Describe which vulnerability is involved, how can you demonstrate this, links (URL, IP address), Notably : if extensive explanation and for example provided with screencaps: please place in a separate document (pdf) and send as an attachment (below).