You can report vulnerabilities you discover by submitting them directly to programs.
To submit reports:
Go to a program's security page.
Click the blue Submit Report button.
Select the asset type of the vulnerability on the Submit Vulnerability Report form.
Select a report template
Select the weakness or the type of potential issue you've discovered.
(Optional) Select the severity of the vulnerability. You can use the CVSS calculator to determine the severity.
Write up your proof of concept. State:
(Optional) Attach screenshots, demo videos, or any other helpful material. Don't share videos by adding a link to them in the report. You can only include videos if you attach the file directly to the report. This ensures the vulnerability isn't accessible to others before being disclosed.
Enter any additional information the program asks for in the Additional information section. These are custom fields that the program created so that they can collect the specific information they need to better manage and understand the vulnerability. Some fields will be required and some will be optional. (This section only appears for programs that have enabled custom fields.)
Review your report details in the preview window. You won't be able to edit your details after submitting the report. Click Submit Report.
After you've submitted your report, you must wait for programs to respond to your submission.