**OEM Partners should contact their NVIDIA Customer Program Manager**
If reporting a potential vulnerability via email, please encrypt it using NVIDIA’s public PGP key ([see PGP Key page](https://www.nvidia.com/en-us/security/pgp-key/)) and include the following information:
* Product/Driver name and version/branch that contains the vulnerability
* Type of vulnerability (code execution, denial of service, buffer overflow, etc.)
* Instructions to reproduce the vulnerability
* Proof-of-concept or exploit code
* Potential impact of the vulnerability, including how an attacker could exploit the vulnerability
See https://www.nvidia.com/en-us/security/ for past NVIDIA Security Bulletins and Notices.