Comment on [deleted]

FaceDeer@fedia.io ⁨12⁩ ⁨hours⁩ ago

The Coordinated Vulnerability Disclosure (CVD) process:

  1. Discovery: The researcher finds the problem.

  2. Private Notification: The researcher contacts the vendor/owner directly and privately. No public information is released yet.

  3. The Embargo Period: The researcher and vendor agree on a timeframe for the fix (industry standard is often 90 days, popularized by Google Project Zero).

  4. Remediation: The vendor develops and deploys a patch.

  5. Public Disclosure: Once the patch is live (or the deadline expires), the researcher publishes their findings, often assigned a CVE (Common Vulnerabilities and Exposures) ID.

  6. Proof of Concept (PoC): Technical details or code showing exactly how to exploit the flaw may be released to help defenders understand the risk, usually after users have had time to patch.

You say the flaw is "fundamental", suggesting you don't think it can be patched? I guess I'd inform my investment manager during the "private notification" phase as well, then. It's possible you're wrong about its patchability, of course, so I'd recommend carrying on with CVD regardless.

source
Sort:hotnewtop