Disclosures

Paul Hutchinson

Table of content
  1. Intro, Our Practises and Processes
  2. Published Disclosures
  3. Resources

Intro, Our Practises and Processes

This section documents security vulnerabilities we have reported to third‑party vendors, along with timelines, technical details, and remediation status where available. The goal is to provide transparent, technically accurate write‑ups that help other practitioners understand real‑world flaws and how they were addressed.

We follow a coordinated vulnerability disclosure approach: issues are first reported privately to the affected vendor, allowing reasonable time for triage and fixes before any public disclosure. In each case study, we include discovery context, impact assessment, and practical mitigation guidance so that operators can verify and harden their own environments.

If you are a vendor referenced here and believe any technical detail or timeline is incorrect, please get in touch so we can review and, if appropriate, update the write‑up. Where possible, we also link to any official advisories, CVEs, or vendor statements so readers can cross‑reference with authoritative sources.

Published Disclosures

Resources