Disclosures
Paul Hutchinson
Table of content
Intro, Our Practises and Processes
This section documents security vulnerabilities we have reported to third‑party vendors, along with timelines, technical details, and remediation status where available. The goal is to provide transparent, technically accurate write‑ups that help other practitioners understand real‑world flaws and how they were addressed.
We follow a coordinated vulnerability disclosure approach: issues are first reported privately to the affected vendor, allowing reasonable time for triage and fixes before any public disclosure. In each case study, we include discovery context, impact assessment, and practical mitigation guidance so that operators can verify and harden their own environments.
If you are a vendor referenced here and believe any technical detail or timeline is incorrect, please get in touch so we can review and, if appropriate, update the write‑up. Where possible, we also link to any official advisories, CVEs, or vendor statements so readers can cross‑reference with authoritative sources.