By Morten R. Stengaard, CTO
Update, June 4, 2013:
I would like to address the story published yesterday in SecurityWeek, and take this opportunity to offer my sincere apologies.
Here is what happened:
Earlier this month, a researcher discovered two vulnerabilities within an application, and were coordinating them via the Secunia SVCRP program.
While coordinating with the researcher, one email was accidentally sent from Secunia to a public emailing list, thereby making information about one of the vulnerabilities publically available.
Upon realizing the mistake, Secunia immediately informed the vendor in question, who is currently working to create a patch for the vulnerability.
Secunia is going through all procedures to ensure that this cannot happen in future.
Morten R. Stengaard, CTO