Update, June 4, 2013:The vendor has now released a patch. You can find details here
I would like to address the story published yesterday in SecurityWeek, and take this opportunity to offer my sincere apologies.
Here is what happened:Earlier this month, a researcher discovered two vulnerabilities within an application, and were coordinating them via the Secunia SVCRP program.
While coordinating with the researcher, one email was accidentally sent from Secunia to a public emailing list, thereby making information about one of the vulnerabilities publically available.
Upon realizing the mistake, Secunia immediately informed the vendor in question, who is currently working to create a patch for the vulnerability.
Secunia is going through all procedures to ensure that this cannot happen in future. Morten R. Stengaard, CTO
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.