Vulnerability handling and managing is not something done solely by vendors. It involves multiple other actors, and each of them has a specific role in the overall process. The roles of individual players and interactions among them is changing and evolving over time.
This chapter investigates who the players in the vulnerability handling process are, what their roles are, how they interact with each other, and the current trends in how these relationships are changing. The main actors are
“Researchers” is a catch-all word that encompasses all classes of people who are scrutinizing products for security vulnerabilities. Researchers can range ...