Selected
security vulnerabilities resolved by applying coordinated disclosure: •
MD5 collision attack that shows how to create false CA certificates, 1 week •
Starbucks gift card double-spending/race condition that allowed producing fraudulent extra credits, 10 days (Egor Homakov) •
Dan Kaminsky discovery of
DNS cache poisoning, 5 months •
MBTA vs. Anderson, MIT students find vulnerability in the Massachusetts subway security, 5 months •
Radboud University Nijmegen breaks the security of the
MIFARE Classic cards, 6 months • The
Meltdown vulnerability, hardware vulnerability affecting
Intel x86 microprocessors and some
ARM-based microprocessors, 7 months. • The
Spectre vulnerability, hardware vulnerability with implementations of
branch prediction affecting modern microprocessors with
speculative execution, allowing malicious
processes access to the
mapped memory contents of other programs, 7 months. ==See also==