Intake
Researchers submit a structured request with vendor, product, attack surface, evidence, disclosure timing, and a preliminary CVSS assessment.
Researcher-to-vendor disclosure platform
The platform combines structured vulnerability intake, private case coordination, public advisories, and CVE support when a case should receive an identifier. Pentest firms and independent researchers gain recognition, vendors get a faster path to remediation, and VAPT keeps the disclosure record coherent from intake to publication.
Stable disclosure URLs and machine-readable CVE references.
Private intake records awaiting triage or publication.
Identifier handling is available when a coordinated case should receive one.
Mission flow
Researchers submit a structured request with vendor, product, attack surface, evidence, disclosure timing, and a preliminary CVSS assessment.
VAPT case teams validate scope, reproduce impact, check for duplicates, and coordinate directly with vendors on remediation and publication timing.
Public advisories publish with stable identifiers, remediation guidance, metrics, and schema-backed CVE record data.
Program pillars
Public advisory location
Each advisory has a canonical URL, structured metadata, and the technical depth needed for downstream reference and scraping.
Coordinated intake
The intake form captures attack context, affected components, MITRE and CWE mapping, verification flags, and disclosure notes.
CVE support
The backend keeps CVE Services authentication, reserve and publish actions, and record construction on the server side when VAPT needs to support the disclosure with a CVE record.
Latest advisories
Fetching the latest published disclosure records for the homepage feed.
Fetching the latest published disclosure records for the homepage feed.
Stable disclosure URLs and machine-readable CVE references.
Private intake records awaiting triage or publication.
Identifier handling is available when a coordinated case should receive one.
Nimbus Gateway accepted stale bootstrap session material on the administrative API, allowing remote attackers to regain privileged access without re-authentication.
A trusted maintenance workflow in Orbit Mail passed unsanitized template directives to a shell-backed renderer, leading to authenticated remote command execution.