A well-intentioned researcher discovers a vulnerability on the web site of a major corporation. What should he
do?
A.
Ignore it.
B.
Try to sell the information to a well-paying party on the dark web.
C.
Notify the web site owner so that corrective action be taken as soon as possible to patch the vulnerability.
D.
Exploit the vulnerability without harming the web site owner so that attention be drawn to the problem.