Background: After a vulnerability is discovered it must be dealt with. However, the question becomes who is responsible for discovering and fixing vulnerabilities, the vendor or the client? What if it is an industrial control system that is critical to a nuclear...