Read Sidebar 3-7 on pages 184-185 of the textbookWhat are the pros and cons

Read Sidebar 3-7 on pages 184-185 of the textbook.  What are the pros and cons of making a system vulnerability public?  Is it better to keep these vulnerabilities secret until they can controlled or should they be disseminated?