The only thing that I would add that ehat in an idea world firstly on
finding a vulnerability that an advisory is made to the product producer
then secondly to the list with an IDS fingerprint SNORT. Then not until a
reasonable time to fix the vulnerability the proof of concept exploit is
released (This gives time to hone the exploit as well :)
Sometimes (often, in fact) it's really hard to write a good SNORT signature
that can't be reverse-engineered to give up enough info to create a PoC....