If you look on here you will see many people coming in saying "I have found a flaw, but can't give you details" and it turns out that they didn't understand something, so everyone is very skeptical when someone comes in and won't give out any details.
PM someone with development experience on here with the details - in exacting detail showing where in the code their is a problem, in the math, or in the design. If it is a vulnerability, you'll hear back quite quickly if you have actually provided enough details and if there is a problem.
The link above shows how quickly the code can be changed if needed, so the answer to the question is, YES.
I am aware that it will take proof to convince people of a flaw, and that I likely have not discovered a flaw worthy of people dealing with.
As for PM'ing -- therein lies the chicken and egg problem. If there is a serious flaw, what prevents the person from taking advantage of it? We're not talking about the cash register at the local burger joint being open in an unlocked building at night, we're talking about the safe deposit box at the bank being open in an unlocked building at night -- in a jurisdiction where the penalty for getting caught is that you had to give up what you took.
Let's say that I found that whatever the block header, a nonce of 0x12345678 would generate a hash well exceeding the current difficulty level (of course it isn't really that simple). Wouldn't it be very tempting for the person I tell to take advantage of that? Perhaps generate a block an hour for half a day, selling for fiat every hour, and walk off with $250K of cash?
Now perhaps the code could be changed quickly if someone took advantage and started created new blocks once a minute, hoping to raise a quick $40M. It's decided to go back to the block before they started, and they have no bitcoins (except perhaps the few they were able to sell). But what if the miner knew that was a possibility, and created a new block say every 4 hours, generating $100K a day. How would that even be detected?