Must describe the vulnerability in one sentence
Must be readable by non-technical readers
Must be adapted to the organisation
software or local infra
Must describe the vulnerability in one sentence
Must be readable by non-technical readers
Must be adapted to the organisation
software or local infra