Vulnerability identification (High and above)

Rationale

Identifying high-risk vulnerabilities ensures they receive urgent attention to prevent exploitation that could lead to major security incidents or data breaches.

How to do it

Immediately log any high-risk vulnerabilities with detailed descriptions, severity ratings, and suggested remediations.

Expected Evidence

Upload a high-risk vulnerability report or screenshot, ensuring sensitive system details are removed.