Evaluating Vulnerabilities

For each vulnerability we need to now: