including enough detail to allow an attacker to exploit the vulnerability
9.4m questions
12.2m answers