Return to Article Details Severity and Exploitability Analysis of Security Vulnerabilities in the Public Sector Download Download PDF