Information security


My vulnerability is overflow
Explanation and documentation of vulnerability.
-Sensible choice in terms of impact/severity
-Documentation in own words -Shows understanding of root causes