The most important vulnerabilities might have rapid consideration to incorporate security controls. The minimum vital vulnerabilities might need no notice at all simply because There's minor likelihood They are going to be exploited or they pose very little danger Should they be. Following weaponization could be the delivery phase — https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network