When generating a vulnerability management report, what would a 'Top 10' list most likely include?
The most recent security patches applied to systems
A list of all user accounts and their privileges
The least critical vulnerabilities to be monitored
The most critical security vulnerabilities requiring immediate attention