When preparing a vulnerability management report, which of the following elements should be given the highest priority to communicate effectively with stakeholders?
Risk score
List of affected hosts, irrespective of the severity of vulnerabilities
A comprehensive list of all vulnerabilities without prioritization
Recommended action plans for potential future vulnerabilities
Detailed mitigation steps for low-risk vulnerabilities
Historical data of all previously identified vulnerabilities