During a penetration test, you have identified multiple vulnerabilities within the client's network. Which of the following would be the BEST approach for highlighting these issues within the written report to ensure proper prioritization?
Suggest immediate system downtime for all identified vulnerabilities
Provide a detailed technical description for each discovered issue
Categorize each vulnerability by its risk rating referencing a recognized framework
List the vulnerabilities in alphabetical order