There are only two things your client wants: how their business can be affected by impactful exploitation of a vulnerability and how they can prevent this from happening?