Information technology. Security techniques. Vulnerability handling processes. (9th October 2019)