Detailed vulnerability remediation steps