Connections

Description Entity Location
Prerequisite Briber
Prerequisite Exploit Vulnerability