Updating risk assessment to match CERT's language
diff --git a/docs/limitations.rst b/docs/limitations.rst
index 5b63ef5..dee189d 100644
--- a/docs/limitations.rst
+++ b/docs/limitations.rst
@@ -10,9 +10,9 @@
uninitialized memory.
Python exposes no API for us to implement this reliably and as such almost all
-software in Python is potentially vulnerable to this attack. However the
-`CERT secure coding guidelines`_ consider this issue as "low severity,
-unlikely, expensive to repair" and we do not consider this a high risk for most
+software in Python is potentially vulnerable to this attack. The
+`CERT secure coding guidelines`_ assesses this issue as "Severity: medium,
+Likelihood: unlikely, Remediation Cost: expensive to repair" and we do not consider this a high risk for most
users.
.. _`Memory wiping`: http://blogs.msdn.com/b/oldnewthing/archive/2013/05/29/10421912.aspx