Calculates the risk level and score of vulnerabilities.
Public internet exposure, reachable data assets, vulnerable functions, public exploit, assessment mode.
Resolution and mute status of vulnerabilities and affected entities.
Entities directly and indirectly affected by vulnerabilities.
Vulnerable components, entry points, code location.