Calculates the severity of vulnerabilities.
Public internet exposure, reachable data assets, vulnerable functions, public exploit, reduced accuracy.
Resolution and mute status of vulnerabilities and affected entities.
Recommends fixes for third-party vulnerabilities.
Entities directly and indirectly affected by vulnerabilities.
Vulnerable components, entry points, code location.