Map a list of known vulnerabilities to the software inventory and hardware firmware so you can pull a report of vulnerable software installed on clients/servers.