How can we cluster vulnerabilities? Discover commonalities in the way tags can overlap with this interactive Sankey diagram.
What code tends to have repeated vulnerabilities? Explore vulnerabilities through the source code files they were found in.
Want to suggest another visualization?
Go to our Github