We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
The implementation needs a bit a refactoring to be re-usable in other places listing vulnerabilities. Also, QuerySet optimization is required.