Recently there were reports of malicious individuals attempting to take advantage of well-known vulnerabilities on certain devices. Which of the following would allow those individuals to match these well-known vulnerabilities to each device?