# Vulnerability management

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><a href="vulnerability-management/security-terms"><strong>Security terms</strong></a></td><td></td><td></td><td></td></tr><tr><td><a href="vulnerability-management/data-sources"><strong>Data sources</strong></a></td><td></td><td></td><td><a href="vulnerability-management/data-sources">data-sources</a></td></tr><tr><td><a href="vulnerability-management/see-your-data"><strong>See your data</strong></a></td><td></td><td></td><td><a href="vulnerability-management/see-your-data">see-your-data</a></td></tr><tr><td><a href="vulnerability-management/pull-requests"><strong>Pull Requests (PR)</strong></a></td><td></td><td></td><td></td></tr><tr><td><a href="vulnerability-management/set-a-review-status"><strong>Set a review status</strong></a></td><td></td><td></td><td></td></tr><tr><td><a href="vulnerability-management/reachability-analysis"><strong>Reachability analysis</strong></a></td><td></td><td></td><td><a href="vulnerability-management/reachability-analysis">reachability-analysis</a></td></tr><tr><td><a href="vulnerability-management/solve-vulnerabilities-manually-with-root-fixes"><strong>Root fixes</strong></a></td><td></td><td></td><td></td></tr></tbody></table>
