Creating a matrix of vulnerability attributes and system object
Place Order