Watch this video on YouTube
During a simulated attack on your network, you discover several vulnerabilities. What Linux command should be used to rank these vulnerabilities based on the CVSS score?