Identify most critical vulnerabilities with ThreatMapper