Home SecurityApplication Security Vulnerability eXploitability Exchange explained: How VEX makes SBOMs actionable