The authenticated and unauthenticated requests hit different parts of our system which take slightly different approaches to vulnerabilities when they appear multiple times within a single package. The former counts each instance of a vulnerability within a package, whereas the unauthenticated view will group these vulnerabilities based on a unique ID.
If you take a look at this example you can see appears multiple times as it has been introduced through 4 paths.
The authenticated and unauthenticated requests hit different parts of our system which take slightly different approaches to vulnerabilities when they appear multiple times within a single package. The former counts each instance of a vulnerability within a package, whereas the unauthenticated view will group these vulnerabilities based on a unique ID.
If you take a look at this example you can see appears multiple times as it has been introduced through 4 paths.