Using SBOM to Identify Vulnerabilities and Impacted Devices