Add a field to the vulnerability registration form to identify whether the vulnerability is related to a server or an application. Ex: Vulnerability Source: Server/Application