If a vulnerability is specific to a feature, parse the config on the device to verify the feature is enabled or in use
and do not list the device as vulnerable if the feature is not present.