Analyzing Vulnerability reports