Vulnerability flow and analysis