Vulnerability analysis