Analyzing The Result Of A Vulnerability Scan