Implementation of vulnerability management