Information technology — Security techniques — Vulnerability handling processes