Triaging Vulnerabilities and Information Leaks