“Luke, I am your fuzzer”. Automating vulnerability management