Overview Of Cybersecurity Vulnerability Analysis Comes