How do you determine the severity of a vulnerability?