Vulnerability scanning and timescales for action