I. Introduction
Security vulnerability, is defect or deficiency in the process of the design and implementation of the hardware, software or protocol in computer system. Illegal users can use the security vulnerabilities to obtain additional privileges of computer systems, access or improve their access rights without authorization, damage the system, endanger the computer system. Nowadays the number of vulnerability is growing rapidly and diversified, how to resolve the risk of information security which caused by vulnerabilities effectively has become an important topic in network security. Since the existing defenses such as firewalls, intrusion detection systems and other network security devices can not completely block attacks, preventions of the attacks become increasingly important. Assessing the degree of hazard caused by vulnerabilities, understanding the risk prioritization of the system security vulnerabilities, processing the vulnerabilities more effectively and reducing the harm are very meaningful to the management of network security.