Report on application of the propagation model to security vulnerabilities

Summary
Report on application of the propagation modelto security vulnerabilities