EXPOSING SILENT WEAKNESSES: YOUR GUIDE TO VULNERABILITY SCANNERS