Vulnerability Intelligence Roundup: Leveraging The OODA Loop For Vulnerability Management