Modern vulnerability resources are considered, their content, security and recovery time of different software products are analyzed. To make the process smoother and more efficient three main stages are distinguished: source overview, general security and severity analysis, and more detailed vulnerability consideration including recovery time. The proposed approach is universal and can be used for almost any software projects and systems.