Understanding Vulnerability Classification in Cybersecurity