How to Prioritize Critical Vulnerabilities to Protect Your Cloud Applications