Seeking out and identifying configuration flaws and vulnerabilities in obsolete software versions