Effectiveness of using call graphs to detect propagated vulnerabilities