Bookworm Game: Automatic Discovery of LTEVulnerabilities Through Documentation Analysis