An Optimization Approach for the Cascade Vulnerability Problem