Data-Driven Techniques For Vulnerability Assessments