Everyday, hundreds of new vulnerabilities are discovered and disclosed to the users of the systems they affect. The sheer volume of vulnerabilities makes it difficult, if not impossible, for system administrators to rapidly address every vulnerability. Furthermore, research shows that only 5% of vulnerabilities are eventually exploited. This situation brings about a need to prioritize some vulnerabilities over others, with the vulnerabilities most likely to be exploited treated as priorities.