Vulnerability Assessment: Limitations and how to solve them