The Evolution of Scoring Security Vulnerabilities: The Sequel