Attack Techniques and Threat Identification for Vulnerabilities