Correlating Easily and Unobtrusively Queried Computer Characteristics to Number and Severity of Vulnerabilities