Empirical Models for Vulnerability Exploits