Understanding Vulnerability and Exploitation