The heavy tails of vulnerability exploitation