Applying Attacker Profile Knowledge to Vulnerability Management