Vulnerability Testing Using Models