system vulnerabilities examples