data vulnerability example