site:crowdstrike.com examples of vulnerabilities - Search