Example Of Split Tunneling Vulnerabilities