Vulnerabilities in IBM Disconnected Log Collector