Known Vulnerabilities in Log Analysis