Known Vulnerabilities in Log Analysis 1.3.5.3 page 2