Known Vulnerabilities in Log Analysis 1.3.7.2 page 2