Known Vulnerabilities in Log Analysis 1.3.8.1