Vulnerabilities in Logstash