Known Vulnerabilities in log-symboles