wavelog Exploited Vulnerabilities