zrlog Exploited Vulnerabilities