Vulnerabilities in Log HTTP Requests