log injection vulnerabilities and exploits