Fluent Bit Vulnerabilities: RCE, Log Tampering & Cloud Takeover Threats