[rwth-security] How to find Log4j Vulnerabilities in Every Possible Way