Mitigating Log4Shell and Other Log4j-Related Vulnerabilities