Understanding the Log4j Vulnerability that Lasted for Years