もっと詳しく

Most exploited list topped by Log4Shell, ProxyShell, and ProxyLogon vulnerabilities.