Detect log4j vulnerabilities in windows

1. findstr /s /m JNDI c:\*.*

2. start powershell and run:
gci 'C:\' -rec -force -include *.jar -ea 0 | foreach {select-string "JndiLookup.class" $_} | select -exp Path

3. from https://github.com/CERTCC/CVE-2021-44228_scanner
download file 'checkjndi.ps1'
create a file named 'path.txt' with content for example c:\
run 'powershell.exe -ExecutionPolicy bypass'
run 'get-content .\path.txt | .\checkjndi.ps1 -Force'

4. https://github.com/Qualys/log4jscanwin
download file, extract
run 'Log4jScanner.exe /scan /report_sig'
report is located in \ProgramData\Qualsys

5. https://github.com/hillu/local-log4j-vuln-scanner
scanner for all operating systems
run 'local-log4j-vuln-scanner -log log.txt c:\'

VERIFICATION:
Installed Windows Server 2016 Standard
downloaded Oracle Database Express Edition 18c and datamodeler 21.4.1.349.1605
All scanners found vulnerabilties.