Checkpoint:
Apache Log4j Remote Code Execution (CVE-2021-44228)
Deep Security:
Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)
Fidelis:
FSS_CVE-2021-44228 - Apache Log4j Inject Request
Firepower:
SERVER-OTHER Apache Log4j logging remote code execution attempt
SERVER-APACHE Apache Log4j2 CVE- 2021-44228 Remote Code Execution Vulnerability
Fortigate:
Apache.Log4j.Error.Log.Remote.Code.Execution
Palo Alto:
Apache Log4j Remote Code Execution Vulnerability
Mcafee:
UDS-HTTP: Apache Log4j2 Remote Code Execution Vulnerability
HTTP: Apache Log4j2 Remote Code Execution Vulnerability (CVE-2021-44228)
TippingPoint:
HTTP: JNDI Injection in HTTP Request
IBM:
HTTP_Log4J_JndiLdap_Exec
DDI:
HTTP_POSSIBLE_USERAGENT_RCE_EXPLOIT_REQUEST
CVE-2021-44228 - OGNL EXPLOIT - HTTP(REQUEST)
POSSIBLE HTTP HEADER OGNL EXPRESSION EXPLOIT - HTTP(REQUEST)
POSSIBLE HTTP BODY OGNL EXPRESSION EXPLOIT - HTTP (REQUEST) - Variant 2
Sophos:
SERVER-OTHER Apache Log4j logging remote code execution attempt
SERVER-APACHE Apache Log4j2 CVE- 2021-44228 Remote Code Execution Vulnerability