mirror of
https://github.com/cisagov/log4j-affected-db.git
synced 2024-11-24 01:20:48 +00:00
Removed incorrect usage of escape codes in yml.
The incorrect escape codes are removed. This will also result in the removal of (incorrect) escape codes in the generated markdown file.
This commit is contained in:
parent
77f73e03ce
commit
11ef0d7d70
2 changed files with 2 additions and 2 deletions
|
@ -4365,7 +4365,7 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cloud.google.com/log4j2-security-advisory
|
||||
notes: \Looker-hosted instances have been updated to a Looker version with Log4j v2.16.
|
||||
notes: Looker-hosted instances have been updated to a Looker version with Log4j v2.16.
|
||||
Looker is currently working with third-party driver vendors to evaluate the
|
||||
impact of the Log4j vulnerability. As Looker does not enable logging for these
|
||||
drivers in Looker-hosted instances, no messages are logged. We conclude that
|
||||
|
|
|
@ -3753,7 +3753,7 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228
|
||||
notes: The vulnerability will be patch/mitigated in upcoming releases\patches.
|
||||
notes: The vulnerability will be patch/mitigated in upcoming releases/patches.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-22T00:00:00'
|
||||
|
|
Loading…
Reference in a new issue