From 11ef0d7d70b6c1fe7c0e76b5f4adea522f635b4b Mon Sep 17 00:00:00 2001 From: 00gh <00gh> Date: Fri, 4 Feb 2022 23:27:02 +0100 Subject: [PATCH] Removed incorrect usage of escape codes in yml. The incorrect escape codes are removed. This will also result in the removal of (incorrect) escape codes in the generated markdown file. --- data/cisagov_G.yml | 2 +- data/cisagov_S.yml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/data/cisagov_G.yml b/data/cisagov_G.yml index 65b7c07..394687e 100644 --- a/data/cisagov_G.yml +++ b/data/cisagov_G.yml @@ -4365,7 +4365,7 @@ software: unaffected_versions: [] vendor_links: - https://cloud.google.com/log4j2-security-advisory - notes: \Looker-hosted instances have been updated to a Looker version with Log4j v2.16. + notes: Looker-hosted instances have been updated to a Looker version with Log4j v2.16. Looker is currently working with third-party driver vendors to evaluate the impact of the Log4j vulnerability. As Looker does not enable logging for these drivers in Looker-hosted instances, no messages are logged. We conclude that diff --git a/data/cisagov_S.yml b/data/cisagov_S.yml index 7b7bf71..97fbbe5 100644 --- a/data/cisagov_S.yml +++ b/data/cisagov_S.yml @@ -3753,7 +3753,7 @@ software: unaffected_versions: [] vendor_links: - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228 - notes: The vulnerability will be patch/mitigated in upcoming releases\patches. + notes: The vulnerability will be patch/mitigated in upcoming releases/patches. references: - '' last_updated: '2021-12-22T00:00:00'