1
0
Fork 0
mirror of https://github.com/cisagov/log4j-affected-db.git synced 2024-11-22 08:30:48 +00:00

Merge pull request #499 from 00gh/esc-codes

Removed incorrect usage of escape codes in yml.
This commit is contained in:
justmurphy 2022-02-08 08:07:12 -05:00 committed by GitHub
commit e2f4cacb8a
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
2 changed files with 2 additions and 2 deletions

View file

@ -4365,7 +4365,7 @@ software:
unaffected_versions: [] unaffected_versions: []
vendor_links: vendor_links:
- https://cloud.google.com/log4j2-security-advisory - https://cloud.google.com/log4j2-security-advisory
notes: \Looker-hosted instances have been updated to a Looker version with Log4j v2.16. notes: Looker-hosted instances have been updated to a Looker version with Log4j v2.16.
Looker is currently working with third-party driver vendors to evaluate the Looker is currently working with third-party driver vendors to evaluate the
impact of the Log4j vulnerability. As Looker does not enable logging for these impact of the Log4j vulnerability. As Looker does not enable logging for these
drivers in Looker-hosted instances, no messages are logged. We conclude that drivers in Looker-hosted instances, no messages are logged. We conclude that

View file

@ -3753,7 +3753,7 @@ software:
unaffected_versions: [] unaffected_versions: []
vendor_links: vendor_links:
- https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228
notes: The vulnerability will be patch/mitigated in upcoming releases\patches. notes: The vulnerability will be patch/mitigated in upcoming releases/patches.
references: references:
- '' - ''
last_updated: '2021-12-22T00:00:00' last_updated: '2021-12-22T00:00:00'