From 1073ce93760b4b327836667c3be30636ceceecb1 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Fri, 27 May 2022 09:32:32 -0400 Subject: [PATCH] Enhancement: vulnerabilities/code42/code42-log4j-rce.yaml by mp --- vulnerabilities/code42/code42-log4j-rce.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/code42/code42-log4j-rce.yaml b/vulnerabilities/code42/code42-log4j-rce.yaml index 2c0dc52775..dd2b61909c 100644 --- a/vulnerabilities/code42/code42-log4j-rce.yaml +++ b/vulnerabilities/code42/code42-log4j-rce.yaml @@ -1,7 +1,7 @@ id: code42-log4j-rce info: - name: Code42 Apache Log4j - Remote Code Execution + name: Apache Code42 - Log4j Remote Code Execution author: Adam Crosser severity: critical description: Multiple Code42 components are impacted by the logj4 vulnerability. Affected Code42 components include: @@ -49,4 +49,4 @@ requests: regex: - '([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+' # Print extracted ${hostName} in output -# Enhanced by mp on 2022/05/24 +# Enhanced by mp on 2022/05/27