From 8bf60ddf2bf2cfb9e99a25a83ed42cbbf9541479 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 19 Oct 2023 13:02:01 +0530 Subject: [PATCH] fix lint error --- http/vulnerabilities/other/symantec-sepm-log4j-rce.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/http/vulnerabilities/other/symantec-sepm-log4j-rce.yaml b/http/vulnerabilities/other/symantec-sepm-log4j-rce.yaml index 6e91bbb3f0..5e301ba429 100644 --- a/http/vulnerabilities/other/symantec-sepm-log4j-rce.yaml +++ b/http/vulnerabilities/other/symantec-sepm-log4j-rce.yaml @@ -5,7 +5,7 @@ info: author: shaikhyaser severity: critical description: | - Symantec SPEM is susceptible to Log4j JNDI remote code execution. + Symantec SPEM is susceptible to Log4j JNDI remote code execution. reference: - https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793 classification: