diff --git a/src/main/java/org/owasp/dependencycheck/data/nvdcve/xml/DatabaseUpdater.java b/src/main/java/org/owasp/dependencycheck/data/nvdcve/xml/DatabaseUpdater.java index dd0ba4555..2fdf79c7d 100644 --- a/src/main/java/org/owasp/dependencycheck/data/nvdcve/xml/DatabaseUpdater.java +++ b/src/main/java/org/owasp/dependencycheck/data/nvdcve/xml/DatabaseUpdater.java @@ -83,7 +83,8 @@ public class DatabaseUpdater implements CachedWebDataSource { *
Downloads the latest NVD CVE XML file from the web and imports it into * the current CVE Database.
* - * @throws UpdateException is thrown if there is an error updating the database + * @throws UpdateException is thrown if there is an error updating the + * database */ public void update() throws UpdateException { try { @@ -164,7 +165,8 @@ public class DatabaseUpdater implements CachedWebDataSource { * * @param file the file containing the NVD CVE XML * @param oldVersion contains the file containing the NVD CVE XML 1.2 - * @throws ParserConfigurationException is thrown if there is a parserconfigurationexception + * @throws ParserConfigurationException is thrown if there is a + * parserconfigurationexception * @throws SAXException is thrown if there is a saxexception * @throws IOException is thrown if there is a ioexception * @throws SQLException is thrown if there is a sql exception @@ -195,6 +197,12 @@ public class DatabaseUpdater implements CachedWebDataSource { cve20Handler.setPrevVersionVulnMap(prevVersionVulnMap); cve20Handler.setCpeIndex(cpeIndex); saxParser.parse(file, cve20Handler); + +// Logger.getLogger(DatabaseUpdater.class.getName()).log(Level.WARNING, +// String.format("%d out of %d entries processed were application specific CVEs.", +// cve20Handler.getTotalNumberOfApplicationEntries(), +// cve20Handler.getTotalNumberOfEntries())); + cve20Handler = null; } finally { if (cpeIndex != null) { @@ -209,7 +217,6 @@ public class DatabaseUpdater implements CachedWebDataSource { } //