spelling fixes

Former-commit-id: 8d53d845ec1212370aec6f58bec97cd94ef9b20d
This commit is contained in:
Jeremy Long
2013-02-19 21:40:42 -05:00
parent 6274cfce4b
commit e59377d9a3
3 changed files with 4 additions and 4 deletions

View File

@@ -154,7 +154,7 @@ public class JarAnalyzer extends AbstractAnalyzer implements Analyzer {
* Returns whether or not this analyzer can process the given extension.
*
* @param extension the file extension to test for support.
* @return whether or not the specified file extension is supported by tihs
* @return whether or not the specified file extension is supported by this
* analyzer.
*/
public boolean supportsExtension(String extension) {

View File

@@ -197,7 +197,7 @@ public class CveDB {
}
/**
* Cleansup the object and ensures that "close" has been called.
* Cleans up the object and ensures that "close" has been called.
* @throws Throwable thrown if there is a problem
*/
@Override
@@ -228,7 +228,7 @@ public class CveDB {
* @return a list of Vulnerabilities
* @throws DatabaseException thrown if there is an exception retrieving data
*/
public List<Vulnerability> getVulnerablilities(String cpeStr) throws DatabaseException {
public List<Vulnerability> getVulnerabilities(String cpeStr) throws DatabaseException {
ResultSet rs = null;
final Entry cpe = new Entry();
try {

View File

@@ -103,7 +103,7 @@ public class NvdCveAnalyzer implements org.codesecure.dependencycheck.analyzer.A
if ("cpe".equals(id.getType())) {
try {
String value = id.getValue();
List<Vulnerability> vulns = cveDB.getVulnerablilities(value);
List<Vulnerability> vulns = cveDB.getVulnerabilities(value);
for (Vulnerability v : vulns) {
dependency.addVulnerability(v);
}