mirror of
https://github.com/ysoftdevs/DependencyCheck.git
synced 2026-03-20 08:14:44 +01:00
spelling fixes
Former-commit-id: 8d53d845ec1212370aec6f58bec97cd94ef9b20d
This commit is contained in:
@@ -154,7 +154,7 @@ public class JarAnalyzer extends AbstractAnalyzer implements Analyzer {
|
|||||||
* Returns whether or not this analyzer can process the given extension.
|
* Returns whether or not this analyzer can process the given extension.
|
||||||
*
|
*
|
||||||
* @param extension the file extension to test for support.
|
* @param extension the file extension to test for support.
|
||||||
* @return whether or not the specified file extension is supported by tihs
|
* @return whether or not the specified file extension is supported by this
|
||||||
* analyzer.
|
* analyzer.
|
||||||
*/
|
*/
|
||||||
public boolean supportsExtension(String extension) {
|
public boolean supportsExtension(String extension) {
|
||||||
|
|||||||
@@ -197,7 +197,7 @@ public class CveDB {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Cleansup the object and ensures that "close" has been called.
|
* Cleans up the object and ensures that "close" has been called.
|
||||||
* @throws Throwable thrown if there is a problem
|
* @throws Throwable thrown if there is a problem
|
||||||
*/
|
*/
|
||||||
@Override
|
@Override
|
||||||
@@ -228,7 +228,7 @@ public class CveDB {
|
|||||||
* @return a list of Vulnerabilities
|
* @return a list of Vulnerabilities
|
||||||
* @throws DatabaseException thrown if there is an exception retrieving data
|
* @throws DatabaseException thrown if there is an exception retrieving data
|
||||||
*/
|
*/
|
||||||
public List<Vulnerability> getVulnerablilities(String cpeStr) throws DatabaseException {
|
public List<Vulnerability> getVulnerabilities(String cpeStr) throws DatabaseException {
|
||||||
ResultSet rs = null;
|
ResultSet rs = null;
|
||||||
final Entry cpe = new Entry();
|
final Entry cpe = new Entry();
|
||||||
try {
|
try {
|
||||||
|
|||||||
@@ -103,7 +103,7 @@ public class NvdCveAnalyzer implements org.codesecure.dependencycheck.analyzer.A
|
|||||||
if ("cpe".equals(id.getType())) {
|
if ("cpe".equals(id.getType())) {
|
||||||
try {
|
try {
|
||||||
String value = id.getValue();
|
String value = id.getValue();
|
||||||
List<Vulnerability> vulns = cveDB.getVulnerablilities(value);
|
List<Vulnerability> vulns = cveDB.getVulnerabilities(value);
|
||||||
for (Vulnerability v : vulns) {
|
for (Vulnerability v : vulns) {
|
||||||
dependency.addVulnerability(v);
|
dependency.addVulnerability(v);
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user