spelling fixes

Former-commit-id: 8d53d845ec1212370aec6f58bec97cd94ef9b20d
This commit is contained in:
Jeremy Long
2013-02-19 21:40:42 -05:00
parent 6274cfce4b
commit e59377d9a3
3 changed files with 4 additions and 4 deletions

View File

@@ -154,7 +154,7 @@ public class JarAnalyzer extends AbstractAnalyzer implements Analyzer {
* Returns whether or not this analyzer can process the given extension. * Returns whether or not this analyzer can process the given extension.
* *
* @param extension the file extension to test for support. * @param extension the file extension to test for support.
* @return whether or not the specified file extension is supported by tihs * @return whether or not the specified file extension is supported by this
* analyzer. * analyzer.
*/ */
public boolean supportsExtension(String extension) { public boolean supportsExtension(String extension) {

View File

@@ -197,7 +197,7 @@ public class CveDB {
} }
/** /**
* Cleansup the object and ensures that "close" has been called. * Cleans up the object and ensures that "close" has been called.
* @throws Throwable thrown if there is a problem * @throws Throwable thrown if there is a problem
*/ */
@Override @Override
@@ -228,7 +228,7 @@ public class CveDB {
* @return a list of Vulnerabilities * @return a list of Vulnerabilities
* @throws DatabaseException thrown if there is an exception retrieving data * @throws DatabaseException thrown if there is an exception retrieving data
*/ */
public List<Vulnerability> getVulnerablilities(String cpeStr) throws DatabaseException { public List<Vulnerability> getVulnerabilities(String cpeStr) throws DatabaseException {
ResultSet rs = null; ResultSet rs = null;
final Entry cpe = new Entry(); final Entry cpe = new Entry();
try { try {

View File

@@ -103,7 +103,7 @@ public class NvdCveAnalyzer implements org.codesecure.dependencycheck.analyzer.A
if ("cpe".equals(id.getType())) { if ("cpe".equals(id.getType())) {
try { try {
String value = id.getValue(); String value = id.getValue();
List<Vulnerability> vulns = cveDB.getVulnerablilities(value); List<Vulnerability> vulns = cveDB.getVulnerabilities(value);
for (Vulnerability v : vulns) { for (Vulnerability v : vulns) {
dependency.addVulnerability(v); dependency.addVulnerability(v);
} }