From 164356e776c190ccdaa3f0917d10fdcc40d3989c Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ville=20Skytt=C3=A4?= Date: Thu, 21 Dec 2023 15:58:12 +0200 Subject: [PATCH] Spelling fixes (#233) --- src/ssh_audit/kexdh.py | 4 ++-- src/ssh_audit/versionvulnerabilitydb.py | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/src/ssh_audit/kexdh.py b/src/ssh_audit/kexdh.py index cdefd4e..83cada2 100644 --- a/src/ssh_audit/kexdh.py +++ b/src/ssh_audit/kexdh.py @@ -80,7 +80,7 @@ class KexDH: # pragma: nocover # contains the host key, among other things. Function returns the host # key blob (from which the fingerprint can be calculated). def recv_reply(self, s: 'SSH_Socket', parse_host_key_size: bool = True) -> Optional[bytes]: - # Reset the CA info, in case it was set from a prior invokation. + # Reset the CA info, in case it was set from a prior invocation. self.__hostkey_type = '' self.__hostkey_e = 0 # pylint: disable=unused-private-member self.__hostkey_n = 0 # pylint: disable=unused-private-member @@ -100,7 +100,7 @@ class KexDH: # pragma: nocover # A connection error occurred. We can't parse anything, so just # return. The host key modulus (and perhaps certificate modulus) # will remain at length 0. - self.out.d("KexDH.recv_reply(): received packge_type == -1.") + self.out.d("KexDH.recv_reply(): received package_type == -1.") return None # Get the host key blob, F, and signature. diff --git a/src/ssh_audit/versionvulnerabilitydb.py b/src/ssh_audit/versionvulnerabilitydb.py index 82ed51d..782f3bf 100644 --- a/src/ssh_audit/versionvulnerabilitydb.py +++ b/src/ssh_audit/versionvulnerabilitydb.py @@ -122,7 +122,7 @@ class VersionVulnerabilityDB: # pylint: disable=too-few-public-methods ['2.1', '4.1p1', 1, 'CVE-2005-2798', 5.0, 'leak data about authentication credentials'], ['3.5', '3.5p1', 1, 'CVE-2004-2760', 6.8, 'leak data through different connection states'], ['2.3', '3.7.1p2', 1, 'CVE-2004-2069', 5.0, 'cause DoS via large number of connections (slot exhaustion)'], - ['3.0', '3.4p1', 1, 'CVE-2004-0175', 4.3, 'leak data through directoy traversal'], + ['3.0', '3.4p1', 1, 'CVE-2004-0175', 4.3, 'leak data through directory traversal'], ['1.2', '3.9p1', 1, 'CVE-2003-1562', 7.6, 'leak data about authentication credentials'], ['3.1p1', '3.7.1p1', 1, 'CVE-2003-0787', 7.5, 'privilege escalation via modifying stack'], ['3.1p1', '3.7.1p1', 1, 'CVE-2003-0786', 10.0, 'privilege escalation via bypassing authentication'],