mirror of
				https://github.com/jtesta/ssh-audit.git
				synced 2025-10-31 05:25:28 +01:00 
			
		
		
		
	Spelling fixes (#233)
This commit is contained in:
		| @@ -80,7 +80,7 @@ class KexDH:  # pragma: nocover | |||||||
|     # contains the host key, among other things.  Function returns the host |     # contains the host key, among other things.  Function returns the host | ||||||
|     # key blob (from which the fingerprint can be calculated). |     # key blob (from which the fingerprint can be calculated). | ||||||
|     def recv_reply(self, s: 'SSH_Socket', parse_host_key_size: bool = True) -> Optional[bytes]: |     def recv_reply(self, s: 'SSH_Socket', parse_host_key_size: bool = True) -> Optional[bytes]: | ||||||
|         # Reset the CA info, in case it was set from a prior invokation. |         # Reset the CA info, in case it was set from a prior invocation. | ||||||
|         self.__hostkey_type = '' |         self.__hostkey_type = '' | ||||||
|         self.__hostkey_e = 0  # pylint: disable=unused-private-member |         self.__hostkey_e = 0  # pylint: disable=unused-private-member | ||||||
|         self.__hostkey_n = 0  # pylint: disable=unused-private-member |         self.__hostkey_n = 0  # pylint: disable=unused-private-member | ||||||
| @@ -100,7 +100,7 @@ class KexDH:  # pragma: nocover | |||||||
|             # A connection error occurred.  We can't parse anything, so just |             # A connection error occurred.  We can't parse anything, so just | ||||||
|             # return.  The host key modulus (and perhaps certificate modulus) |             # return.  The host key modulus (and perhaps certificate modulus) | ||||||
|             # will remain at length 0. |             # will remain at length 0. | ||||||
|             self.out.d("KexDH.recv_reply(): received packge_type == -1.") |             self.out.d("KexDH.recv_reply(): received package_type == -1.") | ||||||
|             return None |             return None | ||||||
|  |  | ||||||
|         # Get the host key blob, F, and signature. |         # Get the host key blob, F, and signature. | ||||||
|   | |||||||
| @@ -122,7 +122,7 @@ class VersionVulnerabilityDB:  # pylint: disable=too-few-public-methods | |||||||
|             ['2.1',     '4.1p1',   1, 'CVE-2005-2798',  5.0, 'leak data about authentication credentials'], |             ['2.1',     '4.1p1',   1, 'CVE-2005-2798',  5.0, 'leak data about authentication credentials'], | ||||||
|             ['3.5',     '3.5p1',   1, 'CVE-2004-2760',  6.8, 'leak data through different connection states'], |             ['3.5',     '3.5p1',   1, 'CVE-2004-2760',  6.8, 'leak data through different connection states'], | ||||||
|             ['2.3',     '3.7.1p2', 1, 'CVE-2004-2069',  5.0, 'cause DoS via large number of connections (slot exhaustion)'], |             ['2.3',     '3.7.1p2', 1, 'CVE-2004-2069',  5.0, 'cause DoS via large number of connections (slot exhaustion)'], | ||||||
|             ['3.0',     '3.4p1',   1, 'CVE-2004-0175',  4.3, 'leak data through directoy traversal'], |             ['3.0',     '3.4p1',   1, 'CVE-2004-0175',  4.3, 'leak data through directory traversal'], | ||||||
|             ['1.2',     '3.9p1',   1, 'CVE-2003-1562',  7.6, 'leak data about authentication credentials'], |             ['1.2',     '3.9p1',   1, 'CVE-2003-1562',  7.6, 'leak data about authentication credentials'], | ||||||
|             ['3.1p1',   '3.7.1p1', 1, 'CVE-2003-0787',  7.5, 'privilege escalation via modifying stack'], |             ['3.1p1',   '3.7.1p1', 1, 'CVE-2003-0787',  7.5, 'privilege escalation via modifying stack'], | ||||||
|             ['3.1p1',   '3.7.1p1', 1, 'CVE-2003-0786', 10.0, 'privilege escalation via bypassing authentication'], |             ['3.1p1',   '3.7.1p1', 1, 'CVE-2003-0786', 10.0, 'privilege escalation via bypassing authentication'], | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user
	 Ville Skyttä
					Ville Skyttä