Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: address some typos #299

Merged
merged 1 commit into from
Oct 21, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,7 @@ Together, these include vulnerabilities from:
- RubyGems
- Ubuntu

These vulnerabilites are aggregated by <https://osv.dev>.
These vulnerabilities are aggregated by <https://osv.dev>.

Join the discussion in the [OpenSSF Slack](https://slack.openssf.org/) channel [#osv_schema](https://openssf.slack.com/archives/C03K6SZBH2S)

Expand Down
2 changes: 1 addition & 1 deletion docs/schema.md
Original file line number Diff line number Diff line change
Expand Up @@ -587,7 +587,7 @@ describes the quantitative method used to calculate the associated `score`.
| --------- | ----------- |
| `CVSS_V2` | A CVSS vector string representing the unique characteristics and severity of the vulnerability using a version of the [Common Vulnerability Scoring System notation](https://www.first.org/cvss/v2/) that is == 2.0 (e.g.`"AV:L/AC:M/Au:N/C:N/I:P/A:C"`).|
| `CVSS_V3` | A CVSS vector string representing the unique characteristics and severity of the vulnerability using a version of the [Common Vulnerability Scoring System notation](https://www.first.org/cvss/) that is >= 3.0 and < 4.0 (e.g.`"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"`).|
| `CVSS_V4` | A CVSS vector string representing the unique characterictics and severity of the vulnerability using a version on the [Common Vulnerability Scoring System notation](https://www.first.org/cvss/) that is >= 4.0 and < 5.0 (e.g. `"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"`). |
| `CVSS_V4` | A CVSS vector string representing the unique characteristics and severity of the vulnerability using a version on the [Common Vulnerability Scoring System notation](https://www.first.org/cvss/) that is >= 4.0 and < 5.0 (e.g. `"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"`). |
| Your quantitative severity type here. | [Send us a PR](https://github.com/ossf/osv-schema/compare). |

### severity[].score field
Expand Down
2 changes: 1 addition & 1 deletion tools/debian/.pylintrc
Original file line number Diff line number Diff line change
Expand Up @@ -289,7 +289,7 @@ no-space-check=
max-module-lines=99999

# String used as indentation unit. The internal Google style guide mandates 2
# spaces. Google's externaly-published style guide says 4, consistent with
# spaces. Google's externally-published style guide says 4, consistent with
# PEP 8. Here, we use 2 spaces, for conformity with many open-sourced Google
# projects (like TensorFlow).
indent-string=' '
Expand Down
2 changes: 1 addition & 1 deletion tools/ghsa/convert_ghsa.py
Original file line number Diff line number Diff line change
Expand Up @@ -253,7 +253,7 @@ def get_affected(ghsa: Dict[str, Any]) -> List[Dict[str, Any]]:
if ghsa_range.upper:
if ghsa_range.upper.operator == '<=':
if first_patched:
# "fixed" events are prefered over "last_affected"
# "fixed" events are preferred over "last_affected"
current_events.append({'fixed': first_patched})
else:
current_events.append({'last_affected': ghsa_range.upper.version})
Expand Down
2 changes: 1 addition & 1 deletion tools/osv-linter/internal/checks/checks.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
// To add additional checks:
// 1. define a new instance of `Check`
// 2. add it to the `checks` array
// 3. add it to the relevent collections defined in `checkCollections`
// 3. add it to the relevant collections defined in `checkCollections`
//
// To add additional collections of checks:
// 1. add to the `checkCollections` array.
Expand Down