@@ -77,7 +77,7 @@ def process_release_page(self, release_url):
7777 return
7878
7979 soup = BeautifulSoup (page .content , "lxml" )
80-
80+
8181 # 3. Find Vulnerability Links
8282 vuln_links = set ()
8383 for a in soup .find_all ("a" , href = True ):
@@ -97,16 +97,16 @@ def process_vulnerability_page(self, vuln_url):
9797 return
9898
9999 soup = BeautifulSoup (page .content , "lxml" )
100-
100+
101101 # Extract Details
102102 title = soup .find ("h1" )
103103 title_text = title .get_text (strip = True ) if title else ""
104-
104+
105105 # CVE ID
106106 cve_match = re .search (r"(CVE-\d{4}-\d{4,})" , title_text )
107107 if not cve_match :
108108 cve_match = re .search (r"(CVE-\d{4}-\d{4,})" , soup .get_text ())
109-
109+
110110 cve_id = cve_match .group (1 ) if cve_match else ""
111111 if not cve_id :
112112 return
@@ -135,12 +135,10 @@ def process_vulnerability_page(self, vuln_url):
135135 vector = cvss_match .group (1 )
136136 score_match = re .match (r"([\d\.]+)" , sev_text )
137137 score = score_match .group (1 ) if score_match else None
138-
138+
139139 severities .append (
140140 VulnerabilitySeverity (
141- system = CVSSV31 ,
142- value = score ,
143- scoring_elements = f"CVSS:3.1/{ vector } "
141+ system = CVSSV31 , value = score , scoring_elements = f"CVSS:3.1/{ vector } "
144142 )
145143 )
146144
@@ -177,33 +175,30 @@ def process_vulnerability_page(self, vuln_url):
177175 affected_packages = affected_packages ,
178176 references_v2 = [ReferenceV2 (url = vuln_url )],
179177 url = vuln_url ,
180- severities = severities
178+ severities = severities ,
181179 )
182180
183181 def parse_version_text (self , text ):
184182 if not text :
185183 return None
186-
184+
187185 if "DXP" in text :
188186 name = "liferay-dxp"
189187 elif "Portal" in text :
190188 name = "liferay-portal"
191189 else :
192190 name = "liferay-portal"
193-
191+
194192 purl = PackageURL (type = "generic" , name = name )
195-
193+
196194 version_match = re .search (r"(\d+\.\d+(\.\d+)?)" , text )
197195 if version_match :
198196 version = version_match .group (1 )
199197 try :
200198 affected_range = MavenVersionRange .from_versions ([version ])
201- return AffectedPackageV2 (
202- package = purl ,
203- affected_version_range = affected_range
204- )
199+ return AffectedPackageV2 (package = purl , affected_version_range = affected_range )
205200 except Exception as e :
206201 logger .error (f"Failed to parse version { version } : { e } " )
207202 return None
208-
203+
209204 return None
0 commit comments