Skip to content

Commit 14e699d

Browse files
committed
Fix typos
Signed-off-by: Michael Herzog <mjherzog@nexb.com>
1 parent 0c01002 commit 14e699d

2 files changed

Lines changed: 5 additions & 5 deletions

File tree

website/docs/getting_started/getting_started-cravex.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ assessments, security-by-design practices, and vulnerability management.
1616
- **Vulnerability Reporting**: Manufacturers are required to report any actively exploited vulnerabilities to the European Union Agency for Cybersecurity (ENISA) within 24 hours.
1717
- **Security Updates**: Manufacturers must provide timely and effective security updates to address vulnerabilities.
1818
- **Documentation**: Manufacturers must provide documentation and certification to demonstrate compliance with CRA requirements.
19-
- **Enforcement**: The CRA includes includes penalties for non-compliance.
19+
- **Enforcement**: The CRA includes penalties for non-compliance.
2020

2121
The most challenging CRA requirements for most organizations are those for
2222
timely reporting and remediation of actively exploited vulnerabilities in a product. At a minimum this will require organizations to:
@@ -77,14 +77,14 @@ project
7777
It is not clear which of these specifications will become primary, but they all cover similar data.
7878

7979
**DejaCode** provides a Product feature to record essential VEX data such as:
80-
- Status; The current state of an occurrence of a vulnerability, after
80+
- Status: The current state of an occurrence of a vulnerability, after
8181
automated or manual analysis.
8282
- Justification: The rationale for why the impact analysis state was asserted.
8383
- Responses: Can Not Fix, Rollback, Update, Will Not Fix, Workaround Available
8484
- Reach: Whether the vulnerability is reachable in the context of a package in
8585
the product being analyzed.
8686

87-
You can easily xport VEX information from **DejaCode** in CSAF, CycloneDX or
87+
You can easily export VEX information from **DejaCode** in CSAF, CycloneDX or
8888
OpenVEX format.
8989

9090
## Integration with software development tools

website/docs/getting_started/getting_started-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,14 +87,14 @@ It is not clear which of these specifications will become primary, but they all
8787

8888
[DejaCode](https://dejacode.readthedocs.io/en/latest/) provides a Product
8989
(inventory or SBOM) feature to record the essential VEX data such as:
90-
- Status; The current state of an occurrence of a vulnerability, after
90+
- Status: The current state of an occurrence of a vulnerability, after
9191
automated or manual analysis.
9292
- Justification: The rationale for why the impact analysis state was asserted.
9393
- Responses: Can Not Fix, Rollback, Update, Will Not Fix, Workaround Available
9494
- Reach: Whether the vulnerability is reachable in the context of a package in
9595
the product being analyzed.
9696

97-
From **DejaCode** you can easily xport VEX information in CSAF, CycloneDX or
97+
From **DejaCode** you can easily export VEX information in CSAF, CycloneDX or
9898
OpenVEX format.
9999

100100

0 commit comments

Comments
 (0)