File tree Expand file tree Collapse file tree 3 files changed +3
-0
lines changed
core/src/main/java/org/owasp/dependencycheck/data Expand file tree Collapse file tree 3 files changed +3
-0
lines changed Original file line number Diff line number Diff line change @@ -84,6 +84,7 @@ public String getEcosystem(DefCveItem cve) {
8484 private boolean hasMultipleVendorProductConfigurations (DefCveItem cve ) {
8585 if (cve .getCve ().getConfigurations () != null && !cve .getCve ().getConfigurations ().isEmpty ()) {
8686 final List <CpeMatch > cpeEntries = cve .getCve ().getConfigurations ().stream ()
87+ .filter (config -> config .getNodes () != null )
8788 .map (Config ::getNodes )
8889 .flatMap (List ::stream )
8990 .filter (cpe -> cpe .getCpeMatch () != null )
Original file line number Diff line number Diff line change @@ -1611,6 +1611,7 @@ private List<VulnerableSoftware> parseCpes(DefCveItem cve) throws CpeValidationE
16111611 final List <VulnerableSoftware > software = new ArrayList <>();
16121612
16131613 final List <CpeMatch > cpeEntries = cve .getCve ().getConfigurations ().stream ()
1614+ .filter (config -> config .getNodes () != null )
16141615 .map (Config ::getNodes )
16151616 .flatMap (List ::stream )
16161617 .map (Node ::getCpeMatch )
Original file line number Diff line number Diff line change @@ -222,6 +222,7 @@ boolean testCveCpeStartWithFilter(final DefCveItem cve) {
222222 if (cve .getCve ().getConfigurations () != null ) {
223223 //cycle through to see if this is a CPE we care about (use the CPE filters
224224 return cve .getCve ().getConfigurations ().stream ()
225+ .filter (config -> config .getNodes () != null )
225226 .map (Config ::getNodes )
226227 .flatMap (List ::stream )
227228 .filter (Objects ::nonNull )
You can’t perform that action at this time.
0 commit comments