From 0f59456a884169967f132aa5475a74a0b53716c7 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Gy=C3=B6rgy=20Demarcsek?= Date: Wed, 8 Mar 2023 00:22:33 +0100 Subject: [PATCH] Fix tyop sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers/ScriptEngineInjection.java Co-authored-by: Fabian Meumertzheim --- .../jazzer/sanitizers/ScriptEngineInjection.java | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers/ScriptEngineInjection.java b/sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers/ScriptEngineInjection.java index ca46187c0..e9500d6d0 100644 --- a/sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers/ScriptEngineInjection.java +++ b/sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers/ScriptEngineInjection.java @@ -40,7 +40,7 @@ * Before JDK 15, the Nashorn Engine * was registered by default with ScriptEngineManager under several aliases, * including "js". Nashorn allows - * access to JVM classes, for exmaple {@link java.lang.Runtime} allowing the + * access to JVM classes, for example {@link java.lang.Runtime} allowing the * execution of arbitrary OS commands. * Several other scripting engines can be embedded to the JVM (they must follow * the JSR-223