0f2d4db89845b9fe748bb8df19c166ebc937c930,sbin/db_mgmt_json.py,CVEDownloads,download_site,#CVEDownloads#Any#,285

Before Change


            filename = os.path.join(wd, url.split("/")[-1][:-3])
            // print("Saving file to: {}".format(filename))
            buf = BytesIO(response.content)
            with open(filename, "wb") as f:
                f.write(gzip.GzipFile(fileobj=buf).read())

            self.stream_json(filename=filename)

After Change


                                        else:
                                            cve = add_if_missing(
                                                cve,
                                                "vulnerable_product",
                                                cpeuri["cpe23Uri"],
                                            )
                                            cve = add_if_missing(
                                                cve,
                                                "vulnerable_configuration",
Italian Trulli
In pattern: SUPERPATTERN

Frequency: 3

Non-data size: 2

Instances


Project Name: cve-search/cve-search
Commit Name: 0f2d4db89845b9fe748bb8df19c166ebc937c930
Time: 2020-08-11
Author: paul.tikken@gmail.com
File Name: sbin/db_mgmt_json.py
Class Name: CVEDownloads
Method Name: download_site


Project Name: deepfakes/faceswap
Commit Name: e35918cadf0b4bcfbf530e4cb68d52bd2e0bf93f
Time: 2019-10-10
Author: 36920800+torzdf@users.noreply.github.com
File Name: lib/gui/stats.py
Class Name: Session
Method Name: load_state_file


Project Name: pantsbuild/pants
Commit Name: fd1456ac36e0a1ebfb800c9593f1540858ca7bea
Time: 2015-07-17
Author: kwilson@twopensource.com
File Name: src/python/pants/java/nailgun_executor.py
Class Name: NailgunExecutor
Method Name: _spawn_nailgun_server