0f2d4db89845b9fe748bb8df19c166ebc937c930,sbin/db_mgmt_json.py,CVEDownloads,download_site,#CVEDownloads#Any#,285
Before Change
filename = os.path.join(wd, url.split("/")[-1][:-3])
// print("Saving file to: {}".format(filename))
buf = BytesIO(response.content)
with open(filename, "wb") as f:
f.write(gzip.GzipFile(fileobj=buf).read())
self.stream_json(filename=filename)
After Change
else:
cve = add_if_missing(
cve,
"vulnerable_product",
cpeuri["cpe23Uri"],
)
cve = add_if_missing(
cve,
"vulnerable_configuration",
In pattern: SUPERPATTERN
Frequency: 3
Non-data size: 2
Instances
Project Name: cve-search/cve-search
Commit Name: 0f2d4db89845b9fe748bb8df19c166ebc937c930
Time: 2020-08-11
Author: paul.tikken@gmail.com
File Name: sbin/db_mgmt_json.py
Class Name: CVEDownloads
Method Name: download_site
Project Name: deepfakes/faceswap
Commit Name: e35918cadf0b4bcfbf530e4cb68d52bd2e0bf93f
Time: 2019-10-10
Author: 36920800+torzdf@users.noreply.github.com
File Name: lib/gui/stats.py
Class Name: Session
Method Name: load_state_file
Project Name: pantsbuild/pants
Commit Name: fd1456ac36e0a1ebfb800c9593f1540858ca7bea
Time: 2015-07-17
Author: kwilson@twopensource.com
File Name: src/python/pants/java/nailgun_executor.py
Class Name: NailgunExecutor
Method Name: _spawn_nailgun_server