0efc6add68ca2a30ce2905fca2e0ae85ac913cfd,search.py,,,#,15

Before Change



// Search Product (best to use CPE notation, e.g. cisco:ios:12.2
if vSearch:
	for item in collection.find({"vulnerable_configuration": {"$regex" : vSearch}}):
		// the scvOutput module is far from finished !!
		if csvOutput:
			// need to find a way to include 1 (vendor) link in general product searches
			// probably using a command line parameter.
			for entry in item["references"]:
				if re.search("http://www.cisco.com",entry):
					link = entry
				else:
					link = "[no vendor link found]"

After Change


        print(item)
// Search Product (best to use CPE notation, e.g. cisco:ios:12.2
if vSearch:
	for item in collection.find({"vulnerable_configuration": {"$regex" : vSearch}}).sort("last-modified",sorttype):
		// the scvOutput module is far from finished !!
		if csvOutput:
			// need to find a way to include 1 (vendor) link in general product searches
			// probably using a command line parameter.
			for entry in item["references"]:
				if re.search("http://www.cisco.com",entry):
					link = entry
				else:
					link = "[no vendor link found]"
Italian Trulli
In pattern: SUPERPATTERN

Frequency: 3

Non-data size: 2

Instances


Project Name: cve-search/cve-search
Commit Name: 0efc6add68ca2a30ce2905fca2e0ae85ac913cfd
Time: 2012-11-10
Author: a@foo.be
File Name: search.py
Class Name:
Method Name:


Project Name: luispedro/mahotas
Commit Name: d3147629dc479ed6ea3ac5b7c2ba50b12132a4ec
Time: 2014-04-12
Author: luis@luispedro.org
File Name: mahotas/tests/test_find.py
Class Name:
Method Name: test_negative