5dc053923afeefed29ce7fc6d56b26a62acac432,sbin/db_mgmt_json.py,,process_cve_item,#,59
Before Change
if "versionEndExcluding" in cpeuri:
query["versionEndExcluding"] = cpeuri["versionEndExcluding"]
version_info += query["versionEndExcluding"]
if "versionEndIncluding" in cpeuri:
query["versionEndIncluding"] = cpeuri["versionEndIncluding"]
version_info += query["versionEndIncluding"]
if query != {}:
query["id"] = hashlib.sha1(cpeuri["cpe23Uri"].encode("utf-8") + version_info.encode("utf-8")).hexdigest()
cpe_info = db.getCPEVersionInformation(query)
After Change
// If the cpe_match did not have any of the version start/end modifiers,
// add the CPE string as it is.
cve["vulnerable_product"].append(cpeuri["cpe23Uri"])
cve ["vulnerable_configuration" ].append(cpeuri["cpe23Uri"])
else:
cve["vulnerable_configuration"].append(cpeuri["cpe23Uri"])
if "problemtype" in item["cve"]:
In pattern: SUPERPATTERN
Frequency: 3
Non-data size: 5
Instances Project Name: cve-search/cve-search
Commit Name: 5dc053923afeefed29ce7fc6d56b26a62acac432
Time: 2019-11-07
Author: sami.kairajarvi@gmail.com
File Name: sbin/db_mgmt_json.py
Class Name:
Method Name: process_cve_item
Project Name: daavoo/pyntcloud
Commit Name: 246c1dde8da6f29f2871b45ac4a4a3f8fb9dc215
Time: 2017-02-22
Author: daviddelaiglesiacastro@gmail.com
File Name: pyntcloud/pyntcloud.py
Class Name: PyntCloud
Method Name: __init__
Project Name: xinntao/BasicSR
Commit Name: 6917d8a3dbf6617f02b1247fd50fbc20d3cb6fd4
Time: 2018-06-10
Author: wxt1994@126.com
File Name: codes/test_dataloader.py
Class Name:
Method Name: