added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T20:24:12.441607+00:00 | 1,614,014,736,000 | 88e7bb103b82dccc80e048d384c9275e2dde50d2 | 3 | {
"blob_id": "88e7bb103b82dccc80e048d384c9275e2dde50d2",
"branch_name": "refs/heads/main",
"committer_date": 1614014736000,
"content_id": "098f53adc6f787dc86522e971127734142088123",
"detected_licenses": [
"MIT"
],
"directory_id": "4c09da0fe386eff331b88055fe5cfd69f5bf03cb",
"extension": "py",
"file... | 2.921875 | stackv2 | from keras.models import load_model
from keras.preprocessing import image
from keras.applications.resnet50 import ResNet50, preprocess_input
import pickle
import cv2
import numpy as np
import os
from flask import Flask, render_template, request
app = Flask(__name__)
# load model and data
with open('static/dog_nam... | 95 | 33.48 | 106 | 12 | 775 | python | [{"finding_id": "codeql_py/flask-debug_aee01158eae0835c_4701b85e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
95,
40
] | [
null,
null
] | [
5,
19
] | [
51,
24
] | |
2024-11-18T21:00:36.666258+00:00 | 1,476,769,646,000 | 1aa1957974a75e85fcd74f43ad51a3b31be512de | 3 | {
"blob_id": "1aa1957974a75e85fcd74f43ad51a3b31be512de",
"branch_name": "refs/heads/master",
"committer_date": 1476769646000,
"content_id": "ec1f22dce9bd331cd58c31c7e259994c935b0f90",
"detected_licenses": [
"MIT"
],
"directory_id": "893991b18315857511baa271333fbeb77a3080ba",
"extension": "py",
"fi... | 2.75 | stackv2 | import flask
import sqlite3
import sqlalchemy
import pandas as pd
app = flask.Flask(__name__, static_folder='')
sqlite_file = 'sqlite_database.db'
db = sqlalchemy.create_engine('sqlite:///%s' % sqlite_file)
table_signup = 'signup'
key_name = 'name'
key_email = 'email'
key_skills = 'skills'
key_wants = 'wants'
def se... | 60 | 31.93 | 118 | 12 | 508 | python | [{"finding_id": "codeql_py/flask-debug_49638ef4847c8321_d2c8c53d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-089"
] | [
"py/flask-debug",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This SQL query depends on a [user-provided value](1)."
] | [
60,
42
] | [
null,
44
] | [
5,
16
] | [
24,
64
] | |
2024-11-18T21:00:38.464761+00:00 | 1,552,783,971,000 | e166fbaff341d9dee3689f96137cebd4cb26fbb6 | 3 | {
"blob_id": "e166fbaff341d9dee3689f96137cebd4cb26fbb6",
"branch_name": "refs/heads/master",
"committer_date": 1552783971000,
"content_id": "72ad8909b6b380f062d3edde5c256cf0a410f2c4",
"detected_licenses": [
"MIT"
],
"directory_id": "f30e7e6313d98d972ea75b499a2caad3a1247c9c",
"extension": "py",
"fi... | 2.515625 | stackv2 | import dateutil.parser;
import mistune;
import re;
import requests;
from capito import changelogs;
from capito.changelogs import Changelog, Version;
# Define regular expressions to detect changelog parts
regex_version = "^(?:[^*#\s-]).*(\d+(?:\.\w+)+).*";
regex_version_name = "(\d+(?:\.\w+)+)";
regex_date = "([0-9].*... | 153 | 37.18 | 107 | 18 | 1,346 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_18191b99d0e1e756_df270f4b", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This string, which is used as a regular expression [here](1), has an unescaped '.' before 'githubusercontent.com', so it might match more hosts than expected."
] | [
17
] | [
null
] | [
21
] | [
50
] | |
2024-11-18T21:25:37.244863+00:00 | 1,575,169,484,000 | 631811aeefe261a0dea914896b643667141b1429 | 2 | {
"blob_id": "631811aeefe261a0dea914896b643667141b1429",
"branch_name": "refs/heads/master",
"committer_date": 1575169484000,
"content_id": "03bd97570c0791c6a426c3ad07feda423d7f593c",
"detected_licenses": [
"MIT"
],
"directory_id": "7565001d283bbd34832ef1d02e183157d6f06c65",
"extension": "py",
"fi... | 2.390625 | stackv2 | import requests
import os
import json
from bs4 import BeautifulSoup
from flask import Flask, request, render_template, send_from_directory
app = Flask(__name__)
@app.route("/")
def index():
return render_template("index.html")
@app.route("/wiki_search")
def search():
return render_template("wiki_search.html... | 107 | 29.09 | 103 | 20 | 722 | python | [{"finding_id": "codeql_py/path-injection_1282292b21bcd367_03c597a1", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 3 | true | [
"CWE-022",
"CWE-918",
"CWE-918"
] | [
"py/path-injection",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
87,
33,
98
] | [
null,
null,
null
] | [
15,
22,
30
] | [
45,
79,
86
] | |
2024-11-18T21:51:25.286527+00:00 | 1,637,437,963,000 | 5fd663abd2a56278ca19fd7fba2e09f1c6311563 | 3 | {
"blob_id": "5fd663abd2a56278ca19fd7fba2e09f1c6311563",
"branch_name": "refs/heads/main",
"committer_date": 1637437963000,
"content_id": "ed7cad412ee598aa189e7c3f105f631831257858",
"detected_licenses": [
"MIT"
],
"directory_id": "49cfd8442be5ab3d6f3db43a733133a9bc6529ff",
"extension": "py",
"file... | 2.796875 | stackv2 | import os
import getpass
import hashlib
if __name__=="__main__":
#Get number of CPUs
cpus_available = int(os.environ['SLURM_CPUS_PER_TASK'])
#Get username
username = getpass.getuser()
#Create Hash Code
hash_object = hashlib.md5(username.encode())
#Result for webcampus is
print('Y... | 17 | 23.88 | 113 | 12 | 107 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_e71d65e6561bc716_f19e3bba", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
13
] | [
null
] | [
31
] | [
48
] | |
2024-11-18T21:51:35.245565+00:00 | 1,628,838,872,000 | 6c73d7e51c6d523c03696911976a6f3e52e1d292 | 2 | {
"blob_id": "6c73d7e51c6d523c03696911976a6f3e52e1d292",
"branch_name": "refs/heads/master",
"committer_date": 1628838872000,
"content_id": "5b16dd448e33c1fec68fc970d31333d4d798a011",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f0a19130a0f573f506f44369c481b4d0ef2742a2",
"extension": "py"... | 2.4375 | stackv2 | #!/usr/bin/env python3
################################################################################
#
# Title: awx_aiqum_inventory
# Author: Adrian Bronder
# Date: 2020-09-07
# Description: Custom script for inventory collection with AWX from AIQUM
# with Ansible modulesdd
#
# S... | 98 | 35.76 | 131 | 18 | 648 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2ea7b70f5e5321b7_6001df20", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-295"
] | [
"py/clear-text-logging-sensitive-data",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This request may run without certificate validation because [it is disabled](1)."
] | [
54,
61
] | [
null,
null
] | [
34,
36
] | [
59,
84
] | |
2024-11-18T21:51:37.469268+00:00 | 1,615,746,938,000 | 5cd65ea32422a37887fd1b28e387725706b62b3d | 3 | {
"blob_id": "5cd65ea32422a37887fd1b28e387725706b62b3d",
"branch_name": "refs/heads/main",
"committer_date": 1615746938000,
"content_id": "61fd7383861adb1e8557cfdb0d9cb6e09f9e23d0",
"detected_licenses": [
"MIT"
],
"directory_id": "0418ec1ab48ab6dd3c7cc2d7b78da95c39a98df3",
"extension": "py",
"file... | 2.515625 | stackv2 | import os
import hashlib
from datetime import datetime
import json
from flask_cors import CORS
from flask import Flask, request, jsonify, render_template
from bson.objectid import ObjectId
from dotenv import load_dotenv
load_dotenv()
from sendgrid import SendGridAPIClient
from sendgrid.helpers.mail import Mail
from he... | 366 | 34.99 | 147 | 19 | 2,952 | python | [{"finding_id": "codeql_py/flask-debug_f1a1abfd36a9bd60_b6c64a0a", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-327"
] | [
"py/flask-debug",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)]... | [
364,
43
] | [
null,
null
] | [
5,
26
] | [
24,
41
] | |
2024-11-18T22:00:21.354494+00:00 | 1,532,732,748,000 | 1de9e6fde29d0e20d9bf858c4ca3133fcae0b3b8 | 2 | {
"blob_id": "1de9e6fde29d0e20d9bf858c4ca3133fcae0b3b8",
"branch_name": "refs/heads/master",
"committer_date": 1532733458000,
"content_id": "d1f1c4eab50e4532a8828b755d79f79bb771c4ea",
"detected_licenses": [
"MIT"
],
"directory_id": "ca0ae3c54fca60b992330dd546afc47590ddb265",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/usr/bin/env python2
from flask import Flask, render_template, request, redirect, Response, jsonify, make_response
import kd_tree_test as kd
import urllib2
import json
app = Flask(__name__, template_folder='.')
@app.route('/')
def output():
return render_template("index.html")
@app.route('/hf_compute', method... | 44 | 30.09 | 99 | 16 | 313 | python | [{"finding_id": "codeql_py/partial-ssrf_b1ed7771db273895_2c76779f", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
26
] | [
null
] | [
16
] | [
93
] | |
2024-11-18T22:00:22.062747+00:00 | 1,593,318,509,000 | 0f53686489ff753eccc438af1a994666bf492931 | 4 | {
"blob_id": "0f53686489ff753eccc438af1a994666bf492931",
"branch_name": "refs/heads/master",
"committer_date": 1593318509000,
"content_id": "05e2f4793c14c1475ce975f6b78ed62b068480bf",
"detected_licenses": [
"MIT"
],
"directory_id": "9213a0c84535d843729f56dcdf6f57b391476d0d",
"extension": "py",
"fi... | 3.796875 | stackv2 | #!/bin/python3
import itertools
import collections
def sliding_window(n, seq):
"""
Copied from toolz
https://toolz.readthedocs.io/en/latest/_modules/toolz/itertoolz.html#sliding_window
A sequence of overlapping subsequences
>>> list(sliding_window(2, [1, 2, 3, 4]))
[(1, 2), (2, 3), (3, 4)]
... | 39 | 29.74 | 87 | 14 | 321 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0ac7f9ad4dc792a5_23a6bcc1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
39
] | [
null
] | [
7
] | [
46
] | |
2024-11-18T22:00:46.806630+00:00 | 1,487,646,114,000 | 269acdfe0fa11f05e04a796ad91c0c21e9026389 | 3 | {
"blob_id": "269acdfe0fa11f05e04a796ad91c0c21e9026389",
"branch_name": "refs/heads/master",
"committer_date": 1487646114000,
"content_id": "c762fcb46816e08b47116bfae2f59d1493265bb4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "77d80eba62237f347fd9a98d7ca4d9f848a8395a",
"extension": "py"... | 2.609375 | stackv2 | """
:mod:`apps.kb.models` -- Models for app kb.
"""
# Std imports
import os
import logging
import re
from datetime import datetime
from pprint import pformat
# Django imports
from django.utils.encoding import smart_str
from django.db import models
from django.core.exceptions import ValidationError
from django.utils.t... | 205 | 35.21 | 123 | 17 | 1,531 | python | [{"finding_id": "codeql_py/redos_52be78717cc2f08b_bdb03b41", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '+'.", "remediati... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '+'."
] | [
36
] | [
null
] | [
28
] | [
47
] | |
2024-11-18T22:00:50.367041+00:00 | 1,493,201,927,000 | b34d581c25f170e81ec95668b05418e27fa31a9b | 3 | {
"blob_id": "b34d581c25f170e81ec95668b05418e27fa31a9b",
"branch_name": "refs/heads/master",
"committer_date": 1493201941000,
"content_id": "25cacab698b315826078288719bc09c26bc0b83f",
"detected_licenses": [
"MIT"
],
"directory_id": "aacf6824d45ed6b8400c72bf6d51f029b1d05f04",
"extension": "py",
"fi... | 2.65625 | stackv2 | #!/usr/bin/python
#
# Authentication proxy app
import Api
import sys
import struct
import logging
# Logging instance
log = logging.getLogger('extauth')
class EjabberdInputError(Exception):
def __init__(self, value):
self.value = value
def __str__(self):
return repr(self.value)
class AuthApp:... | 94 | 22.05 | 59 | 19 | 615 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cf4dd2ebae94fa1d_2a8c773f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
74
] | [
null
] | [
12
] | [
37
] | |
2024-11-18T22:00:55.183628+00:00 | 1,631,033,530,000 | 1f07f0d4b8ee256db8064a57b5d52353a1454a8c | 2 | {
"blob_id": "1f07f0d4b8ee256db8064a57b5d52353a1454a8c",
"branch_name": "refs/heads/master",
"committer_date": 1631033530000,
"content_id": "44c89f408a39fe906b49c34bec1c724aa605d4de",
"detected_licenses": [
"MIT"
],
"directory_id": "a6cead13b32d77125388f2b5bee77b377b809f01",
"extension": "py",
"fi... | 2.421875 | stackv2 | if __name__ == "__main__":
import sys
import urllib
import urllib.request
import tarfile
import os
if len(sys.argv) < 2:
print("No arguments given")
pass
command = sys.argv.pop(1)
if command == "download_knowledge_base":
FILE_URL = "https://wikidatafiles.nyc3.d... | 28 | 31.96 | 121 | 14 | 224 | python | [{"finding_id": "codeql_py/tarslip_e61925dcdc568de0_8c75275c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
25
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T22:01:06.593980+00:00 | 1,632,687,712,000 | 9c3e6201a72176ae904ee419cb9f4257452bbd4d | 2 | {
"blob_id": "9c3e6201a72176ae904ee419cb9f4257452bbd4d",
"branch_name": "refs/heads/master",
"committer_date": 1632687712000,
"content_id": "dfe9c58a05707e220ccca3adaa0cbba9feff1a58",
"detected_licenses": [
"ISC"
],
"directory_id": "3b1a49ca739e6af3b56f17220b8f0a138d38fec8",
"extension": "py",
"fi... | 2.40625 | stackv2 | import config
from flask import Flask, request
from fenix import fenix_client
from database import session_scope, User, init_db
app = Flask(__name__)
init_db()
@app.route('/')
def auth():
if 'error' in request.args:
return f"{request.args.get('error')}: {request.args.get('error_description')}"
try:
... | 32 | 30.56 | 106 | 15 | 221 | python | [{"finding_id": "codeql_py/reflective-xss_8e421fbb50641519_9d277af4", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
14
] | [
null
] | [
16
] | [
87
] | |
2024-11-18T22:01:14.661520+00:00 | 1,479,144,669,000 | 114edf20dc5ed9f3794116495e9aa1d55128af6d | 3 | {
"blob_id": "114edf20dc5ed9f3794116495e9aa1d55128af6d",
"branch_name": "refs/heads/master",
"committer_date": 1479144669000,
"content_id": "1a874515315b278270dd696e2b574b2734ee04d2",
"detected_licenses": [
"MIT"
],
"directory_id": "f25e6f75563f28be32a3180ad330350315bb1bbe",
"extension": "py",
"fi... | 2.703125 | stackv2 | import tornado.web
import tornado.escape
import json
from pow_comments.config import myapp
from pow_comments.models.user import User
#
#
# Base PoW handler (Controller)
# automatically adds RESTful routing:
# 1 GET /items #=> index
# 2 GET /items/1 #=> show
# 3 GET /items/new #=>... | 307 | 36.73 | 131 | 23 | 2,542 | python | [{"finding_id": "codeql_py/reflective-xss_66229c86a6df3d27_965be406", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
210
] | [
null
] | [
20
] | [
26
] | |
2024-11-18T22:15:06.106076+00:00 | 1,674,374,018,000 | d38f65c7b0afb9116e6d1ac2c0a461efe0fb8661 | 3 | {
"blob_id": "d38f65c7b0afb9116e6d1ac2c0a461efe0fb8661",
"branch_name": "refs/heads/master",
"committer_date": 1674374018000,
"content_id": "5f7e099d95c10013309d9c2e5e4f1774c1f931d1",
"detected_licenses": [
"MIT"
],
"directory_id": "04f75ffb1333f6538c22ecef087978d4520195ce",
"extension": "py",
"fi... | 3.03125 | stackv2 | from openpyxl import Workbook, load_workbook
import random
import string
def read_excel(fname):
wb = load_workbook(filename=fname)
data = wb.active
r = data.max_row
col = data.max_column
item = []
array = []
for i in range(1, r + 1):
for j in range(2, col + 1):
cell_val... | 54 | 23.43 | 76 | 13 | 322 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7bd936b1360a7061_9b1b8961", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
20
] | [
null
] | [
11
] | [
16
] | |
2024-11-18T22:26:13.166582+00:00 | 1,693,476,121,000 | 52f6b087cc6825832735f366baabb4e946c31647 | 2 | {
"blob_id": "52f6b087cc6825832735f366baabb4e946c31647",
"branch_name": "refs/heads/master",
"committer_date": 1693476121000,
"content_id": "7da94f73e48e8a14d2d0a0b3453674eb4e832fe5",
"detected_licenses": [
"MIT"
],
"directory_id": "8baa789931c40073889ef7bd5f913947deb36bb5",
"extension": "py",
"fi... | 2.484375 | stackv2 | # -*- coding: utf-8 -*-
from six.moves.urllib.parse import quote, unquote, urlparse, urlencode
import hmac
import time
import hashlib
import logging
from requests.auth import AuthBase
from .cos_comm import to_unicode, to_bytes, to_str
logger = logging.getLogger(__name__)
def filter_headers(data):
"""只设置host con... | 186 | 37.18 | 167 | 20 | 1,797 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_896b342280f498ed_60dcb3f8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
137
] | [
null
] | [
22
] | [
48
] | |
2024-11-18T22:26:17.949973+00:00 | 1,625,072,206,000 | 5cb6a89166d187566b8e13bfb78a291384d358cf | 3 | {
"blob_id": "5cb6a89166d187566b8e13bfb78a291384d358cf",
"branch_name": "refs/heads/main",
"committer_date": 1625072206000,
"content_id": "fcd1c46d3998639f497791a1b8443b2cb415ff98",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "187f1b4d1cd8076eac3bb2973d01b85512c98e4e",
"extension": "py"... | 2.90625 | stackv2 | import sys
import shutil
import json
import subprocess
from typing import Union
from pathlib import Path
from jinja2 import Template
class UserModel():
"""Handles user-defined model described in python scripts.
"""
def __init__(self):
self.parent = Path(__file__).resolve().parent
self.dst... | 224 | 30.03 | 83 | 18 | 1,560 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_7dc7033e74de2f67_98ec1bc6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
192,
207
] | [
null,
null
] | [
16,
16
] | [
27,
29
] | |
2024-11-18T22:26:18.885696+00:00 | 1,558,938,021,000 | 303c6e2250c963b0adcc6a2ea69b2f640cb785d2 | 2 | {
"blob_id": "303c6e2250c963b0adcc6a2ea69b2f640cb785d2",
"branch_name": "refs/heads/master",
"committer_date": 1558938021000,
"content_id": "e654b481b5c151ce719deeda16755e698b261c2c",
"detected_licenses": [
"MIT"
],
"directory_id": "bcc57683b4b7982c8ed011cd18f3f26c222dded6",
"extension": "py",
"fi... | 2.5 | stackv2 | import datetime as dt
import pandas as pd
from pandas import DataFrame, Series
import os
import sys
import re
import logging
import sqlalchemy
from configobj import ConfigObj
import html
from flask import Flask, request
class ListManager(object):
config = ConfigObj('C:/webapps/listman/listman.conf')
MAIL_SERV... | 223 | 43.5 | 137 | 22 | 2,186 | python | [{"finding_id": "codeql_py/flask-debug_9d18cf5eb999d02a_0832f98f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 5 | true | [
"CWE-215",
"CWE-1333",
"CWE-079",
"CWE-089",
"CWE-089"
] | [
"py/flask-debug",
"py/polynomial-redos",
"py/reflective-xss",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '?'.",
"Cross-site scripting vulnerability due to a [user-provided valu... | [
223,
93,
219,
103,
116
] | [
null,
null,
null,
null,
null
] | [
5,
45,
12,
26,
30
] | [
24,
54,
19,
33,
37
] | |
2024-11-18T20:40:03.566851+00:00 | 1,427,063,095,000 | 4df04c10fefff81196b34f2efe46ee0af47317f5 | 3 | {
"blob_id": "4df04c10fefff81196b34f2efe46ee0af47317f5",
"branch_name": "refs/heads/master",
"committer_date": 1427063095000,
"content_id": "b59e582f2b18b06537ea9df8b5181fa879c172de",
"detected_licenses": [
"MIT"
],
"directory_id": "efad0656670d7fb5c45fff2b8eb62b7bd9b56bc4",
"extension": "py",
"fi... | 2.625 | stackv2 | import os.path
import tornado.ioloop
import tornado.web
import re, praw, requests, os, glob, sys
from bs4 import BeautifulSoup
def addimagetolist(submissions, image_list):
# Process all the submissions from the front page
for submission in submissions:
# Check for all the cases where we will skip a sub... | 130 | 44.52 | 104 | 21 | 1,234 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_38a2d9af3e29fee2_6b9b65e3", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://i.imgur.com/](1) may be at an arbitrary positio... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [http://i.imgur.com/](1) may be at an arbitrary position in the sanitized URL.",
"The string [http://imgur.com/](1) may be at an arbitrary position in the sanitized URL."
] | [
29,
40
] | [
null,
null
] | [
14,
14
] | [
53,
51
] | |
2024-11-18T20:52:24.814813+00:00 | 1,624,105,809,000 | ec7f5276e90681021ce434a26618775478292b00 | 3 | {
"blob_id": "ec7f5276e90681021ce434a26618775478292b00",
"branch_name": "refs/heads/main",
"committer_date": 1624105809000,
"content_id": "8a5cda44e1bf5816c53eddb1ababdf3bef5c2df6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "45d02ae8c0962284697c1678cac8633141082e9d",
"extension": "py",
... | 2.796875 | stackv2 | #python 3.7.1
from time import sleep as sp
app=str(input("app: "))
username=str(input("username: "))
import socket
host = socket.gethostname()
ip = socket.gethostbyname(host)
import random
lower = "abcdefghijklmnopqrstuvwxyz"
upper = "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
number = "0123456789"
all = lower + upper + number
len... | 66 | 19.7 | 76 | 11 | 434 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e82448fe0b8e816c_b22bec1b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
63
] | [
null
] | [
11
] | [
12
] | |
2024-11-18T21:08:06.803376+00:00 | 1,509,992,216,000 | 1ece10356f6eaa9cadf8852299ebd2fac9fbf65b | 2 | {
"blob_id": "1ece10356f6eaa9cadf8852299ebd2fac9fbf65b",
"branch_name": "refs/heads/master",
"committer_date": 1509992216000,
"content_id": "62b078471abe423e4c9a98cd89d0e8e4e0e493aa",
"detected_licenses": [
"MIT"
],
"directory_id": "8b75737cbc0055e85bcbf6970cdf0619e7394d46",
"extension": "py",
"fi... | 2.359375 | stackv2 | # pylint: disable=line-too-long
import os
import logging
import docker
import hmac
from hashlib import sha1
from flask import Flask, jsonify, request, Response
from flask_cors import CORS, cross_origin
VERSION = '0.0.1'
WORKER_INFO = {
'image': os.environ.get('INSTANCE_IMAGE_NAME'),
'source_port': 3000,
}
d... | 117 | 38.91 | 127 | 20 | 1,044 | python | [{"finding_id": "codeql_py/stack-trace-exposure_2b7e2fd15b237261_ae1f54ac", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
102
] | [
null
] | [
30
] | [
36
] | |
2024-11-18T21:08:26.390983+00:00 | 1,628,496,047,000 | 53269516393d8af10f9ebec633c2f2a29ed04c52 | 3 | {
"blob_id": "53269516393d8af10f9ebec633c2f2a29ed04c52",
"branch_name": "refs/heads/master",
"committer_date": 1628496047000,
"content_id": "9f7786877634a2d47598deb2e4e87615cbb12e30",
"detected_licenses": [
"MIT"
],
"directory_id": "5a34ce118ea4503e2497ddd5517da3805cc15690",
"extension": "py",
"fi... | 3.171875 | stackv2 | import pandas as pd
import matplotlib.pyplot as plt
# 读取脱发信息文件
df = pd.read_csv(filepath_or_buffer="2019年国内脱发人群抽样信息.csv")
# print(df.columns)
# Index(['性别', '年龄', '职业', '所在城市', '脱发类型'], dtype='object')
# 预处理:分组统计
# 统计不同性别人数
seriesGenderCnt = df["性别"].value_counts()
# 也可以按照SQL语句特色来分组、聚合
# 不过,这里需要添加代理码
# df["surrogate"... | 57 | 24.12 | 105 | 10 | 535 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_22ad7f06429ed96d_18148068", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
27
] | [
29
] | [
7
] | [
52
] | |
2024-11-18T21:08:32.921249+00:00 | 1,618,800,030,000 | f84d0885e1ea083cc6ee385b62223026b36861a4 | 3 | {
"blob_id": "f84d0885e1ea083cc6ee385b62223026b36861a4",
"branch_name": "refs/heads/master",
"committer_date": 1618800030000,
"content_id": "ebb8bf6750e00f53967bfc42a65b1c5f0af7dc3b",
"detected_licenses": [
"MIT"
],
"directory_id": "79bd1caf21f7810c3c76379341db36884e617bce",
"extension": "py",
"fi... | 2.5625 | stackv2 | from selenium.webdriver.common.action_chains import ActionChains
from selenium.webdriver.common.keys import Keys
from selenium import webdriver
from time import sleep
from sys import exit
import PySimpleGUI as sg
import openpyxl
import os
import docx
import socket
import logging
#logging.basicConfig(filename='LastLog... | 149 | 29.88 | 123 | 21 | 1,143 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fb3ddbdb44cd71fa_d91bbecc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
109
] | [
null
] | [
15
] | [
66
] | |
2024-11-18T21:31:28.253940+00:00 | 1,451,973,794,000 | 43891ce2657b14ce4ecb8f64c51c93c7e2207180 | 2 | {
"blob_id": "43891ce2657b14ce4ecb8f64c51c93c7e2207180",
"branch_name": "refs/heads/master",
"committer_date": 1451973794000,
"content_id": "f2326c30fce96d1e00a03f699afd91bb7d7b91df",
"detected_licenses": [
"MIT"
],
"directory_id": "3043ce9d80e2451a4231ee33035f821ae1786583",
"extension": "py",
"fi... | 2.453125 | stackv2 | """
Create the index page.
"""
import os
from os import path
import subprocess
import csv
from jinja2 import Environment, PackageLoader
from static_html_demo.utils import (make_local_copy, timestamp_now,
mkdir, Opener, include_file)
def get_versions():
output = subprocess.ch... | 75 | 35.04 | 84 | 15 | 593 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_73ec7f062882ff69_f41fc9f9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
60
] | [
null
] | [
11
] | [
77
] | |
2024-11-18T21:31:32.044801+00:00 | 1,457,917,710,000 | 14bcfb51255a4c3a39d14e2edb2c76f11af9f62c | 3 | {
"blob_id": "14bcfb51255a4c3a39d14e2edb2c76f11af9f62c",
"branch_name": "refs/heads/master",
"committer_date": 1457917710000,
"content_id": "e1f84f3801a5b8c252b0a5cf275f27775033931c",
"detected_licenses": [
"MIT"
],
"directory_id": "1fb7441ab6d6a82102ccb29e87b52b667405eb18",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/env python3
from bs4 import BeautifulSoup
from flask import Flask
from flask import request
import datetime
import requests
import json
import re
# The URLs for the login page and the main timetable page
CURRENT_YEAR = datetime.datetime.now().year
LOGIN_PAGE = 'https://timetable.jcu.edu.au/%i/Login.aspx' % ... | 298 | 35.79 | 174 | 21 | 2,811 | python | [{"finding_id": "codeql_py/stack-trace-exposure_6b025a57b18da88e_322c3b4e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-730"
] | [
"py/stack-trace-exposure",
"py/regex-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This regular expression depends on a [user-provided value](1) and is executed by [re.match](2)."
] | [
295,
77
] | [
null,
null
] | [
16,
42
] | [
45,
52
] | |
2024-11-18T21:31:34.919304+00:00 | 1,617,807,023,000 | 66a89ab40a32f6797b2be8dd823d5e3b21dab9a8 | 3 | {
"blob_id": "66a89ab40a32f6797b2be8dd823d5e3b21dab9a8",
"branch_name": "refs/heads/main",
"committer_date": 1617807023000,
"content_id": "2d6ca528ad6c5ba454c83eacf4194c1399f9fca4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "faecc8e9a6e42114ea9738f1954e35570710fd82",
"extension": "py",
... | 2.8125 | stackv2 | """
UserController.py
Sprinkle
Created by LeeKW on 2021/02/04.
"""
from sprinkle.models.User import User
class UserController():
def __init__(self):
self.user = User()
def createUser(self, userInfo):
"""
새로운 사용자 정보를 Database에 저장하는 메소드
기존에 동일한 정보가 있는지 확인하고 없다면 새로 저장한다.
... | 73 | 27.4 | 74 | 18 | 555 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_381fdae31a6ded52_9fbed576", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
29
] | [
null
] | [
15
] | [
23
] | |
2024-11-18T21:32:15.074336+00:00 | 1,600,583,069,000 | 31f70f2e4e1ae7785f69317dbff21fed9575b40d | 3 | {
"blob_id": "31f70f2e4e1ae7785f69317dbff21fed9575b40d",
"branch_name": "refs/heads/master",
"committer_date": 1600583069000,
"content_id": "2b19caef77215654a3b33e4b76a658be717f1358",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "338883a2aa0ebc0555e9f33497bb28cfa9614a27",
"extension": "py"... | 2.53125 | stackv2 | from flask import Flask
from flask import render_template,request
from jinja2 import Template
import re
app = Flask(__name__, template_folder='templates')
compression = r"\"|ca|mor|hea|tai|\{%|\\"
def black_list(string):
global compression
print(re.findall(compression,string))
if re.findall(compression,st... | 33 | 24.94 | 63 | 14 | 204 | python | [{"finding_id": "codeql_py/template-injection_d88bb64a608b70e5_bb4153d9", "tool_name": "codeql", "rule_id": "py/template-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This template construction depends on a [user-provided value](1).", "remediation": "", "location": ... | 2 | true | [
"CWE-074",
"CWE-079"
] | [
"py/template-injection",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This template construction depends on a [user-provided value](1).",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25,
25
] | [
null,
null
] | [
32,
23
] | [
63,
64
] | |
2024-11-18T21:32:17.130366+00:00 | 1,657,375,515,000 | 25dd4ab52e00f86bb7c33977b1b18821c2b73f93 | 3 | {
"blob_id": "25dd4ab52e00f86bb7c33977b1b18821c2b73f93",
"branch_name": "refs/heads/master",
"committer_date": 1657375515000,
"content_id": "27697f797a96d0ba5b7b72b8326f1fdd58551666",
"detected_licenses": [
"MIT"
],
"directory_id": "39656b7cefe1569987ef00456b592fbeccd8fb25",
"extension": "py",
"fi... | 2.578125 | stackv2 | import jinja2
import typing
class TemplateGenerator:
def __init__(self, *, dirname: str):
self.template_loader = jinja2.FileSystemLoader(searchpath=dirname)
def render(self, *,
path: str,
payload: typing.Dict,
filters: typing.Optional[typing.Dict] = None) ... | 20 | 31.55 | 74 | 12 | 126 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9e422da353677e52_0cf751fc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
15
] | [
null
] | [
24
] | [
71
] | |
2024-11-18T21:32:27.494879+00:00 | 1,571,681,307,000 | 42dff47ac43ffbe2b365e3fc0365341d1ea74841 | 2 | {
"blob_id": "42dff47ac43ffbe2b365e3fc0365341d1ea74841",
"branch_name": "refs/heads/master",
"committer_date": 1571681307000,
"content_id": "17a021a08d010a549b56905b59ee2d4d8ba76523",
"detected_licenses": [
"MIT"
],
"directory_id": "52ca6c98d8cb44c5e7bcf1484354f75111cacedd",
"extension": "py",
"fi... | 2.453125 | stackv2 | import urllib.request, urllib.parse, urllib.error
#import json
from bs4 import BeautifulSoup
import os
from flask import Flask
from flask import request
from flask import make_response
# Flask app should start in global layout
app = Flask(__name__)
@app.route('/webhook', methods=['POST'])
def webhook():
req = re... | 112 | 29.77 | 145 | 19 | 825 | python | [{"finding_id": "codeql_py/partial-ssrf_3730d4f2e7b19fa6_e72e236b", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
32,
42
] | [
null,
null
] | [
12,
12
] | [
44,
39
] | |
2024-11-18T21:32:44.356584+00:00 | 1,691,399,521,000 | dc784ff812836e9ec0085f65e98d53f6f3787f92 | 3 | {
"blob_id": "dc784ff812836e9ec0085f65e98d53f6f3787f92",
"branch_name": "refs/heads/master",
"committer_date": 1691399521000,
"content_id": "9223908940906c0cd2f14c8345be28d2220ddb26",
"detected_licenses": [
"MIT"
],
"directory_id": "6b5ffc003053d4aaacbf200c119cf2344c289da2",
"extension": "py",
"fi... | 2.515625 | stackv2 | import os
import socket
import sys
import boto3
sys.path.append(os.path.abspath(os.path.join(__file__, "../../../")))
import logging
import v2.utils.utils as utils
from botocore.client import Config
log = logging.getLogger()
class Auth(object):
"""
This class is used to perform authentication.
The fun... | 171 | 29.53 | 81 | 15 | 1,081 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_061fedbaf4118d20_1d0910f5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
55
] | [
null
] | [
18
] | [
52
] | |
2024-11-18T21:33:11.734914+00:00 | 1,512,976,263,000 | 324285eaea67fb63bf305eabd69225ebad3c6118 | 3 | {
"blob_id": "324285eaea67fb63bf305eabd69225ebad3c6118",
"branch_name": "refs/heads/master",
"committer_date": 1512976263000,
"content_id": "654d13bb6c1b608734ca8c181c582e80f353b591",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b524eafac75ce50461176bea4dd5397a70ff6e67",
"extension": "py"... | 2.625 | stackv2 | #usr/bin/python3
import os
print("********* file operate *************")
print("is file : ", os.path.isfile("text.txt"))
print("is abs: ", os.path.isabs("text.txt"))
print("is abs: ", os.path.isabs("/d"))
print("exists", os.path.exists("/d/soft"))
print("exists .", os.path.exists("."))
print("exists .. ", os.p... | 126 | 24.1 | 88 | 12 | 866 | python | [{"finding_id": "codeql_py/overly-permissive-file_79752c7af3658525_ded82a00", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable."
] | [
68,
72
] | [
null,
null
] | [
5,
5
] | [
34,
40
] | |
2024-11-18T21:49:05.520075+00:00 | 1,595,449,080,000 | 3d863e7b9780bae68f2548509c2bdf5866bcf0ae | 3 | {
"blob_id": "3d863e7b9780bae68f2548509c2bdf5866bcf0ae",
"branch_name": "refs/heads/master",
"committer_date": 1595449080000,
"content_id": "cbdad800d4dbee07bf9858f4b827a6e58db6facb",
"detected_licenses": [
"MIT"
],
"directory_id": "69647e2a24ee342a9fe59b04ff4b9d9400ce2ffd",
"extension": "py",
"fi... | 3.234375 | stackv2 | #!/usr/bin/env python3
"""
Advent of Code 2016: Day 5
"""
import hashlib
decrypted = [
"00000fe1e92080b9951b053e70e31fcb",
"000007c827126c81fa664211693f2540",
"000007880153f1b804481a39a6d2e86a",
"00000a6e225253b6aaa8f20efbaad8b5",
"00000096164643e2e0fbf5a91bfd7f06",
"00000e77a8b223b2d149990fb63... | 84 | 23.45 | 81 | 19 | 735 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8cb20e2f6152c3b4_7c3db4b6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
75,
77
] | [
null,
null
] | [
11,
11
] | [
20,
20
] | |
2024-11-18T21:49:08.699280+00:00 | 1,667,714,621,000 | 7ad08cce66574062e94557bd2783eace7b7e25db | 3 | {
"blob_id": "7ad08cce66574062e94557bd2783eace7b7e25db",
"branch_name": "refs/heads/master",
"committer_date": 1667714621000,
"content_id": "4f30e0bcd27b635b1ab6c87ecfb24fc673c94f4d",
"detected_licenses": [
"MIT"
],
"directory_id": "7fc455fd780d67fc0685850da82cb508e34c4de5",
"extension": "py",
"fi... | 2.609375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import os
def main():
for path, dirnames, filenames in os.walk('.'):
for dname in dirnames:
try:
os.chmod(os.path.join(path, dname), 0775)
except OSError as e:
print('set {} error: {}'.format(dname, e))
... | 23 | 26.7 | 58 | 17 | 151 | python | [{"finding_id": "codeql_py/overly-permissive-file_fb7f55591251684f_0243d7ad", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable.",
"Overly permissive mask in chmod sets file to world readable."
] | [
9,
16
] | [
null,
null
] | [
17,
17
] | [
58,
58
] | |
2024-11-18T22:42:12.238617+00:00 | 1,634,011,374,000 | ee6a0e5f17444dc6376b2da309cfe29e31d78753 | 3 | {
"blob_id": "ee6a0e5f17444dc6376b2da309cfe29e31d78753",
"branch_name": "refs/heads/master",
"committer_date": 1634011374000,
"content_id": "a62686570bc6f67c52f98649cf46cb35e6af30f5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c0933acba30c172c3e4fa1edeba7159b0a5b32db",
"extension": "py"... | 2.828125 | stackv2 | # Copyright 2016, 2020 John J. Rofrano. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable ... | 84 | 34.54 | 88 | 13 | 623 | python | [{"finding_id": "codeql_py/stack-trace-exposure_0a4a6c4b0858763c_bb8be6f9", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
71
] | [
null
] | [
30
] | [
43
] | |
2024-11-18T20:31:26.778657+00:00 | 1,666,569,906,000 | b221cf8f47a74e4d41fe79e67f6dc55354420cc2 | 3 | {
"blob_id": "b221cf8f47a74e4d41fe79e67f6dc55354420cc2",
"branch_name": "refs/heads/main",
"committer_date": 1666569906000,
"content_id": "84c70eafd8570dd3ad9d36f1f3a285137c0d65ce",
"detected_licenses": [],
"directory_id": "9be8d7b4db213990ae0d10ffee3705f210651371",
"extension": "py",
"filename": "utils... | 3.09375 | stackv2 | #!/usr/bin/env python
"""Import required modules."""
import os
import re
from typing import TypedDict, Tuple
import meraki
# Constant variables declaration
API_KEY = os.environ['MERAKI_API_KEY_HH']
# API_KEY = os.environ['MERAKI_API_KEY_SYD_TRAINING']
BASE_URL = "https://api.meraki.com/api/v0"
PRODUCT_TYPES = {
'm... | 238 | 36.99 | 79 | 20 | 2,119 | python | [{"finding_id": "codeql_py/overly-large-range_ddd4bac0206c9218_9ac698b5", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[)*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "reme... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[)*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
96
] | [
null
] | [
52
] | [
55
] | |
2024-11-18T20:31:39.586508+00:00 | 1,644,056,429,000 | 761b45673d5d0c6c9c37fafd762e3396eec7901d | 2 | {
"blob_id": "761b45673d5d0c6c9c37fafd762e3396eec7901d",
"branch_name": "refs/heads/master",
"committer_date": 1644056429000,
"content_id": "ec9682c8a1a644703bfb126eedc0f1e573166d6f",
"detected_licenses": [
"BSD-3-Clause",
"BSD-2-Clause"
],
"directory_id": "0585739ed6a2251ade7b2a6116f803b2e4d1f544... | 2.421875 | stackv2 | # Copyright (c) 2009 Tim Dumol
# Copyright (c) 2013- The Spyder Development Team and Docrepr Contributors
#
# Distributed under the terms of the BSD BSD 3-Clause License
"""
Process docstrings with Sphinx.
AUTHORS:
- Tim Joseph Dumol (2009-09-29): initial version
- The Spyder Development Team: Maintenance
Copyright ... | 489 | 30.01 | 79 | 16 | 3,576 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d22841947259dc9f_64326d8c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
74,
479
] | [
null,
null
] | [
11,
11
] | [
24,
24
] | |
2024-11-18T20:31:41.982997+00:00 | 1,530,701,219,000 | 008ce4c31634cd66ae777e972dcda513eefbc267 | 3 | {
"blob_id": "008ce4c31634cd66ae777e972dcda513eefbc267",
"branch_name": "refs/heads/master",
"committer_date": 1530701219000,
"content_id": "06bf361bd34a9d0b1bcd95ec63d30bf078ac0e78",
"detected_licenses": [
"MIT"
],
"directory_id": "0f38a82775850bbc1072f62fd1a50b879f6b95b7",
"extension": "py",
"fi... | 2.75 | stackv2 | from . import auth_blueprint
from app.models import User, Access_token
from flask import make_response, request, jsonify
from flask.views import MethodView
class RegistrationView(MethodView):
"""this class will handle registration of users"""
def post(self):
"""this method will handle post requests
... | 142 | 40.9 | 116 | 19 | 1,059 | python | [{"finding_id": "codeql_py/stack-trace-exposure_fe93996a792b9f3b_9f6817a6", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
71,
107
] | [
null,
null
] | [
46,
42
] | [
54,
50
] | |
2024-11-18T21:10:00.480046+00:00 | 1,629,205,752,000 | 670638d8ac1d89b134f55affc74ecc1ed67cd863 | 3 | {
"blob_id": "670638d8ac1d89b134f55affc74ecc1ed67cd863",
"branch_name": "refs/heads/main",
"committer_date": 1629205752000,
"content_id": "d88a485bf558869f344bedba4231a71b550eae80",
"detected_licenses": [
"Unlicense"
],
"directory_id": "8faeb260b8ddc5b2f1ce2887e25c03b98ab1ad4d",
"extension": "py",
... | 2.515625 | stackv2 | import inspect
import os
from difflib import SequenceMatcher
from logging import getLogger
from typing import List, Union
import requests
import unidecode
from covid_data.db import queries
from covid_data.errors import (
PlaceInfoFetchException,
PlaceInfoNotCompleteException,
PlaceNameNotProvidedException,... | 310 | 30.36 | 115 | 16 | 2,124 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3034a3327f8c4491_f5449683", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
46
] | [
null
] | [
22
] | [
37
] | |
2024-11-18T21:10:22.771188+00:00 | 1,585,723,208,000 | 9777884e116fa4c59e4df56bbf62701fbdf9d2ef | 2 | {
"blob_id": "9777884e116fa4c59e4df56bbf62701fbdf9d2ef",
"branch_name": "refs/heads/master",
"committer_date": 1585723208000,
"content_id": "3cc0da3aa52621822a012b00d141541679151d14",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d4044bd9c5cf70c491df3b1da5bd2d16063717bf",
"extension": "py"... | 2.375 | stackv2 | import pyeapi
import yaml
from getpass import getpass
from pprint import pprint
def myfunc_yaml_output(filename):
with open(filename) as f:
device_dict = yaml.load(f)
return device_dict
def myfunc_show_arp(output):
arp_entry = output[0]['result']['ipV4Neighbors']
print("IP Address MAC ... | 21 | 27.19 | 52 | 14 | 140 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d98fc9c711843668_0035e07c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
19
] | [
null
] | [
32
] | [
40
] | |
2024-11-18T21:10:32.089959+00:00 | 1,610,043,052,000 | efa98dcfff333599e1557674a548a065e4e5927e | 3 | {
"blob_id": "efa98dcfff333599e1557674a548a065e4e5927e",
"branch_name": "refs/heads/main",
"committer_date": 1610043052000,
"content_id": "5c6d63458d43a1783aa4c7b3986bb77591c0705d",
"detected_licenses": [
"MIT"
],
"directory_id": "6c9de356a00c276646cbeaba3e0305dd969f0142",
"extension": "py",
"file... | 2.65625 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
#
# Copyright (c) Igor Lesik 2020
import sys, os, re, markdown, argparse
from jinja2 import Template
import verilog_parser as parser
import render_html
def parse_args():
parser = argparse.ArgumentParser(description='Generate Verilog documentation.')
parser.add_ar... | 238 | 27.11 | 88 | 17 | 1,443 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8a5cf03c792af262_5d2a0fe2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
141
] | [
null
] | [
16
] | [
46
] | |
2024-11-18T21:10:32.349502+00:00 | 1,530,688,738,000 | 96f20caa093b93421f05f82817d39919e41b5992 | 2 | {
"blob_id": "96f20caa093b93421f05f82817d39919e41b5992",
"branch_name": "refs/heads/master",
"committer_date": 1530688738000,
"content_id": "a567abaad5ed7fa26b2546ac5af0ad7966393e12",
"detected_licenses": [
"BSD-3-Clause",
"Apache-2.0"
],
"directory_id": "08ec866f78484b951e80f4444dead0e150d61b9f",... | 2.375 | stackv2 | # Copyright (c) 2012 The Chromium Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
import re
class CSSChecker(object):
def __init__(self, input_api, output_api, file_filter=None):
self.input_api = input_api
self.output_api ... | 249 | 36.61 | 80 | 25 | 2,634 | python | [{"finding_id": "codeql_py/redos_65c439d8c39b728f_89eb2c9e", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '0%{{-:' and containing many repet... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '0%{{-:' and containing many repetitions of '-'."
] | [
65
] | [
null
] | [
52
] | [
66
] | |
2024-11-18T21:11:14.227769+00:00 | 1,639,315,196,000 | c2ef12720098a406a7702af305df98df27760ad1 | 3 | {
"blob_id": "c2ef12720098a406a7702af305df98df27760ad1",
"branch_name": "refs/heads/master",
"committer_date": 1639315196000,
"content_id": "68937a4267375c612b2dc203f632749d4e56b744",
"detected_licenses": [
"Unlicense"
],
"directory_id": "3beec068158598234412d94ae89c652705cc08b8",
"extension": "py",... | 3.4375 | stackv2 | #!/usr/bin/env python3
import hashlib
input = "ojvtpuvg"
password1 = ""
passwordLength1 = 8
password2 = ["g"] * 8
passwordLength2 = 8
i = 0
while passwordLength1 > 0 or passwordLength2 > 0:
value = "%s%i" % (input, i)
m = hashlib.md5(value.encode())
if m.hexdigest()[0:5] == "00000":
print("%s%i %s" % (input, i, ... | 28 | 24.68 | 56 | 15 | 247 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8c9936b4372f181d_cc6a131b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (passw... | [
16,
27,
28
] | [
null,
null,
null
] | [
9,
7,
7
] | [
50,
16,
25
] | |
2024-11-18T21:46:30.631875+00:00 | 1,574,794,682,000 | a8b414ea6ede955ab6f15fec11ad4ff7d5a77242 | 3 | {
"blob_id": "a8b414ea6ede955ab6f15fec11ad4ff7d5a77242",
"branch_name": "refs/heads/master",
"committer_date": 1574794682000,
"content_id": "fd5a419ba714160b7cba4623e0619ae46f148fe8",
"detected_licenses": [
"MIT"
],
"directory_id": "6a3e9a726bb2d554d6d8156dd8aa258792c1fe49",
"extension": "py",
"fi... | 3.265625 | stackv2 | import getpass
from auth import AuthBankAccount
from cash_machine import CashMachineWithdraw, CashMachineInsertMoneyBill, CashMachineGetter
class AuthBankAccountConsole:
@staticmethod
def is_auth():
account_number_typed = input("Digite sua conta: ")
password_typed = getpass.getpass("Digite su... | 102 | 35.62 | 110 | 16 | 821 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c508b215f85ec1d0_a183a4d3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
28
] | [
null
] | [
19
] | [
110
] | |
2024-11-18T21:46:35.567840+00:00 | 1,553,735,633,000 | 5ca0f410cbdb6baf0002eb3237f039d509ed129b | 4 | {
"blob_id": "5ca0f410cbdb6baf0002eb3237f039d509ed129b",
"branch_name": "refs/heads/master",
"committer_date": 1553735633000,
"content_id": "a5792147d27301474a5aa9eb06554fa0fd3d1e2e",
"detected_licenses": [
"MIT"
],
"directory_id": "fae2175e4fca335216f0ee9d66cc9a850b4c2abb",
"extension": "py",
"fi... | 4.5 | stackv2 | # Problem Set 2, hangman.py
# Name:
# Collaborators:
# Time spent:
# Hangman Game
# -----------------------------------
# Helper code
# You don't need to understand this helper code,
# but you will have to know how to use the functions
# (so be sure to read the docstrings!)
import random
import string
WORDLIST_FILENAM... | 349 | 37.11 | 85 | 16 | 2,853 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5067ea5226b882d9_1247918b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 17 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.",
"This expression logs [sensitive data (secre... | [
114,
129,
134,
142,
148,
153,
157,
171,
174,
262,
281,
286,
294,
300,
305,
309,
326
] | [
null,
null,
null,
null,
null,
154,
158,
null,
null,
null,
null,
null,
null,
null,
306,
310,
null
] | [
66,
23,
33,
23,
23,
35,
60,
19,
66,
66,
23,
33,
23,
23,
35,
60,
66
] | [
77,
69,
79,
69,
69,
64,
64,
74,
77,
77,
69,
79,
69,
69,
64,
64,
77
] | |
2024-11-18T21:46:37.082314+00:00 | 1,634,042,651,000 | dd9fcb087ba3ff51fc3935d08f988ae722a73cbe | 2 | {
"blob_id": "dd9fcb087ba3ff51fc3935d08f988ae722a73cbe",
"branch_name": "refs/heads/master",
"committer_date": 1634042651000,
"content_id": "5c11823056b6f15df52381284ab9e704dc1f5a1b",
"detected_licenses": [
"MIT"
],
"directory_id": "40fc4f549bcd4b7dd9b185af62cc424628cf8ef6",
"extension": "py",
"fi... | 2.328125 | stackv2 | from ply import lex, yacc
from . import rules, utils, definitions, config
from jinja2 import Template
class Costflow:
def __init__(self, conf=None):
if conf is not None:
config.config = conf
self.parser = yacc.yacc(module=rules)
self.lexer = lex.lex(module=rules)
def comp... | 59 | 29.53 | 70 | 15 | 381 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_eab0f7ee1b16a3dd_a7f1884d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
22
] | [
null
] | [
16
] | [
33
] | |
2024-11-18T21:47:30.007487+00:00 | 1,389,258,172,000 | cec92f7666d60bb5ab4bb301bf24f30fdcd0b0da | 3 | {
"blob_id": "cec92f7666d60bb5ab4bb301bf24f30fdcd0b0da",
"branch_name": "refs/heads/master",
"committer_date": 1389258172000,
"content_id": "973d63dba5e7f4b96b80ecc4aa1817863e13561a",
"detected_licenses": [
"MIT"
],
"directory_id": "204242ff30045e5c5ee51de33f5b85a9d1cd20bd",
"extension": "py",
"fi... | 2.53125 | stackv2 | import tornado
import tornado.web
import tornado.gen
import tornadoredis
from tornado import httpclient
from urlcache.core import RedisBank, UrlCacher
from utils import Router
from utils import message_encode, message_decode
import json
import logging
try:
import atm_settings
except:
raise('Please create atm... | 209 | 29.72 | 115 | 18 | 1,347 | python | [{"finding_id": "codeql_py/log-injection_3abe7b918a17c1e0_ea6c94da", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
80,
94
] | [
null,
null
] | [
21,
25
] | [
29,
55
] | |
2024-11-18T21:47:39.860872+00:00 | 1,422,574,848,000 | 3b7df0e296f71b6e9d147389fd7ef15af21f618c | 2 | {
"blob_id": "3b7df0e296f71b6e9d147389fd7ef15af21f618c",
"branch_name": "refs/heads/master",
"committer_date": 1422574848000,
"content_id": "f365f86e416a82ef0f641d5a92fabe7cb9de0ed7",
"detected_licenses": [
"MIT"
],
"directory_id": "55a26acef4076eef83a10875d386f7991192fb6d",
"extension": "py",
"fi... | 2.390625 | stackv2 | import os
from sqlite3 import dbapi2 as sqlite3
from flask import Flask
from flask import render_template
from flask import request
from flask import g
from werkzeug import secure_filename
# config
app = Flask(__name__)
app.config.from_object(__name__)
app.config.update({
'DATABASE': os.path.join(app.root_pat... | 79 | 29.11 | 145 | 19 | 551 | python | [{"finding_id": "codeql_py/sql-injection_f535329217b661a0_0bb904b4", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
69
] | [
null
] | [
24
] | [
29
] | |
2024-11-18T22:28:59.848730+00:00 | 1,634,281,752,000 | bb16654c744f0980fb39fde47755cbfb5f3fa8ba | 3 | {
"blob_id": "bb16654c744f0980fb39fde47755cbfb5f3fa8ba",
"branch_name": "refs/heads/master",
"committer_date": 1634281752000,
"content_id": "4b0e0ce08631d2b7f59a6b756571579a1eadc2cc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bd9aafb330c6c0f778f57217bd6236461a30829d",
"extension": "py"... | 2.671875 | stackv2 | # coding=utf-8
# !/usr/bin/python
import paramiko
import threading
"""
ssh 到服务器并执行bash command
"""
def ssh2(ip, username, passwd, cmd):
"""
ssh 服务器并执行bash command
:param ip:
:param username:
:param passwd:
:param cmd:
:return:
"""
try:
ssh = paramiko.SSHClient()
s... | 74 | 24.3 | 93 | 15 | 561 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_4c31a56aaaeed79f_64fd316a", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
21
] | [
null
] | [
9
] | [
66
] | |
2024-11-18T22:29:03.263064+00:00 | 1,415,587,963,000 | 22d7187417999b3bc8531b6fa7b121fa8def2aca | 3 | {
"blob_id": "22d7187417999b3bc8531b6fa7b121fa8def2aca",
"branch_name": "refs/heads/master",
"committer_date": 1415587963000,
"content_id": "0e27705d7de9ed57d9891c23ee0ad5ad930ff396",
"detected_licenses": [
"MIT"
],
"directory_id": "84b69842977ca08dc7119f3e9f3d81422bcb5b22",
"extension": "py",
"fi... | 2.84375 | stackv2 | from flask import Flask,request
from multiprocessing import Process,Queue
import logging
import os
import signal
app = Flask(__name__)
# Development Mode
logging.basicConfig(level=logging.DEBUG)
# Global datastructures - lifetime of the server
pid_table = {}
class Container(object):
def __init__(self, data):
... | 50 | 26.78 | 113 | 14 | 313 | python | [{"finding_id": "codeql_py/log-injection_b281a1d10dca8347_ee0c77b8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
33,
47
] | [
null,
null
] | [
19,
19
] | [
50,
113
] | |
2024-11-18T22:29:24.829078+00:00 | 1,614,013,928,000 | c6936af94c7d374af44d6ac8e5e69118ff3d05a6 | 3 | {
"blob_id": "c6936af94c7d374af44d6ac8e5e69118ff3d05a6",
"branch_name": "refs/heads/master",
"committer_date": 1614013928000,
"content_id": "dba0ab7feb9b0f1f06f733ef048e8a1aa5355e67",
"detected_licenses": [
"MIT"
],
"directory_id": "ee4f1dc6a39fca8ec1ef5560e2cc269f2993a1da",
"extension": "py",
"fi... | 3.03125 | stackv2 | import urllib.request,json
from .models import News
import requests
News = News
# Getting api key
api_key = None
# Getting the news base url
base_url = None
base_url2 = None
def configure_request(app):
global api_key,base_url,base_url2
api_key = app.config['NEWS_API_KEY']
base_url = app.config['NEWS_API... | 96 | 25.51 | 109 | 12 | 549 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fd0736920e6e2184_89d4afe1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
25,
27
] | [
null,
null
] | [
11,
11
] | [
23,
28
] | |
2024-11-18T22:29:29.323802+00:00 | 1,412,687,075,000 | 802f0ac506066a0634458bee8bd7b9a0ad07e503 | 3 | {
"blob_id": "802f0ac506066a0634458bee8bd7b9a0ad07e503",
"branch_name": "refs/heads/master",
"committer_date": 1412687075000,
"content_id": "bf6e7ea4f4d2dedbb0c6c88cd90d0908c6edadc0",
"detected_licenses": [
"MIT"
],
"directory_id": "3b3cf2a345038706d7370d1db53195c60c90aaa8",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/env python2
import json
import logging
import logging.handlers
import os
import subprocess
from datetime import datetime
from flask import Flask, request
try:
# Python 3
from configparser import RawConfigParser
except ImportError:
# Python 2
from ConfigParser import RawConfigParser
confi... | 102 | 34.25 | 140 | 17 | 739 | python | [{"finding_id": "codeql_py/command-line-injection_a152ff420eaebacb_840259ed", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 6 | true | [
"CWE-078",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-117"
] | [
"py/command-line-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This log entry depends on a [user-pro... | [
55,
68,
70,
74,
80,
48
] | [
null,
null,
null,
null,
null,
null
] | [
41,
32,
31,
31,
27,
23
] | [
45,
46,
35,
56,
48,
111
] | |
2024-11-18T22:29:34.825205+00:00 | 1,526,602,927,000 | a92df726a945656569b1aa81c63ea058fc7da3e6 | 3 | {
"blob_id": "a92df726a945656569b1aa81c63ea058fc7da3e6",
"branch_name": "refs/heads/master",
"committer_date": 1526602927000,
"content_id": "bac883414b39c0ea74eb8d58efa1cc36cbbc2751",
"detected_licenses": [
"MIT"
],
"directory_id": "10eb70672f74271613845ba8c36c7cc52ead79f2",
"extension": "py",
"fi... | 3.390625 | stackv2 | import os
import yaml
from jinja2 import Environment, PackageLoader
def render_document(template_name, data_name, output_name):
"""
Combines a MarkDown template file from the aide_document package with a local associated YAML data file, then outputs the rendered combination to a local MarkDown output file.
... | 37 | 41.16 | 179 | 14 | 324 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_83f41f178baf6491_975f38e8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
32
] | [
null
] | [
11
] | [
61
] | |
2024-11-18T22:29:39.834024+00:00 | 1,426,375,193,000 | d8c3d07f9735b56c5349955b1bc1a691f4ed7759 | 2 | {
"blob_id": "d8c3d07f9735b56c5349955b1bc1a691f4ed7759",
"branch_name": "refs/heads/master",
"committer_date": 1426375193000,
"content_id": "483426f0cc7b0fe7ece56a4ed2b053243fa26e08",
"detected_licenses": [
"MIT"
],
"directory_id": "e21e432f73ecbe15a6cb3bb52a7d21a4917f4e4d",
"extension": "py",
"fi... | 2.328125 | stackv2 | from bs4 import BeautifulSoup
from datetime import datetime
from django.contrib.auth import authenticate
from django.shortcuts import get_object_or_404
from django.http import HttpResponse, HttpResponseServerError, HttpResponseForbidden
from django.views.decorators.csrf import csrf_exempt
from models import Blog, Categ... | 137 | 34.42 | 93 | 16 | 1,001 | python | [{"finding_id": "codeql_py/stack-trace-exposure_baa7e98a1f5bfdf9_890f07b1", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
66,
90
] | [
null,
null
] | [
40,
40
] | [
46,
46
] | |
2024-11-18T22:40:27.059177+00:00 | 1,531,177,717,000 | c16a6aee2fdcf5d5cbea6389eb1f432744c48eb3 | 2 | {
"blob_id": "c16a6aee2fdcf5d5cbea6389eb1f432744c48eb3",
"branch_name": "refs/heads/master",
"committer_date": 1531177717000,
"content_id": "37a2df741a8999af059ab1d529e50ea814a5c27a",
"detected_licenses": [
"MIT"
],
"directory_id": "4a93fc8e6964aedef6b94ceb02a9d2a107f821f6",
"extension": "py",
"fi... | 2.359375 | stackv2 | from flask import Flask, request, render_template, jsonify
from flask_restful import Resource, Api
import MySQLdb
app = Flask(__name__)
api = Api(app)
def getConnection():
connection = MySQLdb.connect(
host = 'localhost',
user = 'root',
passwd = '****',
db = '***'
)
return ... | 82 | 22.94 | 83 | 10 | 480 | python | [{"finding_id": "codeql_py/sql-injection_996c0be56f0e7f8d_dbbabb81", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
25
] | [
null
] | [
20
] | [
25
] | |
2024-11-18T22:40:27.897687+00:00 | 1,551,806,700,000 | bb02d208f3d0f26a682fc3a413b109f4c4ff7f39 | 3 | {
"blob_id": "bb02d208f3d0f26a682fc3a413b109f4c4ff7f39",
"branch_name": "refs/heads/master",
"committer_date": 1551806700000,
"content_id": "8071ebdf657ad7e9b167e58dbe46fa37c1677cac",
"detected_licenses": [
"MIT"
],
"directory_id": "42e0311166f5b8dd5908cc3e078ad225cb14d7e5",
"extension": "py",
"fi... | 2.75 | stackv2 | # -*- coding: utf-8 -*-
import argparse, mechanize, os, sys, socks, socket
from time import sleep
from subprocess import call
from selenium import webdriver
from selenium.webdriver.common.keys import Keys
from selenium.webdriver.support.ui import WebDriverWait
from pyvirtualdisplay import Display
from urllib import ur... | 266 | 24.94 | 123 | 25 | 1,499 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2147b8cb701beb97_8a2f4499", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p... | [
239,
233,
215
] | [
null,
null,
null
] | [
23,
23,
31
] | [
100,
99,
109
] | |
2024-11-18T22:40:32.048525+00:00 | 1,501,778,062,000 | b67f2e7dbdc4f36c68f83a1bac189737ba24e0d1 | 3 | {
"blob_id": "b67f2e7dbdc4f36c68f83a1bac189737ba24e0d1",
"branch_name": "refs/heads/master",
"committer_date": 1501778062000,
"content_id": "531fb9e1824b507a589bf0511bdc5e7554686d94",
"detected_licenses": [
"MIT"
],
"directory_id": "81c52e0679800b94fc7010a713451a27048b487f",
"extension": "py",
"fi... | 2.546875 | stackv2 | import os
import sys
import random
from pymongo import MongoClient
import pprint
from flask_socketio import SocketIO, emit, join_room, leave_room
from flask import Flask, render_template, request, session, redirect
from flask_bcrypt import Bcrypt
app = Flask(__name__)
app.config['SECRET_KEY'] = os.urandom(24).encode('h... | 200 | 28.86 | 103 | 20 | 1,511 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ad2ad2313339de06_670c907f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
127,
145
] | [
null,
null
] | [
9,
11
] | [
75,
72
] | |
2024-11-18T22:40:56.420806+00:00 | 1,565,016,282,000 | 1de270ce7784388e7db55016c44ee6df7be9f0f7 | 3 | {
"blob_id": "1de270ce7784388e7db55016c44ee6df7be9f0f7",
"branch_name": "refs/heads/master",
"committer_date": 1565016282000,
"content_id": "f97c06f5403755fcb07ccf8e070aa981168e36a1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "25c5b6666e0a325d7bc65d21c528d8329982ac4b",
"extension": "py"... | 2.65625 | stackv2 | #! /usr/bin/env python3
# -*- coding: utf-8 -*-
#
# Copyright 2019 Matt Post <post@cs.jhu.edu>
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2... | 126 | 37.19 | 132 | 16 | 1,114 | python | [{"finding_id": "codeql_py/overly-permissive-file_552369505e79bd58_02008e0a", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
109
] | [
null
] | [
9
] | [
35
] | |
2024-11-18T22:41:01.456328+00:00 | 1,562,130,848,000 | ff4d3cb1f204670edb6c56efb75a26eb371fe180 | 3 | {
"blob_id": "ff4d3cb1f204670edb6c56efb75a26eb371fe180",
"branch_name": "refs/heads/master",
"committer_date": 1562130848000,
"content_id": "b88e468b904ef8cd3b8cecc52c09ab50c250c2a6",
"detected_licenses": [
"MIT"
],
"directory_id": "3d73ebd2cfe87a84c86b500f653ac7fe69bde51b",
"extension": "py",
"fi... | 2.609375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
Git embedding plugin for Pelican
=================================
This plugin allows you to embbed `git` file into your posts.
"""
from __future__ import unicode_literals
import os, re, logging, hashlib, codecs, copy
from bs4 import BeautifulSoup
import collections... | 148 | 31.56 | 120 | 16 | 1,059 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9b8f0b0a7d95888a_36653c63", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
18
] | [
null
] | [
12
] | [
87
] | |
2024-11-18T22:41:17.153631+00:00 | 1,602,308,708,000 | 2aad3583cd854b0614d6027022da06332d2a53f3 | 3 | {
"blob_id": "2aad3583cd854b0614d6027022da06332d2a53f3",
"branch_name": "refs/heads/master",
"committer_date": 1602308708000,
"content_id": "e25705dca4e42e484b7847af39949460c8165384",
"detected_licenses": [
"MIT"
],
"directory_id": "2ddbe0b310dd2ce86277c484844e5a534d3adac5",
"extension": "py",
"fi... | 2.59375 | stackv2 | import json
from bot.settings import EVENT_API_KEY
class Event:
def __init__(self, bot):
self.bot = bot
# event api url
self.event_url = "https://app.ticketmaster.com/discovery/v2/events.json?"
async def show_events(self, artist):
artist_find = ("-").join(artist.split(" "))
... | 21 | 33.43 | 126 | 15 | 160 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_89a198d460801eca_563af19a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
15
] | [
null
] | [
15
] | [
29
] | |
2024-11-18T22:54:19.863984+00:00 | 1,500,376,716,000 | c40cc818b0b6512c6a82ba86588a7a080f83751a | 3 | {
"blob_id": "c40cc818b0b6512c6a82ba86588a7a080f83751a",
"branch_name": "refs/heads/master",
"committer_date": 1500376716000,
"content_id": "3783dbc27c3217190c1ed5c64d6ac18078e08e4a",
"detected_licenses": [
"MIT"
],
"directory_id": "7d735c5ba68cd65244d2475acc1bd9e8a83a51f9",
"extension": "py",
"fi... | 2.546875 | stackv2 | """
PC5 Linux Fileserver
A customised Python HTTP Server with basic features such as downloading
and deleting multiple files when listing directories.
Copyright (c) 2017 Giovanni Grieco <giovanni.grc96@gmail.com>,
Poliba Corse <polibacorse@poliba.it>
Permission is hereby granted, free of charge, to any person o... | 153 | 37.33 | 73 | 19 | 1,260 | python | [{"finding_id": "codeql_py/path-injection_5ff30b0ff22c650b_eaa354f0", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 3 | true | [
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
139,
140,
143
] | [
null,
null,
null
] | [
35,
31,
39
] | [
43,
39,
50
] | |
2024-11-18T22:54:19.940548+00:00 | 1,631,768,140,000 | 38e0576b292ea4e8be2f53b8658d1c53e11c864e | 3 | {
"blob_id": "38e0576b292ea4e8be2f53b8658d1c53e11c864e",
"branch_name": "refs/heads/main",
"committer_date": 1631768140000,
"content_id": "d2d67bf5589b199f86b80b5270a8f94c576db739",
"detected_licenses": [
"MIT"
],
"directory_id": "7447354d41c37f857af06e5bdd7c63a6b11fbb94",
"extension": "py",
"file... | 2.796875 | stackv2 | import requests # module for https request to the League Server
import json
import collections
APIKEY = "RGAPI-7cbe79bb-e9ef-44db-a8ed-4eb28ca29645" # Riot will give you a key, key has to be renewed daily
def requestSummonerName(name):
summonerName = getSummonerName(name) # Parse the name into correct format
URL =... | 270 | 32.8 | 122 | 17 | 2,482 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_61acd9809e2c961f_178a91fa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
199,
220,
225
] | [
null,
null,
null
] | [
8,
11,
11
] | [
33,
19,
19
] | |
2024-11-18T22:54:24.056320+00:00 | 1,471,447,766,000 | 8032643f3cb23bafbb1eb80f96dcac33884924ee | 2 | {
"blob_id": "8032643f3cb23bafbb1eb80f96dcac33884924ee",
"branch_name": "refs/heads/master",
"committer_date": 1471447766000,
"content_id": "a5207927ce86351928d362e25cb5971414f8be2e",
"detected_licenses": [
"MIT"
],
"directory_id": "5dd75a0b8366f491d68a9579653a8a23f6b3759a",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/local/bin/python
# coding: utf-8
__author__ = 'spouk'
from wtforms import *
from wtforms.widgets.html5 import EmailInput
from wtforms.widgets.core import CheckboxInput, SubmitInput
from wtforms.csrf.core import CSRF
from wtforms.validators import DataRequired
from hashlib import md5
import uuid
import random
im... | 83 | 33.72 | 105 | 21 | 706 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_39fdfc2450e7d638_9535a990", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
28
] | [
null
] | [
22
] | [
93
] | |
2024-11-18T20:54:59.911214+00:00 | 1,570,979,667,000 | e05f41578c85c017d4d0a549e446f5cc882fb3a7 | 3 | {
"blob_id": "e05f41578c85c017d4d0a549e446f5cc882fb3a7",
"branch_name": "refs/heads/master",
"committer_date": 1570979667000,
"content_id": "c04ccf09f879e8973ec3ee523d35b463f6825ec1",
"detected_licenses": [
"MIT"
],
"directory_id": "a36ea63a76128513a8fd65c7de0ac37fb6140709",
"extension": "py",
"fi... | 2.984375 | stackv2 | from flask import Flask, request, render_template
import urllib.request
import requests as rq
from google.cloud import language
from google.cloud.language import enums
from google.cloud.language import types
app = Flask(__name__)
smiley = "smile"
frowny = "frown"
meh = "meh"
def failed():
return """
... | 89 | 23.19 | 118 | 13 | 509 | python | [{"finding_id": "codeql_py/full-ssrf_7eea6089b8d2fe65_92c71f6c", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
36
] | [
null
] | [
10
] | [
37
] | |
2024-11-18T20:55:11.885520+00:00 | 1,623,601,593,000 | b2278388960035990bac20a9003f42cd5643fd4a | 2 | {
"blob_id": "b2278388960035990bac20a9003f42cd5643fd4a",
"branch_name": "refs/heads/main",
"committer_date": 1623601593000,
"content_id": "2538104e29e812ac8627f0b819e30b20ec164a24",
"detected_licenses": [
"MIT"
],
"directory_id": "f67119166a25a452966df8c00fcbe34f46e347ff",
"extension": "py",
"file... | 2.375 | stackv2 | from flask import Flask, redirect, render_template
import random
import string
from flask_socketio import SocketIO, send, emit
import time
app = Flask(__name__, template_folder="../build", static_folder="../build/static", static_url_path="/static")
app.config['SECRET_KEY'] = 'secret!'
app.config['TEMPLATES_AUTO_RELO... | 83 | 20.17 | 109 | 12 | 457 | python | [{"finding_id": "codeql_py/reflective-xss_3445a8423d8ddeef_73be97a6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
66,
79
] | [
74,
null
] | [
12,
12
] | [
4,
50
] | |
2024-11-18T20:55:12.092250+00:00 | 1,487,561,009,000 | 50db0a0fd0151c7843f9e1d85b2397c85eb76727 | 2 | {
"blob_id": "50db0a0fd0151c7843f9e1d85b2397c85eb76727",
"branch_name": "refs/heads/master",
"committer_date": 1487561009000,
"content_id": "82aa5686bac320647c1e6a5f8da221c2e59413dd",
"detected_licenses": [
"MIT"
],
"directory_id": "ba2084b00f4e43fb08aea26614549b320ce0b01b",
"extension": "py",
"fi... | 2.390625 | stackv2 |
import random
import hashlib
import requests
from cachecontrol import CacheControl
class Session:
uid = None
token = None
organization = None
session = None
netid = None
_init = False
_logged_in = False
_BASE_URL = 'https://tv.byu.edu/'
_TIMEOUT = 5
def __init__(self):
... | 94 | 29.82 | 97 | 18 | 704 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_52725eaab0abcba6_bb82bed6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
32
] | [
33
] | [
13
] | [
55
] | |
2024-11-18T21:07:33.100812+00:00 | 1,562,581,677,000 | ee7f15459c1321bc1ba271192d6ba1696278f2cf | 2 | {
"blob_id": "ee7f15459c1321bc1ba271192d6ba1696278f2cf",
"branch_name": "refs/heads/master",
"committer_date": 1562581677000,
"content_id": "1095a6e87baf66a30706ff8bc6d8f5621efff170",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "45b9d10d3bac5469f2e847b3fd03f4540dc2d478",
"extension": "py"... | 2.328125 | stackv2 | # -*- coding: utf-8 -*-
import logging
from os import path
import jinja2
from invoke import task
# 项目根目录
BASE_DIR = path.dirname(path.dirname(path.dirname(path.realpath(__file__))))
# 模板所在目录
TEMPLATE_DIR = path.join(BASE_DIR, "nebula_sniffer/templates")
def jinja2_render(template_name, **context):
u"""
jin... | 54 | 21.72 | 76 | 12 | 334 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c166594082de3e14_41a9f5d0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
23
] | [
null
] | [
11
] | [
44
] | |
2024-11-18T21:33:08.287667+00:00 | 1,543,922,303,000 | a5a49b98aa9a96f262d1bb84e6985a6785ab3571 | 4 | {
"blob_id": "a5a49b98aa9a96f262d1bb84e6985a6785ab3571",
"branch_name": "refs/heads/master",
"committer_date": 1543922303000,
"content_id": "eeadf0cd459ecb5c77cb9ff82990c9ca69297d09",
"detected_licenses": [
"MIT"
],
"directory_id": "ef2dbd468280dc8f755355b4a2279e3884a83093",
"extension": "py",
"fi... | 4.125 | stackv2 | import random
def generate_password(number_of_symbols, number_of_numbers, remain_length):
numbers = ["0", "1", "2", "3", "4", "5", "6", "7", "8", "9"]
alphabets = [
"a",
"b",
"c",
"d",
"e",
"f",
"g",
"h",
"i",
"j",
"k",
... | 142 | 16.91 | 75 | 12 | 650 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7b0fa421e8ad4e88_2f91b712", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
134,
137
] | [
null,
null
] | [
11,
15
] | [
31,
24
] | |
2024-11-18T21:33:13.653636+00:00 | 1,685,146,022,000 | 6d1cb9e32b228620766cfa22aa2a9dcd147ca6b8 | 4 | {
"blob_id": "6d1cb9e32b228620766cfa22aa2a9dcd147ca6b8",
"branch_name": "refs/heads/master",
"committer_date": 1685146022000,
"content_id": "7d59cd5a9e15fcb847e28b8fb3ddc2b5d0c7642f",
"detected_licenses": [
"MIT"
],
"directory_id": "57138ba30706cf790b9f3cc31863909fa50023e4",
"extension": "py",
"fi... | 3.5625 | stackv2 | from random import choice
from time import sleep
import sys
from unidecode import unidecode
from utils import ler_arquivo, ler_letra, forca
print(f"{'#'*20} BEM VINDO AO JOGO DA ADIVINHAÇÃO {'#'*20}")
# Obtêm arquivo com as profissões
profissoes = ler_arquivo("profissoes.txt")
if not profissoes:
print("Erro ao ... | 73 | 28.3 | 77 | 14 | 603 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8718f3d011e843e1_2d7ff4e7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](... | [
38,
43,
67
] | [
null,
null,
null
] | [
15,
15,
19
] | [
54,
57,
58
] | |
2024-11-18T21:33:14.567492+00:00 | 1,531,216,570,000 | 334243f494b813e36ded44bdba06b07d2c827915 | 3 | {
"blob_id": "334243f494b813e36ded44bdba06b07d2c827915",
"branch_name": "refs/heads/master",
"committer_date": 1531216570000,
"content_id": "cf78df80a42a5b31eddde9e9e651306767de560b",
"detected_licenses": [
"MIT"
],
"directory_id": "f5291138d0f192b98761ce5d42d1627d2f5c6669",
"extension": "py",
"fi... | 2.609375 | stackv2 | from dao import GameDao
from models import Game, User
from flask import Flask, render_template, request, redirect, session, flash, \
url_for
from flask_mysqldb import MySQL
app = Flask(__name__)
app.secret_key = 'testing_flask'
app.config['MYSQL_HOST'] = "172.17.0.2"
app.config['MYSQL_USER'] = "root"
app.config['... | 77 | 28.01 | 84 | 16 | 584 | python | [{"finding_id": "codeql_py/flask-debug_e83f39a94ddab565_64969356", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
77,
66
] | [
null,
null
] | [
null,
29
] | [
20,
33
] | |
2024-11-18T21:33:15.642823+00:00 | 1,685,342,343,000 | a2437183a4bc7c09aad1e748dedc4f418bf34ae0 | 3 | {
"blob_id": "a2437183a4bc7c09aad1e748dedc4f418bf34ae0",
"branch_name": "refs/heads/master",
"committer_date": 1685342343000,
"content_id": "5fddd675ed47c4cc2d0d3dad45b8b4b49177d959",
"detected_licenses": [
"MIT"
],
"directory_id": "a95236e2dccd588627c6f0a1542f37e26f6899f3",
"extension": "py",
"fi... | 2.921875 | stackv2 | """
成绩管理系统程序
运行后,使用浏览器打开http://localhost:5050/
需要flask、matplotlib、zodb库
"""
# zodb
from dataclasses import dataclass
import ZODB
from BTrees.OOBTree import BTree
import transaction
import io
from flask import Flask, render_template, request, Response
import csv
from matplotlib.backends.backend_agg import FigureCanv... | 234 | 22.69 | 80 | 16 | 1,398 | python | [{"finding_id": "codeql_py/reflective-xss_50968fa5becf0122_53bc1ad6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 4 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
88,
135,
147,
162
] | [
null,
null,
null,
null
] | [
16,
16,
16,
16
] | [
34,
38,
38,
38
] | |
2024-11-18T21:33:17.709097+00:00 | 1,691,761,725,000 | 09563a91f83d163b96d08396bbc73fa949d65fac | 2 | {
"blob_id": "09563a91f83d163b96d08396bbc73fa949d65fac",
"branch_name": "refs/heads/master",
"committer_date": 1691761725000,
"content_id": "74555137b3a9037ba6bd3a2f08cabeb9423b5a2f",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "743110fee1163ea0fffbd0ff3d102d2f12c5e0a6",
"extension": "p... | 2.359375 | stackv2 | # -*- coding: utf-8 -*-
#
# This file is part of hepcrawl.
# Copyright (C) 2016, 2017 CERN.
#
# hepcrawl is a free software; you can redistribute it and/or modify it
# under the terms of the Revised BSD License; see LICENSE file for
# more details.
"""Spider for Hindawi."""
from __future__ import absolute_import, div... | 239 | 32.95 | 117 | 18 | 1,940 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_1e5ef716723ffa9d_4edcc219", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [dx.doi.org](1) may be at an arbitrary position in the ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [dx.doi.org](1) may be at an arbitrary position in the sanitized URL."
] | [
131
] | [
null
] | [
18
] | [
46
] | |
2024-11-18T21:33:26.486561+00:00 | 1,478,725,920,000 | 1d58f57b8f5852193b901c6113e82aed4a327627 | 3 | {
"blob_id": "1d58f57b8f5852193b901c6113e82aed4a327627",
"branch_name": "refs/heads/master",
"committer_date": 1478725920000,
"content_id": "9a66cb020ea4a0a67848bb26b8ea7eae8c32eb78",
"detected_licenses": [
"MIT"
],
"directory_id": "564b038051f5df6d064cee0dbb5611f2d8e20d63",
"extension": "py",
"fi... | 2.984375 | stackv2 | import os
import requests
address = "1850 N 53rd st, Seattle 98103"
api_key = os.environ.get('GOOGLE_MAPS_API_KEY')
geocode_url = 'https://maps.googleapis.com/maps/api/geocode/json?address='
url = '{0}{1}&key={2}'.format(geocode_url, address, api_key)
api_response = requests.get(url)
api_response_dict = api_response.... | 16 | 36.19 | 78 | 12 | 159 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_08ea57e9149d8af5_6432d695", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
15,
16
] | [
null,
null
] | [
25,
26
] | [
33,
35
] | |
2024-11-18T21:33:26.897393+00:00 | 1,511,445,978,000 | d2567264e4fcf85ba33cbcf883af8e8664f0aa1d | 2 | {
"blob_id": "d2567264e4fcf85ba33cbcf883af8e8664f0aa1d",
"branch_name": "refs/heads/master",
"committer_date": 1511445978000,
"content_id": "d563091a63f174a57f706a07b2ff7a210df31504",
"detected_licenses": [
"MIT"
],
"directory_id": "d93c904715df39d0c432a72819fbac3f8e266b36",
"extension": "py",
"fi... | 2.375 | stackv2 | import hashlib
import json
import sys
from time import time
import requests
from flask import Flask, jsonify, request
import black
import channel
import authority
app = Flask(__name__)
@app.route('/join', methods=['POST'])
def join_channel():
values = request.get_json()
required = ['remote_node', 'local_no... | 177 | 27.12 | 99 | 15 | 1,221 | python | [{"finding_id": "codeql_py/partial-ssrf_2b251faa23517cf5_0a940f5b", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
27
] | [
31
] | [
16
] | [
6
] | |
2024-11-18T21:55:48.133371+00:00 | 1,617,146,846,000 | b02b3a410bbcf9042cac63beafebfe41188353fd | 3 | {
"blob_id": "b02b3a410bbcf9042cac63beafebfe41188353fd",
"branch_name": "refs/heads/master",
"committer_date": 1617146846000,
"content_id": "1ff8074923011c178ceecf399dd6ea7342a9eab7",
"detected_licenses": [
"MIT"
],
"directory_id": "5618cd9b05d94c60acb5ff1fc919e16dddc09316",
"extension": "py",
"fi... | 3 | stackv2 | import base64
import hashlib
def generate_url_token(url, secret_key):
md5_digest = hashlib.md5(
("%s %s" % (url, secret_key)).encode("utf-8")
).digest()
base64_encoded = base64.b64encode(md5_digest).decode("utf-8")
# Make the key look like Nginx expects.
token = base64_encoded.replace('+', '-').replace('... | 25 | 25.8 | 72 | 15 | 194 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b0e56034ea62d4b0_82adb2b4", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](3) is used in a hashing algorithm (MD5) that is insecure."
] | [
6
] | [
null
] | [
5
] | [
50
] | |
2024-11-18T21:55:56.344972+00:00 | 1,553,895,295,000 | 2c113f12897f11cc67d7e18e274cac8d733db2aa | 3 | {
"blob_id": "2c113f12897f11cc67d7e18e274cac8d733db2aa",
"branch_name": "refs/heads/master",
"committer_date": 1553895295000,
"content_id": "1acf5ada7793239ffa9577c703edf3a9a5775575",
"detected_licenses": [
"MIT"
],
"directory_id": "875bf5959f9220000e29ecb3261b3ca540233c4a",
"extension": "py",
"fi... | 3.390625 | stackv2 | import sqlite3
connect = sqlite3.connect('C:/Users/Donaldo/Downloads/northwind_small.sqlite3')
cursor = connect.cursor()
expensive_items = """SELECT ProductName, UnitPrice
FROM Product ORDER BY UnitPrice DESC"""
expensive_items = cursor.execute(expensive_items).fetchmany(10)
# Top 10 most expensive items
for item in... | 40 | 31.8 | 79 | 9 | 302 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f47b0d9cf6af26d9_82b9bfd8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
17
] | [
null
] | [
7
] | [
27
] | |
2024-11-18T21:56:01.371350+00:00 | 1,499,105,863,000 | e742d6c70475a27eafda63111caed2815c06d082 | 3 | {
"blob_id": "e742d6c70475a27eafda63111caed2815c06d082",
"branch_name": "refs/heads/master",
"committer_date": 1499105863000,
"content_id": "0c62656faf0b404a584ad900d339ad9f1861ac8d",
"detected_licenses": [
"MIT"
],
"directory_id": "9fde2bd6294436dbaf05b659de8f6ff958964fa6",
"extension": "py",
"fi... | 2.546875 | stackv2 | from app import app, BASE_URL
from flask import jsonify, request
import urllib2
import json
import datetime as dt
@app.route('/')
def landing_message():
return 'Refer to github.com/hitendesai/WeatherService-API for more info.'
@app.route('/weather/', methods=['GET'])
def weather_default():
return jsonify(get_... | 34 | 31.06 | 115 | 13 | 278 | python | [{"finding_id": "codeql_py/partial-ssrf_c906e7351a20c6a2_48b0bd07", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
34
] | [
null
] | [
23
] | [
43
] | |
2024-11-18T21:56:05.002647+00:00 | 1,557,408,460,000 | 7f3992a569aa849c5afcf64842a460a7af4436db | 2 | {
"blob_id": "7f3992a569aa849c5afcf64842a460a7af4436db",
"branch_name": "refs/heads/master",
"committer_date": 1557438332000,
"content_id": "0ec8ce2f1784f25221ba6a4e464deb6f45d4b549",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7d8d28784c93f37282fd4a27b8ba8fa420db055d",
"extension": "py"... | 2.328125 | stackv2 | # Copyright 2018 Datawire Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing... | 169 | 33.51 | 120 | 17 | 1,300 | python | [{"finding_id": "codeql_py/flask-debug_28c65cb9b040162e_6faa0ad9", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 6 | true | [
"CWE-215",
"CWE-327",
"CWE-327",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/flask-debug",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (passwor... | [
169,
94,
99,
92,
96,
105
] | [
null,
null,
null,
null,
null,
null
] | [
5,
31,
37,
63,
67,
59
] | [
51,
80,
61,
71,
75,
67
] | |
2024-11-18T22:39:34.083293+00:00 | 1,518,065,664,000 | 139fe5e510e9bfeb2e4e07cd4626deca55458570 | 3 | {
"blob_id": "139fe5e510e9bfeb2e4e07cd4626deca55458570",
"branch_name": "refs/heads/master",
"committer_date": 1518065664000,
"content_id": "0a71b947c8af4a504529603a85aa23e3b866378c",
"detected_licenses": [
"MIT"
],
"directory_id": "1a0e14df6b89fe26df7a301cb37579cd64a382f4",
"extension": "py",
"fi... | 2.734375 | stackv2 |
import json
from zabexceptions import *
from connection import ConnManager, CredentialStore
from Crypto.Cipher import DES
from requests import exceptions
class ZabbixMethodManager(ConnManager):
def __init__(self):
self.rediscredentials = CredentialStore()
self.rediscredentials.redisConnection()
self.rediscre... | 88 | 30.53 | 104 | 18 | 711 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_41712892ea9e5c1c_1c05635c", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptograph... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used."
] | [
82
] | [
null
] | [
11
] | [
40
] | |
2024-11-18T22:39:39.119563+00:00 | 1,687,274,758,000 | 875ac59b28d6ec9128c67d4397ddddd64ed05216 | 3 | {
"blob_id": "875ac59b28d6ec9128c67d4397ddddd64ed05216",
"branch_name": "refs/heads/master",
"committer_date": 1687274758000,
"content_id": "0dc8e3a422eaebc5b07a6400b36f86c57e897802",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2eb76a71733a5795426cc4a62434743edd2d7b23",
"extension": "py"... | 2.609375 | stackv2 | #!/usr/bin/env python2
import getpass
import json
import requests
import sys
requests.packages.urllib3.disable_warnings()
def racker_auth():
password = getpass.getpass("Password: ")
url = 'https://identity-internal.api.rackspacecloud.com/v2.0/tokens'
data = {
"auth": {
"RAX-AUTH:domai... | 80 | 27.1 | 82 | 14 | 550 | python | [{"finding_id": "codeql_py/request-without-cert-validation_8e01ddc85e6e6be3_77ee6574", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
28,
49,
60
] | [
null,
null,
null
] | [
11,
11,
11
] | [
83,
83,
59
] | |
2024-11-18T22:54:57.616810+00:00 | 1,578,862,224,000 | 19b86b87b190a88c31ef610f27fe9d9e6b43f09e | 2 | {
"blob_id": "19b86b87b190a88c31ef610f27fe9d9e6b43f09e",
"branch_name": "refs/heads/master",
"committer_date": 1578862224000,
"content_id": "9cd7d01bacd1de98db4eb4f74cc5c052c118c19e",
"detected_licenses": [
"MIT"
],
"directory_id": "c8f33dc4b93fd0e94a04a25b0e2cda7244b7ffbf",
"extension": "py",
"fi... | 2.453125 | stackv2 | from flask import Flask, escape, url_for, render_template, request, jsonify
import glob
# TensorFlow and tf.keras
import tensorflow as tf
#from tensorflow import keras
import matplotlib.pyplot as plt
import numpy as np
import os
#from tensorflow.keras.models import Model, load_model
from skimage.io import imread, ims... | 101 | 28.97 | 90 | 12 | 852 | python | [{"finding_id": "codeql_py/reflective-xss_de6ce79997cbe766_47da4742", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
92
] | [
null
] | [
11
] | [
28
] | |
2024-11-18T22:55:01.865357+00:00 | 1,347,445,528,000 | f8d726342e8be5913a06a33bad6ab9e2f52523da | 3 | {
"blob_id": "f8d726342e8be5913a06a33bad6ab9e2f52523da",
"branch_name": "refs/heads/master",
"committer_date": 1347445528000,
"content_id": "911f07fd2a0b18d5e95ac27c8cc48979f570931e",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "5b166e7bb66bec25126ce6622162075956397d07",
"extension": "p... | 2.8125 | stackv2 | import re
import urllib
def do_spotify(bot, user, channel, dataurl, type):
f = urllib.urlopen(dataurl)
songinfo = f.read()
f.close()
if type == "track":
artist, album, song = songinfo.split("/", 2)
return bot.say(channel, "[Spotify] %s - %s (%s)" % (artist.strip(), song.strip()... | 28 | 34.75 | 107 | 14 | 285 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_b9541a7b8d65a46d_5eeeb8fb", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'spotify.com', so it might match mor... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'spotify.com', so it might match more hosts than expected."
] | [
23
] | [
null
] | [
20
] | [
47
] | |
2024-11-18T23:06:13.193854+00:00 | 1,691,153,383,000 | edbc47b1b11279c43ae0358ccaa56a9ffb399a45 | 3 | {
"blob_id": "edbc47b1b11279c43ae0358ccaa56a9ffb399a45",
"branch_name": "refs/heads/master",
"committer_date": 1691153383000,
"content_id": "63230b12942d3ae1fb166159c7327de9dc68cf2f",
"detected_licenses": [
"MIT"
],
"directory_id": "aa32c0bc26488a9c31e28e090cd36865cedeb482",
"extension": "py",
"fi... | 2.71875 | stackv2 | try:
import gzip
except ImportError:
gzip = None
try:
import zlib
except ImportError:
zlib = None
import hashlib
import hmac
import logging
import pickle
import sys
from huey.exceptions import ConfigurationError
from huey.utils import encode
logger = logging.getLogger('huey.serializer')
if gzip is ... | 133 | 30.51 | 79 | 16 | 892 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_eebf854cf815f493_a05bb0b2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
109
] | [
null
] | [
34
] | [
57
] | |
2024-11-18T23:06:16.797751+00:00 | 1,469,333,204,000 | 7cad1e9b82873fd9628607af855746a78227cf68 | 3 | {
"blob_id": "7cad1e9b82873fd9628607af855746a78227cf68",
"branch_name": "refs/heads/master",
"committer_date": 1469333204000,
"content_id": "808cd431d8913b8667c030723887d8f406a970bf",
"detected_licenses": [
"MIT"
],
"directory_id": "24b75e6eff196e0dc32d8c6c314a808e9c725d4f",
"extension": "py",
"fi... | 2.671875 | stackv2 | import tornado.ioloop
import tornado.web
import tornado.httpclient
import json
import lxml.html
from lxml import etree
import collections
class MainHandler(tornado.web.RequestHandler):
@tornado.web.asynchronous
def post(self):
self.set_header("Access-Control-Allow-Origin", "*")
if not self.ge... | 47 | 28.85 | 86 | 18 | 330 | python | [{"finding_id": "codeql_py/xpath-injection_efd19e28d547e460_ccacec2e", "tool_name": "codeql", "rule_id": "py/xpath-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "XPath expression depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-643"
] | [
"py/xpath-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"XPath expression depends on a [user-provided value](1)."
] | [
25
] | [
null
] | [
24
] | [
50
] | |
2024-11-18T23:06:21.456968+00:00 | 1,463,068,908,000 | cb7bc9961451521e2f1394bbcc6078d6ec753b8b | 2 | {
"blob_id": "cb7bc9961451521e2f1394bbcc6078d6ec753b8b",
"branch_name": "refs/heads/master",
"committer_date": 1463068908000,
"content_id": "748296bb5ed0576b0b120ff2b4717455c4dde11e",
"detected_licenses": [
"MIT"
],
"directory_id": "0660f18b77375a44ff7550a5abdc9be0861dfde8",
"extension": "py",
"fi... | 2.453125 | stackv2 | """Added views for a bitserv server."""
from rest_framework import status
from rest_framework.viewsets import ViewSet
from rest_framework.response import Response
from . import payment
class PaymentAPIError(Exception):
"""Generic error for exceptions encountered during payment negotiation."""
pass
class Ba... | 108 | 34.27 | 93 | 16 | 725 | python | [{"finding_id": "codeql_py/stack-trace-exposure_dccea9750dc8f339_f84fb50d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
52,
60,
83,
108
] | [
null,
null,
null,
null
] | [
29,
29,
29,
29
] | [
46,
34,
46,
46
] | |
2024-11-18T23:06:22.014930+00:00 | 1,591,940,158,000 | 4009188b2631d860ea340382e5a86d46b421f9c3 | 4 | {
"blob_id": "4009188b2631d860ea340382e5a86d46b421f9c3",
"branch_name": "refs/heads/master",
"committer_date": 1591940158000,
"content_id": "094a28e7cf552d8ab3d422f0e238f1cc52195ca2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "195d531a31aa93444abb1b16ddf78771ef88c754",
"extension": "py"... | 4.4375 | stackv2 | ## We oftrn need current date and time when logging errors and saving data
# to get current date and time
# You need to use the datetime library
from datetime import datetime
current_date = datetime.now()
#the now function returns a datetime object
print('Today is: ' + str(current_date))
## There are functions you ca... | 36 | 30.06 | 86 | 9 | 258 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e433779bd1f9164f_0a399bfb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
36
] | [
null
] | [
7
] | [
40
] | |
2024-11-18T20:56:54.936161+00:00 | 1,605,045,116,000 | 0d3432c3a8338b61144d39575ae404ce438abb16 | 2 | {
"blob_id": "0d3432c3a8338b61144d39575ae404ce438abb16",
"branch_name": "refs/heads/master",
"committer_date": 1605045116000,
"content_id": "a698347b501a223841e3d1a3a26d3f4251696a9c",
"detected_licenses": [
"MIT"
],
"directory_id": "ade4775c4284fd1ab298e3d27844be5658a812b4",
"extension": "py",
"fi... | 2.40625 | stackv2 | import http.client
import hashlib
import json
import urllib
import random
import opencc
import pdb
import time
from baidu_ids import ids
def translate(content , id_use = "id1" , src_lan = "zh" , tar_lan = "en"):
appid = ids[id_use][0]
secretKey = ids[id_use][1]
httpClient = None
myurl = '/api/trans/vip/translate'
... | 51 | 23.57 | 74 | 19 | 387 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_e90ee052e06cceb8_1f35f6a8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
19
] | [
null
] | [
21
] | [
34
] | |
2024-11-18T22:44:05.620248+00:00 | 1,628,172,278,000 | f843819812df0cc6b4fccc1e31569ead8bee22b5 | 3 | {
"blob_id": "f843819812df0cc6b4fccc1e31569ead8bee22b5",
"branch_name": "refs/heads/master",
"committer_date": 1628172278000,
"content_id": "aedc3e93f84e2385b85cd7c66e32da121d51a8ed",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5c5fbc8547bca3ee2cd147186a3a8ce40e75dbc3",
"extension": "py"... | 3.40625 | stackv2 | import functools
user = {"username": "anna", "access_level": "user"}
def make_secure(func):
@functools.wraps(func)
def secure_function(*args, **kwargs):
if user["access_level"] == "admin":
return func(*args, **kwargs)
else:
return f"No admin permissions for {user['user... | 64 | 22.56 | 138 | 17 | 345 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_213d9bc88cd27956_d26196bb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
58,
59,
63,
64
] | [
null,
null,
null,
null
] | [
7,
7,
7,
7
] | [
27,
31,
27,
31
] | |
2024-11-18T22:44:12.660376+00:00 | 1,656,720,335,000 | 8dea9ab7c9844936287f69f6a07a5c5d92af6476 | 3 | {
"blob_id": "8dea9ab7c9844936287f69f6a07a5c5d92af6476",
"branch_name": "refs/heads/master",
"committer_date": 1656720335000,
"content_id": "1c7adb6d929d6d80cb2bedf9d8506321df8510a7",
"detected_licenses": [
"MIT"
],
"directory_id": "b6ad7a2e9e7abb319f8f0f14876a9952ec8ac020",
"extension": "py",
"fi... | 2.65625 | stackv2 | import os
import shutil
import winbrew.util
import zipfile
import tarfile
import urllib
import subprocess
class Archive:
"""
Archive describes the type of package to download. Typically, some kind of
compressed file (tar, zip) or a git repository.
"""
@staticmethod
def create(url, work_dir, pa... | 153 | 29.03 | 98 | 16 | 1,108 | python | [{"finding_id": "codeql_py/tarslip_bde0fdbe6c1d44d7_c800907c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
104
] | [
null
] | [
36
] | [
38
] | |
2024-11-18T22:44:13.975377+00:00 | 1,615,810,093,000 | c6b0949541d048d4b4499771706e4acc78342845 | 3 | {
"blob_id": "c6b0949541d048d4b4499771706e4acc78342845",
"branch_name": "refs/heads/main",
"committer_date": 1615810093000,
"content_id": "2e3e572a6825a4fc1070ed5b9b7cd183e9e7c924",
"detected_licenses": [
"MIT"
],
"directory_id": "8477e6d50febc895de08382e02c8d49ffacc42d2",
"extension": "py",
"file... | 3.109375 | stackv2 | from hashlib import sha256
import arrow
def get_local_isoformat(time: float, timezone: str) -> str:
"""Get localtime isoformat string from unix time"""
return str(arrow.get(time).to(timezone).isoformat())
def generate_user_entry(username: str, password: str) -> str:
"""Generate user:password_hash line"... | 24 | 29.29 | 65 | 13 | 168 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_77f312df6eb647e5_92d0370d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
14,
22
] | [
null,
null
] | [
19,
19
] | [
36,
36
] | |
2024-11-18T23:10:39.031919+00:00 | 1,555,511,497,000 | 8d6dcd4e643ddffbb50b561a17e254e50b5f0cbc | 3 | {
"blob_id": "8d6dcd4e643ddffbb50b561a17e254e50b5f0cbc",
"branch_name": "refs/heads/master",
"committer_date": 1555511497000,
"content_id": "d7a2589709057211e00af9e90533820d0b498fb0",
"detected_licenses": [
"MIT"
],
"directory_id": "ddb09330eb51f823c1dc66617b363affd4e23290",
"extension": "py",
"fi... | 3.140625 | stackv2 | import redis
import time
# r = redis.Redis(host='127.0.0.1', port=6379, decode_responses=True)
# r.set('name', 'redis_test')
# print(dir(r))
# print(r['name'])
# print(r.get('name'))
# 连接池
pool = redis.ConnectionPool(host='127.0.0.1', port=6379, decode_responses=True)
r = redis.Redis(connection_pool=pool)
r.set('gend... | 24 | 26.62 | 79 | 8 | 261 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_efaea929b30c368e_08f1a6fc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
14
] | [
null
] | [
7
] | [
22
] | |
2024-11-18T23:10:48.978546+00:00 | 1,688,136,297,000 | 07869be55681bae524fa2bcfa12c2d0a9d3401d7 | 2 | {
"blob_id": "07869be55681bae524fa2bcfa12c2d0a9d3401d7",
"branch_name": "refs/heads/master",
"committer_date": 1688136297000,
"content_id": "58cf82550d0e83fcd22a7c77d0fca8401be35d12",
"detected_licenses": [
"MIT"
],
"directory_id": "e28454cb69890999189311163d30bd7c178451a6",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/env python
"""
Script to get data_internal from KPI data_internalbase and render dashboard HTML files.
"""
import click
from datetime import datetime
from distutils.dir_util import copy_tree
import logging
import jinja2
import json
import os
import urllib.request
import yaml
logging.basicConfig(level=logg... | 106 | 36.93 | 109 | 16 | 952 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e058a52071799844_785da28b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
70
] | [
null
] | [
15
] | [
80
] | |
2024-11-18T23:10:51.496186+00:00 | 1,591,699,578,000 | 70a7ffd49c13535cfa1356e849a3e62b53d03ffe | 2 | {
"blob_id": "70a7ffd49c13535cfa1356e849a3e62b53d03ffe",
"branch_name": "refs/heads/master",
"committer_date": 1591699578000,
"content_id": "af96619d1e0e06ea4e41b75f8f16c1a76cec8a6c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9f3ce954bd6e2ca716ac36f5cc4b151aae0c617e",
"extension": "py"... | 2.359375 | stackv2 | #!/usr/bin/env python3
import os
import sys
import logging
import tarfile
import requests
import argparse
import tempfile
log = logging.getLogger(__name__)
KUBEBUILDER_URL = "https://github.com/kubernetes-sigs/kubebuilder/releases/download/v1.0.5/kubebuilder_1.0.5_linux_amd64.tar.gz"
KUSTOMIZE_URL = "https://github.... | 76 | 31.66 | 128 | 15 | 631 | python | [{"finding_id": "codeql_py/overly-permissive-file_914119b109b36254_5e904c15", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable."
] | [
61,
65
] | [
null,
null
] | [
5,
5
] | [
62,
56
] | |
2024-11-18T22:29:56.549076+00:00 | 1,462,649,944,000 | 089a673216dfaa958cd4a54a76f5ec11d8657e19 | 2 | {
"blob_id": "089a673216dfaa958cd4a54a76f5ec11d8657e19",
"branch_name": "refs/heads/master",
"committer_date": 1462649970000,
"content_id": "5e593f33965c31527c84db0cd8c99bc6236fd3eb",
"detected_licenses": [
"MIT"
],
"directory_id": "22aab6c333c16feb6815bbfca27c1cb259c1c42b",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!/usr/bin/env python
import cgi
import http.client
import json
import sys
import urllib
import cgitb
cgitb.enable()
def do_julia():
print("Content-Type: application/json")
print()
form = cgi.FieldStorage()
method = form.getvalue("method", "GET")
cmd = form.getvalue("cmd")
if cmd == 'eval... | 51 | 23.08 | 68 | 16 | 306 | python | [{"finding_id": "codeql_py/partial-ssrf_a3f289fddfd9186d_4bb750bd", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
42
] | [
null
] | [
5
] | [
51
] | |
2024-11-18T22:29:57.739723+00:00 | 1,633,274,340,000 | 796fdfdf0267ff4a5602d05e856dd671fd452c8f | 3 | {
"blob_id": "796fdfdf0267ff4a5602d05e856dd671fd452c8f",
"branch_name": "refs/heads/main",
"committer_date": 1633274340000,
"content_id": "6c220bddedcb90d349d8356ce42be4c91d1255a5",
"detected_licenses": [
"MIT"
],
"directory_id": "7656ab276d0cbb8bec2ffa83319de3d1f56a1fc0",
"extension": "py",
"file... | 2.765625 | stackv2 | import tornado.ioloop
import tornado.web
class MainHandler(tornado.web.RequestHandler):
def get(self):
self.write("Hello, world")
class MyFormHandler(tornado.web.RequestHandler):
def get(self):
self.write('<html><body><form action="/myform" method="post">'
'<input type="te... | 32 | 24.88 | 70 | 13 | 196 | python | [{"finding_id": "codeql_py/reflective-xss_c75e389a630144fa_3152c178", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
19
] | [
null
] | [
20
] | [
69
] | |
2024-11-18T23:10:10.757291+00:00 | 1,519,826,598,000 | 28e35170baca916c808c35e426a57df48d3f7bc9 | 3 | {
"blob_id": "28e35170baca916c808c35e426a57df48d3f7bc9",
"branch_name": "refs/heads/master",
"committer_date": 1519826598000,
"content_id": "d584e7a84453d34a6007aca4b68294a246d960d2",
"detected_licenses": [
"MIT"
],
"directory_id": "78afd6bfa90074e947b97a8dc6dc6cd59cbff716",
"extension": "py",
"fi... | 3.015625 | stackv2 | #!/usr/bin/python
# Creted by Yunindyo Prabowo
import json
import requests
city = "Semarang" # Adding your city
api_key = "Your Api Key" # Adding your Api Key
weather2 = requests.get("http://api.openweathermap.org/data/2.5/weather?q={}&APPID={}".format(city, api_key))
result = json.loads(weather2.text)
city = ... | 19 | 24.11 | 109 | 11 | 148 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_192af349d6ee670e_e0da3645", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
19
] | [
null
] | [
8
] | [
48
] | |
2024-11-18T23:10:11.551311+00:00 | 1,492,426,983,000 | e3a5ccc53cb98b7cc15f93b7d253aab8e0aa7e0b | 2 | {
"blob_id": "e3a5ccc53cb98b7cc15f93b7d253aab8e0aa7e0b",
"branch_name": "refs/heads/master",
"committer_date": 1492426983000,
"content_id": "97b05b7f29f54257833b4c9ef1191778871f472f",
"detected_licenses": [
"MIT"
],
"directory_id": "48be2421478fb28d94ba4ce9e4266c4da9048337",
"extension": "py",
"fi... | 2.4375 | stackv2 | # -*- coding:utf-8 -*-
import sys
import os
import argparse
from jinja2 import FileSystemLoader, Environment
import cococrawler
from cococrawler.config import get_project_config
import importlib
CRAWLER_PATH = 'crawlers'
PATH = os.path.dirname(os.path.abspath(cococrawler.__file__))
TEMPLATE_ENVIRONMENT = Environment(
... | 124 | 30.3 | 89 | 17 | 869 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_70cb811bcf4f10a8_1059936f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
12
] | [
15
] | [
24
] | [
23
] | |
2024-11-18T23:10:19.522561+00:00 | 1,525,757,515,000 | f76821cf33e8e8c8d349ee3bbefd80273f8b5206 | 2 | {
"blob_id": "f76821cf33e8e8c8d349ee3bbefd80273f8b5206",
"branch_name": "refs/heads/master",
"committer_date": 1525757515000,
"content_id": "59514edab01382d127c84276a17183d615e25010",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "4db61dec3e7aa6f7191ce937f2b096c7a0a609bc",
"extension": "p... | 2.4375 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on 26.11.2009
@author: ivbeg
"""
import dns.resolver, dns.exception
from bs4 import UnicodeDammit
import io
import pycurl
from urllib.parse import urlparse
import datetime
from .consts import SERVER_APACHE, DEFAULT_NAMESERVERS
class HttpHeaders:
"""Class of HTTP headers"""
... | 197 | 28.66 | 110 | 26 | 1,438 | python | [{"finding_id": "codeql_py/request-without-cert-validation_9ac6b8fb7a16c70b_2f5fb60b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
174
] | [
null
] | [
5
] | [
39
] | |
2024-11-18T23:21:52.640858+00:00 | 1,449,469,262,000 | d6dad44bc7e076a91787ecf3a1382143aba31774 | 3 | {
"blob_id": "d6dad44bc7e076a91787ecf3a1382143aba31774",
"branch_name": "refs/heads/master",
"committer_date": 1449469261000,
"content_id": "dd3060cd0ba47e96a3fb31d3450db0b3165018c5",
"detected_licenses": [
"MIT"
],
"directory_id": "280bbf0bcef46b5a947349d5010c7122e0ecdb11",
"extension": "py",
"fi... | 2.96875 | stackv2 | """Methods for reading and writing spk files"""
from Crypto.Cipher import AES
from Crypto.PublicKey import RSA
import constants
import util
def parse(data):
"""Parses an spk file
Returns:
The contained apk data
"""
encryptedKey, encryptedData = parseContainer(data)
key = decryptKey(encryptedKey)
return decr... | 55 | 31.47 | 123 | 12 | 431 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_158369dcf4dcc2dc_c9c47156", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
50,
55
] | [
null,
null
] | [
28,
17
] | [
42,
64
] | |
2024-11-18T21:33:29.134760+00:00 | 1,397,069,259,000 | b0a391c3b172bd94a8ed9df9275cc8650b4129f7 | 3 | {
"blob_id": "b0a391c3b172bd94a8ed9df9275cc8650b4129f7",
"branch_name": "refs/heads/master",
"committer_date": 1397069259000,
"content_id": "ce58626855e822f3c72f4fcc71274193369cb791",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "02e1972c15616f6fc80da7e3a302bec93c8784b6",
"extension": "p... | 2.671875 | stackv2 | # -*- coding: utf-8 -*-
'''
Created on 2014-04-09
This logger saves the information into file system.
@author: Krzysztof Langner
'''
import datetime
import json
import os
from flask import Flask
from flask import request
from iclogger.example_settings import FILE_STORAGE
app = Flask(__name__)
@app.route("/")
def lo... | 35 | 25.86 | 69 | 14 | 238 | python | [{"finding_id": "codeql_py/path-injection_b6f7af077badddb5_7579736a", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 3 | true | [
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
24,
26,
27
] | [
null,
null,
null
] | [
25,
21,
25
] | [
33,
46,
33
] | |
2024-11-18T21:33:29.675950+00:00 | 1,669,134,755,000 | 71e854e85b2cf4282a4028714d3e06e97299e177 | 3 | {
"blob_id": "71e854e85b2cf4282a4028714d3e06e97299e177",
"branch_name": "refs/heads/main",
"committer_date": 1669134755000,
"content_id": "f98a4aa0269e364658f01a35a96aa41e4009cdde",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "4d5534b32af2f75e49c4cd72284195eaf9de8848",
"extension": "py"... | 2.75 | stackv2 | """An example flask application demonstrating server-sent events."""
from hashlib import sha1
from shutil import rmtree
from stat import S_ISREG, ST_CTIME, ST_MODE
import json
import os
import time
from PIL import Image, ImageFile
from gevent.event import AsyncResult
from gevent.queue import Empty, Queue
from gevent.... | 285 | 29.8 | 117 | 16 | 2,118 | python | [{"finding_id": "codeql_py/stack-trace-exposure_3cb9c0c8d04bfcee_01272046", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
114
] | [
null
] | [
16
] | [
38
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.