added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T01:43:46.564600+00:00 | 1,624,933,416,000 | 2640932e4aafefaebe878a737ca2792d7abdc4a2 | 3 | {
"blob_id": "2640932e4aafefaebe878a737ca2792d7abdc4a2",
"branch_name": "refs/heads/main",
"committer_date": 1624933416000,
"content_id": "81c10ce37e521c3634fc6f3767b22a85bf45d9d9",
"detected_licenses": [
"MIT"
],
"directory_id": "61eb79aad2639da74c07d5fdb7a2569285103d9e",
"extension": "py",
"file... | 2.515625 | stackv2 | from flask import Flask, Blueprint, render_template
app = Flask(__name__)
bp = Blueprint('app', __name__)
filmes = [
{
'id': 1,
'nome': 'Home Aranha: Longe de casa',
'url': 'https://upload.wikimedia.org/wikipedia/pt/0/04/Spider-man-far-from-home-poster.jpg'
},
{
'id': 2,
... | 54 | 27.5 | 107 | 9 | 526 | python | [{"finding_id": "codeql_py/flask-debug_78127792cb537a1c_38799646", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
54,
49
] | [
null,
null
] | [
5,
12
] | [
24,
41
] | |
2024-11-19T01:44:01.067798+00:00 | 1,634,246,391,000 | 2a22e5b2055e8769052019918ac43d8d24f68948 | 3 | {
"blob_id": "2a22e5b2055e8769052019918ac43d8d24f68948",
"branch_name": "refs/heads/main",
"committer_date": 1634246391000,
"content_id": "6a88480d7ec25e4bf21d63ae61610423c2ef34e1",
"detected_licenses": [
"MIT"
],
"directory_id": "26f3b4ecbe1342de4b48e84bbafebf1b07d72224",
"extension": "py",
"file... | 3.015625 | stackv2 | # -------------------------------------------------------------------
# CREAR NUESTRA API con Flask
# ------------------------------------------------------------------
import traceback
from flask import Flask, jsonify, request, render_template
# Crear el server Flask
app = Flask(__name__)
# Crear el modelo que utiliz... | 37 | 32.97 | 81 | 17 | 266 | python | [{"finding_id": "codeql_py/stack-trace-exposure_d6c985e8a56cc67b_130124e2", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
32
] | [
null
] | [
28
] | [
61
] | |
2024-11-19T01:44:08.916503+00:00 | 1,457,351,494,000 | 15e7b583efa109c573f862cc7093f534eb4f3386 | 2 | {
"blob_id": "15e7b583efa109c573f862cc7093f534eb4f3386",
"branch_name": "refs/heads/master",
"committer_date": 1457351494000,
"content_id": "9a7abec262395b10dd78fa78c622c07f167517d3",
"detected_licenses": [
"MIT"
],
"directory_id": "bc957e85344c16fd2f33b6c448169c67a1a8a93f",
"extension": "py",
"fi... | 2.40625 | stackv2 | # -*- coding: UTF-8 -*-
from werkzeug.security import check_password_hash
from flask.ext.login import current_user
from flask import render_template, request, url_for, flash, redirect
from flask.ext.login import login_user, login_required, logout_user
from ..models import Customer
from .forms import LoginForm
from . i... | 35 | 34.54 | 77 | 16 | 254 | python | [{"finding_id": "codeql_py/url-redirection_82d0ecaa9ae06e22_fa22d6e4", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
25
] | [
26
] | [
29
] | [
45
] | |
2024-11-19T02:19:53.861702+00:00 | 1,598,369,630,000 | d53959531d27a7506484e608f01b229e15baf2b4 | 3 | {
"blob_id": "d53959531d27a7506484e608f01b229e15baf2b4",
"branch_name": "refs/heads/master",
"committer_date": 1598369630000,
"content_id": "f500c6806a8b474c55c011688439b369039bfcd8",
"detected_licenses": [
"MIT"
],
"directory_id": "d2f4c673d6adf16c9f982f68cc21e23b4b453ca9",
"extension": "py",
"fi... | 3.109375 | stackv2 | # encoding:utf-8
import zipfile
import os
from threading import Thread
import time
from itertools import product
from pathlib import Path
path = r'G:\\video\日本\[多P]某体校运动系美女和两个社会青年野战3P晚上街头露出\某体校运动系美女.zip'
my_pass_dict = r'dict\\'
def password(x = 6):
# iter = ['1234567890abcdefghijklmnopqrstuvwxyz.',]
iter = ... | 43 | 27.3 | 118 | 15 | 360 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_acac58b3a06e7181_3e5ffb56", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
29,
33
] | [
null,
null
] | [
19,
19
] | [
62,
62
] | |
2024-11-19T02:19:54.856375+00:00 | 1,470,744,339,000 | 7442fdb1aff666b03afb8030cc51e23a868e8be1 | 2 | {
"blob_id": "7442fdb1aff666b03afb8030cc51e23a868e8be1",
"branch_name": "refs/heads/master",
"committer_date": 1470744339000,
"content_id": "ef4a4c71e2107ec0430feeb94f24d369c4ba6e02",
"detected_licenses": [
"MIT"
],
"directory_id": "c6eb460751f59090021f289dda0c80f6bc41d11a",
"extension": "py",
"fi... | 2.453125 | stackv2 | import requests as r
import urllib.parse as purl
import json
def StartScopusSearch(key,params):
ssq = ScopusSearchQuery(key,params)
return ssq
class ScopusSearchQuery:
_defaultParams = {'count':100,
'view':'COMPLETE',
'httpAccept':'application/json'}
_baseUr... | 96 | 31.92 | 94 | 17 | 799 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ea37025ef7c6f3b8_7b65a4aa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
47,
49
] | [
null,
null
] | [
15,
15
] | [
39,
38
] | |
2024-11-19T02:19:55.966414+00:00 | 1,577,765,636,000 | 49ddaa068309b45c0a7f82907a83b70dee9db644 | 3 | {
"blob_id": "49ddaa068309b45c0a7f82907a83b70dee9db644",
"branch_name": "refs/heads/master",
"committer_date": 1577765636000,
"content_id": "319dfe1f9a6f5c1f27d0fc9c70fa2ddf8d9b1aa3",
"detected_licenses": [
"MIT"
],
"directory_id": "8f198f895a9bbbc61e5425d31ee02ead13610cd3",
"extension": "py",
"fi... | 2.953125 | stackv2 | #!/usr/bin/python3
"""
User Class from Models Module
"""
import hashlib
import os
from models.base_model import BaseModel, Base
from sqlalchemy.orm import relationship
from sqlalchemy import Column, Integer, String, ForeignKey
STORAGE_TYPE = os.environ.get('HBNB_TYPE_STORAGE')
class User(BaseModel, Base):
"""
... | 67 | 30.01 | 60 | 13 | 440 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d7f2bb89d82e13e3_e4657831", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
62
] | [
null
] | [
23
] | [
52
] | |
2024-11-19T02:20:06.620079+00:00 | 1,563,243,049,000 | 43e2dccabe35905571ca61822de501fd25906b79 | 4 | {
"blob_id": "43e2dccabe35905571ca61822de501fd25906b79",
"branch_name": "refs/heads/master",
"committer_date": 1563243049000,
"content_id": "fd7e36e60ee7282ecdcde0e0870c092dfbd3601c",
"detected_licenses": [
"Unlicense"
],
"directory_id": "ec3de8dccb601212b754ca2078140c9a4f1535a2",
"extension": "py",... | 3.59375 | stackv2 | from sys import argv
import string_tools
from sanitization import sanitize
# takes a secret message and key and returns
# vigenere ciphertext
# note secret message and key must be a list of numbers
# use string tools to convert
def encrypt(secret_message, secret_key):
cipher_text = []
# encrypting adds the k... | 61 | 31.93 | 78 | 15 | 462 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f4499e6f0435ed29_295a2e22", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (s... | [
54,
54,
54,
59,
59,
59
] | [
null,
null,
null,
null,
null,
null
] | [
23,
45,
67,
23,
42,
64
] | [
37,
55,
78,
34,
52,
78
] | |
2024-11-19T00:59:48.497396+00:00 | 1,604,847,304,000 | bf2c8e39de1dbcb74f9dbd795eec56c60813dc30 | 3 | {
"blob_id": "bf2c8e39de1dbcb74f9dbd795eec56c60813dc30",
"branch_name": "refs/heads/main",
"committer_date": 1604847304000,
"content_id": "9781f5efe6a0a54e1e5eddefa44c70bb9bd6c318",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bd664fe124dad44a86dd93846eddbe05bbe6a05b",
"extension": "py",
... | 2.921875 | stackv2 | """Creates class to interact with HomeWizard Energy P1 meter API.
API Documentation: https://energy.homewizard.net/en/support/solutions/articles/19000117051-homewizard-p1-meter-local-api-beta-
"""
import enum
import json
import logging
import requests
from . import const
_LOGGER = logging.getLogger(__name__)
cla... | 92 | 25.17 | 126 | 15 | 527 | python | [{"finding_id": "codeql_py/request-without-cert-validation_1bd06488c4ebcda2_794946b3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
81
] | [
null
] | [
24
] | [
85
] | |
2024-11-19T01:00:01.591029+00:00 | 1,502,082,315,000 | 62d31c2a77bbdcbe305f07fcf8a136731e824a20 | 2 | {
"blob_id": "62d31c2a77bbdcbe305f07fcf8a136731e824a20",
"branch_name": "refs/heads/master",
"committer_date": 1502082315000,
"content_id": "9bd838edb5bd44d8104b2e35847eea6636b05361",
"detected_licenses": [
"MIT"
],
"directory_id": "80b5dc6e4d03068475ec6a265876b5091810187a",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/usr/bin/env python
try:
import argparse, os, re, signal, socket, string, subprocess, sys, time, paramiko
from urlparse import urlparse
from subprocess import Popen, PIPE, STDOUT
except Exception as e:
print('\n[!] Import(s) failed! ' + str(e))
class SSHpray():
def __init__(self, args):
... | 184 | 39.59 | 169 | 23 | 1,649 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_0adebe881bcf6821_f686fbf8", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
139
] | [
null
] | [
17
] | [
74
] | |
2024-11-19T01:11:42.492429+00:00 | 1,623,619,816,000 | bea26acaa6fbd74e610095510f0c1da58a7219b6 | 2 | {
"blob_id": "bea26acaa6fbd74e610095510f0c1da58a7219b6",
"branch_name": "refs/heads/main",
"committer_date": 1623619816000,
"content_id": "a548ed8a8969f5f7a2e566b2919ce6664fc200df",
"detected_licenses": [
"MIT"
],
"directory_id": "45a58742ed35fcd4aeb1acf8f64f233aeccba51c",
"extension": "py",
"file... | 2.46875 | stackv2 | """Server program for Tunt."""
from flask import Flask
import os
import logging
import template
import mimetypes
# All range request imports
from datetime import datetime
from flask_rangerequest import RangeRequest
app = Flask(__name__)
server_boot_time = datetime.utcnow()
@app.route("/")
def render_home_page():
... | 102 | 24.81 | 82 | 14 | 622 | python | [{"finding_id": "codeql_py/path-injection_c477907b3902f70d_b2b93cd5", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 3 | true | [
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
61,
62,
65
] | [
null,
null,
null
] | [
34,
15,
14
] | [
44,
25,
24
] | |
2024-11-19T01:22:22.677469+00:00 | 1,631,256,238,000 | 1a0c77fa5c580ad3679076ac6a0d36cbf5ff919e | 2 | {
"blob_id": "1a0c77fa5c580ad3679076ac6a0d36cbf5ff919e",
"branch_name": "refs/heads/main",
"committer_date": 1631256238000,
"content_id": "59e59e4c8701ee9dd9755fa5de1175bc49e302c1",
"detected_licenses": [
"MIT"
],
"directory_id": "4c4d79235c84c52242f2d8c5171190c6836a43a7",
"extension": "py",
"file... | 2.484375 | stackv2 | import sys
from PyQt5 import QtCore, QtGui, QtWidgets
from PyQt5.QtCore import *
from PyQt5.QtWidgets import QDial, QDialog, QApplication
from PyQt5.QtGui import *
from Ui_Dialog_Login import *
from Ui_Dialog_Signup import *
class Ui_Login(QDialog,Ui_Dialog_Login):
def __init__(self):
super(Ui_Login,... | 51 | 34.73 | 88 | 12 | 411 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_034ce0befa1c5182_9705b7ca", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
21,
37
] | [
null,
null
] | [
75,
80
] | [
83,
88
] | |
2024-11-19T01:33:50.118171+00:00 | 1,555,220,513,000 | 81d5fe70d90082ab94786b74a90fc4cf8057e5ce | 3 | {
"blob_id": "81d5fe70d90082ab94786b74a90fc4cf8057e5ce",
"branch_name": "refs/heads/master",
"committer_date": 1555220513000,
"content_id": "8010af22cc3ee0d75cbe5102631890b38e9d3c45",
"detected_licenses": [
"Unlicense"
],
"directory_id": "a7e3563eab094b7d0db4f281be0d181a81f4ac1d",
"extension": "py",... | 2.640625 | stackv2 | import paramiko
import getpass
from time import sleep
username = raw_input("Enter your username: ")
#Remove below sharp sign to hard code your password
#password = "YOUR PASSWORD HERE"
#use below line to ask for password and echo it to user
#password = raw_input("Enter your password: ")
#use below line to ask for pass... | 84 | 36.07 | 97 | 9 | 766 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_dbc06f8c1fad6906_6bcf9229", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
26
] | [
null
] | [
5
] | [
69
] | |
2024-11-19T02:10:44.131433+00:00 | 1,629,747,878,000 | 16c7906c07653f8bb9793100315ad0036efa6e45 | 3 | {
"blob_id": "16c7906c07653f8bb9793100315ad0036efa6e45",
"branch_name": "refs/heads/main",
"committer_date": 1629747878000,
"content_id": "ad5179fd84bcc562bcbc25c3656d1ebe203938f1",
"detected_licenses": [
"MIT"
],
"directory_id": "589b9af0b096d25b987160c347e426597c6c9b27",
"extension": "py",
"file... | 2.78125 | stackv2 | import requests
import os
from dotenv import load_dotenv
from typing import List, Dict, Any
from urllib.parse import urljoin
load_dotenv()
access_key = os.environ.get("ACCESS_KEY")
secret_key = os.environ.get("SECRET_KEY")
scan_url = os.environ.get("SCAN_URL", default="https://127.0.0.1:8834/scans")
def send(url: s... | 53 | 25.68 | 93 | 15 | 369 | python | [{"finding_id": "codeql_py/request-without-cert-validation_57b0ab754ebe8dd2_c511a32c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
16
] | [
null
] | [
16
] | [
80
] | |
2024-11-19T02:10:44.823079+00:00 | 1,461,839,437,000 | 06f21e10b390438697d7a525b2d61ba9033f2227 | 2 | {
"blob_id": "06f21e10b390438697d7a525b2d61ba9033f2227",
"branch_name": "refs/heads/master",
"committer_date": 1461839437000,
"content_id": "bdfec971b1b833b19734ecf5e4b7446aa8c780b1",
"detected_licenses": [
"MIT"
],
"directory_id": "12d889573dae5e517d92784f67e74d51c55e1a7c",
"extension": "py",
"fi... | 2.421875 | stackv2 | # -*- coding:utf8 -*-
"""
Usage:
main.py -d <delaytime> -u <url> [-o <save_dir>] [-s]
Arguments:
delaytime delaytime, eg: 60
save_dir path to save your site, eg: 'tmp'
url url, eg: http://m.sohu.com
Options:
-h --help show this help
-d delaytime
-o save_dir
... | 376 | 37.55 | 82 | 23 | 3,278 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e59d9701c2507c42_26382f9f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
111,
169,
207,
251
] | [
115,
170,
209,
252
] | [
16,
24,
24,
24
] | [
41,
73,
63,
75
] | |
2024-11-19T02:10:48.882836+00:00 | 1,671,793,021,000 | b5ccd176177016e72f4f3f66e625abf5fa6c1399 | 2 | {
"blob_id": "b5ccd176177016e72f4f3f66e625abf5fa6c1399",
"branch_name": "refs/heads/main",
"committer_date": 1671793021000,
"content_id": "e0592dd0d2687962aba7749f0bdef240b51ede12",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "9aba1b720206a89d5ae965ec592262c5762582e1",
"extension": "py"... | 2.4375 | stackv2 | import argparse
import json
import os
import sys
import shutil
from jupyter_client.kernelspec import KernelSpecManager
from tempfile import TemporaryDirectory
kernel_json = {
"argv": [sys.executable, "-m", "echo_kernel", "-f", "{connection_file}"],
"display_name": "Echo",
"language": "text",
}
def insta... | 59 | 32.64 | 85 | 16 | 469 | python | [{"finding_id": "codeql_py/overly-permissive-file_26769dbe17595c50_7b0a9cf5", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
19
] | [
null
] | [
9
] | [
28
] | |
2024-11-19T02:45:18.847253+00:00 | 1,523,901,429,000 | c53ec4729481982593b5d96dc0a45daae71952ad | 2 | {
"blob_id": "c53ec4729481982593b5d96dc0a45daae71952ad",
"branch_name": "refs/heads/master",
"committer_date": 1523901429000,
"content_id": "90a821eadcd600fc9ceb85786e62d6539b2c7ae3",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "d48b6ffeb1efbad3e766abccde907d97c9348098",
"extension": "p... | 2.453125 | stackv2 | #!/usr/bin/python
"""composes the config from user definitions."""
import argparse
import os
import users
import users.__config__
import importlib
import csv
# file indicators
IND_DELIM = "_"
USER_INDICATOR = "user" + IND_DELIM
VLAN_INDICATOR = "vlan" + IND_DELIM
AUTH_PHASE_ONE = "PEAP"
AUTH_PHASE_TWO = "MSCHAPV2"
c... | 315 | 29.49 | 79 | 17 | 2,341 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_13d7594fb8a4c4e6_dd84ad2a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.",
"This expression stores [sen... | [
198,
199,
203,
210,
217
] | [
null,
null,
null,
null,
null
] | [
21,
21,
21,
21,
13
] | [
63,
79,
53,
57,
61
] | |
2024-11-19T02:45:34.772698+00:00 | 1,445,244,080,000 | 6541bd37007652a816cd77acce2a80cbbfc931f9 | 3 | {
"blob_id": "6541bd37007652a816cd77acce2a80cbbfc931f9",
"branch_name": "refs/heads/master",
"committer_date": 1445244080000,
"content_id": "2bc219cb7ee46e73d5f93868ea372ad5f944d209",
"detected_licenses": [
"MIT"
],
"directory_id": "d07ebe2bbc884a3626084ad95fdc71028d6a3550",
"extension": "py",
"fi... | 2.5625 | stackv2 | # -*- coding: utf-8 -*-
import re
import urllib2
import time
import json
class bookIf:
def __init__(self, youth_booklist_url, author_booklist_url):
self.youth_booklist_url = youth_booklist_url
self.author_booklist_url = author_booklist_url
def get_group_booklist(self, group_id):
if gr... | 140 | 41.72 | 161 | 21 | 1,238 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_a421a270a55f22ab_a8b5de78", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'douban.com/subject/', so it might m... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'douban.com/subject/', so it might match more hosts than expected."
] | [
122
] | [
null
] | [
45
] | [
76
] | |
2024-11-19T02:57:17.538179+00:00 | 1,461,384,379,000 | 9caac4f98f7ad5a63a3495cdacceaa051f9849cf | 3 | {
"blob_id": "9caac4f98f7ad5a63a3495cdacceaa051f9849cf",
"branch_name": "refs/heads/master",
"committer_date": 1461384379000,
"content_id": "afc79c00b251fa1b3db9880a22cdbe1a8a4de460",
"detected_licenses": [
"MIT"
],
"directory_id": "8f861fa1cb9decdd9c941304a699fb0eeb0da77b",
"extension": "py",
"fi... | 2.671875 | stackv2 | import re
import os
import sys
import importlib
import os.path
import shutil
class Exporter(object):
data = None
def __init__(self, data, target_directory):
self.data = data
self.target_directory = target_directory
def _path_visitor(self, arg, dirname, names):
for name in names:
... | 79 | 34.25 | 121 | 18 | 559 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_710aca03f2b6029e_2dccfcf7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
64,
69
] | [
null,
null
] | [
28,
24
] | [
58,
55
] | |
2024-11-19T03:12:08.540137+00:00 | 1,634,249,866,000 | 36766edffd0502de83e7fda29e3e1b8fbb529f91 | 2 | {
"blob_id": "36766edffd0502de83e7fda29e3e1b8fbb529f91",
"branch_name": "refs/heads/master",
"committer_date": 1635270268000,
"content_id": "5be0fefa08aa9df742df080ecfe1b5a2be42a4a9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1c5e29435a6954ccc855f0bc9b3a7f291330282d",
"extension": "py"... | 2.4375 | stackv2 | import time
import random
import logging
import paramiko
import kraken.kubernetes.client as kubecli
import kraken.invoke.command as runcommand
node_general = False
# Pick a random node with specified label selector
def get_node(node_name, label_selector, instance_kill_count):
if node_name in kubecli.list_killab... | 81 | 35.56 | 112 | 15 | 690 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e0b92dcfeb4a05f5_15a2eb0d", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
57
] | [
null
] | [
5
] | [
62
] | |
2024-11-19T03:12:10.023314+00:00 | 1,621,047,769,000 | 4ef6965c3492315686f49726a4b6e7d335aae2d9 | 3 | {
"blob_id": "4ef6965c3492315686f49726a4b6e7d335aae2d9",
"branch_name": "refs/heads/main",
"committer_date": 1621047769000,
"content_id": "b6e6fe5c51e84d3a438df1c6b374ee84a31618f6",
"detected_licenses": [
"MIT"
],
"directory_id": "13b8df116cc8f255907db54cb13e1c721bf1a487",
"extension": "py",
"file... | 3.109375 | stackv2 | #!/usr/bin/env python3
## std library imports on top
import os
## 3rd party imports below
import paramiko
## work assigned to a junior programming asset on our team
from jrprogrammer import cmdissue
def get_creds():
ip = input("IP: ")
user = input("Username: ")
#list return [ip, user]
return {"ip": ... | 64 | 26.44 | 124 | 16 | 471 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_67ff640b72eb2e9f_509c6833", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
39
] | [
null
] | [
3
] | [
67
] | |
2024-11-19T01:33:39.210335+00:00 | 1,524,070,863,000 | 21df106e58196f1d0035a95ba6884fbe81a5a070 | 2 | {
"blob_id": "21df106e58196f1d0035a95ba6884fbe81a5a070",
"branch_name": "refs/heads/master",
"committer_date": 1524070863000,
"content_id": "aae6743107b4fd7e1991218c6cc399367c32c8ab",
"detected_licenses": [
"MIT"
],
"directory_id": "84fbc1625824ba75a02d1777116fe300456842e5",
"extension": "py",
"fi... | 2.375 | stackv2 | # MIT License
#
# Copyright (c) 2017 Apogee Research
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, mer... | 210 | 32.7 | 105 | 16 | 1,714 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5e7a81cb3b8d70ac_1d70cb86", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
175,
182
] | [
null,
null
] | [
43,
53
] | [
60,
78
] | |
2024-11-19T01:57:19.296446+00:00 | 1,458,553,443,000 | 90cf62b4f1d24d8d95b3bd748c87b86aa59d71a0 | 2 | {
"blob_id": "90cf62b4f1d24d8d95b3bd748c87b86aa59d71a0",
"branch_name": "refs/heads/master",
"committer_date": 1458562992000,
"content_id": "b3f4b71a43c18b5486d28972b6bb56f4c41ccd42",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "95c700425464db880229f988c0417bc108b44c01",
"extension": "p... | 2.484375 | stackv2 | """Define tex request class.
"""
import flasktex.db
import os
import sys
import syslog
import tempfile
import tarfile
import subprocess
class TeXRequest():
@staticmethod
def daemonize():
"""Daemonize with special treatments.
Note: Please, manually ensure that database connection
is ... | 256 | 31.53 | 79 | 17 | 1,819 | python | [{"finding_id": "codeql_py/tarslip_912094cc38ad5521_aa8f0b73", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
189
] | [
null
] | [
13
] | [
16
] | |
2024-11-19T01:57:29.700064+00:00 | 1,456,775,693,000 | 9d9dc3cd993bd4edc166661a3f25772d73afe3f5 | 3 | {
"blob_id": "9d9dc3cd993bd4edc166661a3f25772d73afe3f5",
"branch_name": "refs/heads/master",
"committer_date": 1456775693000,
"content_id": "2706b1d83c4a0d17f4484d51c37e03c9bc39b699",
"detected_licenses": [
"MIT"
],
"directory_id": "31eda0b2eda25b4782f324b5a7ed6cea8b36635b",
"extension": "py",
"fi... | 2.84375 | stackv2 | """
Basic file transfer server for SmartChain functions.
Author: Tim M. (TM2013)
Co-Author: Bitkapp (aka alaniz)
Organization: Project Radon
Date: 2/19/2016
Requirements:
HTTP Connection
"""
import SmartChain_file_transfer_client
from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler
import os
try:
import cP... | 88 | 29.95 | 82 | 18 | 605 | python | [{"finding_id": "codeql_py/path-injection_cbb991afdf25c385_19dbc30c", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 3 | true | [
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
37,
44,
50
] | [
null,
null,
null
] | [
19,
27,
23
] | [
48,
56,
52
] | |
2024-11-19T02:10:58.235757+00:00 | 1,557,537,285,000 | 8039cf7107c3fb1d965bb3dd4c205d553062830e | 2 | {
"blob_id": "8039cf7107c3fb1d965bb3dd4c205d553062830e",
"branch_name": "refs/heads/master",
"committer_date": 1557537285000,
"content_id": "50017ad81cf74beac5b8cf406c935d65892ec1ea",
"detected_licenses": [
"MIT"
],
"directory_id": "720be4dd11c98c44bded37f5978f64242efc669b",
"extension": "py",
"fi... | 2.40625 | stackv2 | from flask import Flask, request
import requests
import sqlite3
import json
DATABASE = './actuator_states.db'
app = Flask(__name__)
@app.teardown_appcontext
def close_connection(exception):
db = getattr(Flask, '_database', None)
if db is not None:
db.close()
@app.route('/', methods=['GET'])
def hell... | 56 | 29.29 | 132 | 22 | 403 | python | [{"finding_id": "codeql_py/sql-injection_f22490490785bcd0_276dce75", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 3 | true | [
"CWE-089",
"CWE-089",
"CWE-089"
] | [
"py/sql-injection",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
42,
48,
51
] | [
null,
null,
null
] | [
25,
29,
29
] | [
103,
132,
118
] | |
2024-11-19T02:10:58.522782+00:00 | 1,666,718,158,000 | 89ded277758c897f18845046ad6f032cbdab626a | 2 | {
"blob_id": "89ded277758c897f18845046ad6f032cbdab626a",
"branch_name": "refs/heads/master",
"committer_date": 1666718158000,
"content_id": "a044a6ee048fb26da4b209afcb270351074ced15",
"detected_licenses": [
"MIT"
],
"directory_id": "3e37b07ce6539b0133e021760e6568742f2c59d3",
"extension": "py",
"fi... | 2.453125 | stackv2 | # *********** auth ***********
from . import (
app,
service_manager,
jsonify,
request,
Response
)
# *********** auth ***********
# <editor-fold desc="Authentication checking views">
def get_request_auth(request):
try:
auth_header_value = request.headers.get('Authorization', None)
... | 83 | 34.18 | 82 | 15 | 596 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ba0f07ddfa1a8c44_66a45db2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
51
] | [
null
] | [
15
] | [
42
] | |
2024-11-19T02:11:00.684846+00:00 | 1,486,945,326,000 | b2b151c46731d5f834f01ce47cdf532ae816d9c6 | 2 | {
"blob_id": "b2b151c46731d5f834f01ce47cdf532ae816d9c6",
"branch_name": "refs/heads/master",
"committer_date": 1486945326000,
"content_id": "ae4c4b4a9c89f97ca7b23bbb117d38d06ff65558",
"detected_licenses": [
"MIT"
],
"directory_id": "9babbf78dee6b37e2e900043cce41ec186af2175",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/env python3
import os
from collections import OrderedDict
from contextlib import contextmanager
from flask import Flask, redirect, render_template, request
import jinja2
import mistune
app = Flask(__name__)
markdown = mistune.Markdown(hard_wrap=True)
try:
ROOT = os.environ['FINIKI_ROOT']
except KeyEr... | 112 | 26.77 | 151 | 18 | 729 | python | [{"finding_id": "codeql_py/url-redirection_543873df507b49ce_12cd71b9", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 7 | true | [
"CWE-601",
"CWE-601",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/url-redirection",
"py/url-redirection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).\nThis ... | [
29,
38,
27,
33,
68,
93,
94
] | [
null,
null,
null,
null,
null,
null,
null
] | [
25,
33,
27,
23,
29,
21,
15
] | [
35,
37,
36,
32,
38,
47,
24
] | |
2024-11-19T02:11:31.049595+00:00 | 1,633,947,917,000 | cd2fb3999b39269fa20a58c42253f052016f0842 | 3 | {
"blob_id": "cd2fb3999b39269fa20a58c42253f052016f0842",
"branch_name": "refs/heads/master",
"committer_date": 1633947917000,
"content_id": "c479ca7d87e977b5edc17dc6dcefd2b369ee94d1",
"detected_licenses": [
"MIT"
],
"directory_id": "95d34413afdc4f7ddfd7a8edaaeadf6dc47ec7e3",
"extension": "py",
"fi... | 2.59375 | stackv2 | import re
from konlpy.tag import Okt, Komoran, Mecab, Hannanum, Kkma
REMOVE_CHARS = re.compile(r"©|'+|(=+.{2,30}=+)|__TOC__|(ファイル:).+|:(en|de|it|fr|es|kr|zh|no|fi):|\n", re.UNICODE)
SPACE_CHARS = re.compile(r"(\\s|゙|゚| )+", re.UNICODE)
EMAIL_PATTERN = re.compile(r"(^[a-zA-Z0-9_.+-]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$)", ... | 43 | 35.26 | 128 | 11 | 488 | python | [{"finding_id": "codeql_py/overly-large-range_b168ea8cf1ef06aa_67c0c0cd", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
8
] | [
null
] | [
67
] | [
70
] | |
2024-11-19T02:11:31.920178+00:00 | 1,634,246,167,000 | be975b6ca09f00a87a9e39ca1dfa96bc9c1b9327 | 2 | {
"blob_id": "be975b6ca09f00a87a9e39ca1dfa96bc9c1b9327",
"branch_name": "refs/heads/master",
"committer_date": 1634246167000,
"content_id": "fa7f96a5827bac3c279b265d82333feeaaee30e7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "53cb12a1050181b1e82285cd66be3a2ee73c9ba7",
"extension": "py"... | 2.328125 | stackv2 | import json
import logging
from datetime import datetime
import os
import importlib
from flask import request
from flask.ext.restful import Resource
from ..stats import get_stats
from .. import settings
from ..services import host
from ..services import query
logger = logging.getLogger('resources.api')
logging.basic... | 210 | 33.06 | 97 | 19 | 1,482 | python | [{"finding_id": "codeql_py/log-injection_ff131fb4e07344c3_c78482c5", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
127,
130,
141
] | [
128,
131,
null
] | [
29,
29,
30
] | [
57,
57,
93
] | |
2024-11-19T02:11:43.880471+00:00 | 1,590,924,149,000 | 63660d5aaeeaa988fdcb9c9b59f5da636500b012 | 3 | {
"blob_id": "63660d5aaeeaa988fdcb9c9b59f5da636500b012",
"branch_name": "refs/heads/master",
"committer_date": 1590924149000,
"content_id": "a9472fbddc4ee11e11c203b2066ebf33399894f1",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "e52093052d676a2f239e056d308bd0b69b32d83b",
"extension": "p... | 2.984375 | stackv2 | from flask import jsonify
def format_data(records):
if "Exception" not in records[0]:
data = dict()
data['columns'] = records.pop(0)
data['records'] = records
try:
json_data = jsonify({
"status": "success",
"data": data
})
... | 34 | 20.53 | 57 | 17 | 150 | python | [{"finding_id": "codeql_py/stack-trace-exposure_318d8635cd9307fa_cc66beab", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
18
] | [
21
] | [
33
] | [
14
] | |
2024-11-19T02:11:48.305897+00:00 | 1,591,663,470,000 | c04efd319df672f32fe154d7bfe3ce1bc5683d33 | 4 | {
"blob_id": "c04efd319df672f32fe154d7bfe3ce1bc5683d33",
"branch_name": "refs/heads/master",
"committer_date": 1591663470000,
"content_id": "820fa2aa4fabb9b7cdf8d5c16e282f438eb0c717",
"detected_licenses": [
"MIT"
],
"directory_id": "bf55d7ad9b0d3d6c600acefce4fb5c10232c203f",
"extension": "py",
"fi... | 3.515625 | stackv2 | import re
txt = "Hello For other world!"
result = re.search(r"f.r", txt, re.IGNORECASE) # Case sensitive
print(result)
print("Span:", re.search(r"[a-zA-z0-9]unt", "Aunt").span())
result = re.search(r"[^A-Za-z0-9 ]", txt) # wont match any number or alpha neigther a white space
print(result)
result = re.search(r"f... | 80 | 25.65 | 99 | 10 | 608 | python | [{"finding_id": "codeql_py/overly-large-range_e5893855b9f18ff4_cecc44b0", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
9
] | [
null
] | [
32
] | [
35
] | |
2024-11-19T02:11:52.879121+00:00 | 1,459,622,587,000 | 78759853affb83979c921af3c2d9db5d30b97729 | 3 | {
"blob_id": "78759853affb83979c921af3c2d9db5d30b97729",
"branch_name": "refs/heads/master",
"committer_date": 1459622587000,
"content_id": "8442bb1bf49459cfaf097ad9e0b73bbbecae1d8a",
"detected_licenses": [
"MIT"
],
"directory_id": "6ccc1971c7d4d84a7c78eb941a646ae7513e650f",
"extension": "py",
"fi... | 2.515625 | stackv2 | from django.views.generic import TemplateView
from bs4 import BeautifulSoup
import requests
class Search(TemplateView):
"""Page to display search for guitar tabs"""
template_name = 'main/index.html'
def get_context_data(self, **kwargs):
context = super().get_context_data(**kwargs)
search... | 30 | 34.8 | 101 | 15 | 243 | python | [{"finding_id": "codeql_py/partial-ssrf_0880bb31686a7168_90140380", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
14,
26
] | [
null,
null
] | [
20,
16
] | [
94,
86
] | |
2024-11-19T02:32:50.994625+00:00 | 1,581,387,368,000 | 4c5c00fb65a9463a6e0afddf38dba601ace2dd04 | 3 | {
"blob_id": "4c5c00fb65a9463a6e0afddf38dba601ace2dd04",
"branch_name": "refs/heads/master",
"committer_date": 1581387368000,
"content_id": "4cbd36cc4e60c4c4cee1580fa77cf0b11b55edad",
"detected_licenses": [
"MIT"
],
"directory_id": "e24904b6ea66b0725b9122e05a16b696000e039f",
"extension": "py",
"fi... | 2.6875 | stackv2 | import http.client
import hashlib
import json
import urllib
import random
import time
from tqdm import tqdm
import pandas as pd
def baidu_translate(content, fromLang='en', toLang='zh'):
appid = '' # 需要替换
secretKey = '' # 需要替换
httpClient = None
myurl = '/api/trans/vip/translate'
q = content
#fr... | 70 | 28.59 | 76 | 19 | 586 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d4e6bfa10514c065_e277633d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
20
] | [
null
] | [
24
] | [
37
] | |
2024-11-19T02:32:51.113398+00:00 | 1,482,195,645,000 | 4f27bcd7373fd24fbd689674c7c0f8a0b3597a4e | 2 | {
"blob_id": "4f27bcd7373fd24fbd689674c7c0f8a0b3597a4e",
"branch_name": "refs/heads/master",
"committer_date": 1482195645000,
"content_id": "e754c6c11580b3f747b77be7764504a5a351ffeb",
"detected_licenses": [
"MIT"
],
"directory_id": "15fd913cf6f84205a2233ccea2bc596d8d93f957",
"extension": "py",
"fi... | 2.4375 | stackv2 | # -*- coding: utf-8 -*-
# DISCLAIMER: The regular expressions used here are taken from
# https://github.com/gforcada/haproxy_log_analysis
from datetime import datetime
import re
# Example log line, to understand the regex below (truncated to fit into
# 80 chars):
#
# Dec 9 13:01:26 localhost haproxy[28029]: 127.0.0... | 149 | 32.23 | 76 | 16 | 1,531 | python | [{"finding_id": "codeql_py/redos_db26d7cf428bc14d_71435e8e", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a /' and containing many repetiti... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'a /' and containing many repetitions of '/'."
] | [
64
] | [
null
] | [
18
] | [
66
] | |
2024-11-19T02:59:27.180691+00:00 | 1,632,050,269,000 | a313b5da3430d47a21c5a0a189c810ef4d31fb47 | 3 | {
"blob_id": "a313b5da3430d47a21c5a0a189c810ef4d31fb47",
"branch_name": "refs/heads/main",
"committer_date": 1632050269000,
"content_id": "0e9bd5ad0e4cdd8e64cc2580c999070aefbaf0f7",
"detected_licenses": [
"MIT"
],
"directory_id": "4b807ed174f50be1e7b98f7ac99645ff62874d4f",
"extension": "py",
"file... | 2.578125 | stackv2 | from flask import render_template, url_for, flash, redirect, request
from flaskblog import app, db, bcrypt
from flaskblog.forms import RegistrationForm, LoginForm, HashtagtForm
from flaskblog.models import User
from flask_login import login_user, current_user, logout_user, login_required
from flaskblog.sentiment import... | 105 | 38.2 | 168 | 17 | 914 | python | [{"finding_id": "codeql_py/url-redirection_79b24d79938326d6_21698dae", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
33
] | [
null
] | [
29
] | [
38
] | |
2024-11-19T02:59:58.208698+00:00 | 1,627,915,922,000 | 5f046e2da31993cd523fae11b27b01b5dd2f2518 | 4 | {
"blob_id": "5f046e2da31993cd523fae11b27b01b5dd2f2518",
"branch_name": "refs/heads/master",
"committer_date": 1627915922000,
"content_id": "d82152d289927a473c6b7d11086ff0fcef76cbf9",
"detected_licenses": [
"MIT"
],
"directory_id": "9bc228372e586a1f90bb0685c43e744be9638ecd",
"extension": "py",
"fi... | 4.40625 | stackv2 | # 학생 정보 관리 프로그램
# 학생 정보를 담은 Student 클래스
# 단! 무조건 '입력'을 받아서 정보들을 저장할 수 있는 형태 ( + 나중에... 미리 입력된 정보 바탕으로 정보 저장하기 / 값 수정하기)
# 생성되는 Student 객체들은 StudentList 에 리스트로 나열하여 저장
# Student 클래스의 필드: name, birth, age, gender, grade
# Student 클래스의 메소드: __init__ setInit, getAvg, getName, printStud
class Student:
# ----- 생성자 --... | 76 | 27.68 | 96 | 16 | 683 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_178d1cf8dd6e98c7_306c9fdb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
48
] | [
null
] | [
15
] | [
36
] | |
2024-11-19T03:24:40.637652+00:00 | 1,591,961,580,000 | d692de36b7f52f865992d75bf0c5b401c9b0e909 | 4 | {
"blob_id": "d692de36b7f52f865992d75bf0c5b401c9b0e909",
"branch_name": "refs/heads/master",
"committer_date": 1591961580000,
"content_id": "427ebafba8271d806ddf8d50411c9548e94c0cf9",
"detected_licenses": [
"MIT"
],
"directory_id": "a6fb2c28f2f7aa59616050ab557ea5389eb31f19",
"extension": "py",
"fi... | 4.15625 | stackv2 | """
Реализовать функцию, принимающую несколько параметров, описывающих данные пользователя: имя, фамилия, год рождения,
город проживания, email, телефон. Функция должна принимать параметры как именованные аргументы.
Реализовать вывод данных о пользователе одной строкой.
"""
def get_user_data(msg):
res = input(f"... | 32 | 31.28 | 115 | 10 | 281 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2dfbba69150276fb_39a795dd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
15
] | [
null
] | [
11
] | [
87
] | |
2024-11-19T03:24:56.217984+00:00 | 1,511,397,850,000 | e3e07b2ba29cccc8ee1328d8e60ff9ff280ae54f | 3 | {
"blob_id": "e3e07b2ba29cccc8ee1328d8e60ff9ff280ae54f",
"branch_name": "refs/heads/master",
"committer_date": 1511397850000,
"content_id": "0d381ae35fd12c04ce15db0d49ef5bd00d8afd12",
"detected_licenses": [
"MIT"
],
"directory_id": "815b191808dffa4869cda6d6a667c923e8fee65c",
"extension": "py",
"fi... | 2.546875 | stackv2 | """Set the default for the application."""
import pdb
from pyramid.view import view_config
from learning_journal.data.data_entries import ENTRIES
from datetime import datetime
from pyramid.httpexceptions import HTTPNotFound, HTTPFound, HTTPBadRequest
from learning_journal.models.mymodel import Journal
@view_config(ro... | 74 | 30.45 | 81 | 14 | 506 | python | [{"finding_id": "codeql_py/reflective-xss_27812896d3004ad0_a9b21403", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
38
] | [
null
] | [
12
] | [
16
] | |
2024-11-19T03:35:18.422963+00:00 | 1,593,545,582,000 | 10653ee67ca33f9732003169bc2dac36080275d6 | 3 | {
"blob_id": "10653ee67ca33f9732003169bc2dac36080275d6",
"branch_name": "refs/heads/master",
"committer_date": 1593545582000,
"content_id": "ddf2ab6697183113b483ca491f18827a6e223884",
"detected_licenses": [
"BSD-2-Clause-Views"
],
"directory_id": "8103ac2a9c17773cdf5394479ed3d64a4bd4bb3f",
"extensio... | 2.5625 | stackv2 | import argparse
from contextlib import closing
import mimetypes
import os
import shutil
try:
from http.server import BaseHTTPRequestHandler, HTTPServer
except ImportError:
# Compatible with python 2.7
from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer
import markdown
VERSION = "1.1.0"
DEFAULT_... | 164 | 31.31 | 79 | 18 | 1,094 | python | [{"finding_id": "codeql_py/path-injection_96cbc54e4d2e6234_f37f0f48", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 4 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
55,
58,
60,
96
] | [
null,
null,
null,
null
] | [
31,
26,
37,
19
] | [
40,
35,
46,
23
] | |
2024-11-19T01:37:52.061833+00:00 | 1,564,732,485,000 | 9a0d5c21676908120c1a39c954c126054e0235b0 | 2 | {
"blob_id": "9a0d5c21676908120c1a39c954c126054e0235b0",
"branch_name": "refs/heads/master",
"committer_date": 1564732485000,
"content_id": "0d3e6a6de7d8d4f5118faeda2168f1012a47a74a",
"detected_licenses": [
"MIT"
],
"directory_id": "070c68f582cbcdf3de29871bdcb7f49b7f09c068",
"extension": "py",
"fi... | 2.453125 | stackv2 | """
@file
@brief Documentation helper.
"""
from logging import getLogger
from textwrap import indent, dedent
from jinja2 import Template
from sklearn.linear_model import LinearRegression
from pyquickhelper.loghelper import noLOG
from mlprodict.onnxrt.validate import enumerate_validated_operator_opsets, sklearn_operator... | 102 | 28.58 | 92 | 13 | 707 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f236ec04b3a601b1_d88c791d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
24
] | [
null
] | [
13
] | [
44
] | |
2024-11-19T01:38:03.017486+00:00 | 1,478,541,907,000 | b7d35126da55a283d14762fa691b495ec1f0bce6 | 3 | {
"blob_id": "b7d35126da55a283d14762fa691b495ec1f0bce6",
"branch_name": "refs/heads/master",
"committer_date": 1478541907000,
"content_id": "296f25c3d328377384a62cb7c55a5993c575238c",
"detected_licenses": [
"MIT"
],
"directory_id": "77eb303a337e6bef7ea174ecdc79d722adc3e333",
"extension": "py",
"fi... | 2.859375 | stackv2 | import pandas as pd
import numpy as np
from bs4 import BeautifulSoup
import requests
import re
import os
from time import sleep
artist_dict = {}
url = 'http://www.songlyrics.com/bob-dylan-lyrics/'
response = requests.get(url)
page = response.text
page = BeautifulSoup(page, 'lxml')
for j in page.find_all(href=re.compi... | 34 | 22.91 | 88 | 10 | 234 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_f260682be10d078c_b663eeda", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'songlyrics.com/bob-dylan/', so it m... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'songlyrics.com/bob-dylan/', so it might match more hosts than expected."
] | [
15
] | [
null
] | [
41
] | [
85
] | |
2024-11-19T01:38:09.921621+00:00 | 1,693,468,902,000 | 83f28b841d66e52b0361b5e9cf286affa30d4bea | 3 | {
"blob_id": "83f28b841d66e52b0361b5e9cf286affa30d4bea",
"branch_name": "refs/heads/main",
"committer_date": 1693468902000,
"content_id": "f8f4393499176ee3c007b037de60459d305da4a1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e90bf4b372da78ceec15282d060b48d18ba8d4e9",
"extension": "py",
... | 2.5625 | stackv2 | """Manage SSO for Add-ons with Home Assistant user."""
import asyncio
import hashlib
import logging
from .addons.addon import Addon
from .const import ATTR_ADDON, ATTR_PASSWORD, ATTR_USERNAME, FILE_HASSIO_AUTH
from .coresys import CoreSys, CoreSysAttributes
from .exceptions import AuthError, AuthPasswordResetError, Ho... | 140 | 35.56 | 87 | 19 | 1,092 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_53031262ef630447_8ed64d2f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
139
] | [
null
] | [
36
] | [
67
] | |
2024-11-19T01:38:47.185004+00:00 | 1,628,571,439,000 | 4486aa8ad379a6228a42f4f4a0961c9fa8e25078 | 3 | {
"blob_id": "4486aa8ad379a6228a42f4f4a0961c9fa8e25078",
"branch_name": "refs/heads/master",
"committer_date": 1628571439000,
"content_id": "fd6f8e77e937a3d6b4f7a937d2b40e9e0d41eb2d",
"detected_licenses": [
"MIT"
],
"directory_id": "7ae4e17b0b2bf9de2fd742a5e615ea8f94929b7c",
"extension": "py",
"fi... | 2.640625 | stackv2 | import os
import ast
import pandas as pd
from flask import request,jsonify
from anuvaad_auditor.loghandler import log_info, log_exception
from anuvaad_auditor.errorhandler import post_error
from datetime import datetime
from utilities import singularcleanerfn,parallelcleanerfn,number_sequence_corr,spell_corrector
from ... | 144 | 33.57 | 142 | 24 | 981 | python | [{"finding_id": "codeql_py/path-injection_8581fec5700cda6e_63413822", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
58,
61
] | [
null,
null
] | [
39,
37
] | [
67,
65
] | |
2024-11-19T01:51:57.313054+00:00 | 1,600,184,242,000 | 1a2520c6469318e0d103a7b729cdd67c8073af70 | 3 | {
"blob_id": "1a2520c6469318e0d103a7b729cdd67c8073af70",
"branch_name": "refs/heads/master",
"committer_date": 1600184242000,
"content_id": "7c4435af9717de6f98db15d4727b953d910776a9",
"detected_licenses": [
"MIT"
],
"directory_id": "039e819fbe4eb9237a2b605c2ddb62302e0a0fda",
"extension": "py",
"fi... | 2.65625 | stackv2 | # From: https://www.twilio.com/docs/usage/tutorials/how-to-secure-your-flask-app-by-validating-incoming-twilio-requests
import logging
from functools import wraps
from flask import abort, request
from bling.common.request_url import request_url
from bling.config import config
from twilio.request_validator import Req... | 39 | 32 | 121 | 18 | 286 | python | [{"finding_id": "codeql_py/log-injection_31d02752c4c248ec_e0ae0f43", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
35
] | [
null
] | [
17
] | [
122
] | |
2024-11-19T01:51:59.256475+00:00 | 1,566,994,001,000 | e91f2f1dad38e71a998a4c1fe47bcbfadc129d01 | 3 | {
"blob_id": "e91f2f1dad38e71a998a4c1fe47bcbfadc129d01",
"branch_name": "refs/heads/master",
"committer_date": 1566994001000,
"content_id": "109e7dcff63ef48bee7a488b7485249b796a52d2",
"detected_licenses": [
"MIT"
],
"directory_id": "1ff7a3c01ee3a870529bc228767c0fce7d639ccf",
"extension": "py",
"fi... | 2.984375 | stackv2 | import socket
from threading import Thread, Lock
from typing import Callable, List, Any
import certifi
import ssl
class IrcClient():
"""
Class for connecting to Twitch's IRC chat server. Uses socket with SSL functionality
"""
_instance: Any = None
def __new__(self):
if self._instance == N... | 196 | 32.33 | 97 | 18 | 1,340 | python | [{"finding_id": "codeql_py/insecure-default-protocol_3ac11ec50ac9bcb1_30193e2e", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
49
] | [
51
] | [
36
] | [
39
] | |
2024-11-19T01:52:03.170547+00:00 | 1,601,599,589,000 | 50b793eba666e61ca9bc692089b9a389cc3d09d1 | 3 | {
"blob_id": "50b793eba666e61ca9bc692089b9a389cc3d09d1",
"branch_name": "refs/heads/master",
"committer_date": 1601599589000,
"content_id": "d6a7f686003385935efa82426cd7a0db4bbc26f3",
"detected_licenses": [
"MIT"
],
"directory_id": "5bf40ae34fcdf59073651205d2cbc973ff303d30",
"extension": "py",
"fi... | 2.75 | stackv2 | #!/bin/env python2.7
import os
import sys
import requests
class Main:
def __init__(self,x,y):
self.email = x
self.url = 'https://m.facebook.com/login'
self.ex = open(y, 'r').readlines()
def main(self):
for line in self.ex:
password = line.strip()
http = re... | 41 | 40.32 | 107 | 18 | 505 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a9a30782dccb9ff6_6ade1b02", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
16,
19
] | [
null,
null
] | [
24,
23
] | [
73,
72
] | |
2024-11-19T01:52:19.281244+00:00 | 1,553,415,942,000 | 1862bde1f955cc248aeaf1054586da7e88a62c82 | 2 | {
"blob_id": "1862bde1f955cc248aeaf1054586da7e88a62c82",
"branch_name": "refs/heads/master",
"committer_date": 1553415942000,
"content_id": "015a05ef6167deb2f72180dd0e2ed2bd922a4015",
"detected_licenses": [
"BSD-3-Clause",
"MIT",
"Apache-2.0"
],
"directory_id": "0ef48c14cb35abab3676c9e289b0758... | 2.375 | stackv2 | # coding=utf-8
import hashlib
from json.decoder import JSONDecodeError
import projecta11.db as db
from projecta11.config import conf
from projecta11.session import Session
from tornado.escape import json_decode
def parse_json_body(func):
def wrapper(self, *args, **kwargs):
try:
data = json_de... | 74 | 29.18 | 69 | 18 | 510 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6a7ef7cfd9762e63_54863ce0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
71,
73
] | [
null,
null
] | [
29,
40
] | [
46,
55
] | |
2024-11-19T01:52:25.143626+00:00 | 1,635,161,890,000 | db29928f404ce2b160dc91cd418258d112c640be | 2 | {
"blob_id": "db29928f404ce2b160dc91cd418258d112c640be",
"branch_name": "refs/heads/master",
"committer_date": 1635161890000,
"content_id": "ff0d5f5b7516f420ebb9f3e7eb97d191474feccc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "372f1aa2cf1d7091d3c8116dfeb9284d9630cfa0",
"extension": "py"... | 2.421875 | stackv2 | from __future__ import print_function
import numpy as np
import torch
import torch.utils.data as data
import torchvision
import torchvision.transforms as transforms
from PIL import Image
import os
import os.path
import tarfile
import random
import boto3
import time
from data_loader.cifar10_dataset import CIFAR10_sub... | 107 | 39.45 | 149 | 20 | 1,099 | python | [{"finding_id": "codeql_py/tarslip_5078cb33c287aaff_0fe633af", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
38
] | [
null
] | [
5
] | [
8
] | |
2024-11-19T02:04:47.153177+00:00 | 1,681,516,418,000 | 92609065738e7049c18cbdc88bebcbe647f7049b | 3 | {
"blob_id": "92609065738e7049c18cbdc88bebcbe647f7049b",
"branch_name": "refs/heads/master",
"committer_date": 1681516418000,
"content_id": "1b07642d61aa0dc08344b753ae39342f820bd3ca",
"detected_licenses": [
"MIT"
],
"directory_id": "20e3461cdf20ced844b6d00177c8de4fcefbe7ab",
"extension": "py",
"fi... | 2.75 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""Get user oauth credentials.
Utility to help with getting the access token for a user
"""
from __future__ import (division, absolute_import, print_function,
unicode_literals)
import sys
import logging
import tweepy
from six.moves.configparser i... | 52 | 30.15 | 75 | 11 | 359 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_982d5292dc09d676_d72d3682", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
46
] | [
null
] | [
11
] | [
69
] | |
2024-11-19T02:28:04.757879+00:00 | 1,624,724,787,000 | 1d2703d0301539a928942067eedd6f0da7de7c2d | 3 | {
"blob_id": "1d2703d0301539a928942067eedd6f0da7de7c2d",
"branch_name": "refs/heads/master",
"committer_date": 1624724787000,
"content_id": "4e9ce4c1308a981a0f52a56cae672dcbabffe9d9",
"detected_licenses": [
"MIT"
],
"directory_id": "5e47479f649adb7eaa7103ab17d98e4dc191a783",
"extension": "py",
"fi... | 2.515625 | stackv2 | import functools
import logging
import os
import sys
from modem_logger import CM500Parser
from modem_logger.influx import InfluxClient
from apscheduler.schedulers.blocking import BlockingScheduler
# Configuration
influx_base = os.environ.get('INFLUX_URL', 'http://influxdb:8086')
influx_db = os.environ.get('INFLUX_DB... | 66 | 29.92 | 78 | 13 | 457 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3ffbf49b76c175df_81dd73f2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
52
] | [
57
] | [
17
] | [
59
] | |
2024-11-19T02:28:51.965270+00:00 | 1,639,357,443,000 | 633814128e9ee8d115d33ce31b06404832f1d88f | 2 | {
"blob_id": "633814128e9ee8d115d33ce31b06404832f1d88f",
"branch_name": "refs/heads/master",
"committer_date": 1639357443000,
"content_id": "71f5e1a7c3aac62bb098a18edc75b88e576b7372",
"detected_licenses": [
"MIT"
],
"directory_id": "333024f7050c41475fb8f32e472421d89b0cb677",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/usr/bin/env python
from cryptography import x509
from cryptography.hazmat.backends import default_backend
from datetime import datetime
from pluginbase import PluginBase
from . import utils
import copy
import logging
import os
import socket
import ssl
import sys
import yaml
try:
from yaml import CLoader as Lo... | 150 | 29.49 | 79 | 17 | 1,013 | python | [{"finding_id": "codeql_py/insecure-protocol_586eccb8a4fd932d_6eee4422", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)."
] | [
48
] | [
null
] | [
20
] | [
36
] | |
2024-11-19T02:37:09.104351+00:00 | 1,590,956,832,000 | 9ff0f32090b91974ff72366142ef9b835603f66b | 2 | {
"blob_id": "9ff0f32090b91974ff72366142ef9b835603f66b",
"branch_name": "refs/heads/master",
"committer_date": 1590956832000,
"content_id": "20be3844057d063f1608dbc6a0b0aee6e543bd6e",
"detected_licenses": [
"MIT"
],
"directory_id": "771da90a55c08739f914213869e0feec3084fae4",
"extension": "py",
"fi... | 2.484375 | stackv2 | # app/mongo_queries.py
import pymongo
import os
import pandas as pd
import json
DB_USER = 'joemac'
DB_PASSWORD = 'WnpPTBG3lyhJ2bXT'
CLUSTER_NAME = 'cluster0-udrnh'
connection_uri = f"mongodb+srv://{DB_USER}:{DB_PASSWORD}@{CLUSTER_NAME}.mongodb.net/test?retryWrites=true&w=majority"
print("----------------")
print("UR... | 54 | 25.65 | 117 | 12 | 372 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c2fbc355d99c9934_d4c13c63", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
14
] | [
null
] | [
15
] | [
29
] | |
2024-11-19T02:37:10.862560+00:00 | 1,683,150,429,000 | bd221848c71564c7d8d88518f702d6868d9b47c9 | 2 | {
"blob_id": "bd221848c71564c7d8d88518f702d6868d9b47c9",
"branch_name": "refs/heads/master",
"committer_date": 1683150429000,
"content_id": "cffe8443f8be40aa12abfe24d0084d52e577f6d5",
"detected_licenses": [
"MIT"
],
"directory_id": "8df74364e4b88d232ece3f306707df1f88993e72",
"extension": "py",
"fi... | 2.46875 | stackv2 | from flask import Flask, render_template
import config.config
import csv_processor
import os, sysconfig, logging, time
import Report
import sys
from config import config as global_config
import pandas as pd
app = Flask(__name__)
try:
logger = logging.getLogger('Report Generator')
logger.setLevel(logging.D... | 145 | 41.42 | 158 | 21 | 1,367 | python | [{"finding_id": "codeql_py/reflective-xss_5efaa42b35518e65_6cbce1c7", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-117"
] | [
"py/reflective-xss",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
133,
68
] | [
null,
null
] | [
12,
17
] | [
100,
73
] | |
2024-11-19T02:37:14.502788+00:00 | 1,692,976,388,000 | ecf71ae8348ab1f5ac00bf1371b1342d350212ed | 2 | {
"blob_id": "ecf71ae8348ab1f5ac00bf1371b1342d350212ed",
"branch_name": "refs/heads/master",
"committer_date": 1692976388000,
"content_id": "168303fb966b3158978db6330d5d543d7511eefc",
"detected_licenses": [
"MIT"
],
"directory_id": "7f0acb6ce41afb89ae526d3a699ad9570438215b",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python3
import urllib3
from xml.dom import minidom
import requests
import dateutil.parser
# configure package (disable warning for self-signed certificate)
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
# some consts
WEBDAV_URL_HOST = 'http://localhost:8080'
WEBDAV_URL_PATH = '/re... | 52 | 34.88 | 100 | 18 | 493 | python | [{"finding_id": "codeql_py/request-without-cert-validation_4ef36b39d315215c_ce9f3be6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
28
] | [
29
] | [
5
] | [
75
] | |
2024-11-19T02:37:27.486911+00:00 | 1,552,597,759,000 | 3edfbe105adf4a8e822cb0296e3146aaf51414a7 | 3 | {
"blob_id": "3edfbe105adf4a8e822cb0296e3146aaf51414a7",
"branch_name": "refs/heads/master",
"committer_date": 1552597759000,
"content_id": "8451e309e14ee5152ae111b18d67055a0b6fdf4d",
"detected_licenses": [
"MIT"
],
"directory_id": "724a54f533d9d5af9b76066902f09676306dee28",
"extension": "py",
"fi... | 2.5625 | stackv2 | # The MIT License (MIT)
# Copyright (c) 2017 Mike Teachman
# https://opensource.org/licenses/MIT
#
# Publish data to a Thingspeak channel using the MQTT protocol
#
# Micropython implementation using the ESP8266 platform
# Tested using Micropython v1.9.3 (Nov 1, 2017)
#
# prerequisites:
# - Thingspeak account
# - Think... | 85 | 28.87 | 118 | 12 | 702 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_221b83286eb20fb3_997cadc7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
70
] | [
null
] | [
7
] | [
18
] | |
2024-11-19T02:37:43.725415+00:00 | 1,379,719,010,000 | 99c3030c54c876af043c990de90f7eef6a716f6c | 3 | {
"blob_id": "99c3030c54c876af043c990de90f7eef6a716f6c",
"branch_name": "refs/heads/master",
"committer_date": 1379719010000,
"content_id": "067ffe46b426116dfce974343ba624c381580516",
"detected_licenses": [
"MIT"
],
"directory_id": "1b74912c47160e865d9d8f96bdbc10a769505b2e",
"extension": "py",
"fi... | 2.890625 | stackv2 | import jinja2
import os
class Config(dict):
"""Dictionary like helper class for maintaining test data configurations per environment.
:class:`holmium.core.TestCase` and :class:`holmium.core.HolmiumNose` both
look for either a config.json or config.py file in the same directory as the
test file, and will make a ``... | 96 | 37.45 | 127 | 16 | 810 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_186bf4604926c4ab_ba6c69b2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
75
] | [
null
] | [
28
] | [
49
] | |
2024-11-19T02:37:44.255490+00:00 | 1,497,374,122,000 | 6aca261f6b91ca2ec4657e3f4bfef16658ac7aa4 | 2 | {
"blob_id": "6aca261f6b91ca2ec4657e3f4bfef16658ac7aa4",
"branch_name": "refs/heads/master",
"committer_date": 1497374122000,
"content_id": "145d846ce7966b163e2943d2762b1170010ff941",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a2479dd613543c9201310168e47a73ddb95b9745",
"extension": "py"... | 2.375 | stackv2 | #!/usr/bin/python
import BaseHTTPServer
import urllib
import os.path
SERVER_FILES = "serverFiles"
def parsePath(pathArgs):
pathArgs = pathArgs.split("?")
path = pathArgs[0][1:].split("/")
args = pathArgs[1] if len(pathArgs) > 1 else ""
path = [p for p in path if len(p) > 0]
nArgs = {}
for a in args.split("&... | 113 | 19.29 | 101 | 15 | 646 | python | [{"finding_id": "codeql_py/path-injection_16e4a68bb6a6c81d_b1bc0b62", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
40,
45
] | [
null,
null
] | [
24,
12
] | [
32,
20
] | |
2024-11-19T02:37:46.423719+00:00 | 1,541,448,388,000 | fac19d0c2265343f31a0f621de0e687de49a9349 | 3 | {
"blob_id": "fac19d0c2265343f31a0f621de0e687de49a9349",
"branch_name": "refs/heads/master",
"committer_date": 1541448388000,
"content_id": "7ac056eb89c2bce69d52efb0415d93fd3fc997a6",
"detected_licenses": [
"MIT"
],
"directory_id": "484083cb99846d134543b578bc003262925e72d6",
"extension": "py",
"fi... | 3.359375 | stackv2 | import string
import random
import argparse
def password_generator(size=6,
chars=string.ascii_letters + string.digits):
return ''.join(random.SystemRandom().choice(chars) for _ in range(size))
if __name__ == "__main__":
size = 14
parser = argparse.ArgumentParser()
parser.add_a... | 20 | 23.9 | 76 | 11 | 109 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_323757ee0e544b05_37702135", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
20
] | [
null
] | [
11
] | [
40
] | |
2024-11-19T02:37:48.102869+00:00 | 1,480,247,867,000 | a8346e310a4cf1b0d58b3005edc8c3d319a79686 | 2 | {
"blob_id": "a8346e310a4cf1b0d58b3005edc8c3d319a79686",
"branch_name": "refs/heads/master",
"committer_date": 1480247867000,
"content_id": "339d035568be37965593c3355059b33d5f1aa89c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ca7b514b9946be11edb7a17b4ee5c82db7b2eead",
"extension": "py"... | 2.359375 | stackv2 | import os
from flask import Flask, redirect, send_file, request, jsonify, abort
from models import Patient
from database import db
from models import DBSession
from sqlalchemy.orm.exc import NoResultFound
app = Flask(__name__)
app.config.from_pyfile('config.py')
db.init_app(app)
class InvalidUsage(Exception):
st... | 120 | 28.73 | 87 | 14 | 826 | python | [{"finding_id": "codeql_py/path-injection_567cc5df3d87b4b9_bb31c46c", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
32,
34
] | [
null,
null
] | [
27,
22
] | [
31,
26
] | |
2024-11-19T02:37:49.238610+00:00 | 1,605,214,240,000 | 02879c710ea530fab45f279c09784b38bb8d7895 | 3 | {
"blob_id": "02879c710ea530fab45f279c09784b38bb8d7895",
"branch_name": "refs/heads/main",
"committer_date": 1605214240000,
"content_id": "d52c438fba544ff501d7bc16f5c3240126cd4983",
"detected_licenses": [
"MIT"
],
"directory_id": "f6f91e340e5f822429317ea1882022bc56a56347",
"extension": "py",
"file... | 3.1875 | stackv2 | import secrets
import string
import random
from tkinter import *
from tkinter import ttk
root = Tk()
class Application():
def __init__(self):
self.root = root
self.labels()
self.root.mainloop()
def labels(self):
self.password_entry = Entry(self.root, width=30)
self.pas... | 35 | 31.66 | 111 | 18 | 255 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eabb542a42dc8c08_854101fc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
32
] | [
null
] | [
15
] | [
28
] | |
2024-11-19T02:49:15.990575+00:00 | 1,535,635,933,000 | 643da73658b7955acc1842fd9fd1556f89f4ac74 | 3 | {
"blob_id": "643da73658b7955acc1842fd9fd1556f89f4ac74",
"branch_name": "refs/heads/master",
"committer_date": 1535635933000,
"content_id": "df5cf85c311bcede6db5f775808fc48a57d2383f",
"detected_licenses": [
"MIT"
],
"directory_id": "7dd4a626a8382916f94a0718a7ca8043435b3424",
"extension": "py",
"fi... | 2.515625 | stackv2 | import csv
import hunterio_api
from urllib.parse import urlparse
import os
from settings import LIMIT
out_path = "emails_searched_by_domain.csv"
def inject_contacts(companies, api_key):
exists = False
if os.path.isfile(out_path):
exists = True
with open(out_path, 'a+') as f:
fieldnames... | 124 | 34.06 | 151 | 21 | 930 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_efe39e4b5e27aa10_21cc069c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive d... | [
120,
112
] | [
null,
null
] | [
28,
27
] | [
151,
53
] | |
2024-11-19T02:49:41.403746+00:00 | 1,585,068,851,000 | ecbbfbcaaca5d276d493cb80adf27f53eedb185a | 3 | {
"blob_id": "ecbbfbcaaca5d276d493cb80adf27f53eedb185a",
"branch_name": "refs/heads/master",
"committer_date": 1585068851000,
"content_id": "073a7fdc448c045c98bd47db5e6f65f3c590d5cb",
"detected_licenses": [
"MIT"
],
"directory_id": "0f40e70549c19c9255eecb345c8ef9f373961e75",
"extension": "py",
"fi... | 2.828125 | stackv2 | # import packages
import sys
import pandas as pd
from sqlalchemy import create_engine
import numpy as np
import re
from nltk.tokenize import word_tokenize
from nltk.stem import WordNetLemmatizer
from nltk.corpus import stopwords
from sklearn.pipeline import Pipeline
from sklearn.metrics import classification_report
fro... | 156 | 36.03 | 119 | 18 | 1,330 | python | [{"finding_id": "codeql_py/overly-large-range_404fad5820581654_b394ff60", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
90
] | [
null
] | [
48
] | [
51
] | |
2024-11-19T03:00:15.942309+00:00 | 1,585,899,244,000 | 052da5a8e8429c4584fea5544fa0d17f6da13899 | 3 | {
"blob_id": "052da5a8e8429c4584fea5544fa0d17f6da13899",
"branch_name": "refs/heads/master",
"committer_date": 1585899244000,
"content_id": "fc2c6de3294a6ca3d8ef8e87f32ef950753f5884",
"detected_licenses": [
"MIT"
],
"directory_id": "f748e550cd3b57ca61d19e665e789742a88c7abe",
"extension": "py",
"fi... | 2.515625 | stackv2 | '''
docomo API
- Powered by アドバンスト・メディア
- Powered by NTTテクノクロス
- Powered by goo
- Powered by Jetrun
'''
import requests
import json
import datetime
try:
APIKEY = open('config/docomo-token').read().split('\n')
if '' in APIKEY: APIKEY.remove('')
except:
print('Configuration file does not exist')
exi... | 84 | 24.69 | 88 | 13 | 611 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2853c16c91c5a49d_a7e76388", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
84
] | [
null
] | [
11
] | [
40
] | |
2024-11-19T03:11:22.112457+00:00 | 1,619,907,316,000 | 301acf37ac47f05a0d06be4e68f3458702655ad2 | 3 | {
"blob_id": "301acf37ac47f05a0d06be4e68f3458702655ad2",
"branch_name": "refs/heads/master",
"committer_date": 1619907316000,
"content_id": "2265aad9b40a4ad6b4500e2576a6b24517b1b92b",
"detected_licenses": [
"MIT"
],
"directory_id": "00c0c9b80442af8bb26f0d278b4dc9b628d27eba",
"extension": "py",
"fi... | 3.140625 | stackv2 | import re
import csv
pattern = r"(?P<component>^[A-Z-\s]+)+(?P<Value>[0-9.]+)+\s*(?P<StandardRange>[0-9-.\s]+)+(?P<Unit>[A-Z%\/]+)"
fields=["Component" ,"Your Value", "Standard Range" ,"Units"]
file=open('CBC.txt','r')
matchesRow = []
lines=file.readlines()
for line in lines:
match=re.match(pattern,line)
... | 25 | 22.08 | 110 | 11 | 160 | python | [{"finding_id": "codeql_py/redos_6bdd6194e8d78590_d8b5c9c0", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\\t' and containing many repetiti... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '\\t' and containing many repetitions of '.'.",
"This part of the regular expression may cause exponential backtracking on strings starting with '\\t.' and containing many repetitions of '\\t'."
] | [
4,
4
] | [
null,
null
] | [
49,
79
] | [
56,
89
] | |
2024-11-19T03:12:07.203233+00:00 | 1,481,030,359,000 | a057dc2508d8ddbd00723fe196e176e7d37b06b8 | 3 | {
"blob_id": "a057dc2508d8ddbd00723fe196e176e7d37b06b8",
"branch_name": "refs/heads/master",
"committer_date": 1481030359000,
"content_id": "83f8a7d32637c5fa5e18bece2407fd57bf82bebb",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c3a6e38d2ba4f09985bd938b43e16ac43b400986",
"extension": "py"... | 2.921875 | stackv2 | #!/usr/bin/env python
#coding:utf-8
"""
Author: --<VillanCH>
Purpose: check proxy available
Created: 2016/10/31
"""
import unittest
import requests
from pprint import pprint
from base import PluginBaseClass
########################################################################
class CheckProxyPlugin(Plugi... | 206 | 29.95 | 143 | 15 | 1,347 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e8ffcc6e205ff6a9_c4224b1e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
131
] | [
133
] | [
25
] | [
54
] | |
2024-11-19T03:12:30.763036+00:00 | 1,479,216,186,000 | 18ecf3b210530c8d1bf8f5d1f35038c3f17c4ae3 | 3 | {
"blob_id": "18ecf3b210530c8d1bf8f5d1f35038c3f17c4ae3",
"branch_name": "refs/heads/master",
"committer_date": 1479216186000,
"content_id": "7a25eac592a8e5dc2105fc1498a14ecfe178293e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1913284f786f3242b64b624a9e5aa9a00e1061de",
"extension": "py"... | 2.703125 | stackv2 | import requests
from Parser import Parser
from Helpers import eprint
import requests
from furl import furl
import sqlite3
# Should be bound to POFSession class
class UserHistory():
def __init__(self, username):
self.conn = sqlite3.connect("%s.db" % (username))
if self.conn is not None:
... | 337 | 32.47 | 135 | 20 | 2,440 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_38fe101cd2bf07b3_91e4728d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
205
] | [
null
] | [
19
] | [
81
] | |
2024-11-19T03:12:32.076827+00:00 | 1,489,120,380,000 | dae89fbefa236f687ecad90d753dd2ed7139960a | 3 | {
"blob_id": "dae89fbefa236f687ecad90d753dd2ed7139960a",
"branch_name": "refs/heads/master",
"committer_date": 1489120380000,
"content_id": "c6353f998b2aee9d4d313956ce3a1acee65c5f07",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "331475fe157aa85895ecdfd740e41ffece927e04",
"extension": "py"... | 2.546875 | stackv2 | # Ansible module that manages Outlyer plugins via the api
try:
import requests
HAS_REQUESTS = True
except ImportError:
HAS_REQUESTS = False
import json
import base64
import hashlib
def get_api_url(module, restype):
''' Takes ansible module object, and api resource type (agents, plugins, etc.) returns... | 194 | 27.37 | 116 | 17 | 1,171 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_aba7a84a6ce1bbac_14b6e2b6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
122
] | [
null
] | [
20
] | [
42
] | |
2024-11-19T03:12:32.714132+00:00 | 1,466,657,600,000 | fbc74a6d275e9b8f14eb7b2b2b6ef1df144dfbe4 | 3 | {
"blob_id": "fbc74a6d275e9b8f14eb7b2b2b6ef1df144dfbe4",
"branch_name": "refs/heads/master",
"committer_date": 1466657600000,
"content_id": "64aca864f1b30979a2fda1b3183e696e11997ee1",
"detected_licenses": [
"MIT"
],
"directory_id": "c063dfddd87cb750101216fb20d53913c819ea66",
"extension": "py",
"fi... | 2.953125 | stackv2 | from flask import Flask
from flask import abort
from flask import redirect
app = Flask(__name__)
@app.route('/')
def index():
return '<h1>Hello World!</h1>'
#使用app.route修饰器,把修饰的函数注册为路由
#修饰器可以使用不同的方式修改函数的行为,惯常用法是使用修饰器把函数注册为事件的处理程序
@app.route('/user/<name>')
def sayHello(name):
if name == 'baidu':
return redirect(... | 22 | 20.18 | 44 | 11 | 150 | python | [{"finding_id": "codeql_py/flask-debug_4051ddc71034e769_54f25bde", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
22,
19
] | [
null,
null
] | [
2,
9
] | [
21,
33
] | |
2024-11-19T03:12:42.634834+00:00 | 1,428,836,017,000 | 8bf7bf947c1675f27085c5d51758c1b1bac7d76b | 3 | {
"blob_id": "8bf7bf947c1675f27085c5d51758c1b1bac7d76b",
"branch_name": "refs/heads/master",
"committer_date": 1428836017000,
"content_id": "6fb5fb2ede23aa52094d07a67a8ba7e5bb1dcd84",
"detected_licenses": [
"MIT"
],
"directory_id": "6a0e282ade623bae2d793b1a99928356a56e67e4",
"extension": "py",
"fi... | 2.9375 | stackv2 | import re
import hashlib
import hmac
import random
from string import letters
#
# Cookies hashing
#
SECRET = 'fart'
def make_cookie_hash(val):
return '%s|%s' % (val, hmac.new(SECRET, val).hexdigest())
def check_cookie_hash(secure_val):
val = secure_val.split('|')[0]
if secure_val == make_cookie_hash(... | 63 | 17.17 | 66 | 12 | 304 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_952b00764bfcd436_8d35f84c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
36
] | [
null
] | [
24
] | [
40
] | |
2024-11-19T03:12:51.756939+00:00 | 1,595,969,780,000 | b3896d3a740c0454d2ded689057fa5d7d4914cea | 4 | {
"blob_id": "b3896d3a740c0454d2ded689057fa5d7d4914cea",
"branch_name": "refs/heads/master",
"committer_date": 1595969780000,
"content_id": "c7d58c3a526d9b0610f2637ca81ee90b8e38be19",
"detected_licenses": [
"MIT"
],
"directory_id": "d7bf2d5fe88643b4c30c7e38d8f041b6cbcd00ae",
"extension": "py",
"fi... | 3.53125 | stackv2 | n = int(input().strip())
phone_book = {}
for i in range(n):
name = input().strip()
phone_number = input().strip()
phone_book[name] = phone_number
queried_name = input().strip()
while queried_name != '':
found_phone_number = phone_book.get(queried_name)
if found_phone_number is None:
print(... | 16 | 26.06 | 54 | 13 | 105 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_901fae685caac7f1_d824e190", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
15
] | [
null
] | [
15
] | [
54
] | |
2024-11-19T03:25:19.791468+00:00 | 1,446,675,874,000 | c8e6bbb3de18fb06e0a8fc682692b85422ea0da2 | 3 | {
"blob_id": "c8e6bbb3de18fb06e0a8fc682692b85422ea0da2",
"branch_name": "refs/heads/master",
"committer_date": 1446675874000,
"content_id": "7b2d83dead9b1351e953ec8e6f2f9352c783fa24",
"detected_licenses": [
"MIT"
],
"directory_id": "e3c85acda8a143b9194539e754a1f71d4029b135",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/env python3
import hashlib
import getpass
import os
import base64
home = os.getenv('HOME')
seed_path = home + '/.passthe.py.seed'
site = input('Site: ').encode('utf-8')
password = getpass.getpass().encode('utf-8')
with open(seed_path, 'r') as file:
seed = file.read().encode('utf-8')
new_password = h... | 20 | 21.8 | 75 | 10 | 146 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eba61c2630633dcb_f689cad8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
20
] | [
null
] | [
7
] | [
13
] | |
2024-11-19T03:25:24.063858+00:00 | 1,614,396,966,000 | 1711895f4a54c4be21627f0c925d99fa78d92f88 | 3 | {
"blob_id": "1711895f4a54c4be21627f0c925d99fa78d92f88",
"branch_name": "refs/heads/master",
"committer_date": 1614396966000,
"content_id": "2410229cc4cc4816398cd7ec84fa077cb3bbec33",
"detected_licenses": [
"MIT"
],
"directory_id": "22eaeeb39e48a23ddc55af1418c80b47536f2a7b",
"extension": "py",
"fi... | 2.5625 | stackv2 | import os
import requests
from dotenv import load_dotenv
from urllib.parse import urlencode, quote_plus
load_dotenv()
username = os.getenv('GOSMS_USER', 'username')
password = os.getenv('GOSMS_PASS', 'password')
base_url = 'http://gosms.xyz/api/v1/sendSms?'
with open('file.txt', mode='r') as file:
for line in fi... | 33 | 27.79 | 61 | 15 | 230 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_2f85517c59a2b63f_295b2b1b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
30,
27,
32
] | [
null,
null,
null
] | [
25,
15,
15
] | [
54,
26,
21
] | |
2024-11-19T03:35:43.324837+00:00 | 1,603,984,549,000 | c90d44b553fd7c830ea543154fa6f08f742eb557 | 2 | {
"blob_id": "c90d44b553fd7c830ea543154fa6f08f742eb557",
"branch_name": "refs/heads/master",
"committer_date": 1603984549000,
"content_id": "f5d16587a0871b6dd8383ec144c16d690ccbb257",
"detected_licenses": [
"MIT"
],
"directory_id": "1bdc76b33f2905eb5a4fde5c1db644a8f50a2ea8",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import argparse
import importlib_resources as _resources
import pangu
from jinja2 import FileSystemLoader, Environment
def to_html(data, template_filename, fp):
# Template with Jinja2
with _resources.path("crawler_book_info", "templates") as _path:
templat... | 34 | 29.18 | 68 | 11 | 221 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5ddd41b63e2d2252_091071df", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
14
] | [
null
] | [
15
] | [
41
] | |
2024-11-19T03:35:54.387026+00:00 | 1,597,682,743,000 | fc184c3f92c71af9dd0a64f272145b934cbbcc5b | 3 | {
"blob_id": "fc184c3f92c71af9dd0a64f272145b934cbbcc5b",
"branch_name": "refs/heads/master",
"committer_date": 1597682743000,
"content_id": "ff731101d5eef4a5e496df605b1704d00d974fde",
"detected_licenses": [
"MIT"
],
"directory_id": "e6cb448a520d17a7c4c5a43f5df0885e4c2aae7e",
"extension": "py",
"fi... | 2.734375 | stackv2 | #!/usr/bin/env python
# -*- coding:utf-8 -*-
"""
@author: muketong
@file: __init__.py
@time: 2020-08-15
"""
import sys
import re
import gettext
import click
import logging
import prettytable as pt
from . import config
from .utils import colorize
from .source import MangaSource
gettext.install("manga-dl", "locale")
... | 147 | 25.22 | 84 | 17 | 1,086 | python | [{"finding_id": "codeql_py/redos_d250a81a6a51ec0a_6f7b23c3", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '9-' and containing many repetitio... | 3 | true | [
"CWE-1333",
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '9-' and containing many repetitions of '999-'.",
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '9'.",
"This part of the regular expression may cau... | [
48,
48,
48
] | [
null,
null,
null
] | [
34,
40,
45
] | [
37,
43,
48
] | |
2024-11-19T01:28:50.325198+00:00 | 1,632,086,099,000 | bee82ffa36c2dcb545055e4edf240429f87d11a8 | 2 | {
"blob_id": "bee82ffa36c2dcb545055e4edf240429f87d11a8",
"branch_name": "refs/heads/master",
"committer_date": 1632086099000,
"content_id": "050d04ad2dbdf3f36cfb58e4ac59aeee6e1e6890",
"detected_licenses": [
"MIT"
],
"directory_id": "b8969a77fee4807e4ae54e5233c25c4dfd43b260",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/env python
from __future__ import print_function
import os
import sys
import subprocess
import argparse
from settings import PORT, HOST
try:
from SocketServer import ThreadingMixIn
from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler
except ImportError:
from socketserver import Thread... | 71 | 34.68 | 103 | 18 | 509 | python | [{"finding_id": "codeql_py/command-line-injection_e92602fd4ef08569_9893e2b5", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 2 | true | [
"CWE-078",
"CWE-022"
] | [
"py/command-line-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
36,
49
] | [
null,
null
] | [
21,
26
] | [
28,
61
] | |
2024-11-19T01:28:53.796053+00:00 | 1,528,467,142,000 | 8ff3be0e99c05489491c9026413bb93db5428a09 | 3 | {
"blob_id": "8ff3be0e99c05489491c9026413bb93db5428a09",
"branch_name": "refs/heads/master",
"committer_date": 1528467142000,
"content_id": "13c0bb24aab0dc7cb25f0be41565abc52c44ae37",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "37bdf24b81f11b5e8269bb045f34db9d70f6de21",
"extension": "p... | 2.703125 | stackv2 | from flask import Flask, request
from flask_sqlalchemy import SQLAlchemy
from raven.contrib.flask import Sentry
import os
import requests
from datetime import datetime
from pytz import timezone
from urllib import parse
db_url = os.environ['DB_URL']
bot_token = os.environ['BOT_TOKEN']
date_key = 'date'
meal_key = 'typ... | 95 | 32.03 | 150 | 20 | 791 | python | [{"finding_id": "codeql_py/partial-ssrf_e1f63cdb49eea1b7_fad57a11", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
76
] | [
null
] | [
5
] | [
115
] | |
2024-11-19T01:29:03.149188+00:00 | 1,678,956,400,000 | 9321fbebf0283f6025867bf30dda7708b9560fa5 | 2 | {
"blob_id": "9321fbebf0283f6025867bf30dda7708b9560fa5",
"branch_name": "refs/heads/master",
"committer_date": 1678956400000,
"content_id": "37934db268bf0333caf748b98aed506404cbc3a9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9eac9f8e7495d916f7596c4444461521b1a39086",
"extension": "py"... | 2.453125 | stackv2 | #!/bin/env/user python
import jinja2
import yaml
import os, sys
def extractFormat(infile):
format = str.upper(str.rsplit(os.path.basename(infile),".")[1])
return format
def createCSVfile(input_files_list):
o = open('csvfile', 'w')
o.write('filepath\tformat\n')
for f in input_files_list:
... | 75 | 23.88 | 112 | 14 | 465 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_bc8f64a6c7047af5_450ea471", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
56
] | [
null
] | [
16
] | [
113
] | |
2024-11-19T01:29:06.709584+00:00 | 1,592,154,233,000 | 14ed0eda1074034e5c57e401501e0e3a06d4cfa3 | 3 | {
"blob_id": "14ed0eda1074034e5c57e401501e0e3a06d4cfa3",
"branch_name": "refs/heads/master",
"committer_date": 1592154233000,
"content_id": "71b5670cf3ced817f935a65b71eec9b05a8a3199",
"detected_licenses": [
"MIT"
],
"directory_id": "353f30d5043aa4bf6744ab58447192eeaf0af4b0",
"extension": "py",
"fi... | 2.515625 | stackv2 | import re
import numpy as np
#import pgnEval
import settings
import os
import sys
def output(moveEval, username, fileName, path):
# Create arrays and counters
names = []
values = []
PGN = []
count = 0
PGNCount = 0
i = 0
dateInsert = 0
dateNumber = 0
evalCount = 0
nameCounter... | 163 | 31.8 | 125 | 18 | 1,394 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_d618e7c2bf9dada2_498eda13", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://lichess.org/](1) may be at an arbitrary positi... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [https://lichess.org/](1) may be at an arbitrary position in the sanitized URL."
] | [
67
] | [
null
] | [
12
] | [
39
] | |
2024-11-19T01:29:07.310716+00:00 | 1,587,645,358,000 | ab9c69353dc72e1d03de8ffa67f874636b7bc77e | 3 | {
"blob_id": "ab9c69353dc72e1d03de8ffa67f874636b7bc77e",
"branch_name": "refs/heads/master",
"committer_date": 1587645358000,
"content_id": "b612b376c9341dfe18571c00dc3c6db3a9a23773",
"detected_licenses": [
"MIT"
],
"directory_id": "cb795495d7cb7e053c51236279bdfedf3e4b7a37",
"extension": "py",
"fi... | 3.390625 | stackv2 | # Importing required Libraries
import requests
from bs4 import BeautifulSoup
import pandas as pd
import string
# Url of the website
base_url = 'https://babynames.extraprepare.com/'
for gender in ['boy','girl']:
print(f"Scrapping Indian {gender}s Names")
for initial in string.ascii_lowercase:
# To mak... | 47 | 37.6 | 99 | 26 | 337 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f0188fd96be72bb0_a2c81257", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
11
] | [
null
] | [
11
] | [
46
] | |
2024-11-19T01:29:11.871903+00:00 | 1,623,888,169,000 | d5aa356cdb61e0681cf1b11e72aa516db3bbb519 | 2 | {
"blob_id": "d5aa356cdb61e0681cf1b11e72aa516db3bbb519",
"branch_name": "refs/heads/master",
"committer_date": 1623888169000,
"content_id": "e4a1d65ca8a6778e7c1e51757dbbcde12e38ef10",
"detected_licenses": [
"MIT"
],
"directory_id": "598cf86dbda2f36e3d5aea9990f0f161b5af7301",
"extension": "py",
"fi... | 2.40625 | stackv2 | from flask import Flask, jsonify
from flask_restful import Api
from ast import literal_eval
from common_functions import common
from modify_db import New_Entry
import os
app = Flask(__name__)
api = Api(app)
class DELETE():
# USED TO DELETE PERSONAL TEXT NOTE FOR A USER.
@app.route("/note/<UserID>/<topic>", m... | 60 | 41.08 | 101 | 19 | 627 | python | [{"finding_id": "codeql_py/flask-debug_b9ea9796a72fe7db_28cde915", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided va... | [
60,
30,
53
] | [
null,
null,
null
] | [
5,
24,
24
] | [
40,
83,
100
] | |
2024-11-19T01:29:30.319722+00:00 | 1,412,614,664,000 | 2c8c179b247ad18a451c2a0b8edf1ad63f44dee9 | 2 | {
"blob_id": "2c8c179b247ad18a451c2a0b8edf1ad63f44dee9",
"branch_name": "refs/heads/master",
"committer_date": 1412614664000,
"content_id": "8ae20a30ff606ca1f3db263ee58fdce6135c0e8d",
"detected_licenses": [
"MIT"
],
"directory_id": "f7624618f1aa47735d87bbe4e20bb4c7646060a2",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/env python
# -*- vim set ft=python
#
# @author kchr
from PIL import Image as pil, ImageOps as pilops
import jinja2
import argparse
import os
import glob
import shutil
import time
import sys
parser = argparse.ArgumentParser()
parser.add_argument('-f', '--force', action="store_true",
... | 184 | 27.79 | 79 | 15 | 1,353 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_6a02576cdc34b6fe_e3b12c81", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
35
] | [
null
] | [
7
] | [
72
] | |
2024-11-19T01:29:34.671030+00:00 | 1,498,729,776,000 | 0af3bd1a83b5f8f1d21356d15841a73d976dbc84 | 3 | {
"blob_id": "0af3bd1a83b5f8f1d21356d15841a73d976dbc84",
"branch_name": "refs/heads/master",
"committer_date": 1498729776000,
"content_id": "de96a225620ea959d77e62362b48df5847282db6",
"detected_licenses": [
"MIT"
],
"directory_id": "fcde00de3e324925f275eea24248e4e468494454",
"extension": "py",
"fi... | 2.734375 | stackv2 | """
스크립트 구동 방법
$ export FLASK_APP=urban_sound_classifier.py
$ flask run
... Running on http://127.0.0.1:5000
"""
import numpy as np
import tensorflow as tf
import librosa
from flask import Flask, request
import os
def extract_feature(file_name):
X, sample_rate = librosa.load(file_name)
stft = np.abs(libr... | 88 | 31.19 | 102 | 15 | 929 | python | [{"finding_id": "codeql_py/path-injection_2d0d1b54675f2875_4cb50ff2", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
80
] | [
null
] | [
15
] | [
25
] | |
2024-11-19T01:29:48.563581+00:00 | 1,557,234,373,000 | f2054636c48c082ea2a075ca37fcc65c04e08103 | 2 | {
"blob_id": "f2054636c48c082ea2a075ca37fcc65c04e08103",
"branch_name": "refs/heads/master",
"committer_date": 1557234373000,
"content_id": "be8a81c6f663c790b461c4ee537bd6aae5d44580",
"detected_licenses": [
"MIT"
],
"directory_id": "262cf46504a60bacbeee23d3e4d433f2984b82d3",
"extension": "py",
"fi... | 2.375 | stackv2 | import os
import sys
import uuid
from flask import render_template, redirect, url_for, flash, \
request, jsonify, send_from_directory
from werkzeug.utils import secure_filename
from app import app
from app.forms import UploadPhotoForm
from app.utils.ocr import extract_text
@app.route('/', methods=['GET', 'POST']... | 63 | 27.95 | 75 | 18 | 410 | python | [{"finding_id": "codeql_py/path-injection_e905e146652e28b1_52f4cf04", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
38,
39
] | [
null,
null
] | [
23,
19
] | [
31,
27
] | |
2024-11-19T01:29:58.184460+00:00 | 1,570,946,802,000 | 9e72115b683566c1c4e2cb63c38d84a59bc23d6b | 2 | {
"blob_id": "9e72115b683566c1c4e2cb63c38d84a59bc23d6b",
"branch_name": "refs/heads/master",
"committer_date": 1570946802000,
"content_id": "0120043339fc529ec7fbd68697437e6064cc51b4",
"detected_licenses": [
"MIT"
],
"directory_id": "c3fef4cac557d2f0977b4c481b0475036c7a3d09",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
MIT License
Copyright (c) 2017 Maxim Krivich
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation t... | 278 | 30.88 | 82 | 24 | 2,050 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_47895d832c53d5f9_525763a3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA3256) that is i... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA3256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
265
] | [
null
] | [
22
] | [
28
] | |
2024-11-19T01:30:07.031801+00:00 | 1,493,219,542,000 | bb3365f5f4977b71f97729a3b31766947a2e250d | 2 | {
"blob_id": "bb3365f5f4977b71f97729a3b31766947a2e250d",
"branch_name": "refs/heads/master",
"committer_date": 1493219542000,
"content_id": "a87dbb21c9b817b463537ebbcf73cd6eebd6cfb6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a3c9d55ec9a513352e6b71e01af33305b0e33bc1",
"extension": "py"... | 2.359375 | stackv2 | import http.client
import json
import http.server
import socketserver
# Copyright [2017] [Jorge Arroyo Blanco]
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/license... | 430 | 22.53 | 100 | 16 | 3,049 | python | [{"finding_id": "codeql_py/partial-ssrf_7bcc6e9e406f10c3_65d7e38a", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen... | 3 | true | [
"CWE-918",
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).",
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).",
"Part of the URL of ... | [
30,
39,
48
] | [
null,
null,
null
] | [
3,
3,
3
] | [
65,
68,
69
] | |
2024-11-19T01:30:28.188099+00:00 | 1,593,190,089,000 | 77d065466347718ca83cb05211fde20f59b319dd | 3 | {
"blob_id": "77d065466347718ca83cb05211fde20f59b319dd",
"branch_name": "refs/heads/master",
"committer_date": 1593190089000,
"content_id": "66bed673804a669e3d3edada0eae3e6b5972ec2f",
"detected_licenses": [
"MIT"
],
"directory_id": "b33db98ca608a4a72a0ec1f435eb75817c36a204",
"extension": "py",
"fi... | 2.734375 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Fri Jun 26 10:55:19 2020
@author: Soumitra
"""
from bson import json_util
import json
import pprint
from pymongo import MongoClient #python module MongoDb
url = 'mongodb://localhost:27017/' #url for connecting to mongo server
client = MongoClient(url)
db ... | 90 | 28.41 | 116 | 16 | 687 | python | [{"finding_id": "codeql_py/flask-debug_5d67ed501c88aa1e_71122662", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 5 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a ... | [
89,
57,
69,
76,
84
] | [
null,
null,
null,
null,
null
] | [
5,
16,
11,
16,
16
] | [
26,
63,
73,
76,
76
] | |
2024-11-19T01:30:38.502554+00:00 | 1,582,231,414,000 | c8cfa2ea223b015227c05ed3285717c02c527acf | 2 | {
"blob_id": "c8cfa2ea223b015227c05ed3285717c02c527acf",
"branch_name": "refs/heads/master",
"committer_date": 1582231414000,
"content_id": "443c60765cf85c2802cd9e2fd5a85953216df923",
"detected_licenses": [
"MIT"
],
"directory_id": "0353024b9682164dba10ee49495b6a9a97312555",
"extension": "py",
"fi... | 2.4375 | stackv2 | import os
from jinja2 import Template
from session import existRecord, path
from db import getUser
def checkLogin(u, p):
res = getUser(u, p)
print (res)
return res
# def check(rec):
# r = rec.split(',')
# return (r[0].strip() == u) and (p == r[1].strip())
# res, rec = existRecord(os... | 22 | 30.91 | 73 | 12 | 193 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_14e9198f83fcbb85_1659fb90", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
21
] | [
null
] | [
20
] | [
34
] | |
2024-11-19T01:43:03.152397+00:00 | 1,604,066,694,000 | 05baac5e1eb803ee98621e2122f69b009bd431fa | 3 | {
"blob_id": "05baac5e1eb803ee98621e2122f69b009bd431fa",
"branch_name": "refs/heads/main",
"committer_date": 1604066694000,
"content_id": "1b90caf360416eab53dd7b5a62a9b041e59887c9",
"detected_licenses": [
"MIT"
],
"directory_id": "a3a0dcc9c9627f37b8dd7219a055a5d8a76b0d83",
"extension": "py",
"file... | 2.625 | stackv2 | import aiohttp
import asyncio
import argparse
async def get(url):
try:
async with aiohttp.ClientSession() as session:
async with session.get(url=url) as response:
resp = await response.read()
except Exception as e:
raise e
async def post(url, user_input):
data... | 55 | 36.09 | 108 | 16 | 502 | python | [{"finding_id": "codeql_py/request-without-cert-validation_63bacd39287e8c3a_5649810c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
19
] | [
null
] | [
24
] | [
67
] | |
2024-11-19T01:54:47.221809+00:00 | 1,470,262,592,000 | f9756624e5a9bd3ad547d688a63cadc06efc66c6 | 2 | {
"blob_id": "f9756624e5a9bd3ad547d688a63cadc06efc66c6",
"branch_name": "refs/heads/master",
"committer_date": 1470262592000,
"content_id": "b831ba804110a318102d4c09c05c568c40a4caf8",
"detected_licenses": [
"MIT"
],
"directory_id": "1f6453533176993eb0061dcc1b35c993dce6c10c",
"extension": "py",
"fi... | 2.328125 | stackv2 | """
pgoapi - Pokemon Go API
Copyright (c) 2016 tjado <https://github.com/tejado>
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use... | 93 | 33.89 | 132 | 15 | 875 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_903267add84b2af9_3cbb7feb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
64,
64
] | [
null,
null
] | [
67,
81
] | [
79,
94
] | |
2024-11-19T01:55:00.695344+00:00 | 1,675,672,889,000 | 0e95ce8915124af73f9247af780c2fa386550d83 | 2 | {
"blob_id": "0e95ce8915124af73f9247af780c2fa386550d83",
"branch_name": "refs/heads/main",
"committer_date": 1675672889000,
"content_id": "edc4d5c8506f9f6bd4d676a23beb36f8327bcaba",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7e10785944ddad6aabe6f36a9a72ddfed578542e",
"extension": "py",
... | 2.375 | stackv2 | import os
import click
from bioblend import galaxy
from parsec.cli import pass_context
from parsec import config
from parsec.io import warn, info
CONFIG_TEMPLATE = """## Parsec Global Configuration File.
# Each stanza should contian a single galaxy server to control.
#
# You can set the key __default to the name of ... | 97 | 34.7 | 117 | 17 | 794 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1a8b3cb5ece859cb_eee7eea1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
93
] | [
96
] | [
13
] | [
14
] | |
2024-11-19T01:55:09.628132+00:00 | 1,574,185,549,000 | 02f183642f7f4d43174f3187400b62d3f620ec7a | 2 | {
"blob_id": "02f183642f7f4d43174f3187400b62d3f620ec7a",
"branch_name": "refs/heads/master",
"committer_date": 1574185549000,
"content_id": "61548d2496a49460fc1f47369b9adc4b9481988d",
"detected_licenses": [
"MIT"
],
"directory_id": "46edad33f48b5c3fe445e06be298eed098afa0d8",
"extension": "py",
"fi... | 2.484375 | stackv2 | # -*- coding: utf-8 -*-
import os
import shutil
import re
import subprocess
import tempfile
from git import Repo
import requests
# disable ssl warnings. BAD PRACTICE.
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
"""Main module."""
def migrate_repo(url, target_base_url, targe... | 154 | 34.83 | 120 | 16 | 1,399 | python | [{"finding_id": "codeql_py/request-without-cert-validation_bac7f8c5826e5740_1d73cd6d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 6 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
75,
91,
98,
108,
142,
149
] | [
null,
null,
null,
null,
null,
null
] | [
16,
22,
12,
16,
12,
12
] | [
119,
112,
118,
121,
92,
102
] | |
2024-11-19T01:55:10.040503+00:00 | 1,455,748,221,000 | 6185f2f52f66ff219b21f110adeab6a0c336d290 | 3 | {
"blob_id": "6185f2f52f66ff219b21f110adeab6a0c336d290",
"branch_name": "refs/heads/master",
"committer_date": 1455748221000,
"content_id": "606d2658788a4daf3cdb56fe48c18042a313ff04",
"detected_licenses": [
"MIT"
],
"directory_id": "112e9d2fb78af3f84d98e81c1cb17771c8fc0a1c",
"extension": "py",
"fi... | 2.953125 | stackv2 | """HTTP Server for rjpres
This module builds on SimpleHTTPServer by adding extra functionality
to deal with serving files from two directory trees (the user's dir
and a static data dir), dynamically providing wrapper pages, and
processing Markdown files that perhaps weren't orginally designed
for presentation with R... | 302 | 36.92 | 100 | 18 | 2,493 | python | [{"finding_id": "codeql_py/http-response-splitting_2f872cc178891712_fcec9fe5", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is con... | 1 | true | [
"CWE-113"
] | [
"py/http-response-splitting"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is constructed from a [user-provided value](2).\nThis HTTP header is constructed from a [user-provided value](3)."
] | [
133
] | [
null
] | [
46
] | [
61
] | |
2024-11-19T01:55:21.672082+00:00 | 1,596,598,787,000 | f3e884fda105407f7fe4713b5f555ecbcfbaeead | 4 | {
"blob_id": "f3e884fda105407f7fe4713b5f555ecbcfbaeead",
"branch_name": "refs/heads/master",
"committer_date": 1596598787000,
"content_id": "c48e5baf79f9a8d961fb735ebb922146a709f709",
"detected_licenses": [
"MIT"
],
"directory_id": "c3706bcb3c8392b3cdead2303af9b8c1fb3fb7e5",
"extension": "py",
"fi... | 3.6875 | stackv2 | import requests, sys, string
from string import ascii_lowercase, digits
# Pseudo-code:
# 1) Loop through the list of ascii_lowercase and digits,
# 2) For each character, send a request and get the elapsed time for the response
# 3) Take the character that has that highest elapsed time and double check by going through... | 140 | 34.93 | 117 | 16 | 1,184 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_16363e55b38386bc_63d9089d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p... | [
67,
131,
134,
136
] | [
null,
null,
null,
null
] | [
19,
37,
37,
30
] | [
72,
45,
45,
38
] | |
2024-11-19T02:06:55.026881+00:00 | 1,560,905,968,000 | 84441ebfc9b18978a7955d86b3691375f2cd1989 | 2 | {
"blob_id": "84441ebfc9b18978a7955d86b3691375f2cd1989",
"branch_name": "refs/heads/master",
"committer_date": 1560905968000,
"content_id": "1899fcef172d0ac7d50a02841205a1ff0c5c618a",
"detected_licenses": [
"MIT"
],
"directory_id": "1f55e68c97dd69369273ba5117b10bea059cd008",
"extension": "py",
"fi... | 2.453125 | stackv2 | from flask import Flask,render_template,request
import mysql.connector
import time
import redis
import hashlib
import pickle
import random
app = Flask(__name__)
config = {
'host':'demoquakes.mysql.database.azure.com',
'user':'quakes@demoquakes',
'password':'Earth_quake',
'database':'equakes'
}
@app.route(... | 127 | 29.44 | 140 | 19 | 916 | python | [{"finding_id": "codeql_py/sql-injection_23759708a50f8e45_4a4edc78", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
118
] | [
null
] | [
24
] | [
29
] | |
2024-11-19T02:06:59.160534+00:00 | 1,625,657,027,000 | f03458e85f7c0b4ad9105423a606a4e08725995d | 3 | {
"blob_id": "f03458e85f7c0b4ad9105423a606a4e08725995d",
"branch_name": "refs/heads/main",
"committer_date": 1625657027000,
"content_id": "c3bfedc0479b8a9e0ca97f10a4c7aa545ee83df6",
"detected_licenses": [
"MIT"
],
"directory_id": "a33b146e03776c041ff89c24e231650fa0a88e52",
"extension": "py",
"file... | 2.71875 | stackv2 | #!/usr/bin/env python
# -*- coding: UTF-8 -*-
# File: slack.py
"""Slack module file."""
import requests
from jinja2 import Environment
from notifierlib.notifierlib import Channel
__author__ = '''Oriol Fabregas <fabregas.oriol@gmail.com>'''
__docformat__ = 'plaintext'
__date__ = '''20-09-2017'''
class Authenticatio... | 86 | 36.52 | 80 | 18 | 650 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_cd70d52d70deae85_b28e8fad", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
64
] | [
null
] | [
24
] | [
37
] | |
2024-11-19T02:07:02.837320+00:00 | 1,537,977,803,000 | 1e33a611cfcf048759277f2e3b0b748df9fff143 | 3 | {
"blob_id": "1e33a611cfcf048759277f2e3b0b748df9fff143",
"branch_name": "refs/heads/master",
"committer_date": 1537977803000,
"content_id": "135c8516ddc750dc03060a245c74b508397e42ac",
"detected_licenses": [
"MIT"
],
"directory_id": "03c54b2554cb76ea63770b3d208c4102b65d02d6",
"extension": "py",
"fi... | 2.59375 | stackv2 | #!/usr/bin/env python
"""
US-Analytics
RPD Merge Script
This script allows merges RPD files automatically. The variables at the top of this script must be updated.
The Git repository must include the .gitattributes file with the below body:
*.rpd merge=usa-obiee
Add the below content to the .gitconfig file (use '... | 120 | 29.44 | 166 | 17 | 954 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e212d07e4043d3a3_080839be", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
39
] | [
null
] | [
11
] | [
19
] | |
2024-11-19T02:07:11.893592+00:00 | 1,598,662,845,000 | 789cdf3dec54bdfbe64407f608e14b9d4f6e26f7 | 3 | {
"blob_id": "789cdf3dec54bdfbe64407f608e14b9d4f6e26f7",
"branch_name": "refs/heads/master",
"committer_date": 1598662845000,
"content_id": "674f72fef28113139a4263d167965bb500591c5e",
"detected_licenses": [
"MIT"
],
"directory_id": "6212f46db6202e20fb499e19816d0c9d97ed1383",
"extension": "py",
"fi... | 3.40625 | stackv2 | import re
import pandas as pd
def find_url(text):
'''Finds URLS embedded in a text and extracts them as a list
Parameters
----------
str:
text
Returns
-------
urls: list
Returns a list of all URLS embedded in a text
'''
urls = []
... | 79 | 18.51 | 111 | 11 | 373 | python | [{"finding_id": "codeql_py/overly-large-range_d37ed01a38f400ee_4e420dc0", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
22
] | [
null
] | [
55
] | [
58
] | |
2024-11-19T02:07:16.575542+00:00 | 1,678,744,463,000 | 4e1d0ef28a26b480ac1cbd01379d3825f09c77af | 3 | {
"blob_id": "4e1d0ef28a26b480ac1cbd01379d3825f09c77af",
"branch_name": "refs/heads/master",
"committer_date": 1678744463000,
"content_id": "52e37dc2b1145cb8599a3b876079a11d50e88b57",
"detected_licenses": [
"MIT"
],
"directory_id": "7dfc28944db71d80bd04c6597363591aa08c6687",
"extension": "py",
"fi... | 3.21875 | stackv2 | import os
import sys
import math
import tarfile
class DataManager:
def __init__(self, dataset_path):
self.dataset_path = dataset_path
def extract_dataset(self, compressed_dataset_file_name, dataset_directory):
try:
# extract files to dataset folder
tar = tarfile.open(c... | 91 | 36.51 | 109 | 16 | 806 | python | [{"finding_id": "codeql_py/tarslip_b917852a9daaded9_4ac68417", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
15
] | [
null
] | [
13
] | [
16
] | |
2024-11-19T02:07:17.450830+00:00 | 1,562,356,942,000 | aafdae7e28b9c45b9698d60c02fd23e7e6305a84 | 3 | {
"blob_id": "aafdae7e28b9c45b9698d60c02fd23e7e6305a84",
"branch_name": "refs/heads/master",
"committer_date": 1562356942000,
"content_id": "c98e1ff44b2cc283828675b4f7496d3f648bc17c",
"detected_licenses": [
"MIT"
],
"directory_id": "0a9cf96fda202102bc009593d8dd4153e8fb8190",
"extension": "py",
"fi... | 2.65625 | stackv2 | """###
Creado por William Rodriguez
Ingeniero Electronico
WISROVI
###"""
import os
os.system("git clone https://github.com/DTIC2019/HorariosEjecucionNurcallApp")
from HorariosEjecucionNurcallApp.HorariosProcesos import *
import requests
import json
import os.path as path
import pandas as pd
import sched, time
im... | 384 | 32.97 | 143 | 19 | 3,548 | python | [{"finding_id": "codeql_py/request-without-cert-validation_4e78ba64148dc5fb_860d34d4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
84,
100
] | [
87,
103
] | [
15,
15
] | [
23,
23
] | |
2024-11-19T02:07:20.326176+00:00 | 1,488,315,450,000 | aa0ca6fda85932a28cf3c33d626bc7effcc21f5b | 2 | {
"blob_id": "aa0ca6fda85932a28cf3c33d626bc7effcc21f5b",
"branch_name": "refs/heads/master",
"committer_date": 1488358428000,
"content_id": "340ba06bba3ed9fd01e6bc71922be12e4a917c44",
"detected_licenses": [
"MIT"
],
"directory_id": "113cb2b0cc09f88d6397ebb4121cfb2aceb05912",
"extension": "py",
"fi... | 2.4375 | stackv2 | import json
import twitter
from django.conf import settings
from django.shortcuts import render
from django.http import HttpResponse
from .models import Tweet
from .lib import process_tweet
# VIEW: /
# Main tweeting app entry point
def index(response):
"""
Simple renders the index.html, we get tweet informat... | 90 | 31.79 | 80 | 15 | 635 | python | [{"finding_id": "codeql_py/stack-trace-exposure_847134da97a84753_0b1ba19e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
88
] | [
null
] | [
13
] | [
29
] | |
2024-11-19T02:07:24.970776+00:00 | 1,603,796,734,000 | eb96907b89ffcc0fceed9e05b041158aed848f28 | 2 | {
"blob_id": "eb96907b89ffcc0fceed9e05b041158aed848f28",
"branch_name": "refs/heads/master",
"committer_date": 1603796734000,
"content_id": "35453712a6d391fe2a66fca189864106ca23d64b",
"detected_licenses": [
"MIT"
],
"directory_id": "332a0289a572c2d68f145d867a28013f02a0c4e1",
"extension": "py",
"fi... | 2.34375 | stackv2 | import os
from dotenv import load_dotenv
from flask import Flask, request
import requests
import db_aps
import fb_cache
import fb_templates
import moltin_aps
app = Flask(__name__)
load_dotenv()
FACEBOOK_TOKEN = os.environ['PAGE_ACCESS_TOKEN']
DB = db_aps.get_database_connection()
@app.route('/', methods=['GET'])... | 153 | 31.61 | 109 | 16 | 1,192 | python | [{"finding_id": "codeql_py/reflective-xss_d295e5799b27a371_7e47e43a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
28
] | [
null
] | [
16
] | [
50
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.