added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T21:23:11.984249+00:00 | 1,624,548,033,000 | b1d3f145909bb435a7d11b1a074a3567126410a1 | 3 | {
"blob_id": "b1d3f145909bb435a7d11b1a074a3567126410a1",
"branch_name": "refs/heads/master",
"committer_date": 1624548033000,
"content_id": "812336b01138646beff091248eb331771ef4b898",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7d868cff4d733fd5160d1505febb912b0c559628",
"extension": "py"... | 3.109375 | stackv2 | import sys, getopt
import os
import random
keys = dict()
KEYS_FILE_NAME = "keys.txt"
seed = "1234567890abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ"
def load_keys():
"""
加载KEY列表
@return:
"""
if not os.path.exists(KEYS_FILE_NAME):
return False
with open(KEYS_FILE_NAME) as f:
... | 108 | 19.17 | 79 | 13 | 615 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_597eed4b521626d4_14c846c8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text."
] | [
48
] | [
null
] | [
22
] | [
26
] | |
2024-11-18T21:51:15.651273+00:00 | 1,610,729,791,000 | 4711fda446b004b3fccf80a8d562aa8ef34f3078 | 3 | {
"blob_id": "4711fda446b004b3fccf80a8d562aa8ef34f3078",
"branch_name": "refs/heads/main",
"committer_date": 1610729791000,
"content_id": "06ac0788cc6b56593d7a71d6a6b63f267b63b0de",
"detected_licenses": [
"MIT"
],
"directory_id": "e322e1fa9ad1ebd9bf97b3064c3b3126fddc0cad",
"extension": "py",
"file... | 3.203125 | stackv2 | #!/usr/bin/env python3
from flask import *
import math
app = Flask(__name__)
@app.route('/')
def homepage():
s = 'power x y\nsqrt x'
return s, 200
@app.route('/power')
def power():
if request.method == 'POST':
return 'Not supported', 401
x = request.args.get('x')
y = request.args.get('... | 45 | 19.76 | 54 | 15 | 269 | python | [{"finding_id": "codeql_py/stack-trace-exposure_d6c33fd81ed251af_ede40727", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
28,
41,
45
] | [
null,
null,
null
] | [
16,
16,
5
] | [
46,
45,
24
] | |
2024-11-18T21:51:21.588912+00:00 | 1,626,033,839,000 | 96e7471697b983f9b1d7f4b533db18e702b51f33 | 3 | {
"blob_id": "96e7471697b983f9b1d7f4b533db18e702b51f33",
"branch_name": "refs/heads/main",
"committer_date": 1626033839000,
"content_id": "92e74334d69e54ab39d502a98e9f25ee7a0111f9",
"detected_licenses": [
"MIT"
],
"directory_id": "7c8f62edc91547750bc1911b209e28f66383fa96",
"extension": "py",
"file... | 3.078125 | stackv2 | from flask import Flask, flash, request, render_template, redirect, url_for
import pandas as pd
import os
import json
UPLOAD_FOLDER = os.sep + "static" + os.sep # Estamos apuntando a la carpeta static
# Flask es una clase
app = Flask(__name__) # Para decirle que estamos haciendo un archivo Flask
# Aquí __name__ es s... | 54 | 46.19 | 172 | 13 | 647 | python | [{"finding_id": "codeql_py/flask-debug_8c386d7621ee94f3_137a14e0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
50,
39
] | [
null,
42
] | [
5,
16
] | [
69,
59
] | |
2024-11-18T21:51:34.960123+00:00 | 1,574,617,900,000 | 1cebcbc7af64a141ea143e4509b6898792af2ec0 | 3 | {
"blob_id": "1cebcbc7af64a141ea143e4509b6898792af2ec0",
"branch_name": "refs/heads/master",
"committer_date": 1574617900000,
"content_id": "f08aa3f2cf4ac8e79eba0e7e4f66150d605902d3",
"detected_licenses": [
"MIT"
],
"directory_id": "2ffdb3cad1c58f44f2590c2446a833331c344867",
"extension": "py",
"fi... | 2.640625 | stackv2 | import game
import qrcode
import socket
import uuid
import hashlib
import pygame
from pygame.locals import *
import urllib.request
import json
import ssl
import time
import threading
WINDOW_WIDTH = 400
WINDOW_HEIGHT = 600
WHITE = (255, 255, 255)
BLACK = (0, 0, 0)
FONT_SIZE = 30
startGame = game.main
clientId = None
c... | 108 | 26.73 | 100 | 17 | 748 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_2514e7a312a90006_9909bdcc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (private)](1) is used in a hashing algorithm (MD5) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (private)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
36
] | [
null
] | [
16
] | [
38
] | |
2024-11-18T21:51:44.924193+00:00 | 1,633,529,889,000 | 509cb726cc322a43f05815c353593a800ce2aa22 | 4 | {
"blob_id": "509cb726cc322a43f05815c353593a800ce2aa22",
"branch_name": "refs/heads/master",
"committer_date": 1633529889000,
"content_id": "1eb432485140913b8a2da0103aa71d4c864bbb6c",
"detected_licenses": [
"MIT"
],
"directory_id": "f8343a8525aae60cc4e470920d6fcad78440b4ee",
"extension": "py",
"fi... | 3.90625 | stackv2 | import string
import random
if __name__ == "__main__":
Password_Length = int(input("Enter password length"))
'''
random.choices(sequence, weights=None, cum_weights=None, k=1)
sequence : Required. A sequence like a list, a tuple, a range of numbers etc.
weights : Optional. A list were you can w... | 22 | 35.05 | 116 | 13 | 179 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d4ceff32c2245bea_f6a82ea2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
22
] | [
null
] | [
11
] | [
19
] | |
2024-11-18T21:51:59.748806+00:00 | 1,469,961,307,000 | 46e281a8b2b27fad15c6fdedd5381fe130523812 | 3 | {
"blob_id": "46e281a8b2b27fad15c6fdedd5381fe130523812",
"branch_name": "refs/heads/master",
"committer_date": 1469961307000,
"content_id": "fc82fac72e9fa9b62b6dfab1e2b803797e4fad84",
"detected_licenses": [
"MIT"
],
"directory_id": "1f63dcb28ed505552c7cbfa25b031a4502b212aa",
"extension": "py",
"fi... | 2.546875 | stackv2 | #!/usr/bin/env python
# - coding: utf-8 -
# Copyright (C) 2014 Toms Bauģis <toms.baugis at gmail.com>
import datetime as dt
import logging
import sqlite3 as sqlite
import os
from shutil import copy as copyfile
class Storage(object):
def __init__(self):
self._con = None
self.db_path = self.__init_... | 121 | 31.71 | 104 | 18 | 855 | python | [{"finding_id": "codeql_py/overly-permissive-file_a7c3d0ba1d33f30b_098f26de", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
48
] | [
null
] | [
13
] | [
37
] | |
2024-11-18T22:02:50.580168+00:00 | 1,591,796,810,000 | 81a4c79a600f3d4242d3c86838b716694b1ff828 | 3 | {
"blob_id": "81a4c79a600f3d4242d3c86838b716694b1ff828",
"branch_name": "refs/heads/master",
"committer_date": 1591796810000,
"content_id": "ad1a747a2505b12c94db05df1bdf524d96502c32",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "89c878102fa84dfb9d02ed6b7f79199b97035257",
"extension": "py"... | 2.90625 | stackv2 | # -*- coding:utf-8 -*-
"""
author chenrg
flask 示例
"""
from flask import Flask
from flask import request, g, Response, make_response, render_template
# 创建一个应用
app = Flask(__name__)
# 定义接口路由
@app.route('/')
def index():
return '<h1>Hello World!</h1>'
# 动态路由
@app.route('/sayhello/<name>', methods=['GET'])
def ... | 58 | 19.16 | 71 | 12 | 349 | python | [{"finding_id": "codeql_py/flask-debug_a50acd60a43a4465_2462d304", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
58,
25
] | [
null,
null
] | [
5,
12
] | [
24,
38
] | |
2024-11-18T22:16:44.175930+00:00 | 1,632,141,254,000 | 879e7e0c303ac96b7eadbcdb7546746113eeddef | 2 | {
"blob_id": "879e7e0c303ac96b7eadbcdb7546746113eeddef",
"branch_name": "refs/heads/main",
"committer_date": 1632141254000,
"content_id": "15e009eab0d9f8ac06584fcdd616175115457c5b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "39fbd5614434f331c9bf03401be7637e7eadafbe",
"extension": "py",
... | 2.5 | stackv2 | #!/usr/bin/python3
# Modules' importing
import apt
import subprocess
import mysql.connector
import wget
import tarfile
import shutil
import os
import yaml
import sys
#Conf file loading and reading function
def read_conf(file):
with open(file) as f:
return yaml.load(f)
# Cache updating function
def update(cache)... | 169 | 26.34 | 108 | 19 | 1,108 | python | [{"finding_id": "codeql_py/tarslip_7b9c76e9e32edc9e_7dd0d59a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
91
] | [
null
] | [
5
] | [
8
] | |
2024-11-18T22:27:50.673692+00:00 | 1,436,076,934,000 | bc35598c1345fdd8e4df34fccfbdd36e2d45ab67 | 3 | {
"blob_id": "bc35598c1345fdd8e4df34fccfbdd36e2d45ab67",
"branch_name": "refs/heads/master",
"committer_date": 1436076954000,
"content_id": "2238a5a878e19efef577020c496c20d3a8007fdf",
"detected_licenses": [
"MIT"
],
"directory_id": "f6faecd12fe267b41a611389ad295af67605b3e6",
"extension": "py",
"fi... | 2.578125 | stackv2 | import asyncio
import logging
from stores import network_store, auth_store
from network import Network
from connection import Connection
logger = logging.getLogger('bouncer')
class BouncerServerClientProtocol(Connection):
def __init__(self, get_network_handle):
self.network = None
self.username ... | 149 | 36.08 | 78 | 18 | 1,082 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_64fef4a062c9b309_7a81979e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
44
] | [
null
] | [
25
] | [
38
] | |
2024-11-18T22:27:51.446767+00:00 | 1,692,275,085,000 | e9f6adb05b07380f51589db00fd862867e751a7d | 3 | {
"blob_id": "e9f6adb05b07380f51589db00fd862867e751a7d",
"branch_name": "refs/heads/master",
"committer_date": 1692275085000,
"content_id": "e824f6aa8761d26f47beafda75856fbe40494557",
"detected_licenses": [
"MIT"
],
"directory_id": "f504253210cec1c4ec6c3ea50a45564db7d6cd7f",
"extension": "py",
"fi... | 2.671875 | stackv2 | from __future__ import annotations
import datetime
import itertools
import logging
import re
import typing
logger = logging.getLogger(__name__)
TIME_REGEX = re.compile(
r"((?P<hours>\d+?)h)?((?P<minutes>\d+?)m)?"
r"((?P<seconds>\d+?)s)?((?P<milliseconds>\d+?)ms)?"
)
CASE_PATTERN = re.compile(r"(?<!^)(?=[A... | 284 | 28.73 | 89 | 18 | 2,183 | python | [{"finding_id": "codeql_py/overly-large-range_23d85e9cb8f1538f_6cd1ed54", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
238
] | [
null
] | [
47
] | [
50
] | |
2024-11-18T22:27:52.952190+00:00 | 1,597,006,371,000 | 54bc351c3351645e0362f97f4f5c354f2a295eb2 | 3 | {
"blob_id": "54bc351c3351645e0362f97f4f5c354f2a295eb2",
"branch_name": "refs/heads/master",
"committer_date": 1597006371000,
"content_id": "c87563bb1349477c8eb4490d67b418ad314333d6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c9bc5d6f8dfdca5638cfaafc7cc645920f6ae06e",
"extension": "py"... | 2.640625 | stackv2 | import os
import firebase as fb
from flask import Flask, request, jsonify
from flask_cors import CORS
from model import Model
from data import Data
app = Flask(__name__)
app.config["DEBUG"] = True
CORS(app, resources={r"/*": {"origins": "*"}})
@app.route('/', methods=['GET'])
def home():
return """
<!DOC... | 106 | 34.25 | 100 | 16 | 921 | python | [{"finding_id": "codeql_py/stack-trace-exposure_bf075502a0b6df18_db0816c9", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
80
] | [
null
] | [
24
] | [
95
] | |
2024-11-18T22:27:55.820721+00:00 | 1,693,952,634,000 | bd2d6becaa3e31d533f5f1da233ac5e785ea20bc | 3 | {
"blob_id": "bd2d6becaa3e31d533f5f1da233ac5e785ea20bc",
"branch_name": "refs/heads/main",
"committer_date": 1693952634000,
"content_id": "1a299d1da6fcfdff2a038ae6bfc1b91b113ed935",
"detected_licenses": [
"MIT"
],
"directory_id": "25315b066fd9742d9c8c8be1d0dc70c2dc39a71a",
"extension": "py",
"file... | 2.625 | stackv2 | import urllib
import dateparser
import requests
from bs4 import BeautifulSoup
from .amuselabsdownloader import AmuseLabsDownloader
from ..util import XWordDLException
class CrosswordClubDownloader(AmuseLabsDownloader):
command = 'club'
outlet = 'Crossword Club'
outlet_prefix = 'Crossword Club'
def ... | 72 | 31.75 | 129 | 15 | 552 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_bf58b096a8d429a3_a4da9b3c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [crosswordclub.com](1) may be at an arbitrary position ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [crosswordclub.com](1) may be at an arbitrary position in the sanitized URL."
] | [
23
] | [
null
] | [
17
] | [
61
] | |
2024-11-18T22:43:55.305096+00:00 | 1,459,794,438,000 | bbd884e40b2d5c4587b4a127c5c392038b05e008 | 3 | {
"blob_id": "bbd884e40b2d5c4587b4a127c5c392038b05e008",
"branch_name": "refs/heads/master",
"committer_date": 1459794438000,
"content_id": "20dcfc4c83972034128f174ea41ee7cf87392fdf",
"detected_licenses": [
"MIT"
],
"directory_id": "9e45b75d611847fb18a34fc9193e9164375cf307",
"extension": "py",
"fi... | 2.8125 | stackv2 | #BugMartiniAPI
#Adam Knuckey October 2015
import urllib,urllib2
import re
# Downloads a comic from the given link to a given destination
# Destination must be a name ending in .png
def download(link,destination):
urllib.urlretrieve(link,destination)
# Returns a permalink to today's comic
def getTodays():
html = ur... | 54 | 34.89 | 106 | 17 | 545 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_9ca5c7e8fb28c950_f668c93f", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'bugmartini.com/comic/', so it might... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'bugmartini.com/comic/', so it might match more hosts than expected."
] | [
29
] | [
null
] | [
22
] | [
66
] | |
2024-11-18T22:44:21.117777+00:00 | 1,550,153,196,000 | 6425521c675d62d7e7c85cbd58ee0c94dda787df | 3 | {
"blob_id": "6425521c675d62d7e7c85cbd58ee0c94dda787df",
"branch_name": "refs/heads/master",
"committer_date": 1550153196000,
"content_id": "f6dfd40ae264c6459588f2c48c360d7fce368286",
"detected_licenses": [
"Apache-2.0",
"MIT"
],
"directory_id": "ede3ecc0f427fb63c3baf66aef86c9566392fafe",
"exten... | 3.34375 | stackv2 | import os
class LockFile(object):
"""Provides methods to obtain, check for, and release a file based lock which
should be used to handle concurrent access to the same file.
As we are a utility class to be derived from, we only use protected methods.
Locks will automatically be released on destructio... | 72 | 32.81 | 133 | 15 | 552 | python | [{"finding_id": "codeql_py/overly-permissive-file_84273d131d8ef3f1_7949d503", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
67
] | [
null
] | [
17
] | [
36
] | |
2024-11-18T22:44:22.540321+00:00 | 1,692,832,783,000 | 2db54c293728d4da063e7312206438631fd22c49 | 2 | {
"blob_id": "2db54c293728d4da063e7312206438631fd22c49",
"branch_name": "refs/heads/master",
"committer_date": 1692832783000,
"content_id": "fc2c4b3c2ea9f1cd2704c816dd07fa1394084fdd",
"detected_licenses": [
"MIT"
],
"directory_id": "6d2f83e7dade76eeb4f7abdd7286ba7a518a8bbc",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/env python
import time, requests, json, argparse
from raspyrfm import *
import sensors
from sensors import rawsensor
URL = 'https://emoncms.org/input/post.json'
APIKEY = '123456789123456789'
sensors = [
{
"sensorId": '68', #ID of the sensor
"minInterval": 30, #if new value received before <minInterva... | 93 | 23.87 | 102 | 16 | 779 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_06887a81ad9a3eb9_4f72ed62", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
83
] | [
null
] | [
39
] | [
46
] | |
2024-11-18T22:44:42.158542+00:00 | 1,487,000,102,000 | 844bf812fbfd318beae00abd4ff0b07fa224604b | 3 | {
"blob_id": "844bf812fbfd318beae00abd4ff0b07fa224604b",
"branch_name": "refs/heads/master",
"committer_date": 1487000102000,
"content_id": "95138c89914017ba3049220226c14fe0ddd3196f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "69f91a91f6be1558cb27fdb557005253841e1115",
"extension": "py"... | 2.515625 | stackv2 | ###############################################################################
##
## Senze Crypto Library for My Senosr Server/Client v0.01
## @Copyright 2014 MySensors Research Project
## SCoRe Lab (www.scorelab.org)
## University of Colombo School of Computing
##
## Licensed under the Apache License, Version 2.... | 268 | 29.12 | 101 | 17 | 2,077 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_00dad0136bd07386_ad613d17", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
70,
78
] | [
null,
null
] | [
26,
31
] | [
45,
50
] | |
2024-11-18T20:24:20.218399+00:00 | 1,612,180,128,000 | bcfd6ff3ae16c0891aaba90122ec8f0317ca3853 | 3 | {
"blob_id": "bcfd6ff3ae16c0891aaba90122ec8f0317ca3853",
"branch_name": "refs/heads/main",
"committer_date": 1612180128000,
"content_id": "70e85a279c9bdf83df4484bb01ebf17c560d771d",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "f994a45b0eae03c2b877dbbbef11dbfd20db7875",
"extension": "py"... | 3.0625 | stackv2 | #!/usr/bin/python3
import json, requests, datetime
try:
from configparser import ConfigParser
except ImportError:
from ConfigParser import ConfigParser
class giantbomb_cli:
def __init__(self):
#initialises the cli class
self.headers = {'User-Agent': 'giantbomb-test-cli 0.1', 'From': 'joe.po... | 112 | 37.21 | 131 | 22 | 959 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8476c258d131e076_0982d23f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive dat... | [
84,
86,
87,
89
] | [
null,
null,
null,
null
] | [
27,
31,
27,
31
] | [
53,
64,
69,
69
] | |
2024-11-18T20:59:40.216185+00:00 | 1,635,716,147,000 | 04d83e0ae5bfbe5a23b219423f658c4855b9d404 | 4 | {
"blob_id": "04d83e0ae5bfbe5a23b219423f658c4855b9d404",
"branch_name": "refs/heads/main",
"committer_date": 1635716147000,
"content_id": "1413db28ae73c6f411057e41f100000fb5a655b9",
"detected_licenses": [
"MIT"
],
"directory_id": "3431eeb9b601c672dad490ed7fd8e322bd4202e1",
"extension": "py",
"file... | 4.09375 | stackv2 | import re
#A FUNÇÃO "SEARCH" SÓ BUSCA A PRIMEIRA OPÇÃO DA FRASE
#Usando Character Classes
names = ["Douglas", "douglas", "souglas", "Souglas", "Touglas", "touglas", "@ouglas"]
for name in names:
result = re.search(r"[DdSsTt@]ouglas", name) #Buscando o nome Douglas, podendo ele começar com as letras dentro das chav... | 43 | 50.14 | 172 | 9 | 696 | python | [{"finding_id": "codeql_py/overly-large-range_05007052c80705dd_419df894", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
23,
26
] | [
null,
null
] | [
26,
27
] | [
29,
30
] | |
2024-11-18T20:59:41.895273+00:00 | 1,630,245,819,000 | 673554aabf6b4fb7291117e0101abf2f11265d97 | 3 | {
"blob_id": "673554aabf6b4fb7291117e0101abf2f11265d97",
"branch_name": "refs/heads/main",
"committer_date": 1630245819000,
"content_id": "d96fb7ffa6deeb8d64f8ffb91512dce9928939d2",
"detected_licenses": [
"MIT"
],
"directory_id": "849da0ba1ebec858269c5f86df069d85ac8757e3",
"extension": "py",
"file... | 2.96875 | stackv2 | import logging
from typing import Dict, Tuple, Union
from flask import Blueprint, request
from flask_restful import Api, Resource
from marshmallow import Schema, fields
from .geo_functions import default_geocoder, is_inside_mkad, get_distance
from .exceptions import GeocoderError
logging.basicConfig(level=logging.INF... | 72 | 33.15 | 79 | 18 | 520 | python | [{"finding_id": "codeql_py/log-injection_74e9d9f44341ad83_627c215d", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
61,
65
] | [
null,
null
] | [
30,
30
] | [
65,
77
] | |
2024-11-18T21:00:04.978956+00:00 | 1,501,628,243,000 | cb93126a43ba5bcf534bff431d2bb84d91f88a0f | 2 | {
"blob_id": "cb93126a43ba5bcf534bff431d2bb84d91f88a0f",
"branch_name": "refs/heads/master",
"committer_date": 1501628243000,
"content_id": "5eb0f74d9ea724a5aef643dd54a53d1dd60a04b1",
"detected_licenses": [
"MIT"
],
"directory_id": "b4e7576d908fb08d8863a53eed5ab6d1ca2d1307",
"extension": "py",
"fi... | 2.484375 | stackv2 | import os
import re
import sys
import time
import shutil
import subprocess
import datetime
import yaml
import getpass
# Import gslab_scons modules
import _exception_classes
from size_warning import issue_size_warnings
def scons_debrief(target, env):
'''Execute functions after SCons has built all targets'''
# L... | 323 | 32.32 | 121 | 21 | 2,437 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0a826dc807bbc4f1_d80220e8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](1) as clear text."
] | [
297
] | [
null
] | [
21
] | [
44
] | |
2024-11-18T21:00:33.792077+00:00 | 1,536,000,924,000 | ba151cdc82782d312933440ea123ca87acb92098 | 3 | {
"blob_id": "ba151cdc82782d312933440ea123ca87acb92098",
"branch_name": "refs/heads/master",
"committer_date": 1536000924000,
"content_id": "7728affc446017b4e60f4673080a507a14adba71",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "41e97dc8d5e2380ecb3346af55a5bf41ed7846f0",
"extension": "p... | 2.96875 | stackv2 | from uuid import uuid4
from hashlib import md5
def generate_salt():
""" Generates a random string to use for password generation """
return uuid4().hex[:8].upper()
def generate_password_from_salt(salt, password):
string = salt + password + "KEY123"
return md5(string.encode('utf-8')).hexdigest()
def e... | 17 | 29.59 | 68 | 13 | 116 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7fb9646b45fb4bd8_907b00b9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
10
] | [
null
] | [
16
] | [
38
] | |
2024-11-18T21:00:58.354718+00:00 | 1,451,584,769,000 | 9755d4d27026ef5f1b679027289523818d64c119 | 3 | {
"blob_id": "9755d4d27026ef5f1b679027289523818d64c119",
"branch_name": "refs/heads/master",
"committer_date": 1451584769000,
"content_id": "0f407716c8abd997627b4c09f6622c7f93caa49b",
"detected_licenses": [
"MIT"
],
"directory_id": "bbf3de51020d82105594e79f37e44db18e3103ee",
"extension": "py",
"fi... | 3.0625 | stackv2 | import flask
from flask import Module, make_response
from urlparse import urlparse
from jpegtran import JPEGImage
import os
import requests
cache = Module(__name__, name="cache")
"""Currently works for jpg image only,
client request can provide args in url,
ex: http://test-cache.com/cache?url='image url'&width='int'&h... | 71 | 30.46 | 78 | 17 | 532 | python | [{"finding_id": "codeql_py/full-ssrf_3c7b44109e86a395_6e437d20", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/full-ssrf",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](2).",
"The full URL of this request depends on a [user-provided value](1)."
] | [
55,
56
] | [
null,
null
] | [
12,
15
] | [
29,
54
] | |
2024-11-18T21:01:17.597821+00:00 | 1,691,561,787,000 | d10faefb8897448c1f363aefeece3318c28a3a09 | 2 | {
"blob_id": "d10faefb8897448c1f363aefeece3318c28a3a09",
"branch_name": "refs/heads/main",
"committer_date": 1691561787000,
"content_id": "0c01a009b1b8b39743278701e103b468a1285b15",
"detected_licenses": [
"MIT"
],
"directory_id": "268e6241202090b397979d3d7a7cf86f0e44057c",
"extension": "py",
"file... | 2.4375 | stackv2 | import asyncio
import hashlib
import secrets
from functools import lru_cache
from time import time
from typing import Optional
import bcrypt
from fastapi import Request
from pydantic import SecretBytes
from . import glove
from .exceptions import HttpTooManyRequests, UnexpectedResponse, manual_response_error
from .uti... | 96 | 37.27 | 112 | 17 | 828 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_04966f3c33093139_039bf9b5", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
43
] | [
null
] | [
28
] | [
49
] | |
2024-11-18T21:01:22.342476+00:00 | 1,398,260,718,000 | 1b69d0552aa1258638992def34ff5e245b5ef62c | 4 | {
"blob_id": "1b69d0552aa1258638992def34ff5e245b5ef62c",
"branch_name": "refs/heads/master",
"committer_date": 1398260718000,
"content_id": "c51d46bb2133f8f50d0f10432ebd465f30b9df0e",
"detected_licenses": [
"MIT"
],
"directory_id": "074ef082e4970101f8faf46164af8b839dbc519b",
"extension": "py",
"fi... | 3.5 | stackv2 | #!/usr/bin/env python3
# Combine the data in "genotypes.txt", "markers.txt" and "families.txt"
# and convert them into a CRI-MAP .gen file
#
# This is a python version of the perl script discussed in my "Intro to perl"
# at http://www.biostat.wisc.edu/~kbroman/perlintro/index.html#ex2
#
# This is the python 3 version; ... | 105 | 30.97 | 99 | 18 | 910 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a37c921767002336_a98c8b33", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
85
] | [
null
] | [
15
] | [
78
] | |
2024-11-18T21:37:56.340078+00:00 | 1,587,208,859,000 | 66c41a99a274d6be25a9cccdfa63cc010f0fd5b5 | 3 | {
"blob_id": "66c41a99a274d6be25a9cccdfa63cc010f0fd5b5",
"branch_name": "refs/heads/master",
"committer_date": 1587208859000,
"content_id": "bd67a2a9dea4cd5c76974008ff7799deebf51b67",
"detected_licenses": [
"MIT"
],
"directory_id": "ac7c2582157edd02d6660972a175afa6bd231c1f",
"extension": "py",
"fi... | 2.703125 | stackv2 | import argparse
import os
from sys import platform
from selenium.common.exceptions import NoSuchElementException, ElementClickInterceptedException
from selenium import webdriver
import time
import json
from JobParser import settings
def parsing():
parser = argparse.ArgumentParser()
parser.add_argument("-v"... | 285 | 40.44 | 159 | 20 | 2,307 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2bf1ef0e1d4fd7bb_9d98e023", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
114
] | [
null
] | [
23
] | [
68
] | |
2024-11-18T22:00:13.764053+00:00 | 1,666,216,470,000 | c5f2f0cc42d055f6b531313dd4f1f07a2c2b0650 | 2 | {
"blob_id": "c5f2f0cc42d055f6b531313dd4f1f07a2c2b0650",
"branch_name": "refs/heads/master",
"committer_date": 1666216470000,
"content_id": "260d73cda9fdf812854a6dd0195618ba92762b82",
"detected_licenses": [
"MIT"
],
"directory_id": "dad655898e438293fa957847795fc52b3c14cf7e",
"extension": "py",
"fi... | 2.40625 | stackv2 | # -*- encoding: utf-8 -*-
import json
import base64
import logging
import requests
from requests.auth import HTTPBasicAuth
from django.conf import settings
from django.contrib import messages
from pprint import pformat
# Load Logging definition, this is defined in settings.py in the LOGGING section
logger = logging.ge... | 170 | 46.35 | 146 | 19 | 1,909 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_01105bf353ffc68b_2f4a01e7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
22
] | [
null
] | [
21
] | [
28
] | |
2024-11-18T22:01:02.848522+00:00 | 1,547,791,914,000 | 8ff43487fe199b3f0d0074dd4fe5b78049497088 | 2 | {
"blob_id": "8ff43487fe199b3f0d0074dd4fe5b78049497088",
"branch_name": "refs/heads/master",
"committer_date": 1547791914000,
"content_id": "e846d5b4d183fee37c59867dad2e551fd5dda39e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1f0df9e45c38b56b683e1122c350f98f4d474b71",
"extension": "py"... | 2.359375 | stackv2 | # Copyright 2016 IBM Corp. All Rights Reserved.
#!/usr/bin/python2.7
"""Functions for downloading and extracting pretrained py-faster-rcnn/ssd caffe models
and client utils."""
from __future__ import print_function
import argparse
import tarfile
import os
from six.moves import urllib
from os.path import join
# -... | 198 | 29.66 | 103 | 14 | 1,685 | python | [{"finding_id": "codeql_py/tarslip_b4dac0718ad65fb3_04796b1a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
68
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T22:01:07.670722+00:00 | 1,483,961,984,000 | df5096d41e3f5654e107d158a2c3c46a0929c554 | 3 | {
"blob_id": "df5096d41e3f5654e107d158a2c3c46a0929c554",
"branch_name": "refs/heads/master",
"committer_date": 1483961984000,
"content_id": "f73c06f02ad32d864afb9c8a00e1e8ee4355a1b9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ea279ceea73d0a237419db5ff6f99782fb445493",
"extension": "py"... | 2.59375 | stackv2 | import os
import datetime
import logging
import csv
import requests
from flask import make_response
from jinja2 import Environment, FileSystemLoader
WORK_DIR = os.path.dirname(__file__)
CSV_URL = 'http://0.0.0.0:8089/stats/distribution/csv'
STAT_URL = 'http://0.0.0.0:8089/stats/requests'
HTML_TEMPLATE = 'report-tem... | 108 | 39.79 | 114 | 23 | 922 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_1ec9073b37f2c1ab_844de694", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
37
] | [
null
] | [
18
] | [
82
] | |
2024-11-18T22:26:18.062500+00:00 | 1,502,083,969,000 | c8ea7771d2a75e639ebac68adee75bdd2c7bcc6e | 2 | {
"blob_id": "c8ea7771d2a75e639ebac68adee75bdd2c7bcc6e",
"branch_name": "refs/heads/master",
"committer_date": 1502083969000,
"content_id": "d10824d179d369fed830b930610f056451d35c06",
"detected_licenses": [
"MIT"
],
"directory_id": "8b12e0d17beb720d647a663c3fdbb4dd99c1aa74",
"extension": "py",
"fi... | 2.359375 | stackv2 | from zoodb import *
from debug import *
import os
import hashlib
import random
import pbkdf2
import bank_client
def newtoken(db, cred):
hashinput = "%s%.10f" % (cred.password, random.random())
cred.token = hashlib.md5(hashinput).hexdigest()
db.commit()
return cred.token
def login(username, password):
... | 53 | 24.66 | 72 | 11 | 366 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_829b201921c26661_8538d425", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
11
] | [
null
] | [
30
] | [
39
] | |
2024-11-18T20:39:49.535172+00:00 | 1,442,252,198,000 | 708f8540647e4c7ffd827430d7d6ea82acf8a985 | 3 | {
"blob_id": "708f8540647e4c7ffd827430d7d6ea82acf8a985",
"branch_name": "refs/heads/master",
"committer_date": 1442252198000,
"content_id": "7baee74249eb65bde3033715738e79b275a032cc",
"detected_licenses": [
"MIT"
],
"directory_id": "4f8e526b8df465775ae7e3f41bfe4b88a2ccf08b",
"extension": "py",
"fi... | 2.765625 | stackv2 | import clss
import os
def setup_sql():
menu()
s = clss.sql()
s.meta.create_all(s.eng)
def menu():
txt = open('auth_sql', 'w')
print
print '-----SQL Database setup-----'
print
print '=Select SQL type='
print ' (1) sqlite'
print ' (2) MySQL'
print
typ = int(raw_input('... | 36 | 22.81 | 69 | 14 | 238 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_50630696969133fc_90f529c7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
35
] | [
null
] | [
19
] | [
27
] | |
2024-11-18T20:39:51.487790+00:00 | 1,541,437,173,000 | c8ec24fd7e16dad6f431fbbfd2ee6b505e13bab5 | 2 | {
"blob_id": "c8ec24fd7e16dad6f431fbbfd2ee6b505e13bab5",
"branch_name": "refs/heads/master",
"committer_date": 1541437173000,
"content_id": "4b1d9a5493a5b12d053c7c511a376980dd8a8b04",
"detected_licenses": [
"MIT"
],
"directory_id": "9067453580cf1d65fcb6ce1c88bd47376e2c835e",
"extension": "py",
"fi... | 2.46875 | stackv2 | import requests
import threading
import json
from time import sleep
from sys import exit as sysexit, stderr
class Bruter(threading.Thread):
# public constants
ERR_HOMEPAGE_FETCH_FAILED = 0
ERR_HTTP_CODE_NOT_OK = 1
ERR_TOKEN_NOT_FOUND = 2
ERR_CONNECTION_FAILED = 3
ERR_INVALID_RESPONSE = 4
E... | 310 | 40.03 | 125 | 23 | 2,680 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1ed60f0d0c9fa851_46636678", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
283,
257
] | [
null,
null
] | [
56,
23
] | [
66,
48
] | |
2024-11-18T20:52:19.252378+00:00 | 1,624,178,480,000 | fe0bc8472ed910bd76d3e99cfcf48c90dccd1979 | 2 | {
"blob_id": "fe0bc8472ed910bd76d3e99cfcf48c90dccd1979",
"branch_name": "refs/heads/main",
"committer_date": 1624178480000,
"content_id": "da3f15a7d47e8868dd4c2801c1d010ee953295d9",
"detected_licenses": [
"Unlicense"
],
"directory_id": "90139e18bbd94d51a156f4d1ea7ccb7eb047a1d6",
"extension": "py",
... | 2.3125 | stackv2 | from flask import Flask, render_template,redirect
from models import SSRServer, db
import datetime
import json
import logging
logging.basicConfig(filename='/dev/stdout', level=logging.INFO, format='[WEB] %(asctime)s %(message)s')
db.connect()
app = Flask(__name__, static_url_path='/static')
@app.template_filter()
de... | 62 | 28.55 | 103 | 14 | 399 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a9a1fcd114b86b0c_d0dfdbcd", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
39
] | [
53
] | [
13
] | [
14
] | |
2024-11-18T21:08:10.775973+00:00 | 1,349,379,120,000 | 20e9fff6c99655caeb0c844b5b8fd4b8e6e3285a | 3 | {
"blob_id": "20e9fff6c99655caeb0c844b5b8fd4b8e6e3285a",
"branch_name": "refs/heads/master",
"committer_date": 1349379120000,
"content_id": "460949720b20c4eee74af83c44d7b94ee8c85a26",
"detected_licenses": [
"MIT"
],
"directory_id": "3ff3c2ea13973b0f4309be716501c2fedc1bb8f3",
"extension": "py",
"fi... | 2.75 | stackv2 | """
Methods for managing S3 Buckets and making them available as local file systems.
"""
import os
import urllib2
from cm.util import misc
from cm.util import paths
from cm.util.misc import _if_not_installed
from cm.util.decorators import TestFlag
import logging
log = logging.getLogger('cloudman')
class Bucket(objec... | 150 | 39.66 | 106 | 20 | 1,387 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3793915d3b8823d5_3f94764d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
40
] | [
41
] | [
19
] | [
62
] | |
2024-11-18T21:08:22.855923+00:00 | 1,616,859,596,000 | bbb3dc9c8dd2553915037eef8216fbaaea344fe8 | 2 | {
"blob_id": "bbb3dc9c8dd2553915037eef8216fbaaea344fe8",
"branch_name": "refs/heads/main",
"committer_date": 1616859596000,
"content_id": "e92f647ccd2c7b6b8f80da9594b0f1fbf80ba512",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f39a955f01099317a73a35a4e7a028e3271923da",
"extension": "py",
... | 2.40625 | stackv2 | import os
from typing import Union
import yaml
import json
from jinja2 import Template
from copy import deepcopy
header_msg1 = 'This file was automatically generated by jinjaroot. Do not edit directly. See the .jinjaroot dir.'
header_msg2 = 'This file was automatically generated by jinjaroot. Do not edit directly.'
d... | 133 | 44.12 | 146 | 21 | 1,450 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_437cfb99a09df277_808eae39", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 4 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially... | [
15,
24,
79,
90
] | [
null,
null,
null,
null
] | [
18,
17,
21,
32
] | [
33,
68,
72,
73
] | |
2024-11-18T21:08:23.713989+00:00 | 1,609,082,708,000 | ef2edfda6af0dad445b96cfb547dd9ed934cc958 | 3 | {
"blob_id": "ef2edfda6af0dad445b96cfb547dd9ed934cc958",
"branch_name": "refs/heads/master",
"committer_date": 1609083830000,
"content_id": "30c96cc5682e7f378a19cfc929ffb0c3cbbc31d7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2ec94b20d7c748e86e249c2921ad0e113e2fd27e",
"extension": "py"... | 3.046875 | stackv2 | # Write individuals by generation to stdout in JSON format.
# Typical usage:
# python preprocess.py <file.ged> > out.json
import dateparser
import datetime
import json
import sys
from ged4py.parser import GedcomReader
import pandas as pd
def individual_to_dict(indi, gen, include_parents=False):
p = {
"i... | 115 | 30.42 | 140 | 18 | 916 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ecd7ab1734d36f0a_14d1b306", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
115
] | [
null
] | [
15
] | [
48
] | |
2024-11-18T21:08:28.210609+00:00 | 1,665,410,411,000 | 95d02ff7f2ef895cd75b41c5fdc569193821991b | 3 | {
"blob_id": "95d02ff7f2ef895cd75b41c5fdc569193821991b",
"branch_name": "refs/heads/master",
"committer_date": 1665410411000,
"content_id": "98a04c22c95ff3d6aaf08ddf6aea6b903fac3269",
"detected_licenses": [
"MIT"
],
"directory_id": "c3ce0329a42732eb93a09874dc29227efb24f165",
"extension": "py",
"fi... | 2.609375 | stackv2 | import os
import json
import time
import logging
import pathlib
import zipfile
import tempfile
import subprocess
from .util import *
logger = logging.getLogger()
class NgrokManager():
def __init__(self):
self.__ngrok_instalation_path = None
self.__ngrok_executable = None
self.__ngrok_proc... | 202 | 32.06 | 114 | 20 | 1,381 | python | [{"finding_id": "codeql_py/overly-permissive-file_128cb13211761627_348ac6b7", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
77
] | [
null
] | [
17
] | [
44
] | |
2024-11-18T21:08:30.814969+00:00 | 1,587,899,999,000 | 4213c6aee3b0739417c5d85e82ffa776c2c68fda | 2 | {
"blob_id": "4213c6aee3b0739417c5d85e82ffa776c2c68fda",
"branch_name": "refs/heads/master",
"committer_date": 1587899999000,
"content_id": "b761c18d6b16dd69a95ac4c27a115e783dab734b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2617b0b2a8d264c15304757911ed758f61eb56d8",
"extension": "py"... | 2.40625 | stackv2 | #DOCS FOR THE CODE IN THIS PAGE ARE AT: https://docs.python.org/3/library/http.server.html
#import statements
if __name__ == "__main__":
import MasterControl
else:
from . import MasterControl
from sys import exit as ExitProgram
from http.server import *
import os
from pathlib import Path
#Variables
httpd... | 163 | 46.08 | 130 | 30 | 1,623 | python | [{"finding_id": "codeql_py/path-injection_9d50413f1bbbe6a1_e3606250", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 4 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
42,
54,
66,
79
] | [
null,
null,
null,
null
] | [
45,
37,
37,
27
] | [
123,
118,
119,
61
] | |
2024-11-18T21:31:29.104876+00:00 | 1,443,612,667,000 | 1dc9ad48c9c4669ff4d5fc0f15ee56e8844ea743 | 3 | {
"blob_id": "1dc9ad48c9c4669ff4d5fc0f15ee56e8844ea743",
"branch_name": "refs/heads/master",
"committer_date": 1443612667000,
"content_id": "2b4f654a75c62044cb5c8ab587d3a7f9a56ff436",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4a61ab061ecb88a17e18e0d3fc44552541e21af0",
"extension": "py"... | 2.640625 | stackv2 | import tornado.ioloop
import tornado.web
class IndexHandler(tornado.web.RequestHandler):
def get(self):
greeting = self.get_argument('greeting', 'Hello')
self.write(greeting + ", friendly user!")
def write_error(self, status_code, **kwargs):
self.write("Gosh darnit, user!You caused a %d error." % status_code)
... | 18 | 26.11 | 70 | 12 | 131 | python | [{"finding_id": "codeql_py/reflective-xss_5cba7d575558d75a_eb07e5f6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
7
] | [
null
] | [
14
] | [
43
] | |
2024-11-18T21:31:53.721584+00:00 | 1,684,798,861,000 | b1df56d27d1643444576a7674484e4abb0dc8149 | 2 | {
"blob_id": "b1df56d27d1643444576a7674484e4abb0dc8149",
"branch_name": "refs/heads/master",
"committer_date": 1684798861000,
"content_id": "52f0847999690f9fd08af0ff0fcd3b0b8529f8cf",
"detected_licenses": [
"MIT"
],
"directory_id": "301f192743868f4305cf9ed84bf20db512d07d93",
"extension": "py",
"fi... | 2.484375 | stackv2 | import json
import os
import requests
import schedule
import time
API_TOKEN = os.environ['SLACK_API_TOKEN']
START_TIME = '10:00'
QUITTING_TIME = '18:00'
def set_slack_presence(presence):
url = "https://slack.com/api/users.setPresence"
url += f"?token={API_TOKEN}"
url += f"&presence={presence}"
respon... | 69 | 23.29 | 52 | 12 | 417 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dd731d613095515c_c10b3a9e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
18
] | [
null
] | [
15
] | [
28
] | |
2024-11-18T21:32:12.557817+00:00 | 1,375,682,880,000 | e500d536e1b813efb616c6b178d43dfacc7bc834 | 2 | {
"blob_id": "e500d536e1b813efb616c6b178d43dfacc7bc834",
"branch_name": "refs/heads/master",
"committer_date": 1375682880000,
"content_id": "e2ec69dbb57976088fb822d020f4fd0b589ac8e7",
"detected_licenses": [
"MIT"
],
"directory_id": "6cf46f85debb1b0505c0edcbc7296f50a44a615d",
"extension": "py",
"fi... | 2.3125 | stackv2 | from dexy.reporter import Reporter
from dexy.doc import Doc
from jinja2 import Environment
from jinja2 import FileSystemLoader
import operator
import os
import random
import shutil
def link_to_doc(node):
return """ <a href="#%s">↓ doc info</a>""" % node.output_data().websafe_key()
def link_to_doc_if_doc... | 101 | 33.41 | 107 | 17 | 830 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_880afd4e09ead3cb_a59b48ba", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
97
] | [
null
] | [
15
] | [
28
] | |
2024-11-18T21:32:20.417417+00:00 | 1,437,205,483,000 | 5c83e2c9fb97b4aaf774fa890475268295aeecbc | 3 | {
"blob_id": "5c83e2c9fb97b4aaf774fa890475268295aeecbc",
"branch_name": "refs/heads/master",
"committer_date": 1437205483000,
"content_id": "0cc6aae1861d417d6dd118294e2c12dc3c511adf",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f721832d053345936d579ec8f2322c6dd229edfa",
"extension": "py"... | 2.703125 | stackv2 | #!/usr/bin/env python
import os, socket, errno, types, tempfile
class NetworkError(IOError):
pass
class FileError(IOError):
pass
def updArgs(args, newarg=None):
if isinstance(args, IOError):
myargs = []
myargs.extend([arg for arg in args])
else:
myargs = list(args)
if ne... | 110 | 22.16 | 54 | 14 | 699 | python | [{"finding_id": "codeql_py/insecure-temporary-file_8f166127a3899142_c5b4db68", "tool_name": "codeql", "rule_id": "py/insecure-temporary-file", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated function tempfile.mktemp may be insecure.", "remediation": "", "location": ... | 2 | true | [
"CWE-377",
"CWE-732"
] | [
"py/insecure-temporary-file",
"py/overly-permissive-file"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Call to deprecated function tempfile.mktemp may be insecure.",
"Overly permissive mask in chmod sets file to world writable."
] | [
77,
94
] | [
null,
null
] | [
15,
5
] | [
32,
28
] | |
2024-11-18T21:32:59.491454+00:00 | 1,535,482,472,000 | 03f7181752df8e0375506cacba5294ac3e6f5204 | 3 | {
"blob_id": "03f7181752df8e0375506cacba5294ac3e6f5204",
"branch_name": "refs/heads/master",
"committer_date": 1535482472000,
"content_id": "36b19904e14c4c3f5d84952a8d27d1c4888d3d77",
"detected_licenses": [
"MIT"
],
"directory_id": "45cfb1fc234ada435c3768b7a3d316fa5b6ee8aa",
"extension": "py",
"fi... | 2.78125 | stackv2 | #!/usr/bin/env python3
import sys
import praw
import time
import datetime as dt
import numpy as np
import matplotlib.pyplot as plt
import matplotlib.dates as mdates
def main():
print("num args:", len(sys.argv))
if len(sys.argv) < 6:
print('Usage: python3 main.py link_id client_id client_secret user_agent output... | 111 | 27.5 | 95 | 12 | 848 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_420d2124b836ce90_b425f141", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
30
] | [
null
] | [
26
] | [
39
] | |
2024-11-18T21:33:10.216596+00:00 | 1,525,187,874,000 | 69123ced3b705458d3569255b081f9702c0e7000 | 3 | {
"blob_id": "69123ced3b705458d3569255b081f9702c0e7000",
"branch_name": "refs/heads/master",
"committer_date": 1525187874000,
"content_id": "fb6b3df4be74fc6de44f6c726afb5683ae9021fd",
"detected_licenses": [
"Unlicense"
],
"directory_id": "3504bb8778a86082f7fb2ebc0ac7eeb92bd0eea2",
"extension": "py",... | 3.40625 | stackv2 | # -*- coding: utf-8 -*-
"""
Package: venn
Module: draw
This package provides functions for computing all sections of Venn diagrams.
Functionality for drawing the diagrams in SVG format is also provided. Input
can be sets or lists.
The length of the input, i.e., the number of individual sets/lists is arbitrary.
Howeve... | 94 | 24.73 | 80 | 15 | 590 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5f3b41de80e3aa04_b335cad2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
48
] | [
null
] | [
11
] | [
67
] | |
2024-11-18T21:49:14.834745+00:00 | 1,604,341,488,000 | 7ac6667403910f03e282f72f6a2bc8d986c063b5 | 3 | {
"blob_id": "7ac6667403910f03e282f72f6a2bc8d986c063b5",
"branch_name": "refs/heads/master",
"committer_date": 1604341488000,
"content_id": "62142209103f560b4cdea281f330f6a26cf690f0",
"detected_licenses": [
"MIT"
],
"directory_id": "5bc596211416a5dc4d9c8bf05608c8f554e81f8c",
"extension": "py",
"fi... | 2.96875 | stackv2 |
# coding: utf-8
import re
class Tweet_processing:
"""
A helper class for processing tweets. Input: unprocessed tweets
"""
emojis = re.compile("["
u"\U0001F600-\U0001F64F" # emoticons
u"\U0001F300-\U0001F5FF" # symbols & pictographs
u"\U0001F680-\U0001F... | 65 | 33.45 | 126 | 14 | 655 | python | [{"finding_id": "codeql_py/overly-large-range_08d9dd93b6ed6a63_a07af237", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 7 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range ... | [
10,
10,
10,
10,
10,
10,
11
] | [
null,
null,
null,
null,
null,
null,
null
] | [
19,
22,
25,
28,
34,
37,
26
] | [
23,
26,
29,
32,
38,
41,
30
] | |
2024-11-18T21:49:17.367251+00:00 | 1,478,596,304,000 | 0ccf3a4507680cade1d1419e23a7e95f15712004 | 3 | {
"blob_id": "0ccf3a4507680cade1d1419e23a7e95f15712004",
"branch_name": "refs/heads/master",
"committer_date": 1478596304000,
"content_id": "65641fae032a3636025a54669e9049ff6e95cda4",
"detected_licenses": [
"MIT"
],
"directory_id": "10fe75ff1cecffd7238afcc230adeb5c317b54ea",
"extension": "py",
"fi... | 3.125 | stackv2 | # -*- coding: utf-8 -*-
"""
utils.decompress
~~~~~~~~~~~~~~~~
Implements decompress file
:author: Feei <wufeifei#wufeifei.com>
:homepage: https://github.com/wufeifei/cobra
:license: MIT, see LICENSE for more details.
:copyright: Copyright (c) 2016 Feei. All rights reserved
"""
impor... | 148 | 30.68 | 118 | 14 | 1,061 | python | [{"finding_id": "codeql_py/tarslip_a2564e2623af7b8a_5fc59459", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
139
] | [
null
] | [
9
] | [
17
] | |
2024-11-18T22:42:11.326295+00:00 | 1,545,664,275,000 | 58bd4fb8dffa8dd96c9e46ddcc98174db5904d01 | 3 | {
"blob_id": "58bd4fb8dffa8dd96c9e46ddcc98174db5904d01",
"branch_name": "refs/heads/master",
"committer_date": 1545664275000,
"content_id": "7adaca232ff4e9ef1b1dc402b59344e7ca084006",
"detected_licenses": [
"MIT"
],
"directory_id": "332bb3d81bbb1a2dbeee0090fdae7cab8f5007ce",
"extension": "py",
"fi... | 2.65625 | stackv2 | #!/usr/bin/env python3
import glob
import sys
import os
import argparse
import random
from jinja2 import Template
from weasyprint import HTML, CSS
from PIL import Image
base_path = os.path.dirname(os.path.realpath(__file__))
def remove_rotated():
rotated = glob.glob("rotated*")
for i in rotated:
o... | 101 | 24.34 | 90 | 16 | 623 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_1d284026027801c4_9270455c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
90
] | [
null
] | [
20
] | [
42
] | |
2024-11-18T20:31:40.439162+00:00 | 1,624,713,499,000 | ac8bcaedae351ab66eae16f9dea282256ddc5d63 | 3 | {
"blob_id": "ac8bcaedae351ab66eae16f9dea282256ddc5d63",
"branch_name": "refs/heads/master",
"committer_date": 1624713854000,
"content_id": "514d1229faf20d36636547904680cc3d613f71fb",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "89200d6c72acccca45808f53fa9bb5a9bd61359a",
"extension": "py"... | 2.609375 | stackv2 | import pathlib
from fastapi import APIRouter, HTTPException
from fastapi.responses import FileResponse
__all__ = ["vue_frontend"]
def _return_if_exists(path):
if path.exists():
return FileResponse(path)
else:
raise HTTPException(status_code=404)
def vue_frontend(main___file__: str) -> APIR... | 31 | 26.23 | 96 | 16 | 199 | python | [{"finding_id": "codeql_py/path-injection_f5736a0c9051e3fb_f257f4cf", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "remed... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2)."
] | [
10,
11
] | [
null,
null
] | [
8,
29
] | [
12,
33
] | |
2024-11-18T21:10:49.898578+00:00 | 1,427,272,189,000 | 5d4e6c2000c4fbe102048b799a625574f675d707 | 3 | {
"blob_id": "5d4e6c2000c4fbe102048b799a625574f675d707",
"branch_name": "refs/heads/master",
"committer_date": 1427272189000,
"content_id": "e024dde9da5e73632822661c083c31c0bfc5a9bc",
"detected_licenses": [
"MIT"
],
"directory_id": "048d0318f8b51c855bcbf2f096f6a01755ba6922",
"extension": "py",
"fi... | 2.515625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
# @Author: omi
# @Date: 2014-08-24 21:51:57
# @Last Modified by: omi
# @Last Modified time: 2015-01-30 18:02:34
'''
网易云音乐 Ui
'''
import curses
from api import NetEase
import hashlib
class Ui:
def __init__(self):
self.screen = curses.initscr()
# c... | 276 | 43.1 | 129 | 32 | 2,900 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_8078f65dd7cbfa0c_d46e6ba7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
222
] | [
null
] | [
38
] | [
57
] | |
2024-11-18T21:46:32.478505+00:00 | 1,621,565,270,000 | 7959f0c0df2917049b4dfa76e3b95ef0ef563332 | 4 | {
"blob_id": "7959f0c0df2917049b4dfa76e3b95ef0ef563332",
"branch_name": "refs/heads/master",
"committer_date": 1621565270000,
"content_id": "ed8440f4a78452d989e7f45d4d8fb4167e653a32",
"detected_licenses": [
"MIT"
],
"directory_id": "3279560117e971ae59c20925ab1cdab27bd2a688",
"extension": "py",
"fi... | 4.03125 | stackv2 | print('---------- Creating a Class ----------')
class Person:
pass
print('---------- Creating an Object ----------')
p = Person()
print(p)
print('---------- Class Constructor ----------')
class Person:
def __init__(self, firstname, lastname, age, country, city):
self.firstname = firstname
... | 129 | 24.06 | 120 | 12 | 792 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c50ea4184ae7724d_30b0d5d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
129
] | [
null
] | [
7
] | [
23
] | |
2024-11-18T21:46:35.059149+00:00 | 1,558,194,638,000 | 2b7b84cab5c9f8f14e6ccc90d5fb2e84e974c505 | 3 | {
"blob_id": "2b7b84cab5c9f8f14e6ccc90d5fb2e84e974c505",
"branch_name": "refs/heads/master",
"committer_date": 1558194638000,
"content_id": "fd609cce429091c2b5edd6e35e2cd6f02ab357c7",
"detected_licenses": [
"MIT"
],
"directory_id": "78082599211c21db9cb0f18a7277c234a5f89a3d",
"extension": "py",
"fi... | 2.8125 | stackv2 | import hashlib
import uuid
from qobuz import api, Artist, Album, Track, Playlist
class User(object):
"""Own user to be logged in.
Some operations require an authenticated user.
Parameters
----------
username: str
Username or e-mail of the user
password: str
Password for the ... | 296 | 26.92 | 78 | 16 | 1,630 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6e23d2dccbf044e0_5a0d996a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
51
] | [
null
] | [
28
] | [
45
] | |
2024-11-18T21:47:33.827763+00:00 | 1,690,556,815,000 | 9269eaac78c34bcdc6bcdf3b434ff766f979d3a4 | 3 | {
"blob_id": "9269eaac78c34bcdc6bcdf3b434ff766f979d3a4",
"branch_name": "refs/heads/main",
"committer_date": 1690556815000,
"content_id": "4286bf451a8327ac6fed539904ff31f6560e3d2b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "833267bf748687c8fb36c7fa5792a6a14a509597",
"extension": "py",
... | 2.609375 | stackv2 | # Copyright (c) 2020-2023 Antmicro <www.antmicro.com>
#
# SPDX-License-Identifier: Apache-2.0
"""
Provide resource manager responsible for downloading and caching resources
"""
import hashlib
import os
import tarfile
from pathlib import Path
from shutil import copy, rmtree
from tqdm import tqdm
from typing import Any,... | 633 | 27.42 | 79 | 22 | 3,715 | python | [{"finding_id": "codeql_py/tarslip_ca6a366322ba0543_3b3ecbff", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
37
] | [
null
] | [
9
] | [
11
] | |
2024-11-18T21:47:37.678268+00:00 | 1,624,388,022,000 | 6e6143a2f81869f71dd28af2a3ac00a4ed84d9b4 | 3 | {
"blob_id": "6e6143a2f81869f71dd28af2a3ac00a4ed84d9b4",
"branch_name": "refs/heads/master",
"committer_date": 1624388022000,
"content_id": "79310318ecf37fab63086aefd21706a0fc4ff895",
"detected_licenses": [
"MIT"
],
"directory_id": "a9fb9c6477308d33edb329342cc3d0b8c3e80b95",
"extension": "py",
"fi... | 3.0625 | stackv2 | #!/usr/bin/python3
# HELP:
# usage: createPasswdFile [-h] [--path PATH]
# Creates a password file according to Basic WWW-Authenticationi Scheme RFC 7617
#
# optional arguments:
# -h, --help show this help message and exit
# --path PATH, -p PATH specify password file path (default: /home/$USER/.passwd-f... | 83 | 25.13 | 108 | 12 | 534 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4f3289036905f976_f78937ad", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
79
] | [
null
] | [
9
] | [
13
] | |
2024-11-18T21:47:43.455531+00:00 | 1,551,245,345,000 | f6cd872f2c4308c95bb8fd35be8fa1ef87337deb | 2 | {
"blob_id": "f6cd872f2c4308c95bb8fd35be8fa1ef87337deb",
"branch_name": "refs/heads/master",
"committer_date": 1551245345000,
"content_id": "f38ad5046a3c71254e9aeb159b97efd9338b7dd0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "693e817268b6c64cdc6675e84c71f66d91756601",
"extension": "py"... | 2.421875 | stackv2 | import configparser
import requests
import json
import datetime
import random
from flask import request, jsonify, url_for, flash, redirect
from config import configs
from .models import User, UserInfo, God
from functools import wraps
def get_access_token():
url = 'https://api.weixin.qq.com/cgi-bin/token?grant_typ... | 129 | 29.5 | 110 | 16 | 970 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5e0228024e9314d1_f2a2c144", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
19
] | [
null
] | [
11
] | [
23
] | |
2024-11-18T22:29:31.098045+00:00 | 1,421,879,062,000 | 0881b1abf16eaebc4d358481a6b9376667ce9bb9 | 3 | {
"blob_id": "0881b1abf16eaebc4d358481a6b9376667ce9bb9",
"branch_name": "refs/heads/master",
"committer_date": 1421879062000,
"content_id": "6eb8c5c188cbfbe1c9b56b1864cfa7952e37582c",
"detected_licenses": [
"MIT"
],
"directory_id": "c858c9be806510e3e32099178b7b72e43f2a8f51",
"extension": "py",
"fi... | 2.921875 | stackv2 | # This file is part of gpgpass.
#
# simple command line password manager using gnupg
# Copyright (c) 2015, Markus Klein
# MIT Licensed
from gpgpass.password_manager import PasswordManager
from getpass import getpass
import argparse
import pyperclip
import sys
import os.path
def main():
parser = argparse.Argument... | 106 | 40.92 | 145 | 21 | 1,050 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_248cb45c67c1d413_722983d6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
103
] | [
null
] | [
23
] | [
89
] | |
2024-11-18T22:29:38.037858+00:00 | 1,520,577,401,000 | d7a82bef2a3664745ae19006a4fef3f84da6fc23 | 3 | {
"blob_id": "d7a82bef2a3664745ae19006a4fef3f84da6fc23",
"branch_name": "refs/heads/master",
"committer_date": 1520577401000,
"content_id": "57a991962cfaad164402d6f2fa58710e72151359",
"detected_licenses": [
"MIT"
],
"directory_id": "a0e6b98abc914373efc8a51fc1fcad303d0853e4",
"extension": "py",
"fi... | 2.515625 | stackv2 | """
Application 控制器
add on 2017-11-14 16:46:35
"""
import shutil
import os
import chardet
from flask import jsonify, request
from buter import db, ServiceException, getAttachPath
from buter.app import services
from buter.logger import LOG
from buter.util import Result
from buter.util.FlaskTool import Q
from buter.u... | 318 | 23.75 | 114 | 17 | 2,168 | python | [{"finding_id": "codeql_py/path-injection_511f03a4c90d674d_04bd3c49", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
229,
232
] | [
null,
null
] | [
23,
15
] | [
34,
26
] | |
2024-11-18T22:54:12.820766+00:00 | 1,682,540,576,000 | cf62aa619892209948341d029441037a3d13fd2a | 2 | {
"blob_id": "cf62aa619892209948341d029441037a3d13fd2a",
"branch_name": "refs/heads/master",
"committer_date": 1682540576000,
"content_id": "9890b38571a2c5596fc61f9dd97a291a8595c2ff",
"detected_licenses": [
"MIT"
],
"directory_id": "8fc7d4a8d98e39bf38f2ddd9a42bac34847c4339",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/env python
#
# Copyright (c) 2017 Jason Frazier <jafrazie@cisco.com>
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions
# are met:
# 1. Redistributions of source code must retain the above copyrig... | 77 | 37.52 | 104 | 12 | 651 | python | [{"finding_id": "codeql_py/request-without-cert-validation_388b2385858cba1f_8489f1b4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
71
] | [
null
] | [
20
] | [
105
] | |
2024-11-18T22:54:12.930272+00:00 | 1,620,702,364,000 | 30aed5c862353c4e61c24a05ce9cc51b21e6f9d8 | 4 | {
"blob_id": "30aed5c862353c4e61c24a05ce9cc51b21e6f9d8",
"branch_name": "refs/heads/master",
"committer_date": 1620702364000,
"content_id": "38350f69f25fd3f2b4c51348e4fd8135bfa85870",
"detected_licenses": [
"Unlicense"
],
"directory_id": "6c3bb7feea3b3b029fe65de11954aee778ac3578",
"extension": "py",... | 4.125 | stackv2 |
"""
[M] Given an array of intervals representing 'N' appointments, find out if
a person can attend all the appointments.
Example 1:
Appointments: [[1,4], [2,5], [7,9]]
Output: false
Explanation: Since [1,4] and [2,5] overlap, a person cannot attend both of these
appointments.
"""
# Time: O(nlogn) Space: O(n)... | 39 | 30.03 | 102 | 14 | 353 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9d7017e8a70b200e_66b97a66", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
34,
35,
36
] | [
null,
null,
null
] | [
9,
9,
9
] | [
101,
102,
101
] | |
2024-11-18T22:54:19.616513+00:00 | 1,606,333,029,000 | 144495dadee734e67b4c6af899bcb2fb3dde33dd | 2 | {
"blob_id": "144495dadee734e67b4c6af899bcb2fb3dde33dd",
"branch_name": "refs/heads/main",
"committer_date": 1606333029000,
"content_id": "ee0f5819f3b9082aab65bb210878b858b54dee16",
"detected_licenses": [
"MIT"
],
"directory_id": "2188bd3f758186eebb439a86bf6fcdb5ea2bc863",
"extension": "py",
"file... | 2.5 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
import os
from datetime import datetime
from flask import Flask, render_template, jsonify, redirect, url_for, \
request, send_from_directory, send_file
from convert import Convert
template_dir = os.path.abspath(os.path.join(os.getcwd(), "./templates"))
app = Flask(__name_... | 54 | 31.94 | 147 | 19 | 382 | python | [{"finding_id": "codeql_py/flask-debug_c02507efc0ff4663_c7a71787", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
54,
38
] | [
null,
null
] | [
5,
23
] | [
51,
31
] | |
2024-11-18T22:54:20.501556+00:00 | 1,609,661,301,000 | 581f62d783fa3791e590651467bceacfb3569196 | 3 | {
"blob_id": "581f62d783fa3791e590651467bceacfb3569196",
"branch_name": "refs/heads/master",
"committer_date": 1609661301000,
"content_id": "299ad46ab910d05a102362c3e3dd31a496fed1e2",
"detected_licenses": [
"MIT"
],
"directory_id": "f020112d55d2c749234cbaebcd02e317a124ab00",
"extension": "py",
"fi... | 2.640625 | stackv2 | import requests
import json
import os
import urllib.parse
import html.parser
import lxml.html
import lxml.cssselect
import argparse
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
def read_srt( path ):
timestamp = ''
subtitle = ''
skip_num_line = True
subtitles = []... | 149 | 32.32 | 151 | 18 | 1,229 | python | [{"finding_id": "codeql_py/request-without-cert-validation_dfbf22436b358a71_06d2a838", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
59
] | [
null
] | [
9
] | [
80
] | |
2024-11-18T20:55:07.534078+00:00 | 1,621,467,813,000 | e37c26fbf8d5398357a31073e62794832c78fe30 | 3 | {
"blob_id": "e37c26fbf8d5398357a31073e62794832c78fe30",
"branch_name": "refs/heads/main",
"committer_date": 1621467813000,
"content_id": "4b7e46576f004beffb61e721c608d4a315500e38",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f39917a4ab1fbf1b69f4f44603ab13b664ea2f80",
"extension": "py",
... | 3.21875 | stackv2 | import yaml
from jinja2 import Environment, BaseLoader, PackageLoader, select_autoescape
env = Environment(loader=BaseLoader)
def get_sample_template_data():
data = TemplateCollection()
ag_news_template = Template(
'basic',
'Example template.',
'return example["text"] + "\n\nIs this a... | 212 | 31.04 | 123 | 17 | 1,469 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e5fb4715189446a6_0a86049f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
3
] | [
null
] | [
7
] | [
37
] | |
2024-11-18T20:55:11.723828+00:00 | 1,613,636,538,000 | e74b49f9b0309c25b210639090c337be121f8d43 | 3 | {
"blob_id": "e74b49f9b0309c25b210639090c337be121f8d43",
"branch_name": "refs/heads/master",
"committer_date": 1613636538000,
"content_id": "ea3e087375739be5a47d799ef9780d0a08152133",
"detected_licenses": [
"MIT"
],
"directory_id": "79d679c18983a67c4e33e16eb7afc3023c22bfb4",
"extension": "py",
"fi... | 3.4375 | stackv2 | import random
from credential import User, Credential
# from user import User
def create_user(user_name, password):
new_user = User(user_name, password)
return new_user
def save_user(user):
User.save_user(user)
def verify_user(user_name, password):
check_user = Credential.check_user(user_name, passwo... | 180 | 37.22 | 164 | 27 | 1,164 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a064acabda7f5d94_249d082c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (p... | [
80,
139,
148
] | [
null,
null,
null
] | [
23,
31,
37
] | [
32,
130,
149
] | |
2024-11-18T20:55:11.772490+00:00 | 1,540,433,714,000 | 296b0199899d4b8984556b0b93ab813b70a4e2f7 | 3 | {
"blob_id": "296b0199899d4b8984556b0b93ab813b70a4e2f7",
"branch_name": "refs/heads/master",
"committer_date": 1540433714000,
"content_id": "4bd359d5093ab9bb1614cac91da65e64c045bb87",
"detected_licenses": [
"MIT"
],
"directory_id": "5a1b076248ae481fde791c635ca631b6449529f8",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
from flask import Flask, jsonify, make_response, request, send_from_directory
from flaskrun import flaskrun
from HTU21D.HTU21D import HTU21D
import requests
from urllib3.exceptions import MaxRetryError
# Mostly dicts of endpoint addresses
from config import *
app = Flask... | 170 | 39.02 | 110 | 22 | 1,630 | python | [{"finding_id": "codeql_py/full-ssrf_9425e7016a890061_2d264366", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
42
] | [
null
] | [
17
] | [
67
] | |
2024-11-18T21:07:38.061980+00:00 | 1,621,541,041,000 | 6ed8afdde515fab86fcd1447586969eee7ae10ed | 2 | {
"blob_id": "6ed8afdde515fab86fcd1447586969eee7ae10ed",
"branch_name": "refs/heads/main",
"committer_date": 1621541061000,
"content_id": "ef9e9d1f9e9794c8ce6479f6c661123e1f13b239",
"detected_licenses": [
"MIT"
],
"directory_id": "ce80d129b70ddd576d0fba01f0066588681410b2",
"extension": "py",
"file... | 2.3125 | stackv2 | import os
import json
from flask import Flask, render_template, send_from_directory, \
request, redirect, url_for, make_response
app = Flask(__name__)
@app.route('/', methods=('GET',))
@app.route('/home', methods=('GET',))
def home():
return render_template('index.html')
@app.route('/science', methods=('GE... | 54 | 35.94 | 118 | 16 | 467 | python | [{"finding_id": "codeql_py/cookie-injection_c9b0ecd243f58229_2de16f6a", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/cookie-injection",
"py/cookie-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cookie is constructed from a [user-supplied input](1).",
"Cookie is constructed from a [user-supplied input](1)."
] | [
36,
40
] | [
null,
null
] | [
48,
48
] | [
58,
58
] | |
2024-11-18T21:07:42.204480+00:00 | 1,517,221,329,000 | 505ef88e3a304d54da047e9d2f66552e18c2a043 | 3 | {
"blob_id": "505ef88e3a304d54da047e9d2f66552e18c2a043",
"branch_name": "refs/heads/master",
"committer_date": 1517221329000,
"content_id": "9f623aa99f49acdc97503537db173b1094038746",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "f5d5576c58c6039723d8a833ea9659f3deffeb88",
"extension": "p... | 2.59375 | stackv2 | """
The session manages the mechanics of receiving and sending data over
the websocket.
"""
from __future__ import division
from __future__ import print_function
from __future__ import unicode_literals
import logging
import math
import select
import socket
import ssl
import threading
import time
from .frame import ... | 392 | 33.43 | 72 | 22 | 2,713 | python | [{"finding_id": "codeql_py/insecure-protocol_e1fa60ee96091f10_7658861b", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/insecure-protocol",
"py/insecure-default-protocol"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1).",
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
139,
146
] | [
null,
null
] | [
24,
24
] | [
35,
45
] | |
2024-11-18T21:07:48.539481+00:00 | 1,587,992,049,000 | a3c9344cd620f0f2e488f9f4598b6d6413f086d1 | 3 | {
"blob_id": "a3c9344cd620f0f2e488f9f4598b6d6413f086d1",
"branch_name": "refs/heads/master",
"committer_date": 1587992049000,
"content_id": "30e631d4a4e69b39ba0bb9cd9edf0675995730f7",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "aa3b5ad86b326baa5dcc349a5c857462d8fba0d3",
"extension": "p... | 2.53125 | stackv2 | """
Generate static HTML files for eduid-IdP in all supported languages.
"""
import os
import sys
import six
import pkg_resources
from six.moves import configparser
from jinja2 import Environment, PackageLoader
from babel.support import Translations
__version__ = '0.1'
__copyright__ = 'SUNET'
__organization__ = 'SUN... | 167 | 31.25 | 98 | 18 | 1,165 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_38d1321bca0b0063_078e3e0a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
150
] | [
155
] | [
11
] | [
24
] | |
2024-11-18T21:33:08.116254+00:00 | 1,508,407,961,000 | c66b815cf6a60dd66a5407a695063b0578d92b31 | 3 | {
"blob_id": "c66b815cf6a60dd66a5407a695063b0578d92b31",
"branch_name": "refs/heads/master",
"committer_date": 1508407961000,
"content_id": "2a358ab40897cb9bfd6523d82b8a15ce976865d8",
"detected_licenses": [
"MIT"
],
"directory_id": "acb457586a9853be26fd709f47c2afd8a7ca1ae4",
"extension": "py",
"fi... | 2.984375 | stackv2 | # -*- encoding: utf-8 -*-
from jinja2 import Environment
from jinja2.ext import Extension
from jinja2 import nodes
class RepeatNTimesExtension(Extension):
tags = {"repeat"}
def parse(self, parser):
lineno = next(parser.stream).lineno
index = nodes.Name("_", "store", lineno=lineno)
h... | 31 | 31.74 | 92 | 13 | 241 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_37989b7b600c7bc0_b75045a5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
23
] | [
null
] | [
11
] | [
58
] | |
2024-11-18T21:33:13.989621+00:00 | 1,600,799,457,000 | dde1db1f99c8699055adb9e08e20d3ca713d09b9 | 2 | {
"blob_id": "dde1db1f99c8699055adb9e08e20d3ca713d09b9",
"branch_name": "refs/heads/master",
"committer_date": 1600799457000,
"content_id": "d72aeab55e3aebe8af363225d3126595856c8e62",
"detected_licenses": [
"MIT"
],
"directory_id": "dadb7de8dc4b43aff916fead4cf36e7b80131b02",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
import os
import sys
root_path = "/".join(os.path.realpath(__file__).split("/")[:-2])
if root_path not in sys.path:
sys.path.insert(0, root_path)
import json
import math
import shutil
import tarfile
import logging
import tempfile
import random
import argparse
impo... | 147 | 37.88 | 130 | 18 | 1,143 | python | [{"finding_id": "codeql_py/tarslip_6634792f18ecfbd2_232d3a0f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
99
] | [
null
] | [
17
] | [
24
] | |
2024-11-18T21:33:18.727688+00:00 | 1,463,990,647,000 | e40ab183d95475a1a51f12278704a1fccac80395 | 3 | {
"blob_id": "e40ab183d95475a1a51f12278704a1fccac80395",
"branch_name": "refs/heads/master",
"committer_date": 1463990647000,
"content_id": "06dda8d8457aee1e12396068696e5420fd703154",
"detected_licenses": [
"MIT"
],
"directory_id": "70a4b0f8b8ed3478a329e82bf8dff08afad9c897",
"extension": "py",
"fi... | 2.71875 | stackv2 | # -*- coding: utf-8 -*-
"""
This module shows how to accept BeeCloud webhook push notifications.
:created by xuanzhui on 2016/04/22.
:copyright (c) 2015 BeeCloud.
:license: MIT, see LICENSE for more details.
"""
# 这边只是演示如何接收beecloud webhook推送,实际项目中请遵循Flask项目规范,不要重复创建Flask app入口
# 接收webhook推送需要确保你的服务端地... | 97 | 19.93 | 104 | 17 | 802 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_cb322db943094c93_26d7091e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
43
] | [
null
] | [
24
] | [
92
] | |
2024-11-18T21:33:25.168885+00:00 | 1,689,912,169,000 | 7a8c2b81d1ce03ce990743f65f032ec71247e34d | 3 | {
"blob_id": "7a8c2b81d1ce03ce990743f65f032ec71247e34d",
"branch_name": "refs/heads/main",
"committer_date": 1689912169000,
"content_id": "421a117ed0b51425b9aa3bea0e2eb2a892bdcf3f",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "0ed62eec4eea9931f08f383cf657f3ca1a3ef4f9",
"extension": "py"... | 2.734375 | stackv2 | # -*- coding: utf-8 -*-
"""
utils.searcher
~~~~~~~~~~~~~~
This module provides utility functions that are used to search a CEDAR
resource (template/element/instance) by specifying the keyword query and
some other search parameters (e.g., max_count and limit).
If the user doesn't specify the keyword query then the fun... | 96 | 34.9 | 98 | 13 | 795 | python | [{"finding_id": "codeql_py/request-without-cert-validation_cdb97c8e7be653d9_148f5ee1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
94
] | [
null
] | [
16
] | [
83
] | |
2024-11-18T21:55:56.057734+00:00 | 1,557,854,736,000 | e98f41ebea97f1bfdd24cac5ce94b737310faa07 | 2 | {
"blob_id": "e98f41ebea97f1bfdd24cac5ce94b737310faa07",
"branch_name": "refs/heads/master",
"committer_date": 1557854736000,
"content_id": "74a5875746a51136247ddcaf8761d868556b3ccf",
"detected_licenses": [
"Unlicense"
],
"directory_id": "027293346b06eb8f1aea6824fcd039f413f58cda",
"extension": "py",... | 2.375 | stackv2 | #!/usr/bin/env python3
import argparse
import collections
import datetime
import logging
import os
import plistlib
import random
import re
import subprocess
import sys
import time
from urllib.parse import unquote
import psycopg2
DEFAULT_ITUNES_MUSIC_FOLDER = os.path.expanduser('~/Music/iTunes/iTunes Music/')
DEFAULT... | 260 | 35.69 | 115 | 17 | 2,099 | python | [{"finding_id": "codeql_py/overly-large-range_3020b6a54447a910_177da0fd", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[\\u000e\\u000f\\u0010\\u0011\\u0012\\u0013\\u0014\\u... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[\\u000e\\u000f\\u0010\\u0011\\u0012\\u0013\\u0014\\u0015\\...."
] | [
251
] | [
null
] | [
48
] | [
51
] | |
2024-11-18T21:56:05.724099+00:00 | 1,548,291,009,000 | 12a3dec865ad4132a34cdffe0c0b440954a89c12 | 2 | {
"blob_id": "12a3dec865ad4132a34cdffe0c0b440954a89c12",
"branch_name": "refs/heads/master",
"committer_date": 1548291009000,
"content_id": "39305326a0154831a43d53b583653d0eeb582e42",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7009c9763c93ca5049b8aaac551477d815b628ec",
"extension": "py"... | 2.484375 | stackv2 | #!/usr/bin/env python3
import cgi
import cgitb
import os
import json
from templates import login_page, secret_page, after_login_incorrect
from secret import username, password
cgitb.enable()
print("Content-Type: text/html")
#print()
#print("<!doctype html>")
#print(login_page())
#printing out username and password
#... | 72 | 22.83 | 68 | 13 | 404 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bb39fd96142b8644_12385d76", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
58,
65,
67
] | [
null,
null,
null
] | [
11,
15,
15
] | [
46,
60,
46
] | |
2024-11-18T22:39:31.307485+00:00 | 1,656,526,386,000 | dbf6bcb7e75a962c49eb48241cc72238e9a454d8 | 3 | {
"blob_id": "dbf6bcb7e75a962c49eb48241cc72238e9a454d8",
"branch_name": "refs/heads/master",
"committer_date": 1656526386000,
"content_id": "f1534bad005b48c099206b7f59b0f45cefdc87e9",
"detected_licenses": [
"MIT"
],
"directory_id": "c7be50ef7b154f292ad1fd0f04e90b89f558af31",
"extension": "py",
"fi... | 2.578125 | stackv2 | import warnings
warnings.filterwarnings("ignore")
import sys
sys.path.append("..")
from nltk import word_tokenize
from nltk.sentiment.vader import SentimentIntensityAnalyzer
import pandas as pd
import textblob
import PretrainedPolitenessModel
import re
import PPAClient
import nltk
nltk.download('words')
nltk.downl... | 118 | 28.67 | 104 | 14 | 864 | python | [{"finding_id": "codeql_py/overly-large-range_58c22b5c013aa76b_77c942b2", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
22
] | [
null
] | [
55
] | [
58
] | |
2024-11-18T22:39:40.181373+00:00 | 1,637,477,487,000 | 89e7266b895db450f4ac14d84020cd6f237e7016 | 2 | {
"blob_id": "89e7266b895db450f4ac14d84020cd6f237e7016",
"branch_name": "refs/heads/main",
"committer_date": 1637477487000,
"content_id": "e1b21523d1109585b328d1f572ca5bf50aaba26c",
"detected_licenses": [
"MIT"
],
"directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b",
"extension": "py",
"file... | 2.5 | stackv2 | import numpy as np
import random
from os import urandom
from Crypto.Util.number import long_to_bytes, bytes_to_long
from Crypto.Cipher import AES
from qiskit import (
QuantumCircuit,
QuantumRegister,
ClassicalRegister,
Aer,
assemble
)
from qiskit.quantum_info.operators import Operator
class Ban... | 202 | 35.23 | 79 | 21 | 1,795 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_3da6547b28540ba4_046873c5", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
30,
33
] | [
null,
null
] | [
16,
16
] | [
58,
58
] | |
2024-11-18T22:39:40.402528+00:00 | 1,595,237,647,000 | 30ee07b92342bd5a8e00ef4448b9049cf84e12f9 | 2 | {
"blob_id": "30ee07b92342bd5a8e00ef4448b9049cf84e12f9",
"branch_name": "refs/heads/master",
"committer_date": 1595237647000,
"content_id": "6d611eaea51848fbfede694fe9daad14df192468",
"detected_licenses": [
"MIT"
],
"directory_id": "6ceb90b99a45e072425268f964a84b4881ababee",
"extension": "py",
"fi... | 2.3125 | stackv2 | # service apache2 start
# service apache2 stop
# http://10.0.2.13/index.html
# Targeting a remote computer
# iptables -I FORWARD -j NFQUEUE --queue-num 0
# iptables --flush
# Testing on the local computer
# iptables -I OUTPUT -j NFQUEUE --queue-num 0
# iptables -I INPUT -j NFQUEUE --queue-num 0
# iptables --flush
i... | 40 | 27.05 | 62 | 14 | 326 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_488573ca41d08f37_e68d4cea", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [vulnweb.com](1) may be at an arbitrary position in the... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [vulnweb.com](1) may be at an arbitrary position in the sanitized URL."
] | [
24
] | [
null
] | [
12
] | [
34
] | |
2024-11-18T22:54:56.567485+00:00 | 1,540,966,306,000 | 799886fde7091780390e4060a0f468dd5970eb81 | 3 | {
"blob_id": "799886fde7091780390e4060a0f468dd5970eb81",
"branch_name": "refs/heads/master",
"committer_date": 1540966306000,
"content_id": "42e439abca54ad31d720d2930505ffdeca79e97b",
"detected_licenses": [
"MIT"
],
"directory_id": "17445cb52e37ddd20db8edb98f0bf19af934b53b",
"extension": "py",
"fi... | 2.5625 | stackv2 | # -*- coding: utf-8 -*-
import jinja2
from distutils.dir_util import copy_tree
class SiteGenerator():
def __init__(self):
self.t_loader = jinja2.FileSystemLoader(searchpath='templates/')
self.t_env = jinja2.Environment(loader=self.t_loader)
def publish(self, name, content):
with open(... | 66 | 27.26 | 72 | 14 | 441 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_bac0c0f6752fb72f_67edc411", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
9
] | [
null
] | [
22
] | [
62
] | |
2024-11-18T23:06:18.201214+00:00 | 1,467,786,200,000 | 02759bc19a0de20608923e09f684d33fe1461de2 | 2 | {
"blob_id": "02759bc19a0de20608923e09f684d33fe1461de2",
"branch_name": "refs/heads/master",
"committer_date": 1467786200000,
"content_id": "96e57d2e057a0452b200b0adbc7294029f016630",
"detected_licenses": [
"MIT"
],
"directory_id": "93a5773f1a6caf5c929435630eef8b770dc0a450",
"extension": "py",
"fi... | 2.3125 | stackv2 | from flask import render_template, request, jsonify
from flask.ext.socketio import SocketIO, emit
from sqlalchemy import text
from IPy import IP
from index import app, db
socketio = SocketIO(app)
# set postgres like this: export DATABASE_URL='postgresql://pat:[password]@localhost/ip_coordinates'
@socketio.on('clien... | 54 | 31.22 | 122 | 16 | 427 | python | [{"finding_id": "codeql_py/sql-injection_0a7ca1a4c952f052_efb75a59", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
25
] | [
null
] | [
17
] | [
28
] | |
2024-11-18T23:06:19.122447+00:00 | 1,585,634,238,000 | 0955954e9750fc6cd7eb6c13508a3820d8f35364 | 3 | {
"blob_id": "0955954e9750fc6cd7eb6c13508a3820d8f35364",
"branch_name": "refs/heads/master",
"committer_date": 1585634238000,
"content_id": "bf638c234f46eb2f3bbf3bb7257bb8e6db1827a3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ef58faf726ab9a4b1d711c8c1d17063d8e3a7b81",
"extension": "py"... | 2.765625 | stackv2 | """
Copyright 2018 Banco Bilbao Vizcaya Argentaria, S.A.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed ... | 210 | 38.8 | 106 | 20 | 1,846 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b784a812ab7a0c57_b8688473", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
37
] | [
null
] | [
13
] | [
106
] | |
2024-11-18T23:06:21.390202+00:00 | 1,549,370,812,000 | 622a4980478d014cea66734400aeb94f2b65c536 | 3 | {
"blob_id": "622a4980478d014cea66734400aeb94f2b65c536",
"branch_name": "refs/heads/master",
"committer_date": 1549370812000,
"content_id": "b9b41b371f984bff65c5c40ebbc6ec4c479c9e9f",
"detected_licenses": [],
"directory_id": "41bab1de20a739bd792ce7adb947d1d9f66414e2",
"extension": "py",
"filename": "twe... | 2.546875 | stackv2 | # -*- coding: utf-8 -*-:
import geocoder
import csv
import calendar
import tweepy
from google.cloud import storage
from tweepy import Stream
from tweepy import StreamListener
from tweepy import OAuthHandler
import json
clientSt = storage.Client(project='abgcorp-vicsafe')
bucket = clientSt.get_bucket('abgcorp-vicsafe')... | 470 | 34.83 | 152 | 23 | 3,507 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_7c828b83ba3dfc12_e6161c60", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensiti... | [
140,
142,
164,
116
] | [
null,
null,
null,
null
] | [
39,
39,
27,
19
] | [
47,
53,
39,
105
] | |
2024-11-18T20:56:57.507184+00:00 | 1,603,745,635,000 | 74e5477c0f4aec988d3ef6557d2cecd75317fddc | 2 | {
"blob_id": "74e5477c0f4aec988d3ef6557d2cecd75317fddc",
"branch_name": "refs/heads/master",
"committer_date": 1603745635000,
"content_id": "a196e1447281e7e448f74e740a37372115a2aebe",
"detected_licenses": [
"MIT"
],
"directory_id": "9533e8aa19107ac534056b19c1e3200224d7cf16",
"extension": "py",
"fi... | 2.4375 | stackv2 | import logging
FORMAT = '%(asctime)-15s %(message)s'
logging.basicConfig(level=logging.DEBUG, format=FORMAT)
from config.env import DESTINATION_AUTH, DESTINATION_URL
import os, base64
from functools import wraps
from cleaner import cleaner
from flask import Flask, request, jsonify, Response
import json, requests
from ... | 93 | 31.33 | 98 | 16 | 658 | python | [{"finding_id": "codeql_py/stack-trace-exposure_e27d8d1fcd03f030_e32c17d8", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-295"
] | [
"py/stack-trace-exposure",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This request may run without certificate validation because [it is disabled](1)."
] | [
82,
59
] | [
null,
62
] | [
24,
19
] | [
55,
46
] | |
2024-11-18T22:44:01.910805+00:00 | 1,492,547,306,000 | 4bc691ae1024ac6098c863c51df55c3eed0c413e | 4 | {
"blob_id": "4bc691ae1024ac6098c863c51df55c3eed0c413e",
"branch_name": "refs/heads/master",
"committer_date": 1492547306000,
"content_id": "b1827c18aca9283f8be52ee8901a2e244349e38e",
"detected_licenses": [
"MIT"
],
"directory_id": "875522d8813632a5ee0c053ce29dcbcff0ec331e",
"extension": "py",
"fi... | 3.578125 | stackv2 | from Department import Department
class Departments:
"""Contains methods for maintaining a Department
Methods:
--------
build_departments
sell_stock
purchase_stock
"""
def __init__(self, name, supervisor, employee_count=0, stock=None):
self.name = name
self.supervisor = supervisor
s... | 102 | 28.39 | 98 | 12 | 759 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d542ee3440d896e8_61c87a43", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.",
"This expression logs [sensitive data (priva... | [
34,
42,
45,
53
] | [
null,
null,
null,
null
] | [
11,
28,
7,
7
] | [
64,
53,
23,
18
] | |
2024-11-18T23:10:40.261628+00:00 | 1,682,619,413,000 | 05c9d3ce4907311a6830e678773f773208ef28f2 | 3 | {
"blob_id": "05c9d3ce4907311a6830e678773f773208ef28f2",
"branch_name": "refs/heads/master",
"committer_date": 1682619413000,
"content_id": "46a57e21b2074256467df5f45fa17978cf706bab",
"detected_licenses": [
"MIT"
],
"directory_id": "9c93ea752f1d1b7275be3fb5f58d30f9ee69a2ab",
"extension": "py",
"fi... | 2.5625 | stackv2 | import inspect
import os
import select
import string
import sys
import termios
import tty
import time
from contextlib import contextmanager
from getpass import getuser
from hashlib import md5
from io import BytesIO, StringIO
from pathlib import Path
import paramiko
import yaml
from paramiko.client import SSHClient, Wa... | 518 | 28.7 | 79 | 23 | 3,433 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_74fdafb006692ebd_f693d300", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to WarningPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to WarningPolicy may be unsafe."
] | [
209
] | [
null
] | [
9
] | [
66
] | |
2024-11-18T23:10:41.158682+00:00 | 1,693,348,322,000 | 4eced98afd83e330be5ecdb9fe93082070c2eef6 | 2 | {
"blob_id": "4eced98afd83e330be5ecdb9fe93082070c2eef6",
"branch_name": "refs/heads/master",
"committer_date": 1693348322000,
"content_id": "074f15f732038140073867bb44cdfaac461eecff",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5ef6c8d47864f471e26b9902d61f8c687e941f05",
"extension": "py"... | 2.390625 | stackv2 | ''' show_config.py
IOSXE parsers for the following show command
* show configuration lock
'''
# Python
import re
# Metaparser
from genie.metaparser import MetaParser
from genie.metaparser.util.schemaengine import Schema, \
Optional, \
... | 312 | 37.23 | 113 | 22 | 2,476 | python | [{"finding_id": "codeql_py/redos_ed1348c7b9b3b4d2_a0dec4c1", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'User debug info : ' and containin... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'User debug info : ' and containing many repetitions of '0'."
] | [
86
] | [
null
] | [
26
] | [
30
] | |
2024-11-18T22:29:49.633932+00:00 | 1,327,074,718,000 | ddc2c9343a7575d82b8fa4dfb974aad3a46228ce | 2 | {
"blob_id": "ddc2c9343a7575d82b8fa4dfb974aad3a46228ce",
"branch_name": "refs/heads/master",
"committer_date": 1327074718000,
"content_id": "b058d4e084600845ca2ad81eca6c69724b4cad22",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "58a3c68a5965a30858c5cdf5a3357741098c18aa",
"extension": "p... | 2.484375 | stackv2 | import ssl, socket, urlparse
from mimetools import Message
from StringIO import StringIO
FRAME_START = "\x00"
FRAME_END = "\xff"
class WebSocketError(Exception):
def __init__(self, value):
self.value = value
def __str__(self): return str(self.value)
class WebSocket(object):
def __init__(
... | 130 | 30.32 | 125 | 21 | 1,027 | python | [{"finding_id": "codeql_py/insecure-default-protocol_476d9cf3c3adb745_24f90524", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
34
] | [
36
] | [
25
] | [
14
] | |
2024-11-18T22:29:52.600634+00:00 | 1,519,162,890,000 | c48a09d79c46ae4b64586c928a360767512f108b | 3 | {
"blob_id": "c48a09d79c46ae4b64586c928a360767512f108b",
"branch_name": "refs/heads/master",
"committer_date": 1519162890000,
"content_id": "eb0f15791d208c7e829a25f39acade8a0fe0c835",
"detected_licenses": [
"MIT"
],
"directory_id": "9a6b4802ef2c7274cf49501ec97e1e240a99e122",
"extension": "py",
"fi... | 2.609375 | stackv2 | """Python library to connect deCONZ and Home Assistant to work together."""
import asyncio
import logging
import aiohttp
import async_timeout
_LOGGER = logging.getLogger(__name__)
@asyncio.coroutine
def async_get_api_key(loop, host, port, username=None, password=None, **kwargs):
"""Get a new API key for devicet... | 73 | 34.89 | 96 | 16 | 628 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_55934d830beedbaf_e3438953", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive dat... | [
58,
66,
69
] | [
null,
null,
null
] | [
55,
63,
61
] | [
58,
66,
64
] | |
2024-11-18T22:29:54.368591+00:00 | 1,459,639,145,000 | 943cdfd4726e5f051a2636fdc098566fa6f66f8b | 2 | {
"blob_id": "943cdfd4726e5f051a2636fdc098566fa6f66f8b",
"branch_name": "refs/heads/master",
"committer_date": 1459639145000,
"content_id": "ef29af7835f5d778ce688c52b645b15763cce0e9",
"detected_licenses": [
"MIT"
],
"directory_id": "5c9c140cf86d059e5fd400d9a23c992ac420b153",
"extension": "py",
"fi... | 2.328125 | stackv2 | from jinja2 import Template
from jinja2 import Environment, PackageLoader
from jinja2 import FileSystemLoader
from premailer import transform
import smtplib
from private import username, passw
def createhtmlmail(html, text, subject, fromEmail):
"""Create a mime-message that will render HTML in popular
MUAs, te... | 101 | 31.39 | 83 | 13 | 844 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_891d550b4bc536a1_f91904a2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
79
] | [
null
] | [
11
] | [
69
] | |
2024-11-18T23:21:51.971946+00:00 | 1,585,862,269,000 | 4a3a5d1125b697ba351c2089bbd31321e56f3dd6 | 3 | {
"blob_id": "4a3a5d1125b697ba351c2089bbd31321e56f3dd6",
"branch_name": "refs/heads/master",
"committer_date": 1585941966000,
"content_id": "e83bc4ebca73fe95981071f38ff00738950d4c69",
"detected_licenses": [
"MIT"
],
"directory_id": "d7bae114e50e8ca1bbf739474c7a68e8d7e976dd",
"extension": "py",
"fi... | 3.234375 | stackv2 | import binascii
import hashlib
import hmac
import os
import secrets
def check_password(current: str, password: str) -> bool:
salt = current[:64]
stored_password = current[64:]
password_hash = hashlib.pbkdf2_hmac(
"sha512", password.encode("utf-8"), salt.encode("ascii"), 100000
)
password_h... | 55 | 34.53 | 84 | 14 | 507 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_c3f60f6f97272d29_8d5fb7b4", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (SHA1) that is insecure."
] | [
49
] | [
null
] | [
24
] | [
41
] | |
2024-11-18T21:33:40.184028+00:00 | 1,549,615,359,000 | c27e3fbce12a50f5ff2d103927f277bdd7b3b41b | 2 | {
"blob_id": "c27e3fbce12a50f5ff2d103927f277bdd7b3b41b",
"branch_name": "refs/heads/master",
"committer_date": 1549615359000,
"content_id": "c02b8a4975c9c6de96774f0d519e78fdb0d2aec8",
"detected_licenses": [
"MIT"
],
"directory_id": "b7f2478f4c47686043f14eb3196c9b1eff6187f7",
"extension": "py",
"fi... | 2.453125 | stackv2 | # encoding: utf8
from flask import Flask
from flask import json
from datetime import datetime
import requests
from bs4 import BeautifulSoup
from parse import *
from functools import wraps
from flask import request
import re
app = Flask(__name__)
from werkzeug.contrib.cache import SimpleCache
cache = SimpleCache()
#... | 231 | 28.34 | 140 | 16 | 1,684 | python | [{"finding_id": "codeql_py/partial-ssrf_a0fe8bbdf676f699_b5f886ce", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 3 | true | [
"CWE-918",
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
84,
112,
149
] | [
null,
null,
null
] | [
9,
9,
9
] | [
43,
43,
43
] | |
2024-11-18T23:15:49.345380+00:00 | 1,595,732,374,000 | 5212bbe649fbe9a6bc7137c0757a61ba239b7324 | 2 | {
"blob_id": "5212bbe649fbe9a6bc7137c0757a61ba239b7324",
"branch_name": "refs/heads/master",
"committer_date": 1595732374000,
"content_id": "2bd6129945821e8e840a2a8c11455ed434fdd159",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "779016d79175352ab10061e461d075d9ccc9e87f",
"extension": "p... | 2.390625 | stackv2 | import requests
import sys
import json
import os
import time
import logging
import tabulate
import yaml
from logging.handlers import TimedRotatingFileHandler
requests.packages.urllib3.disable_warnings()
from requests.packages.urllib3.exceptions import InsecureRequestWarning
def get_logger(logfile, level):
'''
... | 277 | 36.38 | 119 | 18 | 1,804 | python | [{"finding_id": "codeql_py/request-without-cert-validation_0ac15727226b0231_3270f254", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
54,
70,
171,
254
] | [
null,
null,
null,
null
] | [
20,
20,
20,
20
] | [
70,
72,
99,
99
] | |
2024-11-18T23:15:54.661984+00:00 | 1,607,008,373,000 | 4163b83c3897748874c5d23d8f7811c9bb48f340 | 3 | {
"blob_id": "4163b83c3897748874c5d23d8f7811c9bb48f340",
"branch_name": "refs/heads/master",
"committer_date": 1607008373000,
"content_id": "9a93810863c3ef26c52b1acf9434850eb71661c3",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "ac61fbdcb8c49a0a0915dca392bdabf2ccaf4191",
"extension": "p... | 2.703125 | stackv2 |
#File inladen
#URl ophalen
# Output checken
import requests
import sys
fileName = "./words.txt"
login_url = "http://192.168.178.122:88/cgi-bin/CGIProxy.fcgi?cmd=logIn&usrName=wificam&remoteIp=192.168.178.122&groupId=673982479&pwd=^PASS^&usr=wificam&pwd=^PASS^"
logout_url = "http://192.168.178.122:88/cgi-bin/CGIProxy.... | 62 | 22.45 | 164 | 13 | 480 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ceafe78c51b88d07_1664147e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
45,
55
] | [
null,
null
] | [
9,
8
] | [
15,
16
] | |
2024-11-18T22:30:29.493425+00:00 | 1,606,627,158,000 | 0fe2b6abe397401750ffb7cd3c6271ea3ebe8a9d | 2 | {
"blob_id": "0fe2b6abe397401750ffb7cd3c6271ea3ebe8a9d",
"branch_name": "refs/heads/main",
"committer_date": 1606627158000,
"content_id": "f3ea1c08ca786f903a7e9d066ce13f02f37aaaaf",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "af55e889b7eddc58f20a0906083f2e76b589c6c7",
"extension": "py",
... | 2.40625 | stackv2 | import argparse
import csv
import jinja2
import sys
parser = argparse.ArgumentParser()
parser.add_argument('input_file', nargs='?', type=argparse.FileType('r', encoding='utf-8'), default=sys.stdin)
parser.add_argument('output_file', nargs='?', type=argparse.FileType('w', encoding='utf-8'), default=sys.stdout)
args = p... | 61 | 24.64 | 112 | 13 | 399 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_693071d15ee3b18b_2eeb48b1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
56
] | [
null
] | [
7
] | [
84
] | |
2024-11-18T22:44:48.006873+00:00 | 1,606,692,467,000 | aef098d5cace735f214cdeed23c2d0eb5e7aae9c | 3 | {
"blob_id": "aef098d5cace735f214cdeed23c2d0eb5e7aae9c",
"branch_name": "refs/heads/master",
"committer_date": 1606692467000,
"content_id": "f3fa73cbb4bd6394a220dc462b13aaeb617db9d0",
"detected_licenses": [
"MIT"
],
"directory_id": "8d0951f6ef1918e6c775b1a193f58e69c2b9b64a",
"extension": "py",
"fi... | 2.71875 | stackv2 | import string
import getpass
import urllib.request
import json
import sys
import operator
import os
import re
from datetime import datetime, timezone
from time import sleep
stream = ""
accessToken = ""
getChat = False
getCommentorStats = False
getImageLog = False
getVideoLog = False
#Setup to stage the execution of ... | 403 | 32.67 | 93 | 23 | 3,123 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_4bb730d4b8dbffac_b9d7a85f", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This string, which is used as a regular expression [here](1), has an unescaped '.' before 'groupme.com/', so it might match more hosts than expected.\nThis string, which is used as a regular expression [here](2), has an unescaped '.' before 'groupme.com/', so it might match more hosts than expected."
] | [
328
] | [
null
] | [
16
] | [
45
] | |
2024-11-18T23:37:08.036551+00:00 | 1,612,099,241,000 | 750df554f3e1704c1bb842eaf86d4d586d2be9ea | 4 | {
"blob_id": "750df554f3e1704c1bb842eaf86d4d586d2be9ea",
"branch_name": "refs/heads/main",
"committer_date": 1612099241000,
"content_id": "2db67fdfbd14913a9682a6f3b7f7864f9fecbc12",
"detected_licenses": [
"MIT"
],
"directory_id": "04d02719ebd8c8866943b0c0e116f904a2f2690d",
"extension": "py",
"file... | 4.34375 | stackv2 | '''3. Faça um programa que leia e valide as seguintes informações:
Nome: maior que 3 caracteres;
Idade: entre 0 e 150;
Salário: maior que zero;
Sexo: 'f' ou 'm';
Estado Civil: 's', 'c', 'v', 'd';'''
name = str(input('Name: '))
while len(name) < 3:
print('TRY AGAIN!\nName must be longer than 3 cha... | 40 | 29.35 | 66 | 15 | 374 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b14255f07d8b127e_f8fc5068", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
37,
38
] | [
null,
null
] | [
7,
7
] | [
26,
26
] | |
2024-11-18T21:57:34.418042+00:00 | 1,594,807,001,000 | e5bb19b2184573bed336edcdffad141d0f4339f2 | 2 | {
"blob_id": "e5bb19b2184573bed336edcdffad141d0f4339f2",
"branch_name": "refs/heads/master",
"committer_date": 1594807001000,
"content_id": "cd3689800bcbcbbd08562f66ef47f659354baf40",
"detected_licenses": [
"MIT"
],
"directory_id": "d6a2eddca83007209ba6f2eda6c426df7a8b9f1c",
"extension": "py",
"fi... | 2.40625 | stackv2 | """ Wrapper class for MPTinR.
"""
import math
import re
import numpy as np
from mptpy.fitting import fitter
from . import likelihood as lh
from . import optimize as optim
FUNCS = {"rmse": optim.optim_rmse, "llik": optim.optim_llik}
# def __init__(self, data_path, sep=',', func="rmse", header=None):
# super()... | 265 | 24.71 | 112 | 15 | 1,790 | python | [{"finding_id": "codeql_py/overly-large-range_f2572eed4f72f448_915ec5e7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
58
] | [
null
] | [
29
] | [
32
] | |
2024-11-18T21:57:35.919321+00:00 | 1,436,515,514,000 | 901b093e46fe58abbee5e4d7fafb2711bbee3930 | 3 | {
"blob_id": "901b093e46fe58abbee5e4d7fafb2711bbee3930",
"branch_name": "refs/heads/master",
"committer_date": 1436515514000,
"content_id": "e136d72e2f154404a544ea05a905cd04892e711a",
"detected_licenses": [
"MIT"
],
"directory_id": "1d9aef7fc32bfbe3de98781f1001389a6f62a02b",
"extension": "py",
"fi... | 2.6875 | stackv2 | from dashie_sampler import DashieSampler
import random
import requests
import collections
import re
import datetime
class ConfluenceCutFromDevelopAndRelease(DashieSampler):
def __init__(self, *args, **kwargs):
DashieSampler.__init__(self, *args, **kwargs)
def name(self):
return 'conflu... | 48 | 41.1 | 163 | 13 | 484 | python | [{"finding_id": "codeql_py/request-without-cert-validation_0f4a24571cde1adc_359a1dd8", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
21
] | [
null
] | [
20
] | [
164
] | |
2024-11-18T21:57:54.524932+00:00 | 1,482,182,070,000 | 4bdc3c963da0523a1fdb9c29a643bf10fe66fc3e | 3 | {
"blob_id": "4bdc3c963da0523a1fdb9c29a643bf10fe66fc3e",
"branch_name": "refs/heads/master",
"committer_date": 1482182070000,
"content_id": "3b42deaa343cb8d689d41149971e2ec82cfa2ca2",
"detected_licenses": [
"MIT"
],
"directory_id": "fb0d9a62b13dc9cf71ab9edda4821a894039c943",
"extension": "py",
"fi... | 2.828125 | stackv2 | #!/usr/bin/python
from flask import Flask
from flask import render_template
import json
import RPi.GPIO as GPIO
from time import sleep
from multiprocessing.pool import ThreadPool
app = Flask(__name__)
activeleds = [12,18,24,25]
GPIO.setmode(GPIO.BCM)
GPIO.setwarnings(False)
def togglepin(pin):
if GPIO.input(pin):... | 67 | 22.34 | 61 | 13 | 447 | python | [{"finding_id": "codeql_py/flask-debug_901ed43167aad11d_98ee8718", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
67,
54,
62
] | [
null,
null,
null
] | [
3,
12,
12
] | [
45,
62,
60
] | |
2024-11-18T21:58:09.020146+00:00 | 1,563,439,533,000 | d75e099366f6f0346574febc727017f82f0c0d0a | 3 | {
"blob_id": "d75e099366f6f0346574febc727017f82f0c0d0a",
"branch_name": "refs/heads/master",
"committer_date": 1563439533000,
"content_id": "c1e545953aee30970cdb07b0666db22b93ae4e7b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d1a54642fbef0972acea171d738186bac4c2c05c",
"extension": "py"... | 2.765625 | stackv2 | """
Wrapper for pretrained Deepbind
"""
import os
import math
import tarfile
import tempfile
import subprocess
import numpy as np
from .core import TextModel
from subprocess import PIPE
from spacy.tokens import Doc
from spacy.vocab import Vocab
from ..core import Task
from spacy.language import Language
DEEPBIND_CLAS... | 114 | 30.14 | 150 | 20 | 866 | python | [{"finding_id": "codeql_py/tarslip_1fbd30f174120c16_9d7cd89b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
104
] | [
null
] | [
17
] | [
26
] | |
2024-11-18T21:58:22.189920+00:00 | 1,692,089,812,000 | 1a10fb29f3012b653e7c3413947b42fcc9e5e4cb | 4 | {
"blob_id": "1a10fb29f3012b653e7c3413947b42fcc9e5e4cb",
"branch_name": "refs/heads/master",
"committer_date": 1692089812000,
"content_id": "ef882f4237fec32adaab20e272e9c4ffe241f751",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d30de65ce6c2491bde4d2fa1225415a41305e3a7",
"extension": "py"... | 4.25 | stackv2 | """
面向对象技术简介
类(Class): 用来描述具有相同的属性和方法的对象的集合。它定义了该集合中每个对象所共有的属性和方法。对象是类的实例。
类变量:类变量在整个实例化的对象中是公用的。类变量定义在类中且在函数体之外。类变量通常不作为实例变量使用。
数据成员:类变量或者实例变量, 用于处理类及其实例对象的相关的数据。
方法重写:如果从父类继承的方法不能满足子类的需求,可以对其进行改写,这个过程叫方法的覆盖(override),也称为方法的重写。
局部变量:定义在方法中的变量,只作用于当前实例的类。
实例变量:在类的声明中,属性是用变量来表示的。这种变量就称为实例变量,是在类声明的内部但是在类的其他成员方法之外声明的。
继承... | 62 | 21.73 | 97 | 11 | 605 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b4769274ce03f15f_c710fc06", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
59
] | [
null
] | [
7
] | [
97
] | |
2024-11-18T21:58:27.501452+00:00 | 1,661,771,678,000 | bf914ed3dfd4be01ffe6698cdd3812a279aa20b5 | 3 | {
"blob_id": "bf914ed3dfd4be01ffe6698cdd3812a279aa20b5",
"branch_name": "refs/heads/master",
"committer_date": 1661771678000,
"content_id": "cecd8d09b33aba8b4c0391541c81653f9f21d71d",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "1286ed0470bb1448f31a9e4e0410cd73f241b692",
"extension": "py",
... | 2.890625 | stackv2 | """Validators and converters for regolith input."""
import os
from getpass import getpass
from regolith.tools import string_types
def noop(x):
"""Does nothing, just returns the input."""
return x
def is_int(x):
"""Tests if something is an integer"""
return isinstance(x, int)
def always_true(x):
... | 114 | 25.07 | 72 | 14 | 751 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_90aec521ae6abfee_dd070ec2", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
97
] | [
null
] | [
21
] | [
22
] | |
2024-11-18T21:58:30.428398+00:00 | 1,509,606,811,000 | 9b1a2016a7d9b1da4ae71c3f7bc677207fd6bad8 | 2 | {
"blob_id": "9b1a2016a7d9b1da4ae71c3f7bc677207fd6bad8",
"branch_name": "refs/heads/master",
"committer_date": 1509606811000,
"content_id": "fb8060d2f8f6848eb1c0827ce1fc2466b515ab94",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b15c47a45207e854fb002d69f7e33f8943a5e2b3",
"extension": "py"... | 2.328125 | stackv2 | import json
from rest_framework.response import Response
from rest_framework.views import APIView
import coreapi
class WorkFlowDataReuse(APIView):
coreapi_fields = (
coreapi.Field(
name='node_id',
required=True,
type='string',
),
)
def post(self, request... | 53 | 29.96 | 76 | 15 | 343 | python | [{"finding_id": "codeql_py/stack-trace-exposure_b66f1a0181128f32_83bb7abe", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
32,
52
] | [
null,
null
] | [
29,
29
] | [
52,
52
] | |
2024-11-18T21:58:31.462266+00:00 | 1,444,847,110,000 | 1d74063c02f391dab88b31a4114a691506e3ee4c | 3 | {
"blob_id": "1d74063c02f391dab88b31a4114a691506e3ee4c",
"branch_name": "refs/heads/master",
"committer_date": 1444847110000,
"content_id": "13a9cf09be596245cb03604a84ab48e4c388376a",
"detected_licenses": [
"MIT"
],
"directory_id": "8bacda6f9c88370546e1fc4c1b4c61b27f4b6c9c",
"extension": "py",
"fi... | 2.8125 | stackv2 | #!/usr/bin/python
"""
Simple Python HTTP Server with HTTPS and basic authorization support.
See --help for usage guide.
Author: Mehran Ahadi
Homepage: http://mehran.ahadi.me/
License: MIT
Repository: https://github.com/zxcmehran/SecurePyServer
Version 1.1
"""
import BaseHTTPServer
from SimpleHTTPServer import Simpl... | 174 | 30.27 | 136 | 17 | 1,346 | python | [{"finding_id": "codeql_py/insecure-protocol_924040f8ebac7991_4652f6b0", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.wrap_socket](1).", "remediation": "", "l... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.wrap_socket](1)."
] | [
110
] | [
null
] | [
21
] | [
130
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.