added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T19:19:00.488134+00:00 | 1,496,936,506,000 | cfbdd104d1232b51744daf32207d0f6fe0cba362 | 2 | {
"blob_id": "cfbdd104d1232b51744daf32207d0f6fe0cba362",
"branch_name": "refs/heads/master",
"committer_date": 1496936506000,
"content_id": "e66ba97e6aa76dfda4360130b7fff2d8a750acee",
"detected_licenses": [
"MIT"
],
"directory_id": "4ba7d8ea375e4ce359086c0ed728a01060345efd",
"extension": "py",
"fi... | 2.328125 | stackv2 | import requests, json, sys
from lxml import html
import time
import datetime
from operator import itemgetter
date = datetime.date.today().strftime('%m-%d-%Y')
if len(sys.argv) > 1:
date = sys.argv[1:][0]
print date
session_requests = requests.session()
login_url = "https://live.dentrixascend.com/login/authe... | 198 | 21.95 | 146 | 16 | 1,290 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_7bd02e17b9db8230_1dd5a8fe", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
157
] | [
null
] | [
11
] | [
27
] | |
2024-11-18T19:19:13.738560+00:00 | 1,512,920,482,000 | ae362b92884980b9b18dad234fcbb4c9b2758737 | 3 | {
"blob_id": "ae362b92884980b9b18dad234fcbb4c9b2758737",
"branch_name": "refs/heads/master",
"committer_date": 1512920482000,
"content_id": "23d4757a1a9885efc75589d80137d0e00592019e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "400d234a475c7e6c61ef87b8cfda2c34cb363ae1",
"extension": "py"... | 3.0625 | stackv2 | #!/usr/bin/python
"""
Two things are wrong with Django's default `SECRET_KEY` system:
1. It is not random but pseudo-random
2. It saves and displays the SECRET_KEY in `settings.py`
This snippet
1. uses `SystemRandom()` instead to generate a random key
2. saves a local `secret.txt`
The result is a random and safe... | 22 | 22.59 | 63 | 11 | 139 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b50d5c05ff1051d8_589bc0cd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
22
] | [
null
] | [
7
] | [
17
] | |
2024-11-18T19:19:19.162169+00:00 | 1,525,310,926,000 | 6d2f7eaa284e51a490ecb94ebb910b7637eb4e7f | 2 | {
"blob_id": "6d2f7eaa284e51a490ecb94ebb910b7637eb4e7f",
"branch_name": "refs/heads/master",
"committer_date": 1525310926000,
"content_id": "be35047584df3b78fb415918e997675d804048ed",
"detected_licenses": [
"MIT"
],
"directory_id": "05eaba543b9c55c93e825851bdee96b0faee0a69",
"extension": "py",
"fi... | 2.34375 | stackv2 | # coding:utf-8
import cStringIO
import httplib
import os
import pycurl
import time
from Queue import Queue
from optparse import OptionParser
from threading import Thread
import requests
from urllib3 import disable_warnings
from module import get_ua
httplib.HTTPConnection._http_vsn = 10
httplib.HTTPConnection._http_v... | 110 | 33.83 | 130 | 24 | 978 | python | [{"finding_id": "codeql_py/request-without-cert-validation_bb1bf7bc40feee7a_b09d5c17", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
83
] | [
84
] | [
26
] | [
125
] | |
2024-11-18T19:29:50.251696+00:00 | 1,690,664,607,000 | 5c8ee36332255dae66adb7662d99c59403e6f907 | 2 | {
"blob_id": "5c8ee36332255dae66adb7662d99c59403e6f907",
"branch_name": "refs/heads/master",
"committer_date": 1690664607000,
"content_id": "e34f9a425e435863f547b481c05d17712e6d1f18",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "29d9a947fc954e5d182cb2d8292f96c0d27cdde0",
"extension": "py"... | 2.34375 | stackv2 | #(C) Copyright Syd Logan 2023
#(C) Copyright Thousand Smiles Foundation 2023
#
#Licensed under the Apache License, Version 2.0 (the "License");
#you may not use this file except in compliance with the License.
#
#You may obtain a copy of the License at
#http://www.apache.org/licenses/LICENSE-2.0
#
#Unless required by a... | 194 | 33.7 | 152 | 19 | 1,577 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4b026b7ac0ce8078_d3e0effb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
134
] | [
null
] | [
27
] | [
102
] | |
2024-11-18T19:44:16.554277+00:00 | 1,628,578,251,000 | 052727530d45beb08a61375ff389f4f016abfec3 | 2 | {
"blob_id": "052727530d45beb08a61375ff389f4f016abfec3",
"branch_name": "refs/heads/master",
"committer_date": 1628578251000,
"content_id": "96160f9492041b393084e230cae6e56385144a14",
"detected_licenses": [
"MIT"
],
"directory_id": "ab59bf6a28d2fe82c8c9d7442f011e008c7e8cb4",
"extension": "py",
"fi... | 2.390625 | stackv2 | # -*- coding: utf-8 -*-
"""
* TencentBlueKing is pleased to support the open source community by making 蓝鲸智云-蓝鲸 PaaS 平台(BlueKing-PaaS) available.
* Copyright (C) 2017-2021 THL A29 Limited, a Tencent company. All rights reserved.
* Licensed under the MIT License (the "License"); you may not use this file except in co... | 54 | 40.83 | 118 | 14 | 581 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_52add0da92216fa2_d7890e8e", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm TRIPLEDES](1) is broken or weak, and should not be used... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The cryptographic algorithm TRIPLEDES](1) is broken or weak, and should not be used.",
"[The cryptographic algorithm TRIPLEDES](1) is broken or weak, and should not be used."
] | [
27,
43
] | [
null,
null
] | [
14,
14
] | [
40,
42
] | |
2024-11-18T19:44:33.750363+00:00 | 1,623,626,033,000 | 76980468f44b6db70b326efcde4cea091de35242 | 3 | {
"blob_id": "76980468f44b6db70b326efcde4cea091de35242",
"branch_name": "refs/heads/main",
"committer_date": 1623626033000,
"content_id": "d6a4b482b443303bf2fd31dc4062cd04e81618b2",
"detected_licenses": [
"MIT"
],
"directory_id": "ec9a3ca32767d53e688eedb999fd73dbd8ca1576",
"extension": "py",
"file... | 2.546875 | stackv2 | # this is the "app/robo_advisor.py" file
print("-------------------------")
print("SELECTED SYMBOL: XYZ")
print("-------------------------")
print("REQUESTING STOCK MARKET DATA...")
print("REQUEST AT: 2018-02-20 02:00pm")
print("-------------------------")
print("LATEST DAY: 2018-02-20")
print("LATEST CLOSE: $100,000.... | 33 | 28.33 | 132 | 8 | 281 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cd768788b43a6c0b_daa9cabe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
33
] | [
null
] | [
7
] | [
20
] | |
2024-11-18T19:58:02.867790+00:00 | 1,688,659,531,000 | 5c46f20b10edf084ffc1d552a8b0ac72768a9563 | 3 | {
"blob_id": "5c46f20b10edf084ffc1d552a8b0ac72768a9563",
"branch_name": "refs/heads/master",
"committer_date": 1688659531000,
"content_id": "fc5ca3a4f2df1ba7a4b8164132308f2c99bc4ad6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d28c5a2993f5ba6133845ee724c188e0b3c3775a",
"extension": "py"... | 2.90625 | stackv2 | import json
import csv
import pytz
import logging
import logging.config
import datetime
from python.common.config import Config
logging.config.dictConfig(Config.LOGGING)
def load_json_into_dict(file_name) -> dict:
with open(file_name, 'r') as f:
data = f.read()
return json.loads(data)
def get_csv_t... | 131 | 27.05 | 90 | 16 | 840 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_51c1c0cb299a3b9e_dc805311", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
128
] | [
null
] | [
19
] | [
66
] | |
2024-11-18T19:58:03.544343+00:00 | 1,520,655,497,000 | 0a6f750c47522f89fbf10f082e4c8db1612fff92 | 3 | {
"blob_id": "0a6f750c47522f89fbf10f082e4c8db1612fff92",
"branch_name": "refs/heads/master",
"committer_date": 1520655497000,
"content_id": "a1f15d9dfabb8f8080c1038fd89d3169079e5a15",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f693c8bba68e79ae40521838d278955f2767e7a8",
"extension": "py"... | 2.546875 | stackv2 | #!/usr/bin/python
import os
import sys
import random
import string
import subprocess
import datetime
from jazz_common import validate_email_id
#Global Variables
DEV_NULL = open(os.devnull, 'w')
def passwd_generator():
"""
Random password generator for jazz-ui admin email ID login
"""
length = 10
... | 138 | 31.71 | 130 | 13 | 1,079 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0dd1d9ab6faa620c_3c2f2461", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.",
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text."
] | [
51,
52
] | [
null,
null
] | [
14,
14
] | [
60,
64
] | |
2024-11-18T19:58:04.749828+00:00 | 1,636,300,792,000 | ead1500fb6f0d34895299781644818e8fe36eb39 | 3 | {
"blob_id": "ead1500fb6f0d34895299781644818e8fe36eb39",
"branch_name": "refs/heads/main",
"committer_date": 1636300792000,
"content_id": "ba8599eef8dc1afc5f57d3114fdc5edcc69b56b1",
"detected_licenses": [
"MIT"
],
"directory_id": "77809b56c447dde9f88fda134fac3c6cdc6f6a2e",
"extension": "py",
"file... | 2.5625 | stackv2 | # -*- coding:utf-8 -*-
import paramiko
from paramiko.ssh_exception import SSHException
from app.logger import logger
from app.config import settings
class HostInfo(object):
def __init__(self):
self.__k = None
def connect(self, host, port, username, password):
transport = paramiko.Transport((... | 74 | 30 | 100 | 14 | 591 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_30960302cd0e2a1f_88442362", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
31
] | [
null
] | [
9
] | [
66
] | |
2024-11-18T19:58:07.624842+00:00 | 1,481,934,403,000 | c09515b775da55587176c2acb25c5bbb7d0ae201 | 2 | {
"blob_id": "c09515b775da55587176c2acb25c5bbb7d0ae201",
"branch_name": "refs/heads/master",
"committer_date": 1481934403000,
"content_id": "67d9d595c293db036c69a2f2c85fc5afa9ed4726",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d97cc82c1ee383103b82b5888a45f33e1e63ff75",
"extension": "py"... | 2.34375 | stackv2 | import time
import os
import json
import requests
from traitlets import Int, List, Unicode
from tornado import gen
from jupyterhub.spawner import Spawner
from .QueryUser import query_user
from .marathon import Marathon
from .GPUResourceAllocator import GPUResourceAllocator
class MarathonSpawner(Spawner):
resourc... | 193 | 37.18 | 117 | 20 | 1,473 | python | [{"finding_id": "codeql_py/request-without-cert-validation_bd73dad564c4f59a_86dbd3ef", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
111
] | [
null
] | [
31
] | [
71
] | |
2024-11-18T19:58:08.577924+00:00 | 1,468,507,036,000 | a195d9cb64da5a116f85d66ae1156d177f595f93 | 2 | {
"blob_id": "a195d9cb64da5a116f85d66ae1156d177f595f93",
"branch_name": "refs/heads/master",
"committer_date": 1468507036000,
"content_id": "28dfd298e58059aa28e804b4047084ab05660544",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fd717fe6ca74f6d77210cdd57a8c365d27c5bfc6",
"extension": "py"... | 2.359375 | stackv2 | # ===============================================================================
# Copyright 2016 Jake Ross
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses... | 207 | 32.38 | 89 | 20 | 1,349 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_207a541d388f5746_bf8e63d0", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
159
] | [
null
] | [
9
] | [
66
] | |
2024-11-18T19:58:26.053624+00:00 | 1,597,927,964,000 | 23d28ab73a79fe41cb083b7971391d082c0fba24 | 2 | {
"blob_id": "23d28ab73a79fe41cb083b7971391d082c0fba24",
"branch_name": "refs/heads/master",
"committer_date": 1597927964000,
"content_id": "d551f1a0c3cf78d2a0a4ea53c02d558e1d5b3c76",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a0bb5f4bb3fdb1adab2492b14a81097cb37e2a42",
"extension": "py"... | 2.390625 | stackv2 | import boto3
from botocore.exceptions import ClientError
from boto3.dynamodb.conditions import Key
import json
import os
import logging
import datetime
from dateutil import tz
from pprint import pprint
from msrestazure.azure_active_directory import ServicePrincipalCredentials
from azure.mgmt.compute import ComputeMana... | 222 | 36.09 | 114 | 19 | 1,554 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2951c26b8216f42b_7e55e6b0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
152
] | [
null
] | [
26
] | [
88
] | |
2024-11-18T20:23:09.618698+00:00 | 1,609,364,175,000 | e8cdcfb087017837fda174086e3f650c819ce22f | 2 | {
"blob_id": "e8cdcfb087017837fda174086e3f650c819ce22f",
"branch_name": "refs/heads/master",
"committer_date": 1610199016000,
"content_id": "ad791183ec839831f2bf98ee00aa203897188c88",
"detected_licenses": [
"MIT"
],
"directory_id": "5496fc943df90f6a075dd25f04eda94a065ad736",
"extension": "py",
"fi... | 2.40625 | stackv2 | """
:mod:`zsl.application.error_handler`
---------------------------------------------------
This module does the error handling. It allows users to register
an error handler for a given exception type. It also provides default
error handlers.
"""
from __future__ import absolute_import, division, print_function, unico... | 150 | 31.91 | 104 | 17 | 985 | python | [{"finding_id": "codeql_py/log-injection_de647cb2577001c0_3b64bb1a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
57
] | [
58
] | [
22
] | [
65
] | |
2024-11-18T20:23:10.474516+00:00 | 1,544,651,821,000 | b6b41ddbb4bb27ee0d17bacfc59727b67ed13be2 | 2 | {
"blob_id": "b6b41ddbb4bb27ee0d17bacfc59727b67ed13be2",
"branch_name": "refs/heads/master",
"committer_date": 1544651821000,
"content_id": "d41b1f78e9ff6c16377c3d0a1edd0f00004825c2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ca98a533d53da95249df7aed710a2db9424cdcdc",
"extension": "py"... | 2.4375 | stackv2 | import uuid
import os
import cloudpickle
import pickle
import base64
import logging
import types
logger = logging.getLogger()
import findspark
findspark.init()
import pyspark
import pyspark.sql.functions
from flask import Flask, request, jsonify
from flask.logging import default_handler
from pyspark_proxy.server.c... | 305 | 24.59 | 93 | 20 | 1,785 | python | [{"finding_id": "codeql_py/unsafe-deserialization_e589e097f6849ce2_f5f9a6e2", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio... | 12 | true | [
"CWE-502",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-215",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/unsafe-deserialization",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/flask-debug",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Unsafe deserialization depends on a [user-provided value](1).",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location an... | [
39,
185,
218,
250,
269,
305,
79,
128,
156,
195,
227,
261
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
41,
20,
20,
20,
20,
5,
22,
17,
17,
17,
17,
17
] | [
76,
77,
84,
76,
62,
55,
53,
20,
20,
20,
20,
20
] | |
2024-11-18T20:23:21.254817+00:00 | 1,623,254,757,000 | 8ae7ca5fbee6312a0174248c4164cdeef75dd8e7 | 2 | {
"blob_id": "8ae7ca5fbee6312a0174248c4164cdeef75dd8e7",
"branch_name": "refs/heads/main",
"committer_date": 1623254757000,
"content_id": "eaa13fe0098eaa4111d15994c8a84f4f6ffc0b61",
"detected_licenses": [
"MIT"
],
"directory_id": "bbe2b1394b68ada677d7015fe17cb03dfef6255d",
"extension": "py",
"file... | 2.5 | stackv2 | # -*- coding: UTF-8 -*-
import argparse
import datetime
import glob
import html
import json
import logging
import os
import re
import sys
import tarfile
import zipfile
from collections import OrderedDict
import pandas as pd
# Set directory name for script
dirname = os.path.dirname(__file__)
# Set up argparse
ap = a... | 116 | 31.28 | 107 | 16 | 918 | python | [{"finding_id": "codeql_py/tarslip_e5feb7beb0e18128_ef688f59", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
44
] | [
null
] | [
5
] | [
11
] | |
2024-11-18T20:23:41.484803+00:00 | 1,682,092,239,000 | 405a266b7f5e337a296dc5f6e7a5527873670d06 | 2 | {
"blob_id": "405a266b7f5e337a296dc5f6e7a5527873670d06",
"branch_name": "refs/heads/master",
"committer_date": 1682092239000,
"content_id": "7fc7145bf32a888ab9c4765b26fcedc0350d63f7",
"detected_licenses": [
"MIT"
],
"directory_id": "6955cf08b26ddce910f4932374d9b5242680009f",
"extension": "py",
"fi... | 2.375 | stackv2 | from pint import UnitRegistry
from jinja2 import Template
from wepy.reporter.dashboard import BCDashboardSection
# initialize the unit registry
units = UnitRegistry()
class ReceptorBCDashboardSection(BCDashboardSection):
BC_SECTION_TEMPLATE = \
"""
Boundary Condition: {{ name }}
Total Number of Dynamics seg... | 157 | 22.64 | 73 | 13 | 800 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ba9491c830f1d3da_064f8e88", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
107,
146
] | [
null,
null
] | [
26,
26
] | [
60,
60
] | |
2024-11-18T20:49:15.893788+00:00 | 1,585,634,174,000 | b0df4aa082d7b3834d1862910aa79e4d5b7f622a | 3 | {
"blob_id": "b0df4aa082d7b3834d1862910aa79e4d5b7f622a",
"branch_name": "refs/heads/master",
"committer_date": 1585634174000,
"content_id": "208e0b3cf63f63d682b1e6b69b301cdc8b861fd2",
"detected_licenses": [
"MIT"
],
"directory_id": "da421607c1b19ed660fcaee743fdb405aa4f4b7b",
"extension": "py",
"fi... | 2.609375 | stackv2 | from flask import Blueprint, redirect, render_template, url_for, request, flash
from flask_login import login_user, logout_user, current_user, login_required
from ...Form import LoginForm, RegisterForm # 导入自定义的登录表单
from ...models import User, Role
mod = Blueprint('auth', __name__, url_prefix='/auth')
@mod.route('/l... | 81 | 34.37 | 87 | 18 | 699 | python | [{"finding_id": "codeql_py/url-redirection_c460c62814fa6b78_4aa59219", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
20
] | [
null
] | [
33
] | [
43
] | |
2024-11-18T20:49:20.182951+00:00 | 1,593,098,777,000 | 29d072ff94b46dbe2a86d05f8a056b1e222b7437 | 3 | {
"blob_id": "29d072ff94b46dbe2a86d05f8a056b1e222b7437",
"branch_name": "refs/heads/master",
"committer_date": 1593098777000,
"content_id": "d8636d0d01e75d8385bacaad3a3ec344daaa3ce5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "eade7715e5f1805f461accee8da5e1531ab5c803",
"extension": "py"... | 2.703125 | stackv2 | import os
from jinja2 import Environment, FileSystemLoader
env = Environment(loader=FileSystemLoader(os.path.join(os.path.dirname(__file__), 'templates/flot')))
graphId = 1
class Graph(object):
def __init__(self, graphContainer=None, legendPositions=None, labelWidth=80):
global graphId
graphId ... | 89 | 36.66 | 150 | 14 | 709 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_98f669c409219d68_fc592a5f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
4
] | [
null
] | [
7
] | [
102
] | |
2024-11-18T20:49:29.802830+00:00 | 1,575,536,195,000 | a74e083635a8b24f3c3ac4d6c87b2eed7038b9cc | 3 | {
"blob_id": "a74e083635a8b24f3c3ac4d6c87b2eed7038b9cc",
"branch_name": "refs/heads/master",
"committer_date": 1575536195000,
"content_id": "8c85db2c35124806eaaacf0addd31915f9c2fc07",
"detected_licenses": [
"MIT"
],
"directory_id": "801274b01c8ad7665a5d63b4d68cd75fe278eb78",
"extension": "py",
"fi... | 3.203125 | stackv2 |
# frame.py - physical layer
# The Ethernet frame is defined by RFC 895, but this code
# will follow the norms defined by the class. That norms are:
# - Destination MAC Address: 6 bytes
# - Sender MAC Address: 6 bytes
# - Payload's size : 2 bytes
# - Payload : 0-1500 bytes
from util import... | 90 | 40.29 | 82 | 20 | 979 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c4a407a77048f376_9f211c59", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text."
] | [
53,
54,
58,
59
] | [
null,
null,
null,
null
] | [
21,
21,
21,
21
] | [
44,
44,
37,
37
] | |
2024-11-18T20:49:38.800668+00:00 | 1,486,143,578,000 | e72bb6b89e8679eddd55a16e2a82ea28226f394e | 3 | {
"blob_id": "e72bb6b89e8679eddd55a16e2a82ea28226f394e",
"branch_name": "refs/heads/master",
"committer_date": 1486143578000,
"content_id": "7f6ed8859ddee8eeb20ce6c021d5ce0756a2ff1d",
"detected_licenses": [
"MIT"
],
"directory_id": "4a56854998b9849406a1a13a6dffb9c151cc1d15",
"extension": "py",
"fi... | 2.71875 | stackv2 | #!/usr/bin/env python
import Tkinter as tk
from Crypto.PublicKey import RSA
import socket
from hashlib import sha1
import RegisterWindow
import UserWindowWithTree
import Database
import User
import Utils
import Keyring
import UserRoom
class LoginWindow(tk.Frame):
def __init__(self, master=None):
self.mas... | 142 | 32.42 | 108 | 18 | 1,054 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_5072304ee5df9b92_5cae19d3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
61
] | [
null
] | [
22
] | [
47
] | |
2024-11-18T20:49:39.040841+00:00 | 1,579,187,000,000 | bc0704ca75bcaa1b4d50ff2a5a691d2b0ebeecef | 3 | {
"blob_id": "bc0704ca75bcaa1b4d50ff2a5a691d2b0ebeecef",
"branch_name": "refs/heads/master",
"committer_date": 1579187000000,
"content_id": "573e47dbb43376b7befe307dee57db113f6554c2",
"detected_licenses": [
"MIT"
],
"directory_id": "3769d4f6f6e41d18a7bdb4c697451836087a7d60",
"extension": "py",
"fi... | 2.671875 | stackv2 | #This code is written by Priyanshu Dwivedi, Indian Institute of Information Technology, Design and Manufacturing, Jabalpur
#Source: https://github.com/coderpd/Ubuntu-Systemwide-Proxy-Setter
import sys
import re
import fileinput
import os
if os.geteuid() != 0:
os.execvp("sudo", ["sudo"] + ["python"] + sys.argv)
def ... | 237 | 43.64 | 156 | 23 | 2,763 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b881d3f7ee93d8bf_c27d9269", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 18 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression sto... | [
50,
51,
52,
53,
66,
67,
68,
70,
88,
89,
90,
109,
110,
111,
45,
62,
79,
100
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
25,
25,
25,
25,
25,
25,
25,
25,
25,
25,
25,
25,
25,
25,
30,
30,
30,
30
] | [
92,
94,
90,
94,
103,
105,
101,
105,
94,
96,
92,
87,
89,
85,
34,
34,
34,
34
] | |
2024-11-18T20:49:41.773878+00:00 | 1,678,868,213,000 | 4e2bfafabbd313b1e822ab894f8c8a19f0d449f7 | 2 | {
"blob_id": "4e2bfafabbd313b1e822ab894f8c8a19f0d449f7",
"branch_name": "refs/heads/master",
"committer_date": 1678868213000,
"content_id": "f11ad14255804722e51d7d5fbcca1455da526376",
"detected_licenses": [
"MIT"
],
"directory_id": "9cbda6613c19e65ab30a11a227b7ec2131b5207a",
"extension": "py",
"fi... | 2.3125 | stackv2 | from pathlib import Path
import json
import glob
import logging as log
import gzip
import typing
from takco import Table
class Dataset:
tables: typing.Sequence[typing.Dict[str, typing.Any]] = ()
def params(self, resourcedir: Path = None, datadir: Path = None, **params):
params = dict(params)
... | 88 | 35.08 | 86 | 23 | 671 | python | [{"finding_id": "codeql_py/tarslip_221e12225c0bfebb_370f8d6b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
55
] | [
null
] | [
25
] | [
52
] | |
2024-11-18T20:50:30.055708+00:00 | 1,621,714,210,000 | 243742bc29038faa05419a812e3ec88a5a95f770 | 4 | {
"blob_id": "243742bc29038faa05419a812e3ec88a5a95f770",
"branch_name": "refs/heads/main",
"committer_date": 1621714210000,
"content_id": "61b347fd43dc6ffad9b98ab8b32a04e095a31422",
"detected_licenses": [
"MIT"
],
"directory_id": "431f9a03a36162b2e143b56491440d27517af22c",
"extension": "py",
"file... | 3.8125 | stackv2 | import string
lower_case_alphabets = list(string.ascii_lowercase)
upper_case_alphabets = list(string.ascii_uppercase)
numbers = list(string.digits)
punctuation = list(string.punctuation)
length = int(input("What is the length of the password you want ? "))
characters_list = lower_case_alphabets + upper_case_alphab... | 20 | 23.15 | 85 | 9 | 105 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1ee30f891ed1ae1f_c8b7b1ff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
20
] | [
null
] | [
7
] | [
15
] | |
2024-11-18T20:50:36.084905+00:00 | 1,490,803,687,000 | e8421276f6fc0e05879497f06eb845b4ce2acf32 | 2 | {
"blob_id": "e8421276f6fc0e05879497f06eb845b4ce2acf32",
"branch_name": "refs/heads/master",
"committer_date": 1490803687000,
"content_id": "69944333531e24e71828653d609f7e420b90f68d",
"detected_licenses": [
"MIT"
],
"directory_id": "735f4ca71101e71132b04551c3b6e840bde0db44",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/python
"""
view_rosbag_video.py: version 0.1.0
Note:
Part of this code was copied and modified from github.com/comma.ai/research (code: BSD License)
Todo:
Update steering angle projection. Current version is a hack from comma.ai's version
Update enable left, center and right camera selection. Currently al... | 142 | 35.98 | 132 | 23 | 1,356 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9aedf6bae5a17cf5_8eaf9e04", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
56,
56
] | [
null,
null
] | [
51,
65
] | [
63,
78
] | |
2024-11-18T20:50:57.667283+00:00 | 1,572,708,018,000 | 2f99668da42327fe607f140b34f8bb1a02e25b2f | 3 | {
"blob_id": "2f99668da42327fe607f140b34f8bb1a02e25b2f",
"branch_name": "refs/heads/master",
"committer_date": 1572708018000,
"content_id": "cbb7455ae2e7adff10f4ab9ea3bbdf6ed7ce988a",
"detected_licenses": [
"MIT"
],
"directory_id": "5c0df19de82790354ecbc3c39268b68725dd37f7",
"extension": "py",
"fi... | 2.75 | stackv2 | from socket import socket, AF_INET, SOCK_STREAM
from ssl import SSLContext, PROTOCOL_TLS_SERVER
ip = '127.0.0.1'
port = 8443
context = SSLContext(PROTOCOL_TLS_SERVER)
context.load_cert_chain('cert.pem', 'key.pem')
with socket(AF_INET, SOCK_STREAM) as server:
server.bind((ip, port))
server.listen(1)
with ... | 20 | 28.15 | 62 | 11 | 152 | python | [{"finding_id": "codeql_py/insecure-protocol_e114486e4b1bfd3b_eb8c183d", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to SSLContext](1).\nInsecure SSL/TLS protocol ver... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to SSLContext](1)."
] | [
13
] | [
null
] | [
10
] | [
17
] | |
2024-11-18T20:51:17.454736+00:00 | 1,580,884,094,000 | 7aa38dc204c113cf732b1e77eba9adb8c176db5a | 4 | {
"blob_id": "7aa38dc204c113cf732b1e77eba9adb8c176db5a",
"branch_name": "refs/heads/master",
"committer_date": 1580884094000,
"content_id": "c4c2e03b3e0d21e33420f8b8f2ef7f83d7f85f47",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9c4c8243f307807d31245f917159282fefe14791",
"extension": "py"... | 4.125 | stackv2 | # It is a six-digit number.
# The value is within the range given in your puzzle input.
# Two adjacent digits are the same (like 22 in 122345).
# Going from left to right, the digits never decrease; they only ever increase or stay the same (like 111123 or 135679).
# input is 382345-843167.
input_from = 382345
input_t... | 29 | 33.34 | 146 | 14 | 367 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_59a4087a0bca9441_ce1034d8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
21,
29
] | [
null,
null
] | [
7,
7
] | [
32,
20
] | |
2024-11-18T21:13:52.568626+00:00 | 1,521,153,467,000 | 8b9982d414634dd7f9963fe52520722884310dfd | 3 | {
"blob_id": "8b9982d414634dd7f9963fe52520722884310dfd",
"branch_name": "refs/heads/master",
"committer_date": 1521153467000,
"content_id": "5617ae11f4b437243493cce9f214dfd201fcdbae",
"detected_licenses": [
"MIT"
],
"directory_id": "f2ba76f0789311ae3efe26184c7bc15ae3b57408",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/env python
# Author: Sami Yessou - samiii@protonmail.com
# Telegram Remote-Shell
# Control your Linux System remotely via Telegram API
# Requirements : apt-get install -y python python-pip && pip install telepot , dig,mtr,nmap,whois ,a Telegram BOT
from pprint import pprint
import telepot,time,os
import co... | 192 | 26.66 | 114 | 19 | 1,293 | python | [{"finding_id": "codeql_py/overly-permissive-file_4954bddab35f9cf3_b2d1d82c", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
58
] | [
null
] | [
9
] | [
36
] | |
2024-11-18T21:13:53.309753+00:00 | 1,587,388,910,000 | 9e45fcf934ca666e589e07aa7fd50f7f5be7b5e5 | 3 | {
"blob_id": "9e45fcf934ca666e589e07aa7fd50f7f5be7b5e5",
"branch_name": "refs/heads/master",
"committer_date": 1587388910000,
"content_id": "91efefe8c4e16d5bc299c293bdf683ef27941e21",
"detected_licenses": [
"MIT"
],
"directory_id": "cc3ae37839e17fa3d441725d5c86dc2c5c756a67",
"extension": "py",
"fi... | 3.109375 | stackv2 | from user import User
import string
import random
import getpass
import pyperclip
from credentials import Credential
def create_credential(account_name,passkey):
'''
function to create a new credential
'''
new_credential = Credential(account_name,passkey)
return new_credential
def save_credential(c... | 164 | 32.65 | 114 | 26 | 1,048 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a80ea453162d64e9_3cc87a0b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
117
] | [
null
] | [
35
] | [
84
] | |
2024-11-18T21:14:02.439151+00:00 | 1,670,311,876,000 | fad370ad651becec0b0bc32fff5fa5be59d2e0cf | 3 | {
"blob_id": "fad370ad651becec0b0bc32fff5fa5be59d2e0cf",
"branch_name": "refs/heads/master",
"committer_date": 1670311876000,
"content_id": "a926dded071177fa356a24a3bfb9db99fb7b3d03",
"detected_licenses": [
"MIT"
],
"directory_id": "0a6db7d1ad4c1a0b3b41306efa87967c32dc0194",
"extension": "py",
"fi... | 3.046875 | stackv2 | import hashlib
def main():
door = 'ffykfhsq'
password = ['', '', '', '', '', '', '', '']
print(password)
i = 0
while '' in password:
h = hashlib.md5(str.encode(door + str(i))).hexdigest()
if h[:5] == '00000':
position = int(h[5], 16)
if position < 8:
... | 20 | 24.8 | 62 | 17 | 136 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_215b9b239093a3e2_d2064cdc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
6,
15,
17
] | [
null,
null,
null
] | [
11,
27,
11
] | [
19,
35,
19
] | |
2024-11-18T21:14:09.253873+00:00 | 1,599,419,271,000 | ec2f2987538e29d2b62be5b2377eca612cfffac7 | 2 | {
"blob_id": "ec2f2987538e29d2b62be5b2377eca612cfffac7",
"branch_name": "refs/heads/master",
"committer_date": 1599419271000,
"content_id": "259467fe9006521cd4212933a210afe8ff52a28f",
"detected_licenses": [
"MIT"
],
"directory_id": "7677b35355fbb965a8116c6a0f6a67ee98fc3639",
"extension": "py",
"fi... | 2.4375 | stackv2 | #! python3
"""
Perform OAuth authentication - requires user approval.
Session tokens are saved for later use (they are valid, until the user revokes access).
"""
import requests
import xmltodict
import goodreads_api_client as gr
from rauth.service import OAuth1Service, OAuth1Session
def read_file(filename):
f ... | 66 | 26.45 | 87 | 9 | 405 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d3660b6e55f1cf93_159ce2b8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
63
] | [
null
] | [
9
] | [
28
] | |
2024-11-18T21:14:31.959641+00:00 | 1,528,043,362,000 | f4b90f50905f8e07d709cf6d68f5d6207c92dd02 | 3 | {
"blob_id": "f4b90f50905f8e07d709cf6d68f5d6207c92dd02",
"branch_name": "refs/heads/master",
"committer_date": 1528043380000,
"content_id": "866f569dda999df9bcd7e9e3d15f068ff2c96d03",
"detected_licenses": [
"MIT"
],
"directory_id": "f2ebc9b1d73ec3318e84028798a76713d245526d",
"extension": "py",
"fi... | 2.875 | stackv2 | #!/usr/bin/python3
# coding: utf8
from os import path
from main import loadFile, updateFile
import re
from packages.model.anime import Anime
from packages.model.manga import Manga
from packages.model.DMBase import SiteType, StatusType
from packages.crawler.myselfbbs import MyselfBBSCrawler
from packages.crawler.cartoo... | 108 | 27.17 | 104 | 17 | 728 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_75dd79c3a94390af_954199ee", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [myself-bbs.com](1) may be at an arbitrary position in ... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The string [myself-bbs.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [cartoonmad.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [bilibili.com](1) may be at an arbitrary position in the sanitized URL."
] | [
17,
25,
33
] | [
null,
null,
null
] | [
8,
10,
10
] | [
31,
33,
31
] | |
2024-11-18T21:14:37.270382+00:00 | 1,416,853,574,000 | 8e7bf7a822ca57efaec553c813e80384ccffb46a | 2 | {
"blob_id": "8e7bf7a822ca57efaec553c813e80384ccffb46a",
"branch_name": "refs/heads/master",
"committer_date": 1416853574000,
"content_id": "d999c4ec06e6f03a616630eb886476a02f548447",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "79365e3a4f0dbf41bc68c85937734fd1fe41fc10",
"extension": "py"... | 2.375 | stackv2 | import httplib
import socket
import hashlib
import hmac
import os
import tempfile
import multiprocessing
import BaseHTTPServer
import httplib2
from optparse import OptionParser
import logging
import urlparse
logging.basicConfig()
LOG = logging.getLogger()
parser = OptionParser()
parser.add_option('--instance_dir', d... | 101 | 34.13 | 127 | 15 | 730 | python | [{"finding_id": "codeql_py/log-injection_a077c97e0ca86b09_1dce270b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
35
] | [
null
] | [
36
] | [
40
] | |
2024-11-18T21:14:40.208900+00:00 | 1,573,404,615,000 | ca93f10327f1d5fe69fb0217624f485149214c6c | 3 | {
"blob_id": "ca93f10327f1d5fe69fb0217624f485149214c6c",
"branch_name": "refs/heads/master",
"committer_date": 1573404615000,
"content_id": "79f60c302a4d39fc5e3003a7ed818707fb5301e0",
"detected_licenses": [
"MIT"
],
"directory_id": "f95c58386cb2ce45855878756e28e66ea9468a4c",
"extension": "py",
"fi... | 2.90625 | stackv2 | """
Copyright (c) 2019, Nils P. Müller <shimst3r@gmail.com>
All rights reserved.
This file is part of dodeka.
`factors.py` implements the functionality for generating the
twelve-factor app checklist.
License: MIT, see https://opensource.org/licenses/MIT
"""
import os.path
from dataclasses import dataclass
from typi... | 78 | 29.71 | 108 | 15 | 541 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8907b6e25de8decc_7279bf9f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
70
] | [
73
] | [
28
] | [
6
] | |
2024-11-18T20:48:06.335328+00:00 | 1,631,350,851,000 | 248185d800768ed24c38483b6484c08973e5ef31 | 3 | {
"blob_id": "248185d800768ed24c38483b6484c08973e5ef31",
"branch_name": "refs/heads/master",
"committer_date": 1631350851000,
"content_id": "bfbb5f6e28b2cf86d56a8e6f252a3b99fe212e8d",
"detected_licenses": [
"MIT"
],
"directory_id": "7f71b5f6aa9b0daedd03f20a65e80cfd8c34f4a7",
"extension": "py",
"fi... | 2.671875 | stackv2 | import os
import sys
import requests
from PyQt5.QtWidgets import QMainWindow
from PyQt5.QtWidgets import QApplication
from PyQt5.QtCore import QUrl
from PyQt5.QtCore import Qt
from PyQt5.QtWebEngineWidgets import QWebEngineView, QWebEngineProfile
requests.packages.urllib3.disable_warnings()
headers = {
'Connection... | 133 | 32.32 | 136 | 16 | 1,192 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_d4b73875a23c60a2_c5230b87", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.zhihu.com](1) may be at an arbitrary position in t... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-295"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/request-without-cert-validation"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The string [www.zhihu.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [zhihu.com](1) may be at an arbitrary position in the sanitized URL.",
"This request may run without certificate validation because [it is disabled](1)."
] | [
75,
75,
96
] | [
null,
null,
null
] | [
12,
50,
9
] | [
46,
80,
55
] | |
2024-11-18T20:48:12.552258+00:00 | 1,455,031,788,000 | 9ad7977faaa1055c649bd25ddb5d7c374192cdd5 | 2 | {
"blob_id": "9ad7977faaa1055c649bd25ddb5d7c374192cdd5",
"branch_name": "refs/heads/master",
"committer_date": 1455031788000,
"content_id": "3ba912363b1288ec118fe1eedaf096e4353417a0",
"detected_licenses": [
"MIT"
],
"directory_id": "6a001918ac4f3e16a8549d2dbd257bf9341fefcf",
"extension": "py",
"fi... | 2.328125 | stackv2 | import os
from flask import render_template, Blueprint, send_file
main = Blueprint('main', __name__, template_folder='templates', static_folder='static/gen', static_url_path='/static')
@main.route('/templates/<path:partial>')
def render_partial(partial=None):
return render_template(partial + '.html')
@main.ro... | 29 | 25.9 | 118 | 14 | 177 | python | [{"finding_id": "codeql_py/path-injection_a75653718203ac72_72529561", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
20,
21
] | [
null,
null
] | [
23,
26
] | [
75,
78
] | |
2024-11-18T20:48:16.415328+00:00 | 1,584,668,910,000 | eeb03ba1a36415686ccbb59a573a0168164d8529 | 3 | {
"blob_id": "eeb03ba1a36415686ccbb59a573a0168164d8529",
"branch_name": "refs/heads/master",
"committer_date": 1584668910000,
"content_id": "c939170e232d9e5212dd1412a02a81f0daa1a35b",
"detected_licenses": [
"MIT"
],
"directory_id": "09b2ba018c41a32a413517c71491f299b01cc419",
"extension": "py",
"fi... | 2.828125 | stackv2 | import json
import requests
from getpass import getpass
from logging import getLogger, basicConfig, DEBUG, INFO
logger = getLogger(__name__)
LOG_FMT = "{asctime} | {levelname:<5s} | {name} | {message}"
basicConfig(level=DEBUG, format=LOG_FMT, style="{")
# basicConfig(level=INFO, format=LOG_FMT, style="{")
# --------... | 67 | 32.13 | 87 | 13 | 482 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_df437362967aca2a_11c19e55", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-295"
] | [
"py/clear-text-logging-sensitive-data",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This request may run without certificate validation because [it is disabled](1)."
] | [
40,
41
] | [
null,
null
] | [
18,
9
] | [
49,
85
] | |
2024-11-18T20:48:21.149247+00:00 | 1,576,823,831,000 | 32fcdf7b47d40cdc13578daa081a01cbb4d87fd7 | 3 | {
"blob_id": "32fcdf7b47d40cdc13578daa081a01cbb4d87fd7",
"branch_name": "refs/heads/master",
"committer_date": 1576823831000,
"content_id": "ae04d8a641fa91dc2a35d25d08ea49551a1b038c",
"detected_licenses": [
"MIT"
],
"directory_id": "b27a159bad30655693963f7404fe0252ee584af0",
"extension": "py",
"fi... | 2.625 | stackv2 | from algosdk import kmd
from algosdk import algod
from algosdk.wallet import Wallet
from algosdk import account
from algosdk import mnemonic
#from algosdk import encoding
import json
from getpass import getpass
#Creating kmd and algod sign(This was taken from python_SDK_Algorand). This will start up things
kcl = kmd... | 49 | 45.16 | 125 | 10 | 547 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d13a9cdb2f63968c_c56f1032", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
19
] | [
null
] | [
23
] | [
34
] | |
2024-11-18T20:48:28.216535+00:00 | 1,580,158,542,000 | ce8c39ccbc50a9ec0794bc4b680dbb375718bc26 | 2 | {
"blob_id": "ce8c39ccbc50a9ec0794bc4b680dbb375718bc26",
"branch_name": "refs/heads/master",
"committer_date": 1580163955000,
"content_id": "7d82913ec1a39749542a0bd0c6230f318885da56",
"detected_licenses": [
"MIT"
],
"directory_id": "9b3892c5373d61b3e0987f71f99a9d59a74577ad",
"extension": "py",
"fi... | 2.46875 | stackv2 | import threading
from io import BytesIO
from flask import Flask, send_file, render_template
from pyboy import PyBoy, windowevent, window
from io import BytesIO
from os import environ
app = Flask(__name__, template_folder='template')
ROM_NAME = 'rom/' + environ['ROM_NAME']
pb = PyBoy(ROM_NAME, window_type=None)
pb... | 146 | 18.64 | 61 | 13 | 717 | python | [{"finding_id": "codeql_py/reflective-xss_600f2afffdb1318d_1480a20e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
109
] | [
null
] | [
12
] | [
31
] | |
2024-11-18T20:48:30.291327+00:00 | 1,678,984,485,000 | c686b7a7e94e7c24a2f1861bf778687d9eac3f40 | 3 | {
"blob_id": "c686b7a7e94e7c24a2f1861bf778687d9eac3f40",
"branch_name": "refs/heads/master",
"committer_date": 1678984485000,
"content_id": "c136ca053f8e854c4f59d4be6610d4dd1ef3fb5d",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "d3924938210b3006fb919b5d7299e4b288d8bad6",
"extension": "py",
... | 2.65625 | stackv2 | #!/usr/bin/env python
# Copyright (c) 2012, AverageSecurityGuy
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without modification,
# are permitted provided that the following conditions are met:
#
# Redistributions of source code must retain the above copyright notice, this
# l... | 187 | 35.74 | 121 | 15 | 1,681 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eeb6928bb6a038d6_0184dd5f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
104
] | [
null
] | [
11
] | [
33
] | |
2024-11-18T21:11:33.372278+00:00 | 1,610,805,927,000 | a2f407215a388a013ecc387fe8adbc769698f9aa | 3 | {
"blob_id": "a2f407215a388a013ecc387fe8adbc769698f9aa",
"branch_name": "refs/heads/master",
"committer_date": 1610805927000,
"content_id": "6fa3beae345a87b84e0333548ee4f56c9959d175",
"detected_licenses": [
"MIT"
],
"directory_id": "e078c3f250fb201b50f9cc02f069dab3daa00ad5",
"extension": "py",
"fi... | 2.59375 | stackv2 | import os
import re
import requests
from github import Github
from flask import Flask, request
from flask import render_template
app = Flask(__name__)
def get_gists(username):
try:
url = "https://api.github.com/users/" + username + "/gists"
resp = requests.get(url)
gists = resp.json()
... | 90 | 26.56 | 107 | 21 | 557 | python | [{"finding_id": "codeql_py/partial-ssrf_5ac9295512d268c6_51f11a99", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
14
] | [
null
] | [
16
] | [
33
] | |
2024-11-18T21:11:40.709929+00:00 | 1,620,078,569,000 | e05955ee1e051a65ae673034d054241737bfbbe4 | 3 | {
"blob_id": "e05955ee1e051a65ae673034d054241737bfbbe4",
"branch_name": "refs/heads/main",
"committer_date": 1620078569000,
"content_id": "52b2a90b451fa0a86b968233648914532c36917f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c17955e3512c94d82cdab469406b72a4c1079a82",
"extension": "py",
... | 2.828125 | stackv2 | import datetime
import json
import requests
from flask import render_template, redirect, request
from app import app
# The node with which our application interacts, there can be multiple
# such nodes as well.
CONNECTED_NODE_ADDRESS = "http://127.0.0.1:8000"
posts = []
def fetch_posts():
"""
Function to f... | 230 | 27.98 | 82 | 14 | 1,465 | python | [{"finding_id": "codeql_py/partial-ssrf_6f44db9d6bc6fe77_e5b0458f", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
43
] | [
null
] | [
16
] | [
47
] | |
2024-11-18T21:11:43.522722+00:00 | 1,540,877,381,000 | 783a1e797570b7cc6c8ddf02b5e7ad7dcebb68f4 | 3 | {
"blob_id": "783a1e797570b7cc6c8ddf02b5e7ad7dcebb68f4",
"branch_name": "refs/heads/master",
"committer_date": 1540877381000,
"content_id": "e537992245700d59d65c6627bac3f8256ac0b7eb",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4c263f856547632a6b73d8279aaea72ce1bcee23",
"extension": "py"... | 3.265625 | stackv2 | import operative
import sketch
from random_word import RandomWords
print('H A N G M A N')
difficulty = 'X'
while difficulty not in 'EMH':
print('Select difficulty: E - Easy, M - Medium, H - Hard')
difficulty = input()[0].upper()
max_length = operative.set_max_length(difficulty)
missed_letters = ''
correct... | 74 | 28.62 | 81 | 22 | 462 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6d512db88e02c685_c632ab71", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](... | [
44,
52
] | [
null,
57
] | [
19,
19
] | [
81,
38
] | |
2024-11-18T21:25:50.609260+00:00 | 1,485,638,453,000 | 3044819efacd5d18d1e9f770f29c10921179310f | 3 | {
"blob_id": "3044819efacd5d18d1e9f770f29c10921179310f",
"branch_name": "refs/heads/master",
"committer_date": 1485638453000,
"content_id": "8d20b0e2c9f4ea02d4544b6523066abda359934c",
"detected_licenses": [
"MIT"
],
"directory_id": "3b026a4f19165b3f2167fe23e4955a5a843ea8a4",
"extension": "py",
"fi... | 2.796875 | stackv2 | import argparse
import requests
import json
import sqlite3 as sql
import re
import datetime as dt
import pandas as pd
from progress.bar import Bar
api_key = open('api_key.txt', 'r').read().strip()
url = 'http://api.sportsdatabase.com/nba/query.json?sdql='
def season_team_game_stats(select, season=2014):
"""
... | 118 | 34.72 | 117 | 16 | 1,098 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_eb5925efdd221128_d04ef992", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
36
] | [
null
] | [
17
] | [
52
] | |
2024-11-18T21:26:07.970386+00:00 | 1,554,199,523,000 | f27727860893f883859b9aa717ebb41543fbd67f | 3 | {
"blob_id": "f27727860893f883859b9aa717ebb41543fbd67f",
"branch_name": "refs/heads/master",
"committer_date": 1554199523000,
"content_id": "e2da280bac46f63d272c1d706bc977712fd687e9",
"detected_licenses": [
"MIT"
],
"directory_id": "0f77d6a78d51f1dafef7c01b54a4be14b3a0bc72",
"extension": "py",
"fi... | 2.75 | stackv2 | #-------------------------------------------------------------------------------
# Name: pyWOL
# Purpose: wake up system by sending a magic packet
#
# Author: hansel@163.com
#
# Created: 22/03/2019
# Copyright: (c) Hansel 2019
# Licence: MIT license
#-------------------------------------------... | 94 | 31.86 | 134 | 13 | 823 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_82cc20791ca36046_9df1dfbe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-200"
] | [
"py/clear-text-logging-sensitive-data",
"py/bind-socket-all-network-interfaces"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"'' binds a socket to all interfaces."
] | [
82,
52
] | [
83,
null
] | [
19,
9
] | [
50,
24
] | |
2024-11-18T21:26:15.466226+00:00 | 1,669,497,096,000 | db8983c2a0b2b7e252d74da4b390546bee5048c2 | 2 | {
"blob_id": "db8983c2a0b2b7e252d74da4b390546bee5048c2",
"branch_name": "refs/heads/master",
"committer_date": 1669497096000,
"content_id": "53b7e16117e23ce6060378146eaef866607c525d",
"detected_licenses": [
"MIT"
],
"directory_id": "eb012a857ae020004e9d14608ba96ce713985551",
"extension": "py",
"fi... | 2.34375 | stackv2 | from __future__ import annotations
import jinja2
import shutil
from pathlib import Path
from importlib.resources import read_text
from typing import TYPE_CHECKING
if TYPE_CHECKING:
from ..theme import Theme
class BackupFileExists(Exception):
pass
class Template:
"""
Base class for representing t... | 120 | 26.38 | 94 | 16 | 658 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_883e383a991053db_a2147372", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
29
] | [
null
] | [
25
] | [
55
] | |
2024-11-18T21:26:16.432702+00:00 | 1,608,674,315,000 | 4b63919948cf2c0dc138a657ff1149996be6d46c | 3 | {
"blob_id": "4b63919948cf2c0dc138a657ff1149996be6d46c",
"branch_name": "refs/heads/main",
"committer_date": 1608674315000,
"content_id": "4985987fcc8862bec45aa863850537c5a342aac6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "77e228845c627e35ebec5b72ff6a0b0c61434d6e",
"extension": "py",
... | 2.578125 | stackv2 | #!/usr/bin/env python
#
# Copyright 2020 Eric Gustafson
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable l... | 136 | 30.29 | 97 | 15 | 989 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c3f6c697c764c1b5_7f928695", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
74
] | [
null
] | [
19
] | [
87
] | |
2024-11-18T21:51:44.902914+00:00 | 1,618,326,524,000 | 9051c6c5bafe7f5be2bd2dc94b8316fac5d31a65 | 3 | {
"blob_id": "9051c6c5bafe7f5be2bd2dc94b8316fac5d31a65",
"branch_name": "refs/heads/main",
"committer_date": 1618326524000,
"content_id": "99c37fc1fb7087493881e3c88c4772337843ba90",
"detected_licenses": [
"MIT"
],
"directory_id": "9fb3e00796514a5c8cc27e1679cd2e7af60c7076",
"extension": "py",
"file... | 2.59375 | stackv2 | import os
import sys
import random
import shutil
from commands.config import main as config
from commands.mysql_config import main as mysql_config
from commands.security import main as security
def main():
if len(sys.argv) == 1:
os.system('cls')
if os.path.isdir('./env'):
try:
... | 76 | 28.14 | 129 | 16 | 488 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_22c3f72ea474050c_15233a76", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text."
] | [
54
] | [
null
] | [
17
] | [
23
] | |
2024-11-18T21:51:48.678822+00:00 | 1,531,321,809,000 | ac2661ee082bc2dbdf85d829506ab00f1273adc0 | 4 | {
"blob_id": "ac2661ee082bc2dbdf85d829506ab00f1273adc0",
"branch_name": "refs/heads/master",
"committer_date": 1531321809000,
"content_id": "f9d8a32cd73a702a096dfa2d64a7c382c185ceee",
"detected_licenses": [
"MIT"
],
"directory_id": "c849dd77d0872961080165de75c48db8db823660",
"extension": "py",
"fi... | 3.65625 | stackv2 | class Filer:
@staticmethod
def writeItemsToFile(items, filename):
with open(filename, 'w') as f:
for line in items:
f.write(str(line) + "\n")
@staticmethod
def readItemsFromFileToList(filename):
with open(filename) as f:
lst = f.readlines()
... | 26 | 31.54 | 97 | 17 | 185 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_f5dbeb5a2cce7f46_edc0425c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
20
] | [
null
] | [
21
] | [
29
] | |
2024-11-18T21:52:20.446625+00:00 | 1,421,816,504,000 | 4976fc46d742cff092df0847080d7a65d65cb55f | 3 | {
"blob_id": "4976fc46d742cff092df0847080d7a65d65cb55f",
"branch_name": "refs/heads/master",
"committer_date": 1421816504000,
"content_id": "67caa3c7326db5fc89b94faacd21be06546990a8",
"detected_licenses": [
"MIT"
],
"directory_id": "b35817848bcfb5fabf1c89e2a90b91e867aa0cad",
"extension": "py",
"fi... | 2.625 | stackv2 | from werkzeug.utils import find_modules, import_string
from flask import Blueprint
from os import path
import hashlib
def hash_password(password, secret):
m = hashlib.sha1()
m.update(password)
return m.hexdigest()
def register_all_blueprints(app, blueprint_module):
if blueprint_module:
for na... | 23 | 30.17 | 90 | 15 | 138 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_140da4f5b10bdd57_1c7daf14", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
9
] | [
null
] | [
14
] | [
22
] | |
2024-11-18T21:52:21.434874+00:00 | 1,692,844,508,000 | 4cd91424b4a99daba5c95874fb3e7d61d5ec8278 | 3 | {
"blob_id": "4cd91424b4a99daba5c95874fb3e7d61d5ec8278",
"branch_name": "refs/heads/master",
"committer_date": 1692844508000,
"content_id": "2574b6b08f000cce53b2d697d0e7b2f07e59699e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "034def375a59ec0fbe539cc33476f2b38d5cdaa0",
"extension": "py"... | 2.515625 | stackv2 | # Copyright 2023 Canonical Ltd.
# Licensed under the Apache V2, see LICENCE file for details.
#
# Module that parses constraints
#
# The current version of juju core expects the client to take
# constraints given in the form "mem=10G foo=bar" and parse them into
# json that looks like {"mem": 10240, "foo": "bar"}. Thi... | 168 | 26.22 | 156 | 17 | 1,299 | python | [{"finding_id": "codeql_py/redos_d03210cb843591b4_1ac9b622", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with ',+,<=' and containing many repeti... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with ',+,<=' and containing many repetitions of '::='."
] | [
148
] | [
null
] | [
78
] | [
83
] | |
2024-11-18T20:31:26.135037+00:00 | 1,631,988,124,000 | 743c1e1253b8e6ac4d2aea0061c3be3482b7f3c8 | 3 | {
"blob_id": "743c1e1253b8e6ac4d2aea0061c3be3482b7f3c8",
"branch_name": "refs/heads/main",
"committer_date": 1631988124000,
"content_id": "0c5c78cc208261b123f15d739a9219d16cb1558a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9f7f7b84eaa762e95ef0c642a5f1b31d85b4de9f",
"extension": "py",
... | 2.578125 | stackv2 | #!/usr/bin/env python3
"""Generate the dockerfiles from a jinja template."""
from jinja2 import Environment, FileSystemLoader
from settings import templates
import logging
log = logging.getLogger(__name__)
def generate(log):
"""Generate the dockerfiles for this repo."""
file_loader = FileSystemLoader('templa... | 50 | 34.5 | 76 | 14 | 361 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0c5d5e7d1e0dbea0_1bbd27d6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
null
] | [
11
] | [
42
] | |
2024-11-18T20:31:26.998502+00:00 | 1,523,006,705,000 | 5c5702aae0b3e5c8f28079281e8689aa9f14eaf8 | 3 | {
"blob_id": "5c5702aae0b3e5c8f28079281e8689aa9f14eaf8",
"branch_name": "refs/heads/master",
"committer_date": 1523006705000,
"content_id": "8e8676aca9c6a9d5aac64edda915aa205a92d9ad",
"detected_licenses": [
"Unlicense"
],
"directory_id": "5f9746cd0f51e9db36200cfdfc30770f34d6801e",
"extension": "py",... | 2.78125 | stackv2 | from flask import Flask, request, Response
app = Flask('mini-amazon')
@app.route('/health', methods=['GET'])
def health():
return 'healthy'
@app.route('/', methods=['GET'])
def index():
return "<h1>Welcome to Mini Amazon</h1>"
@app.route('/say-hello/<name>')
def say_hello(name):
return '<h1>Hello, {0}... | 31 | 21.55 | 56 | 9 | 185 | python | [{"finding_id": "codeql_py/flask-debug_9638e34c89a689ce_67ef2bdf", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
31,
17
] | [
null,
null
] | [
5,
12
] | [
51,
47
] | |
2024-11-18T20:31:31.685020+00:00 | 1,612,265,071,000 | 8937cb23599e7691fbb0292b0cd550d913c21d01 | 2 | {
"blob_id": "8937cb23599e7691fbb0292b0cd550d913c21d01",
"branch_name": "refs/heads/master",
"committer_date": 1612265071000,
"content_id": "e46e716183a7653797ba2571951988d048efc7e3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ff0ca8bdaca92f6b7e137114abbcbfe2a8e34a05",
"extension": "py"... | 2.3125 | stackv2 | # Copyright 2020 IBM Corp.
# SPDX-License-Identifier: Apache-2.0
"""
The server of the secret-provider app.
"""
import os
import logging
import hcl
from flask import Flask
from flask import Response
from flask import request
from flask import json
import util
import argparse
import sys
app = Flask(__name__)
def conf... | 145 | 39.99 | 153 | 15 | 1,346 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c0caf9a6eb44c3f4_8d2c2ccd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 11 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided val... | [
91,
98,
129,
78,
90,
91,
92,
117,
128,
129,
130
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
39,
37,
39,
19,
31,
39,
32,
19,
31,
39,
32
] | [
55,
52,
55,
36,
39,
55,
41,
36,
39,
55,
41
] | |
2024-11-18T20:31:35.412846+00:00 | 1,497,918,713,000 | b892723f224eccc723e506a044d2cdda28160e0f | 3 | {
"blob_id": "b892723f224eccc723e506a044d2cdda28160e0f",
"branch_name": "refs/heads/master",
"committer_date": 1497918713000,
"content_id": "301d4b6b24a4ea01c0215ce3636c8d2c3c26bfde",
"detected_licenses": [
"MIT"
],
"directory_id": "c46b7d428c9380bd56a2a86992e0fc15faf24df2",
"extension": "py",
"fi... | 3.28125 | stackv2 | #!/usr/bin/env python
"""
Author: Hank Preston <hank.preston@gmail.com>
Date: March 26, 2017
GitHub: http://github.com/hpreston/haciendo_aio
Lab: http://github.com/hpreston/haciendo_lab
Haciendo is a simple application built as a fun demonstration
and lab exercise for application refactoring.
The point of the lab is ... | 179 | 30.08 | 134 | 14 | 1,242 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c703624970b48ca4_2487e042", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-215"
] | [
"py/clear-text-logging-sensitive-data",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
114,
179
] | [
null,
null
] | [
15,
5
] | [
22,
55
] | |
2024-11-18T20:59:44.849808+00:00 | 1,462,799,580,000 | 2e08d325c9150a445c453f14a0204a9c92dc2611 | 3 | {
"blob_id": "2e08d325c9150a445c453f14a0204a9c92dc2611",
"branch_name": "refs/heads/master",
"committer_date": 1462799580000,
"content_id": "7eccec08df91e21e38311f313c6b3e276f35adf3",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "fa7ce71707bc9984add8d8ce9b453f9f698e9087",
"extension": "p... | 2.59375 | stackv2 | from flask import Flask, render_template
import json
app = Flask(__name__)
@app.route('/')
def index():
return render_template('index.html')
@app.route('/tasks', methods=['GET'])
def list_tasks():
tasks = [{'id': 1, 'name': 'Task 1'}, {'id': 2, 'name': 'Task 2'}, {'id': 3, 'name': 'Task 3'}]
return jso... | 43 | 20.7 | 99 | 11 | 265 | python | [{"finding_id": "codeql_py/reflective-xss_fb4e778f9211ec73_2ddb9e90", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
21,
33,
38
] | [
null,
null,
null
] | [
12,
12,
12
] | [
28,
28,
39
] | |
2024-11-18T21:00:02.142350+00:00 | 1,603,836,333,000 | 8d204b86bd3f1aca90b06832385bd497af72e2f9 | 3 | {
"blob_id": "8d204b86bd3f1aca90b06832385bd497af72e2f9",
"branch_name": "refs/heads/main",
"committer_date": 1603836333000,
"content_id": "886d8e6f558cf33e70b35da3ee9d635191534bf4",
"detected_licenses": [
"MIT"
],
"directory_id": "38562596a441c42d687a4fb9eb0acdb0b0a225d9",
"extension": "py",
"file... | 2.84375 | stackv2 | import json
import plotly
import pandas as pd
import pickle
import re
from nltk.stem import WordNetLemmatizer
from nltk.tokenize import word_tokenize
from flask import Flask
from flask import render_template, request, jsonify
from plotly.graph_objs import Bar
from sqlalchemy import create_engine
app = Flask(__name_... | 150 | 25.35 | 92 | 16 | 895 | python | [{"finding_id": "codeql_py/overly-large-range_c7f6f1942f7d860e_ea07305a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 2 | true | [
"CWE-020",
"CWE-215"
] | [
"py/overly-large-range",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
18,
146
] | [
null,
null
] | [
44,
5
] | [
47,
35
] | |
2024-11-18T21:10:50.382811+00:00 | 1,482,181,609,000 | b2ea3d86e9967372985157572a208cc83434f9c6 | 3 | {
"blob_id": "b2ea3d86e9967372985157572a208cc83434f9c6",
"branch_name": "refs/heads/master",
"committer_date": 1482181609000,
"content_id": "1b3cd7b712080365ceda09cac19da75af0f290d4",
"detected_licenses": [
"MIT"
],
"directory_id": "cd7235651509ce328f282ec96becd5e472a953f1",
"extension": "py",
"fi... | 2.75 | stackv2 | from __future__ import print_function
import boto3
from botocore.exceptions import ClientError
from operator import itemgetter
class Survivor:
survivors_table = boto3.resource('dynamodb').Table('Survivors')
def __init__(self, phone_number=None):
# Construct from Dynamo if user exists, set propert... | 44 | 34.59 | 98 | 18 | 313 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bbf07c7fea501325_9cdac12a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
38
] | [
null
] | [
15
] | [
56
] | |
2024-11-18T21:10:52.647633+00:00 | 1,632,379,341,000 | 6efbbf9e3bce3adc4fbc16853fb280de816750ad | 2 | {
"blob_id": "6efbbf9e3bce3adc4fbc16853fb280de816750ad",
"branch_name": "refs/heads/main",
"committer_date": 1632379341000,
"content_id": "785bb84255ccfb2ad5ca4eb0e6b7dbb761e2c3e8",
"detected_licenses": [
"MIT"
],
"directory_id": "21ad3a9fc248bbab6816dbad3ca17614a5c633ad",
"extension": "py",
"file... | 2.3125 | stackv2 | from datetime import datetime
# import config
import json
import pymongo
import requests
import plotly
from urllib3.exceptions import ProtocolError
import json
import matplotlib.pyplot as plt
import numpy as np
import pandas as pd
import string
import nltk
import re
from nltk.corpus import stopwords
from nltk.stem... | 260 | 32.9 | 171 | 19 | 2,330 | python | [{"finding_id": "codeql_py/command-line-injection_ec5c6bd3c83ffd8f_589f87d8", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 2 | true | [
"CWE-078",
"CWE-215"
] | [
"py/command-line-injection",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
105,
240
] | [
106,
null
] | [
14,
5
] | [
53,
44
] | |
2024-11-18T21:23:39.379030+00:00 | 1,619,075,440,000 | 40cf971f58fec0d8ed1ab806eac02835beb1b90f | 3 | {
"blob_id": "40cf971f58fec0d8ed1ab806eac02835beb1b90f",
"branch_name": "refs/heads/master",
"committer_date": 1619075440000,
"content_id": "f39e2c8cb41286cb59b9f17a516427997013090a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1623e8fa7c525d5a3eb924a71824f22acf0235cc",
"extension": "py"... | 2.765625 | stackv2 | #!/usr/local/bin/python
###################################################
#Inputs:
#1) a single seed
#2) a uuid
#Outputs:
#1) url_list.txt - a list of images that are retrieved from Flickr
import os, sys, json, flickrapi, codecs
#=================================================
def callTheApi(api_key, seed, pe... | 85 | 33.94 | 101 | 20 | 792 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d07a02635088a266_b986472d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
64
] | [
null
] | [
12
] | [
101
] | |
2024-11-18T21:24:01.191214+00:00 | 1,474,483,766,000 | b838ef0d67c0d50401bbc92ec5fb2e3ba9870bea | 3 | {
"blob_id": "b838ef0d67c0d50401bbc92ec5fb2e3ba9870bea",
"branch_name": "refs/heads/master",
"committer_date": 1474483766000,
"content_id": "9e157c5f6c7fc9b8b9ce7002654deabe79900a2f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5ccd50ab4b96f736d5e02c2ab4380ca8f47f4b3b",
"extension": "py"... | 2.578125 | stackv2 | #
# Copyright (c) SAS Institute Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in w... | 135 | 31.36 | 76 | 15 | 924 | python | [{"finding_id": "codeql_py/overly-permissive-file_79984163132678ac_58e00ab6", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
112
] | [
null
] | [
9
] | [
36
] | |
2024-11-18T21:24:02.900848+00:00 | 1,599,849,251,000 | 7e7041cfae30c257bc360564febad15d89ae31ce | 3 | {
"blob_id": "7e7041cfae30c257bc360564febad15d89ae31ce",
"branch_name": "refs/heads/master",
"committer_date": 1599849251000,
"content_id": "a5eea8425b6e9ea78f82b6b636327e983722971c",
"detected_licenses": [
"MIT"
],
"directory_id": "b227729a494ae5c2c9bfd6248476999874d66731",
"extension": "py",
"fi... | 2.734375 | stackv2 | #!/usr/bin/env python
import json
import logging
import os
import sys
import time
import traceback
from itertools import cycle
import coloredlogs
import pandas as pd
import populartimes
from sqlalchemy import create_engine
from sqlalchemy.orm import sessionmaker
from config import API_KEY_FILE, DB_DIR, PLACE_ID_FILE... | 129 | 27.83 | 105 | 18 | 807 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f7f9e872d31c50c8_0a136757", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
54
] | [
null
] | [
9
] | [
83
] | |
2024-11-18T21:37:25.505540+00:00 | 1,594,853,748,000 | c63e74a9b5320dedbb651c135e3f112cba4ea801 | 3 | {
"blob_id": "c63e74a9b5320dedbb651c135e3f112cba4ea801",
"branch_name": "refs/heads/master",
"committer_date": 1594853748000,
"content_id": "8e813ee501bde541895851065f5b9373c11ef32a",
"detected_licenses": [
"MIT"
],
"directory_id": "826aacddc06141dc2c7a65579d32e4cd835ce898",
"extension": "py",
"fi... | 3.234375 | stackv2 | """
How was working with MongoDB different from working with PostgreSQL?
Working with MongoDB was harder because of the diferent syntax than what I'm used to.
Moreover, it has more freedom for loading data. Which could be a good thing, but also adds more changes for human error.
I'll research different use cases f... | 67 | 29.91 | 121 | 10 | 480 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_59a4910a26d0fc14_48202a93", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
30
] | [
null
] | [
15
] | [
29
] | |
2024-11-18T21:37:41.758003+00:00 | 1,689,708,333,000 | 82fa2b2b08f237ca38bd26ddb61e0db8243441dd | 2 | {
"blob_id": "82fa2b2b08f237ca38bd26ddb61e0db8243441dd",
"branch_name": "refs/heads/master",
"committer_date": 1689708333000,
"content_id": "2065f7330fe046061cc32ecd1d3969dd740c1aa9",
"detected_licenses": [
"MIT"
],
"directory_id": "57e194db1420fea5675d3e9920cdd5dd7ba326bc",
"extension": "py",
"fi... | 2.328125 | stackv2 | import sys
import uuid
import traceback
import redis
import pymysql
from wsgiref.simple_server import make_server
from pyramid.config import Configurator
from pyramid.response import Response
import platformshconfig
pshconfig = platformshconfig.Config()
def hello_world(request):
tests = {
"database":... | 81 | 21.72 | 77 | 15 | 420 | python | [{"finding_id": "codeql_py/stack-trace-exposure_fda397e26425b2e7_9e83394c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
24
] | [
null
] | [
21
] | [
31
] | |
2024-11-18T21:37:42.325347+00:00 | 1,562,372,697,000 | c307b2570f1c129f8e66b77cb20879c4bc1a6d71 | 3 | {
"blob_id": "c307b2570f1c129f8e66b77cb20879c4bc1a6d71",
"branch_name": "refs/heads/master",
"committer_date": 1562372697000,
"content_id": "bfd4a79f5765344bd2eac6d349b93fe2040d80f2",
"detected_licenses": [
"MIT"
],
"directory_id": "cb29e3b6d2ece31c30187d66587eedc455dc81fc",
"extension": "py",
"fi... | 2.703125 | stackv2 | import os
import pandas as pd
from sqlalchemy import create_engine, inspect, Table, Column
from sys import exit
class MysqlClient:
def __init__(
self,
user,
password,
hostname,
):
self.db_url = 'mysql+mysqlconnector://{user}:{password}@{hostname}'.format(
u... | 47 | 23.85 | 83 | 14 | 271 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_909b62449094bf4d_b7d7cb92", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
21
] | [
null
] | [
15
] | [
26
] | |
2024-11-18T21:37:52.965886+00:00 | 1,675,179,010,000 | ba913add80507d7b775c17824de510c8c0392782 | 3 | {
"blob_id": "ba913add80507d7b775c17824de510c8c0392782",
"branch_name": "refs/heads/master",
"committer_date": 1675179010000,
"content_id": "b0d72ac81e593bc036f34b191af5caf2f7e04e60",
"detected_licenses": [
"Zlib"
],
"directory_id": "2bbc4c0f576759b488ee5cc875e517e0702ccc75",
"extension": "py",
"f... | 2.515625 | stackv2 | #!/usr/bin/python3
import argparse
from collections import defaultdict
from datetime import datetime
import os
import parse
import re
import subprocess
import sys
import tarfile
import time
import yaml
def error(msg):
print(msg)
sys.exit(-1)
def timestamp():
return '{}'.format(int(time.time()))
def _... | 261 | 29.36 | 153 | 19 | 1,931 | python | [{"finding_id": "codeql_py/tarslip_739d37e80f53de79_f7bd58cd", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
138
] | [
null
] | [
9
] | [
10
] | |
2024-11-18T21:59:01.506662+00:00 | 1,587,248,636,000 | f4206152aa73e1151f16000d635dbec7891815cd | 3 | {
"blob_id": "f4206152aa73e1151f16000d635dbec7891815cd",
"branch_name": "refs/heads/master",
"committer_date": 1587248636000,
"content_id": "866fe71e5df2a0341a3273530249145486fd0928",
"detected_licenses": [
"MIT"
],
"directory_id": "c157983c80227348e78073ced29299fa675282d3",
"extension": "py",
"fi... | 3.125 | stackv2 | import pandas as pd
import numpy as np
class DataProcessing:
def __init__(self):
self.file = pd.read_csv("anime.csv")
self.test = pd.read_csv("teste.csv")
@staticmethod
def amplitute(first, last, sturges_size=5):
return (last - first) / sturges_size
@staticmethod
def max... | 171 | 37.71 | 120 | 21 | 1,705 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_308484f93e7fa00d_b4431f48", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
164
] | [
null
] | [
34
] | [
35
] | |
2024-11-18T21:59:22.857593+00:00 | 1,607,697,298,000 | a4c6b8287dd0db6c2cdc22d33f5af7de3aac78c3 | 2 | {
"blob_id": "a4c6b8287dd0db6c2cdc22d33f5af7de3aac78c3",
"branch_name": "refs/heads/master",
"committer_date": 1607697298000,
"content_id": "a42db8a445e1f0bc592c92b887ee2ccad431f4a9",
"detected_licenses": [
"MIT"
],
"directory_id": "75c04b5e59d153f5096adbc91b0cf8fe10c5bd72",
"extension": "py",
"fi... | 2.421875 | stackv2 | import re
import json
import logging
import requests
from requests.adapters import HTTPAdapter
from requests.packages.urllib3.util.retry import Retry
from salesmanago_python_api.data.auth import SalesManagoAuthData
from salesmanago_python_api.data.event import SalesManagoEventData
logger = logging.getLogger(__name__)... | 209 | 32.73 | 160 | 16 | 1,459 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b0d0af1913a15fa0_40333e6e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
40
] | [
46
] | [
22
] | [
11
] | |
2024-11-18T21:59:28.552728+00:00 | 1,437,726,491,000 | 884066f488e7691d9328f5c5f82275eb65666001 | 3 | {
"blob_id": "884066f488e7691d9328f5c5f82275eb65666001",
"branch_name": "refs/heads/master",
"committer_date": 1437726491000,
"content_id": "f19c0dcb9df5da52fab1424123baab43dcccc5e9",
"detected_licenses": [
"MIT"
],
"directory_id": "9353be31afcac458035c0208d4ce2c9777c44bc8",
"extension": "py",
"fi... | 2.65625 | stackv2 | #!/usr/bin/python
#
# grab an entire folder of nessus scans
# in .nessus format and dump them in the directory
#
# useful for when you had to do fifty scans for some ungodly reason
#
# note that this only grabs the most recent scan, it doesn't care about scan history
#
# written by ak of Asterisk Information Security
... | 122 | 38.59 | 128 | 20 | 1,115 | python | [{"finding_id": "codeql_py/request-without-cert-validation_2e7030d77d1de2cf_341c205a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 6 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
91,
95,
99,
104,
106,
118
] | [
null,
null,
null,
null,
null,
null
] | [
9,
9,
13,
21,
23,
9
] | [
67,
91,
103,
108,
129,
71
] | |
2024-11-18T22:11:29.005803+00:00 | 1,555,278,251,000 | 493eb408ade703bd7e0528e7825dbfb263241e3d | 2 | {
"blob_id": "493eb408ade703bd7e0528e7825dbfb263241e3d",
"branch_name": "refs/heads/master",
"committer_date": 1555278251000,
"content_id": "9181f1442647f2be5404fb8c4efdde2ccad753b5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b5691a7337eec35a20ac3e72329a23d055aadde9",
"extension": "py"... | 2.359375 | stackv2 | # coding: utf-8
"""
Utility for livedoor corpus test
```
cd <repository root>
python src/ld_fetch_data.py
```
-h option to see detail
"""
import sys
import os
import glob
import argparse
import configparser
import subprocess
import tarfile
import tempfile
from urllib.request import urlretrieve
import json
import ... | 352 | 32.39 | 125 | 20 | 2,652 | python | [{"finding_id": "codeql_py/tarslip_377e8b424d0ea723_614fc1a6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
63
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T22:11:50.624893+00:00 | 1,430,322,536,000 | beaa49e40c4a4b11c6702bb734ec962272a17ca7 | 2 | {
"blob_id": "beaa49e40c4a4b11c6702bb734ec962272a17ca7",
"branch_name": "refs/heads/master",
"committer_date": 1430322536000,
"content_id": "a39e043d5c7f6fdd001e260aa5bf45b5c9dc2ebd",
"detected_licenses": [
"MIT"
],
"directory_id": "fea93d46675bbf7af108db2e23645fa8861e6321",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
from bson.objectid import ObjectId
from pymongo import MongoClient
from validate_email import validate_email
from views.base import base
import config
import hashlib
class login():
@property
def db(self):
if config.debug == True:
client = MongoClient('localhost', ... | 100 | 23.18 | 102 | 20 | 683 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_a80b50c08fd77a97_66b79bdf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
86
] | [
null
] | [
27
] | [
43
] | |
2024-11-18T22:11:51.526927+00:00 | 1,657,908,305,000 | 8f5223b97dc85650cfac2628b9da259206dc0454 | 3 | {
"blob_id": "8f5223b97dc85650cfac2628b9da259206dc0454",
"branch_name": "refs/heads/master",
"committer_date": 1657908305000,
"content_id": "8267f75f037c7c4212a6f03c7dbe0cd05061ddbd",
"detected_licenses": [
"MIT"
],
"directory_id": "ed81f401dcd2ce0399cec3a99b6e5851e62e74ca",
"extension": "py",
"fi... | 2.53125 | stackv2 | import os
import os.path
import sys
from .common import *
def max_samples_per_repositories(dataset, max_samples):
samples_per_repo = {}
for path in dataset.data["files"].keys():
if not path.startswith("github.com/"):
continue
repo = "/".join(path.split("/")[1:3])
samples_p... | 89 | 29.38 | 87 | 15 | 623 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_aca7ee07f4fced80_fa1bc35e", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com/](1) may be at an arbitrary position in the... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [github.com/](1) may be at an arbitrary position in the sanitized URL."
] | [
11
] | [
null
] | [
16
] | [
46
] | |
2024-11-18T22:11:53.904041+00:00 | 1,619,453,032,000 | 8d8a94ef4e721a3f58d8a36cab6de9a82ab1c214 | 2 | {
"blob_id": "8d8a94ef4e721a3f58d8a36cab6de9a82ab1c214",
"branch_name": "refs/heads/main",
"committer_date": 1619453032000,
"content_id": "80b90d09748b9c769f3cfa7393ab9002d3a4957c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "710cbf6248a5d51bdb7e9e947f512f11f3b600af",
"extension": "py",
... | 2.34375 | stackv2 | from app.calculator import calc # 获取蓝图
from flask import request,session,render_template,flash,redirect,url_for
@calc.route('/calc_info', methods=['GET', 'POST']) # 设置路由
def calc_info(): # 执行的方法
result = None
if request.method == 'POST':
expression = request.form['expression']
print("resul... | 20 | 25.45 | 72 | 14 | 136 | python | [{"finding_id": "codeql_py/code-injection_e349321f44551746_5f5146a4", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 2 | true | [
"CWE-094",
"CWE-094"
] | [
"py/code-injection",
"py/code-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1).",
"This code execution depends on a [user-provided value](1)."
] | [
11,
12
] | [
null,
null
] | [
39,
23
] | [
49,
33
] | |
2024-11-18T22:11:56.390831+00:00 | 1,684,008,120,000 | ba78de613e91618be86a29ddb5e5b2669d0f0100 | 3 | {
"blob_id": "ba78de613e91618be86a29ddb5e5b2669d0f0100",
"branch_name": "refs/heads/master",
"committer_date": 1684008120000,
"content_id": "a2c87bb9cec1ead5fca20a191864c8cfa247ce76",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "e5c73897fb5c0f97cd6380645d433f0af374b6b5",
"extension": "p... | 2.59375 | stackv2 | """`backup` management command.
Backs up the database and media files.
"""
import os
import shutil
import time
import tempfile
from datetime import datetime
from django.core.exceptions import ImproperlyConfigured
from django.core.management.base import BaseCommand, CommandError, CommandParser
from django.conf import s... | 227 | 37.06 | 97 | 15 | 1,968 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f8a9753315f2cb4c_a126ba0f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
19
] | [
null
] | [
15
] | [
19
] | |
2024-11-18T22:24:11.808092+00:00 | 1,634,245,009,000 | 69fdffd6a4a353ef8252bfaf87f13fd4317ff0d0 | 3 | {
"blob_id": "69fdffd6a4a353ef8252bfaf87f13fd4317ff0d0",
"branch_name": "refs/heads/master",
"committer_date": 1634245009000,
"content_id": "2f1b1c3919e4a675705ff86b61ad38b8d79e7005",
"detected_licenses": [
"MIT"
],
"directory_id": "b1d718f1b364fc256062e6975a831bca56e99473",
"extension": "py",
"fi... | 3.375 | stackv2 | #!/usr/bin/env python3
from pprint import pprint
import contextlib
import datetime
import pytz
import requests
import sqlite3
API_KEY = os.environ.get(OPENWEATHERAPI)
def main():
weather = api_call()
cli_display(weather)
timestamp = datetime_helper(weather)
create_db()
insert_data(weather, time... | 120 | 27.44 | 87 | 13 | 801 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f09b8707dba4d169_d60928b9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
49,
50,
51,
52
] | [
null,
null,
null,
null
] | [
11,
11,
11,
11
] | [
58,
67,
67,
51
] | |
2024-11-18T22:24:26.015342+00:00 | 1,646,841,742,000 | e1f04e68c6ea62522776226e38ad29236f9a40fa | 3 | {
"blob_id": "e1f04e68c6ea62522776226e38ad29236f9a40fa",
"branch_name": "refs/heads/master",
"committer_date": 1646841742000,
"content_id": "a2d8d3cf6c903b0da00be6ab6f53bbe61260c9a0",
"detected_licenses": [
"MIT"
],
"directory_id": "bf8fbff494eaaf8046a41d676d553d4e8144ddeb",
"extension": "py",
"fi... | 3.15625 | stackv2 | """
Given the name of a server, mark (or unmark) it as favourite, store its password.
"""
# Python 3
import tkinter as tk
from tkinter import ttk
############################
# The Editor's public class:
############################
class Editor:
def __init__(self, parentFrame, serverName, favourite, password):
... | 108 | 30.65 | 85 | 12 | 845 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a143bc9f5bbb99e5_7061f989", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
73
] | [
null
] | [
15
] | [
39
] | |
2024-11-18T22:36:03.281698+00:00 | 1,625,632,966,000 | 77f9d3d6ea97b693696c511e07e548a15705f372 | 3 | {
"blob_id": "77f9d3d6ea97b693696c511e07e548a15705f372",
"branch_name": "refs/heads/main",
"committer_date": 1625632966000,
"content_id": "c1b7335afe6d2b17c5ce1145ad72173066c38b6e",
"detected_licenses": [
"MIT"
],
"directory_id": "6c166c5abf3b0a6e1b4641289c5b4b725c90c5d4",
"extension": "py",
"file... | 2.859375 | stackv2 | from secrets import API_KEY, CLIENT_ID, CLIENT_SECRET
import pandas as pd
import requests
url = "https://www.googleapis.com/youtube/v3/search"
def call_youtube():
results = []
ragas = list_ragas()
for raga in ragas:
params = {
"part": "snippet",
"maxResults": 100,
... | 64 | 24.84 | 68 | 15 | 431 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fdaa62cc35fb4598_12a20b24", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
23
] | [
null
] | [
19
] | [
27
] | |
2024-11-18T22:36:33.329365+00:00 | 1,626,409,956,000 | b5843057bcc4344d4ac5e424f78d0fb6c8de1bc1 | 3 | {
"blob_id": "b5843057bcc4344d4ac5e424f78d0fb6c8de1bc1",
"branch_name": "refs/heads/main",
"committer_date": 1626409956000,
"content_id": "040211c81c426602ef319db92931164841e7d39e",
"detected_licenses": [
"MIT"
],
"directory_id": "7e7dc2d7293ad07866fef3be3c6a3dd5f9c1a5bc",
"extension": "py",
"file... | 2.8125 | stackv2 | #This program reads tweets made within a week and scans it to categorize as a positive or negative opinion.
#In the cryptocurrency world, the Fear vs Greed index is one way of analysing if an asset will increase or decrease.
#This program tries to do that index.
from os import truncate
from datetime import date, timed... | 114 | 49.11 | 125 | 11 | 1,638 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e0de624508115a53_7d0e462f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
63,
64,
66
] | [
null,
null,
null
] | [
25,
25,
32
] | [
32,
35,
50
] | |
2024-11-18T20:23:15.013337+00:00 | 1,653,788,651,000 | cb754b8e4f0d8ff9168ad6a49b65fd674b29ff4d | 2 | {
"blob_id": "cb754b8e4f0d8ff9168ad6a49b65fd674b29ff4d",
"branch_name": "refs/heads/master",
"committer_date": 1653788651000,
"content_id": "9808ecb3de324d60937d73406efda0a5515d14ea",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b1c3cc247eee420bd89a79b57e1d59ac04dcbd47",
"extension": "py"... | 2.484375 | stackv2 | import socket
import uuid
from halocoin.ntwrk.message import Message
from halocoin.ntwrk.response import Response
MAX_MESSAGE_SIZE = 1024
def receive(sock, **kwargs):
"""
Receives a socket message one time. This is not a SMP message.
:param sock: Socket
:param kwargs:
:return:
"""
args ... | 121 | 26.8 | 98 | 16 | 761 | python | [{"finding_id": "codeql_py/insecure-default-protocol_1719e533855e79d2_709f6ea7", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
86
] | [
null
] | [
13
] | [
43
] | |
2024-11-18T20:23:22.484969+00:00 | 1,589,574,610,000 | 77cf4474abf28dbd710078e106c8cebf807e80f3 | 3 | {
"blob_id": "77cf4474abf28dbd710078e106c8cebf807e80f3",
"branch_name": "refs/heads/master",
"committer_date": 1589574610000,
"content_id": "9f5427e6226097648e0a39e4226bc3b7328cebbc",
"detected_licenses": [
"MIT"
],
"directory_id": "c5c4e4ee5a0733af1550cc0b92fcb43dda73b33a",
"extension": "py",
"fi... | 2.703125 | stackv2 | import requests
import json
import ast
import joblib
from flask import Flask, request, jsonify
import traceback
import pandas as pd
import numpy as np
# defining the api-endpoint
XGBOOST_API_ENDPOINT = "http://127.0.0.1:12345/xgboost_api"
DATABASE_API_ENDPOINT = "http://127.0.0.1:12346/database_api"
FEATURE_API_EN... | 81 | 32.48 | 108 | 21 | 692 | python | [{"finding_id": "codeql_py/stack-trace-exposure_fbbab6b357530f33_535e859c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
62,
81
] | [
null,
null
] | [
19,
2
] | [
52,
32
] | |
2024-11-18T21:22:21.613397+00:00 | 1,659,864,747,000 | 84e712706e41d2ab79868c8bbca7131277a37bf3 | 4 | {
"blob_id": "84e712706e41d2ab79868c8bbca7131277a37bf3",
"branch_name": "refs/heads/master",
"committer_date": 1659864747000,
"content_id": "d7966ce6c84da7c98269bf10988150922cb8307b",
"detected_licenses": [
"MIT"
],
"directory_id": "d1ed14daed2b2ebc0f7f7e5810f0715a57ac30c4",
"extension": "py",
"fi... | 3.828125 | stackv2 | class Employee:
number_of_employees = 0
raise_amount = 1.04
def __init__(self, first, last, pay): ## self is the instance here
self.first = first
self.last = last
self.pay = pay
self.email = first + "." + last + "@company.com"
Employee.number_of_employees += 1
... | 28 | 24.71 | 71 | 12 | 190 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fd331896e4084ba7_dc1df445", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
23,
28
] | [
null,
null
] | [
7,
7
] | [
35,
35
] | |
2024-11-18T21:22:47.642741+00:00 | 1,558,784,711,000 | 1866c8ee95ee25ec8d1156a9dd664678ef6fbd60 | 2 | {
"blob_id": "1866c8ee95ee25ec8d1156a9dd664678ef6fbd60",
"branch_name": "refs/heads/master",
"committer_date": 1558784711000,
"content_id": "b6e1c86e5b76b161595912a88f5dc0c3bc9d2c83",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "d61d05748a59a1a73bbf3c39dd2c1a52d649d6e3",
"extension": "p... | 2.484375 | stackv2 | #!/usr/bin/python
# Copyright (c) 2012 The Chromium Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
"""Utilities for formatting and writing DEPS files."""
from __future__ import print_function
from builtins import str
from builtins im... | 271 | 34.41 | 79 | 18 | 2,494 | python | [{"finding_id": "codeql_py/overly-permissive-file_1ba673a05f1c6694_6918e956", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to group writable."
] | [
264
] | [
null
] | [
5
] | [
26
] | |
2024-11-18T21:51:29.751526+00:00 | 1,612,193,208,000 | d4a82075303b1f6a7d348b5b85c25b675e87812d | 2 | {
"blob_id": "d4a82075303b1f6a7d348b5b85c25b675e87812d",
"branch_name": "refs/heads/main",
"committer_date": 1612193208000,
"content_id": "8806f0d1ef2074d60636c10d9cc1eeec96794008",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c3f49d1bd74e84f02659bd72f9361f06605bfd74",
"extension": "py",
... | 2.5 | stackv2 | #!/usr/bin/env python3
"""Generate the dockerfiles from a jinja template."""
from jinja2 import Environment, FileSystemLoader
from settings import templates
from settings import images
import logging
log = logging.getLogger(__name__)
def generate(log):
"""Generate the dockerfiles for this repo."""
file_loade... | 49 | 32.82 | 71 | 14 | 343 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_36eea66d00d22a67_d6a505a6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
14
] | [
null
] | [
11
] | [
42
] | |
2024-11-18T21:51:37.936267+00:00 | 1,615,546,359,000 | c930d464a022ec92e4e5dfe09f8a1879014045ab | 3 | {
"blob_id": "c930d464a022ec92e4e5dfe09f8a1879014045ab",
"branch_name": "refs/heads/main",
"committer_date": 1615546359000,
"content_id": "26a24c04bd18cbddb42e8c1c2f4b7e00c4364d54",
"detected_licenses": [
"MIT"
],
"directory_id": "599cd9067d0c9795a943fec0c75dc0a40c8a5f31",
"extension": "py",
"file... | 2.953125 | stackv2 | from flask import Flask, request, Response
import sudoku
import generator
app = Flask(__name__)
@app.route("/solve", methods=["POST"])
def solve():
payload = request.get_json()
if (not payload) or ("board" not in payload):
return Response("You must provide sudoku board in request", 400)
board_... | 55 | 21.76 | 72 | 11 | 285 | python | [{"finding_id": "codeql_py/flask-debug_7fb0f1eace68578e_b3b2b011", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
55,
29
] | [
null,
null
] | [
5,
12
] | [
24,
20
] | |
2024-11-18T21:51:46.847102+00:00 | 1,611,591,215,000 | 3b7378e177dae2ba60127640ecb5fa8c2219e605 | 3 | {
"blob_id": "3b7378e177dae2ba60127640ecb5fa8c2219e605",
"branch_name": "refs/heads/main",
"committer_date": 1611591215000,
"content_id": "e8aa39feb6fea24e6229c7cafb2a1a03c336e1a1",
"detected_licenses": [
"MIT"
],
"directory_id": "f1ec7a7987325b58bc419681e5000016d564a681",
"extension": "py",
"file... | 2.546875 | stackv2 | from rest_framework.views import APIView
from rest_framework import status
from rest_framework.response import Response
from rest_framework.parsers import JSONParser
from rest_framework.permissions import AllowAny
from django.contrib.auth.models import User
# Create your views here.
class Register(APIView):
permi... | 53 | 27.42 | 62 | 16 | 276 | python | [{"finding_id": "codeql_py/stack-trace-exposure_f27291b2488d2d38_572cb266", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
39
] | [
42
] | [
17
] | [
18
] | |
2024-11-18T21:51:50.108131+00:00 | 1,630,213,982,000 | 0468cd8c267713643a2f15abf5e474efc2baa787 | 2 | {
"blob_id": "0468cd8c267713643a2f15abf5e474efc2baa787",
"branch_name": "refs/heads/main",
"committer_date": 1630213982000,
"content_id": "b56a00703ad68d5a3f4483c85543be175b75a14d",
"detected_licenses": [
"MIT"
],
"directory_id": "c446f5182efff1a6da580ce781eb36f58884af21",
"extension": "py",
"file... | 2.34375 | stackv2 | from fastapi import APIRouter
import requests
from conf.conf import OPENWEATHERMAP_API_KEY, url
greeting = APIRouter()
wheather = APIRouter()
@greeting.get('/greeting')
def helloWorld():
return "Hello, World"
@wheather.get('/wheather/{city}')
def getWheatherCity(city: str):
req = url.format(city, OPENWEATH... | 18 | 20.39 | 50 | 9 | 102 | python | [{"finding_id": "codeql_py/partial-ssrf_47337d7574517aff_4169959f", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
17
] | [
null
] | [
11
] | [
28
] | |
2024-11-18T22:02:40.143178+00:00 | 1,547,232,896,000 | 06a55d595f021e76ca1ed72cf7856a88174035ba | 4 | {
"blob_id": "06a55d595f021e76ca1ed72cf7856a88174035ba",
"branch_name": "refs/heads/master",
"committer_date": 1547232896000,
"content_id": "e066ee431545dc22d95b7674dcdad5cc7937c584",
"detected_licenses": [
"Unlicense"
],
"directory_id": "848499c69849968fb1aa7786ac245904a8dff591",
"extension": "py",... | 3.609375 | stackv2 | #!/usr/bin/env python3
'''
Vectorize text input data and create vocab file
'''
import os
import re
import numpy as np
class TextVec(object):
'''
TextVec Class
- Builds character map from unique alphabetical and whitespace characters in data
- Vectorizes an x and y with shapes determined by s... | 67 | 35.85 | 95 | 15 | 564 | python | [{"finding_id": "codeql_py/overly-large-range_70a63fc1597063f0_8043d202", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
39
] | [
null
] | [
34
] | [
37
] | |
2024-11-18T22:02:43.134923+00:00 | 1,620,960,753,000 | 4c619b5db9c004d5c214ef5288dd8add07f4ae0b | 3 | {
"blob_id": "4c619b5db9c004d5c214ef5288dd8add07f4ae0b",
"branch_name": "refs/heads/master",
"committer_date": 1620960753000,
"content_id": "9068a069e5d51fac1864c1ca6b683361b792e7b0",
"detected_licenses": [
"MIT"
],
"directory_id": "719b5faf078c8262af75ebe3c0ced626649593b0",
"extension": "py",
"fi... | 3.078125 | stackv2 | import datetime
import traceback
from example_models import Date, User, Name, Employee
if __name__ == '__main__':
item = {"year": 1985, "month": 4, "day": 3}
date = Date(item)
item = datetime.datetime(2017, 7, 20)
date = Date(item)
data = {
'favorite_color': None,
'favorite_numb... | 57 | 18.86 | 60 | 11 | 329 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7cac60ebbef079e4_c2499f7e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
57
] | [
null
] | [
11
] | [
19
] | |
2024-11-18T22:02:48.733076+00:00 | 1,600,430,308,000 | 1175330c1e2547d7ef8cc4aca1eabf551a573624 | 2 | {
"blob_id": "1175330c1e2547d7ef8cc4aca1eabf551a573624",
"branch_name": "refs/heads/master",
"committer_date": 1600430308000,
"content_id": "c3b16bfdb6d1ac9877a3f44d3e3f4bc35c6d130a",
"detected_licenses": [
"MIT"
],
"directory_id": "46bfdbfb1359057653a9859eeafb20692c1de3c9",
"extension": "py",
"fi... | 2.46875 | stackv2 | import hou
import glob, os, re
from stat import ST_MTIME
from datetime import datetime
def main():
# Get a filename of the most recent opened file
userPrefDir = hou.getenv('HOUDINI_USER_PREF_DIR')
historyPath = os.path.join(userPrefDir, 'file.history')
destPath = None
filename = None
if not o... | 79 | 29.18 | 104 | 18 | 634 | python | [{"finding_id": "codeql_py/redos_bf7d3fa6029e19cf_f45c6c47", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'HIP\\n{{\\n' and containing many ... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'HIP\\n{{\\n' and containing many repetitions of '\\n'."
] | [
20
] | [
null
] | [
50
] | [
53
] | |
2024-11-18T22:16:43.645588+00:00 | 1,539,102,958,000 | 3eea6d9b1bf398fd31e2bd29d60bf52ab124b151 | 3 | {
"blob_id": "3eea6d9b1bf398fd31e2bd29d60bf52ab124b151",
"branch_name": "refs/heads/master",
"committer_date": 1539102958000,
"content_id": "83a7381fefe107949c63c7b789c6e28274820e72",
"detected_licenses": [
"MIT"
],
"directory_id": "26e1e3392100f6fa9d5d849a6d09867c98708080",
"extension": "py",
"fi... | 2.6875 | stackv2 | import os
import pandas as pd
import tarfile
import matplotlib.pyplot as plt
import hashlib
import numpy as np
from six.moves import urllib
from sklearn.model_selection import StratifiedShuffleSplit
from sklearn.preprocessing import Imputer, LabelEncoder, OneHotEncoder, LabelBinarizer, StandardScaler
from sklearn.pipe... | 204 | 41.35 | 114 | 14 | 1,937 | python | [{"finding_id": "codeql_py/tarslip_bddaccfcd456dac8_08fa55a8", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
46
] | [
null
] | [
5
] | [
13
] | |
2024-11-18T22:16:45.220486+00:00 | 1,338,055,240,000 | 7ff9db901cf60eac826631a86a197c3b38bf6691 | 3 | {
"blob_id": "7ff9db901cf60eac826631a86a197c3b38bf6691",
"branch_name": "refs/heads/master",
"committer_date": 1338055240000,
"content_id": "87713cdbc92a180d744f085421ebf5c2ee033f47",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "21dd79918a9872de1ce5cbc0f12d38644f91aec2",
"extension": "p... | 3.078125 | stackv2 | # -*- coding: utf-8 -*-
"""Advanced string formatting for Python >= 2.4.
An implementation of the advanced string formatting (PEP 3101).
CAUTION: this module is a stripped version, without strict error checking.
Author: Florent Xicluna
"""
import re
if hasattr(str, 'partition'):
def partition(s, sep):
... | 227 | 31.62 | 79 | 17 | 1,928 | python | [{"finding_id": "codeql_py/redos_5e4f0cac75e51279_fa9081bb", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '{{z' and containing many repetiti... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '{{z' and containing many repetitions of 'z'."
] | [
28
] | [
null
] | [
19
] | [
26
] | |
2024-11-18T22:27:41.283222+00:00 | 1,587,017,928,000 | e71e00d9e6e4413805ecb3150c885f51445cd605 | 3 | {
"blob_id": "e71e00d9e6e4413805ecb3150c885f51445cd605",
"branch_name": "refs/heads/master",
"committer_date": 1587017928000,
"content_id": "5adb683e4d1eb66594d334b3f929753952272afd",
"detected_licenses": [
"MIT"
],
"directory_id": "7737adea4591e821611105f548d7807a3744cdb7",
"extension": "py",
"fi... | 2.859375 | stackv2 | from selenium import webdriver
import csv
import time
import configparser
driver = webdriver.Chrome()
driver.maximize_window()
driver.get('https://shub.edu.vn/login')
def start(username, password, class_code, test_number):
#Enter username
input_username = driver.find_element_by_xpath('//*[@id="__next"]/div/di... | 110 | 36.35 | 140 | 16 | 1,022 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_61e5bec93d357ca5_89accb83", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensi... | [
100,
101,
102,
103,
104,
105
] | [
null,
null,
null,
null,
null,
null
] | [
7,
7,
7,
7,
7,
7
] | [
31,
31,
35,
37,
37,
35
] | |
2024-11-18T22:44:11.324702+00:00 | 1,676,152,352,000 | 0bc88063241863d7466f52a939ca59b3169308f7 | 3 | {
"blob_id": "0bc88063241863d7466f52a939ca59b3169308f7",
"branch_name": "refs/heads/master",
"committer_date": 1676152352000,
"content_id": "226fd4aaebf036f06cbdea554156448193b55469",
"detected_licenses": [
"MIT"
],
"directory_id": "2305caeb1fd48344bd81de24ae912cc777147b99",
"extension": "py",
"fi... | 3.15625 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
'''
origin version:
https://www.freecodecamp.org/forum/t/make-a-script-read-gps-geolocation/241607
'''
import requests
import time
# Step 1) Find the public IP of the user. This is easier said that done, look into the library Netifaces if you're
# interested in getting... | 37 | 30.62 | 114 | 18 | 337 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_46062eb593cff1e3_0fa30bcd", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
31
] | [
null
] | [
17
] | [
23
] | |
2024-11-18T20:37:01.730370+00:00 | 1,601,387,321,000 | 1d7d37e58c96c39a2e29677271c8a316d78b9c21 | 3 | {
"blob_id": "1d7d37e58c96c39a2e29677271c8a316d78b9c21",
"branch_name": "refs/heads/master",
"committer_date": 1601387321000,
"content_id": "762644fb0b6b9070de322fdac9ac5c8ce25947ac",
"detected_licenses": [
"MIT"
],
"directory_id": "8d7b18da138d45acb96e02c6e166b5c8524a486a",
"extension": "py",
"fi... | 2.671875 | stackv2 | # !/usr/bin/env python3
# -*- coding:utf-8 -*-
###
# File: e:\code\python\spider\.vscode\music_spider\main.py
# Project: e:\code\python\spider\.vscode\music_spider
# Created Date: Saturday, September 12th 2020, 10:10:32 pm
# Author: rz
# -----
# Last Modified:
# Modified By:
# -----
# Copyright (c) 2020 rz WTI bupt
#
#... | 75 | 29 | 152 | 26 | 687 | python | [{"finding_id": "codeql_py/request-without-cert-validation_ece2445652e2c60f_65e64036", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
37
] | [
null
] | [
13
] | [
60
] | |
2024-11-18T20:59:43.792642+00:00 | 1,533,584,300,000 | dc15e41bbeabf623c709b9ef2dc0b24314842941 | 2 | {
"blob_id": "dc15e41bbeabf623c709b9ef2dc0b24314842941",
"branch_name": "refs/heads/master",
"committer_date": 1533584300000,
"content_id": "e0ccd0ba9b9e6ba6485f2c9ce2e1fb1110f15906",
"detected_licenses": [
"MIT"
],
"directory_id": "7112bbd7da20b80f5e1273d06fabfb53f403f971",
"extension": "py",
"fi... | 2.359375 | stackv2 | import tornado.ioloop
import tornado.web
import argparse
import os
import sys
currentpath = os.path.dirname(os.path.realpath(__file__))
project_basedir = os.path.join(currentpath,'..')
sys.path.append(project_basedir)
from config import conf
datadir = conf.distributed_datadir
parser = argparse.ArgumentParser(descrip... | 68 | 33.28 | 109 | 15 | 528 | python | [{"finding_id": "codeql_py/path-injection_f71d4a2eb57d428f_e95357e1", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
32,
49
] | [
null,
null
] | [
19,
19
] | [
45,
28
] | |
2024-11-18T21:00:41.436748+00:00 | 1,664,226,877,000 | e45c9f007c76c6a598a4caf8a6623d7c0571b06e | 2 | {
"blob_id": "e45c9f007c76c6a598a4caf8a6623d7c0571b06e",
"branch_name": "refs/heads/master",
"committer_date": 1664226877000,
"content_id": "6c2cd20bdf7e175cbc9b8de5c34cdb7e634b677e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "dd7d80666eb882ed36163ce888e2039ed077358b",
"extension": "py"... | 2.359375 | stackv2 | # Copyright 2018 Centrify Corporation
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in ... | 121 | 42.42 | 114 | 21 | 1,054 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fdf29b820e2f6719_9042a2c9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
49
] | [
50
] | [
19
] | [
72
] | |
2024-11-18T21:01:00.407158+00:00 | 1,619,536,686,000 | b326dbfc83c59956062561c2ebdc3a2b6d64cae1 | 3 | {
"blob_id": "b326dbfc83c59956062561c2ebdc3a2b6d64cae1",
"branch_name": "refs/heads/main",
"committer_date": 1619536686000,
"content_id": "1830ca815281b7bc0ef894090a629d9fd6f39e1f",
"detected_licenses": [
"MIT"
],
"directory_id": "68e4d7f470cc922e72cc3c195c62cd34a0e203b3",
"extension": "py",
"file... | 2.71875 | stackv2 | import requests
import jinja2
import json
import os
URLS = ['armLink', 'documentationLink', 'githubLink']
WORKDIR='widgets/'
'''
Writes a .md file to markdown/
'''
def write_widget(file_name, rendered_template):
with open(os.path.join(WORKDIR, f'markdown/{file_name}.md'), 'w') as file_object:
file_object.... | 97 | 32.03 | 123 | 22 | 751 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4943f03d4cb9561f_026c7b93", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
55
] | [
null
] | [
19
] | [
52
] | |
2024-11-18T21:01:02.224473+00:00 | 1,580,780,347,000 | 52c485cd0727f9c573266d24eb7baa74b3a37a2a | 2 | {
"blob_id": "52c485cd0727f9c573266d24eb7baa74b3a37a2a",
"branch_name": "refs/heads/master",
"committer_date": 1580780347000,
"content_id": "b283ef1503235575897ab972f15f5aaa537815d2",
"detected_licenses": [
"MIT"
],
"directory_id": "119185ec4ce8d13a48c0f4690a93fcdb7f88b8e7",
"extension": "py",
"fi... | 2.3125 | stackv2 | from flask import Blueprint, render_template, flash, redirect, \
url_for, request, Response
from flask_login import login_required, current_user
from .forms import UpdateAccountForm, UnlockCredentialStoreForm, \
EditCredentialsForm, DecryptCredentialStoreForm, EncryptCredentialStoreForm
from resticweb import bc... | 214 | 38.8 | 127 | 17 | 1,722 | python | [{"finding_id": "codeql_py/reflective-xss_17ffdb0c42dcb83b_7297222b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
69,
71
] | [
null,
null
] | [
16,
16
] | [
80,
83
] | |
2024-11-18T21:01:16.651022+00:00 | 1,575,657,963,000 | 66ec2ecd5d6809de570cf071423b57a71a5daff4 | 3 | {
"blob_id": "66ec2ecd5d6809de570cf071423b57a71a5daff4",
"branch_name": "refs/heads/master",
"committer_date": 1575657963000,
"content_id": "63b91975b6b489915dae6163c99d123649074740",
"detected_licenses": [
"MIT"
],
"directory_id": "49b8dad2cd5ef94e145c263998f731f5857dce39",
"extension": "py",
"fi... | 2.8125 | stackv2 | import re
import os
import random
import tarfile
import urllib
from torchtext import data
class TarDataset(data.Dataset):
"""Defines a Dataset loaded from a downloadable tar archive.
Attributes:
url: URL where the tar archive can be downloaded.
filename: Filename of the downloaded tar archive... | 129 | 38.49 | 99 | 19 | 1,185 | python | [{"finding_id": "codeql_py/tarslip_b26067580d506d3f_6bee1371", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
29
] | [
null
] | [
17
] | [
22
] | |
2024-11-18T21:01:17.489781+00:00 | 1,555,093,300,000 | 25af8ecb4a9e4a6269ad544aff55733e77f9ee03 | 2 | {
"blob_id": "25af8ecb4a9e4a6269ad544aff55733e77f9ee03",
"branch_name": "refs/heads/master",
"committer_date": 1555093300000,
"content_id": "7c0b8fba69704fffec1fde7a342891dc00f638cc",
"detected_licenses": [
"MIT"
],
"directory_id": "927285a80b2dd0503dca5a27fdbd0988501f3266",
"extension": "py",
"fi... | 2.375 | stackv2 | #! /usr/bin/env python
import argparse
import collections
import errno
import json
import logging
import os
import re
import socket
import subprocess
import sys
import BaseHTTPServer
import SimpleHTTPServer
def parse_arguments():
parser = argparse.ArgumentParser()
parser.add_argument(
"-p", "--projec... | 304 | 31.47 | 77 | 20 | 2,059 | python | [{"finding_id": "codeql_py/log-injection_f79940355995064b_5f94670a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
130,
141
] | [
null,
null
] | [
22,
31
] | [
61,
74
] | |
2024-11-18T21:01:19.742578+00:00 | 1,564,733,383,000 | 25d2ffa8788f54f3e059f9524aab4ca69d342fc1 | 2 | {
"blob_id": "25d2ffa8788f54f3e059f9524aab4ca69d342fc1",
"branch_name": "refs/heads/master",
"committer_date": 1564733383000,
"content_id": "94811a5f859c8250c58ae56d58d677c198c84be6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "19ffcf5055833e65c5dc6ff2b1e5cc716e5addc4",
"extension": "py"... | 2.484375 | stackv2 | import os
import datetime
import logging.config
import traceback as tb
from flask import request, jsonify, make_response
import json # it MUST be included after flask!
from pythonjsonlogger import jsonlogger
from lxml import etree
# this must be before logger setup
class CustomJsonFormatter(jsonlogger.JsonFormatte... | 103 | 30.89 | 90 | 16 | 758 | python | [{"finding_id": "codeql_py/stack-trace-exposure_7158ae0c3c8c0f85_9227e2d4", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
53
] | [
null
] | [
34
] | [
35
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.