added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T21:58:58.301537+00:00 | 1,574,111,911,000 | e5163e8727298165a000b4fb5f55344739110a4b | 2 | {
"blob_id": "e5163e8727298165a000b4fb5f55344739110a4b",
"branch_name": "refs/heads/master",
"committer_date": 1574111911000,
"content_id": "bae7b259aad254b9b6afd3cea14157101688aae2",
"detected_licenses": [
"MIT"
],
"directory_id": "be4ad108e2cdfbd673d7fd7a1a39c75ad23eabaf",
"extension": "py",
"fi... | 2.34375 | stackv2 | from flask import Flask, request, jsonify, render_template
from flask_cors import CORS
from flask_mail import Mail, Message
from dotenv import load_dotenv
from os import getenv
import requests
import logging
load_dotenv()
app = Flask(__name__)
CORS(app)
app.config['MAIL_PORT'] = 1025
mail = Mail(app)
@app.route('/', ... | 30 | 29.13 | 134 | 14 | 221 | python | [{"finding_id": "codeql_py/reflective-xss_b4a1af6facec22bf_e500b973", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-918"
] | [
"py/reflective-xss",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
22,
18
] | [
null,
null
] | [
12,
22
] | [
22,
135
] | |
2024-11-18T21:59:06.666673+00:00 | 1,380,974,543,000 | f90075d2adbf8b175c6015bdbda879ce26644e2e | 3 | {
"blob_id": "f90075d2adbf8b175c6015bdbda879ce26644e2e",
"branch_name": "refs/heads/master",
"committer_date": 1380974543000,
"content_id": "a6715253fe9da45a5432c40f940d5c54866d1a49",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9675c1c4459ff6b84de25fece1b10e262fc10781",
"extension": "py"... | 2.625 | stackv2 | #!/usr/bin/env python
# pgsync.py - Dump and restore data from one PostgreSQL database to another. The
# log files are generated in /var/log/pgsync directory. Make sure
# this directory exists before running the script.
import os
import sys
import stat
import logging
import datetime
import sub... | 170 | 28.9 | 92 | 17 | 1,361 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_270662c3eb7f6308_c548d4a6", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text."
] | [
82
] | [
null
] | [
11
] | [
46
] | |
2024-11-18T21:59:07.859025+00:00 | 1,594,799,471,000 | 762490142f5efa280fe1ef34b9158c8de36121e0 | 3 | {
"blob_id": "762490142f5efa280fe1ef34b9158c8de36121e0",
"branch_name": "refs/heads/master",
"committer_date": 1594799471000,
"content_id": "0c7bcb7bf7c875e25f04db03f361c5fed202f2e4",
"detected_licenses": [
"MIT"
],
"directory_id": "bbbc685a9e8cba5ee4819c34e5841baa07966bf7",
"extension": "py",
"fi... | 2.6875 | stackv2 | #!/usr/bin/env python2
# -*- coding: utf-8 -*-
import crawler
import json
import os
import sys
reload(sys)
sys.setdefaultencoding('utf8')
class TouTiaoCrawler:
toutiao_config = dict()
toutiao_crawler = None
article_url_list = list()
def __init__(self):
self.toutiao_crawler = crawler.Crawler... | 112 | 40.63 | 119 | 18 | 953 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_357492706c33d08b_8bb050ff", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://www.toutiao.com](1) may be at an arbitrary pos... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [https://www.toutiao.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [https://www.toutiao.com](1) may be at an arbitrary position in the sanitized URL."
] | [
33,
42
] | [
null,
null
] | [
16,
16
] | [
57,
65
] | |
2024-11-18T22:24:22.098305+00:00 | 1,557,979,484,000 | 3776ab47d19e9a5de744fd9733b8a7655d3b9aee | 3 | {
"blob_id": "3776ab47d19e9a5de744fd9733b8a7655d3b9aee",
"branch_name": "refs/heads/master",
"committer_date": 1557979484000,
"content_id": "46fade6aceffbb665db07753dbbe1071dec4ccd4",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "d0c581b5d5789e9e30ce4d7785c8a406f2f1d614",
"extension": "p... | 2.59375 | stackv2 | """This REST service allows real-time curation and belief updates for
a corpus of INDRA Statements."""
import yaml
import pickle
import logging
import argparse
from flask import Flask, request, jsonify, abort, Response
# Note: preserve EidosReader install as first one from indra
from indra.sources.eidos.reader import E... | 349 | 34.25 | 79 | 22 | 2,706 | python | [{"finding_id": "codeql_py/reflective-xss_08d635188da8e282_e79ae6ac", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-117"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
263,
278,
143
] | [
null,
null,
null
] | [
24,
24,
32
] | [
68,
68,
65
] | |
2024-11-18T22:24:23.811544+00:00 | 1,627,206,129,000 | 5947c052cb1adb3207b6daa8fe3258dbca082e53 | 3 | {
"blob_id": "5947c052cb1adb3207b6daa8fe3258dbca082e53",
"branch_name": "refs/heads/main",
"committer_date": 1627206129000,
"content_id": "5c80c29dc835541f7997b81ac87eaf3ddb6148f5",
"detected_licenses": [
"MIT"
],
"directory_id": "dd3513c4de74e3ab2e0ddc266d090eb3fb88bfdb",
"extension": "py",
"file... | 3.03125 | stackv2 | import argparse
import sys
import requests
class WebBruteForce:
def __init__(self):
self.args = WebBruteForce.parse_args()
self.header = {'User-Agent': self.args.agent}
@staticmethod
def parse_args():
parser = argparse.ArgumentParser(description="Simple python login brute force s... | 47 | 29.66 | 123 | 14 | 337 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_226e7b032be4fd5e_720b200f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
35,
38
] | [
null,
null
] | [
19,
19
] | [
45,
47
] | |
2024-11-18T22:24:25.700399+00:00 | 1,634,373,299,000 | a28b50608fc6baed9918279b30f04b84341fbc7e | 3 | {
"blob_id": "a28b50608fc6baed9918279b30f04b84341fbc7e",
"branch_name": "refs/heads/main",
"committer_date": 1634373299000,
"content_id": "c5951328b5dd1a90f3f4d319d34aa14fd5716295",
"detected_licenses": [
"MIT"
],
"directory_id": "2657eea254e0f6b1a709638f3eeae377d1fee699",
"extension": "py",
"file... | 2.578125 | stackv2 | from flask import Flask, render_template, request, redirect, url_for, flash, session
from flask_wtf import FlaskForm
from wtforms import StringField, PasswordField, BooleanField
from wtforms.validators import InputRequired, Email, Length
from flask_sqlalchemy import SQLAlchemy
from werkzeug.security import generate_pa... | 220 | 35.1 | 118 | 17 | 1,742 | python | [{"finding_id": "codeql_py/partial-ssrf_1a36c34c836c609d_c6ee2487", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
69
] | [
null
] | [
9
] | [
26
] | |
2024-11-18T22:36:35.537644+00:00 | 1,606,644,878,000 | 5e4ebad51f877a2acb6373a61fd791382bbf1b58 | 2 | {
"blob_id": "5e4ebad51f877a2acb6373a61fd791382bbf1b58",
"branch_name": "refs/heads/main",
"committer_date": 1606644878000,
"content_id": "438aa5da0d0a9459f872ea0a4190f510ca0ce52a",
"detected_licenses": [
"MIT"
],
"directory_id": "604365ef8a097d86e975cb5478cde485bf94090d",
"extension": "py",
"file... | 2.4375 | stackv2 | import json
import requests
from flask import Flask, request
from lxml import html
app = Flask(__name__)
@app.route('/get_cover')
def recommendation():
path = request.args.get('url')
if not path:
response = app.response_class(
status=404,
)
return response
resp = requ... | 38 | 21.11 | 46 | 17 | 207 | python | [{"finding_id": "codeql_py/full-ssrf_5e9c4dd93b5e0ba9_3e0ab543", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
18
] | [
null
] | [
12
] | [
30
] | |
2024-11-18T22:36:37.838050+00:00 | 1,606,805,200,000 | 83ac2a0e7656243dd5a3f8bd1cf89fd06728ca0c | 2 | {
"blob_id": "83ac2a0e7656243dd5a3f8bd1cf89fd06728ca0c",
"branch_name": "refs/heads/main",
"committer_date": 1606805200000,
"content_id": "f347a5f2f599714686f32dcbbf47ff4322dfcda6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "00385010f4bfef2fcca495e4699ad09d86502cdc",
"extension": "py",
... | 2.4375 | stackv2 | from django.http import HttpResponse, JsonResponse
from django.shortcuts import render
from django.views import View
import json
from user.models import UserProfile
import hashlib
import time
import jwt
from django.conf import settings
# error code :10200~10299
# Create your views here.
class TokenView(View):
def ... | 42 | 32.55 | 94 | 15 | 333 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_e2859876a5e36c24_7c217325", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
26
] | [
null
] | [
20
] | [
37
] | |
2024-11-18T22:36:47.976754+00:00 | 1,545,841,377,000 | 2a2568ee3b53e79ca6bb113234c403958a0b071b | 3 | {
"blob_id": "2a2568ee3b53e79ca6bb113234c403958a0b071b",
"branch_name": "refs/heads/master",
"committer_date": 1545841377000,
"content_id": "2daa7fedc79319dba4758e8ce84b071f07081e9e",
"detected_licenses": [
"Unlicense"
],
"directory_id": "c4d75dbf784f420bc8961b466207a0b5f699eda1",
"extension": "py",... | 2.734375 | stackv2 | from Crypto.Cipher import AES
from Crypto.Hash import SHA256
from Crypto.Protocol.KDF import PBKDF2
try:
from .Sup import sha000
except:
from Sup import sha000
try:
from .eff_long import words
#from .words6 import words
#from .usrsharedictwords6 import words
except:
from eff_long import words
#from words6 impor... | 64 | 27.84 | 101 | 16 | 556 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_49b6d57d0600c93c_81b62f2b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
59
] | [
null
] | [
8
] | [
16
] | |
2024-11-18T22:36:48.862885+00:00 | 1,690,553,722,000 | a894bbbc5b928b589ba91f61fc202b8f3025ffd2 | 2 | {
"blob_id": "a894bbbc5b928b589ba91f61fc202b8f3025ffd2",
"branch_name": "refs/heads/master",
"committer_date": 1690553722000,
"content_id": "30052909eb2b3d829eb58c562c1a0008e49d14bf",
"detected_licenses": [
"MIT"
],
"directory_id": "86d1cfa854078e589959e0417356acbe0a1b16f6",
"extension": "py",
"fi... | 2.46875 | stackv2 | import re
from complexism.misc import save_json
from .ctbn import BlueprintCTBN
from .ctmc import BlueprintCTMC
__author__ = 'TimeWz667'
__all__ = ['new_dbp', 'read_dbp_json', 'read_dbp_script', 'save_dbp']
def script_to_json(scr):
dcs = scr.split('\n')
while dcs:
dc = dcs[0]
pars = re.match... | 116 | 28.47 | 113 | 17 | 1,086 | python | [{"finding_id": "codeql_py/redos_fd00cfa5ac29e1b0_eda001de", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a{{' and containing many repetiti... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'a{{' and containing many repetitions of 'a'."
] | [
35
] | [
null
] | [
56
] | [
58
] | |
2024-11-18T22:36:53.255340+00:00 | 1,688,183,113,000 | c989305d49e90952020bcef9218848b460b9730f | 3 | {
"blob_id": "c989305d49e90952020bcef9218848b460b9730f",
"branch_name": "refs/heads/main",
"committer_date": 1688183113000,
"content_id": "effd928d8f89ff8304e0053d729f87cc2a90fe20",
"detected_licenses": [
"MIT"
],
"directory_id": "0e5a5c6bb6747383bc800faeef07f3b95665a7ea",
"extension": "py",
"file... | 2.984375 | stackv2 | """
서울 열린데이터 광장 OpenAPI
1. 교통
01.서울시 지하철호선별 역별 승하차 인원 정보
02.서울시 버스노선별 정류장별 승하차 인원 정보
"""
import pandas as pd
import logging
import requests
from bs4 import BeautifulSoup
class Transportation:
"""
서울 열린데이터 광장 교통 관련 정보 조회 클래스
서울 열린데이터 광장에서 발급받은 Service Key를 입력받아 초기화합니다.
parameters
-------... | 158 | 28.3 | 179 | 19 | 1,260 | python | [{"finding_id": "codeql_py/request-without-cert-validation_38a25eb2392f5e97_19de2cab", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
95
] | [
null
] | [
26
] | [
57
] | |
2024-11-18T20:23:16.491635+00:00 | 1,596,067,769,000 | 507fd71dda44725a689a06daea7bb4b10f0092ce | 3 | {
"blob_id": "507fd71dda44725a689a06daea7bb4b10f0092ce",
"branch_name": "refs/heads/master",
"committer_date": 1596067769000,
"content_id": "c4a8625ce26610b29fabbc91175ebc473dfb7830",
"detected_licenses": [
"MIT"
],
"directory_id": "d386f0e92fae38efc8790782f65542ef44ebcaf4",
"extension": "py",
"fi... | 2.71875 | stackv2 | # Answer to assignment: I found that both ways had easy parts and difficult parts to understand and
# execute. With mongodb I had to convert a query to json and then send it to the server
# With postgres I had to iterate over each row. There are trade offs to both.
import pymongo
import os
import json
from dotenv ... | 52 | 29.54 | 119 | 9 | 381 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_485fb787083dc153_765c0e35", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
22
] | [
null
] | [
15
] | [
29
] | |
2024-11-18T20:23:30.293832+00:00 | 1,505,413,005,000 | 9c8f75e8ca8150ec15f8bab340c9eea81a68a4f7 | 3 | {
"blob_id": "9c8f75e8ca8150ec15f8bab340c9eea81a68a4f7",
"branch_name": "refs/heads/master",
"committer_date": 1505413005000,
"content_id": "07a8094aae0dd4e5109d7a8784002fc67065e51e",
"detected_licenses": [
"MIT"
],
"directory_id": "6c1e1d00aa5a99ed9acbf4ab38fc6c87f5998ba4",
"extension": "py",
"fi... | 2.640625 | stackv2 | # -*- coding: utf-8 -*-
try:
from . import Offliberate
except (SystemError, ValueError):
import Offliberate
try:
from urlparse import urlparse
except ImportError:
from urllib.parse import urlparse
try:
from thread import start_new_thread
except ImportError:
from _thread import start_new_thread
import argparse
... | 307 | 30.23 | 143 | 24 | 2,533 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_781ecfedfd42cba5_a569eed4", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [offliberty.com](1) may be at an arbitrary position in ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [offliberty.com](1) may be at an arbitrary position in the sanitized URL."
] | [
181
] | [
null
] | [
5
] | [
28
] | |
2024-11-18T20:23:35.010407+00:00 | 1,546,901,581,000 | ab8dac3ee9e226efe2e55c3b568c1b5f3a7776ea | 3 | {
"blob_id": "ab8dac3ee9e226efe2e55c3b568c1b5f3a7776ea",
"branch_name": "refs/heads/master",
"committer_date": 1546901581000,
"content_id": "2cafbaf43f48c1128aef452f74c1cfa5d0611a1f",
"detected_licenses": [
"MIT"
],
"directory_id": "ea1190c1658fcbe8ad4855bd457188c159ef8f42",
"extension": "py",
"fi... | 2.890625 | stackv2 | """
A collection of functions related to Open edX Integration with L&D
"""
import sys
from datetime import datetime, timedelta
import json
import re
import requests
import adal
# pylint: disable=line-too-long
# pylint: disable=W0703
class EdxIntegration(object):
"""
**Use cases**
Get the data from Ope... | 351 | 34.33 | 158 | 20 | 2,708 | python | [{"finding_id": "codeql_py/request-without-cert-validation_a07434b75604bfd2_3e1c4c88", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
170
] | [
null
] | [
23
] | [
90
] | |
2024-11-18T20:23:41.133209+00:00 | 1,558,108,867,000 | 559e5cddb7252967f6031eae429a9374e1e46a68 | 2 | {
"blob_id": "559e5cddb7252967f6031eae429a9374e1e46a68",
"branch_name": "refs/heads/master",
"committer_date": 1558108867000,
"content_id": "39e3b3d40b11f9cfc971376e710a4a30c0dc86d0",
"detected_licenses": [
"MIT"
],
"directory_id": "5d5412af91c10ea7089e3cef254b051ad97710fb",
"extension": "py",
"fi... | 2.328125 | stackv2 | from django.shortcuts import render
# Create your views here.
from rest_framework.authentication import BasicAuthentication, SessionAuthentication, TokenAuthentication
from rest_framework.permissions import IsAuthenticated
from rest_framework.response import Response
from rest_framework.views import APIView
from good... | 207 | 39.57 | 114 | 17 | 1,673 | python | [{"finding_id": "codeql_py/stack-trace-exposure_d70aed1766ab9072_8b219fdb", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-094"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/code-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This code execution depe... | [
78,
102,
148,
49
] | [
null,
null,
null,
null
] | [
29,
29,
29,
28
] | [
63,
63,
63,
35
] | |
2024-11-18T21:22:27.099553+00:00 | 1,610,649,046,000 | b87534775f6e697df78de8390cd72e926ee91162 | 2 | {
"blob_id": "b87534775f6e697df78de8390cd72e926ee91162",
"branch_name": "refs/heads/main",
"committer_date": 1610649046000,
"content_id": "1e9281ee64a45d21c346af2002a469fb4dfa281d",
"detected_licenses": [
"MIT"
],
"directory_id": "99dec1ef81fdc5e443553e2c10f10c35b048e85b",
"extension": "py",
"file... | 2.3125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import os
import sys
#sys.path.append('/usr/local/lib/python2.7/dist-packages')
from bluetooth import *
import subprocess
import time
#sys.path.append('/home/pi/.local/lib/python2.7/site-packages')
from wifi import Cell, Scheme
import json
wpa_supplicant_conf = "/etc/wpa_... | 137 | 25.72 | 85 | 15 | 936 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5a0d199b9e689c67_372aa62f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
57,
98
] | [
null,
null
] | [
12,
16
] | [
41,
67
] | |
2024-11-18T21:22:43.906252+00:00 | 1,551,478,178,000 | 87fdd44c2e603915eebf5f6360b0a64a3ceab29e | 4 | {
"blob_id": "87fdd44c2e603915eebf5f6360b0a64a3ceab29e",
"branch_name": "refs/heads/master",
"committer_date": 1551478178000,
"content_id": "37f33daac4ef2f11f95907d58cd6275633fa9740",
"detected_licenses": [
"MIT"
],
"directory_id": "27e02f3501e2abbc5ff3703987c95cc67e625c96",
"extension": "py",
"fi... | 4.4375 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""
MATH6005 Lecture 6. Functions Revision.
# =============================================================================
# Example: Scope of a variable
# A more suitable approach to double the value would be to for a function
# to return a value e.g.
# ================... | 29 | 32.24 | 79 | 10 | 199 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_252ff244a824a824_b1de95dd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
22,
25
] | [
null,
null
] | [
11,
11
] | [
76,
75
] | |
2024-11-18T21:23:20.500367+00:00 | 1,609,427,106,000 | 0c5ca3bdd22aac676ec56892f806df09d6a87738 | 3 | {
"blob_id": "0c5ca3bdd22aac676ec56892f806df09d6a87738",
"branch_name": "refs/heads/main",
"committer_date": 1609427106000,
"content_id": "a009cc47fac141b29ad63cde6e5f5d3c77fea9bd",
"detected_licenses": [
"MIT"
],
"directory_id": "7e088a09ffd84af4146eea1a14329820e8ddc638",
"extension": "py",
"file... | 2.6875 | stackv2 | #!/usr/local/bin/python
from youtube_api import YouTubeDataAPI
import langdetect
import sys
import re
import os
if os.getenv('DEBUG', False):
DEBUG = True
else:
DEBUG = False
def is_evil(code):
yt = YouTubeDataAPI(os.getenv('YOUTUBE_KEY', '123'))
response = yt.get_video_metadata(code)
title =... | 74 | 25.51 | 84 | 20 | 498 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_b3119967b1f3c5dc_473810d2", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'youtube.com/', so it might match mo... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'youtube.com/', so it might match more hosts than expected."
] | [
45
] | [
null
] | [
19
] | [
39
] | |
2024-11-18T21:51:10.693394+00:00 | 1,623,153,544,000 | 2b65c9bd9d17e33b9047488607026d0e8c8a6df5 | 2 | {
"blob_id": "2b65c9bd9d17e33b9047488607026d0e8c8a6df5",
"branch_name": "refs/heads/master",
"committer_date": 1623153544000,
"content_id": "b7bd7f64858d32ad82e60bccad38a092ea8d2a8c",
"detected_licenses": [
"MIT"
],
"directory_id": "0f986ea71c6b792cceaa964128bb41e4cac1d044",
"extension": "py",
"fi... | 2.328125 | stackv2 | from flask import Flask, render_template, request, session
import sqlite3
import random
import urllib
app = Flask('app')
app.secret_key = '4Q8z\n\xec]/b_5#y2L"F'
@app.route('/')
def index():
return render_template("index.html", loggedIn=isLoggedIn())
@app.route('/arrivalsDepartures')
def arrivalsDepartures():
re... | 109 | 31.1 | 129 | 14 | 853 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_600af47ad3a1ea91_7ea6594b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-215"
] | [
"py/clear-text-storage-sensitive-data",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
68,
109
] | [
null,
null
] | [
23,
null
] | [
27,
47
] | |
2024-11-18T21:51:23.988486+00:00 | 1,602,309,389,000 | b8ce4262816441d6aa3a864663a959ba06b8632d | 3 | {
"blob_id": "b8ce4262816441d6aa3a864663a959ba06b8632d",
"branch_name": "refs/heads/main",
"committer_date": 1602309389000,
"content_id": "8695b73f9cba79e2aa1044a69a3d478398610ba9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cd846b82f22ccc5d297633ad65cd562201f4dec5",
"extension": "py",
... | 3.15625 | stackv2 | #!/usr/bin/python
from urllib.request import urlopen
from termcolor import colored
import hashlib
print ("Follow Me On The Github:-- https://github.com/lucifer-008")
hash = input("Enter Hash Value: ")
Hash = input("Enter Hash Name: ")
passlist = str(urlopen('https://raw.githubusercontent.com/danielmiessler/SecList... | 92 | 30.22 | 177 | 18 | 791 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_03c85fb426bec7e1_1cda5448", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 8 | true | [
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally... | [
29,
36,
43,
50,
57,
64,
73,
80
] | [
null,
null,
null,
null,
null,
null,
null,
null
] | [
28,
30,
30,
27,
30,
30,
31,
31
] | [
52,
54,
54,
51,
54,
54,
55,
55
] | |
2024-11-18T21:51:24.695651+00:00 | 1,616,683,565,000 | 6197e2a85be5e37c69faebc29466d9358035910f | 3 | {
"blob_id": "6197e2a85be5e37c69faebc29466d9358035910f",
"branch_name": "refs/heads/main",
"committer_date": 1616683565000,
"content_id": "a729ad6759247393abb4085130b01b49f7753e03",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "0cce0b80b4639a3aebe9491e9c7e6a58746cd78c",
"extension": "py"... | 3.4375 | stackv2 | from os import system
import time
class Node:
def __init__(self, value, link=None):
self.value = value
self.link = link
def get_value(self):
return self.value
def get_link(self):
return self.link
def set_link(self, new_link):
self.link = new_link
def ... | 236 | 32.52 | 122 | 27 | 1,340 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_207908015c187b1e_37b945c0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
63
] | [
null
] | [
23
] | [
82
] | |
2024-11-18T21:51:26.809342+00:00 | 1,626,879,994,000 | 19fad672b7f6cfebff5403ab58518922bb2aaab1 | 3 | {
"blob_id": "19fad672b7f6cfebff5403ab58518922bb2aaab1",
"branch_name": "refs/heads/master",
"committer_date": 1626879994000,
"content_id": "f0d00eb122d66507c4fd59d8bcef291059713379",
"detected_licenses": [
"MIT"
],
"directory_id": "6f33b60c79a6b6945b4c72742ac6b2b017456f08",
"extension": "py",
"fi... | 2.75 | stackv2 | #!/usr/bin/env python
import wget
import tarfile
import os
import sys
try:
import piscola
except:
pass
def download_dustmaps(mapsdir='.'):
""" Downloads dust maps of Schlegel, Fikbeiner & Davis (1998).
mapsdir : str, default '.' (current directory) or 'sfddata-master' (under piscola directory if pis... | 37 | 26.57 | 149 | 14 | 275 | python | [{"finding_id": "codeql_py/tarslip_a74f9a4e5aed337c_d86779ee", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
25
] | [
null
] | [
5
] | [
8
] | |
2024-11-18T21:51:58.502559+00:00 | 1,689,265,243,000 | ce6746fa654b149c9ba8834dc2091f696ae607e5 | 2 | {
"blob_id": "ce6746fa654b149c9ba8834dc2091f696ae607e5",
"branch_name": "refs/heads/master",
"committer_date": 1689265243000,
"content_id": "05443be30b23b55014b5dad3abec8b55d4739e65",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "96255a58eef19fea6380601229538028e283e8d4",
"extension": "p... | 2.375 | stackv2 | #!/usr/bin/env python
import cgi
import re
import cgitb
import collections
cgitb.enable()
def header():
header = "Content-Type: text/html;charset=utf-8"
header += "\n"
header += "\n"
header += "<HTML>"
header += "<HEAD><TITLE>Port Config Converter</TITLE>"
header += "<script src=\"jquery.min.j... | 198 | 32.3 | 163 | 23 | 1,577 | python | [{"finding_id": "codeql_py/polynomial-redos_cbaa880da3e61231_98adb6d7", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma... | 1 | true | [
"CWE-1333"
] | [
"py/polynomial-redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'.\nThis [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'.\nThis [regular expression](1) that depends on a [user-provided... | [
178
] | [
null
] | [
72
] | [
76
] | |
2024-11-18T22:02:40.308878+00:00 | 1,507,669,773,000 | d1a1d0da0b4c4b2b15bbacb8c047fbd06ca8d1e7 | 3 | {
"blob_id": "d1a1d0da0b4c4b2b15bbacb8c047fbd06ca8d1e7",
"branch_name": "refs/heads/master",
"committer_date": 1507669773000,
"content_id": "3ba42d4accc62dea18d5244110fa9cf1a04b36ae",
"detected_licenses": [
"MIT"
],
"directory_id": "e13f1e45dcdd0bc9f76c53d5823ca597ebafb16e",
"extension": "py",
"fi... | 2.65625 | stackv2 | #!usr/bin/python3
# Modules related comments are only applied in this Script.
import requests # Using this module to send request and getting response from local_server.
import sys # Using this module for writting formated text on the terminal.
from col... | 110 | 45.9 | 169 | 19 | 1,339 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ea54dc2df81f8762_c2b518cb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
82
] | [
null
] | [
22
] | [
101
] | |
2024-11-18T22:16:35.561958+00:00 | 1,623,000,595,000 | 8307213de0fd6edd56376663bbb1d0b4b90765f2 | 3 | {
"blob_id": "8307213de0fd6edd56376663bbb1d0b4b90765f2",
"branch_name": "refs/heads/main",
"committer_date": 1623000790000,
"content_id": "f7266dca016862413492651e6ea69b794172bb4d",
"detected_licenses": [
"MIT"
],
"directory_id": "f34b25deee7860abbcea86e9a051129e6dc3bd83",
"extension": "py",
"file... | 2.59375 | stackv2 | import time
import json
import requests
import urllib3
from random import randint
from bs4 import BeautifulSoup
from threading import Thread
urllib3.disable_warnings()
BASE_URL = "https://jobs.ksl.com/search/posted/last-7-days"
HEADERS = {
"User-Agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_5) AppleWebKit/... | 73 | 25.38 | 141 | 14 | 509 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b92a9a7bc8f32af7_2767bd6b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
19,
38
] | [
null,
null
] | [
12,
13
] | [
76,
77
] | |
2024-11-18T22:16:44.894414+00:00 | 1,622,142,630,000 | e66071662fc60b1a8d720a91d769c29969c14c18 | 3 | {
"blob_id": "e66071662fc60b1a8d720a91d769c29969c14c18",
"branch_name": "refs/heads/master",
"committer_date": 1622142630000,
"content_id": "ad0bf5a40fef6613ec0a6c564dd33a8a3869537f",
"detected_licenses": [
"MIT"
],
"directory_id": "bdcaeb6da835b8edd86ad269583daf0cc5c5c260",
"extension": "py",
"fi... | 2.90625 | stackv2 | import os
import re
from flask import session, redirect, url_for, request, flash
import hashlib
import model
def has_cyrillic(text):
return bool(re.search('[а-яА-Я]', text))
def search_bad_symbols_and_username(username):
"""Поиск зарезервированных слов и запрещенных символов"""
search_bad_symbols_resu... | 130 | 39.45 | 116 | 28 | 1,071 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7d8bfc8b775c2e80_22bbb8c0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 4 | true | [
"CWE-327",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/weak-sensitive-data-hashing",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provide... | [
92,
114,
115,
116
] | [
null,
null,
null,
null
] | [
45,
42,
42,
42
] | [
79,
76,
82,
84
] | |
2024-11-18T22:27:54.568593+00:00 | 1,612,488,239,000 | d077fe9ad82606f21442024fa28f29c44518ccb1 | 3 | {
"blob_id": "d077fe9ad82606f21442024fa28f29c44518ccb1",
"branch_name": "refs/heads/main",
"committer_date": 1612488239000,
"content_id": "6eea0863c46dce66a6a74e4f4152f569c69422fd",
"detected_licenses": [
"MIT"
],
"directory_id": "3af58cbf93ed11bee4be2b933f5ac384fa4be160",
"extension": "py",
"file... | 3.15625 | stackv2 | """Utility tools used by revelation"""
import os
import shutil
import tarfile
import zipfile
from http.client import HTTPMessage
from pathlib import Path
from typing import Tuple
from urllib.request import urlretrieve
from . import default_config
def make_presentation(presentation_path: Path):
"""
Make a ne... | 96 | 29.38 | 78 | 16 | 638 | python | [{"finding_id": "codeql_py/tarslip_8461873c188118cc_e05a8d8c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
81
] | [
null
] | [
17
] | [
22
] | |
2024-11-18T22:44:00.198896+00:00 | 1,476,602,200,000 | e1c7f2627819fa524c5bdcad7451fbd093e7c717 | 2 | {
"blob_id": "e1c7f2627819fa524c5bdcad7451fbd093e7c717",
"branch_name": "refs/heads/master",
"committer_date": 1476602243000,
"content_id": "5bdcfb381c7f8e672616cc92971cdef71a3237a1",
"detected_licenses": [
"MIT"
],
"directory_id": "3a77e1731eacc6748fd9ae4e208be179656fb312",
"extension": "py",
"fi... | 2.375 | stackv2 | # coding:utf-8
from flask import Flask, url_for
from jinja2 import Environment, PackageLoader
app = Flask(__name__)
env = Environment(loader=PackageLoader('app', 'templates/jinja2'))
@app.route('/')
def index():
return env.get_template('index.html').render(
title='Hello',
content='this is my firs... | 17 | 23 | 66 | 11 | 108 | python | [{"finding_id": "codeql_py/flask-debug_f9a9419baa212fc6_7b7cc250", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
17,
6
] | [
null,
null
] | [
5,
7
] | [
51,
67
] | |
2024-11-18T22:44:04.901568+00:00 | 1,573,756,547,000 | 0ac2b13a227e16096b8d4a16b0964a14931650dc | 3 | {
"blob_id": "0ac2b13a227e16096b8d4a16b0964a14931650dc",
"branch_name": "refs/heads/master",
"committer_date": 1573756547000,
"content_id": "ec09278cf6632e500f0e455b660ad490d792d606",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0488c54d5c369dabeab20e9b28537584943c4b3d",
"extension": "py"... | 2.53125 | stackv2 | """
Copyright 2019 Vanessa Martina Boehm
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, so... | 258 | 30.21 | 110 | 19 | 2,123 | python | [{"finding_id": "codeql_py/tarslip_f9ff486bec872d44_873de592", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
147
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T22:44:06.465680+00:00 | 1,635,177,683,000 | 3c0e2aec827cedb2730a79d39326ddcdc8be6eae | 2 | {
"blob_id": "3c0e2aec827cedb2730a79d39326ddcdc8be6eae",
"branch_name": "refs/heads/master",
"committer_date": 1635177683000,
"content_id": "930021fba8e1e65b4be35ef00a113006e917c8c9",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "1c2bf84fc3ec307296a0c828f46c1b7792de08fd",
"extension": "p... | 2.40625 | stackv2 | #!/usr/bin/env python
import sys
import argparse
from Ifc import SchemaParser
from jinja2 import Environment, FileSystemLoader, Template, contextfilter
from jinja2.runtime import Context
from jinja2 import Undefined
# parse the commandline arguments
ap = argparse.ArgumentParser( ... | 92 | 45.04 | 168 | 14 | 863 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_eb244c3024827626_b2091dcf", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
19
] | [
23
] | [
7
] | [
6
] | |
2024-11-18T22:44:14.658507+00:00 | 1,462,798,849,000 | 096735ce22de25d688aff55a1ff6408107d7737f | 3 | {
"blob_id": "096735ce22de25d688aff55a1ff6408107d7737f",
"branch_name": "refs/heads/master",
"committer_date": 1462798849000,
"content_id": "d2abaaea05ee729f4d7c4e759b13d427250048a1",
"detected_licenses": [
"MIT"
],
"directory_id": "d17e93c3e6037644f8392caf035240eafd465147",
"extension": "py",
"fi... | 2.71875 | stackv2 | #!/usr/bin/env python
from random import randrange
import sys
credit_card_numbers = {
'visa': [
'4024007132477448',
'4539213780183498',
'4024007154567043',
'4485481702082874',
'4556506880751371'
],
'american_express': [
'347515732294946',
'3781981137... | 44 | 21.86 | 71 | 11 | 505 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fc8776b9449f3c62_ce05ebe1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
42
] | [
null
] | [
22
] | [
71
] | |
2024-11-18T22:44:42.450809+00:00 | 1,534,455,089,000 | 942e5b8ddf560df61d8fc65fbff470c652214ead | 3 | {
"blob_id": "942e5b8ddf560df61d8fc65fbff470c652214ead",
"branch_name": "refs/heads/master",
"committer_date": 1534455089000,
"content_id": "08d74c4d1296cdda3f6bbd516a6469b0c275b872",
"detected_licenses": [
"MIT"
],
"directory_id": "ce30494ae099a76727f35906734a4779a68bf8ce",
"extension": "py",
"fi... | 2.75 | stackv2 | # Instagram-py , Copyright (C) 2017 The Future Shell , DeathSec
# filename: logger.py
# Colorful print functions for Instagram-py
from .colors import Fore , Back , Style , init
from .constants import appInfo
from datetime import datetime
init(autoreset=True) # set to automatically reset colors!
def log_result(sessio... | 51 | 34.31 | 152 | 24 | 465 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_649f25702cee555c_1fbcf6bb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
18
] | [
19
] | [
9
] | [
62
] | |
2024-11-18T20:36:59.035200+00:00 | 1,576,618,943,000 | 72cb14220fd5414137e26e22307b5c7c4f648698 | 4 | {
"blob_id": "72cb14220fd5414137e26e22307b5c7c4f648698",
"branch_name": "refs/heads/master",
"committer_date": 1576618943000,
"content_id": "626c4d644dcee163097205138605ab40642af96c",
"detected_licenses": [
"MIT"
],
"directory_id": "25c139fa82e424d3dcf3e9a7846b4c02d5c857d6",
"extension": "py",
"fi... | 3.546875 | stackv2 | """
This module allows to create and populate a database
with usernames and passwords.
"""
import sqlite3
import hashlib
import argparse
import random
conn = None
cursor = None
def open_and_create():
"""
Check the existance of a database of create a new one
with a data schema: username, password and s... | 94 | 27.38 | 87 | 17 | 579 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d2f17117a73db0f0_0faa9f25", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
56,
74
] | [
null,
null
] | [
33,
37
] | [
55,
59
] | |
2024-11-18T21:00:38.311384+00:00 | 1,626,560,433,000 | eebcef4328c07105107329e8dedf2567144f8d3b | 3 | {
"blob_id": "eebcef4328c07105107329e8dedf2567144f8d3b",
"branch_name": "refs/heads/main",
"committer_date": 1626560433000,
"content_id": "e148ff1cbe9931758cca98a34192d330924e84ba",
"detected_licenses": [
"MIT"
],
"directory_id": "ff9771e73a03a0bd46535418feebadeeae9d1fd9",
"extension": "py",
"file... | 2.53125 | stackv2 | from os import environ
from cx_Oracle import connect, Error
HOST = environ.get('DB_HOST', 'localhost')
PORT = environ.get('DB_PORT', '1521')
SID = environ.get('DB_SID', 'xe')
USER = environ.get('DB_USER', 'system')
PASSWORD = environ.get('DB_PASSWORD', 'oracle')
SEPARATOR = '----------------------------------------'
... | 42 | 25.69 | 87 | 14 | 288 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_caa4c56223cf7de9_01ed197a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
31
] | [
null
] | [
11
] | [
34
] | |
2024-11-18T21:00:42.389988+00:00 | 1,692,013,158,000 | 8ab9ca94875b15927de7f42ea44fd63f86b5de5d | 3 | {
"blob_id": "8ab9ca94875b15927de7f42ea44fd63f86b5de5d",
"branch_name": "refs/heads/master",
"committer_date": 1692013158000,
"content_id": "033bed7d4a6f1986a3e8c3553d4744abf0bbc9c1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9ca19852d1245911d7b8b15a0556cd28aaa16094",
"extension": "py"... | 2.828125 | stackv2 | import requests
import getpass
import os
import re
import datetime
import sys
from configparser import ConfigParser
def getAllDate(eslogin,espasswd,url):
urlAllDate = url+"*?v"
r = requests.get(urlAllDate, auth=(eslogin,espasswd),verify=False)
status_code = r.status_code
if status_code == 200:
... | 83 | 25.66 | 81 | 16 | 586 | python | [{"finding_id": "codeql_py/request-without-cert-validation_0a0f89c11a6a7bef_07020c4d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
13,
48
] | [
null,
null
] | [
9,
13
] | [
71,
78
] | |
2024-11-18T21:01:22.136287+00:00 | 1,623,052,659,000 | 011fe7c32facc132bf09fc93877d3e9a219227db | 3 | {
"blob_id": "011fe7c32facc132bf09fc93877d3e9a219227db",
"branch_name": "refs/heads/master",
"committer_date": 1623052659000,
"content_id": "ce40edfff0015dd93d60f7ae5c9f5634b03e4eef",
"detected_licenses": [
"MIT"
],
"directory_id": "985da5163cf8572f353224a48d964594f05d47aa",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/env python
import argparse
import re
import subprocess
import sys
def parse_args():
parser = argparse.ArgumentParser(
description="I use this program to generate a bibtex overview for my blog.")
parser.add_argument('--input', default="_bibliography.bib")
parser.add_argument('--output... | 77 | 31.42 | 126 | 14 | 751 | python | [{"finding_id": "codeql_py/overly-large-range_956e31e5d8910fd1_8cbd36d0", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
38
] | [
null
] | [
110
] | [
113
] | |
2024-11-18T21:01:25.860122+00:00 | 1,622,535,259,000 | 38c17e4ed27b6f64de671e63f171da032dc1b132 | 4 | {
"blob_id": "38c17e4ed27b6f64de671e63f171da032dc1b132",
"branch_name": "refs/heads/main",
"committer_date": 1622535259000,
"content_id": "5b754b7dc482d64d24dd000a202516a1e1d1fcd6",
"detected_licenses": [
"MIT"
],
"directory_id": "41e0ccec25f307e316f5a606e510e04e70ccd9bf",
"extension": "py",
"file... | 3.859375 | stackv2 | import random
class Password:
"""
Генерация пароля
:param int lenght: Длина пароля
:param bool lower: Наличие нижнего регистра
:param bool upper: Наличие верхнего регистра
:param bool numbers: Наличие цифр
:param bool symbols: Наличие специальных знаков
"""
def __init__(self, length=8, lower=True, upper=True,... | 107 | 26.99 | 93 | 15 | 893 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_66b5f468f7cc22fa_33e60251", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
49,
37
] | [
null,
null
] | [
15,
9
] | [
28,
22
] | |
2024-11-18T21:25:27.949446+00:00 | 1,458,133,470,000 | 85878189f792da316a8281c856df5ba29fe613ba | 2 | {
"blob_id": "85878189f792da316a8281c856df5ba29fe613ba",
"branch_name": "refs/heads/master",
"committer_date": 1458133470000,
"content_id": "a8ca0a4f1ac18cf9ad0bd36810fcc5855a088368",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e29d0a80a67fcfeb831f00ac28d2a66b8d1fcf45",
"extension": "py"... | 2.5 | stackv2 | import paramiko
import socket
import time
import logging
from paramiko.ssh_exception import SSHException
import bastion_ssh.errors
LOG = logging.getLogger(__name__)
class SSHTransport(object):
""" This object wraps a shell in yet another shell. When the shell is
switched into "simulate" mode it can just prin... | 45 | 39.36 | 103 | 16 | 324 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_f4f8d407c6bb34a0_9403b6bd", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
20
] | [
null
] | [
9
] | [
74
] | |
2024-11-18T21:25:32.321696+00:00 | 1,619,824,518,000 | f6f7c761e57be67947df2d164fdfbe1b62eb0b54 | 3 | {
"blob_id": "f6f7c761e57be67947df2d164fdfbe1b62eb0b54",
"branch_name": "refs/heads/master",
"committer_date": 1619824518000,
"content_id": "bac7f8d0b5e77f5624971a36811e4227a3d459be",
"detected_licenses": [
"BSD-3-Clause",
"MIT"
],
"directory_id": "babc1c6095e686ba4e6f1ddf4a8fb832b05960aa",
"ext... | 2.890625 | stackv2 | import os
from jinja2 import Template
import glob
import argparse
from collections import defaultdict
from pathlib import Path
def get_args():
parser = argparse.ArgumentParser()
parser.add_argument('directory', nargs='*', help='Explicitly list dirs')
parser.add_argument('--row', choices=('sort', 'match'),
... | 74 | 31.42 | 132 | 21 | 533 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_711196d8e62c9f08_cfc087ed", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
46
] | [
68
] | [
16
] | [
9
] | |
2024-11-18T21:25:35.028376+00:00 | 1,588,608,081,000 | 45abc89148eef438748a00564f6c92f266ab915e | 3 | {
"blob_id": "45abc89148eef438748a00564f6c92f266ab915e",
"branch_name": "refs/heads/master",
"committer_date": 1588608081000,
"content_id": "45a18b1c30b5124242788c97f2712a5804ac9673",
"detected_licenses": [
"MIT"
],
"directory_id": "709c49d91a3a1bcd1d5c70aecd703d3bf629e83a",
"extension": "py",
"fi... | 2.71875 | stackv2 | import time
import requests
import threading
from sseclient import SSEClient
from hammock import Hammock
import traceback
requests.packages.urllib3.disable_warnings()
"""
Inspired heavily from:
https://github.com/Alidron/spyrk/blob/master/spyrk/spark_cloud.py
-- Thank you for sharing your implementation
... | 411 | 34.11 | 132 | 18 | 3,088 | python | [{"finding_id": "codeql_py/request-without-cert-validation_744ef435ee50795e_58b5a45e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
334
] | [
null
] | [
15
] | [
91
] | |
2024-11-18T21:51:34.244777+00:00 | 1,505,184,848,000 | d57c2dac2224e37cccd08ff05124f353da7e4dab | 3 | {
"blob_id": "d57c2dac2224e37cccd08ff05124f353da7e4dab",
"branch_name": "refs/heads/master",
"committer_date": 1505184848000,
"content_id": "fcd16217b92f36e24de76f2b4af6b58df0a040a2",
"detected_licenses": [
"MIT"
],
"directory_id": "184de927609ce08626d417628731b9af23cfda79",
"extension": "py",
"fi... | 3.359375 | stackv2 | import inspect
import os
import re
# FIXME: remove textwrap dependency and code from scratch
import textwrap
def remove_indent(text, include_firstline=False):
"""Removes leading whitespace from the provided text.
Removes largest amount of leading whitespaces that is shared amongst all of the selected lines.
... | 382 | 35.93 | 100 | 20 | 3,030 | python | [{"finding_id": "codeql_py/redos_a3168f7df482da3f_169b49d5", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '..math::\\n' and containing many ... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '..math::\\n' and containing many repetitions of ' \\n'."
] | [
179
] | [
null
] | [
53
] | [
56
] | |
2024-11-18T21:51:34.986927+00:00 | 1,436,861,094,000 | 46c39151a266022f2550809ffe39dd1c78002960 | 2 | {
"blob_id": "46c39151a266022f2550809ffe39dd1c78002960",
"branch_name": "refs/heads/master",
"committer_date": 1436861094000,
"content_id": "1aef8ab70700d7447eaad17b9be342904ccecb9a",
"detected_licenses": [
"MIT"
],
"directory_id": "684c0ab1dff3d75cb2994e1adb5e54dbb1af3444",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/env python
"""A simple example of connecting to Earth Engine using App Engine."""
# Works in the local development environment and when deployed.
# If successful, shows a single web page with the SRTM DEM
# displayed in a Google Map. See accompanying README file for
# instructions on how to set up authen... | 62 | 34.81 | 140 | 18 | 597 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_7e1b43fc4c7bc250_6fbf7be2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25
] | [
26
] | [
21
] | [
63
] | |
2024-11-18T22:00:56.062307+00:00 | 1,544,634,467,000 | bee5621111ade31779f3d4c581ac391eee602a76 | 3 | {
"blob_id": "bee5621111ade31779f3d4c581ac391eee602a76",
"branch_name": "refs/heads/master",
"committer_date": 1544634467000,
"content_id": "4655c17b27c3b973804c67abbfa9b93c712e06ec",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c468915747db034e522e6e542ef9147932b240a1",
"extension": "py"... | 2.515625 | stackv2 | from django.views.decorators.csrf import csrf_exempt
from django.http import JsonResponse, HttpResponseNotFound, HttpResponseBadRequest, HttpResponse
from basicInfo.models import account, attrib, teacher,student
import hashlib as hash, json, time, random,re
basicUrl="http://127.0.0.1:8000/static/basicInfo/"
@csrf_... | 256 | 28.36 | 115 | 26 | 1,647 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7558eea8aa81c833_21be16a6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-327",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"[Sensitive data (id)](1) is used in a hashing algorithm (SHA512) that is insecure for id hashing, since it is not a computationally expensive hash function.\n[Sensitive da... | [
26,
26,
25,
92
] | [
null,
null,
null,
null
] | [
19,
27,
54,
54
] | [
25,
40,
71,
71
] | |
2024-11-18T22:00:56.685077+00:00 | 1,547,773,580,000 | 7cc9ee276e95dc653a68f0d0ceca29e580fcdf3b | 3 | {
"blob_id": "7cc9ee276e95dc653a68f0d0ceca29e580fcdf3b",
"branch_name": "refs/heads/master",
"committer_date": 1547773580000,
"content_id": "f8f0a1ac841dc94920b580516b6759ebbb3e1381",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "393701c0a2f9b0b0b3f0f73b9e8dbb5a48652afb",
"extension": "py"... | 2.546875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
__author__ = "Rob Knight, Gavin Huttley, and Peter Maxwell"
__credits__ = "glenncodes, seals, and newsapi.org"
import requests
import datetime
import time
from ftplib import FTP
import ctypes
counterr = 0
counter = 0
#your api key from newsapi.org
apikey = 'APIKEY'
... | 183 | 34.73 | 143 | 20 | 1,629 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c5698224b5769394_26afaeab", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 10 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression sto... | [
46,
68,
87,
106,
126,
41,
63,
82,
101,
121
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
35,
35,
35,
35,
35,
42,
42,
41,
41,
41
] | [
39,
39,
39,
39,
39,
52,
52,
51,
51,
51
] | |
2024-11-18T22:01:13.023213+00:00 | 1,552,276,453,000 | 543d671319811af41229af757ccfa2cd2cf14924 | 3 | {
"blob_id": "543d671319811af41229af757ccfa2cd2cf14924",
"branch_name": "refs/heads/master",
"committer_date": 1552276453000,
"content_id": "4fa35b01e46ba91697f7bb987ec662ba5ca1f7e8",
"detected_licenses": [
"MIT"
],
"directory_id": "b69e16865f983c7203575ed7ff1c3436cda24cb7",
"extension": "py",
"fi... | 3.171875 | stackv2 | # -*- coding: utf-8 -*-
"""
:author: Grey Li (李辉)
:url: http://greyli.com
:copyright: © 2018 Grey Li
:license: MIT, see LICENSE for more details.
"""
import click
from flask import Flask
from flask import url_for
from flask import redirect
# from flask_foo import Foo
app001 = Flask(__name__)
# the min... | 52 | 21.19 | 67 | 11 | 322 | python | [{"finding_id": "codeql_py/reflective-xss_0e21165785168182_d0f0339e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
42
] | [
null
] | [
12
] | [
38
] | |
2024-11-18T22:15:02.325874+00:00 | 1,635,027,466,000 | 14300c57a4340b6b21a6bb7a4a1a0eb81c1c94cc | 3 | {
"blob_id": "14300c57a4340b6b21a6bb7a4a1a0eb81c1c94cc",
"branch_name": "refs/heads/master",
"committer_date": 1635027466000,
"content_id": "202ab8e91b1a486cc2367f9e5d860cf37ee50d21",
"detected_licenses": [
"MIT"
],
"directory_id": "c311f95ebc4002a4f9d64edacd36f3152f426120",
"extension": "py",
"fi... | 2.609375 | stackv2 | import numpy as np
import pandas as pd
from sklearn import model_selection as ms
from sklearn.naive_bayes import GaussianNB as gaussian
from sklearn.tree import DecisionTreeClassifier
from sklearn.model_selection import GridSearchCV
from sklearn.linear_model import Perceptron
from sklearn.neural_network import MLPClass... | 119 | 41.61 | 116 | 13 | 1,391 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_457e63d96a4440ea_310bfec0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
23,
28
] | [
null,
null
] | [
7,
7
] | [
10,
9
] | |
2024-11-18T22:15:03.109601+00:00 | 1,649,706,319,000 | e4b178bbfb9b90f4ed13180532f0355861633386 | 3 | {
"blob_id": "e4b178bbfb9b90f4ed13180532f0355861633386",
"branch_name": "refs/heads/master",
"committer_date": 1649706319000,
"content_id": "1001851ea6965fca6d10f6ba0a2b959a3d8a89a9",
"detected_licenses": [
"MIT"
],
"directory_id": "78db5bc74181173f2d00bea409997a64b4682adf",
"extension": "py",
"fi... | 2.515625 | stackv2 | """The provided sample code in this repository will reference this file to get the
information needed to connect to your lab backend. You provide this info here
once and the scripts in this repository will access it as needed by the lab.
Copyright (c) 2019 Cisco and/or its affiliates.
Permission is hereby granted, fre... | 234 | 34.29 | 91 | 21 | 1,834 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bbdc1c268c6f4821_8df2bb7c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
198
] | [
null
] | [
11
] | [
30
] | |
2024-11-18T22:15:06.438268+00:00 | 1,633,631,125,000 | 669a47fbb498302d9954a48c992ac59cf96edfb8 | 3 | {
"blob_id": "669a47fbb498302d9954a48c992ac59cf96edfb8",
"branch_name": "refs/heads/main",
"committer_date": 1633631125000,
"content_id": "bf03a85681be93b3a78da22039cb4e5270f51922",
"detected_licenses": [
"MIT"
],
"directory_id": "3ff5d3feb9bc983fc8c3b8ed10132054c024f6e2",
"extension": "py",
"file... | 2.859375 | stackv2 | import tweepy
def send_tweet(consumer_key, consumer_secret, key, secret,message):
auth = tweepy.OAuthHandler(consumer_key, consumer_secret)
auth.set_access_token(key, secret)
print("IN SSEND TWEET")
print(consumer_secret)
print(consumer_key)
print(key)
print(secret)
print(message)
... | 18 | 22.83 | 67 | 8 | 104 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8e6158f063f00d30_8e9d263a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
8,
11
] | [
null,
null
] | [
11,
11
] | [
26,
17
] | |
2024-11-18T22:15:09.163273+00:00 | 1,616,830,651,000 | 4dd7831bb7abb17d6f2ae8a36b69569ddfdbee1a | 3 | {
"blob_id": "4dd7831bb7abb17d6f2ae8a36b69569ddfdbee1a",
"branch_name": "refs/heads/master",
"committer_date": 1616830651000,
"content_id": "6836616fe87a7cc9b3bf37cf316d1ff2852bc722",
"detected_licenses": [
"MIT"
],
"directory_id": "c142b637c7919ee9fd7a0d8fccf702778d46c932",
"extension": "py",
"fi... | 2.96875 | stackv2 | """WhatsApp Message Sender API."""
import re
from time import sleep # for stopping the program for an interval
from traceback import print_exc
from typing import List, Generator
import validators
# for controlling the browser
from selenium import webdriver
from selenium.common.exceptions import NoSuchElementException... | 237 | 41.74 | 116 | 21 | 2,095 | python | [{"finding_id": "codeql_py/overly-large-range_cec11b7215cc994f_accf9162", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
123,
125
] | [
null,
null
] | [
41,
41
] | [
45,
45
] | |
2024-11-18T22:26:01.367100+00:00 | 1,598,004,158,000 | bed647ec3ca1499a59b1426335f1a77ac76aed49 | 2 | {
"blob_id": "bed647ec3ca1499a59b1426335f1a77ac76aed49",
"branch_name": "refs/heads/master",
"committer_date": 1598004158000,
"content_id": "a7bc231c52fd728390d698b7769ef267b27ce782",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fc735eff8d464ccdc9e0777612ee82bec11d86d2",
"extension": "py"... | 2.390625 | stackv2 | import datetime
import os
from flask import Flask, request
from tasks_access.tasks_access import CloudTasksAccessor
app = Flask(__name__)
QUEUE_NAME = 'my-appengine-queue'
LOCATION = 'us-central1'
cloud_tasks_client = None
task_count = 0
@app.route('/task_handler', methods=['POST'])
def task_handler():
payl... | 62 | 33.61 | 113 | 15 | 492 | python | [{"finding_id": "codeql_py/reflective-xss_b796f19fdf0f0258_23896aea", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
23
] | [
null
] | [
12
] | [
15
] | |
2024-11-18T22:26:01.971180+00:00 | 1,499,431,160,000 | 2bfa12d19dafd724eb15bdea25cc0e542f0ef868 | 2 | {
"blob_id": "2bfa12d19dafd724eb15bdea25cc0e542f0ef868",
"branch_name": "refs/heads/master",
"committer_date": 1499431160000,
"content_id": "be3ca956a65b0ee4ae1c22e291cd888f11cc6e3b",
"detected_licenses": [
"MIT"
],
"directory_id": "3c17e189622018329bc0ebd8523eae8db9f3112a",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
from ..simpleextractor import SimpleExtractor
import re
class Iqilu(SimpleExtractor):
name = u"齐鲁网 (iqilu)"
def __init__(self):
SimpleExtractor.__init__(self)
self.title_pattern = '<meta name="description" content="(.*?)\"\W'
self.url_patt... | 18 | 25.44 | 74 | 10 | 133 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_ecf24babaf842637_ace0f264", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'iqilu.com/', so it might match more... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'iqilu.com/', so it might match more hosts than expected."
] | [
16
] | [
null
] | [
27
] | [
49
] | |
2024-11-18T22:26:24.409484+00:00 | 1,610,210,596,000 | 7b51ad3c562beae10238859fc5bf7b9d5d6f136a | 3 | {
"blob_id": "7b51ad3c562beae10238859fc5bf7b9d5d6f136a",
"branch_name": "refs/heads/main",
"committer_date": 1610210596000,
"content_id": "e4e0e3bc2fc07e38e2843d388288ba798e124cfb",
"detected_licenses": [
"MIT"
],
"directory_id": "75fb28b345ee06c201852469d9b02aa3c46d263e",
"extension": "py",
"file... | 2.75 | stackv2 | from flask import Flask, request, jsonify, render_template
import pickle
import numpy as np
import re
from scipy.sparse import hstack
import nltk
app = Flask(__name__)
analyser=open('SentimentAnalyser.pkl','rb')
sid=pickle.load(analyser)
analyser.close()
def remove_htmltags(s):
res = re.sub('<.*?>','',s)
r... | 159 | 29.5 | 125 | 16 | 1,249 | python | [{"finding_id": "codeql_py/flask-debug_2e3a61c699011462_a65d17d6", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-1333"
] | [
"py/flask-debug",
"py/polynomial-redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '<' and with many repetitions of '<'."
] | [
159,
17
] | [
null,
null
] | [
5,
29
] | [
24,
30
] | |
2024-11-18T20:39:51.315991+00:00 | 1,547,191,541,000 | 0e3abd0140a98561fb20214db8acdd5726fdc1a6 | 4 | {
"blob_id": "0e3abd0140a98561fb20214db8acdd5726fdc1a6",
"branch_name": "refs/heads/master",
"committer_date": 1547191541000,
"content_id": "3ac43b70b173a2e09d14f789900d8fab47e44d7f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4a1a64880cee58b916225a46ac339b1cf6d39dc5",
"extension": "py"... | 4 | stackv2 | # # 类封装版学生管理系统
#
#
#
# n = [{'z':'小明' ,'x':13 ,'c':'男'} ,
# {'z':'小红' ,'x':12 ,'c':'女'} ,
# {'z':'老王' ,'x':45 ,'c':'男'}]
# print("""1-查询学员姓名
# 2-添加学员姓名
# 3-修改学员姓名
# 4-删除学员姓名
# 0-退出程序""")
#
# b = int(input('请选择操作:'))
#
# class S():
# n = []
# def v1(self):
# print('编号' ,'\t' ,'\t' ,'姓名' ,'\t' ,... | 137 | 19.97 | 110 | 16 | 939 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fb18931458fbe32d_4e32acdc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
47
] | [
null
] | [
92
] | [
110
] | |
2024-11-18T20:39:54.076310+00:00 | 1,591,596,029,000 | fdb8f5047abfdd2cb646512bd8157eeaf04b0855 | 3 | {
"blob_id": "fdb8f5047abfdd2cb646512bd8157eeaf04b0855",
"branch_name": "refs/heads/master",
"committer_date": 1591596029000,
"content_id": "87fab26437b7368e3066232055c0030d5b967534",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9d79f590bdf878b70b82168370d6875afe7db7c8",
"extension": "py"... | 2.703125 | stackv2 | import hashlib
from typing import Tuple
import uuid
from .auth_provider import User, AuthProvider
class AuthService:
def __init__(self, auth_provider: AuthProvider) -> None:
self.auth_provider = auth_provider
self.is_initialised = False
async def register(self, email: str, password: str) -> ... | 44 | 35.39 | 88 | 17 | 356 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_c630f9908fb04b01_fe105cb8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
32,
37
] | [
null,
null
] | [
42,
44
] | [
68,
70
] | |
2024-11-18T20:39:59.897997+00:00 | 1,466,340,930,000 | 426a8b2e11fb9ee35e564ab603b766ccc73b2272 | 2 | {
"blob_id": "426a8b2e11fb9ee35e564ab603b766ccc73b2272",
"branch_name": "refs/heads/master",
"committer_date": 1466343186000,
"content_id": "b8ed05d566e7b0448653477068a49b5e60a1312a",
"detected_licenses": [
"Unlicense"
],
"directory_id": "617f317dfe1a160f349670c3244473e81e8cac6d",
"extension": "py",... | 2.421875 | stackv2 | import flask
import flask_login
from flask_skeleton.forms import UserForm
from flask_skeleton.models import db, User
views = flask.Blueprint(
'views',
__name__,
template_folder='templates',
static_folder='static')
@views.route('/login/', methods=['GET', 'POST'])
def login():
form = UserForm(flask... | 36 | 29.53 | 74 | 18 | 218 | python | [{"finding_id": "codeql_py/url-redirection_8173b100b3a7c78d_8e1269bb", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
25
] | [
null
] | [
39
] | [
74
] | |
2024-11-18T20:40:01.574716+00:00 | 1,678,784,344,000 | 5a0461f38bea8bdd6d71fc60c9b94a515a320884 | 3 | {
"blob_id": "5a0461f38bea8bdd6d71fc60c9b94a515a320884",
"branch_name": "refs/heads/master",
"committer_date": 1678784344000,
"content_id": "87b5c8abbb9e7ec0fecccbabf4528669fccab9a9",
"detected_licenses": [
"MIT"
],
"directory_id": "2f233b31ea7ffefad4b901b561f341fabe3bbb1f",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/python3.8
from datetime import datetime
import os
import sys
if len(sys.argv) > 1:
day = int(sys.argv[1])
else:
day = datetime.now().day
print(f"Day {day:02}")
with open("template.txt", "rt") as sourcef:
template = sourcef.read()
template = template.replace("{{day}}", str(day))
fname = f"{d... | 24 | 16.21 | 48 | 10 | 129 | python | [{"finding_id": "codeql_py/overly-permissive-file_8ab8c36e1393b236_e0c21fd7", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
24
] | [
null
] | [
null
] | [
23
] | |
2024-11-18T20:40:07.571998+00:00 | 1,693,399,722,000 | a48fa1b6e64a1238f063b81b86d7dc7432c0fd40 | 3 | {
"blob_id": "a48fa1b6e64a1238f063b81b86d7dc7432c0fd40",
"branch_name": "refs/heads/master",
"committer_date": 1693399722000,
"content_id": "af4d4a88f028fb5f9e18e4cfdba93a362d6c79fa",
"detected_licenses": [
"MIT"
],
"directory_id": "9f84d91a8ae3df53b07fe3267992fba00a99ac9e",
"extension": "py",
"fi... | 2.703125 | stackv2 | import os
import os.path as osp
from typing import Callable, List, Tuple, Union
from uuid import uuid1
import torch
from torch_geometric.nn.conv.utils.jit import class_from_module_repr
def Sequential(
input_args: str,
modules: List[Union[Tuple[Callable, str], Callable]],
) -> torch.nn.Module:
r"""An ext... | 123 | 36.21 | 79 | 16 | 1,128 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e683ba0cdaceb100_d822083d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
102
] | [
null
] | [
20
] | [
38
] | |
2024-11-18T20:52:12.999622+00:00 | 1,619,536,988,000 | f78a776b124d9681c053611cfd44b336ea2706d8 | 3 | {
"blob_id": "f78a776b124d9681c053611cfd44b336ea2706d8",
"branch_name": "refs/heads/main",
"committer_date": 1619536988000,
"content_id": "2c6b42ac5b6304739e4973a1df0c8c5d8c2b8dd9",
"detected_licenses": [
"MIT"
],
"directory_id": "3cc3a94e4819ec66ce91209e226abfd558790e4f",
"extension": "py",
"file... | 2.890625 | stackv2 | """
Created on 19 Mar 2019
@author: ejimenez-ruiz
"""
import json
import time
from urllib import parse, request
from entity import KGEntity
class Lookup(object):
def __init__(self, lookup_url):
self.service_url = lookup_url
def getJSONRequest(self, params, attempts=3):
try:
# u... | 340 | 26.49 | 82 | 21 | 2,013 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6d4a6b4d3689abc2_26e1ce33", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
38
] | [
null
] | [
19
] | [
76
] | |
2024-11-18T20:52:20.500003+00:00 | 1,621,359,801,000 | 77e1ba1a4f7420698f12533ce06ce6b2e88d0ae8 | 2 | {
"blob_id": "77e1ba1a4f7420698f12533ce06ce6b2e88d0ae8",
"branch_name": "refs/heads/master",
"committer_date": 1621359801000,
"content_id": "5fa70ae29fc4503ae9eec4e07a577337636d4e00",
"detected_licenses": [
"MIT"
],
"directory_id": "b07d0f7fcf48d9f452cd7a3f60da90bff218c190",
"extension": "py",
"fi... | 2.40625 | stackv2 | from logging import getLogger
from flask import Flask, request, jsonify
from ..config import PROJECT_NAME
from .parser import parse_request_body
from ..predict.main import predict
PING_ROUTE = '/ping'
PREDICT_ROUTE = '/predict'
DEBUG_PORT = 5000
logger = getLogger(__name__)
app = Flask(PROJECT_NAME)
@app.route(P... | 47 | 22.77 | 77 | 15 | 270 | python | [{"finding_id": "codeql_py/stack-trace-exposure_72439e1b7557a288_90b97217", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
35,
43
] | [
null,
null
] | [
24,
5
] | [
40,
57
] | |
2024-11-18T20:52:25.549340+00:00 | 1,608,798,459,000 | 335bc65714e727de19e7eb842e2c111737be86b5 | 3 | {
"blob_id": "335bc65714e727de19e7eb842e2c111737be86b5",
"branch_name": "refs/heads/master",
"committer_date": 1608798459000,
"content_id": "c3dc73a257fda71c3c0e61187d863b7c26d4eba8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "24eceb0f35bf9c9e7d369242816fb168e1006867",
"extension": "py"... | 2.578125 | stackv2 | #!/usr/bin/env python
import urllib2
import tarfile
import os
DOWNLOAD_URL = "https://dl.dropboxusercontent.com/s/r23dxeaahpobjuj/ModernMapOccupancyGrid.tgz"
LOCALFILENAME = 'ModernMapOccupancyGrid.tgz'
def scriptdir():
return os.path.dirname(__file__) or './'
def download_untar(data_url, fname, parentdir):
... | 32 | 27.78 | 95 | 11 | 240 | python | [{"finding_id": "codeql_py/tarslip_6453496316a4bc72_1108221b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
25
] | [
null
] | [
5
] | [
8
] | |
2024-11-18T21:08:12.752840+00:00 | 1,689,093,789,000 | 3a3b957e816a19f98f1e29b31ce8943fecd9bb73 | 3 | {
"blob_id": "3a3b957e816a19f98f1e29b31ce8943fecd9bb73",
"branch_name": "refs/heads/master",
"committer_date": 1689093789000,
"content_id": "21fce741dde44cb65a23b2629d452c0333e620dc",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "409b066a195db9bb6c65abcfbc1c312b077522b4",
"extension": "p... | 2.53125 | stackv2 | # Authors:
# Loic Gouarin <loic.gouarin@polytechnique.edu>
# Benjamin Graille <benjamin.graille@math.u-psud.fr>
#
# License: BSD 3 clause
"""
Symbolic computation of equivalent equations
"""
# pylint: disable=invalid-name
import sympy as sp
from ..symbolic import alltogether
class EquivalentEquation:
de... | 348 | 34.92 | 115 | 32 | 2,713 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a0a59833339d0dad_6dcc786e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
201,
212,
227
] | [
210,
225,
242
] | [
27,
27,
27
] | [
10,
10,
10
] | |
2024-11-18T21:08:21.509026+00:00 | 1,621,569,388,000 | 3d85563003ddee4d2d997bcf8a89ccbabc644828 | 2 | {
"blob_id": "3d85563003ddee4d2d997bcf8a89ccbabc644828",
"branch_name": "refs/heads/master",
"committer_date": 1621569388000,
"content_id": "cd3bf7eaf555b606c5ca5e6a5f9fb70b4b3a568c",
"detected_licenses": [
"MIT"
],
"directory_id": "bd895a5b0bbabf9ade266b22fad353f6f6d58293",
"extension": "py",
"fi... | 2.390625 | stackv2 | from typing import Final
from google.cloud import secretmanager
from dotenv import load_dotenv
load_dotenv()
SECRET_USER_ID: Final = "user"
SECRET_PASSWORD_ID: Final = "password"
DECODE_FORMAT: Final = "UTF-8"
PROJECT_ID = "devhack-55d18"
def get_name(project_id, secret_id, version):
return f"projects/{project_... | 28 | 29.79 | 74 | 12 | 207 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2a3857ae5830dfa7_32a1256e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
26,
27,
28
] | [
null,
null,
null
] | [
11,
11,
11
] | [
49,
53,
52
] | |
2024-11-18T21:08:31.158738+00:00 | 1,616,208,720,000 | d8e9af1e23720c8f4831a4788023847b6fb3eaf9 | 2 | {
"blob_id": "d8e9af1e23720c8f4831a4788023847b6fb3eaf9",
"branch_name": "refs/heads/main",
"committer_date": 1616208720000,
"content_id": "52adb94d08e55783fcb34e421a392c5971335319",
"detected_licenses": [
"MIT"
],
"directory_id": "964f073fb9a3008e31ab563288dd543aa9bb0d89",
"extension": "py",
"file... | 2.328125 | stackv2 | import os
from flask import Flask, render_template, request, flash, redirect, session, g, abort, jsonify, url_for
from flask_admin import Admin
from flask_admin.contrib.sqla import ModelView
from flask_debugtoolbar import DebugToolbarExtension
from sqlalchemy.exc import IntegrityError
from forms import UserAddForm,... | 528 | 27.15 | 103 | 22 | 3,119 | python | [{"finding_id": "codeql_py/url-redirection_026548874b3de9a3_49440cde", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 6 | true | [
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends o... | [
249,
257,
267,
275,
407,
425
] | [
null,
null,
null,
null,
null,
null
] | [
25,
21,
25,
21,
25,
25
] | [
41,
37,
41,
37,
41,
41
] | |
2024-11-18T21:31:25.109615+00:00 | 1,429,354,017,000 | 422628835e2b62b6c6698e1ea5ebf14cbe704afd | 2 | {
"blob_id": "422628835e2b62b6c6698e1ea5ebf14cbe704afd",
"branch_name": "refs/heads/master",
"committer_date": 1429354017000,
"content_id": "d97016ffd2c4141be6bd2c224df1caaf7c1ef85d",
"detected_licenses": [
"MIT"
],
"directory_id": "469dee03907f000a5d99ca3fca41a312f69ce291",
"extension": "py",
"fi... | 2.40625 | stackv2 | """A generic rest serving layer for NDB models."""
import logging
import sys
from google.appengine.api import namespace_manager
from google.appengine.ext import db
import flask
import flask.views
from appengine import user
def command(func):
"""Command decorator - automatically dispatches methods."""
setattr(f... | 207 | 27.86 | 78 | 15 | 1,382 | python | [{"finding_id": "codeql_py/log-injection_4f72439d0162e83e_f22d0b14", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
58,
116,
126
] | [
null,
null,
null
] | [
56,
18,
21
] | [
60,
22,
30
] | |
2024-11-18T21:31:59.089746+00:00 | 1,564,084,309,000 | 54b694f7c32e6f8d3451b19d928a92558675037d | 2 | {
"blob_id": "54b694f7c32e6f8d3451b19d928a92558675037d",
"branch_name": "refs/heads/master",
"committer_date": 1564084309000,
"content_id": "6c410ac0c8b7097a36d9757a8a1c24e65e33e7fe",
"detected_licenses": [
"BSD-3-Clause",
"BSD-2-Clause"
],
"directory_id": "54b06698692a9a3401538f18c2f57523ebcf75ba... | 2.390625 | stackv2 | import os
import boto3
import time
import json
import sys
import urllib.parse
from datetime import datetime, timedelta
from botocore.vendored import requests
s3 = boto3.client('s3')
sqs = boto3.client('sqs')
sqs_queue = sqs.get_queue_url(QueueName='PW3Query-Queue.fifo')
S3_BUCKET_PREFIX = "results/"
PW3_API_URL = "ht... | 123 | 31.37 | 104 | 18 | 956 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_06b9d9916cd12e90_ba2e609b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
66
] | [
null
] | [
56
] | [
59
] | |
2024-11-18T21:32:23.630612+00:00 | 1,559,592,084,000 | 236a6eac505ec16f09032287abaf0602d64a9a00 | 3 | {
"blob_id": "236a6eac505ec16f09032287abaf0602d64a9a00",
"branch_name": "refs/heads/master",
"committer_date": 1559592084000,
"content_id": "0895b96765020b36f794848d4fac38bc3f4d6875",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "5e949c43b6e7c1011e6e2b26229855910f8746fa",
"extension": "p... | 2.578125 | stackv2 | #!/usr/bin/env python
# encoding: utf-8
"""
macosdiff.py
This is a Flask app to show you the differences between the files installed by
two different versions of the macOS installer.
Copyright (C) University of Oxford 2018
Ben Goodstein <ben.goodstein at it.ox.ac.uk>
This program is free software: you can redist... | 99 | 31.31 | 86 | 19 | 721 | python | [{"finding_id": "codeql_py/regex-injection_b1478f0430e300da_088a2873", "tool_name": "codeql", "rule_id": "py/regex-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This regular expression depends on a [user-provided value](1) and is executed by [re.match](2).", "remedi... | 1 | true | [
"CWE-730"
] | [
"py/regex-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression depends on a [user-provided value](1) and is executed by [re.match](2)."
] | [
69
] | [
null
] | [
49
] | [
56
] | |
2024-11-18T21:33:03.186439+00:00 | 1,532,781,802,000 | 9acee9eb9b4858029f904edba60977fc5a9c8116 | 3 | {
"blob_id": "9acee9eb9b4858029f904edba60977fc5a9c8116",
"branch_name": "refs/heads/master",
"committer_date": 1532781802000,
"content_id": "5f6fabd3cbc0e682094ac49eb8bc559a19fb9ae2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3c981d1990c6a8daf0d46ed398d82ff71da43b1f",
"extension": "py"... | 2.921875 | stackv2 | #!/usr/bin/env python3
import sys
import argparse
import re
from collections import Counter
def check_python_version(v):
v = str(v).split('.')
try:
if not 1 < int(v[0]) <= 3:
raise ValueError('Error: You are requiring invalid Python version ' + v[0])
except ValueError as e:
pr... | 168 | 33.12 | 154 | 20 | 1,395 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2792624af430ccd6_08c5a22f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
106
] | [
107
] | [
19
] | [
77
] | |
2024-11-18T22:42:13.738755+00:00 | 1,607,045,356,000 | 8fabf4f45d1ee8dd7dda2aab94ac14d300dcba63 | 3 | {
"blob_id": "8fabf4f45d1ee8dd7dda2aab94ac14d300dcba63",
"branch_name": "refs/heads/master",
"committer_date": 1607045356000,
"content_id": "4f0ed0227af588549bb86fdf12fdca7ce6ddb1d5",
"detected_licenses": [
"MIT"
],
"directory_id": "32f5b3e8299f01bb421e2e2aa324c3f883af1dcf",
"extension": "py",
"fi... | 2.5625 | stackv2 | from untwisted.event import ACCEPT, READ, CLOSE, SSL_ACCEPT, WRITE, SSL_ACCEPT_ERR
from untwisted.dispatcher import Erase
from untwisted.errors import ACCEPT_ERR_CODE
from untwisted.client import install_basic_handles
from untwisted.network import SuperSocket, SuperSocketSSL
import socket
import ssl
class Server:
... | 98 | 25.73 | 82 | 16 | 600 | python | [{"finding_id": "codeql_py/insecure-protocol_a28a22286e87d9ae_c09d8cbf", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)."
] | [
90
] | [
null
] | [
12
] | [
19
] | |
2024-11-18T20:31:42.119596+00:00 | 1,690,821,193,000 | 4b048d4fb07f8058ed5084504c07959ac724f4f1 | 3 | {
"blob_id": "4b048d4fb07f8058ed5084504c07959ac724f4f1",
"branch_name": "refs/heads/master",
"committer_date": 1690821193000,
"content_id": "32c4141b06309853ef874d0dc2edb4537ba34b0c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c2536b4baefe44dc645e1df9746cbc6f7a7c833c",
"extension": "py"... | 3.046875 | stackv2 | #!/usr/bin/env python3
import subprocess
import requests
def location() -> (float, float):
try:
process = subprocess.run(
['CoreLocationCLI', '-once', 'YES',
'-format', '%latitude\n%longitude'],
stdout=subprocess.PIPE,
encoding='utf8',
timeout=... | 88 | 27.9 | 73 | 13 | 574 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d451d7dd2a02f8da_33323a32", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.\nThis expression logs [sensitive data (private)]... | [
88
] | [
null
] | [
11
] | [
29
] | |
2024-11-18T20:31:56.345404+00:00 | 1,622,565,275,000 | 4f8c56cde95d5d5c3a97e81ca9b767dd4d16931a | 3 | {
"blob_id": "4f8c56cde95d5d5c3a97e81ca9b767dd4d16931a",
"branch_name": "refs/heads/main",
"committer_date": 1622565275000,
"content_id": "6827dddf818fa188f9774c7244dc7a50930a67bb",
"detected_licenses": [
"MIT"
],
"directory_id": "33c020d5bf496a429a6459a37f7eb374599781f4",
"extension": "py",
"file... | 2.671875 | stackv2 | import logging
import random
from flask import Flask, request, render_template, flash
from flask_cors import CORS
from utils import get_or_create, TMDB_URLS, GAME_NUM_OPTIONS, GAME_NUM_CORRECT_OPTIONS, make_tmdb_request, get_wrong_actors, score_game
from models import db, Movie, MoviePerson, TriviaScore
logger = loggi... | 143 | 32.5 | 135 | 18 | 1,135 | python | [{"finding_id": "codeql_py/flask-debug_86ea360a91586bb0_5f5cc0e2", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-117",
"CWE-117"
] | [
"py/flask-debug",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
143,
23,
38
] | [
null,
null,
null
] | [
5,
17,
17
] | [
51,
62,
29
] | |
2024-11-18T20:53:29.871221+00:00 | 1,689,613,335,000 | 45003a62d3a0332ab40ba6f4f3025490cad01afc | 2 | {
"blob_id": "45003a62d3a0332ab40ba6f4f3025490cad01afc",
"branch_name": "refs/heads/master",
"committer_date": 1689613335000,
"content_id": "bcef99e41d2d9c1aa90488a1247e389b3e6abb5e",
"detected_licenses": [
"NIST-Software",
"BSD-3-Clause",
"MIT"
],
"directory_id": "faea090a9a70920c5ccdaea84c38... | 2.484375 | stackv2 | """ REST views for the data API
"""
from django.urls import reverse
from rest_framework import status
from rest_framework.decorators import schema
from rest_framework.exceptions import ValidationError
from rest_framework.permissions import IsAuthenticated
from rest_framework.response import Response
from rest_framewor... | 84 | 31.83 | 87 | 18 | 512 | python | [{"finding_id": "codeql_py/stack-trace-exposure_f0121ff1f7017c78_e9d00495", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
83
] | [
null
] | [
17
] | [
24
] | |
2024-11-18T20:53:36.519717+00:00 | 1,548,463,873,000 | ffa8b3c096312939367957b1097672b0b45a5e5c | 3 | {
"blob_id": "ffa8b3c096312939367957b1097672b0b45a5e5c",
"branch_name": "refs/heads/master",
"committer_date": 1548463873000,
"content_id": "3676557d5554a53f3b3b1d5d5cc973d90b86083d",
"detected_licenses": [
"Apache-2.0",
"MIT"
],
"directory_id": "791e1ac10d0686e9fbb0b00e1f9c112557cae657",
"exten... | 2.765625 | stackv2 | '''
Segment - a package of resources
===================================
A Segment is a package of related xforms, models, schemas and templates.
Segments may be exported to, and imported from (correctly formatted) zipfiles.
These segment packages make sharing fashion resources much simpler.
Segment directory layout
... | 520 | 35.76 | 118 | 22 | 3,555 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e1e4c7dc40d05f9b_bbb01708", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
258
] | [
null
] | [
11
] | [
61
] | |
2024-11-18T20:53:39.063978+00:00 | 1,690,380,256,000 | 3fe4d712dd6b2ed0e8499f2eb11366b5b541f7a7 | 3 | {
"blob_id": "3fe4d712dd6b2ed0e8499f2eb11366b5b541f7a7",
"branch_name": "refs/heads/master",
"committer_date": 1690380256000,
"content_id": "4774fc84afe4cd2e78b0ddb5a438c1369fd3afb6",
"detected_licenses": [
"MIT"
],
"directory_id": "480e10ba3c431a52e0bfaa1de81896db80aa8061",
"extension": "py",
"fi... | 2.546875 | stackv2 | """Contract Message Provider."""
import os
import time
import requests
from requests.adapters import HTTPAdapter
from requests.packages.urllib3 import Retry
from multiprocessing import Process
from .verifier import Verifier
from .http_proxy import run_proxy
import logging
logging.getLogger("urllib3").setLevel(logging... | 157 | 31.04 | 103 | 17 | 1,063 | python | [{"finding_id": "codeql_py/request-without-cert-validation_41526eb027cbce86_08fa4d20", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
61,
78
] | [
63,
null
] | [
16,
16
] | [
73,
64
] | |
2024-11-18T20:53:43.787488+00:00 | 1,615,989,223,000 | 6378028490933570f2e171bf64c07a5899be2169 | 2 | {
"blob_id": "6378028490933570f2e171bf64c07a5899be2169",
"branch_name": "refs/heads/master",
"committer_date": 1615989223000,
"content_id": "3063abf5d04ae79ebb9b1f7fcdfe25821852d936",
"detected_licenses": [
"MIT"
],
"directory_id": "d16ea92cbce673b427da0d87c9017ae1fc50cc06",
"extension": "py",
"fi... | 2.34375 | stackv2 | from app import app
from flask import Flask, flash, request, redirect, abort, jsonify, send_from_directory, render_template, make_response, Response
from werkzeug.utils import secure_filename
import json
import time
import os
UPLOADS = app.config["UPLOADS"]
DOWNLOADS = app.config["DOWNLOADS"]
EXTENSION_SOMATIC = app.... | 175 | 33.2 | 128 | 20 | 1,320 | python | [{"finding_id": "codeql_py/url-redirection_f27335373134e68a_ead61807", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 4 | true | [
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a ... | [
60,
54,
110,
160
] | [
null,
null,
null,
null
] | [
33,
33,
25,
25
] | [
44,
44,
36,
36
] | |
2024-11-18T21:10:23.602437+00:00 | 1,669,071,543,000 | d66b8a13c741cd3f87a4ff79d82c863199215f41 | 3 | {
"blob_id": "d66b8a13c741cd3f87a4ff79d82c863199215f41",
"branch_name": "refs/heads/master",
"committer_date": 1669071543000,
"content_id": "50806bde25d23ef352eb2546e2bd52357704864d",
"detected_licenses": [
"MIT"
],
"directory_id": "000715472f9b1d2a286c3c3a28b93537a0e0ffbe",
"extension": "py",
"fi... | 2.53125 | stackv2 | import json
import os
import requests
import time
from dotenv import load_dotenv
load_dotenv()
api_key = os.environ.get('API_KEY')
puuid = os.environ.get('PUUID')
start = 0
count = 100
# why this stupid shit not have all data, ffs
match_list_url = 'https://americas.api.riotgames.com/lol/match/v5/matches/by-puuid/{}... | 83 | 20.04 | 119 | 12 | 568 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3279e6b67b041ad8_037f1c0c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 7 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensi... | [
41,
48,
49,
73,
77,
78,
79
] | [
null,
null,
null,
null,
null,
null,
null
] | [
9,
9,
9,
9,
9,
9,
9
] | [
17,
12,
17,
43,
12,
17,
14
] | |
2024-11-18T21:10:30.647607+00:00 | 1,607,437,498,000 | 67def59df2bde67d0fe7610685a2e8365ff32ab6 | 2 | {
"blob_id": "67def59df2bde67d0fe7610685a2e8365ff32ab6",
"branch_name": "refs/heads/master",
"committer_date": 1607437498000,
"content_id": "44ff1d5cacec6606aebdca4ffabd7e4b35bcd214",
"detected_licenses": [
"MIT"
],
"directory_id": "b1523a6a9e665847cc1cbb7f00870265ba985363",
"extension": "py",
"fi... | 2.375 | stackv2 | import configparser
import json
import logging
import subprocess
import sys
from dataclasses import dataclass
from pprint import pformat
from typing import Any, List
import bottle
logging.basicConfig(stream=sys.stdout, level=logging.INFO,
format='%(asctime)-15s %(levelname)s: %(message)s')
log = l... | 196 | 27.94 | 108 | 19 | 1,327 | python | [{"finding_id": "codeql_py/log-injection_7399438a0e2bcf78_e1f0be74", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [use... | [
107,
110,
158
] | [
null,
null,
163
] | [
23,
23,
14
] | [
77,
75,
37
] | |
2024-11-18T21:10:34.209154+00:00 | 1,628,859,238,000 | b8d4398fc087e45a2dc225d216ef24aafda4cbfa | 3 | {
"blob_id": "b8d4398fc087e45a2dc225d216ef24aafda4cbfa",
"branch_name": "refs/heads/main",
"committer_date": 1628859238000,
"content_id": "8906234f2cbd96d80cbd870ab60971bea518a807",
"detected_licenses": [
"MIT"
],
"directory_id": "d5c0c7316d7304c496ea120292b045803ee324c5",
"extension": "py",
"file... | 2.75 | stackv2 | import os
import tweepy
from huepy import * # refer to this https://github.com/s0md3v/huepy
import re
import time
import pandas as pd
from pandas import DataFrame
from mtranslate import translate
from textblob import TextBlob
import nltk
from nltk.corpus import stopwords
from nltk.tokenize import word_tokenize
class... | 170 | 42.12 | 123 | 21 | 1,514 | python | [{"finding_id": "codeql_py/overly-large-range_cf13db5dad6f858a_52255379", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in the same character class."
] | [
122
] | [
null
] | [
32
] | [
35
] | |
2024-11-18T21:46:33.435419+00:00 | 1,511,820,096,000 | 36b7490b6b8eee332b2aec4534f9ced2851e6eb1 | 2 | {
"blob_id": "36b7490b6b8eee332b2aec4534f9ced2851e6eb1",
"branch_name": "refs/heads/master",
"committer_date": 1511820096000,
"content_id": "8f42e57b46db277baa2e1f05532ef57bc75eaf33",
"detected_licenses": [
"MIT"
],
"directory_id": "faade30e4ab8e35ff8d6b2483b4a7971d3373ca2",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python
""" ASI Data Timeseries """
import sys
import datetime
import numpy
import matplotlib
matplotlib.use('agg')
import matplotlib.pyplot as plt
import matplotlib.dates as mdates
import pytz
import cgitb
cgitb.enable()
from pyiem.network import Table as NetworkTable
nt = NetworkTable("ISUASI")
# Quer... | 106 | 33.11 | 85 | 13 | 1,083 | python | [{"finding_id": "codeql_py/sql-injection_a13fa14e91c2f98f_f1e14549", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
48
] | [
null
] | [
17
] | [
20
] | |
2024-11-18T21:47:33.713289+00:00 | 1,537,447,594,000 | 939dcf818e0df9e726c6e2b8b86b4050b388329c | 2 | {
"blob_id": "939dcf818e0df9e726c6e2b8b86b4050b388329c",
"branch_name": "refs/heads/master",
"committer_date": 1537447594000,
"content_id": "992755a1f697017573fc331fb6e1e63bdedae81f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "94ea92b00f1c8c14af7064350d619daf65b37f09",
"extension": "py"... | 2.421875 | stackv2 | #!/usr/bin/python3
#
# Author: B. Herfort, M. Reinmuth, 2017
############################################
import pyrebase
import pymysql # handle mysql
import json
import sys
CONFIG_PATH = './cfg/config.cfg'
try:
with open(CONFIG_PATH) as f:
config_data = f.read()
except IOError:
print('Unable to lo... | 185 | 29.64 | 117 | 13 | 1,210 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a75c23ada9689745_d50db8f7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
75
] | [
null
] | [
11
] | [
47
] | |
2024-11-18T21:47:34.929259+00:00 | 1,616,298,141,000 | 275b37bce0ed51194b670e745244b30e661168d6 | 2 | {
"blob_id": "275b37bce0ed51194b670e745244b30e661168d6",
"branch_name": "refs/heads/main",
"committer_date": 1616298141000,
"content_id": "fb9d64e37476a89feff194132fe33440abb36523",
"detected_licenses": [
"MIT"
],
"directory_id": "f0169f15e6450b41f2d2c9a955bc806102f6ef66",
"extension": "py",
"file... | 2.46875 | stackv2 | import requests
from bs4 import BeautifulSoup
from bs4 import Comment
import csv
import re
import sys
import getopt
import urllib
import pandas as pd
from selenium import webdriver
from selenium.webdriver.common.keys import Keys
from selenium.webdriver.common.action_chains import ActionChains
from selenium.webdriver.c... | 170 | 28.36 | 108 | 21 | 1,180 | python | [{"finding_id": "codeql_py/bad-tag-filter_fb3cb766471fe717_d79fa995", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression only parses --> and not --!> as a HTML comment end tag.", "remediation": "", "location":... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression only parses --> and not --!> as a HTML comment end tag."
] | [
104
] | [
null
] | [
31
] | [
39
] | |
2024-11-18T22:29:03.276333+00:00 | 1,689,761,405,000 | aaabe374412eb4bbb39eab6a4cca960fded5acaf | 3 | {
"blob_id": "aaabe374412eb4bbb39eab6a4cca960fded5acaf",
"branch_name": "refs/heads/master",
"committer_date": 1689761405000,
"content_id": "bf6de46dc371a7fc8d6eb12fe58288ccf12b6b61",
"detected_licenses": [
"MIT"
],
"directory_id": "957ae0f325516ce4f8d7940aae628d4ec34ac647",
"extension": "py",
"fi... | 3.203125 | stackv2 | # -*- coding: utf-8 -*-
"""Utility functions to download files."""
import os
import hashlib
import zipfile
import tarfile
import requests
from tqdm.auto import tqdm
CHUNKSIZE = 1048576 # 1 MB
RETRIES = 3
def download_file(url, out_path, extract_out_path=None, byte_size=None, sha256sum=None, progress=True, callb... | 123 | 37.23 | 126 | 17 | 1,132 | python | [{"finding_id": "codeql_py/tarslip_6cd237fa94d40348_351d9d08", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)."
] | [
83
] | [
null
] | [
13
] | [
23
] | |
2024-11-18T22:29:03.695532+00:00 | 1,625,155,430,000 | 40775984de5bc83716e74cfdb5c56a78332c628b | 3 | {
"blob_id": "40775984de5bc83716e74cfdb5c56a78332c628b",
"branch_name": "refs/heads/master",
"committer_date": 1625155430000,
"content_id": "74ac33efd7c21830d8a55194cb5ad11bf7eb818a",
"detected_licenses": [
"MIT"
],
"directory_id": "ba91a64cc040cec52e8b46d4064a810ec8927e60",
"extension": "py",
"fi... | 2.65625 | stackv2 | import os
import json
from flask import Flask, render_template, request, redirect, url_for, flash
from werkzeug.utils import secure_filename
from read_midi import read_midi
from algorithms import siatec, time_warp_invariant
app = Flask(__name__)
app.config['UPLOAD_FOLDER'] = 'midi_files'
app.config['MAX_CONTENT_LENG... | 194 | 24.24 | 75 | 17 | 1,172 | python | [{"finding_id": "codeql_py/flask-debug_794df12fa4f6fcb3_41d82409", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
194,
156
] | [
null,
null
] | [
2,
13
] | [
22,
21
] | |
2024-11-18T22:29:20.188710+00:00 | 1,531,527,840,000 | c43bbc0b8a159060ad356c0a6ed5e61950376a12 | 3 | {
"blob_id": "c43bbc0b8a159060ad356c0a6ed5e61950376a12",
"branch_name": "refs/heads/master",
"committer_date": 1531527840000,
"content_id": "f7db3126a7ca4d2c550c7cad7b4e07e0c5610e87",
"detected_licenses": [
"MIT"
],
"directory_id": "2e6e1902fb74bb1af4820b85bc46e4feb21d58d0",
"extension": "py",
"fi... | 3.484375 | stackv2 | import racegen, namegen, statgen, classgen, featgen, skillgen
class NPC():
def __init__(self):
#Inputs
self.inLevel = None
self.inRace = None
self.inName = None
self.inGender = None
self.inStats = None
self.inClass = None
self.inFeats = None
self.inSkills = None
#Intermediate values
self.raceSt... | 116 | 27.18 | 114 | 15 | 908 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2c1d32f630cae3a4_916dcdad", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
99
] | [
null
] | [
9
] | [
60
] | |
2024-11-18T22:29:29.458445+00:00 | 1,608,527,961,000 | 8a4a5db7f93ac432dc848302261c721be8001c4a | 3 | {
"blob_id": "8a4a5db7f93ac432dc848302261c721be8001c4a",
"branch_name": "refs/heads/main",
"committer_date": 1608527961000,
"content_id": "2038c6d07b2476b214e42ce6fbc4ed55fa2e85e8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a1555437baf215548a7fc718b544264095718488",
"extension": "py",
... | 3.078125 | stackv2 | """Recursive full backup.
Usage:
remote-to-local-backup bkp SERVER USER REMOTE_DIR LOCAL_DIR
remote-to-local-backup (-h | --help)
Arguments:
SERVER Remote server from which to backup. It is assumed the passwordless authentication using public SSH key has already been set up
USER User id to login t... | 74 | 35.22 | 170 | 15 | 658 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_98504922c9a86287_aa8ccf77", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
38
] | [
null
] | [
5
] | [
60
] | |
2024-11-18T22:29:34.597030+00:00 | 1,603,740,682,000 | d98fe06ebe21f5d40394092fc90c84b8ac962b25 | 4 | {
"blob_id": "d98fe06ebe21f5d40394092fc90c84b8ac962b25",
"branch_name": "refs/heads/master",
"committer_date": 1603740682000,
"content_id": "fedcd3d6aca2b13a5d4adbef1f9ad080291d121b",
"detected_licenses": [
"MIT"
],
"directory_id": "7a20dac7b15879b9453150b1a1026e8760bcd817",
"extension": "py",
"fi... | 3.546875 | stackv2 | employee_salary = float(input())
readjustment_rate = gain = 0
if 0 <= employee_salary <= 400:
readjustment_rate = 15
elif 400 < employee_salary <= 800:
readjustment_rate = 12
elif 800 < employee_salary <= 1200:
readjustment_rate = 10
elif 1200 < employee_salary <= 2000:
readjustment_rate = 7
elif 2000 <... | 17 | 35.65 | 79 | 8 | 210 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_397e9fbdc7abf9a3_ba4945fa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
15
] | [
null
] | [
7
] | [
45
] | |
2024-11-18T22:40:27.601365+00:00 | 1,537,385,351,000 | 127e4a44a2f1c24299915d5b3bf51ddf6c41fb65 | 3 | {
"blob_id": "127e4a44a2f1c24299915d5b3bf51ddf6c41fb65",
"branch_name": "refs/heads/master",
"committer_date": 1537385351000,
"content_id": "5c4821bb82c66fa22cf3a130d9722d69648f54b8",
"detected_licenses": [
"MIT"
],
"directory_id": "517230c50762a1e3e10810831a2023554d0f99e2",
"extension": "py",
"fi... | 2.796875 | stackv2 | """Offer functions for updating the ``Population`` table in the database.
This module offer functions to automate the process of updating
the ``Population`` table in the database file, ``@/database/database.db``.
The module depends on ``database``, ``inputtools`` and ``outputtools`` modules.
The module contains the f... | 295 | 32.5 | 126 | 16 | 2,295 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b19a80e614c5e33b_8fd10c72", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
76
] | [
null
] | [
11
] | [
42
] | |
2024-11-18T22:41:13.633880+00:00 | 1,572,614,666,000 | 2e1d96e95790aa32d784f79e0d836b09dfa9b414 | 2 | {
"blob_id": "2e1d96e95790aa32d784f79e0d836b09dfa9b414",
"branch_name": "refs/heads/master",
"committer_date": 1572614666000,
"content_id": "93a07dc7500b6e036de7644d9cbe6f2d9caca97a",
"detected_licenses": [
"MIT"
],
"directory_id": "54e9f602de6d5b17e76170e78922f4ef26da99cd",
"extension": "py",
"fi... | 2.46875 | stackv2 | import time
import os
import tweepy
from selenium import webdriver
import sys
#Globals:
#pagenum, timeline, CONSUMER_TOKEN, CONSUMER_SECRET, config[]
def get_api_keys():
file = open(find_path("\env.txt"),"r")
api_keys = file.read()
file.close()
global CONSUMER_TOKEN
global CONSUMER_SEC... | 227 | 29.28 | 117 | 16 | 1,657 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_f2c2781337712f89_9b01702f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text."
] | [
103
] | [
null
] | [
24
] | [
44
] | |
2024-11-18T22:41:17.713248+00:00 | 1,377,196,573,000 | 6bb8a3044b0428f52d5e5b220719134ac07ccb35 | 2 | {
"blob_id": "6bb8a3044b0428f52d5e5b220719134ac07ccb35",
"branch_name": "refs/heads/master",
"committer_date": 1377196573000,
"content_id": "df5dc4e622ac5338936a74f29bc5bb3d37582cc1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4d7c40c014762d03e27f999cc989906bb24cec2a",
"extension": "py"... | 2.328125 | stackv2 | # Copyright 2012 OpenStack Foundation
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable l... | 51 | 34.39 | 78 | 13 | 397 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2cc59b69501cd7e8_ba542a3f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
17
] | [
20
] | [
7
] | [
4
] | |
2024-11-18T22:41:21.169755+00:00 | 1,458,375,735,000 | 833438ff1b37e80468f0f762af032484854ba254 | 2 | {
"blob_id": "833438ff1b37e80468f0f762af032484854ba254",
"branch_name": "refs/heads/master",
"committer_date": 1458375735000,
"content_id": "1191c67fa9bfdb8cccaa02434885f06f506a8ecb",
"detected_licenses": [
"MIT"
],
"directory_id": "0a17076b65f7a8cf44decdc6bd924bc12d6ee4df",
"extension": "py",
"fi... | 2.328125 | stackv2 | # -*- coding: utf-8 -*-
import os
import sys
import requests
import shutil
import multiprocessing
import time
from time import strftime
from bs4 import BeautifulSoup
from functools import partial
requests.packages.urllib3.disable_warnings()
rs = requests.session()
#移除特殊字元(移除Windows上無法作為資料夾的字元)
def remove(value, del... | 141 | 28.61 | 110 | 16 | 1,145 | python | [{"finding_id": "codeql_py/request-without-cert-validation_8c7416cfacf40886_2dffbfac", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
71,
85,
95
] | [
null,
null,
null
] | [
14,
11,
14
] | [
56,
38,
82
] | |
2024-11-18T22:54:22.853364+00:00 | 1,624,074,467,000 | 42ff578786a37b04f2c4c2e19bdc9fe1f56aa8d2 | 2 | {
"blob_id": "42ff578786a37b04f2c4c2e19bdc9fe1f56aa8d2",
"branch_name": "refs/heads/main",
"committer_date": 1624074467000,
"content_id": "3d015a9b6da1a85dcd1547d211ecee60a9198b97",
"detected_licenses": [
"Unlicense"
],
"directory_id": "69f171d355007971c23cdb1ab7fa62c73e3705d0",
"extension": "py",
... | 2.34375 | stackv2 | # ver 20210508a
import time
_ = {'_':time.time()}
class main:
def __init__(self, dbstr_file=None, debug=False,
dbstr='{protocol}://{user}:{password}@{host}:{port}/{db}?charset={charset}',
db='', protocol='mysql', user='root',password='', host='127.0.0.1', port=3306, charset='utf8mb4'
... | 48 | 35.88 | 134 | 18 | 470 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7093ed9dfcf50be2_1ea5eab3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
19
] | [
null
] | [
23
] | [
29
] | |
2024-11-18T20:55:06.512597+00:00 | 1,555,601,556,000 | 1c5ba0ac6ab24c55ecc12619ffa0d59ab1f9dcfa | 2 | {
"blob_id": "1c5ba0ac6ab24c55ecc12619ffa0d59ab1f9dcfa",
"branch_name": "refs/heads/master",
"committer_date": 1555601556000,
"content_id": "7b3b7eab9fb4df666d085b0506319e9920d8872f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e658c33d72c123db65c0343bdf284ed108108d27",
"extension": "py"... | 2.46875 | stackv2 | from flask import Flask, request, jsonify
import base64
import json
import os
from predict import predict
from crontab import CronTab
app = Flask(__name__)
if os.path.isdir("data/known/aligned") == False:
os.mkdir("data/known/aligned")
training_cron = CronTab(user='root')
job = training_cron.new(command='python ... | 43 | 28.53 | 103 | 17 | 346 | python | [{"finding_id": "codeql_py/path-injection_adb364422d438ec5_34673bf4", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 4 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
37,
37,
39,
39
] | [
null,
null,
null,
null
] | [
14,
42,
14,
53
] | [
41,
84,
51,
103
] | |
2024-11-18T21:07:42.927382+00:00 | 1,455,588,497,000 | b7472cb20b8cef7035262fcc04a4ef27c130e718 | 3 | {
"blob_id": "b7472cb20b8cef7035262fcc04a4ef27c130e718",
"branch_name": "refs/heads/master",
"committer_date": 1455588497000,
"content_id": "beefe452a7baee907eca3c3c2813218b1046541c",
"detected_licenses": [
"MIT"
],
"directory_id": "04445b43506e1351a7b78e60d09b2af67db527ed",
"extension": "py",
"fi... | 2.625 | stackv2 | import requests
import json
uwApiEndpoint = "https://api.uwaterloo.ca/v2/"
apiKey = "YOUR API KEY HERE"
reqUrl = uwApiEndpoint + "terms/1161/courses.json?key=" + apiKey
r = requests.get(reqUrl)
courseListData = r.json()
courseDetailsList = []
print "There are " + str(len(courseListData["data"])) + " courses"
count ... | 27 | 27.96 | 125 | 13 | 211 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_89e1f3a4e921e6bd_66a71e9e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
26
] | [
null
] | [
16
] | [
26
] | |
2024-11-18T21:33:01.817387+00:00 | 1,645,276,200,000 | 2367e91d6bb2c4ecf55da59b8864961cb050559e | 2 | {
"blob_id": "2367e91d6bb2c4ecf55da59b8864961cb050559e",
"branch_name": "refs/heads/master",
"committer_date": 1645276200000,
"content_id": "37d121e94ed3dec537c749e16783b5a0117ef462",
"detected_licenses": [
"MIT"
],
"directory_id": "3ee7a2074e29e070ecc8d84efb7175a44aa1c7dc",
"extension": "py",
"fi... | 2.4375 | stackv2 | # pylint: disable=too-many-branches
import socket
import time
import random
import logging
import ssl
import datetime
import subprocess
import threading
from . import config
from . import parser
from . import handler
CONNECTION_TIMEOUT = 30
REBOOT_TIMEOUT = 6
class ShutdownException(Exception):
pass
class Clie... | 87 | 29.24 | 89 | 17 | 468 | python | [{"finding_id": "codeql_py/insecure-protocol_3973cd2e15e841d8_0eeaa6f4", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)."
] | [
50
] | [
null
] | [
26
] | [
37
] | |
2024-11-18T21:33:13.059491+00:00 | 1,426,898,201,000 | dea8c66fe4e6587d9ce6c0725a30aebfb5c38be8 | 3 | {
"blob_id": "dea8c66fe4e6587d9ce6c0725a30aebfb5c38be8",
"branch_name": "refs/heads/master",
"committer_date": 1426898201000,
"content_id": "55e0930f83b2c5193a9525f7b96ce1aedc27394e",
"detected_licenses": [
"MIT"
],
"directory_id": "ca6b7a35820a513634c97be6951f6c5c02fa1073",
"extension": "py",
"fi... | 3.375 | stackv2 | import random
content = open("enable1.txt").readlines()
length = 4
amount = 5
words = []
realpass = 0
while True:
s = input("Difficulty level? (1-5): ")
if int(s) >=1 and int(s)<=5:
length+=int(s)
amount=(2*int(s))+2
break
else:
print("actual difficulty please")
for item in content:
if len(item) == length+1... | 44 | 21.34 | 61 | 13 | 290 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_438d8f6456b4c7b4_07d59dae", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
23
] | [
null
] | [
8
] | [
20
] | |
2024-11-18T21:33:18.500658+00:00 | 1,690,302,849,000 | 466d6e6f665d1bace119ec2a74485519ab22f5d2 | 3 | {
"blob_id": "466d6e6f665d1bace119ec2a74485519ab22f5d2",
"branch_name": "refs/heads/master",
"committer_date": 1690302849000,
"content_id": "e1f6ac499025b9e8175d647e47a5fbec6bda6bc1",
"detected_licenses": [
"MIT"
],
"directory_id": "911eb06616fba273482941ff729a55f61fd3404d",
"extension": "py",
"fi... | 3.171875 | stackv2 | #!/usr/bin/python3
import os
import random as rn
import time
import xml.etree.ElementTree as ET
import hashlib
from AESCipher import AESCipher
from Database import Database
# ============ GLOBAL VARS =====================================================
# ============ UTILITIES =======================================... | 391 | 32.07 | 107 | 17 | 2,923 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6b9b9c68190347ad_f9cfd66f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
147,
229
] | [
null,
231
] | [
15,
11
] | [
18,
81
] | |
2024-11-18T21:33:18.866126+00:00 | 1,445,125,314,000 | c4635d18173f4eee56189082e40d8f87ae4bf2d4 | 3 | {
"blob_id": "c4635d18173f4eee56189082e40d8f87ae4bf2d4",
"branch_name": "refs/heads/master",
"committer_date": 1445125314000,
"content_id": "673fe4b0a91910b9e66c66420c3e51c0e422c3be",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "85578a60df18e3147ec6d47d41f54454dee1343d",
"extension": "p... | 2.515625 | stackv2 | """
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT... | 214 | 26.73 | 87 | 18 | 1,453 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c60f2a4d7e69f9ed_03913fdb", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://news.ycombinator.com](1) may be at an arbitrary... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [http://news.ycombinator.com](1) may be at an arbitrary position in the sanitized URL."
] | [
157
] | [
null
] | [
14
] | [
60
] | |
2024-11-18T21:33:22.743889+00:00 | 1,429,267,842,000 | ff90aa0fb61ee8cdfdce7c4f9fc924e957eabe5b | 3 | {
"blob_id": "ff90aa0fb61ee8cdfdce7c4f9fc924e957eabe5b",
"branch_name": "refs/heads/master",
"committer_date": 1429267842000,
"content_id": "101a7d148874f545b161968d0a67f51310cf8392",
"detected_licenses": [
"MIT"
],
"directory_id": "a4526e490d516e02baf3e2a47dfdd0635e7a03c9",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/env python
#
# run.py
#
# References:
#
# * Masek J. 2013. Single interval showtwave radiation scheme with
# parametrized optical saturation and spectral overlaps.
#
import sys
import os
from tempfile import NamedTemporaryFile
import subprocess
import numpy as np
from StringIO import StringIO
impo... | 223 | 20.1 | 71 | 16 | 1,532 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_dfb5a556248de0ba_23f9d650", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
93
] | [
null
] | [
14
] | [
43
] | |
2024-11-18T21:33:26.679663+00:00 | 1,599,270,040,000 | f6e58103968da2c46c03db882ca198facf9ba349 | 3 | {
"blob_id": "f6e58103968da2c46c03db882ca198facf9ba349",
"branch_name": "refs/heads/master",
"committer_date": 1599270040000,
"content_id": "bf93fdfd6233dc9f7eff19f2f8af1ce0f6631d8d",
"detected_licenses": [
"MIT"
],
"directory_id": "156b7c94908339457d938c0330ec1313ec6cc132",
"extension": "py",
"fi... | 2.8125 | stackv2 | import datetime
import itertools
import re
from urllib.parse import urlparse
import arrow
import pytz
from .constants import LOCALE, Accuracy, Guess, NO_METHOD
# inspired by (MIT licensed) https://github.com/codelucas/newspaper
_LOCALE = arrow.locales.get_locale(LOCALE)
SEPARATOR = r'([\./\-_]{0,1})'
YEAR_PATTERN =... | 139 | 30.56 | 100 | 16 | 1,058 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_bff1ae6cf04935f6_c3eb6457", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [wikipedia.org](1) may be at an arbitrary position in t... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [wikipedia.org](1) may be at an arbitrary position in the sanitized URL.",
"The string [twitter.com](1) may be at an arbitrary position in the sanitized URL."
] | [
119,
122
] | [
null,
null
] | [
10,
10
] | [
44,
42
] | |
2024-11-18T21:55:55.945435+00:00 | 1,564,690,515,000 | b35fdf5d495bc00f776f0f00d7fdbc78bb6e4fc1 | 3 | {
"blob_id": "b35fdf5d495bc00f776f0f00d7fdbc78bb6e4fc1",
"branch_name": "refs/heads/master",
"committer_date": 1564690515000,
"content_id": "98648affd74e77e13cf3ae32fc7cbfa2a4869f14",
"detected_licenses": [
"MIT"
],
"directory_id": "22cc26c10943bc25f50f36cb2b36a28948ef885b",
"extension": "py",
"fi... | 2.8125 | stackv2 | #!/usr/bin/env python3
from flask import Flask
from flask import redirect
from flask import url_for
app = Flask(__name__)
@app.route("/admin")
def hello_admin():
return "Hello Administrator"
@app.route("/guest/<guest>")
def hello_guest(guest):
return "Hello {}, Guest".format(guest)
@app.route("/user/<name>... | 24 | 21.38 | 59 | 14 | 129 | python | [{"finding_id": "codeql_py/reflective-xss_974507bf4accf501_aa6259ca", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
14
] | [
null
] | [
12
] | [
43
] | |
2024-11-18T21:56:07.664293+00:00 | 1,603,728,276,000 | 397d26c98a0fb6dd6bded84f53d80497810a48e9 | 3 | {
"blob_id": "397d26c98a0fb6dd6bded84f53d80497810a48e9",
"branch_name": "refs/heads/main",
"committer_date": 1603728276000,
"content_id": "d2d79637c891bad8ed69b4d1dc572282f031d2c3",
"detected_licenses": [
"MIT"
],
"directory_id": "6286bd6ae8085c3f7946011ad8b2faf743577b78",
"extension": "py",
"file... | 2.546875 | stackv2 | import os
from pathlib import Path
from flask import Blueprint, flash, request, redirect, render_template, send_from_directory
from werkzeug.utils import secure_filename
from flaskr.worker import process_file
from flaskr.db import get_db
from flaskr.conf import ALLOWED_EXTENSIONS, MAX_VIDEO_LENGTH, UPLOAD_FOLDER
bp ... | 93 | 32.65 | 118 | 16 | 701 | python | [{"finding_id": "codeql_py/url-redirection_4beed19d15d80717_6c75e901", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 5 | true | [
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends o... | [
43,
47,
52,
68,
71
] | [
null,
null,
null,
null,
null
] | [
29,
33,
29,
29,
29
] | [
40,
44,
40,
40,
40
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.