added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T20:06:10.723945+00:00 | 1,668,635,430,000 | 9f1e98a7f14438cca0dbdbb1f5035908433312e1 | 3 | {
"blob_id": "9f1e98a7f14438cca0dbdbb1f5035908433312e1",
"branch_name": "refs/heads/master",
"committer_date": 1668635430000,
"content_id": "5047c38b8ef8fcceeeb98f2aea6934bb7234c053",
"detected_licenses": [
"MIT"
],
"directory_id": "c808eb66af2c5b3a269d8cf42ef7a987bbbfd216",
"extension": "py",
"fi... | 2.6875 | stackv2 | from flask import Flask, request
import os
from transformers import (
RobertaForSequenceClassification,
RobertaForMaskedLM,
RobertaTokenizer,
)
import torch
import nltk
from nltk.tokenize.treebank import TreebankWordDetokenizer
import json
import re
def replace_query_token(sentence):
"Small utility fu... | 237 | 34.71 | 122 | 24 | 1,712 | python | [{"finding_id": "codeql_py/reflective-xss_e4b2902216775fc3_cdce23cc", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
145,
182,
235
] | [
null,
null,
null
] | [
20,
24,
24
] | [
40,
44,
44
] | |
2024-11-18T20:06:13.396944+00:00 | 1,573,983,463,000 | 97e5f2a82c095d24fcabda17596e3b308495392e | 3 | {
"blob_id": "97e5f2a82c095d24fcabda17596e3b308495392e",
"branch_name": "refs/heads/master",
"committer_date": 1573983463000,
"content_id": "3d9fee0e91b0ba3a8505ba68f5267bf83a5caa21",
"detected_licenses": [
"MIT"
],
"directory_id": "e0177aa8facbcf17860189f3f9820c42d4aa2837",
"extension": "py",
"fi... | 2.640625 | stackv2 | '''
@Author: your name
@Date: 2019-11-17 15:35:21
@LastEditTime: 2019-11-17 15:46:42
@LastEditors: Please set LastEditors
@Description: In User Settings Edit
@FilePath: /tornado_study/chapter1/hello.py
'''
import tornado.httpserver
import tornado.ioloop
import tornado.options
import tornado.web
from tornado.options imp... | 33 | 25.52 | 68 | 12 | 243 | python | [{"finding_id": "codeql_py/reflective-xss_ce6653acd07e8852_7111e9f3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
23
] | [
null
] | [
20
] | [
49
] | |
2024-11-18T20:06:27.566138+00:00 | 1,486,049,299,000 | ecfa8faab1927c6cb44f532578edcaedf7c3fe5d | 2 | {
"blob_id": "ecfa8faab1927c6cb44f532578edcaedf7c3fe5d",
"branch_name": "refs/heads/master",
"committer_date": 1486049299000,
"content_id": "6efcba773e0518262106387795f49558f8ceb7cd",
"detected_licenses": [
"MIT"
],
"directory_id": "f75959985a7445180b76f664c76dc9f960f47b6d",
"extension": "py",
"fi... | 2.390625 | stackv2 |
import click
import os
import smtplib
from certidude.user import User
from markdown import markdown
from jinja2 import Environment, PackageLoader
from email.mime.multipart import MIMEMultipart
from email.mime.text import MIMEText
from email.mime.base import MIMEBase
from urlparse import urlparse
env = Environment(loa... | 96 | 27.68 | 101 | 14 | 631 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_1778cef8386248b9_1061c889", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
null
] | [
7
] | [
71
] | |
2024-11-18T20:18:15.449469+00:00 | 1,618,304,658,000 | 34d27d5a4e193d88f58819ebde2dba712a4c4d4f | 2 | {
"blob_id": "34d27d5a4e193d88f58819ebde2dba712a4c4d4f",
"branch_name": "refs/heads/master",
"committer_date": 1618304658000,
"content_id": "11ac47aabb5362658a8b6a3bd2df7059ee85ce1e",
"detected_licenses": [
"MIT"
],
"directory_id": "427c454142bae26ff67c73d3653fbdb16416904a",
"extension": "py",
"fi... | 2.328125 | stackv2 | import config
import json
from PIL import Image
from flask import Flask, request, make_response, render_template
from flask import redirect, url_for, jsonify
from src.object_detection import ObjDetectNet
from src.face_recognition import FaceRecogniser
app = Flask(__name__)
obj_det_net = ObjDetectNet()
obj_det_net.ini... | 60 | 31.67 | 81 | 18 | 410 | python | [{"finding_id": "codeql_py/stack-trace-exposure_74822312ec0061e6_a923e595", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
56
] | [
null
] | [
28
] | [
53
] | |
2024-11-18T20:18:18.464058+00:00 | 1,491,795,874,000 | ea1f5e24625e2851740b4857a1ddc505d181bfc3 | 3 | {
"blob_id": "ea1f5e24625e2851740b4857a1ddc505d181bfc3",
"branch_name": "refs/heads/master",
"committer_date": 1511121486000,
"content_id": "a5f562a04a15df5d219ae891c4fe040aff1a6c9c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f44a4cc5fe5ddda3f622605a4f37c04a9bb5b775",
"extension": "py"... | 2.53125 | stackv2 | #!/usr/bin/env python
# GPX from google maps route: http://www.gpsvisualizer.com/convert_input
# Or export directly from http://map.project-osrm.org
### stdlib packages
import os
import socket
import argparse
import sys
import select
import time
import threading
import thread
### external deps
try:
import dateuti... | 300 | 31.1 | 114 | 18 | 2,159 | python | [{"finding_id": "codeql_py/path-injection_ba1468e1310c6485_0c0ee59a", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "remed... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2)."
] | [
202,
210
] | [
null,
null
] | [
39,
27
] | [
49,
37
] | |
2024-11-18T20:18:20.858749+00:00 | 1,662,411,010,000 | 1ea06a23f9bde6337cddad204c99085e6422c3ad | 3 | {
"blob_id": "1ea06a23f9bde6337cddad204c99085e6422c3ad",
"branch_name": "refs/heads/master",
"committer_date": 1662411010000,
"content_id": "97e7b5a07c087532df9bc83759e7cb7f60bd01d2",
"detected_licenses": [
"MIT"
],
"directory_id": "cf689b536bac0b58d104e48bf0e8b1d34450ff13",
"extension": "py",
"fi... | 2.84375 | stackv2 | import logging
import requests
from leexportpy.service import Service
LOGGER = logging.getLogger(__name__)
class DummyService(Service):
"""
En example service class to show how to provide a new service support.
"""
def __init__(self, response, api_key, destination_config):
"""
Initi... | 41 | 26.44 | 81 | 11 | 236 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_902daa4ea3b903bb_ad0c2c7e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
32
] | [
null
] | [
47
] | [
59
] | |
2024-11-18T20:31:18.790541+00:00 | 1,643,198,260,000 | c684a40761cbb314c992f5ea4cf97c25e5c2a400 | 3 | {
"blob_id": "c684a40761cbb314c992f5ea4cf97c25e5c2a400",
"branch_name": "refs/heads/master",
"committer_date": 1643198260000,
"content_id": "38f7b4091610bfb0a0638a4d17457811b30d0a88",
"detected_licenses": [
"MIT"
],
"directory_id": "4d6c87d239681c55d0119219c30296ed611ad5d4",
"extension": "py",
"fi... | 3.28125 | stackv2 | """
Connection functions
"""
import sqlite3
import hashlib
from flask import session
def logged_in():
return session.get('logged_in')
def log_in():
session['logged_in'] = True
def logout():
session['logged_in'] = False
def validate(username, password):
con = sqlite3.connect("User.db")
compl... | 34 | 22 | 77 | 14 | 168 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_173c4bf54e084f8e_3914d975", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
34
] | [
null
] | [
43
] | [
65
] | |
2024-11-18T20:31:20.337190+00:00 | 1,631,715,293,000 | 987d3904f9faf77e5f70e43c778a4d55ab9598a6 | 2 | {
"blob_id": "987d3904f9faf77e5f70e43c778a4d55ab9598a6",
"branch_name": "refs/heads/main",
"committer_date": 1631715293000,
"content_id": "1a3bce54903aafaa696315dcc2bdce756bacefde",
"detected_licenses": [
"MIT"
],
"directory_id": "26f976ad9de2009f980bc13dc9bfc3ef10873dcc",
"extension": "py",
"file... | 2.3125 | stackv2 |
import streamlit as st
import urllib3
import numpy as np
from PIL import Image
import cv2
import requests
import socket
#================================
# Message Headers
#=================================
COMMAND_START=bytes("<command>",'utf-8')
COMMAND_END=bytes("</command>","utf-8")
IMAGE_START=bytes("<image>",... | 120 | 32.72 | 132 | 15 | 1,034 | python | [{"finding_id": "codeql_py/full-ssrf_c70a3b1fb32ccdf1_597c9d3b", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
100
] | [
null
] | [
20
] | [
50
] | |
2024-11-18T20:31:22.478914+00:00 | 1,570,124,937,000 | 3d173d8be25587204988147f4f977b07f815e309 | 3 | {
"blob_id": "3d173d8be25587204988147f4f977b07f815e309",
"branch_name": "refs/heads/master",
"committer_date": 1570124936000,
"content_id": "1833a83f645e439c430db6106ebc21f806da9339",
"detected_licenses": [
"MIT"
],
"directory_id": "dd7039f4a2ac02101f1cbe76bc3e35d23ad45f1f",
"extension": "py",
"fi... | 2.84375 | stackv2 | # -*- coding: UTF-8 -*-
import re
# From:
# http://stackoverflow.com/a/33417311/735926
# http://jrgraphix.net/r/Unicode/2600-26FF
# https://en.wikipedia.org/wiki/Enclosed_Alphanumeric_Supplement
# https://en.wikipedia.org/wiki/CJK_Symbols_and_Punctuation
# https://en.wikipedia.org/wiki/Miscellaneous_Technic... | 129 | 27.75 | 77 | 14 | 1,340 | python | [{"finding_id": "codeql_py/overly-large-range_e864ed9b7ee65734_57f9f9b3", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 5 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range ... | [
14,
14,
14,
14,
14
] | [
null,
null,
null,
null,
null
] | [
6,
9,
12,
15,
18
] | [
10,
13,
16,
19,
22
] | |
2024-11-18T20:43:25.382016+00:00 | 1,472,661,761,000 | 73876c1cc0526ec4fb317904bd408286e5ecf756 | 3 | {
"blob_id": "73876c1cc0526ec4fb317904bd408286e5ecf756",
"branch_name": "refs/heads/master",
"committer_date": 1472661761000,
"content_id": "b83a5f79b09228f0c533d6a81785cae960c63644",
"detected_licenses": [
"MIT"
],
"directory_id": "cef83c75099225056b76a42cb4fc9d413490f6b7",
"extension": "py",
"fi... | 2.75 | stackv2 | from flask import Response, Flask, request, abort, render_template
from flask import jsonify
from datetime import datetime
from flask_restful import Resource, Api
from sqlalchemy import create_engine
from json import dumps
#Create a engine for connecting to SQLite3.
#Assuming geo_example.db is in your app root folder
... | 104 | 41.7 | 126 | 18 | 1,099 | python | [{"finding_id": "codeql_py/flask-debug_4e501c27c38d046f_f0ff8645", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-089",
"CWE-089",
"CWE-089"
] | [
"py/flask-debug",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).\nThis SQL query depend... | [
104,
52,
64,
74
] | [
null,
null,
null,
null
] | [
5,
30,
30,
30
] | [
40,
92,
87,
126
] | |
2024-11-18T20:43:47.021662+00:00 | 1,489,758,709,000 | a03522b73769a94b8ce73f33e157082e9eb700c2 | 2 | {
"blob_id": "a03522b73769a94b8ce73f33e157082e9eb700c2",
"branch_name": "refs/heads/master",
"committer_date": 1489758709000,
"content_id": "2dabab8e64cdfdffb80a46c1cabfc16f1ed33288",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "18d81ad2843c655b1b3dd20b6915806ab85086d8",
"extension": "py"... | 2.5 | stackv2 | #!/usr/bin/python
from ambariclient.client import Ambari
from jinja2 import Template
import argparse, json
import socket
parser = argparse.ArgumentParser()
parser.add_argument("-v", action="store_true", default=False, dest='verbose', help="increase output verbosity")
parser.add_argument("-H", action="store", dest='host... | 82 | 39.82 | 147 | 13 | 784 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_829efec814cef909_a5959e8d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
51
] | [
null
] | [
9
] | [
32
] | |
2024-11-18T20:43:56.337421+00:00 | 1,593,610,178,000 | a4b137e8273276ed6099e1ebd47051725abbe599 | 3 | {
"blob_id": "a4b137e8273276ed6099e1ebd47051725abbe599",
"branch_name": "refs/heads/master",
"committer_date": 1593610178000,
"content_id": "084832715e4e078c8bfe45f777b7a7cf8ee997d3",
"detected_licenses": [
"MIT"
],
"directory_id": "504b13512f5138a7deca1ae711cd4ef7e5e4804e",
"extension": "py",
"fi... | 2.75 | stackv2 | import glob
import os
import tarfile
import matplotlib.pyplot as plt
from tensorflow.keras.preprocessing.image import *
from tensorflow.keras.utils import get_file
DATASET_URL = 'https://datashare.is.ed.ac.uk/bitstream/handle/10283/3192/CINIC-10.tar.gz?sequence=4&isAllowed=y'
DATA_NAME = 'cinic10'
FILE_EXTENSION = 't... | 57 | 31.51 | 112 | 10 | 466 | python | [{"finding_id": "codeql_py/tarslip_82c58e3be43ff3b1_937aa12b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
22
] | [
null
] | [
5
] | [
8
] | |
2024-11-18T20:57:37.263827+00:00 | 1,593,596,362,000 | 65f57e77bac8ad90047f954386b6e7ebd4c15054 | 3 | {
"blob_id": "65f57e77bac8ad90047f954386b6e7ebd4c15054",
"branch_name": "refs/heads/master",
"committer_date": 1593596362000,
"content_id": "22f7eb6c2b1988911507d97d68fe51ccece4a44e",
"detected_licenses": [
"MIT",
"Apache-2.0",
"BSD-3-Clause"
],
"directory_id": "4364462dc62973437404ff6992175f6... | 3.046875 | stackv2 | import os
import json
from base64 import b64encode
from Crypto.Cipher import AES
from Crypto.Random import get_random_bytes
import hashlib
import random
def aesgcmEncrypt(byte, key, nonce):
mac_len = 16
cipher = AES.new(key, AES.MODE_GCM, nonce=nonce, mac_len=mac_len)
ciphertext, tag = cipher.encrypt_and_... | 36 | 34.25 | 83 | 12 | 359 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9e9e0ab6e5a14f72_0f1c72d9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
33,
34
] | [
null,
null
] | [
44,
42
] | [
56,
58
] | |
2024-11-18T20:57:59.816241+00:00 | 1,566,484,879,000 | c80b7102f8b9070a96c7bb3d71f8a38f011f0544 | 4 | {
"blob_id": "c80b7102f8b9070a96c7bb3d71f8a38f011f0544",
"branch_name": "refs/heads/master",
"committer_date": 1566484879000,
"content_id": "0f60cf94001deec658493e254e7a40304feb282b",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "8b68ab8567bfb36b310135a293b68b08f999e4a9",
"extension": "p... | 3.90625 | stackv2 | # Review AutomateTheBoringStuff Chapter 5 principles, test out a few things
# dictionary data type create replace update delete search and transformation
spam = ['cats', 'dogs', 'moose', ]
bacon = ['dogs', 'moose', 'cats', ]
print(spam == bacon)
eggs = {'name': 'Zophie', 'species': 'cat', 'age': '8', }
ham = {'specie... | 100 | 30 | 98 | 16 | 979 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_36c4f70162225b13_412b54b5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
23,
30
] | [
null,
null
] | [
15,
7
] | [
62,
16
] | |
2024-11-18T20:58:07.710756+00:00 | 1,616,038,434,000 | e429dc546928bbdaf79b3da1e4774762acc03ded | 3 | {
"blob_id": "e429dc546928bbdaf79b3da1e4774762acc03ded",
"branch_name": "refs/heads/main",
"committer_date": 1616038434000,
"content_id": "eeaa9bb0552385f5b2be94514e95f76bc4033bbc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "23bcc6dedab12c27e29499af8e74177f21bf2d06",
"extension": "py",
... | 2.84375 | stackv2 | import re, string
import sys, os
import pandas as pd
from wordcloud import WordCloud
import matplotlib # Importing matplotlib for it working on remote server
#matplotlib.use('tkagg')
import matplotlib.pyplot as plt
import emoji
def give_emoji_free_text(text):
return emoji.get_emoji_regexp().sub(r'', text.decode('... | 91 | 34.65 | 109 | 14 | 1,011 | python | [{"finding_id": "codeql_py/overly-large-range_29f9a6f7e49a85c7_c28431a6", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 5 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range ... | [
53,
53,
53,
53,
53
] | [
null,
null,
null,
null,
null
] | [
30,
33,
36,
39,
45
] | [
34,
37,
40,
43,
49
] | |
2024-11-18T20:58:19.377324+00:00 | 1,600,208,766,000 | b73bc9a991e27ac64bda6296b6b9a4356535090f | 3 | {
"blob_id": "b73bc9a991e27ac64bda6296b6b9a4356535090f",
"branch_name": "refs/heads/master",
"committer_date": 1600208766000,
"content_id": "1444c2a69f4ae5a67cb69bbbd85ac69cbd3a414e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0f58bcae13be4d9f5d1be2cbd6fc3d19a6529745",
"extension": "py"... | 2.515625 | stackv2 | #
# 2020 ExpertSystem
#
'''Script for generating predictions for Task2 of CLEF 2018 using the
acred predictor
See https://github.com/clef2018-factchecking/clef2018-factchecking
See also scripts/fetch-data.sh, which should download the v1.0 release
and place it in the `data/evaluation/` folder.
'''
import argparse
im... | 138 | 31.99 | 91 | 16 | 1,134 | python | [{"finding_id": "codeql_py/request-without-cert-validation_a5fff7b144068d1f_a6d11377", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
108
] | [
null
] | [
20
] | [
51
] | |
2024-11-18T21:11:10.749516+00:00 | 1,521,609,831,000 | 53805c15e500879aa4c1151370e55b6b8eb1b872 | 4 | {
"blob_id": "53805c15e500879aa4c1151370e55b6b8eb1b872",
"branch_name": "refs/heads/master",
"committer_date": 1521609831000,
"content_id": "9bbcdd5c429cc940b52ca27021acc4b81eb5ed38",
"detected_licenses": [
"MIT"
],
"directory_id": "e0cb098d0d14f1ededd2224a92bb0554a79cd52c",
"extension": "py",
"fi... | 3.90625 | stackv2 | #Ex9_Program_Excercise
class Contact:
def __init__(self, name, phone_number, e_mail, addr):
self.name=name
self.phone_number=phone_number
self.e_mail=e_mail
self.addr=addr
def print_info():
print("이름: ", self.name)
print('연락처: ', self.phone_number)
print('이메일: ', self.e_mail)
print('주소: ', self.addr)... | 40 | 16.9 | 54 | 11 | 229 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_70f5e5b358ca1fcf_d7f85b0e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
11,
21
] | [
null,
null
] | [
18,
14
] | [
35,
26
] | |
2024-11-18T19:03:20.634418+00:00 | 1,517,690,990,000 | 201f849b6290d695fdbcac633a050f5fd72daa9f | 3 | {
"blob_id": "201f849b6290d695fdbcac633a050f5fd72daa9f",
"branch_name": "refs/heads/master",
"committer_date": 1517690990000,
"content_id": "a3e960f66db07f51d293d3f94672d4f626fa2461",
"detected_licenses": [
"MIT"
],
"directory_id": "755190f3709d1ca8c192a106e84bc3c9694115f6",
"extension": "py",
"fi... | 2.578125 | stackv2 | import logging
import util.web
log = logging.getLogger(__name__)
class Account:
"""
Account class responsible for account related operations.
"""
_login_page_url = 'https://www.ezcapechat.com/login'
_login_post_url = 'https://www.ezcapechat.com/php/go/go_login.php'
_html_source = u''
_n_... | 90 | 27.49 | 107 | 17 | 577 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0e530fe42b18cc3b_417bcc56", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
74
] | [
null
] | [
23
] | [
56
] | |
2024-11-18T19:28:39.866700+00:00 | 1,572,962,347,000 | a450b99ecc453208b72acbe28a26fe58e29713f4 | 3 | {
"blob_id": "a450b99ecc453208b72acbe28a26fe58e29713f4",
"branch_name": "refs/heads/master",
"committer_date": 1572962347000,
"content_id": "38e73290a2f45d27f10b120028c27e781efe3228",
"detected_licenses": [
"Unlicense"
],
"directory_id": "acf9c9f3ca79e93ab785ab4e1c83f7027696d673",
"extension": "py",... | 2.515625 | stackv2 | # import the Flask class from the flask module
import os
from os import urandom
import requests
from flask import Flask, redirect, render_template, request, url_for, jsonify, session
from puppeteer import PrivateIGScrapper, nsfw_api_batch_post
# create the application object
app = Flask(__name__)
app.secret_key = uran... | 61 | 32.82 | 86 | 16 | 399 | python | [{"finding_id": "codeql_py/stack-trace-exposure_42933cb76548f00c_4bdf66e8", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
43,
61
] | [
null,
null
] | [
21,
5
] | [
27,
24
] | |
2024-11-18T19:39:48.686321+00:00 | 1,558,962,302,000 | 957f6c515bc0cb376d673b74558cff4064a0a8f4 | 2 | {
"blob_id": "957f6c515bc0cb376d673b74558cff4064a0a8f4",
"branch_name": "refs/heads/master",
"committer_date": 1558962302000,
"content_id": "57b33cda3775ee23f8b72346f3737068f76e6757",
"detected_licenses": [
"MIT"
],
"directory_id": "6c1dc9c19c078272faa5077e97015732f6d7e959",
"extension": "py",
"fi... | 2.359375 | stackv2 | # 从数据库查询数据 并且传给模板
import hashlib
import os
import uuid
import flask
from flask import render_template, url_for, redirect, request, make_response, session, g, current_app
from flask_mail import Message
from sqlalchemy import and_, or_
from werkzeug.exceptions import abort
from code1.app import db, mail
from code1.app.... | 330 | 28.19 | 144 | 18 | 2,704 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_014f9e477dcbecb5_a47137a3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-079",
"CWE-022"
] | [
"py/clear-text-logging-sensitive-data",
"py/reflective-xss",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
62,
69,
254
] | [
null,
null,
null
] | [
25,
34,
20
] | [
33,
92,
31
] | |
2024-11-18T20:18:21.250948+00:00 | 1,425,067,076,000 | f5d0ac1364c0aa5e175f33d649cd135bdf671009 | 3 | {
"blob_id": "f5d0ac1364c0aa5e175f33d649cd135bdf671009",
"branch_name": "refs/heads/master",
"committer_date": 1425067076000,
"content_id": "1bf42bbd4d9b4ba8089f36952c664fe3bffa3e0b",
"detected_licenses": [
"MIT"
],
"directory_id": "fdde0fa76eea56f9aac6b944a42072dd93e5d71e",
"extension": "py",
"fi... | 2.640625 | stackv2 | __author__ = 'Blake'
import os
import re
from collections import namedtuple
from jinja2 import Environment as JinjaEnvironment, FileSystemLoader as JinjaLoader
from synpost.globals import Values as Globals
from synpost.fn.io import generic_collect
ThemeFile = namedtuple('ThemeFile', 'filename valiname filepath ext... | 107 | 37.45 | 130 | 16 | 921 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c62c397c343a5db4_6751e21f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
56
] | [
null
] | [
34
] | [
131
] | |
2024-11-18T20:18:35.923923+00:00 | 1,392,418,155,000 | c00c25b8fe59829a5793232529f8c9d03ec26a5b | 2 | {
"blob_id": "c00c25b8fe59829a5793232529f8c9d03ec26a5b",
"branch_name": "refs/heads/master",
"committer_date": 1392418155000,
"content_id": "b012cbab800d1610c3fdc9577d031f508b6776c6",
"detected_licenses": [
"MIT"
],
"directory_id": "fe65f270f7b95ede81bc972fab96519348de20da",
"extension": "py",
"fi... | 2.375 | stackv2 | """ Flask extension for Facebook canvas-based applications
"""
import hmac
from base64 import urlsafe_b64decode as b64decode
from hashlib import sha256 # pylint: disable=E0611
try:
from simplejson import loads
except ImportError:
from json import loads
from inspect import getargspec
from urllib2 import urlopen... | 143 | 30.05 | 78 | 22 | 937 | python | [{"finding_id": "codeql_py/url-redirection_7247c59d30a31e1d_5e7221d5", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a ... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](1)."
] | [
70
] | [
72
] | [
37
] | [
57
] | |
2024-11-18T20:18:37.280324+00:00 | 1,514,804,002,000 | d039e5fb88a0292af21b0f2c437a62d18b36abb0 | 3 | {
"blob_id": "d039e5fb88a0292af21b0f2c437a62d18b36abb0",
"branch_name": "refs/heads/master",
"committer_date": 1514804002000,
"content_id": "bfb7b72b8691d02fe1ec6a54a03505499a10033f",
"detected_licenses": [
"MIT"
],
"directory_id": "79877a672a36fe9430b652d77ea5fba86578bcab",
"extension": "py",
"fi... | 2.75 | stackv2 | # Copyright (c) Amber Brown, 2015
# See LICENSE for details.
from __future__ import absolute_import, division, print_function
import os
import textwrap
from collections import OrderedDict
from jinja2 import Template
def normalise(text):
# Blitz newlines
text = text.replace(u"\r\n", u"\n")
text = text... | 178 | 25.56 | 79 | 17 | 1,037 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5371e12f1a592c34_77c527f9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
130
] | [
null
] | [
22
] | [
58
] | |
2024-11-18T20:18:46.259945+00:00 | 1,624,630,932,000 | b655b68af92ef515cf41b64b187968b1f054d018 | 2 | {
"blob_id": "b655b68af92ef515cf41b64b187968b1f054d018",
"branch_name": "refs/heads/master",
"committer_date": 1624630932000,
"content_id": "effef56549eb8d28e9fa1be993769e422585c566",
"detected_licenses": [
"MIT"
],
"directory_id": "1bedd8572c8030af0a8981c24938ff6480ac1b57",
"extension": "py",
"fi... | 2.34375 | stackv2 | import logging
import os
import boto3
from kfai_sql_chemistry.aws.secrets import SecretValue
from kfai_sql_chemistry.db.database_config import DatabaseConfig
logger = logging.getLogger(__name__)
def _create_default_client():
return boto3.client("secretsmanager")
class AwsDbConfig:
def __init__(self, bot... | 51 | 33.31 | 79 | 13 | 388 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_988badacec824dac_f1692ff6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
37,
38
] | [
null,
null
] | [
25,
25
] | [
53,
54
] | |
2024-11-18T20:18:46.844607+00:00 | 1,583,307,996,000 | 0c9b0a13ef4ba060cd442c5e3b68d1bdfb52fff1 | 3 | {
"blob_id": "0c9b0a13ef4ba060cd442c5e3b68d1bdfb52fff1",
"branch_name": "refs/heads/master",
"committer_date": 1583307996000,
"content_id": "57359d09ab2c7ff7985e70263e9b076e2693222a",
"detected_licenses": [
"MIT"
],
"directory_id": "639b14c6d30f963af0b86b67488ee9ead7f483ea",
"extension": "py",
"fi... | 3.234375 | stackv2 | import serial
import time
import sys
from tkinter import *
from tkinter import messagebox
root = Tk()
root.title("PowerTech")
root.geometry("480x180")
titleLabel = Label(root, text = "PowerTech控制器藍牙設定程式")
firstLabel = Label(root, text = "序列埠:")
secondLabel = Label(root, text = "mac位址:")
port = Entry(root, text = "co... | 68 | 25.07 | 98 | 16 | 578 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3bbf80b1143569c4_40837875", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
39
] | [
null
] | [
15
] | [
22
] | |
2024-11-18T20:29:51.892351+00:00 | 1,587,160,528,000 | 1f46a4315625b86b8640e75794b992d9c602332b | 2 | {
"blob_id": "1f46a4315625b86b8640e75794b992d9c602332b",
"branch_name": "refs/heads/master",
"committer_date": 1587160528000,
"content_id": "3040d7b3994ce4130cd9444da9cfa8d75f78491d",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "5af26d6288b147839f4536abf362c022f8a0984e",
"extension": "p... | 2.421875 | stackv2 | import requests
import json
import time
import pandas as pd
import matplotlib.pyplot as plt
import matplotlib.gridspec as gridspec
from src.results_poller import poller
def reo_optimize(post):
API_KEY = 'yOODa4jmZy1q3Wd6lkQcne6izi3nq2YSIIlCQkOg'
root_url = 'https://developer.nrel.gov/api/reopt'
post_url =... | 133 | 37.9 | 113 | 16 | 1,277 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c7a57ec7f273feb5_b455ceb0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
19,
21
] | [
null,
null
] | [
15,
15
] | [
74,
54
] | |
2024-11-18T20:51:24.967253+00:00 | 1,392,064,368,000 | c841c82772bb5c2576cb97ed8cf07724d8adc7a8 | 3 | {
"blob_id": "c841c82772bb5c2576cb97ed8cf07724d8adc7a8",
"branch_name": "refs/heads/master",
"committer_date": 1392064368000,
"content_id": "ae13dfd921cba8f94db4370929a3f811fbc30935",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "a678e2b16da3887600700d47f6c12e7d0d0627fd",
"extension": "p... | 2.65625 | stackv2 | #!/usr/bin/python
import asynchat
import asyncore
import socket
import ssl
import time
from datetime import datetime
HEADER = object()
CHUNKED = object()
CHUNK = object()
BODY = object()
HTTP_METHODS = set(["GET", "POST", "HEAD", "PUT", "DELETE",
"OPTIONS", "TRACE", "CONNECT"])
def ensure_strin... | 416 | 31.2 | 79 | 20 | 2,793 | python | [{"finding_id": "codeql_py/insecure-default-protocol_b9e15554343f90a2_cfa03800", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
197
] | [
199
] | [
27
] | [
47
] | |
2024-11-18T20:51:45.180268+00:00 | 1,680,032,345,000 | f6e8df6c63554a259ea242a806ebed6cd5f00c5c | 2 | {
"blob_id": "f6e8df6c63554a259ea242a806ebed6cd5f00c5c",
"branch_name": "refs/heads/main",
"committer_date": 1680033272000,
"content_id": "0f3cec862e5b7c25ecd23b734209763b749a9e14",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3f5f2bad9f6ab4acd56c4e2929cee1af4a242e57",
"extension": "py",
... | 2.390625 | stackv2 | #
#
# Copyright (c) 2022 Dell EMC Corporation
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agre... | 295 | 45.79 | 119 | 22 | 2,897 | python | [{"finding_id": "codeql_py/request-without-cert-validation_16dce5a17e5ae20c_7b00b06d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 5 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
56,
130,
165,
183,
192
] | [
58,
null,
166,
null,
null
] | [
20,
29,
26,
16,
38
] | [
50,
77,
88,
68,
96
] | |
2024-11-18T19:07:29.869406+00:00 | 1,545,355,322,000 | b78b09f32c99e90420e400f1046ad0006f6d2077 | 2 | {
"blob_id": "b78b09f32c99e90420e400f1046ad0006f6d2077",
"branch_name": "refs/heads/master",
"committer_date": 1545355322000,
"content_id": "693df5390d565f2e498b00c7bbfe7cc8b24a9da7",
"detected_licenses": [
"MIT"
],
"directory_id": "50e40ed81a8e0cc6e2fed5b12836e947c0b45bd8",
"extension": "py",
"fi... | 2.5 | stackv2 | # -*- coding: utf-8 -*-
import json
import os
import re
import urllib.request
from bs4 import BeautifulSoup
from slackclient import SlackClient
from flask import Flask, request, make_response, render_template
import secretKey
app = Flask(__name__)
sc = SlackClient(secretKey.slack_token)
ERR_TEXT = "명령어가 잘못됐거나 없는 유저입... | 285 | 31.14 | 119 | 19 | 2,444 | python | [{"finding_id": "codeql_py/flask-debug_ac2300c905c10766_98310cb7", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 7 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-918",
"CWE-918",
"CWE-918"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a ... | [
285,
253,
261,
267,
68,
134,
183
] | [
null,
null,
null,
null,
null,
null,
null
] | [
5,
26,
30,
23,
26,
26,
26
] | [
48,
33,
54,
30,
53,
53,
53
] | |
2024-11-18T19:07:46.761746+00:00 | 1,624,253,842,000 | fb852a87a3075c1b361cf43b4b96aad5241fce12 | 3 | {
"blob_id": "fb852a87a3075c1b361cf43b4b96aad5241fce12",
"branch_name": "refs/heads/main",
"committer_date": 1624253842000,
"content_id": "b218576e1b2e123c0c7cc5e59cca89f49bb36da8",
"detected_licenses": [
"MIT"
],
"directory_id": "59d240f3f4bd4f0e1d03c8ba184923727f6d3d00",
"extension": "py",
"file... | 2.875 | stackv2 | import os
import json
import base64
import binascii
from pwdgen import generate_password
from collections import defaultdict
from cryptography.hazmat.primitives import hashes
from cryptography.fernet import Fernet, InvalidToken
from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC
global fernet_key
def ad... | 303 | 40.26 | 124 | 21 | 2,649 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_653489ecf2f060f6_9907e636", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
21,
50,
135,
294
] | [
null,
null,
null,
null
] | [
15,
31,
11,
15
] | [
58,
81,
107,
108
] | |
2024-11-18T19:07:48.685661+00:00 | 1,691,737,665,000 | b72551272b78b9ae7122797d43b1d56cf9589b96 | 3 | {
"blob_id": "b72551272b78b9ae7122797d43b1d56cf9589b96",
"branch_name": "refs/heads/master",
"committer_date": 1691737665000,
"content_id": "851504576f29a830a59e0804cf42b51f12d3b321",
"detected_licenses": [
"Unlicense"
],
"directory_id": "6dfc23ef65e5943712340ef2b4b648cc25ea1fad",
"extension": "py",... | 2.796875 | stackv2 | from bottle import run, get, post, request, delete
animals = [{'name' : 'Ellie', 'type' : 'Elephant'},
{'name' : 'Python', 'type' : 'Snake'},
{'name' : 'Zed', 'type' : 'Zebra'}]
@get('/animal')
def getAll():
return {'animals' : animals}
@get('/animal/<name>')
def getOne(name):
the_animal = [animal for animal... | 28 | 26.89 | 84 | 12 | 224 | python | [{"finding_id": "codeql_py/reflective-xss_854b0bc059a0c48c_dc96b037", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
20
] | [
null
] | [
9
] | [
30
] | |
2024-11-18T19:07:57.135721+00:00 | 1,651,894,136,000 | b8203197fef9aad2955b47a82749602647d3931b | 3 | {
"blob_id": "b8203197fef9aad2955b47a82749602647d3931b",
"branch_name": "refs/heads/master",
"committer_date": 1651894136000,
"content_id": "2c90c75ddd48f14f7aafd7c720d0a35d79a72580",
"detected_licenses": [
"MIT"
],
"directory_id": "31259d24c446d86a737ac70e9911d461dbb89ff3",
"extension": "py",
"fi... | 3.046875 | stackv2 | from pathlib import Path
from typing import Union, List, Any
from jinja2 import Environment, FileSystemLoader, Template
class ConfigTemplateBuilder:
def __init__(self, template_dir: str = "templates"):
self._template_path = Path(template_dir)
self._set_env()
def _set_env(self) -> Environment... | 57 | 32.11 | 97 | 14 | 406 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_387ec1f88563ee5c_dce3afed", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
18
] | [
24
] | [
15
] | [
10
] | |
2024-11-18T19:18:24.642363+00:00 | 1,471,378,878,000 | 8dd174dff1462bf248565e6bb942ce9d4465cfd7 | 3 | {
"blob_id": "8dd174dff1462bf248565e6bb942ce9d4465cfd7",
"branch_name": "refs/heads/master",
"committer_date": 1471378878000,
"content_id": "d19eb9d8385b54942e4bb5ce3ee4adacbd7c7b1c",
"detected_licenses": [
"MIT"
],
"directory_id": "acb9ad18ed21c0abd29ca18e7f9daad21bf4ff15",
"extension": "py",
"fi... | 3.34375 | stackv2 | import sys
from datetime import datetime
from conf import settings
from .log import Log
class WorkLog:
"""WorkLog handles displaying and prompting.
WorkLog displays menus to the terminal, waits
for input from the user and makes calls to an
instance of Log to perform actions on a selected
Tas... | 392 | 33.82 | 86 | 23 | 2,741 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d8bec2994fb67e3a_7d19a76d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
331
] | [
null
] | [
19
] | [
56
] | |
2024-11-18T19:18:40.007112+00:00 | 1,553,531,008,000 | 3b874c457da1c4e2eb1f6656d83a9119a3dc914c | 3 | {
"blob_id": "3b874c457da1c4e2eb1f6656d83a9119a3dc914c",
"branch_name": "refs/heads/master",
"committer_date": 1553531008000,
"content_id": "cda2942547b4f4cfc4c473ea97cd9fa86264e810",
"detected_licenses": [
"MIT"
],
"directory_id": "4ced5c69c9a8a1fce6321c32fb180019938b04ab",
"extension": "py",
"fi... | 2.90625 | stackv2 | # -*- coding: utf-8 -*-
import socket
import ssl
host = "127.0.0.1"
port = 8880
s=socket.socket()
ssl_sock = ssl.wrap_socket(s, cert_reqs=ssl.CERT_REQUIRED, ca_certs='cert.crt')
print(ssl.CERT_REQUIRED)
ssl_sock.connect((host,port))
while True:
mensaje=input('> ')
if mensaje == 'quit':
break
mensaje=mensaje.encode... | 18 | 22.83 | 79 | 10 | 131 | python | [{"finding_id": "codeql_py/insecure-default-protocol_3a1ba257efb8b281_0e7b514a", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
7
] | [
null
] | [
12
] | [
80
] | |
2024-11-18T19:19:00.948583+00:00 | 1,605,539,012,000 | e4f61acceb6e957ed7c79aed5f011a51c0e269ff | 2 | {
"blob_id": "e4f61acceb6e957ed7c79aed5f011a51c0e269ff",
"branch_name": "refs/heads/master",
"committer_date": 1605539012000,
"content_id": "4109cedf24decd5d682cd05be4a2ead3dca136d9",
"detected_licenses": [
"MIT"
],
"directory_id": "2694b4aaf79bbaa38837aeedebad508cd98815c5",
"extension": "py",
"fi... | 2.421875 | stackv2 | import pandas as pd
import numpy as np
import sys
import os
from pathlib import Path
import re
from gensim.models import TfidfModel, nmf
from gensim.corpora import Dictionary as Dict
from gensim.models.ldamulticore import LdaModel
from multiprocessing import Pool
from functools import partial
CHUNK_SIZE = 10000
TOPIC_... | 309 | 33.14 | 120 | 31 | 2,886 | python | [{"finding_id": "codeql_py/overly-large-range_b3eb3f10bdb79d33_871422a7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\w in the same character class."
] | [
216
] | [
null
] | [
81
] | [
84
] | |
2024-11-18T19:19:19.107857+00:00 | 1,576,704,182,000 | ba2267b2e1dba34967fb423107e4d22c9f89e81c | 2 | {
"blob_id": "ba2267b2e1dba34967fb423107e4d22c9f89e81c",
"branch_name": "refs/heads/master",
"committer_date": 1576704182000,
"content_id": "3d2992b9860617187bf3f95ff1675f3dfbeaf639",
"detected_licenses": [
"MIT"
],
"directory_id": "f6e4417a6e756a57abeacf9857b621c603b7ce2f",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!/usr/bin/env python3
from bs4 import BeautifulSoup
import hashlib
import json
from lib.output import *
from lib.request import send
def scan(number):
if not args.scanner == 'numverify' and not args.scanner == 'all':
return -1
test('Running Numverify.com scan...')
try:
requestSecret = ... | 81 | 33.2 | 140 | 14 | 728 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_26508f441e97e1b4_e5663f80", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure."
] | [
30
] | [
null
] | [
26
] | [
66
] | |
2024-11-18T19:29:47.640212+00:00 | 1,692,227,376,000 | c40e5e918cb074059da8580cc954968cc34cc3cf | 2 | {
"blob_id": "c40e5e918cb074059da8580cc954968cc34cc3cf",
"branch_name": "refs/heads/master",
"committer_date": 1692227742000,
"content_id": "865aeee40ca80761bcc3d030deb9b853453607f6",
"detected_licenses": [
"MIT"
],
"directory_id": "865e4231a1c1467a040362dddb56024a49990219",
"extension": "py",
"fi... | 2.46875 | stackv2 | #!/usr/bin/env python
#
# Copyright (c) 2023, NVIDIA CORPORATION. All rights reserved.
#
import argparse
import io
import json
import logging
import os
from http.server import HTTPServer, BaseHTTPRequestHandler
from socketserver import ThreadingMixIn
import requests
from PIL import Image
from torchvision import tr... | 128 | 30.62 | 81 | 14 | 827 | python | [{"finding_id": "codeql_py/partial-ssrf_c6f58357876fe3cb_66929812", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
92
] | [
null
] | [
24
] | [
61
] | |
2024-11-18T19:44:16.052726+00:00 | 1,570,377,446,000 | 297a35ddc6cfb84474cf7d0d995aeb76cb17f208 | 3 | {
"blob_id": "297a35ddc6cfb84474cf7d0d995aeb76cb17f208",
"branch_name": "refs/heads/master",
"committer_date": 1570377446000,
"content_id": "3aa9fd7adbf2a940f61eb149ba0c5434f9e30491",
"detected_licenses": [
"MIT"
],
"directory_id": "ebb18d175f06a8f02d6d2fb1a303ef827a0d28c0",
"extension": "py",
"fi... | 2.796875 | stackv2 | from pymongo import MongoClient
from hashlib import sha256
client = MongoClient()
db = client.internetofthings
things = db.things
users = db.users
stopwords = db.stopwords
def hashPass(username, password):
return sha256(str(username+password).encode('utf-8')).hexdigest()
def create_user(username, password):
... | 70 | 24.86 | 111 | 14 | 444 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_fdfee04d6e8808be_cbca6c4c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
11
] | [
null
] | [
19
] | [
57
] | |
2024-11-18T19:44:16.936071+00:00 | 1,576,508,015,000 | 061a51b2f0cdd008c675241def469ce974044c9b | 3 | {
"blob_id": "061a51b2f0cdd008c675241def469ce974044c9b",
"branch_name": "refs/heads/master",
"committer_date": 1576508015000,
"content_id": "1d69a20c11f2e9beb603d6849a17b90fcc233258",
"detected_licenses": [
"MIT"
],
"directory_id": "42d7f4af8dbc15611901a3e2695ce04849756aa5",
"extension": "py",
"fi... | 3.125 | stackv2 | '''make_features.py
Loads data from ../../data/interim/<filename> data. Creates features.
Saves as feather file format, with original filename stub (minus file
extension). Ex: train_df.pkl --> train_df.feather.
Usage:
make_features.py <filename> [options]
Arguments:
filename <file> Filename, with exten... | 154 | 31.38 | 106 | 16 | 1,354 | python | [{"finding_id": "codeql_py/overly-large-range_183f88fc2601eb64_33e17347", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
100
] | [
null
] | [
35
] | [
38
] | |
2024-11-18T20:23:13.877711+00:00 | 1,470,639,479,000 | 40d0a09bfb9db79983d3476c2bc71a921e7b066f | 3 | {
"blob_id": "40d0a09bfb9db79983d3476c2bc71a921e7b066f",
"branch_name": "refs/heads/master",
"committer_date": 1470639479000,
"content_id": "e284e1d9a7dd3fccc5c061b440c87517b749bb52",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "8df95f7d9201f422a3b807084617956501b3e45d",
"extension": "p... | 2.59375 | stackv2 | from flask import Flask
from flask import request
app = Flask(__name__)
html='''<!DOCTYPE html><html>
<head>
<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.3/jquery.min.js"></script>
<script>
$(document).ready(function() {
setInterval("ajaxd()",1000);
});
function ajaxd() {
$.ajax({
type: "... | 80 | 24.9 | 89 | 13 | 600 | python | [{"finding_id": "codeql_py/flask-debug_da6e5e6f5175c795_5b4c085b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
80,
74,
78
] | [
null,
null,
null
] | [
2,
9,
9
] | [
47,
40,
13
] | |
2024-11-18T20:49:16.147317+00:00 | 1,583,419,519,000 | 1d07cc55160225a9d26f058a0c2b009e5bf6f9e8 | 3 | {
"blob_id": "1d07cc55160225a9d26f058a0c2b009e5bf6f9e8",
"branch_name": "refs/heads/master",
"committer_date": 1583419519000,
"content_id": "83e4518ddc5b98d17c513f2c77e394f1029c8e07",
"detected_licenses": [
"MIT"
],
"directory_id": "fb228bb8b3d687d25d86ecdfe2dd0052debffe47",
"extension": "py",
"fi... | 2.625 | stackv2 | """ptt crawler etl"""
import codecs
import requests
from bs4 import BeautifulSoup
import time
import re
import json
from src.system.config_setting import ConfigSetting
class PttArticleParser:
"""Ptt article parser"""
def __init__(self, link, article_id, board, timeout=3):
config_setting = ConfigSet... | 97 | 39.15 | 118 | 17 | 961 | python | [{"finding_id": "codeql_py/overly-large-range_4201fff4b1e40afd_1278f0bf", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class, and is equivalent to \\[\... | 2 | true | [
"CWE-020",
"CWE-295"
] | [
"py/overly-large-range",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\w in the same character class, and is equivalent to \\[\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].",
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
77,
42
] | [
null,
43
] | [
37,
21
] | [
40,
81
] | |
2024-11-18T20:49:23.688016+00:00 | 1,549,988,581,000 | 5b54480563fc8f5771f4a16c4c0c7b3ce48945e2 | 3 | {
"blob_id": "5b54480563fc8f5771f4a16c4c0c7b3ce48945e2",
"branch_name": "refs/heads/master",
"committer_date": 1549988581000,
"content_id": "1ec7624ecad7142183c750c5798d7c47638e7554",
"detected_licenses": [
"MIT"
],
"directory_id": "ac7f0c9a619d0f5ad2293c27eb420a16a7b0cd13",
"extension": "py",
"fi... | 2.8125 | stackv2 | #!/usr/bin/env python3
import sys
from telegram.ext import Updater, CommandHandler, MessageHandler, Filters, ConversationHandler, RegexHandler
from telegram import ReplyKeyboardMarkup, ReplyKeyboardRemove, ParseMode
import requests
import logging
logging.basicConfig(level=logging.INFO,
format='%(a... | 111 | 30.25 | 108 | 17 | 849 | python | [{"finding_id": "codeql_py/request-without-cert-validation_21a77b329af29bca_b277100b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
54
] | [
null
] | [
12
] | [
83
] | |
2024-11-18T20:49:30.262345+00:00 | 1,581,391,742,000 | 913de704bd4d084dd7ce5cd24038c3a81d5550df | 3 | {
"blob_id": "913de704bd4d084dd7ce5cd24038c3a81d5550df",
"branch_name": "refs/heads/master",
"committer_date": 1581391742000,
"content_id": "93258a63d696231f60ae97f55a3d5ec459ba39ab",
"detected_licenses": [
"MIT"
],
"directory_id": "ab3cc60352ec8a5fe9fd316555a10c846b81c6ed",
"extension": "py",
"fi... | 2.578125 | stackv2 | import time
import os, sys, subprocess as sp, json, datetime
from os.path import *
from functools import *
'''
set ErrorCode
0 : No Error
1 : Over 255 chars of filename
[ Project ]
2 : Empty Folder
[ Sources ]
3 : Too much big file
4 : Empty Source file
https://docs.microsoft.com/ko-kr/windows/desktop/Fi... | 220 | 34.77 | 108 | 21 | 2,022 | python | [{"finding_id": "codeql_py/overly-permissive-file_4df83c880da2e1ad_fa4622f2", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable."
] | [
115,
209
] | [
null,
null
] | [
13,
9
] | [
37,
38
] | |
2024-11-18T20:50:37.881681+00:00 | 1,366,998,932,000 | 548b4c9a0a972955289d9e9a6aeae7957ab086c1 | 3 | {
"blob_id": "548b4c9a0a972955289d9e9a6aeae7957ab086c1",
"branch_name": "refs/heads/master",
"committer_date": 1366998932000,
"content_id": "b1163245f7c8722d4fcd26319db6d0e1d3aca76f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "71f9f87f72431588f3fdee817e343876392be9b1",
"extension": "py"... | 2.609375 | stackv2 | # -*- coding: utf-8 -*-
""" The generator creating the output HTML
APACHE LICENSE 2.0
Copyright 2013 Sebastian Dahlgren
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/lic... | 128 | 34.26 | 83 | 19 | 893 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_92ed4343b8da118a_b4e5334a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
35,
96
] | [
37,
98
] | [
11,
11
] | [
67,
67
] | |
2024-11-18T20:50:45.950204+00:00 | 1,599,252,906,000 | 948f9ebe7e8e0a5a8e441d3e34474a3ab09ab1e7 | 2 | {
"blob_id": "948f9ebe7e8e0a5a8e441d3e34474a3ab09ab1e7",
"branch_name": "refs/heads/master",
"committer_date": 1599252906000,
"content_id": "09f78e33322788db5d3ac8ba978b359adf440e62",
"detected_licenses": [
"MIT"
],
"directory_id": "ffe2edee7e4d3e695a6f3a8b0c8ace325021ad64",
"extension": "py",
"fi... | 2.34375 | stackv2 | import json
import logging
import bottle
from spec_server import SpecServer, HttpVerb
LOGGER = logging.getLogger('mokapi.server')
app = bottle.Bottle()
spec_server = None
@app.route('/<uri:re:.*>', method=[v.value.upper() for v in HttpVerb])
def mock_api_router(uri):
if not spec_server:
LOGGER.error('Spec S... | 69 | 26.17 | 90 | 18 | 493 | python | [{"finding_id": "codeql_py/log-injection_abffae5ff690c16b_31455303", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
35
] | [
null
] | [
70
] | [
73
] | |
2024-11-18T20:50:54.607472+00:00 | 1,689,092,738,000 | 8c835e3bd665e68963f3b52f558de759efdd26b6 | 3 | {
"blob_id": "8c835e3bd665e68963f3b52f558de759efdd26b6",
"branch_name": "refs/heads/master",
"committer_date": 1689092738000,
"content_id": "dd232c035d6d87aae9fccc35c238bc28688d38db",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "80fd32cb735bfd288c4fb9be1280146f5cf15210",
"extension": "p... | 2.5625 | stackv2 | # Downloading mdbtools
import platform
import os
import tarfile
from urllib.request import urlretrieve
import sys
current_dir = os.path.realpath(os.path.dirname(__file__))
tar_file_name = os.path.join(current_dir, "mdbtools.tar.gz")
mdb_dir = os.path.join(current_dir, "mdbtools")
if platform.system() == "Windows":
... | 42 | 35.76 | 97 | 16 | 333 | python | [{"finding_id": "codeql_py/tarslip_174707ca9197cf0b_3282857f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
39
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T20:51:09.111835+00:00 | 1,693,200,041,000 | b61f20cf1415ecd0418347e57661f2cddc81f5af | 2 | {
"blob_id": "b61f20cf1415ecd0418347e57661f2cddc81f5af",
"branch_name": "refs/heads/master",
"committer_date": 1693200041000,
"content_id": "49c196640fbbc58a97e43a22990c3c813b673676",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1040b320168c49e3fd784d93ff30923527582d26",
"extension": "py"... | 2.3125 | stackv2 | import os
import configparser
from jinja2 import Environment, PackageLoader
from .schema import validate_config
from .init_config import get_init_config_handle
from calm.dsl.tools import make_file_dir
from calm.dsl.log import get_logging_handle
LOG = get_logging_handle(__name__)
class ConfigFileParser:
def __in... | 313 | 26.52 | 123 | 19 | 1,642 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2eacd673f55bda36_c0c3d59e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
202
] | [
null
] | [
15
] | [
41
] | |
2024-11-18T20:51:14.026292+00:00 | 1,599,660,655,000 | 50f41120b0a292a36de1a084c695b20422734023 | 3 | {
"blob_id": "50f41120b0a292a36de1a084c695b20422734023",
"branch_name": "refs/heads/master",
"committer_date": 1599660655000,
"content_id": "5acff04029965b2defb357eeffc44067644a3fd4",
"detected_licenses": [
"MIT"
],
"directory_id": "66d1f76e9657b773dce231926c8eb3c98be314cd",
"extension": "py",
"fi... | 3.28125 | stackv2 | #!/usr/bin/env python3.8
from user import User
from credentials import Credentials
import pyperclip
login_status = False
'''
the login status of any account which will change when user successfully logs in
'''
authentic_username = False
'''
global variable to check if the user's enteredepassword is authentic
'''
s... | 201 | 32 | 116 | 20 | 1,102 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_29f43d2362fb62cc_705a377b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
171
] | [
null
] | [
27
] | [
98
] | |
2024-11-18T21:13:57.104688+00:00 | 1,534,341,308,000 | 72cac8bb16fefa241b0501d73ef4f93b8b9ed21a | 3 | {
"blob_id": "72cac8bb16fefa241b0501d73ef4f93b8b9ed21a",
"branch_name": "refs/heads/master",
"committer_date": 1534341308000,
"content_id": "2301f6ee96d8c81d85345a1ba7e0380d6fa74d7c",
"detected_licenses": [
"MIT"
],
"directory_id": "0e1038926ac062ae57da324adc169da046808479",
"extension": "py",
"fi... | 3.09375 | stackv2 | import turtle
import random
t = turtle.clone()
words = ('entrepreneurship','meet','nature','global warming','animals','recycle','tree','plastic', ' pollution')
underscore_position = []
#user_word_input = input('enter a letter')
#user_input = input()
t.penup()
t.goto(-400,0)
#functions here
#secret_word chooses a ran... | 159 | 21.07 | 112 | 14 | 961 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_605397f99d5a29d0_466bbffd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
117,
16
] | [
null,
null
] | [
19,
7
] | [
45,
18
] | |
2024-11-18T21:13:58.978526+00:00 | 1,600,200,985,000 | 2b3f48d612d0147329c5ecd86057f37a67928dc2 | 2 | {
"blob_id": "2b3f48d612d0147329c5ecd86057f37a67928dc2",
"branch_name": "refs/heads/master",
"committer_date": 1600200985000,
"content_id": "0c3e0a117c3d44afb0d438759e8d26a25c71ff34",
"detected_licenses": [
"MIT"
],
"directory_id": "e26ad1f7e456154c10f7958ef4f544af45ccee6b",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
from flask import Flask, render_template, Response, send_file, request
from src.summarizer import summarize_transcript
from src.entity_analysis_gcp import extract_text_entity
from src.slide_change_gcp import video_to_transcript_cuts
DEVELOPMENT_ENV = True
app = Flask(__... | 83 | 35.81 | 113 | 22 | 654 | python | [{"finding_id": "codeql_py/stack-trace-exposure_5ab4335e7be31b32_9c98a403", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
78,
82
] | [
null,
null
] | [
16,
5
] | [
22,
35
] | |
2024-11-18T21:14:11.489642+00:00 | 1,601,556,512,000 | e8c7a6c5ed1d4459ddb7145cc3bb1e84cd19dafa | 2 | {
"blob_id": "e8c7a6c5ed1d4459ddb7145cc3bb1e84cd19dafa",
"branch_name": "refs/heads/master",
"committer_date": 1601556512000,
"content_id": "576ecefb58eb3587a8cf2d6cc01b309261eebfc3",
"detected_licenses": [
"MIT"
],
"directory_id": "c99078fcc67c45f41f49d869685f78a85cf0f244",
"extension": "py",
"fi... | 2.40625 | stackv2 | from flask import Flask, request, render_template
import json
import time
import _thread
import fasttext
import jieba
import gensim
import analyzer
import html_generator
app=Flask(__name__)
app.jinja_env.auto_reload=True
app.config['TEMPLATES_AUTO_RELOAD']=True
fasttext_model_path='./train_model/fasttext_ftz_model.... | 122 | 24.64 | 85 | 14 | 942 | python | [{"finding_id": "codeql_py/reflective-xss_831be92abac4c446_8b48eff9", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
71
] | [
null
] | [
10
] | [
16
] | |
2024-11-18T21:14:33.435845+00:00 | 1,617,842,110,000 | e6a429ff5b9fa530fc3c9338c1a22fa8f68e862e | 3 | {
"blob_id": "e6a429ff5b9fa530fc3c9338c1a22fa8f68e862e",
"branch_name": "refs/heads/main",
"committer_date": 1617842110000,
"content_id": "1992e0dfbac43ea7d954b6a5b7ac22900b6075f5",
"detected_licenses": [
"MIT"
],
"directory_id": "4d62029be62ae83d533b30b516f751e2d31d3a4e",
"extension": "py",
"file... | 2.609375 | stackv2 | import pyperclip
import json
import requests
import socket
import time
import os
import sys
if __name__ == '__main__':
# Setting root
BASE_PATH = os.path.dirname(os.path.dirname(os.path.abspath(__file__)))
sys.path.insert(0, BASE_PATH)
# Read Config
with open("config.json", "r") as config:
... | 41 | 31.85 | 95 | 16 | 301 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_288cb1afc75ddf1e_649ea380", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
21
] | [
null
] | [
15
] | [
36
] | |
2024-11-18T21:14:37.757683+00:00 | 1,692,115,487,000 | 24cfb3cbe35a580a55d7b6c10ebd57c2a93dd65a | 3 | {
"blob_id": "24cfb3cbe35a580a55d7b6c10ebd57c2a93dd65a",
"branch_name": "refs/heads/master",
"committer_date": 1692115487000,
"content_id": "4b37416c2e67edb183dcc5024d22fb795af21ac7",
"detected_licenses": [
"MIT"
],
"directory_id": "a413670238c682c61d96c6afd650a66c29cc81c9",
"extension": "py",
"fi... | 3.1875 | stackv2 | """
GTech robots: https://smartech.gatech.edu/robots.txt
Main Sitemaps: https://smartech.gatech.edu/sitemap
Main has two different sitemap locations.
Crawl delay: 10
This parser will go to each link and extract the links from those sitemaps and create a set of text files with the urls.
"""
imp... | 39 | 27.51 | 128 | 14 | 336 | python | [{"finding_id": "codeql_py/request-without-cert-validation_042a13ff1e2a78c3_ea6a226e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
16
] | [
null
] | [
9
] | [
40
] | |
2024-11-18T21:14:39.806544+00:00 | 1,629,800,017,000 | b8edf53b9467c459d75cc5406591a1c19b373771 | 3 | {
"blob_id": "b8edf53b9467c459d75cc5406591a1c19b373771",
"branch_name": "refs/heads/main",
"committer_date": 1629800017000,
"content_id": "07c2696801656892c6d548788420d3e7c5e6b095",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9584c97580e6289f00c99e0d02a86df6a29880c4",
"extension": "py",
... | 3.109375 | stackv2 | # The following is a script in streamlit that uses BinaryEdge and SecurityTrails APIs for subdomain enumeration. It takes input a domain name.
# Most of the code has been written by Codex of OpenAI. I only tweaked it.
import requests
import json
import pandas as pd
import streamlit as st
import time
import os
import r... | 71 | 40.56 | 142 | 17 | 668 | python | [{"finding_id": "codeql_py/partial-ssrf_f3e08072fca42df1_f82edff1", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
27,
36
] | [
null,
null
] | [
11,
11
] | [
45,
45
] | |
2024-11-18T21:14:43.034887+00:00 | 1,483,980,617,000 | 7e751f5d9c7276874be2c5ee8fd6fe2bdfb403be | 2 | {
"blob_id": "7e751f5d9c7276874be2c5ee8fd6fe2bdfb403be",
"branch_name": "refs/heads/master",
"committer_date": 1483980617000,
"content_id": "4876a53da5703a154229700f6113d42d1311411e",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "da7fc5ba8562e56f01a66fddb40624ff172ff982",
"extension": "p... | 2.34375 | stackv2 | # -*- coding: utf-8 -*-
from __future__ import unicode_literals
import io
import itertools
import os
import re
import jinja2
import ruamel.yaml
from conda_build.metadata import ensure_valid_license_family
EXPECTED_SECTION_ORDER = ['package', 'source', 'build', 'requirements',
'test', 'ap... | 183 | 38.74 | 79 | 17 | 1,641 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_81422389539cac00_ab6b8fda", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
177
] | [
null
] | [
11
] | [
54
] | |
2024-11-18T20:48:11.531227+00:00 | 1,607,638,226,000 | 668d5e098aceeda98b5a6f5beb30e1e04ffb55d4 | 3 | {
"blob_id": "668d5e098aceeda98b5a6f5beb30e1e04ffb55d4",
"branch_name": "refs/heads/master",
"committer_date": 1607638226000,
"content_id": "2455cdd235885da4efab6e79d309815919b2ca1c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "91e45236aa6022a603b09a106bffbe9bbd477bbb",
"extension": "py"... | 2.671875 | stackv2 | import os
from flask import Flask, render_template, request, flash, redirect, url_for, send_from_directory
from werkzeug.utils import secure_filename
from docbot import *
# production server
from waitress import serve
# bot, covering content of given text file
bots = {
}
UPLOAD_FOLDER = '/home/UNT/ws0163/Documents/p... | 119 | 28.5 | 96 | 16 | 781 | python | [{"finding_id": "codeql_py/url-redirection_2e1b357af0d67757_31018afc", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 3 | true | [
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
84,
90,
100
] | [
null,
null,
null
] | [
29,
29,
29
] | [
40,
40,
40
] | |
2024-11-18T20:48:14.188609+00:00 | 1,588,418,545,000 | 2e7ce336f69f9e4bcdb6d2c4400f267cb31ce120 | 4 | {
"blob_id": "2e7ce336f69f9e4bcdb6d2c4400f267cb31ce120",
"branch_name": "refs/heads/master",
"committer_date": 1588418545000,
"content_id": "39bc7288fdee7b41b0bc597d205a97ceb7f0ad6d",
"detected_licenses": [
"MIT"
],
"directory_id": "0df888bbc159f3d3a19a17b984527a85d07d5f59",
"extension": "py",
"fi... | 3.734375 | stackv2 | #关键字参数
def person(name,age,**kw):
print('name:',name,'age:',age,'other:',kw)
person('Bob',30)
person('bob',30,city='beijing')
extra={'city':'beijing','job':'engineer'}
person('jack',24,city=extra['city'],job=extra['job'])
person('jack',24,**extra)
#命名关键字参数
def person_1(name,age,**kw):
if 'city' in kw:
pass... | 107 | 17.16 | 69 | 11 | 761 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3e8adf2634368e95_10fcc884", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
36,
39
] | [
null,
null
] | [
31,
31
] | [
34,
34
] | |
2024-11-18T20:48:17.460749+00:00 | 1,626,816,210,000 | fb30beded727c472c16f3b99eef1b450233547fc | 3 | {
"blob_id": "fb30beded727c472c16f3b99eef1b450233547fc",
"branch_name": "refs/heads/master",
"committer_date": 1626904139000,
"content_id": "b1bf19887c82910b39cdf1c80e9be9a28f2307eb",
"detected_licenses": [
"MIT"
],
"directory_id": "a5bf41e760329b8183250d4d7155699b090272db",
"extension": "py",
"fi... | 2.875 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Mon Jun 21 15:35:13 2021
@author: Oleg Kryachun
"""
from tensorflow.keras.models import model_from_json
import tensorflow as tf
import numpy as np
import tarfile
import cv2
import sys
import os
# local import
from process_data import get_model_vars
class FaceNotFound(Exception... | 300 | 28.54 | 103 | 16 | 2,120 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8f2d328f84ae87a9_45bbfe01", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-022"
] | [
"py/clear-text-logging-sensitive-data",
"py/tarslip"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
131,
171
] | [
null,
null
] | [
35,
13
] | [
39,
21
] | |
2024-11-18T20:48:25.728916+00:00 | 1,542,613,515,000 | f70ed4ca17be9a65dd915c22e368b660f791f1d6 | 3 | {
"blob_id": "f70ed4ca17be9a65dd915c22e368b660f791f1d6",
"branch_name": "refs/heads/master",
"committer_date": 1542613543000,
"content_id": "855d9fc797c78584c8cee158d749f1c93027109e",
"detected_licenses": [
"MIT"
],
"directory_id": "d7f46cb85fe046c7aa890a918e887f14ea36ad1e",
"extension": "py",
"fi... | 2.671875 | stackv2 |
import jinja2
import argparse
import json
import os
import sys
def needs_overwrite( target_path, text ):
if not os.path.exists( target_path ):
return True
with open(target_path, "r") as f:
current_text = f.read()
if current_text == text:
return False
return True
def overwrite... | 107 | 32.79 | 117 | 17 | 799 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_813caec4f1acc3a1_709ffb62", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
42
] | [
null
] | [
28
] | [
58
] | |
2024-11-18T20:48:32.074583+00:00 | 1,572,838,970,000 | 26a37cb729df224de194ad38bea13a677dc561c6 | 2 | {
"blob_id": "26a37cb729df224de194ad38bea13a677dc561c6",
"branch_name": "refs/heads/master",
"committer_date": 1572838970000,
"content_id": "85e8312a24a26b2ad937a9524897143cf47a0e51",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "4e250a28bae6251cfd8f03847933483acb13ce3f",
"extension": "p... | 2.328125 | stackv2 | import json
import math
from datetime import datetime
from App import db
from flask import Response, request, make_response, url_for, redirect, abort, render_template, session, jsonify
from App.models import User,Order
from . import user_blue
from App import db,cache
@user_blue.route('/')
def getuser():
return "这是... | 418 | 24 | 121 | 18 | 3,234 | python | [{"finding_id": "codeql_py/reflective-xss_38c34be44ec7a3d3_08fe1a76", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
331
] | [
null
] | [
28
] | [
51
] | |
2024-11-18T20:48:32.203938+00:00 | 1,587,649,436,000 | 42c00090ec3a5a66e97bb8a5aefe80fc134138cd | 2 | {
"blob_id": "42c00090ec3a5a66e97bb8a5aefe80fc134138cd",
"branch_name": "refs/heads/master",
"committer_date": 1587649436000,
"content_id": "3e08770cc474d52b591b5f764c8ae35b098155bb",
"detected_licenses": [
"MIT"
],
"directory_id": "77edeb6208a4842e08d906f7219661d7bc2402b9",
"extension": "py",
"fi... | 2.484375 | stackv2 | import logging
import os
from flask import Flask, request, jsonify, Response
from flask_sqlalchemy import SQLAlchemy
from flask.logging import create_logger
from sqlalchemy import text
from sqlalchemy.exc import ResourceClosedError
app = Flask(__name__)
LOG = create_logger(app)
LOG.setLevel(logging.INFO)
db_user = o... | 56 | 24 | 77 | 12 | 351 | python | [{"finding_id": "codeql_py/flask-debug_eda9f7d514b43cc6_704b7335", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-089"
] | [
"py/flask-debug",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This SQL query depends on a [user-provided value](1)."
] | [
56,
40
] | [
null,
null
] | [
5,
16
] | [
69,
24
] | |
2024-11-18T21:11:29.553671+00:00 | 1,521,312,238,000 | 6db6086d174ea4bb4d04e14ffede9420e4526f1a | 3 | {
"blob_id": "6db6086d174ea4bb4d04e14ffede9420e4526f1a",
"branch_name": "refs/heads/master",
"committer_date": 1521312238000,
"content_id": "d93f714c00845c9b2175fd4272276bc6723d4175",
"detected_licenses": [
"MIT"
],
"directory_id": "a862ab35e33fc7161fafea7148b109e6f097ced0",
"extension": "py",
"fi... | 2.5625 | stackv2 | # -*- coding: utf-8 -*-
from flask import Flask, url_for, render_template, request
from format_name import *
import requests
import json
app = Flask(__name__)
@app.route('/', methods=['GET','POST'])
def api_root():
if request.method == 'POST':
movie_name= request.form['movie_name']
# Note that the... | 24 | 37.62 | 93 | 13 | 240 | python | [{"finding_id": "codeql_py/flask-debug_17a28d328c4f798e_9aad82ed", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-918",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
24,
18,
19
] | [
null,
null,
null
] | [
5,
20,
24
] | [
51,
59,
64
] | |
2024-11-18T21:11:33.659334+00:00 | 1,606,970,166,000 | 34199e6b72037adbb9d89ffc3324c6315bd2f146 | 3 | {
"blob_id": "34199e6b72037adbb9d89ffc3324c6315bd2f146",
"branch_name": "refs/heads/main",
"committer_date": 1606970166000,
"content_id": "139daf02605fc0643e294140d56fb467a824aecb",
"detected_licenses": [
"MIT"
],
"directory_id": "3800ec95dd078e0423458c1eea35308f42ca1d2f",
"extension": "py",
"file... | 2.546875 | stackv2 | from flask import Flask, render_template, request
import requests as apirequest
app = Flask(__name__)
key=""
weatherkey=""
@app.route('/')
def index():
ip = request.remote_addr
r=apirequest.get('https://api.ipgeolocation.io/ipgeo?apiKey={0}&ip={1}&fields=geo'.format(key,ip))
thedict=r.json()
try:
... | 25 | 35.08 | 136 | 14 | 236 | python | [{"finding_id": "codeql_py/partial-ssrf_ac2ee308dc7a5131_3a878350", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
9,
14
] | [
null,
null
] | [
7,
12
] | [
103,
137
] | |
2024-11-18T21:25:46.052818+00:00 | 1,602,321,397,000 | 51eea3f081211de9467c5145a1b33b34cacf6138 | 2 | {
"blob_id": "51eea3f081211de9467c5145a1b33b34cacf6138",
"branch_name": "refs/heads/main",
"committer_date": 1602321397000,
"content_id": "202862ead1112ed89f895577803785e292c445b4",
"detected_licenses": [
"MIT"
],
"directory_id": "74f92c392869742ee7d6fa2aed7d14d535d48f84",
"extension": "py",
"file... | 2.375 | stackv2 | # -*- coding: utf-8 -*-
from flask import Flask, request, jsonify, make_response
from flask_restplus import Api, Resource, fields
#from sklearn.externals import joblib
import numpy as np
import sys
import warnings
import joblib
import json
from insertData import insertDataFunc
from imageUpload import fileUpload
from ed... | 127 | 32.59 | 71 | 26 | 981 | python | [{"finding_id": "codeql_py/stack-trace-exposure_0d7bafbfd64b9f2a_3fdb6f41", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
123
] | [
127
] | [
19
] | [
5
] | |
2024-11-18T21:25:52.495956+00:00 | 1,624,187,365,000 | 7f042648505aafe0ecbd92eda6053d9dedd71b59 | 3 | {
"blob_id": "7f042648505aafe0ecbd92eda6053d9dedd71b59",
"branch_name": "refs/heads/main",
"committer_date": 1624187365000,
"content_id": "dbf8e04e0f507d1a57615022e90a7146655387ba",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2ca417f288878e87a52c004fa56e2915c113aec3",
"extension": "py",
... | 3.125 | stackv2 | import emoji
import streamlit as st
from alphafy import *
est = [':lemon:', ':crown:', ':pizza:', ':kissing_cat:', ':hamburger:',
':sparkles:', ':fire:', ':crescent_moon:']
emolst = [emoji.emojize(i) for i in est]
def evaluate(text, ch):
for i in text:
st.write(eval(i + '(ch)'))
st.title('... | 33 | 22.24 | 84 | 13 | 218 | python | [{"finding_id": "codeql_py/code-injection_30ec529b00a30540_b96c5543", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-094"
] | [
"py/code-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1)."
] | [
12
] | [
null
] | [
27
] | [
37
] | |
2024-11-18T21:25:57.862902+00:00 | 1,513,413,143,000 | c6876fd36a2b3505fbf34c8baa0e5f81f271da7f | 2 | {
"blob_id": "c6876fd36a2b3505fbf34c8baa0e5f81f271da7f",
"branch_name": "refs/heads/master",
"committer_date": 1513413143000,
"content_id": "4565676e85a40c0057b2cc1534e21ba761c9da72",
"detected_licenses": [
"MIT"
],
"directory_id": "188437aa46dca54ec8872f6e3ee1b982cf38dc00",
"extension": "py",
"fi... | 2.390625 | stackv2 |
import os
import json
import jinja2 as jj
from IPython.display import display, HTML, Markdown
class DemoCalculator:
"""
"""
here = os.path.dirname(os.path.abspath(__file__))
dir_template = os.path.join(here, 'templates')
loader = jj.FileSystemLoader(dir_template)
env = jj.Environment(loade... | 29 | 24.66 | 73 | 11 | 140 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ba695c792df028b0_8dabebd0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
17
] | [
22
] | [
11
] | [
27
] | |
2024-11-18T21:26:02.273199+00:00 | 1,522,281,230,000 | 9bc455a9ddb09b401f74b0453ee933deccfe28e7 | 4 | {
"blob_id": "9bc455a9ddb09b401f74b0453ee933deccfe28e7",
"branch_name": "refs/heads/master",
"committer_date": 1522281230000,
"content_id": "dc0c7bc8e278dbb368e58961a0d1b097ef302ce6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4aa4533cbadcb8e719f6b31af87ca39e673664d9",
"extension": "py"... | 3.5 | stackv2 | # -*- coding: utf-8 -*-
import re
from textblob import TextBlob
def get_tweet_sentiment(tweet):
'''
Utility function to classify sentiment of passed tweet
using textblob's sentiment method
'''
# create TextBlob object of passed tweet text
analysis = TextBlob(clean_tweet(tweet))
# set sentiment
if analysis.sent... | 68 | 31.79 | 109 | 16 | 607 | python | [{"finding_id": "codeql_py/overly-large-range_810bd548053a985b_20ba13da", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
33
] | [
null
] | [
50
] | [
53
] | |
2024-11-18T21:26:03.469658+00:00 | 1,519,582,893,000 | c17900ea3cd99ceb4c10b388169335759a8439fb | 3 | {
"blob_id": "c17900ea3cd99ceb4c10b388169335759a8439fb",
"branch_name": "refs/heads/master",
"committer_date": 1519582893000,
"content_id": "632e73b060d77c27bcc82014071fda0ce1b6bd9e",
"detected_licenses": [
"MIT"
],
"directory_id": "3c4aeb694d7c747f63389f1ba9059028ca5289ef",
"extension": "py",
"fi... | 2.546875 | stackv2 | from flask import Flask
from flask_restful import Resource, Api
import os
import numpy as np
import pandas as pd
from keras.models import model_from_json
port = os.getenv('VCAP_APP_PORT', '5000')
def get_price_data(coinId, startDate, endDate, normalized=0):
name = os.path.join("Top100Cryptos", coinId + ".csv")
... | 88 | 31.07 | 82 | 18 | 748 | python | [{"finding_id": "codeql_py/flask-debug_0b22642c402f250b_f2ea9f8f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
84,
13
] | [
null,
null
] | [
5,
23
] | [
54,
27
] | |
2024-11-18T20:31:29.087831+00:00 | 1,476,103,802,000 | 5658778af8769709a293a365756863d1e4b4c95c | 2 | {
"blob_id": "5658778af8769709a293a365756863d1e4b4c95c",
"branch_name": "refs/heads/master",
"committer_date": 1476103802000,
"content_id": "f17db6592b93922a476151154f907040fcab9fe4",
"detected_licenses": [
"MIT"
],
"directory_id": "92c371d5f688cb52d41561015711a3bffc272f7f",
"extension": "py",
"fi... | 2.421875 | stackv2 | from __future__ import print_function, division
import os
import sys
import select
import acoustid
import mutagen
from mutagen.easyid3 import EasyID3 as ID
from collections import Counter, defaultdict
import logging
import click
import time
import re
logging.basicConfig(level=logging.WARNING)
logging.getLogger("urllib... | 141 | 38.73 | 89 | 20 | 1,270 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c6dd9979b8d1ead4_d8926a36", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
25
] | [
26
] | [
25
] | [
49
] | |
2024-11-18T20:31:33.198027+00:00 | 1,548,452,016,000 | a79708bcafcd71b4815a81ce6b9d394c734fbae4 | 4 | {
"blob_id": "a79708bcafcd71b4815a81ce6b9d394c734fbae4",
"branch_name": "refs/heads/master",
"committer_date": 1548452016000,
"content_id": "f68c89ae5d1d65371cbebf5e831f3d9b8f2044d1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "14e9b33ad9f3f3fd6a5b9d1303448eaffe54e655",
"extension": "py"... | 4.4375 | stackv2 | def main():
# problem1()
# problem2()
# problem3()
# problem4()
challenge()
# Create a class Dog.
# Make sure it has the attributes name, breed, color, gender.
# Create a function that will print all attributes of the class.
# Create an object of Dog in your problem1 function and print all of it's ... | 105 | 34.73 | 102 | 15 | 995 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1a6676a105e412b1_8c02e2ad", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
19
] | [
null
] | [
15
] | [
86
] | |
2024-11-18T21:00:03.027545+00:00 | 1,480,158,168,000 | a48897d5c96c668743281efa035cf6cb49fbea43 | 2 | {
"blob_id": "a48897d5c96c668743281efa035cf6cb49fbea43",
"branch_name": "refs/heads/master",
"committer_date": 1480158168000,
"content_id": "84c2a108f31c1a4af29889bba8bb2d8ea025cbea",
"detected_licenses": [
"MIT"
],
"directory_id": "63b759bfee7657401eb2aa0975ab8041c2ae4cbb",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
import os
from datetime import datetime
from flask import Flask, render_template, jsonify, redirect, url_for, request
from Bio import SeqIO
import subprocess
ALLOWED_EXTENSIONS = set(['fasta', 'gbk'])
app = Flask(__name__)
app.config.from_object(__name__)
app.config['UPLOAD... | 49 | 29.63 | 141 | 19 | 332 | python | [{"finding_id": "codeql_py/flask-debug_c9e537ff5c882d22_21e7af9d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
48,
29
] | [
null,
null
] | [
5,
23
] | [
24,
31
] | |
2024-11-18T21:00:05.393134+00:00 | 1,539,059,825,000 | 03ddeb79f3ffd0beaca575f253685c6112d9122d | 3 | {
"blob_id": "03ddeb79f3ffd0beaca575f253685c6112d9122d",
"branch_name": "refs/heads/master",
"committer_date": 1539059825000,
"content_id": "efa5b3ee7f76e7ba801b813af284ef64d7a86736",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bcc162255958295a3f4f1f1816258ae49863e53a",
"extension": "py"... | 2.546875 | stackv2 | #coding=utf8
import requests
import selenium.webdriver
from bs4 import BeautifulSoup
import random
import time
from requests.packages.urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
def douyu(douyugame):
game_list=[]
url='HTTPs://www.douyu.com/... | 263 | 38.68 | 107 | 21 | 2,495 | python | [{"finding_id": "codeql_py/request-without-cert-validation_bf5e0257482b4bf3_f05620a0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
12,
144
] | [
null,
null
] | [
9,
9
] | [
39,
39
] | |
2024-11-18T21:10:30.626683+00:00 | 1,596,887,621,000 | d798584c29b866a7c5539da2175e0781926c7c76 | 2 | {
"blob_id": "d798584c29b866a7c5539da2175e0781926c7c76",
"branch_name": "refs/heads/master",
"committer_date": 1596887621000,
"content_id": "c1d4c49e86b6e21b80ce8767d58521f543666803",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "73e440b0f2dbf4c6bfb41d24e97cf2b1163e1e2f",
"extension": "py"... | 2.46875 | stackv2 | from flask import Flask, request, jsonify
from collections import OrderedDict
from smart_open import open
from google.cloud import storage
from time import time
import os
import requests
import logging
import datetime
try:
import settings
except ImportError:
from . import settings
logging.basicConfig(level=lo... | 131 | 28.44 | 86 | 19 | 904 | python | [{"finding_id": "codeql_py/flask-debug_54911ff69e912c60_984a1870", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-918",
"CWE-918",
"CWE-117"
] | [
"py/flask-debug",
"py/full-ssrf",
"py/full-ssrf",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"The full URL of this request depends on a [user-provided value](1).",
"The full URL of this request depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value... | [
131,
33,
78,
29
] | [
null,
null,
null,
null
] | [
5,
10,
18,
18
] | [
42,
40,
48,
44
] | |
2024-11-18T21:10:33.368553+00:00 | 1,560,096,548,000 | 07d7c2f5780716ebeae4fed6a76e4f8c527a55cb | 2 | {
"blob_id": "07d7c2f5780716ebeae4fed6a76e4f8c527a55cb",
"branch_name": "refs/heads/master",
"committer_date": 1560096548000,
"content_id": "9e4a0b719323fb16473d0bfa46fd9f00b39485b9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cc3bdbde42857022b9c78a571af7574ae7a98a64",
"extension": "py"... | 2.375 | stackv2 | from flask import Flask, json
from flask import request
from flask_cors import *
import os
import os
import networkx as nx
app = Flask(__name__)
CORS(app, supports_credentials=True)
def summary_graph(keyword, k = 20, database = 'sembib', verbose=False):
parent_path = os.path.realpath(os.path.dirname(os.path.ab... | 112 | 27.78 | 120 | 15 | 794 | python | [{"finding_id": "codeql_py/command-line-injection_7616535b9e50ebc7_ea925b8b", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 2 | true | [
"CWE-078",
"CWE-215"
] | [
"py/command-line-injection",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
31,
64
] | [
null,
null
] | [
23,
5
] | [
30,
24
] | |
2024-11-18T21:10:34.800619+00:00 | 1,693,318,965,000 | 38edb4f96db61118be2100c15c7a42764afab72a | 2 | {
"blob_id": "38edb4f96db61118be2100c15c7a42764afab72a",
"branch_name": "refs/heads/master",
"committer_date": 1693318965000,
"content_id": "e4dc4ffa487ede640b3aa9e987d296347df34deb",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "29eac50cc208d8aaebde699e8c851ed84b2de591",
"extension": "py"... | 2.40625 | stackv2 | """
This script creates the BUT Reverb DB dataset, which is available at:
https://speech.fit.vutbr.cz/software/but-speech-fit-reverb-database
The following description is taken from the official website:
This is the first release of BUT Speech@FIT Reverb Database. The database is being built
with respect to collect a... | 139 | 39.26 | 105 | 14 | 1,691 | python | [{"finding_id": "codeql_py/tarslip_36f123129eaa05cd_27b3a55a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
87
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T21:10:48.363171+00:00 | 1,540,135,364,000 | 2cdaeb7105bf76a0958be1048fe663d827f9a388 | 3 | {
"blob_id": "2cdaeb7105bf76a0958be1048fe663d827f9a388",
"branch_name": "refs/heads/master",
"committer_date": 1540135364000,
"content_id": "ddfee5ffb5ef79c1b95df70a262193a6d983093b",
"detected_licenses": [
"MIT"
],
"directory_id": "b925d02a266c5a71a8a8d933c1d2dbb81d207ed3",
"extension": "py",
"fi... | 2.859375 | stackv2 | from rest_framework import status
from rest_framework.decorators import api_view
from rest_framework.response import Response
from backend.models import Game, PlayerGame
from backend.serializers import GameSerializer
from random import random, choice
from hashlib import sha512
from itertools import permutations
from ba... | 176 | 37.76 | 103 | 18 | 1,610 | python | [{"finding_id": "codeql_py/stack-trace-exposure_5229f433108bc72a_7102a998", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
123
] | [
null
] | [
25
] | [
46
] | |
2024-11-18T21:23:38.625315+00:00 | 1,592,494,038,000 | 825c58b7d2b78f774960c1a8e8e82dfc3e0a1c34 | 3 | {
"blob_id": "825c58b7d2b78f774960c1a8e8e82dfc3e0a1c34",
"branch_name": "refs/heads/master",
"committer_date": 1592494038000,
"content_id": "3274fae5c9a321b724de9a7600956bdbfa351750",
"detected_licenses": [
"MIT"
],
"directory_id": "3a308b3c4f24cebdee1d66c1191a7d86ee73806d",
"extension": "py",
"fi... | 2.59375 | stackv2 | import glob
import matplotlib.pyplot as plt
import math
from processResultsUtils import get_numbers_from_string
from mpl_toolkits.mplot3d import Axes3D
import re
import copy
from processResultsUtils import lineseg_dist
import numpy as np
# Define where the tests are stored
file_location = "../AnafiSimulation/TestingAn... | 120 | 29.06 | 93 | 13 | 929 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_96fa3a7258636391_1cce7bf4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
100,
101
] | [
null,
null
] | [
11,
11
] | [
55,
53
] | |
2024-11-18T21:23:55.709237+00:00 | 1,454,804,297,000 | f919af8cfc6f6c02f35aaf2010abed0d30114760 | 2 | {
"blob_id": "f919af8cfc6f6c02f35aaf2010abed0d30114760",
"branch_name": "refs/heads/master",
"committer_date": 1454804297000,
"content_id": "2ea4d55c82e59ae38bdeb57c3557d85c5ce1b923",
"detected_licenses": [
"MIT"
],
"directory_id": "d177bff3f38c88839eec367e9569660731cd5506",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/env python
# Copyright (c) Twisted Matrix Laboratories.
# See LICENSE for details.
from __future__ import print_function
import time
import select
import os
import sys
import socket
import hashlib
from twisted.protocols.basic import LineReceiver
from twisted.internet import reactor, protocol, endpoints, ta... | 197 | 31.35 | 98 | 23 | 1,399 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d0a607ec6707de1f_a267810e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-200"
] | [
"py/weak-sensitive-data-hashing",
"py/bind-socket-all-network-interfaces"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"'' binds a socket to all interfaces."
] | [
42,
181
] | [
null,
null
] | [
32,
5
] | [
51,
25
] | |
2024-11-18T21:59:01.802758+00:00 | 1,692,259,973,000 | 10b64d978814a75e2794c3ba46ec46cd58a2cbe2 | 2 | {
"blob_id": "10b64d978814a75e2794c3ba46ec46cd58a2cbe2",
"branch_name": "refs/heads/main",
"committer_date": 1692259973000,
"content_id": "681ded53d78d5b931913cd0c681f10917b314244",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "9143962494f56b95589ae8a8d3889bba5a30981d",
"extension": "py"... | 2.328125 | stackv2 | from __future__ import annotations
import functools
from abc import ABC, abstractmethod
import numpy as np
from jinja2 import ChoiceLoader, Environment, PackageLoader
import dials.extensions
from dials.array_family import flex
def generate_html_report(plots_data, filename):
loader = ChoiceLoader(
[
... | 328 | 32.85 | 80 | 18 | 2,289 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_edecae6222bc525d_5d895b61", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
20
] | [
null
] | [
11
] | [
37
] | |
2024-11-18T22:11:25.044006+00:00 | 1,578,368,437,000 | 71f813ec529fd2ffa0dee803e63157cf6f015496 | 3 | {
"blob_id": "71f813ec529fd2ffa0dee803e63157cf6f015496",
"branch_name": "refs/heads/master",
"committer_date": 1578368437000,
"content_id": "c1316409e438682dedea3a4e9ef3ab536623b017",
"detected_licenses": [
"MIT"
],
"directory_id": "f06b56b66c8575b42761d2a261e4ae9484452594",
"extension": "py",
"fi... | 2.96875 | stackv2 | import logging
import json
from flask import request, jsonify;
from codeitsuisse import app;
logger = logging.getLogger(__name__)
@app.route('/chessgame', methods=['POST'])
def evaluate2():
data = request.get_json();
logging.info("data sent for evaluation {}".format(data))
inputValue = request.get_json(... | 115 | 29.17 | 60 | 18 | 693 | python | [{"finding_id": "codeql_py/log-injection_7c8bd2d3c29919b4_3e30eff6", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
13
] | [
null
] | [
18
] | [
60
] | |
2024-11-18T22:11:39.651317+00:00 | 1,521,615,181,000 | 8b4cf88cedbef2171528263abb6f407b4ce6b566 | 2 | {
"blob_id": "8b4cf88cedbef2171528263abb6f407b4ce6b566",
"branch_name": "refs/heads/master",
"committer_date": 1521615181000,
"content_id": "b32c76cfeec1065f47fef2e5e76a78079d87c1d2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2f3da88d62b5fa2c1eadec4cff4ce41dd7009409",
"extension": "py"... | 2.34375 | stackv2 | import logging, sys, os
import paramiko
sys.path.append(os.path.dirname(os.getcwd()))
from automation.config import HOSTNAME
logging.basicConfig(level=logging.DEBUG)
def mk_dir(username, hostname):
# setup a SSHClient object
ssh = paramiko.SSHClient()
# 允许将信任的主机自动加入到host_allow 列表,此方法必须放在connect方法的前面
... | 75 | 25.08 | 87 | 13 | 487 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e12f2f6c16ae00bb_c31e725d", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation",
"py/paramiko-missing-host-key-validation"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
15,
43
] | [
null,
null
] | [
5,
5
] | [
62,
62
] | |
2024-11-18T22:11:44.312607+00:00 | 1,567,724,182,000 | 58b99cc384a62194fe2adb47d1ce15d27da79a89 | 3 | {
"blob_id": "58b99cc384a62194fe2adb47d1ce15d27da79a89",
"branch_name": "refs/heads/master",
"committer_date": 1567724182000,
"content_id": "f97508b85705906f650d1b8ba37aac7fb4cc9371",
"detected_licenses": [
"MIT"
],
"directory_id": "a32ee565258e1eae8d7c5b34bcbf57e270eeb0cb",
"extension": "py",
"fi... | 2.859375 | stackv2 | import sys
import json
import datetime
import requests
import html
import tldextract
from bs4 import BeautifulSoup, Comment
import re
import signal
from urllib.parse import urlparse
from urllib.parse import parse_qs
'''
This contains utilities used by other functions in the YoutubeDataApi class, as well as a few conv... | 189 | 27.76 | 134 | 19 | 1,373 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_8f3d04d138f80e33_ff22e344", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com](1) may be at an arbitrary position in the... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The string [youtube.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [youtube.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [youtube.com](1) may be at an arbitrary position in the sanitized URL."
] | [
108,
110,
125
] | [
null,
null,
null
] | [
10,
10,
10
] | [
33,
33,
33
] | |
2024-11-18T22:11:51.014122+00:00 | 1,518,970,757,000 | 29338c3c40a0c689a9c92898ba73334493403f07 | 3 | {
"blob_id": "29338c3c40a0c689a9c92898ba73334493403f07",
"branch_name": "refs/heads/master",
"committer_date": 1518970757000,
"content_id": "3e69b002c2cf8dd55a0b606059480c78fe7908a8",
"detected_licenses": [
"MIT"
],
"directory_id": "ae53f48ac67cf73bd79c93a19edb5850687cbebf",
"extension": "py",
"fi... | 2.734375 | stackv2 | import os
import re
import time
from configparser import RawConfigParser
from urllib.parse import urljoin
from urllib.request import urlopen, build_opener
from bs4 import BeautifulSoup
from financial_statements_downloader.data import Data
PARSER = "html5lib"
"""BeautifulSoup parser."""
WAIT = 1
"""Wait seconds afte... | 186 | 31.34 | 134 | 24 | 1,437 | python | [{"finding_id": "codeql_py/overly-large-range_f033e8f55b194e3b_3d06629f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\u00e1-\\u017e in the same character class.", "remediatio... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\u00e1-\\u017e in the same character class."
] | [
87
] | [
null
] | [
47
] | [
50
] | |
2024-11-18T22:11:53.784734+00:00 | 1,464,246,581,000 | 3dd6039833f960d33a025d4acd407be47a084795 | 3 | {
"blob_id": "3dd6039833f960d33a025d4acd407be47a084795",
"branch_name": "refs/heads/master",
"committer_date": 1464246581000,
"content_id": "d187892dc3ac6956da41d3165ff15a894d4b4e35",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a868f5f506df840bdb7119a9106331c19def4978",
"extension": "py"... | 2.6875 | stackv2 | from __future__ import unicode_literals, absolute_import, print_function
import logging
import math
import tarfile
import hashlib
# Processing functions, untar, calculating stats etc...
# TODO some kind of logging??
# How do we know where the database is???
def process_upload(uploaded_file):
from .ResultDataProcess... | 304 | 23.33 | 80 | 20 | 2,485 | python | [{"finding_id": "codeql_py/tarslip_4ca334a5023e2ce8_de78aff3", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
23
] | [
null
] | [
3
] | [
6
] | |
2024-11-18T22:24:00.307100+00:00 | 1,573,209,593,000 | 0a826e3cdd9e1771a121c92b4deab3603c77543c | 3 | {
"blob_id": "0a826e3cdd9e1771a121c92b4deab3603c77543c",
"branch_name": "refs/heads/master",
"committer_date": 1573209593000,
"content_id": "038103ef2240aabfd8cc0c60138c47f1f616f668",
"detected_licenses": [
"MIT"
],
"directory_id": "d0e04bdce91baef10ea235491a9bdf492703b6df",
"extension": "py",
"fi... | 2.5625 | stackv2 | import sys
import os
import subprocess
EXEC = sys.executable #local pythonw.exe
def run_py_file(py_path):
result = subprocess.run([EXEC, py_path], stdout=subprocess.PIPE, stderr=subprocess.STDOUT, universal_newlines=True)
return str(result.stdout)
def run_py_codes(py_codes):
codes = str(py_codes)
if ... | 57 | 26.68 | 119 | 16 | 421 | python | [{"finding_id": "codeql_py/code-injection_f53003dd389f52df_e6ea1d78", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-094"
] | [
"py/code-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1)."
] | [
15
] | [
null
] | [
31
] | [
36
] | |
2024-11-18T22:24:16.479928+00:00 | 1,578,255,878,000 | 628fdb22522e80964090de9cd594df1d68d23c0f | 2 | {
"blob_id": "628fdb22522e80964090de9cd594df1d68d23c0f",
"branch_name": "refs/heads/master",
"committer_date": 1578255878000,
"content_id": "91ee70ef9d6313b830c8f9281c42c6a36a7dca7f",
"detected_licenses": [
"MIT"
],
"directory_id": "4a44931f329859fffff8c8582cce2c78d047dcdb",
"extension": "py",
"fi... | 2.390625 | stackv2 | from sqlalchemy.orm import Session
import hashlib
from . import models, schemas
salt = "salt1"
def get_users(db: Session, skip: int = 0, limit: int = 100):
return db.query(models.User).offset(skip).limit(limit).all()
def get_user(db: Session, user_id: int):
return db.query(models.User).filter(models.User.... | 32 | 32.69 | 134 | 15 | 250 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_05749c19e163708d_6f2d9740", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally e... | [
22,
27
] | [
null,
null
] | [
36,
36
] | [
74,
74
] | |
2024-11-18T22:36:17.665986+00:00 | 1,388,271,636,000 | 9060f4a3e224579343ec2b9b21345a9727e06b9a | 3 | {
"blob_id": "9060f4a3e224579343ec2b9b21345a9727e06b9a",
"branch_name": "refs/heads/master",
"committer_date": 1388271636000,
"content_id": "bde4a664a76529162b7f18f7ba5c1bd754d33dc1",
"detected_licenses": [
"MIT"
],
"directory_id": "c555e2527e2b730497590e6ffb6d197c8d477137",
"extension": "py",
"fi... | 2.734375 | stackv2 | import flask
import random
app = flask.Flask(__name__)
@app.route("/")
def blunder():
return "Never get involved in a land war in Asia."
@app.route("/fourup", methods=["POST"])
def fourup_move():
if flask.request.json is None:
raise ValueError("No JSON match data found")
toprow = flask.request... | 47 | 24.7 | 71 | 13 | 301 | python | [{"finding_id": "codeql_py/flask-debug_a98d9faf34e967d7_372e58d8", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
47,
42
] | [
null,
null
] | [
5,
16
] | [
24,
62
] | |
2024-11-18T22:36:34.266430+00:00 | 1,522,825,225,000 | 222127c0bff0fc2af96e1fc8d7d8a2e80b55cfac | 2 | {
"blob_id": "222127c0bff0fc2af96e1fc8d7d8a2e80b55cfac",
"branch_name": "refs/heads/master",
"committer_date": 1522825225000,
"content_id": "d63a90301e4ce3ff3af4fbdc423339ccff778dfd",
"detected_licenses": [
"MIT"
],
"directory_id": "a48d2daf100be8a6336d2d765739023531491dc9",
"extension": "py",
"fi... | 2.421875 | stackv2 | import requests, urllib, json, logging, sys, base64, datetime, math
import pprint
class FreedomPop:
session = requests.Session()
#logging.basicConfig(level=logging.DEBUG)
logger = logging.getLogger('FreedomPop')
#handler = logging.StreamHandler()
#logger.addHandler(handler)
#logger.setLevel(lo... | 230 | 38.3 | 123 | 20 | 2,013 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_115c6e2138ca94f1_769be04c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (priva... | [
204,
217
] | [
null,
220
] | [
20,
24
] | [
63,
65
] | |
2024-11-18T22:36:36.274945+00:00 | 1,540,633,128,000 | 24699e2a648f81b6926748296d541fb615d594dc | 3 | {
"blob_id": "24699e2a648f81b6926748296d541fb615d594dc",
"branch_name": "refs/heads/master",
"committer_date": 1540633128000,
"content_id": "3e61bae6b791ab488b3638852f3f82eaf77fc629",
"detected_licenses": [
"MIT"
],
"directory_id": "09d3fb0fe56d63d40e140a8058da28c44d4d54f8",
"extension": "py",
"fi... | 2.578125 | stackv2 | import ssl
import socket
import pickle
import time
from params import params
from log import get_logger
CERT_FILE = '/home/SDPSource/openssl/cert.crt'
KEY_FILE = '/home/SDPSource//openssl/rsa_private.key'
LATENCY = 0
class DisconnectException(Exception):
pass
def valid_ip(address):
try:
socket.in... | 147 | 25.14 | 99 | 17 | 826 | python | [{"finding_id": "codeql_py/insecure-protocol_560b1f1e5651b072_489a4d54", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)."
] | [
46
] | [
null
] | [
30
] | [
37
] | |
2024-11-18T22:36:38.469970+00:00 | 1,413,889,370,000 | 64104fb24dfc94931c6dfcbdbef9e1ce9cf83c9f | 3 | {
"blob_id": "64104fb24dfc94931c6dfcbdbef9e1ce9cf83c9f",
"branch_name": "refs/heads/master",
"committer_date": 1413889370000,
"content_id": "b6f72c28937535222dd96d4420988f3a57966fe9",
"detected_licenses": [
"MIT"
],
"directory_id": "ebbb5fd79e8ea187de2e4deafd340b15a361020e",
"extension": "py",
"fi... | 2.546875 | stackv2 | # coding=utf-8
# Copyright 2013 Janusz Skonieczny
import logging
import os
from flask import request, current_app
MSG = u'''
Message type: %(levelname)s
Location: %(pathname)s:%(lineno)d
Module: %(module)s
Function: %(funcName)s
Time: %(asctime)s
Message:
%(message)s
'''
EXTRA_MSG = u"""
URL... | 124 | 30.09 | 144 | 15 | 924 | python | [{"finding_id": "codeql_py/log-injection_e1756bfca86f7063_a4f86b29", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
76
] | [
null
] | [
23
] | [
48
] | |
2024-11-18T20:23:40.564196+00:00 | 1,593,478,440,000 | 676c0df825582bdce85f347390ed08b90d47c875 | 3 | {
"blob_id": "676c0df825582bdce85f347390ed08b90d47c875",
"branch_name": "refs/heads/master",
"committer_date": 1593478440000,
"content_id": "d28e7d06d983a26f81445c742c98e2b0f0d41679",
"detected_licenses": [
"MIT"
],
"directory_id": "2feb2b7be0ce2fffdd0e1d3f8d67483c7d27443a",
"extension": "py",
"fi... | 3.3125 | stackv2 | # import pyspark class Row from module sql
from pyspark.sql import *
# Create Example Data - Departments and Employees
# Create the Departments
department1 = Row(id='123456', name='Computer Science')
department2 = Row(id='789012', name='Mechanical Engineering')
department3 = Row(id='345678', name='Theater and Drama... | 29 | 45.52 | 88 | 8 | 379 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_92f30aea10d02c2b_57fee279", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
28
] | [
null
] | [
7
] | [
16
] | |
2024-11-18T21:22:14.756369+00:00 | 1,661,361,842,000 | 674e7146db3a174c5dc908fc2adcba96690ce121 | 3 | {
"blob_id": "674e7146db3a174c5dc908fc2adcba96690ce121",
"branch_name": "refs/heads/master",
"committer_date": 1661361842000,
"content_id": "3a078fa75af5f40db4a1049c930ff82fafa813c6",
"detected_licenses": [
"MIT"
],
"directory_id": "3aaf0f67afb74c245d31c0bf677afaaa064cae9e",
"extension": "py",
"fi... | 2.78125 | stackv2 | #!/usr/bin/python3
import jinja2
import sys
import os
import shutil
from project import Project
from post import Post
class Generator:
# projects: [Project]
# posts: [Post]
def __init__(self, projects_dir, posts_dir, templates_dir):
self.projects = []
self.posts = []
self.env = jin... | 68 | 39.4 | 140 | 16 | 605 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fb317b66c96aacf0_b9d4fd39", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
16
] | [
null
] | [
20
] | [
96
] | |
2024-11-18T21:22:22.646769+00:00 | 1,516,789,783,000 | 27e09ce9a5a50f8d7d4b1c372db26e0947cb1243 | 2 | {
"blob_id": "27e09ce9a5a50f8d7d4b1c372db26e0947cb1243",
"branch_name": "refs/heads/master",
"committer_date": 1516789783000,
"content_id": "9b78b275dc5b740047681cc52e79c3eeab7a0248",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5e55d4399bc76a4501f18440cdc52b819949e314",
"extension": "py"... | 2.4375 | stackv2 | # http://localhost:8000/getreply?key=xxxx&lang=en&input=hola
import tornado.ioloop
import tornado.web
import argparse
import sys
import os
import tensorflow as tf
import time
import logging
from settings import PROJECT_ROOT
from chatbot.botpredictor import BotPredictor
os.environ['TF_CPP_MIN_LOG_LEVEL'] = '3'
logging... | 58 | 31.45 | 77 | 18 | 449 | python | [{"finding_id": "codeql_py/stack-trace-exposure_2501830aa1964a60_7cbb4a94", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-079"
] | [
"py/stack-trace-exposure",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
29,
34
] | [
null,
null
] | [
24,
20
] | [
39,
41
] | |
2024-11-18T21:22:25.122300+00:00 | 1,444,129,618,000 | 3af1319e5cc34e65dbd011b47eed92b0618fc236 | 3 | {
"blob_id": "3af1319e5cc34e65dbd011b47eed92b0618fc236",
"branch_name": "refs/heads/master",
"committer_date": 1444129618000,
"content_id": "9d461250da6d0cc6089ba3f6e754b348744fa750",
"detected_licenses": [
"MIT"
],
"directory_id": "111548be9dae8785202a9273887fd6faf4c6abe0",
"extension": "py",
"fi... | 2.53125 | stackv2 | import re
import os
import yaml
import codecs
import argparse
import jinja2
import misaka as m
import unidecode
from pygments import highlight
from pygments.lexers import get_lexer_by_name
from pygments.formatters import HtmlFormatter
from flask import escape
RE_NON_WORD = re.compile(r'\W+')
def slugify(s):
s = u... | 101 | 28.37 | 75 | 19 | 719 | python | [{"finding_id": "codeql_py/flask-debug_dc11bfcfdb09fda1_116570eb", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
78,
62
] | [
null,
null
] | [
5,
16
] | [
36,
67
] | |
2024-11-18T21:22:25.800470+00:00 | 1,466,971,282,000 | beeac58e23ce2cb7d703a057011c868b24cb6942 | 2 | {
"blob_id": "beeac58e23ce2cb7d703a057011c868b24cb6942",
"branch_name": "refs/heads/master",
"committer_date": 1466971282000,
"content_id": "5125d557308e7edfdd4d424d577dca12468ee1b6",
"detected_licenses": [
"ISC"
],
"directory_id": "29849f8aeb9c7ca5fc3a64510036bd6b6b8c09bd",
"extension": "py",
"fi... | 2.421875 | stackv2 | from __future__ import unicode_literals
import logging
from jinja2 import Template
logger = logging.getLogger(__name__)
FILE_TEMPLATE = Template("""
rules = {
{%- for entity in entities %}
{{ render_entity(entity) }}
{%- endfor %}
}
""".lstrip())
ENTITY_TEMPLATE = Template("""
"{{ entity['name'] }}"... | 183 | 24.45 | 90 | 19 | 1,036 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_919171b75be7b80b_5ea67635", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
11,
20,
25
] | [
17,
22,
31
] | [
17,
19,
24
] | [
14,
13,
13
] | |
2024-11-18T21:22:28.862133+00:00 | 1,531,994,607,000 | a29c0651e239f632c2a0b8e1dac6b2f092d9855e | 3 | {
"blob_id": "a29c0651e239f632c2a0b8e1dac6b2f092d9855e",
"branch_name": "refs/heads/master",
"committer_date": 1531994607000,
"content_id": "1c87f62846d47c8b657a6f604d114415fe40db42",
"detected_licenses": [
"MIT"
],
"directory_id": "8e4abfe517acf760ae79092fb8b10b4cbf59c624",
"extension": "py",
"fi... | 2.609375 | stackv2 | # -*- coding: utf-8 -*-
__author__ = 'patrick'
import urllib
import hashlib
from xml.dom import minidom
from functions import windrichtung
########## Wetter von Yahoo ##########
WEATHER_URLY = 'http://xml.weather.yahoo.com/forecastrss?w=%s&u=c'
WEATHER_NSY = 'http://xml.weather.yahoo.com/ns/rss/1.0'
def yahoowetter... | 77 | 41.77 | 98 | 17 | 812 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_79fb25d7e7d51aab_9446bb74", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
53
] | [
null
] | [
28
] | [
59
] | |
2024-11-18T21:22:37.956087+00:00 | 1,565,364,183,000 | 2803ca30254cb1ec1fee8acb0dcd3409e692ed32 | 3 | {
"blob_id": "2803ca30254cb1ec1fee8acb0dcd3409e692ed32",
"branch_name": "refs/heads/master",
"committer_date": 1565364183000,
"content_id": "1b6be111925341f74d32750a0d59fea922175834",
"detected_licenses": [
"MIT"
],
"directory_id": "b99b456a9fbbea78ca71cceb122b25fefbe41e13",
"extension": "py",
"fi... | 2.71875 | stackv2 | from selenium import webdriver
import time
import re
#from selenium.webdriver.common.keys import keys
def clean_string(str_to_clean):
clean_str = str_to_clean
clean_str = clean_str.replace(":", "<#><#>")
clean_str = clean_str.replace(";", "<$<$<")
clean_str = clean_str.replace(",", ">*>*>")
clean_s... | 57 | 39.51 | 97 | 22 | 509 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_926ec83c001ea993_e9cf9b3b", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [doi.org](1) may be at an arbitrary position in the san... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [doi.org](1) may be at an arbitrary position in the sanitized URL.",
"The string [link.springer.com](1) may be at an arbitrary position in the sanitized URL."
] | [
37,
56
] | [
null,
null
] | [
20,
12
] | [
59,
39
] | |
2024-11-18T21:22:39.848455+00:00 | 1,623,198,748,000 | 8d3388e95da140c0d269fa5aebac5ab0f4f3b1f1 | 2 | {
"blob_id": "8d3388e95da140c0d269fa5aebac5ab0f4f3b1f1",
"branch_name": "refs/heads/master",
"committer_date": 1623198748000,
"content_id": "9f534fb8aba2e4a78b4fb0469ebedd88c4e9e649",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "696b9f24963428de1d1bd65a4b4705d054a9bfd6",
"extension": "py"... | 2.453125 | stackv2 | import os
# import django
import sys
from os.path import dirname, abspath
#
# sh00t_path = dirname(dirname(abspath(__file__)))
# sys.path.append(sh00t_path)
# os.environ.setdefault("DJANGO_SETTINGS_MODULE", "sh00t.settings")
# django.setup()
def generate_secret_key():
secret_file = "/root/sh00t/sh00t/secret.txt"
... | 34 | 31.97 | 105 | 15 | 279 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_f95442a9f67d32b9_b9f2a67f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
21
] | [
null
] | [
22
] | [
32
] | |
2024-11-18T21:51:08.914745+00:00 | 1,611,954,818,000 | c09c000b2e9536f01668acd9630edcc786079159 | 2 | {
"blob_id": "c09c000b2e9536f01668acd9630edcc786079159",
"branch_name": "refs/heads/main",
"committer_date": 1611954818000,
"content_id": "358a6053ddee3689dc13ee6b0627342dd17e6634",
"detected_licenses": [
"MIT"
],
"directory_id": "4791c7dfa6ab838741f69d507d7a4431812815aa",
"extension": "py",
"file... | 2.375 | stackv2 | import re
from datetime import datetime, timedelta, timezone
from typing import Dict, List, Optional
from urllib.parse import unquote
import semver # type: ignore
from dateutil import parser
from gitlab.v4.objects import ( # type: ignore
Project,
ProjectIssue,
ProjectMergeRequest,
ProjectTag,
)
from ... | 234 | 34.6 | 96 | 16 | 1,822 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_732745adc576412a_bc569ba0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
65
] | [
null
] | [
26
] | [
62
] | |
2024-11-18T21:51:30.793607+00:00 | 1,563,452,363,000 | 9a7b88faf1898e1787b4458c5976b4b57982e020 | 3 | {
"blob_id": "9a7b88faf1898e1787b4458c5976b4b57982e020",
"branch_name": "refs/heads/master",
"committer_date": 1563452363000,
"content_id": "4eed10135e7d1fbf9c9eb7242f2205f408f5bca7",
"detected_licenses": [
"MIT"
],
"directory_id": "1f849a940f2971bd3284b45929d3c354a0a089e6",
"extension": "py",
"fi... | 3.3125 | stackv2 | """
Command line Tool for looking up MAC Address information from macaddress.io
Parameters:
mac_address (str): Mac Address to be looked up against macaddress.io
"""
import json
import argparse
import os
import yaml
import requests
def get_mac_addr(userkey, mac):
"""
Function to get the Mac Address Info reques... | 61 | 35.41 | 98 | 14 | 510 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7b18d1abeb9aa9f3_ce731170", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
57,
59,
61
] | [
null,
null,
null
] | [
15,
15,
15
] | [
63,
80,
37
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.