added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T02:10:57.290529+00:00 | 1,459,015,799,000 | f301baf20452bf40732eaacbe07bdad928839e35 | 3 | {
"blob_id": "f301baf20452bf40732eaacbe07bdad928839e35",
"branch_name": "refs/heads/master",
"committer_date": 1459015799000,
"content_id": "48a2a9c9108c07ddcc2896073365f81793a3e692",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8ec52d325ad8770e901384a06ebf950cc76d10ac",
"extension": "py"... | 2.75 | stackv2 | import sys
import requests
import json
def main():
if len(sys.argv) < 2:
print('ARG 1: NBA Stats api key')
return
apikey = sys.argv[1]
download_player_stats(apikey)
#download_teams(apikey)
return
def download_teams(apikey):
test = "https://probasketballapi.com/teams?api_key=... | 45 | 24.82 | 113 | 13 | 308 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_578d8ad5ebc5f5ea_b35a584b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sen... | [
22,
31,
41,
38
] | [
null,
null,
null,
null
] | [
16,
16,
20,
15
] | [
21,
23,
26,
24
] | |
2024-11-19T02:11:15.200833+00:00 | 1,688,080,348,000 | aeb4a6f7f6bbb1e2a2454c8dc0d1f552e607d800 | 2 | {
"blob_id": "aeb4a6f7f6bbb1e2a2454c8dc0d1f552e607d800",
"branch_name": "refs/heads/master",
"committer_date": 1689767267000,
"content_id": "18539b806540b3bc71bfc83733b22d1bc540fab9",
"detected_licenses": [
"Apache-2.0",
"MIT",
"BSD-2-Clause"
],
"directory_id": "d110546d747d7e3865ce5742d5fca09... | 2.5 | stackv2 | """
Module for sending data to OpsGenie
.. versionadded:: 2018.3.0
:configuration: This module can be used in Reactor System for
posting data to OpsGenie as a remote-execution function.
For example:
.. code-block:: yaml
opsgenie_event_poster:
local.opsgenie.post_data:
- tg... | 113 | 28.81 | 86 | 16 | 810 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e8f368c44a0b4cf3_0a7feafc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
92
] | [
null
] | [
50
] | [
57
] | |
2024-11-19T02:11:32.496517+00:00 | 1,583,352,900,000 | 48963d5667bfcd00e81564a68c3b6dea819a5c0d | 3 | {
"blob_id": "48963d5667bfcd00e81564a68c3b6dea819a5c0d",
"branch_name": "refs/heads/master",
"committer_date": 1583352900000,
"content_id": "f720dbb912a33f6df1fac7c953a783e5d94e86e3",
"detected_licenses": [
"MIT"
],
"directory_id": "9da4d8446f953a73617f98c78204965922d08cad",
"extension": "py",
"fi... | 2.671875 | stackv2 | from pathlib import Path
from datetime import datetime
import shutil
import subprocess
import yaml
import requests
class SCMCredentialValidationError(Exception):
pass
class SCMCloneRepoError(Exception):
pass
class SCMCreateBranchError(Exception):
pass
class SCMWriteFileError(Exception):
pass
c... | 349 | 37.19 | 162 | 21 | 2,719 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_632310531b51913d_006e7264", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
213
] | [
null
] | [
32
] | [
36
] | |
2024-11-19T02:32:48.260866+00:00 | 1,490,502,381,000 | 08cad71ba4eeacfbd2a53d55df403d643fc02566 | 3 | {
"blob_id": "08cad71ba4eeacfbd2a53d55df403d643fc02566",
"branch_name": "refs/heads/master",
"committer_date": 1490502381000,
"content_id": "f0e8641d5bdd9ffbcf1e21842b34f11163f46758",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "eaec10631ac05fcc7c93b9ee67687a755b252254",
"extension": "py"... | 3.03125 | stackv2 | import contextlib
import urllib
from domain.ScrapeHelper import ScrapeHelper
class ImageExtractor:
def __init__(self, search_criteria):
self.search_criteria = search_criteria
self._url = self._get_search_url()
pass
def images_for_search_criteria(self):
"""
1. yout... | 56 | 36.95 | 91 | 18 | 444 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fed0c767ebd80f17_33aa35e0", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [i.ytimg.com](1) may be at an arbitrary position in the... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [i.ytimg.com](1) may be at an arbitrary position in the sanitized URL."
] | [
53
] | [
null
] | [
16
] | [
43
] | |
2024-11-19T02:33:01.978876+00:00 | 1,512,131,549,000 | 53ec17e6da6b95029c15446ec0dfad7978f36247 | 2 | {
"blob_id": "53ec17e6da6b95029c15446ec0dfad7978f36247",
"branch_name": "refs/heads/master",
"committer_date": 1512131549000,
"content_id": "fbefdc18180922da83a116095216ede473ff3b60",
"detected_licenses": [
"Unlicense"
],
"directory_id": "6d0fe7ddd3f34135987ec1b26d679fd891ba4e24",
"extension": "py",... | 2.359375 | stackv2 | from flask import Flask, render_template, request, redirect, Response, session
from config import Config as cfg
import requests
import json
app = Flask(__name__, template_folder="templates")
app.debug = True
app.secret_key = cfg.SECRET_KEY
@app.route('/products', methods=['GET'])
def products():
""" Get a stores... | 76 | 29.45 | 99 | 16 | 527 | python | [{"finding_id": "codeql_py/full-ssrf_6e188bc01e802a7f_fe62cf0c", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 2 | true | [
"CWE-918",
"CWE-601"
] | [
"py/full-ssrf",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
55,
44
] | [
60,
null
] | [
16,
21
] | [
10,
29
] | |
2024-11-19T02:33:05.185290+00:00 | 1,628,873,701,000 | 63edc2f4d3ddfd017da9fa768072988570fb312b | 2 | {
"blob_id": "63edc2f4d3ddfd017da9fa768072988570fb312b",
"branch_name": "refs/heads/main",
"committer_date": 1628873701000,
"content_id": "3ea6c890aff96abee2d3b84ba5a3b05c72905941",
"detected_licenses": [
"MIT"
],
"directory_id": "cc03c22a59dba54b5eeb080cbbc13c215604d1f4",
"extension": "py",
"file... | 2.390625 | stackv2 | from wsgiref import simple_server
from flask import Flask, request, render_template
from flask import Response
import os
from flask_cors import CORS, cross_origin
from prediction_Validation_Insertion import pred_validation
from trainingModel import trainModel
from training_Validation_Insertion import train_validation
i... | 98 | 28.86 | 89 | 15 | 637 | python | [{"finding_id": "codeql_py/stack-trace-exposure_107d3ec93526fa36_c39755f8", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
59,
89
] | [
null,
null
] | [
25,
25
] | [
48,
49
] | |
2024-11-19T02:33:11.447955+00:00 | 1,459,501,343,000 | 8413fc575ffc74e5177bb2a666004a7c4097280d | 3 | {
"blob_id": "8413fc575ffc74e5177bb2a666004a7c4097280d",
"branch_name": "refs/heads/master",
"committer_date": 1459501343000,
"content_id": "609384ad9a60d00d5ffc709c8b60571ea869242e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8c8d07132242eb548224df6e44de3065f2d27599",
"extension": "py"... | 2.546875 | stackv2 | # coding=utf-8
from os import environ
import urllib
from flask import Flask, request, jsonify
import re
from random import randint
app = Flask(__name__)
app.config['DEBUG'] = False
NON_LETTERS = re.compile(ur'[^а-яё \-]+', flags=re.UNICODE)
PREFIX = re.compile(u"^[бвгджзйклмнпрстфхцчшщ]+", flags=re.UNICODE)
DELAY = {... | 88 | 32.51 | 71 | 25 | 708 | python | [{"finding_id": "codeql_py/stack-trace-exposure_4282a3a95f84e6d8_a75eb263", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-117"
] | [
"py/stack-trace-exposure",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This log entry depends on a [user-provided value](1)."
] | [
63,
35
] | [
null,
36
] | [
48,
34
] | [
54,
49
] | |
2024-11-19T02:33:26.925109+00:00 | 1,580,371,743,000 | 6f3f492ff2babd671a84323b241c5d98f238d44b | 3 | {
"blob_id": "6f3f492ff2babd671a84323b241c5d98f238d44b",
"branch_name": "refs/heads/master",
"committer_date": 1580371743000,
"content_id": "d1f10b07f8d2997dd238c12851717e70560ff815",
"detected_licenses": [
"MIT"
],
"directory_id": "759f467d235c3732ecdfc4dd20606f93db2da317",
"extension": "py",
"fi... | 2.625 | stackv2 |
# python -m pip install redis-py-cluster
import time, random, string
from rediscluster import StrictRedisCluster
from rediscluster.client import ClusterConnectionPool
host = "XXX"
password = ""
shardMap = None
numShards = 2
maxSlots = 16384
numKeys = 400
def randomword(length):
return ''.join(random.choice(strin... | 103 | 26.34 | 147 | 17 | 771 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_306be649de0403d9_32f79c11", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
56
] | [
null
] | [
7
] | [
147
] | |
2024-11-19T02:46:18.668542+00:00 | 1,693,748,601,000 | 030862ca158697e6b34e4d1cb03d29247615ed7a | 2 | {
"blob_id": "030862ca158697e6b34e4d1cb03d29247615ed7a",
"branch_name": "refs/heads/master",
"committer_date": 1693748601000,
"content_id": "746cba9baff690aabe3446e3e426abea1c93600d",
"detected_licenses": [
"Zlib",
"BSD-3-Clause"
],
"directory_id": "f7848ee3bb2ffcbc1bde5a7f636dd7502b749381",
"ex... | 2.453125 | stackv2 | #!/usr/bin/env python
"""
Usage:
python googlecode2github/wikiconfig.py PROJID SRCDIR DSTDIR
where "PROJID" is the github project id, e.g. "trentm/python-markdown2",
"SRCDIR" is a Google Code project wiki Subversion working copy dir and
"DSTDIR" is the git clone dir of the git project's wiki.
"""
__version__ = "1... | 146 | 31.72 | 99 | 18 | 1,481 | python | [{"finding_id": "codeql_py/redos_9c80519e58cc3739_a76888f1", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '||' and containing many repetitio... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '||' and containing many repetitions of '||'."
] | [
77
] | [
null
] | [
36
] | [
39
] | |
2024-11-19T02:46:21.044410+00:00 | 1,422,050,798,000 | a79a03c61ba1d8a38bca5c91a89cc687daedd279 | 2 | {
"blob_id": "a79a03c61ba1d8a38bca5c91a89cc687daedd279",
"branch_name": "refs/heads/master",
"committer_date": 1422050798000,
"content_id": "03418b538b8acf650926fa02977d5aaa263f66a9",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "911fe52398b2afe5d8db0c05b42152c15fb88f95",
"extension": "p... | 2.34375 | stackv2 | from flask import Flask, render_template, request
import logging
import call
import queue
import cdr
import time
from contextlib import contextmanager
import argparse
INCOMING_NAME = "incoming"
INCOMING_NUM_THREAD = 30
OUTGOING_NAME = "outgoing"
OUTGOING_NUM_THREAD = 300
CDR_NAME = "cdr"
CDR_NUM_THREAD = 5
TIME_MULT... | 167 | 31.85 | 120 | 16 | 1,281 | python | [{"finding_id": "codeql_py/reflective-xss_5838dc645400077f_3852dea5", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
97
] | [
null
] | [
16
] | [
28
] | |
2024-11-19T02:59:20.798025+00:00 | 1,593,594,071,000 | 675dbd47abc5537e40184c66c7ce4faf36958034 | 3 | {
"blob_id": "675dbd47abc5537e40184c66c7ce4faf36958034",
"branch_name": "refs/heads/master",
"committer_date": 1593594071000,
"content_id": "f303017258159f01ca9ed7a32ca451e847497d05",
"detected_licenses": [
"MIT"
],
"directory_id": "b0c9f3b9f6d201d5ce7169344c09790e5bdf308c",
"extension": "py",
"fi... | 2.8125 | stackv2 | #!/usr/bin/env python
"""
CURLDownloadFileList.py
A script to download files from an input list using pycurl.
Author: Pete Bunting (pfb@aber.ac.uk)
Date: 20/05/2014
"""
import os
import argparse
import sys
import pycurl
import time
import random
def readFileList(fileList):
fTxt = open(fileList, 'r')
files... | 153 | 39.78 | 145 | 19 | 1,369 | python | [{"finding_id": "codeql_py/request-without-cert-validation_0e20ce717695ae60_6fd3d869", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
68
] | [
null
] | [
13
] | [
50
] | |
2024-11-19T03:12:10.647578+00:00 | 1,502,053,224,000 | c6d9d54b32aa7008fe486b63dec1f1f5728025ec | 3 | {
"blob_id": "c6d9d54b32aa7008fe486b63dec1f1f5728025ec",
"branch_name": "refs/heads/master",
"committer_date": 1502053224000,
"content_id": "5b581d9cd58cb34f4f6041139f2ea90c27e1d8ea",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cf30613738518e8449537347ad0e5ba6d4dcd355",
"extension": "py"... | 2.5625 | stackv2 | #!/usr/bin/env python2
import paramiko
import optparse
import time
import yaml
import sys
class Ucs_bmc:
def __init__(self, client=None, shell=None):
self.shell = shell
self.client = client
self.fixkeys = []
def connect(self, options):
# Create instance of SSHClient object
self.client = para... | 194 | 25.75 | 96 | 19 | 1,417 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_19791b890a948851_91099239", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
20
] | [
null
] | [
5
] | [
70
] | |
2024-11-19T03:24:45.132106+00:00 | 1,543,459,816,000 | d2afa54bfc717ed8bce8ff780fee1a83549491c0 | 3 | {
"blob_id": "d2afa54bfc717ed8bce8ff780fee1a83549491c0",
"branch_name": "refs/heads/master",
"committer_date": 1543459816000,
"content_id": "3b8909a5d91f2638b41740c4a75f9fe4a0d519b9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0bd63ea64e72bbbf7c913e1cffe291e89f923cf0",
"extension": "py"... | 2.953125 | stackv2 | from jinja2 import Environment, FileSystemLoader, StrictUndefined
from jinja2.exceptions import UndefinedError
from .logging import getLogger
from .process import fail
logger = getLogger(__name__)
class JinjaRenderer():
def __init__(self, facts):
self.facts = facts
def render(self, template_file) ->... | 30 | 37.53 | 105 | 15 | 241 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_94bc9d24ccb59c0b_8ffde9be", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
19
] | [
21
] | [
21
] | [
39
] | |
2024-11-19T03:24:45.958690+00:00 | 1,592,074,100,000 | 448875c3711fb4b567e622f2a6ee0483acbb8c4b | 2 | {
"blob_id": "448875c3711fb4b567e622f2a6ee0483acbb8c4b",
"branch_name": "refs/heads/master",
"committer_date": 1592074100000,
"content_id": "19a86f1575e1d23340f52770c72689bae1a31f06",
"detected_licenses": [
"MIT"
],
"directory_id": "e1e21e8ac7efbe21a0448a1c566693054aed0d00",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python2.7
import requests
import json
import time
import os
import sys
import codecs
from requests_oauthlib import OAuth1
'''
# authentication pieces
client_key = "14RdwJwcED1RkanxC5QdLLgeF"
client_secret = "lY2NG8dk082YcG16TEWndihyn7Gmh7mCOmYsFaTlTUakkZ9cva"
token = "2920967563-NE93uzMVjJax... | 280 | 28.11 | 108 | 21 | 2,080 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_df05746ce8e5fabb_1001524e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive data (private)](4) as clear text.\nThis expression stores [sensitive data ... | [
223
] | [
null
] | [
19
] | [
26
] | |
2024-11-19T03:24:50.434509+00:00 | 1,518,129,918,000 | 1c2712d9a76590aee9df1f03b66dec85d0d60a3e | 3 | {
"blob_id": "1c2712d9a76590aee9df1f03b66dec85d0d60a3e",
"branch_name": "refs/heads/master",
"committer_date": 1518129918000,
"content_id": "be2da449a679619f3738ec9598263e10ac6a9a6b",
"detected_licenses": [
"MIT"
],
"directory_id": "dbe2402566c38a1e746289ec3eca59875c5a4831",
"extension": "py",
"fi... | 3.109375 | stackv2 | import config, requests, json, time, os, platform
def checkIfFilesExpiered(path,filename):
filepath = path+'\\'+filename+'.json'
if os.path.isfile(filepath):
if platform.system() == 'Windows':
creationDate = os.path.getctime(filepath)
else:
stat = os.stat(filepath)
... | 58 | 31.84 | 91 | 15 | 438 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_199c34c4aa4a7ef1_a5fff255", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
39
] | [
null
] | [
15
] | [
53
] | |
2024-11-19T03:35:28.024177+00:00 | 1,539,815,611,000 | 4172db7b1044b49dfad92f9eac1467f727865a58 | 2 | {
"blob_id": "4172db7b1044b49dfad92f9eac1467f727865a58",
"branch_name": "refs/heads/master",
"committer_date": 1539815611000,
"content_id": "6f2a42e4a49f8647feef5c027b84eb6a5aaa24ea",
"detected_licenses": [
"MIT"
],
"directory_id": "2c6f56d8f1ba453717de7a4dc09da3df272ffb63",
"extension": "py",
"fi... | 2.421875 | stackv2 |
"""
simplemap.map.py
~~~~~~~~~~~~~~~~
This module contains all core functionality related to map generation
"""
from jinja2 import Environment, FileSystemLoader
from simplemap.html_render import SilentUndefined
import json
import os
import sys
import traceback
TEMPLATES_DIR = FileSystemLoader('simplemap/templates'... | 110 | 26.25 | 131 | 16 | 734 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0abb144ab74d392e_9cfc228a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
23
] | [
null
] | [
15
] | [
93
] | |
2024-11-19T01:26:48.392140+00:00 | 1,618,057,755,000 | 01fb3ff069777ea5e2b01bbd6ead779fe2e98c58 | 3 | {
"blob_id": "01fb3ff069777ea5e2b01bbd6ead779fe2e98c58",
"branch_name": "refs/heads/master",
"committer_date": 1618057755000,
"content_id": "737c8a4bb52767704a3ae2db1d7df5a71919439c",
"detected_licenses": [
"MIT"
],
"directory_id": "709c11a1bcf70b9a3c238827787897be1d06e817",
"extension": "py",
"fi... | 2.65625 | stackv2 | #!/usr/bin/python3
from cv2 import VideoCapture, imwrite, waitKey, IMWRITE_JPEG_QUALITY
from datetime import datetime
from os import environ, chdir, system
from os import path as p
import logging as log
from json import load
import threading
from time import sleep
import lan_scan
from safe_list import SafeList
class c... | 127 | 34.66 | 88 | 18 | 1,003 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b9edc85a11638889_c830e069", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text."
] | [
35,
42
] | [
null,
null
] | [
18,
18
] | [
48,
51
] | |
2024-11-19T01:26:55.967381+00:00 | 1,546,731,599,000 | a6faa3e7c05354a356cb74d38db5f7585577efae | 3 | {
"blob_id": "a6faa3e7c05354a356cb74d38db5f7585577efae",
"branch_name": "refs/heads/master",
"committer_date": 1546731599000,
"content_id": "56f049762bc011e373c1fc568c27d6d2f6ff48c5",
"detected_licenses": [
"MIT"
],
"directory_id": "b2127e23713f64b7e33b42a8e1cb9dc7b11c6fdd",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/env python3
# Load all essential statistics from AWS SAM including almost-exact number of Lambdas as well as metadata.
import urllib.request
import json
import itertools
import math
import csv
import datetime
def pullstatistics(stamp):
neededpages = None
f = open("autocontents-{}.csv".format(stamp), "w... | 85 | 28.76 | 106 | 17 | 647 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_d9377ca4705e1636_770f21da", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [github.com](1) may be at an arbitrary position in the sanitized URL."
] | [
41
] | [
null
] | [
7
] | [
41
] | |
2024-11-19T01:26:56.504256+00:00 | 1,563,894,144,000 | 1ed3e9c96f4dfe70eeaed82f08edad3b9f1c9185 | 2 | {
"blob_id": "1ed3e9c96f4dfe70eeaed82f08edad3b9f1c9185",
"branch_name": "refs/heads/master",
"committer_date": 1563894144000,
"content_id": "5381adc0aa7da0f8b22aa552d383751ccab2f558",
"detected_licenses": [
"MIT"
],
"directory_id": "da5378f6807e807e1f45546ebd8468e1deeaf3f6",
"extension": "py",
"fi... | 2.453125 | stackv2 | import re
import time
import json
import urllib3
from pprint import pprint
from urllib import parse
from multiprocessing.dummy import Pool
import requests
from faker import Faker
from bs4 import BeautifulSoup
from pymongo import MongoClient
from config import BaseConfig
from redis_helper import RedisHelper
urllib3.d... | 204 | 29.38 | 114 | 21 | 1,715 | python | [{"finding_id": "codeql_py/request-without-cert-validation_80710af7f9b06442_0ac22edd", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
44
] | [
null
] | [
19
] | [
95
] | |
2024-11-19T01:27:05.848873+00:00 | 1,559,855,168,000 | 80179fdaf143f8adf1ab86624ea2cf0da56f8b7e | 4 | {
"blob_id": "80179fdaf143f8adf1ab86624ea2cf0da56f8b7e",
"branch_name": "refs/heads/master",
"committer_date": 1559855168000,
"content_id": "ef8f71253477f68972c389d57c59f5838bae28dd",
"detected_licenses": [
"MIT"
],
"directory_id": "561c2632a69f13c774918a466fb097ee613d432f",
"extension": "py",
"fi... | 3.53125 | stackv2 | # coding=UTF-8
from Member import *
class Group(object):
"""A Group is defined by his name and contains Members"""
def __init__(self, name, members=[]):
#public attributes
self.name = name
#private attributes
self.__members = members
def addMember(self, me... | 153 | 27.58 | 130 | 17 | 1,038 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e317111c55dbfdca_a837df45", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
139,
149,
152
] | [
null,
null,
null
] | [
30,
30,
113
] | [
46,
46,
129
] | |
2024-11-19T01:37:53.783782+00:00 | 1,627,625,016,000 | 8f31e3610cc3ae9a6736e2949912d516371be573 | 4 | {
"blob_id": "8f31e3610cc3ae9a6736e2949912d516371be573",
"branch_name": "refs/heads/main",
"committer_date": 1627625016000,
"content_id": "a7b149296311c776bc663bf1da27cdbbb97860ad",
"detected_licenses": [
"MIT"
],
"directory_id": "f740484c02d567f1cb548e3aebda15c2da2d9d7d",
"extension": "py",
"file... | 3.734375 | stackv2 | print('this is an example of an overloding')
class books:
def __init__(self):
self. pages=int(input('enter number of pages:'))
def __add__(self,other):
return self.pages+other.pages
print('this is add magic method')
b1=books()
b2=books()
print('total pages of both books are:',b1+b2)
print(... | 62 | 28.85 | 67 | 13 | 542 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eb42880cb1b39d13_66c75195", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
61
] | [
null
] | [
55
] | [
58
] | |
2024-11-19T01:38:04.041230+00:00 | 1,466,573,877,000 | ec7e3b325e55d807fb2a612a939560362ff6e1ee | 2 | {
"blob_id": "ec7e3b325e55d807fb2a612a939560362ff6e1ee",
"branch_name": "refs/heads/master",
"committer_date": 1466573877000,
"content_id": "09ffacb545d1b5f21b9ffcbdc8c9a560b32b9e32",
"detected_licenses": [
"MIT"
],
"directory_id": "6a2a178c75c1457722505ecf963835fe95ea44c1",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/env python3
import os
import datetime
import concurrent.futures
import time
import logging
import jinja2
import chronos
def get_year():
y = datetime.datetime.now().year
return y + 2 if datetime.datetime.now().month < 7 else y + 3
STUDENT_PROM = get_year()
ASSISTANT_PROM = STUDENT_PROM - 2
OUTP... | 74 | 24.45 | 78 | 15 | 515 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3a5808a2b75ee447_b086fbb1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
37
] | [
null
] | [
11
] | [
74
] | |
2024-11-19T01:38:07.203912+00:00 | 1,353,529,630,000 | 6967a2cda581a6adbaf711fc524d7ed92b0ef580 | 2 | {
"blob_id": "6967a2cda581a6adbaf711fc524d7ed92b0ef580",
"branch_name": "refs/heads/master",
"committer_date": 1353529630000,
"content_id": "0c58e09ffa67cbc6070e575d17f44c910741bb3c",
"detected_licenses": [
"BSD-3-Clause",
"BSD-2-Clause-Views",
"BSD-2-Clause"
],
"directory_id": "56c38ce119efb8... | 2.40625 | stackv2 | import os
import traceback
import jinja2 as jinja
from nose.plugins import Plugin
#A few named tuple to package the result
from collections import namedtuple, defaultdict
TestReport = namedtuple("TestReport", ['name', 'mod_name', 'kind', 'text'])
ImportReport = namedtuple("ImportReport", ['name', 'fp', 'tests'])
... | 134 | 34.43 | 103 | 15 | 979 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2cac6de73e10915f_518f7828", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
65
] | [
null
] | [
25
] | [
91
] | |
2024-11-19T01:38:10.117329+00:00 | 1,597,210,742,000 | 95a76ecd0918ca5b8664dad350be4bc8e8a78168 | 2 | {
"blob_id": "95a76ecd0918ca5b8664dad350be4bc8e8a78168",
"branch_name": "refs/heads/master",
"committer_date": 1597210742000,
"content_id": "5aa1cad9db68a08151046fb5dbfebb86d4f51643",
"detected_licenses": [
"MIT",
"Python-2.0"
],
"directory_id": "862cc5a64eba3041d497aee3737abd92d6fbac5f",
"exten... | 2.46875 | stackv2 | # from django.shortcuts import render
from django.http import HttpResponse
# from django.contrib.auth.decorators import login_required
from dungeon.models.character import MudUser, Character
from django.views import View
from django.db import IntegrityError
from django.db.models import F
class CharacterView(View):
... | 184 | 57.09 | 110 | 28 | 1,678 | python | [{"finding_id": "codeql_py/reflective-xss_06065f127688cf6e_900683f3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 4 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
28,
118,
172,
176
] | [
null,
null,
null,
null
] | [
41,
41,
49,
45
] | [
75,
91,
56,
52
] | |
2024-11-19T01:38:12.268579+00:00 | 1,683,486,871,000 | 8791c0bca9716c82cd06a8f0e639dcc1b0610f12 | 3 | {
"blob_id": "8791c0bca9716c82cd06a8f0e639dcc1b0610f12",
"branch_name": "refs/heads/master",
"committer_date": 1690286346000,
"content_id": "e8b002ae731eb3161bd0b975efc6ca6d65330b9a",
"detected_licenses": [
"MIT"
],
"directory_id": "126884e6916e9d78201527419681c0369bc61e9a",
"extension": "py",
"fi... | 3.4375 | stackv2 | import sys
import requests
import json
import datetime
# each key can respond to a maximum of 60 calls per minute
# and 1,000,000 calls per month
# use your own api key which you can get from openweathermap
api_key = "c4129d312f42336xxxxxe5b8c65e3647"
# the first argument is the script name
# the second argument is t... | 135 | 27.1 | 88 | 12 | 987 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b9a3ad9276fb0f1d_1fa6ec8a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 10 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensi... | [
68,
69,
70,
71,
81,
82,
83,
92,
93,
102
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
11,
11,
11,
11,
11,
11,
11,
11,
11,
11
] | [
55,
51,
56,
56,
49,
47,
50,
48,
48,
61
] | |
2024-11-19T01:38:19.559002+00:00 | 1,506,375,412,000 | de1d1409092e06f618a81123762c155f93165dc7 | 4 | {
"blob_id": "de1d1409092e06f618a81123762c155f93165dc7",
"branch_name": "refs/heads/master",
"committer_date": 1506375412000,
"content_id": "1b0fd97454581da02004b6214eb33ceba6353f64",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "e2b5c0a6e7921b566b1e91fb203ff0fd1eb6acbe",
"extension": "p... | 3.6875 | stackv2 | #User inputs information
f = open("Usernames and passwords.txt","a")
name = input("Please enter your name: ")
age = input("Please enter your age: ")
password = input("Please enter a password: ")
username = ""
for i in range(3): #Loops for the first 3 letters of the name
username += (name[i])
username += age
print(u... | 31 | 26.65 | 61 | 10 | 204 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_cb9fea9516266313_b3738ae9", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
20
] | [
null
] | [
9
] | [
54
] | |
2024-11-19T01:52:13.074814+00:00 | 1,615,242,138,000 | 60570d93c1d3ba29a7dadce86593f68bfe7a26ff | 3 | {
"blob_id": "60570d93c1d3ba29a7dadce86593f68bfe7a26ff",
"branch_name": "refs/heads/main",
"committer_date": 1615242138000,
"content_id": "6c51832073086f2b92285bee1a46e78d5061a969",
"detected_licenses": [
"MIT"
],
"directory_id": "1234bd6c85fcbdda7de61ebc8fe1eb9f6cfc6eb7",
"extension": "py",
"file... | 2.90625 | stackv2 | import json
from typing import Union
from urllib.request import Request
import pycurl
class Storage:
def __init__(self):
self.contents = b''
def store(self, buf: bytes):
self.contents += buf
def get_length(self):
return len(self.contents)
def __str__(self):
return s... | 136 | 34.55 | 119 | 17 | 1,227 | python | [{"finding_id": "codeql_py/request-without-cert-validation_4c4accaf584ad31d_f1dc4a08", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
101
] | [
null
] | [
9
] | [
53
] | |
2024-11-19T02:04:25.029680+00:00 | 1,562,819,560,000 | 9d19fa8d8e4f76b21ed679eb4c983971d999f194 | 3 | {
"blob_id": "9d19fa8d8e4f76b21ed679eb4c983971d999f194",
"branch_name": "refs/heads/master",
"committer_date": 1562819560000,
"content_id": "ac1e8da21afede2cea75ee0bd7e058c2e72e9252",
"detected_licenses": [
"MIT"
],
"directory_id": "c4f26d98b5425f564f057023591ebffd86d36063",
"extension": "py",
"fi... | 2.84375 | stackv2 | #!/usr/bin/env python3
"""Check a keepassxc database against previously cracked haveibeenpwned passwords
Usage:
keepassxc_pwned <KDBX_DATABASE_FILE> [--plaintext]
Options:
KDBX_DATABASE_FILE The path to your keepassxc database file
--plaintext Print breached passwords in plaintext; defau... | 140 | 39.6 | 171 | 18 | 1,378 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2c0180a0f455f71f_b3bd8752", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
138
] | [
null
] | [
19
] | [
95
] | |
2024-11-19T02:36:58.056617+00:00 | 1,502,334,701,000 | a5efa26bbd3a83e537480f42d5de234155562622 | 3 | {
"blob_id": "a5efa26bbd3a83e537480f42d5de234155562622",
"branch_name": "refs/heads/master",
"committer_date": 1502334701000,
"content_id": "bc55270ca8cf67ad0d2a3a3a37b9ccba424d934f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cd646d958c0f1e8b7762da3e67ec173a6489f1d7",
"extension": "py"... | 3.03125 | stackv2 | from __future__ import absolute_import
from __future__ import division
from __future__ import print_function
def maybe_download_and_extract(directory, url, extract=True):
"""Download file from url unless it already exists in specified directory.
Extract the file if `extract` is True.
The file at `url` is downl... | 71 | 30.03 | 77 | 16 | 521 | python | [{"finding_id": "codeql_py/tarslip_7ae61f31d2c416bd_7c16e2ed", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
60
] | [
null
] | [
9
] | [
10
] | |
2024-11-19T02:37:17.449604+00:00 | 1,690,143,883,000 | ae4b6e46a7e870fdaf99755f54217b5506bb3c02 | 2 | {
"blob_id": "ae4b6e46a7e870fdaf99755f54217b5506bb3c02",
"branch_name": "refs/heads/master",
"committer_date": 1690143883000,
"content_id": "8c59b9558c451035bb499e50831a59a318577447",
"detected_licenses": [
"MIT"
],
"directory_id": "53e2c50adf6698a562b42725f073e18f88d35232",
"extension": "py",
"fi... | 2.375 | stackv2 | from jinja2 import Environment, FileSystemLoader
from Crypto.PublicKey import RSA
import os
if __name__ == '__main__':
origin = input("What is the origin FQDN? Domain only, no scheme (e.g. www.horahora.org)")
# compose file
env = Environment(loader=FileSystemLoader("./templates"))
template = env.get_t... | 34 | 33.82 | 93 | 13 | 305 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_dd06f35c2e55c25d_a96992cb", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
9
] | [
null
] | [
11
] | [
62
] | |
2024-11-19T02:37:22.668676+00:00 | 1,454,120,163,000 | 855f2c12293123e4a033b5ea31fa64d4a4ecb8e3 | 3 | {
"blob_id": "855f2c12293123e4a033b5ea31fa64d4a4ecb8e3",
"branch_name": "refs/heads/master",
"committer_date": 1454120163000,
"content_id": "477a54d6d3b8cb347cfd929f8a0eb7a98afb4410",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "dcf5d2fc3e83f8b1a4bb6771c5730a990b53e400",
"extension": "py"... | 2.703125 | stackv2 | #!/usr/bin/python
######################################################################
# Cloud Routes Availability Manager: http-keyword module
# ------------------------------------------------------------------
# This is a module for performing http keyword searches.
# This will return true if no errors or false if... | 94 | 31.73 | 99 | 15 | 673 | python | [{"finding_id": "codeql_py/request-without-cert-validation_d9363856d23982aa_6063d369", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
52
] | [
53
] | [
18
] | [
100
] | |
2024-11-19T02:49:10.847159+00:00 | 1,603,036,069,000 | caa22f7b1e702431fb216fd96ec8bbb55182b9b8 | 3 | {
"blob_id": "caa22f7b1e702431fb216fd96ec8bbb55182b9b8",
"branch_name": "refs/heads/master",
"committer_date": 1603036069000,
"content_id": "cbc49e20bb6c0a9fd0b71757843727fc0abb5245",
"detected_licenses": [
"MIT"
],
"directory_id": "f392a63995d02bcdbbb988a11ec40f82ce024ba0",
"extension": "py",
"fi... | 2.65625 | stackv2 | import os, sys
import Image
from jinja2 import Template
with file('xlsxart.template') as f:
source = f.read()
XimgTemplate = Template(source)
im = Image.open("sample.png")
mx,my = im.size
pix = im.load()
def RGBToHTMLColor(rgb_tuple):
""" convert an (R, G, B) tuple to #RRGGBB """
hexcolor = '#%02x%02x%02x'... | 24 | 28.29 | 92 | 11 | 206 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5825e575f3050df8_4cf1a00f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
6
] | [
null
] | [
16
] | [
32
] | |
2024-11-19T02:49:13.937975+00:00 | 1,515,960,000,000 | d51d31065b75827f67968e1caba625c4d9a03571 | 3 | {
"blob_id": "d51d31065b75827f67968e1caba625c4d9a03571",
"branch_name": "refs/heads/master",
"committer_date": 1515960000000,
"content_id": "b2accfe0164e197c3517e96c1e9c8dc8e2cd0e43",
"detected_licenses": [
"MIT"
],
"directory_id": "a484bd40a5c5c722ab6a0a7ca80e237bb78d14c9",
"extension": "py",
"fi... | 2.515625 | stackv2 | import re
import locale
import os
import termcolor
import jinja2
from . import logger
from . import consts
PARAGRAPH_PATTERN = re.compile(r'\r\n|\n\r|\n|\r')
SENTENCE_PATTERN = re.compile(r'\.(?:\W|$)')
def output_coupons(coupons):
# sets the locale setting for the datetime.strptime() function
locale.setloc... | 115 | 30.98 | 75 | 19 | 827 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_cf35e2ef04ac3377_14021f5e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
37
] | [
null
] | [
23
] | [
59
] | |
2024-11-19T02:49:25.335941+00:00 | 1,580,126,626,000 | 7345b9dccb52d808b7cddd53186cca27f89e4169 | 3 | {
"blob_id": "7345b9dccb52d808b7cddd53186cca27f89e4169",
"branch_name": "refs/heads/master",
"committer_date": 1580126626000,
"content_id": "a8f6ccfc6f235ecc35bbda79a536a24a75a11abc",
"detected_licenses": [
"MIT"
],
"directory_id": "be5eb1738c1f91bfc5a94f5e1af325b6b411424f",
"extension": "py",
"fi... | 3.484375 | stackv2 | #!/usr/bin/env python3
from password import Credential
from password import UserData
import random
import string
import time
import pyperclip
def create_credentials(user_name, email, password):
'''
function that creates new credentials
'''
new_credential = Credential(user_name,email, password)
retu... | 170 | 30.19 | 136 | 18 | 1,056 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bc379f93bf8a7848_038d007f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
109
] | [
null
] | [
19
] | [
128
] | |
2024-11-19T03:00:03.605655+00:00 | 1,538,719,277,000 | 9c39605f01d4ba01baa0a0e1037eac4c61ee00f3 | 2 | {
"blob_id": "9c39605f01d4ba01baa0a0e1037eac4c61ee00f3",
"branch_name": "refs/heads/master",
"committer_date": 1538719398000,
"content_id": "bcf56318124f22bea81f05cbcfd679e5fa970bb4",
"detected_licenses": [
"MIT"
],
"directory_id": "9927ffebcaecc215bda6651bda415115cd672192",
"extension": "py",
"fi... | 2.328125 | stackv2 | """
Auth blueprint's view. Defined the route of the auth blueprint and the related logic.
"""
import re
from flask import (
render_template, url_for, redirect, flash, request, current_app, make_response
)
from flask_login import current_user, login_required, login_user, logout_user
from flask_principal import Ident... | 277 | 28.62 | 97 | 19 | 1,663 | python | [{"finding_id": "codeql_py/url-redirection_4c77dac51e17cf91_f5778f67", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
92
] | [
null
] | [
29
] | [
78
] | |
2024-11-19T03:00:04.068269+00:00 | 1,677,659,022,000 | 3f44cce223430868683ef28405fb206d1b91cc47 | 3 | {
"blob_id": "3f44cce223430868683ef28405fb206d1b91cc47",
"branch_name": "refs/heads/master",
"committer_date": 1677659022000,
"content_id": "229df961aebf8639240d701ddc3b0653f9bc981b",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "2396e9fe1c1897a7d19845aedead202524a42cd6",
"extension": "p... | 2.671875 | stackv2 | #!/usr/bin/env python3
"""
Copyright (c) 2019 - 2021, Chris Perkins
Licence: BSD 3-Clause
Reports on .1x authentication sessions on a Cisco switch, optionally output to CSV
v1.2 - delay_factor tweak due to show authentication sessions being very slow
v1.1 - fixed edge case for empty show output
v1.0 - initial releas... | 148 | 36.73 | 125 | 21 | 1,097 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_71755d810d200ffe_2bf3107d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
137
] | [
139
] | [
21
] | [
59
] | |
2024-11-19T03:00:26.734170+00:00 | 1,578,561,078,000 | df39d53222718a3d417e61f51366bcd8fad1bc78 | 3 | {
"blob_id": "df39d53222718a3d417e61f51366bcd8fad1bc78",
"branch_name": "refs/heads/master",
"committer_date": 1578561078000,
"content_id": "49aa545c6f479ca836d46e86dc4536f6a705bd8b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "294cb20ee3af4b9fcf605c4b86965378c4e1b54f",
"extension": "py"... | 2.75 | stackv2 | import paramiko
import os
import time
def connect_remote():
host = '123.123.123.123'
port = 22
name = 'abc'
key = paramiko.RSAKey.from_private_key_file('C:/Users/feng8/.ssh/id_rsa_feng')
# 创建SSH对象
ssh_client = paramiko.SSHClient()
# 允许连接不在know_hosts文件中的主机, 第一次登录的认证信息
ssh_client.set_mi... | 91 | 32.08 | 104 | 21 | 786 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_05c271b6587a2a6c_b4cfd83f", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
15
] | [
null
] | [
5
] | [
69
] | |
2024-11-19T03:12:05.030249+00:00 | 1,610,058,579,000 | d69d038617b0ef9a53430781e4b27e64fe142ba5 | 3 | {
"blob_id": "d69d038617b0ef9a53430781e4b27e64fe142ba5",
"branch_name": "refs/heads/main",
"committer_date": 1610058579000,
"content_id": "243239920743416dfe24f12696e699d449b0e2f6",
"detected_licenses": [
"MIT"
],
"directory_id": "e27bf3b437e83c19bbfe62b99bd6461363795f4d",
"extension": "py",
"file... | 3.25 | stackv2 | import string, random
def genPass(num):
upper_ = string.ascii_uppercase
lower_ = upper_.lower()
special_ = ['!','",','£','$','%','^','&','*','(',')','_','+','-']
char = []
pword = []
password = ""
for i in upper_:
char.append(i)
for i in lower_:
char.append(i)
for i i... | 25 | 23.96 | 69 | 12 | 180 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1022304f6e922669_1f1821fb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
22
] | [
null
] | [
11
] | [
19
] | |
2024-11-19T03:12:07.791097+00:00 | 1,577,040,182,000 | 7878ca5fe786771923f8f8aee6dce546ce785975 | 3 | {
"blob_id": "7878ca5fe786771923f8f8aee6dce546ce785975",
"branch_name": "refs/heads/master",
"committer_date": 1577040182000,
"content_id": "9a945ddb655b212a93f95875232095e347f07706",
"detected_licenses": [
"MIT"
],
"directory_id": "2b9fc3f3bc799c461e69d6a7926dafed3c2bc393",
"extension": "py",
"fi... | 2.90625 | stackv2 | import csv
import re
import spacy
import sys
reload(sys)
import pandas as pd
sys.setdefaultencoding('utf8')
from cStringIO import StringIO
from pdfminer.pdfinterp import PDFResourceManager, PDFPageInterpreter
from pdfminer.converter import TextConverter
from pdfminer.layout import LAParams
from pdfminer.pdfpage import ... | 138 | 29.94 | 120 | 14 | 1,121 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7a0216b20bf87a9c_029478c0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
102
] | [
null
] | [
7
] | [
9
] | |
2024-11-19T03:12:08.140801+00:00 | 1,679,777,917,000 | e5faf535755acc715345b42f49461fbd5a92babd | 4 | {
"blob_id": "e5faf535755acc715345b42f49461fbd5a92babd",
"branch_name": "refs/heads/master",
"committer_date": 1679777917000,
"content_id": "6f90dd781a8fcb8b2206adbb534df99fb56417ed",
"detected_licenses": [
"MIT"
],
"directory_id": "74e5f8a54be985c50ba160189f9bd8b202cd2c6e",
"extension": "py",
"fi... | 3.8125 | stackv2 | #!/usr/bin/python3
#
# zipweather.py - Get the current weather conditions for a given zip code
#
# Cobbled together by Jim McClanahan, W4JBM (Dec 2020)
#
# Based on example from here:
# https://www.geeksforgeeks.org/python-find-current-weather-of-any-city-using-openweathermap-api/
#
# Wind direction conversion to cardi... | 109 | 31.39 | 97 | 13 | 975 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f235084cfd66aa52_f3202a00", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
99,
102,
103,
105
] | [
null,
null,
104,
null
] | [
11,
11,
11,
11
] | [
64,
55,
66,
66
] | |
2024-11-19T03:12:18.379289+00:00 | 1,634,333,370,000 | 35231acc23da552336d6d52216f300a74fe0165c | 2 | {
"blob_id": "35231acc23da552336d6d52216f300a74fe0165c",
"branch_name": "refs/heads/main",
"committer_date": 1634333370000,
"content_id": "48f6c3b1c7374554ce5ce3f24234a51161d7e7f0",
"detected_licenses": [
"MIT"
],
"directory_id": "5840b08359b19ccaa3cc77c5fe9e342dc7984d7b",
"extension": "py",
"file... | 2.46875 | stackv2 | # Standard Library Imports
import os
import subprocess
import logging
import tempfile
from logging.handlers import RotatingFileHandler
from multiprocessing import Process, freeze_support
import msvcrt
import ctypes
# Third Party Imports
import uvicorn
from fastapi import FastAPI
import MetaTrader5 as mt5
# General C... | 196 | 33.5 | 108 | 17 | 1,597 | python | [{"finding_id": "codeql_py/log-injection_4c4f64d35afc5634_c563666d", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
105,
107,
109
] | [
null,
null,
null
] | [
25,
25,
29
] | [
73,
72,
68
] | |
2024-11-19T03:12:18.961700+00:00 | 1,628,661,665,000 | edf36960e6d725247595117cbaca31583e76a4da | 2 | {
"blob_id": "edf36960e6d725247595117cbaca31583e76a4da",
"branch_name": "refs/heads/master",
"committer_date": 1628661665000,
"content_id": "c9a7cde55d8aee2220909c34179f12ec7b191d26",
"detected_licenses": [
"MIT"
],
"directory_id": "917a690cad8fece9102ba3191284f1ab83a8aeaf",
"extension": "py",
"fi... | 2.34375 | stackv2 | """
https://www.ncbi.nlm.nih.gov/books/NBK25497/
"""
import os
import sys
import json
import time
import textwrap
import datetime
import click
import prettytable
from dateutil.parser import parse as date_parse
from impact_factor import ImpactFactor
from simple_googletrans import GoogleTrans
from simple_loggers i... | 282 | 35.66 | 123 | 22 | 2,450 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8108a4231e26b419_c5b3c63b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text."
] | [
241
] | [
null
] | [
27
] | [
39
] | |
2024-11-19T03:12:27.407772+00:00 | 1,547,130,889,000 | 059c545c23ba899b4783157c7b207f83adb83cb2 | 2 | {
"blob_id": "059c545c23ba899b4783157c7b207f83adb83cb2",
"branch_name": "refs/heads/master",
"committer_date": 1547130889000,
"content_id": "f9756229b660ab583b8171292b7bbcd9a4564eaa",
"detected_licenses": [
"MIT"
],
"directory_id": "2337e4a1bade0d3ea809e10679cc2bd026b7067b",
"extension": "py",
"fi... | 2.390625 | stackv2 | import logging
from flask import request, current_app
from flask_restplus import Resource, fields
from rest_api_oscar.lib.oscar_saml import OscarSaml
from rest_api_oscar.api.restplus import api
import base64, json
from flask import jsonify
ns = api.namespace('auth', description='Operations related to OSCAR login')
... | 70 | 31.51 | 89 | 20 | 535 | python | [{"finding_id": "codeql_py/log-injection_d9e6f96d74ca59b2_0c46ebe0", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
34
] | [
null
] | [
23
] | [
83
] | |
2024-11-19T03:12:52.228738+00:00 | 1,539,059,825,000 | 3f81456dcf80da2284f5d15c02fed0358ea52d0d | 3 | {
"blob_id": "3f81456dcf80da2284f5d15c02fed0358ea52d0d",
"branch_name": "refs/heads/master",
"committer_date": 1539059825000,
"content_id": "8ad43b57cd78f8fd626f6bde2d3e9ed853d7fcb2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bcc162255958295a3f4f1f1816258ae49863e53a",
"extension": "py"... | 2.578125 | stackv2 | #coding=utf8
import requests
import selenium.webdriver
from bs4 import BeautifulSoup
import random
import time
from requests.packages.urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
def nowplay():
headers = {'User-Agent': 'Mozilla/5.0 (Windows NT ... | 222 | 36.01 | 119 | 21 | 1,966 | python | [{"finding_id": "codeql_py/request-without-cert-validation_31b0f9eea2fa0a74_2b0a3a8e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
14,
94
] | [
null,
null
] | [
9,
9
] | [
55,
39
] | |
2024-11-19T03:12:53.353484+00:00 | 1,529,414,392,000 | c19e712103517ba45c8a3fb8e3b0135530e4d4e3 | 3 | {
"blob_id": "c19e712103517ba45c8a3fb8e3b0135530e4d4e3",
"branch_name": "refs/heads/master",
"committer_date": 1529414392000,
"content_id": "5fd1950241e28b06e2321167263725fd50565256",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5855a51fa9b232a62decf4d1dbda13969a42d78e",
"extension": "py"... | 2.5625 | stackv2 | # -*- coding: utf-8 -*-
from .blogDB import get_db
from functools import reduce
class blogInfo:
def __init__(self):
blogdb = get_db()
cur = blogdb.cursor()
cur.execute('SELECT id,content from info order by id')
temp = cur.fetchall()
self.title=temp[4][1]
self.subtitle... | 240 | 34.86 | 167 | 17 | 2,161 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_740846f0031d5bc3_36471a0c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
19
] | [
null
] | [
18
] | [
41
] | |
2024-11-19T01:28:52.788656+00:00 | 1,568,898,970,000 | 26dc053dddc7bd881c3b17244c96b23f0e90c469 | 3 | {
"blob_id": "26dc053dddc7bd881c3b17244c96b23f0e90c469",
"branch_name": "refs/heads/master",
"committer_date": 1568898970000,
"content_id": "1ce60b4a86985fc46213110dc9cc749f0707ef2b",
"detected_licenses": [
"MIT"
],
"directory_id": "fb60100ea3b7e776e6b25250401c597fcf5f9573",
"extension": "py",
"fi... | 3 | stackv2 | import requests
from requests.auth import HTTPBasicAuth
import json
__log__ = True
def doLog(func):
def wrapped(*args, **kwargs):
result = func(*args, **kwargs)
if __log__:
print 'called {} result:{}'.format(func.__name__, result)
return result
return wrapped
class FakeU... | 48 | 32.23 | 78 | 14 | 332 | python | [{"finding_id": "codeql_py/request-without-cert-validation_35272e2eff4134f7_aca4624c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
39
] | [
41
] | [
13
] | [
54
] | |
2024-11-19T01:29:01.978925+00:00 | 1,594,488,577,000 | 54fe0f76b0d907dc798dacb14a2ede693ff04725 | 3 | {
"blob_id": "54fe0f76b0d907dc798dacb14a2ede693ff04725",
"branch_name": "refs/heads/master",
"committer_date": 1594488577000,
"content_id": "c5ca2e29242f9b65bca3c54a3555fbc2a16c180e",
"detected_licenses": [
"MIT",
"BSD-3-Clause"
],
"directory_id": "2580d5f300369d4e3234e58c46a56ba641563afa",
"ext... | 2.765625 | stackv2 | #This file is the database driver
import psycopg2
import sys
import random
import string
import site_settings
import base64
from Crypto.Cipher import AES
conn = psycopg2.connect(database="TEST1", user="postgres", password="dachengzi", host="192.168.0.102", port="5432") #password in this line is invalid
cur = conn.cu... | 31 | 26.19 | 150 | 10 | 254 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_8846369fbb3e6d57_674be08a", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
26
] | [
null
] | [
19
] | [
51
] | |
2024-11-19T01:29:26.440127+00:00 | 1,535,056,128,000 | 536ce8511595675df7a66a12acc395cb0ab50b6c | 2 | {
"blob_id": "536ce8511595675df7a66a12acc395cb0ab50b6c",
"branch_name": "refs/heads/master",
"committer_date": 1535056128000,
"content_id": "45442c1b49bb8c42d2762fe49758514cab5db48b",
"detected_licenses": [
"MIT"
],
"directory_id": "59e632f03385b15b20397bae057b8c290caf20b9",
"extension": "py",
"fi... | 2.4375 | stackv2 | # -*- coding: utf-8 -*-
import os
import hashlib
from google.appengine.ext import ndb
from messaging.exceptions import EntityNotFound
class Account(ndb.Model):
site = ndb.StringProperty(required=True)
name = ndb.StringProperty()
modified_at = ndb.DateTimeProperty(auto_now=True)
key_hash = ndb.String... | 40 | 24.1 | 76 | 14 | 230 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_e13d116384f0a223_4ae63bee", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
21
] | [
null
] | [
38
] | [
45
] | |
2024-11-19T01:29:56.958965+00:00 | 1,566,185,146,000 | 4d00845a5fb63029daa7b466c1d23b73359e8866 | 3 | {
"blob_id": "4d00845a5fb63029daa7b466c1d23b73359e8866",
"branch_name": "refs/heads/master",
"committer_date": 1566185146000,
"content_id": "97d186de4e68d9114671b8cd276f995b398eeb9a",
"detected_licenses": [
"MIT"
],
"directory_id": "588e301ce910e5137df7dd15497df37cb81a4a63",
"extension": "py",
"fi... | 2.546875 | stackv2 | # coding=utf-8
import os
import urllib.request
from flask import Flask, flash, request, redirect, jsonify
from flask import send_from_directory
from werkzeug.utils import secure_filename
import uuid
from cv_code import blur_image
from db_code import Database
# set host address, allow all ip address
HOST = '0.0.0.0'
... | 131 | 30.19 | 119 | 17 | 957 | python | [{"finding_id": "codeql_py/path-injection_6c681a807e765bf0_a70f41cd", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
52,
105
] | [
null,
null
] | [
27,
23
] | [
62,
55
] | |
2024-11-19T01:29:59.040925+00:00 | 1,628,856,065,000 | 2e733f8c387d8076ff94e73f5565770789861605 | 2 | {
"blob_id": "2e733f8c387d8076ff94e73f5565770789861605",
"branch_name": "refs/heads/master",
"committer_date": 1628856065000,
"content_id": "27bf68436fd6caa8775963d677d3a2fcad9172cd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7b7f7e6303291be89794394f50e7889c902b67c4",
"extension": "py"... | 2.484375 | stackv2 | import jinja2 as jinja
from pathlib import Path
from .config_doc import ObjectConfigurationDocument
class ObjectConfigurationTemplate:
@staticmethod
def from_file(self, path):
path = Path(path)
with open(self.path, 'r') as f:
content = f.read()
return ObjectConfigurationTem... | 20 | 34.35 | 105 | 14 | 138 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8efa1dbae85c9460_77d129c2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
18
] | [
null
] | [
21
] | [
63
] | |
2024-11-19T01:30:16.907409+00:00 | 1,660,843,188,000 | 73035ad043edfd84c5e609593678a52ba9aaff26 | 2 | {
"blob_id": "73035ad043edfd84c5e609593678a52ba9aaff26",
"branch_name": "refs/heads/master",
"committer_date": 1660843188000,
"content_id": "302319c60843d8edc642d289ea40dff9ea879d57",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "2df1e7228cedf565d1e17ef1b59238718cb7eba5",
"extension": "p... | 2.375 | stackv2 | #! /usr/bin/env python3
import argparse
from dataclasses import dataclass
from shutil import copyfile, copytree
from pathlib import Path
import subprocess
import sys
import os
from typing import Dict, Type
import build
def install_hal_daemon(out: Path) -> None:
path = Path('daemon')
out_bin = out / 'bin'
... | 62 | 32.44 | 107 | 12 | 550 | python | [{"finding_id": "codeql_py/overly-permissive-file_da700c76220bfeca_ccd7244a", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
17
] | [
null
] | [
5
] | [
37
] | |
2024-11-19T01:30:33.237509+00:00 | 1,406,458,334,000 | 11896620b0172b86f245ffe4a683f642b4847036 | 3 | {
"blob_id": "11896620b0172b86f245ffe4a683f642b4847036",
"branch_name": "refs/heads/master",
"committer_date": 1406458334000,
"content_id": "88882c8bf0fc45bd5b09d8160d24fb652dc78a9e",
"detected_licenses": [
"MIT"
],
"directory_id": "66db4d9468952603adeefdcbcbf1cd3b24acfc9d",
"extension": "py",
"fi... | 2.578125 | stackv2 | import re
import locale
from datetime import time as dt_time
_DIRECT_PATTERN = re.compile(r'%[A-z]')
_C_KEY = locale.nl_langinfo(locale.D_T_FMT)
_XD_KEY = locale.nl_langinfo(locale.D_FMT)
_XT_KEY = locale.nl_langinfo(locale.T_FMT)
_AMPM_KEY = '({am}|{pm})'.format(am=dt_time().strftime('%p'),
... | 48 | 27.79 | 75 | 15 | 419 | python | [{"finding_id": "codeql_py/overly-large-range_13ffbb27d17d2fae_fb35e8aa", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
5
] | [
null
] | [
34
] | [
37
] | |
2024-11-19T01:30:34.568263+00:00 | 1,631,854,394,000 | 836a0f6ee80080bcc62ba0f0eb9e7399db54a9e0 | 3 | {
"blob_id": "836a0f6ee80080bcc62ba0f0eb9e7399db54a9e0",
"branch_name": "refs/heads/master",
"committer_date": 1631854394000,
"content_id": "26fc25a0a88da4ceed410968935952bdc4528d47",
"detected_licenses": [
"MIT"
],
"directory_id": "b2ff37406e50976b8db1c75bde4297f5039f7391",
"extension": "py",
"fi... | 2.78125 | stackv2 | from flask import Flask
app = Flask(__name__)
#this is home end point
@app.route("/")
def hello_world():
return "Hello, World! my name is tithi"
# this is login end point
@app.route("/login")
def login():
return "this is login page"
# this is contact end point
@app.route("/contact")
def contact():
return ... | 25 | 20.2 | 43 | 10 | 137 | python | [{"finding_id": "codeql_py/flask-debug_eb9a605af8ad600e_948b7c8c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
24,
21
] | [
null,
null
] | [
5,
12
] | [
34,
38
] | |
2024-11-19T01:55:11.006593+00:00 | 1,587,917,444,000 | a5500e80b92ef987d6498ddc1be77eade506dfe5 | 2 | {
"blob_id": "a5500e80b92ef987d6498ddc1be77eade506dfe5",
"branch_name": "refs/heads/master",
"committer_date": 1587917444000,
"content_id": "beb590f8eb1489cfcb5a113583d9238807857fb6",
"detected_licenses": [
"MIT"
],
"directory_id": "8ffd2a1977f5df0c520927b7e6e33b3cf787d88b",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!coding=utf-8
import requests
import json
import datetime
import re
from selenium import webdriver
from selenium.webdriver.chrome.options import Options
import time
requests.packages.urllib3.disable_warnings()
# 慢慢买历史价格爬取
class ManManMai:
def __init__(self):
# 无界面运行
chrome_opt = Options() # 创建参... | 125 | 35.78 | 152 | 18 | 1,394 | python | [{"finding_id": "codeql_py/overly-large-range_1a1d80548d245bc4_8ccc0e41", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 2 | true | [
"CWE-020",
"CWE-295"
] | [
"py/overly-large-range",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"This request may run without certificate validation because [it is disabled](1)."
] | [
32,
76
] | [
null,
null
] | [
36,
15
] | [
39,
58
] | |
2024-11-19T01:55:30.398389+00:00 | 1,570,588,100,000 | c7983a5585099b87a65625a66d668835a57e78da | 2 | {
"blob_id": "c7983a5585099b87a65625a66d668835a57e78da",
"branch_name": "refs/heads/master",
"committer_date": 1570588100000,
"content_id": "c9e07959a2e27a34a51dfec50b1246cede005de4",
"detected_licenses": [
"MIT"
],
"directory_id": "b632cd1ddd199921d5c0f835c60300666b22b0f8",
"extension": "py",
"fi... | 2.484375 | stackv2 | import os
import ntpath
from builtins import OSError
from jinja2 import Environment, FileSystemLoader
def generate_html(body, report_dir, build_id):
env = Environment(loader=FileSystemLoader('./'))
template = env.get_template('tntfuzzer/utils/template.html')
path = "{}/{}/".format(report_dir, build_id)
... | 63 | 35.14 | 105 | 13 | 584 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_26634f1904677e2f_941931f9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
9,
23
] | [
null,
null
] | [
11,
11
] | [
53,
53
] | |
2024-11-19T01:55:32.869007+00:00 | 1,621,514,772,000 | 59339a60a1cbcd8d32826341f73054e6723fca11 | 3 | {
"blob_id": "59339a60a1cbcd8d32826341f73054e6723fca11",
"branch_name": "refs/heads/main",
"committer_date": 1621514772000,
"content_id": "0c123637fc2509a5b1986c672b37b70c350e9eae",
"detected_licenses": [
"MIT"
],
"directory_id": "e5f88583b36a3430d7b27c327acbd43f200dd8fb",
"extension": "py",
"file... | 3.296875 | stackv2 | from tkinter import *
root = Tk()
def getvalue():
username = uservalue.get()
upassword = passvalue.get()
print(username, upassword)
root.geometry("600x500")
user = Label(root, text="username")
password = Label(root, text="password")
user.grid()
password.grid(row=1)
# Variable classes in tkinter
# Boo... | 34 | 18.03 | 50 | 8 | 173 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_07d350add7c421b6_854624e3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
9
] | [
null
] | [
21
] | [
30
] | |
2024-11-19T02:06:52.908474+00:00 | 1,523,533,207,000 | 212513322d3b5ede966a7c479b3450258e894454 | 2 | {
"blob_id": "212513322d3b5ede966a7c479b3450258e894454",
"branch_name": "refs/heads/master",
"committer_date": 1523533207000,
"content_id": "8c36eaea908818c32f9e9fd8b5da04e158ba2361",
"detected_licenses": [
"MIT"
],
"directory_id": "56f3441dbd0892fe5eb73302314044511913499a",
"extension": "py",
"fi... | 2.390625 | stackv2 | import tornado.web
import json
from jinja2 import Environment, FileSystemLoader, TemplateNotFound
from settings import settings
class JinjaCustomFilter:
@classmethod
def debug(cls, text):
print(str(text))
return
class BaseHandler(tornado.web.RequestHandler):
def write_error(self, statu... | 33 | 25.61 | 77 | 16 | 173 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ab2dc2e0c9819a6b_78c778ae", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
24
] | [
null
] | [
15
] | [
78
] | |
2024-11-19T02:07:27.267168+00:00 | 1,592,775,809,000 | 66338ddbf85b18ffe3cf1ece22b8b535d90e6961 | 3 | {
"blob_id": "66338ddbf85b18ffe3cf1ece22b8b535d90e6961",
"branch_name": "refs/heads/master",
"committer_date": 1592775809000,
"content_id": "c87e039d251102597a5ef6d4dd01bbe34c32d34b",
"detected_licenses": [
"MIT"
],
"directory_id": "c094ae79fac760c70ec8658a0d8451b8909d2f59",
"extension": "py",
"fi... | 2.5625 | stackv2 | from flask import Flask
import pika
import os
import json
app = Flask(__name__)
host_name = os.getenv("RMQ_HOST")
@app.route('/')
def index():
if host_name:
return f"Hello from {host_name} running in a Docker container!"
return 'Couldn\'t grab host_name'
@app.route('/test/<cmd>')
def add(cmd):
... | 38 | 22.97 | 83 | 12 | 223 | python | [{"finding_id": "codeql_py/flask-debug_a1e9e08b2f78a8bc_62aec065", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
38,
34
] | [
null,
null
] | [
5,
12
] | [
40,
37
] | |
2024-11-19T02:07:40.644404+00:00 | 1,637,477,487,000 | a023677cf4f1e4a937bd1deb36d0589a3d78d15a | 3 | {
"blob_id": "a023677cf4f1e4a937bd1deb36d0589a3d78d15a",
"branch_name": "refs/heads/main",
"committer_date": 1637477487000,
"content_id": "9fd5f088c338ddbcdfa4c609c0c8efee17ec06e2",
"detected_licenses": [
"MIT"
],
"directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b",
"extension": "py",
"file... | 2.53125 | stackv2 | import os
import hashlib
import tempfile
from exiftool import ExifTool
from flask import Flask, request, jsonify
app = Flask(__name__, template_folder="views", static_folder="public", static_url_path="/")
app.config["MAX_CONTENT_LENGTH"] = 100 * 1024
secret = os.getenv("SECRET") or "BSidesTLV2021{This_Is_Not_The_Flag}... | 93 | 26.96 | 103 | 22 | 574 | python | [{"finding_id": "codeql_py/stack-trace-exposure_8f3483c1ff10bc55_f434f12b", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-215",
"CWE-327"
] | [
"py/stack-trace-exposure",
"py/flask-debug",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
87,
93,
54
] | [
null,
null,
null
] | [
24,
5,
24
] | [
42,
66,
39
] | |
2024-11-19T02:31:19.459471+00:00 | 1,596,731,693,000 | c3dcb83c90bfcd8e92f17930eca0598790addb04 | 3 | {
"blob_id": "c3dcb83c90bfcd8e92f17930eca0598790addb04",
"branch_name": "refs/heads/master",
"committer_date": 1596731693000,
"content_id": "74f263d6f9338068d0ee8a349720666f9057bba3",
"detected_licenses": [
"MIT"
],
"directory_id": "8e223049d07832edca42eeab0e3cbd5b7a440394",
"extension": "py",
"fi... | 3.078125 | stackv2 | from secret import DATABASE
class Password:
normalChars = list(
"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789@#_")
specialChars = list("""~`!@#$%^&*()_-+={[}]|\:;"'<,>.?/""")
row_format = "{:^25}" * (4)
def __init__(self, password, username, site):
self.password =... | 120 | 32.04 | 95 | 17 | 867 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3ed4408cdb8a9007_b491f17d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
47
] | [
48
] | [
15
] | [
60
] | |
2024-11-19T02:31:37.103481+00:00 | 1,576,452,899,000 | 1202a79aa337d574289e2d55deeaff48afbfeb8f | 3 | {
"blob_id": "1202a79aa337d574289e2d55deeaff48afbfeb8f",
"branch_name": "refs/heads/master",
"committer_date": 1576452899000,
"content_id": "0f1a157918e6de220c2c0eaa8472980356133757",
"detected_licenses": [
"MIT"
],
"directory_id": "00f389cc2eeb6ce9b7f75b7fa9c40356a3f75178",
"extension": "py",
"fi... | 3.359375 | stackv2 | """Check the user is allowed to run the code."""
import sqlite3
import hashlib
import os
def check_db(args):
"""Check if the user is registered in the database.
Connect to the sqlite3 database. If the user is registered verify
whether its password is correct adding the salt and computing the
... | 51 | 27.88 | 74 | 17 | 317 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_2cb5a03b8ff78d59_a0d1dddb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
37
] | [
null
] | [
37
] | [
59
] | |
2024-11-19T02:31:50.910826+00:00 | 1,480,636,844,000 | be2cf563859d40a9e497dad5dc5ea119af9f28ad | 2 | {
"blob_id": "be2cf563859d40a9e497dad5dc5ea119af9f28ad",
"branch_name": "refs/heads/master",
"committer_date": 1480636844000,
"content_id": "c788f5e4d02b591b564a43a3d6a976670b1f9d17",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8e289723e71a368ae909dc342596d3f75acfceb2",
"extension": "py"... | 2.359375 | stackv2 | from __future__ import print_function # In python 2.7
import sys
from facebook import get_user_from_cookie, GraphAPI
from flask import g, render_template, redirect, request, session, url_for
import facebook
from app import app, db
from models import User
import sys
import requests
from threading import *
import time
# ... | 225 | 30.26 | 104 | 18 | 1,668 | python | [{"finding_id": "codeql_py/full-ssrf_b7e9f5fa461da433_02a46c07", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
81
] | [
null
] | [
15
] | [
59
] | |
2024-11-19T02:33:00.536797+00:00 | 1,585,762,980,000 | 6ba8697706684cf88a92526268c31dba2d45eec8 | 3 | {
"blob_id": "6ba8697706684cf88a92526268c31dba2d45eec8",
"branch_name": "refs/heads/master",
"committer_date": 1585762980000,
"content_id": "26c47c8d6986868edb17010921f5ed568cb389b6",
"detected_licenses": [
"MIT"
],
"directory_id": "95656ea56e15979f6e9d29d3cca929a07e2db0eb",
"extension": "py",
"fi... | 2.6875 | stackv2 | import re
import requests
def url_videofind(url, ext):
url_fetch = requests.get(url)
url_txt = url_fetch.text
results = re.findall('http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]))+', url_txt)
#List of videos found within page
vide... | 104 | 24.04 | 119 | 12 | 624 | python | [{"finding_id": "codeql_py/overly-large-range_f7d3e02886d276c0_d33523d2", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
8
] | [
null
] | [
61
] | [
64
] | |
2024-11-19T02:33:00.704348+00:00 | 1,432,743,118,000 | 230fe2db6c03f3c13600e42c56c8c2ac6e72f681 | 3 | {
"blob_id": "230fe2db6c03f3c13600e42c56c8c2ac6e72f681",
"branch_name": "refs/heads/master",
"committer_date": 1432743118000,
"content_id": "2af54c9eb59c3fc341e57f980fc27696f7b5a3a2",
"detected_licenses": [
"MIT"
],
"directory_id": "866e83b8f5c88b5441af58fe5dd4e1f594928c48",
"extension": "py",
"fi... | 2.828125 | stackv2 | import os
import requests
import json
from collections import namedtuple
from requests.auth import HTTPDigestAuth
class ConnectionHelper(object):
url = None
user = None
password = None
def __str__(self):
return self.user + ":" + self.password + " " + self.url
def __init__(self, user, pa... | 58 | 31.93 | 83 | 17 | 344 | python | [{"finding_id": "codeql_py/request-without-cert-validation_a4cf76ebd222f45b_12a40a54", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
37,
43,
50
] | [
40,
47,
54
] | [
24,
24,
24
] | [
83,
59,
60
] | |
2024-11-19T02:43:23.546597+00:00 | 1,557,301,554,000 | c2b4b305b1191f876baa9e0676294df9ac0892df | 3 | {
"blob_id": "c2b4b305b1191f876baa9e0676294df9ac0892df",
"branch_name": "refs/heads/master",
"committer_date": 1557301554000,
"content_id": "fec7d1b72f4aec1eef9f9b237d94ba74be99b448",
"detected_licenses": [
"MIT"
],
"directory_id": "c4d3fe12e3e507da540182c489cc8bd8443841f3",
"extension": "py",
"fi... | 2.53125 | stackv2 | import paramiko
import sys, argparse
from argparse import RawTextHelpFormatter
if __name__ == "__main__":
# Exit code for nagios 0 -OK, 1 - Warning, 2 - Critical
exit_code = 0
output_info = ""
# OceanStor failed Health and Running status
failed_health_status = ["Offline", "Pre-fail", "Fault", "--"... | 273 | 38.03 | 153 | 17 | 2,456 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_d444c689df2df9cd_f677df06", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
260
] | [
null
] | [
5
] | [
62
] | |
2024-11-19T02:43:27.612888+00:00 | 1,692,717,414,000 | b23b820e9c53e1772653a88add0daa6eb03a62a1 | 3 | {
"blob_id": "b23b820e9c53e1772653a88add0daa6eb03a62a1",
"branch_name": "refs/heads/master",
"committer_date": 1692717414000,
"content_id": "ee899f66dce83ad77b892d84428b2be3384cf9f2",
"detected_licenses": [
"Unlicense"
],
"directory_id": "e99dee22ce2608aec732f1793ca889d9c53d081f",
"extension": "py",... | 2.875 | stackv2 | #!/usr/bin/env python2
# -*- coding: utf-8 -*-
import hashlib
import sqlite3
import sys
from OpenSSL import SSL
from flask import Flask,request
app = Flask(__name__)
def setup_ssl():
try:
context = SSL.Context(SSL.SSLv23_METHOD)
context.use_privatekey_file("ssl/fakeserver.key")
context.u... | 73 | 23.59 | 85 | 12 | 426 | python | [{"finding_id": "codeql_py/reflective-xss_e50474029d4601f5_adfb81f3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-327",
"CWE-089"
] | [
"py/reflective-xss",
"py/weak-sensitive-data-hashing",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256)... | [
65,
42,
28
] | [
null,
null,
null
] | [
20,
34,
21
] | [
81,
42,
26
] | |
2024-11-19T02:43:32.866462+00:00 | 1,585,994,123,000 | b45193e8c6764f5d972fa023376cb9db144174cb | 3 | {
"blob_id": "b45193e8c6764f5d972fa023376cb9db144174cb",
"branch_name": "refs/heads/master",
"committer_date": 1585994123000,
"content_id": "dfb80ce2501d1578b2d9198a8dc825471afeae41",
"detected_licenses": [
"MIT"
],
"directory_id": "ecd6439997fbfd0c4d30a2a6777f000440d57b60",
"extension": "py",
"fi... | 2.828125 | stackv2 | import os
import logging
import json
import requests
import dotenv
import math
import typing
import functools
def get_my_logger():
"""モジュール用のロガーを作成します。
メインの処理とは別に関係ない。
Returns:
Logger -- モジュール用のロガー。
"""
# ルートロガーを作成します。ロガーはモジュールごとに分けるもの。
logger = logging.getLogger(__name__)
# ルートロガ... | 225 | 25.31 | 119 | 17 | 1,884 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f98830e8321ca0b9_4559142d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
195
] | [
null
] | [
21
] | [
45
] | |
2024-11-19T02:54:52.790573+00:00 | 1,560,263,771,000 | 354566c0fa2c01b2a15d68ad20df759fe1c81429 | 3 | {
"blob_id": "354566c0fa2c01b2a15d68ad20df759fe1c81429",
"branch_name": "refs/heads/master",
"committer_date": 1560263771000,
"content_id": "62bb0c968a0c16c25d3c80c0ce5452e76609765f",
"detected_licenses": [
"MIT"
],
"directory_id": "ababc7badab824835aad1fbac6e179787a0b45c4",
"extension": "py",
"fi... | 2.796875 | stackv2 | import json
import datetime
import configparser
FITBIT_BASE_URL = "https://api.fitbit.com/"
inifile = configparser.ConfigParser()
inifile.read('./config.ini', 'UTF-8')
client_id = inifile.get('fitbit', 'client_id')
client_secret = inifile.get('fitbit', 'client_secret')
access_token = inifile.get('fitbit', 'access_tok... | 62 | 28.42 | 106 | 18 | 492 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_27362b9ddf84c9a9_83e9f0fb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
61
] | [
null
] | [
11
] | [
26
] | |
2024-11-19T02:55:13.789397+00:00 | 1,575,351,337,000 | 274baba14df9343422d372034d174018944cde5a | 3 | {
"blob_id": "274baba14df9343422d372034d174018944cde5a",
"branch_name": "refs/heads/master",
"committer_date": 1575351337000,
"content_id": "9da085218465565f85f9bcbbea207b0a4d504387",
"detected_licenses": [
"MIT"
],
"directory_id": "e089eae5220e0b6514fee7630ff938ad261cd11d",
"extension": "py",
"fi... | 2.546875 | stackv2 | from flask import Flask, jsonify, request
from flask_cors import CORS
import mysql.connector
db = mysql.connector.connect(
host='localhost',
user='root',
passwd='',
database='berita'
)
app = Flask('berita-service')
CORS(app)
@app.route('/getBerita', methods=['GET'])
def index():
cursor = db.cur... | 43 | 27.3 | 125 | 11 | 316 | python | [{"finding_id": "codeql_py/flask-debug_974f549353557f92_d0d6ad74", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-089",
"CWE-089"
] | [
"py/flask-debug",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
43,
28,
39
] | [
null,
null,
null
] | [
null,
20,
20
] | [
31,
72,
25
] | |
2024-11-19T02:55:17.538896+00:00 | 1,364,974,019,000 | 7f12164c454ac79697079cc313c04fbc574ab0b5 | 3 | {
"blob_id": "7f12164c454ac79697079cc313c04fbc574ab0b5",
"branch_name": "refs/heads/master",
"committer_date": 1364974019000,
"content_id": "24ab421a1c9ee9d10670a1335fb95ec472b37e0a",
"detected_licenses": [
"MIT"
],
"directory_id": "2098db9336a6510e8060767b19ad277f3e1542b2",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import json
import yaml
import time
import re
import os
import argparse
from collections import OrderedDict
from flask import Flask, Response, request, render_template
from simmetrica import Simmetrica
parser = argparse.ArgumentParser(description='Start Simmetrica web ... | 95 | 32.93 | 140 | 19 | 762 | python | [{"finding_id": "codeql_py/redos_48f6121f261cf2d5_768de9bf", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '9'.", "remediati... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '9'."
] | [
89
] | [
null
] | [
33
] | [
36
] | |
2024-11-19T02:55:35.347190+00:00 | 1,665,073,299,000 | 961649faa09eac0f532c1881050dfc6180c98f97 | 2 | {
"blob_id": "961649faa09eac0f532c1881050dfc6180c98f97",
"branch_name": "refs/heads/master",
"committer_date": 1665073299000,
"content_id": "23ac525295e307eb4f3bc98df8d714c1ad30e9ec",
"detected_licenses": [
"MIT"
],
"directory_id": "0c3eb786a7e4755acd1348b21f468e2f2c6a5240",
"extension": "py",
"fi... | 2.453125 | stackv2 | """Client API for Camect."""
import asyncio
import base64
import json
import logging
import ssl
import sys
from threading import Thread
import time
from typing import Callable, Dict, List
import urllib3
import requests
import websockets
EMBEDDED_BUNDLE_JS = "js/embedded_bundle.min.js"
_LOGGER = logging.getLogger(__... | 279 | 36.83 | 100 | 21 | 2,454 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b226364eaa4d2b4c_d67e5d44", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 8 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"... | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
113,
121,
133,
141,
156,
185,
205,
226
] | [
114,
123,
135,
142,
158,
187,
207,
228
] | [
16,
16,
16,
16,
16,
16,
16,
16
] | [
95,
35,
27,
95,
27,
27,
29,
27
] | |
2024-11-19T02:55:38.294669+00:00 | 1,631,832,430,000 | 7d32f8902d3bce38e4ddcf98c7b903566955b113 | 4 | {
"blob_id": "7d32f8902d3bce38e4ddcf98c7b903566955b113",
"branch_name": "refs/heads/main",
"committer_date": 1631832430000,
"content_id": "52376b43f206059ce2ba7bad4b3c2cf3717a47c3",
"detected_licenses": [
"MIT"
],
"directory_id": "70197614594b92a40161013d7ff4121d9491760d",
"extension": "py",
"file... | 3.765625 | stackv2 | import getpass
import random
def check_number(hc):
while not(hc in ("1","2","3","4","5","6")) or not(len(hc)==1):
print("...please try again... ")
hc = getpass.getpass("Enter a number from 1 to 6:")
return hc
def main():
try_again = True
while try_again == True:
print("-------... | 158 | 38.89 | 128 | 27 | 1,434 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_acb57a9020794340_4646fcd9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw... | [
100,
112
] | [
null,
null
] | [
19,
19
] | [
31,
31
] | |
2024-11-19T03:10:28.532433+00:00 | 1,606,513,998,000 | 194543c7fb886f59661da90aafbb6ff1c54810f2 | 3 | {
"blob_id": "194543c7fb886f59661da90aafbb6ff1c54810f2",
"branch_name": "refs/heads/main",
"committer_date": 1606513998000,
"content_id": "f935c825e871dcc6561ee93cf1cdc31197b99280",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "414a4bd0ba97d994c8829a5d18315b2c542be200",
"extension": "py",
... | 2.5625 | stackv2 | #!/usr/bin/env python
# coding: utf-8
import os
import sys
import json
import nltk
import random
import logging
import tensorflow as tf
from glob import glob
from tensorflow.keras.utils import Progbar
sys.path.append("bert")
import sentencepiece as spm
import argparse
import re
regex_tokenizer = nltk.RegexpTokenizer... | 128 | 25.89 | 115 | 16 | 1,034 | python | [{"finding_id": "codeql_py/overly-large-range_e29982413bb75804_c442a9e1", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class."
] | [
25,
30
] | [
null,
null
] | [
13,
29
] | [
17,
32
] | |
2024-11-19T03:10:48.947972+00:00 | 1,483,385,309,000 | dfa085ce8469ff7a1c5518d38fafd4beb76c0fc1 | 3 | {
"blob_id": "dfa085ce8469ff7a1c5518d38fafd4beb76c0fc1",
"branch_name": "refs/heads/master",
"committer_date": 1483385309000,
"content_id": "3f26e3160ce2ceafcf3343521d11189751958310",
"detected_licenses": [
"MIT"
],
"directory_id": "5dc07863210c6e3c33216e7cc2531892a27c5ba0",
"extension": "py",
"fi... | 2.9375 | stackv2 | """
A `Sewer` is a pipeline for mutating things.
_.---._
_.-(_o___o_)
)_.'_ _'.
_.-( (_`---'_) )-._
.'_.-'-._`"^"`_.-'-._'.
/` | __`"`__ | `\
| | .'` ^:^ `'. | |
)'-.// | \\.-'(
/ // ... | 252 | 31.07 | 93 | 19 | 1,858 | python | [{"finding_id": "codeql_py/redos_850e1d91eed2f366_5779b8fc", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '{{a' and containing many repetiti... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '{{a' and containing many repetitions of 'a'."
] | [
165
] | [
null
] | [
51
] | [
54
] | |
2024-11-19T03:10:55.363574+00:00 | 1,605,533,294,000 | fda344748e92f11f3e6be65b35fcd8170657da62 | 2 | {
"blob_id": "fda344748e92f11f3e6be65b35fcd8170657da62",
"branch_name": "refs/heads/main",
"committer_date": 1605533294000,
"content_id": "59655f6d6a25c2787f3dd9fd46aef176b61619f5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8e2605b89c06376fa195a1aae6c2d1999ef0f5b5",
"extension": "py",
... | 2.34375 | stackv2 | """
Software License Agreement (Apache 2.0)
Copyright (c) 2020, The MITRE Corporation.
All rights reserved.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
https://www.apache.org/licenses/LICENSE-... | 171 | 35.19 | 101 | 12 | 1,452 | python | [{"finding_id": "codeql_py/bad-tag-filter_86f39acbe5574eb2_6202c362", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match comments containing newlines.", "remediation": "", "location": {"file_pat... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match comments containing newlines."
] | [
31
] | [
null
] | [
28
] | [
45
] | |
2024-11-19T03:21:44.327672+00:00 | 1,565,516,183,000 | d64e9d13b88f09e605c076eda043c6e56e6f2e16 | 2 | {
"blob_id": "d64e9d13b88f09e605c076eda043c6e56e6f2e16",
"branch_name": "refs/heads/master",
"committer_date": 1565516183000,
"content_id": "c3a147227d849a600ae1160174375ccb04423c06",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "131b02d8d78d02af328305d70d22cb6a4bafbd97",
"extension": "py"... | 2.421875 | stackv2 | from django.shortcuts import render
# Create your views here.
from rest_framework.views import APIView
from carts.serializers import CartSerializer,CartSKUSerializer
from django_redis import get_redis_connection
from rest_framework.response import Response
import base64
import pickle
from goods.models import SKU
f... | 210 | 29.52 | 83 | 17 | 1,443 | python | [{"finding_id": "codeql_py/unsafe-deserialization_b92f304d90ac0d0c_e6e6f487", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).\nUnsafe deserialization depen... | 4 | true | [
"CWE-502",
"CWE-502",
"CWE-502",
"CWE-502"
] | [
"py/unsafe-deserialization",
"py/unsafe-deserialization",
"py/unsafe-deserialization",
"py/unsafe-deserialization"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Unsafe deserialization depends on a [user-provided value](1).\nUnsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provided value](1).\nUnsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provided valu... | [
69,
121,
161,
196
] | [
null,
null,
null,
null
] | [
44,
37,
44,
44
] | [
54,
65,
66,
72
] | |
2024-11-19T03:22:12.220913+00:00 | 1,630,413,999,000 | b7e840312c28a7df741c160a422531844d77e8d2 | 2 | {
"blob_id": "b7e840312c28a7df741c160a422531844d77e8d2",
"branch_name": "refs/heads/main",
"committer_date": 1630413999000,
"content_id": "b793b46c1a4776e22f4104e183cd822b1f882f8c",
"detected_licenses": [
"MIT"
],
"directory_id": "1b8c19bca90f1674642f7b35b882868404c06952",
"extension": "py",
"file... | 2.421875 | stackv2 | import os
import sys
from dotenv import load_dotenv
import random
import re
import requests
from flask import Flask, json, redirect, render_template, request, url_for, jsonify, abort
from flask_limiter import Limiter
from flask_limiter.util import get_remote_address
from six import class_types
app = Flask(__name__)
... | 139 | 24.58 | 90 | 19 | 852 | python | [{"finding_id": "codeql_py/regex-injection_c5d8f94f9ef17ffe_dba0d432", "tool_name": "codeql", "rule_id": "py/regex-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This regular expression depends on a [user-provided value](1) and is executed by [re.finditer](2).", "rem... | 1 | true | [
"CWE-730"
] | [
"py/regex-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression depends on a [user-provided value](1) and is executed by [re.finditer](2)."
] | [
93
] | [
null
] | [
34
] | [
43
] | |
2024-11-19T03:44:03.038281+00:00 | 1,524,444,610,000 | f17713b7d8d0b4d7afc94346bd7582cbab1547c8 | 2 | {
"blob_id": "f17713b7d8d0b4d7afc94346bd7582cbab1547c8",
"branch_name": "refs/heads/master",
"committer_date": 1524444610000,
"content_id": "495bac30900e862e28fe64a9b8eb00a348eb634f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0c9a9b22ba406bd7b31364b9f491ffbb1fda469f",
"extension": "py"... | 2.453125 | stackv2 | """Listener module."""
from sys import platform as _platform
from os import environ
from pync import Notifier
from flask import Flask, request
from random import randint
import json
import requests
clearpass_auth_token = "Bearer xxxx"
clearpass_fqdn = "192.0.2.1"
app = Flask(__name__)
# check for ngrok subdomain
ng... | 126 | 33.22 | 148 | 14 | 1,049 | python | [{"finding_id": "codeql_py/flask-debug_904e0e02f6cf3f2f_51e6fca4", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-295",
"CWE-295"
] | [
"py/flask-debug",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
126,
114,
121
] | [
null,
null,
null
] | [
5,
16,
16
] | [
51,
88,
73
] | |
2024-11-19T03:44:11.292963+00:00 | 1,652,447,824,000 | 9406472060ae4608e454c5cfb7e057513d3caee9 | 3 | {
"blob_id": "9406472060ae4608e454c5cfb7e057513d3caee9",
"branch_name": "refs/heads/master",
"committer_date": 1652447824000,
"content_id": "6c93592987a1fb5b70a89d9c4da98fad4d410200",
"detected_licenses": [
"MIT"
],
"directory_id": "6b201605227f11880c1d32c9cad300f6e29ff4ae",
"extension": "py",
"fi... | 3.015625 | stackv2 | from base64 import b64encode
from base64 import b64decode
import random
# Define random seed
randSeed = "SEED"
random.seed(randSeed)
# Define secret message
botToken = "123456789:RaNdOmChArAcTeRs"
chatId = "12345678"
rawSecret = botToken + "$=$" + chatId
# Define alphabet
alnumlist=[]
alphabet=r"ABCDEFGHIJKLMNOPQR... | 196 | 32.19 | 104 | 18 | 1,607 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1e2a54e83e4ed9ae_49539952", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text."
] | [
173
] | [
null
] | [
11
] | [
23
] | |
2024-11-19T02:08:46.369948+00:00 | 1,580,142,905,000 | 28fec2fee403a742e1bd2f91cd49ef1568a25429 | 2 | {
"blob_id": "28fec2fee403a742e1bd2f91cd49ef1568a25429",
"branch_name": "refs/heads/master",
"committer_date": 1580142905000,
"content_id": "19bb84c1d78ceadd5c49bb8988eb87d2800c321d",
"detected_licenses": [
"MIT"
],
"directory_id": "397381608548f96ec4d3a82ce198a627a82cd835",
"extension": "py",
"fi... | 2.375 | stackv2 | import random
import traceback
import discord
from discord.ext import commands
from requests import HTTPError
from poediscordbot.cogs.pob import util
from poediscordbot.cogs.pob.output import pob_output
from poediscordbot.cogs.pob.poe_data import poe_consts
from poediscordbot.cogs.pob.util import pastebin
from poedis... | 102 | 40.19 | 118 | 21 | 906 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_6398ac797b80254b_1050dd03", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [pastebin.com/](1) may be at an arbitrary position in t... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [pastebin.com/](1) may be at an arbitrary position in the sanitized URL."
] | [
45
] | [
null
] | [
21
] | [
55
] | |
2024-11-19T02:08:46.424578+00:00 | 1,455,761,102,000 | 3d29007f86b60ce959be6539b2db81127da35675 | 2 | {
"blob_id": "3d29007f86b60ce959be6539b2db81127da35675",
"branch_name": "refs/heads/master",
"committer_date": 1455761102000,
"content_id": "8270a43cab00e5d2de30535d301f74c97e9652e6",
"detected_licenses": [
"MIT"
],
"directory_id": "971abc1a32d8bcc5076ce02660a280178812cc07",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/env python
#coding=utf-8
from flask import redirect, render_template, url_for, flash, request
from flask.ext.login import current_user, login_user
from . import auth
from .form import LoginForm
from ..model.users import User
@auth.route('/login', methods=['GET', 'POST'])
def login():
form = LoginF... | 23 | 31 | 78 | 16 | 160 | python | [{"finding_id": "codeql_py/url-redirection_1e562dfba58ee3d8_6664ec58", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
21
] | [
null
] | [
29
] | [
78
] | |
2024-11-19T02:08:51.882448+00:00 | 1,630,637,147,000 | 0f5a983c8b30123136fd089df59857a1f05dfc2c | 3 | {
"blob_id": "0f5a983c8b30123136fd089df59857a1f05dfc2c",
"branch_name": "refs/heads/main",
"committer_date": 1630637147000,
"content_id": "14b3e70257408ed3ce29462e2856382916c60868",
"detected_licenses": [
"MIT"
],
"directory_id": "46b08f5fa691f66d33d23f2ade3b8a9ed27524d0",
"extension": "py",
"file... | 3.15625 | stackv2 | """Authentication blueprint routes and view functions.
Routes/view functions:
- login(): Login page for webapp. Authenticates username and password.
- logout(): Logout page for webapp. Closes connection to MySQL server.
"""
# %% Imports
# Standard system imports
# Related third party imports
from flas... | 71 | 37.65 | 79 | 17 | 580 | python | [{"finding_id": "codeql_py/url-redirection_8c3fa4b9d5b1da55_6efc7d81", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
47
] | [
null
] | [
29
] | [
38
] | |
2024-11-19T02:21:22.334760+00:00 | 1,650,476,552,000 | 2d627bf76e61d02126d1db68278b7105162ab469 | 2 | {
"blob_id": "2d627bf76e61d02126d1db68278b7105162ab469",
"branch_name": "refs/heads/master",
"committer_date": 1650476552000,
"content_id": "d89cdb0d3deab9fe2d2ab10cfed436f244d1b329",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f3b4fdddca320ce4628daf522249d719cef715fb",
"extension": "py"... | 2.359375 | stackv2 | import os
from flask import render_template
from flask import request, redirect, url_for, flash
from soundeffectsapp import app
# from sqlalchemy import create_engine
# from sqlalchemy_utils import database_exists, create_database
# import pandas as pd
# import psycopg2
from werkzeug import secure_filename
import s... | 120 | 32.69 | 161 | 17 | 907 | python | [{"finding_id": "codeql_py/url-redirection_3cf1afb0ffcb2c88_4d78262a", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
59,
63
] | [
null,
null
] | [
27,
23
] | [
38,
34
] | |
2024-11-19T02:46:44.293530+00:00 | 1,485,103,059,000 | 359a8a18f4f366f01ba8f1c75bb18e2f99213253 | 2 | {
"blob_id": "359a8a18f4f366f01ba8f1c75bb18e2f99213253",
"branch_name": "refs/heads/master",
"committer_date": 1485103059000,
"content_id": "fee325d0cbb9b0de80e699d14681bb29838672cc",
"detected_licenses": [
"MIT"
],
"directory_id": "f4c51f527564a4300a3dc593ac11ffb5b3cc131d",
"extension": "py",
"fi... | 2.46875 | stackv2 | import os
import time
from boto.ec2.connection import EC2Connection
import settings
class EC2Factory(object):
def __init__(self):
self.conn = EC2Connection(settings.AWS_ACCESS_KEY_ID, settings.AWS_SECRET_ACCESS_KEY)
def create_key_pair(self):
key_pair = self.conn.create_key_pair(settings.EC2... | 71 | 33 | 93 | 14 | 502 | python | [{"finding_id": "codeql_py/overly-permissive-file_0667e2b47a4b2900_6be827f3", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to group writable."
] | [
22
] | [
null
] | [
9
] | [
33
] | |
2024-11-19T02:57:56.564547+00:00 | 1,638,544,848,000 | 0cb26137ffa43498d6697540a39b852aeea5a43d | 3 | {
"blob_id": "0cb26137ffa43498d6697540a39b852aeea5a43d",
"branch_name": "refs/heads/master",
"committer_date": 1638544848000,
"content_id": "c3d8d5469b918422ae2f7c99e3c6c27df2df92a1",
"detected_licenses": [
"MIT"
],
"directory_id": "73124b85b01f3f4903dd70662498622cfb77943e",
"extension": "py",
"fi... | 2.578125 | stackv2 | class ConsoleFormatter:
def __init__(self, args):
self.data_format = args.data_format
def __call__(self, message):
print('''
---------- MESSAGE ----------
Iridium Latitude {}
Iridium Longitude {}
Device Type {}
Transmit Time {}
MOMSN {}
IMEI {}
Serial ... | 31 | 23.94 | 93 | 15 | 163 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eb5d0e72407603af_62e6cc5c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
6
] | [
28
] | [
15
] | [
6
] | |
2024-11-19T02:58:13.057182+00:00 | 1,561,322,198,000 | 7aef9af9801a3a41773eca2177dfdb277fd02683 | 2 | {
"blob_id": "7aef9af9801a3a41773eca2177dfdb277fd02683",
"branch_name": "refs/heads/master",
"committer_date": 1561322198000,
"content_id": "8b0a71c30ad8f11086f3077570176f50f4ae7ff8",
"detected_licenses": [
"MIT"
],
"directory_id": "c72d112d7d4de228df3d3b5f31a55d5bfaf6ce05",
"extension": "py",
"fi... | 2.359375 | stackv2 | import json
import logging
from flask import Flask, request
import stop_to_stop
from lib.logs import init_logging
from lib.model import download_model, predict
app = Flask(__name__)
@app.route('/predictFromMovement', methods=['POST'])
def get_prediction_from_movement():
journey = request.get_json()
route_i... | 40 | 25.95 | 84 | 12 | 244 | python | [{"finding_id": "codeql_py/log-injection_b430ee6237802309_50fc4c23", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
17,
29,
30
] | [
null,
null,
null
] | [
18,
18,
18
] | [
80,
84,
44
] | |
2024-11-19T03:10:08.890412+00:00 | 1,578,104,250,000 | bd9da0e36dc40bc152b3ab41d6f5bee7fa3d6d21 | 2 | {
"blob_id": "bd9da0e36dc40bc152b3ab41d6f5bee7fa3d6d21",
"branch_name": "refs/heads/master",
"committer_date": 1578104250000,
"content_id": "1536054351882d4d0b3840a1caf1c7a1d19ae528",
"detected_licenses": [
"Python-2.0",
"MIT"
],
"directory_id": "05fe2ac32c054867fc72c8d92b3be30530671964",
"exten... | 2.46875 | stackv2 | #!/opt/cloudera/parcels/Anaconda/bin/python
# -*- coding: utf-8 -*-
'''
FILE
‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾
jinja_file.py
DECLARATION
‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾
JINJA(subpath1[, subpath2, ..., dir=dir])
DESCRIPTIO... | 219 | 27.33 | 118 | 19 | 2,069 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e2260f78b6b5073e_fa6c7369", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
114
] | [
null
] | [
20
] | [
74
] | |
2024-11-19T03:10:22.016840+00:00 | 1,565,226,379,000 | bef4328bb249fb40c08156d49b9f3c5ac44eae65 | 3 | {
"blob_id": "bef4328bb249fb40c08156d49b9f3c5ac44eae65",
"branch_name": "refs/heads/master",
"committer_date": 1565226379000,
"content_id": "c59b6ddf2b7751c7ed1b388ed6b893444c80b8b4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "33aad9725fec1926107e798d5312552a8e66348f",
"extension": "py"... | 3.390625 | stackv2 | #!/usr/bin/env python
# -*- coding:utf8 -*-
# by LZN
'''各个类的模块'''
from conf import settings
import pickle
class School:
'''校区与地点'''
def __init__(self,area,site):
self.area=area
self.site=site
self.area_courses=[] # 创建一个空列表存放课程
self.area_teacher=[] # 创建一个空列表存放老师
def se... | 125 | 22.48 | 87 | 15 | 817 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_963cb36d04ad0168_cf97ed3c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priva... | [
73,
98
] | [
80,
106
] | [
15,
15
] | [
75,
87
] | |
2024-11-19T03:22:36.801898+00:00 | 1,610,832,042,000 | c94172a1814a5169c49c8436bfd748ef3dd23a16 | 3 | {
"blob_id": "c94172a1814a5169c49c8436bfd748ef3dd23a16",
"branch_name": "refs/heads/main",
"committer_date": 1610832042000,
"content_id": "7737d6f4cf6013f3b6d2b45c5435dac31c4c22b9",
"detected_licenses": [
"MIT"
],
"directory_id": "1783e397d8586d7e63d913a2f53c71ddd1a1b4a0",
"extension": "py",
"file... | 3.46875 | stackv2 | from re import compile
from typing import List
def get_input(path: str):
input = []
with open(path, "r") as f:
for line in f.readlines():
input.append(line.strip())
return input
def get_parameters(line: str, regex: str) -> dict:
pattern = compile(regex)
parameters = pattern.f... | 50 | 32.9 | 101 | 14 | 433 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f6db582a1b1359c3_6a8d3d00", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
48,
50
] | [
null,
null
] | [
11,
11
] | [
67,
73
] | |
2024-11-19T03:22:37.159740+00:00 | 1,486,926,929,000 | 5a790161d4916b20539c7ea24fedb29761b403b6 | 3 | {
"blob_id": "5a790161d4916b20539c7ea24fedb29761b403b6",
"branch_name": "refs/heads/master",
"committer_date": 1486926929000,
"content_id": "13047a1483feae438ed0627a5d6ee0c3871ff4d5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2a11879816a2cbe8c5f27f668cf114a9f4428a11",
"extension": "py"... | 2.5625 | stackv2 | import tornado.ioloop, tornado.web, tornado.websocket, tornado.template
import logging, uuid, subprocess, pykka
from datetime import datetime
from tornado.escape import json_encode, json_decode
logger = logging.getLogger(__name__)
# container for all current pusher connections
connections = {}
frontend = {}
##
... | 321 | 35.01 | 124 | 19 | 2,235 | python | [{"finding_id": "codeql_py/log-injection_66c9da9afac70837_dd4b7a7c", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
112,
142
] | [
null,
null
] | [
22,
22
] | [
105,
57
] | |
2024-11-19T03:22:42.692736+00:00 | 1,485,137,773,000 | 31955b43218ca21547a9b7a8871be4b5b52c6999 | 3 | {
"blob_id": "31955b43218ca21547a9b7a8871be4b5b52c6999",
"branch_name": "refs/heads/master",
"committer_date": 1485137773000,
"content_id": "b0a41e1cc7accbec7127e9d1b266544739944dae",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a155dcf70be677feca19bc2af8949f0f54e56e40",
"extension": "py"... | 3.078125 | stackv2 | import datetime
import time
import re
import json
class TaxiLocation:
def __init__(self, line):
line = str.strip(line, '\n')
splits = re.split(',', line)
self.id = splits[0]
timestamp = splits[1]
self.timeAsDate = timestamp
self.timestamp = int(time.mktime(datetime.... | 24 | 31.38 | 123 | 17 | 192 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_89750adbb76e74a5_2e4675f6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
20
] | [
null
] | [
15
] | [
120
] | |
2024-11-19T03:22:55.710712+00:00 | 1,693,185,721,000 | 6c02fff1811251f4926392b507388517357d2604 | 2 | {
"blob_id": "6c02fff1811251f4926392b507388517357d2604",
"branch_name": "refs/heads/master",
"committer_date": 1693185721000,
"content_id": "902ea5506c2516ec0e3ff06cb64d5be22c6369f9",
"detected_licenses": [
"MIT"
],
"directory_id": "a4536c3dbca3b232d4657eafad981fdb8d58820e",
"extension": "py",
"fi... | 2.375 | stackv2 | # Copyright 2019 - 2023 by Sergio Valqui. All rights reserved.
# Source Class
# https://
# https://ipam.illinois.edu/wapidoc/objects/network.html
# https://ipam.illinois.edu/wapidoc/objects/range.html
# to add a MAC to a given filter use POST
# macfilteraddress?filter=filter-name&mac=
import requests
from requests.au... | 90 | 39.08 | 96 | 16 | 841 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f6df2c416cadef7a_bc0b08ef", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-295",
"CWE-295"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (p... | [
76,
81,
81,
36,
74
] | [
null,
null,
null,
37,
75
] | [
28,
23,
41,
21,
21
] | [
43,
26,
63,
84,
85
] | |
2024-11-19T01:34:43.752415+00:00 | 1,562,625,304,000 | 262d3533a241785477a2917b2d3245cfb73a84a5 | 2 | {
"blob_id": "262d3533a241785477a2917b2d3245cfb73a84a5",
"branch_name": "refs/heads/master",
"committer_date": 1562625304000,
"content_id": "080be97e578d16d87dc4955319f118c7e490e276",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "ba4d56f4a816d036915ec19a9e75029ee691f3e7",
"extension": "p... | 2.40625 | stackv2 | from __future__ import absolute_import
import six
import ipaddress
import socket
from functools32 import lru_cache
from ssl import wrap_socket
from six.moves.urllib.parse import urlparse
from django.conf import settings
from urllib3.util.connection import allowed_gai_family, _set_socket_options
from sentry.exception... | 138 | 31.69 | 96 | 15 | 1,014 | python | [{"finding_id": "codeql_py/insecure-default-protocol_3b8310f75e3fd217_0457e218", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
137
] | [
null
] | [
16
] | [
33
] | |
2024-11-19T02:07:58.967929+00:00 | 1,632,352,045,000 | 1d55e11e12de539f48d405c44ecfe4ff4a21d18c | 3 | {
"blob_id": "1d55e11e12de539f48d405c44ecfe4ff4a21d18c",
"branch_name": "refs/heads/master",
"committer_date": 1632352045000,
"content_id": "0bd4701196b5a2c08fec476b47728a7725355366",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "b095f6e10524c69c733733f39b99e643055cb476",
"extension": "p... | 2.59375 | stackv2 | from flask import Flask, request
import emoji
app = Flask(__name__)
@app.route('/', methods = ['GET', 'POST'])
def text():
if request.method == 'GET' or request.method == 'POST':
data = request.get_json(force=True)
animal = data.get('animal', -1)
if animal == -1:
return "Bad r... | 28 | 26.14 | 61 | 17 | 202 | python | [{"finding_id": "codeql_py/reflective-xss_e06a35ab37953ecf_f4b3efe2", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
22
] | [
null
] | [
16
] | [
19
] | |
2024-11-19T02:17:21.254561+00:00 | 1,651,820,351,000 | 2f946029a01204a595de072319e224789ce52af4 | 2 | {
"blob_id": "2f946029a01204a595de072319e224789ce52af4",
"branch_name": "refs/heads/master",
"committer_date": 1651820351000,
"content_id": "ac2546ddf9e72883d8d4361730f31b7b88f48b83",
"detected_licenses": [
"MIT"
],
"directory_id": "f45d7fb74cd87b1a764bc9b95cc0c06587fe088f",
"extension": "py",
"fi... | 2.390625 | stackv2 | import urllib.request
from fastapi import FastAPI
from fastapi.responses import HTMLResponse, PlainTextResponse
import json
app = FastAPI()
@app.get('/', response_class=HTMLResponse)
def root():
try:
return open("get_tweet.html","r").read()
except:
return HTMLResponse(content="internal error",... | 21 | 29.1 | 93 | 14 | 147 | python | [{"finding_id": "codeql_py/partial-ssrf_2ffebd5131439817_0fb64ee6", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
19
] | [
null
] | [
10
] | [
81
] | |
2024-11-19T02:17:31.521225+00:00 | 1,619,114,014,000 | d8f923107e52c850b76081943e488397faeb23e1 | 3 | {
"blob_id": "d8f923107e52c850b76081943e488397faeb23e1",
"branch_name": "refs/heads/master",
"committer_date": 1619114014000,
"content_id": "43a3bec9b5cc6fbb9339089a8afb2096261f6a50",
"detected_licenses": [
"MIT"
],
"directory_id": "7edc26a54f4b71085db5758ee15e87dfc822c372",
"extension": "py",
"fi... | 2.921875 | stackv2 | from __future__ import print_function
from future import standard_library
standard_library.install_aliases()
from os.path import exists, join
import requests
from .state import StateBase
class HTTPError(Exception):
def __init__(self, code, reason):
self.code = code
self.reason = reason
def __... | 91 | 31.77 | 86 | 20 | 594 | python | [{"finding_id": "codeql_py/request-without-cert-validation_2ab5f30d9249c5ff_ca41d3db", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
42,
49
] | [
null,
null
] | [
21,
25
] | [
52,
56
] | |
2024-11-19T02:17:38.609201+00:00 | 1,570,042,406,000 | 8d6ef0ebdcf695bf7ad80575c7143ab977cfcbf7 | 3 | {
"blob_id": "8d6ef0ebdcf695bf7ad80575c7143ab977cfcbf7",
"branch_name": "refs/heads/master",
"committer_date": 1570042406000,
"content_id": "1e63c099877d9a5eb388c615c12dfffe10d173f2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5190f6586f4d1c15703a09f661f0a9aad6b1aa8b",
"extension": "py"... | 2.703125 | stackv2 | import abc
import json
import re
import os
import zipfile
import wget
class UnitexPBDictionary(abc.ABC):
'''
Dictionary class to handle Unitex-PB dictionaries from NILC.
'''
@abc.abstractmethod
def __init__(self, mapping=None):
self.root_path = 'dictionary/unitex'
self.root_ur... | 122 | 33.42 | 93 | 22 | 938 | python | [{"finding_id": "codeql_py/overly-large-range_b9d483093b92a335_7c80eee1", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
111
] | [
null
] | [
145
] | [
148
] | |
2024-11-19T02:18:08.398633+00:00 | 1,547,645,965,000 | 364dccdcba75ed0d51ba6020c2f3e5f86f8b16da | 3 | {
"blob_id": "364dccdcba75ed0d51ba6020c2f3e5f86f8b16da",
"branch_name": "refs/heads/master",
"committer_date": 1547645965000,
"content_id": "3ad42b0835d9bd1d6c14d9575133636def565c0b",
"detected_licenses": [
"MIT"
],
"directory_id": "8b76dfe7bed58228ca94323f7573d641cac099ec",
"extension": "py",
"fi... | 2.578125 | stackv2 | # Author: Lucas Roelser <roesler.lucas@gmail.com>
# Modified from serverlesscode.com/post/ssl-expiration-alerts-with-lambda/
import datetime
import fileinput
import logging
import os
import socket
import ssl
import time
logger = logging.getLogger('SSLVerify')
def ssl_expiry_datetime(hostname: str, port: int) -> date... | 28 | 28.04 | 74 | 11 | 191 | python | [{"finding_id": "codeql_py/insecure-protocol_fa27dd2332935f22_756830f7", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)."
] | [
18
] | [
null
] | [
12
] | [
19
] | |
2024-11-19T02:18:09.922427+00:00 | 1,546,640,122,000 | 89c38ba993edfee80fddb904c415c7309ddafdbe | 3 | {
"blob_id": "89c38ba993edfee80fddb904c415c7309ddafdbe",
"branch_name": "refs/heads/master",
"committer_date": 1546640122000,
"content_id": "6d043e9267bb7d93ffacc517e8ea25eb23c2f03e",
"detected_licenses": [
"MIT"
],
"directory_id": "52e1cca9c046cc76b40d5d391f3a037f64eb91bf",
"extension": "py",
"fi... | 2.703125 | stackv2 | from scapy.all import *
import argparse
def get_mac_addr(ip_addr):
resp, _ = sr(ARP(hwdst="ff:ff:ff:ff:ff:ff", pdst=ip_addr), verbose=0)
for s, r in resp:
return r[ARP].hwsrc
return None
def send_arp_packet(gateway_ip, gateway_mac, victim_ip, victim_mac):
print("[.] Packet Sending...")
try... | 36 | 30.58 | 112 | 14 | 303 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fb75998ce9acddbc_13d37ad6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
32,
33
] | [
null,
null
] | [
7,
7
] | [
40,
38
] | |
2024-11-19T02:18:14.336853+00:00 | 1,397,514,667,000 | 496436b12a00ccdb04fc5d3b2a61938786be5928 | 2 | {
"blob_id": "496436b12a00ccdb04fc5d3b2a61938786be5928",
"branch_name": "refs/heads/master",
"committer_date": 1397514667000,
"content_id": "90fff9acff608507378461c65e83d742c769b5ac",
"detected_licenses": [
"MIT"
],
"directory_id": "9a18afdf833686b063260c240a48e5194407b00e",
"extension": "py",
"fi... | 2.34375 | stackv2 | from flask import Flask
from flask import request
from flask import session
from flask import redirect
from flask import render_template
from jinja2 import Template
from datetime import datetime
from flask.ext.sqlalchemy import SQLAlchemy
from flask.ext.script import Manager
from flask.ext.migrate import Migrate, Migra... | 321 | 32.29 | 79 | 16 | 2,340 | python | [{"finding_id": "codeql_py/template-injection_7296f19a62091ab0_c8a08399", "tool_name": "codeql", "rule_id": "py/template-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This template construction depends on a [user-provided value](1).", "remediation": "", "location": ... | 13 | true | [
"CWE-074",
"CWE-074",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/template-injection",
"py/template-injection",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/ji... | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This template construction depends on a [user-provided value](1).",
"This template construction depends on a [user-provided value](1).",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Usi... | [
239,
242,
158,
162,
179,
182,
208,
212,
239,
242,
277,
305,
308
] | [
null,
null,
null,
null,
null,
185,
null,
null,
null,
null,
278,
null,
311
] | [
29,
29,
20,
20,
24,
24,
20,
20,
20,
20,
16,
24,
24
] | [
54,
57,
55,
58,
59,
37,
55,
58,
55,
58,
66,
59,
37
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.