added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T21:22:40.671239+00:00 | 1,603,377,253,000 | 40773463d4da6d7b1d3ca6067111a7d796ad0667 | 4 | {
"blob_id": "40773463d4da6d7b1d3ca6067111a7d796ad0667",
"branch_name": "refs/heads/main",
"committer_date": 1603377253000,
"content_id": "3fd8aa9dd5a5e28ad6031a8a76ffa573f413212e",
"detected_licenses": [
"MIT"
],
"directory_id": "227f2934ce7bf31a40b4437ff782d005a02869aa",
"extension": "py",
"file... | 3.703125 | stackv2 | from student import *
class StudentManager(object):
def __init__(self):
# 存储学员数据的列表
self.student_list = []
def run(self):
"""程序入口方法, 启动程序后执行的方法"""
self.load_student()
while True:
self.show_menu()
menu_num = int(input('请输入你需要的功能序号: '))
... | 139 | 24.17 | 93 | 16 | 927 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8470363e8489662c_99dcc435", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
82,
93,
103
] | [
null,
null,
null
] | [
23,
23,
19
] | [
75,
65,
51
] | |
2024-11-18T21:23:19.828040+00:00 | 1,632,457,139,000 | 5bb7f5d7475e574a9f7d3df4a4b63a398c36c66c | 3 | {
"blob_id": "5bb7f5d7475e574a9f7d3df4a4b63a398c36c66c",
"branch_name": "refs/heads/main",
"committer_date": 1632457139000,
"content_id": "f62161ac0f865bec89a08092e0b6909afa881173",
"detected_licenses": [
"MIT"
],
"directory_id": "602a8bfacbbfefcc7fbf539b44a85963bbfc5642",
"extension": "py",
"file... | 2.578125 | stackv2 | import socket,random,smtplib
from email.message import EmailMessage
class app:
file_name = "database.txt"
def __init__(self,ip,port):
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
s.bind((ip, port))
s.listen(5)
self.conn, self.addr = s.accept()... | 34 | 33.38 | 85 | 17 | 359 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_009113af7fa19c36_0072396d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
21
] | [
null
] | [
12
] | [
58
] | |
2024-11-18T21:51:11.960493+00:00 | 1,632,709,047,000 | 26c39259de039ad3f4b29654dbd9a1df9bb3faf5 | 3 | {
"blob_id": "26c39259de039ad3f4b29654dbd9a1df9bb3faf5",
"branch_name": "refs/heads/master",
"committer_date": 1632709047000,
"content_id": "2133b801814d1d73c8aee3a07bef9e5d2341d81a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ee1a5e24be68962d3163f6c18571769afc291053",
"extension": "py"... | 2.96875 | stackv2 | # copyright (c) 2021 PaddlePaddle Authors. All Rights Reserve.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applica... | 85 | 27.34 | 74 | 13 | 780 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8a9d02658446b40f_e87e3342", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
32,
33
] | [
null,
null
] | [
7,
7
] | [
45,
45
] | |
2024-11-18T21:51:15.224042+00:00 | 1,533,193,300,000 | ed493aa96d555143f089189c9e7bcc0222393a77 | 4 | {
"blob_id": "ed493aa96d555143f089189c9e7bcc0222393a77",
"branch_name": "refs/heads/master",
"committer_date": 1533193300000,
"content_id": "b3c803746a83b774fe8a1c63800502f915553468",
"detected_licenses": [
"MIT"
],
"directory_id": "e0b95cf25559c5438dc302267f2653f5ffd074f6",
"extension": "py",
"fi... | 3.703125 | stackv2 | print('====================通讯录====================')
print('--------------------李金灿--------------------')
print('''
---1:添加联系人---
---2:删除联系人---
---3:修改联系人---
---4:查询联系人---
---5:打印所有人---
---6:退出通讯录---
''')
address_file = '/Users/admin/Desktop/Python/fishc/Address book/str.txt'
def add(name,sex,phone):
file1 = o... | 87 | 23.02 | 71 | 13 | 574 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_40070ffb85ab1885_ef8dadb6", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
19
] | [
null
] | [
17
] | [
60
] | |
2024-11-18T21:51:20.860101+00:00 | 1,691,037,619,000 | 1fd94cf6d79c3c0865b6c7b963e002824f926b10 | 3 | {
"blob_id": "1fd94cf6d79c3c0865b6c7b963e002824f926b10",
"branch_name": "refs/heads/master",
"committer_date": 1691037619000,
"content_id": "6406b349c63a0f6859919077d0447ba8a4f45aa9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7dfc958846a98c9dc90829ace237adb0f4e79057",
"extension": "py"... | 2.859375 | stackv2 | import json
from collections.abc import Mapping
import logging
from pathlib import Path
from reprlib import Repr
import yaml
from jinja2 import (
Environment,
Template,
UndefinedError,
FileSystemLoader,
PackageLoader,
StrictUndefined,
)
from ploomber.exceptions import RenderError, SourceInitia... | 522 | 31.18 | 88 | 18 | 3,499 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_dae3bd7a72b16753_590066da", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
304,
321
] | [
306,
325
] | [
20,
15
] | [
10,
10
] | |
2024-11-18T21:51:31.908409+00:00 | 1,624,459,227,000 | cd64c25292a41d00521556646a254829e1e3d09c | 3 | {
"blob_id": "cd64c25292a41d00521556646a254829e1e3d09c",
"branch_name": "refs/heads/main",
"committer_date": 1624466500000,
"content_id": "d35f68b5c489e470db91790fcd74d3299f2c99ff",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "041dcaf11ab98d0e0cb537e56b6e119ee5e5b864",
"extension": "py"... | 2.515625 | stackv2 | import sys
import pikepdf
from tqdm import tqdm
PDF_FILE_NAME = sys.argv[1]
PASSWORDS_FILE_NAME = "passwords.txt"
passwords = [ line.strip() for line in open(PASSWORDS_FILE_NAME) ]
for password in tqdm(passwords, "HaCkEaNdO o PdF"):
try:
with pikepdf.open(PDF_FILE_NAME, password=password) as pdf:
... | 19 | 26.37 | 67 | 13 | 154 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7abc6cb675f20555_df366988", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
13
] | [
null
] | [
41
] | [
49
] | |
2024-11-18T21:51:46.029353+00:00 | 1,448,756,461,000 | 5e88b122ec130d3fedcecd92045650bb5b23d988 | 3 | {
"blob_id": "5e88b122ec130d3fedcecd92045650bb5b23d988",
"branch_name": "refs/heads/master",
"committer_date": 1448756461000,
"content_id": "c19c76863ce5e13f41dbabebf85bc25d60826120",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1bfc00ccaac4e5815f51030a9546f28bd6191bf9",
"extension": "py"... | 2.703125 | stackv2 | from __future__ import with_statement, print_function
"""Copyright 2013 Justin Hall
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Un... | 315 | 33.07 | 105 | 17 | 2,200 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_9dec4b2441332998_badeb4cd", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
154
] | [
null
] | [
38
] | [
62
] | |
2024-11-18T21:52:04.247470+00:00 | 1,576,082,774,000 | 216a7cb321dcb3f73d897b466f4fd53c974befc4 | 3 | {
"blob_id": "216a7cb321dcb3f73d897b466f4fd53c974befc4",
"branch_name": "refs/heads/master",
"committer_date": 1576082774000,
"content_id": "3aaf2b793e0c834cd71db159479ccfd891c1f78a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2dccfea986a550fbeab588edcd413a544bb9eb02",
"extension": "py"... | 2.734375 | stackv2 | import os
import logging
import shutil
import zipfile
from flask import Blueprint, jsonify, request, send_file
from werkzeug.utils import secure_filename
from service.errors import ApiError
from service.user.user_service import auth
staging_controller = Blueprint('staging', __name__)
staging_dir = os.environ['STAGI... | 453 | 26.65 | 79 | 18 | 2,829 | python | [{"finding_id": "codeql_py/path-injection_f900869864a1b171_98616808", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 10 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-117"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](... | [
23,
78,
81,
175,
177,
178,
230,
375,
375,
413
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
36,
19,
27,
22,
25,
26,
21,
19,
27,
15
] | [
44,
67,
75,
30,
33,
34,
75,
25,
33,
68
] | |
2024-11-18T22:16:21.252609+00:00 | 1,522,890,892,000 | 6f02f97253a122c937fe081cb2a23ad67addc6f3 | 4 | {
"blob_id": "6f02f97253a122c937fe081cb2a23ad67addc6f3",
"branch_name": "refs/heads/master",
"committer_date": 1522890892000,
"content_id": "fcddbf5811a2dd5de41a814b10a94ba621503118",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ccc6db9962655f540da7917ae161fb47a13f57ac",
"extension": "py"... | 4.1875 | stackv2 | # 클래스
# 변수와 그것과 관련된 함수를 하나의 이름으로 정의한 것
# 클래스는 메서드, 속성, 클래스 변수, 인스턴스변수로 구성
# 덫붙여 생성자와 소멸자등의 멤버도 존재
# 클래스 정의
# class 이름 :
# 클래스 변수
# 생성자
# 함수정의(메서드)
# 파이썬에서는 생성자나 메서드 정의시 암시적으로 첫번째 매개변수가 self로 지정되어 있음
# self는 항상 객체 자기 자신을 가리키는 의미로 사용
# 클래스의 멤버변수는 생성자를 통해서 정의
# 파이썬에서는 객체로 생성된 후에도 멤버변수를 추가할 수 있음(비추)
class HelloPy... | 137 | 18.21 | 60 | 13 | 980 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4d824a64c051f4ac_a8f2aedb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
51
] | [
null
] | [
7
] | [
19
] | |
2024-11-18T22:16:32.651512+00:00 | 1,670,016,093,000 | af84201e0ebecc0bff6385b2d2845527ce21e019 | 2 | {
"blob_id": "af84201e0ebecc0bff6385b2d2845527ce21e019",
"branch_name": "refs/heads/master",
"committer_date": 1670019174000,
"content_id": "c0f5ce99ed7d880cf2d9ebbe24673953a5d65780",
"detected_licenses": [
"MIT"
],
"directory_id": "b516f19c1d62ebac2fe47aaff320a09565cb9502",
"extension": "py",
"fi... | 2.5 | stackv2 | #! /usr/bin/env python3
# Name for experiments directory
import sys
import argparse
import os.path
import string
import importlib.resources
import os
class MkPar(object):
def __init__(self):
self._name = 'mkpar'
self._help = 'Create script to run parallel experiments'
def _mk_arg_parser(se... | 90 | 31.1 | 81 | 17 | 580 | python | [{"finding_id": "codeql_py/overly-permissive-file_b3dcc755da14dfda_da140d91", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to group writable."
] | [
79
] | [
null
] | [
9
] | [
34
] | |
2024-11-18T22:27:49.683358+00:00 | 1,624,801,132,000 | fd1f051736386f0e7354168fe4ec83492e063eb2 | 3 | {
"blob_id": "fd1f051736386f0e7354168fe4ec83492e063eb2",
"branch_name": "refs/heads/main",
"committer_date": 1624801132000,
"content_id": "bd51e9848ddab0554309f3d57061a2fc2b65424b",
"detected_licenses": [
"MIT"
],
"directory_id": "dec0797f4282096388906c7eff7bca3a0e67464e",
"extension": "py",
"file... | 2.84375 | stackv2 | '''
File [ src/util/generate_lm.py ]
Author [ Heng-Jui Chang (NTUEE) ]
Synopsis [ Generate text data for masked LM training ]
'''
import argparse
import csv
import pickle
import json
import numpy as np
from tqdm import tqdm
from text_normalization import normalize_sent_with_jieba
from opencc impo... | 111 | 33.11 | 83 | 20 | 931 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_3337923c1ea67653_ed89a730", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
83
] | [
null
] | [
22
] | [
39
] | |
2024-11-18T22:28:02.318411+00:00 | 1,688,924,210,000 | a1f6e65de3e90a47ed06ff58cca8ac0ac7affea4 | 2 | {
"blob_id": "a1f6e65de3e90a47ed06ff58cca8ac0ac7affea4",
"branch_name": "refs/heads/master",
"committer_date": 1688924210000,
"content_id": "ac2212e16e173dbf8a161adf611601db70222181",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3f70d57d2995a9fcd57d46d0ab6f05afdbd35a24",
"extension": "py"... | 2.3125 | stackv2 | # coding=utf-8
import os
import sys
import json
import requests
from flask import Flask, request
from flask import render_template
from flask import send_file
app = Flask(__name__)
@app.route('/', methods=['GET'])
def verify():
# when the endpoint is registered as a webhook, it must echo back
# the 'hub.chal... | 239 | 37.18 | 132 | 24 | 1,951 | python | [{"finding_id": "codeql_py/flask-debug_b82dd4a5ccf1abf3_4705c2b8", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-918"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
239,
20,
133
] | [
null,
null,
null
] | [
5,
16,
9
] | [
24,
50,
26
] | |
2024-11-18T22:28:14.844041+00:00 | 1,615,456,343,000 | 1c001cb55553c8b3c57df4eb72554cfa6fd1e8d5 | 2 | {
"blob_id": "1c001cb55553c8b3c57df4eb72554cfa6fd1e8d5",
"branch_name": "refs/heads/main",
"committer_date": 1615456343000,
"content_id": "d665f45a006e4d317b6460fa2e72c5483a0afefc",
"detected_licenses": [
"MIT"
],
"directory_id": "a7c3c98d4ce0ac21db15dee6245ee5bc90f6ad90",
"extension": "py",
"file... | 2.4375 | stackv2 | import io
from cloudinary.uploader import upload
import torchvision.transforms as transforms
from rest_framework import status
from rest_framework.decorators import api_view
from rest_framework.response import Response
from api import neural_style as ns
@api_view(['GET'])
def index_page(request):
return_data = {... | 77 | 31.82 | 120 | 20 | 525 | python | [{"finding_id": "codeql_py/stack-trace-exposure_8e689e9a3cb5fc41_1cbfb911", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
77
] | [
null
] | [
21
] | [
27
] | |
2024-11-18T22:28:15.935452+00:00 | 1,511,113,350,000 | a6b3eddbb64491a3963c2331e550b33900d44f40 | 3 | {
"blob_id": "a6b3eddbb64491a3963c2331e550b33900d44f40",
"branch_name": "refs/heads/master",
"committer_date": 1511113350000,
"content_id": "dbea0a8bba836c677d79500691adcb9339c08408",
"detected_licenses": [
"MIT"
],
"directory_id": "5ef5fa99c80f0b76f49ac8b9701dce373d0e062b",
"extension": "py",
"fi... | 2.75 | stackv2 | import os
import jinja2
DIR_PATH = os.path.dirname(os.path.realpath(__file__))
TEMPLATE_PATH = os.path.join(DIR_PATH, 'output', 'index.html')
def render(data, verbose=False):
"""
Fill the HTML template with data.
:param str data: The encrypted base64 data to put in the template
:returns: the templ... | 22 | 24.59 | 69 | 16 | 137 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fd3f71f1c63ef91f_428e81b6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
20
] | [
22
] | [
12
] | [
6
] | |
2024-11-18T22:28:17.695061+00:00 | 1,629,379,559,000 | 5309eb2ec943e928f747bc63daf0e85139d07725 | 3 | {
"blob_id": "5309eb2ec943e928f747bc63daf0e85139d07725",
"branch_name": "refs/heads/master",
"committer_date": 1629379559000,
"content_id": "2cad06de58cb923c495b7b02bfcf51051d9cc091",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "267a508bcebc09f7aec8dc500282d680d5183956",
"extension": "py"... | 2.625 | stackv2 | #!/usr/bin/python3
import hashlib
import time
import uuid
import requests
def generateHash(phoneNumber, smsCode, timestamp):
sha = hashlib.sha256()
data = phoneNumber + smsCode + "com.tisc.familyasyst2" + timestamp
sha.update(data.encode("utf-8"))
hashString = sha.hexdigest()
return hashString
if __name__ == "_... | 73 | 25.64 | 100 | 14 | 601 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_07bcd2f2e2266d5a_f105d167", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
48,
69,
73
] | [
null,
null,
null
] | [
9,
9,
8
] | [
24,
24,
30
] | |
2024-11-18T22:44:23.217956+00:00 | 1,606,236,871,000 | cec5f862657c48a9702c702fba1f1de85819ba6a | 2 | {
"blob_id": "cec5f862657c48a9702c702fba1f1de85819ba6a",
"branch_name": "refs/heads/master",
"committer_date": 1606236871000,
"content_id": "eb7c66fa2870eda90428cdbf15748ddbb068aaee",
"detected_licenses": [
"MIT"
],
"directory_id": "198f7caf8775b3272214bd84a788498327bc4d63",
"extension": "py",
"fi... | 2.5 | stackv2 | import re
import urllib
import sys
import socket
import base64
import ssl
from lightbulb.core.utils.common import accept_bool
META = {
'author': 'George Argyros, Ioannis Stais',
'name': 'RawHTTPHandler',
'description': 'Performs membership queries in a browser filter',
'type': 'UTIL',
'options': [
... | 109 | 34.49 | 149 | 17 | 852 | python | [{"finding_id": "codeql_py/insecure-default-protocol_5c0dd6ef75fdd469_4309c089", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
66
] | [
null
] | [
33
] | [
51
] | |
2024-11-18T20:59:39.004836+00:00 | 1,627,760,766,000 | b2ac73ff20465dcc468003641e2dc9bde441db4b | 3 | {
"blob_id": "b2ac73ff20465dcc468003641e2dc9bde441db4b",
"branch_name": "refs/heads/master",
"committer_date": 1627760813000,
"content_id": "7161ca22fe45b6194d11f9497919a06e77b6b66c",
"detected_licenses": [
"MIT"
],
"directory_id": "fc651aeb0bc681e773c16024d6541bfda672dafc",
"extension": "py",
"fi... | 2.5625 | stackv2 | # -*- coding: utf-8 -*-
# hi-rez-API: Smite, Paladins, Realm.
import datetime
import hashlib
import requests
import json
import os
class Err_API(Exception):
err_info_hard = True
def base_err(self, text):
if type(self.err_info_hard) == bool:
if self.err_info_hard:
raise Err... | 277 | 42.66 | 119 | 20 | 2,907 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_5147ba23b92f9c58_1991981e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
44
] | [
null
] | [
33
] | [
62
] | |
2024-11-18T21:00:37.415450+00:00 | 1,515,119,651,000 | 07f37d308736b98d407acf90071beec6b03017c6 | 3 | {
"blob_id": "07f37d308736b98d407acf90071beec6b03017c6",
"branch_name": "refs/heads/master",
"committer_date": 1515120136000,
"content_id": "d73d75f479d1182d2a0a02617433d909c4bbaa87",
"detected_licenses": [
"MIT"
],
"directory_id": "a9c11e10e9388978e3127c52013562c2e6a088a6",
"extension": "py",
"fi... | 2.765625 | stackv2 | import logging
from urlparse import urlparse
import requests
import boto3
from werkzeug.exceptions import ServiceUnavailable
from flask import g
from flask.globals import _app_ctx_stack
log = logging.getLogger(__name__)
def fetch_url(url, error_title, expire=None):
"""
Fetch contents of 'url' and cache the ... | 69 | 31.22 | 111 | 14 | 526 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_66f01f4d834c77d5_222bd184", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [amazonaws.com](1) may be at an arbitrary position in t... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [amazonaws.com](1) may be at an arbitrary position in the sanitized URL."
] | [
48
] | [
null
] | [
8
] | [
30
] | |
2024-11-18T21:00:58.994613+00:00 | 1,693,816,756,000 | 7b5a069deda01f5bda2a8f94408cf9c06610cef9 | 3 | {
"blob_id": "7b5a069deda01f5bda2a8f94408cf9c06610cef9",
"branch_name": "refs/heads/master",
"committer_date": 1693816756000,
"content_id": "84452c075450b0eb21d99e1c8c66308694f66186",
"detected_licenses": [
"MIT"
],
"directory_id": "a9f63a0746de04b87979107995c94ef46d054f5b",
"extension": "py",
"fi... | 2.5625 | stackv2 | #!/usr/bin/env python
import sys
import os
import argparse
import logging
import ast
import re
from glob import glob
from jinja2 import Template
logger = logging.getLogger("api_docs_generator")
HTTP_METHODS = [
"get", "post", "put", "patch", "delete",
"head", "options", "trace"
]
def no_parse(line):
... | 507 | 27.75 | 79 | 14 | 3,245 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_01bb26ecced4453a_96e948cf", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
437
] | [
503
] | [
30
] | [
2
] | |
2024-11-18T21:01:05.261114+00:00 | 1,633,025,659,000 | c39bdaf252933a00843beb94604b53bff1a37231 | 3 | {
"blob_id": "c39bdaf252933a00843beb94604b53bff1a37231",
"branch_name": "refs/heads/master",
"committer_date": 1633025659000,
"content_id": "2acb17ec53db463ce7a137bd8aac418e998c50c9",
"detected_licenses": [
"MIT"
],
"directory_id": "6ecb39e83cc80193b123a8fafec6cb0525e35445",
"extension": "py",
"fi... | 2.515625 | stackv2 | import argparse
import os
import logging.config
import google.cloud.logging
from google.cloud.logging.handlers import CloudLoggingHandler
from .discord_bot_client import DiscordBotClient
from .dictionary_api import OwlBotDictionaryAPI, UnofficialGoogleAPI, MerriamWebsterCollegiateAPI, RapidWordsAPI, MerriamWebsterMedic... | 143 | 39.09 | 177 | 17 | 1,226 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3c07fa3773ff37b8_cc93c4f3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
129
] | [
null
] | [
23
] | [
133
] | |
2024-11-18T21:01:20.561905+00:00 | 1,601,777,623,000 | be6c28ebe2e449f0e5eb57f3f98741ddcf6be446 | 3 | {
"blob_id": "be6c28ebe2e449f0e5eb57f3f98741ddcf6be446",
"branch_name": "refs/heads/main",
"committer_date": 1601777623000,
"content_id": "c245a76d14db5d1c6a50d6e38faa90e18c2695e5",
"detected_licenses": [
"MIT"
],
"directory_id": "6de714e88093d098d18734288565d2a0673c0242",
"extension": "py",
"file... | 2.671875 | stackv2 | #!/usr/bin/python3
from flask import Flask, request, render_template, url_for, send_file
import os, json
app = Flask(__name__)
APP_ROOT = os.path.dirname(os.path.abspath(__file__))
@app.route("/")
def main():
return render_template("index.html", text="Hello, World!")
@app.route("/upload", methods=["POST"])
def ... | 55 | 25.71 | 95 | 14 | 347 | python | [{"finding_id": "codeql_py/path-injection_147c9942c1c3c15f_5acc7969", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
36,
52
] | [
null,
null
] | [
17,
22
] | [
28,
30
] | |
2024-11-18T21:51:13.941108+00:00 | 1,636,523,631,000 | 903874f696a9890627140b52eaf44f0a653311da | 3 | {
"blob_id": "903874f696a9890627140b52eaf44f0a653311da",
"branch_name": "refs/heads/main",
"committer_date": 1636523631000,
"content_id": "16e1237bc4481e00efbde04842e749d7cea7a96a",
"detected_licenses": [
"MIT"
],
"directory_id": "16de39d854f5a1c99207e03713b44efe00eb99f6",
"extension": "py",
"file... | 3.484375 | stackv2 | from LaoCode import lao_decode, lao_encode
from LaoPlus import lao_to_plus, plus_to_lao
import haversine as hs
print("===================== Test lao_to_latlon and reverse =================")
while True:
lao_string = str(input("Enter a Lao code to convert into Lat/Lon, or 'q' to quit: "))
if lao_string == 'q': ... | 89 | 43.7 | 111 | 17 | 1,072 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_44547677dbf45bed_3f10c811", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
88,
89
] | [
null,
null
] | [
11,
11
] | [
62,
73
] | |
2024-11-18T21:51:20.056257+00:00 | 1,693,599,816,000 | 652e4a3d1fa139d4c650f315442361eb931d9cfa | 3 | {
"blob_id": "652e4a3d1fa139d4c650f315442361eb931d9cfa",
"branch_name": "refs/heads/main",
"committer_date": 1693599816000,
"content_id": "7c23313910efe1213ef2ec7c219e0e1b46727b81",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "41ddc89de25a8fc0dcbabbe6bc2772254e991a2b",
"extension": "py"... | 2.59375 | stackv2 | import os
import re
import logging
import random
import shutil
from jinja2 import Template
from tethys_cli.cli_colors import write_pretty_output, FG_RED, FG_YELLOW, FG_WHITE
from tethys_apps.base.app_base import TethysAppBase, TethysExtensionBase
# Constants
APP_PREFIX = TethysAppBase.package_namespace
EXTENSION_PREF... | 448 | 32.03 | 115 | 22 | 3,126 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9d928b49d3b04d44_892cf8ca", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
438
] | [
null
] | [
32
] | [
51
] | |
2024-11-18T21:51:37.076075+00:00 | 1,680,190,653,000 | 337fd1f409431da54109ed868d57e22c2fcfd1ff | 2 | {
"blob_id": "337fd1f409431da54109ed868d57e22c2fcfd1ff",
"branch_name": "refs/heads/master",
"committer_date": 1680190653000,
"content_id": "2982fcf6909f7901f95ccca12900905020d426c2",
"detected_licenses": [
"MIT"
],
"directory_id": "0d54a4227a095c4d88a0f0c4d6a221c8814c6d96",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import argparse
import sys
import logging
from flask import Flask, request
import requests
from subsonic_api_proxy import __version__
_logger = logging.getLogger(__name__)
def parse_args(args):
"""Parse command line parameters
Args:
args ([str]): command... | 109 | 23.81 | 76 | 14 | 619 | python | [{"finding_id": "codeql_py/reflective-xss_879c8f68b0bb2621_9c01bc38", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-918"
] | [
"py/reflective-xss",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
109,
106
] | [
null,
107
] | [
16,
16
] | [
68,
68
] | |
2024-11-18T22:00:17.536774+00:00 | 1,556,292,037,000 | 65a2d5c0ce7efaac642e402e43db3df9dae29f1f | 2 | {
"blob_id": "65a2d5c0ce7efaac642e402e43db3df9dae29f1f",
"branch_name": "refs/heads/master",
"committer_date": 1556292037000,
"content_id": "c34d275c9977cd44c7e85acb61fd8e34e2928d3b",
"detected_licenses": [
"MIT"
],
"directory_id": "1b00a464a66ee2cf586df2022a5f7289ee487790",
"extension": "py",
"fi... | 2.484375 | stackv2 | import os
from flask import Flask, render_template, request
from flask import send_from_directory
from keras.models import load_model
from keras.preprocessing import image
import numpy as np
import cv2
import math
from keras.preprocessing import image
import tensorflow as tf
from sklearn.feature_extraction import image... | 108 | 23.5 | 105 | 13 | 687 | python | [{"finding_id": "codeql_py/flask-debug_e1bdab02ee580e60_8ee5630d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
107,
90
] | [
null,
null
] | [
5,
19
] | [
24,
28
] | |
2024-11-18T22:00:23.168986+00:00 | 1,477,172,804,000 | 313e150b99f73e099a02e7cb3f43ea5e02f640eb | 2 | {
"blob_id": "313e150b99f73e099a02e7cb3f43ea5e02f640eb",
"branch_name": "refs/heads/master",
"committer_date": 1477172804000,
"content_id": "feac73a2f92693885fcf8190c6207dbaed3eb820",
"detected_licenses": [
"MIT"
],
"directory_id": "9ab64dabfd1ea60cb3729c3fa0ac4c19e73715eb",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/env python3
from jinja2 import Environment, PackageLoader, FileSystemLoader
from jinja2.exceptions import UndefinedError
from markdown import markdown
from datetime import datetime
import yaml
import argparse
import traceback
def markdown_filter(value, *args, **kwargs):
return markdown(value, *args, *... | 54 | 27.48 | 75 | 15 | 330 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3880d75837d22ee9_f1ae68f9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25
] | [
null
] | [
15
] | [
56
] | |
2024-11-18T22:00:50.259473+00:00 | 1,430,729,423,000 | 650d3dd74f23cbfdf37c9e59c5db50ff2f80823d | 3 | {
"blob_id": "650d3dd74f23cbfdf37c9e59c5db50ff2f80823d",
"branch_name": "refs/heads/master",
"committer_date": 1430729423000,
"content_id": "5e3d65f941af92c12157cefbe7753a0e369e5da6",
"detected_licenses": [
"MIT"
],
"directory_id": "d880d4734b0fd788bb80b84d85d032547b675918",
"extension": "py",
"fi... | 2.671875 | stackv2 | '''
curl -d definition=a+leg+shirt http://localhost:8000/pants
curl http://localhost:8000/pants
'''
import tornado.httpserver
import tornado.ioloop
import tornado.options
import tornado.web
import pymongo
from tornado.options import define,options
define("port",default=8000,help="run on the given port",type=int)
c... | 51 | 25.65 | 65 | 14 | 353 | python | [{"finding_id": "codeql_py/reflective-xss_06033f0e879c6806_0a23c8ee", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2)."
] | [
44
] | [
null
] | [
14
] | [
22
] | |
2024-11-18T22:01:08.139163+00:00 | 1,538,159,341,000 | e150e998e5879246969d6bb60a699de1688678c8 | 3 | {
"blob_id": "e150e998e5879246969d6bb60a699de1688678c8",
"branch_name": "refs/heads/master",
"committer_date": 1538159341000,
"content_id": "7358e76077b64bbba6a773adae0fa27e41b38abe",
"detected_licenses": [
"MIT"
],
"directory_id": "a95536ffebffff4f095ea93d0c4da784157901ac",
"extension": "py",
"fi... | 3.328125 | stackv2 | import re
import feelyng.utils.logging as l
import nltk
logger = l.get_logger(__name__)
def lower_case(s):
"""Transforms an input string into its lower case version.
Args:
s (str): input string
Returns:
Lower case of 's'.
"""
return s.lower()
def valid_char(s):
"""Valid... | 70 | 15.46 | 62 | 12 | 263 | python | [{"finding_id": "codeql_py/overly-large-range_891a1ba0f0b7d1d5_7ea1f9fc", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
34
] | [
null
] | [
25
] | [
28
] | |
2024-11-18T22:01:09.184859+00:00 | 1,521,509,385,000 | 706017777006aab661902409cea6078b37633702 | 3 | {
"blob_id": "706017777006aab661902409cea6078b37633702",
"branch_name": "refs/heads/master",
"committer_date": 1521509385000,
"content_id": "a0cddbf418c3bf3815861838a7517634b9e65b5d",
"detected_licenses": [
"MIT"
],
"directory_id": "46c6c3022cc3365b2ce171bb498325066f603482",
"extension": "py",
"fi... | 2.5625 | stackv2 | import re
import datetime
import discord
from src.btcapi import BTCClient
from src.utils import load_text_commands
class Commands(object):
'''
Class containing static methods to handle messages the bot receives.
'''
def __init__(self, client):
self.client = client
self.commands = {
'convert': {'function... | 116 | 36.12 | 118 | 21 | 1,110 | python | [{"finding_id": "codeql_py/overly-large-range_72dc2b9ad7c61cfc_44c9c9ed", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
30,
30
] | [
null,
null
] | [
22,
32
] | [
25,
35
] | |
2024-11-18T22:15:10.866469+00:00 | 1,676,139,610,000 | 2d9384d20f6d1d58d1b2a4c12e2b9c427fc465b1 | 3 | {
"blob_id": "2d9384d20f6d1d58d1b2a4c12e2b9c427fc465b1",
"branch_name": "refs/heads/master",
"committer_date": 1676139610000,
"content_id": "524c85c761967f92e185a55814074a6000f75531",
"detected_licenses": [
"MIT"
],
"directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9",
"extension": "py",
"fi... | 2.75 | stackv2 | #!/usr/bin/python3
#coding: utf-8
# Download video from tvple.com
import re
import requests
import bs4
def download_file(url, filename, session=requests):
r = session.get(url, stream=True)
with open(filename, 'wb') as f:
for chunk in r.iter_content(chunk_size=1024):
if chunk:
... | 66 | 26.14 | 71 | 13 | 454 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_7a9d13082730d4b9_1c981867", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'tvple.com/v1/player/meta', so it mi... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'tvple.com/v1/player/meta', so it might match more hosts than expected."
] | [
27
] | [
null
] | [
28
] | [
70
] | |
2024-11-18T22:25:57.584722+00:00 | 1,631,660,151,000 | d21f40eba57c70591788be011019bfbb59c357e7 | 3 | {
"blob_id": "d21f40eba57c70591788be011019bfbb59c357e7",
"branch_name": "refs/heads/main",
"committer_date": 1631660151000,
"content_id": "70e8a4f9b58e7739b8681713aaedaa47e78c2d10",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "2675528c11e38326dc60fcb9a0feeac66f9643d5",
"extension": "py",
"... | 3.109375 | stackv2 | #! /usr/bin/python3
from astral import LocationInfo
import datetime
from astral.sun import sun
# location from termux-location
city = LocationInfo("Belize City", "BZ", "America/Belize",17.5149, -88.2229)
print((
f"Information for {city.name}/{city.region}\n"
f"Timezone: {city.timezone}\n"
f"Latitude: {city... | 33 | 23.21 | 76 | 13 | 298 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fee17d85b3b1e0ec_910f2cac", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
9
] | [
11
] | [
5
] | [
74
] | |
2024-11-18T22:26:08.831148+00:00 | 1,553,267,044,000 | 64dd4fbe5400c9422ab94d68efc55b41c67058b8 | 2 | {
"blob_id": "64dd4fbe5400c9422ab94d68efc55b41c67058b8",
"branch_name": "refs/heads/master",
"committer_date": 1553805426000,
"content_id": "cb0a0f082ee4762a0ce19dfd8b8a4f82f22e077f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5890d7a32dcacb41001cee0c9beaa81011f2d490",
"extension": "py"... | 2.3125 | stackv2 | from __future__ import print_function
import argparse
import os
import json
import requests
import re
import sys
from collections import namedtuple
from parallelm.components import ConnectableComponent
from parallelm.common import model_connector_constants
from parallelm.mlops.models.model import ModelFormat
from par... | 147 | 27.48 | 104 | 13 | 894 | python | [{"finding_id": "codeql_py/request-without-cert-validation_57cd7a092185d641_0963e85c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
75,
86
] | [
null,
null
] | [
9,
9
] | [
63,
62
] | |
2024-11-18T20:39:40.255887+00:00 | 1,613,825,636,000 | b9dfcdac0f215e3c2d75b85eedad045646b934df | 3 | {
"blob_id": "b9dfcdac0f215e3c2d75b85eedad045646b934df",
"branch_name": "refs/heads/main",
"committer_date": 1613825636000,
"content_id": "aa1de288283cfaca538b9e76d175d38b01f2b9fd",
"detected_licenses": [
"MIT"
],
"directory_id": "58c96e78d69407c346f8ce03f753df78d9652f7c",
"extension": "py",
"file... | 3 | stackv2 | import string
from requests import Session
s = Session()
s.post("http://10.10.10.195/postlogin", data={"username": "guest", "password": "guest"})
def inject(condition):
payload = "'),((SELECT CASE WHEN %s THEN 1 ELSE ZEROBLOB(1000000000) END))--" % condition
assert len(payload) <= 140
assert all(x not in ... | 34 | 33.68 | 95 | 16 | 352 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e42e25fbd52f8c94_b1063649", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
34
] | [
null
] | [
7
] | [
34
] | |
2024-11-18T20:39:46.677211+00:00 | 1,689,879,196,000 | aed9aa296abd2a3059b90c300fbaf40fb04d8a3e | 2 | {
"blob_id": "aed9aa296abd2a3059b90c300fbaf40fb04d8a3e",
"branch_name": "refs/heads/main",
"committer_date": 1689879196000,
"content_id": "2499ded625100b56c2620c48442d698da962c9fc",
"detected_licenses": [
"BSD-2-Clause",
"BSD-3-Clause"
],
"directory_id": "061ed9ee920b935de7d96067d140e538cb4afd0c",... | 2.359375 | stackv2 | import os
import re
import time
import json
import stat
import email
try: # python 2
from Queue import Queue
except ImportError: # python 3
from queue import Queue
import struct
import socket
import logging
import binascii
import base64
import datetime
import mimetypes
import functools
import threading
impor... | 387 | 35.73 | 104 | 19 | 3,191 | python | [{"finding_id": "codeql_py/url-redirection_f754286d76455234_3aaabe8d", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a ... | 9 | true | [
"CWE-601",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/url-redirection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](2).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).",
"This path depends on a [user-provided value](1).\nThis path depends on a [u... | [
105,
100,
108,
110,
114,
122,
155,
159,
173
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
31,
26,
31,
31,
31,
26,
26,
26,
27
] | [
54,
33,
38,
38,
38,
33,
79,
55,
104
] | |
2024-11-18T21:08:08.140912+00:00 | 1,543,820,411,000 | 6182463aea0845024942d137a04da6555b9498c7 | 3 | {
"blob_id": "6182463aea0845024942d137a04da6555b9498c7",
"branch_name": "refs/heads/master",
"committer_date": 1543820411000,
"content_id": "882e770934883d87cf3368d9807107257093565b",
"detected_licenses": [
"MIT"
],
"directory_id": "99453718c534ede635ac0d9d9f795f63df7f94bf",
"extension": "py",
"fi... | 2.875 | stackv2 | import os
import sys
import smtplib
import pyAesCrypt
import random
import string
userdetails =[]
def key_generator(size=6, chars=string.ascii_uppercase + string.digits):
return ''.join(random.choice(chars) for _ in range(size))
def registration():
print("welome to registration")
loop = 'true'
while(... | 68 | 34.5 | 102 | 20 | 490 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_38a7a16576afbecc_79b53d14", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
67
] | [
null
] | [
11
] | [
22
] | |
2024-11-18T21:08:10.710913+00:00 | 1,617,820,651,000 | 27f63e108019d1c9dbc0180e72256c84ee6b46d4 | 2 | {
"blob_id": "27f63e108019d1c9dbc0180e72256c84ee6b46d4",
"branch_name": "refs/heads/main",
"committer_date": 1617820651000,
"content_id": "1ca08e6f80c29d0d3d8add4b2c409c4f4dac027c",
"detected_licenses": [
"MIT"
],
"directory_id": "536b97c7aa9252c314bd41aa5e3799edf3e5019a",
"extension": "py",
"file... | 2.40625 | stackv2 | import os
import base64
import locale
from datetime import datetime
from flask import Flask
from flask import render_template
from flask import request, jsonify, make_response
locale.setlocale(locale.LC_TIME, 'ca_ES.ISO8859-15')
app = Flask(__name__)
plates = list()
os.makedirs('detections', exist_ok=True)
@app.rou... | 47 | 22.66 | 62 | 13 | 301 | python | [{"finding_id": "codeql_py/flask-debug_f206a31360e94a19_33017c96", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
47,
33
] | [
null,
null
] | [
5,
15
] | [
45,
23
] | |
2024-11-18T21:31:29.099945+00:00 | 1,594,871,103,000 | 5e06d48ba351beac5f889a78f17bb01935b664d2 | 3 | {
"blob_id": "5e06d48ba351beac5f889a78f17bb01935b664d2",
"branch_name": "refs/heads/master",
"committer_date": 1594871103000,
"content_id": "1ededee31cfce9ccfc3c010674c0da0dc0b12a50",
"detected_licenses": [
"MIT"
],
"directory_id": "969c9d3ef1eda05a3bb6e7039a2f7e6d39744009",
"extension": "py",
"fi... | 2.71875 | stackv2 | import random
import json
import logging
from flask import Flask, request
app = Flask(__name__)
logging.basicConfig(level=logging.DEBUG)
sessionStorage = {}
@app.route("/", methods=['POST'])
def main():
logging.info('Request: %r', request.json)
response = {
"version": request.json['version'],
... | 105 | 40.25 | 113 | 14 | 1,313 | python | [{"finding_id": "codeql_py/reflective-xss_f5d7d2e14e7afdf8_280e8b39", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-117",
"CWE-117"
] | [
"py/reflective-xss",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
23,
13,
22
] | [
null,
null,
null
] | [
12,
33,
34
] | [
62,
45,
42
] | |
2024-11-18T21:31:32.795074+00:00 | 1,571,818,798,000 | ee25836acc9c328f81fc47674d91995e0c9bac1f | 2 | {
"blob_id": "ee25836acc9c328f81fc47674d91995e0c9bac1f",
"branch_name": "refs/heads/master",
"committer_date": 1571818798000,
"content_id": "afcd66456a15a8c22969614a4b8ebbd080e4acc3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e28d3c6d241c2b6b6cfdcf5f1034ce8ceae94e6a",
"extension": "py"... | 2.3125 | stackv2 | #!/usr/bin/env python3
import grp
import logging
import numbers
import os
import pickle
import pwd # TODO: move the dependent function elsewhere
import queue
import select
import threading
import traceback
INPUTFD = 4
OUTPUTFD = 5
LOGFD = 6
response_queue = queue.Queue()
use_globals = globals()
class stream_read... | 247 | 27.37 | 98 | 17 | 1,621 | python | [{"finding_id": "codeql_py/overly-permissive-file_ffcad4fc8d399ced_2694a93f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to group readable.", "remediation": "", "location": {... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in open sets file to group readable."
] | [
53
] | [
55
] | [
19
] | [
32
] | |
2024-11-18T21:31:59.619535+00:00 | 1,605,983,410,000 | 17a7ea431d4c67af0729b8d88b80f2f0f8c85d1c | 2 | {
"blob_id": "17a7ea431d4c67af0729b8d88b80f2f0f8c85d1c",
"branch_name": "refs/heads/master",
"committer_date": 1605983410000,
"content_id": "dcc8f5a9bb50ba991dfa9e8d89b468b55ccf0638",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "89208352bbeae16beea544a15fa0fd29c7f95369",
"extension": "py"... | 2.484375 | stackv2 | from flask import Flask, request, redirect, session
import flask as f
import json
import uuid
import os
import review_db as db
import hashlib as h
app = Flask(__name__)
app.secret_key = "any random string"
def hash_pwd(pwd):
md5 = h.md5()
md5.update(pwd.encode('utf-8'))
return md5.digest().hex()
def sa... | 131 | 26.05 | 110 | 13 | 825 | python | [{"finding_id": "codeql_py/flask-debug_477b22ee41d79a73_2f6665b7", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-327"
] | [
"py/flask-debug",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)]... | [
131,
15
] | [
null,
null
] | [
5,
16
] | [
53,
35
] | |
2024-11-18T21:32:11.276554+00:00 | 1,549,002,406,000 | e0a6d8a0833920011cc737b405cdaac9ea90e7b0 | 3 | {
"blob_id": "e0a6d8a0833920011cc737b405cdaac9ea90e7b0",
"branch_name": "refs/heads/master",
"committer_date": 1549002406000,
"content_id": "af3b9dd6ab0e775e1507d098e52cf93fa2b04b81",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "0f8f69f1e03fc328b218a0a00cc2b2f929a6d2f8",
"extension": "p... | 2.640625 | stackv2 | """This REST service allows real-time curation and belief updates for
a corpus of INDRA Statements."""
import sys
import pickle
import logging
import argparse
from flask import Flask, request, jsonify, abort, Response
from indra.belief import wm_scorer, BeliefEngine
from indra.statements import stmts_from_json_file
l... | 128 | 35.54 | 86 | 21 | 1,068 | python | [{"finding_id": "codeql_py/reflective-xss_94ba586f198c5c7a_4b265e5a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-117"
] | [
"py/reflective-xss",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
47,
59
] | [
null,
null
] | [
24,
28
] | [
68,
61
] | |
2024-11-18T21:32:19.273775+00:00 | 1,553,638,211,000 | 0cee2b3d48108ae5010bad8d6791163911fd42d9 | 3 | {
"blob_id": "0cee2b3d48108ae5010bad8d6791163911fd42d9",
"branch_name": "refs/heads/master",
"committer_date": 1553638211000,
"content_id": "1ff0d344ad7c0b56d40c9592b1ae3322e58f9154",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "714cfba0ac34f8ebef290984393bdc2e8824caa6",
"extension": "p... | 2.546875 | stackv2 | from six.moves import urllib
import tarfile
import os
DOWNLOAD_DIR='http://portal.nersc.gov/project/desi/users/kburleigh/legacyzpts'
def fetch_targz(targz_url, outdir):
"""downloads targz_url file to outdir, then untars it
Args:
targz_url: like 'http://www.google.com/path/to/data.tar.gz'
outd... | 31 | 29.42 | 78 | 12 | 260 | python | [{"finding_id": "codeql_py/tarslip_afce70fa5fa67c56_ec50cb6b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
26
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T21:32:20.093795+00:00 | 1,691,154,790,000 | 332bb9fea2d696670f17cb46aefba2bbe843bda9 | 2 | {
"blob_id": "332bb9fea2d696670f17cb46aefba2bbe843bda9",
"branch_name": "refs/heads/master",
"committer_date": 1691154790000,
"content_id": "78781b05b8ddcff8adddf0254f41259b71f188b9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4491549f0b1bbf5397ae0b56192605a7abcb61b0",
"extension": "py"... | 2.328125 | stackv2 | # import re
from flask import Flask, render_template, request, url_for, redirect, session, send_from_directory, make_response
from json import dumps
from db.db import seed_db
from db.users import get_user_by_id, get_user, get_user_by_username, create_user, get_customers
from db.comments import get_comments, create_co... | 153 | 30.66 | 113 | 19 | 1,067 | python | [{"finding_id": "codeql_py/reflective-xss_beac79a2c2faed51_6ac141e0", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
98,
103
] | [
null,
null
] | [
16,
16
] | [
68,
50
] | |
2024-11-18T21:32:20.995625+00:00 | 1,552,854,851,000 | 26fedc9419de6cba008c57fb906d7e6168e3756b | 3 | {
"blob_id": "26fedc9419de6cba008c57fb906d7e6168e3756b",
"branch_name": "refs/heads/master",
"committer_date": 1552854851000,
"content_id": "49d01ff1b78c66ca593ac31fb8e8ee8d7135cfdf",
"detected_licenses": [
"MIT"
],
"directory_id": "876d574998e61444397ca7cb7d944093b7f15332",
"extension": "py",
"fi... | 2.921875 | stackv2 | import base64
import binascii
from Crypto.Cipher import AES
from collections import defaultdict
def hex_to_base64(msg):
msg = bytearray.fromhex(msg)
encoded = base64.b64encode(msg)
return encoded.decode('utf-8')
def xor_hex_strings(str1, str2):
str1 = bytearray.fromhex(str1)
str2 = bytearray.fromhex(str2)
deco... | 207 | 23.55 | 74 | 16 | 1,662 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_d584df873924b17e_981a2afc", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
180
] | [
null
] | [
12
] | [
28
] | |
2024-11-18T21:32:23.172388+00:00 | 1,557,768,528,000 | dd1fc7ff535ba2d36c384404c2e9ee14255b738f | 2 | {
"blob_id": "dd1fc7ff535ba2d36c384404c2e9ee14255b738f",
"branch_name": "refs/heads/master",
"committer_date": 1557768528000,
"content_id": "5b1c5e6464cd83947f77c124bc7a9d9012658981",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "54d0e2a465fff88b93b4fbca3029d15d9f97ea9b",
"extension": "py"... | 2.5 | stackv2 | import cherrypy
from hashlib import sha256
from base64 import b64encode
from os import urandom
from time import time_ns
from pymongo.database import Database
from api.helpers import Snowflake
from api.base import Base
# This class is used for registering a user.
@cherrypy.expose
class Register(Base):
def __init_... | 41 | 33.44 | 75 | 20 | 342 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_dce760ed9798c0a6_ba317e48", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
23
] | [
null
] | [
34
] | [
62
] | |
2024-11-18T21:32:26.481938+00:00 | 1,441,779,163,000 | 076cb2f9df5eb9a6e2a3138c2e23ec9cb3dc4c1f | 2 | {
"blob_id": "076cb2f9df5eb9a6e2a3138c2e23ec9cb3dc4c1f",
"branch_name": "refs/heads/master",
"committer_date": 1441779163000,
"content_id": "b5514fed25fa4e3d9f07da00d696112496f7744e",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "a98021b3877e4f87bc4b7f7fa168636f6c037fb4",
"extension": "p... | 2.453125 | stackv2 | from twisted.web.server import Site
from twisted.web.resource import Resource
from twisted.web.static import File
from twisted.internet import reactor
from twisted.web.resource import NoResource
from twisted.web import server, resource, static
import subprocess, os
import cgi
from calendar import calendar
from itertoo... | 170 | 34.28 | 160 | 21 | 1,548 | python | [{"finding_id": "codeql_py/reflective-xss_d22afb9ca64085b6_74ae5547", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
55
] | [
null
] | [
12
] | [
90
] | |
2024-11-18T21:33:01.259972+00:00 | 1,597,365,475,000 | 044d60aa004fa6e3251fd3ec0b95a6982cab307e | 3 | {
"blob_id": "044d60aa004fa6e3251fd3ec0b95a6982cab307e",
"branch_name": "refs/heads/master",
"committer_date": 1597365475000,
"content_id": "cbda9f58612f2ce8193a2572d28b6fae0bf75dfc",
"detected_licenses": [
"MIT"
],
"directory_id": "57ef20f1450c09c024b536b14bf9068408cd125b",
"extension": "py",
"fi... | 2.84375 | stackv2 | from itsdangerous import URLSafeTimedSerializer as utsr, SignatureExpired, BadSignature
import base64
import re
class Token:
def __init__(self,secret_key):
self.secret_key = secret_key
self.salt = base64.encodebytes(self.secret_key.encode('utf8')).decode('utf8')
def generate_validate_token(self... | 34 | 30.29 | 87 | 15 | 297 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6bf9bcee6ed38f31_8f31f0c8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
30
] | [
null
] | [
11
] | [
21
] | |
2024-11-18T21:33:03.125189+00:00 | 1,524,470,519,000 | b493a5f038c6a2e0460b9115726f2d619c5c1d99 | 2 | {
"blob_id": "b493a5f038c6a2e0460b9115726f2d619c5c1d99",
"branch_name": "refs/heads/master",
"committer_date": 1524470519000,
"content_id": "d8bf700ab8b4a2773ff2c7e986b944802194d4e4",
"detected_licenses": [
"MIT"
],
"directory_id": "6e557ce904d26575fc825c3256e7d5afbc663967",
"extension": "py",
"fi... | 2.375 | stackv2 | from flask import Flask, render_template, request, abort
from utils.downloader import download_img,download_thumbnail
import sys
from evaluate import evaluate, mobilenet, nasnet
import os
import json
app = Flask(__name__)
fn = "temp/flask_test.jpg"
model = mobilenet()
model._make_predict_function()
#model2 = nasnet()
... | 50 | 25.76 | 117 | 15 | 349 | python | [{"finding_id": "codeql_py/stack-trace-exposure_2b2f572476454edf_4c574b1c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
34,
50
] | [
null,
null
] | [
20,
5
] | [
50,
24
] | |
2024-11-18T21:33:08.155482+00:00 | 1,566,868,758,000 | f9fd5893285edc1beaf3ef2da905d04a542a33fd | 3 | {
"blob_id": "f9fd5893285edc1beaf3ef2da905d04a542a33fd",
"branch_name": "refs/heads/master",
"committer_date": 1566868758000,
"content_id": "4e91f3bafd9983bb9f95d92fb959b5ba8c770a94",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7cfc3e68a9d08f154f653656453366e2117563eb",
"extension": "py"... | 2.78125 | stackv2 | ##
## Generate and manipulate RSA keypair
##
import os
import socket
import posixpath
import rsa
class KeyPair:
def __init__(self, name=socket.gethostname(), path=None):
self.KEYSIZE = 1024
self.state = False
self.name = name
if not self.load_keys(name, path):
self.... | 64 | 29.14 | 66 | 18 | 471 | python | [{"finding_id": "codeql_py/weak-crypto-key_3121fc0cab317a24_ce77b322", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
37
] | [
null
] | [
34
] | [
59
] | |
2024-11-18T21:49:29.077387+00:00 | 1,625,927,981,000 | 09231389ccb181716cd0c2a4449a3b9c6cf96414 | 3 | {
"blob_id": "09231389ccb181716cd0c2a4449a3b9c6cf96414",
"branch_name": "refs/heads/main",
"committer_date": 1625927981000,
"content_id": "bb3df549a64eee7554475585f5ed6bf4fad99d76",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "6b2f845c8a8f817d790f0023a54ccf736cf49802",
"extension": "py",
"... | 2.515625 | stackv2 | import jinja2
import pathlib
from yaml import load, Loader
import markdown
import requests
import gnupg
from datetime import datetime,timezone
identities = pathlib.Path("identities")
with (identities / "conf.yaml").open() as f:
conf = load(f, Loader=Loader)
def getsign(message):
gpg = gnupg.GPG()
sign =... | 69 | 24.25 | 110 | 16 | 453 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ded0f19aa0f6096d_6c0b483e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
52
] | [
null
] | [
17
] | [
42
] | |
2024-11-18T22:42:09.560851+00:00 | 1,603,591,433,000 | d4d2fbd5621b19a6246e96de373e00db7ac45d53 | 3 | {
"blob_id": "d4d2fbd5621b19a6246e96de373e00db7ac45d53",
"branch_name": "refs/heads/master",
"committer_date": 1603591433000,
"content_id": "7c67a2e601dbcda22f85cbe1af74b8eace392715",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "0af90fd332037d85547446fa5c0a4769ba8e987f",
"extension": "p... | 2.625 | stackv2 | import click
import jinja2
import os
import stat
import myhacks as myh
file_template = """
#!/usr/bin/env python
'''No docstring has been added yet.'''
import click
import os
import myhacks as myh
@click.command()
@click.argument('parameter', required=False)
def run_{{ execname }}(parameter):
\'\'\'{{ docstri... | 61 | 18.64 | 81 | 12 | 326 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2c3d9b6d1522a79f_3f2520a1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
39
] | [
null
] | [
16
] | [
46
] | |
2024-11-18T20:53:43.711799+00:00 | 1,599,711,965,000 | 6368de79a4dac83fb68d06ea2c171d9e946f0ff4 | 3 | {
"blob_id": "6368de79a4dac83fb68d06ea2c171d9e946f0ff4",
"branch_name": "refs/heads/master",
"committer_date": 1599711965000,
"content_id": "f7afb1df4dc8682c54d3708fff34533b6c3286db",
"detected_licenses": [
"MIT"
],
"directory_id": "71f0d61c636c3c17def0cc357c1500c31886b52b",
"extension": "py",
"fi... | 2.6875 | stackv2 | from fumblr.keys import IMGUR_SECRET, IMGUR_ID
from imgurpython import ImgurClient, helpers
import os
import base64
API_URL = 'https://api.imgur.com/3/'
def get_client():
"""
Get an API client for Imgur
Returns:
Imgur client if it is available
"""
try:
return ImgurClient(IMGUR_ID... | 142 | 19.65 | 83 | 13 | 733 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2e76f80a852b6429_812dd291", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
19
] | [
null
] | [
15
] | [
83
] | |
2024-11-18T21:10:33.561290+00:00 | 1,515,119,651,000 | cc925997ca08a8c66efe5e3300fd52a115ad7bad | 2 | {
"blob_id": "cc925997ca08a8c66efe5e3300fd52a115ad7bad",
"branch_name": "refs/heads/master",
"committer_date": 1515120136000,
"content_id": "be1678b573a6545dd82c7aff3670258709435d5c",
"detected_licenses": [
"MIT"
],
"directory_id": "a9c11e10e9388978e3127c52013562c2e6a088a6",
"extension": "py",
"fi... | 2.34375 | stackv2 |
import logging
import httplib
import requests
from werkzeug.exceptions import Unauthorized
from flask import request
from flask_restful import abort
from drift.auth import get_provider_config
from drift.core.extensions.schemachecker import check_schema
log = logging.getLogger(__name__)
# Oculus provider details s... | 83 | 29.53 | 128 | 15 | 531 | python | [{"finding_id": "codeql_py/partial-ssrf_8e9011f4164c998f_8227c331", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 2 | true | [
"CWE-918",
"CWE-117"
] | [
"py/partial-ssrf",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
68,
74
] | [
null,
null
] | [
15,
92
] | [
73,
102
] | |
2024-11-18T21:10:49.071247+00:00 | 1,396,547,956,000 | ab4012eb4f7aecfc6c6df84423a77ec996737360 | 3 | {
"blob_id": "ab4012eb4f7aecfc6c6df84423a77ec996737360",
"branch_name": "refs/heads/master",
"committer_date": 1396547983000,
"content_id": "f097eea0d6a20b7c74361b74bfd3206b5235b328",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3932c2f0412042c8c1d66705d290de93d82191be",
"extension": "py"... | 2.53125 | stackv2 | from copy import deepcopy
from datetime import datetime
from hashlib import sha1
import json
import os
import subprocess
LOCK_FILE = ".kap10.db.lock"
class LockError(RuntimeError):
pass
class Database(object):
def __init__(self, filename):
self.filename = filename
self.update()
self.console = None
... | 93 | 26.13 | 127 | 17 | 613 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_086cd9982a09fed7_d17715eb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
26
] | [
null
] | [
14
] | [
22
] | |
2024-11-18T21:47:18.922346+00:00 | 1,625,176,603,000 | c6a1b851660cb74507d73efaba99883b04fa9c0c | 2 | {
"blob_id": "c6a1b851660cb74507d73efaba99883b04fa9c0c",
"branch_name": "refs/heads/main",
"committer_date": 1625176603000,
"content_id": "44d68c65b7dfb5ade20b3dc8a9e3f406faa0270a",
"detected_licenses": [
"Unlicense"
],
"directory_id": "544320c3df282d33c065c1507cfd1e5ac76f3165",
"extension": "py",
... | 2.40625 | stackv2 | import os
import toml
import requests
import shutil
from jinja2 import Environment, FileSystemLoader, StrictUndefined
from datetime import datetime
from rcssmin import cssmin
REDIRECTS_PATH = "redirects.toml"
TEMPLATE_FOLDER_PATH = "./template"
TEMPLATE_HTML = "index.j2"
TEMPLATE_CONF = "redirects.j2"
UNIA_CSS = "un... | 87 | 25.91 | 84 | 15 | 580 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_89c4ad381424ea27_46ac8e46", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
44,
59
] | [
47,
62
] | [
11,
11
] | [
6,
6
] | |
2024-11-18T22:29:00.651163+00:00 | 1,637,477,487,000 | 0935a15bad7ca1c8f8a2c7c9adb55e8b65799112 | 3 | {
"blob_id": "0935a15bad7ca1c8f8a2c7c9adb55e8b65799112",
"branch_name": "refs/heads/main",
"committer_date": 1637477487000,
"content_id": "46b50acfd96c23269075a3d8218da477964118ef",
"detected_licenses": [
"MIT"
],
"directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b",
"extension": "py",
"file... | 2.859375 | stackv2 | #!/usr/bin/python3
import json
import Crypto.Cipher.AES as aes
import Crypto.Random as rand
from binascii import *
import struct
import string
import sys
def debug_print(err):
sys.stderr.write(err)
from RARsecrets import secrets_server
def validate(value, check, minimum=None, maximum=None):
valid_types = ["... | 222 | 38.66 | 178 | 21 | 2,352 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ec156dd0c6a7e132_a076cd93", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (secret)](5) a... | [
193
] | [
null
] | [
15
] | [
28
] | |
2024-11-18T22:29:04.028523+00:00 | 1,622,006,809,000 | bc188b57cb461f012224edfcac32beddf5f12d82 | 3 | {
"blob_id": "bc188b57cb461f012224edfcac32beddf5f12d82",
"branch_name": "refs/heads/main",
"committer_date": 1622006809000,
"content_id": "92901c457049bcfa0b75ddeac529f93305a824b8",
"detected_licenses": [
"MIT"
],
"directory_id": "487a89c6f1c36836a22ae1c4745c942b67244854",
"extension": "py",
"file... | 3.078125 | stackv2 | # -*- coding: utf-8 -*-
import argparse
import re
import cloudscraper
from bs4 import BeautifulSoup
def parse_books(url: str, source: str) -> str:
"""
Parse the list of titles from a URL.
"""
scraper = cloudscraper.CloudScraper()
data = scraper.get(url).text
soup = BeautifulSoup(data, 'html.p... | 107 | 29.14 | 109 | 18 | 813 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_06d053b1d7a8ca60_02d0457c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://www.amazon](1) may be at an arbitrary position... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [https://www.amazon](1) may be at an arbitrary position in the sanitized URL."
] | [
69
] | [
null
] | [
37
] | [
78
] | |
2024-11-18T22:29:19.994555+00:00 | 1,536,163,191,000 | e37b3ff72208823403bfde8bd5b624c5ee05f842 | 3 | {
"blob_id": "e37b3ff72208823403bfde8bd5b624c5ee05f842",
"branch_name": "refs/heads/master",
"committer_date": 1536163191000,
"content_id": "754e41b7308101242f9445265f4dfdec03f42097",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "65c00da42d4e347a3540e6d7815066615858c434",
"extension": "py"... | 2.609375 | stackv2 | from pykwalifire.core import Core as yaml_validate
from pykwalifire.errors import SchemaError, SchemaConflict
import re
import requests
import yaml
import sys
import contextlib
import requests
CFF_CORE_SCHEMA_URL = ("https://raw.githubusercontent.com/citation-file-format"
"/schema/{0}/CFF-Core/... | 216 | 29.49 | 114 | 19 | 1,446 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b40281331bc7edc2_124708df", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://github.com](1) may be at an arbitrary position... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [https://github.com](1) may be at an arbitrary position in the sanitized URL."
] | [
67
] | [
null
] | [
12
] | [
53
] | |
2024-11-18T22:29:21.164073+00:00 | 1,611,843,605,000 | af42b42758260da28eff012f1ebb2fe1696f7ffe | 2 | {
"blob_id": "af42b42758260da28eff012f1ebb2fe1696f7ffe",
"branch_name": "refs/heads/master",
"committer_date": 1611843605000,
"content_id": "42580767cdce9b61242bc96a2749e8983548f17d",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "ecd75525b29ee54d6b5cde41da4f7e0f5dc3b2f8",
"extension": "p... | 2.34375 | stackv2 | import re
import logging
from functools import wraps
# flask inports
from flask import abort, request
from flask_login import current_user, AnonymousUserMixin
from werkzeug.local import LocalProxy
# own modules
from app import app
from app.models.user_models import User
from app.controllers import user_controller, p... | 192 | 29.71 | 120 | 20 | 1,247 | python | [{"finding_id": "codeql_py/polynomial-redos_f66d43ec20078ff8_228e7537", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma... | 1 | true | [
"CWE-1333"
] | [
"py/polynomial-redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'."
] | [
21
] | [
null
] | [
31
] | [
43
] | |
2024-11-18T22:29:33.616498+00:00 | 1,466,330,936,000 | c0e5074b89563cdf2198217e5d9080b67b405be8 | 3 | {
"blob_id": "c0e5074b89563cdf2198217e5d9080b67b405be8",
"branch_name": "refs/heads/master",
"committer_date": 1466330936000,
"content_id": "5b9102c826e08f7d5c6b91f0f28486cde40fd626",
"detected_licenses": [
"MIT"
],
"directory_id": "b3c287e7bdbea3906a3f0454ea9489484ee03930",
"extension": "py",
"fi... | 2.671875 | stackv2 | #!/usr/bin/env python
import sys
import socket
import select
import ssl
import argparse
from cgi import parse_qs
from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer
class ProxyRequestHandler(BaseHTTPRequestHandler):
sockets = {}
BUFFER = 1024*50
SOCKET_TIMEOUT = 50
def _get_connection_id(self):
retu... | 134 | 26.51 | 129 | 19 | 1,011 | python | [{"finding_id": "codeql_py/insecure-default-protocol_5a67a69e45a6b361_c81fa1e0", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
130
] | [
null
] | [
18
] | [
116
] | |
2024-11-18T22:29:40.759262+00:00 | 1,609,431,810,000 | a63ed903d6ef52e03a5c707396b1d9529ad182ef | 3 | {
"blob_id": "a63ed903d6ef52e03a5c707396b1d9529ad182ef",
"branch_name": "refs/heads/main",
"committer_date": 1609431810000,
"content_id": "92b867081c35bb8305c42d020e6fcad7f01f785c",
"detected_licenses": [
"MIT"
],
"directory_id": "e25866922e6d6b417b6d919aa23e1b817dc22bb9",
"extension": "py",
"file... | 3.171875 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
# https://docs.python.org/3/library/hashlib.html
# https://raw.githubusercontent.com/danielmiessler/SecLists/master/Passwords/Common-Credentials/10-million-password-list-top-10000.txt
# ministry: 3e98ecfa6a4c765c5522f897a4a8de23
# amigos: c2b592488a765722513420108c466524
... | 53 | 28.08 | 160 | 16 | 493 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bfdf0b6b40a617f6_45ab7761", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
19
] | [
null
] | [
9
] | [
160
] | |
2024-11-18T22:29:46.590531+00:00 | 1,615,561,868,000 | 7d12ab6ac5f249540c74b087628c96a37e80f8b4 | 3 | {
"blob_id": "7d12ab6ac5f249540c74b087628c96a37e80f8b4",
"branch_name": "refs/heads/master",
"committer_date": 1615561868000,
"content_id": "c7150ea7d6481c3c891df88e9ce9f34cb33cb6a1",
"detected_licenses": [
"MIT"
],
"directory_id": "87ebd5bd04fbc7981adbc768dc9a72023a747264",
"extension": "py",
"fi... | 2.765625 | stackv2 | from encryption import password_decrypt
from getpass import getpass
from argparse import ArgumentParser
from nfilepicker import select_file, select_folder
import sqlite3
import os
import hashlib
import sys
import datetime
import os.path
import base64
def decrypt_db():
values = get_data()
all_done = True
p... | 114 | 30.96 | 112 | 16 | 890 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_c9538a8c0b49a135_41b74d6d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
25
] | [
null
] | [
28
] | [
31
] | |
2024-11-18T22:40:37.001907+00:00 | 1,532,142,375,000 | 73ac9438958d2800fff63c4333e4bceb2498904c | 2 | {
"blob_id": "73ac9438958d2800fff63c4333e4bceb2498904c",
"branch_name": "refs/heads/master",
"committer_date": 1532142375000,
"content_id": "9aecca25ec13ff9c9429250376ae07b45bfdebb6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "afe04cd22c2a839668dd0f29c314cc4b35bc7345",
"extension": "py"... | 2.40625 | stackv2 | # coding: utf-8
import hashlib
import time
import urllib2
# 请替换appkey和secret
import requests
def useproxy(url,headers,postdata=None,post=False):
appkey = ""
secret = "c978952ede1661bd5342b34ca0bf561e"
paramMap = {
"app_key": appkey,
"timestamp": time.strftime("%Y-%m-%d %H:%M:%S") # 如果你的程序在... | 43 | 29.33 | 98 | 17 | 411 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_0fa3109966587698_2bb3a6c5", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
21
] | [
null
] | [
24
] | [
29
] | |
2024-11-18T22:54:20.816053+00:00 | 1,693,477,536,000 | 74dacaff0e469216d556cdcd136958b73ac1640f | 2 | {
"blob_id": "74dacaff0e469216d556cdcd136958b73ac1640f",
"branch_name": "refs/heads/master",
"committer_date": 1693477536000,
"content_id": "cecdc3b9b7686d0d04d73f62c46874dee36badb7",
"detected_licenses": [
"MIT"
],
"directory_id": "c9500ad778b8521aaa85cb7fe3239989efaa4799",
"extension": "py",
"fi... | 2.328125 | stackv2 | import komand
from .schema import DemoteInput, DemoteOutput
# Custom imports below
import requests
class Demote(komand.Action):
def __init__(self):
super(self.__class__, self).__init__(
name="demote",
description="Demote admin to ordinary user",
input=DemoteInput(),
... | 45 | 34.78 | 109 | 17 | 326 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e822b95d8e181401_0c008179", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
22,
39
] | [
27,
41
] | [
24,
24
] | [
14,
14
] | |
2024-11-18T22:54:33.078547+00:00 | 1,612,969,713,000 | 1fc6d8c92cd2bc109de2e9f7bb26b9eb46088499 | 3 | {
"blob_id": "1fc6d8c92cd2bc109de2e9f7bb26b9eb46088499",
"branch_name": "refs/heads/main",
"committer_date": 1612969713000,
"content_id": "9e0c5e236d2f655d48578e6f9baac4cb9074fbed",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6eb56f2e3f14f2373be07fe95b1c6fedf1e2d49f",
"extension": "py",
... | 2.546875 | stackv2 | import random
from django.http import HttpResponse, JsonResponse
from django.shortcuts import render
# Create your views here.
from django.utils.decorators import method_decorator
from django.views import View
from .models import UserProfile
import json
import hashlib
import jwt
import time
from django.conf import s... | 184 | 30.18 | 73 | 20 | 1,515 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1c64ae38aab082b2_5e5714ea", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
91
] | [
null
] | [
20
] | [
39
] | |
2024-11-18T22:54:34.655345+00:00 | 1,555,027,198,000 | 4cbdf93e87e6f478c391879c1e68ec1760af4326 | 2 | {
"blob_id": "4cbdf93e87e6f478c391879c1e68ec1760af4326",
"branch_name": "refs/heads/master",
"committer_date": 1555027198000,
"content_id": "a1470aef3fd73a78470df1c2937d123de7886f3e",
"detected_licenses": [
"MIT"
],
"directory_id": "f3d757f421497e19f2de0d3be21b9ae381511577",
"extension": "py",
"fi... | 2.34375 | stackv2 | import hashlib
import random
from django.core.exceptions import ObjectDoesNotExist
from django.db import models
from django.utils import timezone
from django.contrib.sites.models import Site
from . import sms
from .signals import phone_confirmed
from .utils import digits_only
class PhoneNumberManager(models.Manage... | 79 | 29.38 | 78 | 18 | 453 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_99f0e0760e282f31_6863aa72", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (private)](1) is used in a hashing algorithm (SHA1) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (private)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
59
] | [
null
] | [
13
] | [
62
] | |
2024-11-18T20:55:10.734803+00:00 | 1,532,456,766,000 | 0fadbd647f644330ba9ffce925d08263fb70eee8 | 3 | {
"blob_id": "0fadbd647f644330ba9ffce925d08263fb70eee8",
"branch_name": "refs/heads/master",
"committer_date": 1532456766000,
"content_id": "9ec548d0926ac39d9e44e920a437e42ac7fdc18f",
"detected_licenses": [
"MIT"
],
"directory_id": "0d8f787bd03f47a7472943d2ddad5a75dc9e599b",
"extension": "py",
"fi... | 2.703125 | stackv2 | from paramiko import SSHClient
from scp import SCPClient
from subprocess import CalledProcessError
import logging
import os
import paramiko
import subprocess
import sys
class Resource:
"""
Represents a Virtual Machine object that can execute commands. This class
is used to encapsulate all the complexities... | 206 | 39.37 | 142 | 18 | 1,839 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_326ab38161c72d20_7973ae61", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
46
] | [
null
] | [
9
] | [
69
] | |
2024-11-18T20:55:12.480340+00:00 | 1,539,681,324,000 | 507f5711a22b39c721a4392aba9d76a0d653e6bc | 2 | {
"blob_id": "507f5711a22b39c721a4392aba9d76a0d653e6bc",
"branch_name": "refs/heads/master",
"committer_date": 1539681324000,
"content_id": "039b53b57f2403bdb78ce211204f441a32df62d4",
"detected_licenses": [
"Unlicense"
],
"directory_id": "b13a58ea41c7c0828140af92f0fab655ab45def2",
"extension": "py",... | 2.359375 | stackv2 | from flask import render_template, url_for, request, redirect, flash, abort
from flask_login import login_required, login_user, logout_user, current_user
from thermos import app, db, login_manager
from thermos.forms import BookmarkForm, LoginForm, SignupForm
from thermos.models import User, Bookmark, Tag
@login_ma... | 119 | 30.08 | 86 | 17 | 862 | python | [{"finding_id": "codeql_py/url-redirection_8ca0a9343ce2357e_15b10e67", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
80
] | [
null
] | [
20
] | [
86
] | |
2024-11-18T21:07:34.433008+00:00 | 1,606,690,123,000 | 275440dc8e382ca8e593505c82b030d640b2e396 | 3 | {
"blob_id": "275440dc8e382ca8e593505c82b030d640b2e396",
"branch_name": "refs/heads/main",
"committer_date": 1606690123000,
"content_id": "0a64e609be8d1f98da958cb1794d40b48cc16685",
"detected_licenses": [
"MIT"
],
"directory_id": "d97c0cc0af8705f1f7f51ba4cfcdc7719176d122",
"extension": "py",
"file... | 3.078125 | stackv2 | import hashlib
from aocd import data as door_id
password1 = ''
password2 = [None]*8
password2_found = False
index = 0
indicies = set()
while not password2_found:
door_hash = hashlib.md5(f'{door_id}{index}'.encode()).hexdigest()
if door_hash[:5] == '0'*5:
if len(password1) != 8:
password... | 29 | 21.93 | 76 | 14 | 195 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7cf7e839cfa62f0f_fc33cecf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
28,
29
] | [
null,
null
] | [
18,
18
] | [
27,
36
] | |
2024-11-18T21:33:08.234192+00:00 | 1,632,925,811,000 | 5e6af0ba3548e2b59969f2142d5a9becb331ba9a | 3 | {
"blob_id": "5e6af0ba3548e2b59969f2142d5a9becb331ba9a",
"branch_name": "refs/heads/main",
"committer_date": 1632925811000,
"content_id": "fcb4545e3e064960578a331eb070459872f2e62b",
"detected_licenses": [
"MIT"
],
"directory_id": "f1661c65e801a845242a9b5977db490f06f14ed0",
"extension": "py",
"file... | 2.515625 | stackv2 | # -*- coding: utf-8 -*-
import sys
import os.path
import json
import getpass
import argparse
import requests
from dotenv import dotenv_values
__author__ = 'Victor Knell'
__copyright__ = 'Copyright 2021, Palo Alto Networks'
__license__ = 'MIT'
__version__ = '0.1.0'
__maintainer__ = 'Victor Knell'
__email__ = 'vknell@... | 263 | 31.08 | 165 | 15 | 1,884 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c739ba994fac30a0_f73a8772", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (secret)](5)... | [
219,
226
] | [
null,
null
] | [
19,
19
] | [
40,
41
] | |
2024-11-18T21:33:15.857615+00:00 | 1,590,502,991,000 | 0212b403eb75a02e08e207f572ca9a9d6c054bae | 3 | {
"blob_id": "0212b403eb75a02e08e207f572ca9a9d6c054bae",
"branch_name": "refs/heads/master",
"committer_date": 1590502991000,
"content_id": "b6feb0ee6f73821afd3462d84fa888f77b7b7cc1",
"detected_licenses": [
"MIT"
],
"directory_id": "be65a78519d09ee6f8623fa4b5e7670615ffc6c2",
"extension": "py",
"fi... | 2.890625 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Tue May 19 10:31:29 2020
@author: Vincent
"""
# =============================================================================
# Récupération du csv avec plages de salaire
# Ajout de 3 colonnes avec salaire min / max / moyen mensuel -- en cours
# =================================... | 100 | 33.05 | 94 | 18 | 861 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_012983015ac77622_87f9f485", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
79
] | [
null
] | [
15
] | [
20
] | |
2024-11-18T21:33:16.824963+00:00 | 1,604,679,997,000 | e013498c2aa2d6513b6920566a0b4247fb3278ff | 3 | {
"blob_id": "e013498c2aa2d6513b6920566a0b4247fb3278ff",
"branch_name": "refs/heads/master",
"committer_date": 1604679997000,
"content_id": "ac9f97757c9bd4b3be219eed3661674de06cf9e6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7aebdd6af3c1b39766de9211973a223a56298cfe",
"extension": "py"... | 2.59375 | stackv2 | import random
import math
import config
import wavelink
import re
import time
import asyncio
from youtube_title_parse import get_artist_title
from modules import format_time, database
from .spotify_link import SpotifyLink
db = database.Connection()
class Song(wavelink.Track):
def __init__(self, song, song_type=N... | 340 | 33.79 | 138 | 20 | 2,562 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_17c09bc466b1d5eb_3af9762e", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://open.spotify.com](1) may be at an arbitrary po... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [https://open.spotify.com](1) may be at an arbitrary position in the sanitized URL.",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
225,
268
] | [
null,
null
] | [
16,
45
] | [
51,
48
] | |
2024-11-18T21:33:32.607937+00:00 | 1,579,532,845,000 | d28660cc294560600bacd42435a11a0e2ec2dfb3 | 3 | {
"blob_id": "d28660cc294560600bacd42435a11a0e2ec2dfb3",
"branch_name": "refs/heads/master",
"committer_date": 1579532845000,
"content_id": "6df8a985bf6a2b5d3e98bf191cdb7953360b3571",
"detected_licenses": [
"MIT"
],
"directory_id": "e2ca1989dfb79a6f71182767b57e6fe5bc8997ae",
"extension": "py",
"fi... | 2.65625 | stackv2 | #!/usr/bin/env python3
from cgi import parse_header, parse_multipart
from html import escape
from http.server import BaseHTTPRequestHandler, HTTPServer
from subprocess import PIPE, Popen
from urllib.parse import parse_qs
INDEX_HTML = """<html>
<head><title>CppFormatter</title></head>
<body>
<textarea name="code" for... | 77 | 30.25 | 83 | 16 | 612 | python | [{"finding_id": "codeql_py/command-line-injection_73cbb7ff85a282e2_cd603c18", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 1 | true | [
"CWE-078"
] | [
"py/command-line-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1)."
] | [
59
] | [
null
] | [
19
] | [
26
] | |
2024-11-18T21:55:41.250258+00:00 | 1,600,242,245,000 | 0cdae2aa382595e4c672da116c01f489fe9ad55b | 4 | {
"blob_id": "0cdae2aa382595e4c672da116c01f489fe9ad55b",
"branch_name": "refs/heads/master",
"committer_date": 1600242245000,
"content_id": "b64c1c293e7f098605459d8e557c0e028048355c",
"detected_licenses": [
"MIT"
],
"directory_id": "53592c4ce1dad7f96779a2b44c772692a0f46fc3",
"extension": "py",
"fi... | 4.4375 | stackv2 | # --------python函数
a = 1.238913
result = round(a,2)
print(result) # 1.24 会进行4舍5入
# --------函数练习
# 1.实现两个数字的相加
# 2.打印输入的参数
def add(x,y):
sum = x+y
return sum
def print_code(code):
print(code)
# 相加
b = add(1,2)
c = print_code('python')
print(b,c)
# 执行结果
# python
# 3 None
# --解释:
# 第一个python结果是为在定义print_co... | 94 | 16.65 | 51 | 11 | 746 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fe842832dcedb465_f51d3ba7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
84
] | [
null
] | [
11
] | [
26
] | |
2024-11-18T21:55:42.312108+00:00 | 1,490,034,864,000 | 69b820621576a99c3419f6ae972bc9cd05c698ee | 3 | {
"blob_id": "69b820621576a99c3419f6ae972bc9cd05c698ee",
"branch_name": "refs/heads/master",
"committer_date": 1490034864000,
"content_id": "82963100a7ca2f9419d6d165d2acbc43990ef7c3",
"detected_licenses": [
"MIT"
],
"directory_id": "34bd8ef71ab211032714253280e1016008ef931a",
"extension": "py",
"fi... | 2.625 | stackv2 | from lib.util import *
import hashlib
import lib.util
import getpass # TODO Make this work
import sys
import os
loggedUser = "NULL"
permissions = ""
def addUser(username, password, ftp):
currId = 0
for i in open("users.txt", "r"):
try:
if (i.split(";")[1] == username):
re... | 103 | 37.14 | 167 | 23 | 965 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1e234d186ad00ecc_f85cc85e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
27
] | [
null
] | [
64
] | [
88
] | |
2024-11-18T22:39:33.136189+00:00 | 1,575,562,455,000 | b0f228ff5e1609190f0b727002ce86f1c711e51f | 4 | {
"blob_id": "b0f228ff5e1609190f0b727002ce86f1c711e51f",
"branch_name": "refs/heads/master",
"committer_date": 1575562455000,
"content_id": "6d07f6f5f3af0e305dcc4bde05bc6bfd06805984",
"detected_licenses": [
"MIT"
],
"directory_id": "4046daf6b12fdda5f71550d73dfc9181858f9004",
"extension": "py",
"fi... | 3.5 | stackv2 | def is_valid_credit_card(number):
reversed = str(number)[::-1]
is_odd = 0
even_sum = 0
odd_sum = 0
for digit in reversed:
if (is_odd % 2 == 0):
odd_sum += int(digit)
is_odd = 1
else:
twice = 2 * int(digit)
sum_digits = twice % 10 + twic... | 18 | 25.5 | 49 | 14 | 142 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_431df84b553c2389_f8507d9e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
17
] | [
null
] | [
7
] | [
31
] | |
2024-11-18T22:39:34.559028+00:00 | 1,564,718,281,000 | 59559b1051950c45b91a94903e9e6326ed2f0274 | 2 | {
"blob_id": "59559b1051950c45b91a94903e9e6326ed2f0274",
"branch_name": "refs/heads/master",
"committer_date": 1564718281000,
"content_id": "57ab940265276610f5f53baf8d6241d464d4937b",
"detected_licenses": [
"MIT"
],
"directory_id": "f6dd2dfdb5a374c4db12c15831475b0a641ceee4",
"extension": "py",
"fi... | 2.484375 | stackv2 | # --------------------------------------------------------
# object detection restful api
# author:wang lei
# update time:2018-9-21
# --------------------------------------------------------
import sys
sys.path.append('../')
import cv2
from flask import Flask, jsonify
from flask_restful import Resource, Api
from flas... | 63 | 27.75 | 83 | 19 | 428 | python | [{"finding_id": "codeql_py/stack-trace-exposure_ec847f49ed3a281e_e2b93241", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
49
] | [
null
] | [
28
] | [
67
] | |
2024-11-18T22:39:34.677667+00:00 | 1,524,709,156,000 | 6151c5102255187fd473f0835e803021be0dcb65 | 2 | {
"blob_id": "6151c5102255187fd473f0835e803021be0dcb65",
"branch_name": "refs/heads/master",
"committer_date": 1524709156000,
"content_id": "100a2e815848fe7a0601c8b05fceaa1ebc8e480d",
"detected_licenses": [
"MIT"
],
"directory_id": "1007b08fbdbe7f446f5ed65a0be4a599afd9a5c4",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/env python
import ssl
from urllib import request
from lulu.common import (
match1,
url_info,
get_content,
)
from lulu.extractor import VideoExtractor
class Infoq(VideoExtractor):
name = 'InfoQ infoq.com'
stream_types = [
{'id': 'video'},
{'id': 'audio'},
{'id'... | 70 | 29.27 | 78 | 14 | 572 | python | [{"finding_id": "codeql_py/insecure-protocol_b5e4b0214ecf31e9_25f9f006", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1)."
] | [
41
] | [
null
] | [
21
] | [
55
] | |
2024-11-18T22:55:02.788000+00:00 | 1,638,408,905,000 | 58a2293954481351c602c461d146246a34392baa | 2 | {
"blob_id": "58a2293954481351c602c461d146246a34392baa",
"branch_name": "refs/heads/master",
"committer_date": 1638408905000,
"content_id": "d080fd7e89ba9e8740005dc28823a60070e388ba",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "70b178e8edf88110afc03b1b99cd03cfc52daa1a",
"extension": "py"... | 2.421875 | stackv2 | from flask import Blueprint
main = Blueprint('main', __name__)
import json
from engine import RecommendationEngine
import logging
logging.basicConfig(level=logging.INFO)
logger = logging.getLogger(__name__)
from flask import Flask, request
@main.route("/<int:user_id>/ratings/top/<int:count>", methods=["GET"])
d... | 51 | 34.63 | 86 | 15 | 410 | python | [{"finding_id": "codeql_py/log-injection_3c90afb3c2134dca_89652ed0", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
15,
21,
21
] | [
null,
null,
null
] | [
51,
59,
68
] | [
58,
66,
76
] | |
2024-11-18T23:06:16.000795+00:00 | 1,581,373,316,000 | 564c8a202aed4213493965a7c0992dfdd7ef7381 | 3 | {
"blob_id": "564c8a202aed4213493965a7c0992dfdd7ef7381",
"branch_name": "refs/heads/master",
"committer_date": 1581373316000,
"content_id": "cb86a215ed40faa0bfeda3f6f3f3139fb62bbfcd",
"detected_licenses": [
"MIT"
],
"directory_id": "d352279c9fddef92654eb7037b8318af1bbea3a1",
"extension": "py",
"fi... | 2.75 | stackv2 | #!/usr/bin/python
import mysql.connector
from mysql.connector import errorcode
from datetime import datetime
##===============================================
class DatabaseUtility:
def __init__(self, database, tableName):
self.db = database
self.tableName = tableName
f = open('C:\\Users\\susha\\Desktop\\pa... | 93 | 24.55 | 79 | 16 | 609 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ebd7b637af30b607_1efd2c5f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
57,
62
] | [
null,
null
] | [
10,
11
] | [
35,
24
] | |
2024-11-18T20:56:54.884835+00:00 | 1,487,193,057,000 | 38c2b0c0d60ca0214a6cd896089bb0126871957c | 3 | {
"blob_id": "38c2b0c0d60ca0214a6cd896089bb0126871957c",
"branch_name": "refs/heads/master",
"committer_date": 1487193057000,
"content_id": "3dd041c59ac57b8f66824f6594229b502cfb9bdc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f1d1e4bbb373ec6b92c3f0c126b3df95c7d5618a",
"extension": "py"... | 2.546875 | stackv2 | import httplib
import urllib
import ssl
from os import path
def main_microsoft(args):
prediction = {}
# Request headers
headers = {
'Content-Type': 'application/json',
'Ocp-Apim-Subscription-Key': args.microsoft_key
}
# Request parameters
params = urllib.urlencode({
'... | 44 | 25.45 | 94 | 13 | 287 | python | [{"finding_id": "codeql_py/insecure-protocol_d07c6bcbe450ae38_9623ab3c", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1)."
] | [
30
] | [
null
] | [
20
] | [
54
] | |
2024-11-18T20:56:59.898691+00:00 | 1,561,550,377,000 | f16902748aa1528517f8a5c80aacc74af75e04ad | 3 | {
"blob_id": "f16902748aa1528517f8a5c80aacc74af75e04ad",
"branch_name": "refs/heads/master",
"committer_date": 1561550377000,
"content_id": "11c1ca092157ef009bc0e5aa75637ad948c7f604",
"detected_licenses": [
"MIT"
],
"directory_id": "31df96388bef38aa3df1fba9e5b1737c27da535e",
"extension": "py",
"fi... | 2.515625 | stackv2 | from django.shortcuts import render
from django.views import View
import json, pickle, base64
from django import http
from goods.models import SKU
from meiduo_mall.utils.response_code import RETCODE
from django_redis import get_redis_connection
class CarsView(View):
"""添加购物车"""
def post(self, request):
... | 324 | 33.91 | 99 | 19 | 2,687 | python | [{"finding_id": "codeql_py/unsafe-deserialization_6f5ac1694274f0a0_b3a0841d", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio... | 6 | true | [
"CWE-502",
"CWE-502",
"CWE-502",
"CWE-502",
"CWE-502",
"CWE-502"
] | [
"py/unsafe-deserialization",
"py/unsafe-deserialization",
"py/unsafe-deserialization",
"py/unsafe-deserialization",
"py/unsafe-deserialization",
"py/unsafe-deserialization"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Unsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provi... | [
57,
108,
171,
224,
270,
307
] | [
null,
null,
null,
null,
null,
null
] | [
42,
42,
43,
43,
42,
43
] | [
52,
77,
79,
79,
78,
79
] | |
2024-11-18T20:57:01.018676+00:00 | 1,518,396,995,000 | 1e56dfad12b0ca9e35b9e13553720b6655d052cc | 3 | {
"blob_id": "1e56dfad12b0ca9e35b9e13553720b6655d052cc",
"branch_name": "refs/heads/master",
"committer_date": 1518396995000,
"content_id": "cab62072ee3729261207c555229fe464ebeedf91",
"detected_licenses": [
"MIT"
],
"directory_id": "f8817c6013b2fff656ac9b21ad8227a05a8d6235",
"extension": "py",
"fi... | 2.515625 | stackv2 | #!/usr/bin/env python3
from io import StringIO
import pandas as pd
import traceback
import psycopg2
import boto3
import sys
import os
import pandas._libs.lib as lib
from pandas.core.dtypes.missing import isna
def connect_to_redshift(dbname, host, user, password, port = 5439):
# connect to redshift
global conne... | 192 | 36.02 | 114 | 20 | 1,564 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cb8e34bbca71cc7d_7dd2c6cb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
155
] | [
null
] | [
15
] | [
24
] | |
2024-11-18T22:43:26.838539+00:00 | 1,565,923,749,000 | 4c4bed192c80dec927ff41aaf404d6e1cfecff35 | 2 | {
"blob_id": "4c4bed192c80dec927ff41aaf404d6e1cfecff35",
"branch_name": "refs/heads/master",
"committer_date": 1565923749000,
"content_id": "9d19d32ba39259ce78c356523afcbdc559e6b391",
"detected_licenses": [
"MIT"
],
"directory_id": "8790f93e36e41061cdbed0a168168c469c192c16",
"extension": "py",
"fi... | 2.40625 | stackv2 | """
Created by yan on 2018/9/27 15:14
"""
import os
import filetype
from flask import request, jsonify
import app
from app.web import web
__author__ = 'yan'
basedir = os.path.abspath(os.path.dirname(os.path.dirname(__file__)))
@web.route('/upload',methods=['POST'])
def upload():
resp = {'code': 200, 'msg': ''... | 26 | 23.65 | 69 | 11 | 183 | python | [{"finding_id": "codeql_py/path-injection_82ce1071a37ec688_e544e99a", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
24
] | [
null
] | [
15
] | [
47
] | |
2024-11-18T22:43:33.305362+00:00 | 1,568,191,697,000 | d05f7241cc8648629f6231fc663230a5a81c0525 | 3 | {
"blob_id": "d05f7241cc8648629f6231fc663230a5a81c0525",
"branch_name": "refs/heads/master",
"committer_date": 1568191697000,
"content_id": "d9504a3a888ab991d16267c61dcf27b8a7c60f4b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1f1b62a23e9267fba41a5f9dc757d2c107d3d7c1",
"extension": "py"... | 3.109375 | stackv2 | from Crypto.Cipher import DES
class MyDESCrypt:
key = chr(11)+chr(11)+chr(11)+chr(11)+chr(11)+chr(11)+chr(11)+chr(11)
iv = chr(22)+chr(22)+chr(22)+chr(22)+chr(22)+chr(22)+chr(22)+chr(22)
def __init__(self,key='',iv=''):
if len(key)> 0:
self.key = key
if len(iv)>0 :
... | 36 | 28.72 | 73 | 18 | 311 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_92812c7ccfce39fd_89320c18", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES](1) is broken or weak, and should not be used.", "r... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The cryptographic algorithm DES](1) is broken or weak, and should not be used.",
"[The cryptographic algorithm DES](1) is broken or weak, and should not be used."
] | [
22,
33
] | [
null,
null
] | [
16,
17
] | [
43,
37
] | |
2024-11-18T22:43:37.814595+00:00 | 1,556,997,313,000 | b2024be2368e2b96f9598f76778ce329defa7d61 | 2 | {
"blob_id": "b2024be2368e2b96f9598f76778ce329defa7d61",
"branch_name": "refs/heads/master",
"committer_date": 1556997313000,
"content_id": "7909e0ffec49b0bf73dd169d12190aee676388b8",
"detected_licenses": [
"MIT"
],
"directory_id": "2c9e55ca7b9f5ec7348f4ecd094d4258daba9af8",
"extension": "py",
"fi... | 2.5 | stackv2 | import json
from flask import Flask, request, Response, send_from_directory, redirect, flash
from flask_login import LoginManager, current_user, login_user
from flask_wtf import FlaskForm
from wtforms import StringField, PasswordField, BooleanField, SubmitField
from wtforms.validators import DataRequired
from ..models ... | 32 | 31.72 | 80 | 13 | 217 | python | [{"finding_id": "codeql_py/url-redirection_ea9653e89d882035_a234cd94", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
32
] | [
null
] | [
25
] | [
35
] | |
2024-11-18T22:44:09.695737+00:00 | 1,597,851,367,000 | e6c32eb0c8c352c840fce1a3ee4da3f8f75759a0 | 3 | {
"blob_id": "e6c32eb0c8c352c840fce1a3ee4da3f8f75759a0",
"branch_name": "refs/heads/master",
"committer_date": 1597851367000,
"content_id": "64817fa1669b516f2f8387c40c3f1659dd9683b4",
"detected_licenses": [
"MIT"
],
"directory_id": "785367a9c36571041ce205d33c68fcb880d3a590",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
### Settings ###
# Attemp to reconstruct media paths, set to False if you get errors while extracting
TRY_PATH_RECONSTRUCT = True
# If one of the headers is corrupted, these can help
FORCE_NEW_HEADER = False
FORCE_OLD_HEADER = False
# Name of the output directory
EXPORT_... | 274 | 30.08 | 116 | 23 | 2,184 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_70c315ad34e828c0_e8b66cdc", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
112
] | [
null
] | [
18
] | [
38
] | |
2024-11-18T22:44:11.722651+00:00 | 1,680,226,379,000 | 82a2babfec616902303cfef89b497abc78628f9d | 2 | {
"blob_id": "82a2babfec616902303cfef89b497abc78628f9d",
"branch_name": "refs/heads/master",
"committer_date": 1680226379000,
"content_id": "de80875220116cd5176da8648e2e7e5aaa56ce4c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1da9347deb8e22971abe791f877e47f4e20b3fe1",
"extension": "py"... | 2.34375 | stackv2 | # Copyright 2021 Red Hat
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software... | 79 | 28.67 | 75 | 13 | 515 | python | [{"finding_id": "codeql_py/overly-permissive-file_8ba5cc6c5ed8d270_8020100b", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
78
] | [
null
] | [
9
] | [
34
] | |
2024-11-18T22:44:12.964128+00:00 | 1,554,745,942,000 | fed845c3261bd39f5a76d34b5bfdce00e60d7aff | 2 | {
"blob_id": "fed845c3261bd39f5a76d34b5bfdce00e60d7aff",
"branch_name": "refs/heads/master",
"committer_date": 1554745942000,
"content_id": "e338ee93dd33f06b46322796102b0f3b0d4d1f8f",
"detected_licenses": [
"MIT"
],
"directory_id": "bcddf027f168a2e1e873117c3f9bcb5b0acf3db9",
"extension": "py",
"fi... | 2.5 | stackv2 | import base64
import json
import os
import sys
import requests
import pyotp
from loguru import logger
CONFIG_PATH = 'boilerkey_config.json'
COUNTER_PATH = 'boilerkey_counter.json'
# DO NOT LOSE YOUR WAAAAAAY!
__license__ = "WTFPL"
__author__ = "Russian election hackers"
__credits__ = ['ITaP', 'Mitch Daniels']
de... | 152 | 26.66 | 79 | 16 | 1,017 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_77459e29d7295a56_fb16236b", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [m-1b9bef70.duosecurity.com](1) may be at an arbitrary ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [m-1b9bef70.duosecurity.com](1) may be at an arbitrary position in the sanitized URL."
] | [
65
] | [
null
] | [
16
] | [
52
] | |
2024-11-18T23:10:42.724432+00:00 | 1,591,456,552,000 | 5f08e396e454f37579bfaeebaf1735cd085b60fa | 3 | {
"blob_id": "5f08e396e454f37579bfaeebaf1735cd085b60fa",
"branch_name": "refs/heads/master",
"committer_date": 1591456552000,
"content_id": "6eab6d566d97ba8cecc879daf0699f6d5be256dd",
"detected_licenses": [
"MIT"
],
"directory_id": "ab60d83558f0af545bd83ab026a5d81d1aae6167",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/env python
import threading
import os
import json
import time
import logging
import urllib
import urllib2
import sh
from hashlib import sha256
from uuid import getnode as get_mac
logger = logging.getLogger('dcnow')
API_ROOT = "https://dcnow-2016.appspot.com"
UPDATE_END_POINT = "/api/update/{mac_address}... | 112 | 28.39 | 108 | 22 | 740 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7ec771652363a2d9_9b9f590c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
92
] | [
null
] | [
21
] | [
64
] | |
2024-11-18T23:25:02.141749+00:00 | 1,552,738,494,000 | 191a876965a6206023d60d0dcac403b6acd7895f | 2 | {
"blob_id": "191a876965a6206023d60d0dcac403b6acd7895f",
"branch_name": "refs/heads/master",
"committer_date": 1552738494000,
"content_id": "3e64b88f97ad07687b786d396ff8155ab486d0d3",
"detected_licenses": [
"MIT"
],
"directory_id": "91b556fc6b83d20939417fed5e3e398308b69080",
"extension": "py",
"fi... | 2.3125 | stackv2 | import time
import hashlib
import os
import random
import re
import string
import fooster.db
import mcp.config
import mcp.error
users_allowed = '[0-9a-zA-Z-_+][0-9a-zA-Z-_+.]*'
key_length = 24
salt_length = 8
token_length = 16
token_lifetime = 4*3600
rand_chars = string.ascii_letters + string.digits
rand_rng = ran... | 148 | 22.53 | 162 | 14 | 823 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_c7747a57e89c1a56_6b5ea0cc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
24
] | [
null
] | [
27
] | [
60
] | |
2024-11-18T22:29:31.714432+00:00 | 1,686,901,173,000 | 89ecfdadc8cfbdd629c6c157dc88bba984422663 | 3 | {
"blob_id": "89ecfdadc8cfbdd629c6c157dc88bba984422663",
"branch_name": "refs/heads/main",
"committer_date": 1687259094000,
"content_id": "1133f94cbfe08e36d259a516cede0924d8198469",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "1126985fc98d13356a45ed3fd7717afcb490db3f",
"extension": "py"... | 2.5625 | stackv2 | #!/usr/bin/env python3
"""
Parse the xNVMe header files for auto-generation purposes
"""
from __future__ import print_function
import argparse
import copy
import logging
import os
import sys
from subprocess import PIPE, Popen
import jinja2
DECLARATIONS = {
"func": [],
"macro": [],
"struct": [],
"... | 199 | 23.09 | 79 | 16 | 1,191 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5dd1c86f34812945_6c15b36b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
139
] | [
null
] | [
20
] | [
62
] | |
2024-11-18T22:29:31.885005+00:00 | 1,469,950,965,000 | 05f5df347e09daf030882f4e53f09bdb7f15f7bc | 2 | {
"blob_id": "05f5df347e09daf030882f4e53f09bdb7f15f7bc",
"branch_name": "refs/heads/master",
"committer_date": 1469950965000,
"content_id": "6e2c171c8bf9651ea05a190043a5399c1d5388ce",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "947cc5f04fabf1f094b21c84e257c2850d52e47a",
"extension": "py"... | 2.421875 | stackv2 | import urllib.request
import urllib.parse
import json
from Admit import Data
# number:the number of a student
# birthday: the student's birthday, like 9301
# try_time: the request reconnect times when it broken.
def get_admit_result_by_number_and_birthday(number, birthday, try_times=3):
if try_times == 0:
... | 53 | 44.7 | 154 | 22 | 750 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_83aead5c47d6c81b_1a48ea91", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text."
] | [
14,
50
] | [
null,
null
] | [
20,
24
] | [
48,
111
] | |
2024-11-18T22:29:53.911090+00:00 | 1,629,821,043,000 | 75cc5734a9e9b311f2896f02a8434ff301fb474a | 3 | {
"blob_id": "75cc5734a9e9b311f2896f02a8434ff301fb474a",
"branch_name": "refs/heads/master",
"committer_date": 1629821043000,
"content_id": "2e44f7b6050269265951cdf048fb6304dc564293",
"detected_licenses": [
"MIT"
],
"directory_id": "8f074fd16c7dfe6a0df4d9dcd0c2351117e52193",
"extension": "py",
"fi... | 3.15625 | stackv2 | """
lipydomics/util.py
Dylan H. Ross
2020/03/17
description:
Miscellaneous utility functions that do not quite fit in with other modules
"""
import re
from numpy import sqrt, nan, inf, mean, abs, array
from datetime import datetime
def abbreviate_sheet(sheet_name):
"""
abbreviate_sheet
... | 285 | 44.83 | 157 | 22 | 3,580 | python | [{"finding_id": "codeql_py/redos_3c89d235dda9fa4f_c189f66a", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '1(0:00:' and containing many repe... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '1(0:00:' and containing many repetitions of '000:'.",
"This part of the regular expression may cause exponential backtracking on strings starting with '1(0:00:' and containing many repetitions of '000:'."
] | [
154,
154
] | [
null,
null
] | [
109,
145
] | [
115,
151
] | |
2024-11-18T22:30:05.640409+00:00 | 1,555,501,984,000 | 1722f21843fe01354b4f5ff3130ea5b02b30278c | 3 | {
"blob_id": "1722f21843fe01354b4f5ff3130ea5b02b30278c",
"branch_name": "refs/heads/master",
"committer_date": 1555501984000,
"content_id": "da55206ed1459f305ea0eb1acf8f879a0a070c6e",
"detected_licenses": [
"MIT"
],
"directory_id": "e0add23cbed12377bf356bb33495ed2088920a15",
"extension": "py",
"fi... | 2.515625 | stackv2 | import re
import os
import toml
import json
from jinja2 import Template
from toca.entity.api import Api
from toca.entity.group import Group
from toca.entity.service import Service
from toca.utils.errors import HTTPMethodError
from toca.utils.functions import loadJsonFromFile, getRandomName, getRandomInt, fileObject, g... | 152 | 43.5 | 108 | 24 | 1,242 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_74dc3a5f96950fc5_abfa5665", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
58
] | [
null
] | [
19
] | [
36
] | |
2024-11-18T23:10:12.188589+00:00 | 1,490,579,345,000 | 738e9c5e2f6e77b574ffddbf6fa9a0fd16b08e7f | 2 | {
"blob_id": "738e9c5e2f6e77b574ffddbf6fa9a0fd16b08e7f",
"branch_name": "refs/heads/master",
"committer_date": 1490579345000,
"content_id": "cc7e7df5523a90a7b7132efb9f4e46a520eb7027",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ce15bf73e4b4e31c7b4dfd664d5c229bd7cf44fb",
"extension": "py"... | 2.484375 | stackv2 | # -*- coding: utf-8 -*-
from flask import Flask, request
import sqlite3
import json
from sqlite3 import OperationalError
app = Flask(__name__)
app_name = "/t-helper"
def get_daily_word_by_id(id):
conn = sqlite3.connect("./t-helper.sqlite")
cur = conn.cursor()
try:
cur.execute("select * from daily... | 39 | 25.1 | 169 | 12 | 290 | python | [{"finding_id": "codeql_py/stack-trace-exposure_efe94f098b34a05a_399fb424", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-215",
"CWE-089"
] | [
"py/stack-trace-exposure",
"py/flask-debug",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This SQL query depends on a [user-provided value](1)."
] | [
34,
38,
15
] | [
null,
null,
null
] | [
12,
5,
21
] | [
31,
51,
61
] | |
2024-11-18T23:10:12.865195+00:00 | 1,615,326,825,000 | efecd666a75b96b0fad2f4bc089fa85b19f6d8bc | 3 | {
"blob_id": "efecd666a75b96b0fad2f4bc089fa85b19f6d8bc",
"branch_name": "refs/heads/main",
"committer_date": 1615326825000,
"content_id": "e28875feb51f5d2bd875b414cce531e82ad58ac8",
"detected_licenses": [
"MIT"
],
"directory_id": "d4b36f04cd0dc3d97ac0b425e91afc461ee61729",
"extension": "py",
"file... | 3.09375 | stackv2 | #!/usr/bin/python
import argparse
import json
import requests
# reference : https://realpython.com/python-requests/
if __name__ == '__main__':
parser = argparse.ArgumentParser(
description='Inserts example json into backend using the POST request')
parser.add_argument('jsonFile', help='Library data ... | 25 | 26.04 | 103 | 10 | 157 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c3575de4b87e16fe_7f00cf76", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
23
] | [
null
] | [
16
] | [
60
] | |
2024-11-18T23:10:17.686188+00:00 | 1,596,796,186,000 | ed3d3ae9c48774710a2fd2bb8f962e7a794af410 | 3 | {
"blob_id": "ed3d3ae9c48774710a2fd2bb8f962e7a794af410",
"branch_name": "refs/heads/master",
"committer_date": 1596796186000,
"content_id": "825d102686c4bc18324877548463192b99f757e7",
"detected_licenses": [
"MIT"
],
"directory_id": "8cff3912016bfd1a2a877f454484e8ba4776ddff",
"extension": "py",
"fi... | 3 | stackv2 | import csv
import argparse
import re
parser = argparse.ArgumentParser()
parser.add_argument('original')
parser.add_argument('noblank')
parser.add_argument('result')
args = parser.parse_args()
def restoreText(original):
text = re.sub('[-=+,#/\?:^\n-❛˓◞˂̵✧$.@*\"※~&%ㆍ!』\\‘|\(\)\[\]\<\>`\'…》]', '', original)
retu... | 37 | 28.7 | 90 | 19 | 266 | python | [{"finding_id": "codeql_py/overly-large-range_63ef78cbd7e75820_15a9f6e0", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[\\n\\u000b\\u000c\\r\\u000e\\u000f\\u0010\\u0011\\u0... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[\\n\\u000b\\u000c\\r\\u000e\\u000f\\u0010\\u0011\\u0012\\u0...."
] | [
12
] | [
null
] | [
31
] | [
34
] | |
2024-11-18T23:21:45.518307+00:00 | 1,350,685,312,000 | 23f91668d64c93881bd8f9a7f21e7dc281faab03 | 3 | {
"blob_id": "23f91668d64c93881bd8f9a7f21e7dc281faab03",
"branch_name": "refs/heads/master",
"committer_date": 1350685312000,
"content_id": "6d48687cf8622ced6a11d41dd42157bac89360ba",
"detected_licenses": [
"MIT"
],
"directory_id": "1326c24130c225b49b652d5c726329e575284c27",
"extension": "py",
"fi... | 2.609375 | stackv2 | # -*- coding: utf-8 -*-
u"""
Contact form class definitions.
"""
import logging
from smtplib import SMTPException
from django import forms
from django.core import mail
from django.template.loader import render_to_string
from django.utils.translation import ugettext_lazy as _
from envelope import settings, signals
... | 191 | 31.77 | 92 | 17 | 1,229 | python | [{"finding_id": "codeql_py/log-injection_9427b9dc12d36584_81a99301", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
81
] | [
82
] | [
25
] | [
51
] | |
2024-11-18T21:33:28.760646+00:00 | 1,577,414,887,000 | e9758285654eff69449a5b4e20126f05f2f27eef | 2 | {
"blob_id": "e9758285654eff69449a5b4e20126f05f2f27eef",
"branch_name": "refs/heads/master",
"committer_date": 1577414887000,
"content_id": "97196415257dce68531b1c8b8042cde4fd90a20b",
"detected_licenses": [
"MIT",
"BSD-3-Clause"
],
"directory_id": "56abf87c04f7e49989870a327c5e59bec40b4cd1",
"ext... | 2.3125 | stackv2 | import os
import time
import argparse
import json
import shutil
import torch
from torch.utils.data.distributed import DistributedSampler
from torch.nn import DataParallel
from torch.utils.data import DataLoader
from distributed import init_distributed, apply_gradient_allreduce, reduce_tensor
import math
import numpy ... | 246 | 32.07 | 97 | 19 | 1,724 | python | [{"finding_id": "codeql_py/overly-permissive-file_2beaa556d382f4f0_727fc271", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
64
] | [
null
] | [
13
] | [
46
] | |
2024-11-18T21:33:31.612691+00:00 | 1,658,946,170,000 | d537f6229c9797bba93c147abe1fad09a58ef216 | 2 | {
"blob_id": "d537f6229c9797bba93c147abe1fad09a58ef216",
"branch_name": "refs/heads/master",
"committer_date": 1658946170000,
"content_id": "32e50b39378be583df443fc6156976f8722a8c9e",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "f5d6e591a9684db43ec6c97c5ab06613ee7e2ec6",
"extension": "p... | 2.453125 | stackv2 | import os
import re
import zipfile
from abc import abstractmethod
from pathlib import Path
from typing import Iterator, Any, Awaitable, Callable, Tuple, Optional, List
import asyncpg
import click
from jinja2 import Environment, FileSystemLoader
from settings import AppConfig
from .aodataparser import AoDataParser
fro... | 262 | 35.66 | 114 | 23 | 2,189 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_72263f730ff49721_e653e1a1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
139
] | [
null
] | [
24
] | [
83
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.