added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T03:44:25.168880+00:00 | 1,565,986,745,000 | 474005d2a1718716c1f0089d6df83573d1c2be2e | 2 | {
"blob_id": "474005d2a1718716c1f0089d6df83573d1c2be2e",
"branch_name": "refs/heads/master",
"committer_date": 1565986745000,
"content_id": "7f44277dc1bee356c940e3890aa8bc1ad146006b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2bb733fe51534b8ad27539b80135b694fe9402f0",
"extension": "py"... | 2.46875 | stackv2 | #!/usr/bin/python
import argparse
import json
import re
import requests
import sys
def send_data(url, data, timeout, cache):
# update cache
records = {}
with open(cache, 'r') as cf:
for line in cf:
if not line:
continue
client, checklist = line.split(':::')... | 98 | 35.65 | 79 | 17 | 769 | python | [{"finding_id": "codeql_py/request-without-cert-validation_32a27d643a981af0_1ed6c003", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
24,
42,
45
] | [
28,
44,
47
] | [
5,
9,
9
] | [
35,
41,
41
] | |
2024-11-19T03:44:25.672519+00:00 | 1,605,546,486,000 | c43d8af9575c2ae20ea4068aaefa49ec72c187ce | 3 | {
"blob_id": "c43d8af9575c2ae20ea4068aaefa49ec72c187ce",
"branch_name": "refs/heads/main",
"committer_date": 1605546486000,
"content_id": "db35e7d281271fd99c91381f79100931bfcc3a6a",
"detected_licenses": [
"MIT"
],
"directory_id": "008f17847c643834bf523c9819b12dc9cd2f4285",
"extension": "py",
"file... | 2.921875 | stackv2 | from cellulariot import *
import time
import sys
import json
# Process the ISS data: lat and long
def process_iss_data(modem_response):
# 'modem_response' is a string, eg. "+QHTTPGET: 0,200,22323"
# Check for HTTP error code, the
response = modem_response.split(": ")
response = response[1].split(",")
... | 73 | 28.38 | 113 | 16 | 548 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b6c1dad03b163f75_e62f069a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
22,
22
] | [
null,
null
] | [
35,
77
] | [
72,
113
] | |
2024-11-19T02:08:15.163498+00:00 | 1,589,521,532,000 | f286831c67e995b580c8025c5825910c5275e3c4 | 3 | {
"blob_id": "f286831c67e995b580c8025c5825910c5275e3c4",
"branch_name": "refs/heads/master",
"committer_date": 1589521532000,
"content_id": "936ddd344ed39f597db9270bc5e7ab1acb4d93c0",
"detected_licenses": [
"MIT"
],
"directory_id": "217e9399ebfce44b985c6eba68b995e205a95204",
"extension": "py",
"fi... | 2.796875 | stackv2 | import argparse
import logging
from bs4 import BeautifulSoup
import requests
import re
import youtube_dl
import sys
# parse arguments passed from command line
def parseArguments():
# set up argument parser
parser = argparse.ArgumentParser(description='Downloads video playlists hosted on mediaspace.gatech.edu ... | 115 | 34.17 | 152 | 13 | 964 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_a183a6cc405ff136_93fe068f", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'gatech.edu/playlist/details/', so i... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'gatech.edu/playlist/details/', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'kaltura.com/p', so it might match more hosts than expected."
] | [
21,
42
] | [
null,
null
] | [
34,
61
] | [
89,
94
] | |
2024-11-19T02:08:42.372923+00:00 | 1,551,187,783,000 | 57a32cc10f36bd1a1db8dcf6db7a8231d2f938b9 | 3 | {
"blob_id": "57a32cc10f36bd1a1db8dcf6db7a8231d2f938b9",
"branch_name": "refs/heads/master",
"committer_date": 1551187783000,
"content_id": "10a0e8f65f47688c9adfe1c3c198444dda220bd7",
"detected_licenses": [
"Unlicense"
],
"directory_id": "2e802250a6e76e3c9b7fe517eeba21172361b2ce",
"extension": "py",... | 2.734375 | stackv2 | import paramiko
import time
def ssh_connect():
#Variables
ip = '192.168.146.132'
username = 'admin'
password = 'cisco'
#create SSH object
remote_ssh = paramiko.SSHClient()
#add untrusted hosts to SSH
remote_ssh.set_missing_host_key_policy(
... | 47 | 26.64 | 108 | 9 | 317 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_40dd7fd7e235c625_0ecc4c62", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
14
] | [
15
] | [
9
] | [
42
] | |
2024-11-19T02:21:26.400706+00:00 | 1,676,139,610,000 | ed698c166ef5b8e5444145f80b23189167977626 | 3 | {
"blob_id": "ed698c166ef5b8e5444145f80b23189167977626",
"branch_name": "refs/heads/master",
"committer_date": 1676139610000,
"content_id": "02e64d9de74ab1028e8b7604a5dd287d0657bd72",
"detected_licenses": [
"MIT"
],
"directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9",
"extension": "py",
"fi... | 2.78125 | stackv2 | from flask import Flask
from flask import request
app = Flask(__name__)
#Normally this would be an external file like object, but here
#it's inlined
FORM_PAGE = """
<html>
<head>
<title>Flask Form</title>
</head>
<body>
<form action="/process" method="POST">
... | 55 | 34.31 | 109 | 14 | 436 | python | [{"finding_id": "codeql_py/reflective-xss_91743ff54941bf93_e5bbcca3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
52
] | [
null
] | [
12
] | [
20
] | |
2024-11-19T02:21:29.256404+00:00 | 1,529,634,462,000 | ab565b58704e1b129ba0c067d5f6c36452d39b27 | 3 | {
"blob_id": "ab565b58704e1b129ba0c067d5f6c36452d39b27",
"branch_name": "refs/heads/master",
"committer_date": 1529634462000,
"content_id": "ad685e7da7ade6a8bc24b265f66c8b670f4f63fd",
"detected_licenses": [
"MIT"
],
"directory_id": "870c1a9c569e12918598d3e7eb25e66a7eb667a0",
"extension": "py",
"fi... | 2.734375 | stackv2 | '''
APP层
收发消息的功能事实上是基于layer3的APP,应该整理到这里,而不是放在main里面
而且这样也可以扩展出很多其他APP
'''
from .layer3 import P2P
from .services.keys import GetKey
import rsa
class Chat(object):
def __init__(self, groupname):
self.down = P2P(groupname)
def send(self):
friends = list(self.down.trust.items())
for i in... | 36 | 31.17 | 88 | 15 | 322 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3b933d27d745bfb3_50216cbf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
17,
31
] | [
null,
null
] | [
45,
45
] | [
65,
65
] | |
2024-11-19T02:21:34.561142+00:00 | 1,504,249,281,000 | 57745aeeaa2a0fee7d680c48c3f301cfadc8aa51 | 2 | {
"blob_id": "57745aeeaa2a0fee7d680c48c3f301cfadc8aa51",
"branch_name": "refs/heads/master",
"committer_date": 1504249281000,
"content_id": "78903c760abe29c4cd4ae165ca0594f46215fd5a",
"detected_licenses": [
"MIT"
],
"directory_id": "45bd296034f2aab55cad2ac04e8821d37029aa46",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/env python
#CODE HELP FROM https://code.google.com/p/threepress/source/browse/trunk/bookworm/database-backup.py
import sys
import os.path
import os
import logging
from datetime import datetime
from django.conf import settings
import boto.s3
logging.basicConfig(level=logging.INFO, stream=sys.stdout)
PG_CM... | 122 | 31.99 | 143 | 13 | 1,044 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_96531928ccde9d89_3eed4f71", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
51
] | [
null
] | [
19
] | [
54
] | |
2024-11-19T02:21:39.270755+00:00 | 1,620,324,487,000 | 51e5b79d11b182b470923af5abdc7f3d69f77803 | 3 | {
"blob_id": "51e5b79d11b182b470923af5abdc7f3d69f77803",
"branch_name": "refs/heads/main",
"committer_date": 1620324487000,
"content_id": "c8149a1e6d38e05f30d821e0ce10f2020e2333ab",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0a34957ee9c354362f5d8bb21f8f72531808135e",
"extension": "py",
... | 2.9375 | stackv2 | import subprocess
import optparse
def get_arguments():
parser=optparse.OptionParser()
parser.add_option("-i","--interface", dest="interface", help="interface to change mac address")
parser.add_option("-m","--mac_address", dest="mac_address", help="it will change to new mac address ")
(options, argument... | 40 | 24.75 | 106 | 11 | 223 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e9f50f8030968046_f7ccbd08", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
16
] | [
null
] | [
11
] | [
76
] | |
2024-11-19T02:58:15.624667+00:00 | 1,629,359,675,000 | a68e94ec1b9b080f86110aeac7ceac7ae2d4fe68 | 2 | {
"blob_id": "a68e94ec1b9b080f86110aeac7ceac7ae2d4fe68",
"branch_name": "refs/heads/master",
"committer_date": 1629359675000,
"content_id": "e9bcba913ea9bb9dff8b8968cb3ce44ac48cce47",
"detected_licenses": [
"MIT"
],
"directory_id": "473d5b0f9ad809dbb17f2c63179db36164fe5691",
"extension": "py",
"fi... | 2.390625 | stackv2 | from slackclient import SlackClient
from flask import Flask, request, Response, jsonify
import json
import requests
app = Flask(__name__)
SLACK_TOKEN = '---'
slack_client = SlackClient(SLACK_TOKEN)
slack_token = '---'
def send_message(channel_id, message,user):
slack_client.api_call(
"chat.postMessage",... | 48 | 24.46 | 51 | 13 | 314 | python | [{"finding_id": "codeql_py/flask-debug_1c9dc4602e919905_643e4f50", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
48,
27
] | [
null,
null
] | [
2,
10
] | [
47,
43
] | |
2024-11-19T03:10:03.420753+00:00 | 1,576,690,473,000 | a85a378db8c55430978fc38e8f460c73699aa933 | 3 | {
"blob_id": "a85a378db8c55430978fc38e8f460c73699aa933",
"branch_name": "refs/heads/master",
"committer_date": 1576690473000,
"content_id": "b225d501acb580fedd337ee900974931a88a7ab7",
"detected_licenses": [
"MIT"
],
"directory_id": "6ee970f1ec0e61512098005cfede311c8c7ab8a5",
"extension": "py",
"fi... | 2.515625 | stackv2 | from urllib.request import urlopen
from urllib.parse import urlencode
from bs4 import BeautifulSoup
import multiprocessing as mp
from io import StringIO
import pandas as pd
import sqlite3
import tarfile
import shutil
import time
import json
import re
import os
#Download de arquivo
def Download(url, folder="."):
fi... | 319 | 40.79 | 160 | 22 | 3,416 | python | [{"finding_id": "codeql_py/tarslip_0d88bef8a8f12b76_b467b59f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
34
] | [
null
] | [
5
] | [
8
] | |
2024-11-19T03:10:09.452432+00:00 | 1,632,145,044,000 | 6a3f005d3da2cbda1dff1bc0d727f0a4d6ad9d91 | 2 | {
"blob_id": "6a3f005d3da2cbda1dff1bc0d727f0a4d6ad9d91",
"branch_name": "refs/heads/main",
"committer_date": 1632145044000,
"content_id": "370620842d154430dfa6f41036b0ed002dc56370",
"detected_licenses": [
"MIT"
],
"directory_id": "f7815aea45dc5dac3b418cee8a543a39a5abf2e3",
"extension": "py",
"file... | 2.40625 | stackv2 | import hashlib
import base64
import os
import uuid
from datetime import datetime
def encrypt_password(password):
salt = os.urandom(16)
hashed = hashlib.sha512(password.encode('utf8')+salt).digest()
return base64.b64encode(salt + hashed) # 108 chars fixed
def compare_password(raw, encrypted):
try:
... | 250 | 32.88 | 136 | 16 | 2,073 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1bfae3c878957a9a_dd4d1c1e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
11,
20
] | [
null,
null
] | [
29,
33
] | [
57,
56
] | |
2024-11-19T03:10:19.029680+00:00 | 1,693,417,914,000 | c54fc8688b0d2b7733592f86e91d8cef7420f307 | 3 | {
"blob_id": "c54fc8688b0d2b7733592f86e91d8cef7420f307",
"branch_name": "refs/heads/master",
"committer_date": 1693417914000,
"content_id": "3fd148aa3a4302bc194ba69d6ec95aa482411523",
"detected_licenses": [
"CC0-1.0",
"MIT"
],
"directory_id": "71acb7214efd91c0d327f6d8958e1798eadb4401",
"extensio... | 2.828125 | stackv2 | import re
from urllib.parse import parse_qs, urlsplit
def _get_possible_links(response):
yield from response.xpath('//img[contains(@src, "maps/api/staticmap")]/@src').getall()
yield from response.xpath('//iframe[contains(@src, "maps/embed")]/@src').getall()
yield from response.xpath("//a[contains(@href, '... | 96 | 41.65 | 103 | 20 | 1,072 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_8c19862a6325d6f7_8bea8372", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [maps.apple.com](1) may be at an arbitrary position in ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [maps.apple.com](1) may be at an arbitrary position in the sanitized URL."
] | [
81
] | [
null
] | [
10
] | [
33
] | |
2024-11-19T03:22:47.440785+00:00 | 1,511,265,627,000 | 40f4ebf613627c2aef01ed269ef40421b3def1dc | 3 | {
"blob_id": "40f4ebf613627c2aef01ed269ef40421b3def1dc",
"branch_name": "refs/heads/master",
"committer_date": 1511265627000,
"content_id": "e2e7deb337c30c3b92c70c7e143eefa04952e873",
"detected_licenses": [
"MIT"
],
"directory_id": "29b089355e5f30561e7303e66a5375d521997ccc",
"extension": "py",
"fi... | 3.125 | stackv2 | # coding=utf-8
# alexa_skill.py
# By
#
# Alexa skill api
import logging
import os
import time
from datetime import datetime
from random import randint
import requests
from flask import Flask, render_template
from flask_ask import Ask, question, statement
__author__ = os.environ.get('author_name')
__email__ = os.env... | 371 | 24.17 | 120 | 15 | 2,137 | python | [{"finding_id": "codeql_py/flask-debug_bdf968b239fc1257_6615bdc0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-295",
"CWE-295"
] | [
"py/flask-debug",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This request may run without certificate validation because [it is disabled](1) by [this value](2).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
371,
149,
176
] | [
null,
null,
null
] | [
5,
15,
5
] | [
24,
50,
85
] | |
2024-11-19T03:22:49.819758+00:00 | 1,665,754,395,000 | b79148339ba45a3dc90033175ddd0846fb822428 | 3 | {
"blob_id": "b79148339ba45a3dc90033175ddd0846fb822428",
"branch_name": "refs/heads/master",
"committer_date": 1665754395000,
"content_id": "92cfae01f1412105c4e967b67391123b6f3f6ea0",
"detected_licenses": [
"MIT"
],
"directory_id": "c13be69d0960a4af8116e9173a2ad465df0af728",
"extension": "py",
"fi... | 2.546875 | stackv2 | """
File used to make requests to Google APIs
-----------
Generative Adversarial Networks (GAN) research applied to the phishing detection.
University of Gloucestershire
Author : Pierrick ROBIC--BUTEZ
2019
Copyright (c) 2019 Khuzd
"""
import logging
import time
from socket import error
import json
import requests
fro... | 117 | 31.1 | 119 | 23 | 894 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2d210206144b9963_cf3eec48", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
110
] | [
null
] | [
15
] | [
18
] | |
2024-11-19T03:22:57.472711+00:00 | 1,530,541,768,000 | d374060c83f57517e80bbc387a2de00e200ec142 | 3 | {
"blob_id": "d374060c83f57517e80bbc387a2de00e200ec142",
"branch_name": "refs/heads/master",
"committer_date": 1530541768000,
"content_id": "299b1ea515bfa1b605c613ffa8d475051bd8389d",
"detected_licenses": [
"MIT"
],
"directory_id": "7c8a0b6893f55424e2fa6259f0f8911c207a1823",
"extension": "py",
"fi... | 3.09375 | stackv2 | class UserData:
"""
A class that geerates new instances of a user account data
"""
start=0
users=dict()
def __init__(self, username,master_password):
'''
Method for defining the instances of the object of the class
'''
self.username=username
self.master_pa... | 36 | 29.61 | 102 | 11 | 238 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_548e3abb4165bc1c_a18a7b3c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
35,
30
] | [
null,
null
] | [
20,
15
] | [
28,
102
] | |
2024-11-19T03:23:00.044125+00:00 | 1,635,451,009,000 | e097f33dfb1878aac76a2cec83bacf74e245b5c1 | 2 | {
"blob_id": "e097f33dfb1878aac76a2cec83bacf74e245b5c1",
"branch_name": "refs/heads/master",
"committer_date": 1635451009000,
"content_id": "b317945f27f85c8e951b8fdca974777ce5b01881",
"detected_licenses": [
"MIT"
],
"directory_id": "49335de0b379386e22119b8c5d72601e1f59d3de",
"extension": "py",
"fi... | 2.46875 | stackv2 | from prefect import task, Flow, Parameter, client
from prefect.tasks.secrets import PrefectSecret
from prefect.tasks.airtable.airtable import WriteAirtableRow
import googlemaps
from datetime import datetime
airtable_key = PrefectSecret('AIRTABLE')
gmaps_key = PrefectSecret('GMAPS')
@task
def getDrivingDistance(home, ... | 40 | 40.92 | 128 | 11 | 410 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_70ffecec2bb3f863_fe558cd5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
12
] | [
null
] | [
11
] | [
16
] | |
2024-11-19T03:44:01.835891+00:00 | 1,595,332,099,000 | 7e9d739dc79bd97e40dbba06348d03beefacf69c | 2 | {
"blob_id": "7e9d739dc79bd97e40dbba06348d03beefacf69c",
"branch_name": "refs/heads/master",
"committer_date": 1595332099000,
"content_id": "b840dc1168af2d2641335a3a5984d104614a663a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "511e39f07fe444c9cab4c6eede13af8350289cdf",
"extension": "py"... | 2.328125 | stackv2 | import collections
import contextlib
import datetime
import multiprocessing
import os
import shutil
import sys
import socket
import tempfile
import threading
import jinja2
import yaml
@contextlib.contextmanager
def temp_dir():
path = tempfile.mkdtemp(dir=os.environ.get('TEMP'))
try:
yield path
fi... | 147 | 25.62 | 120 | 21 | 907 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8b218973b4e7a885_70695337", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
130
] | [
139
] | [
11
] | [
6
] | |
2024-11-19T01:34:53.907620+00:00 | 1,604,653,091,000 | 9811ceb9e9036567a89ca84e6a6a5522db0e252d | 3 | {
"blob_id": "9811ceb9e9036567a89ca84e6a6a5522db0e252d",
"branch_name": "refs/heads/master",
"committer_date": 1604653091000,
"content_id": "76f61c4101ba69dc1d5bbfe0386f6f7b10008120",
"detected_licenses": [
"MIT"
],
"directory_id": "34ba661c593167e2aaa4da6cda5a638524ea8823",
"extension": "py",
"fi... | 2.9375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
Sample script to get iEL entries via Redfish REST API
in Fujitsu PRIMERGY
[Usage]
- Show all events
$ python get_iel.py -i 192.168.10.10 -u admin -p admin
- Show all events (ascending)
$ python get_iel.py -i 192.168.10.10 -u admin -p admin -r
- Show... | 105 | 31.48 | 105 | 24 | 867 | python | [{"finding_id": "codeql_py/request-without-cert-validation_d6d79885d1993e98_ec099588", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
36
] | [
41
] | [
16
] | [
6
] | |
2024-11-19T01:34:54.305059+00:00 | 1,609,377,676,000 | f4be390cb45e18e8a1a55a652d9742868d4c188a | 3 | {
"blob_id": "f4be390cb45e18e8a1a55a652d9742868d4c188a",
"branch_name": "refs/heads/main",
"committer_date": 1609377676000,
"content_id": "21ee30982e79207bd9c7b40230537bae4ffda8de",
"detected_licenses": [
"MIT"
],
"directory_id": "39aa9f4af78b31deb21d669225b4bb97f55b7df9",
"extension": "py",
"file... | 2.734375 | stackv2 | from secrets import compare_digest
from functools import cached_property
import sqlite3
from system.data_user import User as du
from system.sql import SQLCommands as sqlc
from system.info_types import InfoTypes as it
class User:
""" A real implementation of the user data class """
def __init__(self):
... | 103 | 28.69 | 74 | 20 | 627 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2ae8984ea8c2d759_aed6e540", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
102
] | [
null
] | [
7
] | [
47
] | |
2024-11-19T01:35:05.887513+00:00 | 1,619,113,952,000 | f9e8f6a778852b375d62361ca62c091fa0ce6e7c | 3 | {
"blob_id": "f9e8f6a778852b375d62361ca62c091fa0ce6e7c",
"branch_name": "refs/heads/master",
"committer_date": 1619113952000,
"content_id": "19a088cc8f507737b80ab71db32f4018b494c0d7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "05ed9ff2d74c4f17d69424be8fffc5746482f8ad",
"extension": "py"... | 2.703125 | stackv2 | # #https://medium.com/@lily_su/accessing-s3-bucket-from-google-colab-16f7ee6c5b51
import os
import s3fs
class AWS(object):
def __init__(self, path_config):
self.path_config= path_config
self.fs = s3fs.S3FileSystem()
def generate_session_file(self,service_name,key_id,secret_key,region_n... | 26 | 33.19 | 81 | 13 | 213 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_03e9307f8b5e5e9e_ffb72801", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
19
] | [
null
] | [
21
] | [
25
] | |
2024-11-19T02:08:09.024978+00:00 | 1,538,483,257,000 | 778ad3dd99325c0e81321814eb7ccf6b9b005946 | 3 | {
"blob_id": "778ad3dd99325c0e81321814eb7ccf6b9b005946",
"branch_name": "refs/heads/master",
"committer_date": 1538483257000,
"content_id": "5519360cfdce129d6a7f3390e83136b21bf8ddb6",
"detected_licenses": [
"MIT"
],
"directory_id": "945b7bb0b86652c936b40e4a1850188d229aa8e7",
"extension": "py",
"fi... | 2.734375 | stackv2 | import requests
import json
url = 'https://localhost:8081/login'
data = {'username': 'admin', 'password': 'admin'}
try:
# Issue is here, gives the error
token = requests.post(url, data = json.dumps(data), headers = {'Content-type':'application/json'})
print('Status Code: ', token.status_code)
token_json = json.... | 22 | 37.95 | 116 | 12 | 210 | python | [{"finding_id": "codeql_py/request-without-cert-validation_7bfa4bfbd7d93a19_87dde935", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
17
] | [
null
] | [
11
] | [
117
] | |
2024-11-19T02:17:16.853569+00:00 | 1,609,074,339,000 | 6247ddeb0d4b7ee9eafeee5ddd1b4eae88a06828 | 4 | {
"blob_id": "6247ddeb0d4b7ee9eafeee5ddd1b4eae88a06828",
"branch_name": "refs/heads/main",
"committer_date": 1609074339000,
"content_id": "aaf18987a2e3781fb80de060c03c47445d7a66c8",
"detected_licenses": [
"MIT"
],
"directory_id": "562efe351ea884732d94e93fb6ba6f25b3c2844d",
"extension": "py",
"file... | 3.953125 | stackv2 | import random
import math
class SameNumError(Exception):
def __init__(self):
pass
def is_prime_number(n):
for i in range(2, n):
if n % i == 0:
return False
return True
def make_prime_list(n):
prime_list = []
for i in range(2, n):
if math.gcd(n, i) == 1:
... | 78 | 23.54 | 62 | 12 | 552 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e70bbcafa291fc05_79eae65d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
68
] | [
null
] | [
7
] | [
38
] | |
2024-11-19T02:18:09.672125+00:00 | 1,484,571,456,000 | 087bf57644f55777680937e8627e9c602b4e8667 | 3 | {
"blob_id": "087bf57644f55777680937e8627e9c602b4e8667",
"branch_name": "refs/heads/master",
"committer_date": 1484571456000,
"content_id": "8008e4261d1786173d80c4e773879cf10a207a54",
"detected_licenses": [
"MIT"
],
"directory_id": "a665d555e7741fa3d6b663283c29287d9d2ade36",
"extension": "py",
"fi... | 2.6875 | stackv2 | import jinja2
import click
import os
import yaml
@click.command()
@click.option('--config', '-c', type=click.File(mode='r'), default='./config.yml', help="Location of the config file. Defaults to ./config.yml")
@click.option('--skip-empty/--no-skip-empty', help="When set any template that produces an all whitepace res... | 52 | 47.92 | 157 | 22 | 623 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_87074d196ee77d34_1f97f507", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
22
] | [
null
] | [
15
] | [
67
] | |
2024-11-19T02:19:03.174042+00:00 | 1,626,117,656,000 | a586c8503fab81f37eb72119d682635ef20d636e | 3 | {
"blob_id": "a586c8503fab81f37eb72119d682635ef20d636e",
"branch_name": "refs/heads/main",
"committer_date": 1626117656000,
"content_id": "58c307307dd73cc587298f65f61e74e37b5c3e5b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fb8666ba2f687441fb462482ddc2465669ab815f",
"extension": "py",
... | 2.921875 | stackv2 | import os
import json
import requests
from pprint import pprint
from urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning)
# Constants, including ID from previously created object
BASE_URL = "https://netbox.lasthop.io/api/"
# ADDRESS_ID = "51"
A... | 46 | 26.61 | 79 | 11 | 313 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f5c8441144cc6411_4567d66c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
31
] | [
36
] | [
12
] | [
6
] | |
2024-11-19T02:29:57.206699+00:00 | 1,677,900,649,000 | 829ddbc6d8c8e421c6e73abf6b1c04c0f499bc07 | 3 | {
"blob_id": "829ddbc6d8c8e421c6e73abf6b1c04c0f499bc07",
"branch_name": "refs/heads/main",
"committer_date": 1677900649000,
"content_id": "24f3fd94ab922c209c5f701fe7e71a0f366725c1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3eb78230ac1700a95c0d4fcad3653251088a2b57",
"extension": "py",
... | 2.609375 | stackv2 | # Copyright 2022 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, ... | 121 | 47.51 | 130 | 18 | 1,680 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_ddccf37a44c75503_c312d66d", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [linkedin.com](1) may be at an arbitrary position in th... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [linkedin.com](1) may be at an arbitrary position in the sanitized URL."
] | [
86
] | [
null
] | [
8
] | [
60
] | |
2024-11-19T02:30:16.051655+00:00 | 1,687,854,217,000 | 3f8473a0a26f92f8ea957b09c60997bfa7d9505d | 3 | {
"blob_id": "3f8473a0a26f92f8ea957b09c60997bfa7d9505d",
"branch_name": "refs/heads/master",
"committer_date": 1687854217000,
"content_id": "87a7bec31ed0463b3e5755c899e7bf18de19cf2a",
"detected_licenses": [
"MIT"
],
"directory_id": "dbfd72349e10863d3b6bde2605efb04a5a2823cb",
"extension": "py",
"fi... | 2.71875 | stackv2 | from functools import wraps
from flask import jsonify
from app.pkgs.errors import Error, HttpStatusCode
class JsonResponse(object):
def __init__(self, d=None, http_status: int = 200):
if d is None:
d = {}
self.data: dict = d
self.http_status = http_status
def to_json(self)... | 34 | 27.29 | 109 | 19 | 210 | python | [{"finding_id": "codeql_py/stack-trace-exposure_cbb4106b36518708_ef80299d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
28
] | [
null
] | [
45
] | [
71
] | |
2024-11-19T02:30:24.182537+00:00 | 1,574,775,516,000 | e13dafa7da38ee175b64f77c0b04065176c2f594 | 2 | {
"blob_id": "e13dafa7da38ee175b64f77c0b04065176c2f594",
"branch_name": "refs/heads/master",
"committer_date": 1574775516000,
"content_id": "d3ad400d081628994812bbbf6f554a9847cdfb75",
"detected_licenses": [
"MIT"
],
"directory_id": "a41542bacafd67f0556436f93ace9dd206bb5029",
"extension": "py",
"fi... | 2.375 | stackv2 | from flask import render_template, flash, redirect, url_for, request
import requests
from app import app, db
from app.forms import LoginForm, RegistrationForm
from app.models import User, Liste_series,Notification
from flask_login import current_user, login_user, logout_user, login_required
from werkzeug.urls import ur... | 341 | 43.16 | 142 | 27 | 3,374 | python | [{"finding_id": "codeql_py/url-redirection_7f645bc88a7cd273_10de8417", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
303
] | [
null
] | [
29
] | [
38
] | |
2024-11-19T02:30:30.498875+00:00 | 1,634,631,547,000 | c3b02f2f1a6cf929deb4fb1ff6430312733e9e86 | 3 | {
"blob_id": "c3b02f2f1a6cf929deb4fb1ff6430312733e9e86",
"branch_name": "refs/heads/master",
"committer_date": 1634631547000,
"content_id": "df6b80cfe06d2551a912940465ebd8a4621bf4d5",
"detected_licenses": [
"MIT"
],
"directory_id": "034472fa6288d84d79be868514779303349e7603",
"extension": "py",
"fi... | 2.890625 | stackv2 | from flask import Flask, abort, redirect
app = Flask(__name__)
import argparse, os, pygments
from pygments import highlight
from pygments.lexers import guess_lexer
from pygments.formatters import HtmlFormatter
parser = argparse.ArgumentParser()
parser.add_argument("root_dir", help="Path to directory with pastes")
arg... | 51 | 25.98 | 69 | 14 | 321 | python | [{"finding_id": "codeql_py/path-injection_9eed760292e45c7a_0150b6e1", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
33,
37
] | [
null,
null
] | [
22,
19
] | [
32,
30
] | |
2024-11-19T02:30:39.314833+00:00 | 1,619,976,248,000 | a21e1bf67b1ce111232125633ae3c6b9cef3831d | 2 | {
"blob_id": "a21e1bf67b1ce111232125633ae3c6b9cef3831d",
"branch_name": "refs/heads/master",
"committer_date": 1619976248000,
"content_id": "b1259d063fe93478549d41bb3ad0ad84d8998c2b",
"detected_licenses": [
"MIT"
],
"directory_id": "12d1e9c367c1276d5d9af82387fedabfc0c10da4",
"extension": "py",
"fi... | 2.3125 | stackv2 | import os
from typing import Any
from pydantic import BaseSettings as Settings, conint
from pydantic import EmailStr, validator
from jinja2 import Environment, FileSystemLoader
from fastapi_mail.schemas import validate_path
from fastapi_mail.errors import TemplateFolderDoesNotExist
class ConnectionConfig(Settings):
... | 35 | 32.6 | 79 | 18 | 285 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_28bba474d522cda8_a45ebe03", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
33
] | [
34
] | [
32
] | [
48
] | |
2024-11-19T02:41:42.702350+00:00 | 1,621,031,180,000 | 4930c59df3bb84c8d085201265db1168f61c5189 | 3 | {
"blob_id": "4930c59df3bb84c8d085201265db1168f61c5189",
"branch_name": "refs/heads/main",
"committer_date": 1621031180000,
"content_id": "b973efd09fda894d121170a43f0cb9862dd1602d",
"detected_licenses": [
"MIT"
],
"directory_id": "eb67819e20914b8b400acc87c40c5658ed3039fc",
"extension": "py",
"file... | 2.546875 | stackv2 | from flask import request, flash, redirect, url_for, Blueprint
from sample import db, models, views, app
from sample.models import User
from werkzeug.security import generate_password_hash, check_password_hash
from flask_login import login_user, login_required, logout_user, current_user
import logging
logging.basicC... | 84 | 36.67 | 122 | 19 | 655 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1a8a9ab305283629_a1a1f545", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-117"
] | [
"py/clear-text-logging-sensitive-data",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This log entry depends on a [user-provided value](1)."
] | [
23,
23
] | [
null,
null
] | [
23,
23
] | [
56,
56
] | |
2024-11-19T02:41:56.623461+00:00 | 1,551,030,684,000 | 0d6b8ed101a9f17da4d28a01cb80acc072ef1809 | 2 | {
"blob_id": "0d6b8ed101a9f17da4d28a01cb80acc072ef1809",
"branch_name": "refs/heads/master",
"committer_date": 1551030684000,
"content_id": "59eb848d7588fd82eef7cd71e30181208cf20d2d",
"detected_licenses": [
"MIT"
],
"directory_id": "855dc9fcd4170923e8723b6946c09c5cae68e079",
"extension": "py",
"fi... | 2.34375 | stackv2 | from __future__ import unicode_literals
from contextlib import closing
import logging
import os
import os.path
import requests
from qiller.utils import ensure_file_dir_exists, retry_action, q_enc
logger = logging.getLogger(__name__)
def stream_download(destination, response):
ensure_file_dir_exists(destinatio... | 87 | 40.57 | 145 | 24 | 794 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_3f0e3f04cb9c6ce9_5fbbc308", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [compute-1.amazonaws.com](1) may be at an arbitrary pos... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [compute-1.amazonaws.com](1) may be at an arbitrary position in the sanitized URL."
] | [
79
] | [
null
] | [
44
] | [
82
] | |
2024-11-19T02:42:24.145717+00:00 | 1,686,471,682,000 | cb91e3abfee4e02e000da9ee7483fe590c5f0278 | 2 | {
"blob_id": "cb91e3abfee4e02e000da9ee7483fe590c5f0278",
"branch_name": "refs/heads/master",
"committer_date": 1686471682000,
"content_id": "e1e27bb073dbbef2546d4f3ed6893652107ed1ae",
"detected_licenses": [
"MIT"
],
"directory_id": "01f16569d84dc1f3287b03f7c000c17bb8ea0efa",
"extension": "py",
"fi... | 2.390625 | stackv2 | import marshmallow
from flask import Blueprint, Response, current_app, request
from flask_login import login_required
from stefan_on_software import post_manager
from stefan_on_software.contracts.publish_post import PublishPostContract
from stefan_on_software.post_manager import NoSuchPost
# Blueprint under which all ... | 85 | 31.89 | 86 | 15 | 627 | python | [{"finding_id": "codeql_py/stack-trace-exposure_6d8f3b98c0c2a0e9_85997305", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
18
] | [
null
] | [
46
] | [
80
] | |
2024-11-18T18:05:48.472470+00:00 | 1,247,873,413,000 | a344134e6effcf913ab484c98e844a2605094928 | 3 | {
"blob_id": "a344134e6effcf913ab484c98e844a2605094928",
"branch_name": "refs/heads/master",
"committer_date": 1247873413000,
"content_id": "c9ffacf913f6039a532362ea7ecdbc2abc894617",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fb68aae4c91fb889fe0e6654289a0e0ff3ded258",
"extension": "py"... | 2.515625 | stackv2 | #!/usr/bin/env python
#
# (c) Copyright 2009 Cloudera, Inc.
#
"""
makeJava.py --mainclass className --exec executableName --dir pathName
[--javaopts args]
creates a script named "executableName" in "pathName" that
launches className. Finds the appropriate class path entities for this.
"""
import os
import... | 134 | 23.75 | 77 | 14 | 944 | python | [{"finding_id": "codeql_py/overly-permissive-file_827b7ed30cc5ce72_d094129a", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
117
] | [
null
] | [
5
] | [
35
] | |
2024-11-18T18:05:48.641011+00:00 | 1,508,562,251,000 | d46f7d27e5b01c317f66a7ed7d10c645af8d3698 | 3 | {
"blob_id": "d46f7d27e5b01c317f66a7ed7d10c645af8d3698",
"branch_name": "refs/heads/master",
"committer_date": 1508562251000,
"content_id": "792993ea8996fb8af532a85c389d4c6c70ded691",
"detected_licenses": [
"MIT"
],
"directory_id": "6a71690c49250dde6885cff48687f23c550afdf0",
"extension": "py",
"fi... | 2.78125 | stackv2 | import pandas as pd
from nltk.stem.porter import PorterStemmer
import re
import numpy as np
import json
import sys
maxSeqLength = 30
ps = PorterStemmer()
def load_data_saved():
with open('stemmed_split_sentences','r') as myfile:
data = json.load(myfile)
return data
def load_data():
#file_path = '/home/rudresh/Des... | 169 | 31.19 | 86 | 15 | 1,598 | python | [{"finding_id": "codeql_py/overly-large-range_09e3787a4ff131f7_56864695", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=\\]."
] | [
44
] | [
null
] | [
36
] | [
39
] | |
2024-11-18T18:06:03.838171+00:00 | 1,516,068,785,000 | 34301092b860dd88840f8d75a8c7843080861670 | 2 | {
"blob_id": "34301092b860dd88840f8d75a8c7843080861670",
"branch_name": "refs/heads/master",
"committer_date": 1516068785000,
"content_id": "4d88e0f185fb8f293f981733a5dbd01247a08892",
"detected_licenses": [
"MIT"
],
"directory_id": "89219ee9fb81abe51ac1a161b874bc920aa1bb38",
"extension": "py",
"fi... | 2.40625 | stackv2 | import os
import signal
from flask import Flask
from flask import render_template
app = Flask(__name__)
signal.signal(signal.SIGINT, lambda s, f: os._exit(0))
@app.route("/")
def cacule():
page = '<html><body><h1>'
page += 'Hello world'
page += '</h1></body></html>'
return page
@app.route("/w")
def ... | 28 | 19.82 | 54 | 11 | 166 | python | [{"finding_id": "codeql_py/reflective-xss_334fac5bccacbacd_57202b66", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2)."
] | [
25
] | [
null
] | [
12
] | [
16
] | |
2024-11-18T18:15:54.936433+00:00 | 1,566,472,102,000 | 008b0e9134b8748ba78a57f7f010bef6b2f7dad9 | 3 | {
"blob_id": "008b0e9134b8748ba78a57f7f010bef6b2f7dad9",
"branch_name": "refs/heads/master",
"committer_date": 1566472102000,
"content_id": "dd873988b9d26b89b070d01c5f264fc53c95caa1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c5d4b263ec981a8e210d61ab5b92a83e95b0e6cb",
"extension": "py"... | 2.875 | stackv2 | import logging
from DAL import user_dal
from flask import Flask, render_template, request, redirect, url_for
import re
def first_deploy():
try:
username = request.form['username']
password = request.form['password']
re_password = request.form['re_password']
fullname = request.form[... | 44 | 40.27 | 132 | 15 | 385 | python | [{"finding_id": "codeql_py/polynomial-redos_147673ef535ec68a_a2b4b68c", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma... | 1 | true | [
"CWE-1333"
] | [
"py/polynomial-redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'."
] | [
42
] | [
null
] | [
24
] | [
32
] | |
2024-11-18T19:31:11.558437+00:00 | 1,476,400,358,000 | 0405ab8ac75c7e6ef067f47aab2c4c6685fd2740 | 3 | {
"blob_id": "0405ab8ac75c7e6ef067f47aab2c4c6685fd2740",
"branch_name": "refs/heads/master",
"committer_date": 1476400358000,
"content_id": "6cc789c554d005a1c89f67573b0bb66fc5ddfc38",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3872e80dc65030792830e055eec8bddb2b5c9a89",
"extension": "py"... | 2.640625 | stackv2 | #!/usr/bin/env python
"""Juniper PYEZ config operations."""
from getpass import getpass
from pprint import pprint
from jinja2 import Template
from jnpr.junos import Device
from jnpr.junos.utils.config import Config
from jnpr.junos.op.routes import RouteTable
# XML Templates
XML_TEMPLATE = """
<configuration>
... | 84 | 25.17 | 79 | 10 | 538 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_07cb16fe79efe455_5c7ce962", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
37
] | [
null
] | [
17
] | [
39
] | |
2024-11-18T20:08:57.681950+00:00 | 1,545,430,150,000 | cd5a36f5a4f8636ff69f62bebb0f564941668e9d | 2 | {
"blob_id": "cd5a36f5a4f8636ff69f62bebb0f564941668e9d",
"branch_name": "refs/heads/master",
"committer_date": 1545430150000,
"content_id": "5a92c1533560d4e72cfaa6d3aa8826ee6aedacb5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "93135b3ad13be4f361f52ce7892a62631cf99203",
"extension": "py"... | 2.46875 | stackv2 | """
Usage:
write_manifest.py [options] <study>
Arguments:
<study> Name of the study to process
Options:
-v --verbose Verbose logger
-d --debug Debug logger
-q --quiet Less debuggering
"""
from docopt import docopt
import sys, os, glob, log... | 219 | 33.61 | 151 | 18 | 1,770 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_87756d5bba856bca_71628637", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text."
] | [
126
] | [
null
] | [
24
] | [
93
] | |
2024-11-18T19:11:47.531159+00:00 | 1,493,173,382,000 | 12491cc31c5021a38cb40799492171c2d5b6b978 | 3 | {
"blob_id": "12491cc31c5021a38cb40799492171c2d5b6b978",
"branch_name": "refs/heads/master",
"committer_date": 1493173411000,
"content_id": "2b1f259a83bae568cc2c174067c26a27cb1b72d2",
"detected_licenses": [
"MIT"
],
"directory_id": "b6fca3e8032fb0b51bb8e1a5653c6fb40b3722fd",
"extension": "py",
"fi... | 3.171875 | stackv2 | """
URL Redirection
Summary:
Sends the HTTP header response based on the code received.
Converts the URL received into Location in the response.
Example:
$ curl -i http://127.0.0.1:5000/301/http://www.google.com
HTTP/1.0 301 Moved Permanently
Server: BaseHTTP/0.3 Python/2.7.5
Date: Wed, 19 Apr 2017 20:06:11 GMT
Locat... | 89 | 23.65 | 76 | 14 | 662 | python | [{"finding_id": "codeql_py/http-response-splitting_5d8dd99776b6b49e_1a32eb0b", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).", "remediation": "", "lo... | 1 | true | [
"CWE-113"
] | [
"py/http-response-splitting"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This HTTP header is constructed from a [user-provided value](1)."
] | [
74
] | [
null
] | [
35
] | [
38
] | |
2024-11-18T19:23:47.837268+00:00 | 1,608,139,179,000 | 2b98fd7c81736e00e33caf523cd5c646831c2940 | 2 | {
"blob_id": "2b98fd7c81736e00e33caf523cd5c646831c2940",
"branch_name": "refs/heads/master",
"committer_date": 1608139179000,
"content_id": "fe2d0991c0d6cb827b153199b19b27ffc3c01a7e",
"detected_licenses": [
"MIT"
],
"directory_id": "6b97237bfd9647f7a90c1d1c33b4453c07e56839",
"extension": "py",
"fi... | 2.421875 | stackv2 | """Push & Pull Actions."""
# Standard Library
from typing import Dict
from datetime import datetime
# Third Party
from httpx import AsyncClient
# Project
from routingpolicy.log import log
from routingpolicy.models.switch import Switch
async def get_current_config(switch: Switch) -> Dict:
"""Get the running con... | 45 | 29.78 | 81 | 18 | 277 | python | [{"finding_id": "codeql_py/request-without-cert-validation_a1c78669fe8fa84f_f22077c4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
22
] | [
37
] | [
21
] | [
10
] | |
2024-11-18T19:24:02.479274+00:00 | 1,595,319,634,000 | 82ccba33d9020fa9579b682cf04bb9f05f0ddced | 2 | {
"blob_id": "82ccba33d9020fa9579b682cf04bb9f05f0ddced",
"branch_name": "refs/heads/master",
"committer_date": 1595319634000,
"content_id": "60b1e52d24320c71c95c2e256e41d027c365a6c9",
"detected_licenses": [
"BSD-3-Clause",
"MIT"
],
"directory_id": "2cd584dc2ef99b5a60e9fc40022ab71589c5b356",
"ext... | 2.328125 | stackv2 | from flask import render_template, url_for, flash, redirect,request
from flaskblog import app,db,bcrypt
from flaskblog.forms import *
from flaskblog.models import User, Complaint
from flask_login import login_user,current_user,logout_user,login_required
from flask_datepicker import datepicker
import os
@app.route("/ho... | 172 | 38.19 | 117 | 17 | 1,391 | python | [{"finding_id": "codeql_py/url-redirection_0570aa63ffce1633_d9a01afc", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
23
] | [
null
] | [
29
] | [
38
] | |
2024-11-18T19:58:22.550645+00:00 | 1,693,578,280,000 | 2607c0dccaee5b730872d399df1428d05b48f81e | 3 | {
"blob_id": "2607c0dccaee5b730872d399df1428d05b48f81e",
"branch_name": "refs/heads/master",
"committer_date": 1693804803000,
"content_id": "962bf0b583214a4b51e810983269de906ea26065",
"detected_licenses": [
"MIT"
],
"directory_id": "bec0383f2afd255a72afeb9049a898615e547327",
"extension": "py",
"fi... | 2.671875 | stackv2 | #!/usr/bin/env python3
#
# Electron Cash - a lightweight Bitcoin Cash client
# CashFusion - an advanced coin anonymizer
#
# Copyright (C) 2020 Mark B. Lundeberg
#
# Permission is hereby granted, free of charge, to any person
# obtaining a copy of this software and associated documentation files
# (the "Software"), to d... | 193 | 33.28 | 100 | 19 | 1,403 | python | [{"finding_id": "codeql_py/insecure-protocol_6470f28229374038_32eb466f", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)."
] | [
74
] | [
null
] | [
27
] | [
37
] | |
2024-11-18T19:58:32.861650+00:00 | 1,390,164,224,000 | 96540811d9facf16736b4c74ef64948c0f8af35a | 3 | {
"blob_id": "96540811d9facf16736b4c74ef64948c0f8af35a",
"branch_name": "refs/heads/master",
"committer_date": 1390164224000,
"content_id": "1ad13872affc00a3a73f556f218ac172d194033c",
"detected_licenses": [
"MIT"
],
"directory_id": "0c12a573f7950bd96cc721227ff8bd558dfc222a",
"extension": "py",
"fi... | 2.609375 | stackv2 | # encoding: utf-8
import os.path
import urllib.parse
from abc import ABCMeta, abstractmethod
import requests
from requests.exceptions import HTTPError
from utils import EmptyProgressMonitor
class Service(metaclass=ABCMeta):
def __init__(self, baseURL, username = '', password = ''):
self.baseURL = baseU... | 98 | 40.48 | 116 | 21 | 763 | python | [{"finding_id": "codeql_py/request-without-cert-validation_98e88b345282effd_3c0ed1ef", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
78
] | [
null
] | [
13
] | [
100
] | |
2024-11-18T19:58:34.295762+00:00 | 1,628,254,358,000 | 7043bd30eb0f6712528c51ef9a00c9ed434ac2d8 | 3 | {
"blob_id": "7043bd30eb0f6712528c51ef9a00c9ed434ac2d8",
"branch_name": "refs/heads/master",
"committer_date": 1628254358000,
"content_id": "7a6e7700ea679d37485b7a2995cfaa8c5158ffbd",
"detected_licenses": [
"MIT"
],
"directory_id": "95b2a446cb611eb87455b7c265aa28ba0fc80323",
"extension": "py",
"fi... | 3.46875 | stackv2 | import pyperclip
from user_details import User, Credentials
def create_user(username,password):
'''
Create new user account
'''
new_user = User(username,password)
return new_user
def save_user(user):
'''
Save a new user account
'''
user.save_user()
def verify_user(username,p... | 155 | 27.46 | 131 | 26 | 1,022 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7006ec777c35e3db_61d598cd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive dat... | [
72,
117,
125
] | [
null,
null,
null
] | [
10,
13,
15
] | [
76,
112,
127
] | |
2024-11-18T19:58:37.647517+00:00 | 1,605,184,746,000 | aba6148a464987084379a32595152ef40b7f7356 | 3 | {
"blob_id": "aba6148a464987084379a32595152ef40b7f7356",
"branch_name": "refs/heads/main",
"committer_date": 1605184746000,
"content_id": "464a759a51b6962fd623c503b26c2f6f54cd250f",
"detected_licenses": [
"MIT"
],
"directory_id": "e52b90b89b31c6deab8151fc53f9043efaab0663",
"extension": "py",
"file... | 2.765625 | stackv2 | import re
# Basic Items
def String(obj):
return type(obj) == str
def Number(obj):
return type(obj) == int
def List(obj):
return type(obj) == list
def Dict(obj):
return type(obj) == dict
# ID Items
def WeChatID(obj):
return re.compile(r"^[a-zA-Z]{1}[-_a-zA-Z0-9]{5,19}$").match(obj)
de... | 91 | 16.12 | 166 | 11 | 588 | python | [{"finding_id": "codeql_py/overly-large-range_6977da6b1dd491d4_53d71de9", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
60
] | [
null
] | [
29
] | [
32
] | |
2024-11-18T18:39:32.961000+00:00 | 1,692,996,663,000 | fc93938bd7528001e2fe961b7805c4b3bc0f431c | 2 | {
"blob_id": "fc93938bd7528001e2fe961b7805c4b3bc0f431c",
"branch_name": "refs/heads/master",
"committer_date": 1692996663000,
"content_id": "851854255cc80d9753725457f33cfa4b4f9fb03d",
"detected_licenses": [
"MIT"
],
"directory_id": "05d880e660c32c9a4b4754d7246e388f3c59e6e0",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
'''
RRFRaptor
Learn more about RRF on https://f5nlg.wordpress.com
73 & 88 de F4HWN Armel
'''
import settings as s
import requests
import os
import time
import datetime
import json
import sys
# Usage
def usage():
print('Usage: RRFRaptor.py [options ...]')
print()... | 141 | 31.44 | 111 | 23 | 1,137 | python | [{"finding_id": "codeql_py/request-without-cert-validation_7d2d1e70d97a0992_317e71ce", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
41
] | [
null
] | [
13
] | [
82
] | |
2024-11-18T18:39:40.093608+00:00 | 1,563,442,739,000 | 69c90e44e3bbaa494415a81fd2ab4bb5f790278c | 3 | {
"blob_id": "69c90e44e3bbaa494415a81fd2ab4bb5f790278c",
"branch_name": "refs/heads/master",
"committer_date": 1563442739000,
"content_id": "f543261ec716677633de64eaabe6946d41527db9",
"detected_licenses": [
"MIT"
],
"directory_id": "799b8dc58cf64d74d267c76d91a7f87eb459563d",
"extension": "py",
"fi... | 2.59375 | stackv2 | import argparse
import multiprocessing
import time
import requests
import json
import os
import urllib
import hashlib
from functools import partial
"""
Arma 3 Mod Download Script
by RealLifeRPG Team - www.realliferpg.de
More Info: https://github.com/A3ReallifeRPG/PboSignTool
"""
def main():
parser = argparse.A... | 142 | 30.05 | 120 | 20 | 1,091 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_325ff85f25cce447_86a1ef61", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
50,
127
] | [
null,
null
] | [
11,
23
] | [
96,
46
] | |
2024-11-18T18:39:45.813105+00:00 | 1,583,314,969,000 | dce8114df903ab93573b22b6487c173c9fe616b4 | 2 | {
"blob_id": "dce8114df903ab93573b22b6487c173c9fe616b4",
"branch_name": "refs/heads/master",
"committer_date": 1583314969000,
"content_id": "079012a47ba9b915fe3b2565084ff7ffa9c44e59",
"detected_licenses": [
"MIT"
],
"directory_id": "d546db2e57754e3bdae4cf45a978d7b1b823a5c6",
"extension": "py",
"fi... | 2.421875 | stackv2 | # vim: set ts=4 sw=4 et: -*- coding: utf-8 -*-
from __future__ import absolute_import
from __future__ import print_function
import os
import re
import sys
import json
import requests
import argparse
import time
import codecs
from datetime import datetime
from bs4 import BeautifulSoup
from six import u
__version__ = '... | 262 | 43.09 | 147 | 27 | 2,863 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e6d727e700703528_84cfa2b1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2).",
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
66,
136
] | [
69,
null
] | [
24,
16
] | [
18,
78
] | |
2024-11-18T18:39:49.557117+00:00 | 1,452,429,131,000 | 84d91785b318f944f392a1b1093346c005b03e7c | 3 | {
"blob_id": "84d91785b318f944f392a1b1093346c005b03e7c",
"branch_name": "refs/heads/master",
"committer_date": 1452429131000,
"content_id": "d07b912877c802ad7f061108c7ca90e57c5b1a8b",
"detected_licenses": [
"MIT"
],
"directory_id": "8e5e2fbb499ed178785c59f6f8a125d9e0a2501a",
"extension": "py",
"fi... | 3.3125 | stackv2 | # Name: python_postRequest.py
# Haupt-Funktion: sendet die aktuelle Position mit dem Zeitstempel an den Server
__author__ = "BKonstantin"
__date__ = "$14.12.2015 13:29:04$"
#if __name__ == "__main__":
# print ("start postRequest...")
# Imports:
# Die Bibliothek "requests" muss vorher installiert werden.
import re... | 56 | 37.12 | 101 | 11 | 595 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5bbf0a860f31471d_82fc6e11", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
19
] | [
null
] | [
8
] | [
33
] | |
2024-11-18T18:39:59.564526+00:00 | 1,573,882,923,000 | f06e146b2373c317333e9ff19622e965a9d562e5 | 3 | {
"blob_id": "f06e146b2373c317333e9ff19622e965a9d562e5",
"branch_name": "refs/heads/master",
"committer_date": 1573882923000,
"content_id": "64a520ce50f6a98d878fc18c5f86782ef17c04e9",
"detected_licenses": [
"MIT"
],
"directory_id": "c57f5785f2581070fabbe91d2c24a98b63c6e913",
"extension": "py",
"fi... | 2.828125 | stackv2 | #!/usr/bin/python3.7
from dataclasses import dataclass
import re
import sys
import argparse
from pathlib import Path
#Convert C header files to nasm
NASM_INCLUDE_SUFFIX = ".inc"
DIRECTIVE_START_TOKEN = "#"
#Currently only #define directives are recognized
DIRECTIVE_PATTERN = "#(\t|\s)*define(\t|\s)*(([a-zA-Z0-9_]|[\u... | 73 | 39.96 | 152 | 14 | 740 | python | [{"finding_id": "codeql_py/redos_0ce9cc0a6a57daa0_6a32522b", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '#' and containing many repetition... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '#' and containing many repetitions of '\\t'.",
"This part of the regular expression may cause exponential backtracking on strings starting with '\\\\' and containing many repetitions of '\\t'."
] | [
13,
14
] | [
null,
null
] | [
23,
21
] | [
30,
28
] | |
2024-11-18T18:40:03.088521+00:00 | 1,576,261,075,000 | 99b894e71c3d60eb1a5c1a1e6b0d168ae94503a4 | 2 | {
"blob_id": "99b894e71c3d60eb1a5c1a1e6b0d168ae94503a4",
"branch_name": "refs/heads/master",
"committer_date": 1576594575000,
"content_id": "b8d580c8d53b1879bf0d45284884e077ab4ffd87",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "506c00ed836a04a902efab514ac9c9637c11a355",
"extension": "p... | 2.390625 | stackv2 | """
Copyright (c) 2019 Red Hat, Inc
All rights reserved.
This software may be modified and distributed under the terms
of the BSD license. See the LICENSE file for details.
Downloads and unpacks the source code archive from Cachito and sets appropriate build args.
"""
from __future__ import absolute_import
import t... | 50 | 31.32 | 91 | 14 | 330 | python | [{"finding_id": "codeql_py/tarslip_623e146e39c4d156_7aeb7af2", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
45
] | [
null
] | [
13
] | [
15
] | |
2024-11-18T20:52:23.833563+00:00 | 1,590,261,682,000 | de404b376d9e6f5370747a13399abae74a0fabf1 | 3 | {
"blob_id": "de404b376d9e6f5370747a13399abae74a0fabf1",
"branch_name": "refs/heads/master",
"committer_date": 1590261682000,
"content_id": "bd8e65d0928a485ec449331f37e0e5cf5edc0c6a",
"detected_licenses": [
"MIT"
],
"directory_id": "a46b064486b703b5424a5e59fb6d567a0c08d480",
"extension": "py",
"fi... | 2.8125 | stackv2 | """
IPython magic function to provide notifications via PushBullet
Author: Nicholas Youngblut <nyoungb2@gmail.com>
[6~License: MIT
"""
from __future__ import print_function
import os
import sys
import re
import time
import subprocess
import IPython
from socket import gethostname
from IPython.core.magic import Magics
... | 221 | 32.94 | 125 | 18 | 1,650 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d6268de786e6c9d9_972a886d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
144
] | [
null
] | [
19
] | [
64
] | |
2024-11-18T20:15:48.449573+00:00 | 1,592,340,417,000 | b3100ae2d3e71059780e9455aa565c0b655ff4ea | 3 | {
"blob_id": "b3100ae2d3e71059780e9455aa565c0b655ff4ea",
"branch_name": "refs/heads/master",
"committer_date": 1592340417000,
"content_id": "d0e8f60a24305dcfa958e9016bf1b54bc950c4d0",
"detected_licenses": [
"MIT"
],
"directory_id": "79b05ea38c5d06d1b9554796176fe256d369954f",
"extension": "py",
"fi... | 2.609375 | stackv2 | from flask import Flask, request, jsonify
import re
import string
import requests
from bs4 import BeautifulSoup
from sklearn.feature_extraction.text import CountVectorizer, TfidfTransformer
import joblib
import numpy as np
app = Flask(__name__)
# load the model
clf = joblib.load('models/voting_model.pkl')
def remove... | 41 | 23.95 | 77 | 13 | 242 | python | [{"finding_id": "codeql_py/full-ssrf_a867342f6aa76cc2_a60989f1", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
24
] | [
null
] | [
12
] | [
29
] | |
2024-11-18T19:23:08.058636+00:00 | 1,641,757,863,000 | 2fc2d0d6f9400c40792ebe02edd71a68290f4697 | 3 | {
"blob_id": "2fc2d0d6f9400c40792ebe02edd71a68290f4697",
"branch_name": "refs/heads/master",
"committer_date": 1641757863000,
"content_id": "b920bc175a93cce813b7ea7603c126b625eb1d86",
"detected_licenses": [
"MIT"
],
"directory_id": "8a5d20b5e9b3d9a5360ed6be168df4c79449fc96",
"extension": "py",
"fi... | 2.625 | stackv2 | from difflib import SequenceMatcher
from c_shared import *
def StrSimilar( a,b ):
return SequenceMatcher( None, a, b ).ratio()
class RelationshipType( IntEnum ):
ROMANTIC = 0,
PLATONIC = 1
class Relationship:
def __init__( self, characters, type ):
self.characters = characters
self.ty... | 312 | 37.1 | 140 | 22 | 3,114 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_99bcb752a62c023c_9c71402b", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.fanfiction.net/](1) may be at an arbitrary positio... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [www.fanfiction.net/](1) may be at an arbitrary position in the sanitized URL.",
"The string [archiveofourown.org/](1) may be at an arbitrary position in the sanitized URL."
] | [
126,
128
] | [
null,
null
] | [
12,
14
] | [
40,
43
] | |
2024-11-18T19:38:38.983191+00:00 | 1,524,439,530,000 | 948b9b251cb69ce020f0929aa108de1575a4146c | 3 | {
"blob_id": "948b9b251cb69ce020f0929aa108de1575a4146c",
"branch_name": "refs/heads/master",
"committer_date": 1524439530000,
"content_id": "9a55e4246d65305ee9d36429daddf81b9172cd12",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "50894d5f93d3d3334dc284ab04679143292aaf85",
"extension": "p... | 2.546875 | stackv2 | # -*- coding: utf-8 -*-
import paramiko
import sys
from scp import SCPClient
import time
import random
class sshObject():
def __init__(self, ipAddress=None, user=None, password=None, port=22, ssh_key=None):
self.ipAddress = ipAddress
self.user = user
self.password = password
self.s... | 55 | 25.09 | 107 | 15 | 330 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_f977097ebd729554_d84e1d87", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
38
] | [
null
] | [
13
] | [
70
] | |
2024-11-18T20:10:38.223807+00:00 | 1,628,769,677,000 | 9af48a580f98c4928b648f71a8e31330e173fb0a | 2 | {
"blob_id": "9af48a580f98c4928b648f71a8e31330e173fb0a",
"branch_name": "refs/heads/main",
"committer_date": 1628769677000,
"content_id": "d4de3dac7071c747cc2e5f37f2cd4339761cbdfc",
"detected_licenses": [
"MIT"
],
"directory_id": "170d78048845de95179689b06a76358dafe8248b",
"extension": "py",
"file... | 2.328125 | stackv2 | from flask import *
from db import login_mysql
mydb, cursor = login_mysql.login()
app = Flask(__name__)
@app.route("/main")
def mainpage():
from db import queries
influencer = queries.main_influencer()
brand = queries.main_brand()
##influencer, brand = jsonify(influencer, brand)
return render_tem... | 29 | 21.9 | 81 | 9 | 166 | python | [{"finding_id": "codeql_py/flask-debug_9e85cd3b603690b9_6434230f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
28,
19
] | [
null,
null
] | [
null,
12
] | [
31,
32
] | |
2024-11-18T20:10:39.671817+00:00 | 1,411,193,655,000 | 7b2593b288e13fd821a546a2792479e973727580 | 2 | {
"blob_id": "7b2593b288e13fd821a546a2792479e973727580",
"branch_name": "refs/heads/master",
"committer_date": 1411193655000,
"content_id": "953a730d154855f54615cc6d98ae95a6767eb42a",
"detected_licenses": [
"MIT"
],
"directory_id": "a17b4761f5cc9148ed65748bcab79cc0a54067f7",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/python
# coding: utf-8
import os
import sys
import urllib
import codecs
import glob
import commands
import time
import re
import BaseHTTPServer
import SocketServer
wwwpath = sys.argv[1]
pypath = os.path.realpath(sys.path[0])
actions = {
"/editor":"/html/editor.html",
"/":"/html/index.html",
}
de... | 163 | 29.72 | 90 | 18 | 1,148 | python | [{"finding_id": "codeql_py/polynomial-redos_07216f4e1107b2e1_40ee8aee", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin... | 4 | true | [
"CWE-1333",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/polynomial-redos",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with 'Content-Disposition' and with many repetitions of 'Content-Disposition'.\nThis [regular expression](1) that depends on a [user-provided value](3) may run slow on strings starting with 'Content-Disposition... | [
120,
62,
63,
131
] | [
null,
null,
null,
null
] | [
79,
27,
22,
24
] | [
83,
29,
24,
29
] | |
2024-11-18T20:10:42.641928+00:00 | 1,658,741,208,000 | 5b22ba4ccd80aae060c3266c15a1131694ec1727 | 2 | {
"blob_id": "5b22ba4ccd80aae060c3266c15a1131694ec1727",
"branch_name": "refs/heads/master",
"committer_date": 1658741208000,
"content_id": "4a15e4c15324eaf081f48978013234f10610c5cb",
"detected_licenses": [
"MIT"
],
"directory_id": "17129a158a4c1eba65dcda16033a44062df5f38a",
"extension": "py",
"fi... | 2.328125 | stackv2 | #from flask import Flask
#from flask import render_template
#from flask import request
#from PIL import Image
from prediction import *
import os
import cv2
from flask import Flask, render_template, request,jsonify
from PIL import Image
import tensorflow as tf
#import jinja2
app=Flask(__name__)
#app.jinja_env.line_state... | 61 | 27.92 | 76 | 17 | 350 | python | [{"finding_id": "codeql_py/flask-debug_ef3823e45b8ffc33_77de50b4", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
61,
31
] | [
null,
null
] | [
5,
27
] | [
24,
28
] | |
2024-11-18T20:10:49.706628+00:00 | 1,584,126,208,000 | e3b0a5833fb053be978083ea4eb42da5b8d95c6e | 3 | {
"blob_id": "e3b0a5833fb053be978083ea4eb42da5b8d95c6e",
"branch_name": "refs/heads/master",
"committer_date": 1584126208000,
"content_id": "981f98976a4302106e2fe746ed949c657a4e4ac2",
"detected_licenses": [
"MIT"
],
"directory_id": "322ac7676c4af546f6cf2500a8daacfdbc04d1e5",
"extension": "py",
"fi... | 3.078125 | stackv2 | '''
This script guides users to answer questions and fills in the
details in config and settings files as appropriate.
'''
import os
import glob
import sys
import re
from jinja2 import Environment, FileSystemLoader
from Crypto.Cipher import DES
def take_inputs():
params = {}
print('Please enter inputs as pr... | 187 | 42.84 | 142 | 15 | 1,814 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_213e6196599c2a1c_f70898c7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
162,
173
] | [
null,
null
] | [
11,
15
] | [
59,
65
] | |
2024-11-18T20:11:08.018136+00:00 | 1,624,239,504,000 | 3705b568503d1b305d53fc4b5ea27549f7be9116 | 4 | {
"blob_id": "3705b568503d1b305d53fc4b5ea27549f7be9116",
"branch_name": "refs/heads/main",
"committer_date": 1624239504000,
"content_id": "10a69fc85cb6273c2277059e255063af561c3c70",
"detected_licenses": [
"MIT"
],
"directory_id": "17deb76479a63682ba72d8e141c45c98dff8407f",
"extension": "py",
"file... | 4.09375 | stackv2 | import random
import string
def generate_password():
"""
Generate a password formed from randomized uppercase and lowercase
letters, numbers, and symbols. Make it as long as the user wants.
Print out the password.
"""
while True:
valid_lengths = list(range(1, 95))
valid_lengths... | 35 | 26.74 | 71 | 13 | 201 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_927fa0a933ee36f1_806e079a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
30
] | [
null
] | [
19
] | [
45
] | |
2024-11-18T20:26:04.682111+00:00 | 1,576,672,002,000 | ff2bbed549d5718e3c74c375bdc6b52227a5aa6d | 3 | {
"blob_id": "ff2bbed549d5718e3c74c375bdc6b52227a5aa6d",
"branch_name": "refs/heads/master",
"committer_date": 1576672002000,
"content_id": "feb2f6b39fa94406d72e9f0eec3eaaea1da5de4e",
"detected_licenses": [
"MIT"
],
"directory_id": "8bcf3479416767f75ee65ffb144cfb375842eda4",
"extension": "py",
"fi... | 2.796875 | stackv2 | # coding: utf-8
"""
@author: zc12345
@contact: 18292885866@163.com
@file: 02_end2end_ml_project.py
@time: 2019/4/22 22:02
@description:
"""
import os
import tarfile
from six.moves import urllib
import pandas as pd
from pandas.plotting import scatter_matrix
import matplotlib.pyplot as plt
from sklearn.model_selectio... | 144 | 31.12 | 98 | 13 | 1,256 | python | [{"finding_id": "codeql_py/tarslip_03f8d91777f2d1e2_f8fba5d3", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
31
] | [
null
] | [
5
] | [
13
] | |
2024-11-18T20:26:24.807864+00:00 | 1,529,690,606,000 | b8768e59736b7a1e02ad8e8ec4fdcdeadfb903e6 | 3 | {
"blob_id": "b8768e59736b7a1e02ad8e8ec4fdcdeadfb903e6",
"branch_name": "refs/heads/master",
"committer_date": 1529690606000,
"content_id": "f88599fa0a766e9de4d140834b8771a340547fd4",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "f9e1cb63cf064c092b2a8cfe6d05d6559466ab92",
"extension": "p... | 2.875 | stackv2 | #!/usr/bin/python3
from abc import ABC, abstractmethod
import base64
from getpass import getpass
from hashlib import sha384
from os import environ
from sys import argv, exit
import bcrypt
filestore = '/etc/openvpn/server/store.txt'
# abstract out implementation backends
class PassStore(ABC):
@abstractmethod
... | 77 | 24.94 | 106 | 25 | 499 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_85c8bcab1e2729d5_d2510abc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA384) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA384) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
53
] | [
null
] | [
72
] | [
83
] | |
2024-11-18T20:26:37.054634+00:00 | 1,503,659,650,000 | 0157f7236c58e44afdde565fbd2d2c5004990d76 | 2 | {
"blob_id": "0157f7236c58e44afdde565fbd2d2c5004990d76",
"branch_name": "refs/heads/master",
"committer_date": 1503659650000,
"content_id": "e6e39f80b013f1b21a3e49d3eec1f8f832156618",
"detected_licenses": [
"MIT"
],
"directory_id": "d0057dd617061d51f02f47928a57fb8fd59400f0",
"extension": "py",
"fi... | 2.4375 | stackv2 | from flask import Flask
from flask import render_template, flash, request, redirect, url_for, session
from werkzeug.utils import secure_filename
from passlib.hash import pbkdf2_sha512
from functools import wraps
import datetime
import paramiko
import os
from bson.objectid import ObjectId
from dbconnect import connec... | 331 | 31.86 | 145 | 24 | 2,381 | python | [{"finding_id": "codeql_py/url-redirection_d437aabe899a1864_07fccd09", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
196
] | [
null
] | [
29
] | [
40
] | |
2024-11-18T20:26:37.495942+00:00 | 1,501,228,286,000 | 4c62d742ae26eeee72a282113282d4e789ec1977 | 2 | {
"blob_id": "4c62d742ae26eeee72a282113282d4e789ec1977",
"branch_name": "refs/heads/master",
"committer_date": 1502039645000,
"content_id": "061b23a6456d8878b2a71b34627dbe36ac06fb9f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8d6e30eb770e9ebb409ba50726e72c04caec5cb3",
"extension": "py"... | 2.3125 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
#
# Copyright 2016, 2017 Kairo Araujo
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unl... | 265 | 39.01 | 79 | 31 | 2,213 | python | [{"finding_id": "codeql_py/overly-large-range_fe6e16b9927a55ba_20866ef6", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class.", "remediation": "", "loc... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class."
] | [
222
] | [
null
] | [
47
] | [
50
] | |
2024-11-18T20:26:48.062011+00:00 | 1,651,730,868,000 | 06f59d2fdf12a062635924b6625fd3ba4ee43827 | 3 | {
"blob_id": "06f59d2fdf12a062635924b6625fd3ba4ee43827",
"branch_name": "refs/heads/master",
"committer_date": 1651730868000,
"content_id": "efc7e293be936dbd77ade3e7cd47967f2a438e2c",
"detected_licenses": [
"MIT"
],
"directory_id": "5dc830740b6735ddb1b720bb36c45b9337f56968",
"extension": "py",
"fi... | 2.59375 | stackv2 | from flask import flash, redirect, render_template, request, url_for
from flask_login import current_user, login_required
from flaskeddit.auth import auth_blueprint, auth_service
from flaskeddit.auth.forms import LoginForm, RegisterForm
@auth_blueprint.route("/register", methods=["GET", "POST"])
def register():
... | 57 | 34.93 | 86 | 16 | 412 | python | [{"finding_id": "codeql_py/url-redirection_e34dbc54a0bc5d09_8dec77a1", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
42
] | [
null
] | [
29
] | [
42
] | |
2024-11-18T20:27:04.684171+00:00 | 1,571,023,450,000 | 50fb6d84956a6099fb27417f9bb1fb4c2bcf6582 | 2 | {
"blob_id": "50fb6d84956a6099fb27417f9bb1fb4c2bcf6582",
"branch_name": "refs/heads/master",
"committer_date": 1571023450000,
"content_id": "33a012f37d9d966667772acff9df5b98fa761611",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b491b2c01e11f36cb34eac1d0cd7e5597f960237",
"extension": "py"... | 2.484375 | stackv2 | #!/usr/bin/env python3
from flask import Flask, request, abort, jsonify
from timeout_decorator import timeout
import logging
import socket
import platform
import os
# App for uwsgi
app = Flask(__name__)
ENDPOINT = os.getenv('ENDPOINT', '192.168.1.104')
ENDPOINT_PORT = 8899
INTERNAL_ADDRESS = [0x11, 0x0e, 0x59]
BUFFE... | 205 | 33.18 | 155 | 17 | 1,786 | python | [{"finding_id": "codeql_py/log-injection_78925a6321ba1dec_b735d1f3", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)... | 7 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends o... | [
91,
101,
101,
101,
101,
101,
101
] | [
null,
null,
null,
null,
null,
null,
null
] | [
50,
9,
15,
20,
27,
33,
40
] | [
54,
13,
18,
25,
31,
38,
50
] | |
2024-11-18T20:52:07.157288+00:00 | 1,671,574,166,000 | c4399a53c25e43b8fdb324f135c32e83cb6e697b | 2 | {
"blob_id": "c4399a53c25e43b8fdb324f135c32e83cb6e697b",
"branch_name": "refs/heads/main",
"committer_date": 1671574166000,
"content_id": "a929ed681246d4ffc8b8a58ec8c2378318fa854a",
"detected_licenses": [
"ISC"
],
"directory_id": "7113b9475f09687620afa54b6f8d7a591e6f9765",
"extension": "py",
"file... | 2.375 | stackv2 | #!/usr/bin/env python
import configparser
import requests
import sys
from argparse import ArgumentParser
from chopt import chopt
from pathlib import Path
from urllib3.exceptions import InsecureRequestWarning
# Suppress only the single warning from urllib3 needed.
requests.packages.urllib3.disable_warnings(category=In... | 246 | 27.81 | 88 | 27 | 1,537 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c9d192eb45ea6d88_b5db69a1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 6 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
80,
105,
141,
159,
176,
183
] | [
84,
109,
145,
163,
178,
187
] | [
20,
20,
16,
12,
12,
20
] | [
10,
10,
10,
6,
6,
10
] | |
2024-11-18T20:52:19.151202+00:00 | 1,580,400,828,000 | 531ccc4a3b438b979ac0fc62694db6c4be936ffb | 3 | {
"blob_id": "531ccc4a3b438b979ac0fc62694db6c4be936ffb",
"branch_name": "refs/heads/master",
"committer_date": 1580400828000,
"content_id": "9fa06520e638ed843832b33c87e224c8146bb49a",
"detected_licenses": [
"MIT"
],
"directory_id": "576150a5ae18e78be2ac3d0188029587ebdf6926",
"extension": "py",
"fi... | 2.65625 | stackv2 | import json
import datetime
import logging.config
import boto3
import uuid
fleet = [
{"Name": "Bucephalus", "Color": "Golden", "Gender": "Male",},
{"Name": "Shadowfax", "Color": "White", "Gender": "Male",},
{"Name": "Rocinante", "Color": "Yellow", "Gender": "Female",},
]
FORMAT = "%(asctime)s - %(name)s ... | 76 | 23.41 | 66 | 15 | 465 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3c61bf8f6948892c_7c1cac97", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
45
] | [
46
] | [
9
] | [
41
] | |
2024-11-18T20:52:28.481545+00:00 | 1,374,844,520,000 | fa83f1b9f24fb8c3a8b53d13cbcf3f6680211837 | 2 | {
"blob_id": "fa83f1b9f24fb8c3a8b53d13cbcf3f6680211837",
"branch_name": "refs/heads/master",
"committer_date": 1374844520000,
"content_id": "83e9e51a9ecf736284b74bae70be8253bb1710a4",
"detected_licenses": [
"MIT"
],
"directory_id": "1ad91af6931ef6367e9277f950303714af405410",
"extension": "py",
"fi... | 2.390625 | stackv2 | from wsgiref.util import setup_testing_defaults
from wsgiref.simple_server import make_server
import os
def callXemark(fullpath):
return os.popen("./xemark < %s" % fullpath).read()
def xemarkapp(environ, start_response):
status = '200 OK'
headers = [('Content-Type', 'text/html')]
file_requested = environ['PATH_... | 37 | 25.89 | 65 | 11 | 279 | python | [{"finding_id": "codeql_py/command-line-injection_3c455418c14cc07b_b46a7ea1", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 2 | true | [
"CWE-078",
"CWE-022"
] | [
"py/command-line-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
6,
28
] | [
null,
null
] | [
18,
32
] | [
44,
50
] | |
2024-11-18T19:02:32.853742+00:00 | 1,566,909,790,000 | 289492333c59c1b0bf20eb371a09391b20f63b65 | 4 | {
"blob_id": "289492333c59c1b0bf20eb371a09391b20f63b65",
"branch_name": "refs/heads/master",
"committer_date": 1566909790000,
"content_id": "edcbee11407d7ab2738b79399e97b70ffc47b477",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "197d545a51ee3aa6985f2c9f334a2f9216ee6e7d",
"extension": "py"... | 3.84375 | stackv2 | # 练习一
name = " alberT"
# 1 移除 name 变量对应的值两边的空格,并输出处理结果
print(name.strip())
# 2 判断 name 变量对应的值是否以 "al" 开头,并输出结果
print(name.strip().find('al', 0, 2))
print(name.startswith('al'))
# 3 判断 name 变量对应的值是否以 "T" 结尾,并输出结果
print(name.strip().find('T', -1))
print(name.endswith('T'))
# 4 将 name 变量对应的值中的 “l” 替换为 “p”,并输出结果
print(name... | 198 | 21.34 | 87 | 17 | 1,631 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3ae4c849cafe680a_e9843cc5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
101
] | [
null
] | [
7
] | [
8
] | |
2024-11-18T19:02:47.169877+00:00 | 1,624,462,239,000 | 27886a8f2cccd089024a6e3b6a2a4ece4e670b00 | 2 | {
"blob_id": "27886a8f2cccd089024a6e3b6a2a4ece4e670b00",
"branch_name": "refs/heads/main",
"committer_date": 1624462239000,
"content_id": "f85a01fdd02dd9c4182290bcb82ea3e0a231c6da",
"detected_licenses": [
"MIT"
],
"directory_id": "880ef0bb367228d487680dd8bace85938b9057ab",
"extension": "py",
"file... | 2.484375 | stackv2 | # import the necessary packages
from color_descriptor import ColorDescriptor
from searcher import Searcher
import cv2
from flask import Flask, request, jsonify
import os
import uuid
app = Flask(__name__)
@app.route('/upload/', methods=['POST'])
def upload():
if request.method == 'POST':
file = request.f... | 44 | 27.23 | 62 | 14 | 284 | python | [{"finding_id": "codeql_py/flask-debug_ceb2c07738cd9d82_addc4e75", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
44,
19,
38
] | [
null,
null,
null
] | [
5,
19,
19
] | [
35,
49,
36
] | |
2024-11-18T19:02:53.743958+00:00 | 1,638,440,787,000 | d177239d6c4932bb7905741666d47234f36a9f0a | 3 | {
"blob_id": "d177239d6c4932bb7905741666d47234f36a9f0a",
"branch_name": "refs/heads/master",
"committer_date": 1638440787000,
"content_id": "c6e33bddba1ca25faa4fcd1c6c8ba335d69ffc24",
"detected_licenses": [
"BSD-3-Clause",
"Apache-2.0"
],
"directory_id": "5096efbc24cf77d3b9798582c5878dd7af3cf431",... | 3.03125 | stackv2 | import hmac
import json
from hashlib import sha1
from http import HTTPStatus
from typing import Callable, Optional, Dict, Any, Tuple
from flask import Flask, request, Response
PayloadType = Dict[str, Any]
HandleFuncReturnType = Tuple[str, HTTPStatus]
class Listener:
def __init__(self, name: str,
... | 119 | 34.06 | 88 | 16 | 887 | python | [{"finding_id": "codeql_py/reflective-xss_67aec03a9e9851a8_52fdcc79", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
76
] | [
null
] | [
34
] | [
41
] | |
2024-11-18T19:03:04.936595+00:00 | 1,621,262,581,000 | 5f7b1c96c6f726ead869270173fbb3333c54c8b1 | 3 | {
"blob_id": "5f7b1c96c6f726ead869270173fbb3333c54c8b1",
"branch_name": "refs/heads/main",
"committer_date": 1621262581000,
"content_id": "afecac61d9fb02770ca4c9172bc40b13a2269705",
"detected_licenses": [
"MIT"
],
"directory_id": "89dab9fb60ae882910d7ac9e1be10c4ce6ffcf24",
"extension": "py",
"file... | 3.015625 | stackv2 | import socket
import sys
import string
import itertools
path = "hacking\passwords.txt"
f =open(path,'r')
password = f.read().split("\n")
class Connection():
def __init__(self, host, port):
self.hostname = host
self.port = int(port)
self.sock = socket.socket()
self.myList = list(strin... | 45 | 28.31 | 89 | 24 | 288 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_640a41e5a8bf5516_d42bed5d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
40
] | [
null
] | [
27
] | [
34
] | |
2024-11-18T19:14:33.390958+00:00 | 1,541,421,000,000 | 3a50db722af62a5a8e8cdee69abde98cc204190f | 2 | {
"blob_id": "3a50db722af62a5a8e8cdee69abde98cc204190f",
"branch_name": "refs/heads/master",
"committer_date": 1541421000000,
"content_id": "a09ea8352619e16defe396437993bbb285e4ed91",
"detected_licenses": [
"MIT"
],
"directory_id": "714fcefc8358454a2e7c305a6842b0798ac00cb2",
"extension": "py",
"fi... | 2.390625 | stackv2 | import json
from aiohttp import web
import logging
import json
# Content-Type
CONTENT_TYPE = 'Content-Type'
CONTENT_TYPE_HTML = {'Content-Type': 'text/html'}
CONTENT_TYPE_JSON = {'Content-Type': 'application/json'}
async def content_type_json_check(request):
if request.content_type != 'application/json':
... | 35 | 27.91 | 75 | 16 | 209 | python | [{"finding_id": "codeql_py/stack-trace-exposure_8880ba389e6cb6a9_f29bac08", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
35
] | [
null
] | [
30
] | [
36
] | |
2024-11-18T19:14:33.441591+00:00 | 1,509,610,179,000 | 8de26755048580f003b75e42e5705c00e6b5e95a | 2 | {
"blob_id": "8de26755048580f003b75e42e5705c00e6b5e95a",
"branch_name": "refs/heads/master",
"committer_date": 1509610179000,
"content_id": "5b1bb31d37c04bb95b6ad42b435e79550dcf1bc6",
"detected_licenses": [
"MIT"
],
"directory_id": "b4b3c3f7bf06b0d98455668ff6a10e2732193091",
"extension": "py",
"fi... | 2.484375 | stackv2 | # -*- coding: utf8 -*-
'''
Simple Write MD Server Program
Provide list, query, edit, save, etc
'''
import os
import codecs
from flask import Flask
from flask import render_template
from flask import jsonify
from flask import request
from flask import abort
app = Flask(__name__)
app.config.from_object('config')
@ap... | 101 | 21.88 | 94 | 18 | 624 | python | [{"finding_id": "codeql_py/path-injection_362c132957a682b7_46a66331", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 6 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](... | [
40,
45,
46,
47,
76,
94
] | [
null,
null,
null,
null,
null,
null
] | [
22,
44,
32,
34,
27,
17
] | [
64,
51,
39,
41,
73,
24
] | |
2024-11-18T19:14:46.283968+00:00 | 1,632,335,711,000 | cd12f022fd87aa291f69c7d4a12f5f1d528c94c7 | 2 | {
"blob_id": "cd12f022fd87aa291f69c7d4a12f5f1d528c94c7",
"branch_name": "refs/heads/master",
"committer_date": 1632335711000,
"content_id": "43c141c7c0b9a56728af88f002a7ded77b18d854",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "745f58a02e94343f67fa5b5af5915aee2b2c9aa7",
"extension": "py"... | 2.46875 | stackv2 | import os
import logging
from datetime import datetime, timezone
from ibm_botocore.credentials import DefaultTokenManager
from lithops.utils import is_lithops_worker
from lithops.config import load_yaml_config, dump_yaml_config
from lithops.constants import CACHE_DIR
logger = logging.getLogger(__name__)
class IBMTo... | 78 | 43.63 | 109 | 19 | 740 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_12fd8480d4a48487_b4d4acd8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p... | [
23,
32,
72
] | [
null,
null,
null
] | [
26,
26,
26
] | [
102,
107,
89
] | |
2024-11-18T19:27:45.740543+00:00 | 1,542,207,829,000 | d833e9c02188496ddea7b4b0f5c443dce2086c16 | 3 | {
"blob_id": "d833e9c02188496ddea7b4b0f5c443dce2086c16",
"branch_name": "refs/heads/master",
"committer_date": 1542207829000,
"content_id": "4204bdc3f9ca310e54a356f0d1b1bb9c2c46aaa0",
"detected_licenses": [
"MIT"
],
"directory_id": "f6e5c235841c62c8c8de79b6c0ccb5bc229a4d4f",
"extension": "py",
"fi... | 2.65625 | stackv2 | import logging
from datetime import date, timedelta
from operator import methodcaller
from pathlib import Path
from typing import Optional, NamedTuple, Tuple, List
import dateparser
import requests
from lxml.html import fromstring
from selenium import webdriver
from selenium.webdriver.common.by import By
from selenium... | 165 | 37.26 | 93 | 19 | 1,452 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4595a9d00c9e9fd6_7b98fec3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
45
] | [
null
] | [
63
] | [
71
] | |
2024-11-18T19:27:55.290505+00:00 | 1,493,826,595,000 | 609ee86fb7ddd3856eee9fe338356281e237da95 | 3 | {
"blob_id": "609ee86fb7ddd3856eee9fe338356281e237da95",
"branch_name": "refs/heads/master",
"committer_date": 1493826595000,
"content_id": "c1de46a03ad4774371bc2e846ab29786b9895bb2",
"detected_licenses": [
"MIT"
],
"directory_id": "768b2e4a1a3e231aa28b0adb9ac52722add1863f",
"extension": "py",
"fi... | 2.5625 | stackv2 | #!/usr/bin/env python
import codecs
import logging
import logging.handlers
import ssl
import socket
class SSLSysLogHandler(logging.handlers.SysLogHandler):
# We need to paste all this in because __init__ bitches otherwise
# This all comes from logging.handlers.SysLogHandler
LOG_EMERG = 0 # system... | 157 | 29.6 | 76 | 15 | 1,339 | python | [{"finding_id": "codeql_py/insecure-default-protocol_439102b6151907f1_a6320749", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/insecure-default-protocol",
"py/insecure-default-protocol"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.",
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
112,
116
] | [
114,
null
] | [
21,
21
] | [
65,
64
] | |
2024-11-18T19:38:30.286411+00:00 | 1,606,661,619,000 | 60766ef7b17857cacc06c44a52da0662abb114be | 3 | {
"blob_id": "60766ef7b17857cacc06c44a52da0662abb114be",
"branch_name": "refs/heads/master",
"committer_date": 1606661619000,
"content_id": "1af33dbb36340113db9d960bcac903f13e42fc30",
"detected_licenses": [
"MIT"
],
"directory_id": "4964705b804b7c46b996116064d80c12f7d1484e",
"extension": "py",
"fi... | 2.890625 | stackv2 | import csv
from numpy import array, asarray, zeros
from keras.preprocessing.text import one_hot, Tokenizer
from keras.preprocessing.sequence import pad_sequences
from keras.models import Sequential
from keras.layers import Dense, SpatialDropout1D, LSTM
from keras.layers import Flatten
from keras.layers.embeddings impor... | 81 | 31.37 | 114 | 12 | 704 | python | [{"finding_id": "codeql_py/overly-large-range_81bd16175cc2ebff_7a94e264", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
18
] | [
null
] | [
53
] | [
56
] | |
2024-11-18T19:38:48.673990+00:00 | 1,610,474,323,000 | 72993890ab84a94970b524d814d74deca2095d2c | 4 | {
"blob_id": "72993890ab84a94970b524d814d74deca2095d2c",
"branch_name": "refs/heads/main",
"committer_date": 1610474323000,
"content_id": "598d5af7d18091d9c358d0af17d2128fbf5084f6",
"detected_licenses": [
"MIT"
],
"directory_id": "efe329252385fc21d27ec57f1a2e56b190c6f564",
"extension": "py",
"file... | 3.890625 | stackv2 | # Title : Multiple Inheritance
# Author : Kiran Raj R.
# Date : 08:11:2020
class EmployeeDetail:
def __init__(self, emp_id, name, age, email_id, position):
self.emp_id = emp_id
self.name = name
self.age = age
self.email_id = email_id
self.position = position
def... | 47 | 30.49 | 122 | 13 | 397 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_74e3cfe25e8841f0_613d4a8a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
42
] | [
null
] | [
15
] | [
39
] | |
2024-11-18T19:38:52.128664+00:00 | 1,627,273,710,000 | 5f043266bc0d7c835b10771e47de63938cfd555b | 4 | {
"blob_id": "5f043266bc0d7c835b10771e47de63938cfd555b",
"branch_name": "refs/heads/main",
"committer_date": 1627273710000,
"content_id": "c4a1357fcf5a343eafc710062cbe17c364b71be7",
"detected_licenses": [
"MIT"
],
"directory_id": "cb980f2c540f75b727e7feb56f7389a48b66f060",
"extension": "py",
"file... | 3.8125 | stackv2 | database = {'entries': []}
SRNO = 'srno'
NAME = 'name'
AGE = 'age'
GENDER = 'gender'
OCCUPATION = 'occupation'
def get_serial_no():
return len(database['entries']) + 1
def add_entry(entry):
entry = {
'srno': get_serial_no(),
'name': entry['name'],
'age': entry['age'],
'gender'... | 133 | 30.95 | 79 | 17 | 967 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2add739c8a8dd6f3_e818c9cb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
47
] | [
null
] | [
11
] | [
39
] | |
2024-11-18T20:06:03.548214+00:00 | 1,501,829,678,000 | b8f6e060c3ffbed97b49cb68456ce335edb98438 | 2 | {
"blob_id": "b8f6e060c3ffbed97b49cb68456ce335edb98438",
"branch_name": "refs/heads/master",
"committer_date": 1501829678000,
"content_id": "ce39d5c6cd47b74f489ed1542d7e90b5c83c37e8",
"detected_licenses": [
"MIT"
],
"directory_id": "de29b523a65d7e02c096cc7353f5b544b39efe9f",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/python3.6
import lxml.etree as ET
import re
number_pattern = r'[0-9]+'
class ListMBeans():
def __init__(self, path='scheduler-service.xml'):
self.mbeans = list()
self.commented_mbeans = list()
self.path = path
try:
self.etree = ET.parse(path)
except ... | 158 | 36.14 | 104 | 24 | 1,289 | python | [{"finding_id": "codeql_py/bad-tag-filter_d2b03103254ee2c0_d96dd9e3", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match comments containing newlines.", "remediation": "", "location": {"file_pat... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match comments containing newlines."
] | [
24
] | [
null
] | [
32
] | [
41
] | |
2024-11-18T20:06:11.477759+00:00 | 1,606,260,895,000 | d0e0728ed63a9b356c74e9a69680b7bd7e7ab18f | 3 | {
"blob_id": "d0e0728ed63a9b356c74e9a69680b7bd7e7ab18f",
"branch_name": "refs/heads/master",
"committer_date": 1606260895000,
"content_id": "9b461b072395e4e1af15412e7417c3a2aa32414f",
"detected_licenses": [
"MIT"
],
"directory_id": "ace11052f663a5c3469aaea3d6da135b78b0164a",
"extension": "py",
"fi... | 3.09375 | stackv2 | import requests as rq
import json
import time
class SupremeMonitor:
def __init__(self, item_id, colour, size):
self.headers = {'user-agent': 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/537.36 (KHTML, '
'like Gecko) Chrome/83.0.4103.116 Safari/537.36'}... | 56 | 39.36 | 136 | 31 | 494 | python | [{"finding_id": "codeql_py/request-without-cert-validation_84db2b5dc5be6850_03c6208d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
19
] | [
null
] | [
20
] | [
137
] | |
2024-11-18T20:18:14.026383+00:00 | 1,567,348,500,000 | 201061603186f8e3bf3be8e2e81982b902412452 | 3 | {
"blob_id": "201061603186f8e3bf3be8e2e81982b902412452",
"branch_name": "refs/heads/master",
"committer_date": 1567348500000,
"content_id": "719d32a01a3a399b69f6d837064b0a02706e2c08",
"detected_licenses": [
"MIT"
],
"directory_id": "559464bf444d348b06956421d93d8e0af2955ecb",
"extension": "py",
"fi... | 3.03125 | stackv2 | """AES Encryption implementation (including a Fernet suit)."""
__all__ = (
"AESEncryption",
)
import base64
import hashlib
from django.conf import settings
from cryptography.fernet import Fernet
from rest_multi_factor.encryption.abstract import AbstractEncryption
class AESEncryption(AbstractEncryption):
... | 71 | 21.13 | 68 | 14 | 337 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6f07e143b888d1a2_91944668", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
42
] | [
null
] | [
30
] | [
58
] | |
2024-11-18T20:18:20.218852+00:00 | 1,692,716,824,000 | a32fca4acf43ffa1a3ae484492e2a1f4afcb3d5f | 2 | {
"blob_id": "a32fca4acf43ffa1a3ae484492e2a1f4afcb3d5f",
"branch_name": "refs/heads/master",
"committer_date": 1692716824000,
"content_id": "abb41a8ab520652f218f51cf2ec068dacf9143f3",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "4ebeaa3d8dbe4f5ecb1c9d69530f2cee2539c7d4",
"extension": "p... | 2.3125 | stackv2 | # -*- coding: utf-8 -*-
# @Time : 2020/11/16 11:37
# @File : util.py
# @Author : Rocky C@www.30daydo.com
import datetime
import random
import smtplib
import time
import warnings
from email.mime.text import MIMEText
from email.header import Header
from email.utils import parseaddr, formataddr
import json
import pandas ... | 241 | 25.84 | 116 | 16 | 1,751 | python | [{"finding_id": "codeql_py/weak-crypto-key_7686e86ac3742a32_649403b6", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
91
] | [
null
] | [
25
] | [
42
] | |
2024-11-18T20:31:11.001555+00:00 | 1,635,343,965,000 | 9f42f9463e911b5afb42671f621a4f303311a663 | 3 | {
"blob_id": "9f42f9463e911b5afb42671f621a4f303311a663",
"branch_name": "refs/heads/master",
"committer_date": 1635343965000,
"content_id": "83a4dcc009c2994cf367edbe1a0ea932f48f998a",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "ef59f94c6e99a84429b8e328bc2ba82cc1eacbb7",
"extension": "py",
... | 2.609375 | stackv2 | from copy import deepcopy
from datetime import date
from hashlib import md5
import re
from django import forms
from django.db import models
from django.utils.translation import ugettext_lazy as _, ugettext
from collab.settings import AUTH_USER_MODEL
from django.core.exceptions import ValidationError
from django.core.u... | 260 | 39.92 | 79 | 16 | 1,930 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_ff1d7ef0559b3430_deff414d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](3) is used in a hashing algorithm (MD5) that is insecure."
] | [
227
] | [
null
] | [
20
] | [
43
] | |
2024-11-18T20:31:22.713144+00:00 | 1,585,764,740,000 | 6bdca2946d6bed5598499421b520946f05ef44b2 | 2 | {
"blob_id": "6bdca2946d6bed5598499421b520946f05ef44b2",
"branch_name": "refs/heads/master",
"committer_date": 1585764740000,
"content_id": "142e97c682991267b10da83f12c2a73205b0c727",
"detected_licenses": [
"MIT"
],
"directory_id": "3d55ccd1cdb98d9859b7bfe8b250d09a740cd847",
"extension": "py",
"fi... | 2.484375 | stackv2 | # coding=utf-8
from Crypto.Cipher import DES3
from Crypto.Random import get_random_bytes
from Crypto import Random
while True:
try:
key = DES3.adjust_key_parity(get_random_bytes(16))
break
except ValueError:
pass
out = open("../distrib/key", "wb")
out.write(key)
out.close()
iv = Random.new().read(DES3.block... | 31 | 19.94 | 59 | 12 | 179 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_fb1dbf3b83e56cad_efb85d8f", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES3](1) is broken or weak, and should not be used.", "... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The cryptographic algorithm DES3](1) is broken or weak, and should not be used."
] | [
25
] | [
null
] | [
7
] | [
40
] | |
2024-11-18T20:31:26.866534+00:00 | 1,491,888,202,000 | e2fdc9630d0bfa60fcad1772a693314f7ab0503a | 3 | {
"blob_id": "e2fdc9630d0bfa60fcad1772a693314f7ab0503a",
"branch_name": "refs/heads/master",
"committer_date": 1491888202000,
"content_id": "1c101bc19f9744b30d3c0b62e6b1e4b7b2c2bf0a",
"detected_licenses": [
"MIT"
],
"directory_id": "9c8f73723482361cc8d04f0ce1650dccc8b7bea6",
"extension": "py",
"fi... | 2.84375 | stackv2 | import os
import re
from flask import request, Response
from slackclient import SlackClient
from flask_classy import FlaskView, route
from urlparse import urljoin
class WebexSlashCommandController(FlaskView):
route_base = '/'
__slack_token = os.environ.get('SLACK_TOKEN')
__slack_webhook_secret = os.enviro... | 51 | 40 | 99 | 19 | 470 | python | [{"finding_id": "codeql_py/reflective-xss_8b2f57bb84105a76_5a59dc97", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
30
] | [
31
] | [
33
] | [
82
] | |
2024-11-18T20:43:41.749064+00:00 | 1,624,270,127,000 | 85a27d60ac48fa6b4848253a03ff298b4eeadab3 | 3 | {
"blob_id": "85a27d60ac48fa6b4848253a03ff298b4eeadab3",
"branch_name": "refs/heads/main",
"committer_date": 1624270127000,
"content_id": "30bfdc3053a02e7b6811e9ee50e4d5ea066a9d35",
"detected_licenses": [
"MIT"
],
"directory_id": "819ede7cb2fdc6640dd47d26d9dd114805346e1f",
"extension": "py",
"file... | 3.09375 | stackv2 | import re
from exceptions.availability_checker_exception import AvailabilityCheckerException
class Client:
def __init__(self, name, mobile, email, pincode):
self.name = name
self.mobile = mobile
self.email = email
self.pincode = pincode
@property
def name(self):
re... | 55 | 25.93 | 82 | 14 | 341 | python | [{"finding_id": "codeql_py/redos_59e2c6b2e54cb74d_968dc3f8", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "remediati... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'a@' and containing many repetitions of '_'."
] | [
39,
39
] | [
null,
null
] | [
15,
32
] | [
29,
46
] | |
2024-11-18T20:57:35.108614+00:00 | 1,548,784,772,000 | b008d0a488bc6d50d27548c480785c8603472167 | 2 | {
"blob_id": "b008d0a488bc6d50d27548c480785c8603472167",
"branch_name": "refs/heads/master",
"committer_date": 1548784772000,
"content_id": "b698b3636eb707ce9d7101109f6e17ba42925e96",
"detected_licenses": [
"MIT"
],
"directory_id": "af33e6fe0fce08b617fa63dc6eb9c1ffa75f8640",
"extension": "py",
"fi... | 2.375 | stackv2 | import os
import requests
import tarfile
import tempfile
import shutil
from . import arango_client, spec_loader
from .config import get_config
def download_latest(init_collections=True):
"""Check and download the latest spec and extract it to the spec path."""
config = get_config()
# Remove the spec dire... | 97 | 37.64 | 92 | 15 | 842 | python | [{"finding_id": "codeql_py/tarslip_1b5c6170b13b3c86_c52fb29b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
63
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T20:57:41.471335+00:00 | 1,614,221,503,000 | cfc6483fe5dda56239af20a157d3d864d83c5544 | 2 | {
"blob_id": "cfc6483fe5dda56239af20a157d3d864d83c5544",
"branch_name": "refs/heads/master",
"committer_date": 1614221503000,
"content_id": "0086fb16897bd3639c509ebeb0cba03befbd1e38",
"detected_licenses": [
"MIT"
],
"directory_id": "a4a18abbfae9584116a847bec4a1dfb9e9d3d306",
"extension": "py",
"fi... | 2.328125 | stackv2 | from flask import Flask, request, make_response
from slack_sdk.oauth import AuthorizeUrlGenerator
from slack_sdk.oauth.installation_store import FileInstallationStore, Installation
from slack_sdk.oauth.state_store import FileOAuthStateStore
from slack_sdk.web import WebClient
import settings
# A lot of code taken fr... | 78 | 36.06 | 105 | 18 | 596 | python | [{"finding_id": "codeql_py/reflective-xss_68521961337ca2aa_5e3461dd", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
62
] | [
null
] | [
26
] | [
86
] | |
2024-11-18T20:58:37.653535+00:00 | 1,633,550,593,000 | 896d589cc145558b5c2703510aa9cbd5849509c7 | 3 | {
"blob_id": "896d589cc145558b5c2703510aa9cbd5849509c7",
"branch_name": "refs/heads/main",
"committer_date": 1633550593000,
"content_id": "74b5591fb6510a69a19fa5c2700cc762560baaa4",
"detected_licenses": [
"MIT"
],
"directory_id": "715ea56fd4966b9982167df5cc678005a98de23c",
"extension": "py",
"file... | 2.828125 | stackv2 | import requests
def login_to_recnet(username, password):
# REQUEST SESSION
session = requests.Session()
# GET REQUEST VERIFICATION TOKEN
r = session.get("https://auth.rec.net/Account/Login")
login_html = str(r.content) # Save the HTML from the login page
# Gather the request verification tok... | 76 | 40.29 | 119 | 15 | 846 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_be45e0cc6a6f69f0_d333acd4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
58
] | [
null
] | [
32
] | [
40
] | |
2024-11-18T21:10:14.890763+00:00 | 1,567,505,106,000 | 9766ef97159b56424c903e467857655caf9dec45 | 3 | {
"blob_id": "9766ef97159b56424c903e467857655caf9dec45",
"branch_name": "refs/heads/master",
"committer_date": 1567505106000,
"content_id": "751c5cf045ad72b3eb5cd85f4595a00edf3c66ee",
"detected_licenses": [
"MIT"
],
"directory_id": "b0350d319b916ae670c902b50accd7b2ed403fff",
"extension": "py",
"fi... | 3.34375 | stackv2 | # import pyperclip
from user_credentials import User, Credential
def create_user(firstname,lastname,password):
'''
Function to create a new user account
'''
new_user = User(firstname,lastname,password)
return new_user
def save_user(user):
'''
Function to save a new user account
'''
User.save_user(user)
def... | 161 | 27.75 | 131 | 27 | 1,082 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ea2f831eacb9cb1d_eadcb2dd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive dat... | [
77,
122,
130
] | [
null,
null,
null
] | [
10,
13,
15
] | [
89,
112,
125
] | |
2024-11-18T21:10:25.407851+00:00 | 1,598,279,488,000 | 254c4c51b2e5585901c1e20faad3e5c37d08968d | 2 | {
"blob_id": "254c4c51b2e5585901c1e20faad3e5c37d08968d",
"branch_name": "refs/heads/master",
"committer_date": 1598279488000,
"content_id": "b58a12ee00f9827e1211ffcf3fb872fcef261265",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9e8daec9b79a118f52ce32f8de0ac4e3feb5f2f7",
"extension": "py"... | 2.34375 | stackv2 | from bmc import bmc_app, db
from bmc.forms import LoginForm, RegistrationForm
from bmc.library import Library
from bmc.models import User, Practice
from flask import render_template, request
from flask import request, flash, redirect, url_for
from flask_login import current_user, login_user, logout_user, login_required... | 130 | 34 | 82 | 21 | 1,009 | python | [{"finding_id": "codeql_py/url-redirection_4dd355cfcf9387b6_df68d30a", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-022"
] | [
"py/url-redirection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
109,
53
] | [
null,
null
] | [
25,
15
] | [
34,
37
] | |
2024-11-18T21:10:26.937511+00:00 | 1,441,060,592,000 | 6f0007b4b3ac7931f403aac29b32c3d4fbf7db14 | 3 | {
"blob_id": "6f0007b4b3ac7931f403aac29b32c3d4fbf7db14",
"branch_name": "refs/heads/master",
"committer_date": 1441060592000,
"content_id": "0de101f60a956a751000e7df375f13b40a9a977c",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "8fbe5c37e4fe781f6c301d79b782462491a6e2cb",
"extension": "p... | 3.3125 | stackv2 | #!/usr/bin/env python
"""
get_password function that displays asterisks instead of the actual characters.
With the addition of a ControlT shortcut to hide/show the input.
"""
from __future__ import unicode_literals
from prompt_toolkit.shortcuts import get_input
from prompt_toolkit.key_binding.manager import KeyBindingM... | 31 | 31.32 | 79 | 13 | 207 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0d8e7e52ac5bbce6_f71b2104", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
27
] | [
null
] | [
11
] | [
36
] | |
2024-11-18T21:10:30.807600+00:00 | 1,692,017,646,000 | 4bedfeab416824b9a71b41190bbc7e19f0e2e5d3 | 2 | {
"blob_id": "4bedfeab416824b9a71b41190bbc7e19f0e2e5d3",
"branch_name": "refs/heads/master",
"committer_date": 1692621741000,
"content_id": "f2288d60024a82c55e571c0b15cdf8fbc3311719",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3bba998ece193dd4594059025d0ebdc86a982e18",
"extension": "py"... | 2.3125 | stackv2 | # -*- coding: utf-8 -*-
# Copyright European Organization for Nuclear Research (CERN) since 2012
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-... | 249 | 43.78 | 167 | 20 | 2,538 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_0486a4fc9b48f141_bf792c72", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
57,
91
] | [
null,
null
] | [
35,
35
] | [
50,
50
] | |
2024-11-18T21:11:04.349108+00:00 | 1,492,651,065,000 | 24256af8fe14395d7a10b460531b8f5643d056f8 | 2 | {
"blob_id": "24256af8fe14395d7a10b460531b8f5643d056f8",
"branch_name": "refs/heads/master",
"committer_date": 1492651065000,
"content_id": "a27fb79cf4664c162660d09fef51a46e76ed5c1e",
"detected_licenses": [
"MIT"
],
"directory_id": "bc72c492b621f89d5f0202bdc79bf4a301bdd8d4",
"extension": "py",
"fi... | 2.40625 | stackv2 | import requests
import json
from pprint import pprint
import re
import time
import sys
#getdata = requests.get(geturl)
#pprint (vars(getdata))
from bs4 import BeautifulSoup
from geopy.geocoders import Nominatim
if len(sys.argv) != 4:
print(sys.argv[0]+" <item> <location> <num items>")
exit()
#get list of prod... | 110 | 28.79 | 159 | 19 | 922 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f28f901efb691453_31f359ec", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
70
] | [
null
] | [
8
] | [
44
] | |
2024-11-18T19:03:21.918946+00:00 | 1,541,523,089,000 | 3917387dcb4797c0653c7e5ddc058942f457d957 | 3 | {
"blob_id": "3917387dcb4797c0653c7e5ddc058942f457d957",
"branch_name": "refs/heads/master",
"committer_date": 1541523089000,
"content_id": "412ef73c946090c0e291f05190df704445f8cf9f",
"detected_licenses": [
"ISC"
],
"directory_id": "7f73a911170c2ea7f892ec5d71ae24fdf18f7f46",
"extension": "py",
"fi... | 2.578125 | stackv2 | import os
import pathlib
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
import nacl
from nacl.encoding import RawEncoder
from nacl.signing import SigningKey
from aeternity import hashing, utils
# imports for keystore
from datetime im... | 216 | 36.88 | 115 | 16 | 1,809 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_32517ff7825a3f67_6d19486d", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
174,
193
] | [
null,
null
] | [
25,
25
] | [
56,
54
] | |
2024-11-18T19:03:37.133976+00:00 | 1,497,474,598,000 | 970ccfcd71202909eabf1105fccd748e1e52cc2b | 3 | {
"blob_id": "970ccfcd71202909eabf1105fccd748e1e52cc2b",
"branch_name": "refs/heads/master",
"committer_date": 1497474598000,
"content_id": "fc6093ba43ad6cfcc69be3108cc1a24dac280d10",
"detected_licenses": [
"MIT"
],
"directory_id": "6c179681f5eb8259f24a0dcf57052c2a8e253fff",
"extension": "py",
"fi... | 2.671875 | stackv2 | #!/usr/bin/env python3
import datetime as dt
import requests
import smtplib
import socket
import ssl
class SiteCheckException(Exception):
def __init__(self, message):
self.message = message
class SslCertException(SiteCheckException):
pass
class PingException(SiteCheckException):
pass
def p... | 140 | 25.24 | 72 | 24 | 756 | python | [{"finding_id": "codeql_py/insecure-protocol_eec4447e86b82a81_08a2c5b4", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)."
] | [
48
] | [
null
] | [
18
] | [
25
] | |
2024-11-18T19:28:48.648273+00:00 | 1,623,007,871,000 | 77e57dc37250c79c7972d65845b318b063e7f4b2 | 3 | {
"blob_id": "77e57dc37250c79c7972d65845b318b063e7f4b2",
"branch_name": "refs/heads/master",
"committer_date": 1623007871000,
"content_id": "b0ecebd290e45b205b5dccb589b24ce098d930cb",
"detected_licenses": [
"MIT"
],
"directory_id": "f755238a8d8fc359c6d017b8cffbcd6d30bb9d28",
"extension": "py",
"fi... | 3.015625 | stackv2 | import re
# Nested Form data deserializer utility class
# --------------------------------------------
class UtilityMixin(object):
_nested_re = re.compile(r'((.+)\[(.*)\]+)|(\[(.*)\]{2,})')
_namespace_re = re.compile(r'^([\w]+)(?=\[)')
_list_re = re.compile(r'\[([0-9]+)\]')
_number_re = re.compile(r'... | 187 | 28.16 | 85 | 18 | 1,110 | python | [{"finding_id": "codeql_py/redos_1486eebc7a126eac_d73e88ab", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\\[' and containing many repetiti... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '\\[' and containing many repetitions of '/'."
] | [
12
] | [
null
] | [
45
] | [
52
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.