added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T19:38:38.800329+00:00 | 1,624,203,457,000 | 7ca4dd6ece5b97b4e26b03a2cd88552d35ce5146 | 3 | {
"blob_id": "7ca4dd6ece5b97b4e26b03a2cd88552d35ce5146",
"branch_name": "refs/heads/master",
"committer_date": 1624203457000,
"content_id": "e6783bb861022a2def204e7d4c4619b9ca439f07",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "22f8cb2c5b35f01966aa725b2ec6e409812cac83",
"extension": "p... | 2.9375 | stackv2 | """
Usage: downloader.py --download=all --output_directory=output_path
downloader.py --help | -help | -h
This script is for downloading and extracting files
Arguments:
--download: download files or all.
--output_directory: the path where the extracted files will be present
Options:
-h --help... | 136 | 33.38 | 100 | 18 | 1,251 | python | [{"finding_id": "codeql_py/tarslip_0983932414104a03_397aa39f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)."
] | [
53
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T20:10:41.826251+00:00 | 1,549,332,800,000 | 9c2bd30fc3f176c5e8600f4428fcad74b75f451f | 3 | {
"blob_id": "9c2bd30fc3f176c5e8600f4428fcad74b75f451f",
"branch_name": "refs/heads/master",
"committer_date": 1549332800000,
"content_id": "0e18e65f70fe3ac17b6195443c9897870f022d51",
"detected_licenses": [
"MIT"
],
"directory_id": "10847da51a59859c0d12d82d29e146ca75c481c7",
"extension": "py",
"fi... | 2.640625 | stackv2 | """
Search images from Twitter with query.
Most of code for searching Twitter are from Jefferson Henrique's GetOldTweets-python.
- https://github.com/Jefferson-Henrique/GetOldTweets-python
"""
from datetime import datetime
import logging
import re
import requests
from bs4 import BeautifulSoup, FeatureNotFound
import ... | 173 | 26.74 | 92 | 15 | 1,170 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_0c5e11b879ac6ddf_ba258d60", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'twitter.com/', so it might match mo... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'twitter.com/', so it might match more hosts than expected."
] | [
19
] | [
null
] | [
21
] | [
42
] | |
2024-11-18T20:10:44.465211+00:00 | 1,556,785,074,000 | a7bdcd921114a0afadeadf4b994327d1034c12a5 | 2 | {
"blob_id": "a7bdcd921114a0afadeadf4b994327d1034c12a5",
"branch_name": "refs/heads/master",
"committer_date": 1556785074000,
"content_id": "3b8bb11bbd5bc210e82f456c2a09d8a4232e018f",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "c46fc0df74c353dc4b66177df8b790407e551478",
"extension": "p... | 2.34375 | stackv2 | import os, traceback, json
import hashlib
import argparse
from flask_cors import CORS, cross_origin
from flask import Flask, request, render_template, jsonify, \
send_from_directory, make_response, send_file
from synthesizer import Synthesizer
from utils import str2bool, makedirs, add_postfix
import base64
ROO... | 86 | 31.36 | 85 | 14 | 724 | python | [{"finding_id": "codeql_py/reflective-xss_0f7ba651f5c306e3_cb8db87f", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
68
] | [
null
] | [
12
] | [
41
] | |
2024-11-18T20:10:52.350894+00:00 | 1,573,772,241,000 | cf5847e3aee7a39a5e05a421ca00d8fe990d5e80 | 2 | {
"blob_id": "cf5847e3aee7a39a5e05a421ca00d8fe990d5e80",
"branch_name": "refs/heads/master",
"committer_date": 1573772241000,
"content_id": "8935fbc1fa41fa8c98ed78dbbb86002e69b16bc9",
"detected_licenses": [
"MIT"
],
"directory_id": "0fc524338a4114a04e5a033fdd35d6057f94ac41",
"extension": "py",
"fi... | 2.421875 | stackv2 | import binascii
import hashlib
import os
from app import db
from .base import create_uuid_string, UUID_LENGTH
server_secret = os.environ['BJ_SECRET']
class BjUser(db.Model):
__tablename__ = 'bj_user'
id = db.Column(db.String(UUID_LENGTH), primary_key=True, default=create_uuid_string)
username = db.Column(db.St... | 76 | 25.91 | 92 | 18 | 500 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6e36e2808166ef3c_634421d4", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
70
] | [
null
] | [
13
] | [
28
] | |
2024-11-18T20:10:56.118656+00:00 | 1,518,121,785,000 | 96929f0bf3feca9437f8d9a3e04ec994c9203c02 | 3 | {
"blob_id": "96929f0bf3feca9437f8d9a3e04ec994c9203c02",
"branch_name": "refs/heads/master",
"committer_date": 1518121785000,
"content_id": "595570be00aa6cddca174524ddda248be9f4a5ea",
"detected_licenses": [
"MIT"
],
"directory_id": "f8af4f56814853e01c1c9362e58c2c7d5a148027",
"extension": "py",
"fi... | 2.515625 | stackv2 | from operator import itemgetter
from app import app, cap
from werkzeug.urls import url_parse
from flask import render_template, redirect, url_for, request, flash
from app import db
from flask_login import current_user, login_user, logout_user, login_required
from app.forms import LoginForm, RegisterForm, AddCoinForm, U... | 133 | 32.06 | 88 | 17 | 1,103 | python | [{"finding_id": "codeql_py/url-redirection_1a51ea0392401da6_d228fe6f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
35
] | [
null
] | [
19
] | [
28
] | |
2024-11-18T20:26:34.784346+00:00 | 1,609,770,294,000 | 9a400e0a75735a0c00c689c74b4d216264aac38e | 3 | {
"blob_id": "9a400e0a75735a0c00c689c74b4d216264aac38e",
"branch_name": "refs/heads/master",
"committer_date": 1609770294000,
"content_id": "062a21425f1930dd21f60807d80d406744cc365f",
"detected_licenses": [
"MIT"
],
"directory_id": "0ebf81f9f359e0bc8398e6458926bec373bfbdb1",
"extension": "py",
"fi... | 2.984375 | stackv2 | import json
from typing import Dict
import fnl
import re
from . import entity_types as et
from . import entities as e
from . import type_parser
BUILTINS: Dict[str, e.Entity] = {}
# we need to parse the docstrings of built-in functions
# to equip them with a documentation Entity
def _parse_docstring(docstring: str) ... | 361 | 29.18 | 99 | 17 | 2,921 | python | [{"finding_id": "codeql_py/redos_0d999557561db450_40c16853", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '%%' and containing many repetitio... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '%%' and containing many repetitions of '$'."
] | [
19
] | [
null
] | [
35
] | [
40
] | |
2024-11-18T20:26:40.306729+00:00 | 1,510,938,559,000 | 58c59c62ba2d7e85d50e0e64236795bdbdd3d481 | 3 | {
"blob_id": "58c59c62ba2d7e85d50e0e64236795bdbdd3d481",
"branch_name": "refs/heads/master",
"committer_date": 1510938559000,
"content_id": "8b43d975806be8669d75e57bb4344edc3507f23e",
"detected_licenses": [
"MIT"
],
"directory_id": "f1f5c239ed2d20ad3bf2afe500f493a1edceeb32",
"extension": "py",
"fi... | 2.6875 | stackv2 | import sys
import requests
import time
import json
import os
import const
import argparse
from clint.textui import prompt
from lib import err, info
def getVideoId(url):
if "hotstar.com/" in url:
video_id = url.split("/")[-1]
if len(video_id) == 10 and int(video_id):
return video_id
... | 123 | 31.58 | 86 | 15 | 1,021 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_65c2fc3d917ffc73_82db6e48", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [hotstar.com/](1) may be at an arbitrary position in th... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [hotstar.com/](1) may be at an arbitrary position in the sanitized URL."
] | [
12
] | [
null
] | [
8
] | [
29
] | |
2024-11-18T20:26:47.369213+00:00 | 1,573,753,542,000 | 7b7ebfe3693fda11cbf918019495b8d441c5dd9d | 3 | {
"blob_id": "7b7ebfe3693fda11cbf918019495b8d441c5dd9d",
"branch_name": "refs/heads/master",
"committer_date": 1573753542000,
"content_id": "34ebf1e07c480ac604e28943a09357a9163ae7c1",
"detected_licenses": [
"MIT"
],
"directory_id": "013fcbcfbedc90598f3e9ac76fefa27b0086fd5a",
"extension": "py",
"fi... | 2.6875 | stackv2 | """
Wattbox control module for turning on and off outlets on a SnapAV wattbox
power strip.
Author: Greg J. Badros
$ cd .../path/to/home-assistant/
$ pip3 install --upgrade .../path/to/pywattbox
Then the component/wattbox.py and its require line will work.
TODO: Parse voltage_value (1200 = 120V; it's in tenths of vo... | 245 | 33.36 | 96 | 18 | 2,026 | python | [{"finding_id": "codeql_py/request-without-cert-validation_2fd7c66d9dc52c69_61e7496c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
110,
161,
228
] | [
111,
163,
230
] | [
24,
28,
28
] | [
50,
54,
54
] | |
2024-11-18T20:26:55.335555+00:00 | 1,625,719,912,000 | fd38a90a831d650e429ff9db7f773ff60503ce84 | 3 | {
"blob_id": "fd38a90a831d650e429ff9db7f773ff60503ce84",
"branch_name": "refs/heads/main",
"committer_date": 1625719912000,
"content_id": "334fa6d75a37cbe90f15c5d6bacaf06521d849f2",
"detected_licenses": [
"MIT"
],
"directory_id": "af2cace308035c0eab693c447d4543c6402864b0",
"extension": "py",
"file... | 2.5625 | stackv2 | import math
import elasticsearch
from flask import Flask, flash, request, redirect, render_template
from werkzeug.utils import secure_filename
from uploader import pdf_loader
UPLOAD_FOLDER = './pdf'
ALLOWED_EXTENSIONS = {'pdf'}
app = Flask(__name__)
app.config['UPLOAD_FOLDER'] = UPLOAD_FOLDER
app.secret_key = 'u of d... | 124 | 30.12 | 92 | 18 | 769 | python | [{"finding_id": "codeql_py/url-redirection_c094c0702f16c664_77f15508", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
100,
106
] | [
null,
null
] | [
29,
29
] | [
40,
40
] | |
2024-11-18T20:26:58.267035+00:00 | 1,593,318,221,000 | ecdc7fa84f6325325c7096fdc7fc359155348964 | 3 | {
"blob_id": "ecdc7fa84f6325325c7096fdc7fc359155348964",
"branch_name": "refs/heads/master",
"committer_date": 1593318221000,
"content_id": "c53d7b8e3bda8e6131eb3bdecd9488a669e2638e",
"detected_licenses": [
"MIT"
],
"directory_id": "186e82b10f9218f8a48cd6ce8e197b29aa0e044d",
"extension": "py",
"fi... | 2.890625 | stackv2 | # Flask-Login example inspired by https://github.com/shekhargulati/flask-login-example/blob/master/flask-login-example.py
import os
from flask import Flask, request, redirect
from flask_login import LoginManager, UserMixin, login_user, logout_user
import dash_core_components as dcc
import dash_html_components as html
... | 166 | 27.43 | 121 | 17 | 1,148 | python | [{"finding_id": "codeql_py/flask-debug_8b76af4d62ccd89e_b5fc10ff", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
166,
158
] | [
null,
null
] | [
5,
29
] | [
38,
53
] | |
2024-11-18T20:52:05.792381+00:00 | 1,622,592,136,000 | 962eb29dfb5ea1f6d04aeaf1b28b6371031986af | 2 | {
"blob_id": "962eb29dfb5ea1f6d04aeaf1b28b6371031986af",
"branch_name": "refs/heads/main",
"committer_date": 1622592136000,
"content_id": "a134ec56bc848f5853f2bac23227ac2e67080bfe",
"detected_licenses": [
"Unlicense"
],
"directory_id": "ab9711a882c72c2c948073a09729299d8590436a",
"extension": "py",
... | 2.40625 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
# DFIR Deaddrop - quick http client/server file transfer for IR evidence collection.
# This is http only so password protect or encrypt the evidence prior to transfer
# Author: Sean Frank
import aiofiles
import aiohttp
import asyncio
import base64
import ctypes
import h... | 192 | 38.27 | 160 | 19 | 2,414 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_3051b4408bd7c21a_c32a06cb", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
39,
47
] | [
null,
null
] | [
47,
30
] | [
80,
76
] | |
2024-11-18T20:52:06.613157+00:00 | 1,551,816,922,000 | 15dd8515ceb7387486bb94236afafb48954b642c | 3 | {
"blob_id": "15dd8515ceb7387486bb94236afafb48954b642c",
"branch_name": "refs/heads/master",
"committer_date": 1551816922000,
"content_id": "647182087cfff771b8d0834508e79e22d5b59fb8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "edf4cd6bfd9cc635cdf21f15f8a643fbc082a6fa",
"extension": "py"... | 2.6875 | stackv2 | # This is Retort, a thing to boil iKettles in Flask.
# It is built on the shoulders of giants.
#
# This is the flask app. It's got no complicated bits
#
# things to do:
# Move API bits to flask-restful
# Add a pretty GUI
# WebSockets for GUI updates? I heard you like sockets, so I put sockets in your sockets
... | 155 | 22.78 | 91 | 16 | 927 | python | [{"finding_id": "codeql_py/log-injection_bd4ed70acbd36de1_e9e02a26", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
73
] | [
null
] | [
15
] | [
67
] | |
2024-11-18T20:52:25.388282+00:00 | 1,522,131,144,000 | 4b00cc3e3609c84565e492f6a9edb8a23693f67b | 3 | {
"blob_id": "4b00cc3e3609c84565e492f6a9edb8a23693f67b",
"branch_name": "refs/heads/master",
"committer_date": 1522131144000,
"content_id": "a94a92f2a37965036b640a077fe5e81f56128977",
"detected_licenses": [
"MIT"
],
"directory_id": "601ee3605224c69c23f71e398c42280db0eb3f77",
"extension": "py",
"fi... | 2.796875 | stackv2 | #!/usr/bin/env python3
import os, sys, requests
from argparse import ArgumentParser, FileType
from yaml import safe_load as load
from jinja2 import Template, Environment
def main():
parser = ArgumentParser()
parser.add_argument('input', type=FileType('r'))
parser.add_argument('output', nargs='?', type=FileType(... | 41 | 23.85 | 82 | 12 | 235 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ff226396267e504d_432b88ea", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
19
] | [
null
] | [
9
] | [
22
] | |
2024-11-18T20:52:25.877261+00:00 | 1,469,531,285,000 | e6100b08ef46742273ffda6789fc50cd3d4e3686 | 2 | {
"blob_id": "e6100b08ef46742273ffda6789fc50cd3d4e3686",
"branch_name": "refs/heads/master",
"committer_date": 1469531285000,
"content_id": "7f330078780c5c4195535379a8bf21da5cc1fea9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "85550d94a02496dbe6720e53b2f40fb8cbc28a74",
"extension": "py"... | 2.34375 | stackv2 | # -*- coding: UTF-8 -*-
import hashlib
import base64
import datetime
import urllib2
import json
class TemplateSMS:
account_sid = ''
account_token = ''
app_id = ''
server_ip = ''
server_port = ''
soft_version = ''
timestamp = ''
def set_account(self, account_sid, token):
self.a... | 81 | 35.49 | 113 | 18 | 701 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_3a951a9db3a5e977_3340a33e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that i... | [
35,
64
] | [
null,
null
] | [
20,
20
] | [
29,
29
] | |
2024-11-18T20:52:30.140740+00:00 | 1,608,452,525,000 | a4bd2e7f15551215480f0450ff9e84f5772169c1 | 3 | {
"blob_id": "a4bd2e7f15551215480f0450ff9e84f5772169c1",
"branch_name": "refs/heads/main",
"committer_date": 1608452525000,
"content_id": "e998b4166f6fc250438f0aa73a65c93ff8173f26",
"detected_licenses": [
"MIT"
],
"directory_id": "af91ba1b8b808aeb72cbe80f0f225415679bf5ed",
"extension": "py",
"file... | 3.4375 | stackv2 | import re
DEBUG = False
class filethingy:
values = []
def __init__(self, filename):
self.values = []
f = open(filename, 'r')
for line in f:
self.values.append(line)
# print("input: ", self.values)
class findvalid:
"""class to solve the problem at hand
"... | 59 | 26 | 85 | 16 | 413 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_19d7be59a0671a92_91280d9c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
36
] | [
null
] | [
15
] | [
59
] | |
2024-11-18T20:52:33.641133+00:00 | 1,629,007,668,000 | 3c5db701516105a096a9d29ee2373daf00eb5f71 | 3 | {
"blob_id": "3c5db701516105a096a9d29ee2373daf00eb5f71",
"branch_name": "refs/heads/main",
"committer_date": 1629007668000,
"content_id": "22d68005d97f4f14a1e5f9d4c0e8734830656f2d",
"detected_licenses": [
"MIT"
],
"directory_id": "6f42bc8da6931b6577eb00ba851e97b2b8017332",
"extension": "py",
"file... | 2.5625 | stackv2 | from flask import Flask, render_template, request
import requests as r
import pyqrcode
from pyqrcode import QRCode
import io
app = Flask(__name__)
@app.route('/')
def home():
return render_template('home.html')
@app.route('/scan',methods=['GET','POST'])
def qrcode():
gambar=None
gambar = io.BytesIO()
... | 49 | 21.88 | 99 | 12 | 298 | python | [{"finding_id": "codeql_py/flask-debug_8c3092ca83537b08_23420ab1", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
49,
46
] | [
null,
null
] | [
5,
12
] | [
24,
16
] | |
2024-11-18T20:52:38.477434+00:00 | 1,601,632,082,000 | 5e2def12bd2a2895e17b23bd73a51268e6ad3ac8 | 3 | {
"blob_id": "5e2def12bd2a2895e17b23bd73a51268e6ad3ac8",
"branch_name": "refs/heads/master",
"committer_date": 1601632082000,
"content_id": "410096acae1f8d57a6b2f0d5bb3fbc48ec6d0d88",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "aeb03567266b28846ea2b4e24a22a47510829cba",
"extension": "py"... | 2.671875 | stackv2 | """
Simple service to download files from URL's extracted from Sesam data entities and upload
them to another URL
"""
import os
import tempfile
import logging
import json
import requests
from flask import Flask, Response, request
from sesamutils import VariablesConfig, sesam_logger
from sesamutils.flask import serve
... | 121 | 33.94 | 101 | 20 | 892 | python | [{"finding_id": "codeql_py/full-ssrf_8245b051430e3792_349e70e2", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/full-ssrf",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"The full URL of this request depends on a [user-provided value](1)."
] | [
57,
70
] | [
null,
null
] | [
19,
29
] | [
54,
67
] | |
2024-11-18T20:52:50.572542+00:00 | 1,535,255,264,000 | 576f249c26c05ad30bb62ac82bcfc56fb3df959f | 2 | {
"blob_id": "576f249c26c05ad30bb62ac82bcfc56fb3df959f",
"branch_name": "refs/heads/master",
"committer_date": 1535255264000,
"content_id": "8c1e2c347f55c65171bb3e8c9d95c780efdaa5c9",
"detected_licenses": [
"MIT"
],
"directory_id": "b61711f4b7b559517cdce14a4a79a67d58f93168",
"extension": "py",
"fi... | 2.421875 | stackv2 | from collections import namedtuple
from jinja2 import Environment, PackageLoader
from . import filters
Generator = namedtuple('Generator', ['generate_project'])
def is_valid_language(language):
return language.lower() in ['python']
def get_generator(language):
if is_valid_language(language):
ret... | 54 | 26.26 | 67 | 12 | 317 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b2ffaea365578ed2_e65963f4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
37
] | [
39
] | [
11
] | [
6
] | |
2024-11-18T20:52:56.432801+00:00 | 1,676,938,200,000 | 073aecb434e226ea04469b3ed18b0f023a1c81ad | 3 | {
"blob_id": "073aecb434e226ea04469b3ed18b0f023a1c81ad",
"branch_name": "refs/heads/master",
"committer_date": 1676938200000,
"content_id": "56b32c6e8568069a6121a5ff75cc927cc9fb7313",
"detected_licenses": [
"MIT"
],
"directory_id": "6f9069ed4eacaf006eb25e21195d19581651ca55",
"extension": "py",
"fi... | 2.796875 | stackv2 | import json
import logging
import shapely
import time
from shapely import speedups
if speedups.available:
speedups.enable()
from shapely.geometry import shape, Point
logger = logging.getLogger(__name__)
# load GeoJSON file containing sectors
with open('static/flightmap_europe_fir_uir.json') as f:
firuirs = js... | 55 | 34.58 | 78 | 15 | 446 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_898dbe33d58a3568_a9a3eaa9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text."
] | [
44
] | [
null
] | [
19
] | [
74
] | |
2024-11-18T19:02:29.882148+00:00 | 1,615,517,706,000 | b319a08b06efe5d7a4d0d83eb41abc178e03e24e | 3 | {
"blob_id": "b319a08b06efe5d7a4d0d83eb41abc178e03e24e",
"branch_name": "refs/heads/master",
"committer_date": 1615517706000,
"content_id": "d96d93dea7f56ee20adb6a8cd3d9626ad62e1b7a",
"detected_licenses": [
"MIT"
],
"directory_id": "f0a54fa8580357d129f6701a107fe02d063e0ea7",
"extension": "py",
"fi... | 2.9375 | stackv2 | # -*- coding:utf-8 -*-
import re
import json
import requests
"""
目标APP:Before避风【快手旗下】
目标url:APP视频分享链接
爬取思路:
1. 通过APP里的分享获取视频url
2. 对 https://hlg.xiatou.com/h5/feed/detail 发送get请求,获取json数据
"""
class Before(object):
def __init__(self, url):
self.url = url
self.session = requests.Session()
... | 62 | 35.34 | 115 | 21 | 612 | python | [{"finding_id": "codeql_py/overly-large-range_bb056d29fb3d9bef_9c635530", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
23
] | [
null
] | [
66
] | [
69
] | |
2024-11-18T19:02:57.955451+00:00 | 1,630,085,136,000 | 197f5b8a183ee3dc8ffc04949fa5d539bb1f6419 | 2 | {
"blob_id": "197f5b8a183ee3dc8ffc04949fa5d539bb1f6419",
"branch_name": "refs/heads/master",
"committer_date": 1630085136000,
"content_id": "1f9c16b21a1dd75f048b7a429a02a8bf121e5c0b",
"detected_licenses": [
"MIT"
],
"directory_id": "ce34c14dcf56bc042b1a49e87b7d7c5c70b6237d",
"extension": "py",
"fi... | 2.484375 | stackv2 | from sendgrid import SendGridAPIClient
from sendgrid.helpers.mail import Mail, From
from jinja2 import Template, Environment, FileSystemLoader
from config.config import Config
# sending email
def send_email(msg):
# load config file
configuration = Config()
# set message to variable
subject = msg['subj... | 67 | 30.22 | 67 | 14 | 477 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fc943d6a46707aeb_7b580a1f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
60
] | [
null
] | [
11
] | [
60
] | |
2024-11-18T19:14:53.628278+00:00 | 1,588,070,539,000 | 620e642c6ac81f2e530b88232574f701ae0b5c73 | 3 | {
"blob_id": "620e642c6ac81f2e530b88232574f701ae0b5c73",
"branch_name": "refs/heads/master",
"committer_date": 1588072610000,
"content_id": "29436efaf8967f465b72e3b0ca73898bbfd823be",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "567909720b1d72923bdf3237b50f087923a32337",
"extension": "py"... | 2.59375 | stackv2 | # /*
# * Copyright 2018 Nokia Solutions and Networks
# * Licensed under the Apache License, Version 2.0,
# * see license.txt file for details.
# */
import argparse
import os
import paramiko
import select
import sys
import zipfile
def mkdir_p(sftp, remote_directory):
"""Change to this directory, recursively makin... | 194 | 37.71 | 168 | 17 | 1,828 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_1696613c9a977a5f_c9de2797", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
178
] | [
null
] | [
null
] | [
58
] | |
2024-11-18T19:27:39.511160+00:00 | 1,587,821,996,000 | 581c0077a05ed7d80eeecf2b6ad6fe6372b8dea5 | 3 | {
"blob_id": "581c0077a05ed7d80eeecf2b6ad6fe6372b8dea5",
"branch_name": "refs/heads/master",
"committer_date": 1587821996000,
"content_id": "2d2ec3379b50437ac31f2d036e970a35a374b1d7",
"detected_licenses": [
"MIT"
],
"directory_id": "5478a6265b2aace785b2eb805cbddcad4c07fb61",
"extension": "py",
"fi... | 2.65625 | stackv2 | """ Creation of Flask object along with configuration based on environment name specified in the settings file"""
import logging
from datetime import datetime as dt
from flask import Flask, Blueprint, request
from flask_restful import Api
from flask_sqlalchemy import SQLAlchemy
from flask_bcrypt import Bcrypt
from flas... | 68 | 27.76 | 127 | 15 | 415 | python | [{"finding_id": "codeql_py/log-injection_a475aec9007e8db4_44c761cf", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 5 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
46,
48,
49,
53,
54
] | [
null,
null,
null,
null,
null
] | [
13,
13,
13,
13,
13
] | [
32,
27,
25,
29,
31
] | |
2024-11-18T19:27:40.987997+00:00 | 1,691,673,242,000 | b11ab73bb9b85a9e2c9fa6dafd3905aed124fd66 | 3 | {
"blob_id": "b11ab73bb9b85a9e2c9fa6dafd3905aed124fd66",
"branch_name": "refs/heads/master",
"committer_date": 1691673242000,
"content_id": "0a46bfddafdd007abcdc3a544316e9d23ce1c735",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "10b2b8d1d77c70c700885cd43ca8d341034ff734",
"extension": "py"... | 2.703125 | stackv2 | #!/usr/bin/env python3
#
# generate_docker_compose.py
#
# Generate configuration from Jinja template.
#
# usage: python3 ./script/generate_docker_compose.py
# (call only from root repository)
#
# Generate configuration with .env.values:
# - from docker-compose.yml.template (Jinja template) to docker-compose.yml
# - fro... | 121 | 32.13 | 91 | 15 | 861 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d16738b5592f575b_4bc5cdb0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
74
] | [
76
] | [
15
] | [
6
] | |
2024-11-18T19:27:46.442310+00:00 | 1,540,802,274,000 | 6a00e1fb1aa546037240908bc0f15488322e6311 | 3 | {
"blob_id": "6a00e1fb1aa546037240908bc0f15488322e6311",
"branch_name": "refs/heads/master",
"committer_date": 1540802274000,
"content_id": "1c52b5f83721a9c3a5b11ad81ce6d23fe17f7145",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "5ed2e645da9afbd2b9bbb83c492cad0f44530954",
"extension": "p... | 2.625 | stackv2 | # coding: utf-8
import requests
from flask import request, Response
class Proxy(object):
def __init__(self, app=None):
self.upstreams = []
self.init_app(app)
def init_app(self, app):
"""Initialize this class with the given :class:`flask.Flask`
application.
:param app... | 89 | 29.09 | 68 | 17 | 542 | python | [{"finding_id": "codeql_py/reflective-xss_e52cac873e3df0c6_27250deb", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-918"
] | [
"py/reflective-xss",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
86,
71
] | [
null,
78
] | [
29,
20
] | [
44,
33
] | |
2024-11-18T19:38:33.200618+00:00 | 1,588,336,244,000 | cb02462a3dc8a79d6f445e1095b55f0eb017b2e3 | 3 | {
"blob_id": "cb02462a3dc8a79d6f445e1095b55f0eb017b2e3",
"branch_name": "refs/heads/master",
"committer_date": 1588336244000,
"content_id": "4b9801557e9bf9d9593308e7c8862b91c7833e71",
"detected_licenses": [
"MIT"
],
"directory_id": "e36d17f9af9429f0f00a8221abd24b311a2d2df9",
"extension": "py",
"fi... | 2.625 | stackv2 | # -*- coding: utf-8 -*-
import scrapy
from scrapeNews.items import ScrapenewsItem
from scrapeNews.settings import logger
from dateutil import parser
class NdtvSpider(scrapy.Spider):
name = 'ndtv'
custom_settings = {
'site_id': 104,
'site_name': 'NDTV',
'site_url': 'https://www.ndtv.com... | 147 | 50.6 | 138 | 19 | 1,698 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_9ee5b5731c44f9f8_8d8f21b7", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [gadgets.ndtv.com](1) may be at an arbitrary position i... | 28 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE... | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitizatio... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MED... | [
"The string [gadgets.ndtv.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [www.ndtv.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [auto.ndtv.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [food.ndtv.com](1) may be at an arb... | [
53,
55,
57,
59,
61,
63,
65,
76,
78,
78,
80,
80,
82,
84,
96,
100,
104,
104,
108,
108,
112,
127,
129,
129,
131,
133,
135,
135
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
16,
18,
18,
18,
18,
18,
18,
16,
18,
52,
18,
55,
18,
18,
16,
18,
18,
53,
18,
53,
18,
16,
18,
55,
18,
18,
18,
56
] | [
50,
48,
49,
49,
51,
51,
51,
50,
48,
83,
51,
88,
49,
51,
50,
48,
49,
86,
49,
86,
51,
46,
51,
88,
49,
49,
52,
89
] | |
2024-11-18T19:38:44.138531+00:00 | 1,639,897,812,000 | 4eb0623e0b9f2038c678cd8e732d18fcdf6cb8fa | 3 | {
"blob_id": "4eb0623e0b9f2038c678cd8e732d18fcdf6cb8fa",
"branch_name": "refs/heads/master",
"committer_date": 1639897812000,
"content_id": "277a2a8fe4d547e3965745c47616675723dc220a",
"detected_licenses": [
"MIT"
],
"directory_id": "74be39a2172a1c9afcd4f44df9f6f9fb8fb8f804",
"extension": "py",
"fi... | 2.765625 | stackv2 | # -*- coding: utf-8 -*-
"""
Marker Cluster plugin
---------------------
Creates a MarkerCluster plugin to add on a folium map.
"""
from jinja2 import Template
from branca.element import JavascriptLink, CssLink, MacroElement, Figure
from folium.map import Popup, Icon, Marker
class MarkerCluster(MacroElement):
... | 75 | 32.8 | 130 | 15 | 545 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_96b3134337f4175b_dceaf2d5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
51
] | [
56
] | [
26
] | [
17
] | |
2024-11-18T19:38:44.568215+00:00 | 1,593,109,769,000 | fd6389db5e29b0d0a78bfd4b03df5dd0e509ecf2 | 2 | {
"blob_id": "fd6389db5e29b0d0a78bfd4b03df5dd0e509ecf2",
"branch_name": "refs/heads/master",
"committer_date": 1593109769000,
"content_id": "2ccbfa42d85e402ced7382607844a30877d117bd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7604095b8355f1221123ae9dbab2ad294756ca4c",
"extension": "py"... | 2.40625 | stackv2 | #!/usr/bin/env python3
#
# fritzswitch - Switch your Fritz!DECT200 via command line
#
# Copyright (C) 2014 Richard "Shred" Körber
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as
# published by the Free Software Foundation, either version... | 76 | 37.25 | 93 | 15 | 747 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_093c8416893e66a6_b85d1b65", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
46
] | [
null
] | [
24
] | [
51
] | |
2024-11-18T19:38:56.421460+00:00 | 1,523,301,144,000 | 6e68f0528e08d5aae215b538ff7b26db57602277 | 3 | {
"blob_id": "6e68f0528e08d5aae215b538ff7b26db57602277",
"branch_name": "refs/heads/master",
"committer_date": 1523301144000,
"content_id": "46193f81dd83934e181a015c006faae50b22a099",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "24a5f9fcb96369add6af2690d340e9a9ecc00d3e",
"extension": "py"... | 2.640625 | stackv2 | import datetime
import json
from flask import Flask
from flask import request
from flask_restful import reqparse
app = Flask(__name__)
parser = reqparse.RequestParser()
parser.add_argument('pos')
parser.add_argument('neg')
def filter_blanks(dataset):
return [val for val in dataset if val is not None and val != '... | 139 | 32.24 | 139 | 27 | 1,122 | python | [{"finding_id": "codeql_py/flask-debug_19fcc756727060ad_2dc315be", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-079",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
137,
134,
84,
126
] | [
null,
null,
null,
null
] | [
5,
12,
19,
19
] | [
24,
49,
31,
31
] | |
2024-11-18T20:18:34.478791+00:00 | 1,673,701,306,000 | bc533470d1432ca0afc274ad704e688d641a28c4 | 3 | {
"blob_id": "bc533470d1432ca0afc274ad704e688d641a28c4",
"branch_name": "refs/heads/master",
"committer_date": 1673701306000,
"content_id": "2a3db9c0df6cac72387033db470e37705e843465",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7869c15427c2cb5d825b961b5a36e084d25f1fdd",
"extension": "py"... | 3.046875 | stackv2 | """
This module uses endesive to sign PDF files and provides
some classes to manage this and to help render the signature
into the body of the PDF file (similar for portable signer)
"""
import logging
import datetime
import OpenSSL.crypto
import endesive.pdf
import pytz
__author__ = 'Stephen Brown (Little Fish Solut... | 134 | 37.12 | 124 | 17 | 1,101 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2b31a0ba5faa9710_dea72229", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
98
] | [
null
] | [
26
] | [
34
] | |
2024-11-18T20:18:37.136703+00:00 | 1,508,770,036,000 | 7bff82662bcd3e928ed013c94a492e7d30610f6b | 2 | {
"blob_id": "7bff82662bcd3e928ed013c94a492e7d30610f6b",
"branch_name": "refs/heads/master",
"committer_date": 1508770036000,
"content_id": "00abc4d30aa793f29e5706cd1f9ef9125dd7de26",
"detected_licenses": [
"MIT"
],
"directory_id": "a29d45978e121847aa36fd36dac515f073652273",
"extension": "py",
"fi... | 2.390625 | stackv2 | """Blueprint for user interface (the single page app) entry points"""
from flask import Blueprint, Response, g, redirect, render_template, request, send_file
from flask_security import current_user, login_required
from common.config import get_config
from ...flask_modules.jwt import create_jwt_for_user
_CONFIG = get_... | 55 | 37.13 | 90 | 14 | 450 | python | [{"finding_id": "codeql_py/url-redirection_401bccec153e7f0c_56484d5e", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
47
] | [
null
] | [
21
] | [
73
] | |
2024-11-18T20:31:36.198078+00:00 | 1,514,449,518,000 | e67d4b9eef47c1f6411298b43acf7720d890b151 | 3 | {
"blob_id": "e67d4b9eef47c1f6411298b43acf7720d890b151",
"branch_name": "refs/heads/master",
"committer_date": 1514449518000,
"content_id": "189c5815467bb3ecd92ece1c0bc331c61db8a5b6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "588fd74997a933d3dae48fee21780b441a84902d",
"extension": "py"... | 2.671875 | stackv2 | import uuid
import time
from hashlib import sha1, sha256
from chaintoken.wallet.token import Token
from chaintoken.database.client import Mongo
from chaintoken.settings import SECRET_KEY, ADDRESS_STARTSWITH, TRANSACTION_FEE, TRANSACTION_FEE_PERCENTS
class Wallet(object):
"""
Token wallet object
"""
cl... | 217 | 26.05 | 123 | 21 | 1,177 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1c3525416b26d1cd_342b3f2f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (SH... | [
47,
193,
194
] | [
null,
null,
null
] | [
25,
29,
29
] | [
47,
32,
48
] | |
2024-11-18T20:43:18.822774+00:00 | 1,469,309,231,000 | 318aff9778b54e938286c2231cf9bdcf984dad2c | 3 | {
"blob_id": "318aff9778b54e938286c2231cf9bdcf984dad2c",
"branch_name": "refs/heads/master",
"committer_date": 1469309231000,
"content_id": "0f8523d14c9b11a884059bde9d616deceded55b7",
"detected_licenses": [
"MIT"
],
"directory_id": "97039b47204ceccfc11f572f4b5715111d6db4ff",
"extension": "py",
"fi... | 2.59375 | stackv2 | from flask import Flask, render_template, request, json, Response, redirect
from flask_sqlalchemy import SQLAlchemy
from werkzeug.utils import secure_filename
from errors import *
import os
app = Flask(__name__)
app.config.from_object(os.environ['APP_SETTINGS'])
app.config['SQLALCHEMY_TRACK_MODIFICATIONS'] = False
db... | 302 | 31.9 | 79 | 19 | 2,312 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b656cc2155ead220_3662ef00", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-022"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2)."
] | [
164,
165,
118
] | [
null,
null,
null
] | [
28,
28,
23
] | [
47,
54,
31
] | |
2024-11-18T20:43:22.031856+00:00 | 1,693,778,182,000 | 56a46711306b00246c040c5a34ea0b615fb31dc7 | 3 | {
"blob_id": "56a46711306b00246c040c5a34ea0b615fb31dc7",
"branch_name": "refs/heads/master",
"committer_date": 1693778182000,
"content_id": "60e0a22a0b84354e8daf308d5ddf7f1280c6c604",
"detected_licenses": [
"MIT"
],
"directory_id": "2a1b8a671aceda6bc446f8ce26400aa84fa444a6",
"extension": "py",
"fi... | 2.578125 | stackv2 | import demistomock as demisto # noqa: F401
from CommonServerPython import * # noqa: F401
from pathlib import Path
from multiprocessing import Process
import resource
import re
import time
import subprocess
import requests
import urllib3
urllib3.disable_warnings()
CLOUD_METADATA_URL = 'http://169.254.169.254/' #... | 260 | 37.1 | 165 | 19 | 2,426 | python | [{"finding_id": "codeql_py/request-without-cert-validation_0437501a5c553b72_a2bd4673", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
190
] | [
null
] | [
19
] | [
82
] | |
2024-11-18T20:43:49.238234+00:00 | 1,610,081,685,000 | fcbed948be207540a102de8e395c4c6d64d9ae9e | 3 | {
"blob_id": "fcbed948be207540a102de8e395c4c6d64d9ae9e",
"branch_name": "refs/heads/master",
"committer_date": 1610081685000,
"content_id": "eabd0fe41f96f98f77a73c6fc79e538721385b9e",
"detected_licenses": [
"MIT"
],
"directory_id": "e5e9032965f2593fc2e022604887aee582c9c198",
"extension": "py",
"fi... | 2.53125 | stackv2 | import argparse
from collections import defaultdict, Counter
import json
import re
from tqdm import tqdm
RE_TAGGING = re.compile(r'^(O|B(o|b(i[_~])+|I[_~])*(I[_~])+)+$')
# don't support plain I and i
STRENGTH = {'I_': '_', 'I~': '~', 'i_': '_', 'i~': '~', 'B': None, 'b': None, 'O': None, 'o': None}
# don't support p... | 196 | 43.69 | 108 | 17 | 2,296 | python | [{"finding_id": "codeql_py/redos_2e1d68b4b2f38947_36be4942", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'B' and containing many repetition... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'B' and containing many repetitions of 'I_I_B'."
] | [
9
] | [
null
] | [
32
] | [
52
] | |
2024-11-18T20:44:05.514253+00:00 | 1,693,532,147,000 | 2f1bf62d594c15f3ca8e94effdd037e050c52417 | 2 | {
"blob_id": "2f1bf62d594c15f3ca8e94effdd037e050c52417",
"branch_name": "refs/heads/master",
"committer_date": 1693532147000,
"content_id": "5309153425c59e89cbb61e9db48aee8a06900bcd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a64358585c6833b254abc909e41f91126ce156b5",
"extension": "py"... | 2.359375 | stackv2 | #
# Pyserini: Reproducible IR research with sparse and dense representations
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required... | 283 | 40.36 | 137 | 15 | 2,714 | python | [{"finding_id": "codeql_py/tarslip_ac2d4b716fd753e9_7769c856", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](2).\nThis file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](2)."
] | [
160
] | [
null
] | [
5
] | [
12
] | |
2024-11-18T20:57:29.259520+00:00 | 1,447,286,394,000 | f7b656b58b9feac759f9da0def9e7e2481603f65 | 2 | {
"blob_id": "f7b656b58b9feac759f9da0def9e7e2481603f65",
"branch_name": "refs/heads/master",
"committer_date": 1447286423000,
"content_id": "c8819c4f305d65c30fac9dad20767fe84c45c636",
"detected_licenses": [
"MIT"
],
"directory_id": "7d17b1ab5dd70f0f38d42bcea484e4a52a1570f3",
"extension": "py",
"fi... | 2.484375 | stackv2 | # Quickie D3JS-NX interface for Jupyter Notebooks
# Copyright (c) Nick Timkovich 2015
# MIT Licensed
from __future__ import absolute_import, division, print_function
import random
import json
from IPython.display import HTML
import jinja2
__all__ = ['nx_force']
_LETTERS = 'bcdghjklmnpqrtvwyz'
_CHARS = _LETTERS + '34... | 164 | 24.88 | 76 | 14 | 1,097 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e3773ba9ef35745a_330674aa", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
16
] | [
null
] | [
8
] | [
28
] | |
2024-11-18T20:57:35.217825+00:00 | 1,634,590,691,000 | 74ba589797c234e760100460b71558803e09b631 | 3 | {
"blob_id": "74ba589797c234e760100460b71558803e09b631",
"branch_name": "refs/heads/main",
"committer_date": 1634590691000,
"content_id": "286bf1ec8f6135bb71bd878b329b3d96a7147135",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "50ae0be5b4946a6980ea109828508981879ec4a7",
"extension": "py",
... | 2.53125 | stackv2 | from pprint import pprint
import requests
from flask import Flask
from flask import request
app = Flask(__name__)
@app.route("/")
def whatsapp_echo():
return "WhatsApp HTTP API Echo server is ready!"
@app.route("/message", methods=["GET", "POST"])
def whatsapp_webhook():
data = request.get_json()
if n... | 40 | 25.3 | 82 | 13 | 261 | python | [{"finding_id": "codeql_py/full-ssrf_392bc904a9ccf5a1_a68e5a83", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 2 | true | [
"CWE-918",
"CWE-022"
] | [
"py/full-ssrf",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
31,
32
] | [
null,
null
] | [
13,
14
] | [
37,
18
] | |
2024-11-18T20:57:40.593626+00:00 | 1,590,211,141,000 | a70a14dfa4559d1d5b4db50a75aed532d261e5cd | 3 | {
"blob_id": "a70a14dfa4559d1d5b4db50a75aed532d261e5cd",
"branch_name": "refs/heads/master",
"committer_date": 1590211141000,
"content_id": "de5d16a8ad38334e53e362c22434b1dd67c10396",
"detected_licenses": [
"MIT"
],
"directory_id": "4b53c8242822e801a02309c541349d1fcc792358",
"extension": "py",
"fi... | 3.3125 | stackv2 | """
c13.py
Cryptopals Set 2, Challenge 13
"""
from Crypto.Cipher import AES
from Crypto.Random import get_random_bytes
from cryptopals import padding
secret_key = get_random_bytes(16)
def main():
# email=aaaaaaaaaa
# aaaaaaaaa@gmail.
# com&uid=10&role=
# user------------
email = 'a'*19 + '@gmai... | 72 | 22.54 | 72 | 12 | 447 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_fe805033c32edd39_adab6f66", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
60,
67
] | [
null,
null
] | [
12,
15
] | [
62,
65
] | |
2024-11-18T20:57:56.966156+00:00 | 1,516,180,614,000 | f0516cc25c055d05d50d3b6787416ddbca46c665 | 4 | {
"blob_id": "f0516cc25c055d05d50d3b6787416ddbca46c665",
"branch_name": "refs/heads/master",
"committer_date": 1516180614000,
"content_id": "d280f3519174143a0f8be70e551c3d075e33ebb4",
"detected_licenses": [
"MIT"
],
"directory_id": "e0cbd2a8868cb26d60e637763c3a37e3acb57c2f",
"extension": "py",
"fi... | 3.515625 | stackv2 | #!/usr/bin/env python
#_*_coding:utf-8_*_
#创建商品列表
product_list = [
('Robot',200000),
('MacPro',12000),
('Iphone8',8888),
('Hello World',1200),
]
#创建购物车列表
shopping_list = []
user_salary=input("请输入你的工资:")
if user_salary.isdigit():
user_salary = int(user_salary)
while True:... | 43 | 28.4 | 68 | 17 | 303 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b7cd0e92539ef613_4cd03827", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
31,
33
] | [
null,
null
] | [
51,
35
] | [
62,
46
] | |
2024-11-18T20:58:17.981696+00:00 | 1,622,659,659,000 | 0cc1a7f480de7a03bb5b7025a3e50974e8171fdc | 3 | {
"blob_id": "0cc1a7f480de7a03bb5b7025a3e50974e8171fdc",
"branch_name": "refs/heads/master",
"committer_date": 1622659659000,
"content_id": "2082dd70ac1691b665cd5f747fcbc4b55c9daa9e",
"detected_licenses": [
"MIT"
],
"directory_id": "2c76a7de56619d90e404f0bcde784596010bb4a9",
"extension": "py",
"fi... | 3.125 | stackv2 | """
Board handling.
"""
import csv
import logging as log
from random import shuffle
_CAT_FIELD = {'go','jail','parking','gojail','tax','chance','community'}
_CAT_BUYABLE = {'utility','station'}
FIELD_POSITION = {
'Go' : 0,
'Pall Mall' : 11,
'Marylebone Station' : 15,
'Trafalgar Square'... | 354 | 34.12 | 89 | 23 | 2,828 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_783316df6e7076b6_88566b0e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
242
] | [
null
] | [
66
] | [
74
] | |
2024-11-18T20:58:34.764005+00:00 | 1,545,380,620,000 | 31536f9f9ee7a0ac514ab3e00479b68752da7047 | 2 | {
"blob_id": "31536f9f9ee7a0ac514ab3e00479b68752da7047",
"branch_name": "refs/heads/master",
"committer_date": 1545380620000,
"content_id": "38d04452f252ef634672390b1b9ba5e61e665a20",
"detected_licenses": [
"MIT"
],
"directory_id": "961d9e652a536a554f32257709685041279260dd",
"extension": "py",
"fi... | 2.484375 | stackv2 | # -*- coding: utf-8 -*-
import json
import os
import re
import urllib.request
import time
# 쓰레드, 큐를 위한 라이브러리 추가
import multiprocessing as mp
from threading import Thread
from bs4 import BeautifulSoup
from slackclient import SlackClient
from flask import Flask, request, make_response, render_template
app = Flask(__na... | 227 | 26.75 | 119 | 17 | 1,835 | python | [{"finding_id": "codeql_py/reflective-xss_339d8c6f1495ea30_1d96153e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
196,
202
] | [
null,
null
] | [
30,
23
] | [
54,
30
] | |
2024-11-18T20:58:40.078292+00:00 | 1,552,215,142,000 | 00170913f86657a265f46ae2d26b6e2e64fc8d6f | 2 | {
"blob_id": "00170913f86657a265f46ae2d26b6e2e64fc8d6f",
"branch_name": "refs/heads/master",
"committer_date": 1552215142000,
"content_id": "2c6f6e39e4f927230aa2cf1752211bb3e8d3f57d",
"detected_licenses": [
"MIT"
],
"directory_id": "09df178ff30004f5c220ef651ab663203f7ba672",
"extension": "py",
"fi... | 2.359375 | stackv2 | from __future__ import print_function
from flask import Blueprint, request, render_template, jsonify, current_app, redirect, url_for
import social.db.user as db_user
import social.db.follow as db_follow
import social.db.post as db_post
import json
from social.webserver.login import User
from flask_login import login_re... | 133 | 29.05 | 94 | 15 | 895 | python | [{"finding_id": "codeql_py/full-ssrf_686bfe3b4e74e322_d7d534fd", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/full-ssrf",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"The full URL of this request depends on a [user-provided value](1)."
] | [
104,
110
] | [
null,
null
] | [
9,
9
] | [
89,
91
] | |
2024-11-18T21:10:20.829430+00:00 | 1,634,319,148,000 | 0bdf9b5046b077bb4dc0c7e2707118f1bf578125 | 3 | {
"blob_id": "0bdf9b5046b077bb4dc0c7e2707118f1bf578125",
"branch_name": "refs/heads/master",
"committer_date": 1634319148000,
"content_id": "9a4497a0210755a2969baccfd8dd6c06a3979838",
"detected_licenses": [
"MIT"
],
"directory_id": "95506c7665f2b5cc75c42f893720f3f559b44a70",
"extension": "py",
"fi... | 2.796875 | stackv2 | import socket
import select
import pickle
from datetime import datetime
from bidict import bidict
import os
HOST = '127.0.0.1' #localhost
PORT = 5001 # Arbitrary non-privileged port
#Function which calls the appropariate helper functions to complete tasks
def executeTask(conn, data, activeUsers):
... | 166 | 34.96 | 88 | 21 | 1,588 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_db280c2ed2d7b179_6bb366b4", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
86
] | [
null
] | [
11
] | [
42
] | |
2024-11-18T21:10:47.567510+00:00 | 1,591,885,249,000 | 9400ed5e87aab3b26ffe0f96dcb4acd4fd6f8a5c | 3 | {
"blob_id": "9400ed5e87aab3b26ffe0f96dcb4acd4fd6f8a5c",
"branch_name": "refs/heads/master",
"committer_date": 1591885249000,
"content_id": "5b22540e51f594dffce14b2dfcb296952fcbba3f",
"detected_licenses": [
"MIT"
],
"directory_id": "4826128b95d63a9ac691ae80cc14829ec1db1fa6",
"extension": "py",
"fi... | 3.15625 | stackv2 | #!/usr/bin/env python3
"""Utility functions, includes: `hash_id` and `Validate` class."""
import re
def hash_id(*args: str or int) -> str:
"""A simple hashing function to generate `id`s given any number of string or number inputs."""
return ":".join([str(val) for val in args])
class Validate:
@staticme... | 47 | 33.3 | 98 | 17 | 477 | python | [{"finding_id": "codeql_py/overly-large-range_1ae21f277a5e4253_ba66d3a2", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 2 | true | [
"CWE-020",
"CWE-1333"
] | [
"py/overly-large-range",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].",
"This part of the regular expression may cause exponential backtracking on strings starting with 'http://' and containing many repetitions of '*'."
] | [
43,
43
] | [
null,
null
] | [
51,
32
] | [
54,
95
] | |
2024-11-18T21:11:01.699528+00:00 | 1,525,255,165,000 | e9e4eae552d12d5e279a88de292ed16f2e37bbb8 | 2 | {
"blob_id": "e9e4eae552d12d5e279a88de292ed16f2e37bbb8",
"branch_name": "refs/heads/master",
"committer_date": 1525255165000,
"content_id": "0083aeb9a142af84c20462c82e0e422dbb0d40f9",
"detected_licenses": [
"MIT"
],
"directory_id": "c8390a8b0057482d89e766c88e7e9286c79606be",
"extension": "py",
"fi... | 2.46875 | stackv2 | #!/anaconda3/envs/py3.6/bin/python
from PyPDF2 import PdfFileReader
import os
allpdfs = []
for filename in os.listdir('./'):
tmp = filename.split('.')
if filename.split('.')[-1] == 'pdf':
allpdfs.append(filename)
def pageCount(pdffile):
fp = open(pdffile, "rb")
pdf = PdfFileReader(fp, strict ... | 36 | 22.39 | 74 | 12 | 240 | python | [{"finding_id": "codeql_py/overly-permissive-file_580bfe308d035c58_2c3cf7c5", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
34
] | [
null
] | [
5
] | [
29
] | |
2024-11-18T19:03:23.557061+00:00 | 1,685,409,529,000 | 32e89016da6f0d4f87da3047f4a772b929faceae | 3 | {
"blob_id": "32e89016da6f0d4f87da3047f4a772b929faceae",
"branch_name": "refs/heads/master",
"committer_date": 1685409529000,
"content_id": "b8223ea935965719e9658b43d6328d9873195326",
"detected_licenses": [
"MIT"
],
"directory_id": "d456afaf2d77d3d4ae618d0180a47cb18a915cb5",
"extension": "py",
"fi... | 2.734375 | stackv2 | # Example code to download all diary data for patients with N_EVENTS or more events recorded
import seerpy
N_EVENTS = 10
seer_client = seerpy.SeerConnect()
# party_id can be blank to return all results
patients = seer_client.get_patients_dataframe()
patient_ids = patients['id']
for patient_id in patient_ids:
... | 30 | 35.77 | 97 | 15 | 263 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4b5b4b6d1ec7ad69_db897119", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
29
] | [
null
] | [
19
] | [
47
] | |
2024-11-18T19:03:40.715942+00:00 | 1,527,328,254,000 | c1629c9436fa390e6e819b704140a6e057d9eba6 | 3 | {
"blob_id": "c1629c9436fa390e6e819b704140a6e057d9eba6",
"branch_name": "refs/heads/master",
"committer_date": 1527328254000,
"content_id": "cf3abf8af55acd1e086c7d5315dd0a2f9a0d5187",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "0d3962551f0cf285b662b6e688afb1bc9734872d",
"extension": "p... | 2.59375 | stackv2 | import json
import pymongo
from flask import Flask, request
from bson import ObjectId
replica1 = 'mongod-0.mongodb-service.default.svc.cluster.local:27017'
replica2 = 'mongod-1.mongodb-service.default.svc.cluster.local:27017'
replica3 = 'mongod-2.mongodb-service.default.svc.cluster.local:27017'
uri = 'mongodb://main_... | 85 | 28.72 | 131 | 19 | 571 | python | [{"finding_id": "codeql_py/reflective-xss_3f7c8dd9cdbd73e9_1a3eba7d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
63,
78
] | [
66,
81
] | [
20,
20
] | [
15,
15
] | |
2024-11-18T19:28:39.197999+00:00 | 1,591,119,470,000 | 9e786b9f68e9796ef9571bb5cc4e456b2e673686 | 3 | {
"blob_id": "9e786b9f68e9796ef9571bb5cc4e456b2e673686",
"branch_name": "refs/heads/master",
"committer_date": 1591119470000,
"content_id": "7543fdd0d34c30f300b67659f232dc633572562d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b4f58b98cdccdfa29dcfab191952eea7db179eeb",
"extension": "py"... | 2.546875 | stackv2 | import os, base64
from flask import jsonify
from ccai.config import CONFIG
from ccai.image_processing.streetview import fetch_street_view_image
from ccai.image_processing.watermark import apply_watermark
def create_temp_dir(images, temp_dir):
images.download_links(temp_dir)
files = [f for f in os.listdir(tem... | 58 | 35.84 | 92 | 15 | 508 | python | [{"finding_id": "codeql_py/stack-trace-exposure_66cdffe2a4c0f497_6c55cda5", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
27
] | [
30
] | [
13
] | [
14
] | |
2024-11-18T19:28:58.315166+00:00 | 1,364,164,971,000 | 5593cc9e88df102de437519668a91a6b833e846b | 3 | {
"blob_id": "5593cc9e88df102de437519668a91a6b833e846b",
"branch_name": "refs/heads/master",
"committer_date": 1364164971000,
"content_id": "0c41b674a9b4eacd180ea0e04576d641ed652317",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0199ffc1e40738601f68cd437d7ad106ad62cc0c",
"extension": "py"... | 2.59375 | stackv2 | #!/usr/bin/env python
# Copyright 2013 Brett Slatkin
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law o... | 398 | 35.72 | 79 | 17 | 3,279 | python | [{"finding_id": "codeql_py/log-injection_119d71a3ee625fb1_4204707e", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 27 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE... | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-... | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MED... | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MED... | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depen... | [
104,
136,
136,
217,
217,
217,
228,
228,
228,
263,
263,
263,
263,
301,
301,
301,
301,
302,
302,
302,
327,
327,
327,
352,
352,
352,
352
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
67,
39,
49,
23,
33,
47,
27,
37,
51,
18,
28,
42,
58,
18,
28,
42,
58,
18,
27,
43,
39,
49,
63,
31,
39,
49,
63
] | [
71,
47,
61,
31,
45,
61,
35,
49,
65,
26,
40,
56,
66,
26,
40,
56,
66,
25,
41,
55,
47,
61,
77,
37,
47,
61,
77
] | |
2024-11-18T19:39:54.559626+00:00 | 1,577,014,193,000 | dfc61eb0125fbd37254c36f047f5d67344127dd5 | 2 | {
"blob_id": "dfc61eb0125fbd37254c36f047f5d67344127dd5",
"branch_name": "refs/heads/master",
"committer_date": 1577014193000,
"content_id": "f3b284b54204ec082ff4e09a5fba993aab9d1251",
"detected_licenses": [
"MIT"
],
"directory_id": "a5ca689c9926261d790db2864a4fcbc76647bf62",
"extension": "py",
"fi... | 2.40625 | stackv2 |
import requests
import sys, os,platform
'''
记得判断是否处于联网状态
'''
import re,random
import time
from datetime import datetime
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
from user_agents import user_agents
headers={
"Content-Type":"application/x-www-form-urlencoded",
... | 138 | 20.35 | 99 | 16 | 734 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b4a281af10fa5b01_979ea2e1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
53,
77
] | [
null,
null
] | [
23,
16
] | [
100,
78
] | |
2024-11-18T20:18:23.139271+00:00 | 1,621,400,818,000 | 9fd305773cb248f3b59473a45dac772e14760f98 | 3 | {
"blob_id": "9fd305773cb248f3b59473a45dac772e14760f98",
"branch_name": "refs/heads/master",
"committer_date": 1621400818000,
"content_id": "0c91676c0e5430c9a5a9d5c6f1b50c1c7895fc52",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "40f464e64333a63e833c246d39e1598e38592e99",
"extension": "py"... | 2.578125 | stackv2 | """
Validates generated prescriptions.
Valiation errors are written to stdout.
This duplicates functionality in the prescriptor validation script in the covid-xprize repo. It is copy-pasted here
to avoid tangling dependencies, but this could be cleaned up in future.
"""
# Copyright 2021 (c) Cognizant Digital Busines... | 233 | 37.46 | 123 | 20 | 2,030 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b3fd69c2291d09d0_422f1466", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
227
] | [
null
] | [
24
] | [
41
] | |
2024-11-18T20:29:43.511741+00:00 | 1,619,014,410,000 | 6e09a2e6a8f150cf32097d170ff2713d76b4ccc8 | 3 | {
"blob_id": "6e09a2e6a8f150cf32097d170ff2713d76b4ccc8",
"branch_name": "refs/heads/master",
"committer_date": 1619014410000,
"content_id": "738393e69d35202f55c7d35c45c65dd2c1e64538",
"detected_licenses": [
"MIT"
],
"directory_id": "e808f9dc447114dc811b0ab6e7e5799715681a37",
"extension": "py",
"fi... | 2.703125 | stackv2 | """Server app execution."""
import os
import random
import requests
from flask import Flask, render_template, abort, request
from QuoteEngine import Ingestor
from MemeEngine import MemeEngine
app = Flask(__name__)
meme = MemeEngine('./static')
def setup():
"""Load all resources."""
quote_files = ['./_data/... | 72 | 24.46 | 61 | 13 | 446 | python | [{"finding_id": "codeql_py/full-ssrf_41282a051a4339fc_b9a1c67a", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
61
] | [
null
] | [
20
] | [
62
] | |
2024-11-18T20:51:45.062112+00:00 | 1,634,138,655,000 | a4d7cfb9e2fc9629b1d4b8a3a484c6cf1542c8b9 | 3 | {
"blob_id": "a4d7cfb9e2fc9629b1d4b8a3a484c6cf1542c8b9",
"branch_name": "refs/heads/master",
"committer_date": 1634138655000,
"content_id": "a3d00182faa8099ee4029c9655646c128d16959a",
"detected_licenses": [
"MIT"
],
"directory_id": "e0ca2dcd3ab771c61ec2511d14a7f7e11af4f8b3",
"extension": "py",
"fi... | 2.578125 | stackv2 | #!/usr/bin/python
import glob
import json
import os
from pathlib import Path
from jinja2 import Environment, FileSystemLoader
CWD = Path(os.path.dirname(__file__))
env = Environment(loader=FileSystemLoader(CWD / "files/templates"))
tmp = env.get_template("README.jinja.md")
langs = dict()
for filename in glob.glob(... | 24 | 25.25 | 67 | 15 | 160 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c94766982ecfe0b1_f20ea0e1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
12
] | [
null
] | [
7
] | [
68
] | |
2024-11-18T19:07:10.504307+00:00 | 1,498,259,412,000 | 1a049e9696d0cbb5bf15165860ae62cfc7af7523 | 2 | {
"blob_id": "1a049e9696d0cbb5bf15165860ae62cfc7af7523",
"branch_name": "refs/heads/master",
"committer_date": 1498259412000,
"content_id": "adf860145e2c6d3b15a74410d1a585f129140f82",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "55060af49549a8f916d198437ff9bf44559c2e77",
"extension": "py"... | 2.375 | stackv2 |
import os
import nltk
import csv
import pickle
import urllib2
import numpy as np
import ka
from multiprocessing import Process, Lock
dirs = ["data/aclImdb/test/pos", "data/aclImdb/test/neg", "data/aclImdb/train/pos", "data/aclImdb/train/neg"]
url = "http://ai.stanford.edu/~amaas/data/sentiment/aclImdb_v1.tar.gz"
def... | 174 | 31.54 | 115 | 20 | 1,418 | python | [{"finding_id": "codeql_py/tarslip_2ba5f4af4fc3b714_28d86e9f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
25
] | [
null
] | [
9
] | [
14
] | |
2024-11-18T19:07:34.173537+00:00 | 1,595,929,662,000 | 99699fc360dc0f64b7e44e64d8b6104cc9ce98f7 | 2 | {
"blob_id": "99699fc360dc0f64b7e44e64d8b6104cc9ce98f7",
"branch_name": "refs/heads/master",
"committer_date": 1595929662000,
"content_id": "747bc83590562ef164052b7cc6487f39610a743b",
"detected_licenses": [
"MIT"
],
"directory_id": "6a36dbfce4e411261eb92efb70f29829e4562227",
"extension": "py",
"fi... | 2.453125 | stackv2 | from grafana_backup.create_folder import main as create_folder
from grafana_backup.create_datasource import main as create_datasource
from grafana_backup.create_dashboard import main as create_dashboard
from grafana_backup.create_alert_channel import main as create_alert_channel
from glob import glob
import tarfile, te... | 43 | 41.81 | 95 | 19 | 370 | python | [{"finding_id": "codeql_py/tarslip_0e303dbbc3354d70_d174b6eb", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
21
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T19:07:43.574119+00:00 | 1,573,968,116,000 | a2e0047f31485b12a46032e71574dfb037ce207e | 3 | {
"blob_id": "a2e0047f31485b12a46032e71574dfb037ce207e",
"branch_name": "refs/heads/master",
"committer_date": 1573968116000,
"content_id": "9cda63fa270006dbbba905a9e7ce592bce42de2c",
"detected_licenses": [
"MIT"
],
"directory_id": "0c7df95fcab916d93f5fb5d0b1bd13acb547963d",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/env python3
import requests
import base64
import re
from levels_credentials import credentials, folder
level_url = credentials[9]["url"]
level_username = credentials[9]["level"]
level_password = credentials[9]["password"]
next_level_url = credentials[10]["url"]
next_level_username = credentials[10]["level... | 34 | 30.47 | 93 | 11 | 266 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e6c7e5793c33d67c_af9c856c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
33
] | [
null
] | [
15
] | [
28
] | |
2024-11-18T19:07:51.116152+00:00 | 1,676,981,946,000 | 9f56d7826dee98d3d447d130ea557a02ebcb49ca | 3 | {
"blob_id": "9f56d7826dee98d3d447d130ea557a02ebcb49ca",
"branch_name": "refs/heads/master",
"committer_date": 1676981946000,
"content_id": "20b8b641b7223492f0fe66f4830f92380c29a11d",
"detected_licenses": [
"MIT"
],
"directory_id": "2b4741f8d0985d9cb6aa9110ad501879a9de0128",
"extension": "py",
"fi... | 3.234375 | stackv2 | class ExtratorArgumentosUrl:
def __init__(self, url):
if self.url_eh_valida(url):
self.url = url
else:
raise LookupError('Url inválida')
@staticmethod
def url_eh_valida(url):
if url and url.startswith("https://bytebank.com"):
return True
e... | 48 | 35.08 | 91 | 13 | 454 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_3b5cb62061e44b58_65595f55", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://bytebank.com](1) may be at an arbitrary positi... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [https://bytebank.com](1) may be at an arbitrary position in the sanitized URL."
] | [
10
] | [
null
] | [
20
] | [
58
] | |
2024-11-18T19:07:57.841642+00:00 | 1,582,785,043,000 | 3efd99d1f25fa54015b16971c95cd6d910d9360c | 2 | {
"blob_id": "3efd99d1f25fa54015b16971c95cd6d910d9360c",
"branch_name": "refs/heads/master",
"committer_date": 1582785043000,
"content_id": "9d3d8eeddf97fcdf1dcdd4dded61ae05f6160ce3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "28a519d3ca21b91184e97d06a4a736d0079bb74f",
"extension": "py"... | 2.328125 | stackv2 | #!/usr/bin/env python
from __future__ import print_function
from future.standard_library import install_aliases
install_aliases()
import urllib3
from urllib.parse import urlparse, urlencode
from urllib.request import urlopen, Request
from urllib.error import HTTPError
import base64
import json
import os
from textblob... | 117 | 23.53 | 119 | 13 | 689 | python | [{"finding_id": "codeql_py/reflective-xss_ecfd23c1a77eb8cb_72442e81", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
34
] | [
null
] | [
23
] | [
26
] | |
2024-11-18T19:08:00.236584+00:00 | 1,393,340,126,000 | ab07ae62ffddc1b029bb9d8dc00908892452f79a | 3 | {
"blob_id": "ab07ae62ffddc1b029bb9d8dc00908892452f79a",
"branch_name": "refs/heads/master",
"committer_date": 1393340126000,
"content_id": "9dbad579268a6219da224b0af749c5180f6d8053",
"detected_licenses": [
"MIT"
],
"directory_id": "729958b2af793bffaec179cd40598990be491fea",
"extension": "py",
"fi... | 2.59375 | stackv2 | import sys, os, tarfile
from ftplib import FTP
from src.utils import select_files, get_local_timestamp, get_remote_timestamp, \
update_progress, create_folder, is_compressed, is_tgz, is_gz, \
extract_gz, extract_tar
from src.exceptions import ConnectionException, FtpPathExcep... | 242 | 40.52 | 102 | 20 | 2,127 | python | [{"finding_id": "codeql_py/tarslip_ce351e06bdfbd8c9_b358d99c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/tarslip",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
211,
213
] | [
null,
null
] | [
41,
41
] | [
48,
48
] | |
2024-11-18T19:18:30.279099+00:00 | 1,633,295,933,000 | 39cd6ed045da3dd968f736612f4e363b65f5a724 | 3 | {
"blob_id": "39cd6ed045da3dd968f736612f4e363b65f5a724",
"branch_name": "refs/heads/master",
"committer_date": 1633295933000,
"content_id": "e64ed1a624f104201aba3dc8c52002e9e518f2c1",
"detected_licenses": [
"MIT"
],
"directory_id": "0051a8ec096dc0eb7a1dbdea5583f3aec5d8c4b1",
"extension": "py",
"fi... | 2.578125 | stackv2 | import os
import threading
import json
import re
from datetime import date
from flask import Flask, request
from itsdangerous import URLSafeSerializer, BadSignature
from src import parsing
from src.log import logging
from src.persistence import Database
from src.persistence import documents
from src.mail import Recei... | 422 | 38.41 | 120 | 24 | 3,614 | python | [{"finding_id": "codeql_py/polynomial-redos_9338d1c93f115a54_b8fe8494", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma... | 3 | true | [
"CWE-1333",
"CWE-079",
"CWE-079"
] | [
"py/polynomial-redos",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'.\nThis [regular expression](3) that depends on a [user-provided value](2) may run slow on strings starting with 'a+caf_=' and with many repetitions of 'a+caf_='.",
"Cross-site scripting vu... | [
285,
152,
234
] | [
null,
null,
null
] | [
50,
16,
16
] | [
57,
36,
25
] | |
2024-11-18T19:18:51.370450+00:00 | 1,513,635,274,000 | 48808bd0e5d5a5a7c9678571e79942eef53e6506 | 2 | {
"blob_id": "48808bd0e5d5a5a7c9678571e79942eef53e6506",
"branch_name": "refs/heads/master",
"committer_date": 1513635274000,
"content_id": "5c022ac871a8b9f8c9f966f7fa063fa918bff64e",
"detected_licenses": [
"MIT"
],
"directory_id": "6807c9041abff6f7f6f00b86db414b01290a24ed",
"extension": "py",
"fi... | 2.40625 | stackv2 | from django.core.exceptions import ValidationError
from django.core.validators import URLValidator
from rest_framework import status
from rest_framework.mixins import CreateModelMixin, RetrieveModelMixin, ListModelMixin, DestroyModelMixin
from rest_framework.response import Response
from rest_framework.viewsets import ... | 72 | 32.26 | 110 | 16 | 469 | python | [{"finding_id": "codeql_py/stack-trace-exposure_4bb2b41c3c1b21a4_808e3bd0", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
45
] | [
null
] | [
29
] | [
42
] | |
2024-11-18T19:18:52.408421+00:00 | 1,299,808,539,000 | b9d272797fab8e837cc3a247c7e87cbfc2b99c1e | 3 | {
"blob_id": "b9d272797fab8e837cc3a247c7e87cbfc2b99c1e",
"branch_name": "refs/heads/master",
"committer_date": 1299808539000,
"content_id": "feab7128cc399f7d130037d192490dbb2c0afdbb",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "9b657cc5c3fcba61f8d58678e354484810571460",
"extension": "p... | 2.671875 | stackv2 | ## \defgroup configyml
# \ingroup madpack
# routines to pull information out of the Config.yml, Version.yml, and
# Install.yml files.
import yaml
import re
import subprocess
from itertools import chain
##
# A Python exception class for our use
class MadPackConfigError(Exception):
def __init__(self, value):
... | 189 | 30.55 | 119 | 17 | 1,486 | python | [{"finding_id": "codeql_py/overly-large-range_dd2df2df4166738e_70943a0c", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\w in the same character class."
] | [
89
] | [
null
] | [
26
] | [
29
] | |
2024-11-18T19:19:01.071256+00:00 | 1,548,784,812,000 | 75e225ecb064a28bf8fbd70efc28cfe0445585e6 | 2 | {
"blob_id": "75e225ecb064a28bf8fbd70efc28cfe0445585e6",
"branch_name": "refs/heads/master",
"committer_date": 1548784812000,
"content_id": "432b815fb08ae522597446bff78879070b265e8f",
"detected_licenses": [
"MIT"
],
"directory_id": "05846cd9dedf6f148a3b045e91f76cf9b1b9279c",
"extension": "py",
"fi... | 2.453125 | stackv2 | # -*- coding: utf-8 -*-
from __future__ import absolute_import, print_function
import logging
import threading
import requests
from . import wake_on_lan
from .utils import LogIt, LogItWithReturn
logger = logging.getLogger('samsungctl')
class WebSocketBase(object):
"""Base class for TV's with websocket connectio... | 91 | 24.68 | 72 | 18 | 499 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4de38c66bf18e1a2_612686b4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
26
] | [
null
] | [
19
] | [
31
] | |
2024-11-18T19:29:43.237206+00:00 | 1,436,606,293,000 | e1361c168709a01e72185ecfafb4338e86b551d0 | 3 | {
"blob_id": "e1361c168709a01e72185ecfafb4338e86b551d0",
"branch_name": "refs/heads/master",
"committer_date": 1436606293000,
"content_id": "5823725c1428f0b7da736fe533deb633ceb92ce0",
"detected_licenses": [
"MIT"
],
"directory_id": "c938df69057707856d5d50c992c7d93105398b45",
"extension": "py",
"fi... | 2.5625 | stackv2 | """A Team Cowboy API client."""
import hashlib
import httplib
import json
import random
import sys
import time
import urllib
class TeamCowboyException(Exception):
"""A Team Cowboy error."""
pass
class TeamCowboy(object):
"""A Team Cowboy API client."""
def __init__(self, public_key, private_key):
"""C... | 193 | 26.33 | 79 | 17 | 1,271 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7100df3c61c498b4_97e12676", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.\... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
193
] | [
null
] | [
25
] | [
26
] | |
2024-11-18T19:44:15.904974+00:00 | 1,614,594,387,000 | 84cc6dda26d5504fa79273828060ccbf624da16e | 4 | {
"blob_id": "84cc6dda26d5504fa79273828060ccbf624da16e",
"branch_name": "refs/heads/main",
"committer_date": 1614594387000,
"content_id": "ea1d2086d4bd3ae505593962edbfcd807e0e798e",
"detected_licenses": [
"MIT"
],
"directory_id": "85e100c24a867cc29d30936bfa9bbc093c1d6def",
"extension": "py",
"file... | 3.890625 | stackv2 | # -*- coding: utf-8 -*-
########################################################################
# #
# #
# #
# MI... | 49 | 32.57 | 114 | 14 | 348 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7689eb1262d61d75_2ed60ae3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
47
] | [
null
] | [
11
] | [
15
] | |
2024-11-18T19:44:17.141515+00:00 | 1,692,475,624,000 | e83d7523055bedae6db51e97c24bb42d20795d67 | 3 | {
"blob_id": "e83d7523055bedae6db51e97c24bb42d20795d67",
"branch_name": "refs/heads/master",
"committer_date": 1692475624000,
"content_id": "2d5b6fd706db65c96878727d4e33baa3702dafcf",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "baeebadd5786ee0e96626741da650d5c2e277b52",
"extension": "py"... | 2.53125 | stackv2 | #-*- coding:utf-8; mode:python; indent-tabs-mode: nil; c-basic-offset: 2; tab-width: 2 -*-
import os, os.path as path, pkgutil, sys
from bes.fs.file_path import file_path
from bes.fs.file_util import file_util
from bes.fs.temp_file import temp_file
class package(object):
'Class to deal with python packages.'
@cl... | 59 | 37.88 | 112 | 18 | 573 | python | [{"finding_id": "codeql_py/overly-permissive-file_05f45983edcea775_32e04e62", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
20
] | [
null
] | [
7
] | [
31
] | |
2024-11-18T19:44:27.489900+00:00 | 1,469,889,830,000 | 9747a2bd65c7e7baf0b6e92d84f4050711ec7938 | 3 | {
"blob_id": "9747a2bd65c7e7baf0b6e92d84f4050711ec7938",
"branch_name": "refs/heads/master",
"committer_date": 1469889830000,
"content_id": "dd47a3951a4e8c57921e15f1e7332f1f5be6b57a",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "596ad20cba78221817dbb29aecb88abf15145f54",
"extension": "py",
... | 2.953125 | stackv2 | #!/usr/bin/python
from Crypto.Cipher import ARC4
from ctypes import *
# shellcode to give /bin/sh using execve sys call
shell_code = ("\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x89\xe2\x53\x89\xe1\xb0\x0b\xcd\x80")
#i want to display the encrypted and decrypted shellcode in hex format so crea... | 41 | 26.54 | 117 | 10 | 348 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_c38f4a769a4d892b_05761db4", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.",
"[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used."
] | [
25,
29
] | [
null,
null
] | [
12,
18
] | [
33,
37
] | |
2024-11-18T19:44:30.841358+00:00 | 1,693,345,400,000 | 3ed684a3ee0b400eea87f40a0062a160e4919380 | 3 | {
"blob_id": "3ed684a3ee0b400eea87f40a0062a160e4919380",
"branch_name": "refs/heads/master",
"committer_date": 1693345400000,
"content_id": "c60ecdc0079a53b1ffa27731b2600c1e14318fcb",
"detected_licenses": [
"MIT"
],
"directory_id": "8018cbc929b44be4a203dafa661a566151bb801d",
"extension": "py",
"fi... | 2.625 | stackv2 | from flask import jsonify, session, request, make_response
from flask_restful import Resource
from api.db import db
from api.models.post_tag import PostTag
from api.resources.authentication import requires_auth
class PostTagResource(Resource):
def get(self, id):
"""
Returns a post tag by id.
... | 116 | 24.34 | 79 | 18 | 614 | python | [{"finding_id": "codeql_py/stack-trace-exposure_2f370d4ee45f0aa1_debee559", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
61,
96
] | [
null,
null
] | [
63,
63
] | [
73,
73
] | |
2024-11-18T19:44:34.012081+00:00 | 1,693,494,236,000 | b58f9aa0c73b5b2e4fd3ab8549f2eb28ae7f34ae | 2 | {
"blob_id": "b58f9aa0c73b5b2e4fd3ab8549f2eb28ae7f34ae",
"branch_name": "refs/heads/master",
"committer_date": 1693494236000,
"content_id": "f953f66b1095e2580db3b8971c0d872176608df5",
"detected_licenses": [
"MIT"
],
"directory_id": "96a34a048c783a75736bf0ec775df22142f9ee53",
"extension": "py",
"fi... | 2.40625 | stackv2 | """ CRUD operations on a computation's tasks sub-resource
A task is computation sub-resource that respresents a running computational service in the pipeline described above
Therefore,
- the task ID is the same as the associated node uuid
"""
import logging
from typing import NamedTuple
import networkx as nx
from ... | 181 | 32.73 | 115 | 14 | 1,370 | python | [{"finding_id": "codeql_py/log-injection_d12ed8452714211e_4ea4ec54", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).\nThis log entry depends on a [user-provided value](3).\nThis log entry depends on a [user-provided value](4).\nThis log entry depends on a [user-provided value](5)."
] | [
95
] | [
null
] | [
13
] | [
51
] | |
2024-11-18T19:44:43.131263+00:00 | 1,632,062,403,000 | c7dc2a3d56bdb517df29d6d703a2d8437c80342a | 2 | {
"blob_id": "c7dc2a3d56bdb517df29d6d703a2d8437c80342a",
"branch_name": "refs/heads/main",
"committer_date": 1632062403000,
"content_id": "9e27114d4f8f541ab26843d6bd1ba125bd6146c6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "171ba57ceedafa08b83ffca1da0604ed7de64c95",
"extension": "py",
... | 2.375 | stackv2 | import logging
from requests_oauthlib import OAuth1Session
from secrets import key, secret
_ACCESS_TOKEN_URL = "https://api.twitter.com/oauth/access_token"
_BASE_AUTHORIZATION_URL = "https://api.twitter.com/oauth/authorize"
_REQUEST_TOKEN_URL = "https://api.twitter.com/oauth/request_token"
# TODO: caching
# uses p... | 88 | 32.42 | 97 | 11 | 613 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_22293e1543783566_a08d4b08", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
26,
57
] | [
null,
null
] | [
41,
41
] | [
59,
59
] | |
2024-11-18T19:57:59.691699+00:00 | 1,614,633,966,000 | 4a3184e6adec19a278a68b955bb91e8126abc8ad | 2 | {
"blob_id": "4a3184e6adec19a278a68b955bb91e8126abc8ad",
"branch_name": "refs/heads/master",
"committer_date": 1614634065000,
"content_id": "844cbc22315c8a254c9b2890887933ed0d89dcb1",
"detected_licenses": [
"MIT"
],
"directory_id": "030c47770dfb0347e056084abae83a7b2ab3027a",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python
# pylint: disable=W0107
from __future__ import print_function
import argparse
import os
import sys
from .config import DEFAULT_PUBLIC_KEY, DEFAULT_PRIVATE_KEY, DEFAULT_VAULT_FILE
from .identity import Identity
from .vault import Vault
try:
import colorama
colorama.init()
OUTPUT_COL... | 320 | 31.48 | 119 | 15 | 2,460 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_622a6d781d5f79ad_75721c26", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](... | [
45,
50
] | [
null,
null
] | [
11,
15
] | [
53,
66
] | |
2024-11-18T20:10:08.913166+00:00 | 1,568,117,472,000 | 3541d61857a0613357ff3284d4fe5050b5ce3dcb | 2 | {
"blob_id": "3541d61857a0613357ff3284d4fe5050b5ce3dcb",
"branch_name": "refs/heads/master",
"committer_date": 1568117472000,
"content_id": "55b53c44c3783e70390195fb3af8f6b461c7da93",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "823a1ed867a16056c7d2abb9abfb97082872d2af",
"extension": "py"... | 2.34375 | stackv2 | import yaml
import os, sys, stat
from flask import Flask, request, abort, jsonify
import logging as log
import requests
import uuid
DEF_HOST = '0.0.0.0'
DEF_PORT = 6000
DEF_RESDIR = '/tmp/ga_results'
DEF_ROUTEPATH = "/flowbster"
DEF_LOGLEVEL = log.DEBUG
DEF_LOGFORMAT = '%(asctime)s\t%(name)s\t%(levelname)s\t%(message)... | 109 | 31.65 | 94 | 16 | 905 | python | [{"finding_id": "codeql_py/unsafe-deserialization_9d94393464c0a563_1e5988c8", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio... | 16 | true | [
"CWE-502",
"CWE-918",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/unsafe-deserialization",
"py/full-ssrf",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Unsafe deserialization depends on a [user-provided value](1).",
"The full URL of this request depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path dep... | [
88,
37,
18,
33,
40,
40,
54,
57,
62,
71,
50,
53,
55,
64,
68,
100
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
25,
13,
15,
44,
27,
46,
27,
34,
16,
23,
19,
19,
25,
19,
15,
18
] | [
30,
95,
16,
45,
31,
50,
59,
79,
49,
30,
87,
53,
78,
53,
33,
69
] | |
2024-11-18T20:10:22.574494+00:00 | 1,499,847,736,000 | e7906d22f8f17539afa55e27cffdb2a7cdb44a3a | 3 | {
"blob_id": "e7906d22f8f17539afa55e27cffdb2a7cdb44a3a",
"branch_name": "refs/heads/master",
"committer_date": 1499847736000,
"content_id": "b9cfd7ea705a869e49c06c865543538e6abc5f91",
"detected_licenses": [
"MIT"
],
"directory_id": "e8ffe556e3d4115efce3bdeca8824865e278a0cb",
"extension": "py",
"fi... | 3.390625 | stackv2 | # -*- coding: utf-8 -*-
# Copyright (C) 2013-2016 Xue Can <xuecan@gmail.com> and contributors.
# Licensed under the MIT license: http://opensource.org/licenses/mit-license
"""
常用的加密和签名机制
====================
这个模块提供了一些函数,用于快速的实现 AES 和 Triple DES 加密解密的工作。
本模块依赖如下第三方库:
* `pycrypto <https://pypi.python.org/pypi/pycrypt... | 148 | 20.52 | 77 | 11 | 1,037 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_fca605a5e269097c_80eb4452", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES3](1) is broken or weak, and should not be used.", "... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The cryptographic algorithm DES3](1) is broken or weak, and should not be used.",
"[The cryptographic algorithm DES3](1) is broken or weak, and should not be used."
] | [
128,
146
] | [
null,
null
] | [
12,
12
] | [
35,
35
] | |
2024-11-18T20:10:27.026836+00:00 | 1,586,507,830,000 | 99aa06218f9ef6a7cf7bfdfe9bc0a006f1b452e0 | 4 | {
"blob_id": "99aa06218f9ef6a7cf7bfdfe9bc0a006f1b452e0",
"branch_name": "refs/heads/master",
"committer_date": 1586507830000,
"content_id": "c3149521e87cbc51165d5eb939b7e157c4126784",
"detected_licenses": [
"MIT"
],
"directory_id": "486fdef9a93782bf716e774181cc4a3b5289ef0f",
"extension": "py",
"fi... | 3.890625 | stackv2 | # wczytanie napisow
with open('../dane/slowa.txt') as f:
data = []
for word in f.readlines():
data.append(word[:-1])
# jezeli odwrotnosc jest taka sama co slowo to jest to palindrom
def ispali(word):
return word[::-1] == word
# zbior odwroconych slow
passwords = []
# przejscie po slowach
for wor... | 53 | 27.87 | 85 | 16 | 495 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_83fb9d5cb961254a_38264a71", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text."
] | [
53
] | [
null
] | [
7
] | [
13
] | |
2024-11-18T20:10:33.095563+00:00 | 1,532,380,624,000 | bc652a62005d2274ce58063d84b6e05859d26ff7 | 3 | {
"blob_id": "bc652a62005d2274ce58063d84b6e05859d26ff7",
"branch_name": "refs/heads/master",
"committer_date": 1532380624000,
"content_id": "9be6a4c17f22e0ff9499ebaa3f07c7b60a719804",
"detected_licenses": [
"MIT"
],
"directory_id": "662f90d9677d047039e856e99fffb58ebc7c22bf",
"extension": "py",
"fi... | 3.421875 | stackv2 | import pandas as pd
data = pd.read_csv('Salaries.csv')
#average
print(data['BasePay'].sum() / data['BasePay'].count())
#max
print(data['OvertimePay'].max())
# What is the job title of JOSEPH DRISCOLL
print(data[data['EmployeeName'] == 'JOSEPH DRISCOLL']['JobTitle'])
#How much does JOSEPH DRISCOLL make (including b... | 28 | 31.61 | 78 | 10 | 251 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_52e479db126209e4_7c349523", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
20,
24
] | [
null,
null
] | [
7,
7
] | [
58,
58
] | |
2024-11-18T20:23:20.086483+00:00 | 1,635,465,923,000 | 1f7016b8cb33babfc7499e70fbf09da6b7c84df4 | 2 | {
"blob_id": "1f7016b8cb33babfc7499e70fbf09da6b7c84df4",
"branch_name": "refs/heads/master",
"committer_date": 1635465923000,
"content_id": "5ca371356fc401c3cb406f824cdc5136c78574ba",
"detected_licenses": [
"MIT"
],
"directory_id": "e9ac16ebb3066366f530f384020398d648d7944e",
"extension": "py",
"fi... | 2.421875 | stackv2 | import requests
import json
import pprint
import csv
cppm_base = "https://clearpasspm.jsd.ad:443/api"
def gen_cp_token():
# GENERATE TOKEN
authURL = cppm_base + "/oauth"
clientID = "cppmAPI"
clientSecret = "SECRET"
user = "test"
pwd = "test123"
authBody = {"grant_type": "client_credentia... | 58 | 28.64 | 83 | 10 | 436 | python | [{"finding_id": "codeql_py/request-without-cert-validation_cc0f6b20ef48a798_fa7b12ac", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
22,
46
] | [
null,
null
] | [
13,
18
] | [
64,
84
] | |
2024-11-18T20:23:34.650231+00:00 | 1,476,290,575,000 | 467a5963daceda9a9c2af20df9d50ef3c4ecd2c2 | 3 | {
"blob_id": "467a5963daceda9a9c2af20df9d50ef3c4ecd2c2",
"branch_name": "refs/heads/master",
"committer_date": 1476290575000,
"content_id": "8d33e25d6ddcdf5a2c6167da771c3fdb14d5b6e7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c3003ae379df5313db699ec8fabf4ed80e9b1b53",
"extension": "py"... | 2.875 | stackv2 | # These are all the modules we'll be using later. Make sure you can import them
# before proceeding further.
from __future__ import print_function
from __future__ import division
import matplotlib.pyplot as plt
import numpy as np
import os
import sys
import tarfile
from IPython.display import display, Image
from scipy ... | 324 | 35.85 | 113 | 18 | 2,875 | python | [{"finding_id": "codeql_py/tarslip_f9cd128d78858362_ce976160", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
49
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T20:49:25.028525+00:00 | 1,664,667,919,000 | c11a4bd9d7c5065c0aeff3fbe025581b49e21bed | 3 | {
"blob_id": "c11a4bd9d7c5065c0aeff3fbe025581b49e21bed",
"branch_name": "refs/heads/master",
"committer_date": 1664667919000,
"content_id": "5a26cbdef16f716f0c34e939543e94923aea3600",
"detected_licenses": [
"MIT"
],
"directory_id": "da75565668cc3cc510651efe81545a89bee8ef6d",
"extension": "py",
"fi... | 2.609375 | stackv2 | #!/usr/bin/env python3
import threading
import pickle
import copy
import mpv
import time
from lxml.html import parse as parse_html
from socket import gethostbyaddr
from collections import namedtuple
from urllib.request import urlopen
from queue import Queue
from flask import Flask
from flask import request
app = Flas... | 295 | 24.81 | 162 | 17 | 1,767 | python | [{"finding_id": "codeql_py/reflective-xss_ab190cf992e3297d_c6893032", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 6 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-918"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scri... | [
145,
155,
229,
245,
275,
270
] | [
null,
null,
null,
null,
null,
null
] | [
12,
12,
20,
20,
16,
28
] | [
32,
40,
60,
60,
52,
44
] | |
2024-11-18T20:49:25.712859+00:00 | 1,612,287,479,000 | 6771cc5c8d7e2aae9f05470e84cf4f8fcaccecdc | 3 | {
"blob_id": "6771cc5c8d7e2aae9f05470e84cf4f8fcaccecdc",
"branch_name": "refs/heads/main",
"committer_date": 1612287479000,
"content_id": "d53cfe68fca2ac8d2ef2f824c4170f7a44b1e5d9",
"detected_licenses": [
"Unlicense"
],
"directory_id": "50cd3cb3d3c2e52906e4b7f241f28befbcc7e8fa",
"extension": "py",
... | 2.5625 | stackv2 | import http.client
import logging
import os
import queue as Queue
import ssl
import threading
from http.server import BaseHTTPRequestHandler, HTTPServer
from urllib.parse import parse_qs, urlparse
def enable_requests_logging():
http.client.HTTPConnection.debuglevel = 4
logging.basicConfig()
logging.getLo... | 63 | 27.27 | 74 | 17 | 391 | python | [{"finding_id": "codeql_py/insecure-default-protocol_59b7a0ea89edc0f9_ec3784f2", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
46
] | [
48
] | [
27
] | [
14
] | |
2024-11-18T20:49:26.338186+00:00 | 1,401,118,997,000 | 44a05f7de36d07aaee72646beea678a44e6031d8 | 3 | {
"blob_id": "44a05f7de36d07aaee72646beea678a44e6031d8",
"branch_name": "refs/heads/master",
"committer_date": 1401118997000,
"content_id": "011df79536239701bff67fa6fcc5e1d5906f2d8c",
"detected_licenses": [
"MIT"
],
"directory_id": "7280ffcb9d50c81fd5001821eb16d59116107260",
"extension": "py",
"fi... | 3.078125 | stackv2 | #!/usr/bin/env python
# PassPack "export to CSV" default format:
# Name,User ID,Password,Link,Tags,Notes,Email
import sys
import csv
from datetime import datetime as dt
_VERSION = 1.0
_BANNER = "KeePassPack %s" % _VERSION
_USAGE = """Converts PassPack CSV output to KeePassX XML.
Usage: ./keepasspack.py <csv input ... | 185 | 24.05 | 81 | 13 | 1,182 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_62e0913ddb2b2685_c316b9a4", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
178
] | [
null
] | [
23
] | [
33
] | |
2024-11-18T20:49:27.254598+00:00 | 1,574,864,655,000 | 8806863e695e46884c22415ca30c5241eb1cb576 | 2 | {
"blob_id": "8806863e695e46884c22415ca30c5241eb1cb576",
"branch_name": "refs/heads/master",
"committer_date": 1574864655000,
"content_id": "755c17022cae2644db80651ee44ca6da2433aee6",
"detected_licenses": [
"MIT"
],
"directory_id": "becc8deb99231e3296235a2c9366513ec3985cda",
"extension": "py",
"fi... | 2.46875 | stackv2 | from flask import Flask, request, send_file, Response, render_template
from pathlib import Path
from scripts.detect_encoding import detect_encoding
from scripts.converter import convert_encoding, get_available_formats
import subprocess
root_path = Path.cwd() # cwd is for current working directory
# All paths in this p... | 35 | 33.83 | 92 | 16 | 264 | python | [{"finding_id": "codeql_py/path-injection_22fc56f31dde0f39_eaea4171", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
32
] | [
null
] | [
22
] | [
38
] | |
2024-11-18T20:49:33.903105+00:00 | 1,602,916,951,000 | ed92d8851ccca7fc7f8d8bdc0d58ddb992ffda9b | 2 | {
"blob_id": "ed92d8851ccca7fc7f8d8bdc0d58ddb992ffda9b",
"branch_name": "refs/heads/master",
"committer_date": 1602916951000,
"content_id": "568e1d1033f48b6fffaa5a952aed6dfc878fdb41",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "61a174d1461ecd630747fc9e8af4ce0056199448",
"extension": "py"... | 2.4375 | stackv2 | from pathlib import Path
from os import path
import jinja2, tempfile, subprocess, shutil
from lect.util import get_node_info
latex_env = jinja2.Environment(
loader = jinja2.PackageLoader(__name__, 'templates-latex'),
autoescape = False,
trim_blocks = True,
lstrip_blocks = True,
variable_start_strin... | 59 | 29.49 | 142 | 15 | 425 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_761de625629bd46b_5db35b8a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
6
] | [
15
] | [
13
] | [
28
] | |
2024-11-18T20:49:57.324433+00:00 | 1,579,429,376,000 | fa6418d61872c15d8a9a4c12b14a235d16cf81a2 | 2 | {
"blob_id": "fa6418d61872c15d8a9a4c12b14a235d16cf81a2",
"branch_name": "refs/heads/master",
"committer_date": 1579429376000,
"content_id": "b9e2d62b1917ced5048f47d1c6de0ed05d41629d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d59e763a8f916f8d3f7830aea0659940b9d6b210",
"extension": "py"... | 2.421875 | stackv2 | #!/usr/bin/python
import sys
import multiprocessing
import BaseHTTPServer
import logging
import sqlite3
import os
import codecs
from message import HttpMsg
from config import WS_SERVER, PATHS
logger = logging.getLogger(__name__)
class HttpHandler(BaseHTTPServer.BaseHTTPRequestHandler):
configRoot = '../http'
... | 110 | 33.23 | 117 | 19 | 855 | python | [{"finding_id": "codeql_py/path-injection_5e5a160fdb72ea1e_262c9692", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-117"
] | [
"py/path-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
35,
27
] | [
null,
null
] | [
18,
22
] | [
52,
51
] | |
2024-11-18T20:50:46.153573+00:00 | 1,588,583,919,000 | fde02d3b0d81acc040993a2c0be3e0ae21270264 | 3 | {
"blob_id": "fde02d3b0d81acc040993a2c0be3e0ae21270264",
"branch_name": "refs/heads/master",
"committer_date": 1588583919000,
"content_id": "b1cd6668ea61d487138b7da793821df1e3374264",
"detected_licenses": [
"MIT"
],
"directory_id": "ea8c8ec8cc61d88870331a8a8f28d7953b1e759b",
"extension": "py",
"fi... | 2.921875 | stackv2 | #!/usr/bin/env python3
"""
Module Docstring
"""
__author__ = "John Porter"
__version__ = "0.1.3"
__license__ = "MIT License"
# MIT License
#
# Copyright (c) 2019 John Porter
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Softw... | 199 | 43.2 | 118 | 19 | 1,800 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c07f2274e9562e47_753213f7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
131,
194
] | [
null,
null
] | [
23,
23
] | [
36,
24
] | |
2024-11-18T20:51:05.728785+00:00 | 1,607,225,310,000 | 4cede43340df41493491f0fd4654b71f199fc66f | 3 | {
"blob_id": "4cede43340df41493491f0fd4654b71f199fc66f",
"branch_name": "refs/heads/main",
"committer_date": 1607225310000,
"content_id": "2876f7f84128f96ae8e3c3f309097719663e4852",
"detected_licenses": [
"Apache-2.0",
"Python-2.0"
],
"directory_id": "ac576e82308a4bdad3138cbea3d5713a7a6f9b55",
"... | 2.859375 | stackv2 | """
The vra.py module contains properly-formatted API calls for VRA related tasks. The
tasks can include installing a vra, uninstalling a vra, editing a VRA, or upgrading
a vra
"""
import json
import requests
#from zerto_auth import testUrl, testHeaders
class vra():
"""
The VRA class houses VRA specific metho... | 194 | 29.38 | 127 | 14 | 1,199 | python | [{"finding_id": "codeql_py/request-without-cert-validation_00361294da3830fe_2274d582", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 6 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
76,
100,
115,
147,
176,
191
] | [
null,
null,
null,
null,
null,
null
] | [
16,
16,
16,
16,
16,
16
] | [
99,
126,
127,
115,
128,
116
] | |
2024-11-18T20:51:09.099659+00:00 | 1,534,572,393,000 | e88f8371c878e2f47393044044be7b9f417c0b2d | 3 | {
"blob_id": "e88f8371c878e2f47393044044be7b9f417c0b2d",
"branch_name": "refs/heads/master",
"committer_date": 1534572393000,
"content_id": "94e30441f9c00fcc6c84ccb6ec1814ce65745564",
"detected_licenses": [
"MIT"
],
"directory_id": "270262c3bae7a1c2ec4b5f36eb79e7b7d0a9e06a",
"extension": "py",
"fi... | 2.578125 | stackv2 | from jinja2 import Environment, FileSystemLoader, TemplateNotFound
import traceback, os
class ErrorRenderer():
def __init__(self):
self.template_path = os.path.join(os.path.dirname(os.path.realpath(__file__)), 'html')
template_loader = FileSystemLoader(searchpath=self.template_path)
self.j... | 33 | 34.85 | 94 | 16 | 249 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_66dc8b5b81db337c_4749118e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
9
] | [
11
] | [
34
] | [
10
] | |
2024-11-18T20:51:13.848966+00:00 | 1,599,654,230,000 | d7d342af16fb4edb2231880f21a0e010129e5e54 | 3 | {
"blob_id": "d7d342af16fb4edb2231880f21a0e010129e5e54",
"branch_name": "refs/heads/master",
"committer_date": 1599654230000,
"content_id": "1c40a23989ae80e4473f4505e19980540d22119f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fffc68d1118ae290556b9d52a3fc6bf74c1e1cfd",
"extension": "py"... | 2.53125 | stackv2 | import os.path
import logging
from flask import request
def root_dir(): # pragma: no cover
return os.path.abspath(os.path.dirname(__file__))
def get_file(filename): # pragma: no cover
try:
src = os.path.join(root_dir(), filename)
# Figure out how flask returns static files
# Tried:
... | 23 | 26 | 61 | 12 | 145 | python | [{"finding_id": "codeql_py/path-injection_4011c6490a4c30d6_f0af5856", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
16
] | [
null
] | [
21
] | [
24
] | |
2024-11-18T20:51:17.543530+00:00 | 1,387,969,418,000 | 6b7ea47bf06016e29ac695130fda81daf5e42aa2 | 2 | {
"blob_id": "6b7ea47bf06016e29ac695130fda81daf5e42aa2",
"branch_name": "refs/heads/master",
"committer_date": 1387969418000,
"content_id": "35f14c90f2a8600a0fca69d07701f3ee421e9654",
"detected_licenses": [
"MIT"
],
"directory_id": "aed5f7a8a7e8e368b9a4c78c95b742e96cf19d92",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/env python
#coding: utf-8
"""
python webim client
Overview
========
See U{the WebIM homepage<http://www.github.com/webim>} for more about webim.
Usage summary
=============
This should give you a feel for how this module operates::
import webim
c = webim.Client('domain', 'apikey', host='127.0.... | 285 | 28.08 | 110 | 19 | 1,912 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_19c87363087837d0_16cf288a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
60
] | [
null
] | [
48
] | [
56
] | |
2024-11-18T21:13:46.537300+00:00 | 1,591,104,418,000 | 08d922ad31007dc39c67c710a425627fb153110a | 3 | {
"blob_id": "08d922ad31007dc39c67c710a425627fb153110a",
"branch_name": "refs/heads/master",
"committer_date": 1591104418000,
"content_id": "0a15447021f94725d9af068ce6651449a8ee8d4d",
"detected_licenses": [
"MIT"
],
"directory_id": "ebdc78ad69511f9c5eeb34334b0de012e5aebfdb",
"extension": "py",
"fi... | 2.78125 | stackv2 | import re
import string
import numpy as np
import pandas as pd
from nltk.tokenize import word_tokenize
from sklearn.model_selection import train_test_split
from tensorflow.keras.initializers import Constant
from tensorflow.keras.layers import Embedding, LSTM, Dense, SpatialDropout1D
from tensorflow.keras.models import... | 167 | 32.18 | 121 | 15 | 1,480 | python | [{"finding_id": "codeql_py/overly-large-range_f6664b58f4a6ead0_853081f0", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range ... | [
40,
40,
40,
40
] | [
null,
null,
null,
null
] | [
34,
37,
40,
49
] | [
38,
41,
44,
53
] | |
2024-11-18T21:14:06.280187+00:00 | 1,692,107,468,000 | 10aedad6f0a7132750b44a1295de477b83fc732c | 2 | {
"blob_id": "10aedad6f0a7132750b44a1295de477b83fc732c",
"branch_name": "refs/heads/master",
"committer_date": 1692107468000,
"content_id": "6c2aec8567ebb11a32a6a7332517ac6d29bccc00",
"detected_licenses": [
"MIT"
],
"directory_id": "8454441f899c3beb9fcea26cffc2f4c3cf75ff6a",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python3
from flask import Flask, jsonify, send_from_directory
try:
from flask.ext.cors import CORS
except:
from flask_cors import CORS
import json
import sys
application = Flask(__name__)
# Utilize CORS to allow cross-origin API requests
cors = CORS(application)
@application.route("/<path:f... | 42 | 23.52 | 79 | 13 | 228 | python | [{"finding_id": "codeql_py/flask-debug_9c31753f30b918fc_b0557d39", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
42,
31
] | [
null,
null
] | [
5,
15
] | [
32,
32
] | |
2024-11-18T21:14:23.481711+00:00 | 1,569,266,462,000 | 814fa469f522edf86614f961392377004601cc64 | 4 | {
"blob_id": "814fa469f522edf86614f961392377004601cc64",
"branch_name": "refs/heads/master",
"committer_date": 1569266462000,
"content_id": "7b0fa2ec42ac67f503fa908317850fc43e148638",
"detected_licenses": [
"MIT"
],
"directory_id": "cf1ed3fe46a3418cc7f88ad5ccdbfc3475108a1a",
"extension": "py",
"fi... | 3.5 | stackv2 | import random
import sys
#Password set options
p_Upper = 'ABCDEFGHIJKLMNOPQRSTUVWXYZ'
p_Lower = 'abcdefghijklmnopqrstuvwxyz'
p_Digit = '0123456789'
p_Sysbol = "!\"#$%&'()*+,-./:;<=>?@[]^_{|}~"
p_set = ''
x = 0
#Check argv count
if len(sys.argv) < 3:
print("Error in command line")
exit(0)
#Get password leng... | 55 | 18.56 | 44 | 10 | 331 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_941146bb931638f7_e7a8cc3d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
55
] | [
null
] | [
11
] | [
24
] | |
2024-11-18T21:14:24.351652+00:00 | 1,594,279,223,000 | 907f1ec4059bce54f0e2a7dc8229f1f7fc7eca90 | 3 | {
"blob_id": "907f1ec4059bce54f0e2a7dc8229f1f7fc7eca90",
"branch_name": "refs/heads/master",
"committer_date": 1594279223000,
"content_id": "a0dacf57b1295eb445b264d11829a17dd788d35b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ce005d2e7c72cf74491e099c047873bf56c2f0cd",
"extension": "py"... | 2.53125 | stackv2 | # Copyright (C) 2018 Cancer Care Associates
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to ... | 185 | 28.68 | 88 | 16 | 1,189 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0df80cd1e1e20e33_effc57a0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
108,
116
] | [
110,
118
] | [
17,
13
] | [
18,
14
] | |
2024-11-18T21:14:43.157234+00:00 | 1,551,958,787,000 | 5a43f2f5c41e0ad83ef3b04719ca0ee3c5b00d6a | 2 | {
"blob_id": "5a43f2f5c41e0ad83ef3b04719ca0ee3c5b00d6a",
"branch_name": "refs/heads/master",
"committer_date": 1551958787000,
"content_id": "28e6a2f635226320303edd9287b2263622263aae",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "de2c992d8bf28c01ae151c8ed38a14c8b62b68c0",
"extension": "py"... | 2.4375 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
# import Flask
'''
Created on Nov 15, 2016
@author: jmartan
'''
from flask import Flask, request
import uni_func
import fill_set_widget
from lxml import etree
# Create an instance of Flask
app = Flask(__name__, static_url_path='/static')
app.config['DEBUG'] = True
# c... | 156 | 31.35 | 152 | 18 | 1,318 | python | [{"finding_id": "codeql_py/xxe_72d0fd558c712fea_9c65dcd1", "tool_name": "codeql", "rule_id": "py/xxe", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "XML parsing depends on a [user-provided value](1) without guarding against external entity expansion.", "remediation": "", "locat... | 3 | true | [
"CWE-611",
"CWE-117",
"CWE-117"
] | [
"py/xxe",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"XML parsing depends on a [user-provided value](1) without guarding against external entity expansion.",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
44,
41,
42
] | [
null,
null,
null
] | [
33,
21,
21
] | [
41,
58,
50
] | |
2024-11-18T20:10:31.433297+00:00 | 1,583,978,741,000 | 7373ff5a3016cba6e91df11b339439ae50d5bb93 | 3 | {
"blob_id": "7373ff5a3016cba6e91df11b339439ae50d5bb93",
"branch_name": "refs/heads/master",
"committer_date": 1583978741000,
"content_id": "5343c10e4b9cc36d91875685ff3b9fc5f8f88d63",
"detected_licenses": [
"MIT"
],
"directory_id": "750065657aeb6d4d1f6a2445a5fe460e1769edcb",
"extension": "py",
"fi... | 2.65625 | stackv2 | import select
import paramiko
class Ssh:
def __init__(self, host):
self.client = paramiko.SSHClient()
self.client.set_missing_host_key_policy(paramiko.AutoAddPolicy())
self.hostname = host.get_real_hostname()
self.username = host.username
self.password = host.password
... | 40 | 32.58 | 120 | 17 | 314 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_ee29d2cd8e4a75a6_86953168", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
8
] | [
null
] | [
9
] | [
74
] | |
2024-11-18T20:10:32.714454+00:00 | 1,608,119,540,000 | 79c2100325ef5029bd74325f15ce12cc718e2957 | 4 | {
"blob_id": "79c2100325ef5029bd74325f15ce12cc718e2957",
"branch_name": "refs/heads/main",
"committer_date": 1608119540000,
"content_id": "a16f53d694948a9d7c01fd202156d8f2c110869c",
"detected_licenses": [
"MIT"
],
"directory_id": "e004ff5468a8dc1239f4b6d7067f97d07b4cf51a",
"extension": "py",
"file... | 4 | stackv2 | # dictionnary, store info
customers = {
"name": "John Smith",
"age": 30,
"is_verified": True
} # {} c an define dictionary, each key should be unique
print(customers["name"])
print(customers.get("birthday")) # for info that is not in the dictionary
# we can supple the value for "birthday" too
print(custom... | 29 | 29.21 | 178 | 10 | 255 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2495e51001148ae0_12af1874", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
8,
10,
15
] | [
null,
null,
null
] | [
7,
7,
7
] | [
32,
46,
28
] | |
2024-11-18T20:10:34.365081+00:00 | 1,483,106,754,000 | e2b15f03c7e2d0af73c15532fe416397357eadbe | 3 | {
"blob_id": "e2b15f03c7e2d0af73c15532fe416397357eadbe",
"branch_name": "refs/heads/master",
"committer_date": 1483106754000,
"content_id": "e6b5cca840d75bd158f893596a1bc67f2b243187",
"detected_licenses": [
"MIT"
],
"directory_id": "6f5d6b02b0bfc1f8252f59ba1f91ed2954cd5142",
"extension": "py",
"fi... | 2.609375 | stackv2 | # -*- coding: utf-8 -*-
"""
flask.ext.riaksessions
----------------------
This module provides a Riak-backed session store for Flask sessions.
:copyright: (c) 2013 Tim Gross
:license: MIT
"""
__version_info__ = ('0', '1', '0')
__version__ = '.'.join(__version_info__)
__author__ = 'Tim Gross'
__l... | 245 | 31.48 | 85 | 20 | 1,648 | python | [{"finding_id": "codeql_py/log-injection_61386927c3cfc18e_26ecdd49", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
180
] | [
null
] | [
27
] | [
79
] | |
2024-11-18T20:10:48.383400+00:00 | 1,632,970,061,000 | cf67ac4e99979c7d8366f6fd13501d7ae9aaac57 | 2 | {
"blob_id": "cf67ac4e99979c7d8366f6fd13501d7ae9aaac57",
"branch_name": "refs/heads/main",
"committer_date": 1632970061000,
"content_id": "4ac53420d3873056c31a206d1118c93c1a3b93a0",
"detected_licenses": [
"MIT"
],
"directory_id": "4a7f30b815c36618640e3f4c225cff0b9db1c37d",
"extension": "py",
"file... | 2.328125 | stackv2 | # -*- coding: utf-8 -*-
# @Time : 2021/6/27 21:54
# @Author : zp
# @Python3.7
import shutil
import requests
import time
import re
import os
import urllib3
from urllib.parse import urljoin
from loguru import logger
from Crypto.Cipher import AES
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
clas... | 198 | 35.45 | 135 | 18 | 2,042 | python | [{"finding_id": "codeql_py/request-without-cert-validation_33cf742dad97eb2f_6cb60cfd", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
58
] | [
null
] | [
24
] | [
89
] | |
2024-11-18T20:10:51.665053+00:00 | 1,563,836,719,000 | 302312bec2ba65f4611f4e85d7eb2af4afde234c | 4 | {
"blob_id": "302312bec2ba65f4611f4e85d7eb2af4afde234c",
"branch_name": "refs/heads/master",
"committer_date": 1563836719000,
"content_id": "23f231de8ec26f71a7d392e2da0bdafcd39479e1",
"detected_licenses": [
"MIT"
],
"directory_id": "2f74c4d2e5c6dd51eb3eaf0ee4b97122b26e7066",
"extension": "py",
"fi... | 4.15625 | stackv2 | #
# Functional Python: Map & Filter
# Python Techdegree
#
# Created by Dulio Denis on 3/21/19.
# Copyright (c) 2019 ddApps. All rights reserved.
# ------------------------------------------------
# Map & Filter Challenge
# ------------------------------------------------
# Challenge Task 1 of 3
# Create a functi... | 59 | 34.22 | 83 | 11 | 554 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8950c9011baa8711_8af0a706", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
50
] | [
null
] | [
7
] | [
18
] | |
2024-11-18T20:48:06.495961+00:00 | 1,518,147,594,000 | aa7accfb6f41fd98e78cdf7b983e234bccf9aee3 | 2 | {
"blob_id": "aa7accfb6f41fd98e78cdf7b983e234bccf9aee3",
"branch_name": "refs/heads/master",
"committer_date": 1518147594000,
"content_id": "2fc211091bda9bcde9cfe445ff6c159579672737",
"detected_licenses": [
"MIT"
],
"directory_id": "11df3ea05fcae0ec53dc398f56d3f27532f48b71",
"extension": "py",
"fi... | 2.421875 | stackv2 | import tornado.ioloop
import tornado.web
import tornado.websocket
import tornado.httpserver
import tornado.process
import tornado.template
import video
import gen
import os
import sys
cam = None
html_page_path = dir_path = os.path.dirname(os.path.realpath(__file__)) + '/www/'
class HtmlPageHandler(tornado.web.Reque... | 117 | 30.82 | 101 | 16 | 867 | python | [{"finding_id": "codeql_py/path-injection_c7b2a589175496cf_96916ca1", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
22
] | [
null
] | [
27
] | [
37
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.