added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T20:48:17.143832+00:00 | 1,468,854,561,000 | b16bf39a7028484823b3f65f8acb3e1d57f8aeac | 3 | {
"blob_id": "b16bf39a7028484823b3f65f8acb3e1d57f8aeac",
"branch_name": "refs/heads/master",
"committer_date": 1468854561000,
"content_id": "93a6661d1755cc8a481ec3d10f3e0b838c563ffb",
"detected_licenses": [
"MIT"
],
"directory_id": "ae0fd767a88e2a42a0166bdfac1a6d2142beb9a8",
"extension": "py",
"fi... | 2.9375 | stackv2 | """Extract translation tuples from Wiktionary pages."""
import json
import logging
import re
from lxml import etree, html
from ..html import classes, textify, heading_level, mw_headline
from ..zim import ZimFile
def parse_translation_table(table):
"""Extract translation tuples from *table*, which is an lxml
... | 188 | 37.69 | 79 | 19 | 1,440 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9ff3afd231f3a345_819e50e0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
50,
54
] | [
null,
null
] | [
25,
21
] | [
47,
43
] | |
2024-11-18T20:48:18.247747+00:00 | 1,670,100,167,000 | 41a5b129f64962b853c5d9c66a7e42c58a2df487 | 4 | {
"blob_id": "41a5b129f64962b853c5d9c66a7e42c58a2df487",
"branch_name": "refs/heads/master",
"committer_date": 1670100167000,
"content_id": "0d20d3db4c13c5a3c76dfaf57d2193157b36318b",
"detected_licenses": [
"MIT"
],
"directory_id": "9ab07a79bb97e4f2c24b31b716d14acbfb3249e2",
"extension": "py",
"fi... | 4.46875 | stackv2 | # Represents any school member.
class SchoolMember:
def __init__(self, name, age):
self.name = name
self.age = age
print(f"Initialized SchoolMember for: {self.name}")
# Tell my details.
def tell(self):
print(f"Name: {self.name} Age: {self.age}")
# Represents a teacher.
cla... | 76 | 25.22 | 68 | 12 | 528 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bf3ded30f6de49b0_e0b8a05d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
22
] | [
null
] | [
15
] | [
39
] | |
2024-11-18T21:11:30.010986+00:00 | 1,626,687,855,000 | 34a7d5b115e31b91c1a6ae0524b816957f5b74af | 3 | {
"blob_id": "34a7d5b115e31b91c1a6ae0524b816957f5b74af",
"branch_name": "refs/heads/main",
"committer_date": 1626687855000,
"content_id": "f696e0c9b8c04296aaf1fd8cf225e4da3c7a86c8",
"detected_licenses": [
"MIT"
],
"directory_id": "b76bcbc6becc55cf2ccc8e09e1d9c126638f82a0",
"extension": "py",
"file... | 2.609375 | stackv2 | from boruta import BorutaPy
import matplotlib.pyplot as plt
import matplotlib.patches as mpatches
from sklearn.naive_bayes import BernoulliNB, MultinomialNB
from sklearn.preprocessing import FunctionTransformer
from sklearn.ensemble import RandomForestClassifier
from sklearn.feature_extraction.text import CountVectoriz... | 199 | 31.03 | 96 | 14 | 1,695 | python | [{"finding_id": "codeql_py/overly-large-range_4506263c71c874ea_4d5a7761", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 2 | true | [
"CWE-020",
"CWE-918"
] | [
"py/overly-large-range",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"The full URL of this request depends on a [user-provided value](1)."
] | [
64,
91
] | [
null,
null
] | [
33,
16
] | [
36,
46
] | |
2024-11-18T21:11:45.279599+00:00 | 1,625,481,376,000 | 717e6caf171338273f66e19521e52a961bbc7301 | 3 | {
"blob_id": "717e6caf171338273f66e19521e52a961bbc7301",
"branch_name": "refs/heads/main",
"committer_date": 1625481376000,
"content_id": "bbf9c7912da5fa5944854cd7b62e315e3bfeb3ad",
"detected_licenses": [
"MIT"
],
"directory_id": "1bd71f01234fdc91e95a9c07a02de6344ced9452",
"extension": "py",
"file... | 2.578125 | stackv2 | # coding:utf-8
"""
input file :host.txt
output file :result.txt
result is a list like :
["www.baidu.com","14.215.177.38","http://www.baidu.com","title_baidu","200","OK","Tengine"]
run the main.py script then
you can run result.deal.py to get clear reperot view
or you can run reportGeneral.py to get a screen and html ... | 143 | 26.31 | 140 | 17 | 1,014 | python | [{"finding_id": "codeql_py/request-without-cert-validation_9129cfd1af719533_4ee3aea3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
54
] | [
null
] | [
19
] | [
78
] | |
2024-11-18T21:25:46.144715+00:00 | 1,519,756,064,000 | 91e3e8fe6f738b680e3dc44801b8417c25f59191 | 3 | {
"blob_id": "91e3e8fe6f738b680e3dc44801b8417c25f59191",
"branch_name": "refs/heads/master",
"committer_date": 1519756065000,
"content_id": "3d194aa06bcd0b5d1012e82017c3d1863b7335ff",
"detected_licenses": [
"MIT"
],
"directory_id": "8ca3c3aa8f63633d70d166ef2d08968f522d2f0e",
"extension": "py",
"fi... | 2.921875 | stackv2 | """
This is the script that launches Flask app.
@author: Nikolay Lysenko
"""
import os
import sqlite3
from functools import reduce
from typing import Tuple
from flask import Flask, render_template, url_for
from flask_misaka import Misaka, markdown
from markupsafe import Markup
from db_control import create_or_refr... | 114 | 31.83 | 79 | 16 | 900 | python | [{"finding_id": "codeql_py/flask-debug_926902a0e06df97a_91522e43", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-022",
"CWE-022",
"CWE-089"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
114,
59,
61,
92
] | [
null,
null,
null,
null
] | [
null,
27,
15,
21
] | [
20,
45,
33,
52
] | |
2024-11-18T21:26:02.775939+00:00 | 1,505,238,361,000 | 54169eb05c51945a255db158ddaa50be09f0ac97 | 3 | {
"blob_id": "54169eb05c51945a255db158ddaa50be09f0ac97",
"branch_name": "refs/heads/master",
"committer_date": 1505238361000,
"content_id": "2ed60c5328321dfb731638ff44d57614244be553",
"detected_licenses": [
"MIT"
],
"directory_id": "b983b298fd8a1b5c283327b189493e7cadd4bf12",
"extension": "py",
"fi... | 2.953125 | stackv2 | # Imports
import requests
from BeautifulSoup import BeautifulStoneSoup
import config
# Class: CUIC
class CUIC:
# Data
def data(self):
# Parse XML data as JSON
data = {
'queue': [],
'success': False,
'message': ''
}
# Get data
try:
if not config.DEBUG:
xml = requests.get(config.DATA_URL, ... | 60 | 19.05 | 96 | 23 | 352 | python | [{"finding_id": "codeql_py/request-without-cert-validation_daeff2bbe94ac234_d415f7ea", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
22
] | [
null
] | [
11
] | [
78
] | |
2024-11-18T21:26:04.303043+00:00 | 1,594,146,242,000 | 23712c5a38196ca6ee74dfcd9090b4936483dfce | 3 | {
"blob_id": "23712c5a38196ca6ee74dfcd9090b4936483dfce",
"branch_name": "refs/heads/master",
"committer_date": 1594146242000,
"content_id": "28dfac408644a7117601a11175d04bd5323a074b",
"detected_licenses": [
"MIT"
],
"directory_id": "8529dbab5cdee1d73fdea7dcaf44483410a81a9c",
"extension": "py",
"fi... | 2.78125 | stackv2 | import sqlite3
import hashlib
DB_NAME = 'database.sqlite3'
conn = sqlite3.connect(DB_NAME)
conn.cursor().execute('''
CREATE TABLE IF NOT EXISTS `users` (
`uid` INTEGER PRIMARY KEY AUTOINCREMENT,
`email` TEXT NOT NULL UNIQUE,
`username` TEXT NOT NULL UNIQUE,
`password` TEXT NOT NULL
)''')
conn.cursor(... | 85 | 28.41 | 78 | 12 | 586 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_717c7b9be0d40479_7b0932b1", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
59
] | [
null
] | [
27
] | [
51
] | |
2024-11-18T21:26:06.805557+00:00 | 1,543,539,335,000 | b08242c8fecf29a91e66acf0b03200699f00ba37 | 2 | {
"blob_id": "b08242c8fecf29a91e66acf0b03200699f00ba37",
"branch_name": "refs/heads/master",
"committer_date": 1543539335000,
"content_id": "4218939fc5a5f1f6886081ba02f0da0f913d92cd",
"detected_licenses": [
"MIT"
],
"directory_id": "e417a5cf8974438f0e45d3abde5cffd49c70032e",
"extension": "py",
"fi... | 2.5 | stackv2 | # coding: utf-8
import flask
import hashlib
import sqlite3
import Configure
import Database
def CheckLogin():
""" ログイン済みかを確認する """
if 'login' in flask.session and flask.session['login'] == True:
return True
return False
def TryRegisterTeam(teamname, teamcode):
""" チーム登録を試行する """
if not 4 ... | 80 | 30.02 | 100 | 17 | 627 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_461ffdbe533f9470_523ff17b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
32,
70
] | [
null,
null
] | [
19,
19
] | [
27,
27
] | |
2024-11-18T21:52:05.406446+00:00 | 1,568,583,233,000 | 866c81a1669d7a565fecc890261047960f0fcaf6 | 4 | {
"blob_id": "866c81a1669d7a565fecc890261047960f0fcaf6",
"branch_name": "refs/heads/master",
"committer_date": 1568583233000,
"content_id": "b062c311b604aca9df9a8b600548da6641beded6",
"detected_licenses": [
"MIT"
],
"directory_id": "7c4deebe6840df119a57973250267c30de90a0e6",
"extension": "py",
"fi... | 3.578125 | stackv2 | import sqlite3
print('\n', 'Part 2 - The Northwind Database', '\n', '\n')
db = 'northwind_small (1).sqlite3'
try:
print('PROCESSES:')
# establish connection for northwind file
print('attempting to connect to database...')
nw_conn = sqlite3.connect(db)
print('connection successful!', '\n', '\n')
... | 133 | 32.77 | 123 | 13 | 1,097 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_19702165dbe35662_449ce67a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
66
] | [
null
] | [
19
] | [
27
] | |
2024-11-18T21:52:22.820022+00:00 | 1,419,641,420,000 | 22ebc0e9863cf9ef0b3489749748ec36f3c307e3 | 2 | {
"blob_id": "22ebc0e9863cf9ef0b3489749748ec36f3c307e3",
"branch_name": "refs/heads/master",
"committer_date": 1419641420000,
"content_id": "0dfc00ff9ef5ae9b32ce20da050d4a9650604e7a",
"detected_licenses": [
"MIT"
],
"directory_id": "9e9d55c287fff511ffe26e0573213bff77a20943",
"extension": "py",
"fi... | 2.4375 | stackv2 | from flask.ext import restful
from . import database
from flask import abort, request
from datetime import datetime
import pytz
import requests
def GeoIpLookup(ip):
loc_resp = requests.get(
'https://freegeoip.net/json/{0}'.format(ip))
try:
location = loc_resp.json()
return {'latitude': ... | 104 | 25.27 | 85 | 15 | 612 | python | [{"finding_id": "codeql_py/partial-ssrf_8c5ca24d9e1d6a87_f426bb8e", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
9
] | [
10
] | [
16
] | [
53
] | |
2024-11-18T20:31:29.468420+00:00 | 1,692,185,618,000 | 3a8fb910eb6b8c73b78de33994a42019edfa3e53 | 3 | {
"blob_id": "3a8fb910eb6b8c73b78de33994a42019edfa3e53",
"branch_name": "refs/heads/main",
"committer_date": 1692185618000,
"content_id": "36cd96e996285e0d95640ac193822f616423a98c",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "b7b409c839b4110e23219483f667f8d01989221f",
"extension": "py"... | 2.59375 | stackv2 | #!/usr/bin/env python3
"""
Collect CIDR ip ranges from data centers
Generates inputs for network policies to ban ingress
`cidrs_:name()` returns a list of CIDRs for a datacenter owner
Currently only collecting ipv4 addresses
"""
import ipaddress
import os
from html.parser import HTMLParser
import requests
import y... | 149 | 29.58 | 130 | 20 | 1,114 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_4ab7b623a1d583cc_9bdb7ce4", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://download.microsoft.com](1) may be at an arbitr... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [https://download.microsoft.com](1) may be at an arbitrary position in the sanitized URL."
] | [
53
] | [
55
] | [
47
] | [
18
] | |
2024-11-18T20:31:31.612526+00:00 | 1,631,561,556,000 | 59261238bcc32c813c3ff759797ba9a4088f99c8 | 2 | {
"blob_id": "59261238bcc32c813c3ff759797ba9a4088f99c8",
"branch_name": "refs/heads/main",
"committer_date": 1631561556000,
"content_id": "8be02358148bd80a4fe903a605b4d604fca0b09c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c1ef99c34aae524adfeb96f6f12bc623f9f543e5",
"extension": "py",
... | 2.359375 | stackv2 | from flask import Flask, request, render_template, jsonify, send_file
import logging
import os
from tempfile import TemporaryDirectory
from mergechance.db import autocomplete_list, get_from_cache, cache
from mergechance.gh_gql import get_pr_fields, GQLError
from mergechance.analysis import ANALYSIS_FIELDS, get_viable_... | 141 | 33.06 | 116 | 16 | 1,127 | python | [{"finding_id": "codeql_py/log-injection_7a467827976690b7_4cdcc8c6", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
45,
47
] | [
null,
null
] | [
18,
18
] | [
50,
52
] | |
2024-11-18T21:10:34.527042+00:00 | 1,593,667,534,000 | 89bf4f6c4d9189d4da85a96508071fadac2cdbf1 | 3 | {
"blob_id": "89bf4f6c4d9189d4da85a96508071fadac2cdbf1",
"branch_name": "refs/heads/master",
"committer_date": 1593667534000,
"content_id": "5f3ea0b9a8e8e7c9ecdec4e1b0428c9fd51c6061",
"detected_licenses": [
"MIT"
],
"directory_id": "930bcc52e077614ab2343c1fdfb78d7e174ad0b2",
"extension": "py",
"fi... | 2.734375 | stackv2 | from bs4 import BeautifulSoup
import dateparser
import datetime
import requests
import codecs
from urllib.parse import unquote
from langdetect import detect
class Scraper:
"""Scraper class"""
def __init__(self, html):
self.html = html
self.soup = BeautifulSoup(html, "lxml")
print(f"[Scr... | 109 | 34.95 | 97 | 19 | 893 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_584125d09a1f81ac_7bc417e8", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://bn.quora.com/](1) may be at an arbitrary posit... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [https://bn.quora.com/](1) may be at an arbitrary position in the sanitized URL."
] | [
90
] | [
null
] | [
16
] | [
46
] | |
2024-11-18T21:23:35.342754+00:00 | 1,477,411,531,000 | adfac17ab55e94fef7ddc9f1ebd3db3bebd8710b | 3 | {
"blob_id": "adfac17ab55e94fef7ddc9f1ebd3db3bebd8710b",
"branch_name": "refs/heads/master",
"committer_date": 1477411531000,
"content_id": "14611bb910fcdff9358e20b7e1d249780f00196e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2c5b7e184e1916687d1e1388495ef63088d93f86",
"extension": "py"... | 2.59375 | stackv2 | import cStringIO
import os
import socket
import subprocess
import sys
import time
import paramiko
import logging
logger = logging.getLogger(__name__)
def check_port(host, port, timeout=2, attempts=100):
logger.debug("Testing connection to - {0}:{1}".format(host, port))
for attempt in xrange(attempts):
... | 136 | 32.16 | 79 | 15 | 1,057 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_6c790de6d0e9bb8e_839832e4", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
46
] | [
null
] | [
5
] | [
62
] | |
2024-11-18T21:23:46.362822+00:00 | 1,692,887,878,000 | fba22e5ff503a1d455a785ca4261ad0b55f70c0c | 2 | {
"blob_id": "fba22e5ff503a1d455a785ca4261ad0b55f70c0c",
"branch_name": "refs/heads/master",
"committer_date": 1692887878000,
"content_id": "b7f10e0c0bb8cfb2906bf894d9e448b8e4e12d8d",
"detected_licenses": [
"MIT"
],
"directory_id": "149b53990682d1375b580b7a3e143facab6ac147",
"extension": "py",
"fi... | 2.4375 | stackv2 | #
# Copyright (C) 2010-2017 Samuel Abels
# The MIT License (MIT)
#
# Permission is hereby granted, free of charge, to any person obtaining
# a copy of this software and associated documentation files
# (the "Software"), to deal in the Software without restriction,
# including without limitation the rights to use, copy,... | 298 | 32.28 | 81 | 16 | 2,256 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_8496518e85450038_09e5366d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
41
] | [
null
] | [
24
] | [
25
] | |
2024-11-18T21:37:26.522072+00:00 | 1,368,307,381,000 | 7ecebc238150fba7b7cbc31f63416ba77e0692d0 | 3 | {
"blob_id": "7ecebc238150fba7b7cbc31f63416ba77e0692d0",
"branch_name": "refs/heads/master",
"committer_date": 1368307381000,
"content_id": "ca1418be1e6f683bd1d8e0be12806e07332b6e40",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9250d3e6f570143fd361a8acca0a05d150f69a52",
"extension": "py"... | 2.96875 | stackv2 | """
Functions for loading configuration data.
"""
from itertools import chain
from fabric.api import puts
from jinja2 import Environment, FileSystemLoader, TemplateNotFound
from confab.files import _import, _import_string
from confab.merge import merge
from confab.options import options
from confab.output import debug... | 116 | 31.16 | 91 | 17 | 704 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fea32d6011732aec_4f4eb301", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
64
] | [
null
] | [
19
] | [
65
] | |
2024-11-18T21:58:59.784033+00:00 | 1,581,616,191,000 | 6b9fa549a80011f96e824358cab5fbc5b8283017 | 2 | {
"blob_id": "6b9fa549a80011f96e824358cab5fbc5b8283017",
"branch_name": "refs/heads/master",
"committer_date": 1581616191000,
"content_id": "a2d71b0ea58c4ad78c3f0502092cdebd320031c6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "804a1a6b44fe3a013352d04eaf47ea6ad89f9522",
"extension": "py"... | 2.421875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
from __future__ import unicode_literals
import os
import markdown.inlinepatterns
import markdown.extensions
import markdown.util
import slugify as slugify_impl
class ClickHouseLinkMixin(object):
def handleMatch(self, m):
single_page = (os.environ.get('SINGL... | 66 | 30.77 | 106 | 23 | 454 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_f0e5fa4dd659bc33_ff0412b5", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://clickhouse.yandex](1) may be at an arbitrary p... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [https://clickhouse.yandex](1) may be at an arbitrary position in the sanitized URL."
] | [
26
] | [
null
] | [
24
] | [
68
] | |
2024-11-18T21:59:00.525333+00:00 | 1,587,581,828,000 | 716225feed96f5f7a74c70d6b02981856fb09191 | 2 | {
"blob_id": "716225feed96f5f7a74c70d6b02981856fb09191",
"branch_name": "refs/heads/master",
"committer_date": 1587581828000,
"content_id": "52998185ba2c8d335907496a958a3ee5f75020bc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a378892cf54c0efcf8e8a5a6027f439614c2af89",
"extension": "py"... | 2.40625 | stackv2 | import os
from flask import Flask, request, jsonify
from flask_cors import CORS
from firebase_admin import auth, credentials, firestore, initialize_app
import functools
import requests
app = Flask(__name__)
cors = CORS(app, resources={r"/api/*": {"origins": "*"}})
cred = credentials.Certificate("./serviceAccount.jso... | 195 | 32.08 | 129 | 24 | 1,538 | python | [{"finding_id": "codeql_py/stack-trace-exposure_602b0adf959de1e6_8be06736", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
178,
195
] | [
null,
null
] | [
16,
5
] | [
40,
66
] | |
2024-11-18T22:11:27.715004+00:00 | 1,534,698,087,000 | 2894ce0cc7f004389788f7ad672fb750811f842e | 3 | {
"blob_id": "2894ce0cc7f004389788f7ad672fb750811f842e",
"branch_name": "refs/heads/master",
"committer_date": 1534698087000,
"content_id": "b9ab9ffa3d85fb2e4f8742969b2269da924974a9",
"detected_licenses": [
"MIT"
],
"directory_id": "d268c7de57913723ffd34129af77ffe5b2a9efda",
"extension": "py",
"fi... | 2.984375 | stackv2 | """routes.icons
This module contains all of the routes for getting icons
Attributes:
icons_blueprint: The blueprint for these routes
"""
from flask import Blueprint, redirect
icons_blueprint = Blueprint('icons', __name__, url_prefix='/icons')
@icons_blueprint.route('<path:domain>/icon.png', methods=['GET'])
de... | 24 | 23 | 67 | 11 | 123 | python | [{"finding_id": "codeql_py/url-redirection_a0a3464228bae7cf_e1d2e561", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
24
] | [
null
] | [
21
] | [
52
] | |
2024-11-18T22:11:37.322411+00:00 | 1,615,899,993,000 | cede7f41470139b4461c925b7ac924c8850b1e53 | 3 | {
"blob_id": "cede7f41470139b4461c925b7ac924c8850b1e53",
"branch_name": "refs/heads/master",
"committer_date": 1615899993000,
"content_id": "1269f0db4d22bdd7845b3f4390e872d4d19664a8",
"detected_licenses": [
"MIT"
],
"directory_id": "0abcde8a5c7ae429dbce93b0c93998edccd9df14",
"extension": "py",
"fi... | 2.625 | stackv2 | import os
import pandas as pd
from transformers import RobertaTokenizer
import torch
import re
from torch.nn.utils.rnn import pad_sequence
def clean_data(df, tokenizer, fine_tune):
df[0] = df[0].apply(lambda x: re.sub("\[ ?link ?\][a-z]?( \( [a-z] \))?", "<link>" if fine_tune else tokenizer.unk_token, x))
df... | 102 | 38.76 | 148 | 23 | 1,255 | python | [{"finding_id": "codeql_py/overly-large-range_8bb06f3a470b5083_05d7318b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
12
] | [
null
] | [
105
] | [
108
] | |
2024-11-18T22:11:37.494306+00:00 | 1,585,922,859,000 | 1d55ad36649e244a464f0ce161d1a091727ffaf7 | 2 | {
"blob_id": "1d55ad36649e244a464f0ce161d1a091727ffaf7",
"branch_name": "refs/heads/master",
"committer_date": 1585922859000,
"content_id": "638d64c512f6d8be02db58d60b039d62ceec50c3",
"detected_licenses": [
"MIT"
],
"directory_id": "85229d7b842e3ae6784673dd4d15c12f1eea6ab8",
"extension": "py",
"fi... | 2.3125 | stackv2 | import requests
from flask import Blueprint, render_template, url_for, current_app as app, request
from werkzeug.utils import redirect
from app.auth import auth
blueprint = Blueprint('survey', __name__, template_folder='templates')
@blueprint.route('/survey/<survey_id>', methods=["GET"])
@auth.login_required
def ge... | 48 | 37.12 | 120 | 13 | 402 | python | [{"finding_id": "codeql_py/partial-ssrf_f51b26c753b26b70_88e2fe76", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
36,
44
] | [
37,
45
] | [
16,
16
] | [
59,
59
] | |
2024-11-18T22:11:37.745201+00:00 | 1,526,619,282,000 | 4ac09887a5100129f40851deb52f50a1b28ca6bc | 3 | {
"blob_id": "4ac09887a5100129f40851deb52f50a1b28ca6bc",
"branch_name": "refs/heads/master",
"committer_date": 1526619282000,
"content_id": "7883476b1a666e7ceeae429ea05da91b0de9ef3c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "36cf3cc6f2575cc2b8fc17ceb3a017c8b9efb598",
"extension": "py"... | 3.0625 | stackv2 | from math import radians, cos, sin, asin, sqrt
import geocoder
import json
import requests
"""Driver details"""
user_latitude = 22.5697
user_longitude = 88.3697
city = "Kolkata"
print("\nUser/Driver details:")
print ("latitude = " + str(user_latitude) + "\nlongitude = " + str(user_longitude) + "\ncity = " + city)
"""... | 46 | 31.63 | 149 | 12 | 440 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d7935137bd2c24aa_f48a07c2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
11
] | [
null
] | [
8
] | [
104
] | |
2024-11-18T22:11:50.291518+00:00 | 1,602,221,603,000 | 48d50b8823452f07a43e13d908f88091246915e1 | 2 | {
"blob_id": "48d50b8823452f07a43e13d908f88091246915e1",
"branch_name": "refs/heads/master",
"committer_date": 1602221603000,
"content_id": "295fb195706ab89c8b057610c5ba0f82350ed4ab",
"detected_licenses": [
"MIT"
],
"directory_id": "81407be1385564308db7193634a2bb050b4f822e",
"extension": "py",
"fi... | 2.34375 | stackv2 | import os
import re
# import time
import typing
from selenium import webdriver
from selenium.common.exceptions import TimeoutException
from selenium.webdriver.support.wait import WebDriverWait
import tomd
# import execjs # pip install PyExecJS
import requests
from urllib.parse import urlparse
from pyquery import PyQ... | 165 | 36.07 | 144 | 23 | 1,582 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_4061e0919fa64dba_14f2f41b", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.cnblogs.com](1) may be at an arbitrary position in... | 10 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitizatio... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The string [www.cnblogs.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [segmentfault.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [blog.csdn.net](1) may be at an arbitrary position in the sanitized URL.",
"The string [www.jianshu.com](1) may be at a... | [
104,
106,
108,
110,
112,
114,
116,
119,
121,
121
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
12,
12,
12,
12,
12,
12,
12,
12,
12,
40
] | [
36,
37,
34,
36,
37,
36,
38,
39,
36,
62
] | |
2024-11-18T22:23:59.781978+00:00 | 1,601,638,680,000 | b40b562054e73a4d637a887903b08f2166ab7cb5 | 3 | {
"blob_id": "b40b562054e73a4d637a887903b08f2166ab7cb5",
"branch_name": "refs/heads/master",
"committer_date": 1601638680000,
"content_id": "47b99a7e7e3ec3649a9e5628c245c5c535fd772e",
"detected_licenses": [
"MIT"
],
"directory_id": "e7722c60423d7f09a7f52fee049a1c6bf9acecf0",
"extension": "py",
"fi... | 3 | stackv2 | #import required packages
import pandas as pd
import geopandas as gpd
import requests
import json
import shapely
import fiona
from pyproj import Proj, transform, Transformer
from sqlalchemy import create_engine
import psycopg2
import geoalchemy2
def postgis_push(spatial_df):
'''
A function to set the correct... | 162 | 32.79 | 174 | 16 | 1,346 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7cf53a01b514b1ec_3f6bb8d0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p... | [
101,
132
] | [
null,
null
] | [
15,
11
] | [
17,
22
] | |
2024-11-18T22:24:12.721108+00:00 | 1,529,257,700,000 | 2763fef871a3595f0403ec21e3c4f12b8b28a949 | 2 | {
"blob_id": "2763fef871a3595f0403ec21e3c4f12b8b28a949",
"branch_name": "refs/heads/master",
"committer_date": 1529257700000,
"content_id": "43f5c9f6ed6da8d48dcaf513c32c9eeb91ef108f",
"detected_licenses": [
"MIT"
],
"directory_id": "fbabdde26aff4027b3835e972846f7de96127bd2",
"extension": "py",
"fi... | 2.4375 | stackv2 | from django.contrib import messages
from django.contrib.auth import login as django_login, authenticate
from django.shortcuts import render, redirect
# @login_required
from django.views import View
from django.views.generic import ListView
from core.forms import SignUpForm, LoginForm
from core.models import Profile
... | 114 | 26.61 | 85 | 16 | 606 | python | [{"finding_id": "codeql_py/url-redirection_b892d1702e13b542_e6e0e7ed", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
86
] | [
null
] | [
33
] | [
36
] | |
2024-11-18T22:24:12.888813+00:00 | 1,399,038,768,000 | 8cc581ce72bb1930fa4013904f9b5bf4a8e1e1d7 | 3 | {
"blob_id": "8cc581ce72bb1930fa4013904f9b5bf4a8e1e1d7",
"branch_name": "refs/heads/master",
"committer_date": 1399038772000,
"content_id": "7614c9812a9f33e3547f6bbc45d31d48cca2c203",
"detected_licenses": [
"MIT"
],
"directory_id": "e1f300bf751ccc9186451c555303b90f6115cd17",
"extension": "py",
"fi... | 3.25 | stackv2 | """
Copyright 2014 Nauman Ahmad
This file is part of the Rocket library.
"""
from flask import Flask,render_template
import markdown,os,yaml
from werkzeug.utils import cached_property
#Constants Defined
FILE_EXTENSION = '.md'
app = Flask(__name__)
app.secret_key = 'f8ssdf00sas#$2233500966*@!'
class Post(object):
... | 66 | 28.79 | 114 | 18 | 449 | python | [{"finding_id": "codeql_py/flask-debug_50961c598283a57d_585a0cdf", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
66,
41
] | [
null,
null
] | [
5,
19
] | [
24,
28
] | |
2024-11-18T22:24:13.012329+00:00 | 1,599,053,689,000 | d25e744420955db6e8a7df80cb1c10e0192299f9 | 2 | {
"blob_id": "d25e744420955db6e8a7df80cb1c10e0192299f9",
"branch_name": "refs/heads/master",
"committer_date": 1599053689000,
"content_id": "a06a1cda8323c8ca54352d62a6c43a982ba8dc02",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5fe72bb13baf3649058ebe11aa86ad4fc56c69ed",
"extension": "py"... | 2.3125 | stackv2 | #!/usr/bin/python
#Install SleekXMPP & xmpppy Modules
#This program is not for children -(18)
#This program is only for educational purposes only.
#Don't Attack people facebook account's it's illegal !
#If you want to HaCk into someone's account, you must have the permission of the user.
#usage:Facebook-brute-force... | 89 | 27.38 | 87 | 16 | 705 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_96bfcfec0be6fa7f_532da801", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
81
] | [
null
] | [
15
] | [
39
] | |
2024-11-18T22:24:23.756561+00:00 | 1,636,445,367,000 | bf8792e6c251d88419b2917ea801e13adaf31543 | 3 | {
"blob_id": "bf8792e6c251d88419b2917ea801e13adaf31543",
"branch_name": "refs/heads/master",
"committer_date": 1636445367000,
"content_id": "ed565dd83b990024d4d7c80922f74c69842a436a",
"detected_licenses": [
"MIT"
],
"directory_id": "0f04c3f5e35c0a3f96fbbb3b90d79a2d389f24a4",
"extension": "py",
"fi... | 2.515625 | stackv2 | from __future__ import annotations
import os
from io import BytesIO
from typing import List, Optional
import flask
from flask import Flask, redirect, render_template, request
from itsdangerous import URLSafeSerializer
from PIL import Image, ImageDraw, ImageFont
app = Flask(__name__, static_url_path="/media")
SECRET... | 101 | 24.99 | 111 | 13 | 685 | python | [{"finding_id": "codeql_py/flask-debug_ab8b2ca36f921dd1_b2d03a33", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
101,
20
] | [
null,
null
] | [
5,
27
] | [
24,
31
] | |
2024-11-18T22:24:24.820516+00:00 | 1,617,579,095,000 | 4044d6123a3d2dbc07ed76aaa66f29d8efb48b11 | 2 | {
"blob_id": "4044d6123a3d2dbc07ed76aaa66f29d8efb48b11",
"branch_name": "refs/heads/main",
"committer_date": 1617579095000,
"content_id": "f3d4284a6109157714a3d00e2647d5f5a2ee8643",
"detected_licenses": [
"MIT"
],
"directory_id": "db06b71f5ad71d864fa6b3dacbd10989c4c22ad5",
"extension": "py",
"file... | 2.46875 | stackv2 | import os
import re
import sys
import socket
import asyncio
from typing import Any
from typing import Union
from colorama import Fore
from typing import Callable
from asyncio import AbstractEventLoop
from .utils import log
from .utils import http_status_codes
def write_response(code: int, body: bytes, headers: Union[... | 251 | 31.57 | 99 | 22 | 1,774 | python | [{"finding_id": "codeql_py/overly-permissive-file_351597d8544a21fa_fd762daf", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
225
] | [
null
] | [
21
] | [
42
] | |
2024-11-18T22:36:06.757564+00:00 | 1,628,749,665,000 | d450023e5eefa6f6c6de00277556f5f20c644783 | 3 | {
"blob_id": "d450023e5eefa6f6c6de00277556f5f20c644783",
"branch_name": "refs/heads/main",
"committer_date": 1628749665000,
"content_id": "26d1a4bf4b90df81f7d20602cbf564e380743182",
"detected_licenses": [
"MIT"
],
"directory_id": "35f421ecf39c988b0fb16163334de460492755ae",
"extension": "py",
"file... | 3.109375 | stackv2 | from flask import Flask
from flask import request
app= Flask(__name__)
@app.route('/')
def index():
return '<h1>HOLA MUNDO FLASK</h1>'
@app.route('/suma')
def suma():
n1 = request.args.get('n1','ingrese un valor de n1')
n2 = request.args.get('n2','ingrese un valor de n2')
r = int(n1) + int(n2)
re... | 40 | 25.73 | 56 | 12 | 313 | python | [{"finding_id": "codeql_py/flask-debug_1077e55b46a6431f_7fdc4b0e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
40,
15,
20
] | [
null,
null,
null
] | [
5,
12,
12
] | [
36,
54,
46
] | |
2024-11-18T22:36:07.387744+00:00 | 1,406,377,558,000 | ae2eac34ebb456397edebc42c0200d6054deb5d7 | 2 | {
"blob_id": "ae2eac34ebb456397edebc42c0200d6054deb5d7",
"branch_name": "refs/heads/master",
"committer_date": 1406377558000,
"content_id": "e0e9731aeacebc145be934d06e4b11a1ca7055ec",
"detected_licenses": [
"MIT"
],
"directory_id": "44969101dbc9e5056b9e45b18edd8b5003e5e736",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/python
import cgi
import json
form = cgi.FieldStorage()
prob_name = form['problem_name'].value
assert type(prob_name) is str # prevent subclassing shenanigans
print("Content-type: text/plain; charset=iso-8859-1\n")
try:
for line in open('coding-the-matrix/python_lab.problem2name'):
p, desc = line.s... | 35 | 23.66 | 64 | 14 | 239 | python | [{"finding_id": "codeql_py/path-injection_70157988a8a60d06_8fd0fcde", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
19
] | [
null
] | [
14
] | [
16
] | |
2024-11-18T22:36:23.470606+00:00 | 1,688,954,286,000 | 488d57c48b4ec3a3440a523ebe5276b944460f3a | 3 | {
"blob_id": "488d57c48b4ec3a3440a523ebe5276b944460f3a",
"branch_name": "refs/heads/master",
"committer_date": 1688954286000,
"content_id": "b40d388f9b1dc9cdb2f8749c7bb583be0d8d6a67",
"detected_licenses": [
"MIT"
],
"directory_id": "b779e7f6e017b4bbde5fe0ecf057a122f3a1e41f",
"extension": "py",
"fi... | 2.625 | stackv2 | """
Download notMNIST and generate a pickle file
Author: Rowel Atienza
Project: https://github.com/roatienza/Deep-Learning-Experiments
"""
# On command line: python3 mnist_a2j_2pickle.py
# Prerequisite: tensorflow (see tensorflow.org)
from __future__ import print_function
import numpy as np
import pickle
import os
im... | 113 | 32.33 | 96 | 18 | 898 | python | [{"finding_id": "codeql_py/tarslip_837590715a40d71c_7e2acaa7", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
52
] | [
null
] | [
5
] | [
8
] | |
2024-11-18T22:36:27.344105+00:00 | 1,518,937,878,000 | 305c472f818c15eec08af58987e3ee73c23715d4 | 3 | {
"blob_id": "305c472f818c15eec08af58987e3ee73c23715d4",
"branch_name": "refs/heads/master",
"committer_date": 1518937878000,
"content_id": "435830cab7492fb427281d0d98892eedcc080b2a",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "a8ec168566b61f3bab1a19b621c30c3a43dfffe4",
"extension": "p... | 3.25 | stackv2 | # Impler necessary modules
from flask import Flask, jsonify, abort, render_template
from geocoder import Geocoder
# Define the app
app = Flask(__name__)
# Define what happens when '/' is called
@app.route('/', methods=['GET'])
def default():
# Render the webpage
return render_template('layout.html')
# Define what... | 82 | 28.72 | 101 | 20 | 621 | python | [{"finding_id": "codeql_py/flask-debug_4426e23b3dcf4f20_8050fe04", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
82,
75
] | [
null,
null
] | [
2,
11
] | [
21,
70
] | |
2024-11-18T22:36:35.727284+00:00 | 1,519,246,117,000 | d2fd10bb9da36f124f2baca7ffe9f555fa3e3d51 | 3 | {
"blob_id": "d2fd10bb9da36f124f2baca7ffe9f555fa3e3d51",
"branch_name": "refs/heads/master",
"committer_date": 1519246117000,
"content_id": "e7791367f05b20bd0a797ae906e1e1b4e7b963a7",
"detected_licenses": [
"MIT"
],
"directory_id": "721a902265455ea095cbf6db1ad77b0859fd5838",
"extension": "py",
"fi... | 2.703125 | stackv2 | #TWIL IG
from flask import Flask, request, redirect
from twilio.twiml.messaging_response import Message, MessagingResponse
from InstagramAPI import InstagramAPI
from PIL import Image
from resizeimage import resizeimage
import requests
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
... | 105 | 31.09 | 145 | 18 | 815 | python | [{"finding_id": "codeql_py/flask-debug_974ae1aeb26d2ab6_f3b0d7aa", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-295",
"CWE-918"
] | [
"py/flask-debug",
"py/request-without-cert-validation",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This request may run without certificate validation because [it is disabled](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
105,
40,
40
] | [
null,
null,
null
] | [
5,
13,
13
] | [
24,
69,
69
] | |
2024-11-18T22:36:39.308778+00:00 | 1,628,951,004,000 | 81ae6d1e404cde8f09986acd46496fcbc4730b35 | 3 | {
"blob_id": "81ae6d1e404cde8f09986acd46496fcbc4730b35",
"branch_name": "refs/heads/master",
"committer_date": 1628951004000,
"content_id": "4d0955c7abea2b8a533e322af9844f90e8e742ee",
"detected_licenses": [
"MIT"
],
"directory_id": "a1428ffd82f375081b620a9547f5860a97dec460",
"extension": "py",
"fi... | 2.65625 | stackv2 | """VSCode version manager."""
import os
import os.path
import re
import shutil
import subprocess
import urllib.request
from typing import Any, List, NamedTuple
import bs4
import click
VSCVM_PATH = os.path.expanduser("~/.vscvm")
VSCODE_BASE_URL = "https://code.visualstudio.com"
VSCODE_RELEASES_URL = VSCODE_BASE_URL +... | 242 | 27.31 | 86 | 14 | 1,589 | python | [{"finding_id": "codeql_py/overly-permissive-file_bfb3eda3da6f2dc9_e2eec7c0", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
176
] | [
null
] | [
5
] | [
38
] | |
2024-11-18T21:22:14.996381+00:00 | 1,556,590,754,000 | 8ce5ad1c8c2c5503dfec8184e63a625054aa641c | 2 | {
"blob_id": "8ce5ad1c8c2c5503dfec8184e63a625054aa641c",
"branch_name": "refs/heads/master",
"committer_date": 1556590754000,
"content_id": "046d228e38aa469bc53a644653f4fee272a94b4e",
"detected_licenses": [
"MIT"
],
"directory_id": "418c3d40b71e81f9ec954cc40e98ef2b4c9ff0c8",
"extension": "py",
"fi... | 2.359375 | stackv2 | import sys
import os
import time
import logging
import tempfile
import subprocess
import _thread
import traceback
import tornado.web
import tornado.ioloop
import tornado.gen
import requests
import psutil
from .ssh import SSHRemoteForward
log = logging.getLogger('curlbomb.server')
class CurlbombBaseRequestHandler(to... | 249 | 38.78 | 128 | 20 | 2,136 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_53fb4532a02172c8_51945558", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-117"
] | [
"py/clear-text-logging-sensitive-data",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This log entry depends on a [user-provided value](1)."
] | [
226,
123
] | [
null,
124
] | [
34,
22
] | [
92,
40
] | |
2024-11-18T21:51:25.662919+00:00 | 1,418,821,946,000 | ef20a64abbef822152fed26935162b23dcd5ae8f | 2 | {
"blob_id": "ef20a64abbef822152fed26935162b23dcd5ae8f",
"branch_name": "refs/heads/master",
"committer_date": 1418821946000,
"content_id": "c3aafcc20e1f9835f50a9c2329bb123d428f1396",
"detected_licenses": [
"MIT"
],
"directory_id": "0f04bd2aa3768a09a00237be4c1ae3cd152fac9d",
"extension": "py",
"fi... | 2.484375 | stackv2 | import binascii
import types
from lxml import etree
from jinja2 import Template
class XmlToPy():
def __init__(self):
self.py_string = Template("""
class {{pck_name}}():
@classmethod
def dtype(cls, data):{% if complexity == "complex" %}
pos = GetPosition(data){% endif %}
{% if com... | 89 | 31.6 | 133 | 19 | 628 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_02333440dbde2d65_ea8de240", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
11
] | [
19
] | [
26
] | [
44
] | |
2024-11-18T21:51:27.383778+00:00 | 1,570,556,890,000 | 3676111ab33582d230ddc906ab4f2a537fcc8c6a | 2 | {
"blob_id": "3676111ab33582d230ddc906ab4f2a537fcc8c6a",
"branch_name": "refs/heads/master",
"committer_date": 1570556890000,
"content_id": "a89ed998db8e38975c68517309dc054b4d0e51ee",
"detected_licenses": [
"MIT"
],
"directory_id": "16a984aa77f7af07129d846713c633a94a64e7a0",
"extension": "py",
"fi... | 2.390625 | stackv2 | from django.shortcuts import render, redirect
from django.http import HttpResponse
from django.contrib.auth.models import auth, User
from django.contrib import messages
# Create your views here.
# register
def register(request):
if request.method == 'POST':
if User.objects.filter(username=request.POST['na... | 49 | 29.57 | 110 | 16 | 276 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_26758a6db8da09c4_504ef1ba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
31
] | [
null
] | [
24
] | [
32
] | |
2024-11-18T21:51:30.034309+00:00 | 1,650,918,693,000 | f45e33c711fb231405c65cce6ea5f42bf7d81950 | 3 | {
"blob_id": "f45e33c711fb231405c65cce6ea5f42bf7d81950",
"branch_name": "refs/heads/main",
"committer_date": 1650918693000,
"content_id": "23a80dd6c0b2815f610e182fad5bc9fe31473693",
"detected_licenses": [
"MIT"
],
"directory_id": "5f65e12a62b59aea9263f35240c960b7e6009aa5",
"extension": "py",
"file... | 3.34375 | stackv2 | #!/usr/bin/env python3
"""YouTube utilities.
Using the YouTube URL:
* Get the YouTube Title
* Get the YouTube Shortened URL
"""
import sys
import re
import requests
from bs4 import BeautifulSoup
def video_id(url: str) -> str:
"""Return the YouTube Video Id from URL."""
REGEX = '(?:https:\/\/www.youtube.co... | 70 | 22.63 | 86 | 14 | 422 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_6b5f690cc8d861f4_5e2acd14", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This string, which is used as a regular expression [here](1), has an unescaped '.' before 'youtube.com', so it might match more hosts than expected."
] | [
19
] | [
null
] | [
17
] | [
53
] | |
2024-11-18T21:51:43.468973+00:00 | 1,484,192,270,000 | b3c8ae4383a29dce15b445c8933233c41a94b8a2 | 3 | {
"blob_id": "b3c8ae4383a29dce15b445c8933233c41a94b8a2",
"branch_name": "refs/heads/master",
"committer_date": 1484192270000,
"content_id": "49616e5abfb1e1265d3b309f6c4ef526ab5ca8d1",
"detected_licenses": [
"MIT"
],
"directory_id": "7afe7bf5658edcb915b8a0045f6a684f14cc9825",
"extension": "py",
"fi... | 2.546875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import os
import BaseHTTPServer
import SimpleHTTPServer
import socket
import ssl
def main():
ssl_file = '/tmp/simple-https-ssl.pem'
os.system('openssl req -new -x509 -keyout {F} -out {F} -days 365 -nodes -subj "/C=CN/ST=Hangzhou/L=China/CN=www.huijieapp.com"'.for... | 33 | 20.33 | 151 | 10 | 221 | python | [{"finding_id": "codeql_py/insecure-default-protocol_1ad1f75f1a04081a_b6fb119d", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
21
] | [
25
] | [
20
] | [
6
] | |
2024-11-18T21:51:49.083883+00:00 | 1,683,150,422,000 | 39893f07fc4924627664d9addb570093ca9cedb4 | 3 | {
"blob_id": "39893f07fc4924627664d9addb570093ca9cedb4",
"branch_name": "refs/heads/master",
"committer_date": 1683150422000,
"content_id": "c1c276536e49a429ef59f0662d074aec8c8d8031",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "9fa737de79d98c09192bedb76021716d9ab44284",
"extension": "p... | 2.5625 | stackv2 | #!/usr/local/bin/python
# Copyright Jon Berg, turtlemeat.com
import string,cgi,time
from os import curdir, sep
from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer
class MyHandler(BaseHTTPRequestHandler):
def do_GET(self):
print("doGet: path==" + self.path)
try:
if self.path == "/":
sel... | 68 | 31.28 | 86 | 19 | 470 | python | [{"finding_id": "codeql_py/path-injection_bf1c3d6111afccd7_8ebea76f", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
17
] | [
null
] | [
26
] | [
50
] | |
2024-11-18T21:51:54.360690+00:00 | 1,589,560,143,000 | 9e96a6581c520e06f11db8f3ce4d18af4a180bd2 | 3 | {
"blob_id": "9e96a6581c520e06f11db8f3ce4d18af4a180bd2",
"branch_name": "refs/heads/master",
"committer_date": 1589560143000,
"content_id": "edbdf3029d8307c1b3a289dc2fa32769ce0c8536",
"detected_licenses": [
"MIT"
],
"directory_id": "365410cfdc35c6188b5fbe1bfc90615022dcf0ce",
"extension": "py",
"fi... | 2.59375 | stackv2 | import sys
import os
import configparser
import asyncio
import urllib.parse
import aiohttp
from lxml import html, etree
CONFIG_PATH = f"{os.environ['HOME']}/.config/seqartfetch.ini"
VERSION = "0.3.4"
USAGE = f"""SeqArtFetch {VERSION}
About
A semi-universal webcomic/sequential art downloader, licensed under MIT.
... | 231 | 32.31 | 112 | 26 | 1,715 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_5334c694654884c2_12b0738e", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://m.tapas.io](1) may be at an arbitrary position... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [https://m.tapas.io](1) may be at an arbitrary position in the sanitized URL."
] | [
159
] | [
null
] | [
24
] | [
63
] | |
2024-11-18T22:02:46.376538+00:00 | 1,691,154,790,000 | d6b73793ba888941e7d79ae7e8457e772b6b102c | 3 | {
"blob_id": "d6b73793ba888941e7d79ae7e8457e772b6b102c",
"branch_name": "refs/heads/master",
"committer_date": 1691154790000,
"content_id": "c5126bd5cfcc43701d703049e3c32a6a67426288",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4491549f0b1bbf5397ae0b56192605a7abcb61b0",
"extension": "py"... | 2.828125 | stackv2 | from urllib.request import urlopen
from requests import post
import re
url = "http://localhost:5000/login/"
def get_content_from_class(html, class_name):
pattern = f'<div class="{class_name}">.*?</div>'
match_results = re.search(pattern, html, re.IGNORECASE)
content = match_results.group()
content = ... | 62 | 23.19 | 62 | 14 | 365 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cec94707a96f53e0_e709f0ff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
58
] | [
null
] | [
39
] | [
47
] | |
2024-11-18T22:16:39.989356+00:00 | 1,549,041,939,000 | 29bcadbb24dd36423c674924eda59205bd0d6f49 | 3 | {
"blob_id": "29bcadbb24dd36423c674924eda59205bd0d6f49",
"branch_name": "refs/heads/master",
"committer_date": 1549041939000,
"content_id": "91ba98801c30e8e516d777b40f658b0c1b84d50e",
"detected_licenses": [
"MIT"
],
"directory_id": "e0a607c46c5947f3e2055a91fb2907a705a23111",
"extension": "py",
"fi... | 3.3125 | stackv2 | #! /usr/bin/env python
# -- coding: utf-8 --
# ULL - Sistemas Inteligentes 2018/2019
#
# User class and functions to create, write and read users
USERS_DATA = "../Data/users.txt"
LAST_USER_ID = "../Data/last_user_id.txt"
class User:
def __init__(self, uid, age = 30, height = 170, weight = 70, sex = "M", exerci... | 91 | 26.31 | 117 | 23 | 743 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8e6146fee82d81fd_ac59b1ee", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
83
] | [
84
] | [
13
] | [
70
] | |
2024-11-18T22:27:55.607188+00:00 | 1,591,279,780,000 | fd0b431b5e4ee2f9cb7ef9224da3ee2714d0f7c6 | 3 | {
"blob_id": "fd0b431b5e4ee2f9cb7ef9224da3ee2714d0f7c6",
"branch_name": "refs/heads/master",
"committer_date": 1591279780000,
"content_id": "c601556efe80f9b5ce021f7258a9d7c10a66993f",
"detected_licenses": [
"Unlicense"
],
"directory_id": "01eb2a217968b5a5045277c1736bed6ab3bc2996",
"extension": "py",... | 2.796875 | stackv2 | import streamlit as st
#EDA Pkgs
import pandas as pd
import matplotlib.pyplot as plt
import matplotlib
matplotlib.use('Agg')
from wordcloud import WordCloud, STOPWORDS, ImageColorGenerator
#DB
import sqlite3
conn = sqlite3.connect('blog.db')
c = conn.cursor()
#Functions
def create_table():
c.execute('CREATE TA... | 198 | 33.96 | 159 | 18 | 1,722 | python | [{"finding_id": "codeql_py/sql-injection_9018e0e144333f42_28348b9b", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 2 | true | [
"CWE-089",
"CWE-089"
] | [
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
37,
42
] | [
null,
null
] | [
15,
15
] | [
71,
73
] | |
2024-11-18T22:44:04.936048+00:00 | 1,630,626,361,000 | 688b01fd27cce4a2a8b15d90067eec319944971a | 3 | {
"blob_id": "688b01fd27cce4a2a8b15d90067eec319944971a",
"branch_name": "refs/heads/main",
"committer_date": 1630626361000,
"content_id": "e57b3d333a23a5b4513684df59106d970fa4766c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "749cc75e5bb13d4ecd4b8999414e015e64c3464d",
"extension": "py",
... | 2.84375 | stackv2 | import base64
import hmac
import time
class Sign():
def getSign(self,secret_key:str,msg:str) -> str:
"""
生成鉴权签名串
"""
msg_encoded = msg.encode()
secret = str.encode(secret_key)
sign = hmac.new(secret,msg_encoded,digestmod="sha256")
sign = sign.hexdigest()
sign... | 28 | 31.29 | 90 | 16 | 234 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b0114977d96be65c_29ab64ab", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
12
] | [
null
] | [
31
] | [
42
] | |
2024-11-18T22:44:30.083390+00:00 | 1,489,592,039,000 | ce22961c8488e15640ad6827e9e3a01d324ef0fb | 2 | {
"blob_id": "ce22961c8488e15640ad6827e9e3a01d324ef0fb",
"branch_name": "refs/heads/master",
"committer_date": 1489592039000,
"content_id": "484a0b6960d71f42d9aa2415623146c327926934",
"detected_licenses": [
"MIT"
],
"directory_id": "543765bcdd02d1a1634faa434e6e41a62349301a",
"extension": "py",
"fi... | 2.34375 | stackv2 | from flask import Flask, render_template, redirect, url_for, request, session, flash, jsonify, g
import sqlite3 as sql
import os
import random
import json
from flask_sqlalchemy import SQLAlchemy
import ast #To change string list to a python list
import collections #To conte duplicate in iventory list using Counter()
... | 383 | 24.18 | 109 | 19 | 2,725 | python | [{"finding_id": "codeql_py/flask-debug_82ca425bbc640965_8e5eebad", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 6 | true | [
"CWE-215",
"CWE-079",
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"T... | [
383,
339,
287,
289,
293,
295
] | [
null,
null,
null,
null,
null,
null
] | [
5,
9,
20,
20,
20,
20
] | [
39,
90,
71,
75,
71,
75
] | |
2024-11-18T22:44:30.329289+00:00 | 1,413,972,615,000 | 3f733a267bef50992b04e1e09f2f193ddaaf97d5 | 3 | {
"blob_id": "3f733a267bef50992b04e1e09f2f193ddaaf97d5",
"branch_name": "refs/heads/master",
"committer_date": 1413972615000,
"content_id": "5b8053c9c76db20068767955003174f4824be431",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "368c1256a004cd6f0e17ce596cfe3310b473eabc",
"extension": "p... | 2.765625 | stackv2 | import os
from flask import (Flask, request, send_from_directory,
abort, jsonify, render_template)
from werkzeug import secure_filename
VERBOSE = True
UPLOAD_FOLDER = 'static/uploads'
# Folder where resources that are shared between all games are stored
COMMONS_FOLDER = 'static/commons'
JAVASCRIPT_F... | 220 | 41 | 79 | 20 | 2,062 | python | [{"finding_id": "codeql_py/path-injection_0d2e9dc457e24127_b63d5a46", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 7 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).\... | [
92,
95,
98,
140,
175,
174,
195
] | [
null,
null,
null,
null,
null,
null,
null
] | [
43,
37,
31,
15,
40,
27,
32
] | [
56,
50,
41,
32,
43,
53,
35
] | |
2024-11-18T22:44:41.844960+00:00 | 1,534,138,332,000 | 1cffffe1907d8808505d1b69195dee6f65a17110 | 3 | {
"blob_id": "1cffffe1907d8808505d1b69195dee6f65a17110",
"branch_name": "refs/heads/master",
"committer_date": 1534138332000,
"content_id": "1097a11c1dd27beda424e7d2ca22cf29d855e01f",
"detected_licenses": [
"MIT"
],
"directory_id": "c382b70131d13dd91b8c41a378f98ef4a1b8cdcb",
"extension": "py",
"fi... | 2.984375 | stackv2 | import requests
from bs4 import BeautifulSoup
import json
import pandas as pd
term = "vr"
# initialize list of links
links = []
# get a list of links for channels while searching for a given term
for i in range(0,200,10):
r = requests.get("https://www.bing.com/search?q="+term+"%20site%3A%20https%3A%2F%2Fwww.yout... | 69 | 34.12 | 135 | 15 | 652 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_901c8c4b79cd02cf_9ac04a85", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
43
] | [
null
] | [
11
] | [
20
] | |
2024-11-18T20:59:37.880005+00:00 | 1,615,740,347,000 | e6af3c560fa50d8755f92e5cef94786f01574207 | 2 | {
"blob_id": "e6af3c560fa50d8755f92e5cef94786f01574207",
"branch_name": "refs/heads/main",
"committer_date": 1615740347000,
"content_id": "5c80eb4f672aed147c590e053c624cb216381840",
"detected_licenses": [
"MIT"
],
"directory_id": "02fb46fbf913335673bd9100bf5e7b3de737cff6",
"extension": "py",
"file... | 2.3125 | stackv2 | from flask import Flask, redirect, url_for, request, render_template, Response, stream_with_context
import ancv_html_scraper as ancv
import logging
from logging.handlers import RotatingFileHandler
from database.db import initialize_db, drop_db
from database.models import Restaurants
import json
from pymongo import Mong... | 102 | 31.97 | 102 | 16 | 798 | python | [{"finding_id": "codeql_py/flask-debug_a04d6629c113f3be_8b03b777", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-117"
] | [
"py/flask-debug",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1)."
] | [
102,
20
] | [
null,
null
] | [
5,
21
] | [
41,
62
] | |
2024-11-18T20:59:42.932277+00:00 | 1,685,473,511,000 | 060fdf8bacb080b1c72d2d8d0599c5061f3f3a05 | 3 | {
"blob_id": "060fdf8bacb080b1c72d2d8d0599c5061f3f3a05",
"branch_name": "refs/heads/master",
"committer_date": 1685473511000,
"content_id": "2169cb247b10e6004ab10b2f34a35541c786b747",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "c650da6c4144f5090425f3bf87dcf6adf7fe53a2",
"extension": "p... | 3.140625 | stackv2 | import jinja2
def load_template(in_template):
""" Returns a jinja2 template from file.
Parameters
---------
in_template: str
path and name of jinja2 template
Returns
-------
output_template: jinja template object
"""
with open(in_template, 'r') as default:
output_... | 43 | 23.07 | 61 | 12 | 225 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d8e70d1f87b999ac_c0ce6822", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
17
] | [
null
] | [
27
] | [
58
] | |
2024-11-18T21:00:27.964575+00:00 | 1,644,515,547,000 | 453ac0531aa29da25d756840fbf8cce192f52a7b | 2 | {
"blob_id": "453ac0531aa29da25d756840fbf8cce192f52a7b",
"branch_name": "refs/heads/master",
"committer_date": 1644515547000,
"content_id": "9dee8755eaeaeecd0f03a146c24137166b34e9bc",
"detected_licenses": [
"MIT"
],
"directory_id": "4f735598ec73cc2961c4a14bc2ed9dbda9d96b66",
"extension": "py",
"fi... | 2.453125 | stackv2 | #! /usr/env/python
# A wrapper class to run psrcat and generate the JSON dictionary with pulsar parameters
import numpy as np
import logging
import json
from jinja2 import Template
import psrcatpy.params as params
log = logging.getLogger('json_parser')
class JSONParser:
def __init__(self, params):
... | 54 | 31.02 | 102 | 14 | 361 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_00768a706b3613a5_c8809c4d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
17
] | [
31
] | [
30
] | [
28
] | |
2024-11-18T21:01:19.789321+00:00 | 1,577,998,348,000 | f1173f86e7f5793ab752dc5a3f898d21dc02966a | 3 | {
"blob_id": "f1173f86e7f5793ab752dc5a3f898d21dc02966a",
"branch_name": "refs/heads/master",
"committer_date": 1577998348000,
"content_id": "d740b143c670d2bc38d12bf1edfebb6bc12ba4ec",
"detected_licenses": [
"MIT"
],
"directory_id": "e880c6cef9d64071d73be8bd38c1daee71c4c62a",
"extension": "py",
"fi... | 2.609375 | stackv2 | # _*_ coding: utf-8 _*_
from flask import Flask, request
app = Flask(__name__)
@app.route('/')
def root():
parameter_dict = request.args.to_dict()
if len(parameter_dict) == 0:
return 'No parameter'
parameters = ''
for key in parameter_dict.keys():
parameters += 'key: {}, value: {}<br... | 21 | 19.95 | 77 | 13 | 109 | python | [{"finding_id": "codeql_py/reflective-xss_ac83484b5a5d0fb3_9c2cc1f1", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
16
] | [
null
] | [
12
] | [
22
] | |
2024-11-18T21:01:24.381835+00:00 | 1,569,338,543,000 | 915a550f867940a3e42b23d73df947a1b970d86a | 3 | {
"blob_id": "915a550f867940a3e42b23d73df947a1b970d86a",
"branch_name": "refs/heads/master",
"committer_date": 1569338543000,
"content_id": "e9f2ee02a763eb8dd9adba500b37d11a41d47ab4",
"detected_licenses": [
"MIT"
],
"directory_id": "9c6f1d756fc25972f2377636088833863f868895",
"extension": "py",
"fi... | 2.515625 | stackv2 | #!/usr/bin/env python
"""\
Transform a DAWNet file into a Coala planner problem
"""
from __future__ import print_function
import os
import sys
import logging
import shutil
from jinja2 import Environment, FileSystemLoader, TemplateNotFound
from dawnet.parser import dawnet
from dawnet import utils
def get_configurati... | 189 | 30.06 | 123 | 17 | 1,391 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8ae2ecd1c057248c_d9bac574", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
100
] | [
104
] | [
7
] | [
24
] | |
2024-11-18T21:01:34.125049+00:00 | 1,690,806,069,000 | d2303ea261b67b9dd8ce574a643557cdabeab348 | 2 | {
"blob_id": "d2303ea261b67b9dd8ce574a643557cdabeab348",
"branch_name": "refs/heads/master",
"committer_date": 1690806069000,
"content_id": "1adb6783c07f107c786ea150e63ea24573951933",
"detected_licenses": [
"MIT"
],
"directory_id": "07e2f133cba3bdb91d03a1e84d080fc1bf0597c8",
"extension": "py",
"fi... | 2.46875 | stackv2 | #!/usr/bin/env python3
from argparse import ArgumentParser
from boto3 import client
from jinja2 import Template
parser = ArgumentParser(description='Hosts file generator')
parser.add_argument('ec2_instance_name', metavar='NAME', type=str,
help='EC2 instance name for filtering')
args = parser.pars... | 49 | 21.43 | 66 | 11 | 254 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_db6a5fb0ca8a7c5e_d9d30a3a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
44
] | [
null
] | [
16
] | [
38
] | |
2024-11-18T21:51:20.928578+00:00 | 1,609,169,007,000 | 6d48d7d4fd87c37a88b49ce637e83fde41b6fed7 | 3 | {
"blob_id": "6d48d7d4fd87c37a88b49ce637e83fde41b6fed7",
"branch_name": "refs/heads/master",
"committer_date": 1609169007000,
"content_id": "0a1b414f28c91066f8b523b72074d0cfe6b48f2a",
"detected_licenses": [
"MIT"
],
"directory_id": "b8aba2bb539c731591f86e17f1517861b2ccf218",
"extension": "py",
"fi... | 2.5625 | stackv2 | # -*- coding: utf-8 -*-
"""Provider for SemanticScholar
Author: G.J.J. van den Burg
License: See LICENSE file
Copyright: 2020, G.J.J. van den Burg
"""
import re
import bs4
from ._base import Provider
from ._info import Informer
from ..exceptions import URLResolutionError
from ..utils import get_page_with_retry
c... | 65 | 29.11 | 79 | 17 | 508 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_69e462516da05841_8eec91f1", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This string, which is used as a regular expression [here](1), has an unescaped '.' before 'semanticscholar.org/paper/', so it might match more hosts than expected.",
"This string, which is used as a regular expression [here](1), has an unescaped '.' before 'semanticscholar.org/', so it might match more hosts tha... | [
31,
33
] | [
null,
null
] | [
10,
15
] | [
79,
62
] | |
2024-11-18T21:51:25.023190+00:00 | 1,544,683,938,000 | 7549bde66f6e80b0254417a00671dabdaffdc71d | 2 | {
"blob_id": "7549bde66f6e80b0254417a00671dabdaffdc71d",
"branch_name": "refs/heads/master",
"committer_date": 1544683938000,
"content_id": "a7636307117f18d95268c11d9f0097700fee6b31",
"detected_licenses": [
"MIT"
],
"directory_id": "d881bff8fe2a0bccd2f7bfad8435d87c526f8deb",
"extension": "py",
"fi... | 2.3125 | stackv2 | import logging
import os
import uuid
import requests
from bs4 import BeautifulSoup
from flask import request, url_for, send_from_directory
from werkzeug.utils import secure_filename
from chatbrick_admin import app
from chatbrick_admin.util.trans import allowed_file, as_json
logger = logging.getLogger(__name__)
@ap... | 108 | 28.87 | 120 | 21 | 690 | python | [{"finding_id": "codeql_py/full-ssrf_6a2ac3a8a52eee95_b1659e82", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
76
] | [
80
] | [
19
] | [
34
] | |
2024-11-18T21:51:34.104685+00:00 | 1,358,431,115,000 | 58e61be6918ed23fdb67a4e54e9db65cde85bccd | 3 | {
"blob_id": "58e61be6918ed23fdb67a4e54e9db65cde85bccd",
"branch_name": "refs/heads/master",
"committer_date": 1358431115000,
"content_id": "4b4b2f2a5cc5a21e823ed6ddc192cc2b1fb5bf1c",
"detected_licenses": [
"BSD-2-Clause",
"BSD-3-Clause"
],
"directory_id": "e59fb40dac04bf19bf80d56dbe4c668b26b6a45c... | 2.609375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
=================
Threading Classes
=================
:Author:
Moritz Emanuel Beber
:Date:
2011-02-26
:Copyright:
Copyright(c) 2011 Jacobs University of Bremen. All rights reserved.
:File:
threaded.py
Notes
-----
Most classes (unless they inherit fro... | 382 | 30.54 | 82 | 22 | 2,504 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_1383c19546b1ba96_14e03375", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation",
"py/paramiko-missing-host-key-validation"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"Setting missing host key policy to WarningPolicy may be unsafe."
] | [
139,
141
] | [
null,
null
] | [
13,
13
] | [
79,
79
] | |
2024-11-18T21:51:34.753828+00:00 | 1,533,612,652,000 | a5030706d96ef6c4cad114c6c833e376d2dff591 | 3 | {
"blob_id": "a5030706d96ef6c4cad114c6c833e376d2dff591",
"branch_name": "refs/heads/master",
"committer_date": 1533612652000,
"content_id": "7adbeae6006f612e50286297bdd4565d3cde2caf",
"detected_licenses": [
"MIT"
],
"directory_id": "48b749c0ddd1d212d99cca760d806f46e7ac4dfa",
"extension": "py",
"fi... | 2.515625 | stackv2 | # 作者:Charles
# 公众号:Charles的皮卡丘
# B站视频下载:
# -https://www.bilibili.com/
import os
import re
import json
import click
import urllib
import requests
from contextlib import closing
'''
Input:
-url: 视频地址
-savepath: 视频下载后保存的路径
-app: 在cmd窗口运行还是在Demo中调用该类
Output:
-返回下载响应码
'''
class bilibili():
def __init__(self):
self... | 104 | 31.73 | 137 | 24 | 1,125 | python | [{"finding_id": "codeql_py/request-without-cert-validation_747568c0b91ec422_88390163", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
57,
70
] | [
null,
null
] | [
17,
16
] | [
96,
95
] | |
2024-11-18T22:00:18.914923+00:00 | 1,589,786,841,000 | 6172e5e6a0128e71aedd48b94586addaf39aed8c | 3 | {
"blob_id": "6172e5e6a0128e71aedd48b94586addaf39aed8c",
"branch_name": "refs/heads/master",
"committer_date": 1589786841000,
"content_id": "47927970297f9b2f31788490b0369cdb8f418d1a",
"detected_licenses": [
"MIT"
],
"directory_id": "1ccfbd45ca8c8bd92f86d034c2f5bcf47ca42446",
"extension": "py",
"fi... | 2.625 | stackv2 | import logging
import requests
logging.getLogger(__name__)
def LogValue(sensorname, value, api_key, port, prtg_host, ssl):
if ssl:
url_scheme = 'https'
else:
url_scheme = 'http'
json_response = {
"prtg": {
"result": [
{
"channel": se... | 29 | 29.28 | 109 | 15 | 206 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cd6b4542004580da_ac463f73", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
27,
29
] | [
null,
null
] | [
84,
43
] | [
96,
50
] | |
2024-11-18T22:00:24.828523+00:00 | 1,628,346,675,000 | 5c2027356f4d1454eeca0b0531d5eb305a66452a | 3 | {
"blob_id": "5c2027356f4d1454eeca0b0531d5eb305a66452a",
"branch_name": "refs/heads/main",
"committer_date": 1628346675000,
"content_id": "9197c16164aa6e3edfd594353c5d098f0b84e3d7",
"detected_licenses": [
"MIT"
],
"directory_id": "5c52e64424a57b1ddf8b3d09dc98ada658739e58",
"extension": "py",
"file... | 3.25 | stackv2 | #!/usr/bin/env python
"""
3a. Retrieve a list of all the devices in NetBox. This will require authentication.
As in the previous task, create your headers manually and pass them into your request.
In order to perform the NetBox authentication, you should do the following:
import os
# Set the token based on the NETB... | 54 | 28.85 | 87 | 11 | 368 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c69605a47e55f0d5_d770f449", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
43
] | [
null
] | [
16
] | [
69
] | |
2024-11-18T22:00:42.964713+00:00 | 1,600,543,945,000 | b64b992a46060008393b5f4899eb3ebced0c5181 | 3 | {
"blob_id": "b64b992a46060008393b5f4899eb3ebced0c5181",
"branch_name": "refs/heads/master",
"committer_date": 1600543945000,
"content_id": "1ef5845783e4de7b5bc93c1c3b4293fe75272ee0",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "3eef24ef66cb09a06ef970973ee2071e3d4e97a6",
"extension": "py",
... | 3.25 | stackv2 | #PASSWORD GENRATER
import os
import random
import time
# PLAY WITH COLOURS
#red='\033[1;91m'
#green='\033[1;92m' yellow='\033[1;93m'
#blue='\033[1;94m'
#purple='\033[1;95m'
#cyan='\033[1;96m'
#white='\033[1;97m
os.system('clear')
os.system("echo")
print("\... | 43 | 36.4 | 83 | 12 | 707 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_797652f84048ed80_a1ffabcc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
40
] | [
null
] | [
15
] | [
61
] | |
2024-11-18T22:01:02.898272+00:00 | 1,491,788,169,000 | 0602343b1b2a330b62f089716fb57484f96cf12e | 3 | {
"blob_id": "0602343b1b2a330b62f089716fb57484f96cf12e",
"branch_name": "refs/heads/master",
"committer_date": 1491788169000,
"content_id": "fecf40ffb7162321db2f663b189a644d5faf027e",
"detected_licenses": [
"MIT"
],
"directory_id": "4311879e41437fe0d296816029ce41bf4e993344",
"extension": "py",
"fi... | 2.75 | stackv2 | import re
import sys
import argparse
import PIL
import jieba
import requests
import numpy as np
from lxml import html
from wordcloud import WordCloud
def read_stopwords(file_path):
stopwords = set()
with open(file_path, 'rb') as fp:
for line in fp.readlines():
if not line.strip():
... | 99 | 34.83 | 127 | 15 | 879 | python | [{"finding_id": "codeql_py/bad-tag-filter_d14f37465356fcb9_79926de7", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match script end tags like </script >.", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match script end tags like </script >."
] | [
26
] | [
null
] | [
28
] | [
51
] | |
2024-11-18T22:15:09.643567+00:00 | 1,570,306,531,000 | 936a7da85e40a6a0e3430d8d61e39e6f17150800 | 2 | {
"blob_id": "936a7da85e40a6a0e3430d8d61e39e6f17150800",
"branch_name": "refs/heads/master",
"committer_date": 1570306531000,
"content_id": "cee62df09a2b6787bc06e3e1adb4e55fafdcb9c5",
"detected_licenses": [
"MIT"
],
"directory_id": "e08479988afde2def82290b85d7ef3dfb4a1f3cc",
"extension": "py",
"fi... | 2.328125 | stackv2 | from docx import Document
from wordweaver.data import affix_data, pronoun_data, verb_data
from wordweaver import buildtools
import os
from time import time
import jinja2
import re
from pylatexenc.latexencode import utf8tolatex
from wordweaver.config import BUILD_CONFIG, LANG_CONFIG
class FileMaker:
'''Takes conju... | 194 | 39.58 | 111 | 24 | 1,690 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_1eada1151bd81406_5efa15a7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
147
] | [
160
] | [
30
] | [
10
] | |
2024-11-18T22:25:57.408634+00:00 | 1,505,130,121,000 | 3e79dd5368d962e1e004fc9ec3b698a04dbb9eb8 | 3 | {
"blob_id": "3e79dd5368d962e1e004fc9ec3b698a04dbb9eb8",
"branch_name": "refs/heads/master",
"committer_date": 1505130121000,
"content_id": "55957b9aedab2c2b555afc1ee001d9e45a9a8489",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "173b6327e1be549caf257812775176e9f5e2d198",
"extension": "py"... | 2.984375 | stackv2 | #!/usr/bin/env python
import logging.handlers
import os
import json
API_KEY = ''
LONG_LAT = '26.2172,50.1971'
PATH = "temp.log"
handler = logging.handlers.WatchedFileHandler(
os.environ.get("LOGFILE", PATH))
formatter = logging.Formatter(logging.BASIC_FORMAT)
handler.setFormatter(formatter)
root = logging.getLogg... | 77 | 22.34 | 101 | 13 | 513 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ad61d20dc14cc5e6_61d858ff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
40
] | [
null
] | [
14
] | [
50
] | |
2024-11-18T22:26:00.574453+00:00 | 1,588,596,782,000 | 51098889a8dfc5a2ebf7e87ff8175e4fba0e94fd | 3 | {
"blob_id": "51098889a8dfc5a2ebf7e87ff8175e4fba0e94fd",
"branch_name": "refs/heads/master",
"committer_date": 1588596782000,
"content_id": "11246593f2bcb14e31b4d1f560f29f3487e8b934",
"detected_licenses": [
"MIT"
],
"directory_id": "28598b1a77a0886d17a2a278af4214da06cb1ce2",
"extension": "py",
"fi... | 2.78125 | stackv2 | from flask import Flask
from datetime import datetime
import requests
import time
import redis
app = Flask(__name__)
@app.route('/collect')
def collect():
try:
start = datetime.utcnow()
redis_host = "redis-service"
redis_port = 6379
channel_a = 'app-a'
channel_b = ... | 73 | 25.1 | 89 | 16 | 458 | python | [{"finding_id": "codeql_py/stack-trace-exposure_03939e6cf1f1c2cd_e5814db5", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
59,
73
] | [
null,
null
] | [
16,
5
] | [
71,
51
] | |
2024-11-18T22:26:18.113327+00:00 | 1,592,993,122,000 | 3e1352fd7f25294345a2794c8da32d13ccd18bbb | 2 | {
"blob_id": "3e1352fd7f25294345a2794c8da32d13ccd18bbb",
"branch_name": "refs/heads/master",
"committer_date": 1592993122000,
"content_id": "151b7290fb91d7e9eff86c8c525627697198269d",
"detected_licenses": [
"MIT"
],
"directory_id": "c657052e2dab3385d5aba26cf9f0ed1f32882aa8",
"extension": "py",
"fi... | 2.421875 | stackv2 | #!/usr/bin/python -u
# $Id$
# based on:
# http://googleonlinesecurity.blogspot.com/2011/04/improving-ssl-certificate-security.html
from OpenSSL.SSL import WantReadError as SSL_WantReadError,SysCallError as SSL_SysCallError,Context as SSL_Context,SSLv23_METHOD,Connection as SSL_Connection
from sys import stdin, stdou... | 69 | 24.71 | 157 | 17 | 503 | python | [{"finding_id": "codeql_py/insecure-protocol_0adf4c27bd55977c_5c700313", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv2 allowed by [call to SSL_Context](1).\nInsecure SSL/TLS protocol ve... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version SSLv2 allowed by [call to SSL_Context](1).\nInsecure SSL/TLS protocol version SSLv3 allowed by [call to SSL_Context](1).\nInsecure SSL/TLS protocol version TLSv1 allowed by [call to SSL_Context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to SSL_Context](1)."
] | [
39
] | [
null
] | [
26
] | [
29
] | |
2024-11-18T22:26:24.846737+00:00 | 1,572,049,430,000 | a15b9a7ada71ce532b3eceb9d7ca8bab8268e455 | 3 | {
"blob_id": "a15b9a7ada71ce532b3eceb9d7ca8bab8268e455",
"branch_name": "refs/heads/master",
"committer_date": 1572049430000,
"content_id": "e7d852e55f91ea54eb7afe5568b388e71d4184d9",
"detected_licenses": [
"Unlicense"
],
"directory_id": "05e8491dd76c0c2df09beb0bc83feb9eead37bad",
"extension": "py",... | 2.75 | stackv2 | from http.server import BaseHTTPRequestHandler
import urllib.request
import urllib.parse
from typing import Any, List
class MutatorHandler(BaseHTTPRequestHandler):
def __init__(
self,
target_url: str,
mutators: List[Any],
*args: Any, **kwargs: Any
) -> None:
self.target... | 44 | 29.14 | 63 | 15 | 289 | python | [{"finding_id": "codeql_py/full-ssrf_d99cc8b1b1a50642_4d227297", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
25
] | [
null
] | [
20
] | [
47
] | |
2024-11-18T20:39:41.003484+00:00 | 1,634,301,668,000 | 69d90ca011f029b09b56d01de45d8a028ba849d8 | 2 | {
"blob_id": "69d90ca011f029b09b56d01de45d8a028ba849d8",
"branch_name": "refs/heads/master",
"committer_date": 1634301668000,
"content_id": "2ed6dce8c4bb2681005cc34685fb619b9018922d",
"detected_licenses": [
"MIT"
],
"directory_id": "94a1a22916e43b0a6dcbff8e113a8633de3e4b8c",
"extension": "py",
"fi... | 2.453125 | stackv2 | '''
May 2020 by Sebastiano Barbieri
s.barbieri@unsw.edu.au
https://www.github.com/sebbarb/
'''
import sys
sys.path.append('../lib/')
import feather
import pandas as pd
import numpy as np
import pickle as pkl
from hyperparameters import Hyperparameters
from sklearn.model_selection import train_test_split
from deep_sur... | 116 | 41.64 | 146 | 15 | 1,265 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e1a21f101ca6013d_83bcc4a2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
29
] | [
null
] | [
15
] | [
45
] | |
2024-11-18T21:08:16.374502+00:00 | 1,508,157,103,000 | 997b65fee0d31b171bedebac07af6227493823a5 | 3 | {
"blob_id": "997b65fee0d31b171bedebac07af6227493823a5",
"branch_name": "refs/heads/master",
"committer_date": 1508157103000,
"content_id": "c210d8384b8f20ac8b37598c282f8988b1aa108a",
"detected_licenses": [
"MIT"
],
"directory_id": "3edef1c14c878e927a2c82af9e2e346a6c8d0b6b",
"extension": "py",
"fi... | 3.015625 | stackv2 | """module for a emoji based tokenizer"""
import re
from typing import Iterable, Optional, Any, Dict
import numpy as np
from sklearn.base import TransformerMixin
from . import output, TOutputType, TOutput
class EmojiTransformer(TransformerMixin):
# match signatures, pylint: disable=unused-argument
"""extrac... | 52 | 36.17 | 120 | 12 | 485 | python | [{"finding_id": "codeql_py/overly-large-range_4b5bffdd6bf2f4c7_e58b776a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class."
] | [
16,
16,
16
] | [
null,
null,
null
] | [
34,
37,
40
] | [
38,
41,
44
] | |
2024-11-18T21:32:10.493269+00:00 | 1,603,463,951,000 | 6ff4aff5811d2bd7ad150d7e8f925308d120ef74 | 2 | {
"blob_id": "6ff4aff5811d2bd7ad150d7e8f925308d120ef74",
"branch_name": "refs/heads/main",
"committer_date": 1603463951000,
"content_id": "d23c2f3ae66ba2377788338e9eb511b691edbcc9",
"detected_licenses": [
"MIT"
],
"directory_id": "5b6a70756f15b11cf7b5a2180e63fe15f3cad54d",
"extension": "py",
"file... | 2.359375 | stackv2 | # Imports
import os
from flask import Flask, redirect, render_template, url_for, request, flash
from flask_login import LoginManager, login_user, logout_user, login_required, current_user
# Import - Database
from flask_sqlalchemy import SQLAlchemy
# Import - Models
from werkzeug.security import generate_password_hash... | 279 | 30.01 | 141 | 18 | 1,905 | python | [{"finding_id": "codeql_py/url-redirection_d1584ff13a24b27d_66b9ee3d", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
264
] | [
null
] | [
29
] | [
33
] | |
2024-11-18T21:32:20.207546+00:00 | 1,609,431,810,000 | 850d895b67b9a3db91537499250633593512e2a5 | 3 | {
"blob_id": "850d895b67b9a3db91537499250633593512e2a5",
"branch_name": "refs/heads/main",
"committer_date": 1609431810000,
"content_id": "368118c5eae8c7fa75d1339b7ad1f4760eb25f19",
"detected_licenses": [
"MIT"
],
"directory_id": "e25866922e6d6b417b6d919aa23e1b817dc22bb9",
"extension": "py",
"file... | 2.765625 | stackv2 | #!/usr/bin/env python
import socket,sys,re
if len(sys.argv) != 3:
print("How to Use: python bruteftp.py 127.0.0.1 username")
sys.exit(1)
target = sys.argv[1]
username = str(sys.argv[2]).strip()
f = open('wordlists.txt')
for password in f.readlines():
print("Starting the Brute Force Attack: {}|{}".format(usern... | 32 | 23.62 | 75 | 11 | 241 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3ecce75dab6a5f9c_9dbec234", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
14,
29
] | [
null,
null
] | [
9,
11
] | [
75,
44
] | |
2024-11-18T21:32:24.564986+00:00 | 1,545,029,980,000 | f234766ad54ca093239563d8406c4878c67eeb6d | 3 | {
"blob_id": "f234766ad54ca093239563d8406c4878c67eeb6d",
"branch_name": "refs/heads/master",
"committer_date": 1545031146000,
"content_id": "cef1c4fc5bc196c081ef903d52312b01fffab4ac",
"detected_licenses": [
"MIT"
],
"directory_id": "7a26bc073d2eacd158f97e7cb6d804d35346f805",
"extension": "py",
"fi... | 2.671875 | stackv2 | #!/usr/bin/env python3
import requests
import urllib3
from requests.exceptions import ConnectionError, ConnectTimeout, ReadTimeout
from gevent.pool import Pool
from gevent import monkey
from jackal import Credential, Logger, ServiceSearch
from jackal.utils import print_error, print_notification, print_success
from Open... | 70 | 32.34 | 140 | 15 | 501 | python | [{"finding_id": "codeql_py/request-without-cert-validation_0c8b7f180fd6c320_7252ac9e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
35
] | [
null
] | [
22
] | [
115
] | |
2024-11-18T21:32:44.291472+00:00 | 1,469,741,298,000 | 901d5fb4032d407c73bc313367376de52d946438 | 3 | {
"blob_id": "901d5fb4032d407c73bc313367376de52d946438",
"branch_name": "refs/heads/master",
"committer_date": 1469741298000,
"content_id": "b508326154cc64d34c6e62deab79839bbfe775cb",
"detected_licenses": [
"MIT"
],
"directory_id": "d30df79b21ad1897f2da7af997897733110bafb0",
"extension": "py",
"fi... | 3.171875 | stackv2 | import smtplib # as you can see -_- declaring the SMTP Library
smtpserver = smtplib.SMTP("smtp.gmail.com", 587) #SMTP Server Configs Just Follow the instructions of README.md for more informations
smtpserver.ehlo()
smtpserver.starttls()
user = input("Enter the target's email address: ")
passwfile = input("Enter the ... | 19 | 45.05 | 170 | 12 | 212 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e18f9dae780b9024_6153c6c1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
15,
19
] | [
null,
null
] | [
15,
15
] | [
50,
54
] | |
2024-11-18T21:33:08.539804+00:00 | 1,604,775,741,000 | 22a6650483bb1f37e6cc5f7d67128f7a2560a74f | 2 | {
"blob_id": "22a6650483bb1f37e6cc5f7d67128f7a2560a74f",
"branch_name": "refs/heads/main",
"committer_date": 1604775741000,
"content_id": "a79cdc0e1ee70959d5f3ba8a2a6d692525110064",
"detected_licenses": [
"MIT"
],
"directory_id": "04ed7a81c0188e1f4a6de34003a4cc7583edf9b4",
"extension": "py",
"file... | 2.328125 | stackv2 | import urllib3
import logging
import json
from decouple import config
import decouple
import sys
import time
# TODO: SSDP instead of polling outside for the hue bridge ip
logging.captureWarnings(True)
http = urllib3.PoolManager(cert_reqs='CERT_NONE', assert_hostname=False)
def hue_request_username(bridge_ip, ident... | 226 | 30.11 | 123 | 17 | 1,827 | python | [{"finding_id": "codeql_py/request-without-cert-validation_04f0965e784c3368_2a08ef42", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 10 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"... | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).\nThis request may run without certificate validation because [it is disabled](2).",
"This request may run without certificate validation because [it is disabled](1).\nThis request may run without certificate validation because [it i... | [
21,
42,
51,
79,
88,
96,
101,
110,
118,
142
] | [
25,
null,
53,
80,
91,
97,
104,
111,
121,
145
] | [
9,
9,
9,
9,
13,
9,
9,
9,
17,
17
] | [
54,
47,
28,
20,
58,
20,
54,
20,
62,
62
] | |
2024-11-18T21:49:22.970082+00:00 | 1,624,018,682,000 | 505b99c711e0f8f0c3a884c7e92226ae4c297f95 | 3 | {
"blob_id": "505b99c711e0f8f0c3a884c7e92226ae4c297f95",
"branch_name": "refs/heads/main",
"committer_date": 1624018682000,
"content_id": "36ed16d78599d587a90a37b61237c0e9160bd183",
"detected_licenses": [
"MIT"
],
"directory_id": "315d2088fb2e1540cc14d749ba633f4b7fe82e9e",
"extension": "py",
"file... | 3.078125 | stackv2 | import utils
from site_parser import Parser
from utils_objects import Thread, Site
import requests
from bs4 import BeautifulSoup
from question import *
from answer import *
class SOFParser(Parser):
site = Site.SOF
site_url = site.value.url
def parse_links(self, links) -> Thread:
"""
A gen... | 94 | 35.12 | 100 | 17 | 699 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fdb4a141b41dc47b_4f4d3fe0", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [stackoverflow.com](1) may be at an arbitrary position ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [stackoverflow.com](1) may be at an arbitrary position in the sanitized URL."
] | [
47
] | [
null
] | [
16
] | [
43
] | |
2024-11-18T20:31:24.536253+00:00 | 1,693,816,756,000 | d27dd578c6dece9f1b68a5f5b7503670d743e2a0 | 3 | {
"blob_id": "d27dd578c6dece9f1b68a5f5b7503670d743e2a0",
"branch_name": "refs/heads/master",
"committer_date": 1693816756000,
"content_id": "2e99c46eaed5dec7d4f737bb4e1bb9a5578dd856",
"detected_licenses": [
"MIT"
],
"directory_id": "a9f63a0746de04b87979107995c94ef46d054f5b",
"extension": "py",
"fi... | 2.578125 | stackv2 | """Family members' roles with respect to the proband."""
import logging
from collections import defaultdict
from dae.variants.attributes import Role, Status, Sex
from dae.pedigrees.family import Person
logger = logging.getLogger(__name__)
class Mating:
"""Class to represent a mating unit."""
def __init_... | 262 | 38.47 | 78 | 17 | 2,257 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_414e0289d36e694e_23760e98", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
73
] | [
null
] | [
42
] | [
46
] | |
2024-11-18T20:31:24.865768+00:00 | 1,572,507,736,000 | 691f40daabf882e48912580e50812b1c1ef21990 | 3 | {
"blob_id": "691f40daabf882e48912580e50812b1c1ef21990",
"branch_name": "refs/heads/master",
"committer_date": 1572507736000,
"content_id": "2905eda31be8d4bef0bc4173698c7529666d0938",
"detected_licenses": [
"MIT"
],
"directory_id": "d62a8e38a5208ccfc7c902766c7c5f3637f153d7",
"extension": "py",
"fi... | 2.640625 | stackv2 | from flask import Blueprint, request, jsonify, render_template
from file_processing import read_file
lesson_6 = Blueprint('lesson_6', __name__)
@lesson_6.route('/get_file_content_based_on_request')
def get_file_content_based_on_request():
request_type = request.content_type
f = read_file()
if (request_type == ... | 21 | 27.9 | 62 | 12 | 146 | python | [{"finding_id": "codeql_py/reflective-xss_a00f5760ee3c3ad6_46c53f20", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
21
] | [
null
] | [
12
] | [
61
] | |
2024-11-18T20:31:25.934295+00:00 | 1,488,282,147,000 | 4c0a2d7edbbbcf6501403487cd09d39b3906f25d | 2 | {
"blob_id": "4c0a2d7edbbbcf6501403487cd09d39b3906f25d",
"branch_name": "refs/heads/master",
"committer_date": 1488282147000,
"content_id": "4e6a626e9fd8b011dccccd24eb937a6aaea5b80d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a7fda7aabaf63cbfb766b05716970cf8bcdc0163",
"extension": "py"... | 2.40625 | stackv2 | # -*- coding: utf-8 -*-
"""Devoted to services which use web hooks. Plugins are identified via the
path being hit, which then delegates to the plugin to process.
"""
from flask import Flask
from flask import request
import threading
import logging as log
app = Flask("NebHookServer")
class NebHookServer(threading.Th... | 58 | 29.45 | 80 | 14 | 394 | python | [{"finding_id": "codeql_py/log-injection_2fd2f72f4363276a_e8d2e450", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
32
] | [
null
] | [
28
] | [
47
] | |
2024-11-18T20:53:29.745668+00:00 | 1,576,828,376,000 | 737b292f45388e1b276f861d13d8a40b5a3cd01b | 2 | {
"blob_id": "737b292f45388e1b276f861d13d8a40b5a3cd01b",
"branch_name": "refs/heads/master",
"committer_date": 1576828376000,
"content_id": "665a137e4857d3cdedd3ef756b216e621c9439e8",
"detected_licenses": [
"MIT"
],
"directory_id": "cf7a1a32ed20d6877317fb39d8b2590a7788cff2",
"extension": "py",
"fi... | 2.46875 | stackv2 | # Copyright 2015, Gil Levi and Tal Hassner
#
# The SOFTWARE provided in this page is provided "as is", without any guarantee made as to its suitability or fitness for any particular use.
# It may contain bugs, so use of this tool is at your own risk. We take no responsibility for any damage of any sort that may uninte... | 188 | 39.03 | 141 | 19 | 1,892 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_57e7da83303eb9e2_697fc09f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text."
] | [
108,
170
] | [
null,
null
] | [
35,
31
] | [
36,
32
] | |
2024-11-18T21:10:00.411236+00:00 | 1,534,921,701,000 | f28f0993d7b84fec80b05c82a2b184a95bb82164 | 2 | {
"blob_id": "f28f0993d7b84fec80b05c82a2b184a95bb82164",
"branch_name": "refs/heads/master",
"committer_date": 1534921701000,
"content_id": "3aeed79e426398526b697915e1abb8c812d8d3ee",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e042cdc2b30b3539a66aecede8ead2e63539ad2d",
"extension": "py"... | 2.34375 | stackv2 | import argparse
import socket
import time
import re
from . import utils
PORT = 27431
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
s.setsockopt(socket.SOL_SOCKET, socket.SO_BROADCAST, 1)
s.settimeout(3)
device_list = {}
class KonekeDevice(object):
def __init__(self, ip, mac, password, device):
... | 220 | 25.79 | 95 | 17 | 1,463 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4cdc56534f668700_6404053e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
173
] | [
null
] | [
11
] | [
68
] | |
2024-11-18T21:46:34.479879+00:00 | 1,630,511,447,000 | 73f59d5d63bd715b35961d107dd413631fe28f8b | 2 | {
"blob_id": "73f59d5d63bd715b35961d107dd413631fe28f8b",
"branch_name": "refs/heads/main",
"committer_date": 1630511447000,
"content_id": "dd371f68923bd9ecf8477970d190625f0225b0cd",
"detected_licenses": [
"MIT"
],
"directory_id": "a55d3e20f3f0b28a77b8dd7fa3d239ec211dbc76",
"extension": "py",
"file... | 2.34375 | stackv2 | # /usr/bin/python3
from selenium.webdriver.support import expected_conditions as EC
from selenium.webdriver.common.by import By
from selenium.webdriver.support.wait import WebDriverWait
from selenium.common.exceptions import NoSuchElementException
from selenium import webdriver
import time
import random
import string
f... | 164 | 49.98 | 178 | 17 | 1,948 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6a073a5cd58fb438_1dc6c4d7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
150,
67
] | [
null,
null
] | [
30,
24
] | [
64,
67
] | |
2024-11-18T22:28:47.682387+00:00 | 1,610,384,751,000 | 35124d0a6cfc847fe9b8c0790f9c67a66626df1a | 3 | {
"blob_id": "35124d0a6cfc847fe9b8c0790f9c67a66626df1a",
"branch_name": "refs/heads/main",
"committer_date": 1610384751000,
"content_id": "98a5fdff6acd9abf9ef1a0074d9c786c8d73a136",
"detected_licenses": [
"MIT"
],
"directory_id": "abdcbfb69594c40e5e5c5ccb8667f2a49125ee53",
"extension": "py",
"file... | 2.875 | stackv2 | import smtplib, ssl
import json
import pandas as pd
def sendEmail(receiver_email):
sender_email = "socialeyalerts@gmail.com"
message = """\
Subject: Hi there
This message is sent from Python."""
from email.mime.text import MIMEText
from email.mime.multipart import MIMEMultipart
message ... | 93 | 25.14 | 74 | 12 | 597 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_534d7cb1e3ec3ff5_99e0959d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
81
] | [
null
] | [
19
] | [
60
] | |
2024-11-18T22:29:19.207485+00:00 | 1,445,880,322,000 | fc2e46a0105c062f077c85653c9273bba1bf3d52 | 2 | {
"blob_id": "fc2e46a0105c062f077c85653c9273bba1bf3d52",
"branch_name": "refs/heads/master",
"committer_date": 1445880365000,
"content_id": "a6abc720b41b29e53599d91260b0e4a468d2d2fb",
"detected_licenses": [
"MIT"
],
"directory_id": "c43f202dcbf35e37177916bfcc82ab047078be9c",
"extension": "py",
"fi... | 2.390625 | stackv2 | import jinja2
from .config import blog_config as config
from .constants import * # noqa
template_loader = jinja2.PackageLoader(
APPLICATION_NAME,
TEMPLATE_DIR)
if config.TEMPLATE_DIR is not None:
template_loader = jinja2.ChoiceLoader([
jinja2.FileSystemLoader(config.TEMPLATE_DIR),
templ... | 25 | 24.76 | 54 | 12 | 141 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a8ae86c32b79e7b8_3fac145c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
15
] | [
null
] | [
7
] | [
49
] | |
2024-11-18T22:29:32.071366+00:00 | 1,406,178,961,000 | 04991b1513710fa3a610d7b70f1f5f866536519b | 3 | {
"blob_id": "04991b1513710fa3a610d7b70f1f5f866536519b",
"branch_name": "refs/heads/master",
"committer_date": 1406178961000,
"content_id": "2979bc7b09d5d9be7863bc04be3ad78927865a15",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7b3c3e42617cb7458f37d31684abb1e924b84430",
"extension": "py"... | 2.546875 | stackv2 | #!/usr/bin/env python
#
# Generate method and test skeletons from Redis command documentation.
from __future__ import print_function
import argparse
import json
import sys
import jinja2
GROUPS = [
'connection',
'generic',
'hash',
'hyperloglog',
'list',
'pubsub',
'scripting',
'server'... | 85 | 24.61 | 138 | 14 | 525 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4c9b051023a07ead_f3d48a7b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
73
] | [
null
] | [
16
] | [
53
] | |
2024-11-18T22:29:37.542884+00:00 | 1,577,998,348,000 | 5bd0cbaa936dfa42ed60adf98ca09a0f16021563 | 3 | {
"blob_id": "5bd0cbaa936dfa42ed60adf98ca09a0f16021563",
"branch_name": "refs/heads/master",
"committer_date": 1577998348000,
"content_id": "ec3dc28530fe4924d20c0daed2348023f8fb6f20",
"detected_licenses": [
"MIT"
],
"directory_id": "e880c6cef9d64071d73be8bd38c1daee71c4c62a",
"extension": "py",
"fi... | 2.734375 | stackv2 | # _*_ coding: utf-8 _*_
from flask import Flask, request
import json
import requests
app = Flask(__name__)
@app.route('/')
def root():
return 'welcome to flask'
@app.route('/handle_post', methods=['POST'])
def handle_post():
params = json.loads(request.get_data(), encoding='utf-8')
if len(params) == 0:... | 39 | 20.05 | 85 | 12 | 226 | python | [{"finding_id": "codeql_py/reflective-xss_57e2e15abb413433_b3283804", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
23
] | [
null
] | [
12
] | [
22
] | |
2024-11-18T22:29:40.646441+00:00 | 1,650,667,996,000 | 25d3dee84d679005e3064c3b21deeb67d60d3c76 | 3 | {
"blob_id": "25d3dee84d679005e3064c3b21deeb67d60d3c76",
"branch_name": "refs/heads/master",
"committer_date": 1650667996000,
"content_id": "aa8efcf0f3bfbdb891c71b7806a0093d556659a6",
"detected_licenses": [
"MIT"
],
"directory_id": "442fd46c2647d4988d409563d50a841fc1cdf259",
"extension": "py",
"fi... | 2.75 | stackv2 | #!/usr/bin/env python
import csv
import json
import logging
import os
from collections import defaultdict
from html.parser import HTMLParser
from pathlib import Path
from typing import DefaultDict, Dict, List, Optional, Sequence, Tuple
import click
from jinja2 import Template
class HTMLCounter(HTMLParser):
def _... | 125 | 29.46 | 91 | 20 | 884 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e48620240569283c_936ac9be", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
27
] | [
null
] | [
16
] | [
43
] | |
2024-11-18T22:40:27.380598+00:00 | 1,519,319,016,000 | 63e58c77c9dad71118a1adc208d0040def8c04c8 | 3 | {
"blob_id": "63e58c77c9dad71118a1adc208d0040def8c04c8",
"branch_name": "refs/heads/master",
"committer_date": 1519319016000,
"content_id": "9d05cd21aacc7f8bda1b4d56e68ecc8ffb049394",
"detected_licenses": [
"MIT"
],
"directory_id": "d73b114c49d8b6d1e5044d5643cc0ef9777638a7",
"extension": "py",
"fi... | 3.453125 | stackv2 | """Generate a weather-report based on the user's location.
The script uses GeoIP to determine the user's location based on the IP and
retrieves the weather, which is then returned it in a english sentence.
"""
# Native libraries/modules
import json
import sys
import requests
# External libraries/modules
from user_lo... | 162 | 33.59 | 94 | 16 | 1,341 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ff89e62b56f65618_2109d96b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
162
] | [
null
] | [
15
] | [
43
] | |
2024-11-18T22:40:34.132025+00:00 | 1,482,084,640,000 | 4400e8edc5c4829b186f58e40542a4165d9caff5 | 3 | {
"blob_id": "4400e8edc5c4829b186f58e40542a4165d9caff5",
"branch_name": "refs/heads/master",
"committer_date": 1482084640000,
"content_id": "c91124d39f62aff2ae7a5cadf45a7129db657d16",
"detected_licenses": [
"MIT"
],
"directory_id": "57008b78058872d56cf9a984c36fdf7b4ed81646",
"extension": "py",
"fi... | 3.15625 | stackv2 | class UserAccount:
def __init__(self , user_name , user_password , user_secret):
self.name=user_name
self.password=user_password
self.secret=user_secret
def print_my_name(self):
print(self.name)
def forgot_password(self, secret_try):
if self.secret == secret_try:
... | 24 | 25.75 | 74 | 13 | 156 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f40d851400ac2927_d2f97311", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
21
] | [
null
] | [
7
] | [
53
] | |
2024-11-18T22:40:36.599652+00:00 | 1,493,218,609,000 | 117398653012ff42a799209d25197120f9ca8e0c | 2 | {
"blob_id": "117398653012ff42a799209d25197120f9ca8e0c",
"branch_name": "refs/heads/master",
"committer_date": 1493218609000,
"content_id": "105ebca2124b4d8e25d720328aa2a0e9be7b3d5f",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "7e53b38e8f969c9f7898feb59088665f9dfa6b76",
"extension": "p... | 2.421875 | stackv2 | import jinja2
import os
import imp
import requests
import time
from .logger import Logger
from .config import Config
from .discovery import Discovery
from .store import Store
__all__ = ['Apps']
class Apps:
""" Public Apps object
==================================================
format app config:
... | 191 | 35.04 | 108 | 26 | 1,457 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_28057e7ffd624ddf_4f23beb0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
88
] | [
null
] | [
28
] | [
49
] | |
2024-11-18T22:41:23.125569+00:00 | 1,597,007,165,000 | 91838efaac0c230a9c9c3bdab97875f7d3368b9e | 2 | {
"blob_id": "91838efaac0c230a9c9c3bdab97875f7d3368b9e",
"branch_name": "refs/heads/master",
"committer_date": 1597007165000,
"content_id": "4abf3e5b4afdc74c55ba2a6c8e67e68850f1bc96",
"detected_licenses": [
"MIT"
],
"directory_id": "f097648f708e8d37580120fcfbf53fc37c7dd89e",
"extension": "py",
"fi... | 2.375 | stackv2 |
import requests
import requests_cache
from flask import Flask
from flask import request
from flask import Response
from flask import abort
import dateparser
from urllib.parse import urlparse
from urllib.parse import quote_plus
import re
from feedgen.feed import FeedGenerator
from lxml.html import fromstring
import jso... | 142 | 27.95 | 105 | 19 | 1,010 | python | [{"finding_id": "codeql_py/flask-debug_21537606d5d2dca7_499f6534", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](1)."
] | [
142,
56
] | [
null,
58
] | [
5,
12
] | [
51,
7
] | |
2024-11-18T22:54:14.621782+00:00 | 1,500,297,463,000 | ae7883e946cdaf251a4f72e3001ca3d9f5973b2d | 2 | {
"blob_id": "ae7883e946cdaf251a4f72e3001ca3d9f5973b2d",
"branch_name": "refs/heads/master",
"committer_date": 1500297463000,
"content_id": "9d50055b7a73579e5cfca3c4dbf5fb9319d327b8",
"detected_licenses": [
"MIT"
],
"directory_id": "739d589e7de18f10b688592ac5edb30ac5f30d13",
"extension": "py",
"fi... | 2.40625 | stackv2 | """UserResourceCleanupFunction
Clears out user-specific resources on stack deletion.
"""
from __future__ import print_function
import json
import boto3
import botocore
import cfnresponse
cognito_identity_client = boto3.client("cognito-identity")
cognito_sync_client = boto3.client("cognito-sync")
apig_client = boto... | 95 | 33.31 | 87 | 20 | 592 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bba06ec3959f4a31_614106f7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
50
] | [
53
] | [
27
] | [
22
] | |
2024-11-18T22:54:21.891179+00:00 | 1,559,133,183,000 | 96c950aaba515e1126e6d7ddebf202a82b8e3f2e | 3 | {
"blob_id": "96c950aaba515e1126e6d7ddebf202a82b8e3f2e",
"branch_name": "refs/heads/master",
"committer_date": 1559133183000,
"content_id": "aa1dc22b9e53e7acabb59fe0f6be71824ddbde94",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "fc2045fe1946af373b2ca8ae9d4fd6528a49e2c1",
"extension": "p... | 2.828125 | stackv2 | # -*- coding: utf-8 -*-
import rsa
import logging
logger = logging.getLogger(__file__)
class RSAKey:
def __init__(self, key = None, size = 1024, tuple = None):
if key:
self.key = key
elif tuple:
e, n = tuple
self.key = rsa.PublicKey(n, e)
else:
... | 43 | 27.88 | 68 | 14 | 333 | python | [{"finding_id": "codeql_py/weak-crypto-key_880d83371ab41a18_6b7e509b", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
15
] | [
null
] | [
27
] | [
44
] | |
2024-11-18T22:54:29.389940+00:00 | 1,604,871,632,000 | 2e681f9ed6fc9c05206f5143500b3ecb609918dc | 3 | {
"blob_id": "2e681f9ed6fc9c05206f5143500b3ecb609918dc",
"branch_name": "refs/heads/master",
"committer_date": 1604871712000,
"content_id": "924fcea4028560b2cf0cfc02268c365b2d365b62",
"detected_licenses": [
"MIT"
],
"directory_id": "79034d579810e658feab753517cd28d948257f01",
"extension": "py",
"fi... | 2.734375 | stackv2 |
from app import app
from data.names import names
from flask import json, jsonify, redirect, render_template, request
from scripts.levenshtein import levenshtein3
import urllib2
@app.route('/<myname>')
@app.route('/<myname>/')
def myname(myname):
for rd in names:
rd['l2'] = levenshtein3(myname.lower(),rd... | 35 | 21.94 | 70 | 15 | 204 | python | [{"finding_id": "codeql_py/url-redirection_b29d638f9e46cd40_6c5e1071", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
30
] | [
null
] | [
21
] | [
34
] | |
2024-11-18T20:54:59.737908+00:00 | 1,604,282,519,000 | 4fa80cc32e6120ae49806d3eb0c7bfca2d3f09c2 | 3 | {
"blob_id": "4fa80cc32e6120ae49806d3eb0c7bfca2d3f09c2",
"branch_name": "refs/heads/master",
"committer_date": 1604282519000,
"content_id": "c5f338f5e193e2fc955d0613202f27b5f0de8ff3",
"detected_licenses": [
"MIT"
],
"directory_id": "55f2a837a7a75d25d6af14106616e6107d67703b",
"extension": "py",
"fi... | 3.375 | stackv2 | import datetime
current_date = datetime.date.today().strftime('%Y-%m-%d')
current_date_lst = current_date.split('-')
bday_log = [
('Ayushi', ('1999', '10', '19')),
('Yash', ('1999', '04', '21')),
]
add = input('To add birthday type y:').strip().lower()
if add[:1] == 'y':
new = input('Add birthday in format yy... | 28 | 34.57 | 137 | 13 | 334 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_23b4a6a324404214_edc883d0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
27
] | [
null
] | [
14
] | [
69
] | |
2024-11-18T20:55:12.179142+00:00 | 1,592,342,133,000 | 1b9ad962ca4e038c22a2952780cb74c69076c9e7 | 3 | {
"blob_id": "1b9ad962ca4e038c22a2952780cb74c69076c9e7",
"branch_name": "refs/heads/master",
"committer_date": 1592342133000,
"content_id": "4b4a0f44dade64264db1285832c977ebce222120",
"detected_licenses": [
"MIT"
],
"directory_id": "72741d1098f77932e4988328cb27969cae1e0e54",
"extension": "py",
"fi... | 2.671875 | stackv2 | import re
import logging
from bs4 import BeautifulSoup
jednostka_re = re.compile(
"^https://www.szukajwarchiwach.gov.pl/jednostka/-/jednostka/\d+"
)
site_re = re.compile("^https://www.szukajwarchiwach.gov.pl/")
class Depaginator:
def __init__(self, session):
self.s = session
def _next_page_url(se... | 93 | 31.23 | 87 | 15 | 741 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_0a7cc9199195a8b3_85690946", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'szukajwarchiwach.gov', so it might ... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'szukajwarchiwach.gov', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'szukajwarchiwach.gov', so it might match more hosts than expected."
] | [
6,
8
] | [
null,
null
] | [
6,
23
] | [
68,
60
] | |
2024-11-18T21:07:43.428784+00:00 | 1,681,205,860,000 | bd6c0a6425bde14aca77182bc506f7c42c289075 | 3 | {
"blob_id": "bd6c0a6425bde14aca77182bc506f7c42c289075",
"branch_name": "refs/heads/master",
"committer_date": 1681205860000,
"content_id": "98844becc3c677e3ceb8274702667f395be71a95",
"detected_licenses": [
"MIT"
],
"directory_id": "674caa0d07acfa73a49a8762ca48eccef22e68d8",
"extension": "py",
"fi... | 2.75 | stackv2 | #!/usr/bin/env python3
"""
Take a polyglot from mitra,
generate a OFB ciphertext which decrypts correctly under two different algorithms with the same key.
iv = dec(c0 ^ p0)
"""
import binascii
import os
import argparse
import re
from Crypto.Cipher import AES
from Crypto.Cipher import Blowfish as OtherAlgo
from Cryp... | 139 | 23.1 | 112 | 16 | 1,132 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_720c77a5e9945db0_bfd273fe", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
54,
64
] | [
null,
null
] | [
14,
14
] | [
38,
40
] | |
2024-11-18T21:33:18.727628+00:00 | 1,627,296,235,000 | 5796d7e4bc203b6eac55b8907ad2be94ed9025b4 | 2 | {
"blob_id": "5796d7e4bc203b6eac55b8907ad2be94ed9025b4",
"branch_name": "refs/heads/master",
"committer_date": 1627296235000,
"content_id": "e54610595bdba4e3575e915650f22a2adfbc1c18",
"detected_licenses": [
"MIT"
],
"directory_id": "1be296a1aebdd38434157296510827a31643ae3f",
"extension": "py",
"fi... | 2.34375 | stackv2 | # %%
import torch
import flask
from flask import Flask, request, render_template
import json
from rank_models import tfidf, bm25_model
import util
import numpy as np
import Electra.electra_base as electra
from flask_ngrok import run_with_ngrok
app = Flask(__name__)
run_with_ngrok(app)
@app.route('/')
def index():
... | 52 | 34.13 | 173 | 18 | 432 | python | [{"finding_id": "codeql_py/stack-trace-exposure_a1cfbac916afcdc2_2ce5e443", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
48
] | [
null
] | [
44
] | [
59
] | |
2024-11-18T21:33:24.870614+00:00 | 1,568,279,093,000 | 05944a6bce05ef93b25744f4c84cf7b1a2bd61f6 | 3 | {
"blob_id": "05944a6bce05ef93b25744f4c84cf7b1a2bd61f6",
"branch_name": "refs/heads/master",
"committer_date": 1568279093000,
"content_id": "7bbed77dce7673b1773b71ebde509934ff8ecd40",
"detected_licenses": [
"MIT"
],
"directory_id": "8c684fa3053829baa9c8520e4342c0eddd27551d",
"extension": "py",
"fi... | 3.015625 | stackv2 | import enum
import logging
import re
import random
import time
import requests
from datetime import date, datetime, timedelta
from pathlib import Path
logging.basicConfig(level=logging.INFO)
class Station(enum.Enum):
LONDON = 7015400
PARIS = 8727100
BRUXELLES = 8814001
AMSTERDAM = 8400058
def find_a... | 86 | 34.01 | 107 | 13 | 810 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_79a126e8147c37cb_6910fd0a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
78,
33
] | [
null,
null
] | [
28,
18
] | [
40,
59
] | |
2024-11-18T21:55:39.494506+00:00 | 1,462,425,195,000 | 75bedc7997708a36c70e84e5bf88e1fa878e4a3d | 2 | {
"blob_id": "75bedc7997708a36c70e84e5bf88e1fa878e4a3d",
"branch_name": "refs/heads/master",
"committer_date": 1462425195000,
"content_id": "5b1e0acf9f311a920c1afbe939d7a83e1038905d",
"detected_licenses": [
"MIT"
],
"directory_id": "91495be7c53be1bccb7e25d13425c345316583b6",
"extension": "py",
"fi... | 2.390625 | stackv2 | from __future__ import absolute_import
# encoding: UTF-8
import os
import time
from .api.client import Client
from .cache import CachedClient
from .config import CONFIG
from .utils import pj, rel, rm_symlink, untar, chdir, ts
from .logger import get_logger
from .application import Application
from .language import Lang... | 82 | 39.51 | 118 | 16 | 788 | python | [{"finding_id": "codeql_py/overly-permissive-file_2045c43355470a29_07694b91", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
30
] | [
null
] | [
5
] | [
30
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.