added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T19:02:45.134896+00:00 | 1,575,558,429,000 | 4b312e6c6e9ec5eac437a3035145fb2b22dbe08b | 3 | {
"blob_id": "4b312e6c6e9ec5eac437a3035145fb2b22dbe08b",
"branch_name": "refs/heads/master",
"committer_date": 1575558429000,
"content_id": "852fcbc2e47a0809c98a7da74148bf5fb8e76335",
"detected_licenses": [
"MIT"
],
"directory_id": "d22c4fd032dc2b0d38270f67aeab0bfb69cb1c28",
"extension": "py",
"fi... | 2.515625 | stackv2 | from controller import Worker
import os
import time
import torch
import sys
import cv2
import pickle
import warnings
from PIL import Image
from torchvision import transforms
from seer_model import EncoderCNN, DecoderRNN
from multiprocessing import Pool
sys.path.append('utils')
import my_pytube
class Job:
"Model ... | 352 | 37.13 | 114 | 19 | 2,911 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_aeeee1ad11f749b4_9a88cc12", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com](1) may be at an arbitrary position in the... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [youtube.com](1) may be at an arbitrary position in the sanitized URL."
] | [
50
] | [
null
] | [
12
] | [
39
] | |
2024-11-18T19:02:48.602115+00:00 | 1,527,556,401,000 | 0cbf5833932cb5c28389922a9b00e7019aefe1cf | 3 | {
"blob_id": "0cbf5833932cb5c28389922a9b00e7019aefe1cf",
"branch_name": "refs/heads/master",
"committer_date": 1527556401000,
"content_id": "707124655b60050b5759ac079ffc269e0cdae533",
"detected_licenses": [
"MIT"
],
"directory_id": "36050bf30d362e620e700dff2903c2a266cb3dce",
"extension": "py",
"fi... | 3 | stackv2 | # -*- coding: utf-8 -*-
from xgoogle.search import GoogleSearch
import time
import random
import re
DEFAULT_SEARCH_AMOUNT = 30
class GoogleSearchKeyword(GoogleSearch):
def get_keywords(self):
keywords = {}
self.results_per_page = DEFAULT_SEARCH_AMOUNT
soup = self._search_and_get_soup()
... | 58 | 34.14 | 94 | 23 | 493 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_3df1658bcdb7d614_155ae2ab", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'yahoo.com', so it might match more ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'yahoo.com', so it might match more hosts than expected."
] | [
35
] | [
null
] | [
45
] | [
76
] | |
2024-11-18T19:03:03.784436+00:00 | 1,632,313,948,000 | 4b31c93bf07d544878c9f603296b4a54632fc306 | 2 | {
"blob_id": "4b31c93bf07d544878c9f603296b4a54632fc306",
"branch_name": "refs/heads/main",
"committer_date": 1632313948000,
"content_id": "493d543310ab4cedd3e6e64e923c4d6fc648139c",
"detected_licenses": [
"MIT"
],
"directory_id": "83177e497c2fe7ceb16768e3d03e15b7b042969c",
"extension": "py",
"file... | 2.484375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
Basic Dahua RPC wrapper.
Forked from https://gist.github.com/48072a72be3a169bc43549e676713201.git
Added ANPR Plate Number extraction by Naveen Sakthivel <https://github.com/naveenrobo>
Example:
from dahua_rpc import DahuaRpc
dahua = DahuaRpc(host="192.168.1.10"... | 313 | 28.77 | 116 | 15 | 2,205 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6acc055843da324e_661e4f7f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) t... | [
91,
95
] | [
null,
null
] | [
32,
33
] | [
42,
44
] | |
2024-11-18T19:27:26.570231+00:00 | 1,439,396,784,000 | 25b13ff682a4741f031b8999671d135ab012d088 | 3 | {
"blob_id": "25b13ff682a4741f031b8999671d135ab012d088",
"branch_name": "refs/heads/master",
"committer_date": 1439396784000,
"content_id": "99b29e79eef6415c72fbddf5ad399795167f85a7",
"detected_licenses": [
"MIT"
],
"directory_id": "93226c868fbb355c89798e8b506ce2cc048bf2f7",
"extension": "py",
"fi... | 2.59375 | stackv2 | import base64
import getpass
import socket
import string
import os
import subprocess
import time
import datetime
import inspect
def find_exe(name):
"""
Find an executable with the given name.
:param name:
:return:
"""
for path in os.getenv('PATH').split(os.pathsep):
for ext in ('',... | 84 | 27.95 | 98 | 19 | 561 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d493b4d4da6e3732_9d0bebfa", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
72
] | [
null
] | [
18
] | [
24
] | |
2024-11-18T19:27:48.739527+00:00 | 1,557,017,072,000 | 7397e2dcd9e7d01ecc4528b3d3c3ba94f03bc87e | 2 | {
"blob_id": "7397e2dcd9e7d01ecc4528b3d3c3ba94f03bc87e",
"branch_name": "refs/heads/master",
"committer_date": 1557017072000,
"content_id": "d1f6579cec71017991420f89b25cb1ff337fd147",
"detected_licenses": [
"MIT"
],
"directory_id": "aaf2248667c8492787f2ff02dc643202156cab45",
"extension": "py",
"fi... | 2.328125 | stackv2 | import os
import logging
import time
import ast
import requests
from flask import Blueprint, jsonify, request, make_response
gate = Blueprint('gate', __name__, url_prefix='/api')
# Rate Limiting
RATE_LIMIT = int(os.getenv("RATE_LIMITING_THRESHOLD"))
TIMEOUT = int(os.getenv("BLOCKED_IP_TIMEOUT"))
# Logger from Gunic... | 107 | 30.52 | 87 | 18 | 797 | python | [{"finding_id": "codeql_py/partial-ssrf_ff1281b8e953a3af_ac5c3362", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 2 | true | [
"CWE-918",
"CWE-117"
] | [
"py/partial-ssrf",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
89,
32
] | [
null,
null
] | [
16,
26
] | [
33,
50
] | |
2024-11-18T20:06:10.657577+00:00 | 1,687,059,361,000 | 21ec196221dfc7a3969fd32d61d1038810e1f550 | 2 | {
"blob_id": "21ec196221dfc7a3969fd32d61d1038810e1f550",
"branch_name": "refs/heads/master",
"committer_date": 1687059361000,
"content_id": "8155f398842a0826a97dce0b63712c1493d70116",
"detected_licenses": [
"MIT"
],
"directory_id": "7f05e9b1e49d3220d76f684d3bb1a64d71600def",
"extension": "py",
"fi... | 2.421875 | stackv2 | import os
import re
from urllib.parse import urlparse
from flask import (
Flask,
make_response,
render_template,
request,
)
import praw
import markdown
import requests
from weasyprint import HTML
import yaml
app = Flask(__name__)
file_dir = os.path.dirname(__file__)
class Config:
def __init__(... | 117 | 33.78 | 116 | 16 | 891 | python | [{"finding_id": "codeql_py/polynomial-redos_c6a84bacdf6a337b_b0a01236", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin... | 1 | true | [
"CWE-1333"
] | [
"py/polynomial-redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '/r/' and with many repetitions of '/r/'."
] | [
49
] | [
null
] | [
93
] | [
108
] | |
2024-11-18T20:06:11.960907+00:00 | 1,570,413,952,000 | 4a9942519a008f452352f4e65d8c923afd7f9b12 | 3 | {
"blob_id": "4a9942519a008f452352f4e65d8c923afd7f9b12",
"branch_name": "refs/heads/master",
"committer_date": 1570413952000,
"content_id": "a32b9286c172ce834b86784e3e74d51dc5b1a7b3",
"detected_licenses": [
"MIT"
],
"directory_id": "895acb69066b6da8f4a3fa9da340e46c05f025b7",
"extension": "py",
"fi... | 2.96875 | stackv2 | from lib.data.db.schema.recordsets.recordset import RecordSet
from lib.data.db.schema.records.user import User
from sqlalchemy.orm.exc import NoResultFound
import hashlib
class Users(RecordSet):
""" A recordset of persisted users.
---
This class facades several operations and queries on the user records.
... | 78 | 32.46 | 142 | 17 | 507 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_83287b8ea8184e9e_71345678", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
78
] | [
null
] | [
31
] | [
55
] | |
2024-11-18T20:06:33.314695+00:00 | 1,605,043,030,000 | 62bf39d931319b82be3aa46f7774dd1f5ca4952a | 2 | {
"blob_id": "62bf39d931319b82be3aa46f7774dd1f5ca4952a",
"branch_name": "refs/heads/master",
"committer_date": 1605043030000,
"content_id": "c0aa32149e96d301ee6ddd75f016aa04dde5861f",
"detected_licenses": [
"MIT"
],
"directory_id": "c284a0fecb743ae5bb301007e79f7a72f3ccaec5",
"extension": "py",
"fi... | 2.34375 | stackv2 | from flask import abort, request, redirect
from flask_login import login_user
import urllib.parse
from app import app, bcrypt, db, render_template
from app.db_models import User
@app.route("/reset-password/<reset_password_case_id>", methods=["GET", "POST"])
def reset_password(reset_password_case_id):
user = User.... | 49 | 33.59 | 115 | 15 | 355 | python | [{"finding_id": "codeql_py/url-redirection_8fad8d5ab8b16cd1_0408fcea", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
43
] | [
null
] | [
29
] | [
40
] | |
2024-11-18T20:18:11.118619+00:00 | 1,516,020,853,000 | f9b7243debeb92e5f62e4ce3ce7563cc5484bf6a | 2 | {
"blob_id": "f9b7243debeb92e5f62e4ce3ce7563cc5484bf6a",
"branch_name": "refs/heads/master",
"committer_date": 1516020853000,
"content_id": "bc8af36feee79046fc3edff184917a92d7259b8b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "78176f6c8ac304ae40ed0a7f3f9c7123aed08fdf",
"extension": "py"... | 2.328125 | stackv2 | #!/usr/bin/python
#
# Copyright 2015 Gerard kok
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agr... | 67 | 28.54 | 83 | 17 | 444 | python | [{"finding_id": "codeql_py/overly-permissive-file_5af4db790fafd9f2_7bdae8b1", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
55
] | [
null
] | [
9
] | [
31
] | |
2024-11-18T20:31:16.834294+00:00 | 1,690,273,388,000 | 2540918ff8b7c20bb1e54ade0f58ddd4f211d37e | 3 | {
"blob_id": "2540918ff8b7c20bb1e54ade0f58ddd4f211d37e",
"branch_name": "refs/heads/master",
"committer_date": 1690273388000,
"content_id": "5d2498e008316b134dd3ba2ac7075f668f0d471d",
"detected_licenses": [
"MIT"
],
"directory_id": "97933c7f0973cb5671a26d28763e2688882b6ba9",
"extension": "py",
"fi... | 3.125 | stackv2 | #!/usr/bin/env python
# -*- coding:utf-8 -*-
"""
Date: 2022/1/26 15:10
Desc: 福布斯中国-榜单
https://www.forbeschina.com/lists
"""
import pandas as pd
import requests
from bs4 import BeautifulSoup
def forbes_rank(symbol: str = "2021福布斯中国创投人100") -> pd.DataFrame:
"""
福布斯中国-榜单
https://www.forbeschina.com/lists
... | 49 | 25.71 | 81 | 14 | 411 | python | [{"finding_id": "codeql_py/request-without-cert-validation_1a21c567f74b1e47_a206f7b3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
24,
42
] | [
null,
null
] | [
9,
9
] | [
40,
58
] | |
2024-11-18T20:31:29.129551+00:00 | 1,602,076,105,000 | 21dbdd05f66a5e6e6ac21411ed31e1bcaec3e833 | 3 | {
"blob_id": "21dbdd05f66a5e6e6ac21411ed31e1bcaec3e833",
"branch_name": "refs/heads/master",
"committer_date": 1602076105000,
"content_id": "34b00cbaa3f6c41c6e949372e600cd58d4a2c1b3",
"detected_licenses": [
"MIT"
],
"directory_id": "c45d1ae5a4b99ab8ae272cd1f25368a1a293981a",
"extension": "py",
"fi... | 2.625 | stackv2 | # -*- coding:utf-8 -*-
import requests, sys, hashlib, time, json, base64, logging
import urllib.parse
sys.path.append("../../")
import settings
from util.readImage import readImage
from util.log import logging_elapsed_time
class netease_ai(object):
def __init__(self):
self._app_id = settings.NETEASE_APP_I... | 106 | 32.28 | 99 | 16 | 872 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6ae824d454b1e8cb_328d1931", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
29
] | [
null
] | [
32
] | [
49
] | |
2024-11-18T20:31:31.392847+00:00 | 1,530,336,909,000 | 3e4436630bd943d8dd69f603f6b988825b718df4 | 3 | {
"blob_id": "3e4436630bd943d8dd69f603f6b988825b718df4",
"branch_name": "refs/heads/master",
"committer_date": 1530336909000,
"content_id": "90db93b9ae23f3fedf1cb47e71455b591bb043df",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "977307cfe26cf7536227808db0583077f724272a",
"extension": "py"... | 2.734375 | stackv2 | #!/usr/bin/python3
'''
Unobfuscate the master password from the obfuscated encryptionKey.properties file.
yum install python-crypto
'''
import base64,sys,traceback
from Crypto.Hash import MD5
from Crypto.Cipher import DES,AES
pad = b'\xc7\xc7\xc7\xc7\xc7\xc7\xc7\xc7\x99\x99\x99\x99\x99\x99\x99\x99'
des_salt = b'\xc7... | 75 | 28.64 | 86 | 17 | 677 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_50e8d6028b2f62e6_8e7f541a", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES](1) is broken or weak, and should not be used.", "r... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The cryptographic algorithm DES](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash fu... | [
31,
63,
19
] | [
null,
null,
null
] | [
17,
21,
19
] | [
38,
76,
27
] | |
2024-11-18T20:43:31.967866+00:00 | 1,692,279,512,000 | f6bfbdd9a6b527f6bfce09a4b0c68a0bb3048a23 | 2 | {
"blob_id": "f6bfbdd9a6b527f6bfce09a4b0c68a0bb3048a23",
"branch_name": "refs/heads/master",
"committer_date": 1692279512000,
"content_id": "68950a3f1498a98d684ad0b9d8da436c6cf2c7c1",
"detected_licenses": [
"MIT"
],
"directory_id": "82a40fd597a3edb2a2edda2a87e055f89ea98a79",
"extension": "py",
"fi... | 2.46875 | stackv2 | "PubMed interface."
import json
import os
import os.path
import re
import string
import sys
import time
import unicodedata
import xml.etree.ElementTree
import requests
PUBMED_FETCH_URL = "https://eutils.ncbi.nlm.nih.gov/entrez/eutils/efetch.fcgi?db=pubmed&rettype=abstract&id=%s&retmode=xml"
PUBMED_SEARCH_URL = "htt... | 414 | 30.77 | 123 | 17 | 3,230 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0a0b70f396c4d9f9_e4a52fa0", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive... | [
132,
81,
121
] | [
null,
null,
null
] | [
31,
27,
27
] | [
38,
30,
30
] | |
2024-11-18T20:43:38.657238+00:00 | 1,477,567,243,000 | 8dc3135a3e3ebc213680020af425ae32e7fb75c9 | 3 | {
"blob_id": "8dc3135a3e3ebc213680020af425ae32e7fb75c9",
"branch_name": "refs/heads/master",
"committer_date": 1477567243000,
"content_id": "ef65c8cea0d2d353f7444866247b46837fc83689",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "81991eed7c72bd2c0e232c406af1dc570df64b87",
"extension": "py"... | 2.578125 | stackv2 | import errno
import os
import re
import shutil
import time
from applicake.coreutils.keys import Keys
def create_workdir(log, info):
if not Keys.WORKDIR in info:
log.debug("No WORKDIR requested")
return info
if info[Keys.WORKDIR] != "":
log.debug("Using specified WORKDIR [%s]" % info[... | 77 | 29.31 | 106 | 18 | 628 | python | [{"finding_id": "codeql_py/overly-permissive-file_820b5831bde468fe_6ff32bab", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable.",
"Overly permissive mask in chmod sets file to world readable."
] | [
53,
77
] | [
null,
null
] | [
13,
9
] | [
33,
31
] | |
2024-11-18T20:43:42.352435+00:00 | 1,618,866,631,000 | 5a6bac77dc14548cbe52ca3c34c987be4e932d53 | 2 | {
"blob_id": "5a6bac77dc14548cbe52ca3c34c987be4e932d53",
"branch_name": "refs/heads/main",
"committer_date": 1618866631000,
"content_id": "b3d066a663fa6421da26fec7012ccc1194b1dd0d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2e9a8973728c2b4566596b0d8c78a8c32355e65a",
"extension": "py",
... | 2.328125 | stackv2 | """Resource module for resultat view."""
import logging
from aiohttp import web
import aiohttp_jinja2
from sprint_webserver.services import (
InnstillingerService,
KjoreplanService,
KlasserService,
)
class Kjoreplan(web.View):
"""Class representing the kjoreplan / heatliste resource."""
async d... | 71 | 31.9 | 88 | 17 | 552 | python | [{"finding_id": "codeql_py/log-injection_3d3b9638d76e8526_5708af77", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
64
] | [
null
] | [
23
] | [
70
] | |
2024-11-18T20:43:48.389531+00:00 | 1,619,681,784,000 | fb030db06db80906fffd15822a6bc7f820993916 | 2 | {
"blob_id": "fb030db06db80906fffd15822a6bc7f820993916",
"branch_name": "refs/heads/main",
"committer_date": 1619681784000,
"content_id": "8e166ec158cf71a17d49ea737c55aad8d3ce5213",
"detected_licenses": [
"MIT"
],
"directory_id": "7aeef2e5ebc1cf5a0da427f57873ce0653762d11",
"extension": "py",
"file... | 2.46875 | stackv2 | from rest_framework.decorators import api_view, permission_classes
from rest_framework.permissions import AllowAny
from rest_framework.response import Response
from requests import get
@api_view()
@permission_classes([AllowAny])
def ipView(request):
''' IP View '''
ip = get_client_ip(request)
response = i... | 38 | 25.82 | 66 | 12 | 245 | python | [{"finding_id": "codeql_py/partial-ssrf_7709046a7dceb62d_635e73fa", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)."
] | [
27
] | [
null
] | [
12
] | [
31
] | |
2024-11-18T20:43:50.616512+00:00 | 1,519,763,689,000 | 692280e7818ac1eb5f66ed8af0554720a7c22a53 | 3 | {
"blob_id": "692280e7818ac1eb5f66ed8af0554720a7c22a53",
"branch_name": "refs/heads/master",
"committer_date": 1519763689000,
"content_id": "1c1d7765e349545f2ad959a320fe3c7842fc2e4e",
"detected_licenses": [
"MIT"
],
"directory_id": "cdddb09380b2372bbf058715d6fd6fd5cc469919",
"extension": "py",
"fi... | 2.6875 | stackv2 | import base64
import glob
import json
from operator import itemgetter
import os
from jinja2 import Environment, FileSystemLoader
from css_html_js_minify.js_minifier import js_minify_keep_comments
from .marker import Marker, MarkerCluster
from .utils import position_to_latLng, calc_avg_position
from .mapelement import... | 233 | 28.53 | 87 | 17 | 1,539 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c9f36bc9b0b65524_f39f5843", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
24
] | [
null
] | [
11
] | [
37
] | |
2024-11-18T20:44:02.132720+00:00 | 1,562,051,837,000 | 503e2508d7a9f2e3b71b4c2544890480b19c852e | 3 | {
"blob_id": "503e2508d7a9f2e3b71b4c2544890480b19c852e",
"branch_name": "refs/heads/master",
"committer_date": 1562051837000,
"content_id": "2c41208e90ccb0540cdf27fc9890c556ef88668b",
"detected_licenses": [
"MIT"
],
"directory_id": "1720d18e98a9f4066bdf91851ecc9960ab6f8f0f",
"extension": "py",
"fi... | 2.515625 | stackv2 | import logging
import re
import django
from django.contrib.auth import authenticate
from django.shortcuts import render, redirect
from .models import CustomUser
def get_logger():
logger = logging.getLogger('views_account')
logger.setLevel(logging.DEBUG)
ch = logging.StreamHandler()
ch.setLevel(loggi... | 95 | 31.98 | 89 | 16 | 594 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fdb9e36d95bfad7e_ab9d96a4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
80
] | [
null
] | [
22
] | [
41
] | |
2024-11-18T20:44:05.577564+00:00 | 1,600,086,947,000 | aed77e90fe6492d65e911d0147254f7dfff006ae | 3 | {
"blob_id": "aed77e90fe6492d65e911d0147254f7dfff006ae",
"branch_name": "refs/heads/master",
"committer_date": 1600086947000,
"content_id": "d3030e29ce0e4ec52ab9dc86357738a3510047e0",
"detected_licenses": [
"MIT"
],
"directory_id": "2aa66e8adb105205532ae4a05158265e66d9ed70",
"extension": "py",
"fi... | 2.5625 | stackv2 | # -*-coding:utf-8-*-
'''
@author : qzylalala
@file : FaceppApi.py
@time : 2020-09-07 19:04
'''
import urllib.request
import urllib.error
import json
import time
http_url = 'https://api-cn.faceplusplus.com/facepp/v3/detect'
key = "xxx"
secret = "xxx"
# use your own key and secret key
#---------------------------... | 71 | 35.59 | 144 | 14 | 735 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_51075d6732c3845c_7d27330c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
65
] | [
null
] | [
15
] | [
38
] | |
2024-11-18T20:57:30.503166+00:00 | 1,572,552,454,000 | 3549830c8e7ed2a836e6317b81621b710ed9737c | 3 | {
"blob_id": "3549830c8e7ed2a836e6317b81621b710ed9737c",
"branch_name": "refs/heads/master",
"committer_date": 1572552454000,
"content_id": "53a711ddfcf5218e5f991337659b3b7616bfc5f5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d755154d58f66d8ee428d62fc628c4a57127cec5",
"extension": "py"... | 2.5625 | stackv2 | import time
import os
import re
import warnings
from argon2 import PasswordHasher
from argon2.exceptions import VerifyMismatchError
from .error import AbortRequest
VALID_PERM_CODES = "W"
HEADER = "# username:upload_dir_prefix:permission_flags:password_hash"
class SecurityManager(object):
"""Manages a list of ... | 185 | 33.97 | 119 | 18 | 1,455 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8815ebebf195e0c6_7391af29", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
102
] | [
null
] | [
28
] | [
39
] | |
2024-11-18T20:57:38.520261+00:00 | 1,692,465,199,000 | ffb1ee6041ac64e15a030f7aba2d6a6e05c43460 | 3 | {
"blob_id": "ffb1ee6041ac64e15a030f7aba2d6a6e05c43460",
"branch_name": "refs/heads/master",
"committer_date": 1692465199000,
"content_id": "1c594e75cbc86d3a96107ed0b5c7c550c2d524bd",
"detected_licenses": [
"MIT"
],
"directory_id": "632dcb4e37cadd87cb7ff8715b0048df5cd0d11b",
"extension": "py",
"fi... | 2.875 | stackv2 | import os
from jinja2 import Environment, FileSystemLoader
from collections import OrderedDict
# Capture our current directory
def print_rendered_xml():
# Create the jinja2 environment.
# Notice the use of trim_blocks, which greatly helps control whitespace.
THIS_DIR = os.path.dirname(os.path.abspath(__... | 30 | 24.63 | 76 | 11 | 182 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_079c8d4673489b8b_410aca9c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
14
] | [
15
] | [
14
] | [
43
] | |
2024-11-18T20:58:04.969914+00:00 | 1,610,123,214,000 | 432ab5c7f59c0d75dc459e97d7ab0927f7193daf | 2 | {
"blob_id": "432ab5c7f59c0d75dc459e97d7ab0927f7193daf",
"branch_name": "refs/heads/main",
"committer_date": 1610123214000,
"content_id": "604922dc64c941b6d282019ffea81114b423e617",
"detected_licenses": [
"MIT"
],
"directory_id": "0df8ca92e221608c08e0a72d642a33db9eabd381",
"extension": "py",
"file... | 2.328125 | stackv2 | #!/usr/bin/env python3
from flask import Flask, send_file
import keyboard
import os, os.path
app = Flask(__name__)
# path to files
appPath = app.root_path + '/'
@app.route("/")
def Interface():
return send_file(appPath + 'interface.html')
@app.route("/<name>")
def other(name):
if not name == '':
# key... | 36 | 22.69 | 59 | 16 | 220 | python | [{"finding_id": "codeql_py/path-injection_3fc2e130090bbc1c_16ef3d70", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
25,
26
] | [
null,
null
] | [
31,
34
] | [
58,
48
] | |
2024-11-18T20:58:14.134131+00:00 | 1,545,003,404,000 | 861524dfefaefd0c51cd8e89108f7695cfb64f4f | 3 | {
"blob_id": "861524dfefaefd0c51cd8e89108f7695cfb64f4f",
"branch_name": "refs/heads/master",
"committer_date": 1545003404000,
"content_id": "57353d66f533dd709955ca7b934161492f0fc087",
"detected_licenses": [
"MIT"
],
"directory_id": "1e0ae93881658f1ff36d39c93c72b6355ee193da",
"extension": "py",
"fi... | 2.625 | stackv2 | import flask
import json
import random
random.seed(42)
app = flask.Flask('real/fake')
app.secret_key = '9)P39f.a2C99d9+wH662[=*@'
app.config['SEND_FILE_MAX_AGE_DEFAULT'] = 60
app.jinja_env.globals.update(len=len)
app.jinja_env.globals.update(max=max)
app.jinja_env.globals.update(zip=zip)
def load_data(labels_file, ... | 139 | 31.36 | 78 | 18 | 1,039 | python | [{"finding_id": "codeql_py/reflective-xss_c849668e77ac4290_3ae52251", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
103
] | [
null
] | [
12
] | [
62
] | |
2024-11-18T21:10:16.029614+00:00 | 1,584,551,167,000 | 8299841658ead773e6394d7b8e083f7ae3cf1362 | 3 | {
"blob_id": "8299841658ead773e6394d7b8e083f7ae3cf1362",
"branch_name": "refs/heads/master",
"committer_date": 1584551167000,
"content_id": "8f713c9620e3fabe4e015c1bafa6eb2d14a6706f",
"detected_licenses": [
"MIT"
],
"directory_id": "2c953ed3034eb4912b0107fcc94dc417f6d828bc",
"extension": "py",
"fi... | 2.5625 | stackv2 | #!/usr/bin/env python3
from datetime import date
import sys
import argparse
import requests
import random
import json
from io import StringIO
import urllib.request
import os
from datetime import datetime
from dotenv import load_dotenv
load_dotenv()
def getUserInfo(header, user):
r = requests.get(API_URL + "user/"... | 110 | 36.75 | 177 | 30 | 914 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_cdef4a3fc0f3789a_0c3eec78", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data ... | [
75,
64
] | [
null,
null
] | [
35,
27
] | [
46,
34
] | |
2024-11-18T21:10:18.443265+00:00 | 1,630,381,376,000 | a4607cb9cde42e66b3fb8196b9aba7f3457baa17 | 2 | {
"blob_id": "a4607cb9cde42e66b3fb8196b9aba7f3457baa17",
"branch_name": "refs/heads/main",
"committer_date": 1630381376000,
"content_id": "37ca910aa6b52270cba96dd0781816f10f61083d",
"detected_licenses": [
"MIT"
],
"directory_id": "a2da13982a46bd9b822b442efa376809715aaf0d",
"extension": "py",
"file... | 2.5 | stackv2 | import re
from django.db import DatabaseError
from django.http import HttpResponseBadRequest, HttpResponse, JsonResponse
from django.shortcuts import render
import logging
from django.shortcuts import redirect
from django.urls import reverse
from django.contrib.auth.mixins import LoginRequiredMixin
# Create your view... | 401 | 29.39 | 94 | 16 | 3,124 | python | [{"finding_id": "codeql_py/url-redirection_dc84663e3310110a_56e438c7", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
209
] | [
null
] | [
33
] | [
42
] | |
2024-11-18T21:11:02.706643+00:00 | 1,540,403,942,000 | 3eb21e6ab4afa43c0c467eb7fb380d5afe83a612 | 2 | {
"blob_id": "3eb21e6ab4afa43c0c467eb7fb380d5afe83a612",
"branch_name": "refs/heads/master",
"committer_date": 1540403942000,
"content_id": "0e35ec61bc3a8fe9eba10c3351c6ea0fde93bac8",
"detected_licenses": [
"MIT"
],
"directory_id": "c8077a0a60f0d76d12e409f751884e52ae361355",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/env python
"""
Generates an arbitrated Ethernet mux with the specified number of ports
"""
from __future__ import print_function
import argparse
import math
from jinja2 import Template
def main():
parser = argparse.ArgumentParser(description=__doc__.strip())
parser.add_argument('-p', '--ports', t... | 186 | 30.12 | 124 | 12 | 1,586 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_cfd878558c24f836_e87cd071", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
41
] | [
173
] | [
9
] | [
5
] | |
2024-11-18T21:11:04.977852+00:00 | 1,476,563,515,000 | 736700ff5d5f6fab179616ab782e94aee529c46a | 2 | {
"blob_id": "736700ff5d5f6fab179616ab782e94aee529c46a",
"branch_name": "refs/heads/master",
"committer_date": 1476563515000,
"content_id": "3550a6c41e1d6042c87b2072f413d93586aa22c4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b693f62e2769e2a317d753c1e09893c3f9bd5b0f",
"extension": "py"... | 2.46875 | stackv2 |
import os
if os.name == 'nt':
from . import crypt_windows as crypt
else:
import crypt
import hashlib
from struct import pack
import six
from vertica_python.vertica.messages.message import FrontendMessage
from vertica_python.vertica.messages.backend_messages.authentication import Authentication
class Pass... | 59 | 32.17 | 95 | 18 | 386 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_54bf11bcf63144e4_e366cc54", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
37
] | [
null
] | [
26
] | [
59
] | |
2024-11-18T19:03:17.978693+00:00 | 1,565,252,835,000 | 4054343d0a364beffd8c627bd04ccfee5eaaf670 | 3 | {
"blob_id": "4054343d0a364beffd8c627bd04ccfee5eaaf670",
"branch_name": "refs/heads/master",
"committer_date": 1565252835000,
"content_id": "9f8208acafedef247fc22e9494ea1d0007093831",
"detected_licenses": [
"MIT"
],
"directory_id": "f2b68cfe0d863013a76da0b4e516fa37b16d035a",
"extension": "py",
"fi... | 2.59375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
from sys import argv
try:
from PIL import Image
except:
from sys import stderr
stderr.write('[E] PIL not installed')
exit(1)
from io import BytesIO
from urllib.request import Request, urlopen
from urllib.parse import urlencode
import json
import re
import s... | 93 | 29.48 | 126 | 16 | 868 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_f300551066c325dc_346a8c40", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'xkcd.com', so it might match more h... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'xkcd.com', so it might match more hosts than expected."
] | [
29
] | [
null
] | [
51
] | [
82
] | |
2024-11-18T19:28:40.201157+00:00 | 1,581,518,490,000 | 3455789882048a1c5b609154a0ad1747b6df27e8 | 3 | {
"blob_id": "3455789882048a1c5b609154a0ad1747b6df27e8",
"branch_name": "refs/heads/master",
"committer_date": 1581518490000,
"content_id": "1b3f21fd1ce3b84419762a3acfa7a91c89fb3c9f",
"detected_licenses": [
"MIT"
],
"directory_id": "89e908a77dee4196b44d745534b089f0c68f68ce",
"extension": "py",
"fi... | 2.859375 | stackv2 | import flask
import pyodbc
# Initializes app and database connection
app = flask.Flask('biosphere', template_folder='templates')
db_conn = conn = pyodbc.connect(
'Driver={SQL Server};'
'Server=DESKTOP-QR078NF\SQLEXPRESS;'
'Database=BIOSPHERE;'
'Trusted_Connection=yes;'
)
# Function to handle the root ... | 183 | 31.15 | 105 | 15 | 1,413 | python | [{"finding_id": "codeql_py/sql-injection_dd9fffe1dc95ae7a_4c49fc75", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 4 | true | [
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089"
] | [
"py/sql-injection",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
48,
86,
124,
169
] | [
null,
null,
null,
173
] | [
24,
24,
24,
24
] | [
69,
68,
55,
17
] | |
2024-11-18T19:28:56.354749+00:00 | 1,484,190,859,000 | 593447e3d634bf0e4f58e3d2bf0d93d026c0bf0b | 3 | {
"blob_id": "593447e3d634bf0e4f58e3d2bf0d93d026c0bf0b",
"branch_name": "refs/heads/master",
"committer_date": 1484190859000,
"content_id": "b7cfd439c6c53f53dd5ee4e57105035b865bb1c9",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "0e2a416d46e3f76a36db29d87a3a50f7f74e90c8",
"extension": "p... | 2.5625 | stackv2 | #!/usr/bin/python
from jinja2 import Environment, FileSystemLoader
import yaml
import codecs
import sys
ENV = Environment(loader=FileSystemLoader('./'))
# load yaml file into dictionary
with open("data.yaml") as _:
dict = yaml.load(_)
# Render template and print generated config to console, also set codec so ... | 19 | 25.63 | 107 | 10 | 115 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9dc968e1a9dfe1e2_814785bc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
8
] | [
null
] | [
7
] | [
49
] | |
2024-11-18T19:39:33.322809+00:00 | 1,682,623,785,000 | 48a322dbeb8d600c1a7f71c3e19b71cc5709e263 | 3 | {
"blob_id": "48a322dbeb8d600c1a7f71c3e19b71cc5709e263",
"branch_name": "refs/heads/master",
"committer_date": 1682623785000,
"content_id": "72ee0425eb2363ab39f85ba9d239891aa0279dcd",
"detected_licenses": [
"MIT"
],
"directory_id": "3f92c74e40b78cb9a29785f810c4bf6e9a661eca",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/env python
#
# Use the raw transactions API to spend bitcoins received on particular addresses,
# and send any change back to that same address.
#
# Example usage:
# spendfrom.py # Lists available funds
# spendfrom.py --from=ADDRESS --to=ADDRESS --amount=11.00
#
# Assumes it will talk to a bitcoind or Bit... | 267 | 36.65 | 111 | 23 | 2,431 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5e60679b13d30973_fb18761a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
77,
81
] | [
null,
null
] | [
30,
26
] | [
84,
75
] | |
2024-11-18T19:39:34.422956+00:00 | 1,636,706,019,000 | 94bf382ac7675f4d60703d40ea922605f16de12c | 3 | {
"blob_id": "94bf382ac7675f4d60703d40ea922605f16de12c",
"branch_name": "refs/heads/master",
"committer_date": 1636706019000,
"content_id": "d0db8bf7c9c33f5f463c9f7c0089c5c33249a7d5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4ee4ba4ce77f2efe29583fbb2a4f991010710627",
"extension": "py"... | 2.578125 | stackv2 | from flask import Flask, request, Response
import logging
import pyfiglet
import requests
import os
try:
app = Flask(__name__)
logging.basicConfig(level=logging.DEBUG)
logging.getLogger('werkzeug').setLevel(logging.ERROR)
except Exception as e:
logging.exception("Error at startup")
@app.route('/ping... | 84 | 22.21 | 106 | 15 | 455 | python | [{"finding_id": "codeql_py/stack-trace-exposure_fa031da1861449b5_45803485", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
56,
84
] | [
null,
null
] | [
25,
5
] | [
31,
57
] | |
2024-11-18T19:39:50.802929+00:00 | 1,453,209,648,000 | ec08b45b08d03d0d61f7df0b9c0fe2df33d9d6ba | 2 | {
"blob_id": "ec08b45b08d03d0d61f7df0b9c0fe2df33d9d6ba",
"branch_name": "refs/heads/master",
"committer_date": 1453209648000,
"content_id": "b94a39c231f52ed7a4c9370638f0301cf71dc263",
"detected_licenses": [
"MIT"
],
"directory_id": "a4a78fa4ccb243955a834171313de274bd7152c8",
"extension": "py",
"fi... | 2.421875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import os
import sys
import logging
import datetime
import subprocess
from distutils import spawn
import praw
import markdown2
from docopt import docopt
from jinja2 import Environment, PackageLoader
from distutils import spawn
USAGE = """reddit2kindle
Compiles requested ... | 128 | 31.27 | 101 | 17 | 938 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_139a16b7711fdf7d_626423b4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
74
] | [
null
] | [
11
] | [
67
] | |
2024-11-18T19:40:01.079768+00:00 | 1,574,641,880,000 | 0b6e1f480e086a09845834f018fb9406c59e98e2 | 2 | {
"blob_id": "0b6e1f480e086a09845834f018fb9406c59e98e2",
"branch_name": "refs/heads/master",
"committer_date": 1574641880000,
"content_id": "e682e4cb931e9b4fd36b3196f30ce8e5a1843801",
"detected_licenses": [
"MIT",
"Apache-2.0"
],
"directory_id": "f26b098dcae1f06c68a1bbe8748f440ad12125fd",
"exten... | 2.4375 | stackv2 | from google_auth_oauthlib.flow import InstalledAppFlow
from google.auth.transport.requests import AuthorizedSession
from google.oauth2.credentials import Credentials
import json
from more_itertools import chunked
from pathlib import Path
import settings
SCOPE = 'https://www.googleapis.com/auth/photoslibrary.appendonl... | 92 | 39 | 119 | 18 | 827 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_17ab49ffcf50d2d2_ee74c68c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
45,
48
] | [
null,
null
] | [
34,
19
] | [
43,
100
] | |
2024-11-18T20:18:30.472347+00:00 | 1,571,176,846,000 | fc62015d790e502118aea51b44c248c53dc56e1d | 3 | {
"blob_id": "fc62015d790e502118aea51b44c248c53dc56e1d",
"branch_name": "refs/heads/master",
"committer_date": 1571176846000,
"content_id": "4cc46f3b92ff3fa199f85d1733d9311242c6c39a",
"detected_licenses": [
"MIT"
],
"directory_id": "608e6815e0c3346392cbd3480b4311991ff8b1c8",
"extension": "py",
"fi... | 2.765625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
from __future__ import absolute_import
from __future__ import division
from __future__ import print_function
import os
import gzip
import tarfile
import numpy as np
import six
from six.moves import urllib, range
from six.moves import cPickle as pickle
def standardize(da... | 368 | 35.65 | 118 | 17 | 3,696 | python | [{"finding_id": "codeql_py/tarslip_ea78e14faf1107b4_560b6339", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
165
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T20:18:56.543035+00:00 | 1,366,335,548,000 | 8f3d5f0ae791a4480ece593447b0d1e1cf17b6df | 3 | {
"blob_id": "8f3d5f0ae791a4480ece593447b0d1e1cf17b6df",
"branch_name": "refs/heads/master",
"committer_date": 1366341362000,
"content_id": "87e686cd9ca4996a9fbcbd4a9c43ff764db08eaf",
"detected_licenses": [
"MIT"
],
"directory_id": "de1842b632080567e7f84236f9d3e9ce68901783",
"extension": "py",
"fi... | 2.53125 | stackv2 | from django.contrib.auth.models import User
from django.conf import settings
from django.db import models
from django.utils import simplejson as json
from django.utils import timezone
import struct, binascii, ssl
from datetime import datetime
from socket import socket
from importlib import import_module
from json_fiel... | 198 | 32.7 | 96 | 17 | 1,453 | python | [{"finding_id": "codeql_py/insecure-protocol_4e148a3b6cb99a27_75627f50", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.wrap_socket](1).", "remediation": "", "l... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/insecure-protocol",
"py/insecure-protocol"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.wrap_socket](1).",
"Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.wrap_socket](1)."
] | [
31,
88
] | [
36,
93
] | [
13,
13
] | [
10,
10
] | |
2024-11-18T20:29:36.940268+00:00 | 1,631,229,916,000 | 6e48bd56c9218a511805fbad3572d160cf47c525 | 2 | {
"blob_id": "6e48bd56c9218a511805fbad3572d160cf47c525",
"branch_name": "refs/heads/main",
"committer_date": 1631229916000,
"content_id": "abe830fde851df05a442b07f7c123e625a0f3885",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "617f2bfbb824ffc7d4ed12e1cb813c5cd398fa81",
"extension": "py",
... | 2.46875 | stackv2 | import os
import sys
from pathlib import Path
from typing import Optional
import datetime
import hashlib
from .logger import Logger
SESSION_DIR_KEY = 'LAUNCHABLE_SESSION_DIR'
DEFAULT_SESSION_DIR = '~/.config/launchable/sessions/'
def _session_file_dir() -> Path:
return Path(os.environ.get(SESSION_DIR_KEY) or DEF... | 110 | 35.77 | 143 | 18 | 950 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_dbd8788ff154d9a3_7cd8a405", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
18
] | [
null
] | [
48
] | [
102
] | |
2024-11-18T20:51:46.299501+00:00 | 1,386,542,927,000 | bce579c7d36ccd947d198925414946a4df858ce6 | 3 | {
"blob_id": "bce579c7d36ccd947d198925414946a4df858ce6",
"branch_name": "refs/heads/master",
"committer_date": 1386542927000,
"content_id": "caa795ca8122a86431c4c791b879aca6a8272a8d",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "c5e3fd3a1f38c760a07a0786a5a9e16a3dbd0213",
"extension": "p... | 2.703125 | stackv2 | import paramiko
import argparse
import random
import time
import getpass
class Remote(object):
def __init__(self,host,user,path,coord=None,coordport=None):
print("Connecting to %s " % host)
self.path = path
self.host, self.port = str.split(host,':')
self.coordip = coord
self... | 115 | 30.37 | 93 | 14 | 904 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_f97122a57544f758_b1cca780", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
15
] | [
16
] | [
9
] | [
38
] | |
2024-11-18T19:07:13.220388+00:00 | 1,693,518,570,000 | 394ffd864a210b2cb675666ab51f2e8d1fec356c | 3 | {
"blob_id": "394ffd864a210b2cb675666ab51f2e8d1fec356c",
"branch_name": "refs/heads/main",
"committer_date": 1693518570000,
"content_id": "704a87c087c9ca20c93a3915e1fb5a5fd1e70ee1",
"detected_licenses": [
"MIT"
],
"directory_id": "0dddc0508138396c740901be4a0f9eebefb8fded",
"extension": "py",
"file... | 2.59375 | stackv2 | #!/usr/bin/env python3
# Copyright (c) Meta Platforms, Inc. and affiliates.
#
# This source code is licensed under the MIT license found in the
# LICENSE file in the root directory of this source tree.
import os
import pkgutil
from typing import List, Optional
from ax.plot.render import _js_requires, _load_css_resour... | 146 | 28.01 | 86 | 12 | 982 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e7f38d1794edf38a_bfa8d3f2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
146
] | [
null
] | [
12
] | [
67
] | |
2024-11-18T19:07:21.322274+00:00 | 1,606,941,264,000 | 02627afe75ef6e0a24f4fb9bfe0d65019789dc45 | 2 | {
"blob_id": "02627afe75ef6e0a24f4fb9bfe0d65019789dc45",
"branch_name": "refs/heads/master",
"committer_date": 1606941264000,
"content_id": "9dd4a0a91ac037349de61b5a4e6fbc66b0622c56",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0b4d1fb57546adbc85659a144742c4ecd9dfe219",
"extension": "py"... | 2.46875 | stackv2 | from genie.metaparser import MetaParser
from genie.metaparser.util.schemaengine import Any, Or, Optional
import re
# ======================================================
# Schema for 'show vrrp'
# ======================================================
class ShowVrrpSchema(MetaParser):
schema = {
'inter... | 261 | 33.62 | 112 | 27 | 2,040 | python | [{"finding_id": "codeql_py/redos_21341bb2ec241481_16b45dca", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'Master Router is ' and containing... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'Master Router is ' and containing many repetitions of ','."
] | [
123
] | [
null
] | [
52
] | [
60
] | |
2024-11-18T19:07:29.332031+00:00 | 1,592,633,802,000 | 094b5f78f48aa7ba55acea6b66860c1f12e529a0 | 2 | {
"blob_id": "094b5f78f48aa7ba55acea6b66860c1f12e529a0",
"branch_name": "refs/heads/master",
"committer_date": 1592633802000,
"content_id": "956d364be48c12ea2fd3108330014a2a8e16dca0",
"detected_licenses": [
"MIT"
],
"directory_id": "7b4d3522a5753a06a0e7b997c2b6c67bde5adc49",
"extension": "py",
"fi... | 2.375 | stackv2 | from flask import Flask
from flask import jsonify
from flask import request
from flask_cors import CORS
from flask_pymongo import PyMongo, ObjectId
# app modules
from app.aula import Aula
from app.sala import Sala
from app.user import User
app = Flask(__name__)
CORS(app)
app.config['MONGO_DBNAME'] = 'horarios'
app.co... | 130 | 20.5 | 62 | 12 | 874 | python | [{"finding_id": "codeql_py/stack-trace-exposure_6e56a96a74fe8c4f_2f8323ed", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.\n[Stack trace information](3) flows to this location and may be exposed to an external user.\n[Stack trace information](4) flows t... | [
25,
130
] | [
null,
null
] | [
17,
5
] | [
54,
24
] | |
2024-11-18T19:18:33.312633+00:00 | 1,643,155,834,000 | 86483272abf46e72758814ccb9fa51e4654943e6 | 2 | {
"blob_id": "86483272abf46e72758814ccb9fa51e4654943e6",
"branch_name": "refs/heads/master",
"committer_date": 1643155834000,
"content_id": "3219f6da7047b5bcf647ea73d6af0d48e504c0e2",
"detected_licenses": [],
"directory_id": "67a2fea2b3a108a500c3cdd20c4bc23ddcef7aaf",
"extension": "py",
"filename": "hom... | 2.3125 | stackv2 | import datetime
import json
from flask import Blueprint, jsonify, request, current_app
from flask_login import current_user
import db
from utils import database
from utils.file_manager import FileManager, FileType
bp = Blueprint("home", __name__)
@bp.route("/ping", methods=["GET"])
def ping():
return jsonify({... | 217 | 33.25 | 99 | 18 | 1,687 | python | [{"finding_id": "codeql_py/stack-trace-exposure_151e4eea9be5a366_54352fa6", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
31
] | [
null
] | [
24
] | [
36
] | |
2024-11-18T19:19:07.829467+00:00 | 1,637,477,487,000 | 2596d51a076e02510cb155628098a2f6c05dec73 | 3 | {
"blob_id": "2596d51a076e02510cb155628098a2f6c05dec73",
"branch_name": "refs/heads/main",
"committer_date": 1637477487000,
"content_id": "93f02e665ea4f589bafaf2281078cb3c6e230fad",
"detected_licenses": [
"MIT"
],
"directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b",
"extension": "py",
"file... | 2.875 | stackv2 | #!/usr/bin/env python3
import subprocess
import tempfile
import fuckpy3 #pylint:disable=unused-import
import os
ARCHITECTURES = { "aarch64", "riscv64" }
THRESHOLD = int(os.environ.get('THRESHOLD', 1000))
def main():
print("Historically, shellcode was judged by what it could do. This outmoded")
print("way of ... | 60 | 44 | 137 | 20 | 696 | python | [{"finding_id": "codeql_py/overly-permissive-file_48ee301f379c2fc8_7522224c", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
36
] | [
null
] | [
13
] | [
36
] | |
2024-11-18T19:19:12.666101+00:00 | 1,549,935,707,000 | d2ff5f7a12fca2f0bda491616280031d8f18b9ac | 3 | {
"blob_id": "d2ff5f7a12fca2f0bda491616280031d8f18b9ac",
"branch_name": "refs/heads/master",
"committer_date": 1549935707000,
"content_id": "2cf33999f0a40685b9d6cbab306c5e56e7263ac6",
"detected_licenses": [
"MIT"
],
"directory_id": "f711a5a863c6e747f4960ca20555118efba99851",
"extension": "py",
"fi... | 2.75 | stackv2 | # This file needs to be run in your working directory. From there, this code will create a folder called svhn_pytorch
# where all the data will be loaded and converted to images.
# The folder structure needed for Dataloader will also be created using this file.
import warnings
warnings.filterwarnings("ignore")
impor... | 179 | 36.43 | 120 | 15 | 1,457 | python | [{"finding_id": "codeql_py/overly-permissive-file_f4c695d22f767e30_c5fdc8d1", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 4 | true | [
"CWE-732",
"CWE-732",
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file",
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable."
] | [
35,
51,
71,
88
] | [
null,
null,
null,
null
] | [
5,
9,
9,
9
] | [
33,
37,
37,
37
] | |
2024-11-18T19:29:35.650450+00:00 | 1,624,177,955,000 | 41da83248b54f09a4ac8f1afd07a5dd0994b16cd | 3 | {
"blob_id": "41da83248b54f09a4ac8f1afd07a5dd0994b16cd",
"branch_name": "refs/heads/master",
"committer_date": 1624177955000,
"content_id": "f71c1852ffabfd6520c29aa0e5896783707f3f65",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "7f18a68d517cc3711efc4861295f686ac3398337",
"extension": "p... | 2.96875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
PyHtmlCv is a tool to that can be used to generate HTML CVs from a
simple JSON configuration.
:copyright: (c) 2012-2019 Janne Enberg
:license: BSD
"""
from argparse import ArgumentParser, ArgumentTypeError
import codecs
from datetime import datetime
from jinja2 import... | 347 | 27.12 | 86 | 20 | 2,132 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_08a7991fc71f7f33_e9c77a2e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
86
] | [
null
] | [
11
] | [
62
] | |
2024-11-18T19:29:42.244656+00:00 | 1,510,940,933,000 | a239267442a822682dddb89348d84c0c5c91190a | 2 | {
"blob_id": "a239267442a822682dddb89348d84c0c5c91190a",
"branch_name": "refs/heads/master",
"committer_date": 1510940933000,
"content_id": "7ef407ee6e4bb4c7d0534559c5629b3d4485d47b",
"detected_licenses": [
"MIT"
],
"directory_id": "19d79d39ed05e5893d557d80a86ed12e1a7195f9",
"extension": "py",
"fi... | 2.46875 | stackv2 | from django.db import transaction
from SocialNetwork_API.models import *
from SocialNetwork_API.services.base import BaseService
from datetime import datetime, timedelta
class ApiService(BaseService):
@classmethod
def save(cls, user, instance=None):
try:
token = cls.gen_token(user.id)
... | 37 | 27.95 | 55 | 16 | 221 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_046c2881549f6cfb_090b275b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
32
] | [
null
] | [
35
] | [
55
] | |
2024-11-18T19:44:18.023386+00:00 | 1,629,161,487,000 | c72e45ffc81cb01b26e2aaa7ccb0e3dff0a17d46 | 3 | {
"blob_id": "c72e45ffc81cb01b26e2aaa7ccb0e3dff0a17d46",
"branch_name": "refs/heads/master",
"committer_date": 1629161567000,
"content_id": "c270d9effd63d5581665556851f1b66e2232fba9",
"detected_licenses": [
"MIT"
],
"directory_id": "e0e720a01a0cbb9316e525ee57bdbe6b2328345e",
"extension": "py",
"fi... | 2.625 | stackv2 | import logging
import os
import threading
import time
import traceback
import webbrowser
from argparse import ArgumentParser
from pathlib import Path
from urllib.request import urlopen
from flask import Flask, json, jsonify, request, send_from_directory
from flask_cors import CORS
import handlers
__doc__ = """
A Fla... | 181 | 28.56 | 87 | 17 | 1,190 | python | [{"finding_id": "codeql_py/stack-trace-exposure_1b1405fa68059555_b99a77a5", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-022"
] | [
"py/stack-trace-exposure",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This path depends on a [user-provided value](1)."
] | [
115,
41
] | [
null,
null
] | [
13,
8
] | [
83,
9
] | |
2024-11-18T19:44:31.349096+00:00 | 1,390,366,035,000 | a3f91a623f84055da64b7a65e1230c80adc91b48 | 3 | {
"blob_id": "a3f91a623f84055da64b7a65e1230c80adc91b48",
"branch_name": "refs/heads/master",
"committer_date": 1390366035000,
"content_id": "d7f8480f131fb214731be9271f0cc097446b4da0",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "1542825af8b1b04dd62fa294f9e382972fbca05f",
"extension": "p... | 2.65625 | stackv2 | import bottle
from bottle import get, put, delete
import restware
# Holds the data for function that this example API is trying to implement for some one
keyStoreD = {}
@get("/")
def root():
# Returns some documentation for the user to look at
# Consider using Sphinx and sphinxcontrib-httpdomain .. but this i... | 52 | 34.33 | 127 | 13 | 486 | python | [{"finding_id": "codeql_py/stack-trace-exposure_1061a0452fb64503_2a5aac9a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
30
] | [
null
] | [
16
] | [
65
] | |
2024-11-18T19:44:41.087539+00:00 | 1,687,780,470,000 | 204258bbe8310ac15b39f583f94866dba361b4e4 | 2 | {
"blob_id": "204258bbe8310ac15b39f583f94866dba361b4e4",
"branch_name": "refs/heads/main",
"committer_date": 1687780470000,
"content_id": "a7886b6a07c22b5f9a4ed413d5ce62eb8bf8df24",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "34bef62a6f45879233dc302a56d2427d5d02ce73",
"extension": "py",
... | 2.4375 | stackv2 | # See the NOTICE file distributed with this work for additional information
# regarding copyright ownership.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.a... | 146 | 39.27 | 117 | 16 | 1,444 | python | [{"finding_id": "codeql_py/redos_1c8ad092af05eff4_26e0947f", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetition... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetitions of 'a'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'a@a' and containing many repetitions of 'a'."
] | [
23,
23
] | [
null,
null
] | [
36,
52
] | [
39,
55
] | |
2024-11-18T19:57:58.749239+00:00 | 1,623,189,717,000 | 1e41ef5211ddb805024db37d4beb0ca0f95c88f5 | 2 | {
"blob_id": "1e41ef5211ddb805024db37d4beb0ca0f95c88f5",
"branch_name": "refs/heads/main",
"committer_date": 1623189717000,
"content_id": "669fc242d23c91fdcae1f52cca9c6c99a3217d13",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "855e2a135510bc4efcfa92e21b964e17a8778dd7",
"extension": "py",
... | 2.359375 | stackv2 | import os
import re
from typing import Mapping, Sequence
import pulumi_aws as aws
from typing_extensions import Final
import pulumi
# This will be incorporated into various infrastructure object names.
DEPLOYMENT_NAME = pulumi.get_stack()
def _validate_deployment_name() -> None:
# ^ and $ capture the whole str... | 120 | 29.94 | 120 | 14 | 909 | python | [{"finding_id": "codeql_py/redos_e2b499f19ffdd5c7_e734b3f7", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetition... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetitions of '0'."
] | [
19
] | [
null
] | [
43
] | [
52
] | |
2024-11-18T19:58:05.488381+00:00 | 1,610,696,818,000 | c218f8221cdc939219999bfcd49c451f09a2d3b5 | 3 | {
"blob_id": "c218f8221cdc939219999bfcd49c451f09a2d3b5",
"branch_name": "refs/heads/master",
"committer_date": 1610696818000,
"content_id": "7a68658ab1a2a2d3c4a54e83966eed577c08cdff",
"detected_licenses": [
"MIT"
],
"directory_id": "356e489fc479f39583235dd4450ace4c93db260c",
"extension": "py",
"fi... | 3.28125 | stackv2 | import os
from Crypto.Cipher import AES
key = os.urandom(16)
cipher = AES.new(key, AES.MODE_ECB)
plaintext1 = "this is a secret that must be always kept hidden"
plaintext2 = " that can be revealed to anyone!"
cipertext1 = cipher.encrypt(plaintext1)
cipertext2 = cipher.encrypt(plaintext2)
print cipher.decrypt(cipert... | 25 | 25.92 | 63 | 8 | 185 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_767f6407257876bb_6ed4927a", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
10,
11,
13
] | [
null,
null,
null
] | [
14,
14,
7
] | [
40,
40,
51
] | |
2024-11-18T19:58:06.087420+00:00 | 1,528,046,283,000 | d20e1d3f8fae8f610bb5c460becf3f62047a6a7c | 3 | {
"blob_id": "d20e1d3f8fae8f610bb5c460becf3f62047a6a7c",
"branch_name": "refs/heads/master",
"committer_date": 1528046283000,
"content_id": "0ff2267875710d2c97c60702f5f7340c05b64bd9",
"detected_licenses": [
"MIT"
],
"directory_id": "7fdc32256d8cb0a269fa98b25d508b29f0f2d8ce",
"extension": "py",
"fi... | 3.09375 | stackv2 | import hashlib
from auth.auth_exceptions import UserAlreadyExistException, UserNotExistException, \
PasswordMissmatchException, PasswordTooShortException, NotLoggedInError, NotPermittedError
class User:
def __init__(self, username, password):
self.username = username
self.pwd = self.encr_pwd(... | 94 | 29.78 | 94 | 14 | 578 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6f00f53f11b4673c_0a818c1b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
20
] | [
null
] | [
31
] | [
42
] | |
2024-11-18T19:58:13.016014+00:00 | 1,378,477,811,000 | eb0c3bdc2d04bc37570146f9b0946a5e7a40ab4d | 3 | {
"blob_id": "eb0c3bdc2d04bc37570146f9b0946a5e7a40ab4d",
"branch_name": "refs/heads/master",
"committer_date": 1378477811000,
"content_id": "f95d7260126e3886b418c6a47120824c142e8bb6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "699fd9b6d59d095a2034ac88c42e23a90a09cd38",
"extension": "py"... | 2.984375 | stackv2 | #!/usr/bin/python
'''Return the data for a shadow-hash file suitable for use in MacOS X'''
__version__ = 371 # formerly: int('$Revision: 452 $'.split(" ")[1])
def getShadowHashData(password, seedIntInput=None):
import random, struct, hashlib
'''A python re-write of the shadowHash PHP script by Pete Akins, Cincin... | 71 | 36.1 | 160 | 15 | 696 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_978bb6ff689c2f3d_8a1f8f27", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-327"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.",
"[Sensitive data (password)](1) ... | [
66,
69,
20
] | [
null,
null,
null
] | [
19,
9,
33
] | [
33,
23,
54
] | |
2024-11-18T19:58:22.454395+00:00 | 1,550,222,245,000 | ec199b451bcb2b3c29e430589d56b6b4cadaccf2 | 2 | {
"blob_id": "ec199b451bcb2b3c29e430589d56b6b4cadaccf2",
"branch_name": "refs/heads/master",
"committer_date": 1550222245000,
"content_id": "f6b190dc15ade17087868dd480090b6116cfb756",
"detected_licenses": [
"MIT"
],
"directory_id": "a88fb62ae1d1a2b13c54f312bd83cf608a33cc34",
"extension": "py",
"fi... | 2.328125 | stackv2 | from time import time
from flask import request, jsonify
from .models import User, UserToken, Timer, Task
from .core import db
def get_user():
token = request.args.get('token') or \
request.headers.get('Authorization', '').replace('Bearer ', '')
if not token:
raise Exception('no token')
... | 123 | 27.78 | 99 | 15 | 892 | python | [{"finding_id": "codeql_py/stack-trace-exposure_1eae73e35a137f7a_89824951", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 7 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
25,
37,
52,
67,
86,
101,
117
] | [
null,
null,
null,
null,
null,
null,
null
] | [
24,
24,
24,
24,
24,
24,
24
] | [
41,
41,
41,
41,
41,
41,
41
] | |
2024-11-18T20:10:16.558016+00:00 | 1,530,528,533,000 | 986dc9e07f5728b48dee6c0873e414b4bd4880c1 | 2 | {
"blob_id": "986dc9e07f5728b48dee6c0873e414b4bd4880c1",
"branch_name": "refs/heads/master",
"committer_date": 1530528533000,
"content_id": "4ca1aafb20c2e5851c43724e92c07a907cc3a3b9",
"detected_licenses": [
"MIT"
],
"directory_id": "626d59667c6cb98a8cb58b0e6c64303177f64e2b",
"extension": "py",
"fi... | 2.375 | stackv2 | import json
from flask import jsonify
from flask import request
from flask import redirect
from flask import render_template
from app import app
import os
import time
import subprocess
import sqlite3
from itsdangerous import TimedJSONWebSignatureSerializer as Serializer
import itsdangerous
SECRET_KEY = 'I love you mor... | 233 | 25.94 | 101 | 14 | 1,537 | python | [{"finding_id": "codeql_py/path-injection_b6c42003bc9a506c_9d3fb34d", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
170
] | [
null
] | [
49
] | [
53
] | |
2024-11-18T20:10:33.806989+00:00 | 1,581,934,442,000 | 1e01d6b2cde8bb13d856d16d14252de1ab53fc59 | 3 | {
"blob_id": "1e01d6b2cde8bb13d856d16d14252de1ab53fc59",
"branch_name": "refs/heads/master",
"committer_date": 1581934442000,
"content_id": "ee629adeefdb7011591dc47e6fe94d4951e593cd",
"detected_licenses": [
"MIT"
],
"directory_id": "b8b5a9dda6e2400432c3d8cf92d9ba4dde47742f",
"extension": "py",
"fi... | 3.25 | stackv2 | #!/usr/bin/env python3.6
import random
import string
import pyperclip
from userData import UserData
from required_data import RequiredData
import sys
sys.setrecursionlimit(10**6)
def new_users(name_first, name_two, email_adress, user_name, pass_word):
"""
It creates a new user
"""
new_user = UserData(... | 192 | 26.76 | 129 | 19 | 1,006 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e1c5a94d5a509ac7_e16b64f4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.",
"This expression logs [sensitive data (p... | [
115,
165,
177
] | [
null,
null,
null
] | [
19,
19,
25
] | [
65,
60,
125
] | |
2024-11-18T20:23:16.862275+00:00 | 1,599,014,389,000 | c2105dc708f58782ed11d1055287baede5877766 | 3 | {
"blob_id": "c2105dc708f58782ed11d1055287baede5877766",
"branch_name": "refs/heads/master",
"committer_date": 1599014389000,
"content_id": "e8daf897752e4de86dd3cf36ff7b67716e122a70",
"detected_licenses": [
"MIT"
],
"directory_id": "31d1d6a0c888645d64b9134833fdb95e23bfd63e",
"extension": "py",
"fi... | 2.5625 | stackv2 | ####
# Author: Max Miller
# Last Modified: Sept 1st, 2020
# About:
# This script launches a new AWS EC2 instance with a running base Django application.
####
import boto3 as bt
import botocore as bc
import paramiko
import time
client = bt.client('ec2')
resource = bt.resource('ec2')
key_name = 'ec2'
max_ssh_attempts... | 84 | 30.12 | 87 | 16 | 616 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2c1f967c18fb0945_22156816", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
37
] | [
null
] | [
null
] | [
61
] | |
2024-11-18T20:49:25.305415+00:00 | 1,691,007,356,000 | b47ad0db27f1ba4a1779c113075460c808896730 | 3 | {
"blob_id": "b47ad0db27f1ba4a1779c113075460c808896730",
"branch_name": "refs/heads/main",
"committer_date": 1691007356000,
"content_id": "7447b4284346e60ec5e131a2060cd4ea8d86d146",
"detected_licenses": [
"ECL-2.0"
],
"directory_id": "c5cfdd597888fa2281cf7169b914203454c8f14e",
"extension": "py",
"... | 2.578125 | stackv2 | """ create patron record via Koha REST API """
import urllib3
import requests
from koha_mappings import category
from .config import config
# ByWater's SSL cert causes problems so every request has verify=False
# and we do this to silence printed warnings
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestW... | 69 | 27.99 | 79 | 11 | 463 | python | [{"finding_id": "codeql_py/request-without-cert-validation_cfe6224088dcf563_6b372381", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
24,
49
] | [
25,
50
] | [
16,
16
] | [
54,
73
] | |
2024-11-18T20:50:12.483035+00:00 | 1,409,656,018,000 | e92db3fdb3002e19444096f71599fa622a5ce06e | 2 | {
"blob_id": "e92db3fdb3002e19444096f71599fa622a5ce06e",
"branch_name": "refs/heads/master",
"committer_date": 1409656018000,
"content_id": "abf23bc31355742ef78251da9b2d3f3790d88b0c",
"detected_licenses": [
"MIT"
],
"directory_id": "ea269a7f969f1c67ac8acd4ea070a374c02fe581",
"extension": "py",
"fi... | 2.328125 | stackv2 | # -*- coding: utf-8 -*-
from flask import Flask
from flask import request, Response
import xmltodict
import requests
import json
import urllib
app = Flask(__name__)
# Add zoomvalues to the JSON result
addZoomValues = True
# Dictionary holding navnetype and zoomlevel
zoomValues = {
u"By": 12,
u"Kommune": 1... | 84 | 22.3 | 77 | 18 | 589 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b22ce613c2acb54c_3cc1a48f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
61
] | [
null
] | [
9
] | [
40
] | |
2024-11-18T20:50:16.969938+00:00 | 1,240,611,665,000 | 50cd7b9491a77a1aa5380df227137b990d559742 | 2 | {
"blob_id": "50cd7b9491a77a1aa5380df227137b990d559742",
"branch_name": "refs/heads/master",
"committer_date": 1240611665000,
"content_id": "add6ba10642ce70bfbbaa4dc47799b010a70d31c",
"detected_licenses": [
"MIT"
],
"directory_id": "78bab5f84e4f69b5c5ecabc13f792b8145243443",
"extension": "py",
"fi... | 2.375 | stackv2 | # bot.py
#
# Pubsub Client Bot - Listens to pubsub events for new blog entries.
#
import time
import datetime
import os
import cPickle as pickle
import sqlite3
from twisted.python import log
from twisted.internet import defer, task, reactor
from twisted.words.xish import domish, xpath
from wokkel.pubsub import PubSubC... | 249 | 29.76 | 95 | 17 | 1,698 | python | [{"finding_id": "codeql_py/overly-permissive-file_5992a57ebd72a6d2_990476d0", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
131
] | [
null
] | [
9
] | [
34
] | |
2024-11-18T20:51:17.990703+00:00 | 1,609,572,372,000 | 58c49cabac03a4b89885bc23159faccb43c1b1fa | 2 | {
"blob_id": "58c49cabac03a4b89885bc23159faccb43c1b1fa",
"branch_name": "refs/heads/master",
"committer_date": 1609572372000,
"content_id": "65737c116f183fde351e23dfd8bef080f6dc5f65",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "89c8741533b37d8408e441c1cb883b6d0e887535",
"extension": "p... | 2.328125 | stackv2 | # -*- coding:utf-8 -*-
import binascii
import click, logging, os, sys
from datetime import datetime
from server import create_app
from flask.cli import FlaskGroup, ScriptInfo
from server.module import db
from sqlalchemy_utils import database_exists, create_database
from server.models.user import User, Permission
from j... | 164 | 37.85 | 83 | 16 | 1,382 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_bc6b08e45093d651_0566921b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
111
] | [
113
] | [
18
] | [
6
] | |
2024-11-18T20:51:23.133652+00:00 | 1,625,028,548,000 | 3048207fd1b196dc752cb8b416d7c3803e35f6c9 | 2 | {
"blob_id": "3048207fd1b196dc752cb8b416d7c3803e35f6c9",
"branch_name": "refs/heads/master",
"committer_date": 1625028548000,
"content_id": "5218af02f4b6aa6f53069c56f2dd9e2a21ecb668",
"detected_licenses": [
"MIT"
],
"directory_id": "af7e55f59ef6590facaaf7f3baccbc1ea7ff8672",
"extension": "py",
"fi... | 2.4375 | stackv2 | # -*- coding: utf-8 -*-
from http.server import BaseHTTPRequestHandler, HTTPServer
import socketserver
import os, sys, json, io, gc, base64
from PyPDF2 import PdfFileWriter, PdfFileReader
from reportlab.pdfgen import canvas
from reportlab.lib.units import mm
from reportlab.pdfbase import pdfmetrics
from reportlab.p... | 147 | 28.88 | 84 | 17 | 992 | python | [{"finding_id": "codeql_py/path-injection_8fbcd4b2c7cf86e7_7c364324", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
123,
135
] | [
null,
null
] | [
19,
27
] | [
23,
37
] | |
2024-11-18T20:51:25.805817+00:00 | 1,422,944,627,000 | 0c04d95ef673cd4a67869c9e34d2cef236f08eaf | 3 | {
"blob_id": "0c04d95ef673cd4a67869c9e34d2cef236f08eaf",
"branch_name": "refs/heads/master",
"committer_date": 1422944627000,
"content_id": "d6dc7c8c22e98a1dc710f14a3f66345de65b1bb9",
"detected_licenses": [
"MIT"
],
"directory_id": "35cc80dd1b43e5a02a074e0010b298bc66b10af1",
"extension": "py",
"fi... | 2.78125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import sys
from urllib import urlencode, urlopen
__version__ = '0.2.0'
help = """
%s
program [status | login | logout]
status show login status
login login
logout logout
""" % __version__
class MD6(object):
def mc(self, a):
ret =... | 144 | 23.77 | 55 | 20 | 926 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_007caaa75e644d68_74165915", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
112
] | [
null
] | [
19
] | [
44
] | |
2024-11-18T20:51:26.541794+00:00 | 1,658,852,434,000 | a8ceb07249c0101fc1aae14f2894616a6b07aa7b | 3 | {
"blob_id": "a8ceb07249c0101fc1aae14f2894616a6b07aa7b",
"branch_name": "refs/heads/master",
"committer_date": 1658852434000,
"content_id": "f7398cd89e326e9453c3ce94ad448b5d8dce5e1c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "724330fcec05309b64762c65b0aab6a8e9404097",
"extension": "py"... | 2.515625 | stackv2 | #!/usr/bin/env python
# note we'll use glue to assemble a css sprite
# for now we use this to pickup the images we want, convert
# from svg to png in our preferred size
import click
import cairosvg
import os
from pathlib import Path
from jinja2 import Template
from apichanges.icons import ICON_SERVICE_MAP
CSS_BUILD... | 80 | 28.55 | 70 | 18 | 540 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ec0c85ad8898fecf_49d7932e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
73
] | [
74
] | [
18
] | [
61
] | |
2024-11-18T20:51:30.832339+00:00 | 1,380,775,193,000 | a73235151cda432ea9da01efd45e42ddd72f927d | 3 | {
"blob_id": "a73235151cda432ea9da01efd45e42ddd72f927d",
"branch_name": "refs/heads/master",
"committer_date": 1380775193000,
"content_id": "87bd6e08d0d686ec4d54af078ffcf28551cc65a8",
"detected_licenses": [
"MIT"
],
"directory_id": "51722958a06d777ac1666fd60ea34975447b2541",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/env python
# encoding=utf-8
import os
import sys
import uuid
from flask import Flask, render_template, request, send_file
import concatss
INPUT_DIR = os.path.dirname(os.path.abspath(__file__)) + '/input'
OUTPUT_DIR = os.path.dirname(os.path.abspath(__file__)) + '/output'
IMAGE_NAME_PREFIX = 'image'
ACCEPT... | 59 | 33.19 | 78 | 18 | 418 | python | [{"finding_id": "codeql_py/flask-debug_a54dc1e2b39890af_4db94a43", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
59,
25
] | [
null,
null
] | [
5,
22
] | [
40,
43
] | |
2024-11-18T21:13:59.810299+00:00 | 1,602,834,468,000 | fdf5ec42caaad7d401f39caed55e16ec6da30cac | 3 | {
"blob_id": "fdf5ec42caaad7d401f39caed55e16ec6da30cac",
"branch_name": "refs/heads/master",
"committer_date": 1602834468000,
"content_id": "1195bc1b797f2a8373d412b319d73de8a8faec70",
"detected_licenses": [
"MIT"
],
"directory_id": "c8a716889ced199354f2b877cb8b50d4df8af081",
"extension": "py",
"fi... | 2.78125 | stackv2 | import os
import platform
import sys
from flask import Flask
from flask import render_template
from flask import request
from flask import abort, redirect, url_for
app = Flask(__name__, template_folder='templates')
def sys_setup():
"""
Checking the platform on which the script is running and setting up for ... | 66 | 24.05 | 79 | 13 | 384 | python | [{"finding_id": "codeql_py/command-line-injection_d46b6261e27bac62_3cce7579", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 1 | true | [
"CWE-078"
] | [
"py/command-line-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1)."
] | [
56
] | [
null
] | [
25
] | [
32
] | |
2024-11-18T21:14:22.276399+00:00 | 1,462,467,060,000 | 3f0f650a53220979cb73caafa2fee55d8f57af2e | 2 | {
"blob_id": "3f0f650a53220979cb73caafa2fee55d8f57af2e",
"branch_name": "refs/heads/master",
"committer_date": 1462467060000,
"content_id": "7852a67225fc6e3b589d3f76552df904d35ec6fb",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8330b39fdb22e8c537c668861e81c099094051b4",
"extension": "py"... | 2.390625 | stackv2 | """
This file contains user management functions that get called directly from the
browser through angular.
"""
import string
import random
from django.conf import settings
from django.http import JsonResponse, HttpResponse
from django.shortcuts import redirect
from swiftclient import client
from swiftbrowser.utils im... | 135 | 29.51 | 78 | 15 | 884 | python | [{"finding_id": "codeql_py/stack-trace-exposure_dbd0983498ad7537_34ff1c75", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
49,
79,
104,
133
] | [
null,
null,
null,
null
] | [
29,
29,
29,
29
] | [
30,
30,
30,
30
] | |
2024-11-18T20:10:50.392273+00:00 | 1,632,496,816,000 | 3ff0284a5fc64080246c26906fac65ced74415ee | 2 | {
"blob_id": "3ff0284a5fc64080246c26906fac65ced74415ee",
"branch_name": "refs/heads/master",
"committer_date": 1632496816000,
"content_id": "3016be9504790f8faef55c881a377863f3b650ad",
"detected_licenses": [
"MIT"
],
"directory_id": "5e0570044906a7395b9ea617ccf7ad4ec8c7aff2",
"extension": "py",
"fi... | 2.421875 | stackv2 | from flask import Flask, send_file, send_from_directory, request
from werkzeug.utils import secure_filename
import subprocess
import random
import string
import tempfile
import tarfile
class CompileError(ValueError):
pass
def get_random_filename(length=15):
result = ''.join((random.choice(string.ascii_low... | 153 | 30.52 | 84 | 18 | 1,178 | python | [{"finding_id": "codeql_py/stack-trace-exposure_e8936b58c2f531cd_31d484ed", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
115
] | [
117
] | [
20
] | [
14
] | |
2024-11-18T20:10:53.386994+00:00 | 1,630,239,658,000 | 822ec2871fa361ff55f004944c7040b88ba43f11 | 3 | {
"blob_id": "822ec2871fa361ff55f004944c7040b88ba43f11",
"branch_name": "refs/heads/main",
"committer_date": 1630239658000,
"content_id": "f24896994e93735ed62880b41d7c6b3606042972",
"detected_licenses": [
"MIT"
],
"directory_id": "accc9921ffb9761cd235e40aefdaa577047ec01a",
"extension": "py",
"file... | 2.953125 | stackv2 | import os
import pickle
print(
"///////////////****************//////////////*****************/////////////////*****************///////////////////******************//////////")
print(
"----------------------------------------------------- 5 STAR HOTEL AND RESORTS ----------------------------------------------... | 327 | 24.19 | 151 | 20 | 2,172 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b4e57eca0c1827ce_95cca899", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
153,
302
] | [
null,
null
] | [
30,
48
] | [
44,
59
] | |
2024-11-18T21:11:33.002060+00:00 | 1,682,511,684,000 | 6bac32a65e1511da39a5834cd815d7e34844a9bb | 2 | {
"blob_id": "6bac32a65e1511da39a5834cd815d7e34844a9bb",
"branch_name": "refs/heads/master",
"committer_date": 1682511684000,
"content_id": "f06ed7734fff99100c8491b5baa8f05b19d7f5ed",
"detected_licenses": [
"MIT"
],
"directory_id": "62c7fa206bd6dcdd70c25c49247eb8d93776810f",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
import base64
import json
import logging
import os
import re
import requests
import sys
import urllib
import jinja2
import sys
VARIABLES = {
"CONCOURSE_URL": "The URL through which we'll force resource checks",
"SLACK_WEBHOOK_URL": "The URL of the Slack webhook ... | 128 | 31.19 | 119 | 15 | 927 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_13f0b338eff73b5d_bc22b740", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
32
] | [
null
] | [
11
] | [
44
] | |
2024-11-18T21:11:36.203208+00:00 | 1,531,777,623,000 | 66396f95ff0c6d451751b28b674afd715cfa960f | 3 | {
"blob_id": "66396f95ff0c6d451751b28b674afd715cfa960f",
"branch_name": "refs/heads/master",
"committer_date": 1531777623000,
"content_id": "aad8ab9cec1486026051f4fd8fa58d8595c5dfd6",
"detected_licenses": [
"MIT"
],
"directory_id": "075cbf6d8ef760d553a2b752f378f1cc965e70ea",
"extension": "py",
"fi... | 2.765625 | stackv2 | '''
MIT License
Copyright (c) 2018 Greg James
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, di... | 73 | 33.26 | 89 | 13 | 584 | python | [{"finding_id": "codeql_py/partial-ssrf_900a9cfcc4d5ef88_466e375f", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
30
] | [
null
] | [
16
] | [
36
] | |
2024-11-18T21:11:45.122666+00:00 | 1,664,218,587,000 | cd9989c7b263b519780f19e903b12e60a7ee71f4 | 3 | {
"blob_id": "cd9989c7b263b519780f19e903b12e60a7ee71f4",
"branch_name": "refs/heads/master",
"committer_date": 1664218587000,
"content_id": "c6fc96391928a8e2a2b30aedfb41842717e1a17a",
"detected_licenses": [
"MIT"
],
"directory_id": "3d29a9ecd12c439141921945177c5226c789c671",
"extension": "py",
"fi... | 2.703125 | stackv2 | import json
import requests
import logging.config
from datetime import datetime
logging.config.fileConfig("logging.ini", disable_existing_loggers=False)
logger = logging.getLogger(__name__)
# Dark Sky API
DARK_SKY_KEY = "81c07948c439765d630c4c60fc56634e"
def dark_sky_temp_time_series(lat, lon):
forecast_url = "... | 70 | 33.11 | 108 | 12 | 560 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8afe04c3e6fefa6e_faf8c731", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
26
] | [
null
] | [
17
] | [
108
] | |
2024-11-18T21:25:52.200114+00:00 | 1,497,215,575,000 | 3e9798aa40ab13b85ddda8a6965aa67d15feb324 | 2 | {
"blob_id": "3e9798aa40ab13b85ddda8a6965aa67d15feb324",
"branch_name": "refs/heads/master",
"committer_date": 1497215575000,
"content_id": "b67eb495c43c64bd99122149de5f98a8537692b0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1bb24262a34bcfd43a0dedc82b22248307614777",
"extension": "py"... | 2.375 | stackv2 | from __future__ import print_function
from geoInfo.MaxMindRepo import MaxMindRepo
import sys
import traceback
#if len(sys.argv) != 2:
# print('Give me an IP to geolocate.')
maxmind = MaxMindRepo('/home3/akshah/akshah_cron_bin/latest_maxmind_bin')
#maxmind = MaxMindRepo()
print('Using bin file: '+maxmind.binFileLoca... | 25 | 34.32 | 89 | 22 | 237 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d117a72abb73b549_b5f77a5c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
21
] | [
22
] | [
15
] | [
85
] | |
2024-11-18T21:26:10.479552+00:00 | 1,609,691,069,000 | 086909fbb5759d7cfde1265392026412a3360220 | 3 | {
"blob_id": "086909fbb5759d7cfde1265392026412a3360220",
"branch_name": "refs/heads/main",
"committer_date": 1609691069000,
"content_id": "5b487683c92b4ac798afb746ab158c900e5763e2",
"detected_licenses": [
"MIT"
],
"directory_id": "abfa65aec5dc5c8c6fc9242a3df880cf7630f810",
"extension": "py",
"file... | 2.875 | stackv2 | import sqlite3
import streamlit as st
import pandas as pd
usage_mode = st.text
def get_current_date_and_time():
# it will get the time zone
# of the specified location
IST = pytz.timezone('Asia/Kolkata')
datetime_ist = datetime.now(IST)
return datetime_ist.strftime('%Y:%m:%d %H:%M:%S')
s... | 85 | 32.27 | 108 | 14 | 681 | python | [{"finding_id": "codeql_py/sql-injection_dede6d7a6524a648_2ca636f9", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
61
] | [
null
] | [
32
] | [
51
] | |
2024-11-18T21:52:17.517819+00:00 | 1,690,909,021,000 | fbdbf52854d56fe8b37a9bcf199cb9340ded4605 | 3 | {
"blob_id": "fbdbf52854d56fe8b37a9bcf199cb9340ded4605",
"branch_name": "refs/heads/master",
"committer_date": 1690909021000,
"content_id": "030a9630f649043f20609bc9d3480a4890e50b7e",
"detected_licenses": [
"MIT"
],
"directory_id": "65d405aa1f44b91c6fb421c2310edbdf5727c9e3",
"extension": "py",
"fi... | 2.6875 | stackv2 | from __future__ import annotations
import re
from hashlib import sha1
from html.entities import name2codepoint
# Implementation directly copied from Anki (anki/anki/utils.py).
# Only a bit of PEP8ing and making things private.
_reComment = re.compile("(?s)<!--.*?-->")
_reStyle = re.compile("(?si)<style.*?>.*?</style... | 77 | 25.42 | 75 | 21 | 546 | python | [{"finding_id": "codeql_py/bad-tag-filter_c5a74bc6a3542afa_07c04b0f", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match script end tags like </script >.", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match script end tags like </script >."
] | [
12
] | [
null
] | [
25
] | [
53
] | |
2024-11-18T20:31:22.835309+00:00 | 1,629,297,847,000 | ffe4da2379df4d93f3e0c38d340f6f4572cc0c50 | 2 | {
"blob_id": "ffe4da2379df4d93f3e0c38d340f6f4572cc0c50",
"branch_name": "refs/heads/main",
"committer_date": 1629297847000,
"content_id": "7241ceea4d6ea47ad28fb74113fcfb8391db7420",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "50f3930d34cd2522fcef1e40f9d990e2baf1cb39",
"extension": "py",
... | 2.4375 | stackv2 | import json
import random
import hashlib
from urllib import parse
import http.client
from tqdm import tqdm
from collections import defaultdict
from bs4 import BeautifulSoup as bs
class BaiduTranslate:
def __init__(self, fromLang, toLang):
self.url = "/api/trans/vip/translate"
self.appid = "202003... | 82 | 27.98 | 91 | 22 | 602 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d83ce35772611c85_1d6c994a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
24
] | [
null
] | [
19
] | [
48
] | |
2024-11-18T20:31:32.601908+00:00 | 1,412,283,449,000 | 2d161f99014eb3ac03a0223846af4a92f1806de1 | 3 | {
"blob_id": "2d161f99014eb3ac03a0223846af4a92f1806de1",
"branch_name": "refs/heads/master",
"committer_date": 1412283449000,
"content_id": "45dbf8ae0a2ee8e69b7eeea501ce7d1be71ff10f",
"detected_licenses": [
"BSD-3-Clause",
"MIT"
],
"directory_id": "c464524ce4a83d18b676f6d04fd00650d9c27a2b",
"ext... | 2.6875 | stackv2 | # Copyright 2013, Sandia Corporation. Under the terms of Contract
# DE-AC04-94AL85000 with Sandia Corporation, the U.S. Government retains certain
# rights in this software.
"""Functions for managing cached remote ssh sessions.
Slycat makes extensive use of ssh to communicate with remote resources, such
as the high p... | 194 | 33.55 | 172 | 18 | 1,564 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a0114166781e1def_1ce40dfe", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
123
] | [
null
] | [
5
] | [
62
] | |
2024-11-18T20:59:45.253591+00:00 | 1,559,481,653,000 | 0ffa3e12221997f2134eab8652de5d572ed45044 | 2 | {
"blob_id": "0ffa3e12221997f2134eab8652de5d572ed45044",
"branch_name": "refs/heads/master",
"committer_date": 1559481653000,
"content_id": "8ea56ac62653dcd97bc6e865741abe67fc1e68ca",
"detected_licenses": [
"MIT"
],
"directory_id": "b24dd9e7588f919047d1563a80cba02c080491c0",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import sys
import requests
import json
from aruba import Config, clearpass
# Ejemplo de conexión básica, con módulo Aruba.
# Realiza una conexión REST a un Clearpass
# Desactivo el log de certificado autofirmado.
import logging
logging.captureWarnings(True)
# Inicio un... | 29 | 29.59 | 96 | 11 | 212 | python | [{"finding_id": "codeql_py/request-without-cert-validation_49f36bbd41826334_fbb90677", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
24
] | [
null
] | [
16
] | [
97
] | |
2024-11-18T21:00:02.195825+00:00 | 1,378,693,134,000 | db2f52d8f9bb2801937985f29c883c2512f4cf55 | 3 | {
"blob_id": "db2f52d8f9bb2801937985f29c883c2512f4cf55",
"branch_name": "refs/heads/master",
"committer_date": 1378693134000,
"content_id": "164a27929b499fb1735d1c172904ada0941211e6",
"detected_licenses": [
"MIT"
],
"directory_id": "6955702ecc5231d4f43caa0a82925f7c5bc88a44",
"extension": "py",
"fi... | 2.90625 | stackv2 | import urllib2
from BeautifulSoup import *
import urlparse
from collections import deque
from networkx import *
import matplotlib.pyplot as plt
import networkx as nx
import socket
g=nx.Graph()
root_ip=socket.gethostbyname(urlparse.urlparse('http://clemson.edu').netloc)
g.add_node(root_ip)
done=set()
link_dic={}
link_... | 129 | 29.33 | 103 | 29 | 1,070 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_30ed051935e3df87_88a1aa6a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [clemson.edu](1) may be at an arbitrary position in the... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [clemson.edu](1) may be at an arbitrary position in the sanitized URL.",
"The string [clemson.edu](1) may be at an arbitrary position in the sanitized URL."
] | [
28,
120
] | [
null,
null
] | [
6,
51
] | [
36,
81
] | |
2024-11-18T21:23:47.907729+00:00 | 1,493,245,740,000 | 54755d32207e34acfbddd4c37ab8fb775c861102 | 3 | {
"blob_id": "54755d32207e34acfbddd4c37ab8fb775c861102",
"branch_name": "refs/heads/master",
"committer_date": 1493245740000,
"content_id": "e141b952b08ffee26dd476665607977ff93b63fa",
"detected_licenses": [
"MIT"
],
"directory_id": "8cb1a6d6f83c31cc9407d204afdd409d922b6ab1",
"extension": "py",
"fi... | 2.671875 | stackv2 | def isSelfpost(argData):
if "reddit.com" in argData["data"]["url"] and not "np.reddit.com" in argData["data"]["url"]:
return True
else:
return False
def isPreview(argData):
try:
i = argData["data"]["preview"]
return True
except:
return False
def determineType(ar... | 73 | 31.55 | 125 | 19 | 610 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_75d841b6af9697eb_b94635c5", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [reddit.com](1) may be at an arbitrary position in the ... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [reddit.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [np.reddit.com](1) may be at an arbitrary position in the sanitized URL."
] | [
2,
2
] | [
null,
null
] | [
8,
55
] | [
46,
96
] | |
2024-11-18T21:23:51.335500+00:00 | 1,508,836,926,000 | 9b9be3ceaed313f600c6233d51b4dce001e067c8 | 2 | {
"blob_id": "9b9be3ceaed313f600c6233d51b4dce001e067c8",
"branch_name": "refs/heads/master",
"committer_date": 1508836926000,
"content_id": "8f39d18cf37be6b5fd5d267304cf44caf24000b1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "dfc1738679ba45e22c232d1f573dc55814247cda",
"extension": "py"... | 2.484375 | stackv2 | #!/usr/bin/env python3
# -*- coding: UTF-8 -*-
import os,sys,time
import paramiko
import csv
import logging
import logging.config
# Read host list from CVS file
def readCVS(filename):
csv_reader = csv.reader(open(filename, 'r'))
return csv_reader
# Login Server
def loginServer(host,username,password):
st... | 113 | 38.87 | 126 | 21 | 884 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_4b4bab0107ed9f03_b4b778d8", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
19
] | [
null
] | [
5
] | [
62
] | |
2024-11-18T21:24:00.206600+00:00 | 1,604,811,082,000 | 49a43a4cf9e8b8f74b760feeb820096412cbf383 | 3 | {
"blob_id": "49a43a4cf9e8b8f74b760feeb820096412cbf383",
"branch_name": "refs/heads/main",
"committer_date": 1604811082000,
"content_id": "116ebf9035498326b0feb7789778b0ccddfbf606",
"detected_licenses": [
"MIT"
],
"directory_id": "d1df67c321b26b130207d95716767dd4cd828dec",
"extension": "py",
"file... | 3.28125 | stackv2 | import logging
from os import makedirs, listdir, getcwd, rename
import os.path as path
from shutil import rmtree
from subprocess import run, TimeoutExpired, CalledProcessError
from re import compile, findall, match, search, sub
from time import gmtime, strftime
putils_logger = logging.getLogger(__name__)
def create_d... | 428 | 37.83 | 127 | 17 | 3,355 | python | [{"finding_id": "codeql_py/overly-large-range_24460bb110ac9e64_89eb25bb", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
364
] | [
null
] | [
20
] | [
23
] | |
2024-11-18T21:24:02.043638+00:00 | 1,500,914,995,000 | 05623b52455f54170a7613e39843a7d12ef13a4c | 3 | {
"blob_id": "05623b52455f54170a7613e39843a7d12ef13a4c",
"branch_name": "refs/heads/master",
"committer_date": 1500914995000,
"content_id": "127bee6765c545e96e7c499e59944c175986dc99",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fc00da63c8bef5fbb11847e9055036dc03e283d0",
"extension": "py"... | 2.734375 | stackv2 | """Process YAML crowdsale definition files."""
import datetime
import time
from collections import OrderedDict
from typing import Dict
import ruamel.yaml
import jinja2
from eth_utils.currency import to_wei
from ruamel.yaml.comments import CommentedMap
from web3 import Web3
from web3.contract import Contract
from ico... | 125 | 26.74 | 120 | 15 | 798 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f426247ec5d4acaf_716d20ba", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
89
] | [
null
] | [
13
] | [
69
] | |
2024-11-18T21:37:45.531272+00:00 | 1,488,792,553,000 | f7a7342a23fb2516c07520b3373da386e64f228a | 3 | {
"blob_id": "f7a7342a23fb2516c07520b3373da386e64f228a",
"branch_name": "refs/heads/master",
"committer_date": 1488792553000,
"content_id": "dd116037033f2b82a2a49705734bef25f3194260",
"detected_licenses": [
"MIT"
],
"directory_id": "86c9f8f8a47ff268264460c196624ce52cab0a98",
"extension": "py",
"fi... | 2.515625 | stackv2 | import urlparse
from flask import Flask
from flask import request
import hashlib
import requests
import json
public_token = ""
app = Flask(__name__)
@app.route('/')
def home():
request_token = str(request.args.get("request_token"))
api_key = "dn9ld7rvexwulult"
api_secret = "cedkw4emw3c8ybdqoewturi131rv4... | 34 | 23.91 | 87 | 12 | 215 | python | [{"finding_id": "codeql_py/flask-debug_9c9a7c1a8f38bef7_7e4319f8", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-327"
] | [
"py/flask-debug",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
34,
22
] | [
null,
null
] | [
5,
24
] | [
24,
60
] | |
2024-11-18T21:59:09.284708+00:00 | 1,503,490,962,000 | e06db3abe465912d3c96a22c66be1a7f74de36ae | 3 | {
"blob_id": "e06db3abe465912d3c96a22c66be1a7f74de36ae",
"branch_name": "refs/heads/master",
"committer_date": 1503490962000,
"content_id": "8373031c736eb3877cb3d03d18fe6f318f961a14",
"detected_licenses": [
"MIT"
],
"directory_id": "8afce592d78ab01a7388aaed4621e8c8d426659b",
"extension": "py",
"fi... | 2.546875 | stackv2 | import collections
import random
import string
import json
import sys
import logging
import uuid
from django.http import HttpResponse
from django.db.models.fields.files import ImageFieldFile
logger = logging.getLogger("maced")
BAD_ITEM_NAME_CHARACTERS = (
"!", '"', "#", "$", "%", "&", "'", "(", ")", "*", "+", ",... | 195 | 34.11 | 119 | 30 | 1,360 | python | [{"finding_id": "codeql_py/stack-trace-exposure_323ec773a0bc76d8_53616212", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
145,
150
] | [
null,
null
] | [
37,
37
] | [
44,
44
] | |
2024-11-18T21:59:12.214148+00:00 | 1,631,045,562,000 | f688178507fc2862af30d328eee12eb6fa132a92 | 2 | {
"blob_id": "f688178507fc2862af30d328eee12eb6fa132a92",
"branch_name": "refs/heads/master",
"committer_date": 1631045562000,
"content_id": "166997348f8fa2c807c01e2ee0ea5315b4e26524",
"detected_licenses": [
"MIT"
],
"directory_id": "af1436c9b30457fc99eab23c5fe65d399394a41e",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/python3
from bottle import post, get, route, run, template, request, response, default_app
import json, requests, time, traceback, random, os, base64, urllib, jwt
# Change working directory so relative paths (and template lookup) work again
os.chdir(os.path.dirname(__file__))
def process_roles(header):
... | 36 | 33.42 | 100 | 12 | 328 | python | [{"finding_id": "codeql_py/reflective-xss_ea4aeb958e2f56dd_9fb20f86", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
27
] | [
null
] | [
12
] | [
30
] | |
2024-11-18T21:59:21.030104+00:00 | 1,533,479,282,000 | 4f6a98c8bb45d6c53ee3c235a48bbf56800e962e | 3 | {
"blob_id": "4f6a98c8bb45d6c53ee3c235a48bbf56800e962e",
"branch_name": "refs/heads/master",
"committer_date": 1533479282000,
"content_id": "cfdf44659e7d2687f3f17f0c20710f873e13889e",
"detected_licenses": [
"MIT"
],
"directory_id": "39da6b5f8d665a6ca3d1fc1408fb680aa0868dd3",
"extension": "py",
"fi... | 2.75 | stackv2 | #!/usr/bin/python3
# 用于接受写入日记本的内容并写入数据库
import cgi
import codecs
import sys
import os
import pymysql
import traceback
import cgitb
from config import *
# 用于连接并写入数据库
def write(title, content, ip):
db = pymysql.connect(host=mysql.host,user=mysql.user, password=mysql.password, port=mysql.port, db=mysql.database)
curs... | 60 | 19.23 | 115 | 10 | 383 | python | [{"finding_id": "codeql_py/sql-injection_8b8d667fe2298a50_f52094ef", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
22
] | [
null
] | [
18
] | [
21
] | |
2024-11-18T22:11:33.062517+00:00 | 1,584,336,991,000 | 57aa70499b33d109667d86dbd7e7193c57b21e56 | 3 | {
"blob_id": "57aa70499b33d109667d86dbd7e7193c57b21e56",
"branch_name": "refs/heads/master",
"committer_date": 1584336991000,
"content_id": "8ed0645fd7984f1d80853dad71e583a9a4dbabce",
"detected_licenses": [
"MIT"
],
"directory_id": "297cc60784a9b976cb1cb3259d2f9da6f676ff09",
"extension": "py",
"fi... | 2.78125 | stackv2 | from flask import Flask, request, jsonify, render_template
import os
import dialogflow
import requests
import json
import sqlite3
from sqlite3 import Error
app = Flask(__name__)
@app.route('/')
def index():
return render_template('index.html')
@app.route('/webhook', methods=['POST'])
def webhook():
data = r... | 137 | 28.14 | 125 | 19 | 856 | python | [{"finding_id": "codeql_py/sql-injection_5bdb7a63eb992dc8_aa708df3", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
82
] | [
null
] | [
21
] | [
24
] | |
2024-11-18T22:11:33.954092+00:00 | 1,637,243,257,000 | 569b499b71259569389470aaaf307c96658e37f5 | 3 | {
"blob_id": "569b499b71259569389470aaaf307c96658e37f5",
"branch_name": "refs/heads/main",
"committer_date": 1637243257000,
"content_id": "bfd580dcba65003f940cfdd6334410941fcf713f",
"detected_licenses": [
"MIT"
],
"directory_id": "00af17538ca4f43453e673dc28060f4d3631b692",
"extension": "py",
"file... | 3.046875 | stackv2 | import subprocess
from time import sleep
import platform
from zipfile import *
print('''
░██████╗████████╗███████╗░█████╗░██╗░░░░░███████╗██████╗░░░░███████╗██╗░░██╗███████╗
██╔════╝╚══██╔══╝██╔════╝██╔══██╗██║░░░░░██╔════╝██╔══██╗░░░██╔════╝╚██╗██╔╝██╔════╝
╚█████╗░░░░██║░░░█████╗░░███████║██║░░░░░█████╗░░██████╔╝░░... | 60 | 28.82 | 84 | 11 | 674 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5abd67f064b589fd_daa9e0d0", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
26
] | [
null
] | [
17
] | [
18
] | |
2024-11-18T22:11:39.156365+00:00 | 1,625,349,262,000 | f235b9dde40a3f425538b10511c1013a54d9b5ee | 4 | {
"blob_id": "f235b9dde40a3f425538b10511c1013a54d9b5ee",
"branch_name": "refs/heads/master",
"committer_date": 1625349262000,
"content_id": "cdea596a90bf09a280bd108b8496019963a7ed74",
"detected_licenses": [
"Unlicense"
],
"directory_id": "2d544366ada4294769951e446956427991833a4e",
"extension": "py",... | 4.125 | stackv2 | from abc import ABC, abstractmethod
class Employee(ABC):
def __init__(self):
self.name = ""
@abstractmethod
def display(self):
print("{}".format(self.name))
@abstractmethod
def get_paycheck(self):
return 0
class HourlyEmployee(Employee):
def __init__(self):
... | 73 | 23.63 | 105 | 16 | 400 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d4d90da86647beae_bee8c34f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
37
] | [
null
] | [
15
] | [
65
] | |
2024-11-18T22:23:59.166259+00:00 | 1,666,684,557,000 | ff029f070517b1984d6d2e945fa88ee0b57d22d0 | 2 | {
"blob_id": "ff029f070517b1984d6d2e945fa88ee0b57d22d0",
"branch_name": "refs/heads/master",
"committer_date": 1666684557000,
"content_id": "c88d20cd9ebff5735884056f7358d43e7841879e",
"detected_licenses": [
"MIT"
],
"directory_id": "cb1e1f963d252ac1a9d51d457c924af6e2039a24",
"extension": "py",
"fi... | 2.359375 | stackv2 | # -*- coding: utf-8 -*-
import base64
import hashlib
import hmac
import re
def to_smtp_credentials(_password, region=None, relayhost=None, password_conversion_mode=None, **kv):
if password_conversion_mode == None or password_conversion_mode == "aws_ses_v4":
return to_smtp_credentials_aws_ses_v4(_password, ... | 44 | 40.43 | 132 | 17 | 506 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_65b3f01488ee67ef_4132bbac", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
44
] | [
null
] | [
11
] | [
66
] | |
2024-11-18T22:36:29.138026+00:00 | 1,693,898,753,000 | 8f2d5122178085a7283e9119c22ab90d4dbeb538 | 2 | {
"blob_id": "8f2d5122178085a7283e9119c22ab90d4dbeb538",
"branch_name": "refs/heads/master",
"committer_date": 1693898753000,
"content_id": "392e23da6ee6de4f79ac355a8cfdcb6404e111ed",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "88aca3340574f733b9ecd6f76708ecd2d57cb07e",
"extension": "py"... | 2.375 | stackv2 | from flask import Flask, render_template, redirect, url_for, request,make_response
from pymongo import MongoClient
from bson.objectid import ObjectId
import socket
import os
import json
app = Flask(__name__)
LINK=os.environ.get('LINK', "www.cloudyuga.guru")
TEXT1=os.environ.get('TEXT1', "CloudYuga")
TEXT2=os.environ.... | 105 | 30.31 | 110 | 15 | 848 | python | [{"finding_id": "codeql_py/flask-debug_23e8b2ae68b566d2_a9bbb7ec", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
105,
89
] | [
null,
null
] | [
5,
16
] | [
40,
52
] | |
2024-11-18T22:36:37.381036+00:00 | 1,442,117,175,000 | 516b6195bf914f3aa506e32280eec498c16bac6b | 3 | {
"blob_id": "516b6195bf914f3aa506e32280eec498c16bac6b",
"branch_name": "refs/heads/master",
"committer_date": 1442117175000,
"content_id": "3ad342fc058310d97b641e048d154bf4894ac557",
"detected_licenses": [
"MIT"
],
"directory_id": "9544fa236ac0c10c3011bb74cc7639722d01a6cc",
"extension": "py",
"fi... | 2.859375 | stackv2 | import requests
import re
from untitled import Agent, NewCommand
agent = Agent()
def foo():
print('foooooooo')
agent.run_command(NewCommand(foo))
agent.register_command('foo', NewCommand(foo))
agent.call_by_keyword('foo')
@agent.register('bar')
def bar():
print('Que?')
urlRegex = 'http[s]?://(?:[a-zA-Z]|[0-9]|... | 44 | 17.84 | 91 | 14 | 246 | python | [{"finding_id": "codeql_py/overly-large-range_08ce5bc79c6b3a7f_1a0b7c8a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
20
] | [
null
] | [
43
] | [
46
] | |
2024-11-18T22:36:47.237713+00:00 | 1,523,771,233,000 | 0b9267f409ca33cd9e897f2f854ff01673997649 | 2 | {
"blob_id": "0b9267f409ca33cd9e897f2f854ff01673997649",
"branch_name": "refs/heads/master",
"committer_date": 1523771233000,
"content_id": "04cbb9f624ac290087f6d9b85b9194f6a2cda965",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5f5f2e80b97ea9933e2e9e7064727b27f5c1ba04",
"extension": "py"... | 2.328125 | stackv2 | # Copyright 2017 Google Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, ... | 314 | 31.95 | 91 | 27 | 1,906 | python | [{"finding_id": "codeql_py/log-injection_b86e0c68e82fdc30_60713808", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
43,
64
] | [
null,
null
] | [
22,
18
] | [
74,
22
] | |
2024-11-18T20:23:13.667596+00:00 | 1,549,157,630,000 | b92a253047545c45fa225c4320fb35d3e6f03040 | 3 | {
"blob_id": "b92a253047545c45fa225c4320fb35d3e6f03040",
"branch_name": "refs/heads/master",
"committer_date": 1549157630000,
"content_id": "37f67c331064f3838bb0ae2995c1bab708860d15",
"detected_licenses": [
"MIT"
],
"directory_id": "a1645b990317bbab4f373588f11a398745a5475f",
"extension": "py",
"fi... | 3.109375 | stackv2 | # database python file
# Copyright (c) 2019 Joan Chirinos
import uuid
from datetime import datetime
import sqlite3 # enable control of an sqlite database
DB_FILE = "data/main.db"
def create_db():
'''
Creates the database
'''
db = sqlite3.connect(DB_FILE)
c = db.cursor()
c.execute("CREATE ... | 161 | 23.84 | 116 | 11 | 964 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e475080382c4876f_798a1f78", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
59
] | [
null
] | [
11
] | [
116
] | |
2024-11-18T20:23:16.727062+00:00 | 1,601,546,228,000 | 5bc8b1e125ca2e0c791c291a1e066db0c0358d19 | 2 | {
"blob_id": "5bc8b1e125ca2e0c791c291a1e066db0c0358d19",
"branch_name": "refs/heads/master",
"committer_date": 1601546228000,
"content_id": "d0b1ab0b9edaf78fee52c94d0c6eb97ae1f89418",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "9a5505ebc6a4a9f7d710e1ef8ce488b578b63c6e",
"extension": "p... | 2.390625 | stackv2 | # -*- coding: utf-8 -*-
"""
sqldns.py - Prints Data Source Name on stdout
Copied, Trimmed, and Modified from django-extensions module
Copyright (c) 2007 Michael Trier
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to ... | 125 | 37.1 | 131 | 17 | 1,043 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_da7491d4826ea85f_ca527438", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
97
] | [
null
] | [
30
] | [
51
] | |
2024-11-18T20:23:19.087880+00:00 | 1,578,618,011,000 | cc8bff9b2d798efc81ae5805d9a8a46700829dd4 | 2 | {
"blob_id": "cc8bff9b2d798efc81ae5805d9a8a46700829dd4",
"branch_name": "refs/heads/master",
"committer_date": 1578618011000,
"content_id": "8a1910c1ad9a9a3b682715b183ab75f869a33013",
"detected_licenses": [
"MIT"
],
"directory_id": "18461ac26e3f09106a2a8475102a06749594dc09",
"extension": "py",
"fi... | 2.40625 | stackv2 | from flask import Flask, request, jsonify
import os
# <start> Pieces from notebook prototyping..
#
from watson_developer_cloud import VisualRecognitionV3
import json
import re
from PIL import Image
model_id = "" # <-- PASTE YOUR MODEL ID HERE
apikey = "" # <-- PASTE YOUR APIKEY HERE
visual_recognition = VisualRe... | 85 | 33.75 | 112 | 14 | 789 | python | [{"finding_id": "codeql_py/flask-debug_18a3c7ef65388c47_4d8dd208", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 7 | true | [
"CWE-215",
"CWE-1333",
"CWE-1333",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/polynomial-redos",
"py/polynomial-redos",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '.' and with many repetitions of '.'.",
"This [regular expression](1) that depends... | [
85,
37,
38,
27,
51,
80,
81
] | [
null,
null,
null,
null,
null,
null,
null
] | [
5,
43,
42,
16,
16,
20,
20
] | [
52,
55,
54,
30,
24,
32,
31
] | |
2024-11-18T20:23:27.716646+00:00 | 1,545,719,646,000 | 1eae78cb74f87720c522127233717b9495b538fc | 3 | {
"blob_id": "1eae78cb74f87720c522127233717b9495b538fc",
"branch_name": "refs/heads/master",
"committer_date": 1545719646000,
"content_id": "093b58eacac32a14a0b99872b74ecd013db8be3e",
"detected_licenses": [
"MIT"
],
"directory_id": "5c9d178c41577422351a2f7ed69ce9713c38a8b4",
"extension": "py",
"fi... | 3.140625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""Advent of Code 2018 day 24 module."""
from __future__ import division, print_function
import re
from copy import deepcopy
from itertools import count
try:
from tqdm import tqdm
except ImportError:
tqdm = None
class UnitGroup(object):
def __init__(self, ... | 236 | 29.88 | 174 | 20 | 1,705 | python | [{"finding_id": "codeql_py/redos_147160c89dde290e_7bd58d71", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of 'a'.", "remediati... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of 'a'.",
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of 'a'."
] | [
113,
113
] | [
null,
null
] | [
38,
72
] | [
42,
76
] | |
2024-11-18T20:23:30.396902+00:00 | 1,656,386,411,000 | c07e6be5fa7aa1aba9bcb58514d8869d4a139872 | 2 | {
"blob_id": "c07e6be5fa7aa1aba9bcb58514d8869d4a139872",
"branch_name": "refs/heads/master",
"committer_date": 1656386411000,
"content_id": "f100fe675323517132a6f1c8756d8f68399258be",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "977b17b2ea54c1a961d206a9f01e63391cc37a7c",
"extension": "py"... | 2.453125 | stackv2 | import os
from milvus_helpers import MilvusHelper
from mysql_helpers import MySQLHelper
from config import UPLOAD_PATH
from logs import LOGGER
from operations.load import do_load
from operations.search import do_search
from operations.count import do_count
from operations.drop import do_drop
from fastapi import FastAPI... | 138 | 33.27 | 97 | 15 | 1,139 | python | [{"finding_id": "codeql_py/stack-trace-exposure_d1f91e6b8af096cf_b0e1a0e4", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 8 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-022"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
47,
57,
72,
95,
113,
124,
135,
44
] | [
null,
null,
null,
null,
null,
null,
null,
null
] | [
16,
16,
16,
16,
16,
16,
16,
29
] | [
48,
48,
48,
48,
48,
48,
48,
39
] | |
2024-11-18T21:23:10.950873+00:00 | 1,394,198,199,000 | 05cf1d8377ff26b1447a7bc8f71c33457732820f | 3 | {
"blob_id": "05cf1d8377ff26b1447a7bc8f71c33457732820f",
"branch_name": "refs/heads/master",
"committer_date": 1394198199000,
"content_id": "e6fcfe4b08519025dd3eab83472e202d6d799e45",
"detected_licenses": [
"MIT"
],
"directory_id": "a2cbb28a6abee229efd106e24a49197e4d73f19e",
"extension": "py",
"fi... | 3.03125 | stackv2 | import re
import operator
import math
### Code for identifying characters
filename = input("Enter name of the text file: ")
f = open(filename, 'r')
text = f.read()
lines = text.splitlines()
characters = dict()
punctuation = [',', '.', '\'', '\"', '!', '?', '...', ':', ')', '(', '[', ']', '&']
chars_inorder = []
for... | 182 | 24.51 | 174 | 22 | 1,555 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a1d2c5e7ee57302c_57b4250a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
117,
120,
123,
123
] | [
null,
null,
null,
null
] | [
9,
9,
9,
28
] | [
30,
79,
21,
82
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.