added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T23:06:20.600792+00:00 | 1,618,021,243,000 | 31e2df52cebdcd83e686d09961e7dc8bf0a0a6a1 | 3 | {
"blob_id": "31e2df52cebdcd83e686d09961e7dc8bf0a0a6a1",
"branch_name": "refs/heads/master",
"committer_date": 1618021243000,
"content_id": "6d9231ab80d9898850cc9fe8a4557af950125931",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2b69c7bc88235e75fc5a67d41e53f8ecf91390d9",
"extension": "py"... | 2.578125 | stackv2 | # Copyright 2021 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, ... | 173 | 41.31 | 118 | 21 | 1,680 | python | [{"finding_id": "codeql_py/request-without-cert-validation_4d2308163dbedace_621cd14c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
37
] | [
null
] | [
16
] | [
85
] | |
2024-11-18T20:56:57.733053+00:00 | 1,682,101,480,000 | 346fcca95a8313f2cfa406a03ac7da4695ae2067 | 3 | {
"blob_id": "346fcca95a8313f2cfa406a03ac7da4695ae2067",
"branch_name": "refs/heads/master",
"committer_date": 1682101480000,
"content_id": "c15760ca0fe4a30fa5221a0e764bbae521a063d3",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "d3996cf8c4e4f739f22175213a50685719287a54",
"extension": "p... | 2.953125 | stackv2 | """ ``sklearn_xarray.datasets`` """
import numpy as np
import pandas as pd
import xarray as xr
def load_dummy_dataarray():
""" Load a DataArray for demonstration purposes. """
return xr.DataArray(
np.random.random((100, 10)),
coords={"sample": range(100), "feature": range(10)},
dims=... | 144 | 25.04 | 77 | 17 | 900 | python | [{"finding_id": "codeql_py/tarslip_5649d8e4284d248f_1d571eea", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
121
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T23:10:43.059511+00:00 | 1,543,904,370,000 | 4497af4fda72afa8f56c03dc9ba23216dbdd3d99 | 3 | {
"blob_id": "4497af4fda72afa8f56c03dc9ba23216dbdd3d99",
"branch_name": "refs/heads/master",
"committer_date": 1543904370000,
"content_id": "2b7f796a3b6a444304a7b529eccf30816d9f2ad7",
"detected_licenses": [
"MIT"
],
"directory_id": "d3ea3ca5c4d5b7b5ae5e26948cba7cb29f71b97d",
"extension": "py",
"fi... | 2.65625 | stackv2 | from flask import render_template, url_for, flash, redirect, request
from homepg import app, db, bcrypt
from homepg.models import User, Household, Activity
from homepg.forms import RegistrationForm, LoginForm, CreateHome
from flask_login import login_user, current_user, logout_user, login_required
@app.route("/")
@app... | 116 | 29.97 | 103 | 19 | 739 | python | [{"finding_id": "codeql_py/url-redirection_1d7c11653680500e_4eb0a56f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
66
] | [
null
] | [
29
] | [
38
] | |
2024-11-18T23:10:47.977726+00:00 | 1,490,150,532,000 | 9df3db4fa309d8bb7a3eb1126e262663ea8821f8 | 3 | {
"blob_id": "9df3db4fa309d8bb7a3eb1126e262663ea8821f8",
"branch_name": "refs/heads/master",
"committer_date": 1490150532000,
"content_id": "513eb816f241f3018793c5007d4513f60b8fd809",
"detected_licenses": [
"MIT"
],
"directory_id": "e6e5e9e10c61db73df93b3269ae869621ca13687",
"extension": "py",
"fi... | 2.578125 | stackv2 | # -*- coding:utf-8 -*-
import collections
import hashlib
import traceback
import requests
import logging
from random import randint
from wxpy import Message
logger = logging.getLogger(__name__)
class IBot(object):
"""
* 与 wxpy 深度整合的小i机器人
* 需获取 Key和Secret: http://cloud.xiaoi.com/
"""
def __init__(self, app_ke... | 97 | 23.04 | 88 | 15 | 739 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_555af29ca1ff10f4_c74d2178", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
43
] | [
null
] | [
23
] | [
27
] | |
2024-11-18T23:10:50.586652+00:00 | 1,581,099,363,000 | ee854dd33afcf2360e84d30da0ff692406cc75cd | 3 | {
"blob_id": "ee854dd33afcf2360e84d30da0ff692406cc75cd",
"branch_name": "refs/heads/master",
"committer_date": 1581099363000,
"content_id": "f4c115f3b24841aa9dbb4e26d9b65cedc4f0f966",
"detected_licenses": [
"MIT"
],
"directory_id": "f87d3c29736cb7249409ad3f6584981a16cf7210",
"extension": "py",
"fi... | 2.828125 | stackv2 | #!/usr/bin/python3
# -*- coding: utf-8 -*-
from web3 import Web3
from sys import exit
import os, time, json
import getpass, hashlib
CPURP = '\033[95m'
CGREEN = '\033[92m'
CRED = '\033[91m'
CEND = '\033[0m'
def load_contract():
while True:
with open('build/contracts/ChainsawClub.json') as f:
co... | 112 | 30.82 | 82 | 21 | 842 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7b7207d1d106083b_97d323b0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
57
] | [
null
] | [
22
] | [
41
] | |
2024-11-18T22:29:34.612270+00:00 | 1,607,325,973,000 | 3036813ff955c6b0dc55aae86ea6a61c3226929a | 2 | {
"blob_id": "3036813ff955c6b0dc55aae86ea6a61c3226929a",
"branch_name": "refs/heads/master",
"committer_date": 1607325973000,
"content_id": "e557ca5aefe989071ea17ec08a1ceee21a16a5f6",
"detected_licenses": [
"MIT"
],
"directory_id": "ab9f57da5bc4fd99bc1c2758f672e8be295731d7",
"extension": "py",
"fi... | 2.421875 | stackv2 | import hashlib
import hmac
import json
import logging
from pprint import pprint
import dateparser
import requests
from flask import Flask, current_app, request
from googleapiclient.errors import HttpError
from slack.errors import SlackApiError
import server.config as config
from server.after_this_response import Afte... | 138 | 31.27 | 87 | 18 | 1,011 | python | [{"finding_id": "codeql_py/log-injection_e966583bc3ec7655_4ea4489d", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
72,
77,
83
] | [
null,
null,
null
] | [
64,
59,
61
] | [
72,
63,
65
] | |
2024-11-18T22:29:51.594481+00:00 | 1,545,404,327,000 | f99055b4020da10487481671656792eb1c75b847 | 3 | {
"blob_id": "f99055b4020da10487481671656792eb1c75b847",
"branch_name": "refs/heads/master",
"committer_date": 1545404327000,
"content_id": "5c09227e5e40b8475fff0cf2f450ef12acba99e8",
"detected_licenses": [
"MIT"
],
"directory_id": "4d20dff6b7c6e21ae08e45a55ff0f1c2553f2ddf",
"extension": "py",
"fi... | 2.96875 | stackv2 | import requests
import string
import os
import sys
import time
from base64 import b64decode
# setting globals and vars
sess = requests.Session()
cookies = []
BIN_QUERY = "' or {} {} {};-- "
MAX_LENGTH = 100
MAX_CHAR_VALUE = 2 ** 7 - 1 # 7 bit ascii is bae
#############################
# USER PARAMS HERE #... | 71 | 23.97 | 71 | 15 | 483 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5dac42b8ad911e56_c3a8360f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
69
] | [
null
] | [
11
] | [
50
] | |
2024-11-18T22:29:57.301776+00:00 | 1,607,176,192,000 | 4889db8b27d65eb7a601e152084de19a2e1533de | 4 | {
"blob_id": "4889db8b27d65eb7a601e152084de19a2e1533de",
"branch_name": "refs/heads/main",
"committer_date": 1607176192000,
"content_id": "e4c608bb005e85ee54bc059e86b3b095e423378c",
"detected_licenses": [
"MIT"
],
"directory_id": "457ea969b4b5115b2992b8db5578011a720a87a8",
"extension": "py",
"file... | 3.515625 | stackv2 | # /usr/bin/env python
# coding: utf-8
from Crypto.Cipher import AES
from constant.constant import Constant
class AESCrypto(object):
def __init__(self, key, init_vector=None, mode=Constant.MODE_CBC):
"""
初始化
:param key: 加密密钥
:param init_vector: 初始化向量
:param mode: AES加密方式,默认为... | 97 | 25.39 | 86 | 16 | 676 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_9ac96566349f9aaa_4bc1a7a6", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ECB](2) is broken or weak, and should not be used.\n[The block mode CBC](3) is broken or weak, and should not be used.\n[The block mode ECB](4) is broken or weak, and should not be used.",
"[The block mode CBC](1) is broken or we... | [
57,
73
] | [
null,
null
] | [
16,
40
] | [
36,
60
] | |
2024-11-18T21:33:36.691517+00:00 | 1,505,157,373,000 | 070fc7ec9b4dcef1d708c69e51fe82c68b1a1b8c | 3 | {
"blob_id": "070fc7ec9b4dcef1d708c69e51fe82c68b1a1b8c",
"branch_name": "refs/heads/master",
"committer_date": 1505157373000,
"content_id": "790a6fced3b1b9469c137f7c3e15dd786ec39a92",
"detected_licenses": [
"MIT"
],
"directory_id": "8aff61c2c7e77f0f0e0199fcc1a57dccd4f35ab3",
"extension": "py",
"fi... | 2.765625 | stackv2 | #Written by Shitao Tang
# --------------------------------------------------------
import connectDB
import time,hashlib,logging
def sign_up(username,password):
db=connectDB.database.getInstance()
if len(username)<=20:
return db.create_account(username,hashlib.sha224(password).hexdigest())
else:
... | 193 | 30.15 | 122 | 18 | 2,031 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_cd35691863cc7065_f175dee7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA224) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA224) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA224) that is insecure for password hashing, since it is not a computational... | [
9,
15
] | [
null,
null
] | [
58,
60
] | [
66,
68
] | |
2024-11-18T23:15:52.855877+00:00 | 1,633,512,192,000 | d0a757e9382697f658bcfb01cc3775656fe4d4f9 | 3 | {
"blob_id": "d0a757e9382697f658bcfb01cc3775656fe4d4f9",
"branch_name": "refs/heads/main",
"committer_date": 1633512192000,
"content_id": "4449050a187c3148aad269522fc42c4fdffb49b8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "df9c9fc503037361e0321c58006c8071f0ead78f",
"extension": "py",
... | 2.78125 | stackv2 | import time
import random
import shutil
import requests
import argparse
from selenium import webdriver
from selenium.webdriver.common.keys import Keys
from selenium.webdriver.chrome.options import Options
from bs4 import BeautifulSoup as bs
def driver(driver_path):
options = Options()
options.add_argument('-... | 95 | 29.23 | 146 | 16 | 665 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_bf96249eb27c47ae_c33c7474", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://i.pinimg.com](1) may be at an arbitrary positi... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [https://i.pinimg.com](1) may be at an arbitrary position in the sanitized URL."
] | [
34
] | [
null
] | [
69
] | [
120
] | |
2024-11-18T23:15:53.505961+00:00 | 1,569,589,513,000 | f2110ea05b2c1097e8e7c0279543d2bd4a77cd21 | 2 | {
"blob_id": "f2110ea05b2c1097e8e7c0279543d2bd4a77cd21",
"branch_name": "refs/heads/master",
"committer_date": 1569589513000,
"content_id": "b964204a9431f58f580c642c841527cd0dbba11d",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "80721ba8715ffb249746bef405d851cd04df3ea5",
"extension": "p... | 2.421875 | stackv2 | #!/usr/bin/env python
# Cyborg Web Control
import ConfigParser
import subprocess
import argparse
import random
import socket
import time
import pdb
import sys
import os
class VNCRunner:
def get_docker_args(self, localport, password, turkerinfo, programname, tasktype):
assert programname.find(' ') == -1
... | 116 | 31.09 | 145 | 16 | 913 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_afc35409e67870d2_e2dc58c9", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text."
] | [
79
] | [
null
] | [
23
] | [
36
] | |
2024-11-18T22:30:17.613204+00:00 | 1,464,903,440,000 | e87cc45f40cd06d30f57ca7c9558e67de3fa721e | 3 | {
"blob_id": "e87cc45f40cd06d30f57ca7c9558e67de3fa721e",
"branch_name": "refs/heads/master",
"committer_date": 1464903440000,
"content_id": "5441ee179a8c8835727aef3cd9bdf57105119f0c",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "89881b018b000725a2214822e0b8e01d49bd6998",
"extension": "p... | 3.046875 | stackv2 | import csv
#----------------------------------------------------------------------
def csv_dict_reader(file_obj):
"""
Read a CSV file using csv.DictReader
"""
reader = csv.DictReader(file_obj, delimiter=',')
for line in reader:
print(line["first_name"]),
print(line["last_name"]),
... | 18 | 33.11 | 71 | 11 | 114 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6a119a9702b0af7b_1e6ef7d0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
13
] | [
null
] | [
15
] | [
31
] | |
2024-11-18T22:30:32.766943+00:00 | 1,609,709,343,000 | 008b0f7534feebbc060c3a0a283dd849c58ec7c2 | 2 | {
"blob_id": "008b0f7534feebbc060c3a0a283dd849c58ec7c2",
"branch_name": "refs/heads/master",
"committer_date": 1609709343000,
"content_id": "a5522282d2b609530afeafa2023d013cc5495f97",
"detected_licenses": [
"MIT"
],
"directory_id": "7a17365213dee799a4907d8921aa223ef41b3b6f",
"extension": "py",
"fi... | 2.453125 | stackv2 | # -*- coding: utf-8 -*-
"""
list_routes.py
"""
#Built-in/Generic
import datetime
#Libs
from flask import Flask, g, redirect, render_template, request, url_for, session, flash
from flask_sqlalchemy import SQLAlchemy
from sqlalchemy import (
Table, Column, Integer, String, MetaData, ForeignKey, Boolean
)
#Modules... | 125 | 26.56 | 101 | 16 | 834 | python | [{"finding_id": "codeql_py/url-redirection_7120f0a92f458983_e26ce41f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
53
] | [
null
] | [
18
] | [
34
] | |
2024-11-18T23:37:05.909738+00:00 | 1,446,494,811,000 | ebde059b288e761ea7e31bb26768f31b767df753 | 3 | {
"blob_id": "ebde059b288e761ea7e31bb26768f31b767df753",
"branch_name": "refs/heads/master",
"committer_date": 1446494811000,
"content_id": "0864aeedbcb2900b03374aaf3764116d6c75af6c",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "67107ff37bfd4c09077c5781ebf4473c550d62b1",
"extension": "p... | 2.75 | stackv2 | #!/usr/local/bin/python
'''
Search for and retrieve compromised credentials from ThreatExchange
'''
from __future__ import print_function
import argparse
import json
import re
import time
from urllib import urlencode
from urllib2 import urlopen
FB_APP_ID = 'Your AppID Here'
FB_ACCESS_TOKEN = 'Your AccessToken Here'... | 125 | 25.67 | 75 | 16 | 780 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_45a0281dfb06bcd2_33bbcee3", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
62
] | [
null
] | [
22
] | [
69
] | |
2024-11-18T21:57:34.643578+00:00 | 1,603,367,072,000 | e4fdeb5353249a4a35d52e592bae58f81f5c3112 | 3 | {
"blob_id": "e4fdeb5353249a4a35d52e592bae58f81f5c3112",
"branch_name": "refs/heads/master",
"committer_date": 1603367072000,
"content_id": "07f3c1e388753dbb176711e0e9d87d219e7a62ff",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "d2ac2569926b5030906e5a5506093007f919d966",
"extension": "p... | 2.734375 | stackv2 | import pickle
import numpy as np
import os
from utils.features_extraction import mfcc_features
MODEL_DIR = 'models/'
FEMALE_GMM_MODELFILE = 'females_gmm_model.gmm'
MALE_GMM_MODELFILE = 'males_gmm_model.gmm'
def identify_gender(female_model, male_model, vector):
winner = ''
is_female_score = np.arr... | 50 | 23.3 | 84 | 11 | 307 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_74ea2cb1682047e1_4ac0645f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
43
] | [
null
] | [
7
] | [
13
] | |
2024-11-18T21:57:50.610086+00:00 | 1,507,220,260,000 | 07b2ed7ef7dcaf6f2295860eca7e56109e01d74b | 3 | {
"blob_id": "07b2ed7ef7dcaf6f2295860eca7e56109e01d74b",
"branch_name": "refs/heads/master",
"committer_date": 1507220260000,
"content_id": "30f08953d5fadbbb2e03322082d3d9f083aaea16",
"detected_licenses": [
"MIT"
],
"directory_id": "21f789f364176af1e8fd54c709701cdd6161c452",
"extension": "py",
"fi... | 2.75 | stackv2 | from .source import Source, PackageInfo
import requests
from typing import Dict, Set, List
import logging
from urllib.parse import urlparse
from pathlib import PurePosixPath
from os.path import splitext
class Github(Source):
# For a Github object the `name` is owner/repo as a single string
# so the URLs below... | 70 | 32.43 | 69 | 21 | 508 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_5a70fecb4179e620_9c855877", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [github.com](1) may be at an arbitrary position in the sanitized URL."
] | [
26
] | [
null
] | [
20
] | [
47
] | |
2024-11-18T21:58:12.707544+00:00 | 1,486,756,388,000 | dd0aecd14505450ac2d9885f328b09ba00d3870e | 2 | {
"blob_id": "dd0aecd14505450ac2d9885f328b09ba00d3870e",
"branch_name": "refs/heads/master",
"committer_date": 1486756388000,
"content_id": "c6cc7f4ea6f47e16ab6f34ffab6ef2c4f2df9404",
"detected_licenses": [
"MIT"
],
"directory_id": "0a1af18ca7aabc27742f128401bf9058d5a58ab1",
"extension": "py",
"fi... | 2.359375 | stackv2 | import yaml
import os
import time
from tornado import ioloop, web, httpserver, httpclient
import logging
from utils import Config
config = Config('config.yml')
logging.basicConfig(
level=10,
filename=config.conf['log']['file'],
format='%(asctime)s (%(filename)s:%(lineno)s)- %(levelname)s - %(message)s',
... | 46 | 27.54 | 84 | 14 | 313 | python | [{"finding_id": "codeql_py/reflective-xss_20169a5ede7cf327_5c7ae0b3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
29
] | [
31
] | [
13
] | [
44
] | |
2024-11-18T21:58:18.923093+00:00 | 1,563,647,656,000 | b66f3ffe69ef5830ba6a27a3b520c247208c9f0f | 3 | {
"blob_id": "b66f3ffe69ef5830ba6a27a3b520c247208c9f0f",
"branch_name": "refs/heads/master",
"committer_date": 1563647656000,
"content_id": "cf1642c30f37af3005cc987aa0f98891baeb89a6",
"detected_licenses": [
"MIT"
],
"directory_id": "0ea9270c7dc7697ca9ee88df1f108aca01d0ca07",
"extension": "py",
"fi... | 2.5625 | stackv2 | """Custom template support."""
from jinja2 import Template
def render_template(content, context):
"""Render templates in content."""
# Fix None issues
if context.last_release_object is not None:
prerelease = context.last_release_object.prerelease
else:
prerelease = False
# Rende... | 29 | 29.48 | 96 | 13 | 159 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c376318f5bd95643_a57df318", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
17
] | [
null
] | [
18
] | [
35
] | |
2024-11-18T21:58:36.023687+00:00 | 1,480,472,300,000 | 6b39aedd7f04d0a7ce498ade62f261d79d2e10b9 | 3 | {
"blob_id": "6b39aedd7f04d0a7ce498ade62f261d79d2e10b9",
"branch_name": "refs/heads/master",
"committer_date": 1480472300000,
"content_id": "e37cc76acfc5aeaf8fbd6e31b4733f0625a3e84a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2d753c9fc9d1d8e455a71edae759adee171f1d56",
"extension": "py"... | 2.875 | stackv2 | import datetime
import os, pymysql # pip install PyMySql
from flask import Flask, request, redirect
# o request é para pegarmos os conteúdos passados no post/submit do formulário
# redirect -> para redirecionar depois do insert no banco
from flask.helpers import url_for # para retornar para outra url a partir do seu ... | 64 | 34.95 | 100 | 13 | 589 | python | [{"finding_id": "codeql_py/flask-debug_e502d6eab2c127cb_36d93eb0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-089"
] | [
"py/flask-debug",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This SQL query depends on a [user-provided value](1)."
] | [
64,
40
] | [
null,
null
] | [
5,
32
] | [
47,
41
] | |
2024-11-18T22:47:25.271636+00:00 | 1,419,007,202,000 | 83a70cd930e657d588402ffe7827fccc85335c43 | 3 | {
"blob_id": "83a70cd930e657d588402ffe7827fccc85335c43",
"branch_name": "refs/heads/master",
"committer_date": 1419007202000,
"content_id": "8b7e512a357fab080a08cc9551545430fcf4ccb8",
"detected_licenses": [
"MIT"
],
"directory_id": "ed3d09867b048a6944bebc52b27f7c031324d655",
"extension": "py",
"fi... | 2.578125 | stackv2 | import sys, os, re
import HTML
import tweepy
from tweepy import OAuthHandler
from optparse import OptionParser
from datetime import datetime
import codecs
import zipfile
import urllib2
import collections
import shutil
import time
def setup():
"""
Authenticates with Twitter with OAuth credentials and creates an insta... | 478 | 26.45 | 111 | 21 | 3,773 | python | [{"finding_id": "codeql_py/overly-large-range_3a202e160a2a7036_6326d99a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[0-9:;<=>?@A-U\\].", "remediation": "", "location": {... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[0-9:;<=>?@A-U\\].",
"Suspicious character range that is equivalent to \\[0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-u\\].",
"Suspicious character range that is equivalent to \\[0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-u\\]."
] | [
401,
404,
404
] | [
null,
null,
null
] | [
38,
34,
47
] | [
41,
37,
50
] | |
2024-11-18T22:47:26.755441+00:00 | 1,583,716,336,000 | df7a29c035437e7f79d5dee221699eeb47e1f2aa | 2 | {
"blob_id": "df7a29c035437e7f79d5dee221699eeb47e1f2aa",
"branch_name": "refs/heads/master",
"committer_date": 1583716336000,
"content_id": "f44add7c08ac2a0c86582966a38fc2f35f8972c0",
"detected_licenses": [
"MIT"
],
"directory_id": "43228f860246ca5af48660d2c4534a774f4c038b",
"extension": "py",
"fi... | 2.40625 | stackv2 | import csv
from http.client import RemoteDisconnected
import time
import re
from bs4 import BeautifulSoup
from selenium import webdriver
from selenium.webdriver.chrome.options import Options
from selenium.webdriver.support.ui import WebDriverWait, Select
from selenium.webdriver.support import expected_conditions as EC
... | 150 | 40.87 | 129 | 20 | 1,298 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ed2303e3398aae92_78352105", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
140
] | [
null
] | [
23
] | [
86
] | |
2024-11-18T23:10:59.766768+00:00 | 1,424,356,998,000 | 21098d5945a967a5ba915d18a33af1575af4d417 | 3 | {
"blob_id": "21098d5945a967a5ba915d18a33af1575af4d417",
"branch_name": "refs/heads/master",
"committer_date": 1424356998000,
"content_id": "cc8e69d2a1cff3382f98e20de2ac2f03efd57b4c",
"detected_licenses": [
"MIT"
],
"directory_id": "25c5f1deffd366f25eb8fc063f62cdb2218e8e9e",
"extension": "py",
"fi... | 2.828125 | stackv2 | import os
import requests
from geopy.geocoders import Nominatim
from flask import Flask, render_template, flash
from . import app
from .forms import LocationForm
app.config.from_object(os.environ['APP_SETTINGS'])
WUNDERGROUND_BASE_URL = app.config['WUNDERGROUND_BASE_URL']
WUNDERGROUND_API_KEY = app.config['WUNDERGR... | 144 | 31.85 | 88 | 19 | 1,017 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1b40ac9fcfdaffd6_1b8f229c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
78,
78
] | [
null,
null
] | [
15,
20
] | [
18,
23
] | |
2024-11-18T22:35:55.864829+00:00 | 1,593,711,532,000 | 5d421e1e597d95b1603c67787bfc48e4c18e6ec2 | 2 | {
"blob_id": "5d421e1e597d95b1603c67787bfc48e4c18e6ec2",
"branch_name": "refs/heads/master",
"committer_date": 1593711532000,
"content_id": "de15fad2b50d651dbdc7699f6f0a0ad0522acb32",
"detected_licenses": [
"MIT"
],
"directory_id": "542d3f2efb864c80e82bfc11914f12f07bb4caf4",
"extension": "py",
"fi... | 2.34375 | stackv2 | # -*- coding: utf-8 -*-
#!/usr/bin/python
"""
"""
import requests
import time
from raven import Client
client = Client(
'https://aee9ceb609b549fe8a85339e69c74150:8604fd36d8b04fbd9a70a81bdada5cdf@sentry.io/1223891')
key = "f02981de7e824038967f4194b7815c8d"
def check_api(word):
query_string = { 'api-key': key,... | 36 | 23.72 | 117 | 13 | 305 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e42256c996704ff6_ccb15ab5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
20
] | [
null
] | [
11
] | [
118
] | |
2024-11-18T22:36:01.736881+00:00 | 1,567,959,064,000 | e16a18f7f07c70b2ef0ab6deb2a4e7230faa0f5d | 3 | {
"blob_id": "e16a18f7f07c70b2ef0ab6deb2a4e7230faa0f5d",
"branch_name": "refs/heads/master",
"committer_date": 1568019469000,
"content_id": "9d7d79f84de1b25afca3ed8045e8add7cb6eaa96",
"detected_licenses": [
"MIT"
],
"directory_id": "a884895151a5b38c38f56542f3f195ce97bc3f2b",
"extension": "py",
"fi... | 2.703125 | stackv2 | """Service session object"""
import asyncio
import json
import time
from base64 import b64decode, b64encode
from typing import TYPE_CHECKING, Optional
import aiohttp
import requests
from Crypto.Random import get_random_bytes
#pycryptodome
from Crypto.Hash import MD5
from Crypto.Cipher import AES
from Crypto.Util.Pad... | 169 | 31.38 | 104 | 19 | 1,236 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_3cf222d86dbbd3aa_e95d59db", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
77,
95
] | [
null,
null
] | [
21,
25
] | [
28,
32
] | |
2024-11-18T22:48:24.233182+00:00 | 1,520,396,351,000 | 34663af13966ebd5e171217f0b300bc59e482b66 | 3 | {
"blob_id": "34663af13966ebd5e171217f0b300bc59e482b66",
"branch_name": "refs/heads/master",
"committer_date": 1520396351000,
"content_id": "55455c1bfef468e6f0564a3134ac2ee49ab67055",
"detected_licenses": [
"MIT"
],
"directory_id": "30261bcf65b9aeb015edeb5a8ceeedeb0e3493d6",
"extension": "py",
"fi... | 2.765625 | stackv2 | # -*- coding: utf-8 -*-
'''
Copyright(c) 2018, LiuYang
All rights reserved.
2018/02/23
'''
import tarfile
from six.moves import urllib
import sys
import numpy as np
import pickle
import os
import cv2
data_dir = 'cifar10_data'
full_data_dir = 'cifar10_data/cifar-10-batches-py/data_batch_'
vali_dir = 'cifar10_dat... | 139 | 29.62 | 97 | 18 | 1,092 | python | [{"finding_id": "codeql_py/tarslip_ba87999d4f391bfc_eb6f2f66", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
53
] | [
null
] | [
9
] | [
39
] | |
2024-11-18T22:49:13.067160+00:00 | 1,597,584,899,000 | 77e371c26f485dccf14e0fa0be944a3b0df99337 | 2 | {
"blob_id": "77e371c26f485dccf14e0fa0be944a3b0df99337",
"branch_name": "refs/heads/master",
"committer_date": 1597584899000,
"content_id": "a9d1091730eac71e3014047af430618b7220646d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9a653ca161b619f4a2fe345201b5ab591357d84f",
"extension": "py"... | 2.375 | stackv2 | import core
from core.movieinfo import TheMovieDatabase
from core.library import Manage
from core import searcher
import cherrypy
import threading
import os
import json
import logging
logging = logging.getLogger(__name__)
api_version = 2.4
''' API
All methods output a json object:
{'response': true}
A 'true' respo... | 335 | 33.77 | 121 | 22 | 2,764 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a128e728b41c3df4_f5b25b02", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
186
] | [
null
] | [
29
] | [
86
] | |
2024-11-18T23:26:00.648978+00:00 | 1,557,232,025,000 | c28187b0b15d381a1296b65feacafde9ff1b0c0d | 2 | {
"blob_id": "c28187b0b15d381a1296b65feacafde9ff1b0c0d",
"branch_name": "refs/heads/master",
"committer_date": 1557232041000,
"content_id": "8a6cd65e68547c39e34c4761f882120439d631ee",
"detected_licenses": [
"MIT"
],
"directory_id": "32e42a256e69f462628249339f4f6f0501dd42d8",
"extension": "py",
"fi... | 2.328125 | stackv2 | import os
import json
from dotenv import load_dotenv
from .aws_signing import AwsSigningV4
from .request_handler import RequestHandler
load_dotenv()
load_dotenv(os.path.join(os.path.dirname(__name__), "..", ".env"))
client_id = os.environ.get("CLIENT_ID")
client_secret = os.environ.get("CLIENT_SECRET")
api_key = o... | 63 | 27.54 | 98 | 12 | 437 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1942ee25b9e36661_670ae2cb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
50
] | [
null
] | [
11
] | [
38
] | |
2024-11-18T22:27:32.873907+00:00 | 1,545,303,526,000 | 72aaaa09e199ded348ba5281ee9c44f1324a0a31 | 3 | {
"blob_id": "72aaaa09e199ded348ba5281ee9c44f1324a0a31",
"branch_name": "refs/heads/master",
"committer_date": 1545303526000,
"content_id": "d35bda7551b30634258299d14b027d8573774745",
"detected_licenses": [
"MIT"
],
"directory_id": "0b67bcab795878b36596152fe3fc97ba58d15e3f",
"extension": "py",
"fi... | 2.96875 | stackv2 | from flask import Flask, Response
from flask_socketio import SocketIO, send, emit
from flask_cors import CORS
from components.LCD.I2CLCD1602 import display
from components.ultrasonic_ranging import loop_during, get_distance
app = Flask(__name__)
app.config['SECRET_KEY'] = 'secret!'
cors = CORS(app,resources={r"/sock... | 72 | 29.32 | 136 | 12 | 576 | python | [{"finding_id": "codeql_py/reflective-xss_125ba263fe3d56bf_0f7bb4c1", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
38
] | [
null
] | [
12
] | [
19
] | |
2024-11-18T22:27:41.483444+00:00 | 1,625,730,061,000 | 2812628e686c3ff8ab1ae1f138c4e25d1766476b | 2 | {
"blob_id": "2812628e686c3ff8ab1ae1f138c4e25d1766476b",
"branch_name": "refs/heads/main",
"committer_date": 1625730142000,
"content_id": "b612945422018cadf4aa6dfb96f232500eb6fca3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "61dfacc97304ea6e95d1d69b14c072c5977899bb",
"extension": "py",
... | 2.453125 | stackv2 | # -*- coding: utf-8 -*-
#
# Copyright (c) 2021, Flybreak
#
# SPDX-License-Identifier: Apache-2.0
#
# Change Logs:
# Date Author Notes
# 2021-06-06 flybreak the first version
#
import argparse
import os
import sys
import logging
import time
import json
import requests
LOG_LVL = logging.INFO
def... | 235 | 36.15 | 144 | 17 | 2,012 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c27db07a7078bf02_67626ba2", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://github.com](1) may be at an arbitrary position... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [https://github.com](1) may be at an arbitrary position in the sanitized URL."
] | [
25
] | [
null
] | [
12
] | [
57
] | |
2024-11-18T22:27:43.934413+00:00 | 1,559,897,049,000 | 0df86980be3e7e6daa9b215d093bfc9b914f1114 | 2 | {
"blob_id": "0df86980be3e7e6daa9b215d093bfc9b914f1114",
"branch_name": "refs/heads/master",
"committer_date": 1559897049000,
"content_id": "0905e39b568781ac26cb71065f944fdb369d1c3e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "862ebd1ef7162606043d2d1af354cbb836311a18",
"extension": "py"... | 2.359375 | stackv2 | #!/usr/bin/env python
#
# Copyright (c) 2018 YADRO
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or ... | 175 | 34.45 | 84 | 21 | 1,332 | python | [{"finding_id": "codeql_py/request-without-cert-validation_879387820852e254_c378132a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
53,
76
] | [
null,
79
] | [
15,
15
] | [
50,
46
] | |
2024-11-18T22:14:53.061357+00:00 | 1,385,795,819,000 | 726b63e2f9cb2734482d41328b9eb1ba63668a8c | 3 | {
"blob_id": "726b63e2f9cb2734482d41328b9eb1ba63668a8c",
"branch_name": "refs/heads/master",
"committer_date": 1385795819000,
"content_id": "b3029dfa9e46ea8640817cf93d869df6ac2a71ec",
"detected_licenses": [
"MIT"
],
"directory_id": "019d9148ae97b162d4b4f1f0474de55ee77aaa29",
"extension": "py",
"fi... | 2.921875 | stackv2 | from ConfigParser import SafeConfigParser
from time import sleep
import requests
CONFIG_FILENAME = 'settings.ini'
SECTION_NAME = 'auth'
DELAY_SECONDS = 5
class LoginStatus:
SUCCESS, LOGGED, WRONGPASS, CONNECTION_ERROR, UNKNOWN = range(5) # enum imitation
class Authorizer:
def login(self, username, password... | 93 | 34.65 | 103 | 17 | 658 | python | [{"finding_id": "codeql_py/request-without-cert-validation_0ed9d415f9c2ed6f_27da174b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
17
] | [
27
] | [
17
] | [
29
] | |
2024-11-18T22:55:28.743813+00:00 | 1,437,965,279,000 | 8c8cf5f24ed1db319928859c4ddffc4af8af4ff2 | 2 | {
"blob_id": "8c8cf5f24ed1db319928859c4ddffc4af8af4ff2",
"branch_name": "refs/heads/master",
"committer_date": 1437965279000,
"content_id": "ca6f84b9bfb8d5f3c5bb12b6f5a6e3c85574bef0",
"detected_licenses": [
"MIT"
],
"directory_id": "f4152991173ced88e536660a71722d31cc74540c",
"extension": "py",
"fi... | 2.40625 | stackv2 | from django.shortcuts import render, render_to_response, redirect
from django.template import RequestContext
from django.views.generic import View, ListView, DetailView
from main.models import Paste, Op
from functions import get_values
import datetime
import json
import re
import requests
class PasteView(View):
... | 106 | 36.34 | 78 | 16 | 789 | python | [{"finding_id": "codeql_py/polynomial-redos_f3f778502972c999_43004f16", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma... | 2 | true | [
"CWE-1333",
"CWE-918"
] | [
"py/polynomial-redos",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '9'.",
"The full URL of this request depends on a [user-provided value](1)."
] | [
35,
46
] | [
null,
null
] | [
42,
28
] | [
49,
59
] | |
2024-11-18T22:55:33.973315+00:00 | 1,563,112,703,000 | f0699e877f8c2c52121411f5793bf3bb36503de9 | 3 | {
"blob_id": "f0699e877f8c2c52121411f5793bf3bb36503de9",
"branch_name": "refs/heads/master",
"committer_date": 1563112703000,
"content_id": "1101f971094758895a4c5300bf91e3bc58e62b93",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "53a91db8c501fe3811570848ed932f63ea058b59",
"extension": "py"... | 2.546875 | stackv2 | import re
import crypto
import sys
sys.modules['Crypto'] = crypto
from base64 import b64decode
from base64 import b64encode
from Crypto.Cipher import AES
import base64
import json
import requests
import pendulum
# Padding for the input string --not
# related to encryption itself.
BLOCK_SIZE = 16 # Bytes
pad = lamb... | 197 | 27.27 | 89 | 15 | 1,413 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_f0ad628dc9d1ee5a_8a6e4bb3", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
39,
46
] | [
null,
null
] | [
33,
22
] | [
52,
41
] | |
2024-11-18T22:55:40.557973+00:00 | 1,570,616,651,000 | efabec4fccc118547dad210018e57ede2d9247a0 | 2 | {
"blob_id": "efabec4fccc118547dad210018e57ede2d9247a0",
"branch_name": "refs/heads/master",
"committer_date": 1570616651000,
"content_id": "c03ca85dbe51f8ec2d4955007a87d97a959b8c10",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c0ba94723a2b6cd1cccb10834c5ef8a04c5c3e42",
"extension": "py"... | 2.375 | stackv2 | # coding: utf-8
import sys
import json
import logging
import tornado
import tornado.web
import tornado.ioloop
from tornado.httpserver import HTTPServer
sys.path.append('/home/gump/Software/pycharm-2018.1.6/projects/bert-for-classificaion/')
from sentence_fluency.predictor import predict
WEB_PORT = 1368
class Main... | 60 | 24.63 | 88 | 17 | 332 | python | [{"finding_id": "codeql_py/stack-trace-exposure_6c6a0a50c5e9cac8_2fe1dbbb", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-117"
] | [
"py/stack-trace-exposure",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This log entry depends on a [user-provided value](1)."
] | [
41,
27
] | [
44,
null
] | [
24,
26
] | [
14,
56
] | |
2024-11-18T22:56:17.814617+00:00 | 1,684,821,596,000 | a779a8b0413902bfc9576aa39970e896ccc25aa7 | 3 | {
"blob_id": "a779a8b0413902bfc9576aa39970e896ccc25aa7",
"branch_name": "refs/heads/master",
"committer_date": 1684821596000,
"content_id": "3898ca002d106a1462fdc186606af308bc26ce0b",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "f0fc38108790b649b1d2fd5b36099d08011cdcfe",
"extension": "p... | 3.09375 | stackv2 | import re
from typing import List, Tuple, Dict
class Pattern:
def __init__(self, format_object: Dict[str, str]) -> None:
self._pattern = re.compile(format_object["wallet_regexp"])
self._name = format_object["name"]
self._group = format_object["group"]
self._symbol = format_object[... | 59 | 27.98 | 70 | 12 | 428 | python | [{"finding_id": "codeql_py/redos_024d4e36c182720a_e2ee8469", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '!'.", "remediati... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '!'."
] | [
54
] | [
null
] | [
40
] | [
47
] | |
2024-11-18T22:56:19.562164+00:00 | 1,612,294,518,000 | bea27cd924b2b67a0de410fa27a357622667b6b5 | 4 | {
"blob_id": "bea27cd924b2b67a0de410fa27a357622667b6b5",
"branch_name": "refs/heads/main",
"committer_date": 1612294518000,
"content_id": "80df5ab1a15da07fd10a465bc57cbe6d514c92b7",
"detected_licenses": [
"Unlicense"
],
"directory_id": "4c877df2d8feb3b7647f7f83f3f04a36f1e91b1e",
"extension": "py",
... | 3.671875 | stackv2 | #! python3
# need these to pass bash and let the program reset before trying again
import subprocess
import time
# initialize some stuff
guess = []
guessCharacters = []
totalCharacters = 0
# dictionary of useable characters
passwordCharacters = {"numbers": \
(0, 1, 2, 3, 4, 5, 6, 7, 8, 9)... | 126 | 35.48 | 126 | 16 | 1,164 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bd9a8dc0d90de2f2_ba993b16", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
111,
113,
118
] | [
null,
null,
null
] | [
30,
11,
15
] | [
39,
56,
112
] | |
2024-11-18T22:56:34.910056+00:00 | 1,545,455,454,000 | 015f0db6559293b66363cae7c9a547b5d5865140 | 2 | {
"blob_id": "015f0db6559293b66363cae7c9a547b5d5865140",
"branch_name": "refs/heads/master",
"committer_date": 1545455454000,
"content_id": "6c8eb5bdc14cd4112ed4256dc179ab772605a1ce",
"detected_licenses": [
"MIT"
],
"directory_id": "876561eb2f8946f245332bb6817b56ed789e8d8b",
"extension": "py",
"fi... | 2.328125 | stackv2 | import os
import time
import signal
import json
import requests
from web import is_404, is_403, is_complete, is_banned
from utils import getIP, getIPWithoutLogin, generate_rnd
from config import (headers, time_out, min_crawl_interal,
max_crawl_interal, excp_interal, max_retries)
TIME_OUT = time_ou... | 90 | 31.21 | 109 | 16 | 704 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e95dbf5f4522c75a_2925e7b5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
39
] | [
40
] | [
20
] | [
110
] | |
2024-11-19T00:07:18.498308+00:00 | 1,621,499,344,000 | 68fcc51b096ebbbf1dd21355449552497a79de5b | 3 | {
"blob_id": "68fcc51b096ebbbf1dd21355449552497a79de5b",
"branch_name": "refs/heads/master",
"committer_date": 1621499344000,
"content_id": "17e3f55107f8e815591644c6b7efc9c5e7ab6513",
"detected_licenses": [
"MIT"
],
"directory_id": "ae72e1c3469c6a372037c25d2f8e40710d12d20b",
"extension": "py",
"fi... | 2.625 | stackv2 | from flask import Flask, redirect, request
app = Flask(__name__)
LOOKUP = {
"tutor": "http://pythontutor.com/composingprograms.html",
"book": "https://composingprograms.com",
"python": "https://code.cs61a.org/python",
"scheme": "https://code.cs61a.org/scheme",
"sql": "https://code.cs61a.org/sql",... | 52 | 25.6 | 64 | 14 | 368 | python | [{"finding_id": "codeql_py/url-redirection_3c8352e6a9cd9c65_1688e531", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a ... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](2).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
46,
48
] | [
null,
null
] | [
25,
25
] | [
53,
41
] | |
2024-11-19T00:07:25.007777+00:00 | 1,620,504,856,000 | fbf5d900fdc9678df76ce27523ab10b31ec96edd | 2 | {
"blob_id": "fbf5d900fdc9678df76ce27523ab10b31ec96edd",
"branch_name": "refs/heads/master",
"committer_date": 1620504856000,
"content_id": "3c42dd8a81ec11f929296cb850cbb3a05316c06a",
"detected_licenses": [
"MIT"
],
"directory_id": "8546b944dbf66b1c98219263f424cb1af885967f",
"extension": "py",
"fi... | 2.3125 | stackv2 | from flask import Flask, Response, redirect, url_for, request, session, abort, jsonify, escape
import flask
from flask_login import LoginManager, UserMixin, current_user, \
login_required, login_user, logout_user
import os
from flask_session import Session
from flask_socketio import SocketIO, emit, join_ro... | 222 | 29.74 | 116 | 18 | 1,643 | python | [{"finding_id": "codeql_py/url-redirection_e2bf08742affed7e_4a337492", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
100
] | [
null
] | [
25
] | [
49
] | |
2024-11-19T00:07:28.698071+00:00 | 1,594,801,062,000 | 846b1f7fadcc45f4b2c8251d1ff608fadb5c6cd2 | 3 | {
"blob_id": "846b1f7fadcc45f4b2c8251d1ff608fadb5c6cd2",
"branch_name": "refs/heads/master",
"committer_date": 1594801062000,
"content_id": "ab1d2cff3ff3a2e928cea30ecef80e80e3cf97c2",
"detected_licenses": [
"MIT"
],
"directory_id": "228da799856a4da26fe3836df6708a351926ad1b",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/env python
# $id$
"""
Make gsw_mod_saar_data.f from the current gsw_data_v3_0.nc. This is a developer
utility and not a part of the public distribution, but its end-product is.
Note that it generates gsw_saar_data.c but will not overwrite it if it exists.
General concept: we don't want end-users of this dis... | 250 | 31.55 | 88 | 21 | 2,336 | python | [{"finding_id": "codeql_py/overly-permissive-file_35ab05bac8045f81_3afb0ef3", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in open sets file to world readable."
] | [
188
] | [
null
] | [
10
] | [
80
] | |
2024-11-18T23:28:30.548724+00:00 | 1,631,836,308,000 | 9965fa8c07c32e69614ba2c4eef29d42375227f1 | 3 | {
"blob_id": "9965fa8c07c32e69614ba2c4eef29d42375227f1",
"branch_name": "refs/heads/main",
"committer_date": 1631836308000,
"content_id": "dcd2eeeb13520fba2883a8fd1b9cac0dd776bd50",
"detected_licenses": [
"MIT"
],
"directory_id": "97f8be81a8b8ed13147a1afdeb146f170e27966c",
"extension": "py",
"file... | 3.296875 | stackv2 | import cmd
import glob
import random
import pickle as p
class Proficiency():
NONE = 0
ONCE = 1
TWICE = 2
PROFICIENT = 3
class Card():
proficiency = Proficiency.NONE
def __init__(self, english, fr_m, fr_f):
self.english = english
self.fr_m = fr_m
self.fr_f = fr_f
... | 281 | 28.3 | 86 | 20 | 1,952 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_016af07de8dde589_3426faac", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text."
] | [
33
] | [
null
] | [
19
] | [
79
] | |
2024-11-18T23:39:39.615242+00:00 | 1,605,705,401,000 | ebbabb61a9b4655a9a61cde3f0636bd716626aaa | 3 | {
"blob_id": "ebbabb61a9b4655a9a61cde3f0636bd716626aaa",
"branch_name": "refs/heads/master",
"committer_date": 1605705401000,
"content_id": "fa02514870bbdcef6e98cdccf82cdca58a133b85",
"detected_licenses": [
"MIT"
],
"directory_id": "637397bd7d0c0fb6b4f45a1032de79ea2e96dea0",
"extension": "py",
"fi... | 2.765625 | stackv2 | import datetime
import random
import hashlib
import zhdate
from .almanac_text import do, saying, vtb
async def get_almanac_for_dd(user_id: int, user_name: str) -> str:
# 日期与农历
almanac_geo = datetime.date.today().strftime('%Y年%m月%d日')
almanac_luna = zhdate.ZhDate.today().chinese()
# 初始化随机种子
random_... | 31 | 34.52 | 78 | 11 | 402 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7ac9c9e7a1d88a30_65cadac5", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
15
] | [
null
] | [
16
] | [
47
] | |
2024-11-19T00:05:02.270605+00:00 | 1,613,337,019,000 | 08117422a4b6bfd35484c9f5d365cdd2e611ec19 | 3 | {
"blob_id": "08117422a4b6bfd35484c9f5d365cdd2e611ec19",
"branch_name": "refs/heads/master",
"committer_date": 1613337019000,
"content_id": "846b6249ba2ea936a2d5266d594b02fd25ccbaff",
"detected_licenses": [
"MIT"
],
"directory_id": "fae278fc8c28f7e17004b5216cc21b8b9c7256d6",
"extension": "py",
"fi... | 2.921875 | stackv2 | import pyttsx3
from threading import Thread
from multiprocessing import Queue
import time
from textwrap import wrap
class speaker():
"""
The speaker class handles read requests
"""
queue = Queue()
TEXT_LIMIT_SIZE = 5
stopped = False
def __init__(self):
super().__init__()
se... | 83 | 25.52 | 61 | 15 | 481 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3ac929285c6bd7a0_d1a05f78", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
33
] | [
null
] | [
19
] | [
45
] | |
2024-11-18T23:23:30.004409+00:00 | 1,468,994,327,000 | ad2acf938176f5de2b05de5988a0d18d128c86ef | 3 | {
"blob_id": "ad2acf938176f5de2b05de5988a0d18d128c86ef",
"branch_name": "refs/heads/master",
"committer_date": 1468994327000,
"content_id": "4a17d61d65223659f13f4d3e074dcb5b8f6cbfb5",
"detected_licenses": [
"MIT"
],
"directory_id": "98731548daa91f8f7c10e0bd41e6f5dc59f8cdf7",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/env python
import jinja2
import logging
import os
import webapp2
class MainHandler(webapp2.RequestHandler):
def get(self):
logging.info("%s.get()" % self.__class__.__name__)
template = jinja_environment.get_template('hello.html')
self.response.write(template.render())
class Go... | 31 | 24.29 | 63 | 12 | 187 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d6e7bd748595386e_420be32a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25
] | [
null
] | [
21
] | [
60
] | |
2024-11-19T00:44:17.456588+00:00 | 1,586,158,524,000 | 9cd99a9d99755012fe4cb7a457e90dfd41988954 | 3 | {
"blob_id": "9cd99a9d99755012fe4cb7a457e90dfd41988954",
"branch_name": "refs/heads/master",
"committer_date": 1586158524000,
"content_id": "f947e4db6f778c62809437f3775f6688a63c7142",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7dd1e3a6bff4ffa321017c2c8d8ac534ee4b9799",
"extension": "py"... | 2.5625 | stackv2 | """
@file: tasks
@author: linuxzhen520@163.com
@date: 2020/03/24
@desc:
"""
from . import celery
import time
import random
import paramiko
@celery.task
def celery_task(sth1):
print("celery_app.task start")
delay_time = random.randint(5, 10)
time.sleep(delay_time)
print("celery_app.task end")
r... | 38 | 22.66 | 65 | 12 | 258 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_1711a1500c9cfdb8_115b114b", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
27
] | [
null
] | [
9
] | [
66
] | |
2024-11-19T00:44:20.357106+00:00 | 1,608,001,473,000 | d29db3894ee315c43a29b079a743a7c7ad00066f | 2 | {
"blob_id": "d29db3894ee315c43a29b079a743a7c7ad00066f",
"branch_name": "refs/heads/master",
"committer_date": 1608001473000,
"content_id": "f8a8abae8b2e9d504a001a64dd9004d12906942e",
"detected_licenses": [
"MIT",
"Python-2.0"
],
"directory_id": "4a070bd30cebc29fb5a17633d0cc96e27a580fab",
"exten... | 2.4375 | stackv2 | #!/usr/bin/python3
# -*- coding: utf-8 -*-
"""
| @purpose: Automate data importing UTWeb Server.
| @date: Created on Sat May 1 15:12:38 2019
| @author: Semeon Risom
| @email: semeon.risom@gmail.com
| @url: https://semeon.io/d/R33-analysis
"""
from pdb import set_trace as breakpoint
import os, datetime
... | 217 | 38.35 | 117 | 20 | 1,767 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_faf24a1979cddbf4_1cee1847", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
121
] | [
null
] | [
9
] | [
69
] | |
2024-11-18T23:05:20.957927+00:00 | 1,571,753,752,000 | b3c1ff323cac342f1569ff08301931f00098bd18 | 3 | {
"blob_id": "b3c1ff323cac342f1569ff08301931f00098bd18",
"branch_name": "refs/heads/master",
"committer_date": 1571753752000,
"content_id": "8c5b59c7eb917946959ac04920ea7bdbbf7099a8",
"detected_licenses": [
"MIT"
],
"directory_id": "0d966c8dd7ea5929ef7a5ccc0bf7c4d427d53a93",
"extension": "py",
"fi... | 2.578125 | stackv2 | import traceback
import warnings
import paramiko
warnings.filterwarnings("ignore")
class SshUtil(object):
"""
- Connect remote by SSH and run specific command.
- See also `bage_util.SellUtil`
"""
def __init__(self, hostname, username=None, password=None, port=22, log=None):
self.client ... | 61 | 28.46 | 102 | 16 | 373 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2a414c94839ca38d_d847af47", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to WarningPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to WarningPolicy may be unsafe."
] | [
20
] | [
null
] | [
13
] | [
78
] | |
2024-11-18T23:05:32.412397+00:00 | 1,691,138,554,000 | 232e171a34b35c0eab49c640d0500a434631685b | 3 | {
"blob_id": "232e171a34b35c0eab49c640d0500a434631685b",
"branch_name": "refs/heads/master",
"committer_date": 1691138554000,
"content_id": "938f0a14812f86a86c831ab00387c8fe2b5d1df0",
"detected_licenses": [
"MIT"
],
"directory_id": "e567c779e5c1ec5b601790f35024efc4bff60034",
"extension": "py",
"fi... | 2.59375 | stackv2 | """Get gene's info from NCBI entrez API (PubMed).
https://www.ncbi.nlm.nih.gov/
Downloads only necessary part of Entrez response, just enough to get all the tags
you interested in (parameter fields, values from GeneFields).
So we do not wait for full 2Mb entrez response but only for first 5-6Kb.
The easiest way to u... | 270 | 37.33 | 137 | 18 | 2,452 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_efd119aad61d6504_385628b0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 9 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-295",
"CWE-295"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/request-without-ce... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive dat... | [
179,
183,
186,
191,
201,
202,
243,
169,
214
] | [
null,
null,
null,
null,
null,
null,
null,
173,
219
] | [
17,
23,
23,
17,
27,
19,
13,
20,
19
] | [
101,
85,
83,
100,
81,
75,
115,
10,
10
] | |
2024-11-18T23:05:47.927657+00:00 | 1,601,592,789,000 | 66265ce705179f727a1b6cb91acd31b52997b08c | 3 | {
"blob_id": "66265ce705179f727a1b6cb91acd31b52997b08c",
"branch_name": "refs/heads/master",
"committer_date": 1601592789000,
"content_id": "e58c8af1e332193fec37157ee2d069ebf67e5868",
"detected_licenses": [
"MIT"
],
"directory_id": "4ebc36035895c6d16727fb08030789c1424e7cd4",
"extension": "py",
"fi... | 3.3125 | stackv2 |
import pymongo
import os
from dotenv import load_dotenv
load_dotenv()
DB_USER = os.getenv("MONGO_USER", default="OOPS")
DB_PASSWORD = os.getenv("MONGO_PASSWORD", default="OOPS")
CLUSTER_NAME = os.getenv("MONGO_CLUSTER_NAME", default="OOPS")
connection_uri = f"mongodb+srv://{DB_USER}:{DB_PASSWORD}@{CLUSTER_NAME}.mo... | 86 | 32.17 | 140 | 12 | 734 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9465ecabc5a00473_9ec5f8bd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
15
] | [
null
] | [
15
] | [
29
] | |
2024-11-18T23:05:48.043141+00:00 | 1,537,193,696,000 | 85a04c9ad61bd1e009944659691cadc9a2302b3a | 4 | {
"blob_id": "85a04c9ad61bd1e009944659691cadc9a2302b3a",
"branch_name": "refs/heads/master",
"committer_date": 1537193696000,
"content_id": "33818eac6f11195799d9dee29264c66afe680b8d",
"detected_licenses": [
"MIT"
],
"directory_id": "43536edd4f187830297b35178f558e8963021ce3",
"extension": "py",
"fi... | 3.765625 | stackv2 | from user_accounts import UserAccounts
"""
This is a class that generates new instances of users.
"""
class User:
def __init__(self, first_name, last_name, email, password, platforms):
self.first_name = first_name
self.last_name = last_name
self.email = email
self.password... | 92 | 29.83 | 144 | 17 | 643 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_77c54535c01254e3_b450732e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p... | [
45,
47,
65,
83
] | [
null,
null,
null,
null
] | [
15,
13,
17,
17
] | [
73,
124,
92,
87
] | |
2024-11-18T23:11:01.021051+00:00 | 1,531,142,386,000 | da1043a59e64c88df12611bd44ab05cf20915c3d | 3 | {
"blob_id": "da1043a59e64c88df12611bd44ab05cf20915c3d",
"branch_name": "refs/heads/master",
"committer_date": 1531142386000,
"content_id": "109c5a2171411777aac90e2b8a690ba46a425eee",
"detected_licenses": [
"MIT"
],
"directory_id": "8bf8dfbbbe7902c701b0c935c37ff65adf3a424a",
"extension": "py",
"fi... | 2.90625 | stackv2 | # -*- coding: utf-8 -*-
# @Date : 2017/10/24
# @Author : hrwhisper
import os
from math import pi, cos, sin, atan2, sqrt
import gpxpy.geo
from parse_data import read_mall_data
def get_distance_by_latitude_and_longitude(lat1, lon1, lat2, lon2):
return gpxpy.geo.haversine_distance(lat1, lon1, lat2, lon2)
de... | 66 | 28.7 | 104 | 17 | 581 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c82e3e45710f01cd_f3da9cdb", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
62,
61,
61,
61
] | [
null,
null,
null,
null
] | [
21,
28,
38,
43
] | [
73,
36,
41,
47
] | |
2024-11-19T01:21:48.845971+00:00 | 1,675,810,674,000 | 40bc0efc0dd4507e43c9b7aef4c2253c96f8d49c | 3 | {
"blob_id": "40bc0efc0dd4507e43c9b7aef4c2253c96f8d49c",
"branch_name": "refs/heads/master",
"committer_date": 1675810674000,
"content_id": "6b0944fd943f4b3f17a021445eb945e4d463dadc",
"detected_licenses": [
"MIT"
],
"directory_id": "40642628e19f66ed12eb0cec0837be3efd673348",
"extension": "py",
"fi... | 2.5625 | stackv2 | #!/usr/bin/env python3
import configparser
import praw
import json
import time
print("Reading config")
config = configparser.ConfigParser()
config.read("config.ini")
# someone who knows python please tell me there's a better way to do this
subreddit = config["Options"]["subreddit"]
interval = int(config["Options"]["... | 263 | 33.59 | 158 | 17 | 2,118 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_e569cb43c548a620_af5ecb6e", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [i.imgur.com](1) may be at an arbitrary position in the... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [i.imgur.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [pbs.twimg.com](1) may be at an arbitrary position in the sanitized URL."
] | [
218,
220
] | [
null,
null
] | [
8,
8
] | [
28,
30
] | |
2024-11-19T01:21:49.111850+00:00 | 1,398,245,114,000 | ad0f7e413fa97df03510d940304b9173d7ef06bf | 3 | {
"blob_id": "ad0f7e413fa97df03510d940304b9173d7ef06bf",
"branch_name": "refs/heads/master",
"committer_date": 1398245114000,
"content_id": "d7cc1287c0af6d209cd9ad015f6d5de10b91ca4c",
"detected_licenses": [
"MIT"
],
"directory_id": "7bb76a38aa21a95ca35c6eeeebf89270453e6743",
"extension": "py",
"fi... | 2.578125 | stackv2 | import paramiko
class ssh(object):
def __init__(self, host, user, pwd, pkey, debug=False):
self.user = user
self.host = host
self.debug = debug
self.client = paramiko.SSHClient()
self.client.set_missing_host_key_policy(paramiko.AutoAddPolicy())
self.client.c... | 44 | 28.2 | 89 | 15 | 290 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_1ca490a41fb42d66_bc9a8c74", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
10
] | [
null
] | [
9
] | [
74
] | |
2024-11-19T00:11:47.697924+00:00 | 1,619,117,351,000 | 8f97fc25a5189d5fd09d19180c085eba924c15a9 | 4 | {
"blob_id": "8f97fc25a5189d5fd09d19180c085eba924c15a9",
"branch_name": "refs/heads/main",
"committer_date": 1619117351000,
"content_id": "7fce96f849aa3164eece22564406eb10fbdb0ea7",
"detected_licenses": [
"MIT"
],
"directory_id": "a884039e1a8b0ab516b80c2186e0e3bad28d5147",
"extension": "py",
"file... | 3.671875 | stackv2 | # Program: Exemplos_VideoAula11.py
# Author: Ramon R. Valeriano
# Description: Exemplos de Video aula, DICIONÁRIO
# Developed: 28/04/2020 - 18:17
# Updated:
registro = dict()
name = str(input("Enter with your name: "))
date_birth = int(input("Enter wiht your year of birth: "))
if date_birth > 0 :
work = int(inpu... | 29 | 27.48 | 58 | 13 | 250 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6afa365943f30876_2e1dc9e2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
29
] | [
null
] | [
11
] | [
23
] | |
2024-11-19T00:24:55.015018+00:00 | 1,636,705,603,000 | 30044a86396fd49bccdb16f884bd64082044a54c | 3 | {
"blob_id": "30044a86396fd49bccdb16f884bd64082044a54c",
"branch_name": "refs/heads/main",
"committer_date": 1636705603000,
"content_id": "460a77f1a81833a3c4ed164378fae21b23441ed2",
"detected_licenses": [
"MIT"
],
"directory_id": "0a0e915f12db251ab2b571799e7f77d634613e7f",
"extension": "py",
"file... | 2.53125 | stackv2 | ### Package Import ###
from fastapi import Response, Request
from datetime import timedelta
### AppCode Import ###
from Server.Schema.UserSchema import UserSchemaDTO, UserRegisterSchemaDTO
from Server.Model import UserModel as um
def user_login(response:Response, request:Request, user:UserSchemaDTO):
try:
... | 101 | 32.45 | 84 | 14 | 614 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_96e87b4b227632c1_8bb09db1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
53
] | [
null
] | [
19
] | [
27
] | |
2024-11-19T00:36:48.919422+00:00 | 1,585,978,470,000 | 0b0a99f0dcd032ab0cffc2b1dc37d252ab1919a5 | 2 | {
"blob_id": "0b0a99f0dcd032ab0cffc2b1dc37d252ab1919a5",
"branch_name": "refs/heads/master",
"committer_date": 1585978470000,
"content_id": "7dd8c35827679636921d6bace701f6981a16b0d5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7b49e7cab5ccf3ecadf4adb8d98477c8316398d2",
"extension": "py"... | 2.328125 | stackv2 | from django.shortcuts import render, HttpResponse
# Create your views here.
# 主页
def index(request):
return HttpResponse('这是主页')
# 注册
def register(request):
return render(request, 'register.html')
# 登录
def login(request):
print(request.POST)
if request.method == 'POST':
user = request.POST.g... | 22 | 23.14 | 72 | 12 | 121 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_38ca322cf6e3c522_5abdc9d7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
19
] | [
null
] | [
21
] | [
24
] | |
2024-11-19T00:36:51.891190+00:00 | 1,520,569,582,000 | 3e92ab4e060e49d64b7afc05faed14fa42fa7441 | 3 | {
"blob_id": "3e92ab4e060e49d64b7afc05faed14fa42fa7441",
"branch_name": "refs/heads/master",
"committer_date": 1520569582000,
"content_id": "6f20b22a5d91716ec7d9f97f3cef827dd6a745ad",
"detected_licenses": [
"MIT"
],
"directory_id": "9f37bb2ab0c594cf7badfb175c66b55aa3b7a33f",
"extension": "py",
"fi... | 2.953125 | stackv2 | from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
from cryptography.hazmat.backends import default_backend
BLOCK_SIZE = 16
def encrypt(plaintext, key, mode="ECB", iv=None):
cipher = getCipher(key, mode, iv, True)
plaintext = addPadding(plaintext)
return cipher.encryptor().update... | 49 | 29.37 | 76 | 14 | 378 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_d1440fd146364f12_58988439", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.\n[The block mode ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.\n[The block mode CBC](2) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.\n[The block mode CBC](2) is broken or weak, and should not be used."
] | [
9,
13
] | [
null,
null
] | [
12,
17
] | [
48,
54
] | |
2024-11-19T01:02:15.587221+00:00 | 1,532,292,757,000 | 2878494bced68a123b48fc7cf750dfd5e2ea775b | 3 | {
"blob_id": "2878494bced68a123b48fc7cf750dfd5e2ea775b",
"branch_name": "refs/heads/master",
"committer_date": 1532292757000,
"content_id": "78bc500205ca24354a6cefd3392b2477aed4ceb0",
"detected_licenses": [
"MIT"
],
"directory_id": "4ef398ee3459cb3fe2001cbf8fdfacfc03dd6c60",
"extension": "py",
"fi... | 2.71875 | stackv2 | import requests
with open('access_token', 'r') as f:
access_token = f.read().rstrip()
with open('secret', 'r') as f:
secret = f.read().rstrip()
print(access_token, secret)
headers = {'Authorization' : 'Bearer %s' % access_token}
api_base_url = 'https://www.strava.com/api/v3/'
api_activities = api_base_url+... | 29 | 23.28 | 72 | 12 | 183 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d8beb14da3805f61_30577407", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
9
] | [
null
] | [
21
] | [
27
] | |
2024-11-19T01:02:29.428303+00:00 | 1,464,064,016,000 | 28e494e4b8b335cd133e9b0871810fa45783225b | 3 | {
"blob_id": "28e494e4b8b335cd133e9b0871810fa45783225b",
"branch_name": "refs/heads/master",
"committer_date": 1464064016000,
"content_id": "347b824f6febeba8b6094bdd842cfeca51396714",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c0bd7e009e6b4ad6ce221e35ae8fb0adb3523bbc",
"extension": "py"... | 2.953125 | stackv2 | """BuildingDepot helper
Provides helper methods to post data to Building Depot via its REST APIs
"""
import requests
import time
import json
import time
import calendar
from json_setting import JsonSetting
class BuildingDepotHelper:
'''Building Depot Helpe Class'''
def __init__(self, settingFilePath="./knocki... | 115 | 35.11 | 86 | 14 | 846 | python | [{"finding_id": "codeql_py/request-without-cert-validation_50620d65416e659e_defc820f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
31
] | [
null
] | [
18
] | [
66
] | |
2024-11-18T23:48:39.917111+00:00 | 1,476,607,362,000 | 58cfac43b7b13e3ffa5f41f09dd1e4b8ee61be01 | 3 | {
"blob_id": "58cfac43b7b13e3ffa5f41f09dd1e4b8ee61be01",
"branch_name": "refs/heads/master",
"committer_date": 1476607362000,
"content_id": "ab8d801690668fe54dcb52b383fdeaa3d4694d21",
"detected_licenses": [
"MIT"
],
"directory_id": "e4e3fd38e66869a91153edd9de0c1694ad963edb",
"extension": "py",
"fi... | 2.6875 | stackv2 | import json
import threading
import time
import logging
import socket
import ssl
from ..exceptions import SocketError
class BetfairStream:
"""Stream holder, socket connects to betfair,
pushes any received data to listener
"""
__host = 'stream-api.betfair.com'
__port = 443
__CRLF = '\r\n'
... | 153 | 32.14 | 103 | 17 | 1,072 | python | [{"finding_id": "codeql_py/insecure-default-protocol_336b4aad1aba18d6_a5e689ac", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
106
] | [
null
] | [
13
] | [
31
] | |
2024-11-18T23:48:42.603280+00:00 | 1,636,042,919,000 | fee5b53f11ab105648c140adebd3835748f80480 | 3 | {
"blob_id": "fee5b53f11ab105648c140adebd3835748f80480",
"branch_name": "refs/heads/master",
"committer_date": 1636042919000,
"content_id": "da17ddb9b5aa9d4ac10545331093e16085395be4",
"detected_licenses": [
"MIT"
],
"directory_id": "081a998e3e92966007645b74a0ab5754acb6ed9b",
"extension": "py",
"fi... | 2.703125 | stackv2 | from collections import defaultdict
from operator import itemgetter
from typing import List
from tqdm import tqdm
from .language_predictors.util import GENDER
def get_src_indices(instance: List[str]) -> List[int]:
"""
(English)
Determine a list of source side indices pertaining to a
given instance i... | 119 | 30.61 | 113 | 16 | 884 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_96f197c1b608e9b1_5f80046c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
100
] | [
null
] | [
11
] | [
17
] | |
2024-11-19T01:51:50.123904+00:00 | 1,609,956,791,000 | 6e10a7c81db2cdcbc2f1f9ae87ac192ae2edcab7 | 2 | {
"blob_id": "6e10a7c81db2cdcbc2f1f9ae87ac192ae2edcab7",
"branch_name": "refs/heads/main",
"committer_date": 1609956791000,
"content_id": "8f6ad0d9caf1e0547d0837b37b91fcbbed261a79",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7e445080fe2d1e9ec320039054dea2d499f0a42f",
"extension": "py",
... | 2.484375 | stackv2 | import os
import sqlite3
from pathlib import Path
from flask import Flask
ROOT_DIR = str(Path(os.path.dirname(__file__)).parent)
DATABASE = ROOT_DIR + '/db/database.db'
SCHEMA = ROOT_DIR + '/db/schema.sql'
app = Flask(__name__)
g = {'_database': None}
def get_db():
db = getattr(g, '_database', None)
if db ... | 60 | 22 | 81 | 14 | 366 | python | [{"finding_id": "codeql_py/reflective-xss_2a8128477e70c05d_3bf985b7", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
60
] | [
null
] | [
16
] | [
82
] | |
2024-11-19T01:51:57.633217+00:00 | 1,411,088,833,000 | c2442587343452d1c860398aa047241fba0bc52d | 3 | {
"blob_id": "c2442587343452d1c860398aa047241fba0bc52d",
"branch_name": "refs/heads/master",
"committer_date": 1411088833000,
"content_id": "4b4fc510396d0c8a53ad4a711a3a0a1b73f010ee",
"detected_licenses": [
"MIT"
],
"directory_id": "d5488c68f031a8a4cc7fd1bd4fc6e4516c646991",
"extension": "py",
"fi... | 2.796875 | stackv2 | #!/usr/bin/env python
"""
Python library to check Euroticket à la card balance and recent history.
"""
import argparse
import collections
import http.cookiejar
import urllib
import ssl
from html.parser import HTMLParser
from xml.etree import ElementTree
Card = collections.namedtuple('Card', ['card_holder_name', 'car... | 195 | 38.86 | 114 | 21 | 1,786 | python | [{"finding_id": "codeql_py/insecure-protocol_5bae3b5d184516d1_74532ec1", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.SSLContext](1)."
] | [
47
] | [
null
] | [
61
] | [
95
] | |
2024-11-19T01:40:02.877263+00:00 | 1,526,869,969,000 | b2d88ff0262359ad22178759dae63c714f22ee2c | 3 | {
"blob_id": "b2d88ff0262359ad22178759dae63c714f22ee2c",
"branch_name": "refs/heads/master",
"committer_date": 1526869969000,
"content_id": "08eb943ec44394e2f59b820c9b1d98fbc3b6b9aa",
"detected_licenses": [
"MIT"
],
"directory_id": "095400c80c8751bfca43d5aa39d2af444997b17e",
"extension": "py",
"fi... | 2.609375 | stackv2 | import jinja2, os, json
print "\n\n!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
print " >>Warning YOU ARE ABOUT TO DELETE DEVICES FROM CISCO PRIME << "
print "!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!\n"
print "\n*******************... | 35 | 31.03 | 89 | 9 | 241 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4721b1394f7ab553_1f3921c6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
23
] | [
null
] | [
8
] | [
79
] | |
2024-11-18T23:43:32.095999+00:00 | 1,641,888,508,000 | 345c7fdae6bf24471b2e006a7278a28df017ea2d | 2 | {
"blob_id": "345c7fdae6bf24471b2e006a7278a28df017ea2d",
"branch_name": "refs/heads/master",
"committer_date": 1641888508000,
"content_id": "ae5d7a4b21c2679342edd3314f302eb390a61d19",
"detected_licenses": [
"MIT"
],
"directory_id": "b6e5193bccb412c6670b69dd1263c8164f92e3cb",
"extension": "py",
"fi... | 2.390625 | stackv2 | from json import JSONEncoder
from flask import Flask, jsonify, request, send_from_directory
from flask_talisman import Talisman
from midi_process import process_midi
DEFAULT_SONG = process_midi("sample-midi/happy-birthday-simplified.mid")
class ObjectJSONEncoder(JSONEncoder):
def default(self, o):
try:
... | 50 | 22.48 | 72 | 14 | 269 | python | [{"finding_id": "codeql_py/stack-trace-exposure_f27f41f4302305db_f437e842", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
45
] | [
null
] | [
41
] | [
50
] | |
2024-11-19T00:33:05.865842+00:00 | 1,497,604,846,000 | a278d4ce5d7d1f3502400a01acbb5c4d589384f4 | 3 | {
"blob_id": "a278d4ce5d7d1f3502400a01acbb5c4d589384f4",
"branch_name": "refs/heads/master",
"committer_date": 1497604846000,
"content_id": "b75fa9d3fb5e0a83e8f3ff635aea95ec465b0d82",
"detected_licenses": [
"MIT"
],
"directory_id": "28be2173e5590cc5b03119e9b83c57980e6a7e8a",
"extension": "py",
"fi... | 2.90625 | stackv2 | import phonenumbers
import re
def _required(func):
def decorator(*args, **kwargs):
required = kwargs.get('required', False)
if 'required' in kwargs:
del kwargs['required']
def required_validator(data):
if required and data is None:
return 'Field is re... | 118 | 26.83 | 122 | 14 | 809 | python | [{"finding_id": "codeql_py/redos_ae9cbe0d656bc3b7_85319820", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\013'."
] | [
53
] | [
null
] | [
18
] | [
93
] | |
2024-11-19T01:17:58.240211+00:00 | 1,498,395,064,000 | 42c8d3d839f40a9a3be86de39a910714f8c17d68 | 2 | {
"blob_id": "42c8d3d839f40a9a3be86de39a910714f8c17d68",
"branch_name": "refs/heads/master",
"committer_date": 1498395064000,
"content_id": "542ede515389ffa93c220064d8f040fe399b9e7c",
"detected_licenses": [
"MIT"
],
"directory_id": "2e0ffeea2451c3295823c464ef823eb0659a5359",
"extension": "py",
"fi... | 2.453125 | stackv2 | import OpenSSL
from OpenSSL import crypto, SSL
from OpenSSL.crypto import Error
from OpenSSL.crypto import FILETYPE_PEM
from OpenSSL.crypto import dump_certificate
from OpenSSL.crypto import dump_privatekey
from OpenSSL.crypto import load_certificate
from OpenSSL.crypto import load_privatekey
import re
from os.path im... | 117 | 37.03 | 128 | 17 | 975 | python | [{"finding_id": "codeql_py/insecure-protocol_04a65b84db52cad9_cc4018fe", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to OpenSSL.SSL.Context](1).", "remediation": ""... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 specified by [call to OpenSSL.SSL.Context](1)."
] | [
107
] | [
null
] | [
19
] | [
64
] | |
2024-11-19T00:15:29.365219+00:00 | 1,527,503,128,000 | 622b5af9f65dfdebc84b38c8efb4f5b4021a7d92 | 3 | {
"blob_id": "622b5af9f65dfdebc84b38c8efb4f5b4021a7d92",
"branch_name": "refs/heads/master",
"committer_date": 1527503128000,
"content_id": "e627310c7c77dcc537a1b7334861527af38d53cc",
"detected_licenses": [
"MIT"
],
"directory_id": "53360fe03154d821fe05cff682b7e5f3ccffdf2c",
"extension": "py",
"fi... | 2.90625 | stackv2 | # -*- coding: utf-8 -*-
___author___ = "Morando Nicolò"
___version___ = "0.1.2"
import cherrypy
import os
from jinja2 import Environment, FileSystemLoader
import random
import string
'''
declaration of the field of use, of the python code (cherry)
'''
enviroment = Environment(loader = FileSystemLoader('html'))
''... | 60 | 22.63 | 98 | 15 | 346 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fafe4862c2e90d87_5ac5585a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
16
] | [
null
] | [
14
] | [
60
] | |
2024-11-19T00:16:06.159837+00:00 | 1,532,971,162,000 | 6f4779387f32c0cc26642982faa8fec9dd8b045c | 3 | {
"blob_id": "6f4779387f32c0cc26642982faa8fec9dd8b045c",
"branch_name": "refs/heads/master",
"committer_date": 1532971162000,
"content_id": "344a2998e5ba05411e1d37f8260a847f7953f0ff",
"detected_licenses": [
"MIT"
],
"directory_id": "111cdba24c3f2bffa6202dc040395144c8cf8ee6",
"extension": "py",
"fi... | 2.734375 | stackv2 | import os
import base64
from Crypto.Cipher import AES
chave = "0123456789ABCDEF"
aes = AES.new(chave, AES.MODE_ECB)
pastaUsuario =os.getcwd()+"/exercicio"
for root, dirs, arquivos in os.walk(pastaUsuario):
for nome in arquivos:
arq=(os.path.join(root, nome))
arq_entrada = open(arq, "r"... | 30 | 25.87 | 77 | 19 | 238 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_2e0f7f770f859ae5_ac132773", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
20,
22
] | [
null,
null
] | [
42,
38
] | [
66,
77
] | |
2024-11-19T00:16:09.914521+00:00 | 1,569,658,648,000 | 9e19fe7d3344b159cf6872ef45b57c4e9e9e67cb | 4 | {
"blob_id": "9e19fe7d3344b159cf6872ef45b57c4e9e9e67cb",
"branch_name": "refs/heads/master",
"committer_date": 1569658648000,
"content_id": "be589e7faf27ac5afa08e75f1cafddd286111f4f",
"detected_licenses": [
"MIT"
],
"directory_id": "2cb19ab173cc50bebf4cbf815731447f52bb553b",
"extension": "py",
"fi... | 3.625 | stackv2 | import sqlite3
northwind_conn = sqlite3.connect('northwind_small.sqlite3')
northwind_cursor1 = northwind_conn.cursor()
most_expensive_query = (
'SELECT ProductName FROM ' +
'(SELECT * FROM Product ' +
'Order by UnitPrice DESC LIMIT 10);'
)
most... | 112 | 33.39 | 87 | 13 | 826 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ac099d6bf85f1d5b_5857ac38", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
82
] | [
83
] | [
11
] | [
70
] | |
2024-11-19T00:28:38.930471+00:00 | 1,586,696,969,000 | f9e0f7a54bcedbed853a0adb8cac3f6fbb16b19e | 2 | {
"blob_id": "f9e0f7a54bcedbed853a0adb8cac3f6fbb16b19e",
"branch_name": "refs/heads/master",
"committer_date": 1586696969000,
"content_id": "140d311b4fc0f000bccbc3258c7f578583dde090",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8cced97a617f980cca7b5e1342ac15e2ffbf8d33",
"extension": "py"... | 2.328125 | stackv2 | from ..CommonInterface import CommonInterfaceNslcm
from .helpers import Helpers
import json
import requests
import tarfile
class Nslcm(CommonInterfaceNslcm):
"""
Lifecycle Management interface
"""
def __init__(self, host, port=9999):
self._host = host
self._port = port
self._bas... | 395 | 37.65 | 110 | 14 | 3,443 | python | [{"finding_id": "codeql_py/request-without-cert-validation_31c6b52abfd0c1a9_09cdd1d0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 8 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"... | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
49,
95,
131,
198,
231,
267,
308,
329
] | [
null,
96,
132,
null,
null,
null,
null,
null
] | [
17,
17,
17,
17,
17,
17,
17,
17
] | [
97,
49,
49,
86,
97,
87,
97,
97
] | |
2024-11-19T00:28:46.736894+00:00 | 1,684,352,409,000 | 64f4347df9b9bb0b0604e7630438385017e04789 | 3 | {
"blob_id": "64f4347df9b9bb0b0604e7630438385017e04789",
"branch_name": "refs/heads/master",
"committer_date": 1684352409000,
"content_id": "5bbfbe74e52f6701324bb84377695ea7b6bcb9c4",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "ac5c804478b28611208a862fbe64de54562d820a",
"extension": "p... | 2.90625 | stackv2 | """Useful decorators.
"""
import os
import json
import uuid
import logging
import datetime
import time
import threading
from contextlib import ContextDecorator
import wrapt
from flask import request, g
def _start_watch(name, w_type, args, kwargs, show_args=False):
"""Helper function to start watching command
... | 263 | 32.25 | 77 | 18 | 2,023 | python | [{"finding_id": "codeql_py/log-injection_795ee0945199487b_6375f105", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
173
] | [
null
] | [
59
] | [
62
] | |
2024-11-19T00:50:16.755139+00:00 | 1,409,201,183,000 | 7752eda75134169b324e6db408f06f1f46931472 | 2 | {
"blob_id": "7752eda75134169b324e6db408f06f1f46931472",
"branch_name": "refs/heads/master",
"committer_date": 1409201183000,
"content_id": "557691ce652211a65b95bd2dcc85350258ac0d96",
"detected_licenses": [
"Unlicense"
],
"directory_id": "0acb3504e00132ff702c27f31288e24b3bdb6156",
"extension": "py",... | 2.46875 | stackv2 | #!/usr/bin/env python3
from bs4 import BeautifulSoup
from datetime import datetime
from os import path, sep
import sys
from glob import glob
import re
import collections
from decimal import *
from jinja2 import Environment, PackageLoader
# REPORTS_DIR = 'C:\\NullpoMino\\report' # windows example
REPORTS_DIR = '/home... | 116 | 38.28 | 77 | 27 | 1,157 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9988aff90ed31f4a_40f6e5a5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
110
] | [
null
] | [
7
] | [
47
] | |
2024-11-19T00:51:23.495463+00:00 | 1,331,611,355,000 | 92cb026403bc888244f8823643dc6221219cf997 | 3 | {
"blob_id": "92cb026403bc888244f8823643dc6221219cf997",
"branch_name": "refs/heads/master",
"committer_date": 1331611355000,
"content_id": "4769fe2b2ff5697edac867610350404b8e93b4ae",
"detected_licenses": [
"MIT"
],
"directory_id": "cb202849ab49e23e1eda422875e9d984bdaa0121",
"extension": "py",
"fi... | 2.65625 | stackv2 | import os
import random
import re
import shutil
import sys
apps = ['app1', 'app2', 'app3']
def copy_template(name):
"""
Copies the project_template directory structure.
"""
destination = '/Users/jonathan/projects/'
# destination = '/Users/nickficano/Desktop/temp/'
top_dir = os.path.join(dest... | 66 | 29.89 | 126 | 17 | 482 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_615492fd1974aeb8_0d37792e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
35
] | [
null
] | [
26
] | [
126
] | |
2024-11-19T01:30:50.939689+00:00 | 1,545,692,248,000 | 096383f187fbf0cb2d0ca9afb40c59e25b3a9135 | 3 | {
"blob_id": "096383f187fbf0cb2d0ca9afb40c59e25b3a9135",
"branch_name": "refs/heads/master",
"committer_date": 1545692248000,
"content_id": "1660f48dd2ad7ec0eed3a766cbbc2d7e44daa27d",
"detected_licenses": [
"MIT"
],
"directory_id": "0e35bbd48b3f3bd3f77a6b1c97222558cc4fa900",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/env python3
###############################################################################
# Module Imports
###############################################################################
import base64
import jinja2
import os.path
import pathlib
import random as rand
import shutil
import subprocess
import... | 140 | 29.56 | 79 | 13 | 958 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b974f053430737d7_6c6d6712", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
70
] | [
null
] | [
7
] | [
67
] | |
2024-11-19T01:30:52.329035+00:00 | 1,516,570,891,000 | 23ea155e4235a688d2d61ec8ff98c2279685a03c | 3 | {
"blob_id": "23ea155e4235a688d2d61ec8ff98c2279685a03c",
"branch_name": "refs/heads/master",
"committer_date": 1516570891000,
"content_id": "9244e8f8577db96b71dc24f9d06bd1f3a29a79a4",
"detected_licenses": [
"MIT"
],
"directory_id": "abdb29dc22a4a714e48c8d1366e95448ce65c674",
"extension": "py",
"fi... | 3.03125 | stackv2 | import requests
class BitBank(object):
def __init__(self, api_key):
self.api_key = api_key
def fetch_pair(self, currency_pair):
"""
:param currency_pair: str market pair name e.g. "BTC_ETH"
:return: latest forecasts/featureset for the given currency_pair
"""
t... | 54 | 35.15 | 115 | 16 | 406 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_31dd7545892db231_164fdf55", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
18,
33,
49
] | [
null,
null,
null
] | [
23,
23,
23
] | [
93,
93,
93
] | |
2024-11-19T02:05:00.434522+00:00 | 1,503,160,870,000 | 38af7a53835dbb21a49f7b9e7dbb97cd205e2eaa | 3 | {
"blob_id": "38af7a53835dbb21a49f7b9e7dbb97cd205e2eaa",
"branch_name": "refs/heads/master",
"committer_date": 1503160870000,
"content_id": "49af9d5fa7d3572d92fce072767069630fe42774",
"detected_licenses": [
"MIT"
],
"directory_id": "fe9c592d524755da6f1a4bf3b691482593432f0c",
"extension": "py",
"fi... | 2.71875 | stackv2 | # -*- coding: utf-8 -*-
from flask import render_template, redirect, request, url_for, flash
from flask_login import login_user, logout_user, login_required, current_user
from . import auth
from .. import db
from ..models import User
from .forms import LoginForm, RegistrationForm, ChangePasswordForm,\
ChangeEmailFo... | 93 | 30.41 | 78 | 16 | 714 | python | [{"finding_id": "codeql_py/url-redirection_654c753d30e63d18_cea91d19", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
21
] | [
null
] | [
29
] | [
78
] | |
2024-11-19T00:53:38.017073+00:00 | 1,528,116,993,000 | 07665cead73069ce1de316949d395a2bbf10f7d8 | 3 | {
"blob_id": "07665cead73069ce1de316949d395a2bbf10f7d8",
"branch_name": "refs/heads/master",
"committer_date": 1528116993000,
"content_id": "0e1835ae109714948bd8d0ad6418752936b3b9b4",
"detected_licenses": [
"MIT"
],
"directory_id": "33ae38625f65b685ea7673d2e8f01e25f308e85d",
"extension": "py",
"fi... | 2.515625 | stackv2 | import requests
import sys
import random
import base64
white = '\033[97m'
green = '\033[92m'
red = '\033[91m'
yellow = '\033[93m'
end = '\033[0m'
back = '\033[7;91m'
info = '\033[33m[!]\033[0m'
que = '\033[34m[?]\033[0m'
bad = '\033[31m[-]\033[0m'
good = '\033[32m[+]\033[0m'
run = '\033[97m[~]\033[0m'
if sys.version_... | 63 | 32.79 | 130 | 21 | 799 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_60f0139bbe04c8a8_c31260a4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
55
] | [
null
] | [
16
] | [
66
] | |
2024-11-19T02:00:57.765519+00:00 | 1,583,209,243,000 | 00e60c80d7c28bc9b00574038d01138f97a37306 | 3 | {
"blob_id": "00e60c80d7c28bc9b00574038d01138f97a37306",
"branch_name": "refs/heads/master",
"committer_date": 1583209243000,
"content_id": "fbca7d779fe318c16803d31487451d78bf6b1bc9",
"detected_licenses": [
"MIT"
],
"directory_id": "70ba8427a8ee5e16d7a9f577409965ed75abf167",
"extension": "py",
"fi... | 2.609375 | stackv2 | import re
# number_mapping = {'1': 'one',
# '2': 'two',
# '3': 'three',
# '4' : ['one', 'otw', 'itw'] }
# s = "1 testing 2 3"
# # print (re.sub(r'\d', s, lambda x: number_mapping[x.group()]))
# # print(number_mapping)
# for k,v in number_mapping.items():
# i... | 69 | 24.91 | 122 | 8 | 501 | python | [{"finding_id": "codeql_py/redos_f2e7bc03dcf65dd4_649c663a", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '/*' and containing many repetitio... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '/*' and containing many repetitions of '\\n'.",
"This part of the regular expression may cause exponential backtracking on strings starting with '/**' and containing many repetitions of '\\n*'."
] | [
58,
58
] | [
null,
null
] | [
18,
35
] | [
52,
49
] | |
2024-11-19T02:01:01.461483+00:00 | 1,609,788,103,000 | 659d39378eb469dab2dd82fa08101e74a7668520 | 2 | {
"blob_id": "659d39378eb469dab2dd82fa08101e74a7668520",
"branch_name": "refs/heads/master",
"committer_date": 1609788103000,
"content_id": "176fb73ee756fb060f2490b684c6fde2af00c261",
"detected_licenses": [
"MIT"
],
"directory_id": "92f0c73936c45d683a2d3b87465840b7b1b9817a",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/python -tt
# TODO:
# - JSON body for GET requests
"""Client for talking to a RESTful server. Maybe just even a regular web server."""
from collections import namedtuple
import Cookie
import base64
import dbg
import hashlib
import os
import re
import socket
import sys
import time
import urllib
import urlp... | 409 | 37.67 | 163 | 28 | 3,382 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0dc3bb266bce8cca_8fbe08cc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text."
] | [
286
] | [
null
] | [
34
] | [
91
] | |
2024-11-19T00:40:22.977437+00:00 | 1,600,393,483,000 | 716ca406484ae249509504ae24c5a89ad298b442 | 3 | {
"blob_id": "716ca406484ae249509504ae24c5a89ad298b442",
"branch_name": "refs/heads/master",
"committer_date": 1600393483000,
"content_id": "92ac8c0dcc755a65f9369ff91b8417950ab785ea",
"detected_licenses": [
"MIT"
],
"directory_id": "aee58fd0ef8f44c04e08016c25740edeb884568f",
"extension": "py",
"fi... | 3.25 | stackv2 | import operator
import random
# This script assumes that the user has a large window full of YouTube tabs with music, and a large window that has non-music tabs.
# The user also opens YouTube tabs in other windows from time to time - music or not music.
# The script assumes there's only one large (>30) all-music windo... | 165 | 38.48 | 131 | 16 | 1,489 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c17f5f1edce799a4_5cfb6d13", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com/](1) may be at an arbitrary position in th... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The string [youtube.com/](1) may be at an arbitrary position in the sanitized URL.",
"The string [youtube.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [youtube.com](1) may be at an arbitrary position in the sanitized URL."
] | [
25,
31,
115
] | [
null,
null,
null
] | [
45,
40,
40
] | [
77,
64,
64
] | |
2024-11-19T01:06:13.187773+00:00 | 1,572,507,736,000 | ffd2437f23fc4dd18d244c91055945306305b8c6 | 3 | {
"blob_id": "ffd2437f23fc4dd18d244c91055945306305b8c6",
"branch_name": "refs/heads/master",
"committer_date": 1572507736000,
"content_id": "f0cdad6c6152ae4bcb627d6cb4449ea691c2d8d8",
"detected_licenses": [
"MIT"
],
"directory_id": "d62a8e38a5208ccfc7c902766c7c5f3637f153d7",
"extension": "py",
"fi... | 3.03125 | stackv2 | from flask import Blueprint, request, jsonify, render_template
from file_processing import write_file, read_file, read_lines, rewrite_file
lesson_5 = Blueprint('lesson_5', __name__)
@lesson_5.route('/post_request', methods = ['POST'])
def post_request():
return request.args
@lesson_5.route('/write_to_file', method... | 80 | 25.1 | 75 | 13 | 541 | python | [{"finding_id": "codeql_py/reflective-xss_3257ab0fb104538f_7e7e5a86", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
8,
21,
33
] | [
null,
null,
null
] | [
10,
10,
12
] | [
22,
52,
27
] | |
2024-11-19T01:17:14.419946+00:00 | 1,653,618,896,000 | ef9807f9eac6dc8fef16d772a673ceeda61103bd | 3 | {
"blob_id": "ef9807f9eac6dc8fef16d772a673ceeda61103bd",
"branch_name": "refs/heads/master",
"committer_date": 1653618896000,
"content_id": "a6edcf4418a86e77638ca9b5a636692241373534",
"detected_licenses": [
"MIT"
],
"directory_id": "f1254516c22a10eafff4da137f03730809491bef",
"extension": "py",
"fi... | 2.9375 | stackv2 | import os
import tarfile
from six.moves import urllib
import pandas as pd
import matplotlib.pyplot as plt
import numpy as np
import hashlib
from sklearn.model_selection import train_test_split
from sklearn.model_selection import StratifiedShuffleSplit
from pandas.plotting import scatter_matrix
from sklearn.preprocessin... | 151 | 30.81 | 89 | 13 | 1,235 | python | [{"finding_id": "codeql_py/tarslip_c79c573f8cc7ca58_a5c6cf8f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
32
] | [
null
] | [
5
] | [
16
] | |
2024-11-19T01:17:15.789462+00:00 | 1,438,932,973,000 | d2bc9aa80267621262a82244099ed50c2534bad0 | 3 | {
"blob_id": "d2bc9aa80267621262a82244099ed50c2534bad0",
"branch_name": "refs/heads/master",
"committer_date": 1438932973000,
"content_id": "50d3809cd946d7b7493b448fc6736dd68b5e055a",
"detected_licenses": [
"MIT"
],
"directory_id": "6476302ad55753f812668d5296c2374b83128973",
"extension": "py",
"fi... | 2.515625 | stackv2 | #!/usr/bin/env python
import os
import re
import argparse
import mimetypes
from watchdog.observers import Observer
from watchdog.events import FileSystemEventHandler
import tornado.ioloop
import tornado.web
# This JS snippet below is embedded dynamically in every
# HTML response sent back from this server. The JS co... | 126 | 26.65 | 79 | 13 | 796 | python | [{"finding_id": "codeql_py/path-injection_4b997f91dab0f05d_0767a856", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 3 | true | [
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
83,
86,
94
] | [
null,
null,
null
] | [
26,
31,
18
] | [
30,
35,
22
] | |
2024-11-19T01:17:22.771596+00:00 | 1,495,127,235,000 | c03adba3cc9af82af123d233bcfed107fda4ca8c | 3 | {
"blob_id": "c03adba3cc9af82af123d233bcfed107fda4ca8c",
"branch_name": "refs/heads/master",
"committer_date": 1495127235000,
"content_id": "53f74388f88cd072b30f56895bf2be63e971f2a3",
"detected_licenses": [
"MIT"
],
"directory_id": "1b6b9d59ba4b526480c03b7655a5a346ea2a6ae8",
"extension": "py",
"fi... | 3.171875 | stackv2 | #! /usr/bin/env python
import multiprocessing as mp
import numpy as np
import os
import shutil
import configparser
import subprocess
import collections
"""Module that contains functions to help run batches and parameter sweeps
"""
def _parse_config_fr_to_by(config_string):
"""Returns the value for the fr, to, a... | 461 | 31.95 | 81 | 16 | 3,387 | python | [{"finding_id": "codeql_py/overly-permissive-file_6c68163c6a5077b7_aca7773f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 3 | true | [
"CWE-732",
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable.",
"Overly permissive mask in chmod sets file to world readable.",
"Overly permissive mask in chmod sets file to world readable."
] | [
450,
453,
455
] | [
null,
null,
null
] | [
5,
13,
13
] | [
35,
61,
63
] | |
2024-11-19T01:17:25.073910+00:00 | 1,603,724,969,000 | 5b6417983b67af473e299e3e088ade751aaf4c21 | 3 | {
"blob_id": "5b6417983b67af473e299e3e088ade751aaf4c21",
"branch_name": "refs/heads/master",
"committer_date": 1603724969000,
"content_id": "0602c85f798320b5622501cdfe262aa33118cfa1",
"detected_licenses": [
"MIT"
],
"directory_id": "a37d36bae74dca625d56e85727620944b0ffce24",
"extension": "py",
"fi... | 2.5625 | stackv2 | from config import *
from collections import defaultdict
from shapely.geometry import Polygon
from shapely.ops import cascaded_union
from descartes import PolygonPatch
import seaborn as sns
import re
import theano.tensor as tt
import scipy.stats
from itertools import product
import datetime
import pickle as pkl
import ... | 378 | 32.85 | 171 | 18 | 3,260 | python | [{"finding_id": "codeql_py/overly-permissive-file_ce58bafa2bef3608_8c3214a3", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to group writable."
] | [
258
] | [
null
] | [
5
] | [
36
] | |
2024-11-19T01:15:15.860241+00:00 | 1,691,078,020,000 | 78acea8056ada3a6c528e1857ed49c4d61baa449 | 2 | {
"blob_id": "78acea8056ada3a6c528e1857ed49c4d61baa449",
"branch_name": "refs/heads/master",
"committer_date": 1691078020000,
"content_id": "7017e9cf440c174f0de6a86c86e5c3a73015a936",
"detected_licenses": [
"MIT"
],
"directory_id": "19c8f714f77aba731fbe4569501d63a51946f24e",
"extension": "py",
"fi... | 2.421875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import os
import sys
import json
import jinja2
import yaml
import server
def append_path(filename, file_path):
''' If a filename starts with './' then it is relative to the config.yml path.
'''
if filename.startswith('./'):
filename = os.path.join(file... | 232 | 32.6 | 116 | 17 | 1,765 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d59699321ced0135_3518b374", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
108
] | [
114
] | [
16
] | [
6
] | |
2024-11-19T00:43:42.421061+00:00 | 1,540,923,380,000 | a36d7824f4213f4841d7d79f06d8cb39f2f83482 | 3 | {
"blob_id": "a36d7824f4213f4841d7d79f06d8cb39f2f83482",
"branch_name": "refs/heads/master",
"committer_date": 1540923441000,
"content_id": "0bb3f7ec22da86658ca4da5bb40dde4622675041",
"detected_licenses": [
"MIT"
],
"directory_id": "d9295073a51d79d504267622d7876b4abd71393d",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/python3
"""
Capture Siemens WiMAX device configurations. Used by CA Spectrum NCM.
"""
import argparse
import os
import re
import sys
import time
import requests
from bs4 import BeautifulSoup
def newer(file_path, mtime):
try:
return os.path.getmtime(file_path) > mtime
except FileNotFoundEr... | 104 | 28.9 | 108 | 16 | 774 | python | [{"finding_id": "codeql_py/request-without-cert-validation_346ce4ed1a93b930_5a3bab4c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 5 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
43,
46,
56,
83,
84
] | [
null,
null,
null,
null,
null
] | [
5,
9,
9,
9,
9
] | [
34,
38,
43,
45,
61
] | |
2024-11-19T00:43:44.883896+00:00 | 1,630,002,171,000 | 153cd580f9635812a7f25ca560c30d282b6d5c0e | 2 | {
"blob_id": "153cd580f9635812a7f25ca560c30d282b6d5c0e",
"branch_name": "refs/heads/main",
"committer_date": 1630002171000,
"content_id": "5751bc6d2a5ad4ada8fe0ef776d5163a7c11dbb3",
"detected_licenses": [
"MIT"
],
"directory_id": "c232095652d3317a47b2d8a2fc151282992072d4",
"extension": "py",
"file... | 2.4375 | stackv2 | import re
from flask import Flask, render_template, request
from keras.preprocessing.image import load_img
from keras.preprocessing.image import img_to_array
from keras.applications.vgg16 import preprocess_input
from keras.applications.vgg16 import decode_predictions
from keras.applications.vgg16 import VGG16
app = Fl... | 29 | 27.55 | 55 | 12 | 185 | python | [{"finding_id": "codeql_py/flask-debug_96e803d313de9b33_cd89fe36", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
29,
20
] | [
null,
null
] | [
5,
25
] | [
35,
35
] | |
2024-11-19T00:43:45.117542+00:00 | 1,543,811,540,000 | 256b652e72ce15d463fcb4927dc93c121132a40e | 3 | {
"blob_id": "256b652e72ce15d463fcb4927dc93c121132a40e",
"branch_name": "refs/heads/master",
"committer_date": 1543811540000,
"content_id": "b78a4b8c77f9ca0dd75a7f9ebb4bbff78891825c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3c22053270dfd2ae6f9689237554fa889a32e5eb",
"extension": "py"... | 2.75 | stackv2 | #!/usr/env/python python3
# -*- coding: utf-8 -*-
# @File : unzip_tar.py
# @Time : 2018/8/17 9:01
# @Software : PyCharm
import tarfile
import os
from absl import flags, app
FLAGS = flags.FLAGS
flags.DEFINE_string(
"data_dir", "../../data/data_aishell/wav/",
"the original tar data dir")
flags.DEFINE_... | 37 | 20.89 | 67 | 14 | 237 | python | [{"finding_id": "codeql_py/tarslip_eb2850df83908a28_f15be73d", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
24
] | [
null
] | [
5
] | [
15
] | |
2024-11-19T00:43:46.673864+00:00 | 1,632,996,400,000 | 29fcfcb9e41579da5a831406324ffb66ef6af9cd | 3 | {
"blob_id": "29fcfcb9e41579da5a831406324ffb66ef6af9cd",
"branch_name": "refs/heads/master",
"committer_date": 1632996400000,
"content_id": "1a4dca9757b86a132c098bcdce210c8f3c5f7808",
"detected_licenses": [
"MIT"
],
"directory_id": "97ab50a083a5b183593f41e89853e429bc642190",
"extension": "py",
"fi... | 2.984375 | stackv2 | from twython import Twython
def read_strings_from_file(file_path, how_many):
with open(file_path, 'r') as file:
data = file.read()
return data.split()[:how_many]
def read_key_and_secret(file_path):
return read_strings_from_file(file_path, 2)
def read_token_secret_pin(file_path):
return rea... | 51 | 29.92 | 75 | 13 | 365 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_29316957f8f5eed2_7d8fbf78", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text."
] | [
20
] | [
null
] | [
20
] | [
50
] | |
2024-11-19T01:32:05.852650+00:00 | 1,472,233,938,000 | c2ec746203e3c0c78621a3490d55d959ce1d89d6 | 3 | {
"blob_id": "c2ec746203e3c0c78621a3490d55d959ce1d89d6",
"branch_name": "refs/heads/master",
"committer_date": 1472233938000,
"content_id": "d32f982dbe1ae0c0f520957f4b111a489b0f36f2",
"detected_licenses": [
"MIT"
],
"directory_id": "8d7587f48fb459dffec95b817dd528f55199f75c",
"extension": "py",
"fi... | 3.359375 | stackv2 | #!/usr/bin/env python3
from random import choice
medical = open('medical.txt', 'r').read().splitlines()
positive = open('positive.txt', 'r').read().splitlines()
trial_name = choice(positive)
def select_starts_with(letter, terms):
selected = []
for t in terms:
if t[0] == letter:
selected.ap... | 24 | 28.04 | 67 | 13 | 174 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_43e95acba5991714_776531d9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
20,
22,
24
] | [
null,
null,
null
] | [
15,
15,
15
] | [
44,
31,
31
] | |
2024-11-19T01:44:00.356045+00:00 | 1,476,916,026,000 | f325b45c3daa81157b7dd6154fac62da4d114296 | 3 | {
"blob_id": "f325b45c3daa81157b7dd6154fac62da4d114296",
"branch_name": "refs/heads/master",
"committer_date": 1476916026000,
"content_id": "4256903bdcf3406edacaedeb09adb1195be5fef5",
"detected_licenses": [
"MIT"
],
"directory_id": "41d0e821757c2b071ddaca6313014f7848bb21e2",
"extension": "py",
"fi... | 2.53125 | stackv2 | import ipaddress
import logging
from core.NeuronModule import NeuronModule, MissingParameterException, InvalidParameterException
from wakeonlan import wol
logging.basicConfig()
logger = logging.getLogger("kalliope")
class Wake_on_lan(NeuronModule):
def __init__(self, **kwargs):
super(Wake_on_lan, self).... | 36 | 37.86 | 117 | 12 | 313 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0f188a46e281b000_84ddd53e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
32
] | [
33
] | [
22
] | [
62
] | |
2024-11-19T01:44:09.316503+00:00 | 1,636,492,826,000 | 005ebc4edcdd425b6a4c4384e04cb743c051162b | 3 | {
"blob_id": "005ebc4edcdd425b6a4c4384e04cb743c051162b",
"branch_name": "refs/heads/main",
"committer_date": 1636492826000,
"content_id": "5daf5d61df543929a02300ed729344de3a403a98",
"detected_licenses": [
"MIT"
],
"directory_id": "950627849ec9c0b8b26790a44ead59fc05d38d27",
"extension": "py",
"file... | 3.078125 | stackv2 | import pydantic
from typing import Optional
import pprint
import regex as re
import pyperclip
global char_repl_list
char_repl_list = {'l':'1','L':'1',
'i':'1','!':'1','I':'1',
'S' : '$', 's': '$',
'a': '@', 'A' : '@',
'o':'0','O':'0','Q':'0'
}
global new_list
new_list = []
class PassPhraseLengt... | 80 | 35.59 | 155 | 19 | 649 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_415050db5affa20e_a06b253f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
61
] | [
null
] | [
15
] | [
92
] | |
2024-11-19T00:59:32.017930+00:00 | 1,514,560,488,000 | 8a08d9977fa4c56cc7779820ad1578480c16554d | 2 | {
"blob_id": "8a08d9977fa4c56cc7779820ad1578480c16554d",
"branch_name": "refs/heads/master",
"committer_date": 1514560488000,
"content_id": "88180ed09cc09809f46758ed6103f2b082867c45",
"detected_licenses": [
"MIT"
],
"directory_id": "12bcaa918b3a308595f41521df0c72232c1b538a",
"extension": "py",
"fi... | 2.359375 | stackv2 | # TODO incomplete:
# - guard g:loaded_senter?
# - log to python-client's log?
# - auto focus browser when using jupyter_nbportal
import neovim
import json
import logging
import os
import re
try:
import pika
except ImportError:
pika = None
@neovim.plugin
class Senter():
def __init__(self, nvim):
s... | 341 | 32.65 | 81 | 23 | 2,560 | python | [{"finding_id": "codeql_py/redos_4efe9fa6510da49b_6394a2cb", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\n'.", "remedia... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\n'."
] | [
322
] | [
null
] | [
25
] | [
28
] | |
2024-11-19T00:59:49.731674+00:00 | 1,596,408,184,000 | d9db44bf21e28da35104e13a5976c167c566e5e5 | 4 | {
"blob_id": "d9db44bf21e28da35104e13a5976c167c566e5e5",
"branch_name": "refs/heads/master",
"committer_date": 1596408184000,
"content_id": "84c4cd69dcfd43b6ee32fd683ffb187b506a95f3",
"detected_licenses": [
"MIT"
],
"directory_id": "61f96629c9b2a21c48b0d78479ef12b00e4584b7",
"extension": "py",
"fi... | 3.515625 | stackv2 | import argparse
from random import choice
from random import shuffle
from typing import List
from typing import Optional
from typing import Sequence
UPPER_LETTERS = (x for x in "ABCDEFGHIJKLMNOPQRSTUVWXYZ")
LOWER_LETTERS = (x for x in "abcdefghijklmnopqrstuvwxyz")
DIGITS = (x for x in "0123456789")
SPECIAL = [x for x... | 82 | 31.29 | 83 | 13 | 587 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_99b4096758e56725_b18a3c04", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text.\nThis expression stores [sensitive d... | [
52,
75
] | [
null,
null
] | [
21,
15
] | [
36,
23
] | |
2024-11-19T01:00:12.843090+00:00 | 1,607,152,276,000 | 39f14ac6e180000961a6a69bc55de7f62422ace5 | 3 | {
"blob_id": "39f14ac6e180000961a6a69bc55de7f62422ace5",
"branch_name": "refs/heads/master",
"committer_date": 1607152276000,
"content_id": "5f83f1e61a4591788d9788f8a7bc5a206c98a5ef",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "03b258247dd5c48592881e364f017d5f8b9186f9",
"extension": "py"... | 2.6875 | stackv2 | #!/usr/bin/env python3
# encoding: utf-8
'''
Created on 2018
@author: Administrator
'''
import logging
from flask import request, Blueprint, abort, jsonify
from langdetect import detect
detect_language_api = Blueprint('detect_language_api', __name__, template_folder='templates')
@detect_language_api.route('/langu... | 26 | 23.04 | 93 | 12 | 149 | python | [{"finding_id": "codeql_py/log-injection_05366e065e9f69b3_9dfb3fa8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
24
] | [
null
] | [
18
] | [
67
] | |
2024-11-19T01:11:43.966687+00:00 | 1,565,219,346,000 | df79f34fd674c2fa5dd963bf23fdfa39c2a58c49 | 3 | {
"blob_id": "df79f34fd674c2fa5dd963bf23fdfa39c2a58c49",
"branch_name": "refs/heads/master",
"committer_date": 1565219346000,
"content_id": "33878264af728cd13592ee1295a2eaf906ceb9de",
"detected_licenses": [
"MIT"
],
"directory_id": "bdfe4253bde7d5997bb14decef425268e1c9fc33",
"extension": "py",
"fi... | 2.859375 | stackv2 | """
Usage:
python appleapp.py
"""
from flask import Flask, request, json
from flask import request
# App config.
DEBUG = True
app = Flask(__name__)
app.config.from_object(__name__)
app.config['SECRET_KEY'] = 'thisisareallygoodsecretmkay???'
@app.route("/", methods=['GET', 'POST'])
@app.route("/<username>", methods=... | 61 | 30.07 | 92 | 15 | 376 | python | [{"finding_id": "codeql_py/reflective-xss_8aaf0e6db162c7cd_736ff540", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
30
] | [
null
] | [
48
] | [
59
] | |
2024-11-19T01:21:34.639075+00:00 | 1,499,099,757,000 | fc8c64eee321637ff65acb9b31bb6d866cb167a6 | 3 | {
"blob_id": "fc8c64eee321637ff65acb9b31bb6d866cb167a6",
"branch_name": "refs/heads/master",
"committer_date": 1499099757000,
"content_id": "bf9bfa6d0bdb4237c2fe223b4cb48734f2c2a043",
"detected_licenses": [
"MIT"
],
"directory_id": "16b81ed8a643d515a92cbc64618d50cf74953e1a",
"extension": "py",
"fi... | 2.671875 | stackv2 | #!/usr/bin/env python3.6
"""
ReportGeneratorMain.py -- The main logical component of the Appfigures/Zendesk report generation script
Copyright (C) 2017 Brandon Hurley
This software may be modified and distributed under the terms
of the MIT license. See the LICENSE file for details.
"""
import datetime
import o... | 342 | 50.84 | 152 | 23 | 3,095 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4458b05889650327_53ee6ed0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
70
] | [
71
] | [
11
] | [
64
] | |
2024-11-19T02:10:35.231265+00:00 | 1,480,988,980,000 | c1ba933740124ed89db1bc24973534f5a1020cb5 | 2 | {
"blob_id": "c1ba933740124ed89db1bc24973534f5a1020cb5",
"branch_name": "refs/heads/master",
"committer_date": 1480988980000,
"content_id": "f8992cea1c4d7044fda2906f249b4055db4713b7",
"detected_licenses": [
"MIT"
],
"directory_id": "1169f05483e1accce0f9547559132675f606a5ee",
"extension": "py",
"fi... | 2.328125 | stackv2 | # -*- coding: utf-8 -*-
import logging
from flask import render_template, current_app, request, redirect, url_for, \
flash, jsonify, session
from flask_login import login_user, logout_user, login_required, current_user
from .models import User
from . import users_bp
from .forms import LoginForm, UserFormAdd, UserFo... | 125 | 30.49 | 93 | 16 | 864 | python | [{"finding_id": "codeql_py/url-redirection_9630b201bf8ce08d_0cf164ff", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
30
] | [
null
] | [
25
] | [
70
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.