added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T20:26:56.487450+00:00 | 1,537,993,079,000 | 89a2c6bdff2cb4449ecd22856bc931ca18f1e45c | 2 | {
"blob_id": "89a2c6bdff2cb4449ecd22856bc931ca18f1e45c",
"branch_name": "refs/heads/master",
"committer_date": 1537993079000,
"content_id": "d7462003c8284b9d1051d798dacfd4229039b4b9",
"detected_licenses": [
"MIT"
],
"directory_id": "3abe956df2f838f1c1563059fdd2448ca4ee08d0",
"extension": "py",
"fi... | 2.390625 | stackv2 | import flask, json, os
import config, datetime
from contexthandler import ContextHandler
from cloudant_server import DatabaseAccess
from utils import post_facebook_message, get_weather
from flask import Blueprint, request, jsonify, make_response
from flask_restful import Api, Resource
from watson_developer_cloud import... | 89 | 32.9 | 91 | 23 | 751 | python | [{"finding_id": "codeql_py/reflective-xss_acee4217edf04c45_fea3c833", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
30
] | [
null
] | [
25
] | [
58
] | |
2024-11-18T20:26:58.524773+00:00 | 1,397,436,144,000 | 00a93bd4ae66e32bbd2e9cd6787064fc9568facd | 3 | {
"blob_id": "00a93bd4ae66e32bbd2e9cd6787064fc9568facd",
"branch_name": "refs/heads/master",
"committer_date": 1397436144000,
"content_id": "bacd7268923f7804da29c4c3dbd799600c706707",
"detected_licenses": [
"MIT"
],
"directory_id": "77abfc526949cf796c77a4290f5d3251cf9d1619",
"extension": "py",
"fi... | 2.53125 | stackv2 | import socket
import os
import ssl
import select
import sys
import commands
import parsers
import clients
import string
import protocols
import logging
class Server(object):
"""The chat server. It relays communication between client."""
_port = 0
_bind = ""
_parser = None
_server_client = None
_clients = []
_e... | 183 | 31.23 | 134 | 22 | 1,390 | python | [{"finding_id": "codeql_py/insecure-default-protocol_564d603be0a6b93a_5419313a", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
125
] | [
null
] | [
20
] | [
99
] | |
2024-11-18T20:52:15.192833+00:00 | 1,488,131,522,000 | 253e324f4b554a78a5dee72a7dac8b536c57c58a | 3 | {
"blob_id": "253e324f4b554a78a5dee72a7dac8b536c57c58a",
"branch_name": "refs/heads/master",
"committer_date": 1488131522000,
"content_id": "7197ebcedf37279effaf48dbab6059c35a5d84a3",
"detected_licenses": [
"MIT"
],
"directory_id": "040b7db14e4ee2c0d6f30fed72777c2af575925b",
"extension": "py",
"fi... | 2.890625 | stackv2 | #!/usr/bin/env python
"""
Copyright (c) 2015 World Wide Technology, Inc.
All rights reserved.
Revision history:
2 December 2015 | 1.0 - initial release
3 December 2015 | 1.1 - cosmetic and best practices updates.
14 December 2016 | 1.2 - address name conflict with 'items'
"""
... | 168 | 27.7 | 132 | 15 | 1,075 | python | [{"finding_id": "codeql_py/request-without-cert-validation_5857cc753378ec88_af6fbfcd", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
111
] | [
null
] | [
17
] | [
106
] | |
2024-11-18T19:02:59.157908+00:00 | 1,654,883,981,000 | f0795d27ae4f3fb7ae56a11f847f17d56a57546d | 2 | {
"blob_id": "f0795d27ae4f3fb7ae56a11f847f17d56a57546d",
"branch_name": "refs/heads/master",
"committer_date": 1654883981000,
"content_id": "abed7919b87386ab0a67c6a74a471a9883fe553e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "731081ee61b207ba974f052b6b6bcb315bb2b508",
"extension": "py"... | 2.375 | stackv2 | import base64, json, requests
# First example is with the new container registry tokens blade option in azure
# Here you can skip many steps and get an acr access token easily
# The user\pass of the token is the token_name\generated_password (1 of either passwords generated)
# This is similar to using spervice princip... | 78 | 38.14 | 158 | 10 | 779 | python | [{"finding_id": "codeql_py/request-without-cert-validation_77e526c5f416d49e_42c8ecf6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 5 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
25,
35,
52,
67,
76
] | [
null,
null,
null,
null,
null
] | [
12,
12,
12,
12,
12
] | [
85,
85,
86,
86,
85
] | |
2024-11-18T19:14:28.292811+00:00 | 1,654,261,519,000 | 07dfb543e2aef159194ddebd74db39ccde942dae | 2 | {
"blob_id": "07dfb543e2aef159194ddebd74db39ccde942dae",
"branch_name": "refs/heads/master",
"committer_date": 1654261519000,
"content_id": "e4aa2a8fd31bf85df5470367c7fee3f4300c9217",
"detected_licenses": [
"MIT"
],
"directory_id": "bee20f811ff64b58f6810bb100147bc4aea9b5a2",
"extension": "py",
"fi... | 2.359375 | stackv2 | import logging
from django.contrib.auth import authenticate
from django.contrib.auth.password_validation import validate_password, \
get_password_validators
from django.core.exceptions import ObjectDoesNotExist, ValidationError
from rest_framework import status
from rest_framework.response import Response
from res... | 149 | 39.89 | 99 | 17 | 1,085 | python | [{"finding_id": "codeql_py/log-injection_1901de13a4bb6eb9_b69d983b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 5 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
48,
60,
63,
66,
69
] | [
null,
null,
null,
null,
null
] | [
37,
38,
35,
35,
35
] | [
75,
95,
69,
69,
69
] | |
2024-11-18T20:06:14.958120+00:00 | 1,604,127,630,000 | 836c214202e7f47486e16df0b7fc461c83c1ab8c | 3 | {
"blob_id": "836c214202e7f47486e16df0b7fc461c83c1ab8c",
"branch_name": "refs/heads/main",
"committer_date": 1604127630000,
"content_id": "c6eb62f065ff795649834dc62646278c5a226109",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c2a8d4b65a44c39172321f7165e6acf9f9e17096",
"extension": "py",
... | 2.65625 | stackv2 | import requests, random, time, openpyxl, datetime, concurrent.futures, threading, bs4
requests.urllib3.disable_warnings()
def getText(name):
returnlist = []
with open(name, "r") as f:
while True:
a = f.readline()
if len(a) == 0:
break
a = a.replac... | 112 | 26.89 | 93 | 19 | 763 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c38aa87904730a97_c3f68959", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
54
] | [
60
] | [
20
] | [
14
] | |
2024-11-18T20:18:11.854663+00:00 | 1,635,690,047,000 | ec198ad7f6098c2705754d05b238181dc2439b54 | 2 | {
"blob_id": "ec198ad7f6098c2705754d05b238181dc2439b54",
"branch_name": "refs/heads/main",
"committer_date": 1635690047000,
"content_id": "e2d6321cad32c21ea38c8a8dd47c160ea2c94552",
"detected_licenses": [
"MIT"
],
"directory_id": "d5f9665d4dd4c995a77fd246772564cf761b4600",
"extension": "py",
"file... | 2.390625 | stackv2 | import requests
import json
import os
#在此处输入配置即可使用
url="192.168.1.1" #路由器网关url
passwd="" #路由器管理密码
yidongusername="" #移动账号
yidongpassword="" #移动密码
yidongservice="" #移动服务名
dianxinusername="" #电信账号
dianxinservice="" #电信服务名,闪讯一般留空即可
#电信密码由于经常换,在程序内输入即可
#获取id内容
de... | 156 | 18.74 | 87 | 15 | 890 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9908bffdc7de79ce_52a53afa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
44
] | [
null
] | [
11
] | [
36
] | |
2024-11-18T20:18:16.957994+00:00 | 1,568,095,888,000 | 5d14abe2f458d37b158e89c58b5413d7375af424 | 2 | {
"blob_id": "5d14abe2f458d37b158e89c58b5413d7375af424",
"branch_name": "refs/heads/master",
"committer_date": 1568095888000,
"content_id": "ed02fdebdd62875b802ebe7d17c6357e0f4d2727",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "8f863b79e68ff5ac679e7ea717f633629960c1e1",
"extension": "p... | 2.359375 | stackv2 |
import datetime
import json
import logging
import select
import signal
import socket
import ssl
import time
from prometheus_client import start_http_server as prometheus_start_http_server
from typing import Optional
from .metrics import SERVER_LAST_CONTACT, SERVER_UP
from .parser import Parser
from .settings import S... | 329 | 39.24 | 149 | 25 | 2,862 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0aafbe854124526c_da4b2efa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
123
] | [
null
] | [
19
] | [
46
] | |
2024-11-18T20:18:31.376772+00:00 | 1,604,151,386,000 | eadcf588085ef472d0693c4573e401d572f51aa5 | 2 | {
"blob_id": "eadcf588085ef472d0693c4573e401d572f51aa5",
"branch_name": "refs/heads/master",
"committer_date": 1604151386000,
"content_id": "c8eb0e81de034281fa3f30972543585b8d5498e4",
"detected_licenses": [
"MIT"
],
"directory_id": "577fe8970d36b62c1ff98bb0b749aaed932453bd",
"extension": "py",
"fi... | 2.328125 | stackv2 | # Copyright 2020 by Roman Khuramshin <mr.linqu@gmail.com>.
# All rights reserved.
# This file is part of the Intsa Term Client - X2Go terminal client for Windows,
# and is released under the "MIT License Agreement". Please see the LICENSE
# file that should have been included as part of this package.
import os
import... | 273 | 37.03 | 131 | 21 | 2,138 | python | [{"finding_id": "codeql_py/overly-permissive-file_74ee566fba9624ad_c2b42b82", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world writable.", "remediation": "", "location": {... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in open sets file to world writable."
] | [
122
] | [
null
] | [
22
] | [
49
] | |
2024-11-18T20:18:33.622950+00:00 | 1,591,441,439,000 | d865bd5e90fd1409bf2d1f61a1d8d5a168b30ced | 2 | {
"blob_id": "d865bd5e90fd1409bf2d1f61a1d8d5a168b30ced",
"branch_name": "refs/heads/master",
"committer_date": 1591441439000,
"content_id": "f0fe2391ec62bc9eda5d4c4a029b3db2ab487be7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1f09c0b7c9751bd8757ae97521650370e385968e",
"extension": "py"... | 2.4375 | stackv2 | # Create your views here.
## some utils
import json
import re
import urllib3
from django.http import HttpResponse, HttpResponseRedirect, JsonResponse
#templates stuff
from django.template.loader import get_template
from django.template import Context
from tickplot.models import Scrips, Nsehistdata
_email_restr = r"... | 77 | 26.45 | 83 | 15 | 512 | python | [{"finding_id": "codeql_py/overly-large-range_243a77644bdecc6e_578ae553", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
15
] | [
null
] | [
41
] | [
44
] | |
2024-11-18T20:43:35.639611+00:00 | 1,608,858,102,000 | 6c14f6a532fdee92e367d3ca627f1f1f71e9ae42 | 3 | {
"blob_id": "6c14f6a532fdee92e367d3ca627f1f1f71e9ae42",
"branch_name": "refs/heads/master",
"committer_date": 1608858275000,
"content_id": "1b7ed2e97f83b7b78a442451745b4f1f8bb3229a",
"detected_licenses": [
"MIT"
],
"directory_id": "5f5d4cd76d4ff69ed3b35eac162a9e2b760a4c55",
"extension": "py",
"fi... | 2.6875 | stackv2 | from django.http import (
HttpRequest, HttpResponse, JsonResponse, HttpResponseBadRequest, HttpResponseNotAllowed, HttpResponseNotFound,
)
from django.contrib.auth.decorators import login_required
from django.db import transaction
import json
from ..api.arena import arena
# POST
@login_required
def request_match(... | 89 | 38.71 | 114 | 16 | 765 | python | [{"finding_id": "codeql_py/stack-trace-exposure_fe37cb390bc1fc92_809306b3", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
27,
89
] | [
null,
null
] | [
39,
39
] | [
40,
40
] | |
2024-11-18T20:44:15.462156+00:00 | 1,331,673,832,000 | d3930ce4401a5331076b7f27626da907f45c5ab1 | 3 | {
"blob_id": "d3930ce4401a5331076b7f27626da907f45c5ab1",
"branch_name": "refs/heads/master",
"committer_date": 1331673832000,
"content_id": "81034131ce12b9d7eb179f44417f4008b0ee760d",
"detected_licenses": [
"BSD-2-Clause",
"BSD-2-Clause-Views"
],
"directory_id": "d5973b68cabb0f6775cc6cbf257653ed9d... | 2.65625 | stackv2 | """The auth model
Thanks to http://sarafsaurabh.wordpress.com/2010/08/10/pylons-authentication-and-authorization-using-repoze-what/
for repoze.what related authentication and code in this model
"""
import os
from hashlib import sha1
from sqlalchemy import Column, ForeignKey
from sqlalchemy.types import Unicode, Inte... | 176 | 29 | 113 | 14 | 1,198 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b226f4419c6ab575_d2b2de91", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
54,
82
] | [
null,
null
] | [
21,
28
] | [
53,
57
] | |
2024-11-18T20:57:31.091012+00:00 | 1,488,887,362,000 | 5a4fd77792f140594ae5db490b10bb8b367763cc | 3 | {
"blob_id": "5a4fd77792f140594ae5db490b10bb8b367763cc",
"branch_name": "refs/heads/master",
"committer_date": 1488887362000,
"content_id": "fdc14409761e7b4ff107f987691ab77e3f910b82",
"detected_licenses": [
"MIT"
],
"directory_id": "674181cbe6d2e8a33bfaa6f1638ad5a5fb72d3de",
"extension": "py",
"fi... | 2.984375 | stackv2 | '''
downloader.py
'''
import logging
import os
import requests
logger = logging.getLogger('downloader.streambot')
def _download(uri, local):
'''
download from uri and save as local
@param uri
@param local
@return True if download succeeds
'''
try:
resp = requests.get(uri, verify=F... | 81 | 27.38 | 98 | 15 | 530 | python | [{"finding_id": "codeql_py/request-without-cert-validation_856c1492a37c8e85_d18cdd7d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
19
] | [
null
] | [
16
] | [
47
] | |
2024-11-18T20:57:55.341154+00:00 | 1,572,373,639,000 | 26c0908f5151e985c89437ca18050b32a00027af | 2 | {
"blob_id": "26c0908f5151e985c89437ca18050b32a00027af",
"branch_name": "refs/heads/master",
"committer_date": 1572373639000,
"content_id": "cee5c92b98b8ec9da93411557d9577425079c85f",
"detected_licenses": [
"MIT"
],
"directory_id": "339f5fe17f382f77db261758b1df9d942500cdf6",
"extension": "py",
"fi... | 2.453125 | stackv2 | from django import forms
from django.contrib.auth import authenticate
import re
from django.contrib.auth.models import User
class LoginForm(forms.Form):
username = forms.CharField(required=True, max_length=50, label='Username',
widget=forms.TextInput(attrs={'class': 'form-control'}... | 65 | 42.2 | 99 | 15 | 569 | python | [{"finding_id": "codeql_py/polynomial-redos_72083f6131e0092e_c846fe85", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma... | 1 | true | [
"CWE-1333"
] | [
"py/polynomial-redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '?'."
] | [
23
] | [
null
] | [
44
] | [
52
] | |
2024-11-18T21:10:18.604511+00:00 | 1,523,849,246,000 | da764ba0a9aca8add6e8e4d833d233b6e64880fb | 2 | {
"blob_id": "da764ba0a9aca8add6e8e4d833d233b6e64880fb",
"branch_name": "refs/heads/master",
"committer_date": 1523849246000,
"content_id": "4c6a19d8dd2b39b1b1a1403931a92217ac286acf",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "cec7b992e695de5c7be77c57ce6de191fc28d61f",
"extension": "p... | 2.5 | stackv2 | import os
import sys
import urllib
import urllib.request
import urllib.parse
import ssl
import requests
import time
import json
from flask import request,Response,Flask,render_template
from PIL import Image
app = Flask(__name__)
current_milli_time = lambda: int(round(time.time() * 1000))
@app.route('/')
def index():
... | 55 | 29.16 | 73 | 15 | 407 | python | [{"finding_id": "codeql_py/full-ssrf_2a6b8d92e1d87bf2_b385f445", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 3 | true | [
"CWE-918",
"CWE-022",
"CWE-022"
] | [
"py/full-ssrf",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
46,
41,
49
] | [
null,
null,
null
] | [
9,
15,
15
] | [
38,
29,
35
] | |
2024-11-18T21:10:58.681604+00:00 | 1,538,578,305,000 | 14df0da21ed02e3acb618441b8f12bcfb9ca1743 | 2 | {
"blob_id": "14df0da21ed02e3acb618441b8f12bcfb9ca1743",
"branch_name": "refs/heads/master",
"committer_date": 1538578305000,
"content_id": "5246817a82f1620bcf4b3a8646c16d57b250b0e4",
"detected_licenses": [
"MIT"
],
"directory_id": "5b3f33d6cf69192af4a82af44743ac4bc48769fb",
"extension": "py",
"fi... | 2.34375 | stackv2 | #! /usr/bin/env python
# -*- coding: utf-8 -*-
""" Gitlab Webhook Receiver """
# Based on: https://github.com/schickling/docker-hook
import json
import yaml
from subprocess import Popen, PIPE, STDOUT
from argparse import ArgumentParser, ArgumentDefaultsHelpFormatter, FileType
from importlib import import_module
try:
... | 152 | 35.59 | 95 | 17 | 1,146 | python | [{"finding_id": "codeql_py/log-injection_7ad6c7af0f04615a_01d59f44", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
38,
101
] | [
null,
null
] | [
64,
63
] | [
71,
70
] | |
2024-11-18T21:10:58.802057+00:00 | 1,581,902,357,000 | 46cdc4b15efdd3b6f8be6a630e1690734bde7330 | 3 | {
"blob_id": "46cdc4b15efdd3b6f8be6a630e1690734bde7330",
"branch_name": "refs/heads/master",
"committer_date": 1581902357000,
"content_id": "8dfa2336e081b8079b7023d2cfb976c594e08905",
"detected_licenses": [
"MIT"
],
"directory_id": "88ded6952eff03526e2c9083a9de090ca92c6dca",
"extension": "py",
"fi... | 3.171875 | stackv2 | import json
import requests
import sys
def main():
"""Prompt the user, make the request and print results"""
try:
with open('key.json', 'r') as key_file:
api_key = json.load(key_file).get('API_KEY')
except IOError:
print('Key file does not exist!')
sys.exit(1)
print... | 74 | 33.3 | 103 | 15 | 629 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e69cc11186410512_e91fe904", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 24 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive dat... | [
23,
45,
46,
47,
48,
49,
50,
51,
52,
53,
54,
55,
56,
57,
61,
62,
63,
64,
65,
66,
67,
68,
69,
70
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
19,
11,
11,
11,
11,
11,
11,
11,
11,
11,
11,
11,
11,
11,
15,
11,
11,
11,
11,
11,
11,
11,
11,
11
] | [
41,
43,
41,
43,
49,
47,
46,
49,
48,
47,
41,
52,
47,
50,
71,
51,
54,
52,
46,
41,
47,
52,
53,
47
] | |
2024-11-18T21:11:08.739874+00:00 | 1,532,016,034,000 | 1a6ca69ec86a4dabcf615d060bd191e2edf85b6e | 2 | {
"blob_id": "1a6ca69ec86a4dabcf615d060bd191e2edf85b6e",
"branch_name": "refs/heads/master",
"committer_date": 1532016034000,
"content_id": "a6e8c35f93248c1799b36730206c20c705decfe9",
"detected_licenses": [
"MIT",
"BSD-3-Clause"
],
"directory_id": "b58792b4ddc68ffc99a203dd745bc848bd7410b6",
"ext... | 2.4375 | stackv2 | import json
from baldrick.github.github_auth import repo_to_installationid_mapping
from baldrick.github.github_api import RepoHandler
from flask import Blueprint, request
circleci = Blueprint('circleci', __name__)
CIRCLECI_HANDLERS = []
def circleci_webhook_handler(func):
"""
Add a function that gets cal... | 54 | 26.72 | 84 | 15 | 326 | python | [{"finding_id": "codeql_py/reflective-xss_717241c9c93fbd85_dae91d4d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
49
] | [
null
] | [
16
] | [
53
] | |
2024-11-18T19:03:39.170949+00:00 | 1,551,748,729,000 | eb37245636dcdfb9b7732dd7be5e38abdf74f0a5 | 2 | {
"blob_id": "eb37245636dcdfb9b7732dd7be5e38abdf74f0a5",
"branch_name": "refs/heads/master",
"committer_date": 1551748816000,
"content_id": "aa7f31e8e7003bb872b58e0d4903f60b8478a481",
"detected_licenses": [
"ISC"
],
"directory_id": "c62cae9ccf64857274639e3083ccf3631dde30af",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/usr/bin/env python3
import re
header = re.compile('(acro:|imitive:)')
caps_only = re.compile('^[A-Z0-9_]+$')
vhdl_param = re.compile('([A-Z0-9_]+)\s*=>\s*([XOB]?"[^"]*"|[0-9.]+|[A-Z0-9_]+)[^-]*(--.*)?')
vhdl_template = re.compile('--.*Xilinx.*HDL.*Language.*Template')
bit_extract = re.compile('\s*([0-9]*)\s*.bit[^... | 135 | 31.28 | 96 | 22 | 1,054 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_06e9ed0b73d52a75_399a8113", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
133
] | [
null
] | [
12
] | [
56
] | |
2024-11-18T19:28:42.047808+00:00 | 1,569,167,080,000 | 4aeb3891cbf8d416f45ce03da601b1279b7e2763 | 3 | {
"blob_id": "4aeb3891cbf8d416f45ce03da601b1279b7e2763",
"branch_name": "refs/heads/master",
"committer_date": 1569167080000,
"content_id": "2ef61a0f19f212009f8b3c9bc8322e4164e20bbe",
"detected_licenses": [
"MIT"
],
"directory_id": "01ec5e4372e5e4acfb6e8f6606aef5ab3dd34243",
"extension": "py",
"fi... | 2.765625 | stackv2 | """
短信发送工具类
@project: bright
@file: .py
@ide: PyCharm
@auth: Eric Joe
@email: whatisjava@hotmail.com
@build: 2019-09-10 22:41
@info:
"""
import requests
import json
from bright.settings import SMS_CONFIG
import random
class SmsSender:
def __init__(self, api_key=SMS_CONFIG['SMS_API_KEY']):
self.api_key ... | 55 | 21.29 | 119 | 14 | 339 | python | [{"finding_id": "codeql_py/request-without-cert-validation_1da11e0a204ffd60_3c7c2c04", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
35
] | [
null
] | [
16
] | [
120
] | |
2024-11-18T19:28:43.299230+00:00 | 1,648,134,677,000 | cb492096d6ced0a771d915539c0a4fff4a6b0a63 | 2 | {
"blob_id": "cb492096d6ced0a771d915539c0a4fff4a6b0a63",
"branch_name": "refs/heads/master",
"committer_date": 1648134677000,
"content_id": "dc336358de507924a9108055d5ed52447f0b3b13",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "bc83db8996d870f37e8d9fa926e556f2fe25c2e2",
"extension": "p... | 2.484375 | stackv2 | """Liveness/readiness checks for supervisor"""
from django.core.cache import cache, InvalidCacheBackendError
from django.db import DatabaseError
from django.http import JsonResponse
from django.views.decorators.cache import never_cache
from .models import SoftwareCollection
SUCCESS = "OK" # sentinel value indicatin... | 68 | 24.85 | 74 | 11 | 371 | python | [{"finding_id": "codeql_py/stack-trace-exposure_03ea9210d331941d_579ff204", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user."
] | [
62
] | [
null
] | [
29
] | [
35
] | |
2024-11-18T19:28:47.560364+00:00 | 1,568,217,803,000 | 251d81665cea60365ceb86ffa11d2d9a58a64971 | 3 | {
"blob_id": "251d81665cea60365ceb86ffa11d2d9a58a64971",
"branch_name": "refs/heads/master",
"committer_date": 1568217803000,
"content_id": "c8e8f0f1671bba59f29275908f045d6c78f56721",
"detected_licenses": [
"MIT"
],
"directory_id": "85a6bf1c2985b4e5ea2db798951ed71ffb7a00ba",
"extension": "py",
"fi... | 3 | stackv2 | """Templating related utilities
"""
# stdlib imports
import json
import os
# third-party imports
import jinja2
# local imports
from shpkpr import exceptions
from shpkpr import template_filters
class InvalidJSONError(exceptions.ShpkprException):
"""Raised when a template can be rendered successfully but does not... | 116 | 33.97 | 80 | 14 | 876 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_52fb9b87184092c6_c5fe00a6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
102
] | [
108
] | [
20
] | [
6
] | |
2024-11-18T19:28:49.484999+00:00 | 1,634,482,209,000 | f4c2b2eb6a7704777070f733c259bd8535fbae01 | 3 | {
"blob_id": "f4c2b2eb6a7704777070f733c259bd8535fbae01",
"branch_name": "refs/heads/main",
"committer_date": 1634482209000,
"content_id": "cd98ec4bf1af81cc84bb3624fd864d83f1dcd6d8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d047690157fab54389641dfe91cec5c475a2b92d",
"extension": "py",
... | 2.796875 | stackv2 | #!python
import requests
import re
import os
import tarfile
from distutils.version import StrictVersion
class TorProject:
"""Class to perform operations on the TorProject site"""
tor_project_root = "https://www.torproject.org"
downloads_page = tor_project_root + "/download/"
def __init__(self):
... | 96 | 33.9 | 86 | 19 | 809 | python | [{"finding_id": "codeql_py/tarslip_06c1da8d161c6201_d7ca53c1", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
62
] | [
null
] | [
9
] | [
10
] | |
2024-11-18T19:29:02.524121+00:00 | 1,568,262,448,000 | f388668bc89e50a3f18ac0170ca6c8a3dbefd9ae | 2 | {
"blob_id": "f388668bc89e50a3f18ac0170ca6c8a3dbefd9ae",
"branch_name": "refs/heads/master",
"committer_date": 1568270945000,
"content_id": "5aba9baea7cfcbe65835d499963313e1283c7155",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cf912394e9ce03e59a3f3819092fd05b4a1d01da",
"extension": "py"... | 2.390625 | stackv2 | # Copyright 2016 Scalyr Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, so... | 361 | 43.71 | 126 | 18 | 3,380 | python | [{"finding_id": "codeql_py/insecure-default-protocol_395e1f19fd3a445c_96e69b58", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/insecure-default-protocol",
"py/insecure-default-protocol"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.",
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
323,
325
] | [
null,
null
] | [
25,
25
] | [
105,
76
] | |
2024-11-18T19:39:33.529144+00:00 | 1,592,383,792,000 | dba187600a8397b0ff0aab19e0a09590cf3bb561 | 3 | {
"blob_id": "dba187600a8397b0ff0aab19e0a09590cf3bb561",
"branch_name": "refs/heads/master",
"committer_date": 1592383792000,
"content_id": "e17c282247ca38241f945d71c7eed19289906828",
"detected_licenses": [
"MIT"
],
"directory_id": "efdf173826b566e25923005cbf450378c38fdea4",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/python
# -*- coding: UTF-8 -*-
import os
import base64
import json
import random
from Crypto.Cipher import AES
from configparser import ConfigParser
def randomstr():
return ''.join(random.sample('123456890abcdefghijklmnopqrstuvwxyzABCDEDFGHIJKLMNOPQRSTUVWXYZ@#', 16))
def appconfigLoad(path):
data = {}
... | 77 | 30.62 | 102 | 14 | 729 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_cccf564ec22e2f8b_9578c9fa", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
64,
71
] | [
null,
null
] | [
17,
24
] | [
54,
53
] | |
2024-11-18T19:39:47.872138+00:00 | 1,684,067,671,000 | 7c64827f8241751d17e467fd7d93e4813106c6ef | 3 | {
"blob_id": "7c64827f8241751d17e467fd7d93e4813106c6ef",
"branch_name": "refs/heads/master",
"committer_date": 1684067671000,
"content_id": "9d4e60ae62a197ae76711f4adc6f50ba50e17c70",
"detected_licenses": [
"MIT"
],
"directory_id": "358e29209787e370fe6c84f9fd3e1eabbc215414",
"extension": "py",
"fi... | 2.578125 | stackv2 | import os
import tarfile
import wget
import tqdm
import pandas
def download_id(wnid, out):
print(f"Downloading: {wnid}")
download_url = f"https://image-net.org/data/winter21_whole/{wnid}.tar"
filename = wget.download(download_url, out)
folder_name = os.path.join(out, wnid)
if not os.path.exis... | 29 | 26.62 | 76 | 10 | 204 | python | [{"finding_id": "codeql_py/tarslip_35c4a91d87d6039e_a4ce0236", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
18
] | [
null
] | [
5
] | [
13
] | |
2024-11-18T19:40:00.820761+00:00 | 1,551,704,186,000 | 2a901c675acebdbf72ba7a317f6492a2e3d2dd7b | 2 | {
"blob_id": "2a901c675acebdbf72ba7a317f6492a2e3d2dd7b",
"branch_name": "refs/heads/master",
"committer_date": 1551704236000,
"content_id": "40f8aa1660dbb122940c21691a909b35a30837c8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cb0c150336539ef36d9e7817b7d23bd37142ef40",
"extension": "py"... | 2.34375 | stackv2 | from flask import Blueprint,render_template,flash,redirect,url_for,request,current_app,jsonify
from App.models import Posts,User
from App.forms import SendPosts,Upload,UpdateInfo #导入发表博客表单类
from flask_login import current_user,login_required
from datetime import datetime
import os,string,random
from PIL import Image
fr... | 122 | 31.05 | 94 | 15 | 1,024 | python | [{"finding_id": "codeql_py/path-injection_5e78bcd6badd93b4_76574dc8", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 4 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
98,
104,
105,
106
] | [
null,
null,
null,
null
] | [
35,
23,
23,
23
] | [
39,
48,
53,
53
] | |
2024-11-18T20:18:02.604697+00:00 | 1,538,641,853,000 | 5e4c5d6584604b096bff7ae84aabeb6117867262 | 2 | {
"blob_id": "5e4c5d6584604b096bff7ae84aabeb6117867262",
"branch_name": "refs/heads/master",
"committer_date": 1538641853000,
"content_id": "a3a77c3b24a3c4a229b57663bd0c7e7be6fb0cb0",
"detected_licenses": [
"MIT"
],
"directory_id": "540cb3f9543b3f68e6f834db96d6610146f39723",
"extension": "py",
"fi... | 2.34375 | stackv2 | import asyncio
import ssl
from collections import deque
from . import consts
from ._json import json
from .containers import NsqMessage
from .exceptions import ProtocolError, ERROR_CODES
from .log import logger
from .protocol import DeflateReader, Reader, SnappyReader
async def create_connection(host='localhost', p... | 370 | 28.15 | 79 | 18 | 2,254 | python | [{"finding_id": "codeql_py/insecure-protocol_5609222170e77c5e_d457c5c2", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1)."
] | [
87
] | [
null
] | [
24
] | [
58
] | |
2024-11-18T20:18:31.584302+00:00 | 1,445,962,095,000 | 594ed8380d9023b1b2c7293201c36480a5337c14 | 3 | {
"blob_id": "594ed8380d9023b1b2c7293201c36480a5337c14",
"branch_name": "refs/heads/master",
"committer_date": 1445962095000,
"content_id": "09d1977d81b70265ff0b708c19ff7f00dfe09621",
"detected_licenses": [
"MIT"
],
"directory_id": "62072e56c550b0fbfb4cf90414e6a7f29b65dffb",
"extension": "py",
"fi... | 2.640625 | stackv2 | import requests, json
class Playbasis:
"""The Playbasis Object"""
BASE_URL = 'https://api.pbapp.net/'
BASE_ASYNC_URL = 'https://api.pbapp.net/async/';
def __init__(self):
self.token = None
self.apiKeyParam = None
self.respChannel = None
def auth(self, apiKey, apiSecre... | 299 | 37.52 | 131 | 15 | 2,735 | python | [{"finding_id": "codeql_py/request-without-cert-validation_483edc9f5f039a18_7a3b0a81", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 5 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
31,
285,
286,
298,
299
] | [
null,
null,
null,
null,
null
] | [
15,
31,
27,
31,
27
] | [
46,
69,
58,
69,
58
] | |
2024-11-18T20:18:34.580586+00:00 | 1,616,217,753,000 | 4d106b5257f6648c0bbe7f2301fb3a7886b644e2 | 3 | {
"blob_id": "4d106b5257f6648c0bbe7f2301fb3a7886b644e2",
"branch_name": "refs/heads/master",
"committer_date": 1616217753000,
"content_id": "e30691dc50e33572fe437af890285c61b569e5ff",
"detected_licenses": [
"Unlicense"
],
"directory_id": "273836a20afe8e2c8a25fb7f4b4d8dabafb83ff2",
"extension": "py",... | 2.640625 | stackv2 | """
nginx secure streaming application
written by Darren Popham, 2019
"""
import os
import time
import datetime
import json
from requests_oauthlib import OAuth2Session
from flask import Flask, request, redirect, session, url_for, abort
from flask import render_template
from flask.json import jsonify
from functools im... | 249 | 31.42 | 133 | 16 | 1,692 | python | [{"finding_id": "codeql_py/log-injection_8437fb61f255ccb6_d84505ab", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
206,
219,
232
] | [
null,
null,
null
] | [
22,
22,
22
] | [
72,
73,
73
] | |
2024-11-18T20:18:34.991009+00:00 | 1,556,789,773,000 | 0af4676cb69887dc3f1bc9584f7efb0de93024d9 | 3 | {
"blob_id": "0af4676cb69887dc3f1bc9584f7efb0de93024d9",
"branch_name": "refs/heads/master",
"committer_date": 1556789773000,
"content_id": "81ee72bb78bf78aaef78798fb9f79c642ddfeafa",
"detected_licenses": [
"MIT"
],
"directory_id": "38d93fe13c30ae92061a5fcb25a7a1df93041775",
"extension": "py",
"fi... | 2.671875 | stackv2 | from flask import Flask, render_template, request
import os
import sqlite3
import threading
import time
import uuid
def worker():
while True:
time.sleep(12)
with sqlite3.connect('database.db') as conn:
for row in conn.execute('SELECT * FROM tasks WHERE resource IS NULL'):
... | 66 | 27.29 | 142 | 17 | 455 | python | [{"finding_id": "codeql_py/reflective-xss_0a9a27241ae4de90_ad5684f1", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-089"
] | [
"py/reflective-xss",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
32,
42
] | [
null,
null
] | [
16,
26
] | [
28,
36
] | |
2024-11-18T20:18:47.803064+00:00 | 1,496,209,181,000 | 8b2d3089526dfdff0961055f4c5196226edbe4d5 | 3 | {
"blob_id": "8b2d3089526dfdff0961055f4c5196226edbe4d5",
"branch_name": "refs/heads/master",
"committer_date": 1496209181000,
"content_id": "6d12cba117da0a543bd682249a45e81fc3d7a630",
"detected_licenses": [
"MIT"
],
"directory_id": "14060038591587c62edcb365cfbc99fdf469363d",
"extension": "py",
"fi... | 2.59375 | stackv2 | # Python Standard Library
import re
from shutil import rmtree, copyfile
# 3rd Party Libraries
from jinja2 import Environment, PackageLoader, FileSystemLoader, ChoiceLoader
# Local
from stablogen.config import *
from stablogen.Post import *
from stablogen.code import CodeExtension, output_code_style
def setup_jinja(i... | 153 | 29.82 | 83 | 17 | 1,094 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a75b3747fb18deb1_f4101634", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
20
] | [
31
] | [
11
] | [
6
] | |
2024-11-18T20:18:49.627593+00:00 | 1,468,063,930,000 | 4054ccfdff4a7d6471c22cd26442955c64d69937 | 3 | {
"blob_id": "4054ccfdff4a7d6471c22cd26442955c64d69937",
"branch_name": "refs/heads/master",
"committer_date": 1468063930000,
"content_id": "991d73c4c38312849d7e3e8621cd4125055602d3",
"detected_licenses": [
"MIT"
],
"directory_id": "1045807a8505435781af654627fc0cbc0c3140a1",
"extension": "py",
"fi... | 2.640625 | stackv2 | import os
import json
import tornado.web
import requests
import server
BING_KEY = 'd9c59f6186204b4b8c12d4c26e6e84e4'
BING_URL = 'https://bingapis.azure-api.net/api/v5/images/search'
TYPES = ['anger', 'contempt', 'disgust', 'fear', 'happiness', 'neutral',
'sadness', 'surprise']
NUM_FETCH = 20
class GuessHand... | 50 | 26.56 | 75 | 14 | 382 | python | [{"finding_id": "codeql_py/path-injection_4f05291772a27229_8913f217", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
23
] | [
null
] | [
25
] | [
29
] | |
2024-11-18T20:18:50.340956+00:00 | 1,451,479,176,000 | 4f4e8bb935b077675859e35b532de1d869f0cf39 | 2 | {
"blob_id": "4f4e8bb935b077675859e35b532de1d869f0cf39",
"branch_name": "refs/heads/master",
"committer_date": 1451479176000,
"content_id": "5a0f3fbc120267185c37ff6ba6c7fab893bbcb2b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2e041584fa24ccbcbdf56c0cd00f44ec06ca7081",
"extension": "py"... | 2.34375 | stackv2 | import logging
import tornado.escape
import tornado.web
import tornado.websocket
import hashlib, random, datetime
from tornado import gen
from tornado_mysql import err
class GeneralData:
""""""
# STT 保存着sessionId,toren和创建时间,每个 get() 方法开始都应该有一个检测个方法
# sessionId 一直存活到会话结束,而toren就在每次提交之后改变
STT = dict()
... | 109 | 33.7 | 90 | 23 | 882 | python | [{"finding_id": "codeql_py/code-injection_51424e95f42cb9bd_880706ce", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-094"
] | [
"py/code-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1)."
] | [
81
] | [
null
] | [
24
] | [
31
] | |
2024-11-18T20:29:38.600735+00:00 | 1,429,073,072,000 | 5d0def0497e73ae51ef7847209d717c92c3f1057 | 3 | {
"blob_id": "5d0def0497e73ae51ef7847209d717c92c3f1057",
"branch_name": "refs/heads/master",
"committer_date": 1429073072000,
"content_id": "c08d0ab04ce1c3eb9fea5cf7ace4c4729b72015a",
"detected_licenses": [
"MIT"
],
"directory_id": "9bb30ddd77eb8c145e1f00029894a390988292c0",
"extension": "py",
"fi... | 2.515625 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
"""
Created on Tue Jan 20 14:10:00 2015
@author: joschi
"""
from __future__ import print_function
import time as time_lib
from datetime import datetime, timedelta
import collections
import os
import sys
import csv
#import simplejson as json
import json
import util
input_form... | 348 | 30.76 | 132 | 21 | 2,752 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_198139d3a1c9501b_e9d203d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
54
] | [
null
] | [
23
] | [
88
] | |
2024-11-18T20:29:42.992525+00:00 | 1,589,249,402,000 | 710c77c551a6fcabfe4e023f1f07155e489f241e | 4 | {
"blob_id": "710c77c551a6fcabfe4e023f1f07155e489f241e",
"branch_name": "refs/heads/master",
"committer_date": 1589249402000,
"content_id": "537466df195a9b66170f48ed2937212e80d6eb85",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "643c9e81cd934d8eb65da0241f887c5b3fba704e",
"extension": "py"... | 4.21875 | stackv2 | # -*- coding:utf-8 -*-
# __author__="X1gang"
# Date:2018/12/8
'''
非绑定方法 没有自动传值的功能 @staticmethod
绑定方法 绑定给谁就给谁调用,调用时会自动将调用者作为第一个参数传递给函数
1.绑定到对象的方法(不被任何装饰器装饰的函数) 2.绑定到类的方法 @classmethod 装饰的函数
class A:
def __init__(self, name):
self.name = name
def call(self): # 绑定到对象的方法,对象调用时默认将调用者作为第一个参数自动传入,类也可调用,但只是... | 143 | 19.46 | 93 | 10 | 1,150 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_591bfa78e8a57f7a_7e916c23", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
114,
116
] | [
null,
null
] | [
7,
7
] | [
15,
15
] | |
2024-11-18T20:29:48.529142+00:00 | 1,473,096,372,000 | 8bc553a1b4146255254777480a55dcc8a54f75fe | 2 | {
"blob_id": "8bc553a1b4146255254777480a55dcc8a54f75fe",
"branch_name": "refs/heads/master",
"committer_date": 1473096372000,
"content_id": "6d86714abe5c068a5bde826f3ca82bffba6fef1d",
"detected_licenses": [
"MIT"
],
"directory_id": "64bc2ea92f33e1e7ec056b32c5d4db0bc7e13306",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
# file: pavement.py
# authors: jonathan kelley 2016
from paver.easy import *
import paver.doctools
from paver.setuputils import setup
import shutil
import os
import platform
def value_from_specfile(getkey):
"""
loads the version and other keys from the .spec file
... | 184 | 24.02 | 74 | 22 | 1,122 | python | [{"finding_id": "codeql_py/overly-permissive-file_b1a6c3c063ec1ae2_d7594f71", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable.",
"Overly permissive mask in chmod sets file to world readable."
] | [
82,
84
] | [
null,
null
] | [
13,
9
] | [
32,
29
] | |
2024-11-18T20:29:51.400147+00:00 | 1,514,504,467,000 | b6a8848d3fb803545374b33c2f0298c68bc87429 | 2 | {
"blob_id": "b6a8848d3fb803545374b33c2f0298c68bc87429",
"branch_name": "refs/heads/master",
"committer_date": 1514504467000,
"content_id": "d24cd1707699375a66f5b6dc2a27c3ed9ffbb253",
"detected_licenses": [
"MIT"
],
"directory_id": "99b61eb75a0c4689ce934710ab40d0bb1cafa9f5",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/env python
# * coding: utf8 *
'''
LocatorPallet.py
A module that contains a pallet definition for data to support the web api locator services and
methods to keep them current.
Pre-requisites
- The `secrets.py` file has been populated from the template file
- The locators in `self.services` have bee... | 309 | 48.83 | 165 | 16 | 3,535 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9220c7579c50f74a_4a74807e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secre... | [
118,
125,
125
] | [
null,
null,
null
] | [
41,
44,
54
] | [
48,
52,
63
] | |
2024-11-18T20:51:20.305906+00:00 | 1,654,106,220,000 | 93b4bbea310e5a89445d9478504bdc126120c5c9 | 3 | {
"blob_id": "93b4bbea310e5a89445d9478504bdc126120c5c9",
"branch_name": "refs/heads/main",
"committer_date": 1654106220000,
"content_id": "4595f69513400f369f90ba6879b13f4aefba4e55",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "dec8352f5210a6d53c1f40d90f58674de39c72af",
"extension": "py"... | 2.609375 | stackv2 | # Licensed under a 3-clause BSD style license - see LICENSE.rst
# -*- coding: utf-8 -*-
"""
===============
TracRemote.main
===============
Contains entry point for command-line scripts.
"""
import os
import sys
from .connection import Connection
def main_args(args=None):
"""Parse the command-line arguments pass... | 212 | 35.57 | 79 | 20 | 1,578 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e6175869a5477475_6c177d5d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
207
] | [
null
] | [
19
] | [
75
] | |
2024-11-18T20:51:20.602385+00:00 | 1,530,708,597,000 | 89288ef6c765461c49e45b7b1e577daef201107f | 2 | {
"blob_id": "89288ef6c765461c49e45b7b1e577daef201107f",
"branch_name": "refs/heads/master",
"committer_date": 1530708597000,
"content_id": "764d6427cfd28f9e078772d936de434b9926c465",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f5f926f90709354f68694bfe863c445f71a48265",
"extension": "py"... | 2.3125 | stackv2 | import datetime
import sqlalchemy
from flask import request, redirect, url_for, jsonify, flash
from flask_login import logout_user, login_user, login_required, current_user
from beedare import db
from beedare.models import User
from beedare import login_manager
from . import *
@auth_blueprint.route('/login', metho... | 139 | 34.99 | 111 | 17 | 1,110 | python | [{"finding_id": "codeql_py/stack-trace-exposure_a7feca2cda11058b_5811d8c5", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
22,
40,
127,
134
] | [
null,
null,
null,
null
] | [
24,
24,
24,
24
] | [
67,
67,
67,
67
] | |
2024-11-18T20:51:29.849472+00:00 | 1,431,502,497,000 | 9eb62406260816131801eb722f853cc70bbf6e24 | 3 | {
"blob_id": "9eb62406260816131801eb722f853cc70bbf6e24",
"branch_name": "refs/heads/master",
"committer_date": 1431502497000,
"content_id": "1cbb53b4e8a409a64365d41831ccbb0aad892b21",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "0342e3f81113003db8cbbc1ae6bb713f8d98f280",
"extension": "p... | 2.671875 | stackv2 | """
This is the main python tool (the "backend") for uploading, processing, and
ingesting data files. It will call the plotter to make plots too.
You can start up the web server with:
python upload_form.py
Please try to keep lines to 80 characters where possible
Print statements will show up in the terminal. ... | 318 | 37.37 | 132 | 18 | 2,711 | python | [{"finding_id": "codeql_py/flask-debug_3358f108df17551f_36271322", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-117",
"CWE-079"
] | [
"py/flask-debug",
"py/log-injection",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1).",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
318,
161,
52
] | [
null,
null,
null
] | [
5,
22,
7
] | [
24,
28,
27
] | |
2024-11-18T20:51:46.075888+00:00 | 1,644,750,479,000 | f3e32db73943ef0a75f035705831141df8bdec34 | 3 | {
"blob_id": "f3e32db73943ef0a75f035705831141df8bdec34",
"branch_name": "refs/heads/master",
"committer_date": 1644750479000,
"content_id": "bb46220ce6a70f495fa3b7a80c0855ba391aee5b",
"detected_licenses": [
"MIT"
],
"directory_id": "e04d60b5c673b5c9eb4d0a4aa5993de73d707f10",
"extension": "py",
"fi... | 3.3125 | stackv2 | # MAIN APP THAT USES FLASK FOR BACKEND
# CLEAN, SIMPLE FRAMEWORK TO DO ALL THAT IS REQUIRED.
# NOTHING MORE, NOTHING LESS.
from flask import Flask, render_template, request # FLASK FILES
import requests # FOR API CALLS
# APP NAME = app
app = Flask(__name__)
# ROOT URL THAT RETURNS INDEX HTML
@app.route('/')
def ind... | 130 | 30.11 | 96 | 14 | 1,146 | python | [{"finding_id": "codeql_py/flask-debug_ab8203f9c818ec61_f24d1779", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
130,
59
] | [
null,
null
] | [
2,
13
] | [
21,
95
] | |
2024-11-18T19:07:18.366515+00:00 | 1,680,803,901,000 | 72ae112721d3365ffdffe5e83da34c992f528a58 | 2 | {
"blob_id": "72ae112721d3365ffdffe5e83da34c992f528a58",
"branch_name": "refs/heads/main",
"committer_date": 1680803901000,
"content_id": "96c5c157945e0272e1a86e24752f8b1389dc2726",
"detected_licenses": [
"MIT"
],
"directory_id": "4056c19b4603e135e2162b77848c419a189e0c6c",
"extension": "py",
"file... | 2.421875 | stackv2 | #! /usr/bin/env python3.6
"""
server.py
Stripe Sample.
Python 3.6 or newer required.
"""
import stripe
import json
import os
from flask import Flask, render_template, jsonify, request, send_from_directory
from dotenv import load_dotenv, find_dotenv
# Setup Stripe python client library
load_dotenv(find_dotenv())
str... | 135 | 37.74 | 119 | 19 | 1,087 | python | [{"finding_id": "codeql_py/stack-trace-exposure_d128b8c1aed2fa75_28247119", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
115
] | [
null
] | [
20
] | [
21
] | |
2024-11-18T19:07:25.297424+00:00 | 1,614,967,259,000 | 1e1b2f7aaa036826c2cd8e4482d698e1aaa60470 | 3 | {
"blob_id": "1e1b2f7aaa036826c2cd8e4482d698e1aaa60470",
"branch_name": "refs/heads/main",
"committer_date": 1614967259000,
"content_id": "e480076ebc43c6266cf7e4e67c127d1545869bc5",
"detected_licenses": [
"MIT"
],
"directory_id": "1caec96f60692080f1a1e3fd52353b3c2982f3de",
"extension": "py",
"file... | 2.703125 | stackv2 | # Distributed under MIT license (see license.txt), Copyright Tarah Z. Tamayo
#
import leoverb
import boto3
import json
import requests
import jinja2
import sys
import re
import unicodedata
def sanitize_text(txt) -> str:
# Some web data contains zero width strings and possibly other control characters. This strips... | 111 | 28.68 | 107 | 13 | 899 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c8304b12f83cad9b_0c8a7da8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
70
] | [
null
] | [
12
] | [
56
] | |
2024-11-18T19:07:56.849414+00:00 | 1,562,476,510,000 | 6c629b51035926aee2d56ff8dd894824646a18d3 | 3 | {
"blob_id": "6c629b51035926aee2d56ff8dd894824646a18d3",
"branch_name": "refs/heads/master",
"committer_date": 1562481207000,
"content_id": "39f2ccc08f6904e4e502b16d3aee4bb230227e09",
"detected_licenses": [
"MIT"
],
"directory_id": "c0991bf5a08fe4f1628382f8bdef9702e7fad99d",
"extension": "py",
"fi... | 2.5625 | stackv2 | import argparse
from .client import GoodreadsClient
def main(args):
gc = GoodreadsClient(args.key, args.secret)
gc.authenticate(None, None)
summary = [
"",
"OAuth token: %s" % gc.session.access_token,
"OAuth token secret: %s" % gc.session.access_token_secret,
"",
"Co... | 29 | 33.69 | 96 | 11 | 230 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ee735a627c962920_1429c439", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
14,
22
] | [
null,
null
] | [
11,
11
] | [
29,
27
] | |
2024-11-18T19:08:01.933425+00:00 | 1,619,723,542,000 | eb8886548283453bc9bf8cbd592c62726e17b952 | 3 | {
"blob_id": "eb8886548283453bc9bf8cbd592c62726e17b952",
"branch_name": "refs/heads/main",
"committer_date": 1619723542000,
"content_id": "809ab4f29b7cdf6ead5dc666f28cbd4c9d0cefd3",
"detected_licenses": [
"MIT"
],
"directory_id": "59dc58c93a08a2cb64a326a4f4d3bd4eaf3d134f",
"extension": "py",
"file... | 2.84375 | stackv2 | from playwright.sync_api import sync_playwright
import socket
#Stage 2
from ipwhois.net import Net
from ipwhois.asn import IPASN
from pprint import pprint
import ssl, socket
class Solution:
def __init__(self, url):
#1.a
self.user_given_url = url
self.is_https = None
self.domain_name... | 128 | 29.09 | 130 | 19 | 856 | python | [{"finding_id": "codeql_py/insecure-protocol_4e4847a54da431d4_2f908b44", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)."
] | [
86
] | [
null
] | [
18
] | [
21
] | |
2024-11-18T19:18:18.170520+00:00 | 1,637,477,487,000 | 0ac2d30d883d2bdb482960a7fc8d3230148b5f38 | 3 | {
"blob_id": "0ac2d30d883d2bdb482960a7fc8d3230148b5f38",
"branch_name": "refs/heads/main",
"committer_date": 1637477487000,
"content_id": "6d21a7913e6544d7616ee5fb3914025fd87a879d",
"detected_licenses": [
"MIT"
],
"directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b",
"extension": "py",
"file... | 2.734375 | stackv2 | from hashlib import sha1
from random import *
from sys import exit
from os import urandom
from Crypto.PublicKey import DSA
from Crypto.Util.number import *
rot = randint(2, 2**160 - 1)
chop = getPrime(159)
def message_hash(x):
return bytes_to_long(sha1(x).digest())
def nonce(s, padding, i, q):
return (pow(messag... | 95 | 20.76 | 68 | 15 | 729 | python | [{"finding_id": "codeql_py/weak-crypto-key_8bae33104970e539_9346266b", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an DSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an DSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
44
] | [
null
] | [
11
] | [
29
] | |
2024-11-18T19:18:32.717488+00:00 | 1,693,151,150,000 | dc3a4bbd4df2b9bdec069b193ec1b7494c309989 | 3 | {
"blob_id": "dc3a4bbd4df2b9bdec069b193ec1b7494c309989",
"branch_name": "refs/heads/main",
"committer_date": 1693151150000,
"content_id": "ff8618dbc9b7924cea8efb2bb055e2d3ec76164e",
"detected_licenses": [
"MIT"
],
"directory_id": "a8ca3225e24c8b093056ce6baa1db6ba3aea8f97",
"extension": "py",
"file... | 2.796875 | stackv2 | # -*- coding: utf-8 -*-
"""
Parametric 1D Inversion of Sounding Data
========================================
Here we use the module *SimPEG.electromangetics.static.resistivity* to invert
DC resistivity sounding data and recover the resistivities and layer thicknesses
for a 1D layered Earth. In this tutorial, we focus... | 328 | 31.96 | 91 | 13 | 2,673 | python | [{"finding_id": "codeql_py/tarslip_45f674d6210429f8_c4a1d27f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
71
] | [
null
] | [
null
] | [
4
] | |
2024-11-18T19:18:50.640254+00:00 | 1,669,125,703,000 | 65690bf8d82bdad2fe4d5d7edc47a0da4b747062 | 3 | {
"blob_id": "65690bf8d82bdad2fe4d5d7edc47a0da4b747062",
"branch_name": "refs/heads/master",
"committer_date": 1669125703000,
"content_id": "0c033419d9f66afb413699b92699c4ace318b6cc",
"detected_licenses": [
"MIT"
],
"directory_id": "b22716b295e19855fe450d7d115fff7bca12880a",
"extension": "py",
"fi... | 2.609375 | stackv2 | #compare branch lengths on species tree to inferred events (per gene copy) --- read a species tree with branch lengths and a set of uml_rec files
import os, re, sys, glob
from collections import defaultdict
import numpy as np
import scipy
import matplotlib
matplotlib.use('Agg')
import seaborn as sns
import pandas as ... | 109 | 35.39 | 145 | 17 | 1,060 | python | [{"finding_id": "codeql_py/overly-large-range_48681e0ac35c0719_4bd10d5f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\w in the same character class."
] | [
23
] | [
null
] | [
26
] | [
29
] | |
2024-11-18T19:18:55.329597+00:00 | 1,587,221,676,000 | 13205f89540ff378a8d3537ccd6a2375970eaf0f | 3 | {
"blob_id": "13205f89540ff378a8d3537ccd6a2375970eaf0f",
"branch_name": "refs/heads/master",
"committer_date": 1587221676000,
"content_id": "040e575131be6ec75afafa09ff6113f48f71c6fa",
"detected_licenses": [
"Apache-2.0",
"MIT"
],
"directory_id": "82daf96b3169d4927888a95e9c1e45ead616dba0",
"exten... | 2.5625 | stackv2 | # -*- coding: utf-8 -*-
from __future__ import unicode_literals
"""
Views used to process the contact form.
"""
import logging
from django.http import HttpResponseBadRequest
from django.shortcuts import redirect
from django.views.generic import FormView
from envelope import signals
from envelope.forms import Conta... | 130 | 31.94 | 80 | 16 | 844 | python | [{"finding_id": "codeql_py/url-redirection_51ec0af8ec9f280e_e4e316d8", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
105
] | [
null
] | [
25
] | [
47
] | |
2024-11-18T19:19:00.480595+00:00 | 1,532,025,431,000 | 2dc371ce72a3aca6b2c4f2a9289b25629f31bd1f | 3 | {
"blob_id": "2dc371ce72a3aca6b2c4f2a9289b25629f31bd1f",
"branch_name": "refs/heads/master",
"committer_date": 1532025431000,
"content_id": "76774a40df26ac5fc5178966dee0308a18c1b193",
"detected_licenses": [
"MIT"
],
"directory_id": "610e2032a5f813f66e3c9e4a3308e0137a486512",
"extension": "py",
"fi... | 3.375 | stackv2 | # solution to http://cryptopals.com/sets/2/challenges/13
# injection into ciphered bytes, encrypted in AES ECB mode
import Challenge09
from Crypto.Cipher import AES
from random import randint
# generates a random sequence of bytes. length is determined by length argument (int).
# returns randomBytes (bytearray)
def ... | 126 | 44.87 | 116 | 14 | 1,407 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_005bdfc278673244_40e75b4b", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
25,
31
] | [
null,
null
] | [
9,
9
] | [
36,
35
] | |
2024-11-18T19:44:34.597109+00:00 | 1,623,602,862,000 | db276708b53dbcb74e5abdaa742429feefcc7148 | 3 | {
"blob_id": "db276708b53dbcb74e5abdaa742429feefcc7148",
"branch_name": "refs/heads/main",
"committer_date": 1623602862000,
"content_id": "2f2f7cb0a3c392945773da0383c95a636615aac0",
"detected_licenses": [
"MIT"
],
"directory_id": "2fb060c6516bccc4302cfc6aeb3e99ab05671d80",
"extension": "py",
"file... | 2.609375 | stackv2 | from flask import Flask, request
import os
import cv2
import dlib
import numpy as np
from keras.models import load_model
import os
# ---------------------------------
# LOADING MODEL
loadedModal = load_model('main.model')
# ---------------------------------
# CROPPING IMAGE FUNCTIONS
detector = dlib.get_frontal_f... | 104 | 28.62 | 84 | 15 | 934 | python | [{"finding_id": "codeql_py/path-injection_479c034586b50605_a8df95e0", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
79
] | [
null
] | [
20
] | [
59
] | |
2024-11-18T19:58:02.419483+00:00 | 1,526,034,747,000 | 7b0fbe29ab00f2c7c983fd948018a5336d8f1c6c | 2 | {
"blob_id": "7b0fbe29ab00f2c7c983fd948018a5336d8f1c6c",
"branch_name": "refs/heads/master",
"committer_date": 1526034747000,
"content_id": "4dc83d9aca4993ed7ae11203f0a536362dde1cbe",
"detected_licenses": [
"MIT"
],
"directory_id": "8e84b64de2af016c5809772c52e4f8dd8e3381ad",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/user/bin python
#coding:utf-8
import commands
import os
import time
import csv
import sys
import string
import getpass
import logging
from itertools import islice
import xlrd
import json
# ***************** authproxy ****************************
"""
Copyright 2011 Jeff Garzik
AuthServiceProxy has the... | 372 | 32.66 | 141 | 19 | 2,992 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1277ea60d5725ab7_2ddd6baf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
293
] | [
null
] | [
30
] | [
87
] | |
2024-11-18T20:10:19.325556+00:00 | 1,683,645,053,000 | bd027f664ae689f38a9535e77e05391e04defe11 | 3 | {
"blob_id": "bd027f664ae689f38a9535e77e05391e04defe11",
"branch_name": "refs/heads/main",
"committer_date": 1683645053000,
"content_id": "67b46df5aae3d0e610835af53d6c11e43a0459ee",
"detected_licenses": [
"MIT"
],
"directory_id": "74ea34646f2d4116dff04d5ff3eaec07c75fa068",
"extension": "py",
"file... | 3.25 | stackv2 |
#Steady Scanner TickerConv v1.0.0
#9/11/2020
import pandas as pd
import numpy as np
import re
import os
all_trade_details = []
sum_list = []
filepath = "trade_history_test.txt"
percent_change_search = r"([,-9]+)\w+"
sell_type_search = r"([0-9]+)"
file = open(filepath,"r+") #gets filepath
for i, line in enum... | 61 | 24.21 | 119 | 13 | 395 | python | [{"finding_id": "codeql_py/overly-large-range_d7ad5cdd792ba2f1_4e2cf812", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[,\\-.\\/0-9\\].", "remediation": "", "location": {"f... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[,\\-.\\/0-9\\]."
] | [
13
] | [
null
] | [
29
] | [
32
] | |
2024-11-18T20:10:21.316757+00:00 | 1,626,038,619,000 | 2286e1056fadce16b5b9a61fb7825ee2ff05a9be | 2 | {
"blob_id": "2286e1056fadce16b5b9a61fb7825ee2ff05a9be",
"branch_name": "refs/heads/master",
"committer_date": 1626038619000,
"content_id": "fab40beefe00a7c681808600f30e481b69c315ab",
"detected_licenses": [
"MIT"
],
"directory_id": "b8a7843d35364be3a68ff9771c65354291410e8a",
"extension": "py",
"fi... | 2.484375 | stackv2 | import json
from flask_swagger import swagger
from flask import Flask, request, jsonify
from flask_swagger_ui import get_swaggerui_blueprint
from db import initialize_db
from models import Notification, User, NotificationLog
app = Flask(__name__)
app.config['MONGODB_SETTINGS'] ={'host': 'mongo', 'port':27017}
initia... | 177 | 24.92 | 67 | 16 | 930 | python | [{"finding_id": "codeql_py/stack-trace-exposure_e89570617da5e21d_a4cd7ea3", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
84
] | [
null
] | [
16
] | [
22
] | |
2024-11-18T20:23:21.890658+00:00 | 1,445,873,227,000 | 7f9841a2ae85a745183966152f2ec36db9498f83 | 3 | {
"blob_id": "7f9841a2ae85a745183966152f2ec36db9498f83",
"branch_name": "refs/heads/master",
"committer_date": 1445873227000,
"content_id": "dd8cc529ad7c7b7b348a720bd0f0a4fd99505f1c",
"detected_licenses": [
"MIT"
],
"directory_id": "061f669b0125acd994857904dd0bd722bff5f4e6",
"extension": "py",
"fi... | 3.078125 | stackv2 | __author__ = 'wfg2af'
from Crypto.PublicKey import RSA
from Crypto.Hash import SHA256
from Crypto import Random
class userMessages:
#Each user will have the public key of any other user.
UserMap = {}
UserName = ""
def __init__(self, UserName = "", UserMap = {}, key = None):
self.UserMap = UserM... | 66 | 41.62 | 111 | 17 | 683 | python | [{"finding_id": "codeql_py/weak-crypto-key_575bdd24036194ce_007b1f55", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 3 | true | [
"CWE-326",
"CWE-326",
"CWE-326"
] | [
"py/weak-crypto-key",
"py/weak-crypto-key",
"py/weak-crypto-key"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.",
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.",
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
37,
39,
61
] | [
null,
null,
null
] | [
10,
10,
18
] | [
46,
46,
55
] | |
2024-11-18T20:23:23.170378+00:00 | 1,634,092,553,000 | 50a0ae9265067706ee6af9d8462889f4d02b2a2f | 3 | {
"blob_id": "50a0ae9265067706ee6af9d8462889f4d02b2a2f",
"branch_name": "refs/heads/main",
"committer_date": 1634092553000,
"content_id": "afbef788f2fcf8ce4d5557289e08439a9cac23d9",
"detected_licenses": [
"MIT"
],
"directory_id": "c8a89a2b7e15c387de396837af288b357b4e9901",
"extension": "py",
"file... | 3.25 | stackv2 | import requests
import json
# input city and get weather information
city = input("Enter City: ")
api_key ="c6da798dc76b00c38a31c1d4bad1daf5"
url = f"http://api.openweathermap.org/data/2.5/weather?q={city}&appid={api_key}"
res = requests.get(url)
json_data = json.loads(res.text)
weather = json_data["weather"][0][... | 22 | 25.5 | 80 | 8 | 163 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9ed7fde7da52c028_30efa861", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
19,
20,
21,
22
] | [
null,
null,
null,
null
] | [
19,
24,
20,
23
] | [
26,
35,
28,
33
] | |
2024-11-18T20:23:29.656334+00:00 | 1,525,106,057,000 | 52669c0b15a1d1d0596cae0090872015e71f9ffc | 2 | {
"blob_id": "52669c0b15a1d1d0596cae0090872015e71f9ffc",
"branch_name": "refs/heads/master",
"committer_date": 1525106057000,
"content_id": "ec1c695b822c2d2e91cb7956c5105959a1e08082",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d101c891deb3e07a8c83d83b5973631a1b633ce4",
"extension": "py"... | 2.484375 | stackv2 | # Script to finish deployment of new SPP server
# Sets admin password based on argument and initializes onboard vSnap
# Use sppdeploy.py -h for help
# example:
# python sppdeploy.py --host="https://172.20.58.59" --pass="newpass123"
import json
import logging
from optparse import OptionParser
import copy
import sys
imp... | 80 | 32.3 | 109 | 12 | 631 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f1d21934764c45c3_552c2aad", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
48,
59
] | [
null,
61
] | [
9,
9
] | [
94,
66
] | |
2024-11-18T20:23:32.323663+00:00 | 1,576,166,000,000 | 95425a7fa8e735d0e78c6a3d3256db9bc6e7583c | 3 | {
"blob_id": "95425a7fa8e735d0e78c6a3d3256db9bc6e7583c",
"branch_name": "refs/heads/master",
"committer_date": 1576166000000,
"content_id": "ad370cd7f9891103cffbaf6a6759f86ad678ff4b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e04521686d16d66ab41ff62ccfde0e30cb677af3",
"extension": "py"... | 3.0625 | stackv2 | import hashlib
def hexa_hash(packet):
encoded = hashlib.md5(packet.encode())
return encoded.hexdigest()
def solve(secret_key):
i = 0
while True:
if hexa_hash(secret_key + str(i))[:5] == "00000":
return i
i += 1
def parse(file_name):
with open(file_name, "r") as f:
... | 23 | 16.91 | 57 | 14 | 110 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_c8c31cf36567b3e8_155d8034", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
5
] | [
null
] | [
27
] | [
42
] | |
2024-11-18T20:49:31.442301+00:00 | 1,584,091,088,000 | 86d0b0838b5b6e14fcb5224a28009bfe52484e6c | 3 | {
"blob_id": "86d0b0838b5b6e14fcb5224a28009bfe52484e6c",
"branch_name": "refs/heads/master",
"committer_date": 1584091088000,
"content_id": "a11a34c9f5a9b9752c5b0d29436889612b84299c",
"detected_licenses": [
"MIT"
],
"directory_id": "f10c1f31fe1492e214a1ba16d162a2c5bacee9f1",
"extension": "py",
"fi... | 2.546875 | stackv2 | """
buildthedocs.utils
Some random utilities
Copyright (c) 2015 Pietro Albini
Licensed under MIT license
"""
import pkg_resources
import jinja2
def get_resource(path, jinja_context=None):
""" Get a resource from the package, eventually building it with jinja """
path = "resources/"+path
... | 23 | 24.48 | 78 | 11 | 140 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e398fce5cfdf7210_fe93c479", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
20
] | [
null
] | [
20
] | [
40
] | |
2024-11-18T20:49:34.852987+00:00 | 1,583,720,128,000 | cc3a4562366329b89c28fc337e176aa6ef845558 | 2 | {
"blob_id": "cc3a4562366329b89c28fc337e176aa6ef845558",
"branch_name": "refs/heads/master",
"committer_date": 1583720128000,
"content_id": "8d4a49565b30a8d5c68c86e60ba2796eb53b98bd",
"detected_licenses": [
"MIT"
],
"directory_id": "d4c5046d1ae8052370123a2aa4a1f7d30a5d3388",
"extension": "py",
"fi... | 2.390625 | stackv2 | # -*- coding: utf-8 -*-
from flask import Flask
from flask import request
from flask import render_template
from flask_cors import CORS
import threading
import logging
import logging.config
import os
import sys
import traceback
import toml
log_config_file = "./fdsns_log.conf"
if os.path.exists(log_config_file):
l... | 103 | 24.77 | 87 | 15 | 650 | python | [{"finding_id": "codeql_py/reflective-xss_023e0fc986aabd8c_bf762bd6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
81
] | [
null
] | [
12
] | [
47
] | |
2024-11-18T20:49:37.234455+00:00 | 1,629,560,716,000 | fbb6b1ed5b4434a971386f1b66a3d31592984112 | 4 | {
"blob_id": "fbb6b1ed5b4434a971386f1b66a3d31592984112",
"branch_name": "refs/heads/main",
"committer_date": 1629560716000,
"content_id": "a705ea0b8cd8ff548a4740bd4d525c647b72db10",
"detected_licenses": [
"MIT"
],
"directory_id": "878ef1f97362353823a579ccfbe45686a8d81855",
"extension": "py",
"file... | 4.0625 | stackv2 | #!/usr/bin/env python3
'''
Python Password Generator
Ask for the number of characters wanted in a Password, take that number,
generate a password randomizing letters, numbers and special characters.
'''
import string
import random
import sys
def main():
print('Python Password Generator\n')
# Prompt for leng... | 44 | 21.02 | 77 | 11 | 220 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eb7b9d309f1e93db_dbee23ed", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
34
] | [
null
] | [
11
] | [
19
] | |
2024-11-18T20:50:38.697748+00:00 | 1,692,812,852,000 | 99c80f74813d51fa7ee824582d276caf61418128 | 3 | {
"blob_id": "99c80f74813d51fa7ee824582d276caf61418128",
"branch_name": "refs/heads/main",
"committer_date": 1692812852000,
"content_id": "c9da1a4cd82dc4aa18bd860ef50ebc9d02bab82e",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "635c344550534c100e0a86ab318905734c95390d",
"extension": "py"... | 2.515625 | stackv2 | # Copyright (c) FIRST and other WPILib contributors.
# Open Source Software; you can modify and/or share it under the terms of
# the WPILib BSD license file in the root directory of this project.
import os
import sys
from jinja2 import Environment, FileSystemLoader
def output(outPath, outfn, contents):
if not os... | 52 | 27.6 | 83 | 13 | 366 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d4ad28320450bf22_bba36a81", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
32
] | [
36
] | [
11
] | [
6
] | |
2024-11-18T20:51:13.857390+00:00 | 1,693,477,536,000 | 74c318f3569159de25da8d1708f7389ce8e5c78b | 2 | {
"blob_id": "74c318f3569159de25da8d1708f7389ce8e5c78b",
"branch_name": "refs/heads/master",
"committer_date": 1693477536000,
"content_id": "40f921fa12caa8cb18711438b434b38d43a3f230",
"detected_licenses": [
"MIT"
],
"directory_id": "c9500ad778b8521aaa85cb7fe3239989efaa4799",
"extension": "py",
"fi... | 2.3125 | stackv2 | import komand
import time
from .schema import IssueInput, IssueOutput
# Custom imports below
import json
import requests
import queue
import datetime
import dateutil.tz
requests.packages.urllib3.disable_warnings(requests.packages.urllib3.exceptions.InsecureRequestWarning)
class Issue(komand.Trigger):
def __ini... | 117 | 39.09 | 113 | 22 | 995 | python | [{"finding_id": "codeql_py/request-without-cert-validation_5b9b4b32362679fa_6a67b9bc", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
86,
111
] | [
92,
113
] | [
28,
24
] | [
18,
14
] | |
2024-11-18T20:51:16.916891+00:00 | 1,611,239,329,000 | 9b88543830b922f90f1d81e675f0014aa8407686 | 2 | {
"blob_id": "9b88543830b922f90f1d81e675f0014aa8407686",
"branch_name": "refs/heads/master",
"committer_date": 1611239329000,
"content_id": "799940af594bf9972c7faedc6abc2d7ba4fa9aff",
"detected_licenses": [
"MIT"
],
"directory_id": "bf67b73039635a1b49e6e941df351653a3c527f0",
"extension": "py",
"fi... | 2.453125 | stackv2 | from selenium import webdriver
from selenium.webdriver.common.action_chains import ActionChains
from selenium.webdriver.common.by import By
from selenium.webdriver.support.wait import WebDriverWait
from selenium.webdriver.support import expected_conditions as EC
from selenium.common.exceptions import TimeoutException
f... | 135 | 32.28 | 172 | 18 | 1,022 | python | [{"finding_id": "codeql_py/overly-large-range_350f17d34504e34c_d6ce42f7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
87
] | [
null
] | [
57
] | [
60
] | |
2024-11-18T20:51:26.608025+00:00 | 1,668,872,863,000 | 39a7a0a2a216790a7bdefa3d614a70c9b1b28640 | 2 | {
"blob_id": "39a7a0a2a216790a7bdefa3d614a70c9b1b28640",
"branch_name": "refs/heads/main",
"committer_date": 1668872863000,
"content_id": "a56ef06da8bf8000cbe864251fcdd04d9fed18c6",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "d0eb51dfd302a40eef2d53f0759d3adeafd7c6fd",
"extension": "py"... | 2.453125 | stackv2 | #!/usr/bin/env python3
# app
# A quick Flask app to demonstrate Machine Learning decision space.
#
# Author: Benjamin Bengfort <benjamin@bengfort.com>
# Created: Sun Jul 21 06:22:47 2019 -0400
#
# Copyright (C) 2019 Georgetown Data Analytics (CCPE)
# For license information, see LICENSE.txt
#
# ID: app.py [] benjami... | 174 | 30.6 | 127 | 16 | 1,269 | python | [{"finding_id": "codeql_py/stack-trace-exposure_15589fe8611cc590_f9118f4a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
127
] | [
null
] | [
16
] | [
27
] | |
2024-11-18T21:13:47.057691+00:00 | 1,590,418,845,000 | c3ed218aff1c3cf0a30bd7bf6063f29287209c9c | 2 | {
"blob_id": "c3ed218aff1c3cf0a30bd7bf6063f29287209c9c",
"branch_name": "refs/heads/master",
"committer_date": 1590418845000,
"content_id": "17bb796162ec57e31725058781c0b35ae4e9309d",
"detected_licenses": [
"MIT"
],
"directory_id": "cd53da3d868129780dd03c4125753b509b2c6b53",
"extension": "py",
"fi... | 2.453125 | stackv2 | import logging
from flask import Blueprint, request, jsonify
from flask.views import MethodView
from flask_login import current_user, login_required
from todos.schemas.tasks import TaskPost, TaskGet, TaskPatch, TaskOK, TaskError # noqa
from todos.models.api.tasks_api import TaskApi
# logger
logger = logging.getLogger(... | 417 | 35.29 | 113 | 19 | 3,494 | python | [{"finding_id": "codeql_py/log-injection_d75176a840cddc9b_c67d2ec0", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 21 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-... | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends o... | [
63,
114,
119,
125,
132,
135,
190,
195,
224,
227,
230,
287,
292,
300,
313,
306,
372,
377,
381,
391,
394
] | [
null,
115,
120,
null,
null,
null,
191,
196,
null,
null,
231,
288,
293,
null,
null,
307,
373,
378,
null,
null,
395
] | [
21,
26,
26,
26,
26,
26,
26,
26,
25,
30,
30,
26,
26,
21,
26,
30,
26,
26,
21,
26,
26
] | [
68,
69,
62,
91,
88,
88,
69,
62,
93,
92,
95,
69,
62,
68,
88,
76,
69,
62,
68,
88,
64
] | |
2024-11-18T21:13:53.295403+00:00 | 1,571,052,081,000 | 6b669cb8857f02d6b721bf00b43fff44f64fb469 | 2 | {
"blob_id": "6b669cb8857f02d6b721bf00b43fff44f64fb469",
"branch_name": "refs/heads/master",
"committer_date": 1571052081000,
"content_id": "4b86df127e5305d1ca0a2ae7490317dd8e8ccadd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "12c428f34ed3a1ff195b4012de8c84e603974a37",
"extension": "py"... | 2.328125 | stackv2 | """
Copyright (C) 2017 Extreme Networks. All rights reserved.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE L... | 221 | 41.39 | 169 | 18 | 2,076 | python | [{"finding_id": "codeql_py/request-without-cert-validation_9119aff8ec77c203_d93b3cf7", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
43,
64,
87,
144
] | [
44,
65,
null,
null
] | [
27,
27,
31,
31
] | [
119,
118,
96,
96
] | |
2024-11-18T21:13:56.070800+00:00 | 1,443,562,075,000 | a3068ac7ec0582930df53c028181273cbd7175e8 | 2 | {
"blob_id": "a3068ac7ec0582930df53c028181273cbd7175e8",
"branch_name": "refs/heads/master",
"committer_date": 1443562075000,
"content_id": "cdf55c5e91f1966aa0ac4129e9b06df8e061e159",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5553b79f835fcb180185777f5d0f921e1431a386",
"extension": "py"... | 2.5 | stackv2 | # Standard lib imports
#import logging
from requests.auth import HTTPBasicAuth
from requests_toolbelt import SSLAdapter
from requests.adapters import HTTPAdapter
from requests.packages.urllib3.poolmanager import PoolManager
import requests
import ssl
import logging
# Third party imports
# None
# Project level imports... | 156 | 42.26 | 141 | 20 | 1,418 | python | [{"finding_id": "codeql_py/request-without-cert-validation_08c5668f7bad5147_55de958e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2).",
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
62,
79
] | [
66,
83
] | [
26,
50
] | [
10,
18
] | |
2024-11-18T21:14:01.405197+00:00 | 1,684,934,513,000 | 15c0cdd85f8156cc47809e0e9a06ba73ff8ea65b | 2 | {
"blob_id": "15c0cdd85f8156cc47809e0e9a06ba73ff8ea65b",
"branch_name": "refs/heads/master",
"committer_date": 1684934513000,
"content_id": "3fa51d50a5d92126a889ebdfa1245f03c32dbf8f",
"detected_licenses": [
"MIT"
],
"directory_id": "84889ddf879df0eff30f4f8a38855957c55939c0",
"extension": "py",
"fi... | 2.46875 | stackv2 | import logging
import subprocess
import re
import os
from typing import Optional, Tuple
from paramiko import SSHClient, AutoAddPolicy
from backee.model.servers import SshBackupServer
from backee.model.items import FilesBackupItem
from backee.backup import constants
log = logging.getLogger(__name__)
class Transmi... | 383 | 33.49 | 111 | 22 | 2,916 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_46fa704faafb4c9a_4ef69f7b", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
38
] | [
null
] | [
13
] | [
66
] | |
2024-11-18T21:14:06.126544+00:00 | 1,496,699,916,000 | 029e990883360c5c56f70e953252d9f0b48223aa | 2 | {
"blob_id": "029e990883360c5c56f70e953252d9f0b48223aa",
"branch_name": "refs/heads/master",
"committer_date": 1496699916000,
"content_id": "57f5f2365ef676a8dbed6ec8b1d123de38426ef6",
"detected_licenses": [
"MIT"
],
"directory_id": "49fcdf7a72e423f97cd747be8553054061d22ebf",
"extension": "py",
"fi... | 2.46875 | stackv2 | """Set up the default views."""
from pyramid.view import view_config
from pyramid.httpexceptions import HTTPNotFound, HTTPFound
from learning_journal.models import JournalEntries
import datetime
@view_config(route_name='list', renderer='../templates/list.jinja2')
def list_view(request):
"""Return the list view.""... | 79 | 30.43 | 82 | 17 | 542 | python | [{"finding_id": "codeql_py/reflective-xss_562407eb6c979f38_0eb75416", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
42
] | [
46
] | [
20
] | [
14
] | |
2024-11-18T21:14:08.681050+00:00 | 1,411,571,533,000 | 6887b73c1dc3f5aea0e041e5fad6aacba750979e | 3 | {
"blob_id": "6887b73c1dc3f5aea0e041e5fad6aacba750979e",
"branch_name": "refs/heads/master",
"committer_date": 1411571533000,
"content_id": "aabfbf4d762daa4103007ccf4faf06ee4ae89201",
"detected_licenses": [
"MIT"
],
"directory_id": "8f815461e74d6a241a1eb67dd57dc1fea4a9d541",
"extension": "py",
"fi... | 2.625 | stackv2 | from flask import Flask, render_template, request, redirect, url_for
import corpus
import markov
from author_mapping import mapping
app = Flask(__name__)
@app.route('/')
def hello_world():
return render_template('index.html',
congresspeople=sorted(mapping.keys()))
@app.route('/genera... | 41 | 29.98 | 112 | 13 | 278 | python | [{"finding_id": "codeql_py/flask-debug_c58b4fa79db6a003_9968f9bb", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
41,
29
] | [
null,
null
] | [
5,
12
] | [
24,
26
] | |
2024-11-18T21:14:10.890900+00:00 | 1,540,924,611,000 | db30afa810792e79e932f494bc148da8aed73f75 | 2 | {
"blob_id": "db30afa810792e79e932f494bc148da8aed73f75",
"branch_name": "refs/heads/master",
"committer_date": 1540924611000,
"content_id": "2522a77e64e22393611bd49f5760213790a2f314",
"detected_licenses": [
"MIT"
],
"directory_id": "c8cb5e27ae3a81c3976d535ceb1c7db0dfe16a5a",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/env python3
import urllib3
import requests
import json
import logging
import urllib.response
import urllib.request
from datetime import datetime, timedelta
# ctx = ssl.create_default_context()
# ctx.check_hostname = False
# ctx.verify_mode = ssl.CERT_NONE
# ServiceNow - Post -
# Vars Used to Post Data ... | 133 | 30.47 | 148 | 18 | 1,001 | python | [{"finding_id": "codeql_py/request-without-cert-validation_79d1e5fad629a3e5_f910c7b1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
78
] | [
null
] | [
12
] | [
71
] | |
2024-11-18T21:14:12.412430+00:00 | 1,612,433,033,000 | eaef67f17ba7b248d3b384f21a0140936b1a03e1 | 2 | {
"blob_id": "eaef67f17ba7b248d3b384f21a0140936b1a03e1",
"branch_name": "refs/heads/master",
"committer_date": 1612433033000,
"content_id": "e89df15085aa5d14cea2a2023767f526baffe306",
"detected_licenses": [
"MIT"
],
"directory_id": "55e24c49e31bfb876106c2327e04a0364a622161",
"extension": "py",
"fi... | 2.375 | stackv2 | # -*- coding: utf-8 -*-
import socket, requests, validators, certifi
from smart import checkURL
from modules.json import creatJSON
from modules.sort import sortData
from modules.search import search
from termcolor import colored
from bs4 import BeautifulSoup
from tqdm import tqdm
#some init requests
socket.setdefau... | 134 | 27.1 | 121 | 31 | 891 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f45b5289affe9adf_fa79f932", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
79
] | [
null
] | [
16
] | [
69
] | |
2024-11-18T21:14:35.318443+00:00 | 1,625,494,043,000 | 463e2ac234ad21b679aaf5149aa6381f99dc63e8 | 2 | {
"blob_id": "463e2ac234ad21b679aaf5149aa6381f99dc63e8",
"branch_name": "refs/heads/main",
"committer_date": 1625494043000,
"content_id": "2e30637b256419a13194e3149c9444e4a66c82c1",
"detected_licenses": [
"MIT"
],
"directory_id": "02695a155c9d1dced970b1c14e095d1a1dcbb2f2",
"extension": "py",
"file... | 2.484375 | stackv2 | #!/bin/python
import streamlit as st
import pandas as pd
import numpy as np
import time, os
import matplotlib.pyplot as plt
import speech_recognition as sr
import sys
import os
import nltk
nltk.download('punkt')
nltk.download('averaged_perceptron_tagger')
from nltk.stem import PorterStemmer
from nltk.tokenize import w... | 61 | 32.13 | 118 | 20 | 513 | python | [{"finding_id": "codeql_py/command-line-injection_4c905084b5b39eb7_61843482", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 1 | true | [
"CWE-078"
] | [
"py/command-line-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1)."
] | [
27
] | [
null
] | [
15
] | [
97
] | |
2024-11-18T20:10:33.863460+00:00 | 1,576,122,263,000 | dd0eb0c9546de89d1b6e2c6523954aa895f3fe35 | 2 | {
"blob_id": "dd0eb0c9546de89d1b6e2c6523954aa895f3fe35",
"branch_name": "refs/heads/master",
"committer_date": 1576122263000,
"content_id": "51abfedb1469044161d2f7430d7e29adb6d90b96",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f404bf899e31638c3876d31a3521557c5e15f65b",
"extension": "py"... | 2.484375 | stackv2 | # -*- coding:utf-8 -*-
'''
@project: '__dbreport__.py'
@modules: report.host
@description:
@author: abelit
@email: ychenid@live.com
@created:Feb 28, 2018
@licence: GPL
'''
import paramiko
import re
import time
class HostMetric:
def __init__(self, hostname, username, password, port, logpath=None):
... | 132 | 26.1 | 146 | 16 | 894 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_d6f54b57754ac700_c32c79a4", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
31
] | [
null
] | [
9
] | [
66
] | |
2024-11-18T20:10:55.790346+00:00 | 1,691,842,282,000 | ebd265a9af7d5e56e69c0490b0ad8a4042da3de7 | 2 | {
"blob_id": "ebd265a9af7d5e56e69c0490b0ad8a4042da3de7",
"branch_name": "refs/heads/master",
"committer_date": 1691842401000,
"content_id": "9f01b59da7d615b5889e195700b2c2a7ccb82863",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "530b180c3aade8e67cc61ad2baddff018f7d59a8",
"extension": "py"... | 2.359375 | stackv2 | # Copyright (C) 2012 Anaconda, Inc
# SPDX-License-Identifier: BSD-3-Clause
from __future__ import annotations
import os
import re
import subprocess
import sys
from distutils.spawn import find_executable
from functools import lru_cache
from logging import getLogger
from os.path import (
abspath,
basename,
e... | 352 | 29.57 | 118 | 20 | 2,790 | python | [{"finding_id": "codeql_py/redos_bfdb726edeb3bb04_73a26b50", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'A:/' and containing many repetiti... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'A:/' and containing many repetitions of '!/'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'A:/!' and containing many repetitions of '//'."
] | [
313,
313
] | [
null,
null
] | [
55,
66
] | [
66,
72
] | |
2024-11-18T20:48:26.662870+00:00 | 1,608,607,275,000 | 24d5e601c89ce1d4ee2634979948942b14be2306 | 2 | {
"blob_id": "24d5e601c89ce1d4ee2634979948942b14be2306",
"branch_name": "refs/heads/master",
"committer_date": 1608607275000,
"content_id": "4a3e242c3cf3d7e2a0b9c89e4414c8c30c86ac76",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e46d86df334c09d05567b7a90765f2b015dbacc7",
"extension": "py"... | 2.40625 | stackv2 | #!/usr/bin/python3
import requests
import sys
import datetime
import logging
import socket
import ssl
operation = sys.argv[1]
web_service_url = sys.argv[2]
web_service_need_check = sys.argv[3]
ssl_date_fmt = r'%b %d %H:%M:%S %Y %Z'
def ssl_expires_in(hostname):
context = ssl.create_default_context()
conn = co... | 44 | 25.75 | 76 | 17 | 288 | python | [{"finding_id": "codeql_py/insecure-protocol_910a53e0f26d0b2e_fa9fc7f9", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)."
] | [
16
] | [
null
] | [
12
] | [
19
] | |
2024-11-18T21:11:35.455037+00:00 | 1,607,753,950,000 | 49f0fc80e2e1154d4445132158f94a9c15f3b8f8 | 2 | {
"blob_id": "49f0fc80e2e1154d4445132158f94a9c15f3b8f8",
"branch_name": "refs/heads/main",
"committer_date": 1607753950000,
"content_id": "4e88c77c93dac3cfa9f570743d2e5cc534ac8339",
"detected_licenses": [
"MIT"
],
"directory_id": "0f8bc35d50768f135c86310a991e66db48a4f53f",
"extension": "py",
"file... | 2.3125 | stackv2 | import os, shutil, jinja2
from typing import Union
from .introspect import logger, analyze_package, Documenter
# unfortunately sphinx barfs when trying to pickle when we include package_template for some reason
#from .def_render import package_template
# sphinx imports
from docutils import nodes
from docutils.statemac... | 235 | 49.39 | 132 | 17 | 2,578 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d6201ce948dae3dd_466d7e26", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
133
] | [
null
] | [
42
] | [
103
] | |
2024-11-18T21:25:48.494236+00:00 | 1,688,601,008,000 | e9d33c244e0d09aed9113d82cfbdee7611726bad | 2 | {
"blob_id": "e9d33c244e0d09aed9113d82cfbdee7611726bad",
"branch_name": "refs/heads/master",
"committer_date": 1688601120000,
"content_id": "6bd71ce2275860483cd753864b20c6621536b07b",
"detected_licenses": [
"MIT"
],
"directory_id": "f3669b4f8bea59e5e9f2a9f86588dba5ae7c675b",
"extension": "py",
"fi... | 2.46875 | stackv2 | from __future__ import absolute_import
from __future__ import print_function
import json
import sys
import csv
import math
from six.moves import range
from six.moves import zip
def read_csv(csv_path):
"""
Read flat csv file, first row are headers
Return file contents as json {1:{header1:value1,...},2:}
... | 149 | 35.58 | 106 | 23 | 1,447 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ab86eec17ae87508_01a777b3", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.",
"This expression stores [sensitive d... | [
84,
122,
123,
124,
81
] | [
91,
null,
null,
null,
null
] | [
27,
27,
27,
27,
23
] | [
45,
80,
80,
80,
97
] | |
2024-11-18T21:25:49.468090+00:00 | 1,629,202,358,000 | ced28f903add2c6de98865818783f23a62720786 | 2 | {
"blob_id": "ced28f903add2c6de98865818783f23a62720786",
"branch_name": "refs/heads/master",
"committer_date": 1629202358000,
"content_id": "751e0d6cce055670e69fa389ac802d8e95ba2c08",
"detected_licenses": [
"MIT"
],
"directory_id": "407b920e862c31c20530c17ad833f5a8be0aa24b",
"extension": "py",
"fi... | 2.375 | stackv2 | import os
import logging
from jinja2 import FileSystemLoader, Environment
from dop import definitions
def log(msg, info=False):
if info:
logging.info(msg)
else:
logging.debug(msg)
return ""
def raise_error(error):
raise RuntimeError(error)
class RunnerEnvironment:
def __init__... | 68 | 24.99 | 86 | 13 | 349 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_213bbc25c5f90fd4_158bcbf4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
59
] | [
null
] | [
22
] | [
87
] | |
2024-11-18T21:25:57.068908+00:00 | 1,684,764,777,000 | 4e272f60a2665228d4d169aaeeb643980c2e6372 | 2 | {
"blob_id": "4e272f60a2665228d4d169aaeeb643980c2e6372",
"branch_name": "refs/heads/master",
"committer_date": 1684764777000,
"content_id": "781f575c85036be824005b66a80987bbc12bf89d",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "8b5d61f17ab2e4c158270cf6dda79f9a47870df1",
"extension": "p... | 2.5 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""
Created in November 2019
@author: Quentin Lutz <qlutz@enst.fr>
"""
import pickle
import shutil
import tarfile
from os import environ, makedirs, remove, listdir
from os.path import abspath, commonprefix, exists, expanduser, isfile, join
from pathlib import Path
from ty... | 411 | 34.33 | 120 | 21 | 3,391 | python | [{"finding_id": "codeql_py/tarslip_f4ca1aef9609c423_5572224b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](2)."
] | [
46
] | [
null
] | [
5
] | [
8
] | |
2024-11-18T21:26:14.164272+00:00 | 1,477,975,850,000 | 108e941d3ff2388d6e5b08e533b27d01788f2330 | 2 | {
"blob_id": "108e941d3ff2388d6e5b08e533b27d01788f2330",
"branch_name": "refs/heads/master",
"committer_date": 1477975850000,
"content_id": "9ff2c7e15da87f95c8bf916395a0a148489bc818",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "a74ff326d4bb000ba72f1035ff8050854cb04589",
"extension": "p... | 2.484375 | stackv2 | import os
import jinja2
import glob
from collections import namedtuple, defaultdict
env = jinja2.Environment()
fsl = jinja2.DictLoader({"customsidebar.html":
"""
{# need this comment line to be sure versionsselector is on its own line #}
<!--versionselector-->
{% if versions|length > 1 %}
... | 127 | 28.39 | 123 | 17 | 888 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e87f9efc531d1f7d_73d2ef82", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
8
] | [
null
] | [
7
] | [
27
] | |
2024-11-18T21:51:47.688728+00:00 | 1,626,187,342,000 | f4ed1ca6bb3dd4c51f5d05484e31e3518d821c8a | 3 | {
"blob_id": "f4ed1ca6bb3dd4c51f5d05484e31e3518d821c8a",
"branch_name": "refs/heads/main",
"committer_date": 1626187342000,
"content_id": "b0df0b9221ed64f440ac9db946d61584f3b704bc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3234fcd1a07bce1233222aa3b5642bea8f69ba88",
"extension": "py",
... | 3.015625 | stackv2 | import pandas as pd
from Crypto.Cipher import AES
from Crypto.Hash import MD5
from Crypto.Random import random
import numpy as np
import time
def build_trapdoor(MK, keyword):
keyword_index = MD5.new()
keyword_index.update(str(keyword))
ECB_cipher = AES.new(MK, AES.MODE_ECB)
return ECB_cipher.encrypt(k... | 72 | 33.11 | 98 | 13 | 588 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_65640b078623c7a4_8d164ea2", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
13,
20
] | [
null,
null
] | [
12,
12
] | [
54,
49
] | |
2024-11-18T21:52:08.000761+00:00 | 1,589,969,241,000 | c9e643791cbdbaa9549634771f66450b3e2146b5 | 4 | {
"blob_id": "c9e643791cbdbaa9549634771f66450b3e2146b5",
"branch_name": "refs/heads/master",
"committer_date": 1589969241000,
"content_id": "42219fb395d97cb3ea472055288aab3f5532b412",
"detected_licenses": [
"MIT"
],
"directory_id": "8dac8ec2051f4df851f389b1b50dd2f210be8f29",
"extension": "py",
"fi... | 3.75 | stackv2 | class User:
def __init__(self,name,mobile_no,address=""):
self.name = name
self.mobile_no = mobile_no
self.address = address
class BankAccount:
def __init__(self,name,mobile_no):
self.name = name
self.mobile_no =mobile_no
#self.acc_no = acc_no
self.generate_account_no()
self.balance = 0
def genera... | 95 | 21.26 | 79 | 12 | 766 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d06cc33daf378327_f37f3051", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
26
] | [
null
] | [
14
] | [
25
] | |
2024-11-18T21:52:27.744057+00:00 | 1,533,607,280,000 | b939e4c46724c69e49a67bceea1c9a6586f2f26f | 3 | {
"blob_id": "b939e4c46724c69e49a67bceea1c9a6586f2f26f",
"branch_name": "refs/heads/master",
"committer_date": 1533607280000,
"content_id": "2db3bf88760c7162aff7ab66441bc7802baf2c04",
"detected_licenses": [
"MIT"
],
"directory_id": "3420294bac0d69c350326a1168d9a43bb17c7d36",
"extension": "py",
"fi... | 2.515625 | stackv2 | import datetime
from admin_app_config import db
from flask import (request, url_for, redirect, flash, current_app)
from flask_admin import (BaseView, expose)
from flask_login import (current_user, login_user)
from models import User
from wtforms import Form
from wtforms.fields import (DateField, HiddenField, PasswordFi... | 115 | 39.19 | 79 | 22 | 907 | python | [{"finding_id": "codeql_py/url-redirection_759abf0e90f19aa8_e7b148f1", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
74
] | [
null
] | [
37
] | [
68
] | |
2024-11-18T20:31:30.229218+00:00 | 1,676,139,610,000 | 718f3f15b8c98e35d02ec4151ce5c6bb1465dfcc | 3 | {
"blob_id": "718f3f15b8c98e35d02ec4151ce5c6bb1465dfcc",
"branch_name": "refs/heads/master",
"committer_date": 1676139610000,
"content_id": "967e041a2ec380fc96d698865bffd6acc00f390b",
"detected_licenses": [
"MIT"
],
"directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9",
"extension": "py",
"fi... | 2.5625 | stackv2 | '''
If server admin stream is experiencing buffering and there are concurrent transcode streams from
another user, kill concurrent transcode stream that has the lowest percent complete. Message in
kill stream will list why it was killed ('Server Admin's stream take priority and this user has X
concurrent streams'). Mes... | 113 | 36.1 | 114 | 23 | 982 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e1948f191a2b6b87_1275979b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
50,
52,
54
] | [
null,
null,
null
] | [
17,
17,
17
] | [
72,
73,
75
] | |
2024-11-18T20:59:40.730110+00:00 | 1,497,374,525,000 | f0e1cd808519c1c8782534b3a7594db414358fd8 | 5 | {
"blob_id": "f0e1cd808519c1c8782534b3a7594db414358fd8",
"branch_name": "refs/heads/master",
"committer_date": 1497374525000,
"content_id": "3d25ab2de7f8037ecd0eb1e2e344bdd3982d441f",
"detected_licenses": [
"MIT"
],
"directory_id": "ee53fb7e53d3b1f6334361e2ed6dfa31a3abe970",
"extension": "py",
"fi... | 4.6875 | stackv2 | # -------------------------------------------------------------------------------------------------
# FUNCTIONS
# -------------------------------------------------------------------------------------------------
print('\n\t\tFUNCTIONS\n')
def test_one(): # define a 'normal' fun... | 112 | 48.79 | 129 | 10 | 873 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_94434b33b4fcc78b_abd32a25", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text."
] | [
53
] | [
null
] | [
11
] | [
14
] | |
2024-11-18T20:59:41.133284+00:00 | 1,547,282,580,000 | d81fd51a95246342457f7531bc340a5c93e69431 | 3 | {
"blob_id": "d81fd51a95246342457f7531bc340a5c93e69431",
"branch_name": "refs/heads/master",
"committer_date": 1547413387000,
"content_id": "c4dcb8fd22968d3bf2fcc6d2800cb26591602437",
"detected_licenses": [
"MIT"
],
"directory_id": "e36970deb4e7f6025ec1e14ffed313f39e531326",
"extension": "py",
"fi... | 2.625 | stackv2 | from flask import Flask
from flask import abort, redirect, url_for, render_template, request
from flask_less import lessc as flask_less
from flask_sqlalchemy import SQLAlchemy
from uuid import uuid4 as uuid
from os import getcwd
# RSS Schema must be initialized after db creation
# 'db' variable must be bound to SQLA... | 160 | 28.68 | 97 | 18 | 1,041 | python | [{"finding_id": "codeql_py/url-redirection_0ddffb5c560bf1c6_8d81cc17", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
110,
153
] | [
null,
null
] | [
25,
25
] | [
49,
54
] | |
2024-11-18T21:10:30.242581+00:00 | 1,539,016,080,000 | dd19e066bdb9404d5d6c4acde519b592283cd9e9 | 3 | {
"blob_id": "dd19e066bdb9404d5d6c4acde519b592283cd9e9",
"branch_name": "refs/heads/master",
"committer_date": 1539016080000,
"content_id": "0db765ddf823a591bf379eddd239e985438ec4b9",
"detected_licenses": [
"MIT"
],
"directory_id": "db67ad192564640cb266079c8f7c19568c260fe4",
"extension": "py",
"fi... | 2.515625 | stackv2 | from flask import Flask, request, render_template, redirect, session, flash, url_for, jsonify
from flask_pymongo import PyMongo
from pymongo import MongoClient
import datetime
import re
app = Flask(__name__)
app.config['SECRET_KEY'] = 'HelloWorld'
client = MongoClient('mongodb://abcd:abcd123@ds125263.mlab.com:25263/bl... | 124 | 26.25 | 110 | 17 | 922 | python | [{"finding_id": "codeql_py/flask-debug_23d44eeb88f715ab_0b9a08a9", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-730"
] | [
"py/flask-debug",
"py/regex-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This regular expression depends on a [user-provided value](1) and is executed by [re.findall](2)."
] | [
124,
111
] | [
null,
null
] | [
2,
18
] | [
21,
45
] | |
2024-11-18T21:10:37.879437+00:00 | 1,631,083,680,000 | cfa24cdb4d4ffa260114404394234fd51f087664 | 4 | {
"blob_id": "cfa24cdb4d4ffa260114404394234fd51f087664",
"branch_name": "refs/heads/main",
"committer_date": 1631083680000,
"content_id": "af6513d053c1576f53e8da0c1119a4521485cb6c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9dc16419cc28d7f83495cf26bdd0c1c81e6802b2",
"extension": "py",
... | 3.84375 | stackv2 | import csv
contact_fields = ['phone', 'label_phone', 'first_name', 'surname', 'company', 'email', 'label_email']
contact_database = 'address_book.csv'
def menu():
print("Welcome to Address Book\n")
print("1. Add Contact\n")
print("2. View Contacts\n")
print("3. Delete Contact\n")
print("4. Exit\n... | 99 | 24.22 | 101 | 16 | 567 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c493e8dce1092d1b_36c7091e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
78
] | [
null
] | [
15
] | [
71
] | |
2024-11-18T21:23:31.097805+00:00 | 1,607,450,743,000 | ad010392ba2f3b948cb3d7abcd69466177ff338d | 3 | {
"blob_id": "ad010392ba2f3b948cb3d7abcd69466177ff338d",
"branch_name": "refs/heads/master",
"committer_date": 1607450743000,
"content_id": "1b9fbf7cf0f6c4d974a521afc766b73d88b02b10",
"detected_licenses": [
"Unlicense"
],
"directory_id": "f2c4c5c21cb83bbe00e8d5f8d44eeca452c1e01e",
"extension": "py",... | 2.890625 | stackv2 | from colorama import Fore, Style
UP_ONE_LINE = "\033[F\033[K"
to_solve = ''
with open('input.txt') as f:
to_solve = f.read()
to_solve = list(filter(None, to_solve.split('\n')))
to_solve = list(map(lambda x: x.split(': '), to_solve))
temp = []
for i in to_solve:
ttemp = i[0].split(' ')
tttemp = ttemp[0].split('-... | 38 | 22.76 | 91 | 13 | 304 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_16c872e3c1403916_4f8f257e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
33
] | [
null
] | [
9
] | [
32
] | |
2024-11-18T21:23:46.423684+00:00 | 1,395,325,288,000 | a6ded67cf04d54e6eafabc534171f5e3334f11b4 | 2 | {
"blob_id": "a6ded67cf04d54e6eafabc534171f5e3334f11b4",
"branch_name": "refs/heads/master",
"committer_date": 1395325288000,
"content_id": "b2e5347279180478b7eff7b9a7d2576b2072ae5b",
"detected_licenses": [
"MIT"
],
"directory_id": "9ba9624474024d7497a4f81a2af839966d2ec152",
"extension": "py",
"fi... | 2.328125 | stackv2 | import json
import logging
from flask import Blueprint, request
import chronicler
process = Blueprint('process', __name__)
@process.route('', methods=['POST'])
def processes():
try:
details = request.get_json()
if not details:
raise Exception("No data")
process = chronicler.add_process(details)
... | 34 | 26.65 | 80 | 18 | 234 | python | [{"finding_id": "codeql_py/stack-trace-exposure_8a87e39122dafc6a_46632677", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-079"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
20,
34,
31
] | [
null,
null,
null
] | [
12,
12,
13
] | [
46,
46,
80
] | |
2024-11-18T21:23:57.726082+00:00 | 1,565,259,453,000 | 6c52d77817c944c00edf0bd545eb98db5c9d4d56 | 3 | {
"blob_id": "6c52d77817c944c00edf0bd545eb98db5c9d4d56",
"branch_name": "refs/heads/master",
"committer_date": 1565259453000,
"content_id": "abf402c33b07493937480e77d75787b5242b06dd",
"detected_licenses": [
"MIT"
],
"directory_id": "efa7b5676c6d0a66823ad377b40f0514e453ca69",
"extension": "py",
"fi... | 2.953125 | stackv2 | from configparser import ConfigParser
import json
import logging
import os
import socket
import time
import requests
HTTP_200_OK = 200
HTTP_400_BAD_REQUEST = 400
HTTP_500_INTERNAL_ERROR = 500
"""Response codes"""
CONFIG_PATH = '/usr/local/etc/ip2w.ini'
"""Configuration file path"""
IP_URL = 'https://ipinfo.io/{}'
""... | 201 | 24.63 | 97 | 15 | 1,223 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b36b688cbb678941_1bce3715", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
191,
194
] | [
null,
null
] | [
18,
18
] | [
59,
59
] | |
2024-11-18T21:24:03.370150+00:00 | 1,610,418,027,000 | 3e36603f10915bf5d54a54907fa10cb80e25c5d0 | 3 | {
"blob_id": "3e36603f10915bf5d54a54907fa10cb80e25c5d0",
"branch_name": "refs/heads/master",
"committer_date": 1610418027000,
"content_id": "faab0dd0e2f25dcd44886f5d8936720159b3a152",
"detected_licenses": [
"MIT"
],
"directory_id": "9c20da18dc0c29ef2a8500417fd570698aef048e",
"extension": "py",
"fi... | 2.796875 | stackv2 |
from xml.dom import minidom
import utils
import os
import urllib.request
import zipfile
import tarfile
from collections import defaultdict
import shutil
import glob
from bs4 import BeautifulSoup
import csv
__author__ = "Gwena Cunha"
"""
- Downloads dataset
- Extracts information from XML (original and corrected essa... | 296 | 39.46 | 148 | 21 | 2,554 | python | [{"finding_id": "codeql_py/tarslip_1ec458b1109850b4_8f8a37d6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
56
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T21:37:18.739814+00:00 | 1,547,185,016,000 | b63dacc81c43b60210411c0941a64f2243bd7113 | 2 | {
"blob_id": "b63dacc81c43b60210411c0941a64f2243bd7113",
"branch_name": "refs/heads/master",
"committer_date": 1547185016000,
"content_id": "14b8ae17fd70b3e1e070beec547f899b180d491e",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "9e626463b41ea0deab0317cc41623d7829d3997e",
"extension": "p... | 2.40625 | stackv2 | #!/usr/bin/env python
from setuptools import setup
from setuptools.command.develop import develop
from setuptools.command.install import install
from setuptools import Command
import glob
import argparse
import json
import os
import sys
import shutil
kernel_json = {
'argv': [sys.executable, '-m', 'reactivepy', '-... | 178 | 26.38 | 76 | 18 | 1,080 | python | [{"finding_id": "codeql_py/overly-permissive-file_4681e06d7bd68217_668ded80", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
34
] | [
null
] | [
9
] | [
28
] | |
2024-11-18T21:37:51.334266+00:00 | 1,478,259,015,000 | eaef548b8a6d07b4d905dd1ae20be377e7d38253 | 2 | {
"blob_id": "eaef548b8a6d07b4d905dd1ae20be377e7d38253",
"branch_name": "refs/heads/master",
"committer_date": 1478259015000,
"content_id": "856d275d55d7c04713314e4ffc2d4451cd434422",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2318dbbced3f068234185a03ec7110a251e85a04",
"extension": "py"... | 2.328125 | stackv2 | #!/bin/env python
# -*- coding: utf-8 -*-
# Created by Conan on 2016/10/31
import requests
import string
import logging
import datetime
import traceback
from os import path as os_path
from tornado.web import RequestHandler
from tornado.web import HTTPError
from tornado.options import options
from kazoo.exceptions impor... | 213 | 41.42 | 120 | 20 | 1,955 | python | [{"finding_id": "codeql_py/partial-ssrf_011c0aeab4baf110_d8ff6a13", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen... | 4 | true | [
"CWE-918",
"CWE-918",
"CWE-918",
"CWE-117"
] | [
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).\nPart of the URL of this request depends on a [user-provided value](3).\nPart of the URL of this request depends on a [user-provided value](4).",
"Part of the URL of this... | [
28,
37,
147,
72
] | [
null,
null,
153,
null
] | [
16,
16,
13,
33
] | [
65,
81,
11,
114
] | |
2024-11-18T21:59:22.690879+00:00 | 1,670,328,408,000 | cfc4cb684af38a2586b403e6325c5867a0ad4ad4 | 3 | {
"blob_id": "cfc4cb684af38a2586b403e6325c5867a0ad4ad4",
"branch_name": "refs/heads/master",
"committer_date": 1670328408000,
"content_id": "870bc86a27a146c819ff6e61cdbebfb150a40cb1",
"detected_licenses": [
"MIT"
],
"directory_id": "5f28febcb14385f79f2b41263753232bb44d23dc",
"extension": "py",
"fi... | 3.078125 | stackv2 | """
I/O module.
Adapted from keras: https://github.com/tensorflow/tensorflow/blob/r2.0/tensorflow/python/keras/utils/data_utils.py#L150-L270
"""
import os
import shutil
import tarfile
import zipfile
from urllib.error import HTTPError, URLError
from urllib.request import urlretrieve
import six
def _extract_archive(f... | 130 | 34.79 | 124 | 20 | 1,022 | python | [{"finding_id": "codeql_py/tarslip_d2154e5fae65da8a_7128aaa1", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)."
] | [
49
] | [
null
] | [
21
] | [
28
] | |
2024-11-18T21:59:23.385978+00:00 | 1,543,067,286,000 | 7dc56a1cccd0a7a4384a2a9101c4fcc5c164dff2 | 3 | {
"blob_id": "7dc56a1cccd0a7a4384a2a9101c4fcc5c164dff2",
"branch_name": "refs/heads/master",
"committer_date": 1543067286000,
"content_id": "6d91797a323e2ea8420825df8336dc701dfc1fa4",
"detected_licenses": [
"MIT"
],
"directory_id": "50bf58e6e47ca6d4d9b1199eba3dccd687a5d39b",
"extension": "py",
"fi... | 2.546875 | stackv2 | #!/usr/bin/env python
"""
BibTeX fixer
------------
Fix your .bib BibTex files automatically
This script will connect to Crossref's API and retrieve
missing details in your bib files.
Set CROSSREF_MAILTO env var to your mail address to
gain access to a priority queue.
It requires `pybtex`, `habanero`, and `tqdm`:
... | 264 | 31.66 | 124 | 23 | 2,395 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_559313aba9e292ef_a55dfb9f", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [rxiv.org](1) may be at an arbitrary position in the sa... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [rxiv.org](1) may be at an arbitrary position in the sanitized URL."
] | [
111
] | [
null
] | [
43
] | [
84
] | |
2024-11-18T22:11:36.898520+00:00 | 1,551,121,833,000 | 207d9ec5c7c76b264f3c2f16f745daa49c7e8b0e | 2 | {
"blob_id": "207d9ec5c7c76b264f3c2f16f745daa49c7e8b0e",
"branch_name": "refs/heads/master",
"committer_date": 1551121833000,
"content_id": "34fe51129c96a1eba61d350d524859ab46678df8",
"detected_licenses": [
"MIT"
],
"directory_id": "f2e2011f4b674c70038e3d2c72b7ea558bc9e925",
"extension": "py",
"fi... | 2.390625 | stackv2 | import os
import os.path
import sys
import shutil
from distutils.dir_util import copy_tree
import glob
import time
import threading
import http.server
import socketserver
import webbrowser
import json
import markdown
import argparse
import signal
from jinja2 import Template
SCRIPT_DIR = os.path.dirname(os.path.realp... | 400 | 33.52 | 154 | 22 | 2,869 | python | [{"finding_id": "codeql_py/path-injection_75191ac1c13248fb_b0454edf", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-079"
] | [
"py/path-injection",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
117,
313
] | [
null,
null
] | [
22,
24
] | [
26,
42
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.