added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T21:33:18.686185+00:00 | 1,581,290,290,000 | 9688b662243c2f6b6d8e2ce7d077930436536bbd | 3 | {
"blob_id": "9688b662243c2f6b6d8e2ce7d077930436536bbd",
"branch_name": "refs/heads/master",
"committer_date": 1581290290000,
"content_id": "cdf55acd2ff40d40bf4511ff0df11042b4e63749",
"detected_licenses": [
"MIT"
],
"directory_id": "bc1a55b070373c6e59e7115f62a14d3bd7829225",
"extension": "py",
"fi... | 2.734375 | stackv2 | import re
import io
from lark import Lark
from .jass_mapping import JassScriptTransformer
"""
Formats: j
This is a plain text parser for creating an AST out of JASS code, NOT
a binary format parser. It is based on Lark instead of construct. The
grammar is in Lark's EBNF-like syntax and is pretty self-explana... | 267 | 24.9 | 166 | 19 | 2,013 | python | [{"finding_id": "codeql_py/redos_b3b33fbcccedd85f_7304464f", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\\\\\'."
] | [
230
] | [
null
] | [
26
] | [
42
] | |
2024-11-18T21:55:40.548916+00:00 | 1,612,376,236,000 | eca4c04d7b00285c9db0ea5a7300e29bce833768 | 2 | {
"blob_id": "eca4c04d7b00285c9db0ea5a7300e29bce833768",
"branch_name": "refs/heads/master",
"committer_date": 1612376236000,
"content_id": "4775328b56b101c58d8f4e4f2f9f3d0f4a4a17df",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a3385f7636ceb232e97ae30badee0ba9145138f8",
"extension": "py"... | 2.375 | stackv2 | #!/usr/bin/env python
'''
# Copyright 2013-2014 Mirsk Digital ApS (Author: Andreas Kirkedal)
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License. ... | 173 | 35.74 | 118 | 18 | 1,293 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_877b7cb9ac54bcf3_a5806a61", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
123
] | [
null
] | [
20
] | [
46
] | |
2024-11-18T21:55:41.636233+00:00 | 1,614,925,344,000 | 16bcc8df847b47969f9db73dec42ef34ab47ab0e | 3 | {
"blob_id": "16bcc8df847b47969f9db73dec42ef34ab47ab0e",
"branch_name": "refs/heads/master",
"committer_date": 1614925344000,
"content_id": "7128b7961e54348e83c8334de3290252d9b841e0",
"detected_licenses": [
"MIT"
],
"directory_id": "74d1ea06f83470841173dd8014bbdecd54ebc8ec",
"extension": "py",
"fi... | 3.0625 | stackv2 | try:
import requests
import urllib3
from fake_headers import Headers
from .chapter_list import Chapter_list
from bs4 import BeautifulSoup
import re
import os
import time
import random
except Exception as ex:
print(ex)
class Chapter_reader(Chapter_list):
def __init__(self,ma... | 143 | 41.06 | 109 | 20 | 1,221 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e42a89bbe8508135_ac9baf07", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
32,
88
] | [
null,
null
] | [
20,
20
] | [
94,
83
] | |
2024-11-18T21:56:04.454253+00:00 | 1,574,242,725,000 | 46d96ee44dc44a2f396fb769f9857a0bbd231dad | 3 | {
"blob_id": "46d96ee44dc44a2f396fb769f9857a0bbd231dad",
"branch_name": "refs/heads/master",
"committer_date": 1574242725000,
"content_id": "91ae8b3670c7fba072ecdf8b3db69bed3296635e",
"detected_licenses": [
"BSD-3-Clause",
"MIT",
"Apache-2.0"
],
"directory_id": "8b4f09f5a27a77cdf3894756e04566e... | 2.734375 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
from jinja2 import Environment, FileSystemLoader
from util import resource_path
class Renderer:
def __init__(self, path='./', temp_path='preview/template.html', css_path='preview/template.css', lang='en'):
self.lang = lang
self.env = Environment(loader=Fil... | 79 | 34.53 | 113 | 16 | 637 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fb2438ef48a8018f_d1217fe4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
10
] | [
null
] | [
20
] | [
79
] | |
2024-11-18T20:57:00.399283+00:00 | 1,581,099,363,000 | be7a730feec27f239d71a8b61bec3cf55a29b066 | 2 | {
"blob_id": "be7a730feec27f239d71a8b61bec3cf55a29b066",
"branch_name": "refs/heads/master",
"committer_date": 1581099363000,
"content_id": "41848308f5d8cf2f140466b5e72efa7ef723eadf",
"detected_licenses": [
"MIT"
],
"directory_id": "f87d3c29736cb7249409ad3f6584981a16cf7210",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/env python
# encoding: utf-8
import requests
import sys
import json
session = requests.Session()
def login(domain, username, password):
global session
url = domain + "/components/user/controller.php?action=authenticate"
data = {
"username": username,
"password": password,
... | 160 | 36.21 | 149 | 13 | 1,595 | python | [{"finding_id": "codeql_py/request-without-cert-validation_200b51ae5f44aa59_24b40209", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 5 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
20,
30,
79,
88,
97
] | [
null,
null,
null,
null,
null
] | [
16,
16,
20,
20,
20
] | [
58,
46,
82,
82,
82
] | |
2024-11-18T22:17:35.815312+00:00 | 1,594,825,602,000 | b4db684afa526430a14614f47d83eb2458645d32 | 2 | {
"blob_id": "b4db684afa526430a14614f47d83eb2458645d32",
"branch_name": "refs/heads/master",
"committer_date": 1594825602000,
"content_id": "cc563122e5ab6111378ade717449d80825eb2fed",
"detected_licenses": [
"MIT"
],
"directory_id": "1aacf84f6c8106f04ea03da0a790bce33b22f8b2",
"extension": "py",
"fi... | 2.3125 | stackv2 | import requests
import json
def get_access_token(token=False):
if token is False:
url = "https://fmcrestapisandbox.cisco.com/api/fmc_platform/v1/auth/generatetoken"
request = requests.session()
request.auth = ('jamearl', 'e66Z7VGQ')
request.headers = {
"Content-Type": "... | 27 | 23.78 | 90 | 11 | 155 | python | [{"finding_id": "codeql_py/request-without-cert-validation_05e9412b491930bb_0c8dee44", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
14
] | [
null
] | [
20
] | [
51
] | |
2024-11-18T22:44:13.600413+00:00 | 1,681,301,224,000 | 76479f607dfed4bae4084af062367da0db6e972a | 3 | {
"blob_id": "76479f607dfed4bae4084af062367da0db6e972a",
"branch_name": "refs/heads/master",
"committer_date": 1681301224000,
"content_id": "9f4a50b05118c83876ee08ce509ed6ba76969ac5",
"detected_licenses": [
"MIT"
],
"directory_id": "26a087e1043d1d0aaee105ea371762263b967d22",
"extension": "py",
"fi... | 2.875 | stackv2 | import re
from .errors import EmailError
# 手机号正则表达式
_REGEX_PHONE = re.compile(r"1\d{10}")
_GEN_DELIMS_REGEX = re.compile(r"[\:\/\?\#\[\]\@]")
_SUB_DELIMS_REGEX = re.compile(r"[\!\$\&\'\(\)\*\+\,\;\=]")
def is_phone(phone: str = None) -> bool:
if not phone:
return False
return bool(_REGEX_PHONE.fullm... | 69 | 27.84 | 110 | 12 | 610 | python | [{"finding_id": "codeql_py/redos_857b807f98811abf_a665d2db", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\013'."
] | [
39
] | [
null
] | [
14
] | [
89
] | |
2024-11-18T22:44:13.808755+00:00 | 1,497,113,410,000 | a022e343c6c03b38f0fb6885b2c81241070991bd | 3 | {
"blob_id": "a022e343c6c03b38f0fb6885b2c81241070991bd",
"branch_name": "refs/heads/master",
"committer_date": 1497113410000,
"content_id": "2be6ad4a34d8b92b9da3103da05ec92f8dac5f70",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "480cb7b9eaaeec89ce026f4723f0d59bd7c29766",
"extension": "py"... | 3.03125 | stackv2 |
import re
from common import get_job_type_from_position_info_xlsx, set_show_Chinese
from read_position_info import get_salary_list
import numpy as np
import matplotlib.pyplot as plt
from matplotlib.ticker import MultipleLocator, FormatStrFormatter
set_show_Chinese()
def calculate_average_salary(xlsx_file):
sala... | 95 | 32.76 | 116 | 12 | 960 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_73c67c6c1a9ed25b_60c4c81f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
51
] | [
null
] | [
12
] | [
54
] | |
2024-11-18T23:10:48.881045+00:00 | 1,528,124,827,000 | 594d4d0dea751b699b9ab0d0888744eb1282d136 | 2 | {
"blob_id": "594d4d0dea751b699b9ab0d0888744eb1282d136",
"branch_name": "refs/heads/master",
"committer_date": 1528124827000,
"content_id": "2422fcce69423290149fe05f8e82f124c8c8656c",
"detected_licenses": [
"MIT"
],
"directory_id": "be071e6027a118240523b0730e9464a4bed3c706",
"extension": "py",
"fi... | 2.5 | stackv2 | import orm_mfk
from sqlalchemy.orm import sessionmaker
Session = sessionmaker(bind=orm_mfk.engine)
session = Session()
addr1 = orm_mfk.Address(street="adsfad")
addr2 = orm_mfk.Address(street="123")
addr3 = orm_mfk.Address(street="2321asd")
c1 = orm_mfk.Customer(name="jack", billing_address = addr1, shiping_address=... | 19 | 31 | 83 | 11 | 176 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_31e979744c6b56fc_ad0e1342", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
18
] | [
null
] | [
17
] | [
36
] | |
2024-11-18T23:10:51.215913+00:00 | 1,685,740,149,000 | 2abd392608ad4b777ca7e352be054ab76c858e02 | 3 | {
"blob_id": "2abd392608ad4b777ca7e352be054ab76c858e02",
"branch_name": "refs/heads/master",
"committer_date": 1685740149000,
"content_id": "5727ee2f1e05893c4b7b264696d54bf73018d344",
"detected_licenses": [
"MIT"
],
"directory_id": "a08f5ab93802c46ae653ca8e347aadfd9aed6f7c",
"extension": "py",
"fi... | 3.046875 | stackv2 | import json
import requests
import urllib3
from bs4 import BeautifulSoup
from requests_kerberos import OPTIONAL, HTTPKerberosAuth
from colorama import Fore, Style
COLOR_GREEN = Style.BRIGHT + Fore.GREEN
COLOR_RED = Style.BRIGHT + Fore.RED
def get_valid_sites(folder):
"""
Create sites.json in folder with v... | 75 | 36.2 | 119 | 16 | 714 | python | [{"finding_id": "codeql_py/request-without-cert-validation_0331b8720895680f_86677cb2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
30
] | [
34
] | [
20
] | [
82
] | |
2024-11-18T22:29:32.722211+00:00 | 1,615,985,124,000 | ce6973f78ba116c10ccdebd24021f237febfc777 | 2 | {
"blob_id": "ce6973f78ba116c10ccdebd24021f237febfc777",
"branch_name": "refs/heads/master",
"committer_date": 1615985124000,
"content_id": "cce40a669fc1977d58be46e8e67ceaed30f7f351",
"detected_licenses": [
"MIT"
],
"directory_id": "29f9d12964c8e0625678ab338af76a6cde2bc8fd",
"extension": "py",
"fi... | 2.421875 | stackv2 | import pymongo
import os
from dotenv import load_dotenv
# from datetime import datetime
load_dotenv()
DB_USER = os.getenv("MONGO_USER", default="OOPS")
DB_PASSWORD = os.getenv("MONGO_PASSWORD", default="OOPS")
CLUSTER_NAME = os.getenv("MONGO_CLUSTER_NAME", default="OOPS")
connection_uri = f"mongodb+srv://{DB_USER}:{... | 22 | 31.95 | 117 | 8 | 172 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_408625989908c429_59e8de72", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
14
] | [
null
] | [
15
] | [
29
] | |
2024-11-18T22:29:36.438299+00:00 | 1,497,293,759,000 | 87fa912d3dda48b0ef90e292197d5e726e508991 | 2 | {
"blob_id": "87fa912d3dda48b0ef90e292197d5e726e508991",
"branch_name": "refs/heads/master",
"committer_date": 1497293759000,
"content_id": "5812ec345c25d8c6170f3c7b740f25e79c2d8fea",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "02c6f2ff675fb681d26c75c59624cac93bb14b53",
"extension": "py"... | 2.453125 | stackv2 | # Copyright 2017 The TensorFlow Authors All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicab... | 198 | 37.95 | 80 | 17 | 1,866 | python | [{"finding_id": "codeql_py/tarslip_5d6c08536ae4ba92_45be6c76", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
61
] | [
null
] | [
5
] | [
35
] | |
2024-11-18T22:29:46.135325+00:00 | 1,594,395,569,000 | 6ca99ffe40b99afbfb702a1d2059f95d0792ba87 | 2 | {
"blob_id": "6ca99ffe40b99afbfb702a1d2059f95d0792ba87",
"branch_name": "refs/heads/master",
"committer_date": 1594395569000,
"content_id": "8041b8dd678c1995e9638622e89960e324635527",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5e1ca3c8eb770c40c58ee7a92691195351c31c23",
"extension": "py"... | 2.375 | stackv2 | #pylint: disable=bare-except
"""
Abstraction of the data handler. For test purposes, we can store data locally.
With a production system, we are likely to set the data to a remote server.
"""
from __future__ import absolute_import, division, print_function, unicode_literals
import sys
import logging
import json... | 228 | 37.91 | 150 | 17 | 1,984 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_97fd7700253a4471_8a712037", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
31
] | [
null
] | [
21
] | [
72
] | |
2024-11-18T22:29:51.872320+00:00 | 1,606,322,016,000 | 42f46b39a8da44a13007a14bbe6d097d57f0556a | 3 | {
"blob_id": "42f46b39a8da44a13007a14bbe6d097d57f0556a",
"branch_name": "refs/heads/main",
"committer_date": 1606322016000,
"content_id": "6e289cc215b81218c1c45c60997152fc10539ebd",
"detected_licenses": [
"MIT"
],
"directory_id": "3d83f61a832cac160cee2708e60f9f8e139f4b2f",
"extension": "py",
"file... | 2.828125 | stackv2 | from flask import Flask, request, abort, jsonify
app = Flask(__name__, static_url_path='', static_folder='staticpages')
books = [
{"id": 1, "Title": "Harry Potter", "Author": "JK", "Price": 1000},
{"id": 2, "Title": "some cook book", "Author": "Mr Angry Man", "Price": 2000},
{"id": 3, "Title": "Python made ... | 58 | 24.33 | 108 | 15 | 432 | python | [{"finding_id": "codeql_py/flask-debug_8f936a469c46265e_202eeceb", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a ... | [
58,
42,
48,
54
] | [
null,
null,
null,
null
] | [
5,
12,
12,
12
] | [
24,
16,
49,
49
] | |
2024-11-18T21:33:30.318353+00:00 | 1,614,579,126,000 | a058753cabb729b06d53b7eff9aa2ffa43dffbbc | 3 | {
"blob_id": "a058753cabb729b06d53b7eff9aa2ffa43dffbbc",
"branch_name": "refs/heads/main",
"committer_date": 1614579126000,
"content_id": "9a2036e86f91923ab51aba6c2a1f0b8d65c85de1",
"detected_licenses": [
"MIT"
],
"directory_id": "7485d8efbe16a51f13652a9aacefc19a68ebedd1",
"extension": "py",
"file... | 2.671875 | stackv2 | import requests
import json
import tkinter as tk
import qrcode
import os
url = 'http://passport.bilibili.com/qrcode/getLoginUrl'
url2= 'http://passport.bilibili.com/qrcode/getLoginInfo'
#link = input('输入哔哩哔哩url')
#link = str(link)
# json 转get url得参数
def jsonDataToUrlParams(params_data):
url_str = ''
nums = 0
... | 81 | 26.68 | 99 | 17 | 701 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4f8cc437d5357def_a7dc5065", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
35
] | [
null
] | [
7
] | [
33
] | |
2024-11-18T21:33:34.251460+00:00 | 1,562,910,749,000 | 929be721404f6830b3c8d52d666f1a317ce2c934 | 2 | {
"blob_id": "929be721404f6830b3c8d52d666f1a317ce2c934",
"branch_name": "refs/heads/master",
"committer_date": 1562910749000,
"content_id": "b0c2c1793ae1d549483cc1835b33bbf7934d2977",
"detected_licenses": [
"MIT"
],
"directory_id": "0eb397c7843583457c7219a2a503053d41a22e78",
"extension": "py",
"fi... | 2.4375 | stackv2 | # -*- coding: utf-8 -*-
import base64
import hmac
import json
import urllib.parse
from collections import OrderedDict
from hashlib import sha1
import requests
import time
from . import generate_nonce, dict2qs, qs2dict
try:
from urllib import urlencode, quote
except ImportError:
from urllib.parse import urlen... | 249 | 36.49 | 120 | 19 | 2,020 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_91e95aa25848209b_e3bb7a89", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-295",
"CWE-295"
] | [
"py/clear-text-logging-sensitive-data",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
169,
150,
152
] | [
null,
null,
null
] | [
15,
21,
21
] | [
27,
110,
109
] | |
2024-11-18T23:15:48.583178+00:00 | 1,600,746,287,000 | aca1ac6980e8b8e9a041ca5fd3fd4c5b217fc5b0 | 3 | {
"blob_id": "aca1ac6980e8b8e9a041ca5fd3fd4c5b217fc5b0",
"branch_name": "refs/heads/master",
"committer_date": 1600746287000,
"content_id": "5bd66b2970a9e1a80823a13d7abde7caa2cd6f9f",
"detected_licenses": [
"MIT"
],
"directory_id": "3df4ca16bca9621a7e3c9d36fe8c762026b5491e",
"extension": "py",
"fi... | 3.125 | stackv2 | from flask import Flask, render_template, request, send_file
app = Flask(__name__)
@app.route('/')
def index():
"""
Function to render index.html when a request is made to "/".
"""
return render_template('index.html', title='Connect Your Neurons')
@app.route('/get_keras_model', methods=['POST'])
de... | 182 | 27.85 | 99 | 15 | 1,117 | python | [{"finding_id": "codeql_py/code-injection_6d9ebb46c5bc246f_619116ab", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-094"
] | [
"py/code-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1)."
] | [
22
] | [
null
] | [
40
] | [
49
] | |
2024-11-18T22:30:15.179207+00:00 | 1,541,671,468,000 | e4cc987476aa6b75fd1e0fe7ac1c6f4334349ef8 | 2 | {
"blob_id": "e4cc987476aa6b75fd1e0fe7ac1c6f4334349ef8",
"branch_name": "refs/heads/master",
"committer_date": 1541671468000,
"content_id": "53ba45173409137767ffc6d9906ff3d1e550f02d",
"detected_licenses": [
"MIT"
],
"directory_id": "8b1b1a9d8ed82d9fca94a6b311b57c9b5a736f91",
"extension": "py",
"fi... | 2.40625 | stackv2 | import glob, json
import hashlib
from ethereum.utils import privtoaddr, checksum_encode
address = {}
dicts = glob.glob('./dicts/*.txt')
passwords = set()
for d in dicts:
with open(d, 'r') as f:
data = f.read().strip().split('\n')
for d in data:
passwords.add(d.strip())
for p in passwords:
pk = hashlib.sha25... | 37 | 24.27 | 54 | 14 | 303 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_10a3fb6fcf9cc05a_35a7fadc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
18,
24,
31
] | [
null,
null,
null
] | [
22,
22,
19
] | [
32,
32,
29
] | |
2024-11-18T22:30:25.759904+00:00 | 1,691,066,984,000 | 1a1a0926b5fd7fc8faaf0c3edeb31f33611091e1 | 2 | {
"blob_id": "1a1a0926b5fd7fc8faaf0c3edeb31f33611091e1",
"branch_name": "refs/heads/master",
"committer_date": 1691072219000,
"content_id": "a5b76129cb52de9c711b0f1a01cb0e773f830232",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "30f01434a60aecb8e01d1544f2ac697198d3d403",
"extension": "p... | 2.375 | stackv2 | import os
import errno
import shlex
import random
import socket
import tempfile
import yaml
import time
import shutil
import subprocess
def check_port(port, rais=True):
try:
sock = socket.create_connection(("localhost", port))
except socket.error:
return True
if rais:
raise Runtime... | 272 | 29.56 | 114 | 18 | 1,894 | python | [{"finding_id": "codeql_py/overly-permissive-file_773b4feaf6c1b1ac_f8302c15", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
248
] | [
null
] | [
13
] | [
45
] | |
2024-11-18T22:44:42.930104+00:00 | 1,537,954,144,000 | fd61bdb3f2db97b8633f00ffe7d5f74f43826c94 | 2 | {
"blob_id": "fd61bdb3f2db97b8633f00ffe7d5f74f43826c94",
"branch_name": "refs/heads/master",
"committer_date": 1537954144000,
"content_id": "8810876a222e4cbfff168be0aa4ae20a5aadb188",
"detected_licenses": [
"MIT"
],
"directory_id": "5dfa7d688bec2ad6bac08343584e94101474369d",
"extension": "py",
"fi... | 2.4375 | stackv2 | # !/usr/bin/python
# -*- coding: utf-8 -*-
""" Created by andresilva on 2/19/16"""
from flask import redirect, render_template, request, url_for, Blueprint
from flask_login import (login_user, login_required, logout_user,
current_user)
from flask_bcrypt import check_password_hash
import proje... | 56 | 33.8 | 79 | 19 | 406 | python | [{"finding_id": "codeql_py/url-redirection_b1f05a560ad987c2_45dea41e", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
31,
45
] | [
null,
null
] | [
25,
33
] | [
70,
78
] | |
2024-11-18T23:36:47.051233+00:00 | 1,659,540,632,000 | 0c4300ecab7bc3039a69575c8bbba7c171b84647 | 2 | {
"blob_id": "0c4300ecab7bc3039a69575c8bbba7c171b84647",
"branch_name": "refs/heads/master",
"committer_date": 1659540632000,
"content_id": "7819fd6e9b1cf68e3f534ae7c04a207700428a48",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "76737a79d8b27685d3b54523ddba237156deb348",
"extension": "py"... | 2.328125 | stackv2 | import json
from django.conf import settings
from django.http import JsonResponse
from rest_framework.decorators import api_view
from rest_framework.views import APIView
from rest_framework.response import Response
from rest_framework import status
from docs.version import __version__
from my_api.context_processors i... | 130 | 31.06 | 88 | 15 | 962 | python | [{"finding_id": "codeql_py/path-injection_25ba074ec36083e6_26a9e59b", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
74
] | [
null
] | [
19
] | [
63
] | |
2024-11-18T23:36:48.024066+00:00 | 1,520,609,332,000 | b37dd3fa0ecef2e38a055b9694501073e50a303f | 4 | {
"blob_id": "b37dd3fa0ecef2e38a055b9694501073e50a303f",
"branch_name": "refs/heads/master",
"committer_date": 1520609332000,
"content_id": "ab169c8cfdc2ccc9244dce650f40ac2e12e21337",
"detected_licenses": [
"MIT"
],
"directory_id": "1a3cd8b3fabf855ddf5986c7d3ce627075210afd",
"extension": "py",
"fi... | 3.65625 | stackv2 | # -*- coding: utf-8 -*-
"""Main module."""
import sys
import re
import urllib.request
import time
class LED_Grid():
'''Class defined for the LED board'''
def __init__ (self,L):
self.grid = [[False]*L for _ in range(L)]
self.size=L
# this function turns a rectangle of light, topleft LED to btm... | 101 | 29.27 | 128 | 20 | 916 | python | [{"finding_id": "codeql_py/overly-large-range_271370b4e50f5753_3f0b9504", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
47
] | [
null
] | [
57
] | [
60
] | |
2024-11-18T21:14:09.325528+00:00 | 1,459,415,277,000 | 1d107819a5dce2b001550e8f0f0a4a99ea2af971 | 3 | {
"blob_id": "1d107819a5dce2b001550e8f0f0a4a99ea2af971",
"branch_name": "refs/heads/master",
"committer_date": 1459415277000,
"content_id": "48d506f1ddbd4fe5aaabbd0101fd31a547f64e69",
"detected_licenses": [
"MIT"
],
"directory_id": "18e0e96e187805994474e19b3a6f88bf03278cf4",
"extension": "py",
"fi... | 2.59375 | stackv2 | from rest_framework import serializers
from voluptuous import Schema, MultipleInvalid, Invalid
class SchemaValidator:
"""
see also:
- https://github.com/alecthomas/voluptuous
- http://www.django-rest-framework.org/api-guide/validators/#writing-custom-validators
"""
def __init__(self, *args,... | 19 | 32.05 | 92 | 14 | 134 | python | [{"finding_id": "codeql_py/stack-trace-exposure_b89e3a1a61534c77_c58fcc09", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
17,
19
] | [
null,
null
] | [
47,
47
] | [
53,
53
] | |
2024-11-18T21:14:13.657719+00:00 | 1,632,257,371,000 | de7d90c46bff2addda4296b77754dda89ffec857 | 3 | {
"blob_id": "de7d90c46bff2addda4296b77754dda89ffec857",
"branch_name": "refs/heads/main",
"committer_date": 1632257371000,
"content_id": "99502fd9f17ee657ec2beb7361ba0435e27032b6",
"detected_licenses": [
"MIT"
],
"directory_id": "ceb759ad940a4257793de8c6223036b16761d5c8",
"extension": "py",
"file... | 2.984375 | stackv2 | import calendar
import locale
import webbrowser
import argparse
from typing import Dict, Iterable
from datetime import datetime, date, timedelta
from dateutil.relativedelta import relativedelta
from jinja2 import Template
def get_next_sunday_date(input_date: date) -> date:
"""
Returns the date of the next sund... | 128 | 35.02 | 138 | 14 | 1,127 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e97ee122e758b321_f611a3fc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
94
] | [
null
] | [
9
] | [
31
] | |
2024-11-18T21:57:27.249419+00:00 | 1,557,057,226,000 | 1a9d9eef1784c6c4f7b57a38906f3ee7c2e2e121 | 3 | {
"blob_id": "1a9d9eef1784c6c4f7b57a38906f3ee7c2e2e121",
"branch_name": "refs/heads/master",
"committer_date": 1557057226000,
"content_id": "ce7795e24b91f364688b6eb4677697a48242e6a5",
"detected_licenses": [],
"directory_id": "45de13a618813455a3ea1e65c5dd31066b311cd7",
"extension": "py",
"filename": "htm... | 2.75 | stackv2 | # #-*- coding: utf-8-*-
# # Source:https://github.com/Show-Me-the-Code/show-me-the-code
# # Author:Burness Duan
# # Date:2014-12-28
# # Python 2.7
from HTMLParser import HTMLParser
from re import sub
from sys import stderr
from traceback import print_exc
import urllib2
class _DeHTMLParser(HTMLParser):
def __ini... | 58 | 24.72 | 64 | 15 | 422 | python | [{"finding_id": "codeql_py/bad-tag-filter_daab8e7cfae8f9f0_a6925f8a", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match upper case <SCRIPT> tags."
] | [
55
] | [
null
] | [
22
] | [
44
] | |
2024-11-18T21:57:28.879141+00:00 | 1,632,880,075,000 | 146f91548ba2671e45dd99414d547031e8668d69 | 3 | {
"blob_id": "146f91548ba2671e45dd99414d547031e8668d69",
"branch_name": "refs/heads/master",
"committer_date": 1632880075000,
"content_id": "701aca7ea2b8c86e93b641bbee0bb1d86cb5559f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "388750f05c5a1c8f26ae38a29587f8be9569b9c1",
"extension": "py"... | 2.6875 | stackv2 | #!/usr/bin/env python
import jinja2
import os
import sys
import yaml
TEMPLATES_DIRECTORY = "src/deployment_templates"
DEPLOYMENTS_DIRECTORY = "deployments"
def usage():
print "Converts single user data file into a current"
print "deployment configuration under the %s/ directory." % (
DEPLOYMENTS_DIR... | 82 | 28.34 | 90 | 12 | 517 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_031b425296bf286e_ebf06005", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
58
] | [
60
] | [
16
] | [
65
] | |
2024-11-18T21:57:50.624658+00:00 | 1,407,586,396,000 | 45f29c014fa0acf9ff09dd3a5b2d40e9ea049d52 | 2 | {
"blob_id": "45f29c014fa0acf9ff09dd3a5b2d40e9ea049d52",
"branch_name": "refs/heads/master",
"committer_date": 1407586396000,
"content_id": "ce9f9004187ad9453e5c3457b4f6fb4e6ef92e47",
"detected_licenses": [
"MIT"
],
"directory_id": "8e438847008fac75878d3e8e34ba7ae10178ec40",
"extension": "py",
"fi... | 2.421875 | stackv2 | # -*- coding: utf-8 -*-
import requests
from requests_oauthlib import OAuth1
from urlparse import parse_qs
import logging
log = logging.getLogger(__name__)
from dgsauth.settings import USER_AGENT_STRING
from dgsauth.settings import API_KEY
from dgsauth.settings import API_SECRET
from dgsauth.settings import API_ACCES... | 179 | 31.37 | 125 | 15 | 1,225 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3edef54debed8e11_0b2232d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (sec... | [
55,
56,
58,
81,
137
] | [
null,
null,
null,
null,
138
] | [
19,
19,
19,
22,
22
] | [
42,
48,
54,
84,
53
] | |
2024-11-18T21:57:59.763635+00:00 | 1,594,772,042,000 | dd7c699f2285ea30a1ae4362c57a53a4b47af5b6 | 3 | {
"blob_id": "dd7c699f2285ea30a1ae4362c57a53a4b47af5b6",
"branch_name": "refs/heads/master",
"committer_date": 1594772042000,
"content_id": "de1fc18ee141f11444bbba2be3d988b4c139cee5",
"detected_licenses": [
"MIT"
],
"directory_id": "4d86100281031513ea24cc98dcaf16183fb49671",
"extension": "py",
"fi... | 2.984375 | stackv2 | #importing required libraries
import jinja2
cancel = False
device_list= []
#asking the user to enter the devices ips and credentials and creating a device list from user input
while (True):
name = input ("Enter the device name : ")
ip_address = [str(i) for i in input("enter the device ip address ( e.g: 1.1.... | 55 | 34.07 | 147 | 13 | 513 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_af5792a543314197_8fa2cfc8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
50
] | [
null
] | [
16
] | [
41
] | |
2024-11-18T21:58:26.169626+00:00 | 1,572,848,595,000 | e0993028b25777ac6370413a6a69ace29d14c979 | 3 | {
"blob_id": "e0993028b25777ac6370413a6a69ace29d14c979",
"branch_name": "refs/heads/master",
"committer_date": 1572848595000,
"content_id": "fc0cb2a3a3fff05c33d4e01dbfafa7ef38092dc5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0941c0509a21bfda2a5e69eb05fe7f5436812b00",
"extension": "py"... | 3.4375 | stackv2 | # coding:utf-8
from flask import Flask,redirect, url_for
from werkzeug.routing import BaseConverter
app = Flask(__name__)
# 这种语法叫做转换器(就是按照你指明的类型,把参数进行转换)
# 127.0.0.1:5000/goods/123
# @app.route(r'/goods/<int:goods_id>')
@app.route(r'/goods/<goods_id>') # 不加转换器类型,默认是普通的字符串规则(除了/的字符)
# 比如这样子是访问不到的,http://192.168.205... | 88 | 27.58 | 88 | 12 | 1,061 | python | [{"finding_id": "codeql_py/flask-debug_e9aeacffd4346bf7_ebcd7410", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
88,
15,
69
] | [
null,
null,
null
] | [
5,
12,
12
] | [
59,
45,
37
] | |
2024-11-18T21:58:37.337826+00:00 | 1,490,985,752,000 | c330e9b26dc29a758b2cfaa87d125cd4117911ad | 3 | {
"blob_id": "c330e9b26dc29a758b2cfaa87d125cd4117911ad",
"branch_name": "refs/heads/master",
"committer_date": 1490985752000,
"content_id": "27f940b166620f3a7cb4e0c7069c07ccc8b660ba",
"detected_licenses": [
"MIT"
],
"directory_id": "96e3dbb858f9615d7770406cc087d242c305189e",
"extension": "py",
"fi... | 3.203125 | stackv2 | # Hashing
import hashlib
import hmac
# Salting
import string
import random
def create_salt(length=32):
return ''.join(random.SystemRandom().choice(string.ascii_letters + string.digits) for _ in range(length))
def hash_it(password, salt=None, salt_it=True):
if salt_it and not salt:
salt = create_salt()... | 20 | 27.4 | 109 | 14 | 140 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_8fc0ebfe60ab3d94_54986a1d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
15,
17
] | [
null,
null
] | [
40,
31
] | [
53,
44
] | |
2024-11-18T22:10:53.449138+00:00 | 1,621,796,792,000 | b78bacfccb285261448c20bbde7a5864717b916a | 3 | {
"blob_id": "b78bacfccb285261448c20bbde7a5864717b916a",
"branch_name": "refs/heads/master",
"committer_date": 1621796792000,
"content_id": "0ef882827475c43c4fb7503fa7f3db7b633e036c",
"detected_licenses": [
"MIT"
],
"directory_id": "b43990d0a4da55ecf5a1203f9eb5df9b875ff48f",
"extension": "py",
"fi... | 2.59375 | stackv2 | __author__ = "kwhite"
import calendar
import datetime as dt
import random
import re
import time
from datetime import date
from decimal import Decimal
from math import ceil
import pandas as pd
from bs4 import BeautifulSoup
from dateutil.parser import parse
from functional import seq
from selenium import webdriver
from... | 157 | 40.92 | 160 | 28 | 1,663 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e37d84fabbc2b089_ee29c76a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
116
] | [
null
] | [
16
] | [
32
] | |
2024-11-18T23:10:58.896539+00:00 | 1,528,941,782,000 | c97664501bd26cd02fc796ad861e7ab3d9a6afa0 | 2 | {
"blob_id": "c97664501bd26cd02fc796ad861e7ab3d9a6afa0",
"branch_name": "refs/heads/master",
"committer_date": 1528941782000,
"content_id": "d9c1043bd67fb7a3e5727a0b6d0a075fabc89e78",
"detected_licenses": [
"MIT"
],
"directory_id": "05d492f1a83c1f38cca6f51394119fcd8b9df64b",
"extension": "py",
"fi... | 2.34375 | stackv2 | #coding:utf-8
#@auth:yunsle
#@description:3cloud日志可视化平台
from pymongo import MongoClient
from flask import *
import json
import datetime
from bson import ObjectId
# gevent
from gevent import monkey
from gevent.pywsgi import WSGIServer
monkey.patch_all()
#geoip
import geoip2.database
geo_reader = geoip2.database.Reader(... | 104 | 23.57 | 68 | 18 | 683 | python | [{"finding_id": "codeql_py/stack-trace-exposure_70e99800aea5bbb9_d6023944", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-117"
] | [
"py/stack-trace-exposure",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This log entry depends on a [user-provided value](1)."
] | [
55,
51
] | [
null,
null
] | [
16,
25
] | [
22,
29
] | |
2024-11-18T23:10:59.390377+00:00 | 1,560,705,747,000 | bff987113f4c0215978b24952e3ec7b764d6ba45 | 3 | {
"blob_id": "bff987113f4c0215978b24952e3ec7b764d6ba45",
"branch_name": "refs/heads/master",
"committer_date": 1560705747000,
"content_id": "6331315511e0e287e83f95346106d4ed98e218fd",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "1e1aca2fb4e5114337bcc7b5aa27a22585bab191",
"extension": "p... | 2.65625 | stackv2 | # standard library
import os
import shutil
from typing import Dict
# third party
import click
from jinja2 import FileSystemLoader, Environment
from rewardify.env import EnvironmentConfig
from rewardify.main import Rewardify
# local
from rewardifycli.__internal.util import Singleton
# ######################
# PRO... | 285 | 28.76 | 119 | 15 | 1,973 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_55f11fe542510546_68224357", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-079"
] | [
"py/clear-text-storage-sensitive-data",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
245,
50
] | [
null,
null
] | [
24,
28
] | [
31,
59
] | |
2024-11-18T22:05:56.448124+00:00 | 1,552,232,808,000 | 25854fb40e0458e6ec8cd6db31dfce83093c0940 | 4 | {
"blob_id": "25854fb40e0458e6ec8cd6db31dfce83093c0940",
"branch_name": "refs/heads/master",
"committer_date": 1552232808000,
"content_id": "f13f1ae0295aba7aa55310fb08eba2eb3f01cef1",
"detected_licenses": [
"MIT"
],
"directory_id": "0fefd630aa4b500a1a218f5f12d351dfeb79d4a7",
"extension": "py",
"fi... | 4.03125 | stackv2 | from abc import ABC, abstractmethod
class Animal(ABC):
def __init__(self, name=None, age=None, gender=None):
self.name = name
self.age = age
self.gender = gender
@abstractmethod
def produce_sound(self):
pass
@property
def name(self):
return self.__name
... | 108 | 19.9 | 60 | 13 | 570 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aec08dc7a8241ca5_67eba66b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
105
] | [
null
] | [
15
] | [
60
] | |
2024-11-18T22:35:53.952615+00:00 | 1,487,544,095,000 | 6193e80e7adc60a11bab46f7490e1268971b3780 | 3 | {
"blob_id": "6193e80e7adc60a11bab46f7490e1268971b3780",
"branch_name": "refs/heads/master",
"committer_date": 1487544095000,
"content_id": "2290c26b89200b85b75ef920df32f8ab440d1710",
"detected_licenses": [
"MIT"
],
"directory_id": "81bcc901933fee719dab95145751d551b321a4a8",
"extension": "py",
"fi... | 2.65625 | stackv2 | #! /usr/bin/env python
from notebook.auth import passwd
from notebook.auth.security import passwd_check
from getpass import getpass
try:
import argparse
argparse_imported = 1
except Exception:
import sys
argparse_imported = 0
def main(argv):
if argparse_imported == 0:
if len(argv) == 1:
... | 74 | 32.73 | 117 | 14 | 573 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d61d9747fa232623_d1589bce", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p... | [
29,
31
] | [
null,
38
] | [
43,
9
] | [
45,
99
] | |
2024-11-18T22:35:56.265999+00:00 | 1,601,643,163,000 | f005ec5ed2e02cb963274ab1822a8accbf347478 | 2 | {
"blob_id": "f005ec5ed2e02cb963274ab1822a8accbf347478",
"branch_name": "refs/heads/main",
"committer_date": 1601643163000,
"content_id": "266a1547509a5cb6d1a32e3e18797899db69474d",
"detected_licenses": [
"MIT"
],
"directory_id": "a6caffa62e5398c93b50cabbc3226e181e33ea19",
"extension": "py",
"file... | 2.453125 | stackv2 | import asyncio
import aiohttp
import multidict
import ujson
class ApiOperations(object):
def __init__(self):
self.session = None
self.default_header = multidict.CIMultiDict({})
self.loop = asyncio.get_event_loop()
self.loop.run_until_complete(self.open_session())
async def op... | 54 | 34.72 | 109 | 19 | 410 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c6fd50e001e8db9b_c0ebf0ec", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
21
] | [
null
] | [
20
] | [
84
] | |
2024-11-18T22:49:02.239867+00:00 | 1,548,703,629,000 | 01d3934e84aabac3d4ffd344cd5e5370f8cb8c0e | 3 | {
"blob_id": "01d3934e84aabac3d4ffd344cd5e5370f8cb8c0e",
"branch_name": "refs/heads/master",
"committer_date": 1548703629000,
"content_id": "77586a42965453780ff979cd999c6f9f8daff189",
"detected_licenses": [
"MIT"
],
"directory_id": "c42a0ec4205e6de011c1af366776f44a7d57cb21",
"extension": "py",
"fi... | 2.71875 | stackv2 | import hashlib
import hmac
import os
import requests
import time
from flask import abort, Flask, jsonify, request
app = Flask(__name__)
def is_request_valid(request):
slack_signing_secret = os.environ['SLACK_SIGNING_SECRET']
timestamp = request.headers['X-Slack-Request-Timestamp']
slack_signature = req... | 61 | 25.93 | 79 | 15 | 406 | python | [{"finding_id": "codeql_py/partial-ssrf_54303dd6a2c1111a_5392ec6a", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
54
] | [
null
] | [
17
] | [
34
] | |
2024-11-18T23:25:53.876960+00:00 | 1,439,911,824,000 | c9fd2b5bbd125cfc28c69be334aeb543d92c6295 | 3 | {
"blob_id": "c9fd2b5bbd125cfc28c69be334aeb543d92c6295",
"branch_name": "refs/heads/master",
"committer_date": 1439911824000,
"content_id": "811a364ca6dec6a60dc26eb4e6189c0a9b126fe4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ebdad4901768dcf731fba882d3bbd32e4f117988",
"extension": "py"... | 2.5625 | stackv2 | #mitm.py
# A demonstration of how http response cache documents can be
# created in couchbase for later sync with mobile devices
from flask import jsonify, request
from flask import current_app
from flask import g
from . import blueprint
from pprint import pprint
from peewee import *
import requests
import hashlib
imp... | 106 | 28.24 | 96 | 21 | 752 | python | [{"finding_id": "codeql_py/partial-ssrf_2e7a027d66c0b344_358fe4a0", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
61
] | [
null
] | [
14
] | [
42
] | |
2024-11-18T23:26:03.449386+00:00 | 1,504,564,337,000 | 7f8cd3091c1984342bd373f81c9119c73c4fa5b1 | 2 | {
"blob_id": "7f8cd3091c1984342bd373f81c9119c73c4fa5b1",
"branch_name": "refs/heads/master",
"committer_date": 1504564337000,
"content_id": "aef182fab8665bcc6d60def9b2940910597fe52c",
"detected_licenses": [
"MIT"
],
"directory_id": "93026aabe241528299214f5eee565babdb41d786",
"extension": "py",
"fi... | 2.484375 | stackv2 | import importlib, json, logging, os
import gevent
import GlobalStore
from IrcMessage import IrcMessage
class CommandHandler:
commands = {}
commandFunctions = {}
apikeys = {}
def __init__(self):
self.logger = logging.getLogger("DideRobot")
GlobalStore.commandhandler = self
self.loadApiKeys()
def loadAp... | 185 | 40.04 | 157 | 21 | 1,754 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_89f0e96587652286_c2249021", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
33
] | [
null
] | [
18
] | [
68
] | |
2024-11-18T23:26:04.864750+00:00 | 1,587,087,425,000 | 595b04fb3f785890448eb51d0a98b0335874a8ff | 3 | {
"blob_id": "595b04fb3f785890448eb51d0a98b0335874a8ff",
"branch_name": "refs/heads/master",
"committer_date": 1587087425000,
"content_id": "b0a3dc09a57f5d4c3f562719cc7eba8281b71451",
"detected_licenses": [
"MIT"
],
"directory_id": "572634f525d7f46b17b3a266dabb1aa0d4e44834",
"extension": "py",
"fi... | 2.828125 | stackv2 | import hashlib
import json
import requests
import sys
from time import time
from uuid import uuid4
from flask import Flask, jsonify, request, render_template
# Instantiate our Node
app = Flask(__name__)
# Generate a globally unique address for this node
node_identifier = str(uuid4()).replace('-', '')
# get the cur... | 73 | 26.49 | 81 | 22 | 446 | python | [{"finding_id": "codeql_py/reflective-xss_0d0441bd9c490531_b842925a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
67
] | [
null
] | [
12
] | [
30
] | |
2024-11-18T22:27:36.097237+00:00 | 1,692,877,319,000 | 16dd4ea96c0515fb61df3797cce3662b412aedf9 | 3 | {
"blob_id": "16dd4ea96c0515fb61df3797cce3662b412aedf9",
"branch_name": "refs/heads/master",
"committer_date": 1692877319000,
"content_id": "70dc8c2a9ea8f58ddb89f485fa2712fd3c2057dd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2c7d0bb7332d4006b1d9c5768ee86e2838ebf3a2",
"extension": "py"... | 2.609375 | stackv2 | #!/usr/bin/env python3
"""This script is used by the "complete" hook test, to act as a dummy job being started
in a Deployment that belongs to a Krake Application.
"""
import os.path
import requests
endpoint_env = "KRAKE_COMPLETE_URL"
token_env = "KRAKE_COMPLETE_TOKEN"
default_ca_bundle = "/etc/krake_complete_cert/ca-... | 46 | 31.3 | 87 | 12 | 367 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e706a355ca7c4acb_a2169fc1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
38
] | [
40
] | [
16
] | [
6
] | |
2024-11-18T22:27:37.951201+00:00 | 1,608,905,859,000 | 6b04d29e9d1e81008f486ae561ce7b751b8966d8 | 3 | {
"blob_id": "6b04d29e9d1e81008f486ae561ce7b751b8966d8",
"branch_name": "refs/heads/main",
"committer_date": 1608905859000,
"content_id": "9d50bf2aa934518d82e3864d2f0eb0a3395dcde7",
"detected_licenses": [
"MIT"
],
"directory_id": "101a6b35c6603c1588d7ff95f8e81839fbedf618",
"extension": "py",
"file... | 2.59375 | stackv2 | import paramiko
import logging
import os
from dotenv import load_dotenv
from telegram import Update, Bot
from telegram.ext import Updater, CommandHandler, MessageHandler, Filters, CallbackContext
load_dotenv()
TELEGRAM_TOKEN = os.getenv('TELEGRAM_TOKEN')
TELEGRAM_CHAT_ID = os.getenv('TELEGRAM_CHAT_ID')
HOST = os.get... | 83 | 29.96 | 90 | 15 | 585 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_97517d0807f12cd9_d7104453", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
25
] | [
null
] | [
5
] | [
62
] | |
2024-11-18T22:27:43.166342+00:00 | 1,555,101,227,000 | 4d37bb0738800cda93eef202797d86cc71463720 | 2 | {
"blob_id": "4d37bb0738800cda93eef202797d86cc71463720",
"branch_name": "refs/heads/master",
"committer_date": 1555101227000,
"content_id": "ca157f32dabe630a5d2ef916ab85cbb5fde6d4f4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "99a1ed9a97d8a4df63105542fcd27be09f4f303e",
"extension": "py"... | 2.484375 | stackv2 | import logging
from flask import Flask, request as req
from app.controllers import pages
from app.classes.database_container import DatabaseContainer
from app.common_definitions.common_paths import PATH_TO_DATABASE
from app.database import sqlite_script
# Create and fill database with values - closes connection to
... | 35 | 27.71 | 110 | 14 | 195 | python | [{"finding_id": "codeql_py/log-injection_492e4d31d7d1c40f_0f670ab0", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
30
] | [
31
] | [
25
] | [
49
] | |
2024-11-18T22:39:21.962212+00:00 | 1,516,849,520,000 | aa4689c97646c665a032778c5ef5a6e0c2fe43dc | 2 | {
"blob_id": "aa4689c97646c665a032778c5ef5a6e0c2fe43dc",
"branch_name": "refs/heads/master",
"committer_date": 1516849520000,
"content_id": "5752bf31c4ffc93fcd898898821a36057656a4cd",
"detected_licenses": [
"MIT"
],
"directory_id": "c403249fe3b01c4c25e745dadc20ce96faf26dec",
"extension": "py",
"fi... | 2.421875 | stackv2 | from flask import Flask
from flask import render_template
app = Flask(__name__)
@app.route('/')
def index():
return render_template('index.html')
@app.route('/welcome')
def sign_in():
return 'SIGN IN'
@app.route('/who-are-you')
def sign_up():
return 'SIGN UP'
@app.route('/<username>')
def user_profile(... | 24 | 18.5 | 40 | 9 | 110 | python | [{"finding_id": "codeql_py/reflective-xss_ffecd20b621f5ee1_85cb95d3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
20,
24
] | [
null,
null
] | [
12,
12
] | [
37,
39
] | |
2024-11-18T22:15:00.722503+00:00 | 1,601,482,381,000 | 20d04e0551a45bc03a40cf466428133f6550becb | 3 | {
"blob_id": "20d04e0551a45bc03a40cf466428133f6550becb",
"branch_name": "refs/heads/master",
"committer_date": 1601482381000,
"content_id": "ad56bee52a2157fcd0bb37d4eab931a7860222fc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9456bfd645a151922bfde26aabb346a86ca0a3b3",
"extension": "py"... | 2.765625 | stackv2 | #!/usr/bin/env python3.5
# import requests library
import requests
#import json library
import json
# put the ip address or dns of your apic-em controller in this url
#url = 'https://sandboxapic.cisco.com/api/v1/ticket'
url='https://devnetapi.cisco.com/sandbox/apic_em/api/v1/ticket'
#the username and password to ... | 26 | 25.23 | 83 | 9 | 170 | python | [{"finding_id": "codeql_py/request-without-cert-validation_52d6e42440cac90c_56dc130b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
23
] | [
null
] | [
11
] | [
84
] | |
2024-11-18T22:55:37.871483+00:00 | 1,522,339,171,000 | e3eeb59525d7afa2358933783bb81983803eec05 | 3 | {
"blob_id": "e3eeb59525d7afa2358933783bb81983803eec05",
"branch_name": "refs/heads/master",
"committer_date": 1522339171000,
"content_id": "d476a1127a1cee0191d6e89d05871332707a5cef",
"detected_licenses": [
"MIT"
],
"directory_id": "98a8503ea1ec98f8bb450d647c9517529e7f722d",
"extension": "py",
"fi... | 2.640625 | stackv2 | ''''
adapted from: http://flask.pocoo.org/docs/0.12/patterns/fileuploads/
'''
import os
from flask import Flask, request, redirect, flash, url_for, send_from_directory, render_template
from werkzeug.utils import secure_filename
from flask.ext.mobility import Mobility
from flask.ext.mobility.decorators import mobil... | 54 | 31.3 | 96 | 16 | 363 | python | [{"finding_id": "codeql_py/url-redirection_1cc0619d71dc2e78_337fa201", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
34,
40
] | [
null,
null
] | [
29,
29
] | [
40,
40
] | |
2024-11-18T22:55:40.456577+00:00 | 1,469,391,312,000 | b88aa2821d931fb7dba4e6508ab87e39461dc690 | 3 | {
"blob_id": "b88aa2821d931fb7dba4e6508ab87e39461dc690",
"branch_name": "refs/heads/master",
"committer_date": 1469391312000,
"content_id": "448bd314b8c75794690113c407d24f2e36e5ddf5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0cae906ef33539a6963abd26a7f40a3cd835574f",
"extension": "py"... | 2.6875 | stackv2 | from __future__ import print_function
import scipy.io as sio
from shutil import copyfile
import os
import urllib
import tarfile
import numpy as np
from collections import defaultdict
from collections import namedtuple
from PIL import Image
import matplotlib.image as mpimg
import random
BoundingBox = namedtuple('Bound... | 338 | 32.34 | 161 | 16 | 2,891 | python | [{"finding_id": "codeql_py/tarslip_ead52c8aaabe1b2c_4acec280", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
39
] | [
null
] | [
9
] | [
10
] | |
2024-11-18T23:55:44.370651+00:00 | 1,584,001,366,000 | fbb52b55c951a33e93f9b3aed3aa66f0c563069e | 3 | {
"blob_id": "fbb52b55c951a33e93f9b3aed3aa66f0c563069e",
"branch_name": "refs/heads/master",
"committer_date": 1584001366000,
"content_id": "8b37a5d70294b8101d23c67e4fd595858fd2e6bd",
"detected_licenses": [
"MIT"
],
"directory_id": "aeab5760b956fda37c515ac44138d4e0433ee65e",
"extension": "py",
"fi... | 2.5625 | stackv2 | #!/usr/bin/env python3
import logging
import logmatic
import os
import sys
from flask import Flask, request, jsonify, make_response
from flask_sqlalchemy import SQLAlchemy
from requestid import requestid, RequestIdFilter
log_level = getattr(logging, os.environ.get('APP_LOG_LEVEL', 'INFO'))
# Configure JSON filesyst... | 128 | 27.6 | 76 | 14 | 899 | python | [{"finding_id": "codeql_py/log-injection_6417b8bed8c94e3b_3087fdac", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 6 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).",
"This log entry depends o... | [
63,
66,
79,
92,
95,
109
] | [
null,
null,
null,
null,
null,
null
] | [
25,
25,
21,
25,
25,
25
] | [
76,
57,
56,
73,
57,
57
] | |
2024-11-18T22:56:19.315950+00:00 | 1,692,970,228,000 | abc688b5ec92175521ac209997e2472bbd8e756f | 3 | {
"blob_id": "abc688b5ec92175521ac209997e2472bbd8e756f",
"branch_name": "refs/heads/master",
"committer_date": 1692970228000,
"content_id": "a1511b92e88a3e20c3a1648c9269879179c59fe3",
"detected_licenses": [
"MIT"
],
"directory_id": "9468849850c7c2b2040835eb9496bfb716a98c21",
"extension": "py",
"fi... | 2.8125 | stackv2 | """
doc_graphviz.py
Creates the graphviz output used to visualize script dependencies.
This file relies on the schemas.yml to create the graphviz plots.
"""
import os
import cea.config
import cea.schemas
from jinja2 import Template
__author__ = "Jack Hawthorne"
__copyright__ = "Copyright 2018, Architecture and B... | 138 | 37.21 | 118 | 17 | 1,249 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_37f8856735f06f9f_f2f5a171", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
56,
131
] | [
null,
null
] | [
20,
16
] | [
61,
57
] | |
2024-11-18T23:18:13.988897+00:00 | 1,584,874,522,000 | a2b7f40953c5e44d1824f2e4f924bf02830890c7 | 3 | {
"blob_id": "a2b7f40953c5e44d1824f2e4f924bf02830890c7",
"branch_name": "refs/heads/master",
"committer_date": 1584874522000,
"content_id": "781c480e0b5f2ae8eec168d4a63d7c05d2f9d08f",
"detected_licenses": [
"MIT"
],
"directory_id": "0a5ca88fd282a46b0661f343ee44cf6bcbe73c22",
"extension": "py",
"fi... | 3 | stackv2 | #######################################################################
# Python script to convert DayOne exported JSON file with photos in
# separate markdown files and photo files in subfolders
#######################################################################
import json
import os
from shutil import copyfile
... | 174 | 41.59 | 117 | 17 | 1,686 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_3aacedce6a4404ad_d576fe4c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores ... | [
127,
129,
131,
133,
141,
144
] | [
null,
null,
null,
null,
null,
null
] | [
20,
20,
20,
20,
20,
20
] | [
51,
52,
51,
52,
51,
52
] | |
2024-11-19T00:07:14.408169+00:00 | 1,543,228,402,000 | ac1dec0de5fed340042f35999cb610b891e009ca | 2 | {
"blob_id": "ac1dec0de5fed340042f35999cb610b891e009ca",
"branch_name": "refs/heads/master",
"committer_date": 1543228402000,
"content_id": "1a9f866c5d29d5507ab9a718a8e50f4485795d1d",
"detected_licenses": [
"MIT"
],
"directory_id": "3e65228cfbf992b3baa76230384d4db6a573332b",
"extension": "py",
"fi... | 2.34375 | stackv2 | from paramiko.client import SSHClient, AutoAddPolicy
from paramiko.ssh_exception import AuthenticationException
from paramiko.rsakey import RSAKey
from apps.setting import Setting
from io import StringIO
def generate_ssh_key():
key_obj = StringIO()
key = RSAKey.generate(2048)
key.write_private_key(key_obj... | 82 | 28.85 | 104 | 15 | 561 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e0136e7f6ca61247_85be4325", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation",
"py/paramiko-missing-host-key-validation",
"py/paramiko-missing-host-key-validation"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
17,
36,
72
] | [
null,
null,
null
] | [
5,
5,
5
] | [
58,
58,
58
] | |
2024-11-19T00:07:16.258156+00:00 | 1,551,982,299,000 | 673bf87735f61c2409612eb8c013436cec08a4ee | 3 | {
"blob_id": "673bf87735f61c2409612eb8c013436cec08a4ee",
"branch_name": "refs/heads/master",
"committer_date": 1551982299000,
"content_id": "21d52ccfc51bdc73e7054ae228a2b8276f827c63",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ba2d5f77f6c0c5d5fb916e41aee25a777ec35567",
"extension": "py"... | 2.9375 | stackv2 | import datetime
import os
from jinja2 import FileSystemLoader, Environment
class Statistic:
def __init__(self, link, link_name):
self.link = link
self.link_name = link_name
link = ""
link_name = ""
class SubDirectory:
def __init__(self, directory, title):
self.directory = d... | 58 | 26.91 | 99 | 15 | 354 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_17b161c86b2e3fec_9282eae1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
55
] | [
null
] | [
15
] | [
46
] | |
2024-11-19T00:07:16.410534+00:00 | 1,452,017,179,000 | 1d6d369655ce6aa825446583939d655c09dacb46 | 2 | {
"blob_id": "1d6d369655ce6aa825446583939d655c09dacb46",
"branch_name": "refs/heads/master",
"committer_date": 1452017179000,
"content_id": "a3cf22a49840035d5853eeb9ae80e8400a920f40",
"detected_licenses": [
"Unlicense"
],
"directory_id": "dfa85cc243736da77ae15ae6ee14917b486c35aa",
"extension": "py",... | 2.40625 | stackv2 | from flask import Flask, render_template, request
from showmestuff import app
import requests
import json
@app.route("/bitcoin_balance", methods=["POST"])
def get_bitcoin_balance():
if request.method == 'POST':
response = {}
address = request.form['address']
# Get addres... | 52 | 34.85 | 111 | 20 | 378 | python | [{"finding_id": "codeql_py/partial-ssrf_2d7665a8508330bb_5f6c763d", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
17
] | [
null
] | [
22
] | [
112
] | |
2024-11-19T00:07:19.323390+00:00 | 1,619,544,512,000 | c0786d9b1c8b16af2cd3f3a17a39d3c1263d2d75 | 3 | {
"blob_id": "c0786d9b1c8b16af2cd3f3a17a39d3c1263d2d75",
"branch_name": "refs/heads/master",
"committer_date": 1619544512000,
"content_id": "a63a07ec70cefa78e2445a74384c0228dbc72189",
"detected_licenses": [
"MIT"
],
"directory_id": "9c6c7f2ece1bf86b65d2b519ffc61de06d72279a",
"extension": "py",
"fi... | 3.078125 | stackv2 | """ Module for user data accessing functions. """
import os
from hashlib import sha256
from sqlalchemy.orm.exc import NoResultFound
from models import User
from exceptions import SocketIOEventError
class LoginError(SocketIOEventError):
""" Thrown when an issue preventing a successful login occurs. """
ev... | 65 | 25.12 | 79 | 14 | 379 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_38d2aabd9567f2ca_bbc58200", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
39,
58
] | [
null,
null
] | [
21,
19
] | [
45,
63
] | |
2024-11-19T00:34:33.911468+00:00 | 1,513,048,135,000 | 74e5ab94e0c033f0e8dc6867cb82d2a3c26ed6f5 | 3 | {
"blob_id": "74e5ab94e0c033f0e8dc6867cb82d2a3c26ed6f5",
"branch_name": "refs/heads/master",
"committer_date": 1513048135000,
"content_id": "b0a6d5cbed0adbbec3be101b44d78391f152260e",
"detected_licenses": [
"MIT"
],
"directory_id": "d9968d26543b454ec3aa11b451acdcea4fb0ddb1",
"extension": "py",
"fi... | 3.328125 | stackv2 | import random
import logging
BIRTHDAY = 1
PEOPLE = 25
PARTYS = 100000
SAME_BIRTHDAYS = 0
LOG_FILENAME = 'test.log'
logging.basicConfig(filename=LOG_FILENAME,
level=logging.DEBUG)
if __name__ == "__main__":
print('~~~~~~~~~~~~~~~~~~~~~\n')
for i in range(PARTYS):
birthdays = [rando... | 29 | 26.59 | 88 | 12 | 230 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6c36cf9ac7b1f697_1a328c16", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
25
] | [
null
] | [
7
] | [
88
] | |
2024-11-19T00:34:36.141577+00:00 | 1,423,238,059,000 | 420cfb00cd4dbf32c56955237fa7d158d0f39cb2 | 2 | {
"blob_id": "420cfb00cd4dbf32c56955237fa7d158d0f39cb2",
"branch_name": "refs/heads/master",
"committer_date": 1423238059000,
"content_id": "4bf9f830defde9e3b6e1b199e1aac83ab57cda2b",
"detected_licenses": [
"MIT"
],
"directory_id": "8736f2b594b9cd04b0f88654af6689e6c1699095",
"extension": "py",
"fi... | 2.40625 | stackv2 | from flask import Flask
from flask import render_template
import subprocess
app = Flask(__name__)
@app.route("/")
def hello():
return render_template("index.html")
@app.route("/eject")
def eject():
try:
ret = subprocess.call(["eject"])
if ret == 0:
return "Eject!!"
else:
... | 35 | 19.77 | 46 | 13 | 176 | python | [{"finding_id": "codeql_py/stack-trace-exposure_f6adcba722075619_7b3d137e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
20,
31
] | [
null,
null
] | [
16,
16
] | [
22,
22
] | |
2024-11-18T23:28:30.006570+00:00 | 1,686,801,785,000 | e30f64f468cacafdd8b587481057b3d31aaa9973 | 3 | {
"blob_id": "e30f64f468cacafdd8b587481057b3d31aaa9973",
"branch_name": "refs/heads/main",
"committer_date": 1690296907000,
"content_id": "202ebced2cbed3a03a33f231ba3f99775944d941",
"detected_licenses": [
"BSD-3-Clause",
"Apache-2.0"
],
"directory_id": "1cf6fdb7076a2e23ce664d434ec5f0ba08f8f84a",
... | 2.703125 | stackv2 | """
Utility to autogenerate generic LL HAL headers.
Usage::
python3 genllheaders.py [-p /path/to/HAL] [-o /path/to/output_dir]
Copyright (c) 2020 Teslabs Engineering S.L.
SPDX-License-Identifier: Apache-2.0
"""
import argparse
import logging
from pathlib import Path
import re
import shutil
from jinja2 import ... | 126 | 24.78 | 81 | 15 | 781 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_50236830101e8393_3a2f819d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
85
] | [
87
] | [
11
] | [
6
] | |
2024-11-18T23:28:30.720753+00:00 | 1,305,045,004,000 | 6af36e5b9483e0787c20a8a7f4c8b77aec757c38 | 3 | {
"blob_id": "6af36e5b9483e0787c20a8a7f4c8b77aec757c38",
"branch_name": "refs/heads/master",
"committer_date": 1305045004000,
"content_id": "676b6c8d189c51836d55cc1390b97c64f2c701e5",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "849dd919b340b0daf8220dc57364522bd2e965d1",
"extension": "p... | 2.53125 | stackv2 |
import sys, time, os, cPickle, struct, zlib
import errno, fcntl
from cStringIO import StringIO
from disco.error import DataError
MB = 1024**2
MIN_DISK_SPACE = 1 * MB
MAX_RECORD_SIZE = 1 * MB
HUNK_SIZE = 1 * MB
CHUNK_SIZE = 64 * MB
# chunk size seems to be ~ half what it should be
class Chunker(object):... | 201 | 30.19 | 95 | 17 | 1,509 | python | [{"finding_id": "codeql_py/overly-permissive-file_3409a46b31e39453_b25a15cd", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in open sets file to world readable."
] | [
166
] | [
167
] | [
18
] | [
60
] | |
2024-11-18T23:28:36.136836+00:00 | 1,579,244,904,000 | b89ca134c40af80c3727fa6a4d754a46ece07c29 | 2 | {
"blob_id": "b89ca134c40af80c3727fa6a4d754a46ece07c29",
"branch_name": "refs/heads/master",
"committer_date": 1579244904000,
"content_id": "91c3dcd64ec29b039820b71f2a340d0b81210f2c",
"detected_licenses": [
"MIT"
],
"directory_id": "94f33eb0c5dbafac6c563057e441fe0b868108ad",
"extension": "py",
"fi... | 2.375 | stackv2 | import os
import numpy as np
import cv2
import sys
import os
import glob
from sklearn import svm
from scipy.stats import mode
#from sklearn.ensemble import RandomForestClassifier
#from sklearn.ensemble import AdaBoostClassifier
import time
'''
MIT License
Copyright (c) 2020 Somnath Saha
Permission is hereby granted,... | 437 | 29.97 | 118 | 23 | 3,065 | python | [{"finding_id": "codeql_py/url-redirection_780987f0c2d7590f_ff07591f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
143,
149
] | [
null,
null
] | [
29,
29
] | [
40,
40
] | |
2024-11-19T00:05:04.124068+00:00 | 1,671,138,217,000 | 373058509c3e2d6263ec7024b6b90447b4e07f55 | 3 | {
"blob_id": "373058509c3e2d6263ec7024b6b90447b4e07f55",
"branch_name": "refs/heads/main",
"committer_date": 1671138217000,
"content_id": "0c7b7a90d7f832733edf6a030d89ea9d45d1ba52",
"detected_licenses": [
"MIT"
],
"directory_id": "b9963ffb80aad7e057bc375edb85ac7ed5a837d0",
"extension": "py",
"file... | 2.890625 | stackv2 | from hashlib import md5
max_x = 3
max_y = 3
passcode = 'yjjvjgan'
passcode_len = len(passcode)
queue = [(passcode, 0, 0)]
been_here = {}
def visited(x, y, next):
if y not in been_here:
been_here[y] = {}
if x not in been_here[y]:
been_here[y][x] = {}
if next not in been_here[y][x]:
... | 49 | 20.04 | 96 | 16 | 332 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_36d5f4358ad4c570_21ddcc9c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
31,
34
] | [
null,
null
] | [
15,
55
] | [
38,
79
] | |
2024-11-19T01:11:37.212122+00:00 | 1,462,494,114,000 | bc6b62fc5e92ad13e54edc9f8c5ce67c2f502452 | 3 | {
"blob_id": "bc6b62fc5e92ad13e54edc9f8c5ce67c2f502452",
"branch_name": "refs/heads/master",
"committer_date": 1462494114000,
"content_id": "3cc0acd8e0e219c16f88a3bf194cedaca831f8a8",
"detected_licenses": [
"MIT"
],
"directory_id": "c3e4320f6143c779901d0f1d68ddb078f9f0aede",
"extension": "py",
"fi... | 2.515625 | stackv2 | import json
import logging
import re
import webapp2
from models import Watcher
EMAIL_RE = re.compile(r'[^@]+@[^@]+\.[^@]+')
active_terms = [{'code': t[0], 'name': t[1]}
for t in [
(1164, 'Summer Intersession 2016'),
(1166, 'Summer 2016'),
(11... | 63 | 35.9 | 74 | 15 | 553 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_7664dc3fa162a2e0_a820b74a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [uark.edu](1) may be at an arbitrary position in the sa... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [uark.edu](1) may be at an arbitrary position in the sanitized URL."
] | [
26
] | [
null
] | [
21
] | [
47
] | |
2024-11-18T23:46:46.895871+00:00 | 1,692,964,835,000 | b1be844ec99624026cc9f3af8f38828eeb2ba94c | 2 | {
"blob_id": "b1be844ec99624026cc9f3af8f38828eeb2ba94c",
"branch_name": "refs/heads/master",
"committer_date": 1692965148000,
"content_id": "b89e579694b2a2acf7dae9db2c0599f6b05ff2ab",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f35186c28241eb1c61f85ca425a5d4f5b440b9c7",
"extension": "py"... | 2.484375 | stackv2 | # -*- coding: utf-8 -*-
# python std lib
import json
import logging
import re
# phabfive imports
from phabfive.constants import MONOGRAMS
from phabfive.core import Phabfive
from phabfive.exceptions import PhabfiveDataException, PhabfiveRemoteException
# 3rd party imports
from phabricator import APIError
log = logg... | 67 | 29.01 | 147 | 17 | 465 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e7aea2fd5fb90963_6ef1d747", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
67
] | [
null
] | [
27
] | [
39
] | |
2024-11-18T23:46:51.601934+00:00 | 1,630,555,199,000 | 2c8f2df3e182722e5d9209b4ac85fe49b85e54c8 | 3 | {
"blob_id": "2c8f2df3e182722e5d9209b4ac85fe49b85e54c8",
"branch_name": "refs/heads/main",
"committer_date": 1630555199000,
"content_id": "95407467a5ff0f24f309bb2e8a62a62dcd64ff25",
"detected_licenses": [
"MIT"
],
"directory_id": "b1de5cf7a949fd99675c0e9743a6bad868d1ae7e",
"extension": "py",
"file... | 2.71875 | stackv2 | import praw
import csv, codecs
import re
import time
import matplotlib.pyplot as plt
import threading
BLOCK_SIZE = 300
exitFlag = 0
need_csv_file = False
# Follow the instructions here:
# https://towardsdatascience.com/how-to-use-the-reddit-api-in-python-5e05ddfd1e5c
# to get your personal_use_script, secret, and nam... | 260 | 29.65 | 108 | 22 | 1,837 | python | [{"finding_id": "codeql_py/overly-large-range_2eabb00e800d3adb_50565ddd", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class."
] | [
145,
145,
145
] | [
null,
null,
null
] | [
30,
33,
36
] | [
34,
37,
40
] | |
2024-11-18T23:48:13.158228+00:00 | 1,605,307,332,000 | 2690c60af401b5b8b0136e487a39cc5aa9cea476 | 3 | {
"blob_id": "2690c60af401b5b8b0136e487a39cc5aa9cea476",
"branch_name": "refs/heads/main",
"committer_date": 1605307332000,
"content_id": "fd157270e9495de0a19a549294516358b865156b",
"detected_licenses": [
"MIT"
],
"directory_id": "7acdacd7e6876a5d65f514322373d961c769ada8",
"extension": "py",
"file... | 2.953125 | stackv2 | from datetime import datetime
import os
import pytz
import requests
import math
import json
API_KEY = 'OPEN_WEATHER_MAP_API_KEY'
API_URL = ('https://api.openweathermap.org/data/2.5/onecall?lat={}&lon={}&exclude=minutely,alerts&appid={}')
def weather_query(lat, lon):
try:
print(API_URL.format(... | 38 | 28.58 | 108 | 15 | 271 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5a37c21fa2bbd3e8_611ea73a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
13
] | [
null
] | [
15
] | [
48
] | |
2024-11-18T23:48:13.279198+00:00 | 1,609,704,364,000 | 9620f94c8b85a23c5c8bae91376d6ae20064b985 | 2 | {
"blob_id": "9620f94c8b85a23c5c8bae91376d6ae20064b985",
"branch_name": "refs/heads/master",
"committer_date": 1609704364000,
"content_id": "e97e6dc540a9a620d1984c9f31fe100cf1f7e7cf",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "3dcbf494463f4c5e6c640d236a3ab107f1f25996",
"extension": "p... | 2.4375 | stackv2 | import re
from typing import List
from urllib.parse import urljoin
import httpx
import js2py
from faker import Faker
from pydantic import parse_obj_as
from kurby.constants import TWIST_URL, ANIME_ENDPOINT
from kurby.decrypt import decrypt
from kurby.schemas import Anime, AnimeDetails, AnimeSource
from kurby.utils imp... | 90 | 31.97 | 87 | 20 | 749 | python | [{"finding_id": "codeql_py/bad-tag-filter_6d2e01419f2b5eb3_de73e551", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match upper case <SCRIPT> tags."
] | [
27
] | [
null
] | [
25
] | [
47
] | |
2024-11-19T00:44:12.630311+00:00 | 1,557,545,366,000 | 9f1430102e5d5567ad3328df85438a238133c7c7 | 3 | {
"blob_id": "9f1430102e5d5567ad3328df85438a238133c7c7",
"branch_name": "refs/heads/master",
"committer_date": 1557545366000,
"content_id": "0f3f19f5471edeb8ee37c9dad56fc62b45bb3efc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e0bfed179449f953ae5c4504f6f90e3b66c2096d",
"extension": "py"... | 3.234375 | stackv2 | import sys
import os
import struct
import argparse
import json
import tempfile
from Crypto.Cipher import AES
from Crypto.PublicKey import RSA
from Crypto.Cipher import PKCS1_OAEP
def decrypt_file(key, in_filename, out_filename=None, chunksize=24*1024):
""" Decrypts a file using AES (CBC mode) with the given key.
... | 158 | 43.28 | 96 | 17 | 1,431 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7265407c5c082ab6_b9f99339", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text."
] | [
79
] | [
null
] | [
15
] | [
44
] | |
2024-11-19T00:44:20.818813+00:00 | 1,413,387,245,000 | 1f9ca84844831aba66b7218c040e954b3aac0b8a | 3 | {
"blob_id": "1f9ca84844831aba66b7218c040e954b3aac0b8a",
"branch_name": "refs/heads/master",
"committer_date": 1413387245000,
"content_id": "481987da74721fd132b78a44ebbb0f86ea73832a",
"detected_licenses": [
"MIT"
],
"directory_id": "81b9ccaa8e97118ed7287432deac998ebed05d8b",
"extension": "py",
"fi... | 2.515625 | stackv2 | # coding: utf-8
"""
A microservice, that takes an URL and saves the url in some database.
"""
from flask import Flask, request, abort, jsonify, g
from porc import Client
import datetime
import embedly
import hashlib
import json
import nltk
import os
import requests
import uuid
# embedly
embedly_client = embedly.Embe... | 126 | 26.94 | 104 | 18 | 874 | python | [{"finding_id": "codeql_py/stack-trace-exposure_e1525f0433d8f406_e960ceba", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-215",
"CWE-918"
] | [
"py/stack-trace-exposure",
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
122,
126,
97
] | [
null,
null,
null
] | [
28,
5,
9
] | [
36,
40,
26
] | |
2024-11-19T00:44:21.438126+00:00 | 1,587,664,776,000 | 9e23a16bb91df6707be28ddb0f61e6459b57794e | 3 | {
"blob_id": "9e23a16bb91df6707be28ddb0f61e6459b57794e",
"branch_name": "refs/heads/master",
"committer_date": 1587664776000,
"content_id": "5482eff9cd5c4c4314bd4147df967fd5ee32081f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2f6c43c16d9fd38643552b7ff9eed55654bd0ecf",
"extension": "py"... | 2.703125 | stackv2 | # Copyright 2017-2019 Stanislav Pidhorskyi
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed t... | 222 | 36.5 | 132 | 16 | 2,089 | python | [{"finding_id": "codeql_py/tarslip_e70fb0cfa51082a0_419c7836", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
163
] | [
null
] | [
9
] | [
50
] | |
2024-11-19T00:44:21.966228+00:00 | 1,587,894,722,000 | 3d1e53efd2007b1d168b09a3e3b8903cf585faf8 | 2 | {
"blob_id": "3d1e53efd2007b1d168b09a3e3b8903cf585faf8",
"branch_name": "refs/heads/master",
"committer_date": 1587894722000,
"content_id": "c16acec76df7dee2516060b8ce854a43e509af7e",
"detected_licenses": [
"MIT"
],
"directory_id": "a06dd64bda892191b5e6b4c829f06d9713977c53",
"extension": "py",
"fi... | 2.34375 | stackv2 | from datetime import datetime
from flask import (abort, flash, redirect, render_template, request,
url_for)
from flask_login import (current_user, login_required, login_user,
logout_user)
from werkzeug.urls import url_parse
from klaverjas import app, db
from klaverjas.forms... | 133 | 33.03 | 79 | 17 | 909 | python | [{"finding_id": "codeql_py/url-redirection_2a2100872681927a_bfe9b184", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
109
] | [
null
] | [
25
] | [
34
] | |
2024-11-18T23:05:20.968161+00:00 | 1,564,683,823,000 | 76a6acf4499b2bacfd0002f500535881c492c6b8 | 3 | {
"blob_id": "76a6acf4499b2bacfd0002f500535881c492c6b8",
"branch_name": "refs/heads/master",
"committer_date": 1564683823000,
"content_id": "01110987dc51e1d4e3911a105213d6d0d557da7a",
"detected_licenses": [
"MIT"
],
"directory_id": "ae6042978489b559f538a57f9590091c3d4676f4",
"extension": "py",
"fi... | 2.65625 | stackv2 | from __future__ import print_function
import os
import os.path
import jinja2
import tempfile
import time
import webbrowser
from IPython.display import IFrame
TEMPLATES_PATH = os.path.join(os.path.dirname(__file__), '../templates/')
j2_env = jinja2.Environment(loader=jinja2.FileSystemLoader(TEMPLATES_PATH),
... | 110 | 29.08 | 108 | 16 | 756 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fd3f07a989e2a8c9_c4310558", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
14
] | [
15
] | [
10
] | [
46
] | |
2024-11-18T23:11:00.753387+00:00 | 1,608,839,658,000 | 756005363e1383032afd2f660ba99f8921cf5121 | 3 | {
"blob_id": "756005363e1383032afd2f660ba99f8921cf5121",
"branch_name": "refs/heads/master",
"committer_date": 1608839658000,
"content_id": "e37b9950d1975756acf8dec2e62755202d3299a2",
"detected_licenses": [
"MIT"
],
"directory_id": "201812d0833747c84fbc6c2753b1958e31b6cc9a",
"extension": "py",
"fi... | 3.46875 | stackv2 | import zipfile, time
def bruteforce(file, list="lists\list100k.txt", list2="lists\list1m.txt"):
zip = zipfile.ZipFile(file) #open the zipfile
password = None
counter = 0
startTime = time.time() #check when we started so we can know how much time it took us
with open(list, "rt") as f: #open the first 100,000 passw... | 47 | 35.91 | 113 | 17 | 473 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ed60f5ae8cb23106_58a130c4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
19,
35
] | [
null,
null
] | [
22,
22
] | [
30,
30
] | |
2024-11-19T01:21:47.639759+00:00 | 1,679,672,095,000 | 3f7376be78df33a4fd3872f05344d4d893b20e20 | 3 | {
"blob_id": "3f7376be78df33a4fd3872f05344d4d893b20e20",
"branch_name": "refs/heads/master",
"committer_date": 1679672095000,
"content_id": "f41fca459491c5ecd2d0253dddeca05c5d745927",
"detected_licenses": [
"MIT"
],
"directory_id": "407a99d0e33d2553743031dfd9854dc2426e584f",
"extension": "py",
"fi... | 3.046875 | stackv2 | # Database Handler
from getpass import getpass
from platform import system
from clipboard import copy_text
from crypt import hash_pass, encrypt_pass, decrypt_pass, encryptDB, decryptDB
from generator import generate_password
import sqlite3
import os
__dbPath__ = "pvault.db" # Password Database Name
def detect_path():... | 153 | 29.85 | 95 | 19 | 1,004 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_57a08eb3a2355820_583e49a8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
112
] | [
null
] | [
23
] | [
87
] | |
2024-11-19T00:11:42.806042+00:00 | 1,566,883,010,000 | 8b21fe1c0032f83b8312e48019d8f1654685b839 | 2 | {
"blob_id": "8b21fe1c0032f83b8312e48019d8f1654685b839",
"branch_name": "refs/heads/master",
"committer_date": 1566883010000,
"content_id": "9e563742732e33217b20dcafdf20430e233a9b72",
"detected_licenses": [
"MIT"
],
"directory_id": "c6a6a2d00c3c5351479cf82912bc0809fb37c976",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/env python3
import argparse
import logging
import os
import sys
import re
import tarfile
import time
import shutil
import json
import requests
log = logging.getLogger('')
if __name__ == "__main__":
parser = argparse.ArgumentParser(description='Reprocess an archived data folder')
parser.add_argume... | 77 | 32.38 | 97 | 16 | 565 | python | [{"finding_id": "codeql_py/tarslip_7a978fc86beda196_c6b32518", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
49
] | [
null
] | [
9
] | [
12
] | |
2024-11-19T00:24:53.909522+00:00 | 1,625,627,271,000 | f6e08f6fc9f78e2f72009ec6f7978c0f305fe822 | 3 | {
"blob_id": "f6e08f6fc9f78e2f72009ec6f7978c0f305fe822",
"branch_name": "refs/heads/main",
"committer_date": 1625627271000,
"content_id": "2d3e7b2b839bb5d6d6c94bfdbafba9f0cd43ac82",
"detected_licenses": [
"MIT"
],
"directory_id": "07f4aafda850820fa51d05807ba92788788787f9",
"extension": "py",
"file... | 2.75 | stackv2 | import base64
import os
from cryptography.fernet import Fernet
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC
def getKey (salt, password):
print(password)
print(salt)
kdf = PBKDF2HMAC(
algorithm=hashes.SHA256(),
length=32... | 54 | 21.11 | 72 | 14 | 346 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_173c9038efa59bf4_30add6de", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
10
] | [
null
] | [
11
] | [
19
] | |
2024-11-19T00:36:51.386689+00:00 | 1,527,571,884,000 | 4daf059ed0482e7862edfbbda67163081f0aced9 | 3 | {
"blob_id": "4daf059ed0482e7862edfbbda67163081f0aced9",
"branch_name": "refs/heads/master",
"committer_date": 1527616683000,
"content_id": "e4dc3b5ce03e7f671313b6b22c17fa0a2aa10ed5",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "79d69df3b105a37364f4e54e0d263785405c266e",
"extension": "p... | 3.078125 | stackv2 | import bisect
from http.server import HTTPServer, BaseHTTPRequestHandler, HTTPStatus
import logging
import threading
from typing import Tuple
logger = logging.getLogger(__name__)
class Handler(BaseHTTPRequestHandler):
def __init__(self, *args, **kw):
self._paths = kw.pop('__paths')
logger.debug('... | 140 | 29.2 | 89 | 21 | 896 | python | [{"finding_id": "codeql_py/insecure-default-protocol_3c2666510d19dd89_6f0a9e27", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 3 | true | [
"CWE-327",
"CWE-117",
"CWE-117"
] | [
"py/insecure-default-protocol",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).\nThis log entry depends on a [user-provided value](3).",
"This log entry dep... | [
79,
34,
42
] | [
83,
null,
null
] | [
34,
63,
51
] | [
14,
72,
60
] | |
2024-11-19T00:36:55.414382+00:00 | 1,609,749,752,000 | 8fa8e6a497fdf417e8a87e0f19acaf63c5b2d143 | 3 | {
"blob_id": "8fa8e6a497fdf417e8a87e0f19acaf63c5b2d143",
"branch_name": "refs/heads/master",
"committer_date": 1609749752000,
"content_id": "fcd8a2f4e6b2e4e816a560b2d2b2113b5dac0982",
"detected_licenses": [
"MIT"
],
"directory_id": "19e55951af0fdd56e047875637350d6b6577e4d1",
"extension": "py",
"fi... | 2.609375 | stackv2 | # Python script to download US nonprofit data from the Foundation Stats API:
# - http://data.foundationcenter.org/about.html#api
# Diarmuid McDonnell
# Created: 09 March 2018
# Last edited: captured in Github file history
import itertools
import json
import csv
import re
import requests, zipfile, io
import os
import... | 61 | 27.69 | 123 | 11 | 454 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f20bed21a928cd63_aa970a6d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
29
] | [
null
] | [
7
] | [
17
] | |
2024-11-19T00:37:00.505840+00:00 | 1,541,573,902,000 | 529b490f378b54ce0f213416b4675cbd3be4eca8 | 2 | {
"blob_id": "529b490f378b54ce0f213416b4675cbd3be4eca8",
"branch_name": "refs/heads/master",
"committer_date": 1541573902000,
"content_id": "5859509ced4a213995e34fb2a67bf7a09875f047",
"detected_licenses": [
"MIT"
],
"directory_id": "b3e8aa381da1271a4342896d6df3cc52a2ffc543",
"extension": "py",
"fi... | 2.375 | stackv2 | import requests
from lxml import etree
import os
Headers = {
'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8',
'Accept-Encoding': 'gzip, deflate',
'Accept-Language': 'zh,en-US;q=0.9,en;q=0.8,zh-TW;q=0.7,zh-CN;q=0.6',
'Cache-Control': 'no-cache',
'Con... | 80 | 31.86 | 135 | 20 | 758 | python | [{"finding_id": "codeql_py/request-without-cert-validation_160797b9e10edbfb_fa96fa72", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
61
] | [
null
] | [
21
] | [
86
] | |
2024-11-19T01:02:13.182040+00:00 | 1,316,784,384,000 | e34e53189ab872b7cc3c179556b9d42cdf420ad5 | 3 | {
"blob_id": "e34e53189ab872b7cc3c179556b9d42cdf420ad5",
"branch_name": "refs/heads/master",
"committer_date": 1316784384000,
"content_id": "709222f9af4a03eee79600aee71381fa30167ba5",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "f9d78b58b19166aa01391fccc6678b147f0f6295",
"extension": "p... | 3.03125 | stackv2 | """
An example reconciliation service API for Google Refine 2.0.
See http://code.google.com/p/google-refine/wiki/ReconciliationServiceApi.
"""
import re
from flask import Flask, request, jsonify, json
app = Flask(__name__)
# Basic service metadata. There are a number of other documented options
# but this is all we ... | 108 | 34.53 | 78 | 17 | 917 | python | [{"finding_id": "codeql_py/flask-debug_f70bcb431f8bfe44_18e77847", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-730",
"CWE-079"
] | [
"py/flask-debug",
"py/regex-injection",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This regular expression depends on a [user-provided value](1) and is executed by [re.search](2).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
108,
41,
72
] | [
null,
null,
null
] | [
5,
26,
38
] | [
24,
31,
76
] | |
2024-11-19T01:02:24.047909+00:00 | 1,672,227,199,000 | ae5d1eafc3b372118ca2c50399be5f3392888d61 | 4 | {
"blob_id": "ae5d1eafc3b372118ca2c50399be5f3392888d61",
"branch_name": "refs/heads/master",
"committer_date": 1672227199000,
"content_id": "6b65ab5436920f0d3c38cb401088ac9488dbafe6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e8efa40c295bc86fe7fd621ae91e41ed52737e9d",
"extension": "py"... | 3.5625 | stackv2 | import random
import string
def create_password(password_length= 12,contains_non_ascii = False):
password = ""
for i in range(password_length):
if contains_non_ascii:
password_char = random.choice(string.printable)
else:
password_char = random.choice(string.ascii_lette... | 23 | 23.74 | 68 | 14 | 121 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e5519f643fe51f8a_e23bb6e6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw... | [
23
] | [
null
] | [
14
] | [
22
] | |
2024-11-19T01:26:12.548320+00:00 | 1,542,561,279,000 | 4bef61a1d17450a3c4169bfc37396ff8dca4f420 | 3 | {
"blob_id": "4bef61a1d17450a3c4169bfc37396ff8dca4f420",
"branch_name": "refs/heads/master",
"committer_date": 1542561279000,
"content_id": "9a0fc048159706c970c582d223e4dc16f93026e6",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "89c1a23daa5a07f6365ec5b696218905b619b1bf",
"extension": "p... | 2.625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
'''A DCC-agnostic adapter class to inherit and extend for software.'''
# IMPORT STANDARD LIBRARIES
import logging
import tarfile
import zipfile
import abc
import os
# IMPORT LOCAL LIBRARIES
from ..strategies import internet
from ..utils import progressbar
from ..utils im... | 318 | 31.31 | 97 | 19 | 2,064 | python | [{"finding_id": "codeql_py/tarslip_d0d50d5a670afff7_6a8fd361", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
86
] | [
null
] | [
17
] | [
20
] | |
2024-11-18T23:43:30.277033+00:00 | 1,528,727,020,000 | 624c816e000d74241ca3ab16d09c675682c550dd | 3 | {
"blob_id": "624c816e000d74241ca3ab16d09c675682c550dd",
"branch_name": "refs/heads/master",
"committer_date": 1528727020000,
"content_id": "0a6a8f621e21b72d6803d3dd41527287878d67be",
"detected_licenses": [
"MIT"
],
"directory_id": "32552e36d6607c92e1d65bdcd69d28dbd58aa373",
"extension": "py",
"fi... | 2.5625 | stackv2 | from flask import render_template, redirect, request, url_for, flash
from flask_login import login_user, logout_user, login_required, \
current_user
from . import auth
from .. import db
from ..models import User
from ..email import send_email
from .forms import LoginForm, RegistrationForm, ChangePasswordForm,\
... | 107 | 32.25 | 73 | 16 | 855 | python | [{"finding_id": "codeql_py/url-redirection_ce642079eea1046e_cbb29b9c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
32
] | [
null
] | [
29
] | [
33
] | |
2024-11-18T23:43:32.385575+00:00 | 1,585,553,587,000 | d34138742a3eb72592487399c57b94c7e9bbd0de | 3 | {
"blob_id": "d34138742a3eb72592487399c57b94c7e9bbd0de",
"branch_name": "refs/heads/master",
"committer_date": 1585553587000,
"content_id": "410ba125f9b4dbbac7a0612df5a867a2898ccc8b",
"detected_licenses": [
"MIT"
],
"directory_id": "7fbc9acf7e019f1f13ebe60dea29731c4428fa0e",
"extension": "py",
"fi... | 2.78125 | stackv2 | import pandas as pd
import html
import unicodedata
import re
import string
import itertools
import nltk
from nltk.tokenize import TweetTokenizer
tknzr = TweetTokenizer()
ws_pattern = re.compile(r'\s+')
first_split_pattern = re.compile('(.)([A-Z]+[a-z]+(?:[-][A-Z+a-z]+)*)')
second_split_pattern = re.compile('([a-z0-9]... | 142 | 26.87 | 98 | 18 | 1,014 | python | [{"finding_id": "codeql_py/overly-large-range_a469b2baeae6f234_52f6aabd", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[=>?@A-Z\\\\[\\\\\\\\]^_\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
22
] | [
null
] | [
50
] | [
53
] | |
2024-11-19T00:33:02.071479+00:00 | 1,476,381,574,000 | aeb9c2fcc22d440acb3cca6ce78d4fdff73aad61 | 3 | {
"blob_id": "aeb9c2fcc22d440acb3cca6ce78d4fdff73aad61",
"branch_name": "refs/heads/master",
"committer_date": 1476381574000,
"content_id": "c30210a685ee9e1ad92ce3915520a695f788f357",
"detected_licenses": [
"MIT"
],
"directory_id": "8ce93184f8d67e8563500fc5d7afba367266dfff",
"extension": "py",
"fi... | 2.609375 | stackv2 | # -*- coding: utf-8 -*-
try:
from os import getuid
except ImportError:
def getuid():
return 4000
from flask import Flask, request, render_template
from pprint import pformat
app = Flask(__name__)
@app.route("/")
@app.route("/index.html")
def index():
return render_template(
"index.html",
u... | 41 | 19.78 | 49 | 12 | 223 | python | [{"finding_id": "codeql_py/flask-debug_2f50345677b11cbc_8d3749a5", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
41,
37
] | [
null,
null
] | [
5,
9
] | [
48,
37
] | |
2024-11-19T00:33:02.470412+00:00 | 1,605,800,690,000 | ca7092e187e1f25f605bcd0b8cf9f2849cb390e8 | 2 | {
"blob_id": "ca7092e187e1f25f605bcd0b8cf9f2849cb390e8",
"branch_name": "refs/heads/master",
"committer_date": 1605800690000,
"content_id": "c29b74770b05e8dcf0a2e546309371d0fee84625",
"detected_licenses": [
"MIT"
],
"directory_id": "00426559fbef12d8457398bc89b4e05b11080c22",
"extension": "py",
"fi... | 2.484375 | stackv2 | from fastapi import FastAPI, HTTPException, Response
from fastapi.responses import HTMLResponse, FileResponse
import json
from fastapi.staticfiles import StaticFiles
from pydantic import BaseModel
from fastapi_utils.tasks import repeat_every
import time
import random
import hashlib
from fastapi.encoders import jsonable... | 213 | 26.17 | 97 | 20 | 1,471 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8d11af832f1e7792_fd97e264", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
61,
56
] | [
null,
null
] | [
11,
11
] | [
18,
30
] | |
2024-11-19T00:02:43.041234+00:00 | 1,631,871,909,000 | be9b06d1198e65e29f674896ecfa113d7d9a4cf4 | 3 | {
"blob_id": "be9b06d1198e65e29f674896ecfa113d7d9a4cf4",
"branch_name": "refs/heads/main",
"committer_date": 1631871909000,
"content_id": "ce9cb5b05b26fb6901ce777a7497f9c43c16143d",
"detected_licenses": [
"MIT"
],
"directory_id": "1d6d39e250a7e326bd15d98200f6fc22d57bb211",
"extension": "py",
"file... | 2.625 | stackv2 | """Regex utils for AwesomeVersion."""
import re
from typing import Any, Match, Optional, Pattern
# General purpose patterns
RE_DIGIT = re.compile(r"[a-z]*(\d+)[a-z]*")
RE_VERSION = re.compile(r"^(v|V)?(.*)$")
RE_MODIFIER = re.compile(r"^((?:\d+\-|\d|))(([a-z]+)\.?(\d*))$")
# Version patterns
RE_CALVER = re.compile(r... | 50 | 35.02 | 100 | 10 | 632 | python | [{"finding_id": "codeql_py/redos_c092e52b7cb807fa_a088cb53", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '0'.", "remediati... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '0'."
] | [
24
] | [
null
] | [
35
] | [
38
] | |
2024-11-19T00:02:47.151048+00:00 | 1,527,262,233,000 | 9514f91cd17a4a1c7cfd2bd5d51369747b638966 | 3 | {
"blob_id": "9514f91cd17a4a1c7cfd2bd5d51369747b638966",
"branch_name": "refs/heads/master",
"committer_date": 1527262233000,
"content_id": "b63bfc4d7e8bcf940903133fe65a861e236f6904",
"detected_licenses": [
"MIT"
],
"directory_id": "8fbf65ef02cd48d247cfe777580422be18237726",
"extension": "py",
"fi... | 2.640625 | stackv2 | from flask import render_template,redirect,url_for,flash,request
from . import auth
from flask_login import login_user,logout_user,login_required, current_user
from ..models import User
from .forms import LoginForm,RegistrationForm
from .. import db
from app import login_manager
@login_manager.user_loader
def load_us... | 64 | 32.52 | 110 | 16 | 446 | python | [{"finding_id": "codeql_py/url-redirection_d286ec10d7498e78_7451be77", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
51
] | [
null
] | [
29
] | [
77
] | |
2024-11-19T00:15:32.273944+00:00 | 1,591,961,322,000 | 7cabb4640860243095c1a72cbc38d55c5a752566 | 3 | {
"blob_id": "7cabb4640860243095c1a72cbc38d55c5a752566",
"branch_name": "refs/heads/master",
"committer_date": 1591961322000,
"content_id": "1d0f69e6f068e06bba28635a02b83dfb521dfe03",
"detected_licenses": [
"Apache-2.0",
"MIT"
],
"directory_id": "1b044639cc2bb532d8839e976399cefeda591b0e",
"exten... | 2.515625 | stackv2 | import flask, os, sys,time
from flask import request,render_template,send_file,Flask
import subprocess
from shutil import copyfile
import textrank
import FSM
app = Flask(__name__, static_folder='pdf')
def html_and_txt(file_name):
path = os.getcwd().replace('\\','/') + '/pdf'
cmd_docker = 'docker run -idt --rm... | 46 | 33.76 | 159 | 15 | 460 | python | [{"finding_id": "codeql_py/command-line-injection_bb0584db4028b9f4_b9eb6386", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 6 | true | [
"CWE-078",
"CWE-078",
"CWE-078",
"CWE-215",
"CWE-022",
"CWE-022"
] | [
"py/command-line-injection",
"py/command-line-injection",
"py/command-line-injection",
"py/flask-debug",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This command line depends on a [user-provided value](1).",
"This command line depends on a [user-provided value](1).",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This pat... | [
13,
14,
15,
46,
32,
39
] | [
null,
null,
null,
null,
null,
null
] | [
21,
21,
21,
5,
20,
26
] | [
31,
31,
98,
51,
29,
69
] | |
2024-11-19T00:25:29.549732+00:00 | 1,572,894,781,000 | 58b43c7e61a0d78076f7de2c9fcbb89b03fb506d | 2 | {
"blob_id": "58b43c7e61a0d78076f7de2c9fcbb89b03fb506d",
"branch_name": "refs/heads/master",
"committer_date": 1572894781000,
"content_id": "546fe3b3105cd01ffc3d3df52f7a5dad1063c442",
"detected_licenses": [
"MIT"
],
"directory_id": "ca4905eee5d61f075867fda061bab68b25dabaca",
"extension": "py",
"fi... | 2.453125 | stackv2 | from flask import Flask, request, render_template
from flask_restful import Resource, Api
from sqlalchemy import create_engine
from json import dumps
import arrow
from geojson import Point, Feature, FeatureCollection, dump
from collections import defaultdict
#Create a engine for connecting to SQLite3.
#Assuming salar... | 95 | 38.42 | 179 | 20 | 849 | python | [{"finding_id": "codeql_py/sql-injection_cb045486892af267_482d5049", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
42
] | [
null
] | [
30
] | [
130
] | |
2024-11-19T00:25:32.791476+00:00 | 1,633,878,841,000 | 774f9cadbd8a232a007e69d6de7061ba70421d4a | 3 | {
"blob_id": "774f9cadbd8a232a007e69d6de7061ba70421d4a",
"branch_name": "refs/heads/main",
"committer_date": 1633878841000,
"content_id": "c8baad290f4cb949388236761be605e642ed2d6f",
"detected_licenses": [
"MIT"
],
"directory_id": "ef036f1e0d1f0d6b5890ab1fd634162d37bae566",
"extension": "py",
"file... | 2.6875 | stackv2 | from flask_restful import Resource, Api
from flask import request
from apscheduler.schedulers.background import BackgroundScheduler
import atexit
import time
import json
import os
from app import app as application
class API(Resource):
def get(self, room_id):
"""
Receiver gets offer, Sender gets a... | 69 | 23.57 | 84 | 15 | 394 | python | [{"finding_id": "codeql_py/path-injection_dfffeadca8d211f4_45a41ef8", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
16,
23
] | [
null,
null
] | [
19,
19
] | [
38,
38
] | |
2024-11-19T00:25:38.392442+00:00 | 1,629,834,597,000 | 14797850fb27754d03ff87e1911235e4f485fcff | 3 | {
"blob_id": "14797850fb27754d03ff87e1911235e4f485fcff",
"branch_name": "refs/heads/main",
"committer_date": 1629834597000,
"content_id": "135afd4e4d9d626763a05280df47fcdc96ab5ebc",
"detected_licenses": [
"MIT"
],
"directory_id": "d561d9d796398cff7a97d20ea308e1a4ce559982",
"extension": "py",
"file... | 2.578125 | stackv2 | from google.auth import jwt
from google.auth import _helpers
from google.auth.transport import requests
from google.oauth2 import id_token
import facebook
# overriding _verify_iat_and_exp to account for server system clock
# being behind by approximately 25 minutes
def _verify_iat_and_exp_edited(payload):
"""Verif... | 67 | 32.18 | 96 | 15 | 488 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_4c42b1b9124684bd_24d574ec", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [accounts.google.com](1) may be at an arbitrary positio... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [accounts.google.com](1) may be at an arbitrary position in the sanitized URL."
] | [
50
] | [
null
] | [
16
] | [
54
] | |
2024-11-19T00:16:10.204498+00:00 | 1,540,856,300,000 | 7270079df843709de5c499184a72a1b641b5ebd5 | 2 | {
"blob_id": "7270079df843709de5c499184a72a1b641b5ebd5",
"branch_name": "refs/heads/master",
"committer_date": 1540856300000,
"content_id": "11418d7fe0caa7d00e5a43ef8858e93e3005f09b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d535d5c87111cbab5aa4fd4726982837926adc02",
"extension": "py"... | 2.390625 | stackv2 | """
Copyright 2017 Fastboot Mobile, LLC.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agree... | 112 | 31.64 | 114 | 13 | 843 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3792bb430596d236_7257e62b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
87
] | [
null
] | [
11
] | [
60
] | |
2024-11-19T00:28:32.166902+00:00 | 1,518,763,945,000 | 1f23c431641bb75b7ec2cd42b3e8e3508cb010e1 | 2 | {
"blob_id": "1f23c431641bb75b7ec2cd42b3e8e3508cb010e1",
"branch_name": "refs/heads/master",
"committer_date": 1518763945000,
"content_id": "d1f339acbe14be54d5140aa242020d3d6e21d22a",
"detected_licenses": [
"MIT"
],
"directory_id": "9b352177922814ca462a4425137eea518f2888a8",
"extension": "py",
"fi... | 2.4375 | stackv2 | # -*- coding: utf-8 -*-
from __future__ import unicode_literals
import os
import sys
import create_reply
from flask import Flask, request, abort
from linebot import (
LineBotApi, WebhookParser
)
from linebot.exceptions import (
InvalidSignatureError
)
from linebot.models import (
MessageEvent, TextMessag... | 70 | 24.99 | 76 | 13 | 406 | python | [{"finding_id": "codeql_py/log-injection_39e43f63ae7bff27_ddf03c10", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
42
] | [
null
] | [
21
] | [
44
] | |
2024-11-19T00:28:38.268540+00:00 | 1,574,029,901,000 | 81439ec42c1377ca8f8911fbbb9939b0534f9512 | 3 | {
"blob_id": "81439ec42c1377ca8f8911fbbb9939b0534f9512",
"branch_name": "refs/heads/master",
"committer_date": 1574029901000,
"content_id": "6a5a7f27210e81a0cee339643cd89d36c56c0022",
"detected_licenses": [
"MIT"
],
"directory_id": "1fde49a4951008810d64e5181e5a04528cc4b12e",
"extension": "py",
"fi... | 2.890625 | stackv2 | import requests
# api_host = "vcm-9129.vm.duke.edu"
api_host = "http://127.0.0.1:5000/"
def post_new_patients(patient_id, attending_email, user_age):
"""
Makes new patient information POST request to /api/new_patient
Args:
patient_id: patient id in string or int
attending_email: patient's... | 123 | 28.58 | 78 | 11 | 907 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c53174d56e97f130_081eb925", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive dat... | [
111,
114,
117,
120
] | [
null,
null,
null,
null
] | [
11,
11,
11,
11
] | [
16,
25,
18,
17
] | |
2024-11-19T00:28:41.525036+00:00 | 1,475,646,736,000 | 6cdbaed733b69b37f100a4af0f2bd72cb82653de | 3 | {
"blob_id": "6cdbaed733b69b37f100a4af0f2bd72cb82653de",
"branch_name": "refs/heads/master",
"committer_date": 1475646736000,
"content_id": "154afb9650ffa63c97d70ba08588598e7ec40831",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f9457ea82b6cc7262403b10d3c9ed4f4ad492fef",
"extension": "py"... | 3 | stackv2 | """Application body"""
import os
from urllib.error import HTTPError
from urllib.request import urlopen
from app.auth import HubAuth
from flask import Flask, redirect
from webargs import Arg
from webargs.flaskparser import use_args
def create_app(config='production'):
app = Flask(__name__, static_url_path='/static'... | 73 | 29.04 | 72 | 17 | 500 | python | [{"finding_id": "codeql_py/full-ssrf_c8881c01d3f5d706_3d959034", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 2 | true | [
"CWE-918",
"CWE-079"
] | [
"py/full-ssrf",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
54,
39
] | [
null,
40
] | [
9,
11
] | [
24,
25
] | |
2024-11-19T00:28:41.819732+00:00 | 1,675,943,305,000 | a1bdc4474573f4e260493d31222712a90005b362 | 3 | {
"blob_id": "a1bdc4474573f4e260493d31222712a90005b362",
"branch_name": "refs/heads/master",
"committer_date": 1675943305000,
"content_id": "e71fa31e934330320f10d0a34ce43c06c08a4d95",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "07addf6da975492b53df3be57559ebbbd83ad1c1",
"extension": "py"... | 2.8125 | stackv2 | from jinja2 import Template
from cfn_sphere import FileLoader
import os
import json
import yaml
from cfn_sphere.exceptions import CfnSphereException
class FileGenerator(object):
def __init__(self, working_dir):
self.working_dir = working_dir
@staticmethod
def _write_file(file_path, working_dir,... | 64 | 30.09 | 100 | 16 | 426 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_24d4d6f8584d642c_24e07c93", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
60
] | [
null
] | [
16
] | [
34
] | |
2024-11-19T00:50:16.765506+00:00 | 1,614,831,968,000 | 9c236a8262094ee268e4aa7702bdf309d5eec5ba | 2 | {
"blob_id": "9c236a8262094ee268e4aa7702bdf309d5eec5ba",
"branch_name": "refs/heads/main",
"committer_date": 1614831968000,
"content_id": "29332546e0954518986f40cd7680efb1b828152e",
"detected_licenses": [
"MIT"
],
"directory_id": "5cd2dff92ed1b20dfa531c056f10cc7e3a0a96a8",
"extension": "py",
"file... | 2.375 | stackv2 | #!/bin/python3
import paramiko
import getpass
import time
import subprocess
devices = {
'r1': {
'ip': '127.0.0.1',
},
'r3': {
'ip': '127.0.0.1'
}
}
user = "cisco"
password = "cisco"
command = "show ip int b\n"
def get_connection(ip, user, password):
ssh = paramiko.SSHClient()
... | 42 | 23.79 | 78 | 11 | 286 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_203204c1808dbfc8_53a00636", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
24
] | [
null
] | [
5
] | [
62
] | |
2024-11-19T01:30:49.226760+00:00 | 1,625,021,656,000 | 658cbad9e2134592b07fcba19e47759cc570649c | 2 | {
"blob_id": "658cbad9e2134592b07fcba19e47759cc570649c",
"branch_name": "refs/heads/main",
"committer_date": 1625021656000,
"content_id": "10156a4d206adeff4c7b15ca70bb3039927ec269",
"detected_licenses": [
"MIT"
],
"directory_id": "a94755eb3bd727056b7371fd80cc48aa2c620593",
"extension": "py",
"file... | 2.390625 | stackv2 | from flask import Flask, redirect, url_for, request, render_template
from pymysql import connect, cursors
from flask_cors import CORS
import subprocess
app = Flask(__name__)
CORS(app)
def restart_mysql_service():
command = 'service mysql restart'
process = subprocess.Popen(command.split(), stdout=subprocess... | 69 | 35.33 | 140 | 21 | 522 | python | [{"finding_id": "codeql_py/flask-debug_6a2d05e02409eeae_a954e1c9", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-089"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
68,
20,
38
] | [
null,
null,
null
] | [
5,
12,
32
] | [
51,
31,
43
] | |
2024-11-19T02:00:57.386721+00:00 | 1,609,235,219,000 | 67377cb4a0a25d335f2cda7b6aeda6efd67db8ac | 3 | {
"blob_id": "67377cb4a0a25d335f2cda7b6aeda6efd67db8ac",
"branch_name": "refs/heads/main",
"committer_date": 1609235219000,
"content_id": "4f687327cfa33eed18fbcc554cbbfb33f7778b8b",
"detected_licenses": [
"MIT"
],
"directory_id": "3337686fd5123a0845269956006d82cf237b6c65",
"extension": "py",
"file... | 2.671875 | stackv2 | from flask import Flask
app = Flask(__name__)
@app.route('/')
def index():
return "Labrīt!!!!!"
@app.route('/sveiki')
def sveiki():
return "Vairs nav nekāds rīts"
@app.route('/sveiki/<vards>')
def sveikiPersona(vards):
return "Sveiki, {}".format(vards)
@app.route('/cik/<sk1>/<sk2>')
def reizinajums(sk1,... | 25 | 18.04 | 37 | 9 | 160 | python | [{"finding_id": "codeql_py/flask-debug_659711a0a3ff8253_4e51ea9d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
25,
15
] | [
null,
null
] | [
5,
12
] | [
35,
38
] | |
2024-11-19T00:04:26.179920+00:00 | 1,680,237,803,000 | a5af37865a24c40c8f69e3ade4557b8d9a282d24 | 2 | {
"blob_id": "a5af37865a24c40c8f69e3ade4557b8d9a282d24",
"branch_name": "refs/heads/master",
"committer_date": 1680237803000,
"content_id": "07096fdba4be02050671b0509436796449aab223",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f1824cf2393b49c099b28f4c32383e930eae1c66",
"extension": "py"... | 2.421875 | stackv2 | #!/usr/bin/python
from os import path as osp
from flask import Flask, jsonify, request, abort
from tracker import SOTTracker
import requests
import json
# init the server
app = Flask('tracking')
# function module configuration
data_root = '/data'
service_port = 8899
TIMEOUT_SEC = 2 # time-out in seconds for sending... | 142 | 29.32 | 83 | 17 | 1,096 | python | [{"finding_id": "codeql_py/full-ssrf_f1883aa1b9550d29_0d5b2b9f", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 3 | true | [
"CWE-918",
"CWE-022",
"CWE-022"
] | [
"py/full-ssrf",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
113,
86,
94
] | [
117,
null,
null
] | [
17,
27,
23
] | [
37,
35,
31
] | |
2024-11-19T00:40:14.699263+00:00 | 1,586,358,541,000 | 9294a720e8da1e8a1ebc9e5385da8ddf861bcacb | 3 | {
"blob_id": "9294a720e8da1e8a1ebc9e5385da8ddf861bcacb",
"branch_name": "refs/heads/master",
"committer_date": 1586358541000,
"content_id": "0a6ec8aa22aa24fb2417445dc31627dae7276680",
"detected_licenses": [
"MIT"
],
"directory_id": "7ebea1f051a311b4f20dabfc5869b80d15f7ac5c",
"extension": "py",
"fi... | 2.875 | stackv2 | import json
import logging
import random
import constants
import requests
from requests.exceptions import ConnectionError
def set_headers(token):
headers = {
'Content-Type': 'application/json',
'Authorization': 'Bearer ' + token,
}
return headers
def reset_headers():
return {
... | 125 | 29.62 | 118 | 18 | 801 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0b84c888cee4d936_a4250051", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
55
] | [
null
] | [
18
] | [
74
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.