added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T01:06:17.920265+00:00 | 1,500,742,139,000 | 156720165a5352a8d1dcbe888ee4b3af48d74cf3 | 3 | {
"blob_id": "156720165a5352a8d1dcbe888ee4b3af48d74cf3",
"branch_name": "refs/heads/master",
"committer_date": 1500742139000,
"content_id": "302ef2ee7f8089a109df56ac6ffbbac735462749",
"detected_licenses": [
"MIT",
"Apache-2.0"
],
"directory_id": "28deae4b6f2ef4c83116d8a7e08061b2ac47bb71",
"exten... | 2.96875 | stackv2 | import sys
import csv
import urllib2
import requests
import re
from itertools import izip
from lxml import html, etree
from bs4 import BeautifulSoup
from bs4.element import Comment
from datetime import datetime
import time
class Player:
def __init__(self, name, position):
self.name = name;
self.position = positi... | 213 | 37.07 | 162 | 27 | 2,179 | python | [{"finding_id": "codeql_py/bad-tag-filter_ba05d7cc1a2dfd99_20ad1a03", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression only parses --> and not --!> as a HTML comment end tag.", "remediation": "", "location":... | 2 | true | [
"CWE-116",
"CWE-116"
] | [
"py/bad-tag-filter",
"py/bad-tag-filter"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This regular expression only parses --> and not --!> as a HTML comment end tag.",
"This regular expression only parses --> and not --!> as a HTML comment end tag."
] | [
75,
149
] | [
null,
null
] | [
30,
31
] | [
46,
47
] | |
2024-11-19T01:06:19.072066+00:00 | 1,595,485,386,000 | c3900eeeaa2869e18cf582f043ff58ed71f16301 | 3 | {
"blob_id": "c3900eeeaa2869e18cf582f043ff58ed71f16301",
"branch_name": "refs/heads/master",
"committer_date": 1595485386000,
"content_id": "135dfeb1d03c374c060ee037ca4ce7dddcb6dbb1",
"detected_licenses": [
"MIT"
],
"directory_id": "c414ce0c93594c2f0c62c4df456a0ee2dd106eed",
"extension": "py",
"fi... | 2.953125 | stackv2 | import re
from tokens import *
class Lexer:
number_pattern = re.compile(r"^0[xX]([0-9a-fA-F]+(\.)?[0-9a-fA-F]*|\.[0-9a-fA-F]+)([pP][+\-]?[0-9]+)?|"
r"^([0-9]+(\.)?[0-9]*|\.[0-9]+)([eE][+\-]?[0-9]+)?")
var_pattern = re.compile(r"[_a-zA-z][\w]*")
def __init__(self, chunk, c... | 161 | 33.83 | 114 | 19 | 1,367 | python | [{"finding_id": "codeql_py/overly-large-range_1fc983f0b1c74f56_193e0d1a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
9
] | [
null
] | [
37
] | [
40
] | |
2024-11-19T01:17:14.058505+00:00 | 1,425,344,030,000 | e850ef384d73bddbbed3e99d10533fdacff190cc | 2 | {
"blob_id": "e850ef384d73bddbbed3e99d10533fdacff190cc",
"branch_name": "refs/heads/master",
"committer_date": 1425344030000,
"content_id": "22f0f0391307aa61b9d3f182dcb3b95afcb267eb",
"detected_licenses": [
"MIT"
],
"directory_id": "7f3123aa95140bb6237d7177e3cf4d3913a98603",
"extension": "py",
"fi... | 2.359375 | stackv2 | # -*- coding: utf-8 -*-
'''
This module supports operations for instructors to manage courses and assignments
'''
#import the app and the login manager
from app import app, loginManager
from flask import g, request, render_template, redirect, url_for, flash, jsonify
from flask.ext.login import login_user, logout_use... | 238 | 30.24 | 112 | 25 | 1,791 | python | [{"finding_id": "codeql_py/stack-trace-exposure_a33cc918034dc97f_acafcb62", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S... | 4 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1)... | [
162,
182,
202,
238
] | [
null,
null,
null,
null
] | [
24,
26,
26,
26
] | [
69,
32,
32,
32
] | |
2024-11-19T01:17:15.798009+00:00 | 1,617,726,321,000 | 470d735bb0c2a8de5035e7df682a8205c9e677cd | 3 | {
"blob_id": "470d735bb0c2a8de5035e7df682a8205c9e677cd",
"branch_name": "refs/heads/master",
"committer_date": 1617726321000,
"content_id": "893c234301796fd51b7837a6470b7c606773e727",
"detected_licenses": [
"MIT"
],
"directory_id": "ab728f672d55a869f02002d5eb9782ce374b5c86",
"extension": "py",
"fi... | 2.765625 | stackv2 | import requests, json
import sys
import urllib3
urllib3.disable_warnings()
token_url = "https://api.1nce.com/management-api/oauth/token"
# client (application) credentials, page number and message as string which should be send
client_id = sys.argv[1]
client_secret = sys.argv[2]
pg_num = sys.argv[3]
message_content =... | 71 | 37 | 112 | 16 | 618 | python | [{"finding_id": "codeql_py/request-without-cert-validation_1e691c224c87615e_9d99aa34", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
17
] | [
18
] | [
25
] | [
71
] | |
2024-11-19T01:15:14.953080+00:00 | 1,556,003,058,000 | 02c27199e250714ec5d391f9761e5d595952cb79 | 3 | {
"blob_id": "02c27199e250714ec5d391f9761e5d595952cb79",
"branch_name": "refs/heads/master",
"committer_date": 1556003058000,
"content_id": "8b605393a8fff9fe0d16a567bf0d035711fc4a4d",
"detected_licenses": [
"MIT"
],
"directory_id": "bff6f78232dbddd0f785bbbb8616b19748c3f55e",
"extension": "py",
"fi... | 2.953125 | stackv2 | #!/usr/bin/env python3
import bcrypt
import fileinput
import os
from subprocess import call
FILE_PATH = os.path.join(os.path.dirname(__file__), 'serverless.yml')
def ask_user_for_region():
regions = ["eu-west-1 (Ireland)", "eu-west-2 (London)", "eu-west-3 (Paris)", "eu-central-1 (Frankfurt)", "Quit "]
for ... | 100 | 33.08 | 156 | 20 | 956 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_29486f223800e5ae_d62a5ab1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
42,
72,
77
] | [
45,
null,
97
] | [
19,
11,
11
] | [
63,
38,
10
] | |
2024-11-19T00:43:43.635340+00:00 | 1,571,328,510,000 | 555427f69d9059fa038172fbd29953819449feb7 | 3 | {
"blob_id": "555427f69d9059fa038172fbd29953819449feb7",
"branch_name": "refs/heads/master",
"committer_date": 1571328510000,
"content_id": "330f1ee48ef0b0212aaee2b42982fa987021ae2e",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "384e44f0c24d88e02248debed75b897ee9309749",
"extension": "p... | 2.53125 | stackv2 | # Copyright Notice:
# Copyright 2016-2019 DMTF. All rights reserved.
# License: BSD 3-Clause License. For full text see link: https://github.com/DMTF/Redfish-Interface-Emulator/blob/master/LICENSE.md
# Thermal API File
"""
Collection API: (None)
Singleton API: GET, PATCH
"""
import g
import sys, traceback
import... | 129 | 29.86 | 130 | 17 | 898 | python | [{"finding_id": "codeql_py/log-injection_6213851d6d2ca883_5074c637", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
74,
79
] | [
null,
null
] | [
22,
30
] | [
30,
67
] | |
2024-11-19T00:43:44.092386+00:00 | 1,460,934,086,000 | dde3581d72f252eb59607e42bcd8c43326901997 | 2 | {
"blob_id": "dde3581d72f252eb59607e42bcd8c43326901997",
"branch_name": "refs/heads/master",
"committer_date": 1460934086000,
"content_id": "e5f50b509038a01d107c1ca100785eb6eb35c55f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2540eb81f1cd615611e2a5a9d7ba069df822b56a",
"extension": "py"... | 2.484375 | stackv2 | import werkzeug.exceptions as exceptions
import copy
import flask
import functools
import inspect
import logging
import six
from ..utils import boolean, is_nullable, is_null
logger = logging.getLogger(__name__)
# https://github.com/swagger-api/swagger-spec/blob/master/versions/2.0.md#data-types
TYPE_MAP = {'integer'... | 146 | 38.55 | 103 | 21 | 1,175 | python | [{"finding_id": "codeql_py/log-injection_fbae72f5b12a7f88_219b4040", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1)... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-pr... | [
139,
141
] | [
null,
null
] | [
90,
86
] | [
93,
89
] | |
2024-11-19T00:43:46.083260+00:00 | 1,627,388,436,000 | f819f89444e7350a910bd45aa268916c2af00243 | 3 | {
"blob_id": "f819f89444e7350a910bd45aa268916c2af00243",
"branch_name": "refs/heads/main",
"committer_date": 1627388436000,
"content_id": "6cce5c482d3cf7a0ec0c1eb1f46752ac6f1a778e",
"detected_licenses": [
"MIT"
],
"directory_id": "d61cba88df33eec38a67421f5afa036142e223e7",
"extension": "py",
"file... | 2.9375 | stackv2 | from selenium import webdriver
from selenium.webdriver.common.by import By
from selenium.webdriver.support.ui import WebDriverWait
from selenium.common.exceptions import TimeoutException
from selenium.webdriver.support import expected_conditions as EC
from webdriver_manager.chrome import ChromeDriverManager
from urllib... | 83 | 30.81 | 75 | 18 | 599 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_328fbebfe9d388bf_fa05958d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
57,
62,
68,
74
] | [
58,
63,
null,
null
] | [
19,
19,
19,
15
] | [
57,
54,
24,
20
] | |
2024-11-19T00:43:59.873224+00:00 | 1,690,382,364,000 | 694b1f3a463ee8463898906ac5f2b2ac4f7750e0 | 2 | {
"blob_id": "694b1f3a463ee8463898906ac5f2b2ac4f7750e0",
"branch_name": "refs/heads/main",
"committer_date": 1690382364000,
"content_id": "a26f989fcf3f78576f20360460a980cac5b058ad",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b05641ceeb5fba2bb36fd96a4c881ffef41b6171",
"extension": "py",
... | 2.375 | stackv2 | import os
import sys
import datetime
import libhoney
from flask import Flask, jsonify, g, request
import logging
from flask_sqlalchemy import SQLAlchemy
app = Flask(__name__)
app.logger.addHandler(logging.StreamHandler(sys.stderr))
app.logger.setLevel(logging.DEBUG)
db_user = "root"
db_pass = ""
db_host = os.geten... | 186 | 32.9 | 109 | 19 | 1,360 | python | [{"finding_id": "codeql_py/log-injection_03d5ff79a98c8fd9_5b67308b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
176
] | [
null
] | [
30
] | [
67
] | |
2024-11-19T01:43:37.216803+00:00 | 1,566,274,409,000 | 85fd3dad86af5f268f8471a7b07dded3f8cc4edc | 3 | {
"blob_id": "85fd3dad86af5f268f8471a7b07dded3f8cc4edc",
"branch_name": "refs/heads/master",
"committer_date": 1566274409000,
"content_id": "3cfb0ac291bdb30fb5a2a29b2fd3f2cf78bfa5bb",
"detected_licenses": [
"MIT"
],
"directory_id": "ee15b3c7f3fbd9c502e93bee987f27d6599cad2d",
"extension": "py",
"fi... | 2.5625 | stackv2 | import tornado.ioloop
import tornado.web
import json
import base64
from datetime import datetime
import argparse
MAX_PROCESS=1
class TextHandler(tornado.web.RequestHandler):
def post(self, *args, **kwargs):
param = self.request.headers['time']
message = self.request.arguments['msg'][0].decode()
print("... | 59 | 30.59 | 104 | 18 | 469 | python | [{"finding_id": "codeql_py/reflective-xss_54225312a2611118_0da8532c", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
15
] | [
null
] | [
23
] | [
104
] | |
2024-11-19T01:43:47.984312+00:00 | 1,520,205,950,000 | 025ae9415db60dde4fc13fc69853f39a95dfd86d | 3 | {
"blob_id": "025ae9415db60dde4fc13fc69853f39a95dfd86d",
"branch_name": "refs/heads/master",
"committer_date": 1520205950000,
"content_id": "ef0ef8143cef3ad185ad7ce779685117ecf3d37f",
"detected_licenses": [
"MIT"
],
"directory_id": "8277925fa6a1b2b8b5f13bcd79e46ca5af3f862d",
"extension": "py",
"fi... | 2.515625 | stackv2 | ########################################
## import packages
########################################
import os, gc
import re
import csv
import codecs
import numpy as np
import pandas as pd
from string import punctuation
from collections import defaultdict
from nltk.corpus import stopwords
from nltk.stem import Snowball... | 365 | 35.46 | 135 | 16 | 3,627 | python | [{"finding_id": "codeql_py/overly-large-range_b730cb77495be240_6635823f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=\\]."
] | [
90
] | [
null
] | [
39
] | [
42
] | |
2024-11-19T01:43:49.216740+00:00 | 1,635,056,452,000 | bdb49aa618aefd370b1ba1b01f75f3638041aab7 | 4 | {
"blob_id": "bdb49aa618aefd370b1ba1b01f75f3638041aab7",
"branch_name": "refs/heads/main",
"committer_date": 1635056452000,
"content_id": "546f3a50c0da88e040ed3cf0fa1cee3cac31b69b",
"detected_licenses": [
"MIT"
],
"directory_id": "1ee72dcaa45f80066ab16eceb8c06dba013b21f6",
"extension": "py",
"file... | 3.75 | stackv2 | #!/usr/bin/env python3
#
# A random password generator that is customizable in terms of:
# - password length
# - character sets
#
import random
ALPHA = "abcdefghijklmnopqrstuvwxyz" + "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
NUM = "0123456789"
SPECIAL = "@#$%&*"
class GenPass:
""" Generate password based on ... | 60 | 23.97 | 84 | 14 | 345 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a048b224d74f87c3_8b8a65d6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
58
] | [
null
] | [
15
] | [
43
] | |
2024-11-19T01:43:54.869759+00:00 | 1,608,722,874,000 | e44146a9021ef03f94e63fc4c70aa4c687447f69 | 3 | {
"blob_id": "e44146a9021ef03f94e63fc4c70aa4c687447f69",
"branch_name": "refs/heads/main",
"committer_date": 1608722874000,
"content_id": "56c130d2c9b8e91df3d23304f4193004d595428f",
"detected_licenses": [
"MIT"
],
"directory_id": "99396c7511f6efc2ca168e14ea06aa1264f66416",
"extension": "py",
"file... | 2.609375 | stackv2 | import irisnative
import json
import time
import os
def lambda_handler(event, context):
# Retrieve connection information from configuration file
connection_detail = get_connection_info("connection.config")
ip = connection_detail["ip"]
port = int(connection_detail["port"])
namespace = connec... | 86 | 30.08 | 138 | 14 | 620 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_827954b7da14c499_976d9fa3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
29
] | [
null
] | [
11
] | [
34
] | |
2024-11-19T01:44:08.987292+00:00 | 1,585,061,870,000 | 45436b433ebce802d2d7b7e0a1944eda513f58ee | 3 | {
"blob_id": "45436b433ebce802d2d7b7e0a1944eda513f58ee",
"branch_name": "refs/heads/master",
"committer_date": 1585061870000,
"content_id": "a99bac33f7cabcccdf47d3b1edc52a3a2a76d4c6",
"detected_licenses": [
"MIT"
],
"directory_id": "dbccdd2ba6870a7e362d104c8c0fc13c61b10b71",
"extension": "py",
"fi... | 2.515625 | stackv2 | #!/usr/bin/env python3
import cgi, cgitb, os
import json
cgitb.enable()
try:
form = cgi.FieldStorage()
print("Cache-control: private, max-age=0, no-cache")
print("Content-type: application/json\r\n\r\n")
fileitem = form['filename']
if fileitem.filename:
fn = os.path.basename(fileitem.... | 27 | 25.41 | 80 | 13 | 181 | python | [{"finding_id": "codeql_py/path-injection_5dbfe934de1caeaf_e857cb8a", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
17
] | [
null
] | [
14
] | [
22
] | |
2024-11-19T01:44:10.041853+00:00 | 1,691,789,519,000 | c12416f091361eb884b71ce54f160422dc62da75 | 3 | {
"blob_id": "c12416f091361eb884b71ce54f160422dc62da75",
"branch_name": "refs/heads/main",
"committer_date": 1691789519000,
"content_id": "475af5211ad64f2c48a28a0bd6f8c009b8643838",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "f7f3dd55fa7ab6833f3c2d8e457884c127cc203d",
"extension": "py",
"... | 2.546875 | stackv2 | import logging
import re
import subprocess
import sys
from dataclasses import dataclass
from pathlib import Path, PurePath
from typing import List
import click
from linkml._version import __version__
re_decl = re.compile(r"^(\S+):$")
re_start_yaml = re.compile(r"^```(\w+)$")
re_end_yaml = re.compile(r"^```$")
re_htm... | 222 | 30.31 | 98 | 22 | 1,527 | python | [{"finding_id": "codeql_py/bad-tag-filter_01d8c731451575e6_21c3a4b5", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match comments containing newlines.", "remediation": "", "location": {"file_pat... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match comments containing newlines."
] | [
16
] | [
null
] | [
32
] | [
46
] | |
2024-11-19T02:20:03.417532+00:00 | 1,552,203,519,000 | ce6048cea2207c7ba88e36b725041e241ca1f5bd | 3 | {
"blob_id": "ce6048cea2207c7ba88e36b725041e241ca1f5bd",
"branch_name": "refs/heads/master",
"committer_date": 1552203519000,
"content_id": "4f37487feb931332ea82b787e79cabdf756a7715",
"detected_licenses": [
"MIT"
],
"directory_id": "8e1756d560054d674c59d4f677a3196c243b0993",
"extension": "py",
"fi... | 2.625 | stackv2 | from linked_list import LinkedList
from queue import Queue
import datetime
import random
import pickle
def prRed(skk): print("\033[91m {}\033[00m" .format(skk))
def prGreen(skk): print("\033[92m {}\033[00m" .format(skk))
def prYellow(skk): print("\033[93m {}\033[00m" .format(skk))
def prLightPurple(skk): print("\03... | 425 | 29.5 | 90 | 25 | 3,012 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_2489947eea334d94_19816fd8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
250
] | [
null
] | [
31
] | [
53
] | |
2024-11-19T02:20:04.693227+00:00 | 1,542,699,191,000 | 3573addd31fed954e8f749b8832a31eebdff2e12 | 3 | {
"blob_id": "3573addd31fed954e8f749b8832a31eebdff2e12",
"branch_name": "refs/heads/master",
"committer_date": 1542699191000,
"content_id": "d1d0661113e4423a462ea3ebb8f336e3f590a265",
"detected_licenses": [
"MIT"
],
"directory_id": "aacbe21e3e9264c9e3d19ba4bbb08e574ac5791d",
"extension": "py",
"fi... | 2.796875 | stackv2 | import urllib.request,json
from .models import Articles,Sources
#fetching API key
api_key= None
#getting the news base url
base_url = None
def configure_request(app):
global api_key,base_url
api_key = app.config['NEWS_API_KEY']
base_url = app.config['NEWS_API_SOURCE_URL']
def get_sources():
... | 94 | 30.69 | 116 | 12 | 612 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_267f6321a191f32d_dda4d94b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
53
] | [
null
] | [
11
] | [
35
] | |
2024-11-19T02:20:07.531924+00:00 | 1,624,579,221,000 | b00b3b83c80fdedaa7fe9f71c73aa72faaf26923 | 3 | {
"blob_id": "b00b3b83c80fdedaa7fe9f71c73aa72faaf26923",
"branch_name": "refs/heads/master",
"committer_date": 1624579221000,
"content_id": "3340ab870d3c2924b4214f3a825376a485004250",
"detected_licenses": [
"MIT"
],
"directory_id": "92e2e983b6d765750a798d2a4979c75608ba820f",
"extension": "py",
"fi... | 3.109375 | stackv2 | #!/usr/bin/env python3
# -*- coding: UTF-8 -*-
"""The common component contains the logger, error logging, and
flair sanitizing functions that are used by both routines.
There are no functions that connect to Reddit in this component.
"""
import datetime
import logging
import re
import time
from settings import INFO, ... | 162 | 33.61 | 95 | 13 | 1,349 | python | [{"finding_id": "codeql_py/overly-large-range_5c142e45350a0583_d82948b7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class."
] | [
120,
120,
120
] | [
null,
null,
null
] | [
12,
15,
18
] | [
16,
19,
22
] | |
2024-11-19T02:20:07.868106+00:00 | 1,691,478,382,000 | 69f39f2750af259aeb56f9978ad737cd87c6d839 | 3 | {
"blob_id": "69f39f2750af259aeb56f9978ad737cd87c6d839",
"branch_name": "refs/heads/master",
"committer_date": 1691478382000,
"content_id": "d69730bd9b2beeb7bf64a2b421de7da4bbf6c51b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "aa1865ff1b47a2ed0f43dc993e7e0916969d3a9e",
"extension": "py"... | 2.6875 | stackv2 | """
This examples show how to train a Bi-Encoder for the MS Marco dataset (https://github.com/microsoft/MSMARCO-Passage-Ranking).
The queries and passages are passed independently to the transformer network to produce fixed sized embeddings.
These embeddings can then be compared using cosine-similarity to find matchin... | 242 | 42.28 | 177 | 19 | 2,449 | python | [{"finding_id": "codeql_py/tarslip_7b6916166c5cc84c_e11696d4", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/tarslip",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
98,
118
] | [
null,
null
] | [
9,
9
] | [
12,
12
] | |
2024-11-19T00:59:29.855647+00:00 | 1,618,514,645,000 | 18c1ca49d00da0c56bd2a68e12f237eb3f204952 | 2 | {
"blob_id": "18c1ca49d00da0c56bd2a68e12f237eb3f204952",
"branch_name": "refs/heads/main",
"committer_date": 1618514645000,
"content_id": "5711dd5530e131df0cae49320d88bdb78f7020ab",
"detected_licenses": [
"MIT"
],
"directory_id": "7fca03132804100ad46aeb96c3bdb73ea351ae08",
"extension": "py",
"file... | 2.4375 | stackv2 | import inspect
import json
import pathlib
from fastapi import FastAPI, Request
from fastapi.responses import StreamingResponse
from .trigger import trigger_run
filename = inspect.getframeinfo(inspect.currentframe()).filename
BASE_DIR = pathlib.Path(filename).resolve().parent
app = FastAPI()
@app.get("/") # HTTP GET... | 62 | 30.27 | 76 | 12 | 471 | python | [{"finding_id": "codeql_py/path-injection_182def411db356fb_73eb7f0e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 5 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
45,
47,
49,
60,
62
] | [
null,
null,
null,
null,
null
] | [
5,
12,
23,
12,
35
] | [
15,
23,
34,
23,
46
] | |
2024-11-19T00:59:31.156103+00:00 | 1,629,280,618,000 | c195b6285ed80d8f5cb1a582d4a2adb143a6392e | 3 | {
"blob_id": "c195b6285ed80d8f5cb1a582d4a2adb143a6392e",
"branch_name": "refs/heads/main",
"committer_date": 1629280618000,
"content_id": "25d3532ceb470c23e6993831b141e0fd683cde0e",
"detected_licenses": [
"MIT"
],
"directory_id": "f68c4d396c035deb884917bd87a522174be68c34",
"extension": "py",
"file... | 2.796875 | stackv2 | import collections
import json
from jinja2 import Template
from typing import Dict, List
class LabCollection:
def __init__(self, file_name="labs.json", include_status=True):
with open(file_name) as f:
self.all = json.loads(f.read())
self.include_status = include_status
self.cat... | 35 | 32.57 | 75 | 17 | 256 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_96d1a89ae03880d2_adcbae88", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
32
] | [
null
] | [
24
] | [
42
] | |
2024-11-19T00:59:36.526784+00:00 | 1,635,480,750,000 | ee6d19865842bef714dd9435d6c371c4182fa65f | 2 | {
"blob_id": "ee6d19865842bef714dd9435d6c371c4182fa65f",
"branch_name": "refs/heads/master",
"committer_date": 1635480750000,
"content_id": "c35239e1e3562e1df20ea62d870ed1b524412b47",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0ca52d676ada403de864d52cc7260af6193048f3",
"extension": "py"... | 2.34375 | stackv2 | import os
from cachetools import cached, LRUCache
from logging_helper import setup_logging
from ._auth import _get_token
from ._cache import get_file_cache
from ._compat import urlsplit
from ._github import check_repo
logger = setup_logging()
session = get_file_cache("rtd")
TOKEN = os.environ.get("RTD_AUTH_TOKEN")... | 186 | 27.99 | 128 | 19 | 1,276 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_e52b9dfbbddeb7cb_98276c46", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [github.com](1) may be at an arbitrary position in the sanitized URL."
] | [
182
] | [
null
] | [
28
] | [
55
] | |
2024-11-19T01:11:38.267907+00:00 | 1,589,566,024,000 | aafd6a4de02c9eeaa8cf2d5590bdf48d9723f288 | 3 | {
"blob_id": "aafd6a4de02c9eeaa8cf2d5590bdf48d9723f288",
"branch_name": "refs/heads/master",
"committer_date": 1589566024000,
"content_id": "2a5aaab6ff843cf165d78b691a35ec4ee4b9dc4f",
"detected_licenses": [
"MIT"
],
"directory_id": "a8d03be2c746579e698f74efbec1124e72578424",
"extension": "py",
"fi... | 2.6875 | stackv2 | #mongodb+srv://user123:<password>@cluster0-qas6f.mongodb.net/test?retryWrites=true&w=majority
# app/mongo_queries.py
import pymongo
import os
from dotenv import load_dotenv
load_dotenv()
DB_USER = os.getenv("MONGO_USER", default="OOPS")
DB_PASSWORD = os.getenv("MONGO_PASSWORD", default="OOPS")
CLUSTER_NAME = os.gete... | 198 | 20.76 | 118 | 13 | 1,514 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6103e85ce6e4738b_4449f0c4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
16
] | [
null
] | [
15
] | [
29
] | |
2024-11-19T01:11:51.879317+00:00 | 1,490,284,050,000 | 86fd5583eb8fb4e7363f596b3792341b8ead1fa2 | 3 | {
"blob_id": "86fd5583eb8fb4e7363f596b3792341b8ead1fa2",
"branch_name": "refs/heads/master",
"committer_date": 1490284050000,
"content_id": "02a4ccecdbce594ac43a5fb1c1456988b0719646",
"detected_licenses": [
"MIT"
],
"directory_id": "6fed17a4613fe0a7779e6bf978bea7831ca0209a",
"extension": "py",
"fi... | 2.71875 | stackv2 | from bcrypt import hashpw, gensalt
from flask import Blueprint, request, render_template, flash, redirect, url_for
from pimp_board import User, db
from flask_login import login_user, logout_user
auth_blueprint = Blueprint('auth_blueprint', __name__, template_folder='templates')
@auth_blueprint.route('/register', meth... | 47 | 38.32 | 93 | 13 | 386 | python | [{"finding_id": "codeql_py/url-redirection_4055682aee71dc14_82048c49", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
41
] | [
null
] | [
21
] | [
65
] | |
2024-11-19T01:11:53.499372+00:00 | 1,530,952,053,000 | 2146772c95e498db13d4ee0fda2ad4922919d6c8 | 2 | {
"blob_id": "2146772c95e498db13d4ee0fda2ad4922919d6c8",
"branch_name": "refs/heads/master",
"committer_date": 1530952053000,
"content_id": "d26ae2c09902a5a8513634a3cb409b9d5338eb23",
"detected_licenses": [
"MIT"
],
"directory_id": "e770cf3ce12527d24b851a4f77c922cd83a9497a",
"extension": "py",
"fi... | 2.40625 | stackv2 | import logging
import json
import random
from string import Template
import typing
from urllib.parse import urlencode
from urllib.request import urlopen
from crunchy_api.types import Field, ObjectType, MediaType, SortMode
__version__ = "0.3.0"
"""
Api documentation
https://github.com/CloudMax94/crunchyroll-api/wiki/... | 201 | 29.17 | 98 | 16 | 1,422 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5c967ff869625564_c90a76d4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
28
] | [
null
] | [
53
] | [
57
] | |
2024-11-19T01:11:54.054104+00:00 | 1,513,548,304,000 | 393b7bd0e029e7d7461c41c5563df1ca24f65601 | 2 | {
"blob_id": "393b7bd0e029e7d7461c41c5563df1ca24f65601",
"branch_name": "refs/heads/master",
"committer_date": 1513548304000,
"content_id": "df9b7d8c59b7fc9e5a9a6f631c2946afcf1f972a",
"detected_licenses": [
"MIT"
],
"directory_id": "f7d15c5ce61b05a74d625dd28f1f481c34b5777f",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/env python
# coding: utf-8
"""MIT License
Copyright (c) 2017 Curtis La Graff
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the right... | 165 | 26.35 | 98 | 14 | 1,015 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_59376d774058e4bb_34310ce5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
75,
89
] | [
null,
null
] | [
11,
11
] | [
36,
36
] | |
2024-11-19T01:11:56.582411+00:00 | 1,494,164,622,000 | b342c7959d20a49cecd7e6baf19f90016e1b1cf9 | 3 | {
"blob_id": "b342c7959d20a49cecd7e6baf19f90016e1b1cf9",
"branch_name": "refs/heads/master",
"committer_date": 1494164622000,
"content_id": "884ca2ef4bf426804b2738ab00d3404bca0d0655",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1355e7d7592381bdd6133a6d733736b1fe605766",
"extension": "py"... | 3.125 | stackv2 | # 查票类,目的是将查到的票输出到文件,让用户选票
import json
import re
import requests
from requests.packages.urllib3.exceptions import InsecureRequestWarning # 忽略 Warning 用
requests.packages.urllib3.disable_warnings(InsecureRequestWarning) # 忽略 Warning 用
class Crawl:
def __init__(self, departure_date, from_station_chs, to_station_... | 88 | 38.67 | 120 | 20 | 1,123 | python | [{"finding_id": "codeql_py/request-without-cert-validation_17d670b6e49deb32_b481f782", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
72
] | [
null
] | [
16
] | [
47
] | |
2024-11-19T01:21:38.704148+00:00 | 1,524,709,553,000 | 65fef561293e1a8caa4f49a1f043d323ca67dc02 | 3 | {
"blob_id": "65fef561293e1a8caa4f49a1f043d323ca67dc02",
"branch_name": "refs/heads/master",
"committer_date": 1524709553000,
"content_id": "5778121126535b22e91089ab931cc7d51c89e213",
"detected_licenses": [
"MIT"
],
"directory_id": "221a773d42862d4ec42f859d8daa02784bda4091",
"extension": "py",
"fi... | 2.75 | stackv2 | # -*- coding:utf-8 -*-
import urllib.request
import re
import os
from urllib.error import HTTPError
from time import *
# 图片保存根目录
pics_path = r'./pics'
# 输入id文件
id_file = r'./ids.txt'
# 日志文件
logger = r'./piclog.txt'
log = open(logger, 'w')
# ------------定义3个函数,用来创建每个girl的目录、保存图片、写入文本描述及对话----------------
def mkdir_f... | 159 | 28.75 | 104 | 15 | 1,363 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_8fee67ee51974271_06b5e37a", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'pximg.net/img-master/img', so it mi... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'pximg.net/img-master/img', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'pximg.net/c/600x600/img-master/img', so it might match more hosts than expected."
] | [
110,
118
] | [
null,
null
] | [
32,
36
] | [
73,
98
] | |
2024-11-19T01:22:20.282293+00:00 | 1,476,855,805,000 | 4e415fe5fd9f1cbc7ffd44302d7901d583e98731 | 4 | {
"blob_id": "4e415fe5fd9f1cbc7ffd44302d7901d583e98731",
"branch_name": "refs/heads/master",
"committer_date": 1476855805000,
"content_id": "85525df83c7d11eb94cc4a8d6236abc6c2d30be6",
"detected_licenses": [
"MIT"
],
"directory_id": "5364107c216d6d87a3fd8296d7a5bfb6ae16d11c",
"extension": "py",
"fi... | 3.84375 | stackv2 | # Pratice 27. Validating inputs
# Output:
# Enter the first name: J
# Enter the last name:
# Enter the ZIP code : ABCDE
# Enter an employee ID : A12-1234
# "J" is not a valid first name. It is too short.
# The last name must be filled in.
# The ZIP code must be numeric.
# A12-1234 is not a valid ID.
# ... | 101 | 31.16 | 89 | 12 | 866 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_55b31a4364ecc0ce_83c6a17d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text."
] | [
101
] | [
null
] | [
12
] | [
21
] | |
2024-11-19T01:56:40.560559+00:00 | 1,691,063,377,000 | ab9e01474181f2d8283416510475edaaaa6f8e28 | 3 | {
"blob_id": "ab9e01474181f2d8283416510475edaaaa6f8e28",
"branch_name": "refs/heads/main",
"committer_date": 1691063377000,
"content_id": "25aad3973627a74ad48c5a38f94962aa1e7eefcb",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8b12d44618a870d0b4d11719928035f52930093f",
"extension": "py",
... | 2.8125 | stackv2 | """Most of this code is from torchvision.
I will remove all this once verbosity is reduced. More info:
https://github.com/pytorch/vision/issues/2830
"""
import gzip
import hashlib
import os
import tarfile
import urllib
import zipfile
from typing import Optional
from torch.hub import tqdm
from .typing import TypePath... | 172 | 27.88 | 81 | 18 | 1,182 | python | [{"finding_id": "codeql_py/tarslip_16e7a5a51f316312_0216a556", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 3 | true | [
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/tarslip",
"py/tarslip",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
100,
103,
106
] | [
null,
null,
null
] | [
13,
13,
13
] | [
16,
16,
16
] | |
2024-11-19T01:56:45.506200+00:00 | 1,311,268,681,000 | 3ab2b58822a8d235225556caa899bb1db114328e | 3 | {
"blob_id": "3ab2b58822a8d235225556caa899bb1db114328e",
"branch_name": "refs/heads/master",
"committer_date": 1311268681000,
"content_id": "fd06393cd1e477d57ae41ef080736b3863bde1d9",
"detected_licenses": [
"MIT"
],
"directory_id": "a9bd142fed942f0de9073f38e2a72395b69d3ef8",
"extension": "py",
"fi... | 2.625 | stackv2 | # -*- coding: utf-8 -*-
u"""
Envelope contact form.
"""
import logging
from smtplib import SMTPException
from django import forms
from django.conf import settings
from django.core import mail
from django.template.loader import render_to_string
from django.utils.translation import ugettext_lazy as _
logger = loggin... | 153 | 32.72 | 90 | 15 | 1,033 | python | [{"finding_id": "codeql_py/log-injection_a51118e4f07ef21f_ab8d20ec", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
57,
146
] | [
58,
147
] | [
25,
25
] | [
51,
51
] | |
2024-11-19T02:10:46.297265+00:00 | 1,625,765,000,000 | 1d912a8b4139b5c9250a2eefc0ac173882ed91c9 | 3 | {
"blob_id": "1d912a8b4139b5c9250a2eefc0ac173882ed91c9",
"branch_name": "refs/heads/main",
"committer_date": 1625765000000,
"content_id": "ab8b920e7ec5abdfe1d13b158b3e5143ec0596ec",
"detected_licenses": [
"MIT"
],
"directory_id": "779d9244b1280175794a1b3484f7e2c39ecb6922",
"extension": "py",
"file... | 2.796875 | stackv2 | ## This is to help with importing the API only when needed
import sys
import json
from variables import weatherInfo
from IPAddress import getMyIPv4Address, getMyIPv6Address
#sys.path.append("API/")
def readData(filename):
f = open(filename, "rb")
fin = f.readline()
lines = f.readlines()
for line in lin... | 393 | 31.66 | 127 | 17 | 2,932 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_49aa2559f136d0bc_65cb493b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
382
] | [
null
] | [
11
] | [
86
] | |
2024-11-19T02:45:21.432362+00:00 | 1,596,030,399,000 | 91c99b3920376933832a9616fa8663639da99a04 | 3 | {
"blob_id": "91c99b3920376933832a9616fa8663639da99a04",
"branch_name": "refs/heads/master",
"committer_date": 1596030399000,
"content_id": "14d240e4db4bdd998ab47c229d5fbcd7bd62420e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8999b1ef8c7a115e2f4de24b7271ce055d89acc4",
"extension": "py"... | 2.609375 | stackv2 | from __future__ import print_function
__author__ = 'cpaulson'
import pyKriging
from pyKriging.krige import kriging
from pyKriging.samplingplan import samplingplan
import numpy as np
from random import random
from random import seed
seed(1)
import math
# The Kriging model starts by defining a sampling plan, we use an op... | 152 | 23.22 | 94 | 17 | 1,189 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ef40381071c6dd24_f90730a4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
64
] | [
null
] | [
17
] | [
23
] | |
2024-11-19T02:45:45.321232+00:00 | 1,508,358,032,000 | 19ef6d3c310a26957747c1c1a4a569570b99f3f8 | 2 | {
"blob_id": "19ef6d3c310a26957747c1c1a4a569570b99f3f8",
"branch_name": "refs/heads/master",
"committer_date": 1508358032000,
"content_id": "04ccdf80e91f14a91f112d36e2c76d09b3015342",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f826e41bb05b461c052aadf2e5783ebb35a59f29",
"extension": "py"... | 2.40625 | stackv2 | '''
Kurgan AI Web Application Security Analyzer.
http://www.kurgan.com.br/
Author: Glaudson Ocampos - <glaudson@vortexai.com.br>
Created in May, 11th 2016.
'''
import requests
import config
import sys
import warnings
import validators
sys.path.append('../')
class Target(object):
host = None
method = ''
... | 108 | 23.21 | 88 | 15 | 619 | python | [{"finding_id": "codeql_py/request-without-cert-validation_81d3d711509b27ea_8c70bab2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
86,
88,
94,
96
] | [
null,
null,
null,
null
] | [
17,
17,
17,
17
] | [
70,
71,
83,
84
] | |
2024-11-19T01:57:31.208430+00:00 | 1,560,870,299,000 | 68f61dfc62f2ad6863370c3cbe7790df78a63064 | 2 | {
"blob_id": "68f61dfc62f2ad6863370c3cbe7790df78a63064",
"branch_name": "refs/heads/master",
"committer_date": 1560870299000,
"content_id": "a02f65ec2d617ac2e949309c6bfaa48ccec325aa",
"detected_licenses": [
"MIT"
],
"directory_id": "f683461f9be9ab6dbf5fbef5c8b97fd27e4e1eb3",
"extension": "py",
"fi... | 2.40625 | stackv2 | import paramiko
import os
import sys
import subprocess
import string
hostname = sys.argv[1]
def findtunnel(val):
country = val[:2]
city = val[2:4]
appl_type = val[4:7]
code = val[7:10]
values = (country, city, appl_type, code)
return values
def start_socks(val):
system = findtunnel(val)... | 58 | 31.86 | 148 | 14 | 518 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_0c5857c76238c563_61bde951", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
37
] | [
null
] | [
9
] | [
74
] | |
2024-11-19T02:10:54.835093+00:00 | 1,544,079,507,000 | 9594d7d7de0526f3ad7934abf215a59b95604d50 | 4 | {
"blob_id": "9594d7d7de0526f3ad7934abf215a59b95604d50",
"branch_name": "refs/heads/master",
"committer_date": 1544079507000,
"content_id": "13bd1d3079eedc4393b318bb23fead484708df5e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "79acf393ddb336752b1112649ff09fac026a8ab7",
"extension": "py"... | 3.5625 | stackv2 | # -*- coding:utf-8 -*-
__author__ = 'flybrower'
classmates = ['Michael', 'Bob', 'Tracy']
print(classmates)
print('len(classmates)=', len(classmates))
def print_scores(**kw):
print('-------------score------------')
print('------------------------------')
for name,score in kw.items():
print('%10s %d... | 31 | 23.06 | 49 | 11 | 223 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_339a44312d06c43f_345b3539", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
24
] | [
null
] | [
11
] | [
32
] | |
2024-11-19T02:10:55.059443+00:00 | 1,604,570,610,000 | 4d389e474d4a667aca7b750e3099d61c3c64abd4 | 3 | {
"blob_id": "4d389e474d4a667aca7b750e3099d61c3c64abd4",
"branch_name": "refs/heads/main",
"committer_date": 1604570610000,
"content_id": "dddbf2b50f95a48714b2a4fc6feada95be96371e",
"detected_licenses": [
"MIT"
],
"directory_id": "e0581dd9b228169e5c927a8a349e58a34e228368",
"extension": "py",
"file... | 2.71875 | stackv2 | from flask import Flask, render_template, redirect, request
app = Flask(__name__)
distance = 0.1
@app.route("/")
def home():
global distance
return render_template('test8/page.html', distance=distance)
@app.route("/setdistance", methods=["POST"])
def setdistance():
global distance
distance = fl... | 19 | 22.84 | 64 | 11 | 102 | python | [{"finding_id": "codeql_py/flask-debug_99a434ffc6cca913_8acd59e0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
19,
17
] | [
null,
null
] | [
null,
21
] | [
22,
37
] | |
2024-11-19T02:10:57.696033+00:00 | 1,533,343,194,000 | 89ff2af78b3fa467217570434d644d810c6fbbaa | 3 | {
"blob_id": "89ff2af78b3fa467217570434d644d810c6fbbaa",
"branch_name": "refs/heads/master",
"committer_date": 1533343194000,
"content_id": "75b5903a30320f6dd91d91959870d63044903378",
"detected_licenses": [
"MIT"
],
"directory_id": "00d1d8931d39a6c7614d48814d9e42ed148299b4",
"extension": "py",
"fi... | 2.515625 | stackv2 | #! /usr/bin/env python3
# -*- coding: utf-8 -*-
import json
import os
import sys
import time
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - #
# CREDENTIALS #
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -... | 291 | 31.68 | 79 | 22 | 2,461 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_775f61b1e4d28e6d_e8249726", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
181,
64,
68
] | [
null,
null,
null
] | [
29,
15,
15
] | [
37,
28,
21
] | |
2024-11-19T02:11:20.500204+00:00 | 1,365,119,198,000 | 1251682c8ba6a658d40cf77c92e467d8ffb63b56 | 2 | {
"blob_id": "1251682c8ba6a658d40cf77c92e467d8ffb63b56",
"branch_name": "refs/heads/master",
"committer_date": 1365119198000,
"content_id": "4d780466ea82f31de1db068a212c6850a440a0a2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "87424412559338398bf3cef8976fb447d4e15fe6",
"extension": "py"... | 2.359375 | stackv2 | #!/usr/bin/env python -tt
import base64
import hashlib
import hmac
import random
import re
import time
import urllib2
import urlparse
import string
import OAuthSimpleException
class OAuthSimple:
_secrets = {}
_parameters = {}
_default_signature_method = "HMAC-SHA1"
_action = "GET"
_nonce_charact... | 242 | 35.82 | 77 | 22 | 1,849 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_826bbede8dbb43e9_f28c8c79", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
241
] | [
null
] | [
33
] | [
41
] | |
2024-11-19T02:11:24.652983+00:00 | 1,672,716,953,000 | 1845e53db42624d6ebb947c686465563e1d70a47 | 3 | {
"blob_id": "1845e53db42624d6ebb947c686465563e1d70a47",
"branch_name": "refs/heads/master",
"committer_date": 1672716953000,
"content_id": "8f1b8db52bc6255f2fdee25a508f12370a1e5d99",
"detected_licenses": [
"MIT"
],
"directory_id": "e505c675bdd22acc02e4167ec1b762b36d768a70",
"extension": "py",
"fi... | 2.859375 | stackv2 | import os
from urllib.parse import urlparse, urljoin
import requests
from flask import request, redirect, url_for
from mongoengine import DoesNotExist
def redirect_back(default='blog.index', **kwargs):
"""跳转到请求中指定的地址(或发送请求的页面)
尝试从当前请求的next查询参数以及Referer首部字段中获取要跳转的页面地址,
并对改地址进行安全性校验,next查询参数需要在发送请求时传入。
... | 65 | 27.74 | 110 | 12 | 634 | python | [{"finding_id": "codeql_py/url-redirection_5298339d585e9b10_5b5cde35", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
21
] | [
null
] | [
29
] | [
35
] | |
2024-11-19T02:11:30.283369+00:00 | 1,658,083,637,000 | 62d68754093a7cdec50bb1a7e582ea51c749ac06 | 2 | {
"blob_id": "62d68754093a7cdec50bb1a7e582ea51c749ac06",
"branch_name": "refs/heads/master",
"committer_date": 1658083637000,
"content_id": "b0ecafe241f17661d6ef0b8452056d8b39e47a67",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "da47b025b9250085d8dad72234732d897cd6500c",
"extension": "py"... | 2.421875 | stackv2 | # -*- coding: utf-8 -*-
'''
Module to provide access to the power DNS http API
:configuration: This module uses the pdnaspi python library
parameters as well as configuration settings::
pdns.url: "http://192.168.10.65:8081"
pdns.server_id: "localhost"
pdns.api_key: "f5d2abcd"
This dat... | 231 | 25.41 | 153 | 12 | 1,551 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bc7fee0b798e35d2_562b37a0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
65,
74
] | [
null,
null
] | [
15,
15
] | [
82,
70
] | |
2024-11-19T02:11:41.102288+00:00 | 1,614,449,718,000 | 93be0c48f14c7af4621d3d457e7e0bb0b71169c3 | 2 | {
"blob_id": "93be0c48f14c7af4621d3d457e7e0bb0b71169c3",
"branch_name": "refs/heads/master",
"committer_date": 1614449718000,
"content_id": "189ac1a56e82775c7e68bb5e5436348a7076ac1c",
"detected_licenses": [
"MIT"
],
"directory_id": "306061d814148dc4423a669ddd5ed14ecf369d86",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!/usr/bin/env python3
import sys
from pathlib import Path
from datetime import date
import tempfile
import pprint
import shutil
import click
import toolz.curried as _
import larc.common as __
import larc
import pyperclip
import dateutil.parser
import jinja2
from ruamel.yaml.comments import CommentedMap
log = larc.lo... | 188 | 24.04 | 71 | 19 | 1,138 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fc4ac87a191f438e_ff85f5ae", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
57
] | [
65
] | [
9
] | [
10
] | |
2024-11-19T02:11:41.454829+00:00 | 1,632,150,499,000 | c90c6ead40b897e92d12452365a6ce7566181818 | 3 | {
"blob_id": "c90c6ead40b897e92d12452365a6ce7566181818",
"branch_name": "refs/heads/master",
"committer_date": 1632150499000,
"content_id": "7b7fac4de9f234be032bc0b1765e5619bcdb438e",
"detected_licenses": [
"MIT"
],
"directory_id": "714b57307dc9e6b222f8e4716b60e942e1f1be97",
"extension": "py",
"fi... | 2.53125 | stackv2 | from flask import render_template,redirect,url_for,flash,request
from . import auth
from ..models import User
from .forms import RegistrationForm,LoginForm
from .. import db
from flask_login import login_user,logout_user,login_required
from ..email import mail_message
#View functions
#Login route
@auth.route('/login... | 47 | 35.19 | 119 | 16 | 380 | python | [{"finding_id": "codeql_py/url-redirection_18d1f660c67dbd43_c328932f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
20
] | [
null
] | [
23
] | [
72
] | |
2024-11-19T02:59:25.394027+00:00 | 1,575,454,367,000 | 642cc701e1bddbad85c66b33ca39d0039907b841 | 2 | {
"blob_id": "642cc701e1bddbad85c66b33ca39d0039907b841",
"branch_name": "refs/heads/master",
"committer_date": 1575454367000,
"content_id": "b20fa42d4da95488c2ba339a5ea16da9587b1efa",
"detected_licenses": [
"MIT"
],
"directory_id": "b3a7ef94f7b0d5eb8b7633a758d617147d41cd4d",
"extension": "py",
"fi... | 2.5 | stackv2 | from flask import Flask, request
app = Flask(__name__)
def shutdown_server():
func = request.environ.get('werkzeug.server.shutdown')
if func is None:
raise RuntimeError('Not running with the Werkzeug Server')
func()
@app.route('/')
def authorize():
print(request.args['... | 22 | 22.32 | 74 | 10 | 106 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a497242cfc81d54d_41eb211a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
13
] | [
null
] | [
15
] | [
45
] | |
2024-11-19T02:59:34.093949+00:00 | 1,582,620,092,000 | 841e5e73b6cedc0711cd900c5169aad4f9851e73 | 2 | {
"blob_id": "841e5e73b6cedc0711cd900c5169aad4f9851e73",
"branch_name": "refs/heads/master",
"committer_date": 1582620092000,
"content_id": "7a829b281763ed7b53f5e66c2e5385bda576342a",
"detected_licenses": [
"MIT"
],
"directory_id": "95698d7310c15733d284bdf75de96bffe2a03268",
"extension": "py",
"fi... | 2.359375 | stackv2 | # -*- coding: utf-8 -*-
from flask import Flask, request, Response
import requests
app = Flask(__name__)
BASE_URL = "http://222.221.25.243:6166/"
@app.before_request
def before_request():
request_url = BASE_URL + request.url.split("/")[3]
r = requests.get(request_url)
headers = {
"Access-Control-A... | 19 | 26.79 | 73 | 12 | 140 | python | [{"finding_id": "codeql_py/flask-debug_f71ebb524a788400_d2a2ad29", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
19,
11
] | [
null,
null
] | [
5,
9
] | [
35,
34
] | |
2024-11-19T02:59:48.032588+00:00 | 1,518,728,592,000 | 6480bdfba37da80824031eca0d4d10666427c897 | 3 | {
"blob_id": "6480bdfba37da80824031eca0d4d10666427c897",
"branch_name": "refs/heads/master",
"committer_date": 1518728592000,
"content_id": "b402f06f1652b3c3e4979baf03c6275676778d16",
"detected_licenses": [
"MIT"
],
"directory_id": "a35b557a9cbbd9e2750c50aef6f992093bdba285",
"extension": "py",
"fi... | 3.25 | stackv2 | import serial
import time
from flask import Flask
app = Flask(__name__)
BAUD_RATE = 9600
PORT = '/dev/ttyACM0'
arduino = serial.Serial(PORT, BAUD_RATE)
class Arm():
def __init__(self):
self.servos = [0,0,0,0]
def write(self):
angles = self.servos
msg =''
for ang... | 37 | 20.54 | 63 | 14 | 229 | python | [{"finding_id": "codeql_py/reflective-xss_d001536eb00c5b99_99318e87", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2)."
] | [
34
] | [
null
] | [
12
] | [
64
] | |
2024-11-19T02:59:57.690773+00:00 | 1,470,816,164,000 | b5f9ce2b66cdd079ec29437f2d40a99d77adf8a7 | 3 | {
"blob_id": "b5f9ce2b66cdd079ec29437f2d40a99d77adf8a7",
"branch_name": "refs/heads/master",
"committer_date": 1470816164000,
"content_id": "63d8fe056ee8ded729a13a95888ba881ce6459b7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b3f2ee8d6d335ea857702f98efc988e2d7673ef5",
"extension": "py"... | 2.828125 | stackv2 | import os
import posixpath
import urllib
try:
from cStringIO import StringIO
except ImportError:
from StringIO import StringIO
from jinja2 import Environment, FileSystemLoader
import cgi
import sys
THIS_DIR = os.path.dirname(os.path.abspath(__file__))
class Mixin:
def translate_path(self, path):
"... | 88 | 32.49 | 81 | 17 | 638 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_7305a60da7a02c6f_4c83f051", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
52
] | [
null
] | [
18
] | [
82
] | |
2024-11-19T03:12:10.367265+00:00 | 1,610,069,966,000 | 635895cb73dd8dcd2a36f58b0010bdd3bf8ceb6f | 3 | {
"blob_id": "635895cb73dd8dcd2a36f58b0010bdd3bf8ceb6f",
"branch_name": "refs/heads/master",
"committer_date": 1610069966000,
"content_id": "0b67b654c9bbfe2d29659d5f297fa0c42ebb21bb",
"detected_licenses": [
"MIT"
],
"directory_id": "a02aee2ee8e898ae5d0846e4dd560acab8d786b3",
"extension": "py",
"fi... | 2.515625 | stackv2 | #!/usr/bin/env python
from openpyxl import load_workbook
from pdb import set_trace as debug
import re
import os
from bs4 import BeautifulSoup as bs4
import sys
import logging as log
import traceback
os.chdir(os.path.dirname(os.path.abspath(sys.argv[0])))
log.basicConfig(filename='mailmerge.log',level=log.INFO)
log.inf... | 163 | 31.83 | 177 | 15 | 1,288 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_eb99c82a4ec9caad_09799d6a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
147
] | [
null
] | [
16
] | [
38
] | |
2024-11-19T03:12:12.263582+00:00 | 1,544,789,121,000 | 307bcc9ff4cc2dbf78b6c74bfb5e36a640468614 | 3 | {
"blob_id": "307bcc9ff4cc2dbf78b6c74bfb5e36a640468614",
"branch_name": "refs/heads/master",
"committer_date": 1544789121000,
"content_id": "b6ac16db0438001873c0adffe8df5f96cec72338",
"detected_licenses": [
"MIT"
],
"directory_id": "c8424bd1bf89fac5a654f78d062635f428fa798a",
"extension": "py",
"fi... | 3.171875 | stackv2 | #!/usr/bin/env python3
from PIL import Image
from Crypto.Cipher import AES
from Crypto import Random
from argparse import ArgumentParser
def encrypt_image(image, key, iv=b''):
image_array = bytes(image.tostring())
padding_length = AES.block_size - len(image_array) % AES.block_size
image_array += bytes(pad... | 42 | 37.57 | 170 | 13 | 369 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_9246d9e8dfe3f0db_f6449abd", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ECB](2) is broken or weak, and should not be used."
] | [
16
] | [
null
] | [
23
] | [
47
] | |
2024-11-19T03:12:13.329755+00:00 | 1,638,275,154,000 | 1589caab3ef06681c7e40521c6e42c0db27adc7b | 2 | {
"blob_id": "1589caab3ef06681c7e40521c6e42c0db27adc7b",
"branch_name": "refs/heads/master",
"committer_date": 1638275154000,
"content_id": "27025e7c4fd41155dc9bb818903bff3436acd5b4",
"detected_licenses": [
"MIT"
],
"directory_id": "e89bf0ff1f31b72ba7d7f03ca628896bb9a6627d",
"extension": "py",
"fi... | 2.4375 | stackv2 | #! coding: utf-8
import json
from json import JSONDecodeError
from django.http import JsonResponse, HttpResponseBadRequest
from django.views import View
from django.views.decorators.csrf import csrf_exempt
from series_tiempo_ar import TimeSeriesDataJson
from series_tiempo_ar.validations import get_distribution_errors... | 62 | 34.13 | 77 | 14 | 429 | python | [{"finding_id": "codeql_py/stack-trace-exposure_232d77a25e29531a_2d838f1d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
26
] | [
null
] | [
43
] | [
49
] | |
2024-11-19T03:12:16.134853+00:00 | 1,451,115,394,000 | cda5dc81d1311ff51bcece9fe4744a320c1ecd63 | 3 | {
"blob_id": "cda5dc81d1311ff51bcece9fe4744a320c1ecd63",
"branch_name": "refs/heads/master",
"committer_date": 1451115394000,
"content_id": "b3889c59f05fcdadc11fbd1b60a05124ea1bc2d0",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "7d4559bf78cd1215e16cf9127ae06336a808256d",
"extension": "p... | 2.546875 | stackv2 | import json
from smartmemorizer.word.models import Word
__author__ = 'jackyun'
from flask import Blueprint, render_template, session, request
from flask_login import login_required
from smartmemorizer.extensions import login_manager
from smartmemorizer.user.models import User
import requests as r
from bs4 import Beaut... | 91 | 27.89 | 106 | 17 | 585 | python | [{"finding_id": "codeql_py/partial-ssrf_2dedc16bafdafe29_9880e3ba", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
79
] | [
null
] | [
27
] | [
83
] | |
2024-11-19T03:24:44.148457+00:00 | 1,692,952,916,000 | d945d1dc1d8b94d0fbe12718068b0ffa3ea5ae0a | 2 | {
"blob_id": "d945d1dc1d8b94d0fbe12718068b0ffa3ea5ae0a",
"branch_name": "refs/heads/master",
"committer_date": 1692952916000,
"content_id": "7c222838b1883e74b3650b3c07d7e02e2a842021",
"detected_licenses": [
"MIT"
],
"directory_id": "9ce891fdd998efea19f79dae4ce971f6e2d74528",
"extension": "py",
"fi... | 2.328125 | stackv2 | import json
from typing import Dict, List
from actstream.feeds import ModelJSONActivityFeed
from actstream.models import Action
from cursor_pagination import CursorPaginator
from django.contrib.auth import authenticate, login
from django.http import HttpRequest, HttpResponse, HttpResponseForbidden
from django.urls imp... | 114 | 34.16 | 96 | 16 | 828 | python | [{"finding_id": "codeql_py/stack-trace-exposure_2a6b83a16bcb8460_730d2933", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
107
] | [
null
] | [
42
] | [
43
] | |
2024-11-19T03:24:44.640577+00:00 | 1,565,330,498,000 | 2fd87968f093879aafbf5a080166f3ee1ef62f66 | 3 | {
"blob_id": "2fd87968f093879aafbf5a080166f3ee1ef62f66",
"branch_name": "refs/heads/master",
"committer_date": 1565330498000,
"content_id": "daf9931ce21a978f44562bf8eaed2692b7b8fe91",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3c95972abacdb1556a0df80eecebba2694492865",
"extension": "py"... | 2.546875 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
# Email: chenwx716@163.com
# DateTime: 2016-12-27 23:15:32
__author__ = "chenwx"
import paramiko
class Myssh(object):
"""docstring for Myssh
执行一条命令 | 上传和下载文件/目录
"""
def __init__(
self,
ip,
user,
passwd=None,
keys=None,... | 75 | 26.53 | 87 | 16 | 514 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_cafd6ffffc452d55_2102b290", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
29
] | [
null
] | [
9
] | [
71
] | |
2024-11-19T01:26:55.652022+00:00 | 1,606,683,567,000 | 82859c69c6ba4379b50724c7bacd18dd7becd1c9 | 3 | {
"blob_id": "82859c69c6ba4379b50724c7bacd18dd7becd1c9",
"branch_name": "refs/heads/master",
"committer_date": 1606683567000,
"content_id": "cd20de4a7fccfa6e423b9ecc07a3550959a850a6",
"detected_licenses": [
"MIT"
],
"directory_id": "98fa3991640a6bd426ed0b8cd8ee830b26e32930",
"extension": "py",
"fi... | 2.890625 | stackv2 | from django_date_extensions.fields import ApproximateDate
from rest_framework import serializers
class ApproximateDateSerializerField(serializers.Field):
"""
Date objects are serialized to an ApproximateDate object.
"""
def to_representation(self, value):
return str(value)
def to_internal... | 31 | 28.55 | 67 | 14 | 212 | python | [{"finding_id": "codeql_py/stack-trace-exposure_a45c7b7e36bd29d4_43e70002", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
31
] | [
null
] | [
47
] | [
50
] | |
2024-11-19T01:37:33.738469+00:00 | 1,610,515,345,000 | b56611f2f1b07e18accee31f502c224460440e95 | 4 | {
"blob_id": "b56611f2f1b07e18accee31f502c224460440e95",
"branch_name": "refs/heads/main",
"committer_date": 1610515345000,
"content_id": "2623ea35c2b47cbdcd40d05ab6f743c753107ec8",
"detected_licenses": [
"MIT"
],
"directory_id": "fc9555f80430b3c1038ff27912ef5f16491738e8",
"extension": "py",
"file... | 4.1875 | stackv2 | #%%
pythin_is_cool = True
java_is_cool = False
empty_list = []
secret_value = 3.14
print('Python and Java are both cool: {}'.format(pythin_is_cool and java_is_cool))
print('secret value and python is cool: {}'.format(secret_value and pythin_is_cool))
# %%
statement = False
if statement:
print('statement is True')... | 43 | 16.86 | 84 | 9 | 212 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_56b700e9c9f59832_f9a8e86f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
8
] | [
null
] | [
7
] | [
84
] | |
2024-11-19T01:37:33.861801+00:00 | 1,670,512,794,000 | aa0dde2fa582e2417da13299096c801968a6c935 | 3 | {
"blob_id": "aa0dde2fa582e2417da13299096c801968a6c935",
"branch_name": "refs/heads/master",
"committer_date": 1670512794000,
"content_id": "bb62b657bd28a3de08de096ff38585ac3a7c651d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e5aa5e735d53967862f3cac9ae71640dc85fa498",
"extension": "py"... | 2.90625 | stackv2 | def merge(dbag, data):
search(dbag, data['mac_address'])
# A duplicate ip address wil clobber the old value
# This seems desirable ....
if "add" in data and data['add'] is False and "ipv4_adress" in data:
if data['ipv4_adress'] in dbag:
del (dbag[data['ipv4_adress']])
return ... | 26 | 28 | 72 | 13 | 207 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4f9544ff0d7efd0a_e544452c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text."
] | [
22
] | [
null
] | [
15
] | [
62
] | |
2024-11-19T01:37:38.472559+00:00 | 1,562,953,121,000 | 4a9a263e558a3d1b5de363eaa2115aa03ab2e3b9 | 3 | {
"blob_id": "4a9a263e558a3d1b5de363eaa2115aa03ab2e3b9",
"branch_name": "refs/heads/master",
"committer_date": 1562953121000,
"content_id": "7f0aa7a6253f1ac9568e51a266e6f79743960320",
"detected_licenses": [
"MIT"
],
"directory_id": "893d0839b8558948a3dc7a5353493f783f769964",
"extension": "py",
"fi... | 2.609375 | stackv2 | from tkinter import *
import sqlite3
import hashlib
root = Tk()
root.title("Login")
width = 400
height = 300
screen_width = root.winfo_screenwidth()
screen_height = root.winfo_screenheight()
x = (screen_width/2) - (width/2)
y = (screen_height/2) - (height/2)
root.geometry("%dx%d+%d+%d" % (width, height, x, y))
ro... | 186 | 30.55 | 154 | 19 | 1,820 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_448e67a3e15a64fb_0817c972", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
52,
127,
170
] | [
null,
null,
null
] | [
23,
25,
27
] | [
52,
55,
57
] | |
2024-11-19T01:37:56.614644+00:00 | 1,482,938,747,000 | 85a2d40f22f560fbf378b02f689afc1e69f647d2 | 3 | {
"blob_id": "85a2d40f22f560fbf378b02f689afc1e69f647d2",
"branch_name": "refs/heads/master",
"committer_date": 1482938747000,
"content_id": "7a9855979886ddfb74d4882de332d5662a8ce070",
"detected_licenses": [
"MIT"
],
"directory_id": "81dfc5e875ac18e531b0582399901eab4e555cdd",
"extension": "py",
"fi... | 2.546875 | stackv2 | # coding: utf8
import logging
import random
import sys
from jinja2 import Template
from kalliope.core import OrderListener
from kalliope.core import OrderAnalyser
from kalliope.core.SynapseLauncher import SynapseLauncher
from kalliope.core.Utils.Utils import Utils
from kalliope.core.ConfigurationManager import Settin... | 251 | 36.7 | 127 | 16 | 2,025 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_06dd3ee5f4134905_c5a9b8f1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
167,
178
] | [
null,
null
] | [
13,
13
] | [
40,
72
] | |
2024-11-19T01:38:05.322711+00:00 | 1,496,483,916,000 | 6a13c2eb9e1295a8711c95b453a7a18e7f707c92 | 3 | {
"blob_id": "6a13c2eb9e1295a8711c95b453a7a18e7f707c92",
"branch_name": "refs/heads/master",
"committer_date": 1496483916000,
"content_id": "3dcb1d84cb101cb92d3287654098431c893ea15f",
"detected_licenses": [
"MIT"
],
"directory_id": "fc0cf151b2f5df4fe522de0c4bc9115d847f3cab",
"extension": "py",
"fi... | 3.171875 | stackv2 | import base64
import hashlib
from Crypto import Random
from Crypto.Cipher import AES
class AESCipher(object):
"""
Cryptage AES, Rijndael
Peut utiliser n'importe quelle taille de donnees et taille de mot de passe grace au padding
On manipule en octet pour garantir l'integrite des donnees
Taille(s)... | 65 | 35.18 | 105 | 18 | 670 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_7242c642074e98e2_e53d59b9", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 4 | true | [
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
46,
52,
58,
64
] | [
null,
null,
null,
null
] | [
38,
28,
38,
28
] | [
57,
64,
57,
64
] | |
2024-11-19T01:38:11.785707+00:00 | 1,415,740,638,000 | 59637d35afd656fbb0e30461e2e300fed2995855 | 2 | {
"blob_id": "59637d35afd656fbb0e30461e2e300fed2995855",
"branch_name": "refs/heads/master",
"committer_date": 1415740638000,
"content_id": "35bb83f1957bcf32e275454c6111b19a75cf5dd2",
"detected_licenses": [
"MIT"
],
"directory_id": "9858af300456cbd98cf2f3a4bd622f2499deeab6",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/python
'''
Adapted from simple mjpeg stream server (Igor Maculan - n3wtron@gmail.com)
'''
from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer
from lawsoncam import LawsonCamera
import keyboard
import SocketServer
import os
import sys
import mimetypes
sitedir = os.path.dirname(os.path.realpat... | 108 | 27.76 | 143 | 17 | 697 | python | [{"finding_id": "codeql_py/http-response-splitting_9db210323c948ef7_ea40381b", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).", "remediation": "", "lo... | 2 | true | [
"CWE-113",
"CWE-022"
] | [
"py/http-response-splitting",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This HTTP header is constructed from a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
24,
86
] | [
null,
null
] | [
42,
23
] | [
53,
42
] | |
2024-11-19T01:38:11.827200+00:00 | 1,580,674,373,000 | 99f788f1b41c3d28896469288fc591b2f9694f04 | 4 | {
"blob_id": "99f788f1b41c3d28896469288fc591b2f9694f04",
"branch_name": "refs/heads/master",
"committer_date": 1580674373000,
"content_id": "4611bdea4a068cab811abbd598f6bcbb54833161",
"detected_licenses": [
"MIT"
],
"directory_id": "a0562f9d12f4ff527bb9112f512f1aa8fc45571a",
"extension": "py",
"fi... | 3.5625 | stackv2 | import string
import random
def password(userInput):
specialCharacter = [random.choice(string.punctuation) for character in range(userInput)]
wordLower = [random.choice(string.ascii_lowercase) for lower in range(userInput)]
wordUpper = [random.choice(string.ascii_uppercase) for upper in range(userInput)]
... | 16 | 43 | 95 | 11 | 144 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8f2e1b479b67680d_73315060", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
16
] | [
null
] | [
7
] | [
13
] | |
2024-11-19T01:38:26.901753+00:00 | 1,676,139,610,000 | 69a2e540a3c6aa321a01db687a69a48363fda7b3 | 2 | {
"blob_id": "69a2e540a3c6aa321a01db687a69a48363fda7b3",
"branch_name": "refs/heads/master",
"committer_date": 1676139610000,
"content_id": "fd17e21b2673697f3e9d8215fbd85ff73749aa68",
"detected_licenses": [
"MIT"
],
"directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
Usage:
dayone-to-b3.py [options]
Options:
-p, --path=<path> top directory of your blog. [default: .]
"""
from bucket3 import b3tools
import plistlib
import os
from docopt import docopt
import re
import unidecode
import shutil
def slugify(str):
# Credit: http:... | 119 | 24.9 | 91 | 15 | 786 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_08763fdb6f3aae83_7b12accb", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
106
] | [
null
] | [
21
] | [
40
] | |
2024-11-19T01:38:46.672337+00:00 | 1,511,999,316,000 | 8055fd2a86dfcec2976bd490ab869aa1ddde2ac8 | 3 | {
"blob_id": "8055fd2a86dfcec2976bd490ab869aa1ddde2ac8",
"branch_name": "refs/heads/master",
"committer_date": 1511999316000,
"content_id": "3d77379477ae721ca09f239f7f0257e2ccbd5ee9",
"detected_licenses": [
"MIT"
],
"directory_id": "235d1ba278f62e73d40eb61d3d7627ce332847b3",
"extension": "py",
"fi... | 2.75 | stackv2 | import paramiko, os, time
from paramiko_server import ParamikoServer
from process import SingleCPUProcess
known_localhosts = ['sacagawea', 'shackleton']
class OSDCProcess(SingleCPUProcess):
def __init__(self, pid, logfile):
super(OSDCProcess, self).__init__(logfile)
self.pid = pid
def is_runn... | 123 | 47.26 | 144 | 23 | 1,240 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_57adfe6775ded588_626ad96c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
70
] | [
null
] | [
13
] | [
73
] | |
2024-11-19T01:39:03.036075+00:00 | 1,637,350,974,000 | 56028707a88a8d590a80ef9632af061f7f5ab615 | 2 | {
"blob_id": "56028707a88a8d590a80ef9632af061f7f5ab615",
"branch_name": "refs/heads/master",
"committer_date": 1637350974000,
"content_id": "f775c8066ca8f52d20722541d030deafa4f6ae13",
"detected_licenses": [
"MIT"
],
"directory_id": "dd7c7ad89512ce333c8abb1140a980ce649966ef",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/python3
import subprocess
import cgi
print("content-type: text/html")
print()
mydata = cgi.FieldStorage()
myx = mydata.getvalue("c")
myy = mydata.getvalue("d")
if myx == str(1):
output = subprocess.getoutput("sudo date")
print(output)
elif myx == str(2):
output = subprocess.getoutput("sudo cal... | 46 | 24.65 | 68 | 11 | 304 | python | [{"finding_id": "codeql_py/command-line-injection_6b20b9476985bacc_eac59379", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 1 | true | [
"CWE-078"
] | [
"py/command-line-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1)."
] | [
45
] | [
null
] | [
35
] | [
48
] | |
2024-11-19T01:52:11.775880+00:00 | 1,636,420,316,000 | 5f5d21ff8bafa7e47ebba69ce89dcf81fea400fa | 2 | {
"blob_id": "5f5d21ff8bafa7e47ebba69ce89dcf81fea400fa",
"branch_name": "refs/heads/master",
"committer_date": 1636420316000,
"content_id": "f65dc650cb5cf27c84c10b0e1f00a86af27845a4",
"detected_licenses": [
"MIT"
],
"directory_id": "026b5d36a9ea7ce0f75421af5bc840a83022cb54",
"extension": "py",
"fi... | 2.359375 | stackv2 | """Log out handler (``/logout``)."""
from __future__ import annotations
from typing import Optional
from fastapi import APIRouter, Depends, status
from fastapi.responses import RedirectResponse
from gafaelfawr.dependencies.context import RequestContext, context_dependency
from gafaelfawr.dependencies.return_url imp... | 48 | 30.71 | 78 | 12 | 325 | python | [{"finding_id": "codeql_py/url-redirection_20999139c1b5055c_c6b047df", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
48
] | [
null
] | [
29
] | [
39
] | |
2024-11-19T01:52:15.746904+00:00 | 1,535,029,765,000 | f0a688c71bdc701c9669041ddca18767dc36b028 | 2 | {
"blob_id": "f0a688c71bdc701c9669041ddca18767dc36b028",
"branch_name": "refs/heads/master",
"committer_date": 1535029765000,
"content_id": "9d48c99675a0b0736fa9f35616c5c4e3e87257c0",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "1843fd5ccb4377240e664acd21ba5a9369eca2ab",
"extension": "p... | 2.328125 | stackv2 | import re
import logging
from rest_framework import generics
from rest_framework import response
from rest_framework import status
from bluebottle.payments_logger.models import PaymentLogLevels, PaymentLogEntry
logger = logging.getLogger(__name__)
# TODO: limit status change notifications to docdata IPs
class Generi... | 54 | 41.67 | 109 | 17 | 468 | python | [{"finding_id": "codeql_py/log-injection_4ead937853c074d9_03c4f51c", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
30
] | [
31
] | [
21
] | [
34
] | |
2024-11-19T02:04:25.416448+00:00 | 1,571,747,860,000 | 8b4c149989f520e95a86dad46f2e70e82197509f | 3 | {
"blob_id": "8b4c149989f520e95a86dad46f2e70e82197509f",
"branch_name": "refs/heads/master",
"committer_date": 1571747860000,
"content_id": "d1c0c2cf5348495c3bdcf64e8f64ab4804514c0b",
"detected_licenses": [
"MIT"
],
"directory_id": "35b5f9f5f17cb4fae997d83a05d402a4e0ef8efc",
"extension": "py",
"fi... | 2.953125 | stackv2 | # coding:utf8
# -*- coding: UTF-8 -*-
# from Crypto.
#
# (public_key, private_key) = rsa.newkeys(1024)
# print(chr(10)+"公钥:")
# print(public_key.save_pkcs1())
# print(chr(10)+"公钥:")
# print(public_key.save_pkcs1())
from Crypto.PublicKey import RSA
from Crypto import Random
from Crypto.Cipher import PKCS1_v1_5 as PKCS... | 95 | 22.57 | 82 | 15 | 676 | python | [{"finding_id": "codeql_py/weak-crypto-key_5e098030ad280611_a948e771", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
25
] | [
null
] | [
11
] | [
47
] | |
2024-11-19T02:04:30.002257+00:00 | 1,600,753,561,000 | b4bfa826051c9096c111df25eafc7ea9327b449f | 2 | {
"blob_id": "b4bfa826051c9096c111df25eafc7ea9327b449f",
"branch_name": "refs/heads/master",
"committer_date": 1600753561000,
"content_id": "8235e88e7a6ed3738f1d1bd85971a1b72e0919dd",
"detected_licenses": [
"MIT"
],
"directory_id": "3224d39151fcea2a70df2ecb7b506545da885db0",
"extension": "py",
"fi... | 2.359375 | stackv2 | from flask import Flask, request
import json
import requests
from flask_sqlalchemy import SQLAlchemy
import os
import praw
app = Flask(__name__)
app.config['SQLALCHEMY_DATABASE_URI'] = os.environ['DATABASE_URL']
db = SQLAlchemy(app)
reddit = praw.Reddit(client_id='*******',
client_secret='********... | 219 | 35.53 | 157 | 23 | 1,595 | python | [{"finding_id": "codeql_py/reflective-xss_1995a3bb88897821_a81d8d54", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
45
] | [
null
] | [
16
] | [
53
] | |
2024-11-19T02:04:54.796522+00:00 | 1,502,028,161,000 | fa45b064f6cf37bf868a13b91ea6254041836dec | 3 | {
"blob_id": "fa45b064f6cf37bf868a13b91ea6254041836dec",
"branch_name": "refs/heads/master",
"committer_date": 1502028161000,
"content_id": "1173e393d5e26688cf1d522305bd0bd069c0db79",
"detected_licenses": [
"MIT"
],
"directory_id": "0da9c7045daf3ee6591ca3ac3b8e0c27c7f2c884",
"extension": "py",
"fi... | 2.796875 | stackv2 | from flask import Flask, url_for, request, render_template
app = Flask(__name__)
TODOS = {
'todo1': {'task': 'build an API'},
'todo2': {'task': '?????'},
'todo3': {'task': 'profit!'},
}
@app.route('/')
def index():
return 'Index Page'
@app.route('/hello')
def hello_world():
return 'hello, wor... | 51 | 21.67 | 75 | 14 | 284 | python | [{"finding_id": "codeql_py/reflective-xss_939afe6416803f49_31f982ed", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
39,
44
] | [
null,
null
] | [
12,
12
] | [
32,
31
] | |
2024-11-19T02:04:55.780995+00:00 | 1,634,919,988,000 | 689b0a14f2e56add5b95a4ecc23a21a00020739a | 2 | {
"blob_id": "689b0a14f2e56add5b95a4ecc23a21a00020739a",
"branch_name": "refs/heads/main",
"committer_date": 1634919988000,
"content_id": "649744ab49b44c1f562d2650c2c8d57fc2e7e58b",
"detected_licenses": [
"MIT"
],
"directory_id": "c73165911c1e9f62178376ae1e860f42bdaf74f6",
"extension": "py",
"file... | 2.46875 | stackv2 | # -*- coding:utf-8 -*-
from rest_framework import serializers
from cmdb.models import Model, Field, Value
from cmdb.tools.field import validate_field_value
class ValueModelSerializer(serializers.ModelSerializer):
"""
模型实例值 Model Serializer
"""
model = serializers.SlugRelatedField(slug_field='code', q... | 57 | 33.51 | 105 | 17 | 446 | python | [{"finding_id": "codeql_py/stack-trace-exposure_5c638cfdc9f1c284_d385bde2", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
29
] | [
null
] | [
47
] | [
66
] | |
2024-11-19T02:28:06.556969+00:00 | 1,548,858,528,000 | 2a296839a5538ba27f6b2c4b8c61d9265eac9edb | 3 | {
"blob_id": "2a296839a5538ba27f6b2c4b8c61d9265eac9edb",
"branch_name": "refs/heads/master",
"committer_date": 1548858528000,
"content_id": "2beb1a3226aaea2f335f070d065054124b98ad02",
"detected_licenses": [
"MIT"
],
"directory_id": "bb92a6655e286e16ef444275d5c198e61c589796",
"extension": "py",
"fi... | 2.59375 | stackv2 | from app import db
from app.models import User
from wtforms.validators import HostnameValidation, ValidationError
import re
class ExistsInDb(object):
def __init__(self, query, message=None):
self.message = message
self.query = query
def __call__(self, form, field):
if not field.data:
... | 88 | 29.92 | 93 | 19 | 629 | python | [{"finding_id": "codeql_py/redos_9ed35353b63fbb8e_3876b388", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\013'."
] | [
61
] | [
null
] | [
14
] | [
89
] | |
2024-11-19T02:28:22.143883+00:00 | 1,600,962,245,000 | 80c34f1e39cc6d9fe18d892e3bdf3c908a0a712b | 3 | {
"blob_id": "80c34f1e39cc6d9fe18d892e3bdf3c908a0a712b",
"branch_name": "refs/heads/master",
"committer_date": 1600962245000,
"content_id": "f5c1be3152b562abfd0d1101a75d5624b3595a4a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "81d86085466a07b214599d682703de27271a0a96",
"extension": "py"... | 3.0625 | stackv2 | #!/usr/bin/python
import argparse, os
#Define list which we'll use to write to file
output = []
listgroupmembers = []
listUserDetails = []
try:
#Get file to parse from the command line
parser = argparse.ArgumentParser()
parser.add_argument("--spnfile", help="list of cracked spns to parse")
#Add option to be able... | 110 | 31.09 | 117 | 25 | 926 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_988d03bed89fb48a_697220f6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
84
] | [
null
] | [
10
] | [
12
] | |
2024-11-19T02:28:27.184563+00:00 | 1,555,244,625,000 | 95e58bd162a6bbe846359e914a3eb7d78dd6a8b5 | 3 | {
"blob_id": "95e58bd162a6bbe846359e914a3eb7d78dd6a8b5",
"branch_name": "refs/heads/master",
"committer_date": 1555244625000,
"content_id": "b54f72a3bf262bbce986bc1a2317d0fee9d638fb",
"detected_licenses": [
"MIT"
],
"directory_id": "5f4e74dea049171e49c3ea26029db4d9c9d210d3",
"extension": "py",
"fi... | 2.734375 | stackv2 | #!/usr/bin/env python
# encoding=utf8
import requests
import time
import sys
import re
import shutil
import hashlib
import multiprocessing as mp
import subprocess as sp
def download_ipdb(url, path):
response = requests.get(url, verify=False)
etag_value = response.headers.get("ETag")
current_time = time.s... | 105 | 27.37 | 117 | 13 | 806 | python | [{"finding_id": "codeql_py/request-without-cert-validation_27846d1249bcdfcb_50443249", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
15
] | [
null
] | [
16
] | [
47
] | |
2024-11-19T02:28:34.059965+00:00 | 1,615,294,948,000 | d03c8e2ec8b3c6c2c2fffc91da20cb1a46524d09 | 3 | {
"blob_id": "d03c8e2ec8b3c6c2c2fffc91da20cb1a46524d09",
"branch_name": "refs/heads/main",
"committer_date": 1615294948000,
"content_id": "d7d6a8a1fa70c67d2c56354349937c584ce10f88",
"detected_licenses": [
"MIT"
],
"directory_id": "f19d3d25201321731bbc2c5c8f10e5b11504497d",
"extension": "py",
"file... | 2.703125 | stackv2 | import pymysql
from flask import Flask, g, make_response, jsonify, request, redirect
app = Flask(__name__)
MYSQL_SETTINGS = {
'host': '81.70.46.54',
'user': 'root',
'password': 'root',
'database': 'flaskDemo',
'charset': 'utf8',
'port': 3306
}
@app.before_request
def first_request():
# 连... | 84 | 26.95 | 133 | 14 | 660 | python | [{"finding_id": "codeql_py/sql-injection_40a236c3612a410d_e83bc66e", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
73
] | [
null
] | [
17
] | [
20
] | |
2024-11-19T02:28:51.762129+00:00 | 1,691,917,754,000 | e2ef1c75776b9f7834b302970bf7a9a19d4286af | 2 | {
"blob_id": "e2ef1c75776b9f7834b302970bf7a9a19d4286af",
"branch_name": "refs/heads/master",
"committer_date": 1691917754000,
"content_id": "2cc9f28845843e88370aad12e0d801d001324901",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "430e0675c6c12a45fde01e8ae1d558db62963ff9",
"extension": "p... | 2.359375 | stackv2 | import re,sys,os
from os import listdir
import thread
newsUrlRegex='http://timesofindia.indiatimes.com/[^<]*/articleshow/\d+.cms'
if len(sys.argv)<2:
print 'Please provide toi html files directory'
sys.exit(1)
mypath=sys.argv[1]
print 'Finding news urls...'
onlyfiles = [ os.path.join(mypath,f) for f in listdir(myp... | 25 | 27.52 | 75 | 16 | 210 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_754528ee5e0c49d4_14633324", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This string, which is used as a regular expression [here](1), has an unescaped '.' before 'indiatimes.com/', so it might match more hosts than expected."
] | [
5
] | [
null
] | [
15
] | [
75
] | |
2024-11-19T02:37:03.883560+00:00 | 1,601,236,072,000 | 1c95d3bf196a4639d3a8d252c8801a301528046b | 4 | {
"blob_id": "1c95d3bf196a4639d3a8d252c8801a301528046b",
"branch_name": "refs/heads/master",
"committer_date": 1601236105000,
"content_id": "7c72135f15173d26f8033ebe95aecb10632a000d",
"detected_licenses": [
"MIT"
],
"directory_id": "56a64c8fbd031b9c45117c5ca3169cff2a9927ca",
"extension": "py",
"fi... | 3.859375 | stackv2 | class MyList(list):
def __getitem__(self, index):
if index == 0:
raise ValueError("Invalid index")
index = index - 1
return list.__getitem__(self, index)
def __setitem__(self, index, val):
if index == 0:
raise ValueError("Invalid index")
index = i... | 51 | 26.29 | 78 | 12 | 406 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0a366470fb2c31e2_7205eda1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
44,
48
] | [
null,
null
] | [
7,
7
] | [
12,
12
] | |
2024-11-19T02:37:15.774086+00:00 | 1,566,391,511,000 | 9814496d6a06e2faf70b237595e9c5486a75b2ad | 2 | {
"blob_id": "9814496d6a06e2faf70b237595e9c5486a75b2ad",
"branch_name": "refs/heads/master",
"committer_date": 1566391511000,
"content_id": "135150f60b92b35b83a86d6c4ee5bfaa87dc991a",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "e80ebd0a68675236090de4294744594d5591e639",
"extension": "p... | 2.421875 | stackv2 | import base64
from Crypto.Cipher import PKCS1_v1_5
from Crypto.PublicKey import RSA
import gatlin.config.configLocation as loc
PRIVATE_KEY = 0
PUBLIC_KEY = 0
# 废弃,用于生成RSA密钥对
def create_rsa_key():
key = RSA.generate(1024)
encrypted_key = key.exportKey(pkcs=8, protection="scryptAndAES128-CBC")
# encrypte... | 54 | 26.39 | 84 | 13 | 455 | python | [{"finding_id": "codeql_py/weak-crypto-key_8870b3485eefcd73_dcfb39ee", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
14
] | [
null
] | [
11
] | [
29
] | |
2024-11-19T02:37:19.178779+00:00 | 1,476,684,279,000 | b3151c8a237141f433bc53599be887f913d5f785 | 2 | {
"blob_id": "b3151c8a237141f433bc53599be887f913d5f785",
"branch_name": "refs/heads/master",
"committer_date": 1476684279000,
"content_id": "30fe0d0811b23fe5d9e27a54b2303d96351b11b9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a6cd85c3e33f6b19a92cf03f0c198f7bcf0ef7b1",
"extension": "py"... | 2.421875 | stackv2 | #!/usr/bin/env python
# Name: utils.py
# Time:8/19/16 3:38 PM
# Author:luo1fly
import time, hashlib, json, datetime
from hosts import models as hosts_models
from django.shortcuts import render, HttpResponse
from AntiMagic import settings
from django.core.exceptions import ObjectDoesNotExist
import redis
# import custo... | 91 | 32.32 | 97 | 22 | 699 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_ce4afb739384604d_b88dd46b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure."
] | [
31
] | [
null
] | [
16
] | [
43
] | |
2024-11-19T02:37:23.816150+00:00 | 1,566,726,046,000 | e830b51b20ad06a167219927543ccba48eac25f2 | 3 | {
"blob_id": "e830b51b20ad06a167219927543ccba48eac25f2",
"branch_name": "refs/heads/master",
"committer_date": 1566726046000,
"content_id": "30a8d339ec3b37c6a193f54f95b1888a50ca6839",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "12e4f33887ade554ea7841174b288bec56ff7d59",
"extension": "py"... | 3.265625 | stackv2 | # Stdlib imports
try:
import urlparse
except ImportError:
import urllib.parse as urlparse
def weather_is_twitter_link(link):
"""
Example: https://twitter.com/bomalkevych/status/1074683558084706305
returns weather link is Twitter link to status
:param link: (str)
:return: (Boolean)
"""... | 48 | 20.1 | 71 | 13 | 259 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_7db74166a2c5db35_0fc9df1a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [twitter.com/](1) may be at an arbitrary position in th... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [twitter.com/](1) may be at an arbitrary position in the sanitized URL."
] | [
17
] | [
null
] | [
12
] | [
34
] | |
2024-11-19T02:37:43.383172+00:00 | 1,481,602,084,000 | b37dc6d47a41bf339224078b89b4f27845f3c44e | 3 | {
"blob_id": "b37dc6d47a41bf339224078b89b4f27845f3c44e",
"branch_name": "refs/heads/master",
"committer_date": 1481602084000,
"content_id": "22030e6ae21cdbc2aba6d82e68ef0b43db76398e",
"detected_licenses": [
"MIT"
],
"directory_id": "d96fcfe30ca6bea2ca950343852369599b2bfa7f",
"extension": "py",
"fi... | 2.765625 | stackv2 | #!/usr/bin/env python
import os
import sys
import youtube_dl
import requests
import shutil
import urllib
import json
from bs4 import BeautifulSoup
from Tkinter import Tk
from tkFileDialog import askopenfilename
Tk().withdraw()
yt_fmt = u"%(title)s-%(id)s.%(ext)s"
def yt_search(query):
query = urllib.quote(quer... | 173 | 32.52 | 158 | 25 | 1,169 | python | [{"finding_id": "codeql_py/overly-permissive-file_fce22c88a7bd19cc_e0f2b010", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
152
] | [
null
] | [
17
] | [
59
] | |
2024-11-19T02:49:15.658208+00:00 | 1,622,189,348,000 | 033fa36eb36f57a5bdc19f492d6b6e62ce4da0d4 | 2 | {
"blob_id": "033fa36eb36f57a5bdc19f492d6b6e62ce4da0d4",
"branch_name": "refs/heads/master",
"committer_date": 1622189348000,
"content_id": "075b5d53b28240ab4f0dcc3a8ab455d1a99222a1",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "19542506a2bd4594c712064314444e94d1ad48cf",
"extension": "p... | 2.484375 | stackv2 | import functools
import time
import traceback as tb
from abc import abstractmethod
from fastapi.responses import ORJSONResponse
from Utils.Exceptions import DAGAbortException, CustomException
class InterfaceResult:
def __init__(self, _mock_result):
self.interface_result = _mock_result
self.start... | 84 | 27.67 | 73 | 17 | 516 | python | [{"finding_id": "codeql_py/stack-trace-exposure_b34fd059286bc630_77d7be4a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
49
] | [
54
] | [
31
] | [
10
] | |
2024-11-19T02:49:22.855816+00:00 | 1,575,900,635,000 | e1fa38629cd7031f9ac6c9f3f574b6b86385c35a | 3 | {
"blob_id": "e1fa38629cd7031f9ac6c9f3f574b6b86385c35a",
"branch_name": "refs/heads/master",
"committer_date": 1575900635000,
"content_id": "a48e5d2c29f073c006e99e4654215ac64fef4901",
"detected_licenses": [
"MIT"
],
"directory_id": "878279e33352576fa16ae9956b1092ea214c753e",
"extension": "py",
"fi... | 3.1875 | stackv2 | import pandas as pd
import os
import re
# fonte das funções dms2dd e parse_dms: https://en.proft.me/2015/09/20/converting-latitude-and-longitude-decimal-values-p/
def dms2dd(degrees, minutes, seconds, direction):
dd = float(degrees) + float(minutes)/60 + float(seconds)/(60*60);
if direction == 'S' or direction... | 101 | 32.77 | 122 | 17 | 1,003 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6fbce38453f9bffa_a3a16dfa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
81,
81
] | [
null,
null
] | [
11,
16
] | [
14,
19
] | |
2024-11-19T03:00:08.666195+00:00 | 1,537,026,353,000 | ed675934c35161fbf08c4b15f661a0f95175e3f6 | 2 | {
"blob_id": "ed675934c35161fbf08c4b15f661a0f95175e3f6",
"branch_name": "refs/heads/master",
"committer_date": 1537026353000,
"content_id": "c3479363b5c8c21f1e5dfe5f4d476e888ca2094e",
"detected_licenses": [
"MIT"
],
"directory_id": "02c16e1e6c7985779a6cf0726d34584026b8b8d6",
"extension": "py",
"fi... | 2.5 | stackv2 | # -*- coding: utf-8 -*-
"""
Module Docstring
"""
from subprocess import Popen, PIPE
import requests
import os
from datetime import datetime
import base64
__author__ = "Sean Douglas"
__version__ = "0.1.0"
__license__ = "MIT"
class EspeakToMe:
def __init__(self, espeak_path: str=None, word_gap: int=10, wpm: int=1... | 80 | 38.96 | 148 | 17 | 816 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4a95aa6737319d70_c6b0b40d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
75
] | [
null
] | [
21
] | [
22
] | |
2024-11-19T03:00:29.073922+00:00 | 1,521,583,841,000 | 12b6b273b92ac57cd29e2ac5f2d3d9c53dffae28 | 2 | {
"blob_id": "12b6b273b92ac57cd29e2ac5f2d3d9c53dffae28",
"branch_name": "refs/heads/master",
"committer_date": 1521583841000,
"content_id": "575c988d24ea277a48c424ba4bb052c27fd07995",
"detected_licenses": [
"MIT"
],
"directory_id": "2aeb02fc9ad9cd053e30481027731e76bc015beb",
"extension": "py",
"fi... | 2.40625 | stackv2 |
from io import open
import urllib2
from bs4 import BeautifulSoup
import re
import urlparse
import time
import numpy as np
class Get(object):
def __init__(self):
self.tag = set()
self.links = set()
def iniPar(self, url) :
# proxies = {'http':'http://10.10.10.10:8765','h... | 78 | 48.42 | 160 | 21 | 943 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_e7289a30ccbb13a5_bd5bcf44", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'douban.com/subject', so it might ma... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'douban.com/subject', so it might match more hosts than expected."
] | [
54
] | [
null
] | [
99
] | [
138
] | |
2024-11-19T03:11:21.123469+00:00 | 1,601,574,273,000 | 347135aefffbfb1fb86da204ab618fe48da452c1 | 3 | {
"blob_id": "347135aefffbfb1fb86da204ab618fe48da452c1",
"branch_name": "refs/heads/main",
"committer_date": 1601574273000,
"content_id": "aecb8da6f5c7361ee9d4918a0be6b89d764dd740",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "470c67e99ef67b27a653ff6f80b458992a3e2a35",
"extension": "py",
... | 2.65625 | stackv2 | #!/usr/bin/env python3
import os, re, pyyoutube, jinja2, urllib.request, requests, json
from jinja2 import Template
API_KEY = os.environ["API_KEY"]
EPISODES_PATH = os.environ["EPISODES_PATH"]
IMAGES_REL_PATH = os.environ["IMAGES_REL_PATH"]
IMG_PATH_PREFIX = os.environ["IMG_PATH_PREFIX"]
PLAYLIST_ID = os.environ["PLAY... | 86 | 35.71 | 103 | 20 | 736 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_decfcd58e703ff51_87265c8f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-079"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
62,
64,
69
] | [
null,
null,
null
] | [
19,
19,
19
] | [
63,
83,
60
] | |
2024-11-19T03:11:25.902616+00:00 | 1,557,915,337,000 | 748257a06d261fe0e13fad4aab649b90c6ce6c1e | 4 | {
"blob_id": "748257a06d261fe0e13fad4aab649b90c6ce6c1e",
"branch_name": "refs/heads/master",
"committer_date": 1557915337000,
"content_id": "30b9e60149c9b5584d6bed6e04551c63b6d04749",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "95ed2db830126aa61d318c036654bb20ac8f49f9",
"extension": "py"... | 4.125 | stackv2 | """
Author: shikechen
Function: def password class
Version: 5.0
Date: 2019/2/7
"""
class PasswordTool:
def __init__(self, password):
self.password = password
self.strength_level = 0
def process_password(self):
# Rule 1: length >= 8
if len(self.password) >= 8:
... | 96 | 22.47 | 85 | 13 | 509 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_7254d6bca0cab62e_88ad8fe3", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
80
] | [
null
] | [
17
] | [
85
] | |
2024-11-19T03:11:32.502258+00:00 | 1,576,133,118,000 | 9c79d4fe6150ee4b4878ff4a472a3a8e89247872 | 3 | {
"blob_id": "9c79d4fe6150ee4b4878ff4a472a3a8e89247872",
"branch_name": "refs/heads/master",
"committer_date": 1576133118000,
"content_id": "ac0fcac11b58667fcb0c58eb74587b1ecb335628",
"detected_licenses": [
"MIT"
],
"directory_id": "99972ea975b7f0fc4ec08d49b67519fe9424a5cf",
"extension": "py",
"fi... | 2.75 | stackv2 | from http.server import HTTPServer, BaseHTTPRequestHandler
import csv
class Serv(BaseHTTPRequestHandler):
def do_GET(self):
if self.path == '/':
self.path = '/index.html'
try:
file_to_open = open(self.path[1:]).read()
self.send_response(200)
except:
... | 24 | 26.79 | 58 | 16 | 162 | python | [{"finding_id": "codeql_py/path-injection_4bf6583c36cc94cb_444e01a2", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
10
] | [
null
] | [
33
] | [
46
] | |
2024-11-19T03:11:37.337147+00:00 | 1,684,499,106,000 | 126aa439e2ab5756cc901c1ccec30d3bb7b3f933 | 2 | {
"blob_id": "126aa439e2ab5756cc901c1ccec30d3bb7b3f933",
"branch_name": "refs/heads/master",
"committer_date": 1684499106000,
"content_id": "dddbc0d853fd5a3ef9a6e261c85dd508c4ac85d7",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "fb11da0311a0c0813904522eb33391b03c1cb1d8",
"extension": "p... | 2.484375 | stackv2 | import os
from typing import Union
from jinja2 import Environment, FileSystemLoader
from .apptemplate import TemplateFile
from .utils import chdir
if False: # pragma: nocover
from .appmaker import AppMaker
class ContextMutator:
"""Mutator applying additional transformations to template get_context."""
... | 143 | 27.27 | 101 | 18 | 812 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_199b68aca24156d9_fa675762", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
61
] | [
65
] | [
20
] | [
10
] | |
2024-11-19T03:11:39.574298+00:00 | 1,623,084,971,000 | 1f01b53a03a473e06ec69adf5839847f10a119db | 3 | {
"blob_id": "1f01b53a03a473e06ec69adf5839847f10a119db",
"branch_name": "refs/heads/main",
"committer_date": 1623084971000,
"content_id": "41dcae898a85f7b96ddcc8412a785f1bae5d178d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "844c7f8fb8d6bfab912583c71b93695167c59764",
"extension": "py",
... | 2.9375 | stackv2 | import datetime
import configparser
import cx_Oracle
import csv
config = configparser.ConfigParser()
try:
print('Lendo arquivo de configuracao...')
with open('conf/config.ini') as f:
config.read_file(f)
user = config['oracle']['user']
passwd = config['oracle']['password']
db = config['o... | 79 | 29.04 | 104 | 19 | 529 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_36b28eb064f78583_bcc539ce", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
21
] | [
null
] | [
11
] | [
32
] | |
2024-11-19T03:11:58.890008+00:00 | 1,526,672,900,000 | a33e3b570bdab0a3d339783152df4f4f6b46fe57 | 3 | {
"blob_id": "a33e3b570bdab0a3d339783152df4f4f6b46fe57",
"branch_name": "refs/heads/master",
"committer_date": 1526672900000,
"content_id": "d6e7ee9746c52b4077d200ce8624fa3c66a47fca",
"detected_licenses": [
"MIT"
],
"directory_id": "88eb13ed46237fc57ad1cc4d028f5f0cfe417119",
"extension": "py",
"fi... | 2.84375 | stackv2 | #! /usr/bin/python
# -*- coding: utf-8 -*-
"""
Program <meteobike.py> to read and record GPS data, air temperature and humidity
using Adafruit's Ultimate GPS and Pimoroni's DHT22 temperature sensor while riding
on a bike.
University of Freiburg
Environmental Meteology
Version 1.1
Written by Heinz Christen Mar 2018
Mod... | 197 | 36.48 | 125 | 18 | 2,169 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c725364d465ba7be_d5f9269f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text."
] | [
132,
133
] | [
null,
null
] | [
15,
15
] | [
49,
50
] | |
2024-11-19T03:12:06.435409+00:00 | 1,610,832,336,000 | 3a77740f1e018dc93da7a56325d909aeceec76ed | 2 | {
"blob_id": "3a77740f1e018dc93da7a56325d909aeceec76ed",
"branch_name": "refs/heads/main",
"committer_date": 1610832336000,
"content_id": "ab5ecf92861abca32d4f4aaa0917601b8d31ce1a",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "100f86b4a9f9032ceefa4b6b12fbef343b9c491f",
"extension": "py"... | 2.421875 | stackv2 | import functools
from flask import Blueprint
from flask import flash
from flask import g
from flask import make_response
from flask import redirect
from flask import render_template
from flask import request
from flask import session
from flask import url_for
from werkzeug.exceptions import abort
from flaskr import d... | 163 | 28.4 | 126 | 19 | 999 | python | [{"finding_id": "codeql_py/cookie-injection_a05498c2aeef6c81_643e32e1", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-020"
] | [
"py/cookie-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cookie is constructed from a [user-supplied input](1)."
] | [
160
] | [
null
] | [
47
] | [
54
] | |
2024-11-19T03:12:11.617457+00:00 | 1,502,576,150,000 | fa53802dda30c249db120e21af2bb2c0b68e06c4 | 3 | {
"blob_id": "fa53802dda30c249db120e21af2bb2c0b68e06c4",
"branch_name": "refs/heads/master",
"committer_date": 1502576150000,
"content_id": "617a1eeaf48928b43ed6c4528d25e9ada3a362e3",
"detected_licenses": [
"MIT"
],
"directory_id": "cb27ec8e7338a09be5c3dd8098d0fb8e4d49faaa",
"extension": "py",
"fi... | 3.046875 | stackv2 | import coordinates
import requests
import datetime
def get_weather():
#if coordinates.get_coordinates() in coordinates:
lat,lng=(coordinates.get_coordinates())
api_key="e0a60102f41a97b05ea6fe58b5b5fbd0"
host="https://api.darksky.net/forecast/"
url=host+api_key+"/"+str(lat)+","+str(ln... | 32 | 30.25 | 60 | 13 | 240 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_71b50b95e4fb4fec_2b28c06b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
22,
25,
32
] | [
null,
null,
null
] | [
31,
35,
15
] | [
46,
47,
52
] | |
2024-11-19T03:12:14.995560+00:00 | 1,692,879,666,000 | 01c430ef18f23140c7cf2909e0f4eebc7d32f603 | 2 | {
"blob_id": "01c430ef18f23140c7cf2909e0f4eebc7d32f603",
"branch_name": "refs/heads/master",
"committer_date": 1692879666000,
"content_id": "e9b9187d1ff6cd1751be2670385e886693375e2d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0db2472a86d52fba6a7219490dd171d44f44c197",
"extension": "py"... | 2.328125 | stackv2 | # -*- coding: utf-8 -*-
from futu.common import bytes_utf8, IS_PY2
from futu.common.utils import *
from futu.common.constant import *
from futu.common.sys_config import SysConfig
from Crypto.Cipher import AES
from futu.common.constant import *
import struct
def add_pkcs7_padding(data):
padding_len = 16 - len(dat... | 151 | 30.74 | 68 | 18 | 1,292 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_8a6d93dc7fbd8fe7_76fb1243", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ... | 5 | true | [
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ECB](2) is broken or weak, and should not be used.\n[The block mode CBC](3) is broken or weak, and should not be used.\n[The block mode ECB](4) is broken or weak, and should not be used.",
"[The block mode CBC](1) is broken or we... | [
98,
108,
131,
133,
142
] | [
null,
null,
null,
null,
null
] | [
20,
32,
27,
27,
23
] | [
45,
57,
62,
57,
48
] | |
2024-11-19T03:12:17.965251+00:00 | 1,649,902,751,000 | 321aebe75a78aeac3338f6e3fa425f92930c1ba2 | 2 | {
"blob_id": "321aebe75a78aeac3338f6e3fa425f92930c1ba2",
"branch_name": "refs/heads/master",
"committer_date": 1649902751000,
"content_id": "6e48ecfacc027fb736285cd0ee57989efd13a638",
"detected_licenses": [
"MIT"
],
"directory_id": "015a2f09f43fdf5113ab5e493661c636d1c189fa",
"extension": "py",
"fi... | 2.46875 | stackv2 | # -*- coding: utf-8 -*-
# /usr/bin/python
import os
import requests, json, re
import time, datetime
from bs4 import BeautifulSoup
from apscheduler.schedulers.blocking import BlockingScheduler
class DaKa(object):
def __init__(self, username, password, sms_number="", sms_api_key=""):
self.username = usernam... | 196 | 33.33 | 151 | 20 | 1,711 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bf2c0ac08873efe3_711f7ad4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw... | [
108,
110,
126
] | [
null,
null,
null
] | [
15,
15,
52
] | [
18,
18,
55
] | |
2024-11-19T03:12:45.185305+00:00 | 1,628,982,898,000 | 77d08b2eed9aec6a6eb2e70a5cb5fdfaba37288c | 3 | {
"blob_id": "77d08b2eed9aec6a6eb2e70a5cb5fdfaba37288c",
"branch_name": "refs/heads/main",
"committer_date": 1628982898000,
"content_id": "4fff627cd04ed79b009b542e61d479a665c1ac7a",
"detected_licenses": [
"BSD-2-Clause",
"MIT"
],
"directory_id": "11221dedcc5773d5f2e8689e610c0d29287ec224",
"exten... | 2.546875 | stackv2 | #!/usr/bin/env python
# MiniSplitPi - Mitsubishi Mr Slim HeatPump API
#
# requires file MiniSplitPi.uuid with a UUID and cert files key.pem and cert.pem, all in /home/pi/MiniSplitPi/
#
# submit GET request with parameters:
# uuid
# action = [ poweroff, poweron, shutdown, reboot, ledon, ledoff, set ]
# temp (if... | 146 | 27.96 | 118 | 18 | 1,185 | python | [{"finding_id": "codeql_py/insecure-default-protocol_fd8f4d5f921a1d14_3fc082b1", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
144
] | [
null
] | [
16
] | [
119
] | |
2024-11-19T03:12:47.290017+00:00 | 1,549,034,435,000 | 80de3b3272e793de73567d86901ef380f3c41355 | 2 | {
"blob_id": "80de3b3272e793de73567d86901ef380f3c41355",
"branch_name": "refs/heads/master",
"committer_date": 1549034435000,
"content_id": "9cd0072e84ae696809a700193eb6cdc1459d1f2b",
"detected_licenses": [
"MIT"
],
"directory_id": "e62e7ba552486e66685b2a84f983eadc7aa0d37c",
"extension": "py",
"fi... | 2.328125 | stackv2 | from jinja2 import Template
from toolz import groupby
import glob
import janus
import os
import re
def make_doc_index(template_path: str, doc_index_path: str):
with open(template_path) as f:
template = Template(f.read())
project_name = os.path.dirname(
os.path.dirname(os.path.... | 51 | 27.9 | 82 | 20 | 405 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a3fbcb6d7c8113ef_e7cd3e5d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
12
] | [
null
] | [
20
] | [
38
] | |
2024-11-19T03:12:52.563097+00:00 | 1,474,946,498,000 | 010a1ff04ee3f5f5f56678084ae0bcf53e0b3e57 | 3 | {
"blob_id": "010a1ff04ee3f5f5f56678084ae0bcf53e0b3e57",
"branch_name": "refs/heads/master",
"committer_date": 1474946498000,
"content_id": "9cc22afd60f87d183ec3060995221cbe8281157a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "96dac91d033048edf94e45c4730906b9249232cf",
"extension": "py"... | 2.71875 | stackv2 | # coding=utf-8
""" views module
"""
from urllib.parse import urlunsplit, urljoin
from flask import Blueprint, request, current_app, redirect
from .config import NAMESPACE
blueprint = Blueprint( # pylint: disable=invalid-name
'redirector',
__name__
)
@blueprint.route('/', defaults={'path': ''})
@blueprint.r... | 48 | 28.56 | 118 | 12 | 353 | python | [{"finding_id": "codeql_py/url-redirection_b5f059c1f07bfdb2_bdb550e5", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
21
] | [
null
] | [
21
] | [
33
] | |
2024-11-19T03:35:50.192705+00:00 | 1,573,062,676,000 | 0b532c0b5dba04e131790656cabfc7060b5c0e72 | 3 | {
"blob_id": "0b532c0b5dba04e131790656cabfc7060b5c0e72",
"branch_name": "refs/heads/master",
"committer_date": 1573062676000,
"content_id": "b83b0b874573872f804621fa6b0f93ea68053636",
"detected_licenses": [
"MIT"
],
"directory_id": "25567981824beca1431b85423da6f3188e4d2356",
"extension": "py",
"fi... | 2.84375 | stackv2 | import argparse
from io import BytesIO
import json
import logging
import os
from urllib.parse import urlparse
from jinja2 import Environment, FileSystemLoader
from markdown import markdown
from PIL import Image
import requests
from slugify import slugify
import xmltodict
import yaml
log_format = "%(message)s"
loggi... | 149 | 32.32 | 109 | 15 | 1,080 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a047596069648418_61c4cf74", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
33,
34
] | [
null,
null
] | [
20,
17
] | [
69,
74
] | |
2024-11-19T01:28:43.956989+00:00 | 1,611,548,992,000 | 9f3e98ec4f4c3e011d0cf409356f7612209ae4bf | 3 | {
"blob_id": "9f3e98ec4f4c3e011d0cf409356f7612209ae4bf",
"branch_name": "refs/heads/main",
"committer_date": 1611548992000,
"content_id": "e86d202a0c30162699fb8ddf49ad499066812baf",
"detected_licenses": [
"MIT"
],
"directory_id": "59eb161f03f01cecfc9d658b5233bed1906b2d1b",
"extension": "py",
"file... | 3.484375 | stackv2 | import requests
import hashlib
import sys
def request_api_data(query_char):
url = 'https://api.pwnedpasswords.com/range/' + query_char
res = requests.get(url)
if res.status_code != 200:
raise RuntimeError(f'Error fetching: {res.status_code}, check the api and try again')
return res
def get_p... | 45 | 30.22 | 93 | 15 | 350 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_65f873989f028ad7_4d419bd6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
28
] | [
null
] | [
33
] | [
57
] | |
2024-11-19T01:28:45.129863+00:00 | 1,609,415,291,000 | 1a566d2333f8db03351b5b47b9d555fd8840d42f | 3 | {
"blob_id": "1a566d2333f8db03351b5b47b9d555fd8840d42f",
"branch_name": "refs/heads/master",
"committer_date": 1609415291000,
"content_id": "86ece520ace17c05d6cd27b496ff94b137bfb8b9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bd6201cb3b1fc8973dae628998c9cf3b7b97c06b",
"extension": "py"... | 2.65625 | stackv2 | #!/usr/bin/env python3
"""
exercise 2a for Arista eAPI
"""
from getpass import getpass
import pyeapi
from pprint import pprint
import yaml
arista_file = "arista.yml"
with open(arista_file, 'r') as f:
arista_dict = yaml.safe_load(f)
for name, values in arista_dict.items():
values['password'] = getpass(promp... | 34 | 24.24 | 73 | 13 | 243 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3c69298b50d023b5_4d29f5b5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
32
] | [
null
] | [
15
] | [
73
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.