added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T21:47:38.291315+00:00 | 1,690,114,324,000 | 33c9e4bde7dbf7ce0578bedb0f16ecbb5c663a71 | 2 | {
"blob_id": "33c9e4bde7dbf7ce0578bedb0f16ecbb5c663a71",
"branch_name": "refs/heads/master",
"committer_date": 1690114324000,
"content_id": "2573f0d7c5f4ed1b03599401b4e25fcbc9120f13",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "3a3b2b5b410094f4a15cc306f8db7dbf69245a82",
"extension": "p... | 2.34375 | stackv2 | """Generate the main site, other than the theme-specific generated pages."""
import shutil
from jinja2 import Template
from .constants import BUILD, DESTINATION, TEMPLATES
from .themes import get_themes
def main():
# Render index.html
template = Template(TEMPLATES["index.html"].read_text())
rendered = ... | 25 | 23.84 | 76 | 12 | 145 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_82e8caf97b302ea0_0ecad2da", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
null
] | [
16
] | [
61
] | |
2024-11-18T22:28:48.044628+00:00 | 1,692,985,815,000 | dd23ff94b6e932652af522e16528d5443d4723d5 | 2 | {
"blob_id": "dd23ff94b6e932652af522e16528d5443d4723d5",
"branch_name": "refs/heads/master",
"committer_date": 1692985815000,
"content_id": "4132b12684510a83a8b3321cb8bdaf34ba4ba469",
"detected_licenses": [
"MIT"
],
"directory_id": "4eec6af52eca33b139f37d38fc909dd976b80be4",
"extension": "py",
"fi... | 2.4375 | stackv2 | import json
import re
from datetime import datetime, timedelta
from typing import TYPE_CHECKING, Dict, List, Optional, Tuple, Union
from github.GitRelease import GitRelease
from github.Issue import Issue
from github.NamedUser import NamedUser
from github.PullRequest import PullRequest
from jinja2 import Template
from... | 201 | 39.69 | 87 | 18 | 1,840 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3ae711655c5b9ff5_84f0482b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
36
] | [
null
] | [
26
] | [
62
] | |
2024-11-18T22:29:03.589318+00:00 | 1,634,327,392,000 | ba2c1430060a110cea4ce59e975f96438e79a65c | 3 | {
"blob_id": "ba2c1430060a110cea4ce59e975f96438e79a65c",
"branch_name": "refs/heads/main",
"committer_date": 1634327392000,
"content_id": "b75efb9cce7d136f3f90cf825ea7cb55eaa5df43",
"detected_licenses": [
"MIT"
],
"directory_id": "1d0fb6bd3005fd07546d98fa0c18c35ec0afec62",
"extension": "py",
"file... | 2.796875 | stackv2 | import os
import io
from fastapi import APIRouter, Query
from starlette.responses import FileResponse
from tempfile import TemporaryDirectory
import uuid
from google.cloud import texttospeech
# Instantiates a client
client = texttospeech.TextToSpeechClient()
# Define Router
router = APIRouter()
# Routes
@router.po... | 66 | 27.35 | 79 | 12 | 440 | python | [{"finding_id": "codeql_py/path-injection_0b79cea3c37ff90f_45366d1d", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
66
] | [
null
] | [
25
] | [
29
] | |
2024-11-18T22:29:31.385263+00:00 | 1,693,008,024,000 | 6a8bb76b2d3c3d3eda9622e01a20e9031522ca3b | 3 | {
"blob_id": "6a8bb76b2d3c3d3eda9622e01a20e9031522ca3b",
"branch_name": "refs/heads/main",
"committer_date": 1693008024000,
"content_id": "632451821cd68317df541d0fbb2c8499a34ac64b",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "e249e2f5821116eaa18774b8c36502babbeddc00",
"extension": "py"... | 2.609375 | stackv2 | import os, requests
from progressbar import progressbar
from caltechdata_api import get_metadata, caltechdata_edit
def get_datacite_dates(prefix):
"""Get sumbitted date for DataCite DOIs with specific prefix"""
doi_dates = {}
doi_urls = {}
url = (
"https://api.datacite.org/dois?query=prefix:"
... | 46 | 34.3 | 85 | 17 | 412 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_056dca08abbbfe2b_9abdf89b", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [data.caltech.edu](1) may be at an arbitrary position i... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [data.caltech.edu](1) may be at an arbitrary position in the sanitized URL."
] | [
35
] | [
null
] | [
8
] | [
43
] | |
2024-11-18T22:41:05.517790+00:00 | 1,688,050,664,000 | 7c3f3f4e796c5ad4e01cfc586d433b949afe0a8e | 2 | {
"blob_id": "7c3f3f4e796c5ad4e01cfc586d433b949afe0a8e",
"branch_name": "refs/heads/master",
"committer_date": 1688050664000,
"content_id": "6480c77599ad19ca6a068fb834b7c2f134867191",
"detected_licenses": [
"MIT"
],
"directory_id": "7102fe71519a63c00fe2b818f436afed8904efa9",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python
import random
import argparse
import tempfile
import os
import tarfile
from pathlib import Path
import numpy as np
import tensorflow as tf
from tqdm import tqdm
import h5py
from hailo_model_zoo.utils import path_resolver, downloader
TF_RECORD_TYPE = 'val', 'calib'
TF_RECORD_LOC = {'val': 'mod... | 148 | 36.11 | 119 | 25 | 1,232 | python | [{"finding_id": "codeql_py/tarslip_800f41c66db14bd4_fd550a01", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
96
] | [
null
] | [
21
] | [
24
] | |
2024-11-18T22:41:13.402324+00:00 | 1,593,290,089,000 | f1a07b1512a40796af08b5805894f703eb62dc99 | 2 | {
"blob_id": "f1a07b1512a40796af08b5805894f703eb62dc99",
"branch_name": "refs/heads/master",
"committer_date": 1593290089000,
"content_id": "a64d25fd50500aa87672c05e8935eb4bad3dcecc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9dd6886dda3ffa8db14966143e8a5b42b67990d7",
"extension": "py"... | 2.328125 | stackv2 | import requests
from JavPy.embed.BaseEmbed import BaseEmbed
from JavPy.embed.fvs_io import fvs_io
import json
from JavPy.utils.config import proxy
class smartshare_tv(BaseEmbed):
@staticmethod
def decode(url):
video_id = url.split("/v/").pop().split("/")[0]
rsp = requests.post(
"ht... | 30 | 25.73 | 74 | 17 | 208 | python | [{"finding_id": "codeql_py/request-without-cert-validation_3a53f7a713fc34ca_2513c727", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
12
] | [
17
] | [
15
] | [
10
] | |
2024-11-18T22:41:14.695454+00:00 | 1,525,827,221,000 | 2c1f717e2d2882a541f7af7fdc15856bff73e35e | 2 | {
"blob_id": "2c1f717e2d2882a541f7af7fdc15856bff73e35e",
"branch_name": "refs/heads/master",
"committer_date": 1525827221000,
"content_id": "0f2f3d44940d4507e9c25cb060d0f44d02b550eb",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "34cc4da22aa40ef1aac158cb503d059741509812",
"extension": "py"... | 2.5 | stackv2 | """ Fetches and prepares the source code for revisions. """
import errno
import logging
import os
import random
import shutil
from kazoo.exceptions import NodeExistsError
from tornado import gen
from tornado.options import options
from appscale.common.appscale_utils import get_md5
from appscale.common.appscale_info ... | 177 | 33.5 | 79 | 17 | 1,311 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8e2bd7c2c7aad38d_8d612079", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
177
] | [
null
] | [
25
] | [
77
] | |
2024-11-18T22:54:06.001089+00:00 | 1,503,996,087,000 | 49d703a93ca1b489f7784e90d401cd80c01c7577 | 3 | {
"blob_id": "49d703a93ca1b489f7784e90d401cd80c01c7577",
"branch_name": "refs/heads/master",
"committer_date": 1503996087000,
"content_id": "a22c010c433c682e102575d0456ede6d061b3e09",
"detected_licenses": [
"Unlicense"
],
"directory_id": "a39bddfeea008fa4f469e062ea08c630e95548c7",
"extension": "py",... | 3.0625 | stackv2 | #!/usr/bin/env python3
import sys
import argparse
from getpass import getpass
from pathlib import Path
from hashlib import sha256
def get_seed(key):
return sha256(key.encode('utf-8')).digest()
def parse_args():
parser = argparse.ArgumentParser(description='XOR cipher')
parser.add_argument('infile', help=... | 51 | 26.43 | 74 | 17 | 338 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_3d728e5bcf16654a_578745fb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
10
] | [
null
] | [
19
] | [
38
] | |
2024-11-18T22:54:08.864640+00:00 | 1,583,066,848,000 | 633dcfaf4760dec9c513f0240e511a3edb12f7cb | 3 | {
"blob_id": "633dcfaf4760dec9c513f0240e511a3edb12f7cb",
"branch_name": "refs/heads/master",
"committer_date": 1583066848000,
"content_id": "3dc7a0f77f76852935b02639f13154afd3b70105",
"detected_licenses": [
"MIT"
],
"directory_id": "965e2ac3199deffc3a04cda451681724842ad674",
"extension": "py",
"fi... | 2.796875 | stackv2 | #pip install lxml
#pip install pyOpenSSL
import requests
import json
from bs4 import BeautifulSoup as bs
import ssl
import time
'''
The elsevier search is kind of a tree structure:
"keyword --> a list of journals (a journal contain many articles) --> lists of articles
'''
journals = []
articles = []
abstracts = {}
... | 161 | 27.27 | 135 | 15 | 1,230 | python | [{"finding_id": "codeql_py/request-without-cert-validation_5d5212154fb870b2_a1e5488f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
28,
44,
67
] | [
null,
null,
null
] | [
12,
12,
12
] | [
44,
44,
44
] | |
2024-11-18T22:54:32.582659+00:00 | 1,512,439,428,000 | 3b7c32a6f859d123a8e1e09106bc5a71617c64b5 | 3 | {
"blob_id": "3b7c32a6f859d123a8e1e09106bc5a71617c64b5",
"branch_name": "refs/heads/master",
"committer_date": 1512439428000,
"content_id": "3eb5c75e887aa8ee84937e884bbb59e9048a2c5f",
"detected_licenses": [
"MIT"
],
"directory_id": "37170882a5dc31262a6cf418baba71e6f76de12f",
"extension": "py",
"fi... | 2.65625 | stackv2 | from flask import Flask, render_template, request, flash
app = Flask(__name__)
app.secret_key = 'this should be a secret key'
@app.route('/')
def index():
# return HTML
# return "<h1>this is the index page!<h1>"
return render_template('index.html')
@app.route('/songs')
def show_all_classes():
classe... | 68 | 25.87 | 78 | 12 | 473 | python | [{"finding_id": "codeql_py/reflective-xss_7632c5eb3a893eef_c3c24306", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
55
] | [
null
] | [
12
] | [
79
] | |
2024-11-18T22:54:32.973575+00:00 | 1,514,428,218,000 | 1230db29173c4f1476fb5036130d7b07fca8c676 | 2 | {
"blob_id": "1230db29173c4f1476fb5036130d7b07fca8c676",
"branch_name": "refs/heads/master",
"committer_date": 1514428218000,
"content_id": "8bc24e0ba02c261fbafe53a51698ebc5c6fd4116",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "25a9f70ac09b84cf368920c9d6802d0965c6340e",
"extension": "py"... | 2.390625 | stackv2 | # -*- coding:utf8 -*-
import os
import re
from copy import deepcopy
from jinja2 import Template
from .snippets_cfg import SNIPPET_CONFIG, CONTAINER_CONFIG
__all__ = ["Snippet", "SnippetContainer"]
_ROOT_DIR = os.path.abspath(os.path.dirname(__file__))
_TEMPLATE_DIR = os.path.join(_ROOT_DIR, "templates")
_SNIPPET_DI... | 124 | 28.58 | 94 | 14 | 873 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_673b53fb6a1dd06d_2147b11d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
49,
85
] | [
null,
null
] | [
18,
18
] | [
37,
37
] | |
2024-11-18T20:55:06.418843+00:00 | 1,602,916,932,000 | 16769a1032af5cab75f4a4ff4410c32c94001fd7 | 2 | {
"blob_id": "16769a1032af5cab75f4a4ff4410c32c94001fd7",
"branch_name": "refs/heads/master",
"committer_date": 1602916932000,
"content_id": "f364d9eff4e3bc6c21cec6ae30fe66aefeb62af0",
"detected_licenses": [
"MIT"
],
"directory_id": "05aa0f6cfe34907ff3ccee1d4db3040f5d54c852",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/bin/python2
# -*- coding: utf-8 -*-
import requests
import json
import time
import calendar
import datetime
import hashlib
import hmac
import base64
import collections
import socket
import ssl
import threading
import traceback
import logging
import sys
from requests import Request, Session
class FalconAuth:
def... | 317 | 40.8 | 169 | 29 | 2,706 | python | [{"finding_id": "codeql_py/insecure-protocol_0f891638ba553011_832698c0", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)."
] | [
180
] | [
null
] | [
17
] | [
24
] | |
2024-11-18T21:07:37.256983+00:00 | 1,528,881,922,000 | f1853293fde2184e7ebd799a5d15f212b05bd61c | 3 | {
"blob_id": "f1853293fde2184e7ebd799a5d15f212b05bd61c",
"branch_name": "refs/heads/master",
"committer_date": 1528881922000,
"content_id": "5c190687d5bac99d65a16a61882a24febdb02592",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d510c6750eefdd75a6f7d8443347ab144580ba1e",
"extension": "py"... | 2.796875 | stackv2 | # -*- coding: utf-8 -*-
import datetime
from matplotlib.pylab import date2num
import matplotlib.pyplot as plt
from futuquant import OpenQuoteContext
from futuquant import OpenHKTradeContext, OpenUSTradeContext
import matplotlib.finance as mpf
class MACD(object):
"""
A simple MACD strategy
"""
# API pa... | 129 | 37.85 | 122 | 19 | 1,484 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_07536b5c46ef1592_fe5321d7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
56
] | [
null
] | [
27
] | [
89
] | |
2024-11-18T21:07:40.918164+00:00 | 1,623,954,958,000 | a59eba4e957d726b8c1f914189585bacc6a1e470 | 3 | {
"blob_id": "a59eba4e957d726b8c1f914189585bacc6a1e470",
"branch_name": "refs/heads/master",
"committer_date": 1623954958000,
"content_id": "42a08de38693d886bda90f2ed266fdd23b5d1259",
"detected_licenses": [
"MIT"
],
"directory_id": "d2896b89005dfcbcf679a7488f3d94ffd266d1c7",
"extension": "py",
"fi... | 2.546875 | stackv2 | import asyncio
from jinja2 import Template
from starlette.applications import Starlette
from starlette.responses import RedirectResponse, HTMLResponse
from starlette.requests import Request
from starlette.status import (HTTP_201_CREATED, HTTP_303_SEE_OTHER,
HTTP_400_BAD_REQUEST)
from star... | 112 | 26.26 | 124 | 14 | 666 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a25cbc7ed2ceddab_f3ba9353", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
68
] | [
96
] | [
12
] | [
5
] | |
2024-11-18T21:07:45.311365+00:00 | 1,537,124,123,000 | 13074af396f4d958eb122c07b0052122b7aed741 | 3 | {
"blob_id": "13074af396f4d958eb122c07b0052122b7aed741",
"branch_name": "refs/heads/master",
"committer_date": 1537124123000,
"content_id": "4d9b72b8f1354407103c2e4ef38d1f408fcd2613",
"detected_licenses": [
"MIT"
],
"directory_id": "29b28d10e30a79c91215834ccf681a7874e3ad07",
"extension": "py",
"fi... | 2.734375 | stackv2 | #!/usr/bin/env python3
import argparse
import sys
import jinja2
import markdown
import re
TEMPLATE = """<!DOCTYPE html>
<html>
<head>
<link href="https://azlux.fr/bootstrap-combined.min.css" rel="stylesheet">
<meta http-equiv="cache-control" content="max-age=0" />
<meta http-equiv="cache-control" content... | 74 | 27.57 | 97 | 15 | 549 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a501d522dfac3d64_8f4e5098", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
67
] | [
null
] | [
11
] | [
36
] | |
2024-11-18T21:33:24.318011+00:00 | 1,477,241,509,000 | 29f63c542c4638dbc708e33c3cd2f31c97548e27 | 2 | {
"blob_id": "29f63c542c4638dbc708e33c3cd2f31c97548e27",
"branch_name": "refs/heads/master",
"committer_date": 1477241509000,
"content_id": "9e5cda5c8c283e61f8ca0f0e4cd9d2be508353b4",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "6e8f33f94401a0059eeb63b4dea9044a900d76de",
"extension": "p... | 2.359375 | stackv2 | import sys
import asyncio
from collections import Mapping
from pulsar.utils.string import to_bytes
from jinja2 import Template
STREAM_LIMIT = 2**20
class AgileError(Exception):
pass
class AgileExit(AgileError):
pass
class AgileSkip(AgileError):
pass
class ShellError(AgileError):
def __init_... | 128 | 23.71 | 70 | 15 | 737 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f5a87622ce625c58_ea15e3f9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
33
] | [
null
] | [
16
] | [
30
] | |
2024-11-18T21:55:53.241493+00:00 | 1,611,831,863,000 | 3d4c21ae908990d76cb5f714e5ee203e6762d372 | 3 | {
"blob_id": "3d4c21ae908990d76cb5f714e5ee203e6762d372",
"branch_name": "refs/heads/master",
"committer_date": 1611831863000,
"content_id": "02f4e7f41f8585e8bc37e019435f939a0a1a19c3",
"detected_licenses": [
"MIT"
],
"directory_id": "60f31a13a7684080c23024de509ed5312575ad57",
"extension": "py",
"fi... | 2.515625 | stackv2 | import pandas as pd
from config import WEBSCRAPE_DATA_PATH, FEATURE_COLUMNS, RAW_DATA_PATH, INGESTED_DATA
import os
def gameweek_filepaths(players_path):
filepaths = []
for root, dirs, files in os.walk(players_path):
for filename in files:
if filename == "gw.csv":
filepaths... | 119 | 46.66 | 118 | 23 | 1,227 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_27c8e11dbd822822_f82a7f35", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
37
] | [
null
] | [
11
] | [
14
] | |
2024-11-18T22:39:32.994515+00:00 | 1,626,117,656,000 | 95e0062978256c19be3f57839e4d8bdb6fc4dcad | 3 | {
"blob_id": "95e0062978256c19be3f57839e4d8bdb6fc4dcad",
"branch_name": "refs/heads/main",
"committer_date": 1626117656000,
"content_id": "0106bd0f40a9ec2dced30654a8b51a80455219fd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fb8666ba2f687441fb462482ddc2465669ab815f",
"extension": "py",
... | 2.609375 | stackv2 | import os
import requests
from urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning)
# Constants
BASE_URL = "https://netbox.lasthop.io/api/"
def main():
token = os.environ["NETBOX_TOKEN"]
http_headers = {}
http_headers["accept"] ... | 45 | 24.58 | 87 | 12 | 273 | python | [{"finding_id": "codeql_py/request-without-cert-validation_bf19052024a355f9_62875a72", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
22
] | [
null
] | [
12
] | [
88
] | |
2024-11-18T22:39:42.430603+00:00 | 1,692,259,973,000 | 1f32fba854cd43a7eb819bcc0a96bb6d56b300f0 | 2 | {
"blob_id": "1f32fba854cd43a7eb819bcc0a96bb6d56b300f0",
"branch_name": "refs/heads/main",
"committer_date": 1692259973000,
"content_id": "58010d2c8ee79dc3cc04b64bf39b5ac2b9599020",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "9143962494f56b95589ae8a8d3889bba5a30981d",
"extension": "py"... | 2.484375 | stackv2 | """Definitions of screw axes with methods for scoring against data."""
from __future__ import annotations
import logging
import math
import numpy as np
from jinja2 import ChoiceLoader, Environment, PackageLoader
from scipy.stats import norm
from scitbx.array_family import flex
from dials.algorithms.symmetry.absenc... | 380 | 35.01 | 103 | 19 | 3,380 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5f44040133b15de4_7750a3f6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
44
] | [
null
] | [
15
] | [
41
] | |
2024-11-18T23:06:13.156502+00:00 | 1,525,024,436,000 | 4c23cbde0446033c79cfa61a52bc7c66fbd7d695 | 2 | {
"blob_id": "4c23cbde0446033c79cfa61a52bc7c66fbd7d695",
"branch_name": "refs/heads/master",
"committer_date": 1525024436000,
"content_id": "134a28458da58cfd3a7d9fbc7d21c8337c760263",
"detected_licenses": [
"MIT"
],
"directory_id": "603ff44ea7d7bdcdffe554050c781e1837b4ca68",
"extension": "py",
"fi... | 2.4375 | stackv2 | from random import randint, shuffle
druzinky = [#
'Muflóny',
]
veduci = [
'Sára',
]
def create_password():
big_letter = randint(1,4)
digit = randint(1,5)
small_letter = 10 - big_letter - digit
password_list = []
password = ''
for i in range(big_letter):
password_list.append(c... | 53 | 28.42 | 106 | 13 | 448 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1532ed5e9aa44729_9656bddc", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text.",
"This expression stores [sensiti... | [
39,
47
] | [
null,
null
] | [
17,
17
] | [
105,
104
] | |
2024-11-18T23:06:16.623693+00:00 | 1,574,068,687,000 | 0d45432ccf82b18769ca9f7a415c1f44cd0a6a20 | 3 | {
"blob_id": "0d45432ccf82b18769ca9f7a415c1f44cd0a6a20",
"branch_name": "refs/heads/master",
"committer_date": 1574068687000,
"content_id": "b613a3556801c42dc2efb59016046228a7f02ece",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "33c7e8b0c69338efbb5547f95ecdec81715523e2",
"extension": "py"... | 2.921875 | stackv2 | """
OpenID Connect related functionality and helpers.
"""
import base64
import functools
import hashlib
import http.server
import json
import logging
import random
import string
import threading
import time
import urllib.parse
import warnings
import webbrowser
from collections import namedtuple
from queue import Queu... | 338 | 38.93 | 165 | 21 | 2,869 | python | [{"finding_id": "codeql_py/log-injection_a5915416dafb8001_207d8e4c", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
39
] | [
null
] | [
19
] | [
79
] | |
2024-11-18T20:56:58.497306+00:00 | 1,546,896,700,000 | 48e18fe2609e4468203977f71effa3ae3f4ea2fa | 2 | {
"blob_id": "48e18fe2609e4468203977f71effa3ae3f4ea2fa",
"branch_name": "refs/heads/master",
"committer_date": 1546896700000,
"content_id": "a54821afcebd37c206d1c4e5c85a488a8bd49521",
"detected_licenses": [
"MIT"
],
"directory_id": "544dedd74ce6d39f9ce421f16145b32da7968d3a",
"extension": "py",
"fi... | 2.484375 | stackv2 | import importlib
import os
import re
import sys
import tarfile
import zipfile
import yaml
from slugify import slugify
from ezored.models.constants import Constants
from ezored.models.logger import Logger
from ezored.models.util.download_util import DownloadUtil
from ezored.models.util.file_util import FileUtil
from e... | 367 | 38.65 | 109 | 19 | 2,882 | python | [{"finding_id": "codeql_py/tarslip_af385ba48f802aa3_8aeccc0c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
217
] | [
null
] | [
13
] | [
19
] | |
2024-11-18T22:43:36.541612+00:00 | 1,686,219,916,000 | fdc3627dd3675baaefab9f45b4b90fdbfb87cffa | 3 | {
"blob_id": "fdc3627dd3675baaefab9f45b4b90fdbfb87cffa",
"branch_name": "refs/heads/main",
"committer_date": 1686219916000,
"content_id": "3a91bafabfc9800c6c7da6f50493fab30f4f1e30",
"detected_licenses": [
"MIT"
],
"directory_id": "15abe1023912895e9b8c41d77b38f2ce988f309b",
"extension": "py",
"file... | 2.765625 | stackv2 | # https://exchange-docs.crypto.com/spot/index.html?python#digital-signature
import hashlib
import hmac
def sign_request(req, api_key, secret_key):
if req is None or api_key is None or secret_key is None:
return None
# First ensure the params are alphabetically sorted by key
param_string = ''
i... | 25 | 37.44 | 101 | 15 | 247 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_cee9c0b4c532ad20_6cbc6578", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
21
] | [
null
] | [
13
] | [
41
] | |
2024-11-18T22:44:11.644742+00:00 | 1,445,502,508,000 | 52ecbcd26ceeeaebc96083ea7e1c94c145d12d29 | 2 | {
"blob_id": "52ecbcd26ceeeaebc96083ea7e1c94c145d12d29",
"branch_name": "refs/heads/master",
"committer_date": 1445502508000,
"content_id": "9febde1210ff1912d8058554968a0cde325b30b7",
"detected_licenses": [
"MIT"
],
"directory_id": "dbd46c6fae3f9f59679d61f5815a25b91af99bc2",
"extension": "py",
"fi... | 2.484375 | stackv2 | # -*- coding: UTF-8 -*-
# !/usr/bin/python
"""
views.py
~~~~~~~~
auth登录模块视图函数文件
由于桂声是一个面向编辑的后台网站,
所以无需注册接口。账号直接由管理员发放。
"""
from flask import render_template
from flask import redirect, request, url_for, flash
from flask.ext.login import login_user, login_required, logout_user
from flask.ext.login i... | 59 | 27.86 | 69 | 16 | 429 | python | [{"finding_id": "codeql_py/url-redirection_4b562132364ee1a4_ffbbfa6d", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
32
] | [
null
] | [
20
] | [
69
] | |
2024-11-18T22:44:14.395264+00:00 | 1,598,850,048,000 | 0133da49bf9d6c402c34bb0c230073a18e477abf | 2 | {
"blob_id": "0133da49bf9d6c402c34bb0c230073a18e477abf",
"branch_name": "refs/heads/master",
"committer_date": 1598850048000,
"content_id": "ffc0376d6d06d5d6a89a9979d121075a60087178",
"detected_licenses": [
"MIT"
],
"directory_id": "c3c34e058a6f9c8d2760299820e07bbf411b7639",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/python
__author__ = "Bassim Aly"
__EMAIL__ = "basim.alyy@gmail.com"
import yaml
from jinja2 import FileSystemLoader, Environment
with open(
'/media/bassim/DATA/GoogleDrive/Packt/EnterpriseAutomationProject/Chapter6_Configuration_generator_with_python_and_jinja2/network_dc.yml',
'r') as yaml... | 30 | 38.07 | 146 | 12 | 267 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ecac4e97acf52c48_b154c903", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
15
] | [
18
] | [
16
] | [
29
] | |
2024-11-18T22:29:36.335901+00:00 | 1,589,384,235,000 | 066a75848eb15f7bda11efbe5694f261ac06b14f | 3 | {
"blob_id": "066a75848eb15f7bda11efbe5694f261ac06b14f",
"branch_name": "refs/heads/master",
"committer_date": 1589384235000,
"content_id": "60e02c93acc100b3c081c0c4c7d6471b6f9bf9e8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2c1ab9ca2be1cbddcd2442b44a99aef1897ca1a3",
"extension": "py"... | 2.90625 | stackv2 | import requests
import json
import sys
import base64
def fetch_oauth_token(**kwargs):
"""
This method fetches oauth access token by calling /oauth2/token/<app_id> Rest API
"""
if 'tenant' not in kwargs or \
'appid' not in kwargs or \
'scope' not in kwargs or \
... | 52 | 34.4 | 85 | 19 | 343 | python | [{"finding_id": "codeql_py/request-without-cert-validation_82661a4e833e0940_12159037", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
31
] | [
34
] | [
20
] | [
53
] | |
2024-11-18T22:29:36.388353+00:00 | 1,478,009,002,000 | 2aad6eaf29bd08b380275cee57ac3e1c8fb504aa | 2 | {
"blob_id": "2aad6eaf29bd08b380275cee57ac3e1c8fb504aa",
"branch_name": "refs/heads/master",
"committer_date": 1478009002000,
"content_id": "749c1ab92fd7c6b725b6956aa214bb485e81715d",
"detected_licenses": [
"MIT"
],
"directory_id": "6e3d05579687f41ddd47e547a7a78cb6f2d16aec",
"extension": "py",
"fi... | 2.40625 | stackv2 | # coding=UTF-8
import time
from datetime import datetime
import requests
import time
import sys
from bs4 import BeautifulSoup
requests.packages.urllib3.disable_warnings()
Board = ''
payload={
'from':'/bbs/'+ Board +'/index.html',
'yes':'yes'
}
def getPageNumber(content) :
startIndex = content.find('index')
... | 76 | 28.68 | 82 | 16 | 672 | python | [{"finding_id": "codeql_py/request-without-cert-validation_4dacc11f61764160_741d2b60", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
36,
35,
61,
46
] | [
null,
null,
null,
null
] | [
8,
8,
9,
9
] | [
78,
79,
36,
36
] | |
2024-11-18T22:29:37.504780+00:00 | 1,625,137,108,000 | 84b1ce717502d5f56c17e659e823f25ca75292ce | 2 | {
"blob_id": "84b1ce717502d5f56c17e659e823f25ca75292ce",
"branch_name": "refs/heads/master",
"committer_date": 1625137108000,
"content_id": "2f04f6f413528e0d58bf7648b4829468161fe64a",
"detected_licenses": [
"MIT"
],
"directory_id": "4450824baf47cadb934522e4a1e8d300d04558a9",
"extension": "py",
"fi... | 2.40625 | stackv2 | import sys
import os
curPath = os.path.abspath(os.path.dirname(__file__))
rootPath = os.path.split(curPath)[0]
sys.path.append(rootPath)
from flask import Flask, request, abort
from flask_cors import CORS
from linebot.exceptions import (
InvalidSignatureError
)
from controllers.line_bot_controller import Line... | 114 | 25.22 | 107 | 13 | 675 | python | [{"finding_id": "codeql_py/log-injection_921072baf3f55d83_70e156bf", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
69
] | [
null
] | [
27
] | [
31
] | |
2024-11-18T23:15:52.680423+00:00 | 1,443,518,075,000 | acbb754ad30ee7d40d8e3c143cbf39443bb2604d | 3 | {
"blob_id": "acbb754ad30ee7d40d8e3c143cbf39443bb2604d",
"branch_name": "refs/heads/master",
"committer_date": 1443518075000,
"content_id": "0bb4597193018333c5348ebf4fb4f4c62becbc6b",
"detected_licenses": [
"MIT"
],
"directory_id": "03f53a603a110699de9dcee96b55275104cebc51",
"extension": "py",
"fi... | 2.65625 | stackv2 | #!/usr/bin/python
__author__ = 'https://github.com/chelnak'
import json
import requests
from helpers import authenticate, checkResponse
from prettytable import PrettyTable
class ConsumerClient(object):
def __init__(self, host, username, password, tenant=None):
"""
Creates a connection to the vRA... | 346 | 31.41 | 143 | 19 | 2,347 | python | [{"finding_id": "codeql_py/request-without-cert-validation_bbf39da5fd936bbf_ead99569", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 10 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"... | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
58,
87,
116,
139,
173,
234,
263,
290,
318,
338
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
341
] | [
13,
13,
13,
13,
13,
13,
13,
13,
13,
13
] | [
65,
65,
65,
65,
65,
65,
65,
65,
65,
40
] | |
2024-11-18T22:30:19.907569+00:00 | 1,586,670,602,000 | 72ac57ea1751bb2d80a25dca834c20f14db314a3 | 2 | {
"blob_id": "72ac57ea1751bb2d80a25dca834c20f14db314a3",
"branch_name": "refs/heads/master",
"committer_date": 1586670602000,
"content_id": "259b08d31f5592220c55e49b5eaed4f6b98a430d",
"detected_licenses": [
"MIT"
],
"directory_id": "fe4a18ec560b932a18c4e6226482e1f35eac6e62",
"extension": "py",
"fi... | 2.40625 | stackv2 | from flask import Flask
from flask import render_template
from flask import request
from flask import redirect
from tensorflow import keras
from keras.preprocessing import image
from werkzeug.utils import secure_filename
import os
import numpy as np
from random import random
app = Flask(__name__)
UPLOAD_FOLDER = "s... | 84 | 31.42 | 93 | 18 | 572 | python | [{"finding_id": "codeql_py/flask-debug_827a03fe9fa3b361_753834eb", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-601",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
84,
35,
40
] | [
null,
null,
null
] | [
5,
29,
29
] | [
24,
40,
40
] | |
2024-11-18T22:30:30.300149+00:00 | 1,663,538,314,000 | e210a94fcf01f76c51168ba8740e9f02530290f6 | 3 | {
"blob_id": "e210a94fcf01f76c51168ba8740e9f02530290f6",
"branch_name": "refs/heads/master",
"committer_date": 1663538314000,
"content_id": "2662a7530ceeb417f582c927e18b83ab69648288",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "f411e9a90678c5e93fe0e293f5672be7a35c7291",
"extension": "p... | 2.53125 | stackv2 | """Render items using Jinja2 template engine."""
import pathlib
import jinja2
import jsonpointer
from .. import source
from .._misc import parameters
@parameters(
jsonschema={
"type": "object",
"properties": {
"template": {"type": "string"},
"context": {"type": "object"}... | 54 | 31.26 | 78 | 20 | 399 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a6671e473f2b2800_f97de780", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
33
] | [
42
] | [
11
] | [
6
] | |
2024-11-18T23:36:48.091656+00:00 | 1,517,920,386,000 | 59d445be63b7347c91eb9815f577b1dfc2377077 | 3 | {
"blob_id": "59d445be63b7347c91eb9815f577b1dfc2377077",
"branch_name": "refs/heads/master",
"committer_date": 1517920386000,
"content_id": "51489d769f7656795306a111d20ae6d78b43afa8",
"detected_licenses": [
"MIT"
],
"directory_id": "130f1cea85a523b09d4a2eadfea79a2de88219c5",
"extension": "py",
"fi... | 2.765625 | stackv2 | import os
from jinja2 import BaseLoader, Environment
from lxml import etree
import numpy as np
import pandas as pd
import requests
# Template XML para request ao Webservice do SGS
soapenv = 'http://schemas.xmlsoap.org/soap/envelope/'
xsd = 'http://www.w3.org/2001/XMLSchema'
xsi = 'http://www.w3.org/2001/XMLSchema-ins... | 108 | 36.89 | 93 | 18 | 989 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d817249c072f83f3_6bd65e84", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
47
] | [
null
] | [
20
] | [
50
] | |
2024-11-18T23:36:59.117572+00:00 | 1,669,983,054,000 | 26c454fb75aaffc97bc60136e37c7d637dbb76b6 | 2 | {
"blob_id": "26c454fb75aaffc97bc60136e37c7d637dbb76b6",
"branch_name": "refs/heads/master",
"committer_date": 1669983054000,
"content_id": "ba49241df1fb26329695b8c581ee2a358c99537b",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "56731673c481f872b61f86e9c8c07bb9b0548c94",
"extension": "p... | 2.5 | stackv2 | import typing
from bottle import Bottle, Request
from jinja2 import Template
from .base import Apiman as _Apiman
class Apiman(_Apiman):
"""Bottle extension
>>> app = Flask(__name__)
>>> apiman = Apiman(
... template="./examples/docs/dog_template.yml"
... )
>>> apiman.init_app(app)
>... | 118 | 31.86 | 88 | 21 | 830 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c5baf6a62807e09e_1f4bf71a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
38,
47
] | [
null,
null
] | [
28,
26
] | [
72,
68
] | |
2024-11-18T21:57:26.891204+00:00 | 1,581,391,624,000 | d8e37007ce0a812391b48a0ffa4d6c51afe92244 | 3 | {
"blob_id": "d8e37007ce0a812391b48a0ffa4d6c51afe92244",
"branch_name": "refs/heads/master",
"committer_date": 1581391624000,
"content_id": "335bacd8377ecf0cab53535c610c090a33979ede",
"detected_licenses": [
"MIT"
],
"directory_id": "cf5170c940e695e4ce7fdfb7c815d08cc751fafa",
"extension": "py",
"fi... | 2.515625 | stackv2 | import importlib
import os
import re
import types
from types import FunctionType
from docutils import nodes
from docutils.nodes import document
from sphinx.application import Sphinx
from jinja2 import Template
from auto_behave.node import AutoBehave
import inspect
def process_auto_behave_nodes(app: Sphinx, doc_tre... | 136 | 31.65 | 112 | 15 | 963 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4329e609acfb728a_8ce9c188", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
21
] | [
null
] | [
16
] | [
41
] | |
2024-11-18T21:57:53.600268+00:00 | 1,570,981,316,000 | f16d81453dad51b27c6439f90ce3aa6f33e801a4 | 3 | {
"blob_id": "f16d81453dad51b27c6439f90ce3aa6f33e801a4",
"branch_name": "refs/heads/master",
"committer_date": 1570981316000,
"content_id": "a800c3993489fab030859fcc54a4ee35c7e2b7b5",
"detected_licenses": [
"MIT"
],
"directory_id": "b6149b31d8ccd4d1687ea9bd2b291815760dbee3",
"extension": "py",
"fi... | 3.390625 | stackv2 | #1 -)BIRTHDAY CAKE CANDLES
import math
import os
import random
import re
import sys
def birthdayCakeCandles(ar):
# find the max number of array and count how many of it in the array by iterating over list
maxi = max(ar)
couter = 0
for i in ar:
if i == maxi:
couter += 1
return... | 240 | 20.18 | 152 | 21 | 1,397 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8bfc3db735fc591e_97375260", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
29
] | [
null
] | [
16
] | [
34
] | |
2024-11-18T21:58:03.778537+00:00 | 1,565,141,187,000 | 13fdf616cc9dcb1f887e910998e51937f2fdb23e | 3 | {
"blob_id": "13fdf616cc9dcb1f887e910998e51937f2fdb23e",
"branch_name": "refs/heads/master",
"committer_date": 1565141187000,
"content_id": "03df8bd5ae2289fec5862d59342364688c616c33",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "28c4d2a6377f0a5bd5dbb3e4bd3c0b25274e05e2",
"extension": "py"... | 2.59375 | stackv2 | import os
import subprocess
import tempfile
import re
from flask import Flask, request
from google.cloud import storage
app = Flask(__name__)
def download_blob(gcs_uri, destination_file_name):
"""Downloads a blob from the bucket."""
bucket_name = os.path.split(gcs_uri.strip())[0].replace("gs://", "")
cli... | 58 | 32.67 | 77 | 15 | 462 | python | [{"finding_id": "codeql_py/command-line-injection_9896ecb732d8c2b8_1f997612", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 3 | true | [
"CWE-078",
"CWE-215",
"CWE-022"
] | [
"py/command-line-injection",
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
44,
57,
17
] | [
null,
58,
null
] | [
31,
5,
15
] | [
39,
52,
36
] | |
2024-11-18T21:58:06.440629+00:00 | 1,498,043,227,000 | e407f38521d96e64052944b7ac9e93c68bcc2bc6 | 2 | {
"blob_id": "e407f38521d96e64052944b7ac9e93c68bcc2bc6",
"branch_name": "refs/heads/master",
"committer_date": 1498043227000,
"content_id": "68a2d44805a6dd312e794f9329668a53e8c607ef",
"detected_licenses": [
"MIT"
],
"directory_id": "e0bd4928b2c9445da515c747403e3ea3369f8f47",
"extension": "py",
"fi... | 2.390625 | stackv2 | # -*- coding: utf-8 -*-
import logging
from tornado.web import RequestHandler
from Tools import RedisClient, Configuration
logger = logging.getLogger(__name__)
(_, try_limit, ban_time) = Configuration.load_security_conf()
class BaseHandler(RequestHandler):
"""Superclass for Handlers which require a connected u... | 37 | 29.68 | 75 | 13 | 230 | python | [{"finding_id": "codeql_py/log-injection_2b5784bbefbb8e37_230dd8b2", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
34
] | [
null
] | [
43
] | [
65
] | |
2024-11-18T21:58:17.178814+00:00 | 1,477,588,847,000 | 725c4b119ec1415512d592114c420c8fdb4845d8 | 3 | {
"blob_id": "725c4b119ec1415512d592114c420c8fdb4845d8",
"branch_name": "refs/heads/master",
"committer_date": 1477588847000,
"content_id": "ef6a5fdb70394d27d87e0f665519ea32dcf5e2d0",
"detected_licenses": [
"MIT"
],
"directory_id": "31747052a9faa081e61e52506585ef409dcf3a2c",
"extension": "py",
"fi... | 3.03125 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
""" Cipher
"""
__author__ = 'Zagfai'
__date__ = '2016-08'
import hashlib
import M2Crypto.EVP
import M2Crypto.Rand
ciphers = {
'aes-128-cfb': (16, 16),
'aes-256-cfb': (32, 16),
'camellia-256-cfb': (32, 16),
}
def random_string(length):
return M2Crypto.Rand.... | 90 | 23.36 | 69 | 14 | 656 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_f74cf8e5de3c2ffb_4753ebc7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
36
] | [
null
] | [
20
] | [
24
] | |
2024-11-18T21:58:21.516580+00:00 | 1,645,573,682,000 | 2323738506f0651a61d18651cac6b5d8756e60fc | 3 | {
"blob_id": "2323738506f0651a61d18651cac6b5d8756e60fc",
"branch_name": "refs/heads/master",
"committer_date": 1645573682000,
"content_id": "69d1b7a09020f94cada68900618b3a8a1cba1676",
"detected_licenses": [
"MIT"
],
"directory_id": "d6ae08228f1b36bd0fc9d169120d080444563e21",
"extension": "py",
"fi... | 2.609375 | stackv2 | import mysql.connector
from flask import Flask, jsonify, abort, request, redirect, url_for
from mysql.connector import Error
GET = "GET"
POST = "POST"
LOCALHOST = "0.0.0.0"
app = Flask(__name__)
app.config.from_object('config')
def sql_query(query):
try:
connection = mysql.connector.connect(
... | 82 | 28.37 | 133 | 16 | 571 | python | [{"finding_id": "codeql_py/flask-debug_c4b1ca2f5aeb43ad_08d2174b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-089"
] | [
"py/flask-debug",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This SQL query depends on a [user-provided value](1)."
] | [
82,
24
] | [
null,
null
] | [
5,
28
] | [
65,
33
] | |
2024-11-18T21:58:35.504872+00:00 | 1,591,557,524,000 | 8f3fd97eb403c5ceffb9130a2a9417d562a60fa9 | 3 | {
"blob_id": "8f3fd97eb403c5ceffb9130a2a9417d562a60fa9",
"branch_name": "refs/heads/master",
"committer_date": 1591557524000,
"content_id": "e98c5f8ebe33385858e793e93cfb65e25ce9c91f",
"detected_licenses": [
"MIT"
],
"directory_id": "a8e30c94e1207220e6ae943e1d90ffa2bf9ce004",
"extension": "py",
"fi... | 3.171875 | stackv2 | # Script to check subdomain of the websites using Certificate transperancy logs
# 100daysCodingChallenge
# Level: Easy
import requests
import sys
args_length = len(sys.argv) - 1
if args_length < 1:
print("Enter the domain name for search")
sys.exit(1)
def get_subdomains(url):
"""
Takes a URL and ... | 57 | 23.98 | 104 | 15 | 330 | python | [{"finding_id": "codeql_py/request-without-cert-validation_2b26c6c1ddcafcbc_c29e98ac", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
34
] | [
null
] | [
16
] | [
47
] | |
2024-11-18T23:10:59.727042+00:00 | 1,621,843,309,000 | c799da0489be0d5029bc2b86d853467bb894edd9 | 3 | {
"blob_id": "c799da0489be0d5029bc2b86d853467bb894edd9",
"branch_name": "refs/heads/main",
"committer_date": 1621922858000,
"content_id": "df0d9da4dc8257973d0a12702146b6ccbb0a128e",
"detected_licenses": [
"BSD-3-Clause",
"MIT"
],
"directory_id": "3a6a211ea0d32405497fbd6486c490bb147e25f9",
"exten... | 2.78125 | stackv2 | # (c) 2005 Ian Bicking and contributors; written for Paste (http://pythonpaste.org)
# Licensed under the MIT license: http://www.opensource.org/licenses/mit-license.php
import cgi
import six
import re
from six.moves import html_entities
from six.moves.urllib.parse import quote, unquote
__all__ = ['html_quote', 'html... | 85 | 25.11 | 84 | 17 | 599 | python | [{"finding_id": "codeql_py/overly-large-range_8b3a93d2c3d28364_14028ab4", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[\\u000e\\u000f\\u0010\\u0011\\u0012\\u0013\\u0014\\u... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[\\u000e\\u000f\\u0010\\u0011\\u0012\\u0013\\u0014\\u0015\\...."
] | [
68
] | [
null
] | [
36
] | [
39
] | |
2024-11-18T22:05:52.974032+00:00 | 1,604,653,091,000 | 1955226eb2d73529a46601da42037750ccbeb699 | 3 | {
"blob_id": "1955226eb2d73529a46601da42037750ccbeb699",
"branch_name": "refs/heads/master",
"committer_date": 1604653091000,
"content_id": "b8574bbbf9448f585c0fbc42d67d7034f85251c7",
"detected_licenses": [
"MIT"
],
"directory_id": "34ba661c593167e2aaa4da6cda5a638524ea8823",
"extension": "py",
"fi... | 2.8125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
Sample script to reboot iRMC via iRMC Redfish API
in Fujitsu PRIMERGY
"""
import sys
import argparse
import requests
import json
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
__author__ = "Masahiro Murayama"
__version__ = "0.0... | 58 | 22.12 | 77 | 15 | 356 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b06ea55b05e541bc_dbfe6a5d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
24
] | [
null
] | [
16
] | [
71
] | |
2024-11-18T22:35:56.006415+00:00 | 1,690,503,684,000 | 6ebdbbe6845dbb048dd282d4b5dd4aad54c05868 | 2 | {
"blob_id": "6ebdbbe6845dbb048dd282d4b5dd4aad54c05868",
"branch_name": "refs/heads/master",
"committer_date": 1690562178000,
"content_id": "31717bccda8f939ae79b19e42004a8d75d89e184",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5a1693639a49f08bbf389b1612bedb694c8c4e61",
"extension": "py"... | 2.359375 | stackv2 | #!/usr/bin/python3
#
# Copyright (c) 2020-2023 Wind River Systems, Inc.
#
# SPDX-License-Identifier: Apache-2.0
#
from argparse import ArgumentParser
import getpass
import mechanize
import re
import six
import ssl
import sys
import urllib
def main():
parser = ArgumentParser(description="OIDC authentication")
... | 194 | 30.18 | 79 | 16 | 1,367 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_439f0f399d8b1345_8924a202", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
63
] | [
null
] | [
15
] | [
38
] | |
2024-11-18T22:36:01.587001+00:00 | 1,608,239,720,000 | c69ca50f0c5d96f4760d71bc9d478fa886af1063 | 3 | {
"blob_id": "c69ca50f0c5d96f4760d71bc9d478fa886af1063",
"branch_name": "refs/heads/main",
"committer_date": 1608239720000,
"content_id": "2560c9bc1b92b4ef3e80e471a34a319984d19422",
"detected_licenses": [
"MIT"
],
"directory_id": "9d1d9b4d410e9b7ddf4585dbcf02e84069a4913b",
"extension": "py",
"file... | 2.5625 | stackv2 | import os
import re
from datetime import date, datetime
import requests
from django.conf import settings
from django.contrib import messages
from django.shortcuts import redirect, render
from django.views import View
from django.views.generic import ListView
from .models import Show
class ShowManager():
... | 176 | 33.64 | 131 | 19 | 1,270 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_98c0150d14c72b68_d0b1d192", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
99
] | [
null
] | [
29
] | [
45
] | |
2024-11-18T22:36:03.015494+00:00 | 1,413,795,734,000 | e72d1b9f985b7e42fd18065f67ec71b03cb4186c | 3 | {
"blob_id": "e72d1b9f985b7e42fd18065f67ec71b03cb4186c",
"branch_name": "refs/heads/master",
"committer_date": 1413795734000,
"content_id": "b3fea2a857047d1f8e6a2c41dc18d3ca2670df0c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "dd7a284935058a66ed28c521ba7742b04be9c31e",
"extension": "py"... | 2.578125 | stackv2 | #coding=utf-8
import paramiko,datetime,thread
from xml.etree.ElementTree import ElementTree
class RestServer():
def __init__(self,lab_vm_path,host_authentication_path):
self.__lock = thread.allocate_lock()
self.__max_iter=100
self.created_time = datetime.datetime.now()
... | 188 | 39.32 | 118 | 20 | 1,654 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_4588b283f29c13a6_afa6dad7", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
49
] | [
null
] | [
13
] | [
73
] | |
2024-11-18T22:48:19.998326+00:00 | 1,537,139,190,000 | f1bae3b1db5caa33c71647e9bfdb96ee49668ee1 | 3 | {
"blob_id": "f1bae3b1db5caa33c71647e9bfdb96ee49668ee1",
"branch_name": "refs/heads/master",
"committer_date": 1537139190000,
"content_id": "6aba2dc0bdca3b0e139c90d90d7cc1bff8a1a751",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d190750d6cb34e9d86ae96724cf4b56a2f57a74a",
"extension": "py"... | 2.546875 | stackv2 | from __future__ import absolute_import
from __future__ import division
from __future__ import print_function
import argparse
import os
import sys
from six.moves import urllib
if sys.version_info < (3, 0):
reload(sys)
sys.setdefaultencoding('utf8')
def parse_rst(rst_url, tmp_rst_file_path='tmp/rst'):
"""Parse... | 452 | 32.31 | 79 | 22 | 3,270 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8147aadf4c711df9_d4a323ee", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
258
] | [
null
] | [
15
] | [
54
] | |
2024-11-18T23:25:53.675107+00:00 | 1,596,496,357,000 | 72117b4528d9593fcd7f06cfdc1d8aadf5e0a24c | 2 | {
"blob_id": "72117b4528d9593fcd7f06cfdc1d8aadf5e0a24c",
"branch_name": "refs/heads/master",
"committer_date": 1596496357000,
"content_id": "f89d4dd49fca93a0adc574ea14c3e9800118709b",
"detected_licenses": [
"MIT"
],
"directory_id": "cee0b30b1bd3bb834ea35ff6688258f0ba67fd33",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!usr/bin/env python3.7
import time
import os
import sys
from sys import argv
import re
import json
import multiprocessing
import requests
from base.Configurations import *
from urllib.request import urlopen
from subprocess import check_output, CalledProcessError
import subprocess
import threading
from data.index i... | 314 | 33.85 | 133 | 21 | 3,150 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_a071564b0ad07655_5f0cd215", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [.serveo.net](1) may be at an arbitrary position in the... | 3 | true | [
"CWE-020",
"CWE-312",
"CWE-312"
] | [
"py/incomplete-url-substring-sanitization",
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The string [.serveo.net](1) may be at an arbitrary position in the sanitized URL.",
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression log... | [
215,
288,
289
] | [
null,
null,
null
] | [
12,
23,
11
] | [
34,
124,
14
] | |
2024-11-18T23:25:58.850741+00:00 | 1,569,901,609,000 | cff762e25051119debe872427bbca3c0da13dc32 | 3 | {
"blob_id": "cff762e25051119debe872427bbca3c0da13dc32",
"branch_name": "refs/heads/master",
"committer_date": 1569901609000,
"content_id": "e76c88818465e451f417198b3ac110cd2188cf9f",
"detected_licenses": [
"MIT"
],
"directory_id": "9a71988e650cabc657707bb58897e5f7b24053ff",
"extension": "py",
"fi... | 2.65625 | stackv2 | from datetime import datetime
import requests
from urllib.error import HTTPError
import json
import re
from dateutil.parser import parse
class Scrape:
def __init__(self, start_time):
self.scrape_start = datetime.now()
self.scrape_end = None
self.char_count = 0
self.min_ilvl = 0.0
... | 82 | 33.11 | 89 | 19 | 644 | python | [{"finding_id": "codeql_py/overly-large-range_a8eceb9db1a5cda6_784c59ab", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
49
] | [
null
] | [
61
] | [
64
] | |
2024-11-18T23:26:01.063082+00:00 | 1,451,310,651,000 | 78adfa77ce5e0cc4ce2b80855ea4c9aec05d7ffc | 3 | {
"blob_id": "78adfa77ce5e0cc4ce2b80855ea4c9aec05d7ffc",
"branch_name": "refs/heads/master",
"committer_date": 1451310651000,
"content_id": "8b540bcae16b485852c4c1b3356a7c0d8a23714d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "276baddd5665949c334b31f5c4e07356111c90c3",
"extension": "py"... | 3.375 | stackv2 | #hash1.py
import hashlib
md5=hashlib.md5()
md5.update('how to use md5 in python hashlib?')
print md5.hexdigest()
md5=hashlib.md5()
md5.update('how to use md5 in')
md5.update('python hashlib?')
print md5.hexdigest()
sha1=hashlib.sha1()
sha1.update('how to use sha1 in')
sha1.update('python shalib?')
print sha1.hexdig... | 43 | 18.53 | 47 | 9 | 329 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1bbeb5e63bfaf61b_5202acf3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
21
] | [
null
] | [
13
] | [
21
] | |
2024-11-18T23:26:04.814687+00:00 | 1,632,335,711,000 | 515766ff4d0d0cb9570784f37b9dc7185c63ee58 | 3 | {
"blob_id": "515766ff4d0d0cb9570784f37b9dc7185c63ee58",
"branch_name": "refs/heads/master",
"committer_date": 1632335711000,
"content_id": "24fa14ff6593823a3ea2c47c50aff8479156bb0d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "745f58a02e94343f67fa5b5af5915aee2b2c9aa7",
"extension": "py"... | 2.765625 | stackv2 | import paramiko
import logging
import os
logger = logging.getLogger(__name__)
class SSHClient():
def __init__(self, ip_address, ssh_credentials):
self.ip_address = ip_address
self.ssh_credentials = ssh_credentials
self.ssh_client = None
if 'key_filename' in self.ssh_credentials ... | 104 | 31.28 | 86 | 16 | 715 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_556087bb7d9a6820_fb6cb8a9", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
33
] | [
null
] | [
9
] | [
78
] | |
2024-11-18T23:26:05.391353+00:00 | 1,568,828,945,000 | 19d57236cccc32bac6545b0a812287e30913a3cd | 3 | {
"blob_id": "19d57236cccc32bac6545b0a812287e30913a3cd",
"branch_name": "refs/heads/master",
"committer_date": 1568828945000,
"content_id": "8bcaedda57bb0aab65cf3531755dc5bee9881840",
"detected_licenses": [
"MIT"
],
"directory_id": "1795f78569a8dcfa6986168725619d747d88624f",
"extension": "py",
"fi... | 2.59375 | stackv2 | import argparse
import base64
import requests
import urllib3
import re
import xml.dom.minidom
# Disable warnings, as XML Mgmt often has a self-signed certificate
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
# Global for verbose logging, set via --verbose argument
VERBOSE = False
def get_user... | 104 | 27.56 | 132 | 12 | 692 | python | [{"finding_id": "codeql_py/request-without-cert-validation_3b9e682b392953ee_4a6ef272", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
79
] | [
null
] | [
9
] | [
74
] | |
2024-11-18T22:48:15.996257+00:00 | 1,545,744,926,000 | 9f847380453ea35116ac3c0723faca1d37a2c84e | 3 | {
"blob_id": "9f847380453ea35116ac3c0723faca1d37a2c84e",
"branch_name": "refs/heads/master",
"committer_date": 1545744926000,
"content_id": "532f206d59541268a0fd997a5a4ee57a2892615a",
"detected_licenses": [
"MIT"
],
"directory_id": "7f7dc46f18fe565cc49ff6c088047850189ea12d",
"extension": "py",
"fi... | 2.578125 | stackv2 | import asyncio
import random
import json
import re
from .responses import send_error
base_dir = "/home/ninhdo/discord/"
challenges_path = base_dir + "challenges.json"
challenge_regex = "[A-z0-9\.\,\' \(\)]+"
async def fortnite_random_challenge(channel):
with open(challenges_path) as f:
challenges = json.load(f)
... | 81 | 33.91 | 92 | 17 | 690 | python | [{"finding_id": "codeql_py/overly-large-range_8fb32b3a7fe2bcbf_52898b01", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
10
] | [
null
] | [
21
] | [
24
] | |
2024-11-18T22:27:18.288850+00:00 | 1,458,976,673,000 | dc180e17f286604ed6650c09bf7b3eff1ca98cf5 | 3 | {
"blob_id": "dc180e17f286604ed6650c09bf7b3eff1ca98cf5",
"branch_name": "refs/heads/master",
"committer_date": 1458976673000,
"content_id": "f7108b18f3cafb6b5f9f52bb095ed18dd1b80111",
"detected_licenses": [
"MIT"
],
"directory_id": "a1216bad0b2d2d1db66d4ccdb45cc4a9938f5e47",
"extension": "py",
"fi... | 2.6875 | stackv2 | # !/usr/bin/env python
# -*- coding:utf-8 -*-
from bs4 import BeautifulSoup
import urlparse
import re
class Parser(object):
def _pre_test(self, url, soup):
bad_links = {}
if soup.title == "手机搜狐" and url != 'http://m.sohu.com':
bad_links[url] = 404
# todo:坏链处理。。。
... | 48 | 29.42 | 80 | 17 | 355 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_84779456bf2d7cb7_6e5706cd", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://m.sohu.com](1) may be at an arbitrary position ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [http://m.sohu.com](1) may be at an arbitrary position in the sanitized URL."
] | [
29
] | [
null
] | [
18
] | [
59
] | |
2024-11-18T22:27:26.283611+00:00 | 1,490,657,206,000 | 7815bac0c6e0f5ea38b8cc7929c76b2db86c9d69 | 2 | {
"blob_id": "7815bac0c6e0f5ea38b8cc7929c76b2db86c9d69",
"branch_name": "refs/heads/master",
"committer_date": 1490657206000,
"content_id": "8dddba289ced193969dbe6e7a5ebc8be3a53dd27",
"detected_licenses": [
"MIT"
],
"directory_id": "504d7684ab92c853433d8a03096e5650aba61632",
"extension": "py",
"fi... | 2.484375 | stackv2 | # -*- coding: utf-8 -*-
"""
Defines the Layout class.
"""
from __future__ import print_function
import os
from os import path
import inspect
import shutil
import stat
from collections import namedtuple, defaultdict
from subprocess import Popen
from flask import Markup
from jinja2 import Environment, FileSystemLoader... | 302 | 30.62 | 89 | 18 | 1,946 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9c33dcd0f34926f0_c1f78e4c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
202
] | [
206
] | [
15
] | [
10
] | |
2024-11-18T22:27:43.537433+00:00 | 1,420,652,029,000 | 9c76461bd413cb8464ef52c55b267020f862e24a | 3 | {
"blob_id": "9c76461bd413cb8464ef52c55b267020f862e24a",
"branch_name": "refs/heads/master",
"committer_date": 1420652029000,
"content_id": "6e6669b5cf3efa5ccfd22786619fee5e9af52a74",
"detected_licenses": [
"MIT"
],
"directory_id": "72c65ab014d5589eeb034568f855ac159fc552aa",
"extension": "py",
"fi... | 2.5625 | stackv2 | __author__ = 'hujin'
import json
from twisted.internet import reactor
from twisted.web.resource import Resource
from twisted.web.server import NOT_DONE_YET
from twisted.python.failure import Failure
"""
API
GET /services Get a list of services
GET /services/:id Get information of a service
PUT /services/:id ... | 146 | 24.84 | 87 | 16 | 787 | python | [{"finding_id": "codeql_py/reflective-xss_75c5e2a27fa26a63_8da23d26", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
110
] | [
null
] | [
20
] | [
72
] | |
2024-11-18T22:14:49.870859+00:00 | 1,605,609,755,000 | ef5cb771fbfbdf44d3259f6b3c0c1312d3ea1bd1 | 3 | {
"blob_id": "ef5cb771fbfbdf44d3259f6b3c0c1312d3ea1bd1",
"branch_name": "refs/heads/master",
"committer_date": 1605609755000,
"content_id": "3ea0bfb1f4f1e0dd023dcd6181a114d336cf4b6e",
"detected_licenses": [
"MIT"
],
"directory_id": "ef5839ac714adb96f0234a8680202fcb836d12f2",
"extension": "py",
"fi... | 2.953125 | stackv2 | #!/usr/bin/env python3
import fuzzy
from timeit import default_timer as timer
from collections import Counter
from reader import load_sanctions
from dataobjects import NamePart
from dataobjects import NameAlias
dmeta = fuzzy.DMetaphone()
import normalizer
def find_noise_words(id_to_name):
"""
Finds the mos... | 315 | 45.64 | 152 | 18 | 3,286 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_de48c99a689b1f32_7188975b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
286
] | [
null
] | [
15
] | [
149
] | |
2024-11-18T22:14:57.350771+00:00 | 1,660,786,164,000 | 14cc0f7d6c3996de8572d2d1510bb6111aaf8113 | 3 | {
"blob_id": "14cc0f7d6c3996de8572d2d1510bb6111aaf8113",
"branch_name": "refs/heads/master",
"committer_date": 1660786164000,
"content_id": "76e4f7475f53139ee15060984724ca3c2fd5a763",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "6bebc30cedd75e2e417add03e9e759ae39efbee5",
"extension": "p... | 2.890625 | stackv2 | import os
import sys
from functools import wraps
def redirect_stdout_stderr(f):
'''a decorator to add keyword stdout, stderr to the function args
if stdout, stderr is not None, redirect the stdout, stderr to
the respective files.
'''
@wraps(f)
def f_decorated(*args, **kwargs):
try:
... | 38 | 31.39 | 72 | 17 | 273 | python | [{"finding_id": "codeql_py/overly-permissive-file_17a36ddaada136fa_3c706cab", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in open sets file to world readable.",
"Overly permissive mask in open sets file to world readable."
] | [
23,
17
] | [
null,
null
] | [
25,
25
] | [
73,
73
] | |
2024-11-18T22:14:57.586604+00:00 | 1,424,118,744,000 | 0c8faf33c2d10bf5307224c09fd80b8068ed5d95 | 2 | {
"blob_id": "0c8faf33c2d10bf5307224c09fd80b8068ed5d95",
"branch_name": "refs/heads/master",
"committer_date": 1424118744000,
"content_id": "5c014b3fe33616f85a8445fc409e11ce510f82c4",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "4c84fcc98fe5c0c8d2d4fbf6f35697e8bfd95960",
"extension": "p... | 2.40625 | stackv2 | import asyncio
import logging
import simplejson as json
import cryptacular.bcrypt
from aiorm import orm
log = logging.getLogger(__name__)
bcrypt = cryptacular.bcrypt.BCRYPTPasswordManager()
class ModelError(Exception):
""" A base Exception for models validation """
class Table:
"""
A class that initial... | 172 | 31.53 | 77 | 18 | 1,230 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_322af67bd8ea1dc1_90590bf8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
147,
148
] | [
null,
null
] | [
18,
18
] | [
38,
31
] | |
2024-11-18T22:15:05.507919+00:00 | 1,507,487,094,000 | dafa07df584291f3e1b30e672e7357fdea86f344 | 3 | {
"blob_id": "dafa07df584291f3e1b30e672e7357fdea86f344",
"branch_name": "refs/heads/master",
"committer_date": 1507487094000,
"content_id": "30671f562c1df7b4ad600903b48311e213f91828",
"detected_licenses": [
"MIT"
],
"directory_id": "ea0580739e2bdade7785ae5d955ad541e00dba71",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
import StringIO
import base64
from flask import request, redirect, url_for, render_template, Blueprint
import json
import glob
import time
from uuid import uuid4
import random
from PIL import Image
import os
app = Blueprint('steganography', __name__, static_folder='static')
... | 211 | 36.21 | 127 | 21 | 2,166 | python | [{"finding_id": "codeql_py/path-injection_cb2194f799ac3bf2_267a5670", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
187
] | [
null
] | [
26
] | [
30
] | |
2024-11-18T22:55:40.768642+00:00 | 1,628,794,924,000 | 41f87674071b656814b6d11f2fb1b8b806240701 | 3 | {
"blob_id": "41f87674071b656814b6d11f2fb1b8b806240701",
"branch_name": "refs/heads/main",
"committer_date": 1628794924000,
"content_id": "8206a1463a16592c1f035f6f2aa023fccfdb6cc9",
"detected_licenses": [
"MIT"
],
"directory_id": "66daee58ac4357d63b98c2c8cab52919ff0c2600",
"extension": "py",
"file... | 2.875 | stackv2 | import tkinter as tk
from tkinter import ttk
from tkinter import filedialog, messagebox, simpledialog
from PIL import Image, ImageTk
from ecg import *
import matplotlib.image as mpimg
from matplotlib.backends.backend_tkagg import FigureCanvasTkAgg
import base64
import io
import requests
from matplotlib import pyplot as... | 275 | 30.09 | 79 | 15 | 2,079 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_73f5858b6a388884_d3730347", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
75
] | [
null
] | [
15
] | [
24
] | |
2024-11-18T23:23:58.965893+00:00 | 1,691,874,965,000 | f95ea6b79df0db572c2a441cba6f9e7310f956a6 | 2 | {
"blob_id": "f95ea6b79df0db572c2a441cba6f9e7310f956a6",
"branch_name": "refs/heads/master",
"committer_date": 1691874965000,
"content_id": "7e34ed6219cf0122867ce8fb5862df05fbdd5893",
"detected_licenses": [
"MIT"
],
"directory_id": "f5efaf91c0fde47b73fff89f5dd7951975485194",
"extension": "py",
"fi... | 2.421875 | stackv2 | import datetime
from flask import jsonify, request, url_for, make_response, Response
from flask.wrappers import Request
from json import dumps
from schema import SchemaError
from typing import Any, Tuple, Union
from . import app, log, dataset
assert app is not None
assert log is not None
#
# Convenience functions t... | 199 | 27.8 | 79 | 18 | 1,504 | python | [{"finding_id": "codeql_py/stack-trace-exposure_ff5f9d91884b43b9_783ba437", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user."
] | [
18
] | [
null
] | [
47
] | [
50
] | |
2024-11-18T22:56:19.262847+00:00 | 1,567,178,168,000 | c77c736c81a3dee4b5045b65bea83dbb5e39a449 | 3 | {
"blob_id": "c77c736c81a3dee4b5045b65bea83dbb5e39a449",
"branch_name": "refs/heads/master",
"committer_date": 1567178760000,
"content_id": "8c4dcab60b7738aaaf8a84252b9f5cd4dba2b051",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "07d6ee8f22dbe1a60af1584657373e6913afcc13",
"extension": "py"... | 2.921875 | stackv2 | #! /usr/bin/env python3
# proxyget.py
""" Simple library for retrieving websites and online files through a proxy """
import functools
import json
import string
from getpass import getpass, getuser
from pathlib import Path
from typing import Any, Dict, Mapping, NamedTuple, Optional, Union
from warnings import warn
im... | 335 | 30.77 | 83 | 18 | 2,469 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4ca049bde7c487ec_90d2f5b2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
180
] | [
null
] | [
15
] | [
37
] | |
2024-11-19T00:07:16.524520+00:00 | 1,632,872,375,000 | bc2fe5721571d144b31a621e42126448c8a5733f | 2 | {
"blob_id": "bc2fe5721571d144b31a621e42126448c8a5733f",
"branch_name": "refs/heads/master",
"committer_date": 1632872375000,
"content_id": "4c21500c6c5ec9e921ec8369e34767551899d5ce",
"detected_licenses": [
"MIT"
],
"directory_id": "df867bb68495bafd7525132a0f4dd35d926bc517",
"extension": "py",
"fi... | 2.40625 | stackv2 | import requests
from data import ui
def consultar(lang):
Sair=False
while(Sair==False):
placa_input = ui.input_dialog()
placa_data = requests.get('https://apicarros.com/v1/consulta/{}/json'.format(placa_input), verify = False).json() # JSQ7436
try:
if (placa_data['codigoRetor... | 36 | 34.64 | 131 | 16 | 434 | python | [{"finding_id": "codeql_py/request-without-cert-validation_02bc0031528a82bb_522d9099", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
7
] | [
null
] | [
22
] | [
115
] | |
2024-11-19T00:07:29.549434+00:00 | 1,587,408,546,000 | ebb80fde6113ff9c09375561d54d8d018e04e3d3 | 2 | {
"blob_id": "ebb80fde6113ff9c09375561d54d8d018e04e3d3",
"branch_name": "refs/heads/master",
"committer_date": 1587408546000,
"content_id": "dc27635388a07356f30be2f238714dbba1ab1cfc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4968a1d9ec3447034b04da4fc59f9c5ea88c908a",
"extension": "py"... | 2.328125 | stackv2 | import json
import requests
requests.packages.urllib3.disable_warnings()
import logging
import os
import sys
logger = logging.getLogger('avisession')
#logger.setLevel(logging.DEBUG)
#ch = logging.StreamHandler(sys.stdout)
#ch.setLevel(logging.DEBUG)
#logger.addHandler(ch)
class ObjectNotFound(Exception):
pass
cl... | 321 | 39.76 | 102 | 18 | 2,890 | python | [{"finding_id": "codeql_py/request-without-cert-validation_de1d1c828fe7de12_79c252e2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
43
] | [
44
] | [
15
] | [
54
] | |
2024-11-19T00:45:04.400939+00:00 | 1,497,868,116,000 | bfff4f8191f969ebf26ab0a410365d848e65ab33 | 2 | {
"blob_id": "bfff4f8191f969ebf26ab0a410365d848e65ab33",
"branch_name": "refs/heads/master",
"committer_date": 1497868116000,
"content_id": "7ce3589ed199ff3930c88e51d544fbbec5a535d2",
"detected_licenses": [
"MIT"
],
"directory_id": "a37cb8941250a2378348b9f2119fb82bac83a903",
"extension": "py",
"fi... | 2.34375 | stackv2 | __author__ = 'Britefury'
import os, tarfile, cPickle
import numpy as np
from britefury_lasagne import dataset
def _download_cifar10(filename='cifar-10-python.tar.gz', source='http://www.cs.toronto.edu/~kriz/'):
return dataset.download_data(filename, source + filename)
def _convert_batch(b):
return b['dat... | 64 | 34.95 | 120 | 15 | 693 | python | [{"finding_id": "codeql_py/tarslip_7df21bb400f95fea_1ac92567", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
36
] | [
null
] | [
9
] | [
45
] | |
2024-11-19T00:45:04.560289+00:00 | 1,623,063,741,000 | d1a2bd46ac66d3d6518668cced6cad6435252cea | 2 | {
"blob_id": "d1a2bd46ac66d3d6518668cced6cad6435252cea",
"branch_name": "refs/heads/main",
"committer_date": 1623063741000,
"content_id": "542e9b55ea4a7c6e6c2727b77ccbbea457a2e0a5",
"detected_licenses": [
"MIT"
],
"directory_id": "f3159749142a9b143c622780bbb414d08f71fead",
"extension": "py",
"file... | 2.390625 | stackv2 | import json
from rest_framework.views import APIView
from rest_framework.response import Response
from rest_framework.permissions import IsAuthenticated
from django.http import JsonResponse
from django.contrib.auth import get_user_model
from django.db import IntegrityError
from django.contrib.auth import authenticate, ... | 295 | 33.07 | 98 | 19 | 1,991 | python | [{"finding_id": "codeql_py/stack-trace-exposure_dce4dcfcda4afa71_07744ef8", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
144,
219,
282,
295
] | [
null,
null,
null,
null
] | [
29,
29,
29,
29
] | [
33,
33,
33,
33
] | |
2024-11-18T23:39:44.016566+00:00 | 1,642,621,147,000 | 7d96721aaa638b477af9ce6ffe43462004589773 | 3 | {
"blob_id": "7d96721aaa638b477af9ce6ffe43462004589773",
"branch_name": "refs/heads/master",
"committer_date": 1642621147000,
"content_id": "00c986cd14706745f5380cfa0a6e25e242b00e5e",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "7de8f47b851bf96c4e7c336deb713c69de91e4e3",
"extension": "p... | 2.5625 | stackv2 | """
Simple code for gathering forecasts and adjusting the power factors for multiple DER devices
@author: cwhanse, jjohns2
"""
import requests
from requests.auth import HTTPBasicAuth
import json
import pandas as pd
class CE_API(object):
def __init__(self, username=None, password=None):
self.proxy = {'... | 155 | 35.28 | 115 | 19 | 1,334 | python | [{"finding_id": "codeql_py/request-without-cert-validation_67f09b72a38913fa_e236096e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
71,
100,
120,
124
] | [
73,
102,
122,
126
] | [
24,
16,
24,
24
] | [
51,
43,
67,
67
] | |
2024-11-18T23:39:45.516932+00:00 | 1,684,830,686,000 | 8a31eab9a6bcbba895f5083a7dc861871f12ff48 | 3 | {
"blob_id": "8a31eab9a6bcbba895f5083a7dc861871f12ff48",
"branch_name": "refs/heads/master",
"committer_date": 1684830686000,
"content_id": "7a0c28514ad2cc772e30a7c0d938556851eda070",
"detected_licenses": [
"MIT"
],
"directory_id": "860ad5b78ca17ef9640549d7114078ea505c2b31",
"extension": "py",
"fi... | 2.859375 | stackv2 | import re
def remove_animation(content):
return re.sub(re.compile("<!--.*?-->"), "", str(content.text))
def upto_level(content, level):
out = content.text
for ss in [
x[0]
for x in re.findall(
re.compile(
"(\s*.*<!--.*?level=(\d+)*.*?-->)"
), # FI... | 21 | 22.1 | 66 | 13 | 125 | python | [{"finding_id": "codeql_py/redos_c03486de473878bf_4940bc43", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<!--level=' and containing many r... | 2 | true | [
"CWE-1333",
"CWE-116"
] | [
"py/redos",
"py/bad-tag-filter"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '<!--level=' and containing many repetitions of '9'.",
"This regular expression does not match comments containing newlines."
] | [
14,
5
] | [
null,
null
] | [
38,
31
] | [
41,
41
] | |
2024-11-18T23:40:01.415995+00:00 | 1,573,456,994,000 | c3eb7bf28a9121161cab812ac8f088b95210786b | 3 | {
"blob_id": "c3eb7bf28a9121161cab812ac8f088b95210786b",
"branch_name": "refs/heads/master",
"committer_date": 1573456994000,
"content_id": "5db48a2cc896fe7108ed36c7d155d35a18819388",
"detected_licenses": [
"MIT"
],
"directory_id": "71f1613bd424d6f46e00156c51dcee0b77e1eb21",
"extension": "py",
"fi... | 3.21875 | stackv2 | #!/usr/bin/env python3.6
from users import Users
from credentials import Credentials
import random
def create_user(username,firstname,lastname,birthmonth,password):
'''
function to create a new account
'''
new_users = Users(username,firstname,lastname,birthmonth,password)
return new_users
def crea... | 196 | 30.28 | 160 | 24 | 1,134 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5de03c277de26979_aadcbfe1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
141,
148,
155
] | [
null,
null,
null
] | [
31,
27,
35
] | [
62,
99,
160
] | |
2024-11-19T00:19:24.980768+00:00 | 1,561,408,501,000 | 7389ca59c6421b2075ed03ea0472b8187afee92f | 3 | {
"blob_id": "7389ca59c6421b2075ed03ea0472b8187afee92f",
"branch_name": "refs/heads/master",
"committer_date": 1561408501000,
"content_id": "360d79ed46477f76a91f1f7c5a3a4b334b3c0a98",
"detected_licenses": [
"MIT"
],
"directory_id": "9ccfe921acb5d3940e887f2dae337f5de04ad34d",
"extension": "py",
"fi... | 2.796875 | stackv2 | # app.py - a minimal flask api using flask_restful
from flask import Flask, request
from flask_restful import Resource, Api
app = Flask(__name__)
api = Api(app)
class HelloWorld(Resource):
def get(self):
return {'hello': 'world'}
api.add_resource(HelloWorld, '/')
@app.route("/reverse")
def hello():
... | 24 | 19.58 | 52 | 11 | 126 | python | [{"finding_id": "codeql_py/flask-debug_61012f3d5fbfadc6_d589efa3", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
24,
21
] | [
null,
null
] | [
5,
12
] | [
40,
24
] | |
2024-11-19T01:11:35.243751+00:00 | 1,494,917,096,000 | 23f94c66ec6e82e62b5cbc81242213ee4919d9ce | 3 | {
"blob_id": "23f94c66ec6e82e62b5cbc81242213ee4919d9ce",
"branch_name": "refs/heads/master",
"committer_date": 1494917096000,
"content_id": "2071482680a36257cf5b4d4e014bbb4c4b92fb51",
"detected_licenses": [
"MIT"
],
"directory_id": "a62b97ac693c9614a7926d890bfb199864b5a9c9",
"extension": "py",
"fi... | 2.53125 | stackv2 | import requests
from flask import Flask,render_template,request,redirect,url_for
app=Flask(__name__)
API_KEY = "XXXXXXXXXXXXX"
ENDPOINT = "http://api.giphy.com"
@app.route("/",methods = ["GET","POST"])
def home():
if request.method == 'POST':
if request.form['submit'] == 'Trending':
return tr... | 91 | 29.77 | 93 | 15 | 741 | python | [{"finding_id": "codeql_py/flask-debug_4b01a2fc0b1552a0_7e37a5ff", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
91,
84
] | [
null,
null
] | [
2,
9
] | [
21,
43
] | |
2024-11-19T01:11:41.817814+00:00 | 1,627,216,375,000 | db8b48827dfd439d87ee2198122a43252e25cf38 | 3 | {
"blob_id": "db8b48827dfd439d87ee2198122a43252e25cf38",
"branch_name": "refs/heads/master",
"committer_date": 1627216375000,
"content_id": "f233c5c0eba1ad1f633847b25141f24ff9a829ea",
"detected_licenses": [
"Unlicense"
],
"directory_id": "ffcdd190fcdf809b1a53368e1835836cb35cea53",
"extension": "py",... | 2.859375 | stackv2 | #!/usr/bin/env python3
import json
import csv
import os.path
import requests
__author__ = "Alexander Popov"
__version__ = "2.1.0"
__license__ = "Unlicense"
def get_pages(username, api_key, limit=200):
""" Getting the number of pages with scrobbling data """
response = requests.get(
"https://ws.audi... | 138 | 27.35 | 83 | 19 | 974 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6c141665ee749ca1_5cacf0d7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
64,
81
] | [
null,
null
] | [
21,
21
] | [
25,
25
] | |
2024-11-18T23:48:09.580221+00:00 | 1,521,909,078,000 | 2c8fb58012d98d9dabd6f735542bba56834755d2 | 3 | {
"blob_id": "2c8fb58012d98d9dabd6f735542bba56834755d2",
"branch_name": "refs/heads/master",
"committer_date": 1521909078000,
"content_id": "7873f1d69d7656627cc51afb380680a136cf4f58",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "f801c4abf7fabdd9ef6c6f84c52383fd4218725a",
"extension": "p... | 2.96875 | stackv2 | # Parsing JSON from web
import urllib.request, urllib.parse, urllib.error
import ssl
import json
# key = ""
# Google Geocoding JSON interface url
google_geocoidng_json = "https://maps.googleapis.com/maps/api/geocode/json?"
# dr_chuck_jeojson = "http://py4e-data.dr-chuck.net/geojson?"
# Ignore security certificates
ct... | 74 | 37.18 | 97 | 12 | 632 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_16db5d22645bbac3_d50ef51b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text."
] | [
73
] | [
null
] | [
26
] | [
39
] | |
2024-11-19T00:44:24.720158+00:00 | 1,494,355,716,000 | 25746364013b0b6d48c9478332fd473c1c6e0d92 | 3 | {
"blob_id": "25746364013b0b6d48c9478332fd473c1c6e0d92",
"branch_name": "refs/heads/master",
"committer_date": 1494355716000,
"content_id": "f723ef9aa14fada584f3eac9662af0e1a0efc756",
"detected_licenses": [
"MIT"
],
"directory_id": "12716bf2ec47d2c50eb331d164904f05a8e4a736",
"extension": "py",
"fi... | 2.625 | stackv2 | """
Python program that generates information about a Virtual Machine's vNICs and hard disks
"""
from __future__ import print_function
from pyVim.connect import SmartConnect, Disconnect
from pyVmomi import vmodl, vim
from datetime import datetime
import argparse
import atexit
import getpass
# Alter this to change t... | 140 | 42.09 | 128 | 18 | 1,307 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_87854462c280722f_e6ebcf55", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
90,
94
] | [
null,
null
] | [
47,
55
] | [
62,
64
] | |
2024-11-19T00:44:30.793818+00:00 | 1,457,058,336,000 | 01355a56e5a620f424ae2ba43a472b8b91003497 | 2 | {
"blob_id": "01355a56e5a620f424ae2ba43a472b8b91003497",
"branch_name": "refs/heads/master",
"committer_date": 1457058336000,
"content_id": "e1f9d3abb7d5c99cc8bf3d509b04b72e13be4754",
"detected_licenses": [
"MIT"
],
"directory_id": "f78d1e6a8cd1253d9e023bafdbb4d3af1bb14417",
"extension": "py",
"fi... | 2.390625 | stackv2 | # System
import os, sys, socket, json
from datetime import datetime
# 3rd Party
import requests
# Local
import lib.lib
def genconfig(args, config):
agent_root_dir = config.get('AGENT_ROOT_DIR')
if agent_root_dir is None:
agent_root_dir = os.path.dirname(os.path.dirname(__file__))
hostname = conf... | 91 | 32.19 | 106 | 17 | 739 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_9b26268b9a320b37_a8d3c877", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive... | [
90,
33,
81
] | [
null,
null,
null
] | [
26,
11,
15
] | [
30,
43,
19
] | |
2024-11-18T23:05:33.931852+00:00 | 1,424,821,433,000 | a0fea8a21ce1b2c7849095e6ec79cdc65b64881e | 3 | {
"blob_id": "a0fea8a21ce1b2c7849095e6ec79cdc65b64881e",
"branch_name": "refs/heads/master",
"committer_date": 1424821433000,
"content_id": "5e7fea8a6c0bf6622940d4abbfb0174f79e02b1e",
"detected_licenses": [
"MIT"
],
"directory_id": "4a09febd9782573fb0b8ed92cd01f11a9504cf73",
"extension": "py",
"fi... | 3 | stackv2 | """
The view module is responsible for the server side
view layer of glim framework.
"""
from glim.core import Facade
from glim.response import Response
from jinja2 import Environment, PackageLoader
class View:
"""
The view layer base class is responsible for Jinja2 integration, template
data binding ... | 111 | 25.94 | 77 | 13 | 585 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2e38309610c87abd_01c5123e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
29
] | [
31
] | [
20
] | [
10
] | |
2024-11-18T23:05:44.328831+00:00 | 1,589,044,220,000 | 5129284a465d7abde6a0565f9a28ca665a609535 | 3 | {
"blob_id": "5129284a465d7abde6a0565f9a28ca665a609535",
"branch_name": "refs/heads/master",
"committer_date": 1589044220000,
"content_id": "9ccf31fa1b72d85daccb3a38ac885647766c3a1e",
"detected_licenses": [
"MIT"
],
"directory_id": "ec81e91f7eb3314fc3d8d92954e3bbd18a9ca20f",
"extension": "py",
"fi... | 3.21875 | stackv2 | # -*- coding: utf-8 -*-
"""Exemplo de CRUD com Python, SQLAlchemy e SQLite3"""
from sqlalchemy import Column, Integer, String, create_engine
from sqlalchemy.ext.declarative import declarative_base
from sqlalchemy.orm import sessionmaker
# Para debug utilizar ``echo=True``:
# engine = create_engine('sqlite:///db.sqlit... | 100 | 32.08 | 102 | 13 | 902 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fca00bd2fdbf02eb_71662dba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive... | [
63,
69,
75,
83,
89
] | [
null,
null,
null,
null,
null
] | [
15,
15,
11,
11,
11
] | [
94,
96,
102,
102,
102
] | |
2024-11-18T23:43:00.248773+00:00 | 1,279,749,070,000 | 3eb61e8d81f5248ced1a6bbb65dc52a1fc8ce619 | 2 | {
"blob_id": "3eb61e8d81f5248ced1a6bbb65dc52a1fc8ce619",
"branch_name": "refs/heads/master",
"committer_date": 1279749070000,
"content_id": "4b9d79e7f3abcfa0391c3e91a3f42c8494f8965b",
"detected_licenses": [
"MIT"
],
"directory_id": "1be62e50309c64d1d92b8ab048ac0077cbd1275a",
"extension": "py",
"fi... | 2.421875 | stackv2 | #coding: utf-8
import tempfile
import logging
import os
from django import forms
from django.db.models import Max
from django.forms.models import modelformset_factory
from django.utils.translation import ugettext_lazy as _
from django.core.files.uploadedfile import UploadedFile
from generic_images.models import Atta... | 245 | 32.26 | 104 | 17 | 1,748 | python | [{"finding_id": "codeql_py/path-injection_de7015be466e3396_6bbefdd6", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
168
] | [
null
] | [
19
] | [
31
] | |
2024-11-18T23:10:59.786579+00:00 | 1,525,020,871,000 | 3777b4a79567a5cc7169117d61847191e986df70 | 3 | {
"blob_id": "3777b4a79567a5cc7169117d61847191e986df70",
"branch_name": "refs/heads/master",
"committer_date": 1525020871000,
"content_id": "03f4dd6211987e47c21dc7e1bdb16891909a2f04",
"detected_licenses": [
"MIT"
],
"directory_id": "cd161682bfc2377b0df4f8b6c5f93561349fbe5d",
"extension": "py",
"fi... | 2.765625 | stackv2 | ''' RocketChat Realtime API. '''
import hashlib
import json
import logging
import uuid
from abc import ABC, abstractmethod
from typing import (
Any,
Callable,
Dict,
Generator,
List,
Optional,
Union,
)
from ws4py.client.threadedclient import WebSocketClient
from ws4py.messaging import Text... | 371 | 28.47 | 76 | 18 | 2,259 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_4201101f0115c0ab_3693d3b1", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
266
] | [
null
] | [
38
] | [
62
] | |
2024-11-19T01:21:36.991257+00:00 | 1,590,781,234,000 | 4e97976a2c778f816d9fc8b7ebfa588d1cbec61f | 3 | {
"blob_id": "4e97976a2c778f816d9fc8b7ebfa588d1cbec61f",
"branch_name": "refs/heads/master",
"committer_date": 1590781234000,
"content_id": "0504ad9058a417bd9d4a29f5fd9e466663a57da3",
"detected_licenses": [
"MIT"
],
"directory_id": "c45d8aa27d97cd4b95bcdbdbe403919cba0c4e2c",
"extension": "py",
"fi... | 2.578125 | stackv2 | #!/usr/bin/env python
#coding:utf-8
#sudo apt-get install python3-pip
#sudo pip3 install psutil
import psutil
import datetime
import time
import platform
now_time = time.strftime('%Y-%m-%d-%H:%M:%S', time.localtime(time.time()))
#User Computer network name
string = platform.node() #LOUIS-NB
print("Network ... | 117 | 34.16 | 109 | 17 | 1,356 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1bcdab8ab7cb7ea6_bb17f1fc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
84
] | [
null
] | [
19
] | [
48
] | |
2024-11-19T01:21:50.780129+00:00 | 1,637,477,487,000 | eee4d6c998f4a86d7787e4bb247be0052c72a0f5 | 3 | {
"blob_id": "eee4d6c998f4a86d7787e4bb247be0052c72a0f5",
"branch_name": "refs/heads/main",
"committer_date": 1637477487000,
"content_id": "78da46c1925312d60bc7e1b9195998c3fcabf31c",
"detected_licenses": [
"MIT"
],
"directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b",
"extension": "py",
"file... | 2.84375 | stackv2 | import os
import random
import subprocess
import shutil
max_depth = int(os.environ["MAX_DEPTH"])
name = lambda i: i % 2
left_index = lambda i: 2 * i + 1
right_index = lambda i: 2 * i + 2
parent = lambda i: (i - 1) // 2
depth = lambda i: (i + 1).bit_length()
def build_node(i):
d = depth(i)
os.chmod(".", 0o55... | 54 | 21.91 | 71 | 13 | 385 | python | [{"finding_id": "codeql_py/overly-permissive-file_5f9cfee0f5f43d4f_128b38d5", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group readable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to group readable.",
"Overly permissive mask in chmod sets file to group readable."
] | [
17,
24
] | [
null,
null
] | [
5,
9
] | [
25,
34
] | |
2024-11-19T00:11:33.812578+00:00 | 1,600,475,645,000 | ed40c57deed0151a4d837519082c4f417ae7527b | 2 | {
"blob_id": "ed40c57deed0151a4d837519082c4f417ae7527b",
"branch_name": "refs/heads/master",
"committer_date": 1600475645000,
"content_id": "3f0c1bbf3ff252911a81dd4740010f4eb1ea5a41",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1fb4afb8bf86dffe8ff1c2e2b9ed6c3f13c848db",
"extension": "py"... | 2.375 | stackv2 | from http.server import BaseHTTPRequestHandler
from urllib.parse import parse_qs
import os
import requests
class handler(BaseHTTPRequestHandler):
def do_GET(self):
self.send_response(200)
self.send_header('Content-type', 'text/plain')
self.end_headers()
print(parse_qs(self.path[2:]... | 28 | 32.71 | 116 | 14 | 207 | python | [{"finding_id": "codeql_py/partial-ssrf_687819b2330e050f_8feee0ef", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
25
] | [
null
] | [
13
] | [
47
] | |
2024-11-19T00:11:40.925121+00:00 | 1,618,993,622,000 | bf4f6d66b4afe7a05ef510b57e6bb04e01873362 | 3 | {
"blob_id": "bf4f6d66b4afe7a05ef510b57e6bb04e01873362",
"branch_name": "refs/heads/main",
"committer_date": 1618993622000,
"content_id": "59128411997874474b1c869f92251c7b596d1921",
"detected_licenses": [
"MIT"
],
"directory_id": "1f2761765c0550afb1631cd983fc2badd5772de7",
"extension": "py",
"file... | 2.5625 | stackv2 | import urllib.request,json
from .models import Sources,Article
api_key = None
base_url = None
search_url = None
article_url = None
topheadline_url = None
everything_url = None
def configure_request(app):
global api_key,base_url,search_url,topheadline_url,article_url,everything_url
api_key = app.config['NEWS_API_... | 163 | 28.29 | 88 | 12 | 1,007 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d31bf941fdc90ef5_1cd25b8a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive dat... | [
26,
68,
112,
131,
151
] | [
null,
null,
null,
null,
null
] | [
9,
9,
9,
9,
9
] | [
23,
25,
30,
25,
27
] | |
2024-11-19T00:12:32.581595+00:00 | 1,615,738,941,000 | 2f425f5c30894061ad2baab23318f49c71e5021d | 2 | {
"blob_id": "2f425f5c30894061ad2baab23318f49c71e5021d",
"branch_name": "refs/heads/main",
"committer_date": 1615738941000,
"content_id": "dc81eee54e5ff3b98be86d261d6a13adb5ca111b",
"detected_licenses": [
"MIT"
],
"directory_id": "7b8f5b04f59278e1b88136ecf0f2dc19a6eb243a",
"extension": "py",
"file... | 2.328125 | stackv2 | import os
from flask import Flask, request
from git_cli.gkm import GitCLIClient
from config import Config
from github_api_client.github import GitHubOrgAPIClient
app = Flask(__name__)
URL_PREFIX = '/api/v1'
config = Config
clone_path = os.environ.get('CLONE_PATH')
def _repo_form_origin(origin: str):
return ... | 52 | 30.5 | 84 | 14 | 369 | python | [{"finding_id": "codeql_py/path-injection_9f5f922e672732fc_935945bc", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1).", "remed... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1)."
] | [
43
] | [
null
] | [
18
] | [
51
] | |
2024-11-19T01:02:07.689059+00:00 | 1,574,095,857,000 | a62b7dd0c264e93d5e4d51ae5fd03261f94151ec | 3 | {
"blob_id": "a62b7dd0c264e93d5e4d51ae5fd03261f94151ec",
"branch_name": "refs/heads/master",
"committer_date": 1574095857000,
"content_id": "5e8b1af809507acc5b49cc2e7f1221519296673b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6244c8a6bae4de756528d8618254fc345df92621",
"extension": "py"... | 2.546875 | stackv2 | import numpy as np
import gym
from gym import spaces
import requests
import json
import time
from deep_racer_cam import DeepRacerCam
import logging
from deep_racer_object_detection import DeepRacerObjectDetection
from object_detection.detectionresult import DetectionResult
class DeepRacerEnv(gym.Env):
START = 'st... | 115 | 37.61 | 149 | 15 | 1,048 | python | [{"finding_id": "codeql_py/request-without-cert-validation_0a50ac83f8cf28c0_eb28c265", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
61,
68
] | [
null,
null
] | [
20,
20
] | [
79,
79
] | |
2024-11-19T01:02:08.940385+00:00 | 1,600,703,338,000 | a0bc316b3029d7e56d42fe0ee6114f09df58199c | 2 | {
"blob_id": "a0bc316b3029d7e56d42fe0ee6114f09df58199c",
"branch_name": "refs/heads/master",
"committer_date": 1600703338000,
"content_id": "0b3f7a46e245d83f057eed77e29b27ff5a7c1d1b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "63b45604070bfd6309ac7ca06b828bfbf038a14b",
"extension": "py"... | 2.328125 | stackv2 | #!/usr/bin/env python3
# coding: utf-8
'''
Author: Park Lam <lqmonline@gmail.com>
Copyright: Copyright 2019, unipark.io
'''
import os
import re
import requests
import json
import tarfile
import gzip
from decouple import config
from zipfile import ZipFile
from io import BytesIO
PACKAGE_NAME = 'pygeckodriver'
PACKAGE_UR... | 135 | 32.5 | 85 | 23 | 1,090 | python | [{"finding_id": "codeql_py/overly-permissive-file_3ac11cca49621d35_cec6712f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 3 | true | [
"CWE-732",
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable.",
"Overly permissive mask in chmod sets file to world readable.",
"Overly permissive mask in chmod sets file to world readable."
] | [
95,
100,
108
] | [
null,
null,
null
] | [
29,
21,
29
] | [
82,
74,
82
] | |
2024-11-19T01:02:22.334161+00:00 | 1,595,616,357,000 | 4c40025714ef2e2ec2b1f114d83669ac54b06bf8 | 4 | {
"blob_id": "4c40025714ef2e2ec2b1f114d83669ac54b06bf8",
"branch_name": "refs/heads/master",
"committer_date": 1595616357000,
"content_id": "d610be3fe79467a4f38f1846747d0840ab904e4a",
"detected_licenses": [
"MIT"
],
"directory_id": "7ad7aca20723e4b89618cb20b86eb66fcbb8fa06",
"extension": "py",
"fi... | 3.96875 | stackv2 | import time
cor_vermelho_terminal = '\033[31m'
cor_vermelho_final = '\033[m'
acertos = []
def verificacao_inicial(entrada):
if entrada in acertos:
print(cor_vermelho_terminal, 'Você já digitou essa letra\n', cor_vermelho_final)
elif not entrada.isalpha():
print(cor_vermelho_terminal, 'Digite s... | 47 | 27.19 | 89 | 15 | 358 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c581864811ed3c03_11d4006f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
30
] | [
null
] | [
19
] | [
33
] | |
2024-11-19T01:02:24.819846+00:00 | 1,603,152,212,000 | 2bd20cc295805151e799b0ec269579c5cb0d678e | 3 | {
"blob_id": "2bd20cc295805151e799b0ec269579c5cb0d678e",
"branch_name": "refs/heads/main",
"committer_date": 1603152212000,
"content_id": "ffb302d88da3dde94697047ad48bb74105174d86",
"detected_licenses": [
"MIT"
],
"directory_id": "1b3a8f1294dc49eb8dc2ab4a26fd7b7a1136e651",
"extension": "py",
"file... | 3.046875 | stackv2 | #!/usr/bin/python3
import argparse
import os
from random import randint
import requests
RATE_LIMIT = 5
RATE_LIMIT_ERROR = "Blacklist protection"
LOGIN_ERROR = "Incorrect username or password"
QUIET_MODE = False
class ScriptOptions:
"""Class that is going to store options through whole proccess.
:url: Target... | 184 | 26.38 | 80 | 14 | 1,155 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e6e2645cffdc1c3e_3cf33b24", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
78,
104
] | [
null,
null
] | [
15,
19
] | [
22,
59
] | |
2024-11-19T01:02:25.517226+00:00 | 1,443,534,474,000 | 5f05d9d3ec951316cf9f929aa15c8ff17e484721 | 2 | {
"blob_id": "5f05d9d3ec951316cf9f929aa15c8ff17e484721",
"branch_name": "refs/heads/master",
"committer_date": 1443534474000,
"content_id": "60daf149371fc9928c12595ba0540bb9b9d9396f",
"detected_licenses": [
"MIT"
],
"directory_id": "8c1b5eddc219c181d9bb01dfb017201e4b6935a4",
"extension": "py",
"fi... | 2.375 | stackv2 | import functools
import logging
import os
import urllib
# from google.appengine.api import users
# from google.appengine.ext import webapp
# from google.appengine.ext.webapp import template
# from google.appengine.ext.webapp import util
import arrow
from flask import Flask
from flask import redirect
from flask import... | 336 | 29.25 | 105 | 17 | 2,257 | python | [{"finding_id": "codeql_py/url-redirection_8d0a0cdd464c3a3c_aaf3f097", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
190,
207
] | [
null,
null
] | [
21,
21
] | [
33,
33
] | |
2024-11-18T23:49:53.261125+00:00 | 1,629,696,020,000 | 6178a7aa9c55eae014e137837b59f28f8e9108a8 | 3 | {
"blob_id": "6178a7aa9c55eae014e137837b59f28f8e9108a8",
"branch_name": "refs/heads/main",
"committer_date": 1629696020000,
"content_id": "a6379212f32ac2418e28e5529eb20a119d01c0e7",
"detected_licenses": [
"MIT"
],
"directory_id": "c48da823e17d9fc726525b7a5254276771229407",
"extension": "py",
"file... | 2.828125 | stackv2 | import re, io
class Earthquake:
def __init__(self, year, latitude, longitude, magnitude, depth):
self.year = year
self.latitude = latitude
self.longitude = longitude
self.magnitude = magnitude
self.depth = depth
quakes = []
f = io.open('epicsort.tmp', 'r', encoding='ISO-8859-1')
lines = f.readlines()
f.cl... | 43 | 25.3 | 144 | 17 | 396 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a4f3bcbe4d0fe262_e055fdc1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive data (private)](4) as clear text."
] | [
42
] | [
null
] | [
10
] | [
144
] | |
2024-11-18T23:50:01.051247+00:00 | 1,608,874,448,000 | 357dbf1f5920538bcde99ec844dfd3f1feb2a304 | 3 | {
"blob_id": "357dbf1f5920538bcde99ec844dfd3f1feb2a304",
"branch_name": "refs/heads/main",
"committer_date": 1608874448000,
"content_id": "6ada6d72905883c12900d1e4231580766a85f9c4",
"detected_licenses": [
"MIT"
],
"directory_id": "e55f31c1c49109be69daf1ee4cfe4907e881ddd8",
"extension": "py",
"file... | 3.265625 | stackv2 | import re
matcher = re.compile(fr"(\d+)-(\d+) ([a-z]): ([a-z]+)")
with open('input2.txt') as f:
passwords = []
line = f.readline()
while line != '':
result = matcher.match(line)
line = f.readline()
if result is None or not result.group(0):
print(f'wtf,\"{line}\" broke??'... | 34 | 27.79 | 76 | 14 | 305 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_41eac283c850db4e_0b5ea3b8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
33,
34
] | [
null,
null
] | [
7,
7
] | [
34,
34
] | |
2024-11-18T23:50:20.275630+00:00 | 1,538,408,247,000 | ed820482cd984c927b2abbbfbabd54b6681cdb9c | 3 | {
"blob_id": "ed820482cd984c927b2abbbfbabd54b6681cdb9c",
"branch_name": "refs/heads/master",
"committer_date": 1538408247000,
"content_id": "65f254f0f08da7f5acc2a848fcd3abeff630295e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "39666b8110ca59abbf091df14b17f69ea0286fe4",
"extension": "py"... | 2.640625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import argparse
import requests
import json
try:
import configparser
except ImportError:
import ConfigParser as configparser
from xdg.BaseDirectory import xdg_config_home
import os
class BMC:
def __init__(self, server, username, password):
self.url ... | 158 | 32.18 | 99 | 15 | 1,194 | python | [{"finding_id": "codeql_py/request-without-cert-validation_335ccec89b4ecb82_633e19d3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
24
] | [
26
] | [
13
] | [
44
] | |
2024-11-19T00:13:39.823380+00:00 | 1,430,688,004,000 | 027fabae9d3102a405bb9ad240565ea89df57bc0 | 2 | {
"blob_id": "027fabae9d3102a405bb9ad240565ea89df57bc0",
"branch_name": "refs/heads/master",
"committer_date": 1430688004000,
"content_id": "cce714b44e35a5151dfd96235d5f410a3b1cf61f",
"detected_licenses": [
"MIT"
],
"directory_id": "bac207175bd9f19edc02bd0a2429cf3885a56903",
"extension": "py",
"fi... | 2.390625 | stackv2 |
import os
import sys
import time
from flask import Flask, render_template, send_from_directory, request\
, flash, redirect, url_for, make_response, session
from werkzeug import secure_filename
from flask.ext.bootstrap import Bootstrap
from metacleaner import pdfcleaner
app = Flask(__name__)
bootstrap = Bootstrap... | 61 | 25.13 | 90 | 14 | 361 | python | [{"finding_id": "codeql_py/path-injection_e424fdf9d0df3346_91ce6309", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
58
] | [
null
] | [
32
] | [
75
] | |
2024-11-19T01:26:12.915340+00:00 | 1,532,422,437,000 | 0c3e4954469aec7f77b5c7d0339875f203feb4fd | 3 | {
"blob_id": "0c3e4954469aec7f77b5c7d0339875f203feb4fd",
"branch_name": "refs/heads/master",
"committer_date": 1532422437000,
"content_id": "5cc8163397ef6fafbbd91d4cbb258907ec85cbd6",
"detected_licenses": [
"MIT"
],
"directory_id": "d80ef8c716bcc5ea54e87540dbf0463f15bf44ce",
"extension": "py",
"fi... | 2.71875 | stackv2 | """
This example shows two ways to redirect flows to other destinations.
"""
from libmproxy.models import HTTPResponse
from netlib.http import Headers
def request(context, flow):
# pretty_host takes the "Host" header of the request into account,
# which is useful in transparent mode where we usually only have ... | 22 | 34.36 | 75 | 14 | 171 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_21764735ffdf1d63_9065d6c3", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [example.com](1) may be at an arbitrary position in the... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [example.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [example.org](1) may be at an arbitrary position in the sanitized URL."
] | [
13,
21
] | [
null,
null
] | [
8,
8
] | [
56,
56
] | |
2024-11-19T01:52:00.291222+00:00 | 1,500,318,631,000 | 73c4760706e4af18645b8942c0f196d2712511a9 | 3 | {
"blob_id": "73c4760706e4af18645b8942c0f196d2712511a9",
"branch_name": "refs/heads/master",
"committer_date": 1500318631000,
"content_id": "e428826dab85b33fbccca61258860fe14b3bb30b",
"detected_licenses": [
"MIT"
],
"directory_id": "4790a4517da3aeb7837c2984b5ea73b6d605c570",
"extension": "py",
"fi... | 2.578125 | stackv2 | import asyncio
import argparse
import json
from pprint import pprint
import requests
import aiohttp.web
def hex_color(r, g, b):
r, g, b = int(r), int(g), int(b)
v = r * 256**2 + g * 256 + b
return hex(v)
def map_range(x, x0, x1, y0, y1):
i = (x-x0)/(x1-x0)
return y0 * (1-i) + y1 * i
def color_s... | 100 | 20.3 | 94 | 11 | 620 | python | [{"finding_id": "codeql_py/url-redirection_ee326f27060ace80_899dccf3", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-918"
] | [
"py/url-redirection",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
53,
34
] | [
null,
null
] | [
34,
9
] | [
37,
26
] | |
2024-11-19T00:55:25.451985+00:00 | 1,673,965,090,000 | a382f71a5d4bd788d3201d71d9d1092716043c3f | 2 | {
"blob_id": "a382f71a5d4bd788d3201d71d9d1092716043c3f",
"branch_name": "refs/heads/master",
"committer_date": 1673965090000,
"content_id": "d20937f526d69fe99a5ee0164f4aae3906d8de6a",
"detected_licenses": [
"MIT"
],
"directory_id": "342225d4ac58e5414480fd13c20ee5fdfc419f08",
"extension": "py",
"fi... | 2.46875 | stackv2 | #-*- encoding: utf-8
# Apollo: Centralized WakeOnLAN
import os
import sqlite3
import re
from flask import Flask, request, session, g, redirect, url_for, abort, \
render_template, make_response,flash,jsonify
import logging
from logging.handlers import RotatingFileHandler
import socket
app = Flask(__name__)... | 221 | 37.12 | 172 | 22 | 2,046 | python | [{"finding_id": "codeql_py/reflective-xss_36f932fc2ddb05a0_52ed1644", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d... | 7 | true | [
"CWE-079",
"CWE-079",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).",
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).",
"This log entry depends ... | [
113,
125,
134,
137,
147,
150,
160
] | [
null,
null,
null,
null,
null,
null,
null
] | [
38,
38,
29,
32,
29,
32,
29
] | [
57,
67,
64,
102,
65,
103,
84
] | |
2024-11-19T00:55:27.659869+00:00 | 1,551,136,101,000 | 95393c08509ace7c3576f87c20617be7438366f4 | 2 | {
"blob_id": "95393c08509ace7c3576f87c20617be7438366f4",
"branch_name": "refs/heads/master",
"committer_date": 1551136101000,
"content_id": "025406551750a16fed8217bf7fa727946a9d311f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b041836e6071e2bff0589b4ed523f20d6832ad58",
"extension": "py"... | 2.5 | stackv2 | """The main Flask app that serve the different query send by the client"""
# !/usr/bin/python3
import datetime
import json
import logging.handlers
from bson import ObjectId
from flask import Flask, jsonify, request, send_file
from flask_cors import CORS
from flask_pymongo import PyMongo
DEBUG_APP = True
APP = Flask(_... | 141 | 30.89 | 111 | 18 | 1,039 | python | [{"finding_id": "codeql_py/stack-trace-exposure_f54a4e8c239f8401_cf189cbd", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
137,
141
] | [
null,
null
] | [
24,
5
] | [
37,
58
] | |
2024-11-19T00:55:31.098660+00:00 | 1,597,308,236,000 | e2054fe20742dd0e6036d780cace4bcd54f4ef53 | 5 | {
"blob_id": "e2054fe20742dd0e6036d780cace4bcd54f4ef53",
"branch_name": "refs/heads/master",
"committer_date": 1597308236000,
"content_id": "89c2733e06708e221716b8f443f2526493540682",
"detected_licenses": [
"MIT"
],
"directory_id": "748359048158b44890183e4332837b39b7cc343f",
"extension": "py",
"fi... | 4.5625 | stackv2 | '''Print the details of a Programmer using SETTER and GETTER'''
class Programmer:
def setName(self, n): # Setter method, it always takes a parameter which we assign them into object variables
self.name = n
def getName(self): # Getter method, to access the value of Setter... | 31 | 27.32 | 127 | 9 | 217 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_011cf2ae9965d9ca_eefe4e3e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
30
] | [
null
] | [
7
] | [
21
] | |
2024-11-19T00:33:02.600227+00:00 | 1,598,776,872,000 | 9a15a47bea2d62ddab84e88fa5e8cbc5dfb0155f | 3 | {
"blob_id": "9a15a47bea2d62ddab84e88fa5e8cbc5dfb0155f",
"branch_name": "refs/heads/master",
"committer_date": 1598776872000,
"content_id": "8a45ab84208873d0933a5e7f3fd82424fb7fabca",
"detected_licenses": [
"MIT"
],
"directory_id": "3fbc60c9ac863a57d89b95667b8f4871b8070a93",
"extension": "py",
"fi... | 2.765625 | stackv2 | #!/usr/bin/env python3
from airthings import discover_devices
if __name__ == "__main__":
airthings_devices = discover_devices()
print("Found %s Airthings devices:" % len(airthings_devices))
for device in airthings_devices:
print("=" * 36)
print("\tMAC address:", device.mac_address)
... | 17 | 42.53 | 68 | 13 | 162 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_669a7751fee1cb46_feacbe1d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
9
] | [
null
] | [
33
] | [
51
] | |
2024-11-19T00:33:04.707346+00:00 | 1,420,154,393,000 | c76670970e239f15106cd6eeec799641fa3d6965 | 3 | {
"blob_id": "c76670970e239f15106cd6eeec799641fa3d6965",
"branch_name": "refs/heads/master",
"committer_date": 1420154393000,
"content_id": "3b9ce739f5a0b44b6378fa1160bcbc3a7653ec81",
"detected_licenses": [
"MIT"
],
"directory_id": "a56e1899962a935fb3d7d52e9f5e9da522bce470",
"extension": "py",
"fi... | 3.046875 | stackv2 | #!/usr/bin/env python2
from jinja2 import Template
from yaml import load
import argparse
import sys
def parse_arguments():
description = 'YAML to TOML converter'
parser = argparse.ArgumentParser(description=description)
parser.add_argument(
'--template', '-t',
metavar='FILE',
des... | 53 | 23.19 | 63 | 11 | 310 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c28c82d733c373d1_0160ca1e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
44
] | [
null
] | [
9
] | [
32
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.