added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T03:22:57.920471+00:00 | 1,520,554,751,000 | 7d9be018d07a8ef24c90b4ced737242258306e0c | 2 | {
"blob_id": "7d9be018d07a8ef24c90b4ced737242258306e0c",
"branch_name": "refs/heads/master",
"committer_date": 1520554751000,
"content_id": "721666ef70f0e94f243759afc2128c74442caac9",
"detected_licenses": [
"MIT"
],
"directory_id": "5e33f6a394f338515b6d91a45a561d48dab143dc",
"extension": "py",
"fi... | 2.390625 | stackv2 | # !/usr/bin/env python
import tensorflow as tf
import numpy as np
from mnist import model
from flask import Flask, render_template, request, jsonify
app = Flask(__name__, template_folder='build', static_folder='build')
x = tf.placeholder("float", [None, 784])
sess = tf.Session()
with tf.variable_scope("convolutional... | 73 | 22.97 | 76 | 19 | 461 | python | [{"finding_id": "codeql_py/stack-trace-exposure_7a4455871e7a8645_4685f738", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
51,
69
] | [
null,
null
] | [
24,
24
] | [
36,
36
] | |
2024-11-19T01:34:56.521578+00:00 | 1,506,877,191,000 | 5ee426fd7a990476fc2ec01da23c870fd3011e95 | 3 | {
"blob_id": "5ee426fd7a990476fc2ec01da23c870fd3011e95",
"branch_name": "refs/heads/master",
"committer_date": 1518546965000,
"content_id": "7c955d886eb0a24b1481b29e7eb1a5d7a53de5d2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "384a7ae46d99978150bd2573c177278d0f2c73f0",
"extension": "py"... | 2.78125 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
import os
import sys
import stat
import argparse
import fileinput
import urllib.request
import hashlib
import tarfile
import shutil
import subprocess
from distutils.dir_util import copy_tree
parser = argparse.ArgumentParser()
parser.add_argument("-u", "--packageUrl", defa... | 105 | 32 | 165 | 14 | 865 | python | [{"finding_id": "codeql_py/overly-permissive-file_a8cbce7a181d0311_7e9d1d34", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-022"
] | [
"py/overly-permissive-file",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable.",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
58,
37
] | [
null,
null
] | [
5,
5
] | [
37,
8
] | |
2024-11-19T01:45:35.678401+00:00 | 1,618,980,639,000 | ce63b2da566c4bc1957bee5645562b60a9a4b7c6 | 2 | {
"blob_id": "ce63b2da566c4bc1957bee5645562b60a9a4b7c6",
"branch_name": "refs/heads/main",
"committer_date": 1618980639000,
"content_id": "db2e5130f68ed2591740b4da0462cf4b030e42a3",
"detected_licenses": [
"MIT"
],
"directory_id": "234f8905fb7986cb3d9ec9ec488f2f024fc9508c",
"extension": "py",
"file... | 2.484375 | stackv2 | # -*- coding: utf-8 -*-
import os
import random
from flask import Blueprint, render_template, request, flash, redirect, url_for, current_app
from app.utils import allowed_file
blueprint = Blueprint('home', __name__)
@blueprint.route('/', methods=['GET', 'POST'])
def index():
if request.method == 'POST':
... | 45 | 32.91 | 92 | 16 | 322 | python | [{"finding_id": "codeql_py/path-injection_76a42cf1d9926274_4aed2d63", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
24
] | [
null
] | [
23
] | [
82
] | |
2024-11-19T02:07:56.549954+00:00 | 1,629,289,017,000 | eb49fce550c86329988c3c28647e12693d5a52bf | 3 | {
"blob_id": "eb49fce550c86329988c3c28647e12693d5a52bf",
"branch_name": "refs/heads/main",
"committer_date": 1629289017000,
"content_id": "5638297db10db59f4921bae1d9af0b76d6b7b872",
"detected_licenses": [
"MIT"
],
"directory_id": "087060dfca821489c4d075043bef21cbe4daba7d",
"extension": "py",
"file... | 3.25 | stackv2 | import numpy as np
import re
import pandas as pd
from datetime import datetime
def extract_cadicateword(doc, max_word_len):
"""
提取文档中的候选词汇索引
Parameters:
----------
doc: 输入的剔除了特殊符号的语料
max_word_len: 最长的单词长度
Returns:
-------
indexs: 候选词的索引
"""
indexes = []
doc_length = l... | 301 | 22.85 | 128 | 21 | 2,193 | python | [{"finding_id": "codeql_py/overly-large-range_7c0c779814966aa4_30626081", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
217
] | [
null
] | [
39
] | [
42
] | |
2024-11-19T02:17:30.040424+00:00 | 1,692,088,724,000 | 63bc05843ecc71372a9e6127db0539ce29f8861b | 3 | {
"blob_id": "63bc05843ecc71372a9e6127db0539ce29f8861b",
"branch_name": "refs/heads/main",
"committer_date": 1692088724000,
"content_id": "2f171d21c31a6316941eaee3a87c1f015534c22b",
"detected_licenses": [
"MIT"
],
"directory_id": "c80d0926964a49d9b136f4d591cd220c54a5ef6b",
"extension": "py",
"file... | 3.046875 | stackv2 | from branca.element import MacroElement
from jinja2 import Template
class FloatImage(MacroElement):
"""Adds a floating image in HTML canvas on top of the map.
Parameters
----------
image: str
Url to image location. Can also be an inline image using a data URI
or a local file using `fi... | 53 | 30.66 | 76 | 11 | 358 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3cfa539768095b93_260dce25", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
23
] | [
45
] | [
17
] | [
6
] | |
2024-11-19T02:17:33.684458+00:00 | 1,693,516,480,000 | 163c3552973d37af5ed00b6b34d7289c54a728ac | 3 | {
"blob_id": "163c3552973d37af5ed00b6b34d7289c54a728ac",
"branch_name": "refs/heads/master",
"committer_date": 1693516480000,
"content_id": "cb0932dad1b2a2e78357eb89f70614713c3d6e95",
"detected_licenses": [
"MIT"
],
"directory_id": "8f84b0c88c64fcea59aca9bc21af6dc6179d2315",
"extension": "py",
"fi... | 2.546875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import os
import sys
import json
from http.server import BaseHTTPRequestHandler
from http.server import HTTPServer
current_path = os.path.realpath(os.path.dirname(__file__))
DB_FILE = os.path.join(current_path, "database.json")
if os.path.exists(DB_FILE):
print("Load... | 64 | 27.06 | 72 | 15 | 457 | python | [{"finding_id": "codeql_py/http-response-splitting_e5d4787fa0ffaa3f_ee292ee5", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).", "remediation": "", "lo... | 1 | true | [
"CWE-113"
] | [
"py/http-response-splitting"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This HTTP header is constructed from a [user-provided value](1)."
] | [
49
] | [
null
] | [
38
] | [
71
] | |
2024-11-19T02:17:47.056667+00:00 | 1,603,528,725,000 | aee0aba26bcee5ce31ca4b5a043fb9f6c39cc17a | 2 | {
"blob_id": "aee0aba26bcee5ce31ca4b5a043fb9f6c39cc17a",
"branch_name": "refs/heads/main",
"committer_date": 1603528725000,
"content_id": "323a7d9933ae2ceba3a9e4c66b1a6246606a52d7",
"detected_licenses": [
"MIT"
],
"directory_id": "180eb8503e4770570cf8a84875d21a135390c24e",
"extension": "py",
"file... | 2.328125 | stackv2 | from app import app
import gensim
import re
from gensim.models import LdaModel
from gensim.test.utils import datapath
from gensim import corpora, models
from gensim.corpora import Dictionary
from re import sub
import os
import string
import codecs
import nltk
def remove_shorts (words):
words = re.sub(r'\b\w{1,3... | 107 | 29.11 | 90 | 13 | 830 | python | [{"finding_id": "codeql_py/overly-large-range_4da0c24f02520d0e_58704b2d", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
22,
22
] | [
null,
null
] | [
22,
66
] | [
25,
69
] | |
2024-11-19T02:17:48.389646+00:00 | 1,593,345,365,000 | 6f3f6b433ab76117c3e69dbc482f43c4d6a01d54 | 3 | {
"blob_id": "6f3f6b433ab76117c3e69dbc482f43c4d6a01d54",
"branch_name": "refs/heads/master",
"committer_date": 1593345365000,
"content_id": "ad1d3b21aefca79840be1337c3f504ff0c3dfc3b",
"detected_licenses": [
"MIT"
],
"directory_id": "6750c7064881bddf643312b29e5e1a8f0b0b4978",
"extension": "py",
"fi... | 2.625 | stackv2 |
from flask import Flask ,render_template,flash,redirect,url_for,session,logging,request
from flask_mysqldb import MySQL
from functools import wraps
from wtforms import Form,StringField,TextAreaField,PasswordField,validators
from passlib.hash import sha256_crypt
app=Flask(__name__)
app.secret_key="erahalil28"
app.con... | 237 | 34.1 | 127 | 18 | 1,853 | python | [{"finding_id": "codeql_py/flask-debug_56f5850c69adc6e0_fae84b04", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
235,
181
] | [
null,
null
] | [
9,
12
] | [
28,
29
] | |
2024-11-19T02:17:49.951890+00:00 | 1,598,254,615,000 | 10ec2b787c57a8c04dad696cb8ab2581b4ccfede | 3 | {
"blob_id": "10ec2b787c57a8c04dad696cb8ab2581b4ccfede",
"branch_name": "refs/heads/master",
"committer_date": 1598254615000,
"content_id": "49c74fb17f9230c556317078aaf30b64ef70a95e",
"detected_licenses": [
"MIT"
],
"directory_id": "a3739997cead91f7b8e2910ac680897a9e781a04",
"extension": "py",
"fi... | 3.234375 | stackv2 | import hashlib
from random import choice
from .config import salt_dictionary, numbers, letters, symbols
from zxcvbn import zxcvbn
from math import log
def hash_it(password, hash_type='sha256', salting=False,
static_salt='', salt_length=6, local_parameter=''):
def hash_password(word, hashing_type):
... | 125 | 27.98 | 103 | 15 | 788 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_74c02fd1e9e48369_1c861a2b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
19
] | [
null
] | [
32
] | [
45
] | |
2024-11-19T02:18:06.329556+00:00 | 1,546,813,044,000 | 3a1ea798b5dff18b25bd6bbb5576dd40b422435e | 2 | {
"blob_id": "3a1ea798b5dff18b25bd6bbb5576dd40b422435e",
"branch_name": "refs/heads/master",
"committer_date": 1546813044000,
"content_id": "efe9dd4420deceaf959f78ebae97771fc720982a",
"detected_licenses": [
"MIT"
],
"directory_id": "11b0b0cebfc70acfb6f00c8813d4de896b09d67c",
"extension": "py",
"fi... | 2.421875 | stackv2 | from flask import render_template, flash, redirect, url_for, request
from flask_login import current_user, login_user, logout_user, login_required
from werkzeug.urls import url_parse
from app import app
from app.forms import *
from app.models import *
from app import db
import random
@app.route('/')
@app.route('/inde... | 167 | 35.92 | 113 | 17 | 1,272 | python | [{"finding_id": "codeql_py/url-redirection_6f1ff54ea97d6a0d_a3c07642", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
32
] | [
null
] | [
25
] | [
34
] | |
2024-11-19T02:18:13.461884+00:00 | 1,599,563,435,000 | 9eab65106cfd2a91ae3f1df40ce40e862a79e66a | 4 | {
"blob_id": "9eab65106cfd2a91ae3f1df40ce40e862a79e66a",
"branch_name": "refs/heads/master",
"committer_date": 1599563435000,
"content_id": "3b2e002f0b80b23d6635f5491a82d4d7b3ea5a8a",
"detected_licenses": [
"MIT"
],
"directory_id": "300def8465a20362e9f96d99653f97aa1890032d",
"extension": "py",
"fi... | 4.5 | stackv2 | import time
from datetime import date
def menu_for_main(my_dict):
"""
:param my_dict:
:return: None
"""
month_list = ['January', 'February', 'March', 'April', 'May', 'June', 'July', 'Auguste', 'September', 'October',
'November', 'December']
while True:
print("""
... | 59 | 36.71 | 118 | 22 | 559 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_93b12599cf207371_7d90a913", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
27
] | [
null
] | [
42
] | [
79
] | |
2024-11-19T02:29:53.158758+00:00 | 1,675,072,728,000 | 8add55cfd636b89d60cfc0d8fea51dda43bde848 | 2 | {
"blob_id": "8add55cfd636b89d60cfc0d8fea51dda43bde848",
"branch_name": "refs/heads/master",
"committer_date": 1675072728000,
"content_id": "8c8dff3a2bc16f56f8a5ac51ca153c78d6b8cac8",
"detected_licenses": [
"MIT"
],
"directory_id": "60bfe693f0c9442faca6460d1aaa3b415d14e371",
"extension": "py",
"fi... | 2.4375 | stackv2 | '''
Caution
--------
Using this script for any malicious purpose is prohibited and against the law. Please read SourceForge terms and conditions carefully.
Use it on your own risk.
'''
# Python For Offensive PenTest
# Source Forge Docs
# http://sourceforge.net/p/forge/documentation/File%20Management/
# https://sou... | 62 | 30.58 | 153 | 8 | 449 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_7cad321416d332c5_31122119", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
38
] | [
null
] | [
null
] | [
65
] | |
2024-11-19T02:30:10.132750+00:00 | 1,458,679,979,000 | 5ea2f7837a3d7f08b58ce1e0c29f9909e12c87ae | 3 | {
"blob_id": "5ea2f7837a3d7f08b58ce1e0c29f9909e12c87ae",
"branch_name": "refs/heads/master",
"committer_date": 1458679979000,
"content_id": "4cc55430ac45263e3e58cee263c33851e53985d1",
"detected_licenses": [
"MIT"
],
"directory_id": "9ee50f80c7a73488e6785ede765dee5dd52d363f",
"extension": "py",
"fi... | 2.828125 | stackv2 | #!/usr/bin/env python
''' NagiosReportGenerator - Generate HTML status report
Script that fetches the status page as json from nagios and
generates a HTML-mail from it
Copyright (c) 2014 digIT (Eda) 14/15
'''
import time
import sys
import datetime
from optparse import OptionParser
import requests
NAGIOS_STATUS = {2... | 163 | 32.27 | 79 | 17 | 1,296 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b32a377bc607b7fe_c754d8e5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
61
] | [
64
] | [
20
] | [
46
] | |
2024-11-19T02:41:45.487610+00:00 | 1,525,273,324,000 | 6260587db052374aa554ef5137fa5e1d6ba142d5 | 3 | {
"blob_id": "6260587db052374aa554ef5137fa5e1d6ba142d5",
"branch_name": "refs/heads/master",
"committer_date": 1525273324000,
"content_id": "eeae3e223a5463b5de03a0155541ff3f548fc5db",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9c4cbbc6184f7c1699612d9e5bd6f3a2b164efc5",
"extension": "py"... | 2.515625 | stackv2 | #
#
# .SYNOPSIS
# PowerIQ - Raritan Rack PDU API Data to Grafana using InfluxDB
#
# .DESCRIPTION
# This script speaks to the PowerIQ API and transfers the pdu information
# The information provided gives us the currently power reading, unutilized capacity,
# along with the watt hour & delta.
#
# .NOTES
# Name: ... | 143 | 36.57 | 149 | 10 | 1,311 | python | [{"finding_id": "codeql_py/request-without-cert-validation_72783cfcfd348d4b_3e3c256e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
90,
91
] | [
null,
null
] | [
9,
9
] | [
62,
62
] | |
2024-11-19T02:41:49.562120+00:00 | 1,461,727,419,000 | c2102ea6c81346a4fae5a33b9a5a8f18641ccdfb | 3 | {
"blob_id": "c2102ea6c81346a4fae5a33b9a5a8f18641ccdfb",
"branch_name": "refs/heads/master",
"committer_date": 1461727419000,
"content_id": "dc8e1dcf825cef137e9f3a3a9cb4e374e142a37b",
"detected_licenses": [
"MIT"
],
"directory_id": "7c1d71617645f45335ab18ed7aac1b9688c7bf1e",
"extension": "py",
"fi... | 2.515625 | stackv2 | #coding=utf8
import requests
from urllib import unquote
import json, sys, time
import getpass
DEBUG = True
class Oauth():
config = {
True:{
'key': '',
'secret': '',
'url': 'sandbox.evernote.com'
},
False:{
'key'... | 93 | 37.45 | 114 | 24 | 829 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c7323b51d7f557a0_5bd5a4b9", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
80
] | [
84
] | [
21
] | [
19
] | |
2024-11-19T02:42:00.327717+00:00 | 1,553,711,337,000 | 33f5bb74ce10f8699d991dc96f600f18aa56c315 | 2 | {
"blob_id": "33f5bb74ce10f8699d991dc96f600f18aa56c315",
"branch_name": "refs/heads/master",
"committer_date": 1553711337000,
"content_id": "dd9ded4644cfe107096304125ec24c370fad95e9",
"detected_licenses": [
"MIT"
],
"directory_id": "0ee52d4a9e906c6c2bed3648c7976e1cac723619",
"extension": "py",
"fi... | 2.421875 | stackv2 | import base64
from datetime import datetime, timedelta
from functools import wraps
import pytz
from flask import Flask, request, jsonify, Response
from icalendar import Calendar, Event
from njupt import Card, Zhengfang, RunningMan
from njupt.exceptions import AuthenticationException, NjuptException
from utils.store im... | 276 | 29.51 | 84 | 18 | 2,009 | python | [{"finding_id": "codeql_py/stack-trace-exposure_bd7dcf7935dcbdee_f42c7243", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
43,
276
] | [
47,
null
] | [
24,
5
] | [
10,
51
] | |
2024-11-19T02:42:21.193655+00:00 | 1,636,123,558,000 | e01e4641e7f07cb9d811591c3c3de66204631c5d | 3 | {
"blob_id": "e01e4641e7f07cb9d811591c3c3de66204631c5d",
"branch_name": "refs/heads/master",
"committer_date": 1636123558000,
"content_id": "5ebf8e997d7264cb9e7242809abc4e5fc74ee477",
"detected_licenses": [
"MIT"
],
"directory_id": "e2c1400201930c650c3683ffe134705dbc1f8f96",
"extension": "py",
"fi... | 2.515625 | stackv2 | from datetime import datetime
from typing import Type
from decouple import config
from hashlib import sha1
from pydantic import BaseModel
def clean_signature_value(value: str):
"""
According to the docs spaces are removed
"""
return str(value).replace(" ", "")
def build_signature(**kwargs):
re... | 65 | 24.8 | 95 | 13 | 379 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_ff85bd62df5f99a2_103230dc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
41
] | [
null
] | [
22
] | [
39
] | |
2024-11-19T02:42:23.307373+00:00 | 1,515,190,314,000 | de2f3caeec4fa02047134e17ee676f32adaf7383 | 2 | {
"blob_id": "de2f3caeec4fa02047134e17ee676f32adaf7383",
"branch_name": "refs/heads/master",
"committer_date": 1515190314000,
"content_id": "5e385c34d8822d7da39bf2a79f1ae122ea61273c",
"detected_licenses": [
"MIT"
],
"directory_id": "553c0520cc3f066ec0fa96b045fb304f10a0c91b",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/env python3
import hashlib
import imaplib
import os.path
import uuid
import jinja2
import maya
import yaml
def read_config(filename='settings.yml'):
"""Read the configuration from the YAML config file."""
with open(filename, 'r') as fh:
return yaml.load(fh.read())
def parse_headers(head... | 108 | 32.13 | 86 | 13 | 852 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c7b0d5d4a32252ab_d9c408d5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
77
] | [
null
] | [
11
] | [
67
] | |
2024-11-18T18:05:48.436459+00:00 | 1,635,105,119,000 | 52106f391a83977412d0aded3a7ba6b532421cb1 | 2 | {
"blob_id": "52106f391a83977412d0aded3a7ba6b532421cb1",
"branch_name": "refs/heads/main",
"committer_date": 1635105119000,
"content_id": "048cf71fd648c2617d739d2bbf25020f89822243",
"detected_licenses": [
"MIT"
],
"directory_id": "58c67f650dbab693855d6cfab3ad37686dea0fef",
"extension": "py",
"file... | 2.453125 | stackv2 | # from yt_dlp_local.yt_dlp.YoutubeDL import YoutubeDL
import yt_dlp
import flask
from flask import request, send_file, jsonify
import os
from flask_cors import cross_origin
app = flask.Flask(__name__)
app.config["DEBUG"] = True
print('App started and working! Yay!')
@app.route('/wakeup', methods=['GET'])
@cross_origi... | 41 | 25.66 | 86 | 13 | 281 | python | [{"finding_id": "codeql_py/path-injection_915f4b590e466a51_a003abc1", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
29,
41
] | [
null,
null
] | [
18,
26
] | [
39,
30
] | |
2024-11-18T18:05:58.033788+00:00 | 1,595,380,838,000 | 2915475203a93d0edcbbc63020130f09bd79db88 | 5 | {
"blob_id": "2915475203a93d0edcbbc63020130f09bd79db88",
"branch_name": "refs/heads/master",
"committer_date": 1595380838000,
"content_id": "f0c5d258ee1cdab84b7479eef4c238aa89597652",
"detected_licenses": [
"MIT"
],
"directory_id": "8440c8dabb136769bbf70d7b34eedf8a879d80d1",
"extension": "py",
"fi... | 4.53125 | stackv2 | import string
def isWordGuessed(secretWord, lettersGuessed):
'''
secretWord: string, the word the user is guessing
lettersGuessed: list, what letters have been guessed so far
returns: boolean, True if all the letters of secretWord are in lettersGuessed;
False otherwise
'''
result = True
... | 133 | 30.6 | 84 | 21 | 887 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0819ac417653d1b8_886a9f24", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](... | [
112,
119,
105,
133,
116
] | [
113,
120,
106,
null,
117
] | [
27,
23,
19,
15,
27
] | [
61,
57,
53,
83,
61
] | |
2024-11-18T18:16:05.048139+00:00 | 1,674,402,898,000 | 40c9ffa83c22c8bd6e172107ecbf1be30321c42b | 3 | {
"blob_id": "40c9ffa83c22c8bd6e172107ecbf1be30321c42b",
"branch_name": "refs/heads/master",
"committer_date": 1674402898000,
"content_id": "018a6bcd981a365b77e74c15e2c87dd4ae3cee12",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "617033c057120a089afb22d22f996d7bcac7c863",
"extension": "py"... | 2.703125 | stackv2 | """ putJSONdata.py
Copyright 2016 OSIsoft, LLC.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or a... | 103 | 35.18 | 118 | 14 | 838 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b7fc88c6a472d9bd_0936b9cb", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
88
] | [
null
] | [
12
] | [
56
] | |
2024-11-18T19:23:54.595869+00:00 | 1,668,716,547,000 | c0409cad42f4ac66a620529d4dfccb3dd9ce4f26 | 2 | {
"blob_id": "c0409cad42f4ac66a620529d4dfccb3dd9ce4f26",
"branch_name": "refs/heads/master",
"committer_date": 1668716547000,
"content_id": "983328a230627ef8fd497eaccaa384b8198a5118",
"detected_licenses": [
"MIT"
],
"directory_id": "f7bad879bb892547b5c356e8fe4bb517f05fef26",
"extension": "py",
"fi... | 2.453125 | stackv2 | from get_from_netbox import devices, vlans
from jinja2 import Template
with open("templates/vlan_configuration.j2") as f:
vlan_template = Template(f.read())
with open("templates/interface_configuration.j2") as f:
interface_template = Template(f.read())
for device in devices:
print("Device {} of role {}"... | 28 | 35.36 | 79 | 11 | 221 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_15bf623ab9edbd83_874de2de", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
6,
8
] | [
null,
null
] | [
21,
26
] | [
39,
44
] | |
2024-11-18T19:24:02.727711+00:00 | 1,633,076,336,000 | 2fb87115ba2056b8d3b7c0d074c2810e2040c8dc | 2 | {
"blob_id": "2fb87115ba2056b8d3b7c0d074c2810e2040c8dc",
"branch_name": "refs/heads/master",
"committer_date": 1633076336000,
"content_id": "4a06a74360ac66da1d23948864c6c56c86a35f5f",
"detected_licenses": [
"MIT"
],
"directory_id": "e037a07e652b320275cf90f798e613aa2d7fb511",
"extension": "py",
"fi... | 2.359375 | stackv2 | """
Makes it easy and painless to deploy the site and make all necessary changes
so that it's immediately ready to serve in production.
"""
import glob
import json
import os
import shlex
import subprocess
import sys
from colorama import Fore, Style
import data_util
import js_compilation
# Files and directories that... | 205 | 29.41 | 118 | 18 | 1,531 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_742b0d56b036880c_32fefea6", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
162
] | [
null
] | [
17
] | [
25
] | |
2024-11-18T19:58:32.080292+00:00 | 1,588,651,828,000 | e3aff0752e53ba9cca7878d729ed6469d14ebd95 | 2 | {
"blob_id": "e3aff0752e53ba9cca7878d729ed6469d14ebd95",
"branch_name": "refs/heads/master",
"committer_date": 1588651828000,
"content_id": "ad2c08387b944fdc81830dfc3a4cb93c9a20c7cf",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "534f521454380703a0d42eefaa5609a5e4926aa8",
"extension": "py"... | 2.4375 | stackv2 | ############################################################################
# database.py is to create database ,scheme ,table and query in Azure #
# Section azuresqldb added in the file #
############################################################################
import argp... | 375 | 35.41 | 165 | 16 | 3,278 | python | [{"finding_id": "codeql_py/sql-injection_2edd1e9cd1140e4d_adebf0c8", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 2 | true | [
"CWE-089",
"CWE-089"
] | [
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
291,
309
] | [
null,
null
] | [
17,
18
] | [
22,
23
] | |
2024-11-18T19:58:33.962017+00:00 | 1,609,342,402,000 | bc29c0bac30b4ab7d79f4d9ee610334b0c9a93cb | 3 | {
"blob_id": "bc29c0bac30b4ab7d79f4d9ee610334b0c9a93cb",
"branch_name": "refs/heads/master",
"committer_date": 1609342402000,
"content_id": "038f3e66deb5968c4cd8eee410b14770ffc6dfaf",
"detected_licenses": [
"MIT"
],
"directory_id": "18534d74c15482ff5d507c71e30e5b805ca74aa5",
"extension": "py",
"fi... | 3.03125 | stackv2 | """Client for Open Chat Bot.
Example of usage:
from openchatbotclient.client import client
myclient = client('bot.domain.com', 8443, path='api')
response = myclient.ask("my-userId", "hello")
In this case next GET request will be invoked:
https://bot.domain... | 197 | 31.54 | 130 | 19 | 1,437 | python | [{"finding_id": "codeql_py/request-without-cert-validation_6801dbfafefc1b65_9010783f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
186,
188
] | [
null,
null
] | [
17,
17
] | [
97,
131
] | |
2024-11-18T19:58:39.827099+00:00 | 1,422,693,713,000 | 59773c8bac8f1a33962f2d0619782acbe847f31c | 2 | {
"blob_id": "59773c8bac8f1a33962f2d0619782acbe847f31c",
"branch_name": "refs/heads/master",
"committer_date": 1422693713000,
"content_id": "3dcab5d9ebb6b9f96386b2b60489caedc2658637",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e5d7a382d74b6e55d75e6c0a2572ef392cee572d",
"extension": "py"... | 2.5 | stackv2 | #!/usr/bin/env python
""" PyFlex
flexconfig.py is the configuration parser for PyFlex
"""
#TODO: Consider use of the leading underscore for private methods
# Need to have a configuration validator. Unrealistic to be completely
# exhaustive, but the simple stuff like ensuring no VLAN overlap,
# similarly named ... | 33 | 32.91 | 72 | 13 | 237 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_69ccad3e3c0efb8e_113d533b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
20
] | [
null
] | [
7
] | [
59
] | |
2024-11-18T18:39:29.477658+00:00 | 1,524,742,870,000 | 373372a81054a8abb0ef352b8c8743eb3ec72b21 | 3 | {
"blob_id": "373372a81054a8abb0ef352b8c8743eb3ec72b21",
"branch_name": "refs/heads/master",
"committer_date": 1524742870000,
"content_id": "cd1a8eb2457232043116c09ff53a6ea8572f80d8",
"detected_licenses": [
"MIT"
],
"directory_id": "c4ab1297b63e50d9ff544505bed7fe345288aed5",
"extension": "py",
"fi... | 2.6875 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
import yaml
import os
import argparse
import itertools
class color:
PURPLE = '\033[95m'
CYAN = '\033[96m'
DARKCYAN = '\033[36m'
BLUE = '\033[94m'
GREEN = '\033[92m'
YELLOW = '\033[93m'
RED = '\033[91m'
BOLD = '\033[1m'
UNDERLINE = '\033[4m'
... | 179 | 28.17 | 132 | 16 | 1,382 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a02ff4c59741e16c_b3caac43", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
172
] | [
null
] | [
15
] | [
26
] | |
2024-11-18T18:39:29.641615+00:00 | 1,535,467,211,000 | 4dc3dd45388fcc5f5986beab6e3b69d6ecf42830 | 3 | {
"blob_id": "4dc3dd45388fcc5f5986beab6e3b69d6ecf42830",
"branch_name": "refs/heads/master",
"committer_date": 1535467211000,
"content_id": "e40742809a9c7d4134852d9f524f89185e64c803",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "4b35d6820aa1ca27ec95e190acda57a62bc3e62e",
"extension": "p... | 2.625 | stackv2 | import base64
from Crypto.Cipher import AES
import FirebaseFunctions
import fbchat
from fbchat.models import Message
systemKey = b"here-goes-the-key-you-want-to-use-for-encryption"
def UserPasswordDecrypt(udd):
cipher = AES.new(udd["Key"], AES.MODE_EAX, base64.b64decode(udd["Nonce"]))
depass = cipher.decrypt_... | 93 | 28.51 | 99 | 12 | 683 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_da3e7ad3ba2d396e_747e5b6f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
51
] | [
null
] | [
11
] | [
32
] | |
2024-11-18T18:39:30.789578+00:00 | 1,559,925,518,000 | bdf0ac30ecb31111701db46634ef9c4affd00e32 | 3 | {
"blob_id": "bdf0ac30ecb31111701db46634ef9c4affd00e32",
"branch_name": "refs/heads/master",
"committer_date": 1559925518000,
"content_id": "610e9c7471f5c7a566b3bb0afce54e26f9ab4e99",
"detected_licenses": [
"MIT"
],
"directory_id": "f9a763568c77824f231c6440c2ecfcd6abc89380",
"extension": "py",
"fi... | 2.6875 | stackv2 | import http.server
import socketserver
PORT = 8000
class Serv(http.server.SimpleHTTPRequestHandler):
def do_GET(self):
if self.path == '/':
self.path = '../index.html'
try:
file_to_open = open(self.path[1:]).read()
self.send_response(200)
except:
... | 20 | 26.8 | 57 | 16 | 134 | python | [{"finding_id": "codeql_py/path-injection_7652f5f17818e5fc_056f06a2", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
11
] | [
null
] | [
33
] | [
46
] | |
2024-11-18T18:39:33.534788+00:00 | 1,501,253,936,000 | 6d2e397b8a015011cabf42cbfd4d50fcdc20301e | 3 | {
"blob_id": "6d2e397b8a015011cabf42cbfd4d50fcdc20301e",
"branch_name": "refs/heads/master",
"committer_date": 1501253936000,
"content_id": "fb6d039122ab901238e65c67304ad58fed56f21e",
"detected_licenses": [
"MIT"
],
"directory_id": "d8c03a9848c254896f868dc1c8ecaa63594ee374",
"extension": "py",
"fi... | 2.890625 | stackv2 | import urllib2
import BeautifulSoup
from collections import deque
from sets import Set
from app import db, models
import re
from urlparse import urlparse
from InvertedIndex import InvertedIndex
# A Crawler class that explores a set of web pages, and adds
# them to some storage (currently not implemented). This class
#... | 107 | 34.9 | 113 | 17 | 821 | python | [{"finding_id": "codeql_py/bad-tag-filter_a53841d5916aab8d_380000e2", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match comments containing newlines.", "remediation": "", "location": {"file_pat... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match comments containing newlines."
] | [
71
] | [
null
] | [
28
] | [
37
] | |
2024-11-18T18:39:37.859493+00:00 | 1,544,982,851,000 | 7e07925e3bc1fc7783df28dd823d911877c44a24 | 2 | {
"blob_id": "7e07925e3bc1fc7783df28dd823d911877c44a24",
"branch_name": "refs/heads/master",
"committer_date": 1545122518000,
"content_id": "5131ee5ff0e9efe95f68edbd1ac9063957fdd9fe",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a182168f58252ed93926da5dd1c7a4b1266eea42",
"extension": "py"... | 2.359375 | stackv2 | #!/usr/bin/env python3
import cgi, cgitb
import re
import sys, os
from subprocess import check_output, Popen, PIPE, STDOUT, CalledProcessError
from os.path import expanduser
cgitb.enable()
home_dir = expanduser("~")
os.environ['HOME'] = home_dir
def check_form(formvars, form):
for varname in formvars:
if ... | 101 | 36.14 | 118 | 25 | 899 | python | [{"finding_id": "codeql_py/command-line-injection_bb8ec4cfdfffbc2c_fbc8ecdd", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 2 | true | [
"CWE-078",
"CWE-078"
] | [
"py/command-line-injection",
"py/command-line-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This command line depends on a [user-provided value](1)."
] | [
31,
72
] | [
null,
null
] | [
33,
31
] | [
46,
42
] | |
2024-11-18T18:40:04.202239+00:00 | 1,509,681,154,000 | bb2c69709d2d23137bae63444f3a86346ecae572 | 3 | {
"blob_id": "bb2c69709d2d23137bae63444f3a86346ecae572",
"branch_name": "refs/heads/master",
"committer_date": 1509681154000,
"content_id": "5b522b946d17bf1f1eebb0c346cb4fa0e639f55f",
"detected_licenses": [
"MIT"
],
"directory_id": "b5c9b93e6116c7c89e15d604286a6b4e4b35c674",
"extension": "py",
"fi... | 2.921875 | stackv2 | import argparse
import hashlib
import os
from bs4 import BeautifulSoup as bs
import requests
from time import ctime, time
address = "http://hotspot.abu.edu.ng/login"
def main():
try:
parser = argparse.ArgumentParser()
parser.add_argument("-u", "--usernames", help="specify a file containing list o... | 132 | 38.08 | 116 | 22 | 1,197 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5667a5feb07c2c5f_4608dc5c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-327"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text.\nThis expression stores [sensitive d... | [
57,
66,
35,
58,
61,
112
] | [
null,
null,
null,
null,
null,
null
] | [
33,
21,
19,
31,
31,
28
] | [
54,
27,
116,
72,
104,
46
] | |
2024-11-18T18:40:05.881498+00:00 | 1,507,559,646,000 | 7f8a0a9a215acb08d2051b3ac45606c91d736601 | 3 | {
"blob_id": "7f8a0a9a215acb08d2051b3ac45606c91d736601",
"branch_name": "refs/heads/master",
"committer_date": 1507559646000,
"content_id": "53bb391454e7fec8016d285f5e714e5920319805",
"detected_licenses": [
"MIT"
],
"directory_id": "3f6c8d60e6c18ef28b6384eb421793738c53babe",
"extension": "py",
"fi... | 2.78125 | stackv2 | import requests
import os
from urllib3.exceptions import HTTPError
class Notifier(object):
def __init__(self):
#Make sure we have the appropriate keys
self._auth_token = os.getenv('GREASE_HIPCHAT_TOKEN', '')
self._hipchat_room = os.getenv('GREASE_HIPCHAT_ROOM', '')
self._base_url ... | 43 | 29.14 | 99 | 13 | 291 | python | [{"finding_id": "codeql_py/request-without-cert-validation_76729ca3c6e85982_aca565ec", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
32
] | [
36
] | [
30
] | [
14
] | |
2024-11-18T18:47:04.484483+00:00 | 1,485,007,360,000 | b2cfd31066c207858f71d9259867d4baceee4181 | 2 | {
"blob_id": "b2cfd31066c207858f71d9259867d4baceee4181",
"branch_name": "refs/heads/master",
"committer_date": 1485007360000,
"content_id": "2481e88b50a2d65492656e59649129fdbd2f0ec5",
"detected_licenses": [
"MIT"
],
"directory_id": "d21482784381f58a76f7c9561f591314840b19de",
"extension": "py",
"fi... | 2.359375 | stackv2 | import hashlib
from flask import Flask,request
app = Flask(__name__)
@app.route('/')
def wx_verify():
signature = request.args.get('signature', '')
timestamp = request.args.get('timestamp', '')
nonce = request.args.get('nonce', '')
echostr = request.args.get('echostr', '')
#PUT YOUR TOKEN HERE
token = ''
L = [t... | 21 | 22.24 | 46 | 11 | 132 | python | [{"finding_id": "codeql_py/reflective-xss_c47b09f4ad9184eb_bba83c41", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
18
] | [
null
] | [
10
] | [
17
] | |
2024-11-18T18:47:04.704544+00:00 | 1,479,403,950,000 | 4cc835226d59b7f771494ebe7d3288fab788bf54 | 2 | {
"blob_id": "4cc835226d59b7f771494ebe7d3288fab788bf54",
"branch_name": "refs/heads/master",
"committer_date": 1479403950000,
"content_id": "d93c38479e191075b01c04d3b310670b3fbfb8f7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8a25ada37271acd5ea96d4a4e4e57f81bec221ac",
"extension": "py"... | 2.421875 | stackv2 | import logging
import syslog
from passlib.hash import sha512_crypt
import ajenti
import ajenti.usersync
from ajenti.api import *
def restrict(permission):
"""
Marks a decorated function as requiring ``permission``.
If the invoking user doesn't have one, :class:`SecurityError` is raised.
"""
def d... | 171 | 27.16 | 89 | 21 | 1,005 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_77f340198c4526cb_421b031d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
81
] | [
null
] | [
26
] | [
29
] | |
2024-11-18T19:49:13.359226+00:00 | 1,678,369,848,000 | da4e55d651b51dfc98ac701458304355d141c097 | 3 | {
"blob_id": "da4e55d651b51dfc98ac701458304355d141c097",
"branch_name": "refs/heads/main",
"committer_date": 1678369848000,
"content_id": "e8859c91bd7da9ef2ef105bdf3a7092e5d3b3118",
"detected_licenses": [
"MIT"
],
"directory_id": "6ba36dc571dff7c112ed6f0038f836376876f6c1",
"extension": "py",
"file... | 2.546875 | stackv2 | """Login/logout."""
from datetime import datetime, timedelta
import logging
import os
import re
from typing import cast, Dict, Tuple
import urllib.parse
import hashlib
import base64
from pymongo.database import Database
from ldap3 import Server, Connection, ALL
from ldap3.core import exceptions
import bottle
from da... | 95 | 38.58 | 115 | 16 | 869 | python | [{"finding_id": "codeql_py/ldap-injection_d071e908c0917ced_69b5c3a2", "tool_name": "codeql", "rule_id": "py/ldap-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "LDAP query parameter (filter) depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 3 | true | [
"CWE-090",
"CWE-327",
"CWE-117"
] | [
"py/ldap-injection",
"py/weak-sensitive-data-hashing",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"LDAP query parameter (filter) depends on a [user-provided value](1).",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that... | [
73,
49,
80
] | [
null,
null,
null
] | [
39,
24,
56
] | [
76,
48,
64
] | |
2024-11-18T19:49:15.751199+00:00 | 1,599,055,756,000 | b790ba54095af40fb62b99196407ad6fbb6b4b54 | 3 | {
"blob_id": "b790ba54095af40fb62b99196407ad6fbb6b4b54",
"branch_name": "refs/heads/master",
"committer_date": 1599055756000,
"content_id": "30d40e30e06cb76e747134b1bacf92e6371906b7",
"detected_licenses": [
"MIT"
],
"directory_id": "382d5b7c18a98e48a53358da0db2d21f11b38eb8",
"extension": "py",
"fi... | 2.890625 | stackv2 | from finviz.helper_functions.error_handling import ConnectionTimeout
from finviz.config import connection_settings
from user_agent import generate_user_agent
from lxml import html
import asyncio
import aiohttp
import requests
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
def http... | 81 | 37 | 119 | 19 | 597 | python | [{"finding_id": "codeql_py/request-without-cert-validation_9333676e50a7f53e_bfb51824", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
23
] | [
null
] | [
23
] | [
117
] | |
2024-11-18T20:15:43.533971+00:00 | 1,400,229,600,000 | 1937bd504db363d15528c2d95f5cc013ea861d48 | 2 | {
"blob_id": "1937bd504db363d15528c2d95f5cc013ea861d48",
"branch_name": "refs/heads/master",
"committer_date": 1400229600000,
"content_id": "052a794c692789d1c037ae124275c5a0de11e719",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "2539b3eae49b03f6dd9ae1b0efd16a9157f7a024",
"extension": "p... | 2.4375 | stackv2 | # -*- coding: utf-8 -*-
"""
decorators.sslview
~~~~~~~~~~~~~~~~~~
SSL for particular views
http://flask.pocoo.org/snippets/93/
"""
import os
import sys
sys.path.insert(0, os.path.dirname(os.path.abspath(os.path.dirname(__file__))))
from functools import wraps
from flask import request, current_app, r... | 42 | 19.29 | 79 | 18 | 199 | python | [{"finding_id": "codeql_py/url-redirection_4fb17d9d4ac12981_416427d9", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
27
] | [
null
] | [
33
] | [
75
] | |
2024-11-18T20:15:49.875616+00:00 | 1,607,610,465,000 | 591047fb2f63879c40934c1f17741b73b1f15f6a | 3 | {
"blob_id": "591047fb2f63879c40934c1f17741b73b1f15f6a",
"branch_name": "refs/heads/main",
"committer_date": 1607610465000,
"content_id": "ac5d14b58c09aa2aee5dd4be8b2da40a5543ced5",
"detected_licenses": [
"MIT"
],
"directory_id": "4afaa6a51749724eb4dbf988ea8d6ec837869248",
"extension": "py",
"file... | 3.046875 | stackv2 | import streamlit as st
import pandas as pd
import numpy as np
import nltk
import numpy as np
from sklearn.metrics.pairwise import cosine_similarity
from sentence_transformers import SentenceTransformer, util
import copy
import random
import requests
from bs4 import BeautifulSoup
import random
import time
from newspaper... | 333 | 39.12 | 168 | 24 | 3,116 | python | [{"finding_id": "codeql_py/full-ssrf_f335d4e8a54a2c89_108ee6fe", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](2)."
] | [
38
] | [
null
] | [
20
] | [
37
] | |
2024-11-18T20:15:53.567677+00:00 | 1,690,982,654,000 | 9c429caea5548a9c47159c323d6fa9eeb61848b7 | 3 | {
"blob_id": "9c429caea5548a9c47159c323d6fa9eeb61848b7",
"branch_name": "refs/heads/master",
"committer_date": 1690982654000,
"content_id": "b5933f9037b9b9d97ca31ff3f783e5d78569bcc5",
"detected_licenses": [
"MIT"
],
"directory_id": "73f1b44b6ece5d3faa918f69e293e281603f40f5",
"extension": "py",
"fi... | 2.671875 | stackv2 | '''
Hacky KeePass file decrypt script
Based on https://gist.github.com/Evidlo/8bc69fb58dcd0c9e6ce748b6f2cb59f7
Modified to work with cryptography - some stuff from pycryptodome as cryptography does not have salsa20
'''
import struct
import hashlib
import zlib
import codecs
from xml.etree import ElementTree
import base6... | 196 | 39.13 | 149 | 18 | 1,782 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_b44bb980a782c6c1_98e34dae", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) th... | [
148,
136,
139
] | [
null,
null,
null
] | [
31,
45,
40
] | [
64,
69,
58
] | |
2024-11-18T20:15:57.918487+00:00 | 1,628,277,090,000 | 40e5afb8e3b0e342bbbc81dcabcbb1f54ecda1eb | 3 | {
"blob_id": "40e5afb8e3b0e342bbbc81dcabcbb1f54ecda1eb",
"branch_name": "refs/heads/master",
"committer_date": 1628277090000,
"content_id": "be5ff3c44a6e77a6f26bc0c316eef8df2ec214b6",
"detected_licenses": [
"MIT"
],
"directory_id": "0b53961f719f1b9a9268a243ff71dcc9ef96e78a",
"extension": "py",
"fi... | 3.1875 | stackv2 | """
You can run this by just doing python3 simpleWebServer.py
It will then listen for any POST requests on port 8000, and work
it's magic from there.
"""
from http.server import BaseHTTPRequestHandler, HTTPServer
import json
import requests
import os
""" The HTTP request handler """
class RequestHandler(BaseHTTPRequ... | 54 | 29.3 | 98 | 15 | 395 | python | [{"finding_id": "codeql_py/full-ssrf_0a5c53fb5adc4ce4_0e4aad98", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
43
] | [
null
] | [
11
] | [
99
] | |
2024-11-18T20:16:04.687042+00:00 | 1,521,474,384,000 | 347685434db701eec6eb68853adfc34abe3c79f0 | 3 | {
"blob_id": "347685434db701eec6eb68853adfc34abe3c79f0",
"branch_name": "refs/heads/master",
"committer_date": 1521474384000,
"content_id": "2d54c4931343ab44f075c4995b2d6c43ae15c544",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e2968f00d50783eea952d8e7ffbcab45d2b358c2",
"extension": "py"... | 3.046875 | stackv2 | import abc
import pandas as pd
from pycaishen.pycaishenstorage import PycaishenStorage
from pycaishen.user_programs.user_programs_settings import Configurer
import os
import ntpath
import time as t # to use the date to name our file
import zipfile
import requests
class IO_Files(object):
current_directory = os... | 342 | 32.19 | 145 | 26 | 2,454 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6c2a28a54c8c0f39_99cf306f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
164,
153
] | [
null,
null
] | [
24,
16
] | [
33,
56
] | |
2024-11-18T19:23:08.724713+00:00 | 1,630,944,333,000 | 8ecd059a9ad19b964f24b6cbe6d4a1e0d7804918 | 2 | {
"blob_id": "8ecd059a9ad19b964f24b6cbe6d4a1e0d7804918",
"branch_name": "refs/heads/master",
"committer_date": 1630944333000,
"content_id": "3c7b3938b401300dc52b5ac06a80e89037586627",
"detected_licenses": [
"MIT"
],
"directory_id": "2bac949499515c749011d4d2f93a08e4535eeeac",
"extension": "py",
"fi... | 2.453125 | stackv2 | import json
import time
import jwt
from django.shortcuts import render
from django.http import JsonResponse
from user.models import UserProfile
import hashlib
from django.conf import settings
# 异常码10200-10299
# Create your views here.
def tokens(request):
if request.method != 'POST':
result = {'code': 10... | 44 | 29.32 | 78 | 12 | 347 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_24eb87b768a1556e_6aec21cf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
29
] | [
null
] | [
16
] | [
33
] | |
2024-11-18T19:38:25.789572+00:00 | 1,583,329,077,000 | b6a19ffdcd17c4c9bf2f370936c291909191618d | 3 | {
"blob_id": "b6a19ffdcd17c4c9bf2f370936c291909191618d",
"branch_name": "refs/heads/master",
"committer_date": 1583329077000,
"content_id": "8b39d0f792f59b8af79f9e50119ed28f4867bf94",
"detected_licenses": [
"MIT"
],
"directory_id": "be5cfcc8604088c7b1059f42b6209bd2032f0df1",
"extension": "py",
"fi... | 2.546875 | stackv2 | from flask import Blueprint, request, jsonify
from .models import Doctor, DoctorSchema, Reception, ReceptionSchema, db
module = Blueprint('api', __name__, url_prefix='/api')
doctor_schema = DoctorSchema()
reception_schema = ReceptionSchema()
@module.route('/doctors/', methods=['GET'])
def getDoctors():
doctors = ... | 73 | 33.26 | 112 | 16 | 614 | python | [{"finding_id": "codeql_py/reflective-xss_348442313e65425a_1ad7ef1f", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
48
] | [
null
] | [
16
] | [
69
] | |
2024-11-18T20:10:57.460026+00:00 | 1,397,564,836,000 | ade86790ce7d5c7e7eebd13aaed051da44b6acb8 | 2 | {
"blob_id": "ade86790ce7d5c7e7eebd13aaed051da44b6acb8",
"branch_name": "refs/heads/master",
"committer_date": 1397564836000,
"content_id": "e97f3d5e7ec0b5ab120d2e6def10a9a50ecf042d",
"detected_licenses": [
"MIT"
],
"directory_id": "b19ee220f1da60f36f6745b8aa1451499dcc0378",
"extension": "py",
"fi... | 2.390625 | stackv2 | #! /usr/bin/python
import socket, hashlib, getpass, threading, os
from sys import stdout, stderr
HASH_LENGTH = 32
SEGMENT_SIZE = 2**18
def hsh(x):
return hashlib.sha256(x).digest()
def parse_plan(plan):
return ["".join(i) for i in zip(*[iter(plan)]*HASH_LENGTH)]
class FileDownload:
def __init__(self, path, leng... | 282 | 32.87 | 143 | 19 | 2,559 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_570587d724ad34a8_a16129b2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
10
] | [
null
] | [
24
] | [
25
] | |
2024-11-18T20:10:58.857008+00:00 | 1,575,304,957,000 | fe851e8badd441176ab25aecc4257dc9083d6f81 | 3 | {
"blob_id": "fe851e8badd441176ab25aecc4257dc9083d6f81",
"branch_name": "refs/heads/master",
"committer_date": 1575304957000,
"content_id": "e642df9c74b485b9bb5bf40d9de4b91572231e9f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "51027520a5e4b9154e7fb5de80c4c3a49176300f",
"extension": "py"... | 2.75 | stackv2 | import logging
import sys
import requests
from flask_jwt_extended import jwt_required, get_jwt_claims
from flask_restful import Resource, reqparse
sys.path.append("../..")
from settings import GetConfig
logging.basicConfig(level='INFO')
logger = logging.getLogger(__name__)
class TestKeyValidity(Resource):
"""
... | 166 | 38.08 | 79 | 20 | 1,254 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4a6683dd89139944_326f0c4f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
76
] | [
77
] | [
33
] | [
72
] | |
2024-11-18T20:26:18.397682+00:00 | 1,518,419,042,000 | 3a4e544020a71d3b2e473150adee34de6adcfa3d | 3 | {
"blob_id": "3a4e544020a71d3b2e473150adee34de6adcfa3d",
"branch_name": "refs/heads/master",
"committer_date": 1518419042000,
"content_id": "e81311335ba3e30e39049d93900da8c792477c77",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "dcb20a7e94315bff9ead6ee15d1a372fd359037b",
"extension": "py"... | 3.34375 | stackv2 | # -*- coding: utf-8 -*-
import json
import datetime
import codecs
from collections import OrderedDict
# JSON (Javascript object Notation)
# 여러 시스템 간 데이터 교환을 위해 고안한 데이터형
# XML : 데이터를 정의하는 태그 때뭉네 파일 용량이 커짐
# CSV : XML 보다 용량은 작지만, 데이터의 의미 파악이 힘듦
# 자바스크립트의 객체 표기법을 차용해서 만듦
# 객체는 키, 값의 형식으로 작성
# XML과 CSV의 장점을 따서 만든것이라 폭발적인... | 203 | 21.13 | 61 | 11 | 1,705 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d42c30fc47e95355_1870c0cb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 11 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive... | [
91,
95,
98,
99,
140,
142,
145,
148,
149,
154,
155
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
7,
7,
7,
7,
7,
7,
7,
11,
11,
7,
7
] | [
14,
14,
22,
22,
15,
15,
23,
14,
32,
35,
40
] | |
2024-11-18T20:26:18.641078+00:00 | 1,448,374,630,000 | 6729a7dadb4c9670e4634349885ac88ad36b4db1 | 3 | {
"blob_id": "6729a7dadb4c9670e4634349885ac88ad36b4db1",
"branch_name": "refs/heads/master",
"committer_date": 1448374630000,
"content_id": "584c5aef8de510df30fc0776d8fb40a338bd7e32",
"detected_licenses": [
"MIT"
],
"directory_id": "4234194f3985598c22941c7c07aec876d3b5a215",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import time
import json
import hmac
import hashlib
import binascii
import base64
import requests
class TencentYunPornDetect(object):
def __init__(self, appid, secret_id, secret_key, bucket):
"""
APP_ID和BUCKET,在http://console.qcloud.com/image/bucket查... | 125 | 30.54 | 109 | 12 | 1,120 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_5a940f8a71b92326_d0781bb3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](3) is used in a hashing algorithm (SHA1) that is insecure."
] | [
40
] | [
null
] | [
41
] | [
51
] | |
2024-11-18T20:26:26.538684+00:00 | 1,547,835,881,000 | fe7e313c86021a335df63d1ba8c092c8c824831b | 3 | {
"blob_id": "fe7e313c86021a335df63d1ba8c092c8c824831b",
"branch_name": "refs/heads/master",
"committer_date": 1547835881000,
"content_id": "8678528c12055662f6588d2f5f690dc57121bb1e",
"detected_licenses": [
"MIT"
],
"directory_id": "6c05b0bc90df809097213c08baf265822722a452",
"extension": "py",
"fi... | 2.671875 | stackv2 | from flask import Flask, render_template, request, redirect, session, flash, url_for
app = Flask(__name__)
app.secret_key = 'alura'
class Jogo:
def __init__(self, nome, categoria, console):
self.nome = nome
self.categoria = categoria
self.console = console
class Usuario:
def __init__... | 81 | 27.43 | 84 | 16 | 605 | python | [{"finding_id": "codeql_py/flask-debug_6ab09bf5e9dd594d_f149d4c5", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
81,
69
] | [
null,
null
] | [
null,
29
] | [
20,
43
] | |
2024-11-18T20:27:01.107714+00:00 | 1,621,126,389,000 | bb9254874c671b987a2522b461447de68b397f64 | 3 | {
"blob_id": "bb9254874c671b987a2522b461447de68b397f64",
"branch_name": "refs/heads/main",
"committer_date": 1621126389000,
"content_id": "1c085f7b7d6558c55efc5cf56952df0cf0f13481",
"detected_licenses": [
"MIT"
],
"directory_id": "18ca12da81b8ad981aa30f1c0e2cb7f515394586",
"extension": "py",
"file... | 2.5625 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
import re
import urllib.request
from pathlib import Path
from jinja2 import Environment, FileSystemLoader
LINUX_VERSION = 'v5.12'
BASE_URL = f'https://raw.githubusercontent.com/torvalds/linux/{LINUX_VERSION}'
BASEPATH = Path(__file__).parent.absolute()
TEMPLATES_DIR = BA... | 207 | 33.17 | 101 | 19 | 1,898 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_369f977b563408c6_95ed4ed2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
176
] | [
178
] | [
11
] | [
42
] | |
2024-11-18T20:52:02.743178+00:00 | 1,590,828,531,000 | 44597f423afa4481291c36065937b296b27dc444 | 2 | {
"blob_id": "44597f423afa4481291c36065937b296b27dc444",
"branch_name": "refs/heads/master",
"committer_date": 1590828531000,
"content_id": "238f2883530ef1c0b16a46af4a32f80b6a51142b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "12c8ce4e18f3090e7519dab43c9231bcd15bc956",
"extension": "py"... | 2.4375 | stackv2 | # -*- coding: utf-8 -*-
from typing import Any, Dict, List
from chaosaws import aws_client
from chaosaws.types import AWSResponse
from chaoslib.types import Configuration, Secrets
from chaoslib.exceptions import FailedActivity
from logzero import logger
import boto3
import paramiko
import pickle
import json
import os
... | 129 | 29.43 | 117 | 17 | 895 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_21c816df3972f8d6_04c0e0d6", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
51
] | [
null
] | [
5
] | [
62
] | |
2024-11-18T20:52:31.105358+00:00 | 1,509,523,996,000 | ad7e3f8d98db1ca4f0037c73e1e18c1a2cb0da4c | 2 | {
"blob_id": "ad7e3f8d98db1ca4f0037c73e1e18c1a2cb0da4c",
"branch_name": "refs/heads/master",
"committer_date": 1509523996000,
"content_id": "bde6bdfc6d0ca019428f1c8bc28cc477180ca662",
"detected_licenses": [
"MIT"
],
"directory_id": "595c940b2dc679fe81920ff03708bb2169bb3393",
"extension": "py",
"fi... | 2.328125 | stackv2 | # encoding=utf-8
"""Made by delphi for himself's blog"""
import os
from flask import Flask
from flask import render_template
from kits import initialize
from config.conf import conf
app = Flask(__name__)
ROOT_PATH = os.path.dirname(os.path.realpath(__file__))
@app.route("/")
def index():
return render_templat... | 52 | 24.33 | 82 | 12 | 323 | python | [{"finding_id": "codeql_py/path-injection_55f3b6eb171dd627_65010cf2", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
35
] | [
null
] | [
27
] | [
36
] | |
2024-11-18T20:52:52.895201+00:00 | 1,604,521,662,000 | 51ac04a22ff05c86fc9c2f095dc0fca828dd6fdc | 3 | {
"blob_id": "51ac04a22ff05c86fc9c2f095dc0fca828dd6fdc",
"branch_name": "refs/heads/master",
"committer_date": 1604521662000,
"content_id": "d59c2bacfc286d2e00fd5538b042615daec9d46a",
"detected_licenses": [
"MIT"
],
"directory_id": "b0ef6e31d55fa626b3a796fca53a7975272be415",
"extension": "py",
"fi... | 2.578125 | stackv2 | import argparse
# -*- coding: utf-8 -*-
# requires: pip install paho-mqtt
import paho.mqtt.client as mqtt
class MqttIpClient:
def __init__(self, mac_addresses, interface):
self.mac_addresses = mac_addresses
self.interface = interface
def subscribe(self):
client = mqtt.Client()
... | 50 | 28.14 | 62 | 15 | 329 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7ce4181380c1882e_70e003ca", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
30
] | [
null
] | [
19
] | [
43
] | |
2024-11-18T19:02:56.875149+00:00 | 1,488,337,173,000 | f1dbaea6a739a33d1c7d0aed736e989e63cd6e12 | 3 | {
"blob_id": "f1dbaea6a739a33d1c7d0aed736e989e63cd6e12",
"branch_name": "refs/heads/master",
"committer_date": 1488337173000,
"content_id": "9b9d16574c684d4d6bbdb52c690e9f1ae3d4b208",
"detected_licenses": [
"MIT"
],
"directory_id": "e9a653018223579ba78f95ca982226018132b877",
"extension": "py",
"fi... | 2.96875 | stackv2 | from flask import Flask, jsonify, request
import jsonpatch
app = Flask(__name__)
@app.route('/json/diff', methods=['POST'])
def json_diff():
"""Looks at the differences between two json objects A,B and computes
a diff (rfc 6902) that can be applied to document A to transform it into B.
"""
try:
... | 62 | 29.21 | 119 | 19 | 439 | python | [{"finding_id": "codeql_py/stack-trace-exposure_a0443ed4f6d7e11f_48b44540", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
29,
57
] | [
null,
null
] | [
24,
24
] | [
27,
27
] | |
2024-11-18T19:02:58.437257+00:00 | 1,337,527,485,000 | 9f90a5e6119c83fcf8ea700701fdd7a54e0d9095 | 2 | {
"blob_id": "9f90a5e6119c83fcf8ea700701fdd7a54e0d9095",
"branch_name": "refs/heads/master",
"committer_date": 1337527485000,
"content_id": "abcfc06dba6361be8de5ba0f815317dec1076d60",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "ac1a25a133811147549e757b4e856e6ac97a6233",
"extension": "p... | 2.5 | stackv2 | # coding: utf-8
from django.utils.translation import ugettext as _
from django.utils.safestring import mark_safe
from time import gmtime, strftime, localtime, mktime, time
from django.core.files import File
from django.core.files.storage import default_storage
import os, re, decimal
from urlparse import urlparse
# fi... | 358 | 27.98 | 173 | 16 | 2,547 | python | [{"finding_id": "codeql_py/overly-permissive-file_d8f94f8dc376a7df_46027daf", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
307
] | [
null
] | [
13
] | [
40
] | |
2024-11-18T19:03:05.825233+00:00 | 1,480,628,102,000 | 1a288f4f6c451abad160175ccbe2704172e936bf | 3 | {
"blob_id": "1a288f4f6c451abad160175ccbe2704172e936bf",
"branch_name": "refs/heads/master",
"committer_date": 1480628102000,
"content_id": "1daeeda28967bcda7862661138d587a87f1de0b4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "69c01c507655201818bf05c6e2ebb52850ce759b",
"extension": "py"... | 2.625 | stackv2 | import os
import shutil
from jinja2 import BaseLoader, TemplateNotFound
class MetadataTemplateLoader(BaseLoader):
def __init__(self, input_dir):
self.input_dir = input_dir
def get_source(self, environment, template):
path = os.path.join(self.input_dir, template)
if not os.path.exists(pa... | 150 | 39.61 | 137 | 16 | 1,411 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_7c4ec86a9f04093e_5318c80a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
24,
27,
50
] | [
null,
null,
null
] | [
37,
33,
20
] | [
71,
67,
136
] | |
2024-11-18T19:27:36.818576+00:00 | 1,627,312,519,000 | 7a25ebd6fa88fdf6b1b568d3eb210820d38f34b3 | 3 | {
"blob_id": "7a25ebd6fa88fdf6b1b568d3eb210820d38f34b3",
"branch_name": "refs/heads/master",
"committer_date": 1627393171000,
"content_id": "3bae58c1108d8b607e9a2b4cb99dccd66ca6d616",
"detected_licenses": [
"MIT"
],
"directory_id": "18455e177814a0d10f3b7f6e44d8df44da0b470a",
"extension": "py",
"fi... | 2.578125 | stackv2 | import copy
import logging
import re
from homeassistant.const import SUN_EVENT_SUNRISE, SUN_EVENT_SUNSET
from .const import CONDITION_TYPE_AND, CONDITION_TYPE_OR
ENTRY_PATTERN_SUNRISE = "SR"
ENTRY_PATTERN_SUNSET = "SS"
ENTRY_PATTERN_DAILY = "0"
ENTRY_PATTERN_WORKDAY = "15"
ENTRY_PATTERN_WEEKEND = "67"
_LOGGER = log... | 193 | 33.66 | 94 | 24 | 1,443 | python | [{"finding_id": "codeql_py/redos_5baa537b23658500_676e7ae8", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'DT0A' and containing many repetit... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'DT0A' and containing many repetitions of '0'."
] | [
18
] | [
null
] | [
58
] | [
65
] | |
2024-11-18T19:38:36.319116+00:00 | 1,592,583,554,000 | dfe0ddfefe8731a186dc969d0e96321ee7a73722 | 4 | {
"blob_id": "dfe0ddfefe8731a186dc969d0e96321ee7a73722",
"branch_name": "refs/heads/master",
"committer_date": 1592583554000,
"content_id": "e0d3fd7e8e4f77f5886f045051d38964e858029e",
"detected_licenses": [
"MIT"
],
"directory_id": "3e5438ff2957def8d7f3933e4ca163d1616cdbfc",
"extension": "py",
"fi... | 4.375 | stackv2 | """
The second part of the website project is to write a script that validates the password entered by the user.
The company also puts some rules in order to verify valid passwords:
It can contain lowercase a-z and uppercase letters A-Z
It can contain numbers
It can contain the symbols: *, #, $, %, !, &, .
It must be ... | 25 | 36.4 | 108 | 13 | 237 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2831f1c927b283d9_3791bdc4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
23,
25
] | [
null,
null
] | [
14,
14
] | [
92,
83
] | |
2024-11-18T19:38:55.122569+00:00 | 1,490,254,704,000 | 044bda6378bbc0768aa33766b3b0b6ef60d2aa1c | 3 | {
"blob_id": "044bda6378bbc0768aa33766b3b0b6ef60d2aa1c",
"branch_name": "refs/heads/master",
"committer_date": 1490254704000,
"content_id": "3d1a1af1142a7949fe511256dadb92a23c77f395",
"detected_licenses": [
"Unlicense"
],
"directory_id": "7f106512693f3feef490c18f07257d15cbb1aeeb",
"extension": "py",... | 2.703125 | stackv2 | from os.path import join
from tqdm import tqdm
import json
from nltk.stem.snowball import SnowballStemmer
import numpy as np
from sklearn import svm
from sklearn.feature_extraction import text
from sklearn.feature_extraction.text import CountVectorizer
from sklearn.feature_extraction.text import TfidfTransformer
from... | 205 | 24.65 | 116 | 17 | 1,317 | python | [{"finding_id": "codeql_py/overly-large-range_c35072976aa7a787_93c292df", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[.\\/0-9:\\].", "remediation": "", "location": {"file... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[.\\/0-9:\\]."
] | [
92
] | [
null
] | [
25
] | [
28
] | |
2024-11-18T20:06:01.229143+00:00 | 1,563,795,322,000 | f07320ca2e488ecefdbb7ea7c8b6894115055cf0 | 3 | {
"blob_id": "f07320ca2e488ecefdbb7ea7c8b6894115055cf0",
"branch_name": "refs/heads/master",
"committer_date": 1563795322000,
"content_id": "d3c9eb98c926c475bfe1d18253c9ac287032436a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3f005487c3e956cd9bfbca2defe22525c4f5e5ad",
"extension": "py"... | 3.421875 | stackv2 |
import salary
import old_salary
import matplotlib.pyplot as plt
last_diff=-1
last_salary=0
x=[]
y=[]
y2=[]
y3=[]
i=0
for i in range(5000, 50000):
diff=salary.get_salary(i) - old_salary.get_salary(i)
x.append(i)
y.append(diff)
y2.append(salary.get_salary(i))
y3.append(old_salary.get_salary(i))
... | 30 | 18.8 | 68 | 12 | 189 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fc325aaecc522297_64cc211d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
20,
24
] | [
null,
null
] | [
15,
7
] | [
68,
60
] | |
2024-11-18T20:06:05.896748+00:00 | 1,594,279,223,000 | 0dbecd3b6bec2e29b271c3140c87c0f6b10d5545 | 2 | {
"blob_id": "0dbecd3b6bec2e29b271c3140c87c0f6b10d5545",
"branch_name": "refs/heads/master",
"committer_date": 1594279223000,
"content_id": "f9b535e7dbd93b77ceccfc6ae1a14d7cf142ff1a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ce005d2e7c72cf74491e099c047873bf56c2f0cd",
"extension": "py"... | 2.46875 | stackv2 | # Copyright (C) 2018 Cancer Care Associates
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to ... | 84 | 30.95 | 87 | 15 | 573 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e6383e4e3b35aaa6_461aef3f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
73
] | [
null
] | [
16
] | [
41
] | |
2024-11-18T20:06:14.574377+00:00 | 1,411,059,797,000 | 528cb40b79092dfbba52f3642da1845332ec1e39 | 2 | {
"blob_id": "528cb40b79092dfbba52f3642da1845332ec1e39",
"branch_name": "refs/heads/master",
"committer_date": 1411059797000,
"content_id": "8dc2334146a043e01b27b44f56d371fafc700cf9",
"detected_licenses": [
"MIT"
],
"directory_id": "e6f1d216ae720602e9dbe258902842651a53d6ad",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/env python
import datetime, getopt, getpass, os, re, sys, tarfile
try:
import paramiko
except ImportError:
print >>sys.stderr, "Please install the paramiko python module - 'pip install paramiko'"
sys.exit(1)
hostname = ''
output_filenames = []
commands = ('show logging', 'show console', 'enable;show ... | 104 | 24.69 | 152 | 18 | 748 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_3ce35865ea91199e_405c2245", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
59
] | [
null
] | [
2
] | [
61
] | |
2024-11-18T20:06:27.514787+00:00 | 1,586,715,487,000 | a0b21f4102ee301f18dde6365f850e24cf73a8b6 | 3 | {
"blob_id": "a0b21f4102ee301f18dde6365f850e24cf73a8b6",
"branch_name": "refs/heads/master",
"committer_date": 1586715487000,
"content_id": "e36a1d60572fd0aaaa2d4ce581c4dee9beb1310d",
"detected_licenses": [
"MIT"
],
"directory_id": "d31b3d9c0464426d2812cfeca0dd3a5b02229d4a",
"extension": "py",
"fi... | 2.546875 | stackv2 | from flask import Flask, request
from flask import jsonify
import random
from Crypto.Hash import SHA512
from Crypto.Cipher import PKCS1_OAEP
from Crypto.PublicKey import RSA
import base64
from datetime import datetime, timedelta
import jwt
app = Flask(__name__)
# JWT_SECRET = 'secret'
JWT_ALGORITHM = 'RS256'
JWT_EXP_DE... | 75 | 27.83 | 98 | 18 | 626 | python | [{"finding_id": "codeql_py/path-injection_2c3974f211c6e605_481f9c8e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
35
] | [
null
] | [
33
] | [
59
] | |
2024-11-18T20:06:31.711565+00:00 | 1,530,198,092,000 | 392d637a8220fa7c3d667ca42b733f44adaf9ac4 | 2 | {
"blob_id": "392d637a8220fa7c3d667ca42b733f44adaf9ac4",
"branch_name": "refs/heads/master",
"committer_date": 1530198092000,
"content_id": "67c30670a3c680d4d9c0593201e949b3a881c6f4",
"detected_licenses": [
"MIT"
],
"directory_id": "057f518b87cc48546c32e5f8bfc18807bd630720",
"extension": "py",
"fi... | 2.3125 | stackv2 | import os
from flask import Flask, render_template, request, jsonify, send_from_directory
from flask_cors import CORS
from model import build_whole_model
import torch
import torch.utils.model_zoo as model_zoo
import urllib.request
from torchvision import transforms
import PIL.Image
import string
import random
def id... | 106 | 31.64 | 94 | 18 | 815 | python | [{"finding_id": "codeql_py/path-injection_d7446c7d23a26a94_fe68c865", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 5 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
52,
52,
59,
79,
79
] | [
null,
null,
null,
null,
null
] | [
19,
62,
19,
19,
59
] | [
60,
94,
57,
57,
91
] | |
2024-11-18T20:18:17.784450+00:00 | 1,556,971,397,000 | a934352cb73ff552aa70d9d0a41722a0066ccad3 | 2 | {
"blob_id": "a934352cb73ff552aa70d9d0a41722a0066ccad3",
"branch_name": "refs/heads/master",
"committer_date": 1556971397000,
"content_id": "a679c8053e0a80c04774fd09ffd5eb8b78b12953",
"detected_licenses": [
"MIT"
],
"directory_id": "727a4e19617cb922852ed55319a67fccac47e94c",
"extension": "py",
"fi... | 2.3125 | stackv2 | #/usr/bin/env python
from werkzeug.wsgi import DispatcherMiddleware
from werkzeug.serving import run_simple
from flask import Flask, request, g
import core
import practice1
import practice2
import blog
import vpspractice
import vps
import hashlib
from bs4 import BeautifulSoup
from common import robotgate, set_captcha... | 93 | 26.16 | 102 | 17 | 592 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_8a661d295e5ef257_fd60550b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.\... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (SHA1) that is insecure."
] | [
39
] | [
null
] | [
26
] | [
49
] | |
2024-11-18T20:18:20.969596+00:00 | 1,537,930,892,000 | 98ab84f52862337be1f389ee91b2f3e1ffacf395 | 2 | {
"blob_id": "98ab84f52862337be1f389ee91b2f3e1ffacf395",
"branch_name": "refs/heads/master",
"committer_date": 1537930892000,
"content_id": "ec84c79f96259c3fb3ac2656736ecb3eb9ff9f72",
"detected_licenses": [
"MIT"
],
"directory_id": "b5167e2e01b7cae1f615301e4cb7d298372b195e",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python3
import io
import shutil
import os
key = input("Be sure to run this as root/sudo. Press enter to continue.")
webhook = input("Paste your slack webhook url: ").encode()
filename = "slacknotif"
system = input("Are you using a Debian or RHEL based system? ").lower()
with io.FileIO("%s" % filename, ... | 45 | 31.47 | 126 | 13 | 421 | python | [{"finding_id": "codeql_py/overly-permissive-file_a9258357b0299cd1_7010297f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
28
] | [
null
] | [
null
] | [
42
] | |
2024-11-18T20:18:36.933352+00:00 | 1,611,585,981,000 | 2daf0878723c8e2a9a9a52ead58086bbdf4c59eb | 3 | {
"blob_id": "2daf0878723c8e2a9a9a52ead58086bbdf4c59eb",
"branch_name": "refs/heads/main",
"committer_date": 1611585981000,
"content_id": "8810671b6b67aa1a7fd0a38ae3ad873d4ffca0bc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9af0eea2cd70dfea8b919b8ab7a75a4788c102d8",
"extension": "py",
... | 2.65625 | stackv2 | import re, itertools, hashlib, sys
sys.stdout = open('dic.txt', 'w')
def display(result):
print(result)
# on parse le fichier shadow
with open('shadow', 'r') as f:
lines = f.readlines()
passwdTable = {}
for line in lines:
try:
user, user_hash = re.findall('^([^:]+):\$1\$([^:]+):.+', line)[0]
except... | 28 | 29.64 | 71 | 17 | 227 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4477aa7b8979cc83_7cd2a696", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
5,
24
] | [
null,
null
] | [
11,
32
] | [
17,
52
] | |
2024-11-18T20:18:42.158226+00:00 | 1,606,501,468,000 | 179dbb126aa0edad195481ee909ccb825fd2e331 | 3 | {
"blob_id": "179dbb126aa0edad195481ee909ccb825fd2e331",
"branch_name": "refs/heads/master",
"committer_date": 1606501468000,
"content_id": "723cd763f0f0d80a95455c781e809d8b669583e2",
"detected_licenses": [
"MIT"
],
"directory_id": "bbaa6c695c4ca435aa82aed451d24b91204932e0",
"extension": "py",
"fi... | 3.109375 | stackv2 | import ssl
import socket
from typing import List, Optional, Tuple
def find_headers_in_response(response: bytes,
headers: Optional[List[str]] = None) -> List[str]:
"""
Convert response byte strings to strings and search for requested headers.
:param response: response byte st... | 72 | 37.85 | 82 | 12 | 640 | python | [{"finding_id": "codeql_py/insecure-protocol_f171e50df6b8b40d_3865d269", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)."
] | [
67
] | [
null
] | [
10
] | [
17
] | |
2024-11-18T20:31:22.277067+00:00 | 1,572,548,763,000 | 06cf109a57e1948242fd158f83f05aab0041db14 | 3 | {
"blob_id": "06cf109a57e1948242fd158f83f05aab0041db14",
"branch_name": "refs/heads/master",
"committer_date": 1572548763000,
"content_id": "25666a7aa310cf2b5f25ea037d88644603f89f3a",
"detected_licenses": [
"MIT"
],
"directory_id": "c465815ecbe9f565476210bb76f2495ece89596a",
"extension": "py",
"fi... | 2.671875 | stackv2 | #!/usr/bin/env python3
from argparse import ArgumentParser
from collections import OrderedDict
import json
import os
import shutil
import subprocess
import sys
from tempfile import NamedTemporaryFile
from jinja2 import Environment, FileSystemLoader, BaseLoader
import yaml
__version__ = '1.1.1'
sys.tracebacklimit = ... | 416 | 31.26 | 97 | 20 | 2,648 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ec9a3a31194efada_4a93a2c3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
182,
249
] | [
186,
253
] | [
21,
21
] | [
10,
10
] | |
2024-11-18T20:43:30.975882+00:00 | 1,616,561,244,000 | c7a79b11ce1dec024ddd94b603f01a461b6033be | 3 | {
"blob_id": "c7a79b11ce1dec024ddd94b603f01a461b6033be",
"branch_name": "refs/heads/master",
"committer_date": 1616561244000,
"content_id": "67dc7503925f44a4bd334c54a437bccc7cb382bc",
"detected_licenses": [
"MIT"
],
"directory_id": "b6aab329acbe8f400d1b0b1ea57553d50848b125",
"extension": "py",
"fi... | 2.671875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import sys, os, shutil, re, argparse, json
from codecs import open
from itertools import izip
from collections import defaultdict
import urllib
import xml.etree.ElementTree as ET
def clean(x):
x = re.sub(r'\s+', ' ', x).strip()
x = re.sub(r'\.$', '', x)
retur... | 127 | 30.45 | 97 | 16 | 1,000 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_f5d84f1d379abd75_352195f8", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://arxiv.org](1) may be at an arbitrary position i... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [http://arxiv.org](1) may be at an arbitrary position in the sanitized URL.",
"The string [https://arxiv.org](1) may be at an arbitrary position in the sanitized URL."
] | [
101,
102
] | [
null,
null
] | [
9,
13
] | [
43,
48
] | |
2024-11-18T20:43:35.429726+00:00 | 1,557,862,036,000 | feaa6e27c890edbe6efd9bda073c4ef5079f7bb9 | 3 | {
"blob_id": "feaa6e27c890edbe6efd9bda073c4ef5079f7bb9",
"branch_name": "refs/heads/master",
"committer_date": 1557862036000,
"content_id": "c17cc2fa06ec82f05af5d9f8af701d77b995b02a",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "b2f0d16155a94b4a29dad4c2c1ee0faaf62fda49",
"extension": "p... | 2.59375 | stackv2 | import json
import shutil
import tempfile
import six
from urllib.error import URLError
from django.core.files import File
from django.http import HttpResponseBadRequest, HttpResponse
from django.contrib.auth.decorators import login_required, permission_required
from django.utils.decorators import method_decorator
fro... | 121 | 32.21 | 119 | 18 | 843 | python | [{"finding_id": "codeql_py/full-ssrf_59b6d424737933b6_28b125c6", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](2)."
] | [
91
] | [
null
] | [
17
] | [
54
] | |
2024-11-18T20:43:59.718532+00:00 | 1,624,418,416,000 | 6a1e1b574479f43326b4a79fd8a32ee30f8606c1 | 3 | {
"blob_id": "6a1e1b574479f43326b4a79fd8a32ee30f8606c1",
"branch_name": "refs/heads/main",
"committer_date": 1624418416000,
"content_id": "1e1cf9d79b0260329701510dbdf03584b0b8dc0c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "13fa726bb71c99c90255a6d5d1838eef1542eb73",
"extension": "py",
... | 2.609375 | stackv2 | #!/usr/bin/env python3
import argparse
import base64
import html
import http.server
import mimetypes
import os
import posixpath
import re
import shutil
import ssl
import sys
import urllib.error
import urllib.parse
import urllib.request
from http.server import HTTPServer
from io import BytesIO
class UploadHTTPRequest... | 408 | 37.86 | 119 | 19 | 3,765 | python | [{"finding_id": "codeql_py/http-response-splitting_d8d5892a49f3ef4b_c0a0736c", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is con... | 10 | true | [
"CWE-113",
"CWE-1333",
"CWE-327",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/http-response-splitting",
"py/polynomial-redos",
"py/insecure-default-protocol",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is constructed from a [user-provided value](2).\nThis HTTP header is constructed from a [user-provided value](3).\nThis HTTP header is constructed from a [user-provided value](4).",
"This [regular expression](1) that depends on a ... | [
128,
83,
381,
93,
124,
133,
143,
162,
181,
184
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
46,
83,
24,
28,
26,
35,
22,
36,
30,
31
] | [
61,
96,
99,
30,
30,
40,
26,
40,
38,
39
] | |
2024-11-18T20:44:20.083619+00:00 | 1,356,706,963,000 | 2bc9dc962fcad376dfb0667f66b8a5cc4c7b4c4c | 2 | {
"blob_id": "2bc9dc962fcad376dfb0667f66b8a5cc4c7b4c4c",
"branch_name": "refs/heads/master",
"committer_date": 1356706963000,
"content_id": "53e90fefd0e4ae9c09c6f31e45881be2ac99cef2",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "d46c095a9bfe57cd36aebe75cc7b3edba5f2b582",
"extension": "p... | 2.328125 | stackv2 | """
sentry_twilio.models
~~~~~~~~~~~~~~~~~~~~
:copyright: (c) 2012 by Matt Robenolt.
:license: BSD, see LICENSE for more details.
"""
import re
import urllib
from django import forms
from django.utils.translation import ugettext_lazy as _
from sentry.plugins.bases.notify import NotificationPlugin
from twilio.rest imp... | 204 | 38.19 | 124 | 17 | 1,970 | python | [{"finding_id": "codeql_py/polynomial-redos_4e4731e3d2f8b0e4_9aa2204f", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/polynomial-redos",
"py/polynomial-redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of ' '.",
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of ' '."
] | [
47,
91
] | [
null,
null
] | [
50,
50
] | [
54,
54
] | |
2024-11-18T20:57:36.225901+00:00 | 1,680,267,922,000 | 47363966817d90d0ee98ceb6751de87326e366ee | 3 | {
"blob_id": "47363966817d90d0ee98ceb6751de87326e366ee",
"branch_name": "refs/heads/master",
"committer_date": 1680267922000,
"content_id": "a4d51ab80b802e2ef2917283d081b8c793508d9e",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "58f400e04001605d3ab8214167c4e95b3d73b0e3",
"extension": "p... | 2.828125 | stackv2 | import pandas as pd
from sklearn.tree import DecisionTreeClassifier # Import Decision Tree Classifier
from sklearn.model_selection import train_test_split # Import train_test_split function
from sklearn import metrics # Import scikit-learn metrics module for accuracy calculation
from sklearn import tree
from scipy.i... | 206 | 32.66 | 146 | 22 | 1,782 | python | [{"finding_id": "codeql_py/redos_45a4d13328557e07_c98bd4ec", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '0\\\\n\\[' and containing many re... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '0\\\\n\\[' and containing many repetitions of '0'."
] | [
110
] | [
null
] | [
37
] | [
43
] | |
2024-11-18T20:57:41.432781+00:00 | 1,560,847,669,000 | ceb8bd1e8999acfd718e5a6b8387ccb984c5172b | 3 | {
"blob_id": "ceb8bd1e8999acfd718e5a6b8387ccb984c5172b",
"branch_name": "refs/heads/master",
"committer_date": 1560847669000,
"content_id": "9ca457a1504dfa5ba20932e2f0f4c64069b07fc6",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "fb40f67f8d655f1e7fd350bbf6b2d80e9dab4c4a",
"extension": "p... | 2.53125 | stackv2 | #!/usr/bin/python
import os
from os import system
import argparse
import glob
def ParseCommandLine():
parser = argparse.ArgumentParser(description="Changing RPL parameters dynamically")
# folders to scan and write
parser.add_argument('-r', '--folder2scan', help='Folder to Scan for initial logs',required=Tru... | 347 | 34.8 | 168 | 22 | 3,232 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_f6c3fc53e2200dcc_474e2cf1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data ... | [
323
] | [
null
] | [
24
] | [
40
] | |
2024-11-18T20:58:03.193995+00:00 | 1,666,929,698,000 | 6e8ad6c9294addf88627d6d8241962b62509bd0b | 2 | {
"blob_id": "6e8ad6c9294addf88627d6d8241962b62509bd0b",
"branch_name": "refs/heads/master",
"committer_date": 1666929698000,
"content_id": "3f8fe9065cf053deb3aa194d71a7a14aad21349f",
"detected_licenses": [
"MIT"
],
"directory_id": "bd9a09a3f1a8b2b5166c540ada93cc5b30591605",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
'''
name: metinfo5.0 getpassword.php两处时间盲注漏洞
referer: http://www.wooyun.org/bugs/wooyun-2010-021062
author: Lucifer
description: member/getpassword.php与admin/admin/getpassword.php文件中,经过base64解码后的值用explode打散后进入到
SQL语句引起注入。
'''
import sys
import time
import requests
cl... | 42 | 30.4 | 148 | 16 | 412 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f293ef9f87058977_963bc8d6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
32
] | [
null
] | [
23
] | [
87
] | |
2024-11-18T20:58:10.133212+00:00 | 1,335,744,352,000 | b5e2b677c51443c2c88fd80e326d1b52595e0e95 | 2 | {
"blob_id": "b5e2b677c51443c2c88fd80e326d1b52595e0e95",
"branch_name": "refs/heads/master",
"committer_date": 1335744352000,
"content_id": "15765b3491057876d9f2a1e58d85d72b90848918",
"detected_licenses": [
"BSD-2-Clause",
"BSD-2-Clause-Views"
],
"directory_id": "b7b452fbeb652d55e7d20ade30411ed29c... | 2.421875 | stackv2 | #!/usr/bin/env python
from __future__ import division
from flask import Flask, render_template, url_for, session, request, g, \
redirect, flash
from flaskext.oauth import OAuth
from calendar import timegm
import os, datetime
#setup code
app = Flask(__name__)
app.secret_key = 'pagerduty'
oauth = OAuth()
facebook... | 122 | 23.5 | 74 | 17 | 801 | python | [{"finding_id": "codeql_py/flask-debug_163c4bcc9884427d_75c121de", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-601",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
122,
74,
79
] | [
null,
null,
null
] | [
2,
19,
18
] | [
48,
27,
26
] | |
2024-11-18T20:58:15.469707+00:00 | 1,522,668,668,000 | 7bc552639fd4db27ca670e68efab7239568e3661 | 2 | {
"blob_id": "7bc552639fd4db27ca670e68efab7239568e3661",
"branch_name": "refs/heads/master",
"committer_date": 1522668668000,
"content_id": "56589bb741b6c755e6cdfec4940124f943e35f0e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "88658a47b9238825dce23cb1b95bf0f16730ea23",
"extension": "py"... | 2.484375 | stackv2 | import os
import json
from glob import glob
import ftplib
import numpy as np
import random
import urllib.request
import tarfile
import re
import pandas as pd
SNIPS_URL = 'http://share.ipavlov.mipt.ru:8080/repository/datasets/ner/SNIPS2017.tar.gz'
def tokenize(s):
return re.findall(r"[\w']+|[‑–—“”€№…’\"#$%&\'()+... | 92 | 31.86 | 88 | 20 | 726 | python | [{"finding_id": "codeql_py/tarslip_c6c6db5cb4dab900_912e1c2f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
26
] | [
null
] | [
5
] | [
6
] | |
2024-11-18T20:58:19.746814+00:00 | 1,533,559,763,000 | 163ffc0e9c00192b4bbe89c395c3132ce67cc9d5 | 3 | {
"blob_id": "163ffc0e9c00192b4bbe89c395c3132ce67cc9d5",
"branch_name": "refs/heads/master",
"committer_date": 1533559763000,
"content_id": "614aa6139d23b14147154efec35f2d16e087f79f",
"detected_licenses": [
"MIT"
],
"directory_id": "e797aa4291d7cc8a7df3e4c9e376a2d0bcdbb81d",
"extension": "py",
"fi... | 2.703125 | stackv2 | from flask import Flask, render_template, make_response, request
import mysql.connector
import re
import json
app = Flask(__name__)
def edit_db(query, pattern):
settings = read_db_settings()
host_ = settings[0]["db"][0]["host"]
data_base = settings[0]["db"][0]["database"]
user_ = settings[0]["db"][0... | 71 | 24.69 | 108 | 16 | 461 | python | [{"finding_id": "codeql_py/flask-debug_9854b581f5139ce1_b8de4468", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-089"
] | [
"py/flask-debug",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This SQL query depends on a [user-provided value](1)."
] | [
71,
18
] | [
null,
null
] | [
5,
20
] | [
40,
25
] | |
2024-11-18T20:58:37.544936+00:00 | 1,693,602,075,000 | 335c7a986fd0d5fefd9b6927f1607380cd23ebe9 | 2 | {
"blob_id": "335c7a986fd0d5fefd9b6927f1607380cd23ebe9",
"branch_name": "refs/heads/master",
"committer_date": 1693602075000,
"content_id": "36124ea9d2b872acf231efdd5c238c4b13fd8008",
"detected_licenses": [
"MIT"
],
"directory_id": "eb09b371fa8564a2b2532118684f93af8e98d5fb",
"extension": "py",
"fi... | 2.4375 | stackv2 | import re
from elasticsearch_dsl import Q, Search
from core.exceptions import APIQueryParamsError
from core.utils import normalize_openalex_id
def is_openalex_id(openalex_id):
if not openalex_id:
return False
openalex_id = openalex_id.lower()
if re.findall(r"http[s]://openalex.org/([waicfvps]\d{... | 274 | 24.44 | 116 | 18 | 1,921 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_39d49414ee5dce6b_e7759956", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'issn.org/resource/issn/', so it mig... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'issn.org/resource/issn/', so it might match more hosts than expected."
] | [
200
] | [
null
] | [
11
] | [
49
] | |
2024-11-18T21:10:14.262659+00:00 | 1,411,354,483,000 | 03ec634c5fe336d4e22e33acbf8344b41dd2dce0 | 2 | {
"blob_id": "03ec634c5fe336d4e22e33acbf8344b41dd2dce0",
"branch_name": "refs/heads/master",
"committer_date": 1411354483000,
"content_id": "65304dc7fbb58271fbbaf514eff58b8b5f87263e",
"detected_licenses": [
"MIT"
],
"directory_id": "b170f508b5f69e64c3c3dfc9963e73d1d80e9edf",
"extension": "py",
"fi... | 2.484375 | stackv2 | # Copyright (c) 2013-2014 Molly White
#
# Permission is hereby granted, free of charge, to any person obtaining a copy of this software
# and associated documentation files (the "Software"), to deal in the Software without
# restriction, including without limitation the rights to use, copy, modify, merge, publish,
# di... | 313 | 41.96 | 99 | 18 | 2,724 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fe6de841135502d7_d2068d7a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw... | [
237
] | [
240
] | [
13
] | [
73
] | |
2024-11-18T21:10:56.554189+00:00 | 1,687,274,166,000 | d3acf1e656bc2cdbe82083f3bb9a4502b9ffb70b | 3 | {
"blob_id": "d3acf1e656bc2cdbe82083f3bb9a4502b9ffb70b",
"branch_name": "refs/heads/master",
"committer_date": 1687274166000,
"content_id": "93a123f4c1cb2a328231595146dd076840be24a8",
"detected_licenses": [
"MIT"
],
"directory_id": "18541e64203d962d5fb71b491b5ab7f7cb541b34",
"extension": "py",
"fi... | 2.6875 | stackv2 | import hashlib
import base64
from cryptography.hazmat.backends.openssl import backend
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.primitives.hmac import HMAC
def saslprep(string):
# TODO
return string
def ha1(username, realm, password):
return hashlib.md5(
":".joi... | 30 | 29.23 | 79 | 16 | 216 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_58d944d5f5a9100c_d1749652", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) t... | [
16,
30
] | [
null,
null
] | [
9,
24
] | [
65,
70
] | |
2024-11-18T21:11:02.449138+00:00 | 1,619,430,716,000 | 0b2e4e0835a7c04ec541e9e090429ff53646f007 | 2 | {
"blob_id": "0b2e4e0835a7c04ec541e9e090429ff53646f007",
"branch_name": "refs/heads/main",
"committer_date": 1619430716000,
"content_id": "14ac422a5fa22fafcdc0dbe95a82afffb5d7a4b0",
"detected_licenses": [
"MIT"
],
"directory_id": "1eeef30071d167a2b5b318da814074d71fa05b80",
"extension": "py",
"file... | 2.46875 | stackv2 | import requests, base64, configparser
def read_credentials_file():
config = configparser.ConfigParser()
config.read('credentials.ini')
result = {
'base_url': config['DEFAULT']['base_url'],
'username': config['DEFAULT']['username'],
'password': config['DEFAULT']['password'],
}
... | 145 | 36.53 | 150 | 17 | 1,320 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b17517284e8777e6_9b55e8f3", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
141
] | [
null
] | [
26
] | [
32
] | |
2024-11-18T21:11:03.713031+00:00 | 1,659,153,197,000 | 1c4d88cb18a42cf30719868eaa4775ba829cae76 | 3 | {
"blob_id": "1c4d88cb18a42cf30719868eaa4775ba829cae76",
"branch_name": "refs/heads/master",
"committer_date": 1659153197000,
"content_id": "8da2039bbf49512c5847897fcb57dc52692e1f96",
"detected_licenses": [
"MIT"
],
"directory_id": "636787168e151db48093e939a34ddd211c94c263",
"extension": "py",
"fi... | 2.625 | stackv2 | # sample code form https://shian420.pixnet.net/blog/post/350291572-%5Bpython%5D-logging-%E5%B9%AB%E4%BD%A0%E7%B4%80%E9%8C%84%E4%BB%BB%E4%BD%95%E8%A8%8A%E6%81%AF
from logs.logger import create_logger
import requests
requests.packages.urllib3.disable_warnings() # 關閉警告訊息
def main(logger):
url = "https://tw.yahoo.... | 24 | 38.08 | 160 | 11 | 326 | python | [{"finding_id": "codeql_py/request-without-cert-validation_6fa4ba9664003034_11a27ceb", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
10
] | [
null
] | [
15
] | [
63
] | |
2024-11-18T21:11:11.262243+00:00 | 1,440,941,663,000 | 296348f53c5e900e366641052d14374d7c06394d | 3 | {
"blob_id": "296348f53c5e900e366641052d14374d7c06394d",
"branch_name": "refs/heads/master",
"committer_date": 1440941663000,
"content_id": "1191de87254cf79d24fdfbce03b57a1e3b116b65",
"detected_licenses": [
"MIT"
],
"directory_id": "152e4cc19aed7b58975f7411a24849cec15cec6f",
"extension": "py",
"fi... | 2.765625 | stackv2 | """Utilities"""
from jinja2 import Template
def process(domain, record, context=None):
context = context or {}
context["domain"] = domain
for k, v in record.items():
if isinstance(v, (str, unicode,)):
t = Template(v)
record[k] = t.render(**context)
def preprocess(confi... | 20 | 23.2 | 52 | 13 | 106 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9a5ce46fb5baecf0_99ecd41a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
null
] | [
17
] | [
28
] | |
2024-11-18T21:11:16.385344+00:00 | 1,495,535,994,000 | 65492b8fb17df229d63d2855357e0b57765fa03b | 3 | {
"blob_id": "65492b8fb17df229d63d2855357e0b57765fa03b",
"branch_name": "refs/heads/master",
"committer_date": 1495535994000,
"content_id": "a10baa5ac620b1ac7343976c282d03f56a096958",
"detected_licenses": [
"MIT"
],
"directory_id": "98b27956f747f20011ad49eaf8f828de3a7f9fc9",
"extension": "py",
"fi... | 2.875 | stackv2 | import requests
import os
import jinja2
HEWEATHER_KEY = os.getenv("HEWEATHER_KEY")
WEATHER_FORECAST_API = 'https://free-api.heweather.com/v5/forecast?city={city}&key=' + HEWEATHER_KEY
WEATHER_API = 'https://free-api.heweather.com/v5/weather?city={city}&key=' + HEWEATHER_KEY
def fetch_weather_forecast(city):
resp... | 63 | 33.21 | 100 | 11 | 680 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d5bc2e69a13a819f_139c25fe", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25,
43
] | [
33,
51
] | [
20,
16
] | [
2,
2
] | |
2024-11-18T21:11:17.202905+00:00 | 1,613,907,031,000 | 501973c41036b55ed4d930893f554bfa89fc835d | 3 | {
"blob_id": "501973c41036b55ed4d930893f554bfa89fc835d",
"branch_name": "refs/heads/main",
"committer_date": 1613907031000,
"content_id": "6f6eebfa83853cb3c245510ea2da46cf41ec2e4c",
"detected_licenses": [
"MIT"
],
"directory_id": "f13dfcfc2536901b78539bacd8cb6b10b126e5e6",
"extension": "py",
"file... | 3.03125 | stackv2 | #!/usr/bin/env python
from jinja2 import Template
import os
def main():
template_dir = os.path.join(os.getcwd(), 'templates')
if not os.path.isdir(template_dir):
print(f'{template_dir} is not a directory!')
exit(1)
for filename in os.listdir(template_dir):
if filename.endswith('.... | 44 | 28.8 | 64 | 13 | 279 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_091298cc5890a2f1_94a04fb9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
27
] | [
null
] | [
20
] | [
50
] | |
2024-11-18T19:03:28.241765+00:00 | 1,495,377,697,000 | 128158d0c361b92b189a25a9b0ecb307fd4236b1 | 2 | {
"blob_id": "128158d0c361b92b189a25a9b0ecb307fd4236b1",
"branch_name": "refs/heads/master",
"committer_date": 1495377697000,
"content_id": "745d770304a96eda03e4e887e427a63ac7b8adf0",
"detected_licenses": [
"MIT"
],
"directory_id": "053be82313daf267d069b930f84583bb25f51fc5",
"extension": "py",
"fi... | 2.328125 | stackv2 | # coding: utf-8
import re
def media_1280_extender(pipeline_index,
finder_image_urls,
extender_image_urls=[],
*args, **kwargs):
"""
Example:
http://25.media.tumblr.com/3f5f10d7216f1dd5eacb5eb3e302286a/tumblr_mtpcwdzKBT1qh9n5lo1_250.pn... | 58 | 31.43 | 99 | 15 | 584 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_faea05173e756364_65f03c4c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [media.tumblr.com/](1) may be at an arbitrary position ... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [media.tumblr.com/](1) may be at an arbitrary position in the sanitized URL.",
"The string [media.tumblr.com/](1) may be at an arbitrary position in the sanitized URL."
] | [
23,
50
] | [
null,
null
] | [
12,
12
] | [
52,
52
] | |
2024-11-18T19:03:29.584035+00:00 | 1,553,245,889,000 | 342e751678c06543400ffa3fe3d155171014dfd9 | 3 | {
"blob_id": "342e751678c06543400ffa3fe3d155171014dfd9",
"branch_name": "refs/heads/master",
"committer_date": 1553245889000,
"content_id": "467f45b0dcff3b24075630a6379b5a235fbde762",
"detected_licenses": [
"MIT"
],
"directory_id": "cd34f6cc5e2168718d50513f4e1d356e063c9ff0",
"extension": "py",
"fi... | 2.640625 | stackv2 | import os
import re
from botocore.vendored import requests
from core.providers.base import MusicProvider
YOUTUBE_API_KEY = os.environ.get('YOUTUBE_API_KEY')
class YouTube(MusicProvider):
NAME = 'YouTube'
_ID_REGEX = re.compile(r'\?.*v=([\w]+)')
_MUSIC_URL = 'https://youtube.com/watch?v={}'
def get... | 83 | 31.02 | 118 | 20 | 613 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fc18db0d9563f8ee_75fa614e", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com](1) may be at an arbitrary position in the... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [youtube.com](1) may be at an arbitrary position in the sanitized URL."
] | [
80
] | [
null
] | [
12
] | [
32
] | |
2024-11-18T19:03:30.990751+00:00 | 1,689,760,555,000 | 32646cb7a70f027434726f86d7c36a59e4814eb1 | 3 | {
"blob_id": "32646cb7a70f027434726f86d7c36a59e4814eb1",
"branch_name": "refs/heads/main",
"committer_date": 1689760555000,
"content_id": "2472729fa8f88e50a040b2902a17ecca7c3f22b3",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "4ec55079d3632b2699c6a28e0481798561432bc5",
"extension": "py"... | 2.5625 | stackv2 | #!/usr/bin/env python3
"""
Resources
=========
The following constitutes the base-logic of CIJOE:
* cijoe.core.command (Cijoe)
* cijoe.core.transport (Transport, Local, SSH)
* cijoe.core.misc (As the name suggests; various helper-functions)
* cijoe.cli (Command-Line Tool and utilization of... | 522 | 27.93 | 88 | 18 | 3,228 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fc84caebe96074c1_ea87eddf", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
107
] | [
null
] | [
17
] | [
69
] | |
2024-11-18T19:28:36.984471+00:00 | 1,576,737,763,000 | f5115572374e61eec3caf2c1978b953fdfc92d53 | 3 | {
"blob_id": "f5115572374e61eec3caf2c1978b953fdfc92d53",
"branch_name": "refs/heads/master",
"committer_date": 1576737763000,
"content_id": "f810ba8dd6e93b91c72531b2b2a8b6a36191d986",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8ff6b10cf27c3572a49627eb75e3b798cbf0866a",
"extension": "py"... | 2.78125 | stackv2 |
import os, sys
from random import shuffle
import argparse
import json
from time import time
def get_args():
parser = argparse.ArgumentParser(description='Arguments', formatter_class = argparse.ArgumentDefaultsHelpFormatter)
parser.add_argument('-f', '--file',
required=False,
... | 134 | 38.42 | 119 | 19 | 1,216 | python | [{"finding_id": "codeql_py/overly-permissive-file_92ee6f0345a5d16e_6d92c6d2", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world writable.", "remediation": "", "location": {... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in open sets file to world writable.",
"Overly permissive mask in open sets file to world writable."
] | [
56,
77
] | [
null,
null
] | [
13,
13
] | [
64,
51
] | |
2024-11-18T19:28:56.905261+00:00 | 1,548,057,285,000 | 0b2a360f6a96c2df5d767c96d34d4c6507f96661 | 3 | {
"blob_id": "0b2a360f6a96c2df5d767c96d34d4c6507f96661",
"branch_name": "refs/heads/master",
"committer_date": 1548057285000,
"content_id": "d8fe49bd04618433c1b22edd536accfe2d9ce45b",
"detected_licenses": [
"MIT"
],
"directory_id": "2719d4cb1d1f9c754bf689066c7cc8c9e80284bc",
"extension": "py",
"fi... | 2.6875 | stackv2 | from statistics import mean
from jinja2 import Environment, FileSystemLoader
from .singleton import SITES
I18NS = {
'zh-cn': {
'navbar.winter_season': '一月番剧',
'navbar.spring_season': '四月番剧',
'navbar.summer_season': '七月番剧',
'navbar.fall_season': '十月番剧',
'row.average': '平均',... | 156 | 31.83 | 77 | 20 | 1,130 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_89be4d79bf3e7d93_9fdf0b69", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
43
] | [
null
] | [
20
] | [
67
] | |
2024-11-18T19:39:55.282577+00:00 | 1,574,157,126,000 | 02305c1dadec19b26d5d823a8adb32941aac4f37 | 3 | {
"blob_id": "02305c1dadec19b26d5d823a8adb32941aac4f37",
"branch_name": "refs/heads/master",
"committer_date": 1574157126000,
"content_id": "e2a5b303427c36f4c0c798cd33e5c0264a9fa2cf",
"detected_licenses": [
"MIT"
],
"directory_id": "32325ff1595da47948b416ecfac6a4c13b2d6664",
"extension": "py",
"fi... | 2.640625 | stackv2 | # django-salesforce
"""
A set of tools to deal with Salesforce actions that
cannot or can hardly be implemented using the generic
relational database abstraction.
The Salesforce REST API is missing a few endpoints that
are available in the SOAP API. We are using `beatbox` as
a workaround for those specific actions (s... | 59 | 32.83 | 94 | 13 | 448 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_54cdbf0232796051_4706f7f7", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [test.salesforce.com](1) may be at an arbitrary positio... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [test.salesforce.com](1) may be at an arbitrary position in the sanitized URL."
] | [
47
] | [
null
] | [
8
] | [
54
] | |
2024-11-18T20:18:10.697257+00:00 | 1,618,246,180,000 | 7da42754e0c9bfb1109b9a3b4855610b8c159914 | 2 | {
"blob_id": "7da42754e0c9bfb1109b9a3b4855610b8c159914",
"branch_name": "refs/heads/main",
"committer_date": 1618246180000,
"content_id": "463017c7a63d266d6a1639c9a4a7d90d92e2e59c",
"detected_licenses": [
"MIT"
],
"directory_id": "ac4ae285eca536300fedce235f1cf374eeb6e3ad",
"extension": "py",
"file... | 2.484375 | stackv2 | import io
import traceback
import subprocess
import contextlib
from flask import Flask, request
app = Flask(__name__)
@app.route("/api/v1/execute/batch", methods=["POST"])
def execute_batch():
json_data = request.json
if json_data is None:
return {
"error": "We expect json with a `code` ... | 73 | 21.26 | 62 | 13 | 381 | python | [{"finding_id": "codeql_py/command-line-injection_4a77b8191e20bb8e_d4fd9167", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 4 | true | [
"CWE-078",
"CWE-209",
"CWE-209",
"CWE-094"
] | [
"py/command-line-injection",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/code-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This code execution depends on a [user-provided value](1)."... | [
27,
29,
59,
56
] | [
null,
31,
63,
null
] | [
39,
16,
16,
24
] | [
43,
10,
10,
28
] | |
2024-11-18T20:18:42.857119+00:00 | 1,619,894,431,000 | eff830408743db54e4c7352496d4106e447ac32f | 2 | {
"blob_id": "eff830408743db54e4c7352496d4106e447ac32f",
"branch_name": "refs/heads/master",
"committer_date": 1619894431000,
"content_id": "0dd028359e36e5f98d536f0b5a038d8e5f15820b",
"detected_licenses": [
"MIT"
],
"directory_id": "80fa4db91369dd83f68aeff802e8cc0e73bd00e8",
"extension": "py",
"fi... | 2.46875 | stackv2 | from fastapi import FastAPI, Form, Request
import sqlite3
from fastapi.templating import Jinja2Templates
import os
app = FastAPI()
templates = Jinja2Templates(directory="templates")
# delete db if exists
try:
os.remove("db.sqlite3")
except FileNotFoundError:
pass
with open("flag.txt") as f:
flag = f.rea... | 51 | 27.78 | 124 | 13 | 384 | python | [{"finding_id": "codeql_py/sql-injection_369f42339e58f714_385f4aba", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2)."... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2)."
] | [
41
] | [
null
] | [
25
] | [
34
] | |
2024-11-18T20:18:57.564234+00:00 | 1,417,096,503,000 | 6dea75dafcd9b740c7a407856dd6fc1ab7b88929 | 3 | {
"blob_id": "6dea75dafcd9b740c7a407856dd6fc1ab7b88929",
"branch_name": "refs/heads/master",
"committer_date": 1417096503000,
"content_id": "853db6ed9b2edaba0c8f8cd598b70e313e7ba7d3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "346d6e2308e5bdc03aa46915810ee454b76cadd4",
"extension": "py"... | 2.5625 | stackv2 | import hashlib
import requests
import collections
import json
class SmsManager():
def __init__(self, pub_key, secret_key, version="3.0"):
self.pub_key = pub_key
self.secret_key = secret_key
self.version = version
def __get_hashsum(self, **kwargs):
m = hashlib.md5()
m.u... | 67 | 45.06 | 115 | 22 | 668 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1ac5942772527321_06c8542e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
16
] | [
null
] | [
13
] | [
116
] | |
2024-11-18T20:29:56.013123+00:00 | 1,520,398,364,000 | 6010f0168b2bcc592e8919b6639020d77f20cc80 | 3 | {
"blob_id": "6010f0168b2bcc592e8919b6639020d77f20cc80",
"branch_name": "refs/heads/master",
"committer_date": 1520398364000,
"content_id": "5a85dcd34d0135b81a61e116172ca18aa7ca3e48",
"detected_licenses": [
"MIT"
],
"directory_id": "f41956e588c875f197922041e0bc4946e510e39f",
"extension": "py",
"fi... | 3.09375 | stackv2 | # -*- coding: utf-8 -*-
"""Updater is the package responsible for get new values from an
external API and refresh the local file with updated financial
indexes and currency pricing."""
from requests import get
from os import environ
from pandas import DataFrame
from time import time, sleep
import schedule
def get... | 69 | 27.07 | 73 | 10 | 469 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ee3bdc7375370a54_8cf892ca", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
30
] | [
null
] | [
11
] | [
12
] | |
2024-11-18T19:07:26.344831+00:00 | 1,629,061,172,000 | de405a74f73cbb6591413047dfff53c1abd4a625 | 3 | {
"blob_id": "de405a74f73cbb6591413047dfff53c1abd4a625",
"branch_name": "refs/heads/master",
"committer_date": 1629061172000,
"content_id": "c0585cace11787e0a368f42ade7245bed02feca8",
"detected_licenses": [
"MIT"
],
"directory_id": "ecfaacc8843a084a3f6edf7e5c482b7a78a5d85c",
"extension": "py",
"fi... | 3.421875 | stackv2 | """Query Wikidata for Belgian monarchs"""
from datetime import datetime as dt
from os import system, name
from SPARQLWrapper import SPARQLWrapper, JSON
def clear_terminal():
# for windows
if name == 'nt':
_ = system('cls')
# for mac and linux
else:
_ = system('clear')
def picker(cho... | 139 | 28.53 | 85 | 15 | 1,036 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_03b6c72c0af0bcec_71c346b7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
90,
120
] | [
91,
124
] | [
13,
9
] | [
50,
15
] | |
2024-11-18T19:18:41.917303+00:00 | 1,692,307,499,000 | 65edb2d85cfacc76f5258bf46789933fc369ee16 | 3 | {
"blob_id": "65edb2d85cfacc76f5258bf46789933fc369ee16",
"branch_name": "refs/heads/master",
"committer_date": 1692307499000,
"content_id": "8ddd34c4ec44c7211a4407a7b3daffc4ccc70494",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2ae0b8d95d439ccfd55ea7933ad4a2994ad0f6c5",
"extension": "py"... | 3.3125 | stackv2 | from jinja2 import Template
from os import path, remove
from shutil import rmtree
def create_content(template: str, notebooks_data: dict, file_name: str):
"""Filling rst template with data
:param template: jinja template that will be filled with notebook data
:type template: str
:param notebooks_data... | 88 | 29.44 | 90 | 17 | 653 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8549a568d9354c30_aaeb715d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
19
] | [
null
] | [
16
] | [
34
] | |
2024-11-18T19:18:53.730577+00:00 | 1,629,570,200,000 | ea6525aef81e82e9672fd60072c277f7b2cf8ba2 | 3 | {
"blob_id": "ea6525aef81e82e9672fd60072c277f7b2cf8ba2",
"branch_name": "refs/heads/main",
"committer_date": 1629570200000,
"content_id": "1bbc046066c0cbc384caf9e6d59d4fbcee29e11e",
"detected_licenses": [
"MIT"
],
"directory_id": "402203e5951a4bbf4b6f272cf86b064bef2dff91",
"extension": "py",
"file... | 2.671875 | stackv2 | from flask import Flask, render_template, request
import json
import urllib.request
app = Flask(__name__)
@app.route('/', methods = ["POST", "GET"])
def weather():
if request.method == 'POST':
city = request.form['city']
else:
city = 'mathura'
api_key = "ab210ddf92d4f60081d9f986f6d... | 36 | 26.69 | 122 | 16 | 265 | python | [{"finding_id": "codeql_py/flask-debug_d2ee2f1a23771345_ec388105", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
36,
20
] | [
null,
null
] | [
5,
14
] | [
24,
116
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.