added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T03:12:26.793803+00:00 | 1,525,691,909,000 | b862c29bd44a6bae61b69c2d98eed4da02187395 | 3 | {
"blob_id": "b862c29bd44a6bae61b69c2d98eed4da02187395",
"branch_name": "refs/heads/master",
"committer_date": 1525691909000,
"content_id": "6491d5f0d20b049462d28160d874776756459c5a",
"detected_licenses": [
"MIT"
],
"directory_id": "329c00c2699f4fa3459d077c4000eeef41e86f4b",
"extension": "py",
"fi... | 2.5625 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
import random
import string
import re
import time
import requests
import proxy
# this is a simple example
import logging
# define the log file, file mode and logging level
logging.basicConfig(filename='example.log', filemode="a", level=logging.DEBUG)
max_num = 51;
url = 'http... | 96 | 27.44 | 94 | 12 | 761 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_3508c7e6acdf78a2_ae45d62c", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'processon.com/signup/verification/'... | 2 | true | [
"CWE-020",
"CWE-312"
] | [
"py/incomplete-hostname-regexp",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'processon.com/signup/verification/', so it might match more hosts than expected.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
71,
48
] | [
null,
null
] | [
11,
11
] | [
60,
65
] | |
2024-11-19T03:12:33.697504+00:00 | 1,403,431,831,000 | 4154e19cf9d27d534ca8cecb946cbdfb46e16397 | 2 | {
"blob_id": "4154e19cf9d27d534ca8cecb946cbdfb46e16397",
"branch_name": "refs/heads/master",
"committer_date": 1403431831000,
"content_id": "c1e42e97f3cc1eb584a231b860ea89fca11e8204",
"detected_licenses": [
"MIT"
],
"directory_id": "4e268d4a1810f9ad997f3effff775137328a2210",
"extension": "py",
"fi... | 2.484375 | stackv2 | # -*- coding: utf-8 -*-
"""
File handling utils
"""
import cmd
from datetime import datetime
import getpass
import locale
import os
import pkg_resources
import shlex
import shutil
import io
import sys
import time
import traceback
import urllib
import zipfile
from concurrent.core.util.texttransforms import _, printerr,... | 191 | 34.52 | 99 | 18 | 1,570 | python | [{"finding_id": "codeql_py/overly-permissive-file_ac56edc555327ab9_bc875d23", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world writable.", "remediation": "", "location": {... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in open sets file to world writable."
] | [
59
] | [
null
] | [
36
] | [
63
] | |
2024-11-19T03:12:42.701577+00:00 | 1,354,095,425,000 | 0c2677f9887ac26a46c2493e419b849ba230da67 | 3 | {
"blob_id": "0c2677f9887ac26a46c2493e419b849ba230da67",
"branch_name": "refs/heads/master",
"committer_date": 1354095425000,
"content_id": "707e2cad5c54f99a41f702c70949e3902df58a9f",
"detected_licenses": [
"MIT"
],
"directory_id": "8144ee25f69e0954039fec5aa9dc7518871d94ed",
"extension": "py",
"fi... | 2.546875 | stackv2 | import bcrypt
from flask import (current_app, escape, flash, redirect, render_template,
request, url_for)
from flask.ext.login import current_user, logout_user, login_user
from pymongo.errors import DuplicateKeyError
from location.auth import auth
from location.auth.models import User
@auth.route('/login', method... | 64 | 39.86 | 86 | 19 | 533 | python | [{"finding_id": "codeql_py/url-redirection_94eaf9f5d4928b93_8caa2f46", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
25
] | [
null
] | [
33
] | [
80
] | |
2024-11-19T03:12:52.441288+00:00 | 1,453,746,650,000 | 82178566b366f09d9f01f7c5011842f147b8d97a | 2 | {
"blob_id": "82178566b366f09d9f01f7c5011842f147b8d97a",
"branch_name": "refs/heads/master",
"committer_date": 1453746650000,
"content_id": "fb0ab96e52430e22ef28610f2a2f19f8a346d27c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cb5ebc38ad32a11cabe045e6f375eae2ebe92106",
"extension": "py"... | 2.40625 | stackv2 | #!/usr/bin/env python
#
# A FusionReactor Nagios check script
#
# https://github.com/aparnachaudhary/nagios-plugin-jbossas7 is used as a reference for this.
#
# Main Author
# - Christoph Witzany <christoph@web.crofting.com>
# Version: 0.1
# Github URL: https://github.com/doublemalt/nagios-plugin-fusionreactor
#
# ... | 343 | 26.47 | 143 | 14 | 2,382 | python | [{"finding_id": "codeql_py/redos_cee0671df70fea73_a21c3716", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '/'.", "remediati... | 2 | true | [
"CWE-1333",
"CWE-327"
] | [
"py/redos",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '/'.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password... | [
272,
168
] | [
null,
null
] | [
30,
21
] | [
32,
41
] | |
2024-11-19T03:25:29.932917+00:00 | 1,630,504,710,000 | b98f34d15a0ff8e6436feb60d43da6a9d7f8a2f4 | 2 | {
"blob_id": "b98f34d15a0ff8e6436feb60d43da6a9d7f8a2f4",
"branch_name": "refs/heads/master",
"committer_date": 1630504710000,
"content_id": "b5393a5990d2e915fab2bdcd3a19cf50a1fb8502",
"detected_licenses": [
"MIT"
],
"directory_id": "e5590ad1cbbb73ead8af88cf33a71c49f964ef8f",
"extension": "py",
"fi... | 2.375 | stackv2 | import os
import zipfile
from pathlib import Path
import warnings
from shutil import rmtree
import time
import pandas as pd
import numpy as np
import SimpleITK as sitk
from tqdm import tqdm
from segmentation_metrics import compute_segmentation_scores
from survival_metrics import concordance_index
class AIcrowdEvalu... | 270 | 40.63 | 105 | 19 | 2,366 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eedc289ec398ddba_66983618", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
254,
270
] | [
null,
null
] | [
15,
15
] | [
55,
55
] | |
2024-11-19T03:25:40.768292+00:00 | 1,605,505,275,000 | 37450c1819731a5b07d8739d590bd06db26bcaa8 | 3 | {
"blob_id": "37450c1819731a5b07d8739d590bd06db26bcaa8",
"branch_name": "refs/heads/master",
"committer_date": 1605505275000,
"content_id": "66981c756464cb87cc06b2bd968d30ec9129f656",
"detected_licenses": [
"MIT"
],
"directory_id": "f39ba4801aa370007b0b05c08974475472fb1954",
"extension": "py",
"fi... | 3.28125 | stackv2 | #!/usr/bin/env python3.6
from user import User
from credential import Credential
import random
def create_user(user_name):
'''
Function to create a new user
'''
new_user = User(user_name)
return new_user
def create_credential(password):
'''
Function to create a new credential
'''
ne... | 149 | 23.57 | 148 | 19 | 744 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0a57ab124787c291_43eaa07d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
99,
117,
129
] | [
null,
null,
null
] | [
19,
19,
27
] | [
68,
65,
51
] | |
2024-11-19T03:35:43.513917+00:00 | 1,668,662,208,000 | bba21e68c30c150256ffb4f9e923efdeb43079ed | 3 | {
"blob_id": "bba21e68c30c150256ffb4f9e923efdeb43079ed",
"branch_name": "refs/heads/master",
"committer_date": 1668662208000,
"content_id": "706122a090e472ba11b332608aed9173e1fe8568",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "228456eccf1eb0bd832cdd8bbc8116cae8432ff6",
"extension": "py"... | 2.515625 | stackv2 | from flask import make_response, jsonify, request
import socket
from random import randint
from bson import ObjectId
from database import DB
import re
import boto3
from botocore.exceptions import ClientError
import random, string
import apis.utils.constants as CONST
import logging
from datetime import datetime, date, t... | 172 | 28.78 | 129 | 16 | 1,330 | python | [{"finding_id": "codeql_py/redos_acab75058536e808_41f0fadb", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetition... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetitions of 'a'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'a@a' and containing many repetitions of 'a'."
] | [
119,
119
] | [
null,
null
] | [
25,
41
] | [
28,
44
] | |
2024-11-19T03:35:54.169355+00:00 | 1,461,695,098,000 | 226627f519832c438036d839edcd81bb24886ac7 | 3 | {
"blob_id": "226627f519832c438036d839edcd81bb24886ac7",
"branch_name": "refs/heads/master",
"committer_date": 1461695098000,
"content_id": "249b37fa7177891b52e5d87b1eb2b6f454721f78",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "b3a090e008f8928ed74b77996c7bf9379f58d083",
"extension": "p... | 2.875 | stackv2 | """Guardian Search web application
A small, simple web application which allows a user to search for
articles on the Guardian's website (http://www.guardian.co.uk) using
simple queries.
The aim of this project is primarily to learn about the Guardian's
Open Platform Content API (http://www.guardian.co.uk/open-platfor... | 134 | 33.36 | 79 | 17 | 962 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0757f96c2dcbb917_aa31a7e3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
24
] | [
25
] | [
21
] | [
63
] | |
2024-11-19T01:28:53.585942+00:00 | 1,621,584,733,000 | 3576fcf05e7c530b4043cd98345ecac2d26450ec | 4 | {
"blob_id": "3576fcf05e7c530b4043cd98345ecac2d26450ec",
"branch_name": "refs/heads/master",
"committer_date": 1621584733000,
"content_id": "28e191eb6966e0af898b1429e01b7614a27344a5",
"detected_licenses": [
"MIT"
],
"directory_id": "f4a554440e3c382375ad8eeabcee6aaadb3113ba",
"extension": "py",
"fi... | 3.59375 | stackv2 | import hashlib
import json
import user_login
with open('userinfo_files/userinfo.json', 'r') as file:
user_info = json.load(file)
def check_user(fullname):
for key in user_info.keys():
if fullname == key:
return True
def create_pass():
y_pass = input('''Note that your password must b... | 87 | 28.69 | 107 | 16 | 564 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_9992c4c09a4f95bf_7fb8d468", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
46
] | [
null
] | [
29
] | [
46
] | |
2024-11-19T01:29:15.341901+00:00 | 1,632,078,539,000 | 41a48ccc73870840c95d2a4b099b381cecd47913 | 3 | {
"blob_id": "41a48ccc73870840c95d2a4b099b381cecd47913",
"branch_name": "refs/heads/main",
"committer_date": 1632078539000,
"content_id": "10724f7791b742389a3e9da9f3d17ff8bb608209",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "50969dc5360b0a616d5524e32eab8e560194d2ed",
"extension": "py",
... | 2.578125 | stackv2 | import base64
from datetime import datetime
import io
import json
from zipfile import ZipFile
import pandas as pd
import time
import os
from dash.dependencies import Input, Output, State
from dash.exceptions import PreventUpdate
from app import app
def parse_google_files():
"""
Parse the ZIP file uploaded i... | 295 | 53.77 | 119 | 29 | 3,029 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b9fa0ddb63f9d7e2_add9dccd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
266
] | [
null
] | [
23
] | [
35
] | |
2024-11-19T01:29:18.694182+00:00 | 1,592,323,468,000 | e907c21a50262a1ef0060e7444e5fb57ef03d209 | 2 | {
"blob_id": "e907c21a50262a1ef0060e7444e5fb57ef03d209",
"branch_name": "refs/heads/master",
"committer_date": 1592323468000,
"content_id": "88c531512611937dd8eb0eb19a8b90a8931090a5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6d377d36391289374af4127dee2ee9a40e4a3f99",
"extension": "py"... | 2.328125 | stackv2 | from django.shortcuts import render,redirect,reverse
from django.http import HttpResponse
from django.contrib.auth import login,logout,authenticate
from django.contrib.auth.decorators import login_required
from django.views.decorators.http import require_POST
from .forms import LoginForm,RegisterForm
from utils import ... | 86 | 32.2 | 96 | 18 | 683 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3495bcb6e21d5b19_f3c1402f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
47,
47
] | [
null,
null
] | [
15,
34
] | [
24,
42
] | |
2024-11-19T01:30:06.858785+00:00 | 1,566,364,083,000 | 9e6e7a4844cc6a6c70a23c1aec967584ee59f448 | 2 | {
"blob_id": "9e6e7a4844cc6a6c70a23c1aec967584ee59f448",
"branch_name": "refs/heads/master",
"committer_date": 1566364083000,
"content_id": "b3d2217a97739fbfc3b71f6bb88e111f8fffda05",
"detected_licenses": [
"MIT"
],
"directory_id": "9a2279d073952004e6f607065756fe3a2546b0c7",
"extension": "py",
"fi... | 2.34375 | stackv2 | """connectionlist api
"""
import json
import logging.handlers
from rest_framework.response import Response
from rest_framework.views import APIView, status
from webapp.libs.authorization import ValidationUser, ValidateUserRole
from webapp.libs.for_embest import ForEmbest
from webapp.libs.for_whitewalker import ForWhi... | 227 | 36.26 | 117 | 19 | 1,671 | python | [{"finding_id": "codeql_py/log-injection_3b085b50011bae9a_52bb76b6", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
156,
161
] | [
157,
162
] | [
30,
26
] | [
77,
77
] | |
2024-11-19T01:30:11.359645+00:00 | 1,497,993,423,000 | 7b1fa703843910074a767cbd5c650186b9272b39 | 2 | {
"blob_id": "7b1fa703843910074a767cbd5c650186b9272b39",
"branch_name": "refs/heads/master",
"committer_date": 1497993423000,
"content_id": "f194901bdf377fde6d301bd941765eae77c63266",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7dbf3ca19acce6a2c8992e5dc78bf19ebb158f64",
"extension": "py"... | 2.328125 | stackv2 | #!/usr/bin/env python
from __future__ import print_function
from future.standard_library import install_aliases
install_aliases()
from urllib.parse import urlparse, urlencode
from urllib.request import urlopen, Request
from urllib.error import HTTPError
import json
import os
from flask import Flask
from flask impor... | 128 | 28.84 | 109 | 19 | 994 | python | [{"finding_id": "codeql_py/partial-ssrf_3685e89516ceaab5_daae4449", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
46
] | [
null
] | [
14
] | [
30
] | |
2024-11-19T01:30:38.520631+00:00 | 1,617,679,834,000 | 285c92bebbe178b375b75df2b7e5292117ff1585 | 2 | {
"blob_id": "285c92bebbe178b375b75df2b7e5292117ff1585",
"branch_name": "refs/heads/master",
"committer_date": 1617679834000,
"content_id": "c24a9bb7c19202f2888490da488d0db22dac07df",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fc8f4489a5b579da110847ab6a7aca42fbcc3e0d",
"extension": "py"... | 2.375 | stackv2 | from os import path
from jinja2 import Environment
from jinja2.loaders import FileSystemLoader
root_folder_path = path.dirname(path.dirname(__file__))
def generate_sitemap(pages):
non_static_urls = []
for url, type in pages:
if type is None:
continue
is_page = type.startswith(... | 35 | 28.03 | 88 | 14 | 225 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_899f92a75b88fc31_b0f8521c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
30
] | [
null
] | [
11
] | [
89
] | |
2024-11-19T01:55:18.509982+00:00 | 1,463,117,012,000 | 2fa11ba01e7ca456ecd4ba9bbe49215255796e15 | 2 | {
"blob_id": "2fa11ba01e7ca456ecd4ba9bbe49215255796e15",
"branch_name": "refs/heads/master",
"committer_date": 1463117012000,
"content_id": "ad450d16878684cbd29874d65b3bb06a3f230c4d",
"detected_licenses": [
"MIT"
],
"directory_id": "a992cf9c3d52d3e01865918762a29d18719c7a5c",
"extension": "py",
"fi... | 2.375 | stackv2 | """
flask_interface/app.py
Contains the views and url mappings for the web application.
"""
import json
import os
from flask import Flask, render_template, redirect, make_response, jsonify, session
from flask import request
from CardsAgainstGame.GameHandler import Game, SUBMISSION_STATE, JUDGING_STATE
from functools i... | 308 | 26.89 | 134 | 18 | 1,894 | python | [{"finding_id": "codeql_py/insecure-cookie_8568288584cfccdd_40287b57", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"... | 7 | true | [
"CWE-614",
"CWE-614",
"CWE-614",
"CWE-020",
"CWE-1004",
"CWE-1004",
"CWE-1004"
] | [
"py/insecure-cookie",
"py/insecure-cookie",
"py/insecure-cookie",
"py/cookie-injection",
"py/client-exposed-cookie",
"py/client-exposed-cookie",
"py/client-exposed-cookie"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cookie is added to response without the 'secure' flag being set.",
"Cookie is added to response without the 'secure' flag being set.",
"Cookie is added to response without the 'secure' flag being set.",
"Cookie is constructed from a [user-supplied input](1).",
"Sensitive server cookie is set without HttpOn... | [
125,
153,
272,
153,
125,
153,
272
] | [
null,
null,
null,
null,
null,
null,
null
] | [
13,
13,
9,
45,
13,
13,
9
] | [
59,
71,
48,
53,
59,
71,
48
] | |
2024-11-19T01:55:31.954415+00:00 | 1,615,047,509,000 | 6b83d3bb3e1661c7a6406736c42b3a749b993b27 | 2 | {
"blob_id": "6b83d3bb3e1661c7a6406736c42b3a749b993b27",
"branch_name": "refs/heads/main",
"committer_date": 1615047509000,
"content_id": "cf0e9fd0d7bca93ada6ace48b81b15338830c2c9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8554b56092d6d8097c48db74264f402848da753b",
"extension": "py",
... | 2.40625 | stackv2 | import requests
import json
import urllib3
import os
import argparse
from datetime import datetime
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
class VRopsClient:
headers = {"Accept": "application/json", "Content-Type": "application/json"}
url_base = ""
token = ""
def __init_... | 91 | 38.68 | 119 | 19 | 785 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f7a25d6c54d677c2_31c28ad9", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
22,
36,
47
] | [
25,
38,
49
] | [
22,
22,
16
] | [
49,
71,
44
] | |
2024-11-19T02:07:23.162672+00:00 | 1,628,326,795,000 | 662c07e4cb016eb4eda391e3736848a039f65486 | 3 | {
"blob_id": "662c07e4cb016eb4eda391e3736848a039f65486",
"branch_name": "refs/heads/master",
"committer_date": 1628326795000,
"content_id": "7acd197e1020ed134bc0bfbc96b9c34c3a1c4090",
"detected_licenses": [
"MIT"
],
"directory_id": "af7cc1544efb268e7f48c8ce4378a817e296550f",
"extension": "py",
"fi... | 3.46875 | stackv2 | import hashlib
################################################################################
# Class: User
# Author: Duc Anh
# Last modified: 29 May 2021
################################################################################
class User:
'''
This class is used mainly to create t... | 114 | 29.61 | 129 | 14 | 723 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_4232a1aac7677767_8c804203", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
74
] | [
null
] | [
44
] | [
61
] | |
2024-11-19T02:31:28.885309+00:00 | 1,515,712,262,000 | 40875d96f3555e930629d90afce2a91a123a4d52 | 2 | {
"blob_id": "40875d96f3555e930629d90afce2a91a123a4d52",
"branch_name": "refs/heads/master",
"committer_date": 1515712262000,
"content_id": "5d113a5168205563daa91feea735d2e419094d58",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6cf08b4bf8c58acdfdef411915ae355626209c46",
"extension": "py"... | 2.375 | stackv2 | import base64
import requests
from flask_login import UserMixin
from flask_wtf import Form
from wtforms import StringField, PasswordField
from wtforms.validators import DataRequired
from kconfig import settings
__author__ = "Manuel Escriche <mev@tid.es>"
class User(UserMixin):
__data__ = dict()
def __init__... | 90 | 29.2 | 108 | 13 | 610 | python | [{"finding_id": "codeql_py/request-without-cert-validation_da13c90f0b7c7628_f3dc07a1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
69
] | [
null
] | [
22
] | [
83
] | |
2024-11-19T02:31:41.611524+00:00 | 1,378,229,036,000 | 38b2db2da3dfbfa1a17edc74c908e28a1f6b69c5 | 3 | {
"blob_id": "38b2db2da3dfbfa1a17edc74c908e28a1f6b69c5",
"branch_name": "refs/heads/master",
"committer_date": 1378229036000,
"content_id": "42b89b32c4cd423338d0a864cbb2400b4b7a1ae5",
"detected_licenses": [
"MIT"
],
"directory_id": "a09ff1936124cb6f5f1cb6ba6ddbb33e242ab839",
"extension": "py",
"fi... | 3.015625 | stackv2 | #!/usr/bin/python2.7
'''A script for gathering BlueArc NFS shares mounted on servers. It takes one
mandatory parameter, the BlueArc site location (either LAXHQ or SEA), and one
optional paramater, how many threads to use. Results are returned in
txt format.
'''
import argparse
import MySQLdb
import paramiko
from Queue... | 142 | 32.49 | 107 | 17 | 1,133 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_dbf8dec0afe5d711_412241e7", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
24
] | [
null
] | [
9
] | [
71
] | |
2024-11-19T02:32:00.152841+00:00 | 1,582,456,797,000 | 7233fb82e01072336762d2a76564656e753bea77 | 3 | {
"blob_id": "7233fb82e01072336762d2a76564656e753bea77",
"branch_name": "refs/heads/master",
"committer_date": 1582456797000,
"content_id": "727b234ec1e5ed3649ef0f6e127988557343ae26",
"detected_licenses": [
"MIT"
],
"directory_id": "3f1a670abd54e0cedad91fcf7ba22041aa1c7fee",
"extension": "py",
"fi... | 2.59375 | stackv2 | #!./bin/python3
# -*- coding: ascii -*-
#import
import sys
import openpyxl
#get_column_letter
#column_index_from_string
import paramiko
import scp
import datetime
import base64
excelsheetpath = ""
excelsheet = None
sheets = {}
nodeinfo = {}
ipinfo = {}
def getWorkBookFile():
print("IPCheck started....")
print("... | 293 | 30.9 | 170 | 22 | 2,759 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_56980862070e462d_a00bfcea", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
160
] | [
null
] | [
2
] | [
65
] | |
2024-11-19T02:32:09.669218+00:00 | 1,513,176,118,000 | 9265c9a5b121642a452fe2a5335c65b1003e77d6 | 3 | {
"blob_id": "9265c9a5b121642a452fe2a5335c65b1003e77d6",
"branch_name": "refs/heads/master",
"committer_date": 1513176118000,
"content_id": "a6a074ab3cf13553283f24c0bcf88f9dbc5cfa0b",
"detected_licenses": [
"MIT"
],
"directory_id": "7cbb185731e53759b4af0db3f919253baf0b127d",
"extension": "py",
"fi... | 2.6875 | stackv2 | from multiprocessing.managers import SyncManager
import time
import inspect
import datetime
from functools import partial
from types import FunctionType
import sys
import random
import string
if sys.version_info.major == 3:
from queue import Queue as _Queue
else:
from Queue import Queue as _Queue
__all__ = [... | 229 | 36.26 | 137 | 19 | 1,779 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b5d70e4940e87903_ecd67af5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
104
] | [
null
] | [
15
] | [
137
] | |
2024-11-19T02:32:12.493010+00:00 | 1,383,191,360,000 | ece6c8f05fe5e0bcf61b5759a5be2532ed12cb5f | 2 | {
"blob_id": "ece6c8f05fe5e0bcf61b5759a5be2532ed12cb5f",
"branch_name": "refs/heads/master",
"committer_date": 1383191360000,
"content_id": "77b9465c1209b4496f1c27182a14cf7175520419",
"detected_licenses": [
"BSD-3-Clause",
"Python-2.0",
"BSD-2-Clause",
"MIT"
],
"directory_id": "989cb3ad6a0... | 2.46875 | stackv2 | import requests
from flask import Blueprint, render_template, session, redirect, request
from irianas_web.core import require_login, url_server
irianas_module = Blueprint('clients', __name__, template_folder='templates')
@irianas_module.route('/clients/', methods=['GET'])
@require_login
def clients():
data = dic... | 80 | 36.16 | 77 | 20 | 622 | python | [{"finding_id": "codeql_py/request-without-cert-validation_a9768e0a6063a5f1_f86d3b6a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
14,
33,
60
] | [
null,
null,
61
] | [
13,
17,
21
] | [
78,
77,
48
] | |
2024-11-19T02:32:20.442082+00:00 | 1,631,854,394,000 | ed80be8ddb522bb6b3ed4cd5f7b9d8536643f887 | 3 | {
"blob_id": "ed80be8ddb522bb6b3ed4cd5f7b9d8536643f887",
"branch_name": "refs/heads/master",
"committer_date": 1631854394000,
"content_id": "1a5be3c7e55762f608f3b442697a32a0add846c1",
"detected_licenses": [
"MIT"
],
"directory_id": "b2ff37406e50976b8db1c75bde4297f5039f7391",
"extension": "py",
"fi... | 2.640625 | stackv2 | from flask import Flask, render_template , redirect , request
app = Flask(__name__)
@app.route('/')
def home():
return render_template('index.html')
@app.route('/process', methods = ['GET','POST'])
def process():
if request.method == "POST":
get_name = request.form.get("input_name")
return re... | 21 | 24.67 | 61 | 12 | 122 | python | [{"finding_id": "codeql_py/flask-debug_6a2527a733fdd387_fb4d23d4", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
21,
13
] | [
null,
null
] | [
5,
25
] | [
24,
44
] | |
2024-11-19T02:32:48.008121+00:00 | 1,576,283,391,000 | 78b039942604cc2806fa1bfffcaeceae7dec6a8a | 3 | {
"blob_id": "78b039942604cc2806fa1bfffcaeceae7dec6a8a",
"branch_name": "refs/heads/master",
"committer_date": 1576283391000,
"content_id": "e0234f018d7e92122d65a3678974779136bfa70c",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "a5b1308385b01178e82fc43954d3bd3e2405fc45",
"extension": "py",
... | 3.328125 | stackv2 | import random, pyperclip
password = ""
symbols = []
nums = []
alphabet = []
for letter in range(97, 123):
alphabet.append(chr(letter))
for symbol in range(33, 64):
symbols.append(chr(symbol))
for num in range(48, 57):
nums.append(chr(num))
for x in range(8):
password = password + random.choice(al... | 36 | 17.03 | 50 | 9 | 163 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_be3f9a4903c26d21_7d152a03", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text."
] | [
28
] | [
null
] | [
7
] | [
15
] | |
2024-11-19T02:33:00.712324+00:00 | 1,630,638,898,000 | 9f36f90454a0dd20164d71bb1c0a614a942a79a2 | 3 | {
"blob_id": "9f36f90454a0dd20164d71bb1c0a614a942a79a2",
"branch_name": "refs/heads/main",
"committer_date": 1630638898000,
"content_id": "814e4ee01591c5f0d970f71b26330b588bbe2153",
"detected_licenses": [
"MIT"
],
"directory_id": "06aa5e824faeccd1dfd78add4e49cdea42a19908",
"extension": "py",
"file... | 2.875 | stackv2 | import string
import wordcloud
import nltk
nltk.download('stopwords')
nltk.download('wordnet')
nltk.download('punkt')
nltk.download('averaged_perceptron_tagger')
import pandas as pd
import numpy as np
from bs4 import BeautifulSoup
import re
from nltk.corpus import stopwords
from sklearn.model_selection import train_t... | 390 | 34.96 | 159 | 17 | 3,531 | python | [{"finding_id": "codeql_py/overly-large-range_556f1285f37ae793_ab687435", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
19
] | [
null
] | [
22
] | [
25
] | |
2024-11-19T02:33:12.407288+00:00 | 1,500,632,719,000 | c7bbd76e80189701e25e0ce528cafc724580cfb7 | 3 | {
"blob_id": "c7bbd76e80189701e25e0ce528cafc724580cfb7",
"branch_name": "refs/heads/master",
"committer_date": 1500632719000,
"content_id": "de659e2516322298fa7842d4a787b1c585bd3c29",
"detected_licenses": [
"MIT"
],
"directory_id": "37311498a80c6ebffd73ea4f6c262096f39772f2",
"extension": "py",
"fi... | 2.796875 | stackv2 | # -*- coding: utf-8 -*-
import json
import os
from functools import reduce
from config import appid, appsecret
import requests
def print_btn(btn):
result = ''
if 'name' in btn:
result += btn['name'].encode('utf-8')
if 'key' in btn:
result += '(' + btn['key'].encode('utf-8') + ')'
if 'u... | 76 | 31.79 | 102 | 18 | 618 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3dd4a3fd7448ef42_1c607cdb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive dat... | [
28,
33,
47,
55,
71
] | [
null,
null,
null,
null,
null
] | [
15,
11,
19,
15,
19
] | [
22,
18,
31,
51,
56
] | |
2024-11-19T02:43:38.881609+00:00 | 1,625,361,633,000 | 70950d1ada01c5d3bb3d620100acbfa400a8e660 | 3 | {
"blob_id": "70950d1ada01c5d3bb3d620100acbfa400a8e660",
"branch_name": "refs/heads/master",
"committer_date": 1625361633000,
"content_id": "091d7bf039631d539213c0c841a5dcc0cf6e2075",
"detected_licenses": [
"BSD-2-Clause",
"BSD-3-Clause"
],
"directory_id": "faa84a83a3d347ac8b17cab2fa0599c65652a85d... | 2.625 | stackv2 | import os
from uliweb.core.commands import Command
from optparse import make_option
class MakeKeyCommand(Command):
name = 'makekey'
help = 'Make secret key to to a file.'
option_list = (
make_option('-o', dest="output",
help='Output key file name.'),
)
def handle(self, options... | 82 | 33.2 | 138 | 16 | 649 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_617d73dee00d9d0f_66e3cd09", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
30
] | [
null
] | [
17
] | [
27
] | |
2024-11-19T02:54:49.040707+00:00 | 1,605,735,520,000 | 42e83094e933cea6f6ac1abf28955436e9cc1a95 | 3 | {
"blob_id": "42e83094e933cea6f6ac1abf28955436e9cc1a95",
"branch_name": "refs/heads/main",
"committer_date": 1605735520000,
"content_id": "5172ab5d1c319411b479a72236e8440f827271d6",
"detected_licenses": [
"MIT"
],
"directory_id": "48a03aac74e1417712c09dce8b851ca05915627b",
"extension": "py",
"file... | 3.03125 | stackv2 | import sys, getopt, hashlib
from math import exp, expm1
import random
SECRET = "s2rj6235-77d3-3405-3d23-462w34179227"
def mykey(key):
return hashlib.sha256(key + SECRET).hexdigest()
# string to binary
def ConvertStringToBinary(s):
return ''.join('{:08b}'.format(ord(c)) for c in s)
# binary to int
def Co... | 109 | 25.4 | 128 | 14 | 900 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_265da9eff9713b90_b156b6f2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
55,
61,
104
] | [
null,
null,
null
] | [
8,
8,
7
] | [
51,
36,
29
] | |
2024-11-19T02:54:49.097046+00:00 | 1,572,544,430,000 | 319494bd45743b9f7bb35f15213ade4275fb97ad | 3 | {
"blob_id": "319494bd45743b9f7bb35f15213ade4275fb97ad",
"branch_name": "refs/heads/master",
"committer_date": 1572544430000,
"content_id": "fc660ce5af6dab53a6c4159a8087b0f7fe0538fe",
"detected_licenses": [
"MIT"
],
"directory_id": "0090e851ba8ec7a19e048e0535bc39910bab661e",
"extension": "py",
"fi... | 2.640625 | stackv2 | # -*- coding: utf-8 -*-
from branca.element import CssLink, Figure, JavascriptLink, MacroElement
from folium.utilities import parse_options
from jinja2 import Template
class MeasureControl(MacroElement):
""" Add a measurement widget on the map.
Parameters
----------
position: str, default 'toprigh... | 61 | 33.3 | 118 | 12 | 471 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_580e57b1c6066916_50bdcfa0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25
] | [
32
] | [
17
] | [
13
] | |
2024-11-19T02:55:11.015768+00:00 | 1,560,943,419,000 | 15ba2d840b28849a758153e88b817f4c3f72fc4c | 3 | {
"blob_id": "15ba2d840b28849a758153e88b817f4c3f72fc4c",
"branch_name": "refs/heads/master",
"committer_date": 1560943419000,
"content_id": "96201b5bb34fd7b750bbf6af28f4a66240237b8c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bd73a0f046edac7064e84c802486b11005fb57c4",
"extension": "py"... | 2.703125 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
#
# Copyright (C) 2015-2019 Bitergia
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any l... | 57 | 41.72 | 172 | 12 | 623 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ea4fba1aedb26d40_7e3799a6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
42
] | [
null
] | [
11
] | [
55
] | |
2024-11-19T02:55:13.671771+00:00 | 1,596,976,671,000 | 0af53b0f25a0e81d7a2e5046a2ca91afc3b2a805 | 3 | {
"blob_id": "0af53b0f25a0e81d7a2e5046a2ca91afc3b2a805",
"branch_name": "refs/heads/master",
"committer_date": 1596976671000,
"content_id": "df4b12b000bc7e1d4661be378826dde6449a48fd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6ccaa9eaaea9730a78545876d7d5b37b004a4ca5",
"extension": "py"... | 2.796875 | stackv2 | import requests
import random
import logging
import time
from datetime import datetime, date, timedelta
# from mock_response import response_json # for testing only
logging.basicConfig(level=logging.INFO)
logger = logging.getLogger('rover-bot')
def get_photo(rover, date):
api_key = 'DEMO_KEY' # keep this a sec... | 101 | 31.18 | 102 | 14 | 839 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2b368afbb3c4e844_a3f3776f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
18,
75,
90
] | [
null,
null,
null
] | [
17,
21,
14
] | [
43,
54,
21
] | |
2024-11-19T02:55:13.908028+00:00 | 1,604,939,944,000 | e5fd70439f2570d251cd95ce2dcc67d3d9ff1a52 | 2 | {
"blob_id": "e5fd70439f2570d251cd95ce2dcc67d3d9ff1a52",
"branch_name": "refs/heads/main",
"committer_date": 1604939944000,
"content_id": "bf86be5eb0499164bc503fb6e826b1700a895c2b",
"detected_licenses": [
"MIT"
],
"directory_id": "063752d83a3a3a582b7ecd7455648fcd4283c854",
"extension": "py",
"file... | 2.421875 | stackv2 | import json
import datetime
import time
import math
from requests_oauthlib import OAuth1Session
from pytz import timezone
from dateutil import parser
import collections as cl
json_token = open("config.json", "r", encoding='utf-8')
token = json.load(json_token)
CK = token["CK"]
CS = token["CS"]
AT = token["AT"]
ATS = ... | 134 | 22.42 | 88 | 16 | 861 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0dad16c1cf79f032_2a180dba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
71
] | [
null
] | [
7
] | [
10
] | |
2024-11-19T02:55:17.308494+00:00 | 1,584,033,357,000 | 0edc6e1c19884c0a8f05bfd90e2e230b935ef354 | 3 | {
"blob_id": "0edc6e1c19884c0a8f05bfd90e2e230b935ef354",
"branch_name": "refs/heads/master",
"committer_date": 1584033357000,
"content_id": "8d6a7e08cb2e41d5d01cc69c7da19ce2d0425ffe",
"detected_licenses": [
"MIT"
],
"directory_id": "09b733390b1b4ef4dea32a60e76772db93ad627e",
"extension": "py",
"fi... | 2.5625 | stackv2 | '''
16th april 2018 monday
time 3:42am
'''
from pathlib import Path
from getpass import getpass
from cmds.helper import Helper
CONFIG_FILE = 'config.txt'
HOME = str(Path.home())
DIR_PATH = HOME + "/" + '.local/share/acadbot'
FILE_PATH = DIR_PATH + "/" + CONFIG_FILE
def cmd_passwd():
file = Path(FILE_PATH)
if ... | 38 | 26.18 | 76 | 12 | 250 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_fe9115e713df403f_d3d4bc0a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
31
] | [
null
] | [
27
] | [
33
] | |
2024-11-19T02:55:36.852542+00:00 | 1,615,398,281,000 | 75dd4220d707e5ad6538a7f168d6f999730ec51a | 2 | {
"blob_id": "75dd4220d707e5ad6538a7f168d6f999730ec51a",
"branch_name": "refs/heads/master",
"committer_date": 1615398281000,
"content_id": "22103bdca8633c600fbbe4697c56e9cba1041715",
"detected_licenses": [
"MIT"
],
"directory_id": "c7a9ef4807a12c540b93307a207168149ba2d3f9",
"extension": "py",
"fi... | 2.34375 | stackv2 | # -*- coding: utf-8 -*-
import os
import shutil
import time
from flask import render_template, request
from app import app, utils
@app.route('/test')
def home():
"""Render test page"""
app.logger.debug('Loading test page...')
return '''
<html>
<head>
<title>Test Page - CAVE</title>
</hea... | 97 | 28.28 | 78 | 15 | 593 | python | [{"finding_id": "codeql_py/path-injection_d192d874f33183a3_12606791", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
71,
72
] | [
null,
76
] | [
21,
21
] | [
26,
35
] | |
2024-11-19T02:55:43.902885+00:00 | 1,582,074,402,000 | 15f49a2319db0d0a21dfd2d03af56e212341bae6 | 2 | {
"blob_id": "15f49a2319db0d0a21dfd2d03af56e212341bae6",
"branch_name": "refs/heads/master",
"committer_date": 1582074550000,
"content_id": "5b636d7acd94228c1eec24ac22eb27f1c6aaee80",
"detected_licenses": [
"MIT"
],
"directory_id": "0a6ae50779c501c87a4b92e0e8e54c0dcf4d832e",
"extension": "py",
"fi... | 2.390625 | stackv2 | import json
import re
import semver
from datetime import datetime, timedelta
from typing import TYPE_CHECKING, Dict, List, Optional, Tuple, Union
from github.GitRelease import GitRelease
from github.Issue import Issue
from github.NamedUser import NamedUser
from github.PullRequest import PullRequest
from jinja2 impor... | 216 | 39.79 | 87 | 18 | 2,007 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_726a69a4227e8202_97fc3a52", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
36
] | [
null
] | [
26
] | [
62
] | |
2024-11-19T02:55:50.875967+00:00 | 1,665,717,399,000 | 2bc8fbb53eb84296afd64a555918a44236759dd9 | 3 | {
"blob_id": "2bc8fbb53eb84296afd64a555918a44236759dd9",
"branch_name": "refs/heads/main",
"committer_date": 1665717399000,
"content_id": "ba0e89ba8d3705bff29520c9030a989cebddda6d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d05eb9db3b8c7c0883bd471a6dea49d723616d76",
"extension": "py",
... | 2.65625 | stackv2 | #!/usr/bin/env python
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
... | 66 | 38.21 | 78 | 20 | 614 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2a5c39daf9995cb9_897dbb45", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
62
] | [
null
] | [
11
] | [
19
] | |
2024-11-19T02:55:56.791357+00:00 | 1,541,313,877,000 | 2a7ff1ea7aef336f3407ba4bd39b8b58fbf0dda0 | 2 | {
"blob_id": "2a7ff1ea7aef336f3407ba4bd39b8b58fbf0dda0",
"branch_name": "refs/heads/master",
"committer_date": 1541313877000,
"content_id": "edac6bde3331e53266ea122769ffd074f6034097",
"detected_licenses": [
"MIT"
],
"directory_id": "e476267132896ccba3e483890b8316aaaf5e2d58",
"extension": "py",
"fi... | 2.359375 | stackv2 | # -*- coding: utf-8 -*-
import json
from flask import Flask, g
from cookiepool.config import *
from cookiepool.db import *
from cookiepool.generator import taobaoCookiesGenerator
__all__ = ['app']
app = Flask(__name__)
@app.route('/')
def index():
return '<h2>Welcome to Cookie Pool System</h2>'
def get_conn()... | 121 | 24.66 | 95 | 17 | 807 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6eb60a7f1547250d_1a5924e6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-215"
] | [
"py/clear-text-logging-sensitive-data",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
52,
121
] | [
null,
null
] | [
21,
5
] | [
29,
42
] | |
2024-11-19T02:55:58.580828+00:00 | 1,526,629,671,000 | 82fd981f601f453dd83e07158a0bfad4c5a8bcf8 | 3 | {
"blob_id": "82fd981f601f453dd83e07158a0bfad4c5a8bcf8",
"branch_name": "refs/heads/master",
"committer_date": 1526629671000,
"content_id": "9b95a6a2647e666efa8481686ee31ae37939ecda",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "64ac514268f093bbc3d034b1868ca2e1277621ff",
"extension": "py"... | 3.109375 | stackv2 |
import re
import sys
import os
from datetime import datetime
import pandas as pd
def pairwise(iterable):
"s -> (s0, s1), (s2, s3), (s4, s5), ..."
a = iter(iterable)
return zip(a, a)
def convert(list_time):
'''
Converts a list of numbers and time symbols into seconds s
:param list_time: list o... | 141 | 28.82 | 95 | 20 | 1,200 | python | [{"finding_id": "codeql_py/redos_26aa20c44ba4a386_38038b18", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\t'.", "remedia... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\t'."
] | [
50
] | [
null
] | [
38
] | [
54
] | |
2024-11-19T02:56:04.848914+00:00 | 1,525,044,232,000 | 043942554d5fe3079f0dc424319a1768674a24f8 | 3 | {
"blob_id": "043942554d5fe3079f0dc424319a1768674a24f8",
"branch_name": "refs/heads/master",
"committer_date": 1525044232000,
"content_id": "5a08d7bb79064c8db2c01e80e4abb02b33240f61",
"detected_licenses": [
"MIT"
],
"directory_id": "b1d0b118be1279f586259d70f1fa8c397d438f54",
"extension": "py",
"fi... | 3.03125 | stackv2 | #!/usr/bin/env python3
import requests
import hashlib
import json
class hibpEmail():
def __init__(self, email=''):
self.found = False
self.count = 0
if email:
self.email(email)
def email(self, email):
self.found = False
self.count = 0
r = requests... | 71 | 26.77 | 79 | 16 | 430 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_05667307b586ae06_21f01f9e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
49
] | [
null
] | [
32
] | [
43
] | |
2024-11-19T02:56:09.068144+00:00 | 1,602,712,022,000 | 3e34068a056ef0d56b4c268b0b3bfafcd49e41b0 | 3 | {
"blob_id": "3e34068a056ef0d56b4c268b0b3bfafcd49e41b0",
"branch_name": "refs/heads/master",
"committer_date": 1602712022000,
"content_id": "abe58afd35f3c068fbcb1b3bbc10463394a9c430",
"detected_licenses": [
"MIT"
],
"directory_id": "70b3492d541b35ca61df6617139d7fdf03b33495",
"extension": "py",
"fi... | 2.828125 | stackv2 | from tensorflow.keras.preprocessing.text import Tokenizer
from tensorflow.keras.preprocessing.sequence import pad_sequences
import nltk
from nltk.stem.snowball import SnowballStemmer
import re
import string
import pandas as pd
from nltk.corpus import stopwords
import numpy as np
import unidecode
nltk.download('stopwor... | 112 | 33.06 | 104 | 16 | 1,165 | python | [{"finding_id": "codeql_py/overly-large-range_f0f343a7fee03a41_9df07e29", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=\\]."
] | [
25
] | [
null
] | [
39
] | [
42
] | |
2024-11-19T03:10:25.796064+00:00 | 1,603,199,471,000 | b19816a8843bf9e2801517ddc608626a1ad5118b | 3 | {
"blob_id": "b19816a8843bf9e2801517ddc608626a1ad5118b",
"branch_name": "refs/heads/master",
"committer_date": 1603199471000,
"content_id": "2c2b4f977ee1ddb261d8a6b331333227a47e1482",
"detected_licenses": [
"MIT"
],
"directory_id": "61ad58a5434415a9ef5c3e429f0314dee0b44d38",
"extension": "py",
"fi... | 3.0625 | stackv2 | """Methods to cache remote files."""
import hashlib
import logging
import os
import requests
from timer import timed
logger = logging.getLogger(__name__)
CACHE_DIRECTORY = '/cache/'
@timed
def cache_file(url, prefix):
"""Locally cache files fetched from a url."""
cache_filepath = _get_cached_filepath(
... | 49 | 26.47 | 86 | 15 | 297 | python | [{"finding_id": "codeql_py/request-without-cert-validation_4dc3dab8c4146123_16de68e4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
28
] | [
null
] | [
13
] | [
44
] | |
2024-11-19T03:10:38.556894+00:00 | 1,663,773,454,000 | bfd37eed8a0644af4ae74ae6c345cfcd419d38f5 | 3 | {
"blob_id": "bfd37eed8a0644af4ae74ae6c345cfcd419d38f5",
"branch_name": "refs/heads/main",
"committer_date": 1663773454000,
"content_id": "bda1b2c4fc8b38b6d31fc5fff3b891de6411f88c",
"detected_licenses": [
"MIT"
],
"directory_id": "78e0a1940fa1481636cd9171857d6a5d0825a169",
"extension": "py",
"file... | 2.59375 | stackv2 | #pylint: disable=too-many-arguments, too-many-locals, invalid-name
"""
Utility functions to post plot data
"""
from __future__ import print_function
import sys
import logging
from postprocessing.Configuration import Configuration, CONFIG_FILE
import string
import requests
import urllib3
urllib3.disable_warnings()
... | 177 | 35.62 | 92 | 18 | 1,592 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b637373c5047dfc2_9bce4330", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
35
] | [
37
] | [
15
] | [
55
] | |
2024-11-19T03:10:52.700997+00:00 | 1,496,369,499,000 | 099db780ed7d90f0fea8b4081db8443245ce4726 | 3 | {
"blob_id": "099db780ed7d90f0fea8b4081db8443245ce4726",
"branch_name": "refs/heads/master",
"committer_date": 1496369499000,
"content_id": "7763e07748d34af9f249551fff24ac238efc14f0",
"detected_licenses": [
"MIT"
],
"directory_id": "1900c27121148be3093e1d7e23dddd9ea04b5e53",
"extension": "py",
"fi... | 2.734375 | stackv2 | ###test version
import sqlite3
from flask import Flask, render_template, url_for, request, send_from_directory, session, redirect
app = Flask(__name__)
app.secret_key = 'lolcatz'
app.threaded = True
app.config["TEMPLATES_AUTO_RELOAD"] = True
## This is the first page you come to in the program, this displays the home... | 136 | 25.62 | 156 | 17 | 931 | python | [{"finding_id": "codeql_py/flask-debug_d5fc4490af130fe6_b0d0268d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-089"
] | [
"py/flask-debug",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This SQL query depends on a [user-provided value](1)."
] | [
132,
50
] | [
null,
null
] | [
2,
13
] | [
32,
73
] | |
2024-11-19T03:21:44.516188+00:00 | 1,553,791,929,000 | af5f05d789f78d193ce6566c3319f90be9ff71a2 | 3 | {
"blob_id": "af5f05d789f78d193ce6566c3319f90be9ff71a2",
"branch_name": "refs/heads/master",
"committer_date": 1553791929000,
"content_id": "76478ead40c1ca2c7b9d38bfd706c207315c8741",
"detected_licenses": [
"MIT"
],
"directory_id": "db2e1881d5062abf19e0fcdb572bcb3af7b07576",
"extension": "py",
"fi... | 2.515625 | stackv2 | import aiohttp
import asyncio
import base64
import datetime
import json # noqa
import logging
import os
import requests
def get_config(config_file):
"""
Get configuration for command
:return:
"""
with open('/jalbot/config/{}'.format(config_file), 'r') as f:
config = json.load(f)
if 'e... | 303 | 34.01 | 116 | 17 | 2,347 | python | [{"finding_id": "codeql_py/request-without-cert-validation_0da7999814d9d59a_f6cbe92f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
96
] | [
null
] | [
19
] | [
66
] | |
2024-11-19T03:22:14.549002+00:00 | 1,609,350,867,000 | 61087c82f4a554a876f385fdfad9427ce6bd07c4 | 2 | {
"blob_id": "61087c82f4a554a876f385fdfad9427ce6bd07c4",
"branch_name": "refs/heads/main",
"committer_date": 1609350867000,
"content_id": "2bb9d36d69ab2a53215fb350551e2412af9ad04d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "76e2900a9dbf18876373618816df1b790fe2670e",
"extension": "py",
... | 2.390625 | stackv2 | import cv2
from reciever import SecretCamera
from multi_led_reader import MultiLedReader
import gbvision as gbv
from protocol import raw_to_data, raw_to_bmp
import time
# ColorThreshold([[176, 255], [198, 255], [155, 255]], 'RGB')
# ColorThreshold([[200, 255], [202, 255], [201, 255]], 'RGB') !!!WHITE ON BLACK!!!
ERO... | 318 | 29.52 | 119 | 17 | 2,441 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_905c38c779e70d0f_13e4a077", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
260
] | [
null
] | [
11
] | [
17
] | |
2024-11-19T03:22:20.928918+00:00 | 1,687,636,293,000 | 809a5d8f8c82e7db612d7687725afbf04f2a463a | 3 | {
"blob_id": "809a5d8f8c82e7db612d7687725afbf04f2a463a",
"branch_name": "refs/heads/master",
"committer_date": 1687636293000,
"content_id": "bd3cd1cf9714cdef30c102fbf5e5d59afae07ef7",
"detected_licenses": [
"MIT"
],
"directory_id": "ecb66d151961e27b5e1907268dde4cdf2be5ec45",
"extension": "py",
"fi... | 3.078125 | stackv2 | #!/usr/bin/python
# Import the CGI module
import MySQLdb
import cgi
import cgitb
cgitb.enable()
# Required header that tells the browser how to render the HTML.
def getHeader():
return "Content-Type: text/html\n\n"
def getClose():
return "</body>\n</html>\n"
# Define function to generate HTML form.
def generate... | 61 | 24.95 | 118 | 12 | 433 | python | [{"finding_id": "codeql_py/sql-injection_330d8a273f09e537_a62292b8", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
48
] | [
null
] | [
17
] | [
20
] | |
2024-11-19T03:22:24.783253+00:00 | 1,525,703,372,000 | 3979590540046098a6ef6dfca2359159c1d0bebd | 2 | {
"blob_id": "3979590540046098a6ef6dfca2359159c1d0bebd",
"branch_name": "refs/heads/master",
"committer_date": 1525703372000,
"content_id": "a7ff9701d93293b17f8f276a3420567fe8136373",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2498e45f07e75d88beb5db13b7a734191e463aac",
"extension": "py"... | 2.453125 | stackv2 | #!/usr/bin/env python3
import os
from jinja2 import FileSystemLoader, Environment
from tfgen.client import AWSClient
class CodeGenerator(object):
def __init__(self):
dir_path = os.path.dirname(os.path.realpath(__file__))
loader = FileSystemLoader("{}/templates/".format(dir_path))
self.en... | 59 | 32.75 | 102 | 18 | 424 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_087158494ff6c588_b1ecd473", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
null
] | [
28
] | [
54
] | |
2024-11-19T03:44:01.627065+00:00 | 1,606,403,504,000 | edb31375ec00fdaadf426831d2246e1f9d9d720b | 3 | {
"blob_id": "edb31375ec00fdaadf426831d2246e1f9d9d720b",
"branch_name": "refs/heads/main",
"committer_date": 1606403504000,
"content_id": "dde74149b855f207e81432a068f19269431cb492",
"detected_licenses": [
"MIT"
],
"directory_id": "bede9845aa4dbf6f381dcfc006496bfbc0591c7c",
"extension": "py",
"file... | 2.765625 | stackv2 | from flask import Flask
from flask import render_template, url_for
import pycountry
from bs4 import BeautifulSoup
import requests
from requests.exceptions import HTTPError
app = Flask(__name__)
#globals are frowned upon
run_info = {'host':None}
if run_info['host'] == None:
run_info['host'] = '127.0.0.1'
@app.rou... | 56 | 35.7 | 133 | 21 | 503 | python | [{"finding_id": "codeql_py/stack-trace-exposure_861d2c5b36de4baa_86c847bc", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S... | 4 | true | [
"CWE-209",
"CWE-215",
"CWE-295",
"CWE-295"
] | [
"py/stack-trace-exposure",
"py/flask-debug",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This... | [
40,
56,
35,
33
] | [
null,
null,
null,
null
] | [
16,
5,
20,
20
] | [
17,
46,
134,
103
] | |
2024-11-19T03:44:15.217269+00:00 | 1,693,241,515,000 | ce50bac42a74c5811811c12aab99ec28417ba92a | 2 | {
"blob_id": "ce50bac42a74c5811811c12aab99ec28417ba92a",
"branch_name": "refs/heads/main",
"committer_date": 1693241515000,
"content_id": "4413549daa50bd8ac5f9626bad45cdd9a3fde030",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "c168fe819b446640957e5e310ef89fcfe28662b3",
"extension": "py"... | 2.34375 | stackv2 | import os
import time
import argparse
import math
from numpy import finfo
import torch
from distributed import DistributedDataParallel
from torch.utils.data.distributed import DistributedSampler
from torch.nn import DataParallel
from torch.utils.data import DataLoader
from fp16_optimizer import FP16_Optimizer
from m... | 291 | 37.93 | 84 | 19 | 2,376 | python | [{"finding_id": "codeql_py/overly-permissive-file_ce184df81ce621cc_0f178c9b", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
72
] | [
null
] | [
13
] | [
46
] | |
2024-11-19T03:44:20.066683+00:00 | 1,503,280,715,000 | adb1a65daf848cb212e7acd60e862356f0575e20 | 4 | {
"blob_id": "adb1a65daf848cb212e7acd60e862356f0575e20",
"branch_name": "refs/heads/master",
"committer_date": 1503280715000,
"content_id": "7ad97dd6415712e70c581548e2689cd88e9ddcc3",
"detected_licenses": [
"MIT"
],
"directory_id": "9bc6526c32ffa3d645e24b0fa5dc458d2204f133",
"extension": "py",
"fi... | 3.96875 | stackv2 | # some time operations.
import time;
# time method gives the number of ticks since 10:00 am, January 1, 1970. (epoch)
print(time.time());
# gives the current time in a time tuple.
print(time.localtime());
# asctime will give the time in a readable format, so if we provide the current time in time tuple
# to the asc... | 36 | 38.28 | 105 | 9 | 375 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d3709f66fe713725_82421619", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
36
] | [
null
] | [
29
] | [
41
] | |
2024-11-19T03:44:23.452402+00:00 | 1,692,270,674,000 | 92c00319060a62925c28f077ec92916affb263eb | 2 | {
"blob_id": "92c00319060a62925c28f077ec92916affb263eb",
"branch_name": "refs/heads/master",
"committer_date": 1692270674000,
"content_id": "a36c31caf7225aa89c2b247f8f461a180525e5b9",
"detected_licenses": [
"MIT"
],
"directory_id": "96c3c5d015c5338c4b54c78187be9f75ffb1dd8f",
"extension": "py",
"fi... | 2.390625 | stackv2 | import io
import logging
import os
import re
import shutil
import tarfile
import tempfile
from typing import List, Optional, Dict
from urllib import request as request
import numpy as np
from ase import Atoms
from ase.io.extxyz import read_xyz
from tqdm import tqdm
import torch
from schnetpack.data import *
import sc... | 262 | 36.8 | 110 | 19 | 2,309 | python | [{"finding_id": "codeql_py/tarslip_8e5110d1797cbd8a_ca1c47b4", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
224
] | [
null
] | [
9
] | [
12
] | |
2024-11-19T02:08:15.888096+00:00 | 1,623,418,213,000 | dafa2bc88a9869eea7c6d99f0fbe2701c377cd53 | 3 | {
"blob_id": "dafa2bc88a9869eea7c6d99f0fbe2701c377cd53",
"branch_name": "refs/heads/master",
"committer_date": 1623418213000,
"content_id": "13b22f6ee9be388122334620880ea9a36f858b20",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "dbd3f562768ded628d5d8d7ee3e05a3e88970a8d",
"extension": "py"... | 2.5625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*
import configparser
import random
import requests
import time
from bs4 import BeautifulSoup
from .fastlist import get_article_ids
def login():
config = configparser.ConfigParser()
config.read("csdn.conf")
u = config.get("east", "username")
p = config.get... | 76 | 26.99 | 113 | 13 | 630 | python | [{"finding_id": "codeql_py/request-without-cert-validation_af333dddf08e160c_ac3a39eb", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
26
] | [
null
] | [
9
] | [
45
] | |
2024-11-19T03:10:02.588016+00:00 | 1,623,069,389,000 | 9579f7c63305ba9d89da72b800c41dd32eb1172a | 2 | {
"blob_id": "9579f7c63305ba9d89da72b800c41dd32eb1172a",
"branch_name": "refs/heads/master",
"committer_date": 1623069389000,
"content_id": "a9e27f7dd9b3f7623a77fe2a0d86ab0d737176e9",
"detected_licenses": [
"MIT"
],
"directory_id": "d4af15bfec86981d5a8690423c05aa09910967af",
"extension": "py",
"fi... | 2.5 | stackv2 |
import dill
import gherkindb
import threading
import mundisdbobj
import mundiscrypto
import mundissession
import logging
from time import sleep, time
from xmlrpc.server import SimpleXMLRPCServer
import mundisuser
__config__ = '/etc/mundis-server/config.db'
__schemas__ = '/etc/mundis-server/schemas.db'
__userdb__ = '... | 247 | 28.77 | 104 | 17 | 1,519 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3e24037871197822_a6cd6493", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
141,
145
] | [
null,
null
] | [
28,
29
] | [
36,
37
] | |
2024-11-19T03:10:13.737104+00:00 | 1,588,449,685,000 | 8a55622000c175efcdf4a1f011bd1e0fdd94b601 | 3 | {
"blob_id": "8a55622000c175efcdf4a1f011bd1e0fdd94b601",
"branch_name": "refs/heads/master",
"committer_date": 1588449685000,
"content_id": "a535d3cc55fd278e52358723fcde0af1429771ba",
"detected_licenses": [
"MIT"
],
"directory_id": "8ba17add5e3a10e577f99d992fe629c2aa92ed0f",
"extension": "py",
"fi... | 3 | stackv2 | import sys
from GenderSwap import InsertGenderLanguage
from pathlib import Path
rubricData = []
groupInputData = []
def Run():
ReadFiles()
CompileComments()
# print(rubricData)
# print(groupInputData)
def ReadFiles():
"""get rubric/group file data"""
with open(sys.argv[1]) as rubric:
#... | 84 | 29.4 | 97 | 22 | 615 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ff1ab25541088970_abe68b77", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
56
] | [
null
] | [
26
] | [
50
] | |
2024-11-19T03:22:35.412916+00:00 | 1,588,259,799,000 | 1ae3f7884fc60242118c52657762667ffae43d45 | 3 | {
"blob_id": "1ae3f7884fc60242118c52657762667ffae43d45",
"branch_name": "refs/heads/master",
"committer_date": 1588259799000,
"content_id": "6e3d2c3c7ca0f1e33bb2e39000669d7af0bd209b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "59f0aa0a9705ec2af32b864150ffcfd19e6c2af3",
"extension": "py"... | 2.703125 | stackv2 | '''
Created on 11 Oct 2017
@author: gavin
'''
from .basehandler import TcpHandler
import socket
import ssl
import re
import logging
logger = logging.getLogger(__name__)
class forwardsocket(TcpHandler):
NAME = "Foward Socket"
DESCRIPTION = '''Handles incoming connections and forwards onto a socket of your ch... | 114 | 44.18 | 154 | 26 | 984 | python | [{"finding_id": "codeql_py/insecure-protocol_6d9610255ba38b93_8dc29fab", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)."
] | [
46
] | [
null
] | [
30
] | [
37
] | |
2024-11-19T03:22:43.416706+00:00 | 1,533,342,127,000 | e1a8c8de3766850555d55e7ef760858423c0ef2c | 3 | {
"blob_id": "e1a8c8de3766850555d55e7ef760858423c0ef2c",
"branch_name": "refs/heads/master",
"committer_date": 1533342127000,
"content_id": "eb0d9e9bb10e808118e890c20322a2f8e7d238ae",
"detected_licenses": [
"MIT"
],
"directory_id": "e478e07962d0285e09c7e92db14a51b7604fe39b",
"extension": "py",
"fi... | 2.78125 | stackv2 | # Based on Python 3.5.2 | Anaconda 4.1.1
# Print software information
print('This is SunSpotTracker. (c) Seungwon Park under the terms of the MIT License')
print('Source : https://github.com/seungwonpark/SunSpotTracker')
from sys import argv
script, bool_plot, bool_raw = argv # Input : whether or not to plot(show) th... | 137 | 33.5 | 161 | 31 | 1,316 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_41962097b5407bdd_0a610f8c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
110
] | [
null
] | [
40
] | [
161
] | |
2024-11-19T03:22:58.913921+00:00 | 1,523,599,030,000 | a0a23a8d30dfbc08aca7c05dbbd0ec6daf4f3419 | 3 | {
"blob_id": "a0a23a8d30dfbc08aca7c05dbbd0ec6daf4f3419",
"branch_name": "refs/heads/master",
"committer_date": 1523599030000,
"content_id": "42079620a93149b3ced570b62405b54c6245e9f9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d7814d14456b2146b43a4a4af7851f150f3dc1a0",
"extension": "py"... | 2.546875 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Tue Mar 27 20:52:14 2018
@author: Prodipta
"""
import pandas as pd
from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler
import json
import logging
import configparser
from order import OrderWriter
from checksum import verify_checksum
logger = logging.getLogger(__name__)... | 87 | 32.83 | 90 | 19 | 638 | python | [{"finding_id": "codeql_py/log-injection_3adad8d20cf3f9eb_a40f5cec", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
41
] | [
null
] | [
25
] | [
66
] | |
2024-11-19T03:23:06.644882+00:00 | 1,579,767,537,000 | 95246fc2a4959e45d000cb68c3870083c717188d | 3 | {
"blob_id": "95246fc2a4959e45d000cb68c3870083c717188d",
"branch_name": "refs/heads/master",
"committer_date": 1579767537000,
"content_id": "d9805a5d0db67aeafc6bb087a8a0aeef7bf5117b",
"detected_licenses": [
"MIT"
],
"directory_id": "ecb40ef1779d93b0d7cf55f44dd071091bbcc3b8",
"extension": "py",
"fi... | 2.671875 | stackv2 | import urllib.request
import os
import csv
import cv2 as cv
import random
from datetime import datetime, timedelta
from sklearn.model_selection import train_test_split
class Dataset:
face_cascade = cv.CascadeClassifier('../data_loader/haarcascade_frontalface_default.xml')
def createFolder(self, directory):
... | 308 | 41.59 | 144 | 26 | 2,948 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_423a9d8f0353d113_6cdf713c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-022"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/tarslip"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
169,
221,
56
] | [
null,
null,
null
] | [
19,
15,
13
] | [
28,
26,
16
] | |
2024-11-19T03:43:56.554924+00:00 | 1,594,865,592,000 | 26cad14b7228e8c9133073e20c940f4e7bc56c2f | 2 | {
"blob_id": "26cad14b7228e8c9133073e20c940f4e7bc56c2f",
"branch_name": "refs/heads/master",
"committer_date": 1594865592000,
"content_id": "f4180f019372677ad253273a1f5f9806f4ea91d0",
"detected_licenses": [
"MIT"
],
"directory_id": "03865c4f703e446257804924e931563a210f5ac5",
"extension": "py",
"fi... | 2.4375 | stackv2 | from flask import Flask, url_for, render_template, flash, redirect
from flask_sqlalchemy import SQLAlchemy
import os
from search import Stalk
from models import db
from models import Number
from forms import DataForm
from sqlalchemy import exc
app = Flask(__name__)
user_data_dict = {}
db.init_app(app)
app.config["SE... | 64 | 28.23 | 86 | 15 | 423 | python | [{"finding_id": "codeql_py/flask-debug_f62139868c28a56e_a70d19ca", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
64,
58
] | [
null,
null
] | [
5,
15
] | [
24,
34
] | |
2024-11-19T03:44:02.198838+00:00 | 1,588,639,360,000 | cd409d7fb1cc170db84de96e95e2a3630857a276 | 2 | {
"blob_id": "cd409d7fb1cc170db84de96e95e2a3630857a276",
"branch_name": "refs/heads/master",
"committer_date": 1588639360000,
"content_id": "67adb33a98d3e93ca07c3dffcb104fbfc4f7fb32",
"detected_licenses": [
"MIT"
],
"directory_id": "87f0d06cba88e9b5d7604558a7ede8d647d73af0",
"extension": "py",
"fi... | 2.328125 | stackv2 | import datetime as dt
import json
import requests
from collections import defaultdict
from fastapi import APIRouter, Query, Path
from app import const, utils
from app.models.response_models import *
from app.routers import helpers
router = APIRouter()
@router.get(
"/cumulative/bar-chart-race",
summary="Cum... | 317 | 30.69 | 88 | 18 | 2,354 | python | [{"finding_id": "codeql_py/partial-ssrf_6007237e8a6d0c87_d4911b58", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen... | 3 | true | [
"CWE-918",
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).",
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).",
"Part of the URL of ... | [
74,
142,
166
] | [
null,
null,
null
] | [
9,
9,
9
] | [
86,
86,
78
] | |
2024-11-19T01:35:26.464081+00:00 | 1,618,849,477,000 | c7bc8765c6c8ccf9aa2404bd0817ccbefbd7f55d | 3 | {
"blob_id": "c7bc8765c6c8ccf9aa2404bd0817ccbefbd7f55d",
"branch_name": "refs/heads/master",
"committer_date": 1618849477000,
"content_id": "5fa70195ca9e2ddef14b98532b1ef3cf806b3b94",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f012b65140ce5541406ca43f9122b72bf07fcb6a",
"extension": "py"... | 2.8125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import nrrd
import numpy as np
import numpngw as pw
import progressbar as pb
from os.path import basename, isfile
from glob import glob
progress = pb.ProgressBar(widgets=[pb.Bar('*', '[', ']'),
pb.Percentage(), ' '])
class PatientIO(object):
... | 160 | 37.64 | 93 | 17 | 1,352 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_171ab5b4cfc54427_b9451c4a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
55,
109
] | [
null,
null
] | [
15,
15
] | [
56,
71
] | |
2024-11-19T01:55:37.412086+00:00 | 1,692,020,788,000 | f43d7229f20f6f7d0b9ccc9e99353d219445ba6e | 3 | {
"blob_id": "f43d7229f20f6f7d0b9ccc9e99353d219445ba6e",
"branch_name": "refs/heads/main",
"committer_date": 1692020788000,
"content_id": "ae786dfddb872482c1f6865852bbb2675bbea770",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ad39e1324d2f5fc73ae2e06e7a9a7d1048f58dad",
"extension": "py",
... | 3 | stackv2 | """ A simple HTTPS server. """
import argparse
import ssl
from http.server import HTTPServer, SimpleHTTPRequestHandler
if __name__ == '__main__':
parser = argparse.ArgumentParser()
parser.add_argument("listen_port",
help="The port this process will listen on.",
t... | 25 | 37.2 | 85 | 12 | 188 | python | [{"finding_id": "codeql_py/insecure-protocol_5e7ea76c66957b9f_83586c66", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)."
] | [
23
] | [
null
] | [
10
] | [
21
] | |
2024-11-19T01:55:52.152574+00:00 | 1,586,252,711,000 | 8b0afe64708871293a9130c54833989bd8291e24 | 2 | {
"blob_id": "8b0afe64708871293a9130c54833989bd8291e24",
"branch_name": "refs/heads/master",
"committer_date": 1586252711000,
"content_id": "eb4dbaae5d1bcf2caabfbfba7da0f4131da50476",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "073154a50d70fb3d7d482dbee0bde07d28e985a6",
"extension": "py"... | 2.453125 | stackv2 | # -*- coding: utf-8 -*-
from os.path import join, dirname, abspath
from flask import Flask, redirect, render_template, request
import json
app = Flask(
__name__,
static_url_path = '/',
static_folder = 'public'
)
# App configuration
current_dir = dirname(abspath(__file__))
config_dir = join(current_dir, ... | 64 | 20.69 | 59 | 12 | 331 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_51c1aa8fdf4beca0_8331672b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
52
] | [
56
] | [
17
] | [
10
] | |
2024-11-19T02:07:49.418903+00:00 | 1,590,781,667,000 | 06ca139e44f3c9eee89cebc832f840fa4a09a1b1 | 3 | {
"blob_id": "06ca139e44f3c9eee89cebc832f840fa4a09a1b1",
"branch_name": "refs/heads/master",
"committer_date": 1590781667000,
"content_id": "df9b7a3a44b11a4bcc2cceb05f596ad95573111e",
"detected_licenses": [
"MIT"
],
"directory_id": "1dc952db582a671e5174119cee237e39797f04f5",
"extension": "py",
"fi... | 2.921875 | stackv2 | from bottle import get, post, delete, put, run, template, request
from datetime import datetime
from SchoolTasks.assignment4.Database import Database # change tis accordingly to your file structure
db = Database() # initialise database
db.database_main() # start the database
usr_input = input("is this for testing... | 182 | 41.53 | 119 | 21 | 1,814 | python | [{"finding_id": "codeql_py/reflective-xss_b99aac3ee805fa4b_d9f1cff1", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
121,
149
] | [
null,
null
] | [
16,
24
] | [
82,
101
] | |
2024-11-19T02:07:51.973098+00:00 | 1,529,689,954,000 | c9b503d12e2fe1a41df8be260f0d41c7a44b963f | 2 | {
"blob_id": "c9b503d12e2fe1a41df8be260f0d41c7a44b963f",
"branch_name": "refs/heads/master",
"committer_date": 1529689954000,
"content_id": "96bdaed46a37d240a32218fa1de86f5f88668f63",
"detected_licenses": [
"MIT"
],
"directory_id": "0b70cccb012b2e84c94eaf4cc0e76f83ca99a7eb",
"extension": "py",
"fi... | 2.421875 | stackv2 | import json
import time
import requests
import urllib.request, urllib.parse, urllib.error
from decimal import *
import asyncio
import websockets
import redis
#import logging
#logger = logging.getLogger('websockets')
#logger.setLevel(logging.DEBUG)
#logger.addHandler(logging.StreamHandler())
from Exchange import *
... | 459 | 23.44 | 120 | 18 | 3,111 | python | [{"finding_id": "codeql_py/request-without-cert-validation_0f6f650f1cacff1e_748eaf7f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
276,
278,
280
] | [
null,
null,
null
] | [
16,
16,
16
] | [
92,
92,
92
] | |
2024-11-19T02:17:13.000640+00:00 | 1,690,211,404,000 | 888c132a59508c2bf1ecd813f943dd45b3be78d9 | 3 | {
"blob_id": "888c132a59508c2bf1ecd813f943dd45b3be78d9",
"branch_name": "refs/heads/main",
"committer_date": 1690211404000,
"content_id": "23cd3b9910712bc8ee203a4f190bf7a282046228",
"detected_licenses": [
"MIT"
],
"directory_id": "8355269f3ba649ec4a16a849ba22e022edee44d9",
"extension": "py",
"file... | 3.21875 | stackv2 | import getpass
import hashlib
import requests
import sys
def ask_for_password():
password = getpass.getpass(prompt = "\n\nPorfavor introduce tu contraseña: \n\n", stream = None)
if password == "" or password.isspace():
print("Please type a password!")
sys.exit(1)
password = hashlib.sha1(pa... | 32 | 30.03 | 100 | 15 | 238 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f9ff7834b19454aa_de29c391", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.",
"[Sensitive data (password)](1) is used ... | [
29,
12
] | [
null,
null
] | [
15,
29
] | [
82,
53
] | |
2024-11-19T02:17:25.883478+00:00 | 1,526,499,575,000 | f5b440f93f442d808bc994524bd252611fc855ec | 3 | {
"blob_id": "f5b440f93f442d808bc994524bd252611fc855ec",
"branch_name": "refs/heads/master",
"committer_date": 1526499575000,
"content_id": "a4327971625935499ceaffe35a089c6654f93b6b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "db961a80a3b943a1f7fd12b0e7688f688b78a5d0",
"extension": "py"... | 2.9375 | stackv2 | import requests as req
'essa é a minha chave de acesso à API'
api_key = '1525c1ab'
def pega_filme_por_id(film_id):
url = "http://www.omdbapi.com/?apikey={}&i={}".format(api_key, film_id)
retorno = req.get(url).json()
print(url)
print(retorno)
dadosFilme = {
'film_id': film_id,
'nome':r... | 29 | 23.66 | 73 | 10 | 221 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8519c3bdeee9c993_17198642", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
10,
11
] | [
null,
null
] | [
9,
9
] | [
12,
16
] | |
2024-11-19T02:17:27.780384+00:00 | 1,634,518,877,000 | 93c7f6c7ae102fcdf54b4f1cf697e7c2527726a1 | 3 | {
"blob_id": "93c7f6c7ae102fcdf54b4f1cf697e7c2527726a1",
"branch_name": "refs/heads/main",
"committer_date": 1634518877000,
"content_id": "9f950f0cce7f257bf40d523fa5d811eb73dc12cc",
"detected_licenses": [
"MIT"
],
"directory_id": "6ed581f6f382ece018e09cd6401b11efd3d5b242",
"extension": "py",
"file... | 3.09375 | stackv2 | import numpy as np
import pandas as pd
from sklearn.neighbors import KNeighborsClassifier
from sklearn.model_selection import train_test_split
from sklearn.preprocessing import StandardScaler
import tkinter as tk
class Predictor:
def has_disease(self, row):
self.train(self)
return True if self.pr... | 137 | 47.55 | 161 | 15 | 2,166 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bcd4c882cf56d050_51d68675", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
51
] | [
null
] | [
11
] | [
14
] | |
2024-11-19T02:17:29.017222+00:00 | 1,606,042,843,000 | 7b20d84a062d1ea4a980692e35f4b6cffec46486 | 3 | {
"blob_id": "7b20d84a062d1ea4a980692e35f4b6cffec46486",
"branch_name": "refs/heads/main",
"committer_date": 1606042843000,
"content_id": "70b6a3b1e6dd040e33dfaf0eb06c44a83fb71c64",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "649e89992dbb48da4faf599db43881552b5c474d",
"extension": "py"... | 2.578125 | stackv2 | import requests
import os
import json
import re
from urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning)
TIMEOUT=3
social_list = {
'instagram.com': '',
'github.com': '',
'facebook.com': '',
'vk.com': '',
'twitter.com': ''
}
... | 77 | 26.73 | 90 | 14 | 520 | python | [{"finding_id": "codeql_py/request-without-cert-validation_ac8e23d70b5555ee_fe372cd2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
66
] | [
null
] | [
28
] | [
76
] | |
2024-11-19T02:17:31.304943+00:00 | 1,633,731,099,000 | 2e299ac6db98288b25dfbc8305295edcd143456d | 2 | {
"blob_id": "2e299ac6db98288b25dfbc8305295edcd143456d",
"branch_name": "refs/heads/master",
"committer_date": 1633731099000,
"content_id": "02f156c7bc147631044fe58eb2d8a82b195bb9bd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5c0493ef3ed08009387eda5eda98c35b9b7c8187",
"extension": "py"... | 2.421875 | stackv2 | """
.. module: awseipext.aws_lambda.lambda_function
:copyright: (c) 2016 by Lyft Inc.
:license: Apache, see LICENSE for more details.
"""
import logging
import boto3
import botocore
import kmsauth
import os
from awseipext.config.lambda_config import LambdaConfig, SECTION
from awseipext.request.lambda_request i... | 240 | 30.94 | 78 | 16 | 1,554 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_427c52a9f2bf13a6_e5e85aa5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
128
] | [
134
] | [
13
] | [
14
] | |
2024-11-19T02:17:36.923673+00:00 | 1,606,730,283,000 | 5b3db9ec85e3557d699958fd809d49b7642df539 | 3 | {
"blob_id": "5b3db9ec85e3557d699958fd809d49b7642df539",
"branch_name": "refs/heads/master",
"committer_date": 1606730283000,
"content_id": "9a3b695200b09e1d4b32a953c4d9a700139551db",
"detected_licenses": [
"MIT"
],
"directory_id": "b1a8c7e2b696fa34bbc58876f38c180783e905d8",
"extension": "py",
"fi... | 2.59375 | stackv2 | import re
import gdown
import matplotlib.pyplot as plt
import pandas as pd
import numpy as np
import seaborn as sns
import torch
import tarfile
from keras.preprocessing.sequence import pad_sequences
from sklearn import preprocessing
from sklearn.metrics import precision_recall_fscore_support
from sklearn.model_selecti... | 566 | 27.06 | 88 | 19 | 3,619 | python | [{"finding_id": "codeql_py/tarslip_a9a60459804a5652_a7b29478", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
96
] | [
null
] | [
9
] | [
11
] | |
2024-11-19T02:18:15.908214+00:00 | 1,425,803,040,000 | cc91710eb0e7eb5d7603e5b6907d23cb14ceaedc | 3 | {
"blob_id": "cc91710eb0e7eb5d7603e5b6907d23cb14ceaedc",
"branch_name": "refs/heads/master",
"committer_date": 1425803040000,
"content_id": "fcb1e1756aaa9742d3239db9a1f52072b43fcd7f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1acef78ac732bfdcac503f633dde1d719111f4cb",
"extension": "py"... | 2.59375 | stackv2 | from flask import request, flash, redirect, url_for
from flask.ext.login import login_user, logout_user, login_required, current_user
from psbackend import app
from psbackend import templateutil
from psbackend.models.user import *
from psbackend.forms.user import RegisterForm, LoginForm
@app.route('/user')
@login_req... | 61 | 33.28 | 81 | 14 | 437 | python | [{"finding_id": "codeql_py/url-redirection_93b7d94185db7faf_36af08a5", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 3 | true | [
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
31,
48,
61
] | [
null,
null,
null
] | [
25,
25,
21
] | [
69,
69,
65
] | |
2024-11-19T02:18:16.635582+00:00 | 1,391,505,331,000 | 73cdb730206865c6dcb85945445c9b7a80174053 | 2 | {
"blob_id": "73cdb730206865c6dcb85945445c9b7a80174053",
"branch_name": "refs/heads/master",
"committer_date": 1391505331000,
"content_id": "d7fe11c853bf84c565b70be2d003755c622bd4e0",
"detected_licenses": [
"MIT"
],
"directory_id": "3d1da76dfc025ea0814d4c5245d1ea636d5bc657",
"extension": "py",
"fi... | 2.421875 | stackv2 | from BeautifulSoup import BeautifulSoup
import urllib2
import re
tripler_URL = "http://www.rrr.org.au/"
def get_podcasts():
url = "http://rrrfm.libsyn.com/rss/category/Breakfasters"
page = urllib2.urlopen(url, "xml")
soup = BeautifulSoup(page.read())
#urls = soup.findAll(type="audio/mpeg")
urls... | 22 | 25.82 | 62 | 14 | 150 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_22286374697376bd_c2fc02cd", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'libsyn.com', so it might match more... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'libsyn.com', so it might match more hosts than expected."
] | [
14
] | [
null
] | [
42
] | [
60
] | |
2024-11-19T02:18:17.476242+00:00 | 1,644,888,421,000 | b3d78488a43db8f8fc5204e4715b3dc704ef485f | 3 | {
"blob_id": "b3d78488a43db8f8fc5204e4715b3dc704ef485f",
"branch_name": "refs/heads/master",
"committer_date": 1644888421000,
"content_id": "0d33322a8579bce2a5f375536cdf0b265eab9d59",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "2d2ffb9f13bb1b6ea6d1241a9ae6d0a2976dc057",
"extension": "p... | 2.625 | stackv2 | #!/usr/bin/python
import paramiko, sys, os, socket
import threading
import subprocess
attacked_addr = sys.argv[1]
username = sys.argv[2]
number = sys.argv[3]
time = sys.argv[4]
basevm_type = sys.argv[5]
class myThread (threading.Thread):
def __init__(self, threadID, name):
threading.Thread.__init__(self)
... | 93 | 32.94 | 148 | 17 | 843 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_ddb92ce7fcf44a92_4dea2429", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
40
] | [
null
] | [
5
] | [
62
] | |
2024-11-19T02:18:19.420686+00:00 | 1,598,246,795,000 | 6171c32470bf1fd097072b572fe9581eae06962e | 3 | {
"blob_id": "6171c32470bf1fd097072b572fe9581eae06962e",
"branch_name": "refs/heads/master",
"committer_date": 1598246795000,
"content_id": "7c9e3196212bd5055d9836c1be665ff673d63720",
"detected_licenses": [
"MIT"
],
"directory_id": "327b8d8a9dab288ddcbadab16d6c07de6b418929",
"extension": "py",
"fi... | 2.6875 | stackv2 | import wikipediaapi
import networkx as nx
from flask import Flask, request, jsonify, make_response
from flask_cors import CORS
from decouple import config
import requests
G = nx.Graph()
wiki = wikipediaapi.Wikipedia('en')
def smaller_graph(pages):
links = pages.links
for title in sorted(links.keys()):
... | 156 | 28.93 | 123 | 16 | 1,099 | python | [{"finding_id": "codeql_py/stack-trace-exposure_be4c27e3b76eb367_22c6a42a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 6 | true | [
"CWE-209",
"CWE-209",
"CWE-312",
"CWE-312",
"CWE-918",
"CWE-918"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) a... | [
76,
132,
103,
117,
59,
114
] | [
null,
null,
null,
null,
null,
null
] | [
38,
38,
11,
15,
16,
16
] | [
45,
45,
21,
18,
33,
33
] | |
2024-11-19T02:29:53.352966+00:00 | 1,634,714,480,000 | 0818d10f48626da00b7a82abdf609ea44dacd410 | 2 | {
"blob_id": "0818d10f48626da00b7a82abdf609ea44dacd410",
"branch_name": "refs/heads/main",
"committer_date": 1634714480000,
"content_id": "a88d41170bc51f1e089018ef2f2cd13bc2460bff",
"detected_licenses": [
"MIT"
],
"directory_id": "0ab23c78a4861ac706a639eb537af8fd56b3aad7",
"extension": "py",
"file... | 2.484375 | stackv2 | from collections import OrderedDict
import json
import re
import os
import glob
from typing import TYPE_CHECKING
import warnings
# References:
# https://github.com/jgm/pandoc/blob/master/src/Text/Pandoc/Citeproc/BibTeX.hs
# https://github.com/andras-simonyi/citeproc-el/wiki/BibLaTeX-CSL-mapping
# https://github.com/br... | 249 | 35.73 | 123 | 18 | 2,066 | python | [{"finding_id": "codeql_py/redos_2ce12808af59e9c4_41468d11", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\\\\DeclareDatamodelEntrytypes{{'... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '\\\\DeclareDatamodelEntrytypes{{' and containing many repetitions of ' '.",
"This part of the regular expression may cause exponential backtracking on strings starting with '\\\\DeclareDatamodelFields{{' and containi... | [
96,
107
] | [
null,
null
] | [
59,
57
] | [
69,
67
] | |
2024-11-19T02:30:09.844891+00:00 | 1,604,988,019,000 | b3a20523edc9011a2952bbbdee7fa3e8faf7a987 | 4 | {
"blob_id": "b3a20523edc9011a2952bbbdee7fa3e8faf7a987",
"branch_name": "refs/heads/main",
"committer_date": 1604988019000,
"content_id": "38e0bee1f91c264ec4ce851d30f8cfbfbf49e6dc",
"detected_licenses": [
"MIT"
],
"directory_id": "0223a85b6a3fecd453b9bd61368cb51c2978c30f",
"extension": "py",
"file... | 4.03125 | stackv2 | # Вычисление зар.платы
hour_salary = 70
salary = 0 # Начальная зарплата
work = int(input("Введите кол-во часов работы: "))
work_day = 8 # Рабочий день
if work > 1 and work <= 24:
if work > work_day:
# Кол-во часов переработки
check = work - work_day
# Зарплата включающая двойную ставку за ... | 20 | 31.05 | 69 | 13 | 209 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f10ecd8d99a8a6e8_619b4031", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
14,
18
] | [
null,
null
] | [
15,
15
] | [
53,
53
] | |
2024-11-19T02:41:43.533356+00:00 | 1,485,023,246,000 | e5c82f173d359a8c1f440d48d983a2773e8e588f | 2 | {
"blob_id": "e5c82f173d359a8c1f440d48d983a2773e8e588f",
"branch_name": "refs/heads/master",
"committer_date": 1485023246000,
"content_id": "7b40445ee7b615cbfcd3a164cc6a859d91a870f9",
"detected_licenses": [
"MIT"
],
"directory_id": "b1b915ef4054db81e6f24db14184eb32ba1ce217",
"extension": "py",
"fi... | 2.375 | stackv2 | from __future__ import print_function
import boto3
import base64
import time
import paramiko
import socket
public_ip_address = '35.167.226.22'
send_script = False
# Connect via ssh
print('Connecting via ssh...')
ssh = paramiko.SSHClient()
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
# keep trying, migh... | 47 | 25.57 | 83 | 13 | 324 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_931805f34832c909_4b5fde69", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
15
] | [
null
] | [
null
] | [
58
] | |
2024-11-18T18:05:53.952975+00:00 | 1,569,409,144,000 | 0eacc1f8532871f12f34a1bac6764b3e0aa49558 | 3 | {
"blob_id": "0eacc1f8532871f12f34a1bac6764b3e0aa49558",
"branch_name": "refs/heads/master",
"committer_date": 1569409144000,
"content_id": "b71214afca96b9dd7c2f90062a9a22fca1b968dd",
"detected_licenses": [
"MIT"
],
"directory_id": "48fee88f737847de15a4a90be6e261d9576074ad",
"extension": "py",
"fi... | 2.59375 | stackv2 | #!/usr/bin/env python
import eventlet
eventlet.monkey_patch()
import json
import requests
from flask import Flask, render_template, session, request, \
copy_current_request_context
from flask_socketio import SocketIO, emit, join_room, leave_room, \
close_room, rooms, disconnect
# Set this variable to "threadi... | 79 | 30.1 | 110 | 14 | 593 | python | [{"finding_id": "codeql_py/reflective-xss_580d40254e16b15f_4bc6d46f", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
32
] | [
35
] | [
12
] | [
6
] | |
2024-11-18T18:05:57.584886+00:00 | 1,565,535,093,000 | d8f0222b3e77ed3bd19c2defe0afd14b037a789d | 3 | {
"blob_id": "d8f0222b3e77ed3bd19c2defe0afd14b037a789d",
"branch_name": "refs/heads/master",
"committer_date": 1565535093000,
"content_id": "4d996be29d9b87a47d2b810f41af452883db738c",
"detected_licenses": [
"MIT"
],
"directory_id": "e842d039ed84700155764c5abc5ab8c6d991efac",
"extension": "py",
"fi... | 2.71875 | stackv2 | # -*- coding: utf-8 -*-
"""
Author: Sparrow
Purpose: Crawl the single post of content from Instagram application
Created: 2017-08-06
"""
import re
import urllib.request
import os
import traceback
from urllib.parse import quote
from bs4 import BeautifulSoup
import sys
import ssl
import requests
Video = 'GraphVid... | 318 | 29.34 | 174 | 18 | 2,385 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_6bcb5a33469b445c_9395ff61", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This string, which is used as a regular expression [here](1), has an unescaped '.' before 'instagram.com/p/', so it might match more hosts than expected."
] | [
305
] | [
null
] | [
18
] | [
49
] | |
2024-11-18T18:15:56.372102+00:00 | 1,426,775,145,000 | ff3a9359cd69886337759deb0f999008697fe2bb | 2 | {
"blob_id": "ff3a9359cd69886337759deb0f999008697fe2bb",
"branch_name": "refs/heads/master",
"committer_date": 1426775145000,
"content_id": "5fa7dd66e88d1b5aba611a2ef257a751097e5063",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "1854ff0adc08f2ecd9ed6facff88468f2d6bf08d",
"extension": "p... | 2.4375 | stackv2 | import cv2
import numpy as np
import json
import os
from flask.ext.cors import CORS, cross_origin
from flask import Flask, request
app = Flask(__name__)
cors = CORS(app)
@app.route("/imageSearch",methods=["POST"])
def imageSearch():
filename = request.form.get("filename","")
typeof = request.form.get("type","")
if ... | 175 | 26.77 | 119 | 15 | 1,434 | python | [{"finding_id": "codeql_py/flask-debug_e0ceb6d8d7e5873c_2113032c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-022"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
175,
18,
23
] | [
null,
null,
null
] | [
5,
9,
12
] | [
44,
15,
20
] | |
2024-11-18T18:15:56.428362+00:00 | 1,489,679,255,000 | b2cb9be6d8bb555fde22ae1c814fc5d7cf4cfab7 | 2 | {
"blob_id": "b2cb9be6d8bb555fde22ae1c814fc5d7cf4cfab7",
"branch_name": "refs/heads/master",
"committer_date": 1489679255000,
"content_id": "762e88c7e1be2dad425bf56209b932bfc256d97b",
"detected_licenses": [
"MIT"
],
"directory_id": "75f7659e23baab403fc00b7ced208653442b94b6",
"extension": "py",
"fi... | 2.328125 | stackv2 | from flask import Blueprint, render_template, flash, request, redirect, url_for, abort
from flask_login import login_user, logout_user, login_required, current_user
from datetime import datetime
import json
from app.forms import LoginForm, RegisterUserForm, EditUserForm, SearchForm
from app.models import User, Course... | 135 | 36.66 | 96 | 20 | 1,020 | python | [{"finding_id": "codeql_py/url-redirection_9dd3ce8b41154f21_fb1bba4e", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
97,
117
] | [
null,
null
] | [
25,
25
] | [
69,
69
] | |
2024-11-18T18:16:10.535585+00:00 | 1,649,080,391,000 | 17056e6234aaaf6d9978bd14ec447ba833980a14 | 2 | {
"blob_id": "17056e6234aaaf6d9978bd14ec447ba833980a14",
"branch_name": "refs/heads/master",
"committer_date": 1649080391000,
"content_id": "317c907a0368bbe7ea7622ebee2c47c26e517baa",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "71200fe39fe9415c8498b1e99b05fb704c78c5af",
"extension": "p... | 2.5 | stackv2 | # -*- coding: utf-8 -*-
# Originally written by Kevin Breen (@KevTheHermit):
# https://github.com/kevthehermit/RATDecoders/blob/master/AdWind.py
import string
from zipfile import ZipFile
from io import BytesIO
from Crypto.Cipher import ARC4, DES
import xml.etree.ElementTree as ET
def sortConfig(old_config):
if o... | 75 | 38.09 | 86 | 20 | 708 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_713f7f2a40d42c13_847b1a1d", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptograph... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used.",
"[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used."
] | [
45,
50
] | [
null,
null
] | [
12,
12
] | [
32,
32
] | |
2024-11-18T18:16:13.054233+00:00 | 1,622,492,335,000 | e47ce47a830bb4d2ef4346ec95b57d81b317afc9 | 3 | {
"blob_id": "e47ce47a830bb4d2ef4346ec95b57d81b317afc9",
"branch_name": "refs/heads/master",
"committer_date": 1622492335000,
"content_id": "3db0bec8fbd7e7857d198b5f927ca3f8175615e3",
"detected_licenses": [
"MIT"
],
"directory_id": "104bfb4cda37167e9ebef6b3d0a498b1176e0042",
"extension": "py",
"fi... | 2.796875 | stackv2 | """Deal with OpenAPI v3."""
import json
import re
from jinja2 import Environment, FileSystemLoader
class OpenAPI: # pylint: disable=too-few-public-methods
"""Create OpenAPI skeleton."""
def __init__(self, napp_path, tpl_path):
"""Instantiate an OpenAPI object.
Args:
napp_path (... | 167 | 34.29 | 78 | 17 | 1,312 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_6b3b4d2e5e65c2e7_0b263f24", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
161
] | [
163
] | [
19
] | [
30
] | |
2024-11-18T18:59:35.288838+00:00 | 1,391,155,399,000 | 9885da54d38f531a8db6a2b212a045de3aee4563 | 3 | {
"blob_id": "9885da54d38f531a8db6a2b212a045de3aee4563",
"branch_name": "refs/heads/master",
"committer_date": 1391155399000,
"content_id": "fcc5e23456c183dc99153e9ee5a0ef775da4e61c",
"detected_licenses": [
"MIT"
],
"directory_id": "9448edd9a529bf6ec52a8516ecf018dc5f05a2f3",
"extension": "py",
"fi... | 2.515625 | stackv2 | import argparse
import logging
from os import path
from bs4 import BeautifulSoup
from cliff.command import Command
from jinja2 import Environment, PackageLoader
from .core import Qualtrics
def surveyname2tablename(surveyname):
return surveyname.replace(' ', '').replace('-', '_')
class Document(Command):
"... | 78 | 30.19 | 86 | 17 | 497 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a90373738ad677a6_c642063c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
29
] | [
null
] | [
15
] | [
62
] | |
2024-11-18T18:59:41.655417+00:00 | 1,692,750,526,000 | 56166b60f14a651416321f90977c9e76421d989d | 2 | {
"blob_id": "56166b60f14a651416321f90977c9e76421d989d",
"branch_name": "refs/heads/main",
"committer_date": 1692750526000,
"content_id": "8e27da0428f275d1c273a8cafd23c1abbac969af",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "488f1cf914d76f75a3e28130780e0de368b34a87",
"extension": "py"... | 2.359375 | stackv2 | # coding: utf-8
# Copyright (c) Jan Janssen
import getpass
import importlib
import os
import re
import pandas
from jinja2 import Template
from jinja2.exceptions import TemplateSyntaxError
from pysqa.utils.execute import execute_command
from pysqa.utils.queues import Queues
class BasisQueueAdapter(object):
"""
... | 596 | 28.89 | 118 | 25 | 3,765 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_79e17fda426187ce_f6189293", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
490
] | [
null
] | [
50
] | [
68
] | |
2024-11-18T19:11:50.796873+00:00 | 1,576,435,849,000 | c19fe990bfe489f5f71206c310ecc6f9b5f617ee | 3 | {
"blob_id": "c19fe990bfe489f5f71206c310ecc6f9b5f617ee",
"branch_name": "refs/heads/master",
"committer_date": 1576435849000,
"content_id": "7230901abba69c4e1d0238921eb85196e6035551",
"detected_licenses": [
"MIT"
],
"directory_id": "eb70fbe86d605a15540a1976225f0e98b129b507",
"extension": "py",
"fi... | 2.703125 | stackv2 | import time
from selenium import webdriver
import json
import requests
import shutil
import os
# configure path of webdriver
# ----------------------------------------------------
path = "/home/leoam/Downloads/chromedriver"
# ----------------------------------------------------
imagesJson = {}
count = 21
pageCount = 0... | 126 | 27.78 | 123 | 17 | 882 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_004a5d2604c7b145_490fcf8e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
54,
92
] | [
null,
null
] | [
11,
23
] | [
36,
26
] | |
2024-11-18T19:11:53.896165+00:00 | 1,417,707,480,000 | 893696db8676fd0d0b6461c1caa329bfa121446d | 3 | {
"blob_id": "893696db8676fd0d0b6461c1caa329bfa121446d",
"branch_name": "refs/heads/master",
"committer_date": 1417707480000,
"content_id": "6fc25ad9130c1deffd47bf3a6a405d9e0537b6ca",
"detected_licenses": [
"MIT"
],
"directory_id": "67495dc3be95127eeda8652c89d8a9e89ed97420",
"extension": "py",
"fi... | 2.734375 | stackv2 | from flask import Flask
from flask import request
import os, sys
import boto.sqs
import boto.sqs.queue
from boto.sqs.message import Message
from boto.sqs.connection import SQSConnection
from boto.exception import SQSError
app = Flask(__name__)
app.debug = True
#curl examples are shown with te hash comment, above func... | 240 | 28.95 | 155 | 15 | 2,348 | python | [{"finding_id": "codeql_py/flask-debug_18531d45303dedfb_3f31070f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-022"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value]... | [
240,
36,
44,
54
] | [
null,
null,
null,
null
] | [
2,
9,
9,
10
] | [
37,
31,
28,
33
] | |
2024-11-18T19:23:48.826997+00:00 | 1,579,403,706,000 | 1c73ba1906aad1e2e3f7895f58238b93a8441ff3 | 2 | {
"blob_id": "1c73ba1906aad1e2e3f7895f58238b93a8441ff3",
"branch_name": "refs/heads/master",
"committer_date": 1579403706000,
"content_id": "13e130d44892fd66018ec6ff6e165b628b860ed7",
"detected_licenses": [
"MIT"
],
"directory_id": "c1cb1a52e127b8531bcf6ef029994ae4c6a7d9f6",
"extension": "py",
"fi... | 2.40625 | stackv2 | import logging
import json
from requests import request, Session
from schluter.thermostat import Thermostat
API_BASE_URL = "https://ditra-heat-e-wifi.schluter.com"
API_AUTH_URL = API_BASE_URL + "/api/authenticate/user"
API_GET_THERMOSTATS_URL = API_BASE_URL + "/api/thermostats"
API_SET_TEMPERATURE_URL = API_BASE_URL ... | 69 | 34.52 | 101 | 15 | 558 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_06f2ed51f0f1ac77_325f80fb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
60
] | [
null
] | [
58
] | [
65
] | |
2024-11-18T19:23:54.542735+00:00 | 1,575,004,054,000 | 9285c8aa6ffb2fef0d0bd26c995d5b4e72970b56 | 2 | {
"blob_id": "9285c8aa6ffb2fef0d0bd26c995d5b4e72970b56",
"branch_name": "refs/heads/master",
"committer_date": 1575004054000,
"content_id": "86ee76ad8172e4a37011719df78c9ac827b91958",
"detected_licenses": [
"MIT"
],
"directory_id": "163a92c2156afe7bc1c4011f100f01f470bde739",
"extension": "py",
"fi... | 2.4375 | stackv2 | import collections
import re
import requests
import base64
from hyper.contrib import HTTP20Adapter
from requests_toolbelt import MultipartEncoder
class File_download_module():
def __init__(self, busy_username, busy_password, busy_ip='127.0.0.1', busy_port='8080', file_folder='./'):
"""
:param bu... | 198 | 39.19 | 118 | 17 | 1,953 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dbf38f88e90ec7db_75a168dd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
187,
191
] | [
null,
null
] | [
11,
11
] | [
26,
34
] | |
2024-11-18T19:23:56.047319+00:00 | 1,415,345,910,000 | 6437c5ca7b462cbc45622fd02e6ddef88245ff17 | 2 | {
"blob_id": "6437c5ca7b462cbc45622fd02e6ddef88245ff17",
"branch_name": "refs/heads/master",
"committer_date": 1415345910000,
"content_id": "2c7df728fbdd7c866e0a0983fe5d1d511e30f707",
"detected_licenses": [
"MIT"
],
"directory_id": "0c149a209ced3b331eb0b0f4fb07cac50f63d139",
"extension": "py",
"fi... | 2.421875 | stackv2 | # TODO
# - write code to perform useful queries with business rules
# - wrapper to update the data and report
# - cron somewhere
def _get_data(c, customer_id, p, password, a, account_id, e, email):
import sofine.runner as runner
import psycopg2
# sofine pipeline to collect the data
data = {}
... | 88 | 32.31 | 101 | 16 | 733 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c3d9a11a8fae37f8_fad9f2b4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
39
] | [
null
] | [
15
] | [
75
] | |
2024-11-18T19:24:03.261143+00:00 | 1,635,000,840,000 | 38131e74807a012716500b29704334d21782b395 | 3 | {
"blob_id": "38131e74807a012716500b29704334d21782b395",
"branch_name": "refs/heads/main",
"committer_date": 1635000840000,
"content_id": "699aeded45e7572350632693495b216a24a96dcd",
"detected_licenses": [
"MIT"
],
"directory_id": "7f46ad4b122959b6961dd5f2a85c6bf2e660c0f3",
"extension": "py",
"file... | 2.65625 | stackv2 | # Unique UBX sentences
import ubx.Sensors
from ubx.relposned import nav_relposned
from ubx.posllh import nav_posllh
from ubx.secuniqid import sec_uniqid
# Dictionaries of static data
import ubx.ClassID as ubc
import ubx.MessageID as ubm
# List of sensor serial numbers and allocations
from ubx.Sensors import UBLOX
c... | 86 | 43.27 | 132 | 25 | 881 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2b6bff0366aaefc3_04d78341", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
64
] | [
null
] | [
35
] | [
132
] | |
2024-11-18T19:58:19.095111+00:00 | 1,585,775,802,000 | aca3032f9efd2210ed90c85aea426bcc6b110f5e | 2 | {
"blob_id": "aca3032f9efd2210ed90c85aea426bcc6b110f5e",
"branch_name": "refs/heads/master",
"committer_date": 1585775802000,
"content_id": "e78804cf11d9bc9bf8e31803a66a14327b9521d2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b3690d3948bf5064c0a8cc3f8a97fbf506c40ad6",
"extension": "py"... | 2.375 | stackv2 | from __future__ import print_function
import urllib
import requests
PROTOCOL = 'http'
SERVER = 'localhost:8000'
FINAUTAPI = "{}://{}/finautapi/v1/".format(PROTOCOL, SERVER)
CLIENT_ID = 'xsojCstayZtM1VFx2zZd3Nq8JdsNXhP091A2GTKe'
CLIENT_SECRET = 'nRo351z8wiTWbDSscXCdfItEBiSEZunkyjQ5Q6AotA5pl2Zqv6ggoQNtIlot9yZItT7gzD2Bx... | 136 | 24.72 | 146 | 15 | 933 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_68fd98ce43316c2e_da7348aa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
124
] | [
null
] | [
11
] | [
35
] | |
2024-11-18T19:58:23.050582+00:00 | 1,588,181,147,000 | bf100cf4d2c2417a3d1d98667f6b641a829b0ed8 | 2 | {
"blob_id": "bf100cf4d2c2417a3d1d98667f6b641a829b0ed8",
"branch_name": "refs/heads/master",
"committer_date": 1588181147000,
"content_id": "ae245a04b5a4d6f1cfe5c3afe05d633fb54c4f81",
"detected_licenses": [
"MIT-0"
],
"directory_id": "1217bec1017a0586fce4fcfbc84fccaa1b2c065f",
"extension": "py",
"... | 2.375 | stackv2 | '''
Copyright 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
SPDX-License-Identifier: MIT-0
Disclaimer: The code here is based off of an unsupported API from Chamberlain
and is subject to change without notice. The authors claim no responsibility
for damages to yo... | 178 | 42.61 | 107 | 16 | 1,429 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7e1e6f737dc0fb06_f135c679", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
38
] | [
null
] | [
19
] | [
44
] | |
2024-11-18T19:58:40.227050+00:00 | 1,594,543,965,000 | 671608c1387239fc178fadb4684ee61efd380485 | 3 | {
"blob_id": "671608c1387239fc178fadb4684ee61efd380485",
"branch_name": "refs/heads/master",
"committer_date": 1594543965000,
"content_id": "00edcb0137fcab9abc8f3e79bb3ddecdefd1ea7e",
"detected_licenses": [
"MIT"
],
"directory_id": "8f4664838f4b70ea9cd1a783779553ae0fac3c9a",
"extension": "py",
"fi... | 2.515625 | stackv2 | from flask import Flask, request, jsonify, render_template
from flask_cors import CORS
import postgresql_api
app = Flask(__name__)
app.config['JSON_AS_ASCII'] = False
CORS(app)
@app.route('/')
def root():
return "yai_pond GOT7"
@app.route('/std_list')
def std_list():
student_list = postgresql_api.get_studen... | 38 | 22.76 | 67 | 12 | 237 | python | [{"finding_id": "codeql_py/flask-debug_a83234bf497aec96_1df6ef2c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
38,
23
] | [
null,
null
] | [
5,
12
] | [
53,
30
] | |
2024-11-18T18:39:28.493438+00:00 | 1,416,397,801,000 | 035bf6b221226e2079aca460c3627b431d24a423 | 3 | {
"blob_id": "035bf6b221226e2079aca460c3627b431d24a423",
"branch_name": "refs/heads/master",
"committer_date": 1416397801000,
"content_id": "0a31489c14e822176737c5cf3211c1c554d8ecbf",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "4407d8b87f6830cd10fee497e5738e5ea39dbfeb",
"extension": "p... | 2.734375 | stackv2 | # -*- coding: utf-8 -*-
import datetime, time
import logging, threading
from jinja2 import Template
import os
class output:
def __init__(self, devices, mapping):
self.running = True
self.log_path = mapping['log_path']
self.f_name = self.generate_filename()
self.f = open(self.f_name, 'a+', 1)
sel... | 56 | 26.25 | 83 | 18 | 381 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_1891e85dd520cb77_ab73d08c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
42
] | [
null
] | [
13
] | [
43
] | |
2024-11-18T18:39:38.213519+00:00 | 1,573,203,419,000 | 9b4b875d0d2f9c67028a631360188dda238706c7 | 2 | {
"blob_id": "9b4b875d0d2f9c67028a631360188dda238706c7",
"branch_name": "refs/heads/master",
"committer_date": 1573203419000,
"content_id": "32ab508ae5d299691a597e5a74e8d573f2941dc4",
"detected_licenses": [
"MIT"
],
"directory_id": "db4d1c37d1d4d942d89455e407a57cecb273ef8f",
"extension": "py",
"fi... | 2.375 | stackv2 | from flask import jsonify, abort
from flask_restful import Resource, reqparse
import logging
from pgapi.systemCommands import *
class System(Resource):
def get(self, section=None):
"""Return global system information.
Example: GET /system
It's possible to specify what specific set... | 27 | 27.89 | 84 | 11 | 156 | python | [{"finding_id": "codeql_py/log-injection_e2262bb7bfeb4e2c_87b86424", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
19
] | [
null
] | [
76
] | [
83
] | |
2024-11-18T18:39:38.366787+00:00 | 1,652,994,812,000 | d4af47ab9a706b6c58c0d700b493f1a9caa73939 | 3 | {
"blob_id": "d4af47ab9a706b6c58c0d700b493f1a9caa73939",
"branch_name": "refs/heads/master",
"committer_date": 1652994849000,
"content_id": "fd5118e68b8430eda95cadde2f803ac5868801eb",
"detected_licenses": [
"MIT"
],
"directory_id": "9180f87a6b8e34f227df70da663b88444b08d16c",
"extension": "py",
"fi... | 2.671875 | stackv2 | # Copyright 2022 Kaiyu Zheng
#
# Usage of this file is licensed under the MIT License.
# Reproduce the run_*.sh scripts
# by reorganizing the commands in existing scripts
# into new scripts (with shuffle or not) and the
# user can specify how many run_*.sh scripts to produce
# and a suffix after "run_".
import argpa... | 60 | 38.45 | 127 | 17 | 510 | python | [{"finding_id": "codeql_py/overly-permissive-file_d0af6dc508234c54_641a2977", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
56
] | [
null
] | [
9
] | [
45
] | |
2024-11-18T18:40:06.738095+00:00 | 1,616,256,192,000 | 82a5b3268be090c12c5d602284b5cb9eedfea846 | 3 | {
"blob_id": "82a5b3268be090c12c5d602284b5cb9eedfea846",
"branch_name": "refs/heads/master",
"committer_date": 1616256192000,
"content_id": "2c637182684706bc005b3f01dd287f5bac0c78ad",
"detected_licenses": [
"MIT"
],
"directory_id": "b8fcc414c2a888a15c44b4bc64fca1b61f6e3677",
"extension": "py",
"fi... | 2.5625 | stackv2 | # Copyright (c) 2013-2016 Molly White
#
# Permission is hereby granted, free of charge, to any person obtaining a copy of this software
# and associated documentation files (the "Software"), to deal in the Software without
# restriction, including without limitation the rights to use, copy, modify, merge, publish,
# di... | 253 | 43.62 | 104 | 23 | 2,847 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c6b1a6cecd550793_61c9ca4c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com](1) may be at an arbitrary position in the... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [youtube.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [reddit.com](1) may be at an arbitrary position in the sanitized URL."
] | [
62,
64
] | [
null,
null
] | [
12,
14
] | [
32,
33
] | |
2024-11-18T18:47:03.348424+00:00 | 1,624,808,180,000 | 491512349a3b574a8210be5370b77b74c9c0f64f | 2 | {
"blob_id": "491512349a3b574a8210be5370b77b74c9c0f64f",
"branch_name": "refs/heads/main",
"committer_date": 1624808180000,
"content_id": "065c8662fb08b9170a24f4a25a1fdab74a9ccef7",
"detected_licenses": [
"MIT"
],
"directory_id": "f4e82f24b6a9f2069a859f25bc05eaf82b563e4f",
"extension": "py",
"file... | 2.34375 | stackv2 | """
Generate PDFs from chordpro files
Rename PDF songs for latex imports
"""
import os
import subprocess
import shutil
import re
import logging
import jinja2
import io
logger = logging.getLogger(__name__)
try:
import cPickle as pickle #noqa
except:
import pickle
key_info_list = [ # https://www.piano-keyboard-... | 220 | 46.63 | 144 | 24 | 2,162 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_6914f2ea8f629d0b_a242abe7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
136
] | [
138
] | [
15
] | [
10
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.