added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T02:55:00.988460+00:00 | 1,424,293,181,000 | 869ff45df1a44e891a5f89418a963a25cf36fc91 | 3 | {
"blob_id": "869ff45df1a44e891a5f89418a963a25cf36fc91",
"branch_name": "refs/heads/master",
"committer_date": 1424293181000,
"content_id": "9f92cda5ad0e9e7e79b991112761b01893a7b223",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "e012d2f1cf9f50d3ca633718f77dc5ba78425285",
"extension": "p... | 2.515625 | stackv2 | #!/usr/bin/env python2
# -*- coding: utf-8 -*-
__author__ = "David Bidner, Rene Höbling and Alexander Wachter"
__license__ = "BSD 2-Clause"
__version__ = "1.0.0"
__status__ = "Released"
# Provides a more or less complex structure for the SMM Network server
import rsa
import os.path
import time
import stomp
import jso... | 132 | 31 | 80 | 21 | 959 | python | [{"finding_id": "codeql_py/weak-crypto-key_5b58ca3503bd3c33_b2fc6f25", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable.", "remediation": "", ... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable."
] | [
104
] | [
null
] | [
29
] | [
45
] | |
2024-11-19T02:55:57.870662+00:00 | 1,641,335,451,000 | 7943292758606048935f4d0e270892520cec7f14 | 3 | {
"blob_id": "7943292758606048935f4d0e270892520cec7f14",
"branch_name": "refs/heads/master",
"committer_date": 1641335451000,
"content_id": "5b3159f49c6708e2953bdac1dafefd3005649053",
"detected_licenses": [
"MIT"
],
"directory_id": "0c0506d044aac172c35fa606146acb607d42fdde",
"extension": "py",
"fi... | 2.578125 | stackv2 | from __future__ import print_function
import os
import sys
import json
import tempfile
import subprocess
import logging.config
import yaml
import vra_defaults
from io_utilities import promptWithDefault
logger = logging.getLogger("vra_rest")
def initVarsForCurl():
""" Prompts and initializes bash variables to easi... | 56 | 40.84 | 154 | 12 | 547 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c414631a580db5ba_965ced97", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
36
] | [
null
] | [
51
] | [
55
] | |
2024-11-19T02:56:00.657295+00:00 | 1,603,011,597,000 | 3da2bc3e7a38f88b23c6b271d59cc49718097b3a | 3 | {
"blob_id": "3da2bc3e7a38f88b23c6b271d59cc49718097b3a",
"branch_name": "refs/heads/main",
"committer_date": 1603011597000,
"content_id": "b7dfb8ed96edcefd913ed13af6d59e24c3da5007",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "775aa6e95ff6de18f40487777136c78f079f83ab",
"extension": "py",
... | 3.03125 | stackv2 | #CreateCred.py
#Creates a credential file.
from cryptography.fernet import Fernet
import re
import ctypes
import os
import time
import sys
class Credentials():
def __init__(self):
self.__username = ""
self.__key = ""
self.__password = ""
self.__key_file = 'key.key'
#----------------------------... | 89 | 23.84 | 109 | 17 | 584 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_70916c1d59d74e46_bbd0c754", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
55
] | [
56
] | [
18
] | [
44
] | |
2024-11-19T03:43:50.695545+00:00 | 1,633,694,989,000 | e6dab4bc007949085c46a2b276f560cb364b31b9 | 3 | {
"blob_id": "e6dab4bc007949085c46a2b276f560cb364b31b9",
"branch_name": "refs/heads/master",
"committer_date": 1633694989000,
"content_id": "d70a4cf6ed18da426d3ecdb67ac36a4a4cdba00f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "992ce692262e091bd7aa2c6a66ea4e8a63f2f318",
"extension": "py"... | 2.578125 | stackv2 | from aiohttp import (
web,
ClientRequest,
)
from dataclasses import dataclass
from pubsub import pub
import logging
logger = logging.getLogger("aries_webhook_server")
@dataclass
class AriesWebhookServer:
"""The Aries Webhook Listener class
This class allows you to interact with Aries by exposing the... | 116 | 31.78 | 76 | 19 | 786 | python | [{"finding_id": "codeql_py/log-injection_299b2567427e9ae7_9666d383", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 4 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
75,
99,
99,
104
] | [
null,
null,
null,
105
] | [
25,
27,
65,
18
] | [
72,
63,
72,
66
] | |
2024-11-19T03:44:26.665674+00:00 | 1,614,638,676,000 | 1ecc8bafad69eb1d146c96b08652ebe6fae179e5 | 3 | {
"blob_id": "1ecc8bafad69eb1d146c96b08652ebe6fae179e5",
"branch_name": "refs/heads/master",
"committer_date": 1614638676000,
"content_id": "833d97f007eb472e7fe6c7c3ceaa0eae449437e0",
"detected_licenses": [
"MIT"
],
"directory_id": "f9fe9d34cdd88dfb55950899d1288a005d6caae7",
"extension": "py",
"fi... | 2.875 | stackv2 | #!/usr/bin/python
"""AD Lookup Tool.
Runs net user /domain and grabs the listing of domain users.
Then runs a query against each individual user to determine when the password was last changed.
This can be helpful during:
Pentests - Find those old service accounts that may have older passwords
IR - Find accounts tha... | 112 | 33.04 | 112 | 20 | 905 | python | [{"finding_id": "codeql_py/overly-large-range_5efacb99b3f98634_2d3c39d8", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\w in the same character class."
] | [
43
] | [
null
] | [
67
] | [
70
] | |
2024-11-19T01:44:04.761751+00:00 | 1,451,369,996,000 | 41e875be620c979c0ef4f22b120be3fa246a1e7e | 3 | {
"blob_id": "41e875be620c979c0ef4f22b120be3fa246a1e7e",
"branch_name": "refs/heads/master",
"committer_date": 1451369996000,
"content_id": "c41d6dd08905c0ae31ab6299b3ec45bee6378971",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f893f446a241de11958bd99b7a2bb971e38d4f70",
"extension": "py"... | 2.6875 | stackv2 | #-*- coding:utf-8 -*-
#/usr/bin/env python
import os,sys
import pickle
import hashlib
def auth_user(user_name,user_passwd):
hash_passwd = hashlib.md5()
hash_passwd.update(user_passwd)
user_passwd = hash_passwd.hexdigest()
user_file=os.path.dirname(os.path.dirname(os.path.abspath(__file__)))+'/config/use... | 21 | 33.1 | 91 | 14 | 170 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_f7684037cecc57d0_3d47db9e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
8
] | [
null
] | [
24
] | [
35
] | |
2024-11-19T02:08:19.798723+00:00 | 1,598,610,985,000 | c0832713be51e31b1b2bbbf8890988fa475cd749 | 2 | {
"blob_id": "c0832713be51e31b1b2bbbf8890988fa475cd749",
"branch_name": "refs/heads/master",
"committer_date": 1598610985000,
"content_id": "85f795df4653aacaf87f4ab6a71e7ee85b805932",
"detected_licenses": [
"MIT"
],
"directory_id": "b777d3a4c5806159c15929e0b76103e2c1adf72a",
"extension": "py",
"fi... | 2.34375 | stackv2 |
from flask import render_template, flash, redirect, url_for, Blueprint, request
from flaskblog import db, bcrypt
from flask_login import login_user, current_user, logout_user, login_required
from flaskblog.models import User, Post
from flaskblog.users.utils import save_picture, send_reset_email
from flaskblog.users.fo... | 112 | 40.66 | 117 | 16 | 980 | python | [{"finding_id": "codeql_py/url-redirection_7b70a14282bbf9a4_bcdb8276", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
43
] | [
null
] | [
29
] | [
38
] | |
2024-11-19T02:08:42.691241+00:00 | 1,555,014,906,000 | 8d98ffb3961c73c2d319fcd5a2d053bad98d1de1 | 4 | {
"blob_id": "8d98ffb3961c73c2d319fcd5a2d053bad98d1de1",
"branch_name": "refs/heads/master",
"committer_date": 1555014906000,
"content_id": "877df1e84602834cbb313001f71242e01958a0e3",
"detected_licenses": [
"MIT"
],
"directory_id": "10e90e4d279f67bfbf968f134e6f6b07a7cd5d93",
"extension": "py",
"fi... | 3.703125 | stackv2 | """
Problem for DoJo on March 14, 2019.
Implement a URL shortener with the following methods:
shorten(URL), which shortens the URL into a six-character alphanumeric
string, such as zLg6wl.
restore(short), which expands the shortened string into the
original URL. If no such shortened string exists, return null.
Hint... | 166 | 29.62 | 77 | 14 | 1,253 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_69596592f6b2271f_b0129e32", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
63,
79
] | [
64,
80
] | [
15,
15
] | [
50,
51
] | |
2024-11-19T02:21:24.981124+00:00 | 1,507,446,258,000 | 2e2df1b78e794099443ae08edd1a57c50256cf01 | 3 | {
"blob_id": "2e2df1b78e794099443ae08edd1a57c50256cf01",
"branch_name": "refs/heads/master",
"committer_date": 1507446258000,
"content_id": "376c4ce3b41c3a024cf7d5f027f4a6132e9cd514",
"detected_licenses": [
"MIT"
],
"directory_id": "935adb267e28cd9dceafd01e37f987db57024079",
"extension": "py",
"fi... | 3 | stackv2 | import base64
import hashlib
salt_bytes = b'YjBjNWM4YjJkODBlMzJmOWYzOWY4ZDgxY2VkODdiNWI5OTgxMDE4MjFhZjcwMWM2M2Q'
b64_alphabet = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ' + '0123456789' + '+/' # 64 chars
# Below are 2 predefined sets of chars that will appear in the final password
chars = 'abcdefghijklmno... | 60 | 35.98 | 123 | 14 | 706 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6eaee96ac8852523_d8969e0f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
17
] | [
null
] | [
26
] | [
29
] | |
2024-11-19T02:21:26.190343+00:00 | 1,536,701,754,000 | a0821082d21de40053f6d7235ab33439e633ad29 | 3 | {
"blob_id": "a0821082d21de40053f6d7235ab33439e633ad29",
"branch_name": "refs/heads/master",
"committer_date": 1536701754000,
"content_id": "d07ef07a03d5024ba02c64a9c6b0007aa9975f8e",
"detected_licenses": [
"MIT"
],
"directory_id": "fd924e6528acb30e9689a9ff3ca954309aa7f10e",
"extension": "py",
"fi... | 2.75 | stackv2 | # https://www.nkallfa.com/2017/11/05/tutorial-using-googles-cloud-vision-api-with-python/
#http://docs.pimoroni.com/buttonshim/_modules/buttonshim.html#on_release
#pip install gTTS text to speech - use google to turn text to speech
#sudo apt-get install mpg321 - to play the audio
import io
import os
os.environ['GOOGL... | 260 | 28.15 | 89 | 14 | 1,834 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0d2bcc8705f20d12_2a60283d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
110,
111
] | [
null,
null
] | [
19,
19
] | [
57,
59
] | |
2024-11-19T02:21:31.830652+00:00 | 1,444,929,942,000 | 415ac0104766e9caa4c2da4afcfc76f14a7cff49 | 3 | {
"blob_id": "415ac0104766e9caa4c2da4afcfc76f14a7cff49",
"branch_name": "refs/heads/master",
"committer_date": 1444929942000,
"content_id": "6c87a88c2396307cd760821c89fe9c0da5a65789",
"detected_licenses": [
"MIT"
],
"directory_id": "9d81e916446783e4b3e14ea287531f2a073d298a",
"extension": "py",
"fi... | 2.875 | stackv2 | # Copyright (C) 2015 Niklas Rosenstein
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merge, publish, d... | 69 | 33.61 | 79 | 12 | 541 | python | [{"finding_id": "codeql_py/overly-large-range_a95aaffcebd8bf85_59fe5bbb", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[... | [
36,
36,
44,
44
] | [
null,
null,
null,
null
] | [
22,
27,
27,
32
] | [
25,
30,
30,
35
] | |
2024-11-19T02:21:36.036934+00:00 | 1,614,677,991,000 | 75f6143fc607f2613aaf74de0cab57aa56240d1d | 2 | {
"blob_id": "75f6143fc607f2613aaf74de0cab57aa56240d1d",
"branch_name": "refs/heads/master",
"committer_date": 1614677991000,
"content_id": "972fa3c6d4d5edf3915e9a0aeda8694e55a2d889",
"detected_licenses": [
"MIT"
],
"directory_id": "7ac8f6e141f198978eb9ee60a8ee86bb60864cf8",
"extension": "py",
"fi... | 2.328125 | stackv2 | # -----------------------------------------------------------------------------
# Licence:
# Copyright (c) 2012-2018 Luzzi Valerio
#
# The above copyright notice and this permission notice shall be
# included in all copies or substantial portions of the Software.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY ... | 347 | 29.73 | 152 | 20 | 2,507 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b1adcff71bbd7c4f_a0ef4540", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
174,
254,
299
] | [
null,
null,
null
] | [
15,
11,
11
] | [
60,
56,
56
] | |
2024-11-19T02:21:36.492493+00:00 | 1,615,980,936,000 | 5e0755598ba6fa16013b324f0d5588d3395896df | 2 | {
"blob_id": "5e0755598ba6fa16013b324f0d5588d3395896df",
"branch_name": "refs/heads/master",
"committer_date": 1615980936000,
"content_id": "f948f6002b0648909d25ba1bd63b3fba1d4d9b1b",
"detected_licenses": [
"MIT"
],
"directory_id": "655b7176ed004213293840f994b523b7fe605b5f",
"extension": "py",
"fi... | 2.484375 | stackv2 | import os
import threading
import time
from datetime import datetime
from pathlib import Path
from typing import Union, List, Optional, Dict, Tuple
import paramiko
from paramiko import SSHClient, SSHException
from aws_config import Params
from aws_utils import _get_instance_by_name
from launch import SHUTDOWN_MESSAGE... | 248 | 39.53 | 97 | 31 | 2,061 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2de3075a75c486c4_49e2e468", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
161
] | [
null
] | [
9
] | [
69
] | |
2024-11-19T03:10:23.368290+00:00 | 1,564,162,338,000 | 9dae93a4ef5be0fb21fbb2e0e35e8c78933c9d00 | 3 | {
"blob_id": "9dae93a4ef5be0fb21fbb2e0e35e8c78933c9d00",
"branch_name": "refs/heads/master",
"committer_date": 1564162338000,
"content_id": "a24f49a6c664340f77b8c22680e2bcc7caf92f7d",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "38344724fce505ecc1bab8b1b64fc109c492e187",
"extension": "p... | 2.546875 | stackv2 |
import base64
import io
import requests
import pandas as pd
import time
import warnings
from intake.source import base
# because Splunk connections are against a self-signed cert, all connections
# would raise a warning
from . import __version__
warnings.filterwarnings('ignore', module='urllib3.connectionpool')
cla... | 258 | 32.04 | 111 | 20 | 1,932 | python | [{"finding_id": "codeql_py/request-without-cert-validation_80200e22598fa512_867be7c1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 5 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
104,
136,
149,
159,
183
] | [
105,
138,
151,
null,
null
] | [
13,
13,
13,
13,
13
] | [
68,
45,
45,
75,
76
] | |
2024-11-19T03:10:38.182217+00:00 | 1,509,080,766,000 | c1e3e13772b169c2f5af470b16ee7387d9de554a | 2 | {
"blob_id": "c1e3e13772b169c2f5af470b16ee7387d9de554a",
"branch_name": "refs/heads/master",
"committer_date": 1509080766000,
"content_id": "caf24cd6a7d49f0acf8ad7fd7107ec8eca9435d0",
"detected_licenses": [
"MIT"
],
"directory_id": "57b92e85011218d374c4ede9c732619e481a1834",
"extension": "py",
"fi... | 2.5 | stackv2 | # Importing essentials
from flask import Flask, request
from pymessenger.bot import Bot
import os
from engine import jarvis
# Definitions
bot = Bot(os.environ['FB_ACCESS_TOKEN'])
app = Flask(__name__)
VERIFY_TOKEN = "a"
update_id = None
def craft_message(user_id, msg):
for x in msg:
if type(x) is list:... | 50 | 24.44 | 70 | 23 | 266 | python | [{"finding_id": "codeql_py/reflective-xss_85b7664d29aacbfd_0e12c45f", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
28
] | [
null
] | [
20
] | [
53
] | |
2024-11-19T03:22:41.014525+00:00 | 1,412,702,411,000 | 3d495b724fce76edf666d2f8eb3e17401f18a64d | 2 | {
"blob_id": "3d495b724fce76edf666d2f8eb3e17401f18a64d",
"branch_name": "refs/heads/master",
"committer_date": 1412702411000,
"content_id": "2dae592b61635f5708a3641c5ab49466e61094ea",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0a09d09239d9fab7914afdf856a9fd990ad25ffa",
"extension": "py"... | 2.484375 | stackv2 | """
Copyright 2014 VoterChat
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distr... | 160 | 22.64 | 79 | 18 | 900 | python | [{"finding_id": "codeql_py/stack-trace-exposure_5dc50459429f96b0_3dcc9a6d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 5 | true | [
"CWE-209",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/stack-trace-exposure",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided va... | [
49,
94,
105,
122,
139
] | [
51,
null,
null,
null,
null
] | [
28,
21,
21,
25,
21
] | [
14,
69,
74,
79,
58
] | |
2024-11-19T03:22:41.831949+00:00 | 1,612,044,547,000 | fc0bfc03daf1db31457bb02f167148ff158110f9 | 3 | {
"blob_id": "fc0bfc03daf1db31457bb02f167148ff158110f9",
"branch_name": "refs/heads/main",
"committer_date": 1612044547000,
"content_id": "c2f85d694c19760012bf1201fdc6e0cddee3ded4",
"detected_licenses": [
"MIT"
],
"directory_id": "67f7dd3cf232cbca83f55d10716b3f0fdd8792f6",
"extension": "py",
"file... | 2.625 | stackv2 | import os
from datetime import datetime
from flask import Flask, jsonify, request
from flask_sqlalchemy import SQLAlchemy
from flask_migrate import Migrate
app = Flask(__name__)
app.config["SQLALCHEMY_DATABASE_URI"] = os.environ["DATABASE_URL"]
db = SQLAlchemy(app)
migrate = Migrate(app, db)
class UsersModel(db.Mode... | 64 | 27.48 | 82 | 16 | 413 | python | [{"finding_id": "codeql_py/reflective-xss_1d2cdf9755650c91_2714883b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
47
] | [
49
] | [
20
] | [
19
] | |
2024-11-19T03:22:47.619298+00:00 | 1,512,517,650,000 | 369aed2046b61bc3ea5526a96789dc2a6d9633a4 | 3 | {
"blob_id": "369aed2046b61bc3ea5526a96789dc2a6d9633a4",
"branch_name": "refs/heads/master",
"committer_date": 1512517650000,
"content_id": "3d093c12e7baaaf70b5e9bad9515ed3920f7e1c3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "081f80a99254347b1f0f4c754df58feffe529925",
"extension": "py"... | 2.640625 | stackv2 | from flask import Flask, request, redirect, url_for, flash, send_from_directory, render_template
from werkzeug.utils import secure_filename
import os
from datetime import datetime
UPLOAD_FOLDER = os.path.join(os.path.curdir,'tempFiles')
ALLOWED_EXTENSIONS = set(['png', 'jpg', 'jpeg', 'gif'])
app = Flask(__name__)
app.... | 63 | 31.48 | 96 | 14 | 491 | python | [{"finding_id": "codeql_py/reflective-xss_f07c1abd936d51cb_740cf638", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 5 | true | [
"CWE-079",
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-022"
] | [
"py/reflective-xss",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"This path depends on a [user-p... | [
49,
34,
37,
43,
48
] | [
51,
null,
null,
null,
null
] | [
16,
25,
25,
25,
19
] | [
19,
36,
36,
36,
23
] | |
2024-11-19T01:34:44.203555+00:00 | 1,601,220,265,000 | c70526ef7520bb2c3145c10f31049b996d9d9fed | 2 | {
"blob_id": "c70526ef7520bb2c3145c10f31049b996d9d9fed",
"branch_name": "refs/heads/master",
"committer_date": 1601220265000,
"content_id": "b57067e89124d6ccc0dcd2687818a299fe06c069",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a732c0a1aec26a281107dfb63118074b85202013",
"extension": "py"... | 2.453125 | stackv2 | import string
import random
from abc import ABC
from flask import Flask, request, jsonify, views
from backend.response.dispatcher import RequestDispatcher
from backend.utils import ConfigParser
import os
import base64
from orm import History
import hashlib
class WebHandler:
dispatcher = None
history_path = {... | 94 | 38.97 | 121 | 19 | 819 | python | [{"finding_id": "codeql_py/path-injection_a3d6ff03af209ca5_e9288498", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
42,
69
] | [
null,
null
] | [
31,
23
] | [
44,
32
] | |
2024-11-19T01:34:55.600866+00:00 | 1,693,249,660,000 | 4b85b5d531b5cffba4312c010a41ba01d9d7f38b | 3 | {
"blob_id": "4b85b5d531b5cffba4312c010a41ba01d9d7f38b",
"branch_name": "refs/heads/master",
"committer_date": 1693249660000,
"content_id": "c68fa6a9c459c2ac279e82c816c881f51bb2c77b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "83f266cf772fae61ce532107712672732058a170",
"extension": "py"... | 3.03125 | stackv2 | #!/usr/bin/env python3
# This is a simple script that grabs all the cluster nodes and associates them
# with a given MCD pod and outputs their roles. There is probably an easier way
# to do this that I am too naïve to be aware of :). Running this script yields
# the following output:
#
# Current MCD Pods:
# machine-co... | 98 | 31.51 | 115 | 15 | 865 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_93a297a8c62da3c8_d506d78c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [node-role.kubernetes.io](1) may be at an arbitrary pos... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [node-role.kubernetes.io](1) may be at an arbitrary position in the sanitized URL."
] | [
85
] | [
null
] | [
20
] | [
54
] | |
2024-11-19T01:35:08.517938+00:00 | 1,513,681,759,000 | 7c042d52d378a944ef7c6f9111e39845259f8c37 | 3 | {
"blob_id": "7c042d52d378a944ef7c6f9111e39845259f8c37",
"branch_name": "refs/heads/master",
"committer_date": 1513681759000,
"content_id": "65401021321f07e82f6dfc02171861e186a41f90",
"detected_licenses": [
"MIT"
],
"directory_id": "08d362a6ae6b88b701367695e04c6591c2eac599",
"extension": "py",
"fi... | 2.96875 | stackv2 | import json
import requests
# Disable security request warning
from requests.packages.urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
""" Order 2: Login system by https
This is the code which use curl to login system
```
curl -k https://192.168.105.... | 39 | 27.44 | 105 | 13 | 285 | python | [{"finding_id": "codeql_py/request-without-cert-validation_7c17cfaeeb015714_a74ecb8b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
32
] | [
null
] | [
20
] | [
106
] | |
2024-11-19T02:19:00.181729+00:00 | 1,614,686,284,000 | 05b5087912bff8607eac8b10f5a3aa11a3888b10 | 2 | {
"blob_id": "05b5087912bff8607eac8b10f5a3aa11a3888b10",
"branch_name": "refs/heads/master",
"committer_date": 1614686284000,
"content_id": "b4fc6f319269b4e949940775d1cec3426aa7350a",
"detected_licenses": [
"MIT"
],
"directory_id": "fcdc0cee9f4ba13092fb9c0f3dec3cb00877fde2",
"extension": "py",
"fi... | 2.453125 | stackv2 | import shutil
from flask import (
Blueprint, flash, g, redirect, render_template, request, url_for
)
from werkzeug.exceptions import abort
from flaskr.auth import login_required, allowed_file
from flaskr.db import get_db
from markdown import Markdown
from config import POST_PATH
from config import DEFAULT_POST_PAT... | 159 | 28.63 | 117 | 19 | 1,097 | python | [{"finding_id": "codeql_py/url-redirection_a033fc6225b3ba78_63905e6f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
145
] | [
null
] | [
29
] | [
40
] | |
2024-11-19T02:30:05.999538+00:00 | 1,604,793,720,000 | fb27d7df012bdbfb83bac265ea6a5c800b982532 | 4 | {
"blob_id": "fb27d7df012bdbfb83bac265ea6a5c800b982532",
"branch_name": "refs/heads/main",
"committer_date": 1604793720000,
"content_id": "32e7f8c474d4c96ebf7d0608f08d49784e325349",
"detected_licenses": [
"MIT"
],
"directory_id": "96cb1997a3fa6cf24bed3a78878c0fe73e93d748",
"extension": "py",
"file... | 4.15625 | stackv2 |
import string
from random import randrange
# Default values for this function are a lenght of 7 chars for the password and an alphabeth of ASCII letters and numbers.
def password_gen(id_lenght = 7, alphabet = string.ascii_letters + string.digits):
id_list = []
# for the default alphabet this function will i... | 51 | 31.75 | 124 | 13 | 408 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8bbdfe5ca52b61e8_1106b2af", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
35,
40,
45,
51
] | [
null,
null,
null,
null
] | [
7,
7,
7,
7
] | [
57,
73,
78,
101
] | |
2024-11-19T02:30:11.358527+00:00 | 1,518,551,099,000 | fe2a82faa35fede006d4cea4e052cd1b0361c514 | 3 | {
"blob_id": "fe2a82faa35fede006d4cea4e052cd1b0361c514",
"branch_name": "refs/heads/master",
"committer_date": 1518551099000,
"content_id": "ed05cd00b24ca2219805fc1e65a86889956eee42",
"detected_licenses": [
"MIT"
],
"directory_id": "d29474c329840c12a86a8b86763ed3befcd6fe8b",
"extension": "py",
"fi... | 3.21875 | stackv2 | from flask import Flask # import the Flask class
app = Flask(__name__) # Instantiate the Flask class to use the flask application
@app.route('/user/<username>') # Has default string converter which accepts strings without slashes.
def show_user_profile(username):
return 'User is %s' % username
@app.route('/post/<i... | 35 | 37.17 | 114 | 8 | 337 | python | [{"finding_id": "codeql_py/reflective-xss_3f5135a43f46331d_b7bae055", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 5 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scri... | [
7,
11,
15,
19,
23
] | [
null,
null,
null,
null,
null
] | [
9,
9,
9,
9,
9
] | [
32,
34,
45,
35,
29
] | |
2024-11-19T02:30:15.522540+00:00 | 1,572,143,636,000 | cfe359d4cb3de89ada6d0c7534a73d0c6a14cf6c | 2 | {
"blob_id": "cfe359d4cb3de89ada6d0c7534a73d0c6a14cf6c",
"branch_name": "refs/heads/master",
"committer_date": 1572143636000,
"content_id": "5303029e5e096601f0d1cd01994fd7d11d361f20",
"detected_licenses": [
"MIT"
],
"directory_id": "f247bd4562ec3d9b831da4e0a22d922ba542712f",
"extension": "py",
"fi... | 2.390625 | stackv2 | from reminders.airtable_client import AirtableClient
from reminders.reminders_sheet import RemindersSheet
from reminders.task import Task
from reminders.ses_mailer import send_email
from jinja2 import Template
import os
import settings
import json
import logging
logger = logging.getLogger()
logger.setLevel(logging.INF... | 67 | 28.69 | 105 | 15 | 457 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e4485901bbadcbd2_46ddcebb", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
35,
49
] | [
null,
null
] | [
24,
24
] | [
42,
42
] | |
2024-11-19T02:30:29.651951+00:00 | 1,685,035,030,000 | 18a616ea1f6069777d404463858f657b970a3faa | 3 | {
"blob_id": "18a616ea1f6069777d404463858f657b970a3faa",
"branch_name": "refs/heads/main",
"committer_date": 1685035030000,
"content_id": "7378f59e4d6bf666fe90ddf06fabfac6b740dc82",
"detected_licenses": [
"MIT"
],
"directory_id": "57adfd30d44dcec446e55306265b68ee08b51655",
"extension": "py",
"file... | 2.828125 | stackv2 | #!/usr/bin/env python3
import dropbox
from dropbox import DropboxOAuth2FlowNoRedirect
'''
It goes through an example of requesting a starting scope,
and requesting more throughout the process
'''
APP_KEY = ""
APP_SECRET = ""
auth_flow = DropboxOAuth2FlowNoRedirect(APP_KEY,
con... | 85 | 38.21 | 93 | 10 | 689 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d7da646aa8fbfb2b_29428b65", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
68
] | [
null
] | [
11
] | [
23
] | |
2024-11-19T02:41:44.674893+00:00 | 1,470,587,181,000 | c91f2a47b4050d468dc3201ae5021cdda96e6621 | 3 | {
"blob_id": "c91f2a47b4050d468dc3201ae5021cdda96e6621",
"branch_name": "refs/heads/master",
"committer_date": 1470587181000,
"content_id": "51ef182639c5bc18e0ac9b9d765d1c86059fcbc8",
"detected_licenses": [
"MIT"
],
"directory_id": "9f2673381c4b3f8063b6767ff066ab3851b3f618",
"extension": "py",
"fi... | 2.546875 | stackv2 | from subprocess import Popen
import time
from flask import Flask, jsonify, render_template
from flask import request
from base64 import b16encode
import os
import shutil
# Import the fixer
from werkzeug.contrib.fixers import ProxyFix
app = Flask(__name__)
# Use the fixer
app.wsgi_app = ProxyFix(app.wsgi_app)
# F... | 150 | 35.07 | 113 | 20 | 1,324 | python | [{"finding_id": "codeql_py/overly-permissive-file_8eaf553413e712b6_59db5c1b", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable."
] | [
123,
128
] | [
null,
null
] | [
5,
5
] | [
35,
57
] | |
2024-11-19T02:41:52.352673+00:00 | 1,567,049,280,000 | 2badf4550a00e1b266260c94a6ba946a4ff232ee | 3 | {
"blob_id": "2badf4550a00e1b266260c94a6ba946a4ff232ee",
"branch_name": "refs/heads/master",
"committer_date": 1567049280000,
"content_id": "006183fd0ec8dd39d294d03adc566bbedabce4d0",
"detected_licenses": [
"MIT"
],
"directory_id": "02b835f009df472b982121e60a207cb07fe1290e",
"extension": "py",
"fi... | 2.578125 | stackv2 | #!/usr/bin/python3
# -*- coding: utf-8 -*-
"""
This script populates the flicket database with randomly generated text.
Run calling python populate_database_with_junk.py.
"""
import datetime
from random import randint
from mimesis import Person, Text
from application import db
from application.flicket.models.flicke... | 181 | 28.14 | 92 | 16 | 1,201 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_22aad3e7ef21f64d_7225dc94", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
110
] | [
null
] | [
19
] | [
82
] | |
2024-11-19T02:42:21.193787+00:00 | 1,691,505,383,000 | 41968126e3ce3daa1cfde2fc201d63ac28509882 | 2 | {
"blob_id": "41968126e3ce3daa1cfde2fc201d63ac28509882",
"branch_name": "refs/heads/master",
"committer_date": 1691505383000,
"content_id": "a78429caa24c0e8ef84616bb8574490dd32b8939",
"detected_licenses": [],
"directory_id": "abbf6a11c0590f6e5b7327e6f6df5a6c71af891d",
"extension": "py",
"filename": "log... | 2.421875 | stackv2 | # pylint: disable=missing-class-docstring,missing-function-docstring
"""Authenticate a user."""
from __future__ import unicode_literals
import getpass
import logging
import platform
import socket
import sys
from six.moves import input
from six.moves.urllib.parse import urlparse
from binstar_client import errors
fr... | 142 | 34.73 | 116 | 19 | 1,022 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_f30ed3136a52bde7_baa6a871", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [api.anaconda.org](1) may be at an arbitrary position i... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [api.anaconda.org](1) may be at an arbitrary position in the sanitized URL."
] | [
111
] | [
null
] | [
16
] | [
64
] | |
2024-11-18T18:05:48.129850+00:00 | 1,582,784,455,000 | 0058182584be0256663898a22447cb051dcd4ba0 | 4 | {
"blob_id": "0058182584be0256663898a22447cb051dcd4ba0",
"branch_name": "refs/heads/master",
"committer_date": 1582784455000,
"content_id": "d24d21b0a3bfec73b64cb57b7b4efc1ca97fa549",
"detected_licenses": [
"MIT"
],
"directory_id": "6966d64ce65e71c28ca4b2193491ed841f54b029",
"extension": "py",
"fi... | 3.5625 | stackv2 | from os import system
def clear_console():
system('clear')
print("Bienvenido al Ahorcado!!!")
print("Comencemos!")
print("Presiona cualquier tecla para continuar...")
input()
palabra_secreta = 'GERARDO'
letras_correctas = []
oportunidades = 10
restantes = []
for letra in palabra_secreta:
if letra not in resta... | 50 | 22.98 | 61 | 14 | 330 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7ec7a0274320de93_41a533c4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
22
] | [
null
] | [
19
] | [
24
] | |
2024-11-18T18:05:50.388020+00:00 | 1,550,471,205,000 | 2c0c9fb789e5b5478699d30c8cbd51e5d0aa0730 | 4 | {
"blob_id": "2c0c9fb789e5b5478699d30c8cbd51e5d0aa0730",
"branch_name": "refs/heads/master",
"committer_date": 1550471205000,
"content_id": "3710e87223156d62f34fbe08abba97c906105bcc",
"detected_licenses": [
"MIT"
],
"directory_id": "592e60cf86d688dc574fdaafa93474f3daf7bb3a",
"extension": "py",
"fi... | 3.515625 | stackv2 | #!/usr/local/bin/python3
# -*- coding: utf-8 -*-
import random
import argparse
from .stuff import word_set
__version__ = "1.2.0"
SPECIALS = {"!", "@", "#", "$", "%", "^", "&", "*", "("}
NUMS = set(range(1, 1000))
DEFAULT_DELIMITER = "-"
DEFAULT_NUM_WORDS = 3
def create_parser():
""" Create argparse object for th... | 92 | 23.59 | 66 | 13 | 539 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9250d35b18a83fd9_ca9a17a6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
92
] | [
null
] | [
11
] | [
43
] | |
2024-11-18T18:05:58.482083+00:00 | 1,572,341,728,000 | 842431153045104d1f2cc39b462f5b6d1f3eb532 | 3 | {
"blob_id": "842431153045104d1f2cc39b462f5b6d1f3eb532",
"branch_name": "refs/heads/master",
"committer_date": 1572341728000,
"content_id": "14b9f76fe8d962899b683d852095d397bb4bc5ba",
"detected_licenses": [
"MIT"
],
"directory_id": "628f65b2a81ee788179e6b7de34dadd0819b61be",
"extension": "py",
"fi... | 2.640625 | stackv2 | #This is the library for the web scraper PHist 1.1
import requests, codecs, json, datetime
import robotexclusionrulesparser
from urllib.parse import urljoin, urlparse
from bs4 import BeautifulSoup
from collections import OrderedDict
import scraper_globals as sg
#Getting the seed links and cleaning them up a bit
de... | 331 | 31.44 | 111 | 20 | 2,731 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_48124be42caddffc_5b48ad14", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [livejournal.com](1) may be at an arbitrary position in... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [livejournal.com](1) may be at an arbitrary position in the sanitized URL."
] | [
180
] | [
null
] | [
10
] | [
34
] | |
2024-11-18T18:05:59.888732+00:00 | 1,605,028,641,000 | 423f60fdb4e4628fe7cfe96fc1d7efb2c4194796 | 4 | {
"blob_id": "423f60fdb4e4628fe7cfe96fc1d7efb2c4194796",
"branch_name": "refs/heads/main",
"committer_date": 1605028641000,
"content_id": "ceca013ce175a7578959b03767ae50ef6fcde610",
"detected_licenses": [
"MIT"
],
"directory_id": "49e33742e54dec1c0cce2f698550ada71b85237f",
"extension": "py",
"file... | 3.859375 | stackv2 |
class CreditCard():
def __init__(self, numcode, cvv, expiredate):
self.numcode = numcode
self.expiredate = expiredate
self.cvv = cvv
def __str__(self):
return "Number Code: {} | CVV: {} | Expire Date: {}".format(self.numcode, self.cvv, self.expiredate)
def code_ch... | 59 | 27.12 | 112 | 17 | 400 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e802a8221d1afa74_84d462f2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
52
] | [
null
] | [
11
] | [
16
] | |
2024-11-18T18:06:04.427874+00:00 | 1,678,871,215,000 | bae61eaa2c1cc330ab82d74b39e1dcb8b792be09 | 3 | {
"blob_id": "bae61eaa2c1cc330ab82d74b39e1dcb8b792be09",
"branch_name": "refs/heads/master",
"committer_date": 1678871215000,
"content_id": "f869231d18037b11f4b4ddda6c5fec8b26be49ad",
"detected_licenses": [
"MIT"
],
"directory_id": "90edd7f110d41042b5c0eb2a190835c2dbea5f4c",
"extension": "py",
"fi... | 2.578125 | stackv2 | #!/usr/bin/python
import functools
import jinja2
import json
import argparse
import os
import requests
import tempfile
import yaml
class NameItem:
def __init__( self, name ):
self.name = name
self.index = -1
if name.endswith( ']' ):
pos = name.rfind('[' )
if pos != ... | 175 | 34.06 | 107 | 20 | 1,382 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2b18bd9a69b921b8_35727a65", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
136
] | [
null
] | [
19
] | [
62
] | |
2024-11-18T19:31:07.936075+00:00 | 1,576,510,815,000 | 3dc0cd86a033ef8b9426137f73bb09e75c349123 | 3 | {
"blob_id": "3dc0cd86a033ef8b9426137f73bb09e75c349123",
"branch_name": "refs/heads/master",
"committer_date": 1576510815000,
"content_id": "7132f90ae07437069fd935d1e9b7bca89c6a5eef",
"detected_licenses": [
"MIT"
],
"directory_id": "516450c4f4d8262037cbf898bfc02034c8a36f8f",
"extension": "py",
"fi... | 2.515625 | stackv2 | # -*- coding:utf-8 -*-
from lxml import etree
import urllib
import os
import requests
def getHtml(url):
html = requests.get(url).content
selector = etree.HTML(html)
return selector
def getContent(htm, xpathStr):
selector = htm
content = selector.xpath(xpathStr)
return content
def getPath(titl... | 91 | 26.4 | 90 | 13 | 741 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_80522f7b5c99a06c_dda73eaf", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://mov.bn.netease.com/](1) may be at an arbitrary ... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [http://mov.bn.netease.com/](1) may be at an arbitrary position in the sanitized URL.",
"The string [//open.163.com/](1) may be at an arbitrary position in the sanitized URL."
] | [
76,
89
] | [
null,
null
] | [
12,
8
] | [
47,
33
] | |
2024-11-18T18:59:39.045343+00:00 | 1,675,884,890,000 | ea6e84ef564f30e5cdf6afcc0a91879c5efb2f1c | 3 | {
"blob_id": "ea6e84ef564f30e5cdf6afcc0a91879c5efb2f1c",
"branch_name": "refs/heads/master",
"committer_date": 1675884890000,
"content_id": "f099de75e0bf747fcf0d7f4f836ee3cdba924dca",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "30b06187f8c6f30de84b8a93f24bce5562afa947",
"extension": "py"... | 3.046875 | stackv2 | import json
import requests
def config_snmp_hosts(baseurl, snmphosts, cookie_header):
"""
This function configure SNMP hosts
:param baseurl: The resource URL for the device, in String format.
:param cookie_header: The login cookie for the session.
:param snmphosts: snmp hosts parsed from yaml fil... | 129 | 42.43 | 116 | 14 | 1,274 | python | [{"finding_id": "codeql_py/request-without-cert-validation_a9b08cc72270e71c_0605228a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 6 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
16,
35,
53,
76,
104,
125
] | [
null,
null,
null,
null,
null,
null
] | [
16,
16,
16,
16,
16,
16
] | [
93,
91,
64,
88,
87,
90
] | |
2024-11-18T18:59:39.829923+00:00 | 1,408,922,569,000 | a57f25646918b8f8e4662f58f4e756e055c02d05 | 3 | {
"blob_id": "a57f25646918b8f8e4662f58f4e756e055c02d05",
"branch_name": "refs/heads/master",
"committer_date": 1408922569000,
"content_id": "0005dad77a2d586a77683ecd71d680f8a64cada5",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "23454ba9036679aa44a48eb3514aad285b5e0567",
"extension": "p... | 2.640625 | stackv2 | from flask import Flask, render_template, redirect, url_for, request, flash
from sqlalchemy import Column, Integer, String, ForeignKey, Text, DateTime
from flask.ext.sqlalchemy import SQLAlchemy
from flask.ext import wtf
from flask.ext.login import LoginManager, login_required, UserMixin, login_user, logout_user
from d... | 174 | 27.38 | 96 | 16 | 1,130 | python | [{"finding_id": "codeql_py/url-redirection_d06d96d6cdac02dc_4e0d650e", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
57
] | [
null
] | [
29
] | [
75
] | |
2024-11-18T18:59:40.495688+00:00 | 1,566,519,991,000 | d76d9e0a03949e847e69f6703769cbf56b37c6e6 | 2 | {
"blob_id": "d76d9e0a03949e847e69f6703769cbf56b37c6e6",
"branch_name": "refs/heads/master",
"committer_date": 1566519991000,
"content_id": "a23aff835593c3e0293c0e8612c0427bf33e5b71",
"detected_licenses": [
"MIT"
],
"directory_id": "a45c70447c4feec31402a39b4dcf79d6a6116e19",
"extension": "py",
"fi... | 2.5 | stackv2 | import os
import re
import shutil
import zipfile
reg = "[a-zA-z0-9]{1,}\d{1,2}\.(?:in|out)"
reg = re.compile(reg)
ma = "\d{1,2}"
mareg = re.compile(ma)
tireg = "[a-zA-z]{1,}\d{1}"
tireg = re.compile(tireg)
curpath = os.getcwd()
curpathfile = os.listdir(os.getcwd())
#print(os.path.join(curpath, 'input'))
mp = {}
titl... | 115 | 28.77 | 126 | 23 | 1,057 | python | [{"finding_id": "codeql_py/overly-large-range_659c5e3177146da8_32fed3d4", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
7,
11
] | [
null,
null
] | [
12,
14
] | [
15,
17
] | |
2024-11-18T19:11:52.024681+00:00 | 1,361,948,729,000 | 336d68d5275e11f19e2c74f4072061f223332b2b | 3 | {
"blob_id": "336d68d5275e11f19e2c74f4072061f223332b2b",
"branch_name": "refs/heads/master",
"committer_date": 1361948729000,
"content_id": "97b146193504fe1747dfe63303398c8aecfb433f",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "564a8418523753f091ade4b7e125f44840de0dac",
"extension": "p... | 2.890625 | stackv2 | #!/usr/bin/python
import string, os
class TemplateFile():
def __init__(self, path, fname, outpath, outfname ):
self.fname = fname
self.outfname = outfname
self.path = path
self.outpath = outpath
# prepare the output file from keywords in 'kw_list'
def prepare_file(self, k... | 40 | 25.77 | 73 | 19 | 258 | python | [{"finding_id": "codeql_py/overly-permissive-file_4b6e72e96979029b_c7d28f0b", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
28
] | [
null
] | [
13
] | [
42
] | |
2024-11-18T19:58:20.677075+00:00 | 1,625,815,141,000 | 0ef6ed11031e3dd41879fb16111c68d5fe23f4c7 | 3 | {
"blob_id": "0ef6ed11031e3dd41879fb16111c68d5fe23f4c7",
"branch_name": "refs/heads/main",
"committer_date": 1625815141000,
"content_id": "1cfa9912c6d5d0a0715f9dd1fb2068f1788f7860",
"detected_licenses": [
"MIT"
],
"directory_id": "b06ade75c08f2114699002e34ce693faaa8f78ba",
"extension": "py",
"file... | 2.75 | stackv2 | #! /usr/bin/env python
"""
A Flask app for Google SSO
"""
import json
import requests
from flask import Flask, redirect, request
from oauthlib import oauth2
import conf
CLIENT_ID = conf.CLIENT_ID
CLIENT_SECRET = conf.CLIENT_SECRET
DATA = {
'response_type':"code",
'redirect_uri':"https://localhost:50... | 89 | 26.81 | 73 | 12 | 574 | python | [{"finding_id": "codeql_py/flask-debug_d08e097a5306cbb1_aa0f39dc", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
89,
86
] | [
null,
null
] | [
5,
12
] | [
56,
29
] | |
2024-11-18T19:58:35.074008+00:00 | 1,634,386,484,000 | 29287109cd8777d62540bb417c290bf111f126c6 | 3 | {
"blob_id": "29287109cd8777d62540bb417c290bf111f126c6",
"branch_name": "refs/heads/main",
"committer_date": 1634386484000,
"content_id": "8573b9a4fac6662128a4dbad446eaa58684f6402",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "453e32528bf94b3be730b7c30368e5623e46bc31",
"extension": "py",
... | 2.515625 | stackv2 | """Usage
$ python inference.py --data_dir data \
--model_dir model \
--output_dir output \
[args..]
"""
import argparse
import logging
import os
import tarfile
import torch
from dataset import KlueReDataLoader
from transformers import AutoModelForSequen... | 158 | 27.53 | 92 | 21 | 1,032 | python | [{"finding_id": "codeql_py/tarslip_76fd03f058bd5e88_7e68a961", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
34
] | [
null
] | [
5
] | [
8
] | |
2024-11-18T19:58:37.490317+00:00 | 1,634,911,534,000 | c8f7ca60ce53fce0385977f2421e9dd3b21565e0 | 3 | {
"blob_id": "c8f7ca60ce53fce0385977f2421e9dd3b21565e0",
"branch_name": "refs/heads/master",
"committer_date": 1634911534000,
"content_id": "1d0dd60d4272ba4fffb9ef260c81b257a818ae2f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "810eecb9e19d18a7cd3dbfcdf9d534a72253d59d",
"extension": "py"... | 2.53125 | stackv2 | # -*- coding: utf-8 -*-
import copy
import json
import os
from jinja2 import Template
from texttable import Texttable
from elastalert.util import EAException, lookup_es_key
from elastalert.yaml import read_yaml
from collections import Counter
class DateTimeEncoder(json.JSONEncoder):
def default(self, obj):
... | 327 | 43.75 | 124 | 21 | 2,995 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a520f68308c01e96_0c3bbd86", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
216
] | [
null
] | [
30
] | [
79
] | |
2024-11-18T19:58:37.716240+00:00 | 1,547,086,060,000 | a620f973fec2c608bb609e8c07a46c3004df1815 | 3 | {
"blob_id": "a620f973fec2c608bb609e8c07a46c3004df1815",
"branch_name": "refs/heads/master",
"committer_date": 1547086060000,
"content_id": "f46da3dde1027e2b0d5dd86dd7b34f8d926a317a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ccd1946cf254671326a16139e5ebb405d1570f3e",
"extension": "py"... | 2.546875 | stackv2 | from ..config import mkdir_p
import os
import urllib.request, urllib.error, urllib.parse
import errno
import tarfile
def temp_directory():
path = os.path.expanduser('~/.scanner/resources')
mkdir_p(path)
return path
def download_temp_file(url, local_path=None, untar=False):
if local_path is None:
... | 36 | 26.69 | 68 | 15 | 238 | python | [{"finding_id": "codeql_py/tarslip_22fd06a19d0c890c_f07a96ab", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
26
] | [
null
] | [
17
] | [
22
] | |
2024-11-18T18:39:31.020032+00:00 | 1,446,321,714,000 | 98bc0494c14efd97de32a8b29cfe1664761e43f3 | 3 | {
"blob_id": "98bc0494c14efd97de32a8b29cfe1664761e43f3",
"branch_name": "refs/heads/master",
"committer_date": 1446321714000,
"content_id": "3e731ec4407e53b0afc98a651b7d69fc13da68f4",
"detected_licenses": [
"Artistic-2.0"
],
"directory_id": "68add5002662e0990bec030de343c915b35e6991",
"extension": "p... | 2.96875 | stackv2 | """
Flask web app connects to Mongo database.
Keep a simple list of dated memoranda.
Representation conventions for dates:
- In the session object, date or datetimes are represented as
ISO format strings in UTC. Unless otherwise specified, this
is the format passed around internally. Note that ordering
o... | 227 | 23.99 | 89 | 15 | 1,409 | python | [{"finding_id": "codeql_py/log-injection_f99fa5b25a545cb4_10139cdf", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
94,
106
] | [
null,
null
] | [
19,
19
] | [
67,
36
] | |
2024-11-18T18:39:37.233369+00:00 | 1,625,104,339,000 | c7beb885f794999371b71f0821be43268f824097 | 2 | {
"blob_id": "c7beb885f794999371b71f0821be43268f824097",
"branch_name": "refs/heads/master",
"committer_date": 1625104339000,
"content_id": "4adb68b96fc7f1ad5d442e5a1cdf0337cd0fcc7e",
"detected_licenses": [
"MIT"
],
"directory_id": "6d7afcf7d9d590c2d3f55ca0298673f03f7d8cc8",
"extension": "py",
"fi... | 2.359375 | stackv2 | from random_user_agent.params import SoftwareName, HardwareType
from random_user_agent.user_agent import UserAgent
from fp.fp import FreeProxy
import requests as rq
import urllib3
from datetime import datetime
import time
import json
import logging
import dotenv
logging.basicConfig(filename='Shopifylog.log', filem... | 239 | 30.15 | 123 | 21 | 1,551 | python | [{"finding_id": "codeql_py/request-without-cert-validation_2cd3c979dee25190_8636bf67", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
46
] | [
null
] | [
16
] | [
112
] | |
2024-11-18T18:39:43.419049+00:00 | 1,509,322,271,000 | d5aaa045f341768bb156117230351fe7bf0e6a59 | 3 | {
"blob_id": "d5aaa045f341768bb156117230351fe7bf0e6a59",
"branch_name": "refs/heads/master",
"committer_date": 1509322271000,
"content_id": "58dfbdf20c5da4625f6d1c57342dbdf545ed8c3c",
"detected_licenses": [
"MIT"
],
"directory_id": "0df877527f76b1a7ecf6391365eb30e5d26499ae",
"extension": "py",
"fi... | 2.734375 | stackv2 | from flask import Flask
app = Flask(__name__)
import os
@app.route("/gpio<number>/export")
def gpioExport(number):
cmd = 'echo {} > /sys/class/gpio/export'.format(number)
os.system(cmd)
return "gpio{} exported".format(number)
@app.route("/gpio<number>/unexport")
def gpioUnexport(number):
cmd = 'echo {} > /sys/cl... | 46 | 28.67 | 77 | 11 | 337 | python | [{"finding_id": "codeql_py/command-line-injection_c9d0cc978b3d0395_617d6c42", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 12 | true | [
"CWE-078",
"CWE-078",
"CWE-078",
"CWE-078",
"CWE-078",
"CWE-078",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/command-line-injection",
"py/command-line-injection",
"py/command-line-injection",
"py/command-line-injection",
"py/command-line-injection",
"py/command-line-injection",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This command line depends on a [user-provided value](1).",
"This command line depends on a [user-provided value](1).",
"This command line depends on a [user-provided value](1).\nThis command line depends on a [user-provided value](2).",
"This comm... | [
9,
15,
22,
28,
35,
41,
10,
16,
23,
29,
36,
42
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
12,
12,
23,
12,
19,
12,
9,
9,
9,
9,
9,
9
] | [
15,
15,
26,
15,
22,
15,
41,
43,
59,
60,
51,
52
] | |
2024-11-18T18:39:59.360024+00:00 | 1,575,624,771,000 | 8ec571fbe2b777a143fdbb803fbcab7e174fb68c | 2 | {
"blob_id": "8ec571fbe2b777a143fdbb803fbcab7e174fb68c",
"branch_name": "refs/heads/master",
"committer_date": 1575625981000,
"content_id": "cf92379586745b51a1064f8dd2e677ac21f8c414",
"detected_licenses": [
"MIT"
],
"directory_id": "b3dfb9bbfc6c1d93eee075794a9465a6ae278d73",
"extension": "py",
"fi... | 2.484375 | stackv2 | from os.path import join, expanduser, isfile
from os import makedirs, chmod
import json
from qsm import lib
class QsmInvalidConfigOptionError(Exception):
"""
Raised when an invalid config option is used.
"""
pass
def init(config_dir=join(expanduser("~"), ".qsm")):
config_file = join(config_dir, ... | 42 | 30.24 | 99 | 15 | 331 | python | [{"finding_id": "codeql_py/overly-permissive-file_680a772826f0698d_0f47a61f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to group readable."
] | [
31
] | [
null
] | [
13
] | [
38
] | |
2024-11-18T18:47:01.649824+00:00 | 1,602,081,530,000 | 82142f4ea6aaf69bfdf72ec80d120ceff2836fe5 | 2 | {
"blob_id": "82142f4ea6aaf69bfdf72ec80d120ceff2836fe5",
"branch_name": "refs/heads/main",
"committer_date": 1602081530000,
"content_id": "7232e84945a31fe7a4d7717e1b4cd888490b51e9",
"detected_licenses": [
"MIT"
],
"directory_id": "4252f8147c8044ba3dd70b1986512e96f83568f3",
"extension": "py",
"file... | 2.453125 | stackv2 | #!/usr/bin/env python3
# Note: pip install requests
import json, requests
from requests_ntlm import HttpNtlmAuth
from datetime import datetime, timedelta
from dateutil import tz
# == Settings ==
# This is just a sample! Arguments below in the endpoint call has to be modified accordingly!
# Authe... | 98 | 35.09 | 158 | 17 | 848 | python | [{"finding_id": "codeql_py/request-without-cert-validation_a855680867631c9c_0502fdaf", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
35
] | [
null
] | [
24
] | [
123
] | |
2024-11-18T20:58:16.518721+00:00 | 1,616,133,316,000 | 2cdaf8ca52aff0a666e44cafd6c113ae1338314b | 3 | {
"blob_id": "2cdaf8ca52aff0a666e44cafd6c113ae1338314b",
"branch_name": "refs/heads/master",
"committer_date": 1616133316000,
"content_id": "9970d1cb68c171c7a3c59fa7692f61ebfcfd75bb",
"detected_licenses": [
"MIT"
],
"directory_id": "fd2965d30b61567052738888079f174937d31fd8",
"extension": "py",
"fi... | 2.515625 | stackv2 | from hashlib import sha256
import os
from authentication import AuthenticationService
from models import Product, User
from definition import app, engine
app.define(models=[User, Product], engine=engine)
@app.route(methods=['GET'], path='/')
def home(request, *args, **kwargs):
return {
'status': 200,
... | 221 | 23.81 | 92 | 20 | 1,326 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_ca7350bbb937fb75_f73db10a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
38,
71
] | [
null,
null
] | [
29,
43
] | [
65,
79
] | |
2024-11-18T20:58:19.484500+00:00 | 1,619,117,351,000 | 583cf186a42361e2b870812c2975f2f8ce7b2a16 | 4 | {
"blob_id": "583cf186a42361e2b870812c2975f2f8ce7b2a16",
"branch_name": "refs/heads/main",
"committer_date": 1619117351000,
"content_id": "b6e04448849df93580ce9a1c04b5209131beb766",
"detected_licenses": [
"MIT"
],
"directory_id": "a884039e1a8b0ab516b80c2186e0e3bad28d5147",
"extension": "py",
"file... | 3.609375 | stackv2 | # Program: Algoritmo325_Enq63.py
# Author: Ramon R. Valeriano
# Description:
# Developed: 14/04/2020 - 19:42
# Updated:
sum_worked = 0
worked_hours = 0
while True:
minium_salary = float(input("Enter with the value of the minimum salary: "))
if minium_salary < 0:
break
while worked_hours > -1:
... | 43 | 26.05 | 81 | 13 | 362 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_be3b6ea0cb92c0a4_9bd174b7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
42
] | [
null
] | [
11
] | [
17
] | |
2024-11-18T19:49:12.275875+00:00 | 1,544,263,385,000 | a3a3784a8bdb530fc83fd8b654baf43d99a02c35 | 2 | {
"blob_id": "a3a3784a8bdb530fc83fd8b654baf43d99a02c35",
"branch_name": "refs/heads/master",
"committer_date": 1544263385000,
"content_id": "5835f20c17c045f05f92be89668ba852086497e7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3c8c40f9f9d2d5e41c6042c8c2f10ae9612cdaec",
"extension": "py"... | 2.453125 | stackv2 | #لانشاء نماذج مخصوصة
from django.forms import ModelForm
#جلب الكلاس المراد التعديل عليه
from .models import SignUp
#كلاس التعديل
#وإظهار حقل واحد أو اثنين
class SignUpForm(ModelForm):
class Meta:
model = SignUp
fields = ['Email','fullName','BirthDate']
#25 Python Web Django Forms and Va... | 20 | 26.2 | 71 | 14 | 133 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_251867d1ce641bd4_8cc24fa2", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [gmail.com](1) may be at an arbitrary position in the s... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [gmail.com](1) may be at an arbitrary position in the sanitized URL."
] | [
18
] | [
null
] | [
18
] | [
38
] | |
2024-11-18T19:49:15.987440+00:00 | 1,576,069,325,000 | 37faf5e43422ac49452fc893d70e71914417e890 | 2 | {
"blob_id": "37faf5e43422ac49452fc893d70e71914417e890",
"branch_name": "refs/heads/master",
"committer_date": 1634673426000,
"content_id": "887e10600becfd1a07ffebdc5a19a959246ef8e0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b2d3e60bc4d5d2e10477bb667c1d24ea12f79985",
"extension": "py"... | 2.484375 | stackv2 | from glob import glob
from os import getcwd
import falcon
from jinja2 import Template
app = falcon.App()
dir = getcwd()
def get_files():
files = []
for i in ('*.png', '*.jpg', '*.jpeg'):
files.extend(glob(f"images/{i}"))
return sorted(files)
class HTML(object):
def on_get(self, req, resp):... | 39 | 24.33 | 55 | 15 | 251 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5f5edc5434203278_7f8c3168", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
21,
30
] | [
null,
null
] | [
17,
17
] | [
35,
35
] | |
2024-11-18T19:38:19.385628+00:00 | 1,669,983,054,000 | 9d16b46fbfb322db7de2b5fcaeda4a77874d2991 | 2 | {
"blob_id": "9d16b46fbfb322db7de2b5fcaeda4a77874d2991",
"branch_name": "refs/heads/master",
"committer_date": 1669983054000,
"content_id": "60225e8bd340154019254f6cc558f6949ae506d4",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "56731673c481f872b61f86e9c8c07bb9b0548c94",
"extension": "p... | 2.4375 | stackv2 | import json
import pytest
import tornado.httpclient
import tornado.httpserver
import tornado.ioloop
import tornado.testing
import tornado.web
from apiman.tornado import Apiman
apiman = Apiman()
class MainHandler(tornado.web.RequestHandler):
"""
get:
summary: hello api
parameters:
- name: ... | 249 | 26.28 | 112 | 20 | 1,347 | python | [{"finding_id": "codeql_py/reflective-xss_e94d3498260694c3_3cca521b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
33,
112
] | [
null,
null
] | [
20,
20
] | [
36,
36
] | |
2024-11-18T20:10:46.307270+00:00 | 1,631,697,733,000 | 4b1b6f994288e2b2824e2422961d4fe3f400eb72 | 2 | {
"blob_id": "4b1b6f994288e2b2824e2422961d4fe3f400eb72",
"branch_name": "refs/heads/master",
"committer_date": 1631697733000,
"content_id": "ba70ae875ca7c48d53a41d2bfb79031aa645953d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1579a44bb3a25b382805bb222b521b50ca7ea0a5",
"extension": "py"... | 2.46875 | stackv2 | import requests
from .base import LmDriver, NotFoundException
class LmResourcePkgDriver(LmDriver):
"""
Client for CP4NA orchestration Resource Pkg APIs
"""
def __init__(self, lm_base, lm_security_ctrl=None):
super().__init__(lm_base, lm_security_ctrl)
def __packages_api(self):
ret... | 39 | 37.49 | 93 | 14 | 314 | python | [{"finding_id": "codeql_py/request-without-cert-validation_4d2eae221359ecf1_1302f09d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
23,
32
] | [
null,
null
] | [
24,
20
] | [
86,
71
] | |
2024-11-18T20:10:56.090410+00:00 | 1,498,674,726,000 | bc7d5b0437b6246526a306f666270bb7435baaf1 | 3 | {
"blob_id": "bc7d5b0437b6246526a306f666270bb7435baaf1",
"branch_name": "refs/heads/master",
"committer_date": 1498674726000,
"content_id": "41a90958e16959f477305a6035dedd0d04be53c4",
"detected_licenses": [
"MIT"
],
"directory_id": "ecb8de40b3dacdc7064a8b8384ab1b3d3ac152d2",
"extension": "py",
"fi... | 2.578125 | stackv2 | from lxml import html
import requests
import os
import sys
# Will download toonova.net toons
# Supply toonova.net page link with tonn episodes listed
#
# Version: 0.2 2017-06-27 22:22
# Author: hinkocevar@gmail.com
# GIT: https://github.com/hinxx/toonrip
def progress(x):
mb = float(x)/1e6
sys.stdout.write("\rgot %... | 168 | 20.64 | 79 | 17 | 1,104 | python | [{"finding_id": "codeql_py/overly-permissive-file_e652e71d772036cf_9f9763db", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world writable.", "remediation": "", "location": {... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in open sets file to world writable."
] | [
95
] | [
null
] | [
20
] | [
73
] | |
2024-11-18T20:10:56.537800+00:00 | 1,653,616,105,000 | 0073fbf745ab90ac5750ab6633e901c3633740de | 3 | {
"blob_id": "0073fbf745ab90ac5750ab6633e901c3633740de",
"branch_name": "refs/heads/main",
"committer_date": 1653616105000,
"content_id": "77b78d1c0accf4832980185d6bdc72a712f9766e",
"detected_licenses": [
"MIT"
],
"directory_id": "17ee5bc2774e8b9295a1a6dda09540ca3b499f04",
"extension": "py",
"file... | 2.53125 | stackv2 | # Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License.
import pandas as pd
import os
import tarfile
try:
from pyspark.sql.types import StructType, StructField, IntegerType, StringType
except ImportError:
pass # so the environment without spark doesn't break
from reco_... | 176 | 32.81 | 109 | 15 | 1,454 | python | [{"finding_id": "codeql_py/tarslip_cf0ce39287a8810a_1c0d976a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
154
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T20:11:09.841062+00:00 | 1,420,041,087,000 | ba60c841eb28ffc2815debabd6f491d01712586d | 2 | {
"blob_id": "ba60c841eb28ffc2815debabd6f491d01712586d",
"branch_name": "refs/heads/master",
"committer_date": 1420041087000,
"content_id": "8f1074707c6eb57cf3a358db7603b370c5369d41",
"detected_licenses": [
"MIT"
],
"directory_id": "af1aea1e59ae3e8c6304567e8fca7aa2e9733497",
"extension": "py",
"fi... | 2.4375 | stackv2 | '''
ssh client for stash. ssh looks for a valid key generated buy ssh-keygen in .ssh.
You can open an intereactive shell by not passing a command. If a command is passed,
the single command is ran with output then ssh exits.
Once a valid ssh session has been created the special command pythonista [get|put|edit] file1 ... | 264 | 34.88 | 135 | 22 | 2,029 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a7134198353a5e08_db945ad7", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
75
] | [
null
] | [
9
] | [
62
] | |
2024-11-18T20:26:22.460179+00:00 | 1,562,034,482,000 | ebed2ad6f712b3ce41fd61b97ef68cb39d5bb985 | 3 | {
"blob_id": "ebed2ad6f712b3ce41fd61b97ef68cb39d5bb985",
"branch_name": "refs/heads/master",
"committer_date": 1562034482000,
"content_id": "cc93200bd1f3a4e1e6b886029172a3bc706fe836",
"detected_licenses": [
"MIT"
],
"directory_id": "4ebac92281070505f7da0fe8cd8ff32522eedc4a",
"extension": "py",
"fi... | 3.0625 | stackv2 | import urllib
from urllib import request, error
import ssl # contornar erros de certificado
import re
from socket import error as SocketError
import errno
import os
from tqdm import tqdm # barra de progresso
import sys
class HtmlReader:
@staticmethod
def getPageHtml(url='https://', main=False):
'''
... | 196 | 43.2 | 106 | 20 | 1,981 | python | [{"finding_id": "codeql_py/redos_65b2d393772bf404_5e59b44e", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '.' and containing many repetition... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '.' and containing many repetitions of '!.'."
] | [
119
] | [
null
] | [
56
] | [
59
] | |
2024-11-18T20:26:28.634241+00:00 | 1,624,619,571,000 | 764aab069b983193f87faf92bcb50449b50774c9 | 2 | {
"blob_id": "764aab069b983193f87faf92bcb50449b50774c9",
"branch_name": "refs/heads/master",
"committer_date": 1624619571000,
"content_id": "337862bd56f6c251595455e0f129aa71d0872e90",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9ae494f90c47073156e7f235cd45c64d579a188b",
"extension": "py"... | 2.3125 | stackv2 | import requests
from flask import Flask, jsonify,request,make_response
from flasgger import Swagger
from flasgger.utils import swag_from
import json
from flask_restful import Api,Resource
from simplexml import dumps
app = Flask(__name__)
api = Api(app)
app.config['SWAGGER'] = {
'title': 'Verloop API Documentation',
... | 87 | 31.75 | 86 | 18 | 733 | python | [{"finding_id": "codeql_py/flask-debug_2b49e3787ffddd34_de910f27", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
87,
23
] | [
null,
null
] | [
2,
23
] | [
49,
39
] | |
2024-11-18T20:51:56.774448+00:00 | 1,593,795,546,000 | 59a602fd51b95becb9f2a4b2f1b030eb49830cb6 | 3 | {
"blob_id": "59a602fd51b95becb9f2a4b2f1b030eb49830cb6",
"branch_name": "refs/heads/master",
"committer_date": 1593795546000,
"content_id": "74d14bdc0233f9a3d8291cda1ebb9b4726963466",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f81f9c7b8382d1b682df23e08c5f22b5eb8d5f74",
"extension": "py"... | 3 | stackv2 | import requests
from flask import Flask, render_template, request, redirect, url_for, flash
from flask_sqlalchemy import SQLAlchemy
app = Flask(__name__)
app.config['SQLALCHEMY_DATABASE_URI'] = 'sqlite:///weather.db'
app.config['SQLALCHEMY_TRACK_MODIFICATIONS'] = False
app.config['SECRET_KEY'] = 'thisisasecret'
db = ... | 103 | 24.49 | 75 | 18 | 618 | python | [{"finding_id": "codeql_py/flask-debug_4c3d881c4c3c861c_ab591885", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
103,
25
] | [
null,
null
] | [
5,
9
] | [
24,
30
] | |
2024-11-18T20:52:06.324226+00:00 | 1,582,579,915,000 | 7f60e1839a9ede6a59528886a647b5938da70d97 | 3 | {
"blob_id": "7f60e1839a9ede6a59528886a647b5938da70d97",
"branch_name": "refs/heads/master",
"committer_date": 1582579915000,
"content_id": "aafedc327cb61b0e2b83733e1da3e29380e79a99",
"detected_licenses": [
"MIT"
],
"directory_id": "abd30d389b1ff2be523300fb41cb919229ef305d",
"extension": "py",
"fi... | 2.9375 | stackv2 | from modules import cex128
import hashlib
import getpass
import platform
import os
import time
ext = ".cex"
path = os.path.realpath('')
if platform.system() == 'Windows': # Verify operational system
os.system('cls')
else:
os.system('clear')
print('[*] Setting up files...')
time.sleep(1)
try:
if not os... | 70 | 22.13 | 96 | 12 | 430 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d8ca2bc3ceb27a5f_79f281e3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
39
] | [
null
] | [
25
] | [
42
] | |
2024-11-18T20:52:09.434002+00:00 | 1,587,511,767,000 | f564ab2f381dba2b18aebdb4f6305f4046f48d62 | 3 | {
"blob_id": "f564ab2f381dba2b18aebdb4f6305f4046f48d62",
"branch_name": "refs/heads/master",
"committer_date": 1587511767000,
"content_id": "588dabf78c195fb2f927d27f6f22e9c403a6d539",
"detected_licenses": [
"MIT"
],
"directory_id": "765b5974239e981df348a833da68aa0797697214",
"extension": "py",
"fi... | 2.546875 | stackv2 | from django.shortcuts import render
from rest_framework.views import APIView
from django_redis import get_redis_connection
import pickle, base64
from rest_framework.response import Response
from rest_framework import status
from .serializers import CartSerializer, CartSKUSerializer, CartDeleteSerializer, CartSelectedS... | 278 | 32.53 | 104 | 20 | 2,304 | python | [{"finding_id": "codeql_py/unsafe-deserialization_7e1a6254c5606b02_a1898fcd", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio... | 5 | true | [
"CWE-502",
"CWE-502",
"CWE-502",
"CWE-502",
"CWE-502"
] | [
"py/unsafe-deserialization",
"py/unsafe-deserialization",
"py/unsafe-deserialization",
"py/unsafe-deserialization",
"py/unsafe-deserialization"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Unsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provided value](1).\nUnsafe deserialization depends on a [user-provided ... | [
54,
106,
160,
205,
261
] | [
null,
null,
null,
null,
null
] | [
42,
42,
42,
42,
42
] | [
58,
77,
77,
77,
77
] | |
2024-11-18T20:52:17.672620+00:00 | 1,330,912,780,000 | 30cacfd8e9f1e94cded24e4f26807590b618e7e3 | 3 | {
"blob_id": "30cacfd8e9f1e94cded24e4f26807590b618e7e3",
"branch_name": "refs/heads/master",
"committer_date": 1330912780000,
"content_id": "ad5d3a8fc32c9d19a45bcd8268b87745c18d202f",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "a081ae8f09e012adb04c17822e90615edcadd54f",
"extension": "p... | 3.28125 | stackv2 | '''
Created on 2011-10-11
@author: jacekf
Responsible for converting return values into cleanly serializable dict/tuples/lists
for JSON/XML/YAML output
'''
import collections
from jinja2 import Template
from UserDict import DictMixin
xmlListTemplate = Template("""<list>{% for item in items %}<item>{% for prop,val in... | 62 | 35.39 | 173 | 14 | 511 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f519611a69bdabb3_e73bffc9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13,
14
] | [
null,
null
] | [
19,
15
] | [
174,
122
] | |
2024-11-18T20:52:28.896935+00:00 | 1,528,901,175,000 | 6775d7a775701f9304d56fec4e35d8b201a9b3b3 | 2 | {
"blob_id": "6775d7a775701f9304d56fec4e35d8b201a9b3b3",
"branch_name": "refs/heads/master",
"committer_date": 1528901175000,
"content_id": "8ad8d638c5a787a5dfc221cf75ab90212c0585a4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "633ad490de1f314fa900bc9f53f615917086f3fd",
"extension": "py"... | 2.3125 | stackv2 | from http.server import BaseHTTPRequestHandler, HTTPServer
from redis_queue import RedisQueue
import jinja2
import os
import json
BASE_PATH = os.path.dirname(os.path.abspath(__file__))
__all__ = ["RenderTemplates"]
class Singleton(object):
_instance = None
def __new__(cls, *args, **kwargs):
if not... | 81 | 29.33 | 114 | 19 | 526 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_67c5723dadccf505_d3bc6689", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
72
] | [
74
] | [
16
] | [
10
] | |
2024-11-18T20:52:35.152849+00:00 | 1,490,197,142,000 | 84d1da7618913e565f96c33aabab2154f8d6d139 | 2 | {
"blob_id": "84d1da7618913e565f96c33aabab2154f8d6d139",
"branch_name": "refs/heads/master",
"committer_date": 1490197142000,
"content_id": "5292945c2e60eda33dd981bb27675366ebdfc541",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "f8bb2504a1648190c41ec7a442cc6a69d2b44e76",
"extension": "p... | 2.359375 | stackv2 | """
app
---
Web Interface main module.
@author: Dario Garigliotti
@author: Shuo Zhang
@author: Heng Ding
"""
from requests import ConnectionError, Timeout, get as requests_get
from json import loads as j_loads
from urllib.parse import quote # , quote_plus, unquote_plus
from operator import itemgetter
from flask imp... | 327 | 33.4 | 121 | 17 | 2,691 | python | [{"finding_id": "codeql_py/full-ssrf_6cdb23cd04ddee96_cc0d8558", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
144
] | [
null
] | [
13
] | [
55
] | |
2024-11-18T19:14:32.193020+00:00 | 1,683,110,441,000 | a5d77d84b5827e00d014abf6d04759ca3c995098 | 3 | {
"blob_id": "a5d77d84b5827e00d014abf6d04759ca3c995098",
"branch_name": "refs/heads/main",
"committer_date": 1683110441000,
"content_id": "86f32490dc89d44a440d3b88386253db92406fa6",
"detected_licenses": [
"MIT"
],
"directory_id": "ab5970f0d863534655e75ea0e87f3077986cbc6f",
"extension": "py",
"file... | 2.5625 | stackv2 | import logging
from django.http import JsonResponse
from django.http import HttpResponseServerError
from django.shortcuts import render
from django.conf import settings
from django.db.models import Avg
from djaq.query import DjaqQuery as DQ
from djaq.conditions import B
from .models import Book
from .forms import Bo... | 79 | 26.35 | 128 | 21 | 484 | python | [{"finding_id": "codeql_py/stack-trace-exposure_0e73da71fcf88313_f24d67e5", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
79
] | [
null
] | [
40
] | [
41
] | |
2024-11-18T19:14:54.688602+00:00 | 1,553,027,291,000 | 0f034e859f5a12526f6526bf76e4c2965d8990f6 | 2 | {
"blob_id": "0f034e859f5a12526f6526bf76e4c2965d8990f6",
"branch_name": "refs/heads/master",
"committer_date": 1553027291000,
"content_id": "aca3969077a5cbfae861ef392de07be9ebd984ba",
"detected_licenses": [
"MIT"
],
"directory_id": "f196e655cf5f4dae774b3cc7f7f7d89a6af41678",
"extension": "py",
"fi... | 2.453125 | stackv2 | from vote import Vote
from helper import bin2hex, hex2bin, hash_block, hash_str, dump2file
import Crypto
import Crypto.Random
from Crypto.PublicKey import RSA
from Crypto.Signature import PKCS1_v1_5
from Crypto.Hash import SHA
MINING_REWARD = 1
MAX_NONCE = 2 ** 32
MINING_DIFF = 4 # nonce start with n zeros
def gen_i... | 69 | 34.14 | 127 | 14 | 629 | python | [{"finding_id": "codeql_py/weak-crypto-key_a7856d0c6bbd3179_00a466fc", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
16
] | [
null
] | [
19
] | [
49
] | |
2024-11-18T19:27:36.164941+00:00 | 1,448,303,532,000 | 60878bb83864c9974729345c5eb8829e241abb51 | 3 | {
"blob_id": "60878bb83864c9974729345c5eb8829e241abb51",
"branch_name": "refs/heads/master",
"committer_date": 1448303532000,
"content_id": "f7c07080a583f2c4fff109a0ccee50d56a38340a",
"detected_licenses": [
"MIT"
],
"directory_id": "62fc96d481cdd699fe721b093e5e036dd7873200",
"extension": "py",
"fi... | 2.765625 | stackv2 | import urllib
import re
from bs4 import BeautifulSoup
from bedetheque_lib import *
fname_series = "bdt_series.txt"
fname_parsed_series = "bdt_parsed_series.txt"
re_strg_bd = "http://www.bedetheque.com/BD[^#]+"
series = list()
fhand = open(fname_series)
print "Opening", fname_series
i = 0
for line in fhand:
line =... | 66 | 24.05 | 76 | 12 | 481 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_754e906a81954c67_ea035f2f", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This string, which is used as a regular expression [here](1), has an unescaped '.' before 'bedetheque.com/BD', so it might match more hosts than expected."
] | [
8
] | [
null
] | [
15
] | [
48
] | |
2024-11-18T19:27:40.776015+00:00 | 1,693,470,996,000 | 489255977e7b15db790e320d89b9992f19ddc864 | 3 | {
"blob_id": "489255977e7b15db790e320d89b9992f19ddc864",
"branch_name": "refs/heads/master",
"committer_date": 1693470996000,
"content_id": "89f87ac486b97d4cd87a69055d6f9eb885eb9308",
"detected_licenses": [
"MIT"
],
"directory_id": "13ea0050fab32bfac78acabe4a258868e953d45d",
"extension": "py",
"fi... | 2.953125 | stackv2 | import requests
from bs4 import BeautifulSoup
import csv
# get book list from csv
book_list = []
with open('index.csv', newline='') as csv_file:
spamreader = csv.reader(csv_file)
for row in spamreader:
book_list.append(row)
book_list_len = len(book_list)
print(book_list_len)
i=0
while i < book_list_len:
prin... | 64 | 24.56 | 78 | 12 | 454 | python | [{"finding_id": "codeql_py/request-without-cert-validation_ae60fba8c6eb8fcf_92e36f21", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
29
] | [
null
] | [
10
] | [
58
] | |
2024-11-18T19:27:41.936353+00:00 | 1,541,915,363,000 | f1b5d8280ea4dbb468f407c34c2c3f19aed65bc1 | 3 | {
"blob_id": "f1b5d8280ea4dbb468f407c34c2c3f19aed65bc1",
"branch_name": "refs/heads/master",
"committer_date": 1541915363000,
"content_id": "dc513dcc0d80ba1291e79cda0af72b30c831b598",
"detected_licenses": [
"MIT"
],
"directory_id": "0b8eef22e87294f15528cff7c1ffa4ba40266ae2",
"extension": "py",
"fi... | 2.578125 | stackv2 | #! /usr/bin/env python
# -*- coding: utf-8 -*-
import os
import re
import sys
import xlwt
"""
使用方式:
1: 在项目根目录下运行,Excel文件输出在根目录下
python read_django
2: 指定项目的根目录路径,,Excel文件输出在根目录下
python read_django "D:\fixdq\model_read"
3: 指定项目的根目录路径,,指定Excel文件输出路径
python read_django "D:\fixdq\model_read" "C:\Users\... | 87 | 27.51 | 90 | 20 | 723 | python | [{"finding_id": "codeql_py/overly-large-range_3520261e3d4c239a_67231bcc", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that overlaps wi... | [
65,
74,
74
] | [
null,
null,
null
] | [
49,
43,
63
] | [
52,
46,
66
] | |
2024-11-18T19:38:45.590383+00:00 | 1,637,477,487,000 | 166c83c8da9a7e45becf7c9ae3364937a54618e0 | 3 | {
"blob_id": "166c83c8da9a7e45becf7c9ae3364937a54618e0",
"branch_name": "refs/heads/main",
"committer_date": 1637477487000,
"content_id": "3eebac3724e7b18946dc8187981a89682d7f004b",
"detected_licenses": [
"MIT"
],
"directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b",
"extension": "py",
"file... | 2.53125 | stackv2 | from flask import Flask, redirect, url_for, request
from flask_cors import CORS, cross_origin
from pathlib import Path
from subprocess import PIPE, Popen
import string
import random
def get_random_string(length):
letters = string.ascii_lowercase
result_str = ''.join(random.choice(letters) for i in range(length... | 80 | 28.25 | 71 | 17 | 526 | python | [{"finding_id": "codeql_py/command-line-injection_dffdeb78d88ac15e_aa3d00fb", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 3 | true | [
"CWE-078",
"CWE-078",
"CWE-022"
] | [
"py/command-line-injection",
"py/command-line-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This command line depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
60,
71,
13
] | [
null,
null,
null
] | [
27,
27,
8
] | [
30,
30,
22
] | |
2024-11-18T20:31:09.234917+00:00 | 1,552,386,922,000 | 9b458b1a0612c775b32192adf5346e190da9a5e7 | 3 | {
"blob_id": "9b458b1a0612c775b32192adf5346e190da9a5e7",
"branch_name": "refs/heads/master",
"committer_date": 1552386922000,
"content_id": "83f40882b15591d203d3b626dc1b82197dd72768",
"detected_licenses": [
"MIT"
],
"directory_id": "b2bf738c73bcb6b64badb6727de4361f40fee290",
"extension": "py",
"fi... | 2.625 | stackv2 | # -*- coding: utf-8 -*-
"""
:author: Grey Li (李辉)
:url: http://greyli.com
:copyright: © 2018 Grey Li
:license: MIT, see LICENSE for more details.
"""
import click
from flask import Flask, request, redirect, make_response, url_for
import os
app = Flask(__name__)
# the minimal Flask application
@app.ro... | 60 | 19.83 | 66 | 14 | 331 | python | [{"finding_id": "codeql_py/cookie-injection_606541a12857c780_97808cb4", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "... | 2 | true | [
"CWE-020",
"CWE-079"
] | [
"py/cookie-injection",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cookie is constructed from a [user-supplied input](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
54,
34
] | [
null,
null
] | [
27,
12
] | [
31,
40
] | |
2024-11-18T20:31:42.698155+00:00 | 1,583,137,310,000 | e3a02239fef400f4a14dbbeab04664c7bca7bb95 | 3 | {
"blob_id": "e3a02239fef400f4a14dbbeab04664c7bca7bb95",
"branch_name": "refs/heads/master",
"committer_date": 1583137310000,
"content_id": "0238956ad84a28e0131f6ecb6d053416d4457991",
"detected_licenses": [
"MIT"
],
"directory_id": "db6c286f042ba71d63dd8903619a161242f927db",
"extension": "py",
"fi... | 2.578125 | stackv2 | import openpyxl as xl
import pymorphy2
morph = pymorphy2.MorphAnalyzer()
wto = xl.load_workbook("to.xlsx")
wfrom = xl.load_workbook("from.xlsx")
wsto = wto['Лист1']
wsfrom = wfrom['Лист1']
for row in wsfrom.iter_rows(min_row=2):
for cell_from in row:
if cell_from.column_letter == 'D': # фамилия
... | 81 | 55.46 | 82 | 18 | 1,264 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b34b61be70aba2c3_cbf2b527", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [phystech.edu](1) may be at an arbitrary position in th... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The string [phystech.edu](1) may be at an arbitrary position in the sanitized URL.",
"The string [phystech.edu](1) may be at an arbitrary position in the sanitized URL.",
"The string [phystech.edu](1) may be at an arbitrary position in the sanitized URL."
] | [
48,
55,
62
] | [
null,
null,
null
] | [
18,
18,
18
] | [
71,
71,
71
] | |
2024-11-18T20:43:48.006872+00:00 | 1,464,180,888,000 | fc8bbddec0e130a6603fc9e3d9550577c19ea7d5 | 3 | {
"blob_id": "fc8bbddec0e130a6603fc9e3d9550577c19ea7d5",
"branch_name": "refs/heads/master",
"committer_date": 1464180888000,
"content_id": "e0fbf01b291a1d240d57def3f8d49bcd8cd3c43a",
"detected_licenses": [
"MIT"
],
"directory_id": "dd10ae650db9fda3249d614ffa6eb0e24584c6ae",
"extension": "py",
"fi... | 2.8125 | stackv2 | """
API Wrapper for Cachet
https://cachethq.io
Makes an authenticated connection, passes on API requests
and makes the returned stuff be nice and pythony.
"""
from logging import getLogger
from urllib.request import Request, urlopen
from urllib.parse import urlencode
from urllib.error import HTTPError, URLError... | 408 | 38.57 | 95 | 16 | 3,458 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d2c703c482a38384_073ea3f1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
31
] | [
null
] | [
52
] | [
66
] | |
2024-11-18T20:44:02.394111+00:00 | 1,535,384,920,000 | bd324086e548fb14c8763304dca3ac6feb9383a7 | 2 | {
"blob_id": "bd324086e548fb14c8763304dca3ac6feb9383a7",
"branch_name": "refs/heads/master",
"committer_date": 1535384920000,
"content_id": "53d58619104d85349c4bd4f486bcdaf45b829219",
"detected_licenses": [
"MIT"
],
"directory_id": "42dc9805a8612a96599c0c3ba5a9f939ede89cbf",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/env python3
import base64, requests, readline, code, re, warnings
warnings.filterwarnings('ignore')
url = 'http://doublesigma.cf:10204/cgsh_data_center/account.php'
# Login and get session id
r = requests.post(url, data={'username': 'erda', 'password': '2017bad'}, verify=False)
if r.text.find('Hello'):
... | 64 | 24.64 | 86 | 11 | 470 | python | [{"finding_id": "codeql_py/request-without-cert-validation_46b51706c740cc8a_88f074d4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
31,
10
] | [
null,
null
] | [
12,
5
] | [
60,
87
] | |
2024-11-18T20:44:06.850314+00:00 | 1,616,858,686,000 | 009685676e6bde982c348c48370af17495fcad4f | 3 | {
"blob_id": "009685676e6bde982c348c48370af17495fcad4f",
"branch_name": "refs/heads/master",
"committer_date": 1616858686000,
"content_id": "8fa0aa8007b67720fa0d7ae550d5c2f927e860d3",
"detected_licenses": [
"MIT"
],
"directory_id": "9ab5381a0e857aa225d5ad4cf187917dba6d2715",
"extension": "py",
"fi... | 3.046875 | stackv2 | import sys
import subprocess
import network_list
def main(SSID=None, Wordlist=None):
#Some typechecking etc
try:
SSID = str(SSID)
except:
print("Need to supply a network SSID and a password list")
return 0
try:
dictionary = open(Wordlist, 'r')
except:
print(... | 43 | 32.02 | 91 | 15 | 326 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c46b087788cc857b_5cc3acb3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
30
] | [
null
] | [
19
] | [
82
] | |
2024-11-18T20:44:08.122777+00:00 | 1,572,194,676,000 | 44bb5118a0a68b306d0521f969789737c307b421 | 3 | {
"blob_id": "44bb5118a0a68b306d0521f969789737c307b421",
"branch_name": "refs/heads/master",
"committer_date": 1572194676000,
"content_id": "5eb03bfc2e7414d48b0b028488e0b7433266d0cd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "76c26f8c969f3b125b6245a7a7b6036faf890185",
"extension": "py"... | 2.65625 | stackv2 | from flask import Flask, render_template, request
from flask_wtf import FlaskForm
from wtforms import TextAreaField
from wtforms.validators import DataRequired
from transliterate import transliterate_kn_iast
class TransliterationForm(FlaskForm):
name = "test"
text = TextAreaField("text")
app = Flask(__name... | 33 | 27.18 | 80 | 12 | 203 | python | [{"finding_id": "codeql_py/log-injection_39a0323749030c05_3aa0cf13", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
22
] | [
null
] | [
21
] | [
55
] | |
2024-11-18T20:44:13.848481+00:00 | 1,633,542,783,000 | c5a9ce3ae9fe53257b4e9e7eb8f34d93fce6cfed | 3 | {
"blob_id": "c5a9ce3ae9fe53257b4e9e7eb8f34d93fce6cfed",
"branch_name": "refs/heads/master",
"committer_date": 1633542783000,
"content_id": "e44ddb7a03f15f93cc01cbcec3e3cb75d7303af3",
"detected_licenses": [
"MIT"
],
"directory_id": "cc2f65c75e9827b6557babdad64410624dc9a9a2",
"extension": "py",
"fi... | 2.75 | stackv2 | import requests
import click
from AutoApiTestRunner.config import config
import json
@click.group()
def cli():
"""Command Line tool to access Drone.io API .
One time setup command: .
- auto init ... | 117 | 35.18 | 126 | 18 | 755 | python | [{"finding_id": "codeql_py/request-without-cert-validation_642b79644f267877_fe88ecaf", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
53
] | [
55
] | [
16
] | [
59
] | |
2024-11-18T20:57:57.331458+00:00 | 1,578,158,819,000 | 53940f853b84af48febc2add9b77dd4038184739 | 3 | {
"blob_id": "53940f853b84af48febc2add9b77dd4038184739",
"branch_name": "refs/heads/master",
"committer_date": 1578158819000,
"content_id": "3dfb1b124df411646fbd17426a99b9401ba6f729",
"detected_licenses": [
"MIT"
],
"directory_id": "eee0fbee3ab2a9aebc2d4e6e7f323d76d15335e2",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/env python
# pylint: disable=missing-docstring
"""Bot for Webex Teams
- Define decorator for bot
- Show/Create/Delete webhook for Webex Teams
Links:
- user account: https://developer.webex.com/
- webhook api: https://developer.webex.com/docs/api/v1/webhooks
"""
import json
import logging
import os
imp... | 316 | 26.45 | 105 | 17 | 2,465 | python | [{"finding_id": "codeql_py/request-without-cert-validation_7a5d294fe5456200_b0fe8a2d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
140,
249
] | [
null,
null
] | [
18,
19
] | [
76,
92
] | |
2024-11-18T20:58:12.671826+00:00 | 1,567,185,160,000 | b800ed1f1d7ae9bc32b936893af88a4c8e35bd9a | 3 | {
"blob_id": "b800ed1f1d7ae9bc32b936893af88a4c8e35bd9a",
"branch_name": "refs/heads/master",
"committer_date": 1567185285000,
"content_id": "d63be9c69fc85c0b6ccbeed6a27a24e157d0a78a",
"detected_licenses": [
"MIT"
],
"directory_id": "6392363e7459764348e11259e3675db86d96860e",
"extension": "py",
"fi... | 2.9375 | stackv2 | # -*- coding: utf-8
"""Various I/O-related utilities"""
__all__ = ('FileDescriptor', 'sendfile_all', 'isatty')
import os
import sys
import errno
class FileDescriptor:
"""A context manager for operating system file descriptors"""
__slots__ = ('_fd',)
def __init__(self, path, flags=os.O_RDONLY, mode=0o777):
se... | 91 | 18.7 | 76 | 13 | 475 | python | [{"finding_id": "codeql_py/overly-permissive-file_215744bf59549f9f_6b9f8af6", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world writable.", "remediation": "", "location": {... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in open sets file to world writable."
] | [
17
] | [
null
] | [
14
] | [
40
] | |
2024-11-18T20:58:39.283440+00:00 | 1,569,817,100,000 | 3a9794de4f79eda2caf867624c7a5e9b6de85a74 | 3 | {
"blob_id": "3a9794de4f79eda2caf867624c7a5e9b6de85a74",
"branch_name": "refs/heads/master",
"committer_date": 1569817100000,
"content_id": "dc20f430d9c3ef699266e2061da3638532f7e4a7",
"detected_licenses": [
"Unlicense"
],
"directory_id": "c51b66298f2ae625856a1d92fe099365bd13187b",
"extension": "py",... | 2.71875 | stackv2 | import requests
import logging
from datetime import datetime
from pydantic import BaseModel
from fastapi import APIRouter
from starlette.status import HTTP_200_OK
from settings import Settings
from typing import List
_log = logging.getLogger(__name__)
router = APIRouter()
tags = ["messages"]
settings = Settings()
... | 57 | 21.33 | 88 | 12 | 311 | python | [{"finding_id": "codeql_py/partial-ssrf_38a59895b70a8132_160f907d", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 3 | true | [
"CWE-918",
"CWE-117",
"CWE-117"
] | [
"py/partial-ssrf",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
55,
41,
52
] | [
null,
null,
null
] | [
5,
15,
15
] | [
89,
45,
64
] | |
2024-11-18T21:10:19.317316+00:00 | 1,540,406,425,000 | eb4da9da41d2bd7b99aa2cf4b0de3219706c5a7e | 3 | {
"blob_id": "eb4da9da41d2bd7b99aa2cf4b0de3219706c5a7e",
"branch_name": "refs/heads/master",
"committer_date": 1540406425000,
"content_id": "052df5c8d5e1fbdaefeefb656feb7f245f4d0fed",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "1a42caff489a91b74c82ca1d57e002f851b9fa06",
"extension": "p... | 3.15625 | stackv2 | import urllib
from nltk.parse.stanford import StanfordDependencyParser
from nltk.tokenize import sent_tokenize
from gender_novels.corpus import Corpus
from gender_novels.novel import Novel
import os.path
import time
def get_parser(path_to_jar, path_to_models_jar):
"""
The jar files are too big to commit direct... | 108 | 37.74 | 99 | 13 | 1,079 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_53106ac8e8e4071a_204a4929", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
102
] | [
null
] | [
11
] | [
37
] | |
2024-11-18T21:10:22.615210+00:00 | 1,634,765,262,000 | d0809098ec984b00b9d3ff97971b7287728859e7 | 3 | {
"blob_id": "d0809098ec984b00b9d3ff97971b7287728859e7",
"branch_name": "refs/heads/main",
"committer_date": 1634765262000,
"content_id": "c7dd765e80b875159b21cd6228d34e771cfdf35b",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "9eec87e5cc05fe4b072e5151f29fbd89bd7f47fa",
"extension": "py"... | 2.578125 | stackv2 | #!/usr/bin/env python
"""
Copyright 2016 Cisco Systems All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
* Redistributions of source code must retain the above copyright
notice, this list of co... | 50 | 41.5 | 85 | 10 | 465 | python | [{"finding_id": "codeql_py/request-without-cert-validation_8690f954bf426dec_3afb1cab", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
43
] | [
44
] | [
16
] | [
55
] | |
2024-11-18T21:10:22.905515+00:00 | 1,662,323,182,000 | 8947f05c5ac3e421b547c86598624a77a9d520af | 3 | {
"blob_id": "8947f05c5ac3e421b547c86598624a77a9d520af",
"branch_name": "refs/heads/master",
"committer_date": 1662323182000,
"content_id": "3b0f99328c585e688b8e478414fcc9aa9c715220",
"detected_licenses": [
"MIT"
],
"directory_id": "ca5147efc3070a9c7e1e4acc312fb9866ade4bd4",
"extension": "py",
"fi... | 2.625 | stackv2 | '''
Created on Nov 6, 2018
@author: kumarsis
'''
# -*- coding: cp1252 -*-
# The execution starts from calling validate_Input(inputFilePath) in which ith path of input directory is given
# this function checks if a file called common.bin is present or not.if it is present it checks if credentials are present
# in encr... | 323 | 51.24 | 156 | 32 | 2,914 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1be4f3445eec1bfa_5305f76a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
240,
241
] | [
null,
null
] | [
48,
48
] | [
56,
66
] | |
2024-11-18T21:11:00.164488+00:00 | 1,463,758,914,000 | 29e4ad51c8d0180950c7ebbf802803abb4cc6cd6 | 3 | {
"blob_id": "29e4ad51c8d0180950c7ebbf802803abb4cc6cd6",
"branch_name": "refs/heads/master",
"committer_date": 1463759422000,
"content_id": "08da9a2201bf7dc794ae54b8cec9d01071c953f7",
"detected_licenses": [
"MIT"
],
"directory_id": "2fc5ad936cdb2a5818920d389fb80bcaed6bf30b",
"extension": "py",
"fi... | 3.015625 | stackv2 | """
Virtual mail administration models.
"""
from __future__ import absolute_import, unicode_literals
import base64
import hashlib
import random
import string
from django.core.validators import validate_email
from django.db import models
from django.utils.encoding import python_2_unicode_compatible
from django.utils.... | 165 | 38.3 | 87 | 17 | 1,405 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_9dc85cbe3295e39f_a0d0e6e5", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
73
] | [
null
] | [
18
] | [
46
] | |
2024-11-18T21:11:01.895210+00:00 | 1,571,247,258,000 | ea3768168f20053dd60fa6d69781f0770c999985 | 3 | {
"blob_id": "ea3768168f20053dd60fa6d69781f0770c999985",
"branch_name": "refs/heads/master",
"committer_date": 1571247258000,
"content_id": "6ce5298247d8df8bb178dd136df086aa438cf3e0",
"detected_licenses": [
"MIT"
],
"directory_id": "0330131ba8fefe4f84b54100f1ed233e1b0750bf",
"extension": "py",
"fi... | 2.65625 | stackv2 | #
# Copyright (C) 2019 by
# Divyansh Gupta, Harry Karwasra, Nandana Varshney, Nikhil Ramakrishnan
#
# This project is licensed under the MIT License
import getpass
import sys
import ftp
import sql
import utils
conn = None
def main():
'''Main Function'''
# Print our logo
print(utils.get_logo())
pr... | 210 | 27.3 | 75 | 16 | 1,441 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_406081c91d6943bf_0aef252a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
185
] | [
null
] | [
26
] | [
29
] | |
2024-11-18T21:11:03.343260+00:00 | 1,607,567,426,000 | 3b63263024794f0da3d220ac915011779a2df611 | 3 | {
"blob_id": "3b63263024794f0da3d220ac915011779a2df611",
"branch_name": "refs/heads/main",
"committer_date": 1607567426000,
"content_id": "d89061ae0b572d0866408002bf3933e2987e5875",
"detected_licenses": [
"MIT"
],
"directory_id": "5bc865d508c48345be3afb6b11984fd0831bb3ee",
"extension": "py",
"file... | 2.9375 | stackv2 | __author__ = 'Brooke Porter'
__class__ = 'CSC 664 Multimedia Systems (Undergraduate)'
__school__ = 'San Francisco State University'
__professor__ = 'Dr. Rahul Singh'
__file__ = 'sentiment.py'
"""
This file is used to parse the tweets retrieved from app.py into drug-related tweets with positive sentiment.
It uses a Nai... | 317 | 41.1 | 119 | 17 | 2,904 | python | [{"finding_id": "codeql_py/overly-large-range_d71f264984460a74_6c28698f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
101
] | [
null
] | [
62
] | [
65
] | |
2024-11-18T21:11:04.206114+00:00 | 1,588,728,599,000 | eba1ed20deae98c0a9ef1384e462e0b70343878c | 3 | {
"blob_id": "eba1ed20deae98c0a9ef1384e462e0b70343878c",
"branch_name": "refs/heads/master",
"committer_date": 1588728599000,
"content_id": "cbfff5cdba6f9e1a6ac7f652abfdfd423a281534",
"detected_licenses": [
"MIT"
],
"directory_id": "c2192e39c6438e3357c1d06cf1e0422ce56d1ff8",
"extension": "py",
"fi... | 3 | stackv2 | """
Sample script to log the battery, temperature, humidity and dew point from all
available Smart Gadgets to separate CSV files. The MAC address of a Smart Gadget
is used as the name of the file.
Sometimes the number of Smart Gadgets discovered during a Bluetooth scan is
less than the number expected. This example sc... | 92 | 35.54 | 98 | 20 | 748 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7b7791412214ad96_4edb9a1f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
62
] | [
null
] | [
19
] | [
94
] | |
2024-11-18T21:11:13.974736+00:00 | 1,590,202,409,000 | efaae0c92a291447d79f597bcc7f47dcc8cfed8a | 2 | {
"blob_id": "efaae0c92a291447d79f597bcc7f47dcc8cfed8a",
"branch_name": "refs/heads/master",
"committer_date": 1590202409000,
"content_id": "c8dcc73f96ed22974e98f773e2debe8120c0d8e6",
"detected_licenses": [
"MIT"
],
"directory_id": "6ac4ea887a6cfd27054e899871a44eedf2120831",
"extension": "py",
"fi... | 2.34375 | stackv2 | import boto3
import botocore
import os
import sys
def get_ecr_clients(settings):
clients = []
for region in settings['regions']:
clients.append(boto3.client('ecr',
aws_access_key_id=settings['access_key_id'],
aws_secret_access_key=settings['secret_access_key'],
region_name=region
))
... | 119 | 23.04 | 72 | 17 | 695 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_52d4a919edbc1594_4c071961", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
104,
108
] | [
null,
null
] | [
25,
17
] | [
41,
23
] | |
2024-11-18T19:03:29.381163+00:00 | 1,556,369,006,000 | 9a49a8e5e06fd58a2dc93a3641f7cb8b3f18082b | 3 | {
"blob_id": "9a49a8e5e06fd58a2dc93a3641f7cb8b3f18082b",
"branch_name": "refs/heads/master",
"committer_date": 1556369006000,
"content_id": "44174167a4a2a6bdcfb52bbae559f176826fe3c5",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "861a26c8e4ecb17a4d8e12d1f0514a1b1ccab64e",
"extension": "p... | 2.59375 | stackv2 | import pytz
import re
import requests
from datetime import datetime, timedelta
from io import BytesIO
from PIL import Image
import logging
import logging.config
import os
try:
import configparser
except:
from six.moves import configparser
# Project Zakolm
# https://github.com/zakolm/screen
# Fetch Himawari-8 ... | 91 | 28.44 | 117 | 16 | 747 | python | [{"finding_id": "codeql_py/overly-large-range_d5f4a83512ef2e36_04fe939a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
82,
82,
82
] | [
null,
null,
null
] | [
47,
54,
61
] | [
50,
57,
64
] | |
2024-11-18T19:03:41.378123+00:00 | 1,685,893,278,000 | 70665afd53eef48cc94f919f1398e4cce4d5a5c7 | 3 | {
"blob_id": "70665afd53eef48cc94f919f1398e4cce4d5a5c7",
"branch_name": "refs/heads/master",
"committer_date": 1685893278000,
"content_id": "e82702b98f1569fee8a2b17f3aaba1cf1c8355fe",
"detected_licenses": [
"MIT"
],
"directory_id": "f5b99d59741af88067a78383cf2df94c06fe3710",
"extension": "py",
"fi... | 2.8125 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
import urllib
import urllib2
import hashlib
import email.message
import email.encoders
import time
from collections import namedtuple
Metadata = namedtuple("Metadata", ['url', 'name', 'part_data'])
Part = namedtuple("Part", ['sid', 'input_file', 'source', 'name'])
def check... | 251 | 29.96 | 134 | 15 | 1,822 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_9eacfd6802c2e636_1b9bd913", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
151
] | [
null
] | [
17
] | [
45
] | |
2024-11-18T19:28:48.406617+00:00 | 1,622,106,169,000 | 352af84da730557b53014bf2225357f2f57b70a3 | 3 | {
"blob_id": "352af84da730557b53014bf2225357f2f57b70a3",
"branch_name": "refs/heads/master",
"committer_date": 1622106169000,
"content_id": "8e949f28145f67c098bc0bf689897226e2344572",
"detected_licenses": [
"MIT"
],
"directory_id": "97570819e3b1f65a09793ca7ea1c8957915f527e",
"extension": "py",
"fi... | 2.734375 | stackv2 | import os
import hashlib
"""
此文件是云盘的配置文件。
"""
class CloudStorageSetting(object):
"""
配置类的定义,修改以配置。
"""
# 云盘存储目录的位置
STORAGE_PATH = "E:\\cloud_storage"
# 工作临时目录
TEMP_PATH = "E:\\cloud_storage_temp"
def __init__(self, username=None):
if username:
md5 = hashlib.md5(us... | 28 | 23.43 | 68 | 17 | 181 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1e72fa7d05f5cf14_eb1cde00", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure."
] | [
20
] | [
null
] | [
31
] | [
55
] | |
2024-11-18T19:28:49.876466+00:00 | 1,500,983,398,000 | ef888fcc6dc16f0c5b7aac366397d3bc7ae6c434 | 2 | {
"blob_id": "ef888fcc6dc16f0c5b7aac366397d3bc7ae6c434",
"branch_name": "refs/heads/master",
"committer_date": 1500983398000,
"content_id": "0cb6ce449a2f3d62c070bf71ea50dc8f6a897498",
"detected_licenses": [
"MIT"
],
"directory_id": "dbe6178efb609a5ad11d3a51424fcc586600d20a",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/env python
from __future__ import absolute_import
from __future__ import division
from __future__ import print_function
try:
import cStringIO as StringIO
except:
from io import StringIO
import hashlib
import json
import math
import os
import re
import shlex
import subprocess
import sys
import tarfi... | 344 | 31.72 | 79 | 18 | 2,730 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_cde563a35313021f_49bde494", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'google.com/uc', so it might match m... | 2 | true | [
"CWE-020",
"CWE-022"
] | [
"py/incomplete-hostname-regexp",
"py/tarslip"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'google.com/uc', so it might match more hosts than expected.",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
93,
142
] | [
null,
null
] | [
23,
13
] | [
60,
17
] | |
2024-11-18T19:28:53.974397+00:00 | 1,683,500,152,000 | 628196c26ce1a543cc50909e5f3804cf0f5adacc | 3 | {
"blob_id": "628196c26ce1a543cc50909e5f3804cf0f5adacc",
"branch_name": "refs/heads/master",
"committer_date": 1683501722000,
"content_id": "4d0be40f0d954e770e32ab48494fe0cbdd899b08",
"detected_licenses": [
"MIT"
],
"directory_id": "6f24d152d77efa603c31059b7dea841d5d2bd51a",
"extension": "py",
"fi... | 2.640625 | stackv2 | import os
from datetime import datetime
import gzip
from functools import lru_cache
import boto3
from prettytable import PrettyTable # imported from Lambda layer
# PrettyTable
DASH_TABLE = PrettyTable(['Type', 'Count'])
COUNTRY_TABLE = PrettyTable(['Country', 'Number of Messages'])
PHONE_NUMBER_TABLE = PrettyTable(['... | 168 | 30.22 | 94 | 17 | 1,304 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dac69acf163fd70f_cbed0bde", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
163
] | [
null
] | [
15
] | [
33
] | |
2024-11-18T19:39:33.391427+00:00 | 1,492,018,315,000 | 6dc92dd755feb17ff276186851deb8c7b19f7562 | 3 | {
"blob_id": "6dc92dd755feb17ff276186851deb8c7b19f7562",
"branch_name": "refs/heads/master",
"committer_date": 1492018315000,
"content_id": "6093987fe7a604895877ae7b2a19ebad520a310d",
"detected_licenses": [
"MIT"
],
"directory_id": "1f635511ae70d7c2560e151b8990750740d1bf4f",
"extension": "py",
"fi... | 2.71875 | stackv2 | '''
Created on Sep 13, 2016
@author: Rafael Carvalho (rafacarv@cisco.com)
'''
from flask import Flask, request
import json
import traceback
import os
app = Flask(__name__)
@app.route('/')
def hello():
"""Run your server and go browse to the root of your server and see if it is working. It shows the message Hell... | 49 | 27.78 | 145 | 16 | 314 | python | [{"finding_id": "codeql_py/reflective-xss_0ee917a3cf678973_da91e28c", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
45
] | [
null
] | [
13
] | [
19
] | |
2024-11-18T19:39:53.990223+00:00 | 1,471,472,598,000 | 8109f211e686efca6aa501075c6c76d280fc283e | 3 | {
"blob_id": "8109f211e686efca6aa501075c6c76d280fc283e",
"branch_name": "refs/heads/master",
"committer_date": 1471472598000,
"content_id": "72881bbcc670bbaede8d42280fea146e0bccefea",
"detected_licenses": [
"MIT"
],
"directory_id": "d691e259566a815cd35eeb705912f382386b328a",
"extension": "py",
"fi... | 2.84375 | stackv2 | from flask import request, jsonify, Blueprint
from .. import piglatin
main = Blueprint('main', __name__)
@main.route('/', methods=['GET', 'POST'])
def index():
response = """
Please use the endpoint /translate to access this api.
Usage: "{}translate?text=Translate+this+text+into+Piglatin."
... | 29 | 23.21 | 68 | 14 | 164 | python | [{"finding_id": "codeql_py/reflective-xss_33da68ea1538109a_edec5175", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
16
] | [
null
] | [
12
] | [
20
] | |
2024-11-18T20:18:01.638342+00:00 | 1,590,917,255,000 | ee7a024354514ec99b5d7b42110a109a71379522 | 2 | {
"blob_id": "ee7a024354514ec99b5d7b42110a109a71379522",
"branch_name": "refs/heads/master",
"committer_date": 1590917255000,
"content_id": "b887c5d71f8b0cf6e069b0ce6a0e77fcf0677181",
"detected_licenses": [
"MIT"
],
"directory_id": "8ebd0447776ba79bf1d631f8f1bd944e48b24b6f",
"extension": "py",
"fi... | 2.5 | stackv2 | import phonenumbers
import arrow
from flask import Blueprint, render_template, url_for, flash, redirect, request, abort
from flask_login import login_required
from flaskdocs.models import Staff, Documents
from flaskdocs.staff.forms import AddDocsForm, AddStaffForm, EditStaffForm
from flaskdocs import db
staff = Bluepr... | 161 | 40.21 | 154 | 20 | 1,468 | python | [{"finding_id": "codeql_py/url-redirection_e9281ed7502f6e83_7cfdf99a", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 5 | true | [
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends o... | [
79,
96,
102,
106,
109
] | [
null,
null,
null,
null,
null
] | [
21,
33,
37,
37,
33
] | [
37,
49,
53,
53,
49
] | |
2024-11-18T20:18:07.691504+00:00 | 1,573,499,507,000 | 456267ce5e5576802bde728c7ba0b3edf168b4ce | 3 | {
"blob_id": "456267ce5e5576802bde728c7ba0b3edf168b4ce",
"branch_name": "refs/heads/master",
"committer_date": 1573499507000,
"content_id": "ff0b43116af54d5809f2dee4170ef13b2b29be76",
"detected_licenses": [
"MIT"
],
"directory_id": "252d986d3c9da92877b06108d0c0319becba7e88",
"extension": "py",
"fi... | 2.953125 | stackv2 | import datetime
import requests
from typing import Optional
base_url = 'https://big-old-fashioned-bridge.anvil.app/_/api/'
def main():
auth_data = get_auth_data()
api_key = authenticate(auth_data)
if not api_key:
print("Invalid login")
return
print(api_key)
data = get_user_data()... | 76 | 21.39 | 68 | 11 | 418 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fe3e0d516283733e_3d0231b1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
15
] | [
null
] | [
11
] | [
18
] | |
2024-11-18T20:18:18.305854+00:00 | 1,615,366,657,000 | 8159784277f094b183d0354b44b9f43b480dd5f4 | 3 | {
"blob_id": "8159784277f094b183d0354b44b9f43b480dd5f4",
"branch_name": "refs/heads/master",
"committer_date": 1615366657000,
"content_id": "3eb7091dd70977d75e168e1ca519d18f31228d8f",
"detected_licenses": [
"MIT"
],
"directory_id": "d7c50e14db9ec0ee5668b694969df473443df93e",
"extension": "py",
"fi... | 3.140625 | stackv2 | import getpass
from credentials import Credentials
from user import User
import pyperclip
import string
import random
def create_user(f_name,l_name,u_name,psswd):
'''
A funtcion to create a new user.
'''
new_user = User(f_name, l_name,u_name, psswd)
return new_user
def save_user(User):
'''
... | 197 | 35.51 | 92 | 21 | 1,443 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8d24d33cc5bf8207_7a8a10dc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensi... | [
133,
144,
150,
158,
185
] | [
null,
null,
null,
null,
null
] | [
23,
23,
23,
31,
27
] | [
51,
63,
51,
70,
60
] | |
2024-11-18T20:18:30.880769+00:00 | 1,469,525,578,000 | 98faafee8841b93b85612aab00abede961fee3f7 | 2 | {
"blob_id": "98faafee8841b93b85612aab00abede961fee3f7",
"branch_name": "refs/heads/master",
"committer_date": 1469525578000,
"content_id": "327db8d460be7ab4423caaa6d341319c49e1152c",
"detected_licenses": [
"MIT"
],
"directory_id": "92c27adc563b3c8f96f73a22c4fae9e86fdcd4f3",
"extension": "py",
"fi... | 2.421875 | stackv2 | from template_snippets import *
from os.path import join
import sys
import argparse
from jinja2 import Environment, FileSystemLoader
def get_parameters():
parser = argparse.ArgumentParser()
parser.add_argument("-i", "--id", dest="cnn_id", help="Name of the CNN")
parser.add_argument("-a", "--arch", dest="... | 216 | 36.76 | 93 | 16 | 1,797 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8052620371484a75_684884d2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
21,
32
] | [
22,
null
] | [
14,
14
] | [
43,
43
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.