added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T02:31:56.924527+00:00 | 1,599,808,740,000 | 8a41c3ce2ee605653c6dd5ef8b29a981103422ef | 3 | {
"blob_id": "8a41c3ce2ee605653c6dd5ef8b29a981103422ef",
"branch_name": "refs/heads/master",
"committer_date": 1599808740000,
"content_id": "1296452eba8cf5beae925604bd3955ec686b8bf1",
"detected_licenses": [
"MIT"
],
"directory_id": "4da68b54a6f21d551e2cab5110b2bd3cb33f1308",
"extension": "py",
"fi... | 2.984375 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Wed Jun 10 12:04:34 2020
@author: 35732
"""
# 下载纯文本和xml
import requests
import xlrd
import xlwt
class Article_archive_doi:
def __init__(self, header, filename, url_publisher, APIKey, arformat, path, text_outpath):
self.filename = filename
self.url_publisher ... | 55 | 29.98 | 102 | 17 | 458 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_7c0c87f922670e7c_ba7397dd", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
25
] | [
null
] | [
17
] | [
23
] | |
2024-11-19T02:31:58.350498+00:00 | 1,588,386,424,000 | 848ceb438fe5d70220dfc595191fba6bf465c074 | 2 | {
"blob_id": "848ceb438fe5d70220dfc595191fba6bf465c074",
"branch_name": "refs/heads/master",
"committer_date": 1588386424000,
"content_id": "aa55f9e4c45740d52aa4b6aa45d3242baca753b3",
"detected_licenses": [
"MIT"
],
"directory_id": "1687a3b1a3a4c8068c4befdfd436c16bc9a10b2d",
"extension": "py",
"fi... | 2.421875 | stackv2 | import hashlib
import os.path
from tcd.settings import UPLOAD_DIR, MEDIA_URL
def get_user_path(username):
m = hashlib.md5()
m.update(username)
section = m.hexdigest()[:4]
return os.path.join(UPLOAD_DIR, section, username)
def get_upload_url(username):
m = hashlib.md5()
m.update(username)
... | 16 | 24.62 | 61 | 9 | 106 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_62a3e19691b8667a_bf0a5476", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
8,
14
] | [
null,
null
] | [
14,
14
] | [
22,
22
] | |
2024-11-19T02:32:12.900130+00:00 | 1,525,887,992,000 | 89b9748f91f4cfa21f7a904b787ddb1202f473b2 | 3 | {
"blob_id": "89b9748f91f4cfa21f7a904b787ddb1202f473b2",
"branch_name": "refs/heads/master",
"committer_date": 1525887992000,
"content_id": "81397cfd243fd5a641ee9f0ccb5065f88fe888d7",
"detected_licenses": [
"MIT"
],
"directory_id": "1000a3645234c5e2d16faa2c9ae310b0b567987b",
"extension": "py",
"fi... | 3.453125 | stackv2 | from Scheduling.Shift import Shift
from Scheduling.HourMinute import HourMinute
class Day:
def __init__(self, *shifts):
self.__shifts = None
shifts = list(shifts)
self.shifts = shifts
def __repr__(self):
return str(self.shifts)
def employeelist(self):
employeeli... | 56 | 26.04 | 65 | 13 | 429 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6b88171f7676ec35_e884c945", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
56
] | [
null
] | [
11
] | [
30
] | |
2024-11-19T02:32:14.777738+00:00 | 1,626,468,795,000 | e20a5d137e8ce67d94d917747252965e199cffef | 2 | {
"blob_id": "e20a5d137e8ce67d94d917747252965e199cffef",
"branch_name": "refs/heads/main",
"committer_date": 1626468795000,
"content_id": "0683341c2e17f57c5b155a1c249b449011f09c01",
"detected_licenses": [
"MIT"
],
"directory_id": "87b6facfa44bc391fbf834ee934c10ed1f5e1845",
"extension": "py",
"file... | 2.359375 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
# Imports
import signal
import argparse
import logging
import socket
import re
import time
from influxdb_client import InfluxDBClient, Point
from influxdb_client.client.write_api import SYNCHRONOUS
from influxdb_client.rest import ApiException
# Logging
logging.basicCo... | 409 | 27.04 | 103 | 20 | 2,873 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1be2735ccd85c2b7_5fae0b6a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
238
] | [
null
] | [
19
] | [
60
] | |
2024-11-19T02:32:46.840987+00:00 | 1,683,404,001,000 | 7366ada270babdea2801a360b80d5c81c0f10d07 | 2 | {
"blob_id": "7366ada270babdea2801a360b80d5c81c0f10d07",
"branch_name": "refs/heads/master",
"committer_date": 1683404001000,
"content_id": "721dc2aab3728240c7209fa90f495cade9d00297",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c2f46e06c033d612d7d52804ccbc69499f18670e",
"extension": "py"... | 2.4375 | stackv2 | import requests
import certifi
import json
from lxml import html
from rdflib.namespace import Namespace, NamespaceManager
from rdflib import Graph, BNode, RDF, RDFS, URIRef, Literal, XSD
import hashlib
import os.path
import pickle
from SPARQLWrapper import SPARQLWrapper, JSON
import csv
import coloredlogs, logging
from... | 388 | 32.02 | 125 | 18 | 3,287 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_a9b76821457dcdaf_d3096095", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [wikipedia.org](1) may be at an arbitrary position in t... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [wikipedia.org](1) may be at an arbitrary position in the sanitized URL."
] | [
79
] | [
null
] | [
12
] | [
35
] | |
2024-11-19T02:43:25.160308+00:00 | 1,626,009,953,000 | ebd80b76ef7d7438d33d6055c2c5dcc9e767e5df | 3 | {
"blob_id": "ebd80b76ef7d7438d33d6055c2c5dcc9e767e5df",
"branch_name": "refs/heads/main",
"committer_date": 1626009953000,
"content_id": "40cf44f10f8fd67dd37ee9af4587cc025183c69b",
"detected_licenses": [
"MIT"
],
"directory_id": "8eeb9b0098a47a49df2283c931e93fba782b0834",
"extension": "py",
"file... | 2.703125 | stackv2 | from flask_login import UserMixin
from time import time
from Crypto.Cipher import AES
from Crypto.Util.number import long_to_bytes, bytes_to_long
from Padding import appendPadding, removePadding
from app import db
import base64
class Credential(db.Model):
id = db.Column(db.Integer, primary_key=True)
service =... | 31 | 33.06 | 64 | 13 | 248 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_a9d527154751cd8c_2a82f94f", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
26,
30
] | [
null,
null
] | [
33,
17
] | [
52,
65
] | |
2024-11-19T02:43:25.989665+00:00 | 1,574,230,052,000 | ac46d07bd7adc3127b42925759a633b927de6091 | 3 | {
"blob_id": "ac46d07bd7adc3127b42925759a633b927de6091",
"branch_name": "refs/heads/master",
"committer_date": 1574230052000,
"content_id": "dd5eccffe83ec83c21c409f72adbc2e8e15b71cc",
"detected_licenses": [
"MIT"
],
"directory_id": "56c3dd1d1a46cab82469d698a3546a2075928b3f",
"extension": "py",
"fi... | 2.84375 | stackv2 | import urllib.request,json
from .models import Article, Source,News
api_key = None
source_url = None
everything_url = None
search_url = None
headlines_url = None
def configure_request(app):
global api_key,headlines_url,everything_url,source_url
api_key = app.config['API_KEY']
source_url = app.config['EV... | 129 | 31.1 | 93 | 12 | 841 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_260e678730daaecc_b589cc0d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
69
] | [
null
] | [
11
] | [
26
] | |
2024-11-19T02:43:27.797157+00:00 | 1,684,287,966,000 | 2da6f969d959ed7ff18b7f3ad0026733c7971b8f | 3 | {
"blob_id": "2da6f969d959ed7ff18b7f3ad0026733c7971b8f",
"branch_name": "refs/heads/master",
"committer_date": 1684287966000,
"content_id": "a2300fd80f06411c1af54078d4b963e15a9f275a",
"detected_licenses": [
"MIT"
],
"directory_id": "be4a287e48ef2c58d0036788128de837a0d99bf3",
"extension": "py",
"fi... | 2.96875 | stackv2 | """
list_vm_v3_large.py - list all VMs in a cluster
this code sample is designed for compatibility with clusters
hosting a large number of VMs
'large', in this context, is more than 500 VMs, although
the definition of large will vary from location to location
"""
from dataclasses import dataclass
import requests
impor... | 346 | 33.56 | 86 | 19 | 2,469 | python | [{"finding_id": "codeql_py/request-without-cert-validation_df19bb7e4629dc51_aa37a96f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
101
] | [
107
] | [
27
] | [
14
] | |
2024-11-19T02:54:55.465087+00:00 | 1,545,928,179,000 | 6ce58f61e7d2b35540c79cfb00920e1dca7b1438 | 3 | {
"blob_id": "6ce58f61e7d2b35540c79cfb00920e1dca7b1438",
"branch_name": "refs/heads/master",
"committer_date": 1545928212000,
"content_id": "b792f257eee0309339b628071f7e95fe8cdd7842",
"detected_licenses": [
"MIT"
],
"directory_id": "995421463ffae04b9a72d1e74dd32e8bbc7546f1",
"extension": "py",
"fi... | 2.75 | stackv2 | import json
import os
import logging
from random import choice
import boto3
from botocore.exceptions import ClientError
from postgresql import Postgresql
from mysql import Mysql
logger = logging.getLogger()
logger.setLevel(logging.INFO)
def log_error_with_event(err_msg, event, info=False):
"""Log the error mess... | 117 | 29.58 | 88 | 15 | 775 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cb94d53f9068057f_88fa6899", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
18,
20
] | [
null,
null
] | [
40,
41
] | [
45,
46
] | |
2024-11-19T02:55:02.718813+00:00 | 1,606,494,100,000 | e92b96009e8f65dddad47a915fc229d855f0ac39 | 2 | {
"blob_id": "e92b96009e8f65dddad47a915fc229d855f0ac39",
"branch_name": "refs/heads/master",
"committer_date": 1606494100000,
"content_id": "0c2a210363c9d704b5a9f7c9d38194921b3fce25",
"detected_licenses": [
"MIT"
],
"directory_id": "a6cbba37783e6f492bf15e9282d7d35571d97fa6",
"extension": "py",
"fi... | 2.421875 | stackv2 | import requests
import urllib3
from .sepal_exception import SepalException
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
class SepalApi:
def __init__(self, host, username, password):
self.host = host
self.username = username
self.password = password
def _get(sel... | 27 | 30.44 | 103 | 13 | 183 | python | [{"finding_id": "codeql_py/request-without-cert-validation_6dc0898e1631b811_c425d177", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
15
] | [
21
] | [
16
] | [
10
] | |
2024-11-19T02:55:03.607295+00:00 | 1,618,767,872,000 | c00cd38a308682f2bcfc654954d92869878092ca | 2 | {
"blob_id": "c00cd38a308682f2bcfc654954d92869878092ca",
"branch_name": "refs/heads/master",
"committer_date": 1618767872000,
"content_id": "91009f6f3d916aa21992eec9f68fd804e8b8b41c",
"detected_licenses": [
"MIT"
],
"directory_id": "3e5dadd470412004f3917014dd832faf9d8d53ce",
"extension": "py",
"fi... | 2.375 | stackv2 | from flask import Blueprint, request, session, redirect, flash
from .. import mysql, limiter
from ..utils.forms import AddPostForm
from ..utils.functions import getActualTime
from pathlib import Path
import os
add_post_blueprint = Blueprint('add_post_blueprint', __name__)
ALLOWED_EXTENSIONS = {'png', 'jpg', 'jpeg', '... | 67 | 40.88 | 112 | 18 | 635 | python | [{"finding_id": "codeql_py/url-redirection_648b33dcbf32d956_6cd16aae", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
67
] | [
null
] | [
21
] | [
37
] | |
2024-11-19T02:55:20.725227+00:00 | 1,689,950,508,000 | ee3bf328e487df669ffc5e18c793e71cdc8c8e0d | 3 | {
"blob_id": "ee3bf328e487df669ffc5e18c793e71cdc8c8e0d",
"branch_name": "refs/heads/master",
"committer_date": 1689950508000,
"content_id": "8466d3d89b5d23362a37c07070ab6325bc283e8a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ac7853e1d932cb5af3e393b255971c245d284637",
"extension": "py"... | 2.578125 | stackv2 | #!/usr/bin/env python
import errno
import os
import platform
import subprocess
import sys
import traceback
from fcntl import flock, LOCK_EX, LOCK_NB
from optparse import OptionParser
from os import O_RDWR, O_CREAT, O_WRONLY, O_APPEND
from os.path import abspath, basename, dirname, exists, realpath
from os.path import... | 466 | 30.35 | 132 | 18 | 3,459 | python | [{"finding_id": "codeql_py/overly-permissive-file_33f47c6b826b0e28_62da5962", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in open sets file to world readable."
] | [
140
] | [
null
] | [
12
] | [
60
] | |
2024-11-19T02:55:21.711911+00:00 | 1,560,071,873,000 | 55049b405bb41643f01d8a5c51658484587fe06e | 3 | {
"blob_id": "55049b405bb41643f01d8a5c51658484587fe06e",
"branch_name": "refs/heads/master",
"committer_date": 1560071873000,
"content_id": "2a192f27bb8e9d55871917059092912ab499a424",
"detected_licenses": [
"MIT"
],
"directory_id": "cbdc5c28fc485e735f96d6695cd7908781373f39",
"extension": "py",
"fi... | 2.609375 | stackv2 | from flask import Flask
from flask import jsonify
from flask import render_template
from flask import request
from flask import Response
import csv
import json
import math
import pandas as pd
import collections
import numpy as np
from IPython import embed
app = Flask(__name__)
start_path = './data/start.csv'
end_path... | 138 | 29.89 | 125 | 21 | 1,116 | python | [{"finding_id": "codeql_py/flask-debug_730829e5ea6691ce_2bfa6ae5", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
138,
106,
124
] | [
null,
null,
null
] | [
5,
15,
15
] | [
24,
24,
24
] | |
2024-11-19T02:55:28.455903+00:00 | 1,621,446,117,000 | f38254e8c003f4ba6d061282d0b107bd7ff523d1 | 3 | {
"blob_id": "f38254e8c003f4ba6d061282d0b107bd7ff523d1",
"branch_name": "refs/heads/main",
"committer_date": 1621446117000,
"content_id": "84780873eb56a2606d4efbc354a8be70d8376eab",
"detected_licenses": [
"MIT"
],
"directory_id": "9b5ce33b1e902fc617dafb6258ae0d7f44931743",
"extension": "py",
"file... | 2.515625 | stackv2 | from flask import Flask, jsonify, request
import time
import urllib.request
from urllib.request import Request, urlopen
import re
import nltk
from nltk.stem import PorterStemmer
ps = PorterStemmer()
from nltk.tokenize import word_tokenize
from nltk.stem import WordNetLemmatizer
from nltk.corpus import wordnet
from nltk... | 267 | 27.21 | 160 | 21 | 1,767 | python | [{"finding_id": "codeql_py/full-ssrf_dec4e215ec266a8b_a3286ddc", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
98
] | [
null
] | [
15
] | [
66
] | |
2024-11-19T02:55:39.057599+00:00 | 1,591,868,770,000 | 61745f6193064ed445638078b9181d867cbd44bb | 3 | {
"blob_id": "61745f6193064ed445638078b9181d867cbd44bb",
"branch_name": "refs/heads/master",
"committer_date": 1591872930000,
"content_id": "6dd408675651a95d48e0ea16797fe717bb9fe680",
"detected_licenses": [
"Unlicense"
],
"directory_id": "bdc4ad850efe4fef51bb5004db54ab8a9c90dfdd",
"extension": "py",... | 2.96875 | stackv2 | #!/usr/bin/env python3
import os
from http.server import HTTPServer, BaseHTTPRequestHandler
class StaticServer(BaseHTTPRequestHandler):
def do_GET(self):
root = os.path.dirname(os.path.abspath(__file__))
filename = os.path.join(root, 'example.html' if self.path == '/' else self.path[1:])
_, ext = os.pa... | 49 | 23.51 | 88 | 14 | 302 | python | [{"finding_id": "codeql_py/path-injection_54bb9ff0a4797fc7_428fe2c0", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
17,
25
] | [
null,
null
] | [
28,
15
] | [
36,
23
] | |
2024-11-19T02:55:50.593443+00:00 | 1,686,900,670,000 | c5a71132e952bc5001d7978888d4e3ca086d807a | 4 | {
"blob_id": "c5a71132e952bc5001d7978888d4e3ca086d807a",
"branch_name": "refs/heads/main",
"committer_date": 1686900670000,
"content_id": "d77cbbfaf6434c363de8d7d3197a85bdb0ee7a40",
"detected_licenses": [
"MIT"
],
"directory_id": "bef8f684c9668b3fe8dc430c4ed9d7c625faec13",
"extension": "py",
"file... | 4 | stackv2 | # Classes and Objects - Basics
print ("Basic Class")
class MyClass:
pass
obj = MyClass() # creating a MyClass object
print (obj)
print ("\nEmployee Class")
class Employee:
Id = None
salary = None
department = None # compile errors without None
Steve = Employee()
print ("\nProperty outside the Class ... | 203 | 26.3 | 123 | 14 | 1,584 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_202f6a6a0385a4c0_8bf82673", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.",
"This expression logs [sensitive data (p... | [
21,
37,
43,
120,
123
] | [
null,
null,
null,
null,
null
] | [
8,
8,
8,
24,
32
] | [
44,
44,
42,
38,
50
] | |
2024-11-19T02:55:55.819397+00:00 | 1,618,906,807,000 | 3811388da501cde67bbf177200b61defa4e4d558 | 3 | {
"blob_id": "3811388da501cde67bbf177200b61defa4e4d558",
"branch_name": "refs/heads/master",
"committer_date": 1618906807000,
"content_id": "1e24e46cd9a066f830963ca438baa3080690cb2f",
"detected_licenses": [
"MIT"
],
"directory_id": "4cbde4e9bbe01006057043a5ff171b59518c01cb",
"extension": "py",
"fi... | 2.5625 | stackv2 | import urllib2
import os
import tarfile
import shutil
import glob
# Constant
dataset_dir = './TransportationData'
datasetBalanced = dataset_dir + '/datasetBalanced'
rawOriginaldata = dataset_dir + '/_RawDataOriginal'
url_list = ['http://cs.unibo.it/projects/us-tm2017/static/dataset/extension/5second/dataset_5secondWin... | 53 | 36.11 | 117 | 14 | 489 | python | [{"finding_id": "codeql_py/tarslip_16451f8d6aa44a8b_1acf3b3a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)."
] | [
46
] | [
null
] | [
10
] | [
13
] | |
2024-11-19T02:55:56.407293+00:00 | 1,517,852,046,000 | 638b8601defc5ed5de5aac1e042af7e5a414d7f5 | 3 | {
"blob_id": "638b8601defc5ed5de5aac1e042af7e5a414d7f5",
"branch_name": "refs/heads/master",
"committer_date": 1517852046000,
"content_id": "7760eed29ea571c24a2963f63a372f726dfad5bc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "86a3601cd358dce92a6eaf6a9241e215c19d6669",
"extension": "py"... | 2.515625 | stackv2 | # -*- coding:utf-8 -*-
from __future__ import print_function
import os
import paramiko
import xml.etree.ElementTree as ET
from Crypto.PublicKey import RSA
from Crypto.Cipher import PKCS1_OAEP
from Crypto import Random
from server import config, db_client
import smtplib
def load_clients(path):
"""
Load clients... | 265 | 26.59 | 99 | 15 | 1,761 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_f0d70bf9e7c3dc0d_cb083200", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to WarningPolicy may be unsafe.", "r... | 2 | true | [
"CWE-295",
"CWE-326"
] | [
"py/paramiko-missing-host-key-validation",
"py/weak-crypto-key"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Setting missing host key policy to WarningPolicy may be unsafe.",
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
55,
102
] | [
null,
null
] | [
9,
11
] | [
69,
47
] | |
2024-11-19T03:10:51.536030+00:00 | 1,524,225,399,000 | bfdd0324a787178e97e24485e69fba317d6198ab | 2 | {
"blob_id": "bfdd0324a787178e97e24485e69fba317d6198ab",
"branch_name": "refs/heads/master",
"committer_date": 1524225399000,
"content_id": "de38301bd250c3204243169bc80b58000d2e64d9",
"detected_licenses": [
"MIT"
],
"directory_id": "5d0a0911f03631fb4e5040efcdd1d1dff8ba463d",
"extension": "py",
"fi... | 2.421875 | stackv2 | #!/usr/bin/python3
# -*- coding: UTF-8 -*-
"""
@version: ??
@author: xiaoming
@license: MIT Licence
@contact: xiaominghe2014@gmail.com
@site:
@software: PyCharm
@file: get_cartoons.py
@time: 2018/4/18 下午5:19
"""
import os
import re
import json
import requests
import base64
import multiprocessing
import threading
s... | 166 | 31.72 | 106 | 19 | 1,306 | python | [{"finding_id": "codeql_py/request-without-cert-validation_768cdfbd7487dbe7_d6196f24", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
84
] | [
null
] | [
16
] | [
76
] | |
2024-11-19T03:21:54.417788+00:00 | 1,617,699,625,000 | 84213d1fae8507fe3c955475a3b9e46d7d954c02 | 3 | {
"blob_id": "84213d1fae8507fe3c955475a3b9e46d7d954c02",
"branch_name": "refs/heads/main",
"committer_date": 1617699625000,
"content_id": "53d2a1a1b84330b425ed9259f14c31d6cb6215c9",
"detected_licenses": [
"MIT"
],
"directory_id": "2c06ff0d4f64d1b7691d4bc7e1891506eff43ecd",
"extension": "py",
"file... | 2.921875 | stackv2 | from flask_restful import Resource, Api
from flask import Flask, jsonify
from bs4 import BeautifulSoup
from boardgamegeek import BGGClient
import requests
import time
app = Flask(__name__)
api = Api(app)
class DDGames(Resource):
def get(self, page="1"):
"""Inizializza e lancia lo scraping della lista de... | 107 | 30.13 | 105 | 18 | 812 | python | [{"finding_id": "codeql_py/flask-debug_b92fc0068141d902_951b85f4", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
107,
23
] | [
null,
null
] | [
5,
20
] | [
24,
37
] | |
2024-11-19T03:43:54.969382+00:00 | 1,517,283,521,000 | 48b9d95cad322f1368ce685f787a004a40a6eebd | 2 | {
"blob_id": "48b9d95cad322f1368ce685f787a004a40a6eebd",
"branch_name": "refs/heads/master",
"committer_date": 1517283521000,
"content_id": "f785b857499b13e080856ae35bce4f6d490a3030",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bc22466e7caad11d6daa916555cfd1549c7af1da",
"extension": "py"... | 2.3125 | stackv2 | #!/usr/bin/env python
# -*- encoding: utf-8 -*-
#
# Common functions
#
import time
import urlparse
import re
import os
import requests
import difflib
def print_msg(msg):
print '[%s] %s' % (time.strftime('%H:%M:%S', time.localtime()), msg)
def parse_url(url):
_ = urlparse.urlparse(url, 'http')
if not _... | 201 | 25.21 | 133 | 15 | 1,480 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_e6af28a921785c7f_0af4c89c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [asp.net](1) may be at an arbitrary position in the san... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [asp.net](1) may be at an arbitrary position in the sanitized URL."
] | [
137
] | [
null
] | [
8
] | [
32
] | |
2024-11-19T03:44:07.065322+00:00 | 1,623,043,074,000 | d332e08fa183734d7841149503d15e50543760d9 | 3 | {
"blob_id": "d332e08fa183734d7841149503d15e50543760d9",
"branch_name": "refs/heads/master",
"committer_date": 1623043074000,
"content_id": "b94302ca5181d94d729be9c2305647cbea931bc7",
"detected_licenses": [
"MIT"
],
"directory_id": "0aafc32985f775478449724519cbd24b736053b8",
"extension": "py",
"fi... | 2.65625 | stackv2 | import os
os.environ['TF_CPP_MIN_LOG_LEVEL'] = '2'
import io
import tensorflow as tf
from tensorflow import keras
from tensorflow.keras.preprocessing.image import ImageDataGenerator, load_img, img_to_array
import matplotlib.pyplot as plt
import numpy as np
from PIL import Image
from flask import Flask, request, jsoni... | 60 | 24.48 | 91 | 17 | 361 | python | [{"finding_id": "codeql_py/stack-trace-exposure_19f718bb15b75733_6575eed5", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
54,
60
] | [
null,
null
] | [
28,
5
] | [
45,
24
] | |
2024-11-19T03:44:25.643590+00:00 | 1,552,351,232,000 | f46afcb6fb103bf91057304f1d2411975f68970f | 3 | {
"blob_id": "f46afcb6fb103bf91057304f1d2411975f68970f",
"branch_name": "refs/heads/master",
"committer_date": 1552351232000,
"content_id": "b6f0b3d8c1fa636b1e6eab58ee63b62286ede15b",
"detected_licenses": [
"MIT"
],
"directory_id": "87eba503bdac86fb5394117f6d92f78ef29ddaff",
"extension": "py",
"fi... | 2.71875 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""
Created on Sun Feb 12 20:11:05 2017
@author: clesiemo3
"""
import os
import pygsheets
def ya_schedule():
message = '<br>'
error_message = '<br> Error: Failed to find schedule data from google sheets. <br>'
try:
gc = pygsheets.authorize(service_... | 40 | 30.52 | 101 | 15 | 337 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_3db935f4f578dc3d_ae6ec325", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
21
] | [
null
] | [
27
] | [
61
] | |
2024-11-19T01:44:09.158326+00:00 | 1,664,292,970,000 | 8cc789eb9331ac732f62d83dcbb3116b2d74f434 | 3 | {
"blob_id": "8cc789eb9331ac732f62d83dcbb3116b2d74f434",
"branch_name": "refs/heads/master",
"committer_date": 1664292970000,
"content_id": "46fc1fd34adec84bd54461404de1f6b0578a87ca",
"detected_licenses": [
"MIT"
],
"directory_id": "95194e6b13031ba404b8ea39789fb96e8463a736",
"extension": "py",
"fi... | 2.578125 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""
This script reads the ligand-field parameters from a
SINGLE_ANISO calculation of the OpenMolcas package of programs.
written 2021-2022 by Michael Böhme
https://github.com/micb25/chemtools
"""
import re, sys
if len(sys.argv) < 2:
sys.exit("Usage: ... | 126 | 26.61 | 121 | 18 | 1,156 | python | [{"finding_id": "codeql_py/overly-large-range_7b59ec069d41f0b5_ee49281d", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=>?@A-E\\]."
] | [
36
] | [
null
] | [
104
] | [
107
] | |
2024-11-19T02:08:41.267173+00:00 | 1,535,361,465,000 | 59d4411bef06b7770c1af0bbc190628fb55dc964 | 3 | {
"blob_id": "59d4411bef06b7770c1af0bbc190628fb55dc964",
"branch_name": "refs/heads/master",
"committer_date": 1535361465000,
"content_id": "3cdfd482c8b2947f2708b2e60a74192d3f088dd9",
"detected_licenses": [
"MIT"
],
"directory_id": "24c3d40a18b5e6a60f52d22ce21e282be7904c77",
"extension": "py",
"fi... | 3.328125 | stackv2 | #!/usr/bin/env python3.6
from termcolor import colored, cprint
from credential import Credential
print('''
| \/ | / \ |_ _| \ | | | \/ | ____| \ | | | | |
| |\/| | / _ \ | || \| | | |\/| | _| | \| | | | |
| | | |/ ___ \ | || |\ | | | | | |___| |\ | |_| |
|_| |_/_/ \_|___|_| \_| |_| |_|_____|_| \_... | 117 | 25.82 | 126 | 19 | 693 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_074af8566665424c_bdd16250", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
98
] | [
null
] | [
27
] | [
103
] | |
2024-11-19T02:21:36.848272+00:00 | 1,619,744,528,000 | c7c71bd7d89b8d969dfc8c9563532333389d8cde | 3 | {
"blob_id": "c7c71bd7d89b8d969dfc8c9563532333389d8cde",
"branch_name": "refs/heads/main",
"committer_date": 1619744528000,
"content_id": "12e3dd9747e1688a366df101ce06ec6a0aa9bef6",
"detected_licenses": [
"MIT"
],
"directory_id": "3bb58f2b43c4ec95f11f6f536f524985c6967cdd",
"extension": "py",
"file... | 2.609375 | stackv2 | #!/usr/bin/env python
import requests
import json
import os
import sys
import argparse
class AKIPSAnsibleAWXDevices(object):
def __init__(self):
self.inventory = {}
self.read_cli_args()
# Called with `--list`.
self.inventory = self.getAKIPSDeviceList()
print(json.dumps(self... | 84 | 31.5 | 125 | 15 | 597 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e0ccd9f0b5ce050a_347ab558", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
62
] | [
null
] | [
31
] | [
62
] | |
2024-11-19T02:57:56.409074+00:00 | 1,589,056,341,000 | d21c97d3be710b48093b77b55e218d1d4d14d74a | 3 | {
"blob_id": "d21c97d3be710b48093b77b55e218d1d4d14d74a",
"branch_name": "refs/heads/master",
"committer_date": 1589056341000,
"content_id": "b9710074d1185869034c374fc7bc08a5de536a47",
"detected_licenses": [
"MIT"
],
"directory_id": "51af31375eedf07f5aaf192bbda4a4cc8fa7077e",
"extension": "py",
"fi... | 3.09375 | stackv2 | # Create API of ML model using flask
'''
This code takes the JSON data while POST request an performs the prediction using loaded model and returns
the results in JSON format.
'''
# Import libraries
import numpy as np
from flask import Flask, render_template, request, jsonify
import pickle
from sklearn.preprocessing i... | 97 | 32.54 | 120 | 15 | 729 | python | [{"finding_id": "codeql_py/flask-debug_a7ddff5388e78d6c_799734ec", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
97,
42
] | [
null,
null
] | [
5,
20
] | [
24,
121
] | |
2024-11-19T02:58:00.431649+00:00 | 1,620,736,759,000 | a3fbb205abebc027a5e205dcf8df9dd8ac3395d1 | 3 | {
"blob_id": "a3fbb205abebc027a5e205dcf8df9dd8ac3395d1",
"branch_name": "refs/heads/master",
"committer_date": 1620736759000,
"content_id": "f75a6a9a24f1245c8d8ef2a74b28cb614d1f8318",
"detected_licenses": [
"MIT"
],
"directory_id": "79d5835e5cb9d386d1de29e939e65e62714ae6a1",
"extension": "py",
"fi... | 2.625 | stackv2 | __author__ = "scott"
import requests
import json
import uuid
import os
AUTHORIZE_URL = "https://twist.com/oauth/authorize"
TOKEN_URL = "https://twist.com/oauth/access_token"
# callback url specified when the application was defined
# e.g. http://dev.twist.test:4567/v3/
CALLBACK_URI = "<<enter the callback url for yo... | 73 | 30.47 | 76 | 8 | 572 | python | [{"finding_id": "codeql_py/request-without-cert-validation_762eb1af260864ab_f6b9be5f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
56,
71
] | [
58,
null
] | [
25,
21
] | [
2,
77
] | |
2024-11-19T02:58:13.637830+00:00 | 1,483,204,753,000 | 7c8e32b0c0b15143675adf0b7470c9629fa27b89 | 2 | {
"blob_id": "7c8e32b0c0b15143675adf0b7470c9629fa27b89",
"branch_name": "refs/heads/master",
"committer_date": 1483204753000,
"content_id": "85583035f9dcda099344659fef1e3e9fb4408d34",
"detected_licenses": [
"MIT"
],
"directory_id": "117e5ce0758a8b437a1ea9e7fb4149f6adce65e7",
"extension": "py",
"fi... | 2.453125 | stackv2 | import os
import sys
import random
import re
import json
try:
from hashlib import md5
except ImportError:
from md5 import md5
import tornado.httpserver
import tornado.ioloop
import tornado.web
from tornado.escape import xhtml_unescape
from tornado.options import define, options
define("port", default=5000, h... | 115 | 30.65 | 166 | 19 | 915 | python | [{"finding_id": "codeql_py/reflective-xss_19aec54978b4c5d9_3f932e8a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
90
] | [
null
] | [
20
] | [
166
] | |
2024-11-19T02:58:15.412456+00:00 | 1,360,286,963,000 | 2b6ca0668f77e4a9410be28dc9c8884f80af04d6 | 2 | {
"blob_id": "2b6ca0668f77e4a9410be28dc9c8884f80af04d6",
"branch_name": "refs/heads/master",
"committer_date": 1360286963000,
"content_id": "a9b7d5fd8c9837e321d47015f9405d9ec5fe5f17",
"detected_licenses": [
"MIT"
],
"directory_id": "95c836922eaaa1027d933e618133f6510be123d5",
"extension": "py",
"fi... | 2.453125 | stackv2 | from template import Template
class JinjaTemplate(Template):
@staticmethod
def is_engine_initialized():
return 'jinja2' in globals()
def prepare(self):
return
def initialize_engine(self):
global jinja2
import jinja2
def evaluate(self,scope, local_vars, block=None):
if not hasattr(self,'output') or n... | 27 | 19 | 51 | 16 | 128 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_384af90d6e2585d6_13c1b343", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
18
] | [
null
] | [
11
] | [
37
] | |
2024-11-19T02:58:16.976379+00:00 | 1,436,552,241,000 | c9940efcfacf9fc34ed7a25e3a2004365225d33a | 3 | {
"blob_id": "c9940efcfacf9fc34ed7a25e3a2004365225d33a",
"branch_name": "refs/heads/master",
"committer_date": 1436552241000,
"content_id": "0e0f0a60d07ba20ee13a55217c00bacbe61c3215",
"detected_licenses": [
"MIT"
],
"directory_id": "3d39ff42a5d7212903bb84837f7470e02ce49d8e",
"extension": "py",
"fi... | 2.703125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
__version__ = '0.1'
__author__ = 'Andrey Derevyagin'
__copyright__ = 'Copyright © 2014'
import urllib2
import time
import json
import hashlib
#from config import GEOIP_SECRET1, GEOIP_SECRET2, GEOIP_SECRET3
GEOIP_CACHE_ONLY = 0
GEOIP_WEB_SERVICE = 1
class GeoIP(object)... | 76 | 29.93 | 101 | 19 | 592 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_178442d57b68561c_48327abe", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](3) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](4) is used in a hashing algorithm ... | [
44
] | [
null
] | [
28
] | [
31
] | |
2024-11-19T03:10:05.400060+00:00 | 1,558,381,146,000 | 8cd7185ead5b54ef5cfc9f7976e5a803d5dd5e70 | 2 | {
"blob_id": "8cd7185ead5b54ef5cfc9f7976e5a803d5dd5e70",
"branch_name": "refs/heads/master",
"committer_date": 1558381146000,
"content_id": "ee28d7164a47120a0794090e0431c517f690092a",
"detected_licenses": [
"MIT"
],
"directory_id": "92d8091909f475a63886f0746537439ab3921ee0",
"extension": "py",
"fi... | 2.390625 | stackv2 | from flask import Flask, render_template, request
import requests
webserver = Flask(__name__)
@webserver.route("/")
def home():
return render_template("index.html"), 200
@webserver.route("/go")
def go():
r = request.args.get('r')
w = requests.request(request.method, r)
return w.content, 200
if (__na... | 17 | 21.47 | 49 | 10 | 103 | python | [{"finding_id": "codeql_py/flask-debug_5039fa63d1653fb0_fb4f1050", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-918",
"CWE-079"
] | [
"py/flask-debug",
"py/full-ssrf",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"The full URL of this request depends on a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
17,
13,
14
] | [
null,
null,
null
] | [
5,
9,
12
] | [
41,
44,
26
] | |
2024-11-19T03:10:34.036585+00:00 | 1,518,177,959,000 | 3aa9ae0576c9789e99ab1ab650b35e4832df47fa | 2 | {
"blob_id": "3aa9ae0576c9789e99ab1ab650b35e4832df47fa",
"branch_name": "refs/heads/master",
"committer_date": 1518177959000,
"content_id": "081482a92cefbc8dc433d2a12d0744bfef5aa9a6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9f98d366ce95852216128ee02aad7bdaca638708",
"extension": "py"... | 2.359375 | stackv2 | from tornado import web
import tornado, json, os
import subprocess
class TwitterHandle(web.RequestHandler):
def get(self):
try:
data = []
os.chmod('./available_handle.txt', 436)
with open('available_handle.txt', 'r') as handles:
data = handles.read().spl... | 39 | 33.1 | 65 | 18 | 254 | python | [{"finding_id": "codeql_py/command-line-injection_de52a0d8c503efd7_04c3abe8", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 3 | true | [
"CWE-078",
"CWE-079",
"CWE-732"
] | [
"py/command-line-injection",
"py/reflective-xss",
"py/overly-permissive-file"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Overly permissive mask in chmod sets file to world readable."
] | [
23,
35,
10
] | [
null,
null,
null
] | [
29,
24,
13
] | [
36,
46,
52
] | |
2024-11-19T03:10:35.017947+00:00 | 1,568,655,176,000 | d4d9784e4675ad23b9632c0238cf9b6cfff901b3 | 2 | {
"blob_id": "d4d9784e4675ad23b9632c0238cf9b6cfff901b3",
"branch_name": "refs/heads/master",
"committer_date": 1568655176000,
"content_id": "df428f74e4dff0edaffd5c1b8d134cc01fca5a32",
"detected_licenses": [
"MIT"
],
"directory_id": "dbb72e24aefc8106c808ecf3992f144326658b05",
"extension": "py",
"fi... | 2.34375 | stackv2 | from __future__ import print_function
import cv2
import os
import sys
import pytesseract
import numpy as np
import tensorflow as tf
import re
# ap = argparse.ArgumentParser()
# ap.add_argument("-i", "--image", required=True,
# help="path to input image to be OCR"d")
# args = vars(ap.parse_args())
# pp... | 346 | 25.01 | 113 | 20 | 2,432 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_639aab26052919c8_8da6b814", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priva... | [
173,
180,
184,
208,
227
] | [
null,
null,
null,
null,
null
] | [
19,
23,
23,
11,
11
] | [
50,
51,
54,
44,
52
] | |
2024-11-19T03:22:34.597632+00:00 | 1,636,117,878,000 | 7e807f972df3ea2ae82807ecc4c39e93d5ae57e9 | 2 | {
"blob_id": "7e807f972df3ea2ae82807ecc4c39e93d5ae57e9",
"branch_name": "refs/heads/main",
"committer_date": 1636117878000,
"content_id": "1b63ba05e4a1a270b60d4c16db347b544e7c14b2",
"detected_licenses": [
"MIT"
],
"directory_id": "ccc8d481e23ad34fb343041529cb95a1208e5b52",
"extension": "py",
"file... | 2.40625 | stackv2 | import json, youtube_dl, magic, os
from flask import Flask, jsonify, send_file, request, make_response, Response
from pathlib import Path
from flask_cors import CORS, cross_origin
from .errors import errors
app = Flask(__name__)
cors = CORS(app)
app.config['CORS_HEADERS'] = 'Content-Type'
app.register_blueprint(errors... | 86 | 25.4 | 115 | 15 | 584 | python | [{"finding_id": "codeql_py/command-line-injection_646f41a3cfd870d4_760f1d65", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 2 | true | [
"CWE-078",
"CWE-022"
] | [
"py/command-line-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
17,
70
] | [
null,
null
] | [
15,
26
] | [
115,
30
] | |
2024-11-19T03:22:37.168307+00:00 | 1,635,056,836,000 | f37944d9f2d6ced88950d7da1f28f61cd2699d8b | 3 | {
"blob_id": "f37944d9f2d6ced88950d7da1f28f61cd2699d8b",
"branch_name": "refs/heads/master",
"committer_date": 1635056836000,
"content_id": "9c21ab56bc9e357f45e95fe1e7d2e60699c22ba7",
"detected_licenses": [
"MIT"
],
"directory_id": "b2698dace3141c91dee72bcf08de6480b13c39ad",
"extension": "py",
"fi... | 2.90625 | stackv2 | #!/usr/bin/env python3
# Example of converting from some data into some output html using jinja
import os
import pprint
import sys
# pip3 install jinja2
from jinja2 import Environment, FileSystemLoader
thisdir = os.path.dirname(os.path.realpath(__file__))
output_dir = os.path.join(thisdir, 'output')
# Some example... | 40 | 28.35 | 72 | 12 | 305 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8dbf2f5d6db8a03c_1a09d3f3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
30
] | [
null
] | [
7
] | [
52
] | |
2024-11-19T03:22:43.150275+00:00 | 1,562,662,227,000 | b0f90126d112f8cb5a8031b6ab8276de24e876d1 | 3 | {
"blob_id": "b0f90126d112f8cb5a8031b6ab8276de24e876d1",
"branch_name": "refs/heads/master",
"committer_date": 1562662227000,
"content_id": "292fde9da942012beb7d7167e18e299b3dfda9e6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5696f91a586d8ad7e28be77d7161b7b7e24aba8a",
"extension": "py"... | 2.515625 | stackv2 | # This Python file uses the following encoding: utf-8
#!/usr/bin/
import tweepy
import os
import time
import sys
from pathlib import Path
from datetime import datetime
import json
import re
#------------------------------------------------------#
#-------------authentication phase started-------------#
#---------------... | 317 | 40.25 | 174 | 28 | 3,388 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_87b8ceb7638cec27_b50a87d3", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
48
] | [
null
] | [
25
] | [
77
] | |
2024-11-19T03:22:48.553055+00:00 | 1,530,102,547,000 | 98a60d2697cdc0da4f8e108dac298fc2472ce85a | 2 | {
"blob_id": "98a60d2697cdc0da4f8e108dac298fc2472ce85a",
"branch_name": "refs/heads/master",
"committer_date": 1530102547000,
"content_id": "947263503dead7329feed1bff1ab3bf012ea7875",
"detected_licenses": [
"MIT"
],
"directory_id": "801e9fa6f57a3b90b61693d7dcbe56a631b692a7",
"extension": "py",
"fi... | 2.390625 | stackv2 | #
# coding: utf-8
# Copyright (c) 2018 DATADVANCE
#
# Permission is hereby granted, free of charge, to any person obtaining
# a copy of this software and associated documentation files (the
# "Software"), to deal in the Software without restriction, including
# without limitation the rights to use, copy, modify, merge,... | 355 | 38.88 | 79 | 20 | 2,858 | python | [{"finding_id": "codeql_py/tarslip_7cb8ed9b0c0cf607_5b9b4e4a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
284
] | [
null
] | [
17
] | [
20
] | |
2024-11-19T01:34:46.828255+00:00 | 1,584,644,109,000 | 9dbf109ecc03bac54c2cc5800d98b533a730f156 | 2 | {
"blob_id": "9dbf109ecc03bac54c2cc5800d98b533a730f156",
"branch_name": "refs/heads/master",
"committer_date": 1584644109000,
"content_id": "ae5e43faa355c50681021053a4bcd76672c4e09a",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "452c06b03e4f8cc30bec8f6b9340b4622a387f02",
"extension": "p... | 2.453125 | stackv2 | #!/usr/bin/python3
from urllib.parse import unquote
from tornado import web,gen
from tornado.concurrent import run_on_executor
from concurrent.futures import ThreadPoolExecutor
import requests
import os
import json
dbhost=os.environ["DBHOST"]
health_check=os.environ["HEALTH_CHECK"]
class HealthHandler(web.RequestHan... | 45 | 27.47 | 67 | 17 | 294 | python | [{"finding_id": "codeql_py/stack-trace-exposure_8925e562b8078ee8_d89c638c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-918"
] | [
"py/stack-trace-exposure",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
43,
25
] | [
null,
null
] | [
20,
15
] | [
34,
59
] | |
2024-11-19T01:35:02.732612+00:00 | 1,532,933,087,000 | 18a1fa10a3dd3958a32144e0ae5a624476926f61 | 3 | {
"blob_id": "18a1fa10a3dd3958a32144e0ae5a624476926f61",
"branch_name": "refs/heads/master",
"committer_date": 1532933087000,
"content_id": "2717c4d6ba3339afa4fc94dbe9b21b1933d494a7",
"detected_licenses": [
"MIT"
],
"directory_id": "14176920a610e25a1d46e78a9343001471f723e5",
"extension": "py",
"fi... | 2.671875 | stackv2 | # Simple personal web server for bookstore pages
# Usage:
# RUNPY books.pysrc webserver --host foobar --port 8080 --rootdir path
# This serves pages if they exist, calls methods under /api
# Use /stop to kill the server
import argparse
from http.server import BaseHTTPRequestHandler, HTTPServer
import cgi
import log... | 321 | 34.74 | 104 | 24 | 2,331 | python | [{"finding_id": "codeql_py/path-injection_e9ea18e11f782db9_0f01c2fc", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 11 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](... | [
154,
154,
159,
163,
163,
190,
194,
204,
40,
49,
102
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
31,
55,
39,
31,
56,
34,
34,
31,
27,
27,
27
] | [
35,
59,
46,
35,
60,
38,
38,
35,
52,
49,
50
] | |
2024-11-19T02:07:59.524308+00:00 | 1,502,263,052,000 | 2e2ba7e083caec333623605a659c32140def0d11 | 3 | {
"blob_id": "2e2ba7e083caec333623605a659c32140def0d11",
"branch_name": "refs/heads/master",
"committer_date": 1502263052000,
"content_id": "a5ba7ee12007c391b398369afdb119ec81ce2655",
"detected_licenses": [
"MIT"
],
"directory_id": "51345466e03e76a1f2b1c91be3f59292c07f2def",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
import json
import re
import warnings
import ruamel.yaml as yaml
from bs4 import BeautifulSoup
from scrapper_helpers.utils import html_decode, replace_all, _float, _int
from gratka.utils import get_response_for_url
warnings.simplefilter('ignore', yaml.error.UnsafeLoaderWarni... | 226 | 40.54 | 116 | 24 | 2,222 | python | [{"finding_id": "codeql_py/redos_5656498e83b603a1_b76343f5", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'dataLayer = \\[{{' and containing... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'dataLayer = \\[{{' and containing many repetitions of ' '."
] | [
56
] | [
null
] | [
58
] | [
66
] | |
2024-11-19T02:17:31.101155+00:00 | 1,486,731,580,000 | 4ef0a973ab4f8ccf2384f9e8ac9dce2547310fe6 | 2 | {
"blob_id": "4ef0a973ab4f8ccf2384f9e8ac9dce2547310fe6",
"branch_name": "refs/heads/master",
"committer_date": 1486731580000,
"content_id": "9da4c452a3c1b2ba0e83d5f7ffe32620aaa62b71",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "1c21904cf20444e8c95579670461980890e6e6b2",
"extension": "p... | 2.421875 | stackv2 | import os
import sys
import click
import logging
from flask import Flask, request, render_template, jsonify, Markup
from flask_restful import Resource, Api, abort, reqparse
from flask_sqlalchemy import SQLAlchemy
from markdown import Markdown
from bleach import linkify
app = Flask(__name__)
api = Api(app)
db = SQLAl... | 227 | 28.64 | 81 | 15 | 1,660 | python | [{"finding_id": "codeql_py/log-injection_48e3e99f3dc39061_cdee451e", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
147
] | [
null
] | [
22
] | [
45
] | |
2024-11-19T02:17:39.369538+00:00 | 1,676,892,889,000 | a5c18ffd11b30968aaa59210edba8a4f30fb44ea | 3 | {
"blob_id": "a5c18ffd11b30968aaa59210edba8a4f30fb44ea",
"branch_name": "refs/heads/master",
"committer_date": 1676892889000,
"content_id": "9effc49fc6e036f0fbd964057b0c0ef4901a6a2e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a7e8c02ce6616d533dbb32ad7ea604d4d6731ede",
"extension": "py"... | 3.296875 | stackv2 | # This program is free software; you can redistribute it and/or modify
# it under the terms of the (LGPL) GNU Lesser General Public License as
# published by the Free Software Foundation; either version 3 of the
# License, or (at your option) any later version.
#
# This program is distributed in the hope that it will b... | 108 | 28.58 | 76 | 15 | 829 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_04cc227c3e5f88de_3f38229f", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://www.w3.org](1) may be at an arbitrary position ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [http://www.w3.org](1) may be at an arbitrary position in the sanitized URL."
] | [
97
] | [
null
] | [
20
] | [
57
] | |
2024-11-19T02:17:45.083086+00:00 | 1,605,110,039,000 | dfa784f24f6f574b4d7156992d1c41b9e1a83db6 | 2 | {
"blob_id": "dfa784f24f6f574b4d7156992d1c41b9e1a83db6",
"branch_name": "refs/heads/main",
"committer_date": 1605110039000,
"content_id": "d9ed8771e402fe06432bb8453c28bd74e316bfd2",
"detected_licenses": [
"MIT"
],
"directory_id": "e83db170d65645a65448b0aa0bba7a49a7056fe2",
"extension": "py",
"file... | 2.359375 | stackv2 | from flask import Flask, render_template, flash, redirect, request, url_for, session, logging
from werkzeug.datastructures import ImmutableMultiDict
from pdf2image import convert_from_bytes
from signature_extractor import get_signatures
from tika import parser
from pytesseract import image_to_string
from flask_sqlalche... | 138 | 32.75 | 93 | 16 | 1,101 | python | [{"finding_id": "codeql_py/flask-debug_07ec0ebd937caded_bad0bb93", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-022"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
138,
56,
99
] | [
null,
null,
null
] | [
5,
20,
22
] | [
49,
51,
30
] | |
2024-11-19T02:18:12.863041+00:00 | 1,603,128,681,000 | cea5cacb9af76730b6a085d524a941fc1c658f78 | 3 | {
"blob_id": "cea5cacb9af76730b6a085d524a941fc1c658f78",
"branch_name": "refs/heads/master",
"committer_date": 1603128681000,
"content_id": "506c99f83d406ce243f0b10ce3e967b05b6cf957",
"detected_licenses": [
"MIT"
],
"directory_id": "73b187faba0752ae94023d4d7404c0d56c495422",
"extension": "py",
"fi... | 3.03125 | stackv2 | """
Module for identifying and parsing ALF file names.
An ALF file has the following components (those in brackets are optional):
(_namespace_)object.attribute(_timescale)(.extra.parts).ext
Note the following:
Object attributes may not contain an underscore unless followed by 'times' or 'intervals'.
A nam... | 226 | 37.62 | 98 | 21 | 2,254 | python | [{"finding_id": "codeql_py/redos_1c63a29dfd7a32ea_d4ca1a65", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a.0' and containing many repetiti... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'a.0' and containing many repetitions of 'a'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'a.0' and containing many repetitions of '-'."
] | [
30,
31
] | [
null,
null
] | [
27,
17
] | [
31,
25
] | |
2024-11-19T02:18:13.516271+00:00 | 1,525,062,525,000 | fc6fdfb4ffd3d4d0d8c53230143b577ce4d35a6f | 3 | {
"blob_id": "fc6fdfb4ffd3d4d0d8c53230143b577ce4d35a6f",
"branch_name": "refs/heads/master",
"committer_date": 1525062525000,
"content_id": "c322ce0752d0131cda81c714c7624a4d010d05d1",
"detected_licenses": [
"MIT"
],
"directory_id": "c290da32544cb4f371e92c7f2c31ee0313b35e93",
"extension": "py",
"fi... | 2.84375 | stackv2 | from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer
from SocketServer import ThreadingMixIn
import cgi, sys, os, threading
class RequestHandler(BaseHTTPRequestHandler):
def do_GET(self):
#Handle GET Request
try:
filepath = "filehost"+self.path
print "Filepath: "+f... | 71 | 29.14 | 72 | 17 | 454 | python | [{"finding_id": "codeql_py/path-injection_ef58c27c26836296_d8b0258e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
12,
44
] | [
null,
null
] | [
20,
22
] | [
28,
42
] | |
2024-11-19T02:18:20.450985+00:00 | 1,507,385,288,000 | f8276edd2813dafab2fa03e55e2d9aec1fc36914 | 3 | {
"blob_id": "f8276edd2813dafab2fa03e55e2d9aec1fc36914",
"branch_name": "refs/heads/master",
"committer_date": 1507385288000,
"content_id": "c7befe032bf7a1f6470ee54635e1e6249d788eb7",
"detected_licenses": [
"MIT"
],
"directory_id": "7f53dd409f03ceba9e6975bf378e570bdf2f93e9",
"extension": "py",
"fi... | 2.671875 | stackv2 | import sys
import dicom
import os.path
# dicom.debug()
if __name__ == "__main__":
# CD-ROM root
filepath = "X:\\"
if os.path.isdir(filepath): # only gave directory, add standard name
filepath = os.path.join(filepath, "DICOMDIR")
dcmdir = dicom.read_dicomdir(filepath)
base_dir = os... | 30 | 35.7 | 85 | 20 | 257 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_10ba6c9441a04560_d9fecfc3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
16
] | [
17
] | [
19
] | [
52
] | |
2024-11-19T02:18:30.928317+00:00 | 1,629,821,755,000 | fd131c436675260498d5944e62a455a9f1178fbb | 2 | {
"blob_id": "fd131c436675260498d5944e62a455a9f1178fbb",
"branch_name": "refs/heads/main",
"committer_date": 1629821755000,
"content_id": "ef714bb722f3cc2c31508754c5f4c674ea9fe95e",
"detected_licenses": [
"MIT"
],
"directory_id": "1fb2c3eca42b123fedbb2113d5833ae57e8d625b",
"extension": "py",
"file... | 2.34375 | stackv2 | #!/usr/bin/env python3
from tenable.base.platform import APIPlatform
from subprocess import Popen
from pathlib import Path
from time import sleep
import requests
import logging
import urllib3
import pexpect
import typer
import yaml
urllib3.disable_warnings()
app = typer.Typer()
class Nessus(APIPlatform):
_env_b... | 190 | 31.75 | 79 | 22 | 1,324 | python | [{"finding_id": "codeql_py/request-without-cert-validation_a93a95299b12a045_82673a12", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
70
] | [
71
] | [
17
] | [
43
] | |
2024-11-19T02:30:06.603198+00:00 | 1,544,106,414,000 | 3e38aecfb062769900f5a760de65e174952a1cd4 | 2 | {
"blob_id": "3e38aecfb062769900f5a760de65e174952a1cd4",
"branch_name": "refs/heads/master",
"committer_date": 1544106414000,
"content_id": "6893d20d7da182cc56a5af9c640e5a1fdb13e0af",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "5e89f039e8742ff1adb08ba35534c1e9476abc48",
"extension": "p... | 2.328125 | stackv2 | from flask import Flask, render_template, redirect, request, flash
import json
from flask_login import LoginManager, login_user, logout_user, login_required, current_user
from services import user_services
from werkzeug.security import generate_password_hash, check_password_hash
from config import SECRET_KEY
from utils... | 158 | 25.27 | 102 | 15 | 910 | python | [{"finding_id": "codeql_py/reflective-xss_42be392475588a3f_bd62564d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
154
] | [
null
] | [
12
] | [
77
] | |
2024-11-19T02:30:08.533421+00:00 | 1,535,497,803,000 | 3c2929ff581623ada34c0e7b86104482d99f84cc | 3 | {
"blob_id": "3c2929ff581623ada34c0e7b86104482d99f84cc",
"branch_name": "refs/heads/master",
"committer_date": 1535497803000,
"content_id": "c27e213bba873461ad6115b14c37ab1c48ed0b14",
"detected_licenses": [
"MIT"
],
"directory_id": "bc4b7d114bea578d6cc1931f5213deb7513feedd",
"extension": "py",
"fi... | 2.59375 | stackv2 | #!/usr/bin/env python
"""
Python Client/SDK for querying AirPal for headless statistics.
Airpal provides user access control and management for PrestoDB. This client was created to allow a scriptable client
interface to Airpal, so that automated queries can have the same UAC as interactive data mining.
"""
import req... | 381 | 40.21 | 120 | 27 | 2,983 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_631e981cf31c2dd7_8c4efbfe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
283
] | [
null
] | [
76
] | [
80
] | |
2024-11-19T02:30:19.957447+00:00 | 1,555,977,427,000 | d94d5bf45ff11c94922bae656d6beee7e2548a1e | 2 | {
"blob_id": "d94d5bf45ff11c94922bae656d6beee7e2548a1e",
"branch_name": "refs/heads/master",
"committer_date": 1555977427000,
"content_id": "c28bde5a846518809915c6c51d620049951985f0",
"detected_licenses": [
"MIT"
],
"directory_id": "ce7dadb062570bfb41b7df485407df4e5e5448d0",
"extension": "py",
"fi... | 2.3125 | stackv2 | from jinja2 import Environment as JinjaEnvironment
from jinja2 import PackageLoader as JinjaPackageLoader
from ...plugin import Plugin
class JsonPlugin(Plugin):
@staticmethod
def get_name():
return 'json'
@classmethod
def get_output_file_extension(cls):
return 'json'
def __init_... | 29 | 24.79 | 68 | 14 | 157 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_cb02e73b170d9b62_5b1eafc1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
18
] | [
22
] | [
29
] | [
10
] | |
2024-11-19T02:30:26.261398+00:00 | 1,474,297,296,000 | 26690ea424b02ff28f649d4e17691a1f97b374da | 2 | {
"blob_id": "26690ea424b02ff28f649d4e17691a1f97b374da",
"branch_name": "refs/heads/master",
"committer_date": 1474297296000,
"content_id": "affb160e5590631802b71f8c13b3142b1bd1b793",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5769394caee260a3c1e6073e1156fa072c484f0d",
"extension": "py"... | 2.484375 | stackv2 | import logging
import time
from flask import Blueprint, request, jsonify
from recommendation.api import filters
from recommendation.api import candidate_finders
from recommendation.api import pageviews
from recommendation.api import specification
from recommendation.utils import event_logger
from recommendation.utils ... | 83 | 30.19 | 101 | 14 | 575 | python | [{"finding_id": "codeql_py/stack-trace-exposure_4f1a54e02d9b83e9_e813a123", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
22
] | [
null
] | [
30
] | [
36
] | |
2024-11-19T02:30:30.851861+00:00 | 1,583,685,954,000 | 7f4d13c96ca70f456d7143d8a13b9ed173f564a4 | 2 | {
"blob_id": "7f4d13c96ca70f456d7143d8a13b9ed173f564a4",
"branch_name": "refs/heads/master",
"committer_date": 1583685954000,
"content_id": "2cf90fe8a8dbc3d7b1c63d162531207d47abb12f",
"detected_licenses": [
"MIT"
],
"directory_id": "b56560e14791e2a3f6cdd2b68ce9828664c4cd70",
"extension": "py",
"fi... | 2.375 | stackv2 | # -*- coding: utf-8 -*-
""" Class to encapsulate all the emitter logic """
import json
from jinja2 import Template
from tilty.emitters import datadog, influxdb, webhook
def emit(config, tilt_data):
""" Find and call emitters from config
config (dict): configuration file loaded from disk
tilt_data (dict... | 82 | 36.96 | 175 | 17 | 731 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_098dcc737c9755a1_18c4dab0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25,
48,
49
] | [
null,
null,
null
] | [
21,
29,
33
] | [
68,
85,
93
] | |
2024-11-19T02:30:34.576715+00:00 | 1,572,428,815,000 | cc8de583ea4a2897d4d455ae6d3df6ecde8df0f6 | 3 | {
"blob_id": "cc8de583ea4a2897d4d455ae6d3df6ecde8df0f6",
"branch_name": "refs/heads/master",
"committer_date": 1572428815000,
"content_id": "bbcac3640a2b8692b179843e8a30331764e162c7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "10fa0773b0c8ca68643d9005eeede344c1aa0386",
"extension": "py"... | 2.578125 | stackv2 | """
bitcoind related functionality
"""
from subprocess import call, run, PIPE, STDOUT, DEVNULL
import os
import pathlib
import shutil
from noma import rpcauth
def start():
"""Start bitcoind docker compose container"""
from noma.node import is_running
if is_running("bitcoind"):
print("bitcoind is ... | 311 | 31.23 | 79 | 18 | 2,303 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_de79ea322a602757_72eb29b5", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-732",
"CWE-732"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text.",
"This expression stores [sensiti... | [
218,
303,
297,
307,
55,
58
] | [
220,
null,
null,
null,
null,
null
] | [
17,
24,
15,
23,
17,
17
] | [
18,
58,
62,
55,
63,
58
] | |
2024-11-19T02:30:37.753638+00:00 | 1,690,229,608,000 | 534b078b8d50b8e9f3e0fcbac64edfc336b9df01 | 3 | {
"blob_id": "534b078b8d50b8e9f3e0fcbac64edfc336b9df01",
"branch_name": "refs/heads/main",
"committer_date": 1690229608000,
"content_id": "426cc6e97bdd6948ef658f45bf8bd785aefa8f29",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "1268eb2ae1cbb233f2b92ad7292a6bccb1a236cc",
"extension": "py"... | 2.765625 | stackv2 | # -----------------------------------------------------------------------------
# Copyright (c) 2019-2021, NeXpy Development Team.
#
# Author: Paul Kienzle, Ray Osborn
#
# Distributed under the terms of the Modified BSD License.
#
# The full license is in the file COPYING, distributed with this software.
# ------------... | 248 | 32.62 | 79 | 19 | 1,626 | python | [{"finding_id": "codeql_py/overly-permissive-file_74e2c54c0d19b59e_f4d08dfb", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
133
] | [
null
] | [
17
] | [
48
] | |
2024-11-19T02:30:38.741904+00:00 | 1,660,229,956,000 | f381b2a28c28875d7776a8ae8fb6936a535d833e | 3 | {
"blob_id": "f381b2a28c28875d7776a8ae8fb6936a535d833e",
"branch_name": "refs/heads/master",
"committer_date": 1660229956000,
"content_id": "f5d1bdce29dc75052ef103b8889fdd7bd224c72e",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "37e93c58a63dcf0c059c5a8b4e71a87449d62ac4",
"extension": "p... | 3.0625 | stackv2 | #! /usr/bin/env python
# -*- coding: UTF-8 -*-
"""A command line utility for recursively extracting nested tar archives."""
__author__ = "Pushpak Dagade (पुष्पक दगड़े)"
__date__ = "$4 July, 2011 3:00:00 PM$"
import os
import sys
import re
import tarfile
import gzip
from argparse import ArgumentParser
major_version... | 197 | 40.86 | 80 | 19 | 1,873 | python | [{"finding_id": "codeql_py/tarslip_fb6bc35b26fe3ec4_ff456ee6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
124
] | [
null
] | [
13
] | [
16
] | |
2024-11-19T02:42:23.777068+00:00 | 1,609,849,469,000 | 1250c013247960053117afcdb66a08d232ec39db | 3 | {
"blob_id": "1250c013247960053117afcdb66a08d232ec39db",
"branch_name": "refs/heads/master",
"committer_date": 1609849469000,
"content_id": "844f1337c530d36bd943adb8db2174c9bf5c4f43",
"detected_licenses": [
"MIT"
],
"directory_id": "d10fedd25f7b7e31486aacf73bc84f2323397695",
"extension": "py",
"fi... | 2.546875 | stackv2 | from flask import render_template,request,abort,current_app as app,jsonify
import traceback
import json
from utils import get_face_details,landmark_calc,face_compare
from .models import Child,Match
from . import db
from flask_cors import CORS,cross_origin
"""
Routes for the backend api
"""
@app.route("/")
@cross_origi... | 144 | 32.76 | 133 | 20 | 1,053 | python | [{"finding_id": "codeql_py/stack-trace-exposure_e17d790cb3767bad_0dbfbd22", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 7 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
39,
45,
76,
83,
102,
139,
144
] | [
null,
null,
null,
null,
null,
null,
null
] | [
28,
24,
36,
24,
24,
28,
24
] | [
38,
55,
46,
56,
56,
38,
56
] | |
2024-11-18T18:05:48.004534+00:00 | 1,488,074,797,000 | 7c395cf8bf31ae0a55dc1f91bd62a9b26a06d67c | 3 | {
"blob_id": "7c395cf8bf31ae0a55dc1f91bd62a9b26a06d67c",
"branch_name": "refs/heads/master",
"committer_date": 1488074797000,
"content_id": "6939426884b56086f16941dae9303f5eda17c381",
"detected_licenses": [
"MIT"
],
"directory_id": "7b08124fc67b1ac8ad3cbcd083233b6419acc149",
"extension": "py",
"fi... | 2.8125 | stackv2 | from bs4 import BeautifulSoup
import urllib
import RAKE
import re
import cgi
from flask import Flask, render_template
from flask import request
app = Flask(__name__)
# endpoints have get post put patch delete etc http protocol. default is get
# @app.route('/')
# def parse_url():
# return get_keywords(url)
@app.rou... | 84 | 19.7 | 108 | 11 | 463 | python | [{"finding_id": "codeql_py/flask-debug_ebbc0ab6a1094caf_4b0b4823", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
79,
30
] | [
null,
null
] | [
2,
9
] | [
21,
12
] | |
2024-11-18T18:05:52.066651+00:00 | 1,505,677,251,000 | 1dc19f6e55f1c4d8f902a927f7732462cc36af5c | 3 | {
"blob_id": "1dc19f6e55f1c4d8f902a927f7732462cc36af5c",
"branch_name": "refs/heads/master",
"committer_date": 1505677251000,
"content_id": "f29d016a901bdd908a282af442af1923fe6d1e06",
"detected_licenses": [
"MIT"
],
"directory_id": "05ca02e779cc3fe1c146f923d552234e48787225",
"extension": "py",
"fi... | 3.109375 | stackv2 | import re
import pickle
import time
import unittest
timing = {}
def get_time(f, args=[]):
"""
After using timeit we can get the duration of the function f
when it was applied in parameters args. Normally it is expected
that args is a list of parameters, but it can be also a single parameter.
:ty... | 178 | 24.37 | 77 | 17 | 1,177 | python | [{"finding_id": "codeql_py/overly-large-range_4fabe6f8e105b9a5_15dab3c7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class."
] | [
167,
167,
167
] | [
null,
null,
null
] | [
38,
41,
44
] | [
42,
45,
48
] | |
2024-11-18T18:05:54.956884+00:00 | 1,618,468,674,000 | 2aa3f9db3a6b0a186c81bee23af308d044d7c05d | 3 | {
"blob_id": "2aa3f9db3a6b0a186c81bee23af308d044d7c05d",
"branch_name": "refs/heads/master",
"committer_date": 1618468674000,
"content_id": "bd291887610980ca542c665dc5abd5fcf8f20178",
"detected_licenses": [
"MIT"
],
"directory_id": "001412f54fcfbf635349a1397430a29113909b94",
"extension": "py",
"fi... | 2.875 | stackv2 | # -*- encoding: utf-8 -*-
from __future__ import absolute_import, unicode_literals
import re
import six
import uuid
import hashlib
from datetime import datetime
from addonpayments.exceptions import SdkError
from addonpayments.logger import Logger
logger = Logger().get_logger(__name__)
class GenerationUtils(objec... | 162 | 30.26 | 117 | 19 | 1,057 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_f09f538cab4962a9_82c0b631", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
37
] | [
null
] | [
29
] | [
104
] | |
2024-11-18T18:05:57.688433+00:00 | 1,575,623,851,000 | 797fb22fb4168916e622f2441cc58d477da0f9c5 | 3 | {
"blob_id": "797fb22fb4168916e622f2441cc58d477da0f9c5",
"branch_name": "refs/heads/master",
"committer_date": 1575623851000,
"content_id": "2b85f5105ffc4604ecfade1a94ae2916ed5f2d8f",
"detected_licenses": [
"MIT"
],
"directory_id": "632772fb477fd5a1ffce7955b2ad683e2b822c87",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import pyhaproxy.config as config
class Render(object):
"""Do rendering the config.Config object to a str
Attributes:
configuration (config.Configuration):
"""
def __init__(self, configuration):
self.configuration = configuration
def... | 180 | 31.63 | 79 | 15 | 1,229 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_086284ad43212698_d9e6e4e2", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
41
] | [
null
] | [
21
] | [
48
] | |
2024-11-18T18:05:58.803109+00:00 | 1,628,346,675,000 | 9934eea03cd6553b916c6217ffc3f5aa46d9a74f | 3 | {
"blob_id": "9934eea03cd6553b916c6217ffc3f5aa46d9a74f",
"branch_name": "refs/heads/main",
"committer_date": 1628346675000,
"content_id": "ea64fc26f67150cc47baf3531d1d17d145eef511",
"detected_licenses": [
"MIT"
],
"directory_id": "5c52e64424a57b1ddf8b3d09dc98ada658739e58",
"extension": "py",
"file... | 3.203125 | stackv2 | #!/usr/bin/env python
"""
5. Building on the script from exercise 4, add a description to the the IP address object that you just created.
Accomplish this using an HTTP PUT. The HTTP PUT operation will require all of the mandatory fields in the object
(in this case, the "address" field). Print the status code and th... | 63 | 27.97 | 127 | 11 | 458 | python | [{"finding_id": "codeql_py/request-without-cert-validation_a8420ab03b506742_6b52b2c2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
32,
44
] | [
null,
46
] | [
16,
20
] | [
77,
6
] | |
2024-11-18T18:05:59.755830+00:00 | 1,632,922,829,000 | fdf4b2f984ee84f0986d37d32d8c7190b3cafcb9 | 3 | {
"blob_id": "fdf4b2f984ee84f0986d37d32d8c7190b3cafcb9",
"branch_name": "refs/heads/main",
"committer_date": 1632923187000,
"content_id": "576eb57e63541360ed23e6d19ea22c93c3465eaf",
"detected_licenses": [
"MIT"
],
"directory_id": "f2cf03c4fc1318e1607ffc73314d35088834f6fa",
"extension": "py",
"file... | 2.84375 | stackv2 | from bs4 import BeautifulSoup
import requests
params = {'page': 1}
pages = 2
n = 1
params['page'] += 1
while params['page'] <= pages:
url = 'https://career.habr.com/vacancies/?page=1'
response = requests.get(url, params=params)
content = response.content
soup = BeautifulSoup(content, 'lxml')
cards ... | 57 | 43.12 | 124 | 17 | 674 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_78a1f2a7028a0964_bfa9ca08", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
54
] | [
null
] | [
17
] | [
124
] | |
2024-11-18T18:06:03.792459+00:00 | 1,690,250,414,000 | 3de5936f27da1316d7375e68804622543ec200e0 | 2 | {
"blob_id": "3de5936f27da1316d7375e68804622543ec200e0",
"branch_name": "refs/heads/main",
"committer_date": 1690250414000,
"content_id": "eb14ac65d6e457684f11dd93483186c4855f210d",
"detected_licenses": [
"MIT"
],
"directory_id": "156f46142b313ae0bbd9c5fa052f8e3e308b68d8",
"extension": "py",
"file... | 2.5 | stackv2 | import json
import base64
import urllib3
import logging
import hashlib
import requests
from Crypto import Random
from Crypto.Cipher import DES3
from Crypto.PublicKey import RSA
from Crypto.Cipher import PKCS1_v1_5
from Crypto.Util.Padding import pad, unpad
random_generator = Random.new().read
urllib3.disable_warnings(... | 184 | 31.15 | 95 | 21 | 1,498 | python | [{"finding_id": "codeql_py/weak-crypto-key_d2e8a0b8d3632a0f_079555af", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 5 | true | [
"CWE-326",
"CWE-327",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/weak-crypto-key",
"py/weak-cryptographic-algorithm",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.",
"[The cryptographic algorithm DES3](1) is broken or weak, and should not be used.",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validat... | [
18,
36,
79,
130,
166
] | [
null,
null,
86,
138,
174
] | [
11,
16,
16,
16,
16
] | [
47,
75,
26,
26,
26
] | |
2024-11-18T17:59:49.975099+00:00 | 1,611,929,270,000 | b84bcab10ef0efd5d20c6b25f6d66e679a9f99b0 | 3 | {
"blob_id": "b84bcab10ef0efd5d20c6b25f6d66e679a9f99b0",
"branch_name": "refs/heads/master",
"committer_date": 1611929270000,
"content_id": "71bb6276a798fde3d04b15ae296ea5a147334248",
"detected_licenses": [
"MIT"
],
"directory_id": "8ee9c5c47268b5c683d06fcc75b101a9e69ccac3",
"extension": "py",
"fi... | 3.421875 | stackv2 | class CreditCard:
def __init__(self, customer, bank, accnt, limit):
self.__customer = customer
self.__bank = bank
self.__account= accnt
self.__limit = limit
self.__balance = 0
def get_customer(self):
return self.__customer
def get_bank(self):
... | 45 | 23.67 | 71 | 12 | 270 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6315395294ca644f_55551040", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
44
] | [
null
] | [
11
] | [
13
] | |
2024-11-18T19:11:48.859752+00:00 | 1,598,286,420,000 | 5b6e3199ab3b05fa52a886bd5fd55c7675595277 | 2 | {
"blob_id": "5b6e3199ab3b05fa52a886bd5fd55c7675595277",
"branch_name": "refs/heads/master",
"committer_date": 1598286420000,
"content_id": "f473d7e65a56cd8878d5f0ccbe384683a83bf993",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9c7962d8bf05af11b038871811cfd95c70084bea",
"extension": "py"... | 2.453125 | stackv2 | from flask import Flask, render_template, redirect
app = Flask(__name__)
@app.route('/')
def index():
return """
<h1>Hello World</h1>
<h1>Hello World</h1>
<h1>Hello World</h1>
<h1>Hello World</h1>
<h1>Hello World</h1>
<h1>Hello World</h1>
<h1>Hello World</h1>
"""
@app.route('/logi... | 29 | 17.97 | 50 | 9 | 162 | python | [{"finding_id": "codeql_py/flask-debug_f522591689fa67d9_9a17d227", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
29,
20
] | [
null,
null
] | [
5,
12
] | [
34,
39
] | |
2024-11-18T19:11:50.687463+00:00 | 1,580,586,715,000 | 685a8ae65b8e516ee61f623a46a6fec477300216 | 3 | {
"blob_id": "685a8ae65b8e516ee61f623a46a6fec477300216",
"branch_name": "refs/heads/master",
"committer_date": 1580586715000,
"content_id": "c51da77a5c564c0684d565fef564012c7732ec00",
"detected_licenses": [
"MIT"
],
"directory_id": "da7c4ab97525a45285cd23225d2e02e63a2db2a9",
"extension": "py",
"fi... | 2.71875 | stackv2 | """ This module provides access the Tesla Motors Owner API and handles OAuth 2.0
password granting and bearer token renewal. Tokens are saved to disk for reuse.
API endpoints are loaded from 'endpoints.json'. Credentials to teslamotors.com
and client ID and secret are required.
"""
# Author: Tim Dorssers
import json
... | 321 | 42.54 | 80 | 19 | 3,022 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bcde6f2067f03e9a_61ec11a1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-295"
] | [
"py/clear-text-logging-sensitive-data",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (secret)](... | [
164,
260
] | [
null,
261
] | [
27,
20
] | [
61,
60
] | |
2024-11-18T19:11:54.023717+00:00 | 1,556,906,945,000 | 87a5aa708d218cc085088c64baed8cae777f78c5 | 3 | {
"blob_id": "87a5aa708d218cc085088c64baed8cae777f78c5",
"branch_name": "refs/heads/master",
"committer_date": 1556906945000,
"content_id": "3cadcb58a078b01c8419e47de74e445e565d099f",
"detected_licenses": [
"MIT"
],
"directory_id": "63d185e33571783e1c8420dd9c443df585b6b006",
"extension": "py",
"fi... | 2.671875 | stackv2 | from cryptography import x509
from cryptography.x509.oid import NameOID
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives import serialization
from cryptography.hazmat.primitives.asymmetric import padding, rsa
import datetime
f... | 237 | 26.84 | 103 | 17 | 1,536 | python | [{"finding_id": "codeql_py/weak-crypto-key_80feb793952f801e_5b8e9af6", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1000](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1000](1) bits, which is below 2048 and considered breakable."
] | [
26
] | [
29
] | [
21
] | [
39
] | |
2024-11-18T19:23:59.589547+00:00 | 1,574,646,551,000 | ac18867f9f601bda4b0a8b94cb427e92fbbbc48d | 3 | {
"blob_id": "ac18867f9f601bda4b0a8b94cb427e92fbbbc48d",
"branch_name": "refs/heads/master",
"committer_date": 1574646551000,
"content_id": "1fc5e03be7320b0632c6f82d35b22dda1d22a440",
"detected_licenses": [
"MIT"
],
"directory_id": "a838ca1ae056db0a91481f7826d73c67b106abf3",
"extension": "py",
"fi... | 2.921875 | stackv2 | from datetime import datetime
class Submission:
"""Class for text submittion"""
def __init__(self, text):
self.text = text
self.timestamp = datetime.now()
def get_readable_timestamp(self):
return self.timestamp.strftime("%b %d %Y")
def __str__(self):
return "text: {}\n... | 99 | 30.78 | 80 | 14 | 656 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a8087fd34a2492f9_eb9c6a06", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
61
] | [
null
] | [
15
] | [
70
] | |
2024-11-18T19:24:00.153226+00:00 | 1,425,067,076,000 | 133e841562397b8152afe65be9b230e355eb73e8 | 2 | {
"blob_id": "133e841562397b8152afe65be9b230e355eb73e8",
"branch_name": "refs/heads/master",
"committer_date": 1425067076000,
"content_id": "7b0ff5dcb918ef0d326e0b77457b53d5407b90c5",
"detected_licenses": [
"MIT"
],
"directory_id": "fdde0fa76eea56f9aac6b944a42072dd93e5d71e",
"extension": "py",
"fi... | 2.375 | stackv2 | __author__ = 'Blake'
import os
import re
import json
import time
import types
import mimetypes
import markdown
import yaml
from jinja2 import Template
from synpost.fn.conversions import pretty_size, convert_sysdate, \
flatten_list, path_to_asset, clean_filename, merge_dicts
# bootstrap mimetypes table with MARK... | 243 | 30.75 | 118 | 21 | 1,688 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3846b049425278fc_119a87ae", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
169,
241
] | [
null,
null
] | [
20,
20
] | [
40,
68
] | |
2024-11-18T19:24:04.898037+00:00 | 1,429,876,772,000 | c9f90a21b4921fc53d12a740c80b0803803ef182 | 2 | {
"blob_id": "c9f90a21b4921fc53d12a740c80b0803803ef182",
"branch_name": "refs/heads/master",
"committer_date": 1429876772000,
"content_id": "e041755f9ac3aabad5184512fbad79a4e6806ad3",
"detected_licenses": [
"MIT"
],
"directory_id": "7f07770868bad766d5b18e4bc5dbff30f86234c7",
"extension": "py",
"fi... | 2.421875 | stackv2 | #!/usr/bin/env python3
import argparse
import configparser
import hashlib
import logging
import magic
import os
import requests
import time
import sys
import zipfile
from tempfile import TemporaryDirectory
from fnmatch import fnmatch
def setup_cli(args):
""" Configure command-line arguements """
description... | 266 | 37.55 | 159 | 21 | 2,324 | python | [{"finding_id": "codeql_py/request-without-cert-validation_a04615b9a4c4b2b6_382014cb", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
88,
141
] | [
null,
null
] | [
20,
28
] | [
82,
103
] | |
2024-11-18T19:58:32.449107+00:00 | 1,615,595,708,000 | 68f518435991e2dd99c0360281bfe630277e0d4a | 2 | {
"blob_id": "68f518435991e2dd99c0360281bfe630277e0d4a",
"branch_name": "refs/heads/master",
"committer_date": 1615595708000,
"content_id": "24a7b4cc8ad20fd9cca9abe8b4d4d1f5f788ba3b",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "81d4337314591e98670169e4dd0905d7c87f2219",
"extension": "p... | 2.5 | stackv2 | # This script is part of pyroglancer (https://github.com/SridharJagannathan/pyroglancer).
# This code was adapted using the cors_webserver module present in the neuroglancer package
# for serving data from a local directory via http port.
# The implementation for the range requests was adapted from RangeHTT... | 255 | 33.13 | 107 | 16 | 1,959 | python | [{"finding_id": "codeql_py/http-response-splitting_393bf396975c5d97_8fe2f6d1", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is con... | 1 | true | [
"CWE-113"
] | [
"py/http-response-splitting"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is constructed from a [user-provided value](2)."
] | [
117
] | [
null
] | [
26
] | [
68
] | |
2024-11-18T19:34:25.330562+00:00 | 1,557,900,860,000 | ac6d0f40468c7cf6612cb2da525440da4ea2547f | 3 | {
"blob_id": "ac6d0f40468c7cf6612cb2da525440da4ea2547f",
"branch_name": "refs/heads/master",
"committer_date": 1557900860000,
"content_id": "d60c73b5156220e7261de7c74afeda3498e86549",
"detected_licenses": [
"MIT"
],
"directory_id": "1144021893c3ae9620ac4fae39cd3223003038a9",
"extension": "py",
"fi... | 2.65625 | stackv2 | import json
import logging
class SymConfig:
# initialize object by passing in path to config file
# store configuration data in variable data
def __init__(self, path_to_config):
self.path_to_config = path_to_config
self.data = {}
# load RSA configuration variables into SymConfig data
... | 65 | 52.45 | 121 | 17 | 780 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2c1b5ea10857abc7_581f048d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw... | [
64
] | [
null
] | [
23
] | [
63
] | |
2024-11-18T18:39:42.643775+00:00 | 1,565,498,383,000 | 6b88559791a30a3453a27a1e1264fee7ecee0769 | 2 | {
"blob_id": "6b88559791a30a3453a27a1e1264fee7ecee0769",
"branch_name": "refs/heads/master",
"committer_date": 1565498383000,
"content_id": "1dba67ea9ea31b98a41e31e11d19b057efbc8007",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "c2ae432b1598c0820c67188159bc94cbea937b5a",
"extension": "p... | 2.328125 | stackv2 | from dset.dataset import SequenceDataset
import urllib
import tarfile
import os
import sys
import scipy
if sys.version_info[0] >= 3:
from urllib.request import urlretrieve
else:
from urllib import urlretrieve
class HPatches_Dataset(SequenceDataset):
def __init__(self,root_dir = './datasets/', download_f... | 93 | 37.86 | 141 | 17 | 753 | python | [{"finding_id": "codeql_py/tarslip_c553cd4e7c7be220_f3a77e15", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
37
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T18:39:54.320245+00:00 | 1,560,163,923,000 | a5f0794eb0ec9e7accb4d6176600669b391ecd0c | 2 | {
"blob_id": "a5f0794eb0ec9e7accb4d6176600669b391ecd0c",
"branch_name": "refs/heads/master",
"committer_date": 1560163923000,
"content_id": "3e7ef733347c041041bf6816ad756ef0d2bdaf8b",
"detected_licenses": [
"MIT"
],
"directory_id": "febb4062f35fee96e9318bf60b5353b7125f85f2",
"extension": "py",
"fi... | 2.421875 | stackv2 | """Server exposing endpoints for uploading and downloading tracks, extracting their encodings and returning the
mapped visual parameters
"""
import data_processor as dp
import train
import models
import mapping_utils
import commons
import fma_utils
from flask import Flask, request, jsonify, send_file
from flask_cors ... | 189 | 33.98 | 111 | 19 | 1,489 | python | [{"finding_id": "codeql_py/log-injection_d14756f7aa78c04e_766b4747", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
168
] | [
null
] | [
37
] | [
87
] | |
2024-11-18T18:40:07.764282+00:00 | 1,509,466,869,000 | 256bbd6a2a237cfd15e88fbacfb9444a9f69e812 | 2 | {
"blob_id": "256bbd6a2a237cfd15e88fbacfb9444a9f69e812",
"branch_name": "refs/heads/master",
"committer_date": 1509466869000,
"content_id": "f0aaf46545b98abe2f8bd61fd7357ffb2f440aef",
"detected_licenses": [
"MIT"
],
"directory_id": "63e8e9ecb75436e5be1006c2acd275ad32234487",
"extension": "py",
"fi... | 2.4375 | stackv2 | import os
import datetime
from flask import Flask, request, redirect, url_for, flash
from flask_cors import CORS
from werkzeug import secure_filename
import httplib2
from apiclient import discovery
from apiclient.http import MediaFileUpload
from oauth2client import client
from oauth2client import tools
from oauth2c... | 165 | 31.12 | 111 | 17 | 1,215 | python | [{"finding_id": "codeql_py/flask-debug_ca64272fb08024ec_57d80f9f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-601",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
165,
96,
102
] | [
null,
null,
null
] | [
5,
29,
29
] | [
51,
40,
40
] | |
2024-11-18T20:52:23.129303+00:00 | 1,395,677,957,000 | 949335e22a31b7a731d8d2efcaeea1a6e4c1a097 | 3 | {
"blob_id": "949335e22a31b7a731d8d2efcaeea1a6e4c1a097",
"branch_name": "refs/heads/master",
"committer_date": 1395677957000,
"content_id": "6996073737f255d98044c1f18ea2df9ad53d0a1d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b85c8edaf0d4edbc4ce820f19c9ecc7abcb2e3bc",
"extension": "py"... | 2.890625 | stackv2 | #!/usr/bin/env python2.7
# name: 399crypto_analysis.py
# author: Chad Hobbs
# created: 140322
#
# description: ##
import os
from Crypto.Cipher import DES3
from Crypto import Random
# ----------------------------------------------------------------------------------------
# Function Name: encrypt_file(in_filen... | 72 | 33.71 | 90 | 21 | 567 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_2e06ff0db354b1d4_d2e7dd0b", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES3](1) is broken or weak, and should not be used.", "... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The cryptographic algorithm DES3](1) is broken or weak, and should not be used.",
"[The cryptographic algorithm DES3](1) is broken or weak, and should not be used."
] | [
30,
47
] | [
null,
null
] | [
32,
32
] | [
51,
51
] | |
2024-11-18T20:52:23.894407+00:00 | 1,558,322,037,000 | 326bd4728631f446cc1b120a9783d781353a95d7 | 2 | {
"blob_id": "326bd4728631f446cc1b120a9783d781353a95d7",
"branch_name": "refs/heads/master",
"committer_date": 1558322037000,
"content_id": "b02da6b22c198180c7bd702f2d43ca0deac4efda",
"detected_licenses": [
"MIT"
],
"directory_id": "1f353b89eb4280a9bce874f8c411983a2f7e637d",
"extension": "py",
"fi... | 2.4375 | stackv2 | # -*- coding: utf-8 -*-
import scrapy
from mobile_phone.items import MobilePhoneItem
class HonorSpider(scrapy.Spider):
name = 'honor'
allowed_domains = ['www.mobilephonesspecs.com']
start_urls = ['https://www.mobilephonesspecs.com/']
temp_url = 'http://www.mobilephonesspecs.com/{}/page/{}'
page =... | 49 | 37 | 111 | 18 | 410 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_387624ebd5977a38_0de62704", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
48
] | [
null
] | [
15
] | [
19
] | |
2024-11-18T18:47:02.575853+00:00 | 1,552,635,401,000 | 4f6361a1daddd0f2016c91d8dfe446fa2ca7e701 | 2 | {
"blob_id": "4f6361a1daddd0f2016c91d8dfe446fa2ca7e701",
"branch_name": "refs/heads/master",
"committer_date": 1552635401000,
"content_id": "36637b8c3cf0cf32f7280ef642bb8479b7358fd1",
"detected_licenses": [
"MIT"
],
"directory_id": "220647ab931701baf7f55a0b6bb560a546a95d0a",
"extension": "py",
"fi... | 2.34375 | stackv2 | # -*- coding: utf-8 -*-
import requests
import json
from xml.etree import ElementTree
import mashery_api
debug = False
def get(url, headers, payload = None, ssl = False):
if payload:
if not "?" in url:
parameters = "?"
elif url[-1] != "&":
parameters = "&"
else:
parameters = ""
for k, v in payload... | 123 | 20.15 | 74 | 14 | 781 | python | [{"finding_id": "codeql_py/request-without-cert-validation_46d177fb792a2ce0_9584d1b7", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2).",
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
33,
98
] | [
null,
null
] | [
8,
8
] | [
58,
61
] | |
2024-11-18T19:10:00.202081+00:00 | 1,604,186,708,000 | c05f3603622d3c9548a219d5561bd29d9291b253 | 2 | {
"blob_id": "c05f3603622d3c9548a219d5561bd29d9291b253",
"branch_name": "refs/heads/main",
"committer_date": 1604186708000,
"content_id": "189b5108cb0f255ece0a85a23f5f38d081d0d0b7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b042ac9e0604aef7a15c712ad4562387df16fffb",
"extension": "py",
... | 2.375 | stackv2 | #!/usr/bin/env python3
from flask import Flask
from flask import render_template
from flask import make_response
from flask import request
app = Flask(__name__)
@app.route('/')
def start():
id = request.cookies.get('userID')
allowed = False
if id is None:
id = '0'
elif id == '1':
allo... | 26 | 18.88 | 72 | 12 | 129 | python | [{"finding_id": "codeql_py/insecure-cookie_9fbb7e986017239d_4240adcf", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"... | 3 | true | [
"CWE-614",
"CWE-020",
"CWE-1004"
] | [
"py/insecure-cookie",
"py/cookie-injection",
"py/client-exposed-cookie"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cookie is added to response without the 'secure' flag being set.",
"Cookie is constructed from a [user-supplied input](1).",
"Sensitive server cookie is set without HttpOnly flag."
] | [
20,
20,
20
] | [
null,
null,
null
] | [
5,
31,
5
] | [
34,
33,
34
] | |
2024-11-18T20:15:51.125721+00:00 | 1,621,670,522,000 | df623c6564512110e207f7f889faa8bae1e23127 | 3 | {
"blob_id": "df623c6564512110e207f7f889faa8bae1e23127",
"branch_name": "refs/heads/master",
"committer_date": 1621670522000,
"content_id": "e91272d07b1945bcc7b1bbb7c90969df786c1722",
"detected_licenses": [
"MIT"
],
"directory_id": "6c42c62775e2edacf5786e00345d63c3d8f179b1",
"extension": "py",
"fi... | 3.09375 | stackv2 | #!/usr/bin/env python3
import sys
import re
from collections import OrderedDict
import unicodedata
# Modified from https://stackoverflow.com/a/49146722/4327513
# This isn't a perfect solution, but it just has to catch all the emoji in the input data
blacklist_unicode = re.compile(r'['
u'£€'
u'\U0001F600-\U000... | 129 | 30.26 | 136 | 23 | 1,145 | python | [{"finding_id": "codeql_py/overly-large-range_01d4b194ddf3572e_738f7e75", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class."
] | [
12,
12
] | [
null,
null
] | [
7,
10
] | [
11,
14
] | |
2024-11-18T19:38:17.635218+00:00 | 1,609,198,474,000 | 8676f8f859de78ea82be24d15fe9e242af544740 | 3 | {
"blob_id": "8676f8f859de78ea82be24d15fe9e242af544740",
"branch_name": "refs/heads/main",
"committer_date": 1609198474000,
"content_id": "a44b286d99631bbfafe01c2ac14908334fa06817",
"detected_licenses": [
"MIT"
],
"directory_id": "7d79e6e08c56071516b55a01761fd8b30077cb13",
"extension": "py",
"file... | 2.671875 | stackv2 | from typing import List, \
Tuple
from common.file_reader import FileReader
from day_2_tobogan.old_policy import OldPolicy
def count_valid_password(registry: List[Tuple[OldPolicy, str]]) -> int:
return [line[0].is_password_valid(line[1]) for line in registry].count(True)
if __name__ == '__main__':
file_... | 17 | 29.94 | 80 | 12 | 119 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5fcabdd9ad85f4b6_2ad0828a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
17
] | [
null
] | [
11
] | [
48
] | |
2024-11-18T19:38:21.368592+00:00 | 1,551,561,129,000 | 18f707bb80e2f4b3124be8e038eed1a4c4b011f1 | 2 | {
"blob_id": "18f707bb80e2f4b3124be8e038eed1a4c4b011f1",
"branch_name": "refs/heads/master",
"committer_date": 1551561129000,
"content_id": "78856c56448bd02653ce0a759e16c2eda2eb4082",
"detected_licenses": [
"MIT"
],
"directory_id": "938ecdd3b93d5ceeaff9f34e018b6365cc933d7a",
"extension": "py",
"fi... | 2.4375 | stackv2 | import flickr_api
import codecs
import os
import subprocess
# TODO: Figure out how to download videos. Sometimes it downloads as a jpg? sometimes it fails?
# Ex: edrabbit, Stupid brush turkey, Video Original, http://www.flickr.com/photos/77866964@N00/8253619402
# IOError: [Errno 2] No such file or directory: u'saved/e... | 149 | 36.34 | 149 | 15 | 1,491 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_040feedf33de5944_6c229662", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
102,
104
] | [
null,
null
] | [
18,
18
] | [
44,
50
] | |
2024-11-18T19:38:37.733973+00:00 | 1,515,186,149,000 | 0a85e564cd8acd41bd9d91c756994c0fe550e6d3 | 3 | {
"blob_id": "0a85e564cd8acd41bd9d91c756994c0fe550e6d3",
"branch_name": "refs/heads/master",
"committer_date": 1515186149000,
"content_id": "b846c0efcc8c45a6867262094ca55c5c1b3f733b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "46c20b80f9a3d603a3bef24dc589fc74c3cc25f1",
"extension": "py"... | 2.734375 | stackv2 | import requests
from bs4 import BeautifulSoup
import re
import js
class Quora_Crawler():
'''
basic crawler
'''
def __init__(self, url, option="print_data_out"):
'''
initialize the crawler
'''
self.option = option
self.url = url
self.header = {}
... | 130 | 33.38 | 112 | 17 | 995 | python | [{"finding_id": "codeql_py/request-without-cert-validation_7f0f1f1ce71ac751_4af1e1bd", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
32
] | [
33
] | [
17
] | [
64
] | |
2024-11-18T19:38:38.631022+00:00 | 1,442,218,338,000 | 2e4cfd401dd4fcef1ba40c4a9b93cca405baa7c2 | 3 | {
"blob_id": "2e4cfd401dd4fcef1ba40c4a9b93cca405baa7c2",
"branch_name": "refs/heads/master",
"committer_date": 1442218338000,
"content_id": "94fbbf78290c655ee97ce29855c95ad20071d0f7",
"detected_licenses": [
"MIT"
],
"directory_id": "d0caa9d4022e2680034778f30472ba2b52376a86",
"extension": "py",
"fi... | 2.59375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
Decorators for API input validation
Created by: Rui Carmo (https://github.com/rcarmo)
"""
import os, sys, re, functools, logging
from bottle import request, abort
from utils.netstats import valid_ip_address, valid_mac_address
log = logging.getLogger()
def valid_iden... | 55 | 31.51 | 87 | 17 | 417 | python | [{"finding_id": "codeql_py/log-injection_cdceeaf489b053a1_b2ab88ca", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
50
] | [
null
] | [
23
] | [
74
] | |
2024-11-18T20:10:37.738201+00:00 | 1,622,834,554,000 | f84f485e086c117fa7eac33610dd374a17728418 | 3 | {
"blob_id": "f84f485e086c117fa7eac33610dd374a17728418",
"branch_name": "refs/heads/main",
"committer_date": 1622834554000,
"content_id": "46cd60ca6cb849a45643a6b600f6dc8de86087a9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8fb9b99e5f05ffdc1e690bcc3bdcb6bcad4ec077",
"extension": "py",
... | 2.546875 | stackv2 | import pickle
import os
import glob
from dotmap import DotMap
import matplotlib.pyplot as plt
from jinja2 import Environment, FileSystemLoader
import pandas as pd
import requests
import uuid
from weasyprint import HTML
def draw_matrix(data, norm = False):
if norm:
v_bounds = {'vmin' : -1, 'vmax': 1}
... | 97 | 28.92 | 125 | 12 | 785 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0c04b5f8a675b848_735885f7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
78
] | [
null
] | [
11
] | [
52
] | |
2024-11-18T20:26:24.816141+00:00 | 1,440,022,382,000 | ce25d4896f99bf5d4b9d3e431b25718c27f71c30 | 2 | {
"blob_id": "ce25d4896f99bf5d4b9d3e431b25718c27f71c30",
"branch_name": "refs/heads/master",
"committer_date": 1440022382000,
"content_id": "12a2050f515b8f12b6413e71f32f1740e9ab5e9d",
"detected_licenses": [
"MIT"
],
"directory_id": "8d7d9891dd8a3985ae6ae1de93d04cd4915a4529",
"extension": "py",
"fi... | 2.375 | stackv2 | import tornado.web
from tornado.log import app_log
import tornado.escape
import pprint
import os
import json
from tinydb import TinyDB, where
class BaseHandler(tornado.web.RequestHandler):
#
# Base Handler for the Controllers
#
def get_current_user(self):
return self.get_secure_cookie("logi... | 103 | 34.39 | 121 | 20 | 778 | python | [{"finding_id": "codeql_py/reflective-xss_7a1ea1bfd2b06ef8_a1436ae2", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
30,
40
] | [
null,
null
] | [
20,
20
] | [
74,
67
] | |
2024-11-18T20:26:33.896915+00:00 | 1,536,056,667,000 | bef563b0530d5645d2d93f6c9dbe8f8731884dd8 | 3 | {
"blob_id": "bef563b0530d5645d2d93f6c9dbe8f8731884dd8",
"branch_name": "refs/heads/master",
"committer_date": 1536056667000,
"content_id": "cedf652b67bd14f18c746bb52fded8b9b352cab8",
"detected_licenses": [
"MIT"
],
"directory_id": "6745cbb726a1a783b95d6a7360e466dcfe6a7883",
"extension": "py",
"fi... | 2.921875 | stackv2 | # from app import app
import urllib.request,json
from .models import Source
from .models import Article
# getting the api key
apiKey = None
#getting the source base urlli
base_url = None
#getting the article url
articleBase_url = None
def configure_request(app):
global apiKey,base_url,articleBase_url
apiKey... | 108 | 29.06 | 96 | 12 | 654 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_efce58b0e8b83179_ba7cc285", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
69
] | [
null
] | [
11
] | [
26
] | |
2024-11-18T20:26:38.341886+00:00 | 1,606,383,273,000 | 1b1b024a3cc62c4a7d088b55bd070defac9e82c1 | 2 | {
"blob_id": "1b1b024a3cc62c4a7d088b55bd070defac9e82c1",
"branch_name": "refs/heads/master",
"committer_date": 1606383300000,
"content_id": "ab0be7f895ff3df0f810d8d69f7df9453f4e66c6",
"detected_licenses": [
"MIT"
],
"directory_id": "c21bc9e4a4f58493cf71de96b353da376d79ab8d",
"extension": "py",
"fi... | 2.375 | stackv2 | import json
import base64
from urllib.parse import quote_from_bytes, unquote, urlunparse, urlparse, urlencode, parse_qs
from django.conf import settings
from django.core.paginator import InvalidPage
from rest_framework import pagination, serializers
from rest_framework.exceptions import NotFound
from rest_framework.re... | 490 | 31.48 | 114 | 21 | 3,751 | python | [{"finding_id": "codeql_py/stack-trace-exposure_9db989261aaee72a_01a5b3de", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
425
] | [
null
] | [
28
] | [
31
] | |
2024-11-18T20:26:49.091242+00:00 | 1,599,148,415,000 | 87fb3dfa7370f56379c886ea51ad303c335be3b7 | 3 | {
"blob_id": "87fb3dfa7370f56379c886ea51ad303c335be3b7",
"branch_name": "refs/heads/master",
"committer_date": 1599148415000,
"content_id": "7e8cfff83f74a7fe0376a7c369f029a71beed571",
"detected_licenses": [
"MIT"
],
"directory_id": "871846247c7dc797eeeaf87928a7b88be6e04f88",
"extension": "py",
"fi... | 2.703125 | stackv2 | #!/usr/bin/python3
"""
# Author: Scott Chubb scott.chubb@netapp.com
# Written for Python 3.4 and above
# No warranty is offered, use at your own risk. While these scripts have
# been tested in lab situations, all use cases cannot be accounted for.
# This script connects to a cluster or node and does some basic error... | 85 | 41.16 | 91 | 20 | 735 | python | [{"finding_id": "codeql_py/request-without-cert-validation_fd88f0a9bd267f73_54ba7acf", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
22
] | [
26
] | [
20
] | [
50
] | |
2024-11-18T20:26:55.789262+00:00 | 1,687,966,427,000 | df604b338fa6b7d4ab06aef1632e3f5d12d8d184 | 3 | {
"blob_id": "df604b338fa6b7d4ab06aef1632e3f5d12d8d184",
"branch_name": "refs/heads/master",
"committer_date": 1687966427000,
"content_id": "a6819e17d571e5f436ed78c6aab455e4919cf8bc",
"detected_licenses": [
"MIT"
],
"directory_id": "50203b4a349dcb2ed1e72c9f5463d84db8a6e983",
"extension": "py",
"fi... | 2.640625 | stackv2 | """
api_get_namespace_metric_count.py
"""
import logging
from flask import request
from functions.metrics.get_namespace_metric_count import get_namespace_metric_count
# @added 20230131 - Feature #4838: functions.metrics.get_namespace_metric.count
# Task #2732: Prometheus to Skyline
# ... | 55 | 41.05 | 128 | 16 | 499 | python | [{"finding_id": "codeql_py/log-injection_c58bf35b996843ba_1f9c47d0", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
32
] | [
null
] | [
29
] | [
100
] | |
2024-11-18T20:26:59.551257+00:00 | 1,596,113,560,000 | 3032b4be5c73d15d689024c73f51675766b20892 | 3 | {
"blob_id": "3032b4be5c73d15d689024c73f51675766b20892",
"branch_name": "refs/heads/master",
"committer_date": 1596113560000,
"content_id": "e9d820ef37244ac164350795e848bab5b7fb0b65",
"detected_licenses": [
"MIT"
],
"directory_id": "feeacdbbb7429b8178b2cccc12765c43a40ff9e6",
"extension": "py",
"fi... | 2.671875 | stackv2 | import secrets
import getpass
import os
import hashlib
from appdirs import user_data_dir
from permon import config
data_dir = user_data_dir('permon', 'bminixhofer')
secret_path = os.path.join(data_dir, 'SECRET_KEY')
def get_secret_key():
"""
Get the secret key. This key is created once and stays the same aft... | 48 | 24.62 | 79 | 14 | 264 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_82a0406483232dcf_d2fd116f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
30
] | [
null
] | [
27
] | [
51
] | |
2024-11-18T20:27:01.853750+00:00 | 1,583,759,489,000 | 8c8f1c5b369b8a745eb6be73236348e401d9eeab | 2 | {
"blob_id": "8c8f1c5b369b8a745eb6be73236348e401d9eeab",
"branch_name": "refs/heads/master",
"committer_date": 1583759489000,
"content_id": "fe511e184d91ee5f4cd9660d9d371bf7ddf4b31e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "37829728f3727af6e202984402727463eb8b5239",
"extension": "py"... | 2.328125 | stackv2 | from jinja2 import Environment, FileSystemLoader
import os
import sys
def check_dir(dir_path):
"""Get directory path to overrides."""
dir = dir_path
if dir == '.':
dir = os.getcwd()
if not os.path.exists(dir):
print("directory does not exist, exiting")
os._exit(1)
return di... | 48 | 33.42 | 76 | 13 | 363 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_6c8ac9d91a0a7f20_3b3149af", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
22
] | [
24
] | [
11
] | [
42
] | |
2024-11-18T20:52:09.636415+00:00 | 1,501,770,534,000 | 6507125b83d0d85ea4f002ef47f70403616088b6 | 3 | {
"blob_id": "6507125b83d0d85ea4f002ef47f70403616088b6",
"branch_name": "refs/heads/master",
"committer_date": 1501770534000,
"content_id": "8e3f6007cd6799daff854fdb168db51791d43b99",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "7fefde83f43e35ddcddceb552e2d63d0df4c2bf5",
"extension": "p... | 2.640625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
# ******************************************************************************
# Argon Design Ltd. Project P9000 Argon
# (c) Copyright 2017 Argon Design Ltd. All rights reserved.
#
# Module : maybot
# Author : Steve Barlow
# $Id: maybot.py 18334 2017-06-18 18:58:50Z sjb $... | 67 | 33.81 | 103 | 15 | 575 | python | [{"finding_id": "codeql_py/log-injection_5f825ad4beb6c922_08b6a31b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
43
] | [
null
] | [
21
] | [
50
] | |
2024-11-18T20:52:13.405144+00:00 | 1,521,400,542,000 | 2813bffde704cc2ffccc9eecc46d8e27f8ec9f81 | 3 | {
"blob_id": "2813bffde704cc2ffccc9eecc46d8e27f8ec9f81",
"branch_name": "refs/heads/main",
"committer_date": 1521400542000,
"content_id": "1ed92e245ade02ebdb144f63d354479bddfb9a0b",
"detected_licenses": [
"MIT"
],
"directory_id": "f8de8621cd04799367979681d9ce8786482cab2f",
"extension": "py",
"file... | 3.1875 | stackv2 | import argparse
import itertools
import logging
import multiprocessing
import random
def get_response(guess, secret):
bulls, cows = 0, 0
for g, s in zip(guess, secret):
if g == s:
bulls += 1
elif g in secret:
cows += 1
return (bulls, cows)
_solver_classes = set()
class SolverRegistry(typ... | 170 | 26.58 | 79 | 15 | 1,137 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0a8a9f18d7527d29_e1dbe876", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secre... | [
68,
142,
144
] | [
null,
null,
null
] | [
39,
38,
41
] | [
45,
51,
52
] | |
2024-11-18T20:52:26.563222+00:00 | 1,572,065,366,000 | f9b732aac1f7222ccc7e975e9974ef1918abe0e0 | 2 | {
"blob_id": "f9b732aac1f7222ccc7e975e9974ef1918abe0e0",
"branch_name": "refs/heads/master",
"committer_date": 1572065366000,
"content_id": "429424f0e86d65bf64f36a40533d7bbfbfebdd7c",
"detected_licenses": [
"MIT"
],
"directory_id": "62d1e0b8fefb9183307f347b3aacc1475383823c",
"extension": "py",
"fi... | 2.484375 | stackv2 | # The MIT License (MIT)
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merge, publish, distribute, subl... | 111 | 32.31 | 118 | 18 | 872 | python | [{"finding_id": "codeql_py/tarslip_3ed824bd24289205_02409064", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
36
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T20:52:38.548048+00:00 | 1,623,642,098,000 | 1e03257c3a67707e11cf9c4f1029fc7acfd3f491 | 2 | {
"blob_id": "1e03257c3a67707e11cf9c4f1029fc7acfd3f491",
"branch_name": "refs/heads/main",
"committer_date": 1623642098000,
"content_id": "219a35970f890e4ebc7989fadcf88dbb0dcbd7de",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "803a037da8a09b1698d7bc5a28bae3b923257fbc",
"extension": "py",
"... | 2.40625 | stackv2 | from sys import displayhook
import requests
import xml.etree.ElementTree as ET
from parametros import gho_ind
from datetime import datetime
# Se utilizó código de respuestas del siguiente link: https://stackoverflow.com/questions/29810572/save-xml-response-from-get-call-using-python/29810645
def get_country_file(coun... | 104 | 35.43 | 152 | 18 | 948 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a55c00bc8266e2e9_cee34b46", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
53,
84
] | [
null,
null
] | [
19,
23
] | [
35,
39
] | |
2024-11-18T20:52:55.069972+00:00 | 1,492,701,434,000 | 169f4db8023c8190f39980b0a91cb2cae8f27d58 | 3 | {
"blob_id": "169f4db8023c8190f39980b0a91cb2cae8f27d58",
"branch_name": "refs/heads/master",
"committer_date": 1492701434000,
"content_id": "8e6e5c8effd59b50eae90a707f7cad204778cc04",
"detected_licenses": [
"MIT"
],
"directory_id": "8d6038a6d22c14803ead7cd9f65c703b5a6894b1",
"extension": "py",
"fi... | 2.71875 | stackv2 | # basic CAS. An extension could use multiple disks + redis and manage
# redundancy to make best effort use of all disk space.
# TODO deal with: (in base class, NotImplementedError)
# TODO scrub method could deal with one ref at a time to enable a web progress bar (be a Job)
# TODO atomic writes (not that important)
... | 227 | 29.04 | 93 | 18 | 1,565 | python | [{"finding_id": "codeql_py/overly-permissive-file_42b03c33032c34f1_677d9d44", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable.",
"Overly permissive mask in chmod sets file to world readable."
] | [
55,
69
] | [
null,
null
] | [
9,
13
] | [
28,
32
] | |
2024-11-18T19:14:27.393266+00:00 | 1,357,624,768,000 | 833396102211b84056104efcdf2becfd1e4b6309 | 3 | {
"blob_id": "833396102211b84056104efcdf2becfd1e4b6309",
"branch_name": "refs/heads/master",
"committer_date": 1357624768000,
"content_id": "58e95756263119730b87d4350fd5b88453160f64",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a81956301f80a7f2aee1d7264de47c7390924198",
"extension": "py"... | 2.640625 | stackv2 | # -*- coding: utf-8 -*-
"""
heso.model
~~~~~~~~~~
Implements the model.
:copyright: (c) 2011 lanius
:license: Apache License, Version 2.0, see LICENSE for more details.
"""
from hashlib import sha1
import os
from uuid import uuid4
from peewee import Model, CharField, Q
from database import data... | 68 | 22.22 | 72 | 14 | 359 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_25b5af1049b65559_6105d61e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
44,
58
] | [
null,
null
] | [
21,
28
] | [
53,
61
] | |
2024-11-18T19:14:32.894282+00:00 | 1,441,694,863,000 | 55d1e18f3c68107d02142bffa2de688b4fbf6deb | 3 | {
"blob_id": "55d1e18f3c68107d02142bffa2de688b4fbf6deb",
"branch_name": "refs/heads/master",
"committer_date": 1441694863000,
"content_id": "190c532aa20bf44d5c2f3c33d1f4d481d16f3157",
"detected_licenses": [
"MIT"
],
"directory_id": "aed12f37fe5cfc66d435290a0c0ff6a55dc3a447",
"extension": "py",
"fi... | 3.25 | stackv2 | #!/usr/bin/env python
"""
The tiniest Nagios dashboard. Scrapes status.cgi, returns
ANSI-colored host & service counts.
Not guaranteed to work at all. For best chance of results,
use url akin to https://myhost/nagios3/cgi-bin/status.cgi
Sam Merwin, March 2014
smerwin@gmail.com
"""
import requests
from random import... | 111 | 27.12 | 80 | 14 | 808 | python | [{"finding_id": "codeql_py/request-without-cert-validation_a54348d806022860_3f00c219", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
83
] | [
null
] | [
5
] | [
74
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.