added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T03:24:42.601180+00:00 | 1,589,150,485,000 | 6c5d6b202427880bd45537485d8b332dd9d7330e | 3 | {
"blob_id": "6c5d6b202427880bd45537485d8b332dd9d7330e",
"branch_name": "refs/heads/master",
"committer_date": 1589150485000,
"content_id": "e03ca44196e9918b1f7b7452670097d67ea4e6f9",
"detected_licenses": [
"MIT"
],
"directory_id": "e2b9786b94e973c03b286e179b05bbb4c2c3ddad",
"extension": "py",
"fi... | 2.65625 | stackv2 | import stackless
from jinja2 import Environment, PackageLoader
class JinjaRequest(object):
def __init__(self, data):
self.data = data
self.channel = stackless.channel()
class JinjaProcessor(object):
def __init__(self):
self.in_channel = stackless.channel()
self.environment =... | 51 | 26.29 | 71 | 15 | 267 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_904541a7401afb71_5b138217", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
15
] | [
20
] | [
28
] | [
10
] | |
2024-11-19T03:24:56.685313+00:00 | 1,693,388,042,000 | a30fa1513d6a1b60bf5a50aba6ccd8807066cc0c | 2 | {
"blob_id": "a30fa1513d6a1b60bf5a50aba6ccd8807066cc0c",
"branch_name": "refs/heads/master",
"committer_date": 1693388042000,
"content_id": "bbdb6c144cfd4032eb32c3c578a505eee6a18a62",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e124b63c8542da816e03ef5177112fc7af4d91a8",
"extension": "py"... | 2.3125 | stackv2 | '''
Copyright (c) 2017 HERE Europe B.V.
See the LICENSE file in the root of this project for license details.
'''
from abc import ABCMeta, abstractmethod
from jinja2 import Environment, PackageLoader
from jinja2 import nodes
from jinja2.ext import Extension
from jinja2.exceptions import TemplateRuntimeError
from fl... | 86 | 44.28 | 102 | 16 | 823 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b518db33abd79c84_60bd6be9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
40
] | [
41
] | [
15
] | [
91
] | |
2024-11-19T01:37:34.718261+00:00 | 1,543,942,197,000 | 57fe7233cce0c3c9586cf3589374e54a1dfc24f0 | 3 | {
"blob_id": "57fe7233cce0c3c9586cf3589374e54a1dfc24f0",
"branch_name": "refs/heads/master",
"committer_date": 1543942197000,
"content_id": "c0ec56fe7aabe67b283fac1b4d225a74803f6615",
"detected_licenses": [
"MIT"
],
"directory_id": "df5183e60cd3de2dd49a122b2ecbd35bc8c3383f",
"extension": "py",
"fi... | 2.5625 | stackv2 | import requests
import json
class SplunkHTTPEventCollector(object):
"""
method for leveraging the splunk HTTP Event Collector.
"""
@classmethod
def eventpost(cls, splunkurl, event, sourcetype, token):
cls.token = token
cls.event = event
cls.sourcetype = sourcetype
... | 22 | 34.5 | 104 | 14 | 200 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e409701492b1ffa1_fc4ed485", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
21
] | [
null
] | [
13
] | [
105
] | |
2024-11-19T01:37:53.642125+00:00 | 1,495,384,131,000 | 56ebed1169963df645da9a9d691076143ff065e4 | 3 | {
"blob_id": "56ebed1169963df645da9a9d691076143ff065e4",
"branch_name": "refs/heads/master",
"committer_date": 1495384131000,
"content_id": "93787c33bd009c7abca7df9799f3a5a0210375dd",
"detected_licenses": [
"MIT"
],
"directory_id": "197d65e432ebf1cc0a071dee284aa138968314d6",
"extension": "py",
"fi... | 2.953125 | stackv2 | import urllib.request, urllib.parse, urllib.error
import logging
from bs4 import BeautifulSoup
def search(query):
url = 'https://duckduckgo.com/html/?q={}'.format(urllib.parse.quote_plus(query))
try:
resp = urllib.request.urlopen(url)
except Exception as e:
logging.info('DuckDuckGo: {}'.fo... | 37 | 31.84 | 93 | 13 | 299 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b9b9af19d9a01e5b_e71eee4a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://duckduckgo.com](1) may be at an arbitrary posi... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [https://duckduckgo.com](1) may be at an arbitrary position in the sanitized URL."
] | [
30
] | [
null
] | [
8
] | [
58
] | |
2024-11-19T01:38:28.174513+00:00 | 1,610,153,327,000 | 9b52f54a99ff3ca4a729539a63a8b31e4c2eb58a | 2 | {
"blob_id": "9b52f54a99ff3ca4a729539a63a8b31e4c2eb58a",
"branch_name": "refs/heads/main",
"committer_date": 1610153327000,
"content_id": "6e4fae45eeb6a2ab11d79369e4cd830dbbb0d15f",
"detected_licenses": [
"MIT"
],
"directory_id": "af4abf0a22db1cebae466c56b45da2f36f02f323",
"extension": "py",
"file... | 2.390625 | stackv2 | # AVL Mode Package
# Released under MIT License
# Copyright (c) 2020 TytusDb Team
# Developers: SG#16
import csv
import os
import pickle
import re
import shutil
class Handler:
# Databases
@staticmethod
def rootinstance() -> list:
if not os.path.exists('data'):
os.makedirs('data')
... | 109 | 27.43 | 100 | 21 | 755 | python | [{"finding_id": "codeql_py/overly-large-range_215d8605508d4d03_83d31eae", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
87,
89
] | [
null,
null
] | [
32,
36
] | [
35,
39
] | |
2024-11-19T01:38:33.687129+00:00 | 1,535,231,638,000 | d5f47c5383de3c8a04830f06ffbeb7e82fd4a70d | 3 | {
"blob_id": "d5f47c5383de3c8a04830f06ffbeb7e82fd4a70d",
"branch_name": "refs/heads/master",
"committer_date": 1535231638000,
"content_id": "e5b1bcfb13b2b0230f43e8dba7882ebe5257d5d7",
"detected_licenses": [
"MIT"
],
"directory_id": "65768c410fe403593569ed046c6ee486f531a91d",
"extension": "py",
"fi... | 2.625 | stackv2 | import psycopg2
import time
import os
from neorpc.Settings import SettingsHolder
from Client import RPCClient, RPCEndpoint
import socket
import requests
import json
client = RPCClient()
class NodeObject:
def __init__(self, node_id, url, ip):
self.node_id = node_id
self.url = url
self.ip =... | 284 | 36.35 | 146 | 19 | 2,500 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_af5c5dd89af1fe81_54763c92", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
50
] | [
null
] | [
11
] | [
22
] | |
2024-11-19T01:38:35.366275+00:00 | 1,592,610,134,000 | 3b99f7df359a5c3051830e5cfadabf1cf9dc0a96 | 3 | {
"blob_id": "3b99f7df359a5c3051830e5cfadabf1cf9dc0a96",
"branch_name": "refs/heads/master",
"committer_date": 1592610134000,
"content_id": "fe7905a691a888a4dd2baa4cafea5e13476aebf1",
"detected_licenses": [
"MIT"
],
"directory_id": "236e0e1376b97c8789c9382424cfe784f5dc910b",
"extension": "py",
"fi... | 2.875 | stackv2 | #!/usr/bin/env python3
"""
@author: Katherine Eaton
Geocode addresses in a tsv file.
./geocode_NextStrain.py \
--in-tsv ../metadata_assembly_nextstrain_edit_name.tsv \
--loc-col BioSampleGeographicLocation \
--out-tsv ../metadata_assembly_nextstrain_edit_name_geocode.tsv \
--out-lat-lon ../metadata_assem... | 225 | 39.63 | 115 | 22 | 1,738 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_be8fc1e51ac8232e_f38ac8f2", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive data (private)](4) as clear text.",
"This expression stores [sensitive d... | [
185,
205,
214
] | [
188,
208,
217
] | [
20,
40,
36
] | [
52,
62,
58
] | |
2024-11-19T01:38:46.537321+00:00 | 1,597,497,261,000 | 64634cac37f28a07a73a16cb2daf46bd14bbcb69 | 3 | {
"blob_id": "64634cac37f28a07a73a16cb2daf46bd14bbcb69",
"branch_name": "refs/heads/master",
"committer_date": 1597497261000,
"content_id": "0963410d47b12be3df9b676735d536dd39e0c81f",
"detected_licenses": [
"MIT"
],
"directory_id": "af372f845d10953c48c33b6c486b13be90e09766",
"extension": "py",
"fi... | 2.53125 | stackv2 | import torch
from torchvision.datasets import VisionDataset
from torchvision.datasets.utils import check_integrity
import os
import numpy as np
from glob import glob
import PIL
class Chairs(VisionDataset):
# There currently does not appear to be a easy way to extract 7z in python (without introducing additional
... | 79 | 35.2 | 110 | 17 | 635 | python | [{"finding_id": "codeql_py/tarslip_62ae68a2202b0b60_5c23aa16", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
61
] | [
null
] | [
17
] | [
18
] | |
2024-11-19T01:51:55.617313+00:00 | 1,609,751,385,000 | d9d8a95a03f076f51c2bcb04e2f0ace3b84635a8 | 2 | {
"blob_id": "d9d8a95a03f076f51c2bcb04e2f0ace3b84635a8",
"branch_name": "refs/heads/master",
"committer_date": 1609751385000,
"content_id": "59663ec7c603b5ea9b49bac32280f03eae09650c",
"detected_licenses": [
"MIT"
],
"directory_id": "d4920e66ec65a2700b549ffab6e04cfafebc0879",
"extension": "py",
"fi... | 2.484375 | stackv2 | import threading
import queue
import logging
import time
import random
import paramiko
from typing import List
from nornir.core.task import AggregatedResult, Task
from nornir.core.inventory import Host
log = logging.getLogger(__name__)
LOCK = threading.Lock()
class RetryRunner:
"""
RetryRunner is a modifica... | 324 | 42.28 | 132 | 21 | 2,724 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_14ed931254d51399_0079c36c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
88
] | [
90
] | [
17
] | [
18
] | |
2024-11-19T01:52:04.323023+00:00 | 1,675,391,267,000 | e60986c9d17595b392206db0482a8fe09b3957a4 | 2 | {
"blob_id": "e60986c9d17595b392206db0482a8fe09b3957a4",
"branch_name": "refs/heads/master",
"committer_date": 1675391267000,
"content_id": "32fbdf28e84f8fed0bf570936b0f888f41308e50",
"detected_licenses": [
"MIT"
],
"directory_id": "618fcd4acf01245b10f2ebdab9914c593f1f548c",
"extension": "py",
"fi... | 2.375 | stackv2 | # decrypt encrypted responses ca 20221221
# handle hidden encryption key 20230116, 20230123, 20230126
from json import loads
from random import randrange
import re
import sys
import time
from base64 import b64decode
import hashlib
try:
from Cryptodome.Cipher import AES
from Cryptodome.Util.Padding import unpa... | 195 | 32.99 | 109 | 17 | 1,825 | python | [{"finding_id": "codeql_py/redos_f210623410eb59bc_9286382d", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'contextadispatcherastores=JSONapa... | 3 | true | [
"CWE-1333",
"CWE-1333",
"CWE-327"
] | [
"py/redos",
"py/redos",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'contextadispatcherastores=JSONaparse' and containing many repetitions of '\\n'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'concat(t.' and containing many repet... | [
154,
158,
66
] | [
null,
null,
null
] | [
54,
36,
27
] | [
57,
39,
35
] | |
2024-11-19T01:52:16.597035+00:00 | 1,585,502,331,000 | 68272fc0a26c16a93c5994584bc7b0da9a3fed58 | 3 | {
"blob_id": "68272fc0a26c16a93c5994584bc7b0da9a3fed58",
"branch_name": "refs/heads/master",
"committer_date": 1585502331000,
"content_id": "14c03eea30912ee7e2c90d42c05b397a618f1ac3",
"detected_licenses": [
"MIT"
],
"directory_id": "608322dd3562b2c43aab1d1e893c820b829652d8",
"extension": "py",
"fi... | 2.75 | stackv2 | import os
import sqlite3
import getpass
import random
import string
from sqlite3 import Error
from prettytable import PrettyTable
from password_generator import PasswordGenerator
sql_file ="forget.db"
def create_connection(db_file):
try:
conn = sqlite3.connect(db_file)
return conn
except Error as e:
print(e... | 160 | 22.12 | 82 | 15 | 959 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e8350553bd2ee28a_0973c3f7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
93
] | [
null
] | [
10
] | [
58
] | |
2024-11-19T01:52:20.509800+00:00 | 1,648,613,386,000 | ee0a01797d70e726678a8252ca79a9c3efdac9c6 | 3 | {
"blob_id": "ee0a01797d70e726678a8252ca79a9c3efdac9c6",
"branch_name": "refs/heads/master",
"committer_date": 1648613386000,
"content_id": "0786373454b0e009de2f0031220db896dcafcd96",
"detected_licenses": [
"MIT"
],
"directory_id": "b84a4823032021a44568581877f525280c1cb331",
"extension": "py",
"fi... | 2.609375 | stackv2 | from flask import Flask, send_file, send_from_directory,make_response
import os
import json
import pandas as pd
app = Flask(__name__)
app.config['JSON_AS_ASCII'] = False
@app.route('/')
def index():
return 'Index Page'
@app.route("/download/<filename>", methods=['GET'])
def download_file(filename):
# 需要知道2个... | 67 | 27.76 | 97 | 14 | 551 | python | [{"finding_id": "codeql_py/path-injection_6c8abe486e361f13_24df8c29", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
35,
47
] | [
null,
null
] | [
15,
15
] | [
68,
70
] | |
2024-11-19T01:52:24.617996+00:00 | 1,590,113,053,000 | 903589e4c4ae8f4d2c4991af818be42dc8882197 | 3 | {
"blob_id": "903589e4c4ae8f4d2c4991af818be42dc8882197",
"branch_name": "refs/heads/master",
"committer_date": 1590113053000,
"content_id": "eed462ec3a7c409f7742106b4ce1d3f13b0454ae",
"detected_licenses": [
"MIT"
],
"directory_id": "33be842ca68a26183dfa5947aa6b432e077493ed",
"extension": "py",
"fi... | 2.96875 | stackv2 | import bcrypt
import base64
import hashlib
import mysql.connector
from mysql.connector import errorcode
def add_user(username, email, password, db, bcrypt_rotate=14):
# user_id (auto increment), first_name, last_name, email, phone_number, username, password
add_user_query = ("INSERT INTO user "
... | 52 | 42.44 | 116 | 17 | 499 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b9fa72f4c1f400b5_ec4d82ee", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
19
] | [
null
] | [
60
] | [
68
] | |
2024-11-19T02:04:41.535017+00:00 | 1,606,249,066,000 | c9e125d99499a276778300d9fdf4469a95ddc69a | 3 | {
"blob_id": "c9e125d99499a276778300d9fdf4469a95ddc69a",
"branch_name": "refs/heads/master",
"committer_date": 1606249066000,
"content_id": "6424bc11ccd0497d7ba91790fb4e01fb683199a6",
"detected_licenses": [
"MIT"
],
"directory_id": "aa49bbde374bb7ffc3d1537ea9bfdb74d5862070",
"extension": "py",
"fi... | 2.546875 | stackv2 | # encoding: utf-8
import re
import jinja2
import jinja2.ext
import markdown2
import os
import sys
sys.path.append(".")
from staticjinja import make_site
from BeautifulSoup import BeautifulSoup, BeautifulStoneSoup
# remove annoying characters
def cleanitup(text):
chars = {
'\xe2': '',
'\x80': '',
'... | 114 | 29.48 | 72 | 15 | 932 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_53cff58b4f849b2e_e156f418", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
77
] | [
null
] | [
7
] | [
58
] | |
2024-11-19T02:04:45.861984+00:00 | 1,592,976,585,000 | 3aa2472ed362e773a8b903a483e1f8eb9976e772 | 2 | {
"blob_id": "3aa2472ed362e773a8b903a483e1f8eb9976e772",
"branch_name": "refs/heads/master",
"committer_date": 1592976585000,
"content_id": "c5ef325c5f9bb40c1fb49d455fdfbdce1d50222d",
"detected_licenses": [
"MIT"
],
"directory_id": "5ec1eac4c9eae176630be81e7e70a75352ef2f06",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
from urllib import request, parse
import json
import base64
import re
import os
import shutil
import getpass
import sys
import time
def connect_network():
url = 'http://10.255.255.13/index.php/index/login'
user_agent = 'Mozilla/5.0 (Windows NT 10.0; WOW64) AppleW... | 59 | 35.53 | 143 | 19 | 617 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_bc38f00f18516025_0e7fc220", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
46
] | [
48
] | [
17
] | [
143
] | |
2024-11-19T02:04:47.919465+00:00 | 1,531,040,741,000 | 758cce6b6f7233edf97e9a57c0a4e3e2efc0750f | 3 | {
"blob_id": "758cce6b6f7233edf97e9a57c0a4e3e2efc0750f",
"branch_name": "refs/heads/master",
"committer_date": 1531040741000,
"content_id": "5ff438befb1d8d4743a8f3db336eabc70aad858d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "47ce2a03b800e52e521880fb1a61f4a0b7947075",
"extension": "py"... | 2.546875 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
import translator
import logging
import os
import json
COMMOND_GEN_EXCEL = 'gen_excel'
COMMOND_GEN_XML = 'gen_xml'
COMMOND_TRANSLATE = 'translate'
COMMOND_STATUS = 'status'
COMMOND_HELP ='help'
COMMOND_EXIT = 'exit'
API_CONFIG_FILE_PAHT = 'config.json'
def run_commond(... | 171 | 28.09 | 125 | 31 | 1,388 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_45e3ab9d42b2e39e_ccf0a01e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
166
] | [
null
] | [
19
] | [
47
] | |
2024-11-19T02:28:04.726734+00:00 | 1,557,125,369,000 | cd592ed1886d84da56d9670730de4b197ffa79ea | 2 | {
"blob_id": "cd592ed1886d84da56d9670730de4b197ffa79ea",
"branch_name": "refs/heads/master",
"committer_date": 1557125369000,
"content_id": "7caaeaf2b8e559663c3ded3b11c8ef53f325660e",
"detected_licenses": [
"BSD-3-Clause",
"Apache-2.0",
"MIT"
],
"directory_id": "2ce4e110ce17de5aa998f335c85bac9... | 2.328125 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""
License: MIT license
Copyright (c) <2016> <MaskedW [maskedw00@gmail.com]>
Permission is hereby granted, free of charge, to any person
obtaining a copy of this software and associated documentation
files (the "Software"), to deal in the Software without
restriction, i... | 157 | 25.66 | 79 | 16 | 1,076 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5cea3663ea5aab1e_6205b7c4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
152,
156
] | [
null,
null
] | [
11,
11
] | [
44,
44
] | |
2024-11-19T02:28:51.984173+00:00 | 1,522,965,693,000 | e28c82101e0c96e60723696696ebacd7f1b0d6c4 | 3 | {
"blob_id": "e28c82101e0c96e60723696696ebacd7f1b0d6c4",
"branch_name": "refs/heads/master",
"committer_date": 1522965693000,
"content_id": "113d059e0f6151b454d56fef434025fc50833650",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "93231556e579c70048aaf206fc38855e89d470a6",
"extension": "py"... | 2.625 | stackv2 | #TeamG - Waste
#imports the necessary modules for it to work
#commenting and context also provided by looking at Flask documentation online
import os
import json
import getpass
from flask import Flask, jsonify, request #imports the flask class
from watson_developer_cloud import VisualRecognitionV3
'''Authentication... | 47 | 38.72 | 116 | 16 | 483 | python | [{"finding_id": "codeql_py/flask-debug_16a5c643c8b6e05c_5ad378e1", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
47,
32
] | [
null,
null
] | [
2,
24
] | [
53,
28
] | |
2024-11-19T02:36:56.298557+00:00 | 1,509,971,506,000 | a2fc8d86313ab38b3d5a66f84b7c47b759cf1aa7 | 3 | {
"blob_id": "a2fc8d86313ab38b3d5a66f84b7c47b759cf1aa7",
"branch_name": "refs/heads/master",
"committer_date": 1509971506000,
"content_id": "db8f751b095df781d248c5fb7b366678266464d0",
"detected_licenses": [
"MIT"
],
"directory_id": "e9b2f78ea5cffd03f6b64f6cd777ffce79632a82",
"extension": "py",
"fi... | 2.71875 | stackv2 | #/usr/bin/python
#
# HTTP server with a HTML form that allows to upload files to the server.
# Files are stored in a folder named "files" inside the current directory.
from os import curdir
from os.path import join as pjoin
from http.server import BaseHTTPRequestHandler, HTTPServer
from cgi import FieldStorage
upl... | 57 | 25.81 | 74 | 17 | 347 | python | [{"finding_id": "codeql_py/path-injection_d2a6dc3a0411e4a7_20d6d637", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
44
] | [
null
] | [
18
] | [
23
] | |
2024-11-19T02:37:06.773378+00:00 | 1,446,534,290,000 | e839169ec20d2a20ccac4d435cf1f104abdd68c9 | 2 | {
"blob_id": "e839169ec20d2a20ccac4d435cf1f104abdd68c9",
"branch_name": "refs/heads/master",
"committer_date": 1446534350000,
"content_id": "db017eaa16e1ece5afca50d286c495de49fc13ff",
"detected_licenses": [
"MIT"
],
"directory_id": "426971e99e55c9a0594fdde68000c9a391cd40ff",
"extension": "py",
"fi... | 2.4375 | stackv2 | from flask import Flask, request, Response
import urllib2
from calendarprocessor import process_calendar
app = Flask(__name__)
@app.route('/')
def get_processed_calendar():
kintoken = request.args.get('token', '')
if kintoken == '':
return 'No token supplied', 403
try:
calendarFile = urllib2.urlopen(ur... | 27 | 27.63 | 101 | 17 | 201 | python | [{"finding_id": "codeql_py/flask-debug_af920b8d06be17f8_eab38319", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
27,
14
] | [
null,
17
] | [
3,
36
] | [
22,
6
] | |
2024-11-19T02:37:10.947259+00:00 | 1,506,931,532,000 | dd0f61e1e340fe3aef2b89f72d6c7f8c32951a3b | 3 | {
"blob_id": "dd0f61e1e340fe3aef2b89f72d6c7f8c32951a3b",
"branch_name": "refs/heads/master",
"committer_date": 1506931532000,
"content_id": "d93150f7829146c7a11da287c51fd5d591f0d4d6",
"detected_licenses": [
"MIT"
],
"directory_id": "24c4273a87c85103b70dc4959c3574221cb6c8e5",
"extension": "py",
"fi... | 2.609375 | stackv2 | # essential Flask modules
from flask import Flask
from flask import request
from flask import render_template
from flask import session
from flask import redirect
# for reading the config file
import yaml
# for generating SQL queries in pure Python
import sql
# for interfacing with the PostgreSQL database
import psycop... | 177 | 21.99 | 83 | 16 | 1,025 | python | [{"finding_id": "codeql_py/reflective-xss_3bf776e8e33d6b21_5cd88a08", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
45,
133
] | [
null,
null
] | [
10,
9
] | [
29,
21
] | |
2024-11-19T02:37:14.179767+00:00 | 1,543,638,540,000 | bacabb82fea35908e477f5b5f28cb0e0b32cf252 | 3 | {
"blob_id": "bacabb82fea35908e477f5b5f28cb0e0b32cf252",
"branch_name": "refs/heads/master",
"committer_date": 1543638540000,
"content_id": "2d1698e2cfd527d37f88d8ba5197fe5284562086",
"detected_licenses": [
"MIT"
],
"directory_id": "d068d929d0824de7cfda8640a8c974d3679a633c",
"extension": "py",
"fi... | 2.59375 | stackv2 | #!/usr/bin/env python
import os
import random
import requests
import subprocess
import argparse
import datetime
import time
import sys
"""Based off https://github.com/fogleman/primitive/blob/master/bot/main.py
"""
with open(os.path.expanduser('~/.flickr_api_key'), 'r') as key_file:
FLICKR_API_KEY = key_file.read... | 196 | 26.63 | 116 | 17 | 1,336 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_fdd58757e6acf56f_26e257ec", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text."
] | [
114
] | [
null
] | [
18
] | [
27
] | |
2024-11-19T02:37:17.456520+00:00 | 1,680,032,345,000 | 795159fc64ff95c7c8c974f94cdd6ee981496919 | 3 | {
"blob_id": "795159fc64ff95c7c8c974f94cdd6ee981496919",
"branch_name": "refs/heads/main",
"committer_date": 1680033272000,
"content_id": "97db1fd59e45fcea7eb283bf30e081c7ac93a251",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3f5f2bad9f6ab4acd56c4e2929cee1af4a242e57",
"extension": "py",
... | 2.625 | stackv2 | #
# _author_ = Trevor Squillario <Trevor.Squillario@Dell.com>
#
# Copyright (c) 2022 Dell EMC Corporation
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licens... | 200 | 39.73 | 112 | 21 | 1,766 | python | [{"finding_id": "codeql_py/request-without-cert-validation_8a39b8f2a5f1a187_435a606d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
66,
83,
116
] | [
68,
null,
118
] | [
20,
20,
23
] | [
50,
79,
70
] | |
2024-11-19T02:37:23.314442+00:00 | 1,566,008,995,000 | 78f3beb83872baf0236aae94c78107efe7fb0feb | 3 | {
"blob_id": "78f3beb83872baf0236aae94c78107efe7fb0feb",
"branch_name": "refs/heads/master",
"committer_date": 1566008995000,
"content_id": "5972ecfc2f8cfebdd212908283e99459c1e17b1d",
"detected_licenses": [
"MIT"
],
"directory_id": "72c4109ae0dd779004f4a24346ee0c7822a99e11",
"extension": "py",
"fi... | 2.734375 | stackv2 | # LOPEXTftp-v1a.py(w) (18-10-2018)
# For External uploading of the LOPORA pictures
# For Python version 3
# With external module None
# Made by Onno Hoekstra (pa2ohh)
import os
import time
import ftplib
from time import gmtime, strftime
FTPFILES = "FTPuploads.txt"
# ============================================ Mai... | 154 | 30.01 | 164 | 17 | 1,111 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b55fe0b2de9803e3_aa7c5090", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
89
] | [
null
] | [
15
] | [
45
] | |
2024-11-19T02:37:26.222670+00:00 | 1,579,462,083,000 | 341c6b5394e1d7c380d6ce6b7eea6722560c67bc | 4 | {
"blob_id": "341c6b5394e1d7c380d6ce6b7eea6722560c67bc",
"branch_name": "refs/heads/master",
"committer_date": 1579462083000,
"content_id": "28b7c96b632968b593fcff29d4541bdd852ec7c3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "de15fe6741293f04cdf79262110659de2b70a228",
"extension": "py"... | 4.09375 | stackv2 | import keyword
person = 'happylay'
age = 18
gender = '男'
# --------------------------------------------------------------------------------
# sep默认分隔符是空格(sep='',end='\n')
print(person,age,gender)
print(person,age,gender,sep='-')
print('hello\nhappylay')
print('hello happy',end=' ')
print('hello lay',end='\n')
# ... | 69 | 17.35 | 82 | 8 | 307 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_49d95e5ee27cdaf9_13564de7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
9,
11,
49
] | [
null,
null,
null
] | [
18,
18,
7
] | [
24,
24,
23
] | |
2024-11-19T02:37:41.047214+00:00 | 1,589,232,632,000 | 171b94032089764406c8fec04fd64150241740fc | 3 | {
"blob_id": "171b94032089764406c8fec04fd64150241740fc",
"branch_name": "refs/heads/master",
"committer_date": 1589232632000,
"content_id": "3ed7a02c8fb55f77b9c2dfcdda1f620017feb95e",
"detected_licenses": [
"MIT"
],
"directory_id": "8504c563fc27a4cdfcdf62cf690b86f97b7d59b4",
"extension": "py",
"fi... | 3.265625 | stackv2 | #! /usr/local/bin/python3
"""
Description: This is a module that serves to encrypt strings.
Title: crypto.py
Author: theStygianArchitect
"""
import os
import sys
from argparse import ArgumentParser
try:
from cryptography.fernet import Fernet
except ModuleNotFoundError:
print('Please install packaged librarie... | 102 | 26.17 | 82 | 14 | 588 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_398b05e3223bad8a_779f3dd8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
92
] | [
null
] | [
19
] | [
55
] | |
2024-11-19T02:37:51.438998+00:00 | 1,517,111,770,000 | 910e29dab1875f338164debd7c1e598d720d3f95 | 2 | {
"blob_id": "910e29dab1875f338164debd7c1e598d720d3f95",
"branch_name": "refs/heads/master",
"committer_date": 1517111770000,
"content_id": "c1285f8b6fcdeb3ebd20d48289044de2ae3e603e",
"detected_licenses": [
"MIT"
],
"directory_id": "1fecf2925e986038f8aaf2b3cd561fba03bdc964",
"extension": "py",
"fi... | 2.34375 | stackv2 | from flask import Flask, render_template, request, jsonify
from flask_cors import CORS, cross_origin
import requests
import json
from classifier import Classifier
from newspaper import Article
app = Flask(__name__)
CORS(app)
@app.route('/')
def index():
return render_template('index.html')
@app.route("/doreque... | 34 | 25 | 88 | 14 | 207 | python | [{"finding_id": "codeql_py/flask-debug_d8a84719c897ada5_1ac64669", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
34,
20
] | [
null,
null
] | [
5,
16
] | [
24,
89
] | |
2024-11-19T03:00:05.489213+00:00 | 1,645,003,624,000 | ce135b85894c5e8b986e97fb77ee3023ecaf2d16 | 2 | {
"blob_id": "ce135b85894c5e8b986e97fb77ee3023ecaf2d16",
"branch_name": "refs/heads/master",
"committer_date": 1645003624000,
"content_id": "2adc875882d46c68cd4756782f27b8f7f07c6863",
"detected_licenses": [
"MIT"
],
"directory_id": "aef4f9c8aa0b2f32436b34f153dcf46ef01064d3",
"extension": "py",
"fi... | 2.40625 | stackv2 | import re
import os
import math
import time
import socket
import tarfile
import requests
import datetime
from pathlib import Path
from contextlib import closing
from lyrebird.log import get_logger
from lyrebird.mock.dm.jsonpath import jsonpath
logger = get_logger()
def convert_size(size_bytes):
if size_bytes == 0... | 185 | 28.16 | 92 | 17 | 1,255 | python | [{"finding_id": "codeql_py/tarslip_2778c24c4fc62003_1358a57e", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
106
] | [
null
] | [
5
] | [
7
] | |
2024-11-19T03:00:15.961049+00:00 | 1,528,100,493,000 | 33c008cf64ad5a058d068177b1321aac6a780dd9 | 3 | {
"blob_id": "33c008cf64ad5a058d068177b1321aac6a780dd9",
"branch_name": "refs/heads/master",
"committer_date": 1528100493000,
"content_id": "ba7d32cee2a67b9c32f06f4eeea95af75e3e54fa",
"detected_licenses": [
"MIT"
],
"directory_id": "6acc05c17cb15b690eac55e0f2c56bf020f58d45",
"extension": "py",
"fi... | 2.5625 | stackv2 |
import os
import sys
if sys.version_info[0] < 3:
import Queue as queue
else:
import queue
import threading
import signal
import numpy
import pyaudio
from quiet.quiet import Decoder
class Listener(object):
def __init__(self):
self.pyaudio_instance = None
self.done = None
self.thr... | 101 | 24.94 | 88 | 15 | 558 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_20ecea5aef9afbc2_d2165bd4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
78
] | [
null
] | [
15
] | [
62
] | |
2024-11-19T03:00:26.562881+00:00 | 1,684,958,368,000 | 7d2cf2b49bf8f37fb3586d3e2e7780026b15d33f | 3 | {
"blob_id": "7d2cf2b49bf8f37fb3586d3e2e7780026b15d33f",
"branch_name": "refs/heads/master",
"committer_date": 1684958368000,
"content_id": "e0b1ab9494f8c6707c225b24c9609b5a6c1cdd56",
"detected_licenses": [
"MIT"
],
"directory_id": "eff938b40db326ec121e4dd57c6e64a1767ac654",
"extension": "py",
"fi... | 3.171875 | stackv2 | from typing import *
import logging
import math
import bing
from planedb import *
from datetime import datetime, timedelta
def deg2rad(deg: float) -> float:
"""Convert degrees to radians
Arguments:
deg {float} -- Angle in degrees
Returns:
float -- Angle in radians
"""
return deg ... | 177 | 32.16 | 144 | 15 | 1,626 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_2e560640ccbeda13_0c42b68b", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [airliners.net](1) may be at an arbitrary position in t... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The string [airliners.net](1) may be at an arbitrary position in the sanitized URL.",
"The string [planefinder.net](1) may be at an arbitrary position in the sanitized URL.",
"The string [carsbase.com](1) may be at an arbitrary position in the sanitized URL."
] | [
109,
111,
113
] | [
null,
null,
null
] | [
8,
8,
8
] | [
30,
32,
29
] | |
2024-11-19T03:11:41.874385+00:00 | 1,597,062,598,000 | c53c9e25e6d566e5d0429e5b43d0c9c9cdfa14f6 | 2 | {
"blob_id": "c53c9e25e6d566e5d0429e5b43d0c9c9cdfa14f6",
"branch_name": "refs/heads/master",
"committer_date": 1597062598000,
"content_id": "dee07b882c6c71c8056b0a88e4dcc7b59e56f0b3",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "7c23594e20c9db087ec1f14a471c332b605f1acd",
"extension": "p... | 2.390625 | stackv2 | from __future__ import absolute_import
from __future__ import division
from __future__ import print_function
from collections import defaultdict
import gzip
import io
import os
import random
import tarfile
import nltk
import jieba
# Dependency imports
import requests
import six
from six.moves import xrange # pylin... | 238 | 34.16 | 97 | 19 | 1,993 | python | [{"finding_id": "codeql_py/tarslip_a6b722ddf85c4aa8_cdda25a1", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
50
] | [
null
] | [
13
] | [
23
] | |
2024-11-19T03:11:57.597225+00:00 | 1,553,789,160,000 | a9119d28e6fed1a3aae6b037dd3366469555f1f8 | 3 | {
"blob_id": "a9119d28e6fed1a3aae6b037dd3366469555f1f8",
"branch_name": "refs/heads/master",
"committer_date": 1553789160000,
"content_id": "152e75d936f9ab49603ef6f59b2528f64ff74d6c",
"detected_licenses": [
"MIT"
],
"directory_id": "ddf2ba7036f1f3f5239af8a7f7f32288fcb16a6e",
"extension": "py",
"fi... | 2.734375 | stackv2 | import os
import socket
import time
import psycopg2 as psycopg2
from flask import Flask
app = Flask(__name__)
starttime = time.time()
@app.route('/')
def home():
##########################################################################
# simulate some initial delay until the app is ready to respond
###... | 94 | 33.67 | 83 | 17 | 697 | python | [{"finding_id": "codeql_py/stack-trace-exposure_2e3bf4e9c5c89502_223e50a2", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
83
] | [
null
] | [
12
] | [
26
] | |
2024-11-19T03:12:01.748699+00:00 | 1,573,197,979,000 | 1129027669bffb66602239505da493d40b53464a | 3 | {
"blob_id": "1129027669bffb66602239505da493d40b53464a",
"branch_name": "refs/heads/master",
"committer_date": 1573197979000,
"content_id": "9ca86201cbcb8f616e38b12dd71784af86eb5fcf",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1f2847d635a3806020337b45e9fd75027f9da6d2",
"extension": "py"... | 2.578125 | stackv2 | import logging
from multiprocessing import Queue, Pipe
from flask import Flask, jsonify, request
from ..utils.constants import *
logger = logging.getLogger(__name__)
def start_server(queue: Queue, port: int):
logger.debug(f"Create and init server ...")
app = Flask(__name__)
log = logging.getLogger('... | 100 | 28.56 | 99 | 16 | 633 | python | [{"finding_id": "codeql_py/log-injection_aa8e732e1177816d_390b3184", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 5 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).\nThis log entry depends o... | [
26,
51,
65,
79,
94
] | [
null,
null,
null,
null,
null
] | [
22,
22,
22,
22,
24
] | [
99,
75,
80,
74,
86
] | |
2024-11-19T03:12:15.413899+00:00 | 1,550,134,092,000 | 2d89d3557c5796ab51fc4b1f40a7dda0c87e79bf | 2 | {
"blob_id": "2d89d3557c5796ab51fc4b1f40a7dda0c87e79bf",
"branch_name": "refs/heads/master",
"committer_date": 1550134092000,
"content_id": "c4da8ace0221ce782e3306038cca64d41e13bc7e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e7393a151d983e97ebcbcba3768ba1654cee18f9",
"extension": "py"... | 2.453125 | stackv2 | from flask import Blueprint, request, url_for, redirect
import json
import logging
from pycorenlp import StanfordCoreNLP
from core import entity_extraction
from relation_extraction.core.parser import RelParser
relext = Blueprint("relext_server", __name__, static_folder='static')
logger = logging.getLogger(__name__)... | 58 | 32.48 | 103 | 12 | 447 | python | [{"finding_id": "codeql_py/log-injection_7d3516edf9ba21ab_f3b9bf69", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
43
] | [
null
] | [
18
] | [
50
] | |
2024-11-19T03:12:20.407692+00:00 | 1,619,782,176,000 | cb7bbbd5ce151eb56e2a70f753e93fc668dbacd9 | 2 | {
"blob_id": "cb7bbbd5ce151eb56e2a70f753e93fc668dbacd9",
"branch_name": "refs/heads/master",
"committer_date": 1619782176000,
"content_id": "e34318eab6196a35962773b25c67cd580465b5f2",
"detected_licenses": [
"MIT"
],
"directory_id": "9c3bf14350f2bbc8dc79bfb33fd4b8e8a3060aee",
"extension": "py",
"fi... | 2.328125 | stackv2 | # thanks to @github/ZipFile, https://gist.github.com/ZipFile/c9ebedb224406f4f11845ab700124362
import platform
from base64 import urlsafe_b64encode
from hashlib import sha256
from secrets import token_urlsafe
from urllib.parse import urlencode
import requests
from requests_toolbelt.adapters import host_header_ssl
from... | 165 | 33.67 | 100 | 18 | 1,532 | python | [{"finding_id": "codeql_py/request-without-cert-validation_19353975a4533d71_fde8e936", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
160
] | [
null
] | [
24
] | [
87
] | |
2024-11-19T03:12:31.141670+00:00 | 1,577,163,605,000 | 262c52e54274da2674be7103ab435f1c9e335412 | 3 | {
"blob_id": "262c52e54274da2674be7103ab435f1c9e335412",
"branch_name": "refs/heads/master",
"committer_date": 1577163605000,
"content_id": "719d3a281e8d6acebba06dc47f15f47f3c5e16e5",
"detected_licenses": [
"MIT"
],
"directory_id": "af50b5007028a209597f7aefaab560f9ab677cb6",
"extension": "py",
"fi... | 3.203125 | stackv2 | #!/bin/env python3
import collections
import hashlib
import pprint
def md5(indata):
hasher = hashlib.md5()
hasher.update(indata.encode('utf-8'))
return hasher.hexdigest()
class State(collections.namedtuple('State', ('position', 'path'))):
__slots__ = ()
def valid_move(self, direction):
... | 88 | 27.31 | 71 | 16 | 607 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_4b39dbc8e19b1d27_e78cb2f0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
10
] | [
null
] | [
19
] | [
41
] | |
2024-11-19T03:12:37.465920+00:00 | 1,532,590,045,000 | 713f649c8c68e8111803b2c2fd2c3753ee1a8bb8 | 3 | {
"blob_id": "713f649c8c68e8111803b2c2fd2c3753ee1a8bb8",
"branch_name": "refs/heads/master",
"committer_date": 1532590045000,
"content_id": "89152a6128a5aedaddf83fea1c7eea2ea8b38c4f",
"detected_licenses": [
"MIT"
],
"directory_id": "9e7ea33153b005eaf25558ed1fbb1a6fb15f5058",
"extension": "py",
"fi... | 2.59375 | stackv2 | import sys
import io
import yaml
import json
from SPARQLWrapper import SPARQLWrapper, JSON
def outputPrefixes():
prefixes = [('rdfs', 'http://www.w3.org/2000/01/rdf-schema#'), ('wdt', 'http://www.wikidata.org/prop/direct/'), ('wd','http://www.wikidata.org/entity/')]
prefixesForOutput = u''
for prefix in prefixes... | 102 | 27.34 | 154 | 17 | 893 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d8441d5060ac8bde_262d1f2d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text."
] | [
70,
74
] | [
null,
null
] | [
22,
22
] | [
97,
103
] | |
2024-11-19T03:25:31.515245+00:00 | 1,539,874,178,000 | 219d81d0ba2d49679496d6e0945d0e1a49162a44 | 3 | {
"blob_id": "219d81d0ba2d49679496d6e0945d0e1a49162a44",
"branch_name": "refs/heads/master",
"committer_date": 1539874178000,
"content_id": "d5323afcedc3915972e0b215144181a49226100a",
"detected_licenses": [
"MIT"
],
"directory_id": "d456c1c892553066a594c3809005728e01e826da",
"extension": "py",
"fi... | 2.546875 | stackv2 | #!/usr/bin/env python3
from jinja2 import Template
import os
from pyquery import PyQuery
dir_path = os.path.dirname(os.path.realpath(__file__))
def query_html(filename):
file_html_src = (open(dir_path + '/' +filename, 'r')).read()
dom = PyQuery(file_html_src)
title = dom("#title").text()
author = dom... | 152 | 24.97 | 92 | 16 | 997 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_54ca5f5b417d93c8_58bb7621", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
18,
50,
89
] | [
null,
85,
132
] | [
20,
17,
21
] | [
42,
2,
5
] | |
2024-11-19T03:25:36.784879+00:00 | 1,615,570,653,000 | d16ec1a7de8ef75eb0362348cfc93850e6860819 | 2 | {
"blob_id": "d16ec1a7de8ef75eb0362348cfc93850e6860819",
"branch_name": "refs/heads/master",
"committer_date": 1615570653000,
"content_id": "6cb22eb9dd9f59c3536515931750642472c6123f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b47c136e077f5100478338280495193a8ab81801",
"extension": "py"... | 2.359375 | stackv2 | # SPDX-FileCopyrightText: 2021 ladyada for Adafruit Industries
# SPDX-License-Identifier: MIT
import time
import board
import busio
from digitalio import DigitalInOut
import neopixel
from adafruit_esp32spi import adafruit_esp32spi
from adafruit_esp32spi import adafruit_esp32spi_wifimanager
import adafruit_esp32spi.ada... | 116 | 30.16 | 88 | 10 | 991 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8fb1fc7eb420cec2_a2e8eb78", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
66
] | [
null
] | [
11
] | [
85
] | |
2024-11-19T03:25:38.156934+00:00 | 1,624,126,379,000 | 8e135a7eda6998ee93f85081a167bc5e87f5df14 | 2 | {
"blob_id": "8e135a7eda6998ee93f85081a167bc5e87f5df14",
"branch_name": "refs/heads/master",
"committer_date": 1624126379000,
"content_id": "aa9652644356c5783c07fab0828ffd85bc89aa58",
"detected_licenses": [
"MIT"
],
"directory_id": "b0d1b1ad8d3d1b0668ace7733e61135f967160db",
"extension": "py",
"fi... | 2.4375 | stackv2 | import ast
import copy
import logging
import os
import shutil
from abc import ABCMeta
from docxtpl import DocxTemplate, R
from jinja2 import Environment, meta, Template
from wordmarker.contexts import YamlContext, SystemContext
from wordmarker.creatives import FactoryBean, AbstractBuilder
from wordmarker.loaders impo... | 433 | 24.56 | 101 | 23 | 2,975 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_107fda53c4e96cf0_2b0d2afc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
397,
401
] | [
null,
null
] | [
15,
16
] | [
28,
30
] | |
2024-11-19T03:25:41.319596+00:00 | 1,504,760,137,000 | 7e12445a03ef1f8e46fac90e6151b2eeea3c2f30 | 3 | {
"blob_id": "7e12445a03ef1f8e46fac90e6151b2eeea3c2f30",
"branch_name": "refs/heads/master",
"committer_date": 1504760142000,
"content_id": "928ceaf2a45efeba5aa6e03eaf09e5f7e8f6c9e2",
"detected_licenses": [
"MIT"
],
"directory_id": "5ad1731041310177d9f99cc196fbedb4faa43e2e",
"extension": "py",
"fi... | 2.546875 | stackv2 | # Based on: http://isadoranun.github.io/tsfeat/FeaturesDocumentation.html
# JSAnimation import available at https://github.com/jakevdp/JSAnimation
import warnings
import numpy as np
import jinja2
from matplotlib import pyplot as plt
from matplotlib import animation
from JSAnimation import IPython_display
from IP... | 124 | 24.4 | 80 | 15 | 845 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_44bbde292d239a4b_c1db95ea", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
62,
105
] | [
81,
120
] | [
27,
25
] | [
5,
5
] | |
2024-11-19T01:28:39.567201+00:00 | 1,564,555,534,000 | 03395260769b7d36ce2d110c9415fa5f5f9b9fa6 | 3 | {
"blob_id": "03395260769b7d36ce2d110c9415fa5f5f9b9fa6",
"branch_name": "refs/heads/master",
"committer_date": 1564555534000,
"content_id": "1a3b7d25726d6e705054aed976bafe7242dd445d",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "9cadeaf9b18b0220eec57dc5cd3d8865e99cbf63",
"extension": "p... | 2.671875 | stackv2 | import pydicom
from pydicom.filereader import read_dicomdir, read_dataset
from pydicom.data import get_testdata_files
from pydicom.errors import InvalidDicomError
from os.path import dirname, join
from pprint import pprint
import matplotlib.pyplot as plt
from pydicom.dataset import Dataset
from pathlib import Path
from... | 117 | 46.26 | 139 | 19 | 1,146 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0be9779548f63a6b_f19bf0a9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
69,
116
] | [
70,
117
] | [
23,
27
] | [
75,
37
] | |
2024-11-19T01:28:43.325443+00:00 | 1,630,234,877,000 | 20a4639333c5b1c6b82b88736df35e27b7735349 | 3 | {
"blob_id": "20a4639333c5b1c6b82b88736df35e27b7735349",
"branch_name": "refs/heads/main",
"committer_date": 1630234877000,
"content_id": "1402590f4a81aa6266da6238a6bfc7f23e4a119e",
"detected_licenses": [
"MIT"
],
"directory_id": "aedd20d15c45e521aca84d187b7ec7d9cf8f5d29",
"extension": "py",
"file... | 2.96875 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Sat Aug 28 23:05:36 2021
@author: Dhanisht
"""
# class blood_app:
def admin():
global address_bb
global address_bc
global bg_A
global bg_B
global bg_AB
global bg_O
global request
global contact_detail
choice=int(input("enter your choi... | 110 | 27.39 | 108 | 12 | 770 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fc5304caa69a5f85_80d32729", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
52,
67
] | [
null,
null
] | [
31,
31
] | [
37,
37
] | |
2024-11-19T01:28:57.194533+00:00 | 1,496,352,487,000 | 5a2e299278e59f29a9e696cbeefad2406190d2ce | 3 | {
"blob_id": "5a2e299278e59f29a9e696cbeefad2406190d2ce",
"branch_name": "refs/heads/master",
"committer_date": 1496352487000,
"content_id": "703b2626bd0c4277eed5973ae4b8b6104c18ed5e",
"detected_licenses": [
"MIT"
],
"directory_id": "eb136cf6ffd457de9dbb494dd7e610a14429eb94",
"extension": "py",
"fi... | 2.71875 | stackv2 | # Metarunlog, experiment management tool.
# Author: Tom Sercu
# Date: 2016-10-07
from jinja2 import Template
from collections import OrderedDict
import itertools
import cfg
class ConfParser:
"""
ConfParser class will take a template experiment config file,
which ends with MRL:grid[] or MRL:params instruct... | 49 | 44.53 | 105 | 15 | 513 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_11c970a1865c7ed9_94314547", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25
] | [
null
] | [
22
] | [
54
] | |
2024-11-19T01:28:58.694199+00:00 | 1,503,778,474,000 | fea8e6c1c3075378a481ae3272a74f4497d16501 | 2 | {
"blob_id": "fea8e6c1c3075378a481ae3272a74f4497d16501",
"branch_name": "refs/heads/master",
"committer_date": 1503778474000,
"content_id": "5eed5602ba8f8729ff3fc6068a8add668635fd5e",
"detected_licenses": [
"MIT"
],
"directory_id": "f7bd89568154724af56dd6e3d1f09511c4b7778f",
"extension": "py",
"fi... | 2.40625 | stackv2 | import glob
import os
import itertools
import urllib.request as url_request
import tarfile
import json
import pickle
import numpy as np
import pandas as pd
from sklearn.utils import check_random_state
from mosaic import image_io
from mosaic.datasets.base import get_data_home, ImageDataBundle
from mosaic.datasets.prog... | 74 | 30.22 | 70 | 15 | 620 | python | [{"finding_id": "codeql_py/tarslip_9a367a6a94fbbe4b_57c86588", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
37
] | [
null
] | [
5
] | [
39
] | |
2024-11-19T01:29:01.733538+00:00 | 1,634,475,250,000 | df870a8f189be10b1175e7f379ad576a805270c5 | 2 | {
"blob_id": "df870a8f189be10b1175e7f379ad576a805270c5",
"branch_name": "refs/heads/master",
"committer_date": 1634475250000,
"content_id": "b0aab44d0bcc28a200375cc7f985ddd692fd8046",
"detected_licenses": [
"MIT"
],
"directory_id": "0c239c57268cf4e08f50a347a1f63d135999967f",
"extension": "py",
"fi... | 2.375 | stackv2 | import os
if os.getenv('DEVELOPMENT') is not None:
from dotenv import load_dotenv
load_dotenv(dotenv_path='../.env')
import sys
from flask import Flask, request, abort
from linebot import (
LineBotApi, WebhookHandler
)
from linebot.exceptions import (
InvalidSignatureError
)
from linebot.models impo... | 72 | 25.17 | 84 | 14 | 434 | python | [{"finding_id": "codeql_py/flask-debug_b2492305b3ffbe88_b5e44043", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-117"
] | [
"py/flask-debug",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1)."
] | [
72,
45
] | [
null,
null
] | [
5,
21
] | [
51,
44
] | |
2024-11-19T01:29:06.670426+00:00 | 1,619,196,671,000 | 842a0b72efb019ccb839fafd4c00a1267b8836dd | 4 | {
"blob_id": "842a0b72efb019ccb839fafd4c00a1267b8836dd",
"branch_name": "refs/heads/main",
"committer_date": 1619196671000,
"content_id": "2d04a6993d7abf27f0413a3f35b84b0449805df5",
"detected_licenses": [
"Unlicense"
],
"directory_id": "7f4e6bfa2febda8edd6ebcff329ccef2b243991e",
"extension": "py",
... | 4.09375 | stackv2 | import sys
import csv
import os
CLIENT_TABLE = '.clients.csv'
CLIENT_SCHEMA = ['first_name', 'last_name', 'email', 'phone_number']
clients = []
def _initialize_clients_from_storage():
# Opening .clients.csv file in reading mode and copying its actual
# content to clients list variable.
with open(CLIENT_TA... | 153 | 27.88 | 119 | 15 | 1,007 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_37be8fa84d8d7178_58265ec3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
44
] | [
null
] | [
15
] | [
119
] | |
2024-11-19T01:29:28.107701+00:00 | 1,639,211,459,000 | 7105aa20a41d4f4ed41872a8e5940001f51cd28c | 3 | {
"blob_id": "7105aa20a41d4f4ed41872a8e5940001f51cd28c",
"branch_name": "refs/heads/master",
"committer_date": 1639211459000,
"content_id": "d268ecabc92033272330fd1384c76375e864c296",
"detected_licenses": [
"MIT"
],
"directory_id": "134709679f95aed16ad59fd6612f83ef8d8f2723",
"extension": "py",
"fi... | 2.703125 | stackv2 | import math
from io import StringIO
from typing import List
from urllib.parse import unquote
import uuid
from daft import Node, PGM
from flask import Flask, request, Response, send_from_directory
app = Flask(__name__)
@app.route('/static/<path:path>')
def static_file(path):
return send_from_directory('static',... | 138 | 29.47 | 82 | 19 | 855 | python | [{"finding_id": "codeql_py/code-injection_eb2a72f8d90c6e58_0439bd3d", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-094"
] | [
"py/code-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1)."
] | [
44
] | [
null
] | [
10
] | [
22
] | |
2024-11-19T01:29:28.906782+00:00 | 1,610,687,112,000 | a67e7c46a8e6a1c20dc298f739c2fca3e9dc06b8 | 3 | {
"blob_id": "a67e7c46a8e6a1c20dc298f739c2fca3e9dc06b8",
"branch_name": "refs/heads/master",
"committer_date": 1610687112000,
"content_id": "9f206bb9ac7fca4b05b8eca595b070bf1b1dd444",
"detected_licenses": [
"MIT"
],
"directory_id": "af87c1e2ef3161eedb61e680969544dba8afa039",
"extension": "py",
"fi... | 2.671875 | stackv2 | # Import Requests library
import requests
# NSX Variables
nsxmanager = 'https://nsxmgr-01a.corp.local'
nsxurl = '/api/2.0/services/usermgmt/user/admin'
nsxheaders = {'Content-Type': 'application/xml'}
nsxuser = 'admin'
nsxpass = 'VMware1!'
# REST API call using requests.get function from request library. Set verify t... | 18 | 29 | 109 | 8 | 150 | python | [{"finding_id": "codeql_py/request-without-cert-validation_290dbe732f2a2cdf_03cf819e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
12
] | [
null
] | [
12
] | [
110
] | |
2024-11-19T01:29:51.079172+00:00 | 1,426,216,256,000 | 4c6ffd404f855a8c4b8b6a39ff6d138024974a01 | 3 | {
"blob_id": "4c6ffd404f855a8c4b8b6a39ff6d138024974a01",
"branch_name": "refs/heads/master",
"committer_date": 1426216256000,
"content_id": "79624f272794d6995131b81a9c1a08624e89a57d",
"detected_licenses": [
"BSD-3-Clause",
"MIT"
],
"directory_id": "625a3c166e258af9ac3081c4501238039ee2b72c",
"ext... | 2.59375 | stackv2 | import logging
import psycopg2
import psycopg2.extensions
from .packages import pgspecial
_logger = logging.getLogger(__name__)
# Cast all database input to unicode automatically.
# See http://initd.org/psycopg/docs/usage.html#unicode-handling for more info.
psycopg2.extensions.register_type(psycopg2.extensions.UNICO... | 145 | 37.36 | 79 | 15 | 1,255 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a8fde26b785c3d4b_45aedf07", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive dat... | [
44,
44,
44,
44,
44
] | [
null,
null,
null,
null,
null
] | [
13,
21,
27,
37,
43
] | [
19,
25,
35,
41,
47
] | |
2024-11-19T01:30:05.728489+00:00 | 1,686,792,379,000 | c6fbfa509124d35dd45d011aa771ab70352e56ff | 2 | {
"blob_id": "c6fbfa509124d35dd45d011aa771ab70352e56ff",
"branch_name": "refs/heads/main",
"committer_date": 1686792379000,
"content_id": "2e6df78b859b090b1960b3579efa8d8da88c4d9f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "aa5a8163c450a7ca7f4d3e7483213bb3642e0824",
"extension": "py",
... | 2.375 | stackv2 | import json
import random
import string
import requests
import time
import base64
from flask import Flask, request
from pymessenger.bot import Bot
with open('keys.json', 'r') as file:
ACCESS_TOKEN = json.loads(file.read())['facebook']['token']
VERIFY_TOKEN = 'alexpoloz'
with open('sets.json', 'r') as file:
sets ... | 202 | 22.48 | 146 | 21 | 1,363 | python | [{"finding_id": "codeql_py/full-ssrf_fac1750876309e1b_b0c31ad0", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 2 | true | [
"CWE-918",
"CWE-079"
] | [
"py/full-ssrf",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
128,
149
] | [
null,
null
] | [
81,
10
] | [
99,
37
] | |
2024-11-19T01:55:10.756555+00:00 | 1,600,453,713,000 | 29ac37e330c1b3a7b07bf1d61b3f9dbec99a34a9 | 3 | {
"blob_id": "29ac37e330c1b3a7b07bf1d61b3f9dbec99a34a9",
"branch_name": "refs/heads/master",
"committer_date": 1600453713000,
"content_id": "af1961b60f87c23608bfe26571409c9ee50d3e8d",
"detected_licenses": [
"MIT"
],
"directory_id": "12204664d0de6e89a62f4c5f78a3ad3cbe2da09a",
"extension": "py",
"fi... | 2.546875 | stackv2 | import decimal
import hashlib
import logging
import re
import uuid
from collections import OrderedDict
from dataclasses import dataclass
from math import inf
from typing import Any, Dict, List, Optional
import pandas as pd
from django.conf import settings
from django.core.cache import cache
from django.core.serializer... | 248 | 29.25 | 97 | 19 | 1,737 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_5cfd7546ccf7e141_277283cf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
98
] | [
null
] | [
22
] | [
50
] | |
2024-11-19T02:06:41.415634+00:00 | 1,616,044,516,000 | be2883b079af6f6d092e3978863561f815bd0c0a | 3 | {
"blob_id": "be2883b079af6f6d092e3978863561f815bd0c0a",
"branch_name": "refs/heads/master",
"committer_date": 1616044516000,
"content_id": "c2456bd51ee88c85ed7dc3ffc1dc4dbd500010c9",
"detected_licenses": [
"MIT"
],
"directory_id": "e8294bb01d47a59745065bf50ca718d1321c7184",
"extension": "py",
"fi... | 2.765625 | stackv2 | # -*- coding: utf-8 -*-
import base64
from Crypto import Random
from Crypto.Cipher import AES
from Crypto.Hash import SHA256
from acclist.lib.exception.acccryptoexception import AcccryptoDecryptException
class AccCrypto(object):
def __init__(self):
# must be ascii str
self.checkstr = 'accup_crypt... | 121 | 32.79 | 109 | 18 | 1,059 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_e5da039429ae927d_67e2f916", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
86,
99,
101
] | [
null,
null,
null
] | [
19,
22,
34
] | [
41,
44,
56
] | |
2024-11-19T02:07:03.218272+00:00 | 1,561,025,009,000 | 594ed1a2a0e7488f11b1e47fde3614d24724ad0b | 2 | {
"blob_id": "594ed1a2a0e7488f11b1e47fde3614d24724ad0b",
"branch_name": "refs/heads/master",
"committer_date": 1561025009000,
"content_id": "f48cd341b022ddcdbcad42e1da0ed316a1cdee11",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c5a8edd9834e042933b7ef132640deec55ada18c",
"extension": "py"... | 2.40625 | stackv2 | #!/usr/bin/env python
import webapp2
import urllib2
import urllib
import re
from google.appengine.ext import ndb
from models import TestNote
from models import Note
import datetime
import os
import jinja2
import logging
url = 'https://www.zlobki.waw.pl/rekrutacja2012/index.php'
pesel = '00000000000'
pin = '0000'
imi... | 256 | 40 | 117 | 15 | 2,728 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d474d67790d86e81_5843d28d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
28
] | [
null
] | [
13
] | [
90
] | |
2024-11-19T02:07:04.293446+00:00 | 1,532,358,598,000 | d762e284ddcae1960615756c778537745a68b808 | 3 | {
"blob_id": "d762e284ddcae1960615756c778537745a68b808",
"branch_name": "refs/heads/master",
"committer_date": 1532358598000,
"content_id": "aab9ebd3bb28c5dd0328e5bdefc5e8679aac2beb",
"detected_licenses": [
"MIT"
],
"directory_id": "93f0e62fc16624e0e33891a1076fa5f40a6ef9d3",
"extension": "py",
"fi... | 2.671875 | stackv2 | # coding: utf-8
from flask import Flask, render_template, send_from_directory
from os.path import isdir, isfile
from os import listdir
from tools import Tool
from fuzzywuzzy import process
app = Flask(__name__)
tool = Tool()
# Initilize search engine
fuzzy_choices = []
fuzzy_choices_lower = []
ko = 0
match_search = t... | 135 | 28.08 | 79 | 19 | 888 | python | [{"finding_id": "codeql_py/path-injection_951d86f49beb4a3d_5e050f07", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 7 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](... | [
84,
85,
98,
105,
108,
110,
130
] | [
null,
null,
null,
null,
null,
null,
null
] | [
14,
29,
14,
29,
26,
29,
15
] | [
27,
42,
27,
42,
35,
38,
28
] | |
2024-11-19T02:31:48.568046+00:00 | 1,549,534,680,000 | 77eba4e9b03ecad193a03eb95644e81a77f77448 | 3 | {
"blob_id": "77eba4e9b03ecad193a03eb95644e81a77f77448",
"branch_name": "refs/heads/master",
"committer_date": 1549534680000,
"content_id": "41e382dd028cba061228b60bd08c30506e2f60eb",
"detected_licenses": [
"MIT"
],
"directory_id": "c82fcc7ed3b9f1f1e5deedbbc58d47aafec0865a",
"extension": "py",
"fi... | 2.625 | stackv2 | import os
import datetime
import logging
from jinja2 import Template
logger = logging.getLogger("CyberCaptain")
def run_path_visualisation(paths, config, modulesConfig):
"""
Runs the path visualization. Assembles the paths to be visualized.
Will call the render function to output a HTML.
**Parameter... | 78 | 38.76 | 159 | 20 | 642 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e7f17102e67ba941_168243d5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
70
] | [
null
] | [
20
] | [
42
] | |
2024-11-19T02:31:59.598259+00:00 | 1,563,717,647,000 | 46b347e60ad44ed5b6de66c6994ac864875d2312 | 3 | {
"blob_id": "46b347e60ad44ed5b6de66c6994ac864875d2312",
"branch_name": "refs/heads/master",
"committer_date": 1563717647000,
"content_id": "795183de6a0768f33ed394993f4c7d6e431e56a8",
"detected_licenses": [
"MIT"
],
"directory_id": "c3415b113a09199bcc0b771013160801cf874447",
"extension": "py",
"fi... | 3.40625 | stackv2 | # #!/usr/bin/env python3
# """Password generator using Python 3.6 features."""
# # import secrets
import random
import string
import sys
# class Gen:
# def __init__('pwd')
# def generate_password(self):
# """
# a method that gnerates pasword using choice and random key words
# ... | 46 | 22.39 | 78 | 14 | 250 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2236903abf9bd3c1_c2e78c5a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
42
] | [
null
] | [
11
] | [
27
] | |
2024-11-19T02:32:05.404170+00:00 | 1,466,900,467,000 | 94cc908e9610fbf614fb95c3b3904ee7c236b5c2 | 2 | {
"blob_id": "94cc908e9610fbf614fb95c3b3904ee7c236b5c2",
"branch_name": "refs/heads/master",
"committer_date": 1466900467000,
"content_id": "e5460f970d4122a6ebd4de20118fe49b22a99907",
"detected_licenses": [
"MIT"
],
"directory_id": "d20f9d253ee13bf9e6cf87e5eb0f8966e3059a21",
"extension": "py",
"fi... | 2.328125 | stackv2 | from flask import render_template, current_app, request, redirect, url_for, \
flash, session
from flask import jsonify
from flask_login import login_user, logout_user, login_required, current_user
from . import auth
from forms import LoginForm
import jsonpickle
import bcrypt
from app import mongo
from app.models... | 84 | 33.6 | 108 | 16 | 620 | python | [{"finding_id": "codeql_py/unsafe-deserialization_f88aa624f736812c_d2abc092", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio... | 2 | true | [
"CWE-502",
"CWE-601"
] | [
"py/unsafe-deserialization",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Unsafe deserialization depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
77,
47
] | [
null,
null
] | [
35,
29
] | [
47,
84
] | |
2024-11-19T02:32:09.468775+00:00 | 1,629,378,150,000 | a1b290cb03838ab81ed17d1539c8abd81c90d365 | 3 | {
"blob_id": "a1b290cb03838ab81ed17d1539c8abd81c90d365",
"branch_name": "refs/heads/master",
"committer_date": 1629378727000,
"content_id": "5411e49ab239d1fed66cddef236ff2e74850cb88",
"detected_licenses": [
"MIT"
],
"directory_id": "5de836cf809ea7088a6c2ae66c4d4c5db2913ca8",
"extension": "py",
"fi... | 3.34375 | stackv2 | # -*- coding: utf-8 -*-
"""
This module checks for password pwnage using k-anonimity.
"""
import sys
import requests
from requests.compat import urljoin
import passpwnedcheck.constants as constants
from passpwnedcheck.utils import get_password_prefix_suffix, response_to_dict
class PassChecker:
'''
Receive... | 96 | 25.83 | 86 | 14 | 549 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5671e50c75d141d5_59f6ea5c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
77,
80
] | [
null,
null
] | [
19,
19
] | [
67,
57
] | |
2024-11-19T02:32:10.617351+00:00 | 1,563,842,559,000 | 13f8d8b88d35e639ffedcb04dec2b34fb2a966c7 | 2 | {
"blob_id": "13f8d8b88d35e639ffedcb04dec2b34fb2a966c7",
"branch_name": "refs/heads/master",
"committer_date": 1563842559000,
"content_id": "9fef78c02ab986e8b3afac4695c6617bd9d96829",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "ae03e3eece1f4184e8ef8d009ceb25bdcc2557b5",
"extension": "p... | 2.375 | stackv2 | #!/usr/bin/env python
#
# Copyright 2018, Data61
# Commonwealth Scientific and Industrial Research Organisation (CSIRO)
# ABN 41 687 119 230.
#
# This software may be distributed and modified according to the terms of
# the BSD 2-Clause license. Note that NO WARRANTY is provided.
# See "LICENSE_BSD2.txt" for details.
#... | 154 | 34.32 | 106 | 18 | 1,249 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e25886962156abe0_46cfdcce", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
126
] | [
132
] | [
11
] | [
42
] | |
2024-11-19T02:32:23.298716+00:00 | 1,692,085,350,000 | 8a8d47ea903ce506dbd3f67f0e5fd1f29db35003 | 2 | {
"blob_id": "8a8d47ea903ce506dbd3f67f0e5fd1f29db35003",
"branch_name": "refs/heads/master",
"committer_date": 1692085350000,
"content_id": "345449901f4bb6e6618e59bbc2a38ce2532f8b64",
"detected_licenses": [
"MIT"
],
"directory_id": "cbf1b4f810cd237bde51388f3bf1bbf60eee371d",
"extension": "py",
"fi... | 2.34375 | stackv2 | from contextlib import contextmanager
import os
import re
import click
from jinja2 import Environment, FileSystemLoader, Template
from . import echo
SUFFIX = '.jinja2'
def regex_replace(s, find, replace):
"""A non-optimal implementation of a regex filter"""
return re.sub(find, replace, s)
@contextmanager... | 80 | 25.16 | 71 | 19 | 505 | python | [{"finding_id": "codeql_py/overly-permissive-file_42bc9936afe67e4f_e11b0f9d", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 4 | true | [
"CWE-732",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/overly-permissive-file",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.... | [
68,
34,
46,
50
] | [
null,
null,
null,
null
] | [
9,
18,
22,
24
] | [
28,
64,
34,
36
] | |
2024-11-19T02:32:58.959603+00:00 | 1,605,268,514,000 | 27269b3110a600281e07cc5e4555be5228c9af3a | 3 | {
"blob_id": "27269b3110a600281e07cc5e4555be5228c9af3a",
"branch_name": "refs/heads/master",
"committer_date": 1605268514000,
"content_id": "f312f6e31044a5d34d43caeb1f9728a71d7e0c9a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9340b4532bbc98f456da58b36d6bbecd925be12f",
"extension": "py"... | 3.453125 | stackv2 | import re
import struct
from typing import Iterable, List, Text, Tuple, Union
import unicodedata
import six
def wtq_normalize(x):
"""Returns the normalized version of x.
This normalization function is taken from WikiTableQuestions github, hence the
wtq prefix. For more information, see
https://github.com/ppas... | 126 | 28.44 | 81 | 14 | 1,019 | python | [{"finding_id": "codeql_py/redos_1e1e51131f08ac73_25a4137b", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\[0\\]'.", "rem... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\[0\\]'."
] | [
31
] | [
null
] | [
18
] | [
55
] | |
2024-11-19T02:43:32.406573+00:00 | 1,580,874,826,000 | 34e77333867ec7caf497188273ed6b66043a64d8 | 3 | {
"blob_id": "34e77333867ec7caf497188273ed6b66043a64d8",
"branch_name": "refs/heads/master",
"committer_date": 1580874826000,
"content_id": "bf4b830b86d5fb6c0fa1fc25a9bb884be895831a",
"detected_licenses": [
"MIT"
],
"directory_id": "63daa6f9811637ef00a9c79fd068e3e9674d6eaa",
"extension": "py",
"fi... | 2.6875 | stackv2 | from flask import Flask, request, Response, send_from_directory
import os
import random
from os import path
from flask_cors import CORS
from wand.image import Image
import fontforge
import psMat
import sys
from collections import deque
CAP_CHARS = set('ABCDEFGHIJKLMNOPQRSTUVWXYZ')
DOWN_CHARS = set('gjpqy')
UP_CHARS = ... | 119 | 27.51 | 107 | 17 | 984 | python | [{"finding_id": "codeql_py/reflective-xss_ac8700f5c3727c0f_d5d71ca2", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-022"
] | [
"py/reflective-xss",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
84,
119
] | [
null,
null
] | [
12,
32
] | [
24,
37
] | |
2024-11-19T02:54:56.239778+00:00 | 1,621,604,528,000 | accebc1166fcadac18673f60d437ea34288cbfda | 3 | {
"blob_id": "accebc1166fcadac18673f60d437ea34288cbfda",
"branch_name": "refs/heads/master",
"committer_date": 1621604528000,
"content_id": "68c5de2eccad2680c59376548688761b3df370d6",
"detected_licenses": [
"MIT"
],
"directory_id": "5b2a601d9d47dbc195c9ed9971f9f57755f444c9",
"extension": "py",
"fi... | 2.609375 | stackv2 | import os
import socket
import requests
import stdiomask
import time
import json
from signal import signal, SIGINT
from sys import exit
import werkzeug
werkzeug.cached_property = werkzeug.utils.cached_property
from robobrowser import RoboBrowser
######################### Some global constants ########################... | 210 | 35.2 | 121 | 17 | 1,815 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ea15cbe7a3eeefb7_6ac7d20d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
43
] | [
null
] | [
11
] | [
34
] | |
2024-11-19T02:55:02.545896+00:00 | 1,547,941,159,000 | edd9cd6d60e589e919f60e06da3411c9480614f4 | 3 | {
"blob_id": "edd9cd6d60e589e919f60e06da3411c9480614f4",
"branch_name": "refs/heads/master",
"committer_date": 1547941159000,
"content_id": "88445a4aaad8e93b4b38636e0f47fe774133c061",
"detected_licenses": [
"MIT"
],
"directory_id": "e61d7da79904c6517eac90205bd5bfd7c825a12d",
"extension": "py",
"fi... | 2.515625 | stackv2 | import smartcar
from flask import Flask, redirect, request, jsonify, render_template
from flask_cors import CORS
import os
app = Flask(__name__)
CORS(app)
# global variable to save our access_token
access = None
client = smartcar.AuthClient(
client_id= '7126d3ad-f1bf-4712-b484-2e450efa1d5f',
client_secret='... | 77 | 25.23 | 122 | 12 | 520 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_08c9d3ca47cb52fb_01807b73", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
55
] | [
null
] | [
11
] | [
39
] | |
2024-11-19T02:55:06.122996+00:00 | 1,512,418,778,000 | 0f8a30a1e1eccb13623a8bf5b91ab7983a229bbd | 3 | {
"blob_id": "0f8a30a1e1eccb13623a8bf5b91ab7983a229bbd",
"branch_name": "refs/heads/master",
"committer_date": 1512418778000,
"content_id": "deee17966fd7b79fce10aa2e9ac21afba0db1f1d",
"detected_licenses": [
"MIT"
],
"directory_id": "3668008abf521db354fec89b1c6dded28c783c37",
"extension": "py",
"fi... | 2.59375 | stackv2 | import click
import requests
import configparser
import json
import flask
import hmac
import os
from flask import request
from .cli import cli
def config_repos_to_list(config):
"""Parse the repositories contained in configuration file and create a HTML list of them. (for the web usage)
:param config: Configu... | 373 | 28.58 | 124 | 21 | 2,385 | python | [{"finding_id": "codeql_py/partial-ssrf_6a4d3d87c9924cc6_3f53b64e", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
147,
163
] | [
null,
null
] | [
5,
5
] | [
24,
43
] | |
2024-11-19T02:55:16.025057+00:00 | 1,599,948,775,000 | 7a6ce2bd35f97cf64420d26baed15ba6fd8fcb9b | 3 | {
"blob_id": "7a6ce2bd35f97cf64420d26baed15ba6fd8fcb9b",
"branch_name": "refs/heads/master",
"committer_date": 1599948775000,
"content_id": "71ae6987999403ab5d429061e5adcd2b6598a2e1",
"detected_licenses": [
"MIT"
],
"directory_id": "a34551532207ae46e9d202825e8fc9809709df45",
"extension": "py",
"fi... | 2.703125 | stackv2 | '''
Requires a created twitter_keys.py file in the root for necessary imported variables like keys.
[twitter_keys.py] should look like:
CONSUMER_KEY = 'xxxxxxxxxxxxxxxxxxx'
CONSUMER_KEY_SECRET = 'yyyyyyyyyyyyyyyyyyy'
.. and so forth
-----------------------------------------------------------------... | 75 | 29.55 | 98 | 14 | 523 | python | [{"finding_id": "codeql_py/stack-trace-exposure_476bf2beeb4688d0_e89bc032", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-215",
"CWE-601"
] | [
"py/stack-trace-exposure",
"py/flask-debug",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
70,
75,
50
] | [
null,
null,
null
] | [
12,
3,
23
] | [
26,
22,
34
] | |
2024-11-19T02:55:38.795944+00:00 | 1,584,226,948,000 | de079a865f928c23209188f07f0556a4d41c2ba9 | 3 | {
"blob_id": "de079a865f928c23209188f07f0556a4d41c2ba9",
"branch_name": "refs/heads/master",
"committer_date": 1584226948000,
"content_id": "2bf76fc764692d0c996d080767160a6490c2f715",
"detected_licenses": [
"MIT"
],
"directory_id": "1a677fe0a84c7aa4ac241fcf1adab6df6de6b66a",
"extension": "py",
"fi... | 2.9375 | stackv2 | import dns.resolver
import re
import calendar
import time
import requests
def dns_message_data(message):
secs = calendar.timegm(time.gmtime())
return 'shm:' + str(secs) + ':' + message
# Valid host names pass simple domain name validation
def is_valid_hostname(hostname):
if len(hostname) < 4 or len(hos... | 107 | 31.12 | 128 | 16 | 829 | python | [{"finding_id": "codeql_py/request-without-cert-validation_07589823db4ef7d4_a5c8ff91", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
59,
82
] | [
null,
null
] | [
13,
9
] | [
44,
40
] | |
2024-11-19T02:55:55.502506+00:00 | 1,534,449,376,000 | 318d195c86231be911f810c0d2e12899a1481556 | 2 | {
"blob_id": "318d195c86231be911f810c0d2e12899a1481556",
"branch_name": "refs/heads/master",
"committer_date": 1534449376000,
"content_id": "16a3dccfb91db691e5b1db86b5c1e45c0dc33d10",
"detected_licenses": [
"MIT"
],
"directory_id": "873abb51a2f7f5b54dbff852181b17d792c4d2f4",
"extension": "py",
"fi... | 2.453125 | stackv2 | import base64
import os
import re
from enum import Enum
from pathlib import Path
from isort import SortImports
from jinja2 import Template, TemplateError
from ..exceptions import AiohttpDevConfigError
from ..logs import main_logger as logger
THIS_DIR = Path(__file__).parent
TEMPLATE_DIR = THIS_DIR / 'template' # ty... | 182 | 34.55 | 108 | 17 | 1,510 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5ce01cb331c7d8cc_03955b83", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
154
] | [
null
] | [
24
] | [
47
] | |
2024-11-19T02:55:58.223694+00:00 | 1,549,333,824,000 | e4b6ebb172579c58e1dc7918884e9fb9b5ef4d35 | 3 | {
"blob_id": "e4b6ebb172579c58e1dc7918884e9fb9b5ef4d35",
"branch_name": "refs/heads/master",
"committer_date": 1549333824000,
"content_id": "205d9ec53c1d974678f1cc28d685590d5e3bd089",
"detected_licenses": [
"MIT"
],
"directory_id": "fd29efb6e4c087c17350502fd36a0f5022a5a190",
"extension": "py",
"fi... | 2.765625 | stackv2 | import os
from flask import Flask, request, send_from_directory, flash, redirect, url_for
from utils import allowed_file, generate_filename
from db import get_db, query_db, close_db
app = Flask(__name__)
app.config.from_object("config")
@app.route('/')
def hello_world():
return 'Wave Watch'
@app.route('/db/i... | 75 | 26.31 | 121 | 17 | 450 | python | [{"finding_id": "codeql_py/url-redirection_506f3dc5f25b9be9_6b15cbfd", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
39,
45
] | [
null,
null
] | [
29,
29
] | [
40,
40
] | |
2024-11-19T02:56:02.256925+00:00 | 1,575,390,245,000 | a22e8c22d7d6ad1b3d229948c7ee1db4b48d9058 | 2 | {
"blob_id": "a22e8c22d7d6ad1b3d229948c7ee1db4b48d9058",
"branch_name": "refs/heads/master",
"committer_date": 1575390245000,
"content_id": "f0a2e04ee308b2955f55e5ffb6a94072b402f49b",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "b6d52eb0d81647f1b102c1b4100a4e4d0b0ba544",
"extension": "p... | 2.4375 | stackv2 | from __future__ import absolute_import
import json
import logging
import re
from scrapy.utils.misc import load_object
from six import string_types
from six.moves.urllib.parse import urlparse
from six.moves.urllib.request import urlopen
logger = logging.getLogger(__name__)
URL_REGEX = re.compile(
r"^(?:http|ftp)... | 80 | 26.74 | 101 | 20 | 678 | python | [{"finding_id": "codeql_py/redos_2ba9793cfbed4c12_5843c0c1", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\013'."
] | [
28
] | [
null
] | [
10
] | [
84
] | |
2024-11-19T02:56:08.115463+00:00 | 1,556,971,397,000 | 237ff9a91f7b31856bb02d71f20c12aa43da771f | 2 | {
"blob_id": "237ff9a91f7b31856bb02d71f20c12aa43da771f",
"branch_name": "refs/heads/master",
"committer_date": 1556971397000,
"content_id": "5dd6075afa4f073ef3caf2250245219467d7f26a",
"detected_licenses": [
"MIT"
],
"directory_id": "727a4e19617cb922852ed55319a67fccac47e94c",
"extension": "py",
"fi... | 2.390625 | stackv2 | from interact import Bot
from PIL import Image
import base64
import pytesseract
import io
from ocr_mapper import mapper
import paramiko
import time
import threading
BASE_URL = 'http://ahl.threatsims.com:5000'
VPS_URL = BASE_URL + '/vps/'
bot = Bot()
def get_new_image(soup):
image_data = base64.b64decode(soup.fin... | 108 | 22.46 | 106 | 18 | 680 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e797a8961f46d8c4_c32786cf", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 2 | true | [
"CWE-295",
"CWE-312"
] | [
"py/paramiko-missing-host-key-validation",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
63,
61
] | [
null,
null
] | [
null,
7
] | [
61,
69
] | |
2024-11-19T03:10:50.350384+00:00 | 1,399,473,093,000 | 852d030ddc45c0ba4b523cb83813be0647ef9d40 | 2 | {
"blob_id": "852d030ddc45c0ba4b523cb83813be0647ef9d40",
"branch_name": "refs/heads/master",
"committer_date": 1399473093000,
"content_id": "683a34cde506b7c33621de30d406af5dc53d424a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5168eec901b0e716853563e5a2fb7f4321676ae5",
"extension": "py"... | 2.375 | stackv2 | """
This file implements the debug socket interface available in pegasus-monitord.
"""
##
# Copyright 2007-2011 University Of Southern California
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the Lic... | 257 | 27.33 | 100 | 18 | 1,774 | python | [{"finding_id": "codeql_py/overly-large-range_c822f06ce828a85a_6c3dfa40", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
41
] | [
null
] | [
40
] | [
43
] | |
2024-11-19T03:10:52.263602+00:00 | 1,585,496,273,000 | 1ec77b8940d68daac1806a0f11701fc0f67eaf44 | 3 | {
"blob_id": "1ec77b8940d68daac1806a0f11701fc0f67eaf44",
"branch_name": "refs/heads/master",
"committer_date": 1585496273000,
"content_id": "42c2b5939f158587fddd0e9d55d1b14b84a728c8",
"detected_licenses": [
"MIT"
],
"directory_id": "df992a79bfa12c2c83772d0a6b4b2cbb94b6c86b",
"extension": "py",
"fi... | 3.359375 | stackv2 | # --------------
#Header files
import pandas as pd
import numpy as np
import matplotlib.pyplot as plt
#path of the data file- path
data=pd.read_csv(path)
data['Gender'].replace('-','Agender',inplace=True)
data['Gender']
gender_count=data['Gender'].value_counts()
print(gender_count)
gender_count.plot.barh()
#data.plot... | 70 | 21.54 | 69 | 9 | 440 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_60faf670ec9d8ce5_e2ba9968", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
13
] | [
null
] | [
7
] | [
19
] | |
2024-11-19T03:22:12.329450+00:00 | 1,497,918,331,000 | 61f5594438e8be5db75014bf13761cdd52d9f785 | 3 | {
"blob_id": "61f5594438e8be5db75014bf13761cdd52d9f785",
"branch_name": "refs/heads/master",
"committer_date": 1497918331000,
"content_id": "99f578ae5510657357a77e6a96446bac129e7eaf",
"detected_licenses": [
"MIT"
],
"directory_id": "421b5280f17274244e2db46d5cec1b9a944df0fa",
"extension": "py",
"fi... | 3.234375 | stackv2 | """
Get bitcoin prices
This module buffers the bitcoin data and writes in bursts so it doesn't keep the file
open indefinitely, allowing for sync via dropbox/iCloud/etc.
"""
import json
import ssl
import csv
import time
from collections import deque
import urllib.request
BITCOIN_DATA_QUEUE = deque()
STATS = {'count':... | 64 | 30.8 | 89 | 14 | 467 | python | [{"finding_id": "codeql_py/insecure-protocol_2e0aeba6d88b481b_e9587259", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1)."
] | [
21
] | [
null
] | [
24
] | [
58
] | |
2024-11-19T03:22:19.398386+00:00 | 1,634,551,785,000 | beea0c73cd0cc7ec0bca40ffc995ccec5ccac2d9 | 3 | {
"blob_id": "beea0c73cd0cc7ec0bca40ffc995ccec5ccac2d9",
"branch_name": "refs/heads/master",
"committer_date": 1634551785000,
"content_id": "64e5a8a584af2298b8f8dc4229a88abcddd637f8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "886e8a9c415f795433f72fba9c98de9d62aa0083",
"extension": "py"... | 3.125 | stackv2 | import json
import re
from collections import namedtuple
from hashlib import md5
from pathlib import Path
from typing import List, Optional
from Levenshtein import ratio
from yaml import safe_load
Secret = namedtuple("Secret", ["file", "line", "key", "value", "message", "severity"])
escaped_chars = str.maketrans({"... | 167 | 24.24 | 89 | 28 | 1,032 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7d0e081771ebc734_6906f5f4", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
132
] | [
null
] | [
16
] | [
38
] | |
2024-11-19T03:22:20.158142+00:00 | 1,610,866,014,000 | 666ee5813f0112bbf60c4ddaaa9f4a13cf2582eb | 2 | {
"blob_id": "666ee5813f0112bbf60c4ddaaa9f4a13cf2582eb",
"branch_name": "refs/heads/main",
"committer_date": 1610866014000,
"content_id": "69d8a948d20f563791d858cf24fd9c02f4718042",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "167171716480f71bb0cb460ec420f6374ed115dd",
"extension": "py",
... | 2.453125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
# @author : yasin
# @time : 20-12-28 下午9:23
# @File : account.py
import tornado.ioloop
import tornado.web
import tornado.httpclient
import tornado.httputil
import tornado.gen
import hashlib
import json
import copy
import config
from config import logger
class MainHa... | 168 | 33.14 | 96 | 20 | 1,321 | python | [{"finding_id": "codeql_py/reflective-xss_eb05d68dab75dbbe_6de763c5", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
47
] | [
null
] | [
32
] | [
39
] | |
2024-11-19T03:43:51.547254+00:00 | 1,452,470,541,000 | 2c6736176a92f9800bd9d0961d5d5fd4fc4b14b4 | 3 | {
"blob_id": "2c6736176a92f9800bd9d0961d5d5fd4fc4b14b4",
"branch_name": "refs/heads/master",
"committer_date": 1452470541000,
"content_id": "57da9c8e4cc099c7560fe8c7bf2bd21adfbc3b64",
"detected_licenses": [
"MIT"
],
"directory_id": "8946ab804674e32ce86bcabcdf15279ba053c699",
"extension": "py",
"fi... | 3.453125 | stackv2 | # Calculates the mean and median salaries for each school based on BPShighschool.csv
# and writes to salaries.json
import csv, json
hs = set(['Another Course to College','Boston Arts Academy','Community Academy','Boston International HS',
'Boston Latin School', 'Brighton High', 'Burke High', 'Charlestown High',
... | 56 | 34.86 | 107 | 17 | 553 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_238f8824f28012f0_ec32b1b6", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
55
] | [
null
] | [
9
] | [
32
] | |
2024-11-19T03:43:53.321990+00:00 | 1,573,300,840,000 | ec8eb4c046b4087e696937193499e556f721959a | 2 | {
"blob_id": "ec8eb4c046b4087e696937193499e556f721959a",
"branch_name": "refs/heads/master",
"committer_date": 1573300840000,
"content_id": "f50e1a86cb61c4179a80cae48290fa96fd6db6c4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "081713d72f1c19f9a519fb15089e17164658006e",
"extension": "py"... | 2.5 | stackv2 | import json
import requests
from base64 import b64encode
import hashlib
import socket
import shutil
import os
import binascii
import logging
logger = logging.getLogger('urbackup-server-python-api-wrapper')
"""Backwards compatible imports"""
try:
import urllib
except ImportError:
import urllib.parse
class u... | 470 | 25.76 | 110 | 28 | 2,711 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1fd293e1bf0dc87b_767dd9cb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
137
] | [
null
] | [
52
] | [
97
] | |
2024-11-19T03:44:00.921054+00:00 | 1,544,635,865,000 | 39b3a017a6374775e23ee525568b06a3a75b7e8e | 3 | {
"blob_id": "39b3a017a6374775e23ee525568b06a3a75b7e8e",
"branch_name": "refs/heads/master",
"committer_date": 1544635865000,
"content_id": "61dfa9b9c037c47fdf2e454cfad9db054b54a48d",
"detected_licenses": [
"MIT"
],
"directory_id": "a1e3b821da277adfe4af498e2fdfe7502019bf21",
"extension": "py",
"fi... | 2.578125 | stackv2 | import cgi
import mimetypes
import os
import pprint
import time
import traceback
import urlparse
import wsgi_proxy
import golang
def get_upload_dir():
path_dir = os.path.join(os.path.dirname(os.path.abspath(__file__)), 'USERRES')
if not os.path.exists(path_dir):
os.makedirs(path_dir, mode=0755)
... | 225 | 30.29 | 130 | 19 | 1,685 | python | [{"finding_id": "codeql_py/path-injection_6e308c3e5ec2ed9d_14b25a6d", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
174
] | [
null
] | [
15
] | [
19
] | |
2024-11-19T03:44:09.397432+00:00 | 1,675,242,871,000 | dc4693d8c26fa0ed229a6307e4763789ce602245 | 3 | {
"blob_id": "dc4693d8c26fa0ed229a6307e4763789ce602245",
"branch_name": "refs/heads/master",
"committer_date": 1675242871000,
"content_id": "6cc3bd53065c79ef0115b28ab1cb041c149a9065",
"detected_licenses": [
"MIT"
],
"directory_id": "6d4e46adfe4f393b27d6443e5e8027b56ffcc0c9",
"extension": "py",
"fi... | 2.671875 | stackv2 | # -*- coding: utf-8 -*
#import socket module
from socket import *
import sys
import re
import ssl
import traceback
##########################################################
#global params
##########################################################
HOST = "127.0.0.1"
PORT = 8800
FILE = "index.html"
ssl_version = None... | 145 | 32.2 | 90 | 13 | 1,180 | python | [{"finding_id": "codeql_py/insecure-protocol_689d7e4439bc0cff_153224f0", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)."
] | [
84
] | [
null
] | [
16
] | [
26
] | |
2024-11-19T03:44:29.080110+00:00 | 1,632,274,487,000 | ff2838d6a20fd140221b308c7c68580d5fe3bcbc | 3 | {
"blob_id": "ff2838d6a20fd140221b308c7c68580d5fe3bcbc",
"branch_name": "refs/heads/main",
"committer_date": 1632274487000,
"content_id": "d6d562e8e912ee68bde36a0b16f649bd1733f0d4",
"detected_licenses": [
"MIT"
],
"directory_id": "e006165fde69995b3cb257f4c556b6f4ca13c16c",
"extension": "py",
"file... | 2.6875 | stackv2 | from flask import Flask, app, jsonify, request, redirect, make_response
from leer_modelo import predecir
ALLOWED = { "png", "jpg", "jpeg", "gif" }
def evaluar_extencion_archivo(filename):
# queso.jpg
# ["queso", "jpg"]
tiene_punto = "." in filename # True, False
if tiene_punto:
extencion_filena... | 50 | 29.68 | 71 | 14 | 397 | python | [{"finding_id": "codeql_py/flask-debug_b06abdd0bffeb8ee_b1e4eae9", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-601",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
49,
35,
38
] | [
null,
null,
null
] | [
5,
22,
22
] | [
51,
33,
33
] | |
2024-11-19T02:08:52.120582+00:00 | 1,516,807,194,000 | 3aa2e20ff1ba192b7e264ec3acc17b04c82e9d62 | 2 | {
"blob_id": "3aa2e20ff1ba192b7e264ec3acc17b04c82e9d62",
"branch_name": "refs/heads/master",
"committer_date": 1516807194000,
"content_id": "0122d7a0643d5543c0e339b48f7fc5edc80f7219",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e2519ac43e2db404d8d3dc527cb9ba18664c5be0",
"extension": "py"... | 2.390625 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
__author__ = 'jiavan'
import os
import json
import logging
import socketserver
import threading
import time
import socket
import hashlib
import struct
def get_table(key):
m = hashlib.md5()
m.update(key.encode('utf-8'))
s = m.digest()
(a, b) = struct.unp... | 107 | 26.02 | 138 | 26 | 686 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_f022f14a5c7ed05f_587d9eec", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
18
] | [
null
] | [
14
] | [
33
] | |
2024-11-19T02:21:36.904085+00:00 | 1,579,268,021,000 | dbb2cc3c343f605ce058e3ed8c0b22bcfe18948c | 3 | {
"blob_id": "dbb2cc3c343f605ce058e3ed8c0b22bcfe18948c",
"branch_name": "refs/heads/master",
"committer_date": 1579268021000,
"content_id": "7d1e383d5bcf717d5bbe215071c5b8ec356a502d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ce729906834ccbd8da28f1ad44802b1bfb628575",
"extension": "py"... | 2.78125 | stackv2 | from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
from cryptography.hazmat.backends import default_backend
from set2.padding import pkcs7_padding, pkcs7_strip
from random import randint
import os
backend = default_backend()
def encrypt_aes_128_ecb(msg, key):
padded_msg = pkcs7_padding(m... | 27 | 34.96 | 76 | 10 | 263 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_7d25b2b726ef0854_94fd2b6c", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
13,
18
] | [
null,
null
] | [
12,
23
] | [
40,
45
] | |
2024-11-19T02:58:15.412535+00:00 | 1,535,116,250,000 | 540c7f11077408eb5c770bfc072b6894aa981e40 | 2 | {
"blob_id": "540c7f11077408eb5c770bfc072b6894aa981e40",
"branch_name": "refs/heads/master",
"committer_date": 1535116250000,
"content_id": "59ebaac7c5327b9cafe1a4dc17ab9ac2e5986a5b",
"detected_licenses": [
"MIT"
],
"directory_id": "cda1b556f295abf075e74ca76c892879c119ee02",
"extension": "py",
"fi... | 2.359375 | stackv2 | from django.contrib.contenttypes.models import ContentType
from django.contrib.contenttypes.fields import GenericForeignKey
from django.db import models
from django.template.defaultfilters import slugify
from .helpers import get_youtube_data, get_vimeo_data, get_ustream_data
from .managers import VideoManager, Publish... | 108 | 32.06 | 87 | 14 | 758 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_f2a40ad97f7c7163_c778d566", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [vimeo.com/](1) may be at an arbitrary position in the ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [vimeo.com/](1) may be at an arbitrary position in the sanitized URL."
] | [
71
] | [
null
] | [
16
] | [
40
] | |
2024-11-19T03:10:11.672299+00:00 | 1,520,845,627,000 | 716193eb409c510a0f330fd040c676c5c0463667 | 2 | {
"blob_id": "716193eb409c510a0f330fd040c676c5c0463667",
"branch_name": "refs/heads/master",
"committer_date": 1520845627000,
"content_id": "91ef5e1380027f37fcc2f3889c690bfd7d1fcdae",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4d3fc5446d7027e30d16b443e1c5592759994351",
"extension": "py"... | 2.46875 | stackv2 | # -*- coding: utf-8 -*-
'''
Set Up:
::python 3(preferred) flavor of (miniconda) installed
Usage:
::mal_file -> a file name containing malicious strings: 'xss.txt'
OR
-> a list of values haing malicious strings : ["alert}>'><script>alert(<fin2000>)</script>", "<script>alert(<fin... | 117 | 35.65 | 149 | 16 | 834 | python | [{"finding_id": "codeql_py/request-without-cert-validation_bcfe7bb2862def7d_2157ad88", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
42
] | [
44
] | [
20
] | [
40
] | |
2024-11-19T03:10:13.920937+00:00 | 1,519,363,193,000 | d65dd7fd2c32f6fe485749419e52efb263eefb7e | 3 | {
"blob_id": "d65dd7fd2c32f6fe485749419e52efb263eefb7e",
"branch_name": "refs/heads/master",
"committer_date": 1519363193000,
"content_id": "5c2d16d34326443bf8c3a8d7a001e304b94cc787",
"detected_licenses": [
"MIT"
],
"directory_id": "a8a5c303d8f65ba4087eb41f5ecfad86ebfa39aa",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import sys
import json
from contextable import Contextable
from terms import Terms
from item import ItemCollection
from company import Company
from constants import DocumentTypes
import jinja2
from hashlib import sha1
import datetime
import subprocess
import os
path = '/'.... | 136 | 34.03 | 79 | 23 | 1,065 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f9e1385e08de09e5_66db2106", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
17
] | [
18
] | [
9
] | [
31
] | |
2024-11-19T03:10:31.418649+00:00 | 1,625,847,863,000 | 138c1f38a6c231fa875cdccded3a78b05b7b8ac0 | 3 | {
"blob_id": "138c1f38a6c231fa875cdccded3a78b05b7b8ac0",
"branch_name": "refs/heads/main",
"committer_date": 1625847863000,
"content_id": "8b71a2da41e41bced52cf4dec7ac34944ae18118",
"detected_licenses": [
"MIT"
],
"directory_id": "c745e2496778e2faf867ade7d920edefeef7dfe1",
"extension": "py",
"file... | 2.8125 | stackv2 | from Crypto.Cipher import DES
def decrypt(key: bytes, s: str):
d = DES.new(key, DES.MODE_ECB)
dd = d.decrypt(bytes.fromhex(s))
pad_num = dd[-1]
res_str = dd[:-pad_num].decode('utf-8')
return res_str
def encrypt(key: bytes, s: str):
d = DES.new(key, DES.MODE_ECB)
s = s.encode('utf-8')
... | 17 | 23.71 | 43 | 11 | 135 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_669821cc8d7f6f39_e13f79b7", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptograph... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used."
] | [
6,
17
] | [
null,
null
] | [
10,
22
] | [
37,
34
] | |
2024-11-19T03:22:49.186746+00:00 | 1,645,041,830,000 | a520c984c25cb12dc7c411493e34bbf180d3297a | 3 | {
"blob_id": "a520c984c25cb12dc7c411493e34bbf180d3297a",
"branch_name": "refs/heads/master",
"committer_date": 1645041939000,
"content_id": "d14f007bae38376a5dbb92ea87f48c0e8e94c9e8",
"detected_licenses": [
"MIT"
],
"directory_id": "af29c7ef057ef4b99e69c1353ba7b3670128df8a",
"extension": "py",
"fi... | 2.671875 | stackv2 | #!/usr/bin/env python3
# Copyright (c) 2022 Glynn Forrest
# MIT licensed, see LICENSE.txt for details.
# This script is an extract from the full vault-helper.py script I use
# with clients. Any other version I have given to you is still
# licensed under those original terms.
import argparse, os, sys, requests, json... | 440 | 32.18 | 167 | 26 | 2,942 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_87a4ca18ff7c32a5_090b59d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (secre... | [
178,
181,
186,
189
] | [
null,
null,
null,
null
] | [
23,
19,
19,
19
] | [
92,
93,
86,
142
] | |
2024-11-19T03:22:55.363736+00:00 | 1,635,450,248,000 | 5829679abacd13dd7064e0645598bf3db0a3e1f5 | 2 | {
"blob_id": "5829679abacd13dd7064e0645598bf3db0a3e1f5",
"branch_name": "refs/heads/main",
"committer_date": 1635450248000,
"content_id": "20d8aacd68af387ad1baae24300bd87d0cdcb95a",
"detected_licenses": [
"MIT"
],
"directory_id": "76b7e939ea4b441e01da31e9ed765a944077c5b7",
"extension": "py",
"file... | 2.390625 | stackv2 | from flask import Flask, render_template, request
import os
from google.cloud import datastore
import time
from datetime import datetime
from datetime import timezone
import logging
from opencensus.ext.azure.log_exporter import AzureLogHandler
from opencensus.ext.azure.trace_exporter import AzureExporter
from opencensu... | 108 | 31.26 | 151 | 15 | 848 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_06a461993d15f696_17bb3bdb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
71
] | [
null
] | [
11
] | [
20
] | |
2024-11-19T03:44:01.763681+00:00 | 1,631,129,538,000 | d901d9124e2af6d320b03d5687eb6a9805346ccd | 2 | {
"blob_id": "d901d9124e2af6d320b03d5687eb6a9805346ccd",
"branch_name": "refs/heads/main",
"committer_date": 1631129538000,
"content_id": "a9318a949af31a25c5334df8931ead57aaa80ff3",
"detected_licenses": [
"MIT"
],
"directory_id": "f5783ba18a96869d552517566b1a3d9f8de086da",
"extension": "py",
"file... | 2.40625 | stackv2 |
from flask import Blueprint, request, jsonify, render_template
import hotspot.constants as constants
import hotspot.utils as utils
import os.path
import subprocess
import pprint
hotspot_bp = Blueprint('hotspot', __name__)
@hotspot_bp.route('/api/hotspot', methods=['GET'])
def api_get():
rtn = {}
try:
data =... | 198 | 31.92 | 105 | 19 | 1,686 | python | [{"finding_id": "codeql_py/overly-permissive-file_9d4be8dfaae4d228_8733ac79", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable.",
"Overly permissive mask in chmod sets file to world readable."
] | [
90,
112
] | [
null,
null
] | [
3,
3
] | [
51,
52
] | |
2024-11-19T01:34:56.142451+00:00 | 1,642,056,716,000 | 88c38313690cb1e77ba79b55af2fd436d0062009 | 2 | {
"blob_id": "88c38313690cb1e77ba79b55af2fd436d0062009",
"branch_name": "refs/heads/master",
"committer_date": 1642056716000,
"content_id": "1e0b27d821f820a0a93fffe36019eb95f849d056",
"detected_licenses": [
"MIT"
],
"directory_id": "08f1bf41d57e70398576f4a4be6999734131751f",
"extension": "py",
"fi... | 2.359375 | stackv2 | import io
import logging
import os
import re
import requests
import subprocess
from sys import platform
import zipfile
from selenium.common.exceptions import NoSuchElementException
from selenium.webdriver import ChromeOptions
from seleniumrequests import Chrome
logger = logging.getLogger(__name__)
def get_webdriver... | 169 | 32.95 | 79 | 12 | 1,228 | python | [{"finding_id": "codeql_py/overly-permissive-file_5df9ca266bc5e778_0fb2cf06", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
168
] | [
null
] | [
5
] | [
43
] | |
2024-11-19T01:35:01.820695+00:00 | 1,510,232,484,000 | 4e811a3f1abbca92dcf2faf254e14983c276d10f | 3 | {
"blob_id": "4e811a3f1abbca92dcf2faf254e14983c276d10f",
"branch_name": "refs/heads/master",
"committer_date": 1510244063000,
"content_id": "5dd77fd11066970e951c92e8810569dde59f1e43",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6a6c2b922c3ff3d35622c8b9638426fb162b79ed",
"extension": "py"... | 2.515625 | stackv2 | import json
import logging
import os
import shutil
import tarfile
import urllib
import pnc_cli.utils as utils
from argh import arg
from pnc_cli import productmilestones
from pnc_cli import buildrecords
target="target/"
tempdir="target/tmp/"
@arg('-m', '--milestone_id', help='Product milestone id', type=int)
@arg('-... | 73 | 33.47 | 138 | 15 | 553 | python | [{"finding_id": "codeql_py/tarslip_1c419d93ab8a4466_6d55d661", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
55
] | [
null
] | [
5
] | [
8
] | |
2024-11-19T01:35:03.722767+00:00 | 1,689,662,804,000 | 795e4e3e13a04d3ea8569391f47c096d1d23712e | 3 | {
"blob_id": "795e4e3e13a04d3ea8569391f47c096d1d23712e",
"branch_name": "refs/heads/master",
"committer_date": 1689662804000,
"content_id": "40f19f0df086f0bb58a7938733abe3a67856ee0b",
"detected_licenses": [
"MIT"
],
"directory_id": "62d3911c75715a54aa87becea8715c2173a33892",
"extension": "py",
"fi... | 2.53125 | stackv2 | """
MIT License
Copyright (c) 2019-2022 Jake Sichley
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publ... | 322 | 30.18 | 118 | 15 | 2,227 | python | [{"finding_id": "codeql_py/overly-large-range_ea873372d8ca0119_e937b3ef", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
178,
179
] | [
null,
null
] | [
45,
55
] | [
48,
58
] | |
2024-11-19T01:35:04.937624+00:00 | 1,585,284,727,000 | d5fcb619a51f5734176b3b6b98c9e3ab94567bfe | 3 | {
"blob_id": "d5fcb619a51f5734176b3b6b98c9e3ab94567bfe",
"branch_name": "refs/heads/master",
"committer_date": 1585284727000,
"content_id": "3ff22237597774d9e4af9adb9737c507ffa6dfab",
"detected_licenses": [
"MIT"
],
"directory_id": "78c98860d0588c11d0a2fe0ecc183f25b654323c",
"extension": "py",
"fi... | 2.640625 | stackv2 | import os
from flask import Flask
from flask import jsonify
from flask import request
from flask import render_template
from datetime import datetime, timedelta
import psycopg2
import psycopg2.extras
app = Flask(__name__)
def create_app():
"""
Create a Flask application using the app factory pattern.
:par... | 324 | 38.12 | 137 | 18 | 2,776 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_027ce9dd982dcf37_3e53f568", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 8 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This SQL query depends on a [u... | [
123,
139,
249,
254,
146,
161,
175,
255
] | [
null,
null,
null,
null,
155,
170,
184,
264
] | [
31,
15,
15,
15,
21,
21,
21,
21
] | [
41,
22,
22,
24,
68,
68,
68,
57
] | |
2024-11-19T01:35:05.108611+00:00 | 1,623,872,982,000 | ebcb5db4a2a95e70384d0e85463dcf0989651062 | 3 | {
"blob_id": "ebcb5db4a2a95e70384d0e85463dcf0989651062",
"branch_name": "refs/heads/main",
"committer_date": 1623872982000,
"content_id": "c4cc0b35bb3201078a7f8e98d2bf34e98ecf3668",
"detected_licenses": [
"MIT"
],
"directory_id": "2e52171ccdda444bcf24e23562257b1174650b50",
"extension": "py",
"file... | 2.9375 | stackv2 | """Module for calculator service."""
import re
from option import Result
from option.result import Err
from py_expression_eval import Parser
from calculator_bot.model.calculator import Calculator
from calculator_bot.repository import CalculatorRepository
VALID_EXPRESSION = re.compile('[0-9./=+-c*]')
class Calculat... | 51 | 34.51 | 76 | 17 | 370 | python | [{"finding_id": "codeql_py/overly-large-range_ce57172284a62412_f5d1fcf4", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-c\\]."
] | [
11
] | [
null
] | [
39
] | [
42
] | |
2024-11-19T01:35:06.233863+00:00 | 1,622,192,480,000 | 64f08798cd422d50f2b049825fa4f823f12e05f5 | 2 | {
"blob_id": "64f08798cd422d50f2b049825fa4f823f12e05f5",
"branch_name": "refs/heads/master",
"committer_date": 1622192480000,
"content_id": "bcf572d79dca464b8c0b54b008e70caa33f75425",
"detected_licenses": [
"MIT"
],
"directory_id": "c3e4a90f1994564a39a2ff3289b160d78129c2f8",
"extension": "py",
"fi... | 2.390625 | stackv2 | import requests, hashlib
class Account:
def __init__(
self,
agentId,
agentPlatform,
apiKey,
transactionStatusUrl = 'http://35.204.26.22:8086/api/account/transaction/status/',
balanceUrl = 'http://35.204.26.22:8086/api/account/agent/balance/v2/',
changeKeyUrl ... | 47 | 31.7 | 90 | 19 | 369 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_5219a827c0569fe2_d5dd0470", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
24
] | [
null
] | [
28
] | [
75
] | |
2024-11-19T01:35:07.137624+00:00 | 1,542,780,243,000 | 9869e03a4f172d79836fca9cee96ffe0c64d6d44 | 3 | {
"blob_id": "9869e03a4f172d79836fca9cee96ffe0c64d6d44",
"branch_name": "refs/heads/master",
"committer_date": 1542780243000,
"content_id": "786e21119fbdf8ff2a8080415481af1ea326ccb9",
"detected_licenses": [
"MIT"
],
"directory_id": "440ac3e09340b560a56648e41a028a93fa91b442",
"extension": "py",
"fi... | 2.625 | stackv2 | import requests
from bs4 import BeautifulSoup as Soup
def get_links_to_offers(url: str) -> list:
links = []
r = requests.get(url)
html = Soup(r.text, 'html.parser')
divs = html.findAll("div", {"class": "col-xxs-12 col-xs-6 col-sm-6 col-md-6 col-lg-6 no-gutter mb10"})
for i in divs:
link = ... | 34 | 28.5 | 106 | 13 | 281 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_5ccb654313f8d437_b9ce9d39", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.naturisimo.com/](1) may be at an arbitrary positio... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [www.naturisimo.com/](1) may be at an arbitrary position in the sanitized URL."
] | [
25
] | [
null
] | [
30
] | [
59
] | |
2024-11-19T01:55:45.217178+00:00 | 1,543,314,370,000 | 428cfa4a6d8efcd5b902c87dec46f703d0f95363 | 3 | {
"blob_id": "428cfa4a6d8efcd5b902c87dec46f703d0f95363",
"branch_name": "refs/heads/master",
"committer_date": 1543314370000,
"content_id": "a231ffe38bf025aeefb546dd7e9fc0e3584e9107",
"detected_licenses": [
"MIT"
],
"directory_id": "cc98e04de0030bfffea2dde2c38ffc6ffee5b37d",
"extension": "py",
"fi... | 2.8125 | stackv2 | # -*- coding: utf-8 -*-
import re
import requests
from bs4 import BeautifulSoup
from bs4.element import Tag
from django.utils.translation import get_language
import six
if six.PY3:
unicode = str
class BaseDataProvider(object):
""" Basic data provider
with base methods, helpers and universal parsers
"... | 193 | 30.37 | 78 | 22 | 1,496 | python | [{"finding_id": "codeql_py/overly-large-range_c441a0d1688d9ae2_7e59f6d6", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in the same character class, and is equivalent to \\[,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
99
] | [
null
] | [
58
] | [
61
] | |
2024-11-19T01:55:51.870288+00:00 | 1,572,909,872,000 | 970166fe5ec930c7e3168646bf8ac66bb5b07e40 | 3 | {
"blob_id": "970166fe5ec930c7e3168646bf8ac66bb5b07e40",
"branch_name": "refs/heads/master",
"committer_date": 1572909872000,
"content_id": "424a42b0e747ad0faeca8ba4f53a476b7ed8df56",
"detected_licenses": [
"MIT"
],
"directory_id": "e034b5f75ee2b1526aec07e874cd9e15541d6f94",
"extension": "py",
"fi... | 2.515625 | stackv2 | import tensorflow as tf
import numpy as np
import os
import pandas as pd
import re, string
import emoji
from nltk.stem.snowball import SnowballStemmer
import nltk
from nltk.corpus import stopwords
nltk.download('stopwords')
import nltk
from nltk.corpus import stopwords
nltk.download('stopwords')
from keras.preprocessin... | 287 | 27.11 | 113 | 20 | 2,358 | python | [{"finding_id": "codeql_py/overly-large-range_0062f39a54f77c83_1d621937", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class."
] | [
209,
209,
209
] | [
null,
null,
null
] | [
34,
37,
40
] | [
38,
41,
44
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.