added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T19:18:47.294486+00:00 | 1,670,496,785,000 | 7de464121acb4bc289939061a010d28e4eb018bd | 2 | {
"blob_id": "7de464121acb4bc289939061a010d28e4eb018bd",
"branch_name": "refs/heads/master",
"committer_date": 1670496785000,
"content_id": "e1092d37c72fd0baab3f4418c17d3a8871bd1728",
"detected_licenses": [
"MIT"
],
"directory_id": "41c2cf68fa14ba91651620d545a4440b6712fe17",
"extension": "py",
"fi... | 2.375 | stackv2 | import os
import sys
import jinja2
from rdflib import ConjunctiveGraph, URIRef
from rdflib.namespace import DCTERMS, RDFS, FOAF
from rdflib.namespace import Namespace
FM = Namespace('https://purl.org/fair-metrics/terms/')
fairGraph = ConjunctiveGraph()
fairGraph.parse('http://purl.org/fair-ontology#', format='trig')... | 169 | 34.04 | 119 | 16 | 1,412 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8739c0208cae2e61_a846e7ee", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
112
] | [
118
] | [
23
] | [
6
] | |
2024-11-18T19:19:14.235878+00:00 | 1,553,607,538,000 | fd192b7d231d15ff7aeb2478e576e4a82194e901 | 3 | {
"blob_id": "fd192b7d231d15ff7aeb2478e576e4a82194e901",
"branch_name": "refs/heads/master",
"committer_date": 1553607538000,
"content_id": "582728c58751220193b382189cf92434c89278d8",
"detected_licenses": [
"MIT"
],
"directory_id": "bb383b48a5d5530340fe303796da93d2f2940eb0",
"extension": "py",
"fi... | 2.859375 | stackv2 | import requests
import json
import sys
import time
try:
from urllib import quote # Python 2.X
except ImportError:
from urllib.parse import quote # Python 3+
from random import choice
class Connect():
authorization = "Basic token"
def __init__(self, node_ip, base_url):
self.host = node_ip
... | 118 | 35.24 | 110 | 18 | 791 | python | [{"finding_id": "codeql_py/request-without-cert-validation_ebfc0ae8a1c59226_fd032df6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
49,
55,
65,
69
] | [
50,
59,
null,
70
] | [
31,
31,
31,
31
] | [
63,
37,
99,
63
] | |
2024-11-18T19:29:48.750339+00:00 | 1,643,398,436,000 | 5545351656c72df23f64ef9b230f50607adc4928 | 2 | {
"blob_id": "5545351656c72df23f64ef9b230f50607adc4928",
"branch_name": "refs/heads/master",
"committer_date": 1643398468000,
"content_id": "b807a8937b119385363f6722dd141447abdbf90b",
"detected_licenses": [
"MIT"
],
"directory_id": "adf0086a70cd101a22a99e45061cea7d1925e934",
"extension": "py",
"fi... | 2.453125 | stackv2 | from aiohttp import web
from pathlib import Path
from glob import glob
from collections import defaultdict
import re
async def index(request):
index_page = """
<!DOCTYPE html>
<html>
<head>
<title>Vuejspython</title>
<link rel=stylesheet href="/static/picnic.min.css">
<style>
body { margin: 2em; }
</style>
</head>... | 65 | 29.88 | 98 | 17 | 529 | python | [{"finding_id": "codeql_py/polynomial-redos_e3a120c2c65b24d2_c366df37", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma... | 4 | true | [
"CWE-1333",
"CWE-1333",
"CWE-022",
"CWE-022"
] | [
"py/polynomial-redos",
"py/polynomial-redos",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'.",
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'.",
"This path depends on a [user-provided value](1).",
... | [
46,
49,
34,
47
] | [
null,
null,
null,
null
] | [
56,
32,
15,
15
] | [
68,
33,
16,
16
] | |
2024-11-18T19:44:22.679481+00:00 | 1,602,972,824,000 | 80b2d9e10a48df86f8b26309fc939e5529ef7bf4 | 3 | {
"blob_id": "80b2d9e10a48df86f8b26309fc939e5529ef7bf4",
"branch_name": "refs/heads/master",
"committer_date": 1602972824000,
"content_id": "ecba9d3aa671ff373d44711bb14635fb28620981",
"detected_licenses": [
"Unlicense"
],
"directory_id": "82a80d9616e44b8b0c98548d873e0090ba16de51",
"extension": "py",... | 2.671875 | stackv2 | ###
#
#
#
# Program Description :
# Created By : Benjamin Kleynhans
# Creation Date : August 19, 2020
# Authors : Benjamin Kleynhans
#
# Last Modified By : Benjamin Kleynhans
# Last Modified Date : August 19, 2020
# Filename : filemanager.py
#
###
# Imports
import os, subproc... | 198 | 30.95 | 99 | 20 | 1,228 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_75dce00d5b0e57ac_9f0edf75", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
58
] | [
null
] | [
9
] | [
78
] | |
2024-11-18T19:58:20.879173+00:00 | 1,416,762,137,000 | 83317034a660ebdae4fa70785a42b962d74e0906 | 3 | {
"blob_id": "83317034a660ebdae4fa70785a42b962d74e0906",
"branch_name": "refs/heads/master",
"committer_date": 1416762137000,
"content_id": "b33beac147d71eefe2ac5950a72d87e15180d65a",
"detected_licenses": [
"MIT"
],
"directory_id": "6cd686c10ad9d12ab518987ae91c9457976a69bf",
"extension": "py",
"fi... | 2.71875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
#Polina Morozova 23.11.2014
import os
import requests
from http.server import HTTPServer, SimpleHTTPRequestHandler, BaseHTTPRequestHandler
def get_weather_html(ip):
r = requests.get('http://api.hostip.info/get_json.php?ip=%s' % ip)
loc = r.json()
r = requests.get('htt... | 32 | 27.94 | 120 | 13 | 268 | python | [{"finding_id": "codeql_py/partial-ssrf_353429a8f34f69ba_7331a8ce", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
10,
12
] | [
null,
null
] | [
6,
6
] | [
68,
121
] | |
2024-11-18T19:58:21.350266+00:00 | 1,376,288,073,000 | 021b7b72de03fd7041a7966f750c9ae7a4d32c40 | 3 | {
"blob_id": "021b7b72de03fd7041a7966f750c9ae7a4d32c40",
"branch_name": "refs/heads/master",
"committer_date": 1376288073000,
"content_id": "56e01ff4129a086c78e1b04578b5308df98e3291",
"detected_licenses": [
"MIT"
],
"directory_id": "80ccb8ec377284dfc0dda5d0c0af9e5b6ea17140",
"extension": "py",
"fi... | 2.53125 | stackv2 | """
Released under the MIT License
Copyright (c) 2013 Hashem Al-Dujaili
"""
import sys
import re
sys.path.insert(0, 'libs')
import os
import webapp2
import jinja2
from google.appengine.ext import ndb
JINJA_ENVIRONMENT = jinja2.Environment(
loader=jinja2.FileSystemLoader(os.path.dirname(__file__)),
extensions=[... | 125 | 30.32 | 77 | 19 | 814 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ea47c8dd63303191_6fc3e518", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
15
] | [
21
] | [
42
] | |
2024-11-18T20:10:21.440364+00:00 | 1,528,981,850,000 | 5c8a3dcabf99e033fc8320ffd7e1faf228f1b51a | 2 | {
"blob_id": "5c8a3dcabf99e033fc8320ffd7e1faf228f1b51a",
"branch_name": "refs/heads/master",
"committer_date": 1528981850000,
"content_id": "8e3cac2a67926555b019e9b2a3a712261a11901f",
"detected_licenses": [
"MIT"
],
"directory_id": "19865fd153d76532943180f6f80546fb3c6534a5",
"extension": "py",
"fi... | 2.390625 | stackv2 | from mtgsdk import Card
from flask import Flask
from flask import render_template
from flask import jsonify
from flask import request
import os
import json
app = Flask(__name__)
@app.route('/')
def index():
return render_template('base.html')
@app.route('/search', methods=['POST'])
def search():
sets = '... | 46 | 22.15 | 72 | 16 | 257 | python | [{"finding_id": "codeql_py/path-injection_7b36649b6c16bb85_0340a109", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 3 | true | [
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
28,
30,
39
] | [
null,
null,
null
] | [
27,
19,
15
] | [
36,
28,
24
] | |
2024-11-18T20:10:23.025430+00:00 | 1,609,939,659,000 | 6cb1a362fb2d0fc2b2d7aaf5f30eb783c64817ed | 2 | {
"blob_id": "6cb1a362fb2d0fc2b2d7aaf5f30eb783c64817ed",
"branch_name": "refs/heads/master",
"committer_date": 1609939659000,
"content_id": "5515d722d44a032d385bf78873fbbcc04fcddc9d",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "e9eb6536e5e5482ec69a6345b8eb643b385f9a81",
"extension": "py",
... | 2.5 | stackv2 | import flask
import json
import nlp
import logging
from time import gmtime, strftime
app = flask.Flask(__name__)
logging.basicConfig(
level=logging.DEBUG,
filename='log.log',
format='%(levelname)s:%(name)s:%(asctime)s:%(message)s')
@app.route('/', methods=['GET', 'POST'])
def home():
gen = flask.reque... | 54 | 31.17 | 154 | 22 | 408 | python | [{"finding_id": "codeql_py/log-injection_d72ffb256a542ef2_a0d8bb65", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)... | 4 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
25,
41,
44,
47
] | [
null,
null,
null,
null
] | [
18,
54,
54,
50
] | [
20,
62,
62,
58
] | |
2024-11-18T20:10:24.682108+00:00 | 1,454,118,906,000 | f473357bf5cb16a11bd4375de27df34eeac77db0 | 3 | {
"blob_id": "f473357bf5cb16a11bd4375de27df34eeac77db0",
"branch_name": "refs/heads/master",
"committer_date": 1454118906000,
"content_id": "f101aced0f3df3eb138d1d154dcb06080060161d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bb83a87e184bf33f09778f485032e0b5573741f8",
"extension": "py"... | 2.984375 | stackv2 | """Manages problems within the app, including their creation, deletion,
updating, and retreival.
Functions:
url_for_problem -- returns the route for the pdf description of a problem
given an argument that has a 'pid' field.
get_problem -- returns a JSON representation of an individual problem,
... | 345 | 34.4 | 85 | 17 | 2,541 | python | [{"finding_id": "codeql_py/path-injection_1bdbe76c995c5dcc_3d84dec6", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
195,
333
] | [
null,
null
] | [
19,
13
] | [
69,
80
] | |
2024-11-18T20:10:31.158679+00:00 | 1,570,462,906,000 | 3d14c1b9097743c862ff45c2388dc05b96dbd029 | 3 | {
"blob_id": "3d14c1b9097743c862ff45c2388dc05b96dbd029",
"branch_name": "refs/heads/master",
"committer_date": 1570462906000,
"content_id": "8686b5298660e5e57385d6e45d10550587537132",
"detected_licenses": [
"MIT"
],
"directory_id": "7d8e3dc8392d4a77913a4b48152f3cbdce6765d6",
"extension": "py",
"fi... | 2.875 | stackv2 | from urllib.parse import urljoin, urlparse
import logging
import sys
import requests
from requests.packages.urllib3.exceptions import InsecureRequestWarning
from bs4 import BeautifulSoup
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
# TODO: Detect redirect statuses
class Vamp(object):
def ... | 181 | 28.61 | 107 | 16 | 1,067 | python | [{"finding_id": "codeql_py/request-without-cert-validation_4234598880a25672_b9698892", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
57
] | [
null
] | [
24
] | [
56
] | |
2024-11-18T20:23:31.318199+00:00 | 1,640,761,054,000 | 18f1a8ed4139a6aa78726aa953553a38ab93c345 | 3 | {
"blob_id": "18f1a8ed4139a6aa78726aa953553a38ab93c345",
"branch_name": "refs/heads/master",
"committer_date": 1640761054000,
"content_id": "8f4806c270bdf959ba685058be5226d45919621b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fcd4373574558216d6b7f0af9859415b426d6978",
"extension": "py"... | 2.515625 | stackv2 | # Copyright 2019 Matthew Hayes
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, s... | 367 | 43.58 | 150 | 23 | 3,595 | python | [{"finding_id": "codeql_py/redos_57b38fbdd4428880_a666987f", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '{{{{' and containing many repetit... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '{{{{' and containing many repetitions of ':'."
] | [
111
] | [
null
] | [
26
] | [
28
] | |
2024-11-18T20:49:37.776706+00:00 | 1,502,914,565,000 | f3a669e1275c70162db542aa3055bc37b44b771e | 3 | {
"blob_id": "f3a669e1275c70162db542aa3055bc37b44b771e",
"branch_name": "refs/heads/master",
"committer_date": 1502914565000,
"content_id": "28ec2d89ad8ce29a9ec68a6cf207b6114836df8c",
"detected_licenses": [
"MIT"
],
"directory_id": "673ab3b6390e7b6eaff827d74567357a8727a442",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/env python
import argparse
import json
import jinja2
import webbrowser
import graph
if __name__ == '__main__':
parser = argparse.ArgumentParser()
parser.add_argument('groups', help='json file describing seed groups')
args = parser.parse_args()
# load group from file
with open(args.gro... | 37 | 28.16 | 100 | 16 | 267 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b651819623cfa659_8afafbab", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
21
] | [
null
] | [
20
] | [
45
] | |
2024-11-18T20:49:58.123465+00:00 | 1,416,748,738,000 | 98e870850b80b7ebeb00a9563bc72d8dd5e4a078 | 2 | {
"blob_id": "98e870850b80b7ebeb00a9563bc72d8dd5e4a078",
"branch_name": "refs/heads/master",
"committer_date": 1416748846000,
"content_id": "92984f4ff556c6f0b6bd162d4cff637e578d70a8",
"detected_licenses": [
"MIT"
],
"directory_id": "1768d0f3f6ef46d07e5188f6821ef7c4fcfe8112",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python
import os
def dump_date(date):
return date.strftime('%Y-%m-%dT%H:%M:%S.%fZ')
class DumperNotFoundError(RuntimeError):
pass
class GPXDumper:
TAB = ' '
def dump(self, activity):
buffer = []
buffer.append('<?xml version="1.0" encoding="UTF-8"?>\n')
buffe... | 212 | 35.41 | 145 | 15 | 1,972 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0bd7868a54284e78_6a149c30", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive d... | [
23,
105
] | [
null,
null
] | [
35,
35
] | [
54,
54
] | |
2024-11-18T20:50:08.659733+00:00 | 1,563,223,730,000 | fd32d6b4b54fc572d981b35e165d87204b717775 | 2 | {
"blob_id": "fd32d6b4b54fc572d981b35e165d87204b717775",
"branch_name": "refs/heads/master",
"committer_date": 1563223730000,
"content_id": "c330f8f06c0f4902da537511cf30224fcb9ce6e8",
"detected_licenses": [
"MIT"
],
"directory_id": "d3410b6e43de10f8856bd8d64f89a14efb667543",
"extension": "py",
"fi... | 2.359375 | stackv2 | """A util script used on daryl's laptop to switch 'iemdb' /etc/hosts entry
129.186.185.33 iemdb iemdb2
#127.0.0.1 iemdb iemdb2
"""
from __future__ import print_function
import sys
import tempfile
import os
def main():
"""Go Main Go"""
if len(sys.argv) == 1:
print('Usage: python set_iemdb_etc_hosts.p... | 49 | 31.39 | 74 | 14 | 569 | python | [{"finding_id": "codeql_py/overly-permissive-file_0892e0f3be888405_b42bfff5", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
45
] | [
null
] | [
5
] | [
34
] | |
2024-11-18T20:50:44.703204+00:00 | 1,474,392,445,000 | 9ea348dbbe4f322e654b3a9fef34b59e926884dc | 2 | {
"blob_id": "9ea348dbbe4f322e654b3a9fef34b59e926884dc",
"branch_name": "refs/heads/master",
"committer_date": 1474392445000,
"content_id": "fc576e6def224334a477d579812e44f400cd3059",
"detected_licenses": [
"ISC"
],
"directory_id": "285415071f1bb26c191ce105272a97070116e20c",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/env python
# Copyright (c) 2014, Palo Alto Networks <techbizdev@paloaltonetworks.com>
#
# Permission to use, copy, modify, and/or distribute this software for any
# purpose with or without fee is hereby granted, provided that the above
# copyright notice and this permission notice appear in all copies.
#
# ... | 193 | 29.59 | 172 | 13 | 1,315 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2efd08237841da86_adfb1472", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
109
] | [
null
] | [
5
] | [
65
] | |
2024-11-18T21:14:07.033705+00:00 | 1,634,234,705,000 | d764bd998c9868ffac1e0f8da5558adf4173aead | 2 | {
"blob_id": "d764bd998c9868ffac1e0f8da5558adf4173aead",
"branch_name": "refs/heads/main",
"committer_date": 1634234705000,
"content_id": "a69429834f36194d3db2eded57cf0bc89f8faede",
"detected_licenses": [
"MIT"
],
"directory_id": "830e45a8b3dcd6a3e1d21ade24730467a789f03f",
"extension": "py",
"file... | 2.484375 | stackv2 | import requests
from datetime import datetime, time
def toTextFile(file_name, type):
textfile = open(file_name, "w", encoding="utf8")
for x in range(len(type)):
textfile.write(str(type[x]) + "\n")
textfile.close()
URL = "https://api.acleddata.com/acled/read"
PARAMS = {
'key': "*AdNpEvCqZWct!Q... | 109 | 26.26 | 78 | 13 | 786 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_fe5d69c2c4d95603_e8638b16", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
7
] | [
null
] | [
24
] | [
43
] | |
2024-11-18T21:14:09.609355+00:00 | 1,631,482,603,000 | 9a5c1659515f9dbc92acd46b4f21f48fdcdc4087 | 3 | {
"blob_id": "9a5c1659515f9dbc92acd46b4f21f48fdcdc4087",
"branch_name": "refs/heads/main",
"committer_date": 1631482603000,
"content_id": "57b5d1767484533501af42bef140145398e5e874",
"detected_licenses": [
"MIT"
],
"directory_id": "91dbcaca6b047dd56cde4ddce1323aeb62a2182e",
"extension": "py",
"file... | 2.875 | stackv2 | from models.Jogo import Jogo
from tinydb import Query
from extensions.database import jogos as table_jogos
from flask import jsonify
from datetime import datetime
def cadastra_jogo(jogo: dict):
novo_jogo = Jogo(**jogo)
try:
table_jogos.insert(dict(novo_jogo))
return jsonify({"status": True, "me... | 51 | 39.51 | 120 | 19 | 579 | python | [{"finding_id": "codeql_py/stack-trace-exposure_fa79abb4db2bb2b3_fc4ce8c5", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 5 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
13,
27,
31,
43,
51
] | [
null,
null,
null,
null,
null
] | [
24,
32,
24,
24,
24
] | [
95,
115,
105,
105,
108
] | |
2024-11-18T21:14:15.470162+00:00 | 1,629,937,078,000 | 05565858e071ce522d59fcec476b04ac5ba9a27d | 4 | {
"blob_id": "05565858e071ce522d59fcec476b04ac5ba9a27d",
"branch_name": "refs/heads/main",
"committer_date": 1629937078000,
"content_id": "ace124197720801e0e3876e14924a3e54f3c4479",
"detected_licenses": [
"MIT"
],
"directory_id": "b1b5fd9142d7f933324b490325705220eac2de9e",
"extension": "py",
"file... | 3.71875 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Tue Jul 6 12:33:43 2021
@author: user15
"""
import string
from random import choice
pass_size = int(input("暗証番号の長さを記入して下さい \n -->"))
# ask user if wants uppercase letters and symbols
use_symbols = input("暗証番号には記号も使いますか (Y か N): \n -->")
def containsLetterAndNumber(input):
... | 53 | 26.58 | 80 | 12 | 429 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_9b28ecb8aaef2a18_c1d559ed", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
23,
28
] | [
null,
null
] | [
21,
15
] | [
56,
43
] | |
2024-11-18T21:14:18.293678+00:00 | 1,607,903,391,000 | a6acbdf76cf3245573d367650c48c6a1ef357336 | 3 | {
"blob_id": "a6acbdf76cf3245573d367650c48c6a1ef357336",
"branch_name": "refs/heads/main",
"committer_date": 1607903391000,
"content_id": "1c9b4a34f6e1ef07d14c8631f4187ad771f46f6c",
"detected_licenses": [
"MIT"
],
"directory_id": "a69fd0898f5da62cd14f5a88725e9e6f838a1a1c",
"extension": "py",
"file... | 2.78125 | stackv2 | # Import the class `Flask` from the `flask` module
from flask import Flask, render_template, request, make_response
from Resultsfromkeywordsearch import *
from keywordsearchscript import *
from twitter import *
# Instantiate a new web application called `app`, with `__name__` representing the current file
app=Flask(__... | 139 | 28.11 | 118 | 13 | 911 | python | [{"finding_id": "codeql_py/insecure-cookie_085c4e98b7a91fc7_9415e137", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"... | 5 | true | [
"CWE-614",
"CWE-020",
"CWE-020",
"CWE-215",
"CWE-1004"
] | [
"py/insecure-cookie",
"py/cookie-injection",
"py/cookie-injection",
"py/flask-debug",
"py/client-exposed-cookie"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cookie is added to response without the 'secure' flag being set.",
"Cookie is constructed from a [user-supplied input](1).",
"Cookie is constructed from a [user-supplied input](1).",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Sens... | [
30,
29,
30,
136,
30
] | [
null,
null,
null,
null,
null
] | [
5,
31,
31,
5,
5
] | [
43,
40,
42,
24,
43
] | |
2024-11-18T21:14:19.226281+00:00 | 1,559,219,987,000 | 314e66d22b8f92a4ac4a0ea6709bdf1c0f82c164 | 3 | {
"blob_id": "314e66d22b8f92a4ac4a0ea6709bdf1c0f82c164",
"branch_name": "refs/heads/master",
"committer_date": 1559219987000,
"content_id": "d1aa0fff4aacba059816c7869f140b93901071e5",
"detected_licenses": [
"MIT"
],
"directory_id": "4851efd6b18ffed7a31809fe0a34f0245ae8d332",
"extension": "py",
"fi... | 2.859375 | stackv2 |
import requests
API_KEY = '39d6b0d3'
class Movies:
def __init__(self, ids=['tt0111161'], img_dir='.', movies=None):
if movies is not None:
self.movies = movies
else:
self.movies = dict()
for m in ids:
self.movies[m] = dict()
# download information for the movie
... | 56 | 26.05 | 66 | 23 | 378 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_dafe500e91ae740e_3188873d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
30
] | [
null
] | [
25
] | [
30
] | |
2024-11-18T21:14:25.134508+00:00 | 1,687,191,311,000 | 6a5e3d3a2e2fc8c43bafe77db7d845443c944ed4 | 3 | {
"blob_id": "6a5e3d3a2e2fc8c43bafe77db7d845443c944ed4",
"branch_name": "refs/heads/master",
"committer_date": 1687191311000,
"content_id": "29e5d5b6a10bcbc990dc76087578739587476e66",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ea97980b8c9dbbf987b2e470cea11cedde8efb9f",
"extension": "py"... | 3.375 | stackv2 | """Submodule for `MetadataConfig` configurable."""
import re
from ..configurable import configurable, Configurable, opt_checked, ParseError, Unset
@configurable(name='Metadata')
class MetadataConfig(Configurable):
"""This configuration structure is used to identify and document objects
within `vhdmmio`."""
... | 110 | 49.67 | 94 | 16 | 1,240 | python | [{"finding_id": "codeql_py/overly-large-range_4262b1096827a6f5_3930e93d", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class.", "remediation": "", "loc... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class."
] | [
58
] | [
null
] | [
62
] | [
65
] | |
2024-11-18T21:14:43.831749+00:00 | 1,487,360,126,000 | 40fdf3eff6b85643c3c0843d4ec7a06352e1c2e4 | 2 | {
"blob_id": "40fdf3eff6b85643c3c0843d4ec7a06352e1c2e4",
"branch_name": "refs/heads/master",
"committer_date": 1487360126000,
"content_id": "a4f125d694bd1988431d14fd0a543cd3ecd5ba8d",
"detected_licenses": [
"MIT"
],
"directory_id": "5b583a6e9279519cb72319213b7a55f3b8a074f2",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/python
import os
import requests
from flask import Flask
from flask import request
import json
import config
import hmac
import hashlib
from payload import Issue, Comment, Push, Pipeline
app = Flask(__name__)
SECRET = hmac.new(config.SECRET, digestmod=hashlib.sha1) if config.SECRET else None
@app.route(... | 98 | 29.61 | 124 | 16 | 716 | python | [{"finding_id": "codeql_py/flask-debug_603bc4fba1ddb485_dbebe7e6", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-295"
] | [
"py/flask-debug",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This request may run without certificate validation because [it is disabled](1)."
] | [
94,
78
] | [
98,
null
] | [
5,
9
] | [
6,
81
] | |
2024-11-18T20:48:22.415881+00:00 | 1,529,353,982,000 | b5ce08ca0f6baf2f4fa543a29808ce491c306f80 | 2 | {
"blob_id": "b5ce08ca0f6baf2f4fa543a29808ce491c306f80",
"branch_name": "refs/heads/master",
"committer_date": 1529353982000,
"content_id": "b613610f1c408a6f1ab62f739a2c7c54fa4c8f9e",
"detected_licenses": [
"MIT"
],
"directory_id": "ca071d055e63851f848ce7051f2b64d60a3d1dd1",
"extension": "py",
"fi... | 2.390625 | stackv2 | # -*- coding: utf-8 -*-
"""
Popbak makes it easy to back up a POP accessible email in box
The email parsing portion of the code is based on code that I got from Larry Bates here:
http://mail.python.org/pipermail/python-list/2004-June/265634.html
author -- Jay Marcyes <jay@marcyes.com>
todo -- this script is like 6 y... | 513 | 29.52 | 111 | 20 | 3,526 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_96d4789976b42d69_2d16b714", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
70
] | [
null
] | [
24
] | [
48
] | |
2024-11-18T21:11:30.841371+00:00 | 1,581,933,163,000 | 5f75095452d07c4595968c4a67670d0712779a98 | 3 | {
"blob_id": "5f75095452d07c4595968c4a67670d0712779a98",
"branch_name": "refs/heads/master",
"committer_date": 1581933163000,
"content_id": "182682934c5a42b41998506a921beb77712311c9",
"detected_licenses": [
"MIT"
],
"directory_id": "fbfe4eaac5fe7b10ae69b0e9d6c2dd8dfa2046e7",
"extension": "py",
"fi... | 2.59375 | stackv2 | """login
初始化一个已登录的 session:
```python
s = Session("username", "password")
```
然后用此 Session 请求 jxgl.cqu.edu.cn 下的其他路径
"""
import re
from hashlib import md5 as rawmd5
from time import sleep
import requests as r
from bs4 import BeautifulSoup
def md5(string: str) -> str:
return rawmd5(string.encode()).hexdigest()... | 95 | 33.48 | 144 | 17 | 954 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_84066aa3e5222790_fb49bbf4", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
20
] | [
null
] | [
19
] | [
34
] | |
2024-11-18T21:11:37.969874+00:00 | 1,626,381,261,000 | 3137ab4b52aa2dc96cf4d0723139fadcd3407618 | 3 | {
"blob_id": "3137ab4b52aa2dc96cf4d0723139fadcd3407618",
"branch_name": "refs/heads/master",
"committer_date": 1626381261000,
"content_id": "516aaa56b9a4c6d5e7485040e2ecf3ef93854684",
"detected_licenses": [
"MIT"
],
"directory_id": "aee26471570546255a0dea94086654b2327d2173",
"extension": "py",
"fi... | 2.609375 | stackv2 | from flask import Blueprint, request, abort
from modules import printer
from .parsers import parse_invoice, parse_credit_note
from json import dumps, loads
from .auth import requires_auth
api_blueprint = Blueprint('api', __name__)
@api_blueprint.route('/print/invoice', methods=['POST'])
@requires_auth
def print_invo... | 35 | 30.03 | 70 | 12 | 239 | python | [{"finding_id": "codeql_py/reflective-xss_7e42f3c126da22e9_b17c58af", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
35
] | [
null
] | [
12
] | [
66
] | |
2024-11-18T21:25:46.274122+00:00 | 1,573,621,165,000 | 72853b5309781a40fb634ddf5f9ec09911a08e58 | 3 | {
"blob_id": "72853b5309781a40fb634ddf5f9ec09911a08e58",
"branch_name": "refs/heads/master",
"committer_date": 1573621165000,
"content_id": "4d4e988dc9ee55304fa4b8bf8f0d2cb6ed8252aa",
"detected_licenses": [
"MIT"
],
"directory_id": "dc187345147cdac7e295d3ad9aa760b62141d054",
"extension": "py",
"fi... | 2.515625 | stackv2 | """
get_model_zoo.py - Gets the desired entries in the model zoo and extracts them
7/24/2019 Holiday Pettijohn
"""
import os
import glob
import tarfile
import six.moves.urllib as urllib
if not os.path.isdir("model_zoo"):
os.mkdir("model_zoo")
url_base = 'http://download.tensorflow.org/models/object_detection/'
mod... | 29 | 36.1 | 110 | 11 | 365 | python | [{"finding_id": "codeql_py/tarslip_bb6f3c41801a1cec_783e0d4b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
28
] | [
null
] | [
3
] | [
6
] | |
2024-11-18T21:25:59.717949+00:00 | 1,679,126,407,000 | 7957d0fb747fccd90b8cb28e2fa2307cad62993c | 3 | {
"blob_id": "7957d0fb747fccd90b8cb28e2fa2307cad62993c",
"branch_name": "refs/heads/master",
"committer_date": 1679126407000,
"content_id": "4f0952166820a9e7d097dbf009265d1e0b8d1f67",
"detected_licenses": [
"MIT"
],
"directory_id": "0cc2272755f051e1758facaaa7e7ade948a2d20f",
"extension": "py",
"fi... | 2.703125 | stackv2 | #!/usr/bin/env python
"""
Very simple HTTP server in python.
Usage::
./dummy-web-server.py [<port>]
Send a GET request::
curl http://localhost
Send a HEAD request::
curl -I http://localhost
Send a POST request::
curl -d "foo=bar&bin=baz" http://localhost
To make it accessible from the outside world... | 79 | 22.97 | 75 | 17 | 462 | python | [{"finding_id": "codeql_py/log-injection_9a92b71a151ee9f5_b39cb1f9", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
53
] | [
null
] | [
30
] | [
63
] | |
2024-11-18T21:26:10.558644+00:00 | 1,691,921,807,000 | afee398a9753bafb5b0054dee93fd0bed1be843d | 3 | {
"blob_id": "afee398a9753bafb5b0054dee93fd0bed1be843d",
"branch_name": "refs/heads/master",
"committer_date": 1691921807000,
"content_id": "88e1f56ad2f59f98c26c33830e0350e35247f475",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "15227db766faabc2faed2f881f8896b920a85f1e",
"extension": "p... | 2.671875 | stackv2 | # -*- coding: utf-8 -*-
from flask import Flask, render_template, request, make_response, abort
from rtfcal import get_rtfs, results_to_ical, get_default_params, ZIP_CODE_PATTERN, EMPTY_CALENDAR_FILE
from dateparser import parse
from datetime import date, timedelta
import logging
logging.basicConfig(level=logging.INF... | 106 | 35.77 | 117 | 15 | 1,010 | python | [{"finding_id": "codeql_py/log-injection_398af877048a3d65_d0eb36f2", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
90
] | [
null
] | [
21
] | [
76
] | |
2024-11-18T20:31:26.373096+00:00 | 1,399,049,181,000 | dea1f1f1beb6baf512cb05e335aee73757697768 | 2 | {
"blob_id": "dea1f1f1beb6baf512cb05e335aee73757697768",
"branch_name": "refs/heads/master",
"committer_date": 1399049181000,
"content_id": "1f2a62f7b916876805e0ea2f73cdf28b01beeb9b",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "2c0a0325727a362f075d5c6a721317444b7afd30",
"extension": "p... | 2.3125 | stackv2 |
from __future__ import with_statement
__all__ = ["Source", "Template", "StaticFile", "DownloadSource"]
import hashlib
import os
import urllib2
import urlparse
from kokki import environment
from kokki.exceptions import Fail
class Source(object):
def get_content(self):
raise NotImplementedError()
def... | 112 | 36.62 | 116 | 22 | 875 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e3d6525f373dfe48_9cb3fef1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
68
] | [
null
] | [
33
] | [
95
] | |
2024-11-18T20:59:41.066392+00:00 | 1,657,802,577,000 | e530a3ca48ea886ec233de29707a43e2ba5ec356 | 3 | {
"blob_id": "e530a3ca48ea886ec233de29707a43e2ba5ec356",
"branch_name": "refs/heads/master",
"committer_date": 1657802577000,
"content_id": "2ad98aa4058600b05a2de1d2d4e9c9950cf505dc",
"detected_licenses": [
"MIT"
],
"directory_id": "c984f9878e76c0c98406686522b63b628c267235",
"extension": "py",
"fi... | 2.703125 | stackv2 | from flask import *
import hashlib
import os
import db
from werkzeug.utils import *
import uuid
app = Flask(__name__)
app.config['SECRET_KEY'] = '30ea67d46f46a8ca1e9a9d82'
app.config['UPLOAD_FOLDER'] = './images'
ALLOWED_EXTENSIONS = set(['png', 'jpg', 'jpeg', 'gif'])
"""
Creates a Database is already not present
""... | 176 | 32.05 | 138 | 19 | 1,270 | python | [{"finding_id": "codeql_py/flask-debug_aca68a4c82c7733b_5de16b68", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 5 | true | [
"CWE-215",
"CWE-327",
"CWE-327",
"CWE-601",
"CWE-601"
] | [
"py/flask-debug",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (pas... | [
171,
42,
81,
138,
144
] | [
null,
null,
null,
null,
null
] | [
5,
28,
36,
25,
25
] | [
49,
45,
53,
36,
36
] | |
2024-11-18T20:59:46.930090+00:00 | 1,628,951,995,000 | 67a3b349b902d5c6ddc108db2c5518ddef3b9646 | 3 | {
"blob_id": "67a3b349b902d5c6ddc108db2c5518ddef3b9646",
"branch_name": "refs/heads/main",
"committer_date": 1628951995000,
"content_id": "8815d84ecab08004f473d1397311f29a5d123e06",
"detected_licenses": [
"MIT"
],
"directory_id": "81cf27e76b76fb4f2181155ae60eee9bf3d01a5e",
"extension": "py",
"file... | 2.84375 | stackv2 | #VOICE ID FOR PA
import pyttsx3
engine=pyttsx3.init() #defining the engine
voices=engine.getProperty('voices')
voices = engine.getProperty('voices')
for voice in voices:
# to get the info. about various voices in our PC
print("Voice:")
print("ID: %s" %voice.id)
print("Name: %s" %voice.name)
pr... | 16 | 26.12 | 54 | 9 | 125 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_03e3d4320fff42be_7b7b7611", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
15
] | [
null
] | [
11
] | [
37
] | |
2024-11-18T21:10:21.655885+00:00 | 1,582,835,391,000 | 6a2c38d32b5bfe40d91569f3a5804017e5e18f79 | 3 | {
"blob_id": "6a2c38d32b5bfe40d91569f3a5804017e5e18f79",
"branch_name": "refs/heads/master",
"committer_date": 1582835391000,
"content_id": "51f75cba107b530043dd15f9440fa76d1a0b927a",
"detected_licenses": [
"MIT"
],
"directory_id": "7f88738dcea4fc92e63a23262175bbbd214af261",
"extension": "py",
"fi... | 2.84375 | stackv2 | import logging
import os
from flask import Flask, render_template, jsonify, request
from models.players import Player
from services.play import do_move, start_game
from services.utils import WHITE, BLACK
logging.basicConfig(level=logging.DEBUG)
logger = logging.getLogger(__name__)
# Caching the players by name and... | 171 | 29.89 | 120 | 17 | 1,257 | python | [{"finding_id": "codeql_py/stack-trace-exposure_65d38ab404c2ae36_5c6ac756", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 15 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-215",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/flask-debug",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-inje... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
59,
92,
114,
134,
149,
161,
171,
29,
65,
76,
97,
100,
140,
142,
145
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
24,
24,
24,
24,
24,
24,
5,
49,
17,
26,
17,
26,
21,
26,
21
] | [
39,
40,
40,
40,
40,
40,
82,
53,
71,
63,
53,
63,
55,
63,
46
] | |
2024-11-18T21:10:36.677611+00:00 | 1,591,668,519,000 | 439e5440c0d61cae304557dcebbabad9ed64b8b5 | 2 | {
"blob_id": "439e5440c0d61cae304557dcebbabad9ed64b8b5",
"branch_name": "refs/heads/master",
"committer_date": 1591668519000,
"content_id": "8d3291350d40c440be55846a25c930efe3029e72",
"detected_licenses": [
"MIT"
],
"directory_id": "f7b73dfe83a4536e87a2568eb7249d0e5562fd87",
"extension": "py",
"fi... | 2.5 | stackv2 | import os,rarfile,zipfile,tarfile,re,sys
import comics
from shutil import copyfile
from django.conf import settings
from operator import attrgetter
from . import fnameparser
from . import utils
from urllib.parse import quote
class ComicFileHandler(object):
def __init__(self):
# Set the unrar tool based on filesyst... | 271 | 28.92 | 134 | 21 | 2,018 | python | [{"finding_id": "codeql_py/overly-permissive-file_4f566bfd09e09a7b_cbe78eb9", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 4 | true | [
"CWE-732",
"CWE-732",
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file",
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable."
] | [
52,
103,
157,
227
] | [
null,
null,
null,
null
] | [
5,
4,
4,
4
] | [
30,
29,
29,
29
] | |
2024-11-18T21:10:38.537334+00:00 | 1,612,019,244,000 | 7feb630cef9f3c607af1d895a3a5091a38e7fec6 | 4 | {
"blob_id": "7feb630cef9f3c607af1d895a3a5091a38e7fec6",
"branch_name": "refs/heads/master",
"committer_date": 1612019244000,
"content_id": "850fa9f6afce7815276a299977ddf552ec07ca74",
"detected_licenses": [
"MIT"
],
"directory_id": "530779b3c7438d456a3994d0b1af9c1eb6a251d2",
"extension": "py",
"fi... | 4.125 | stackv2 | # Modules
import string
import random
# Variables
# I just wanted to do it this way..
# I know there are a lot of solution for this variables.
pass_char0 = string.punctuation + string.ascii_letters + string.digits
pass_char1 = string.ascii_lowercase + string.ascii_uppercase
pass_char = pass_char0 + pass_char1
# User... | 29 | 35 | 82 | 14 | 216 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_61488e4c8aa4a110_f0587b03", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
21
] | [
null
] | [
19
] | [
46
] | |
2024-11-18T21:10:39.685185+00:00 | 1,581,377,425,000 | e7ece888fcc8b72ab3bce64dbbb4d3613adbc1d1 | 3 | {
"blob_id": "e7ece888fcc8b72ab3bce64dbbb4d3613adbc1d1",
"branch_name": "refs/heads/master",
"committer_date": 1581377425000,
"content_id": "7b41f99d6b859229332813113f8b3e7430b3705e",
"detected_licenses": [
"MIT"
],
"directory_id": "fd0c0e1937d58b56f2a638317be6441fd79f15ab",
"extension": "py",
"fi... | 2.71875 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""Contains methods that reference APIs used by bot."""
import configparser
from functools import lru_cache
import logging
import pixivpy3 # type: ignore
from .exceptions import APIError
@lru_cache(maxsize=32)
def pixiv_tags(illust_id: int, conf: configparser.Sectio... | 38 | 29.82 | 85 | 14 | 287 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d655ad6112d15208_c9ae8ab5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
30
] | [
null
] | [
18
] | [
85
] | |
2024-11-18T21:10:40.221224+00:00 | 1,645,143,720,000 | 8f27cb6236cc072148580a60b3f8e061a63b5b33 | 2 | {
"blob_id": "8f27cb6236cc072148580a60b3f8e061a63b5b33",
"branch_name": "refs/heads/master",
"committer_date": 1645143720000,
"content_id": "709f43b12aea03c900bdd56a994f4d916f8e6da8",
"detected_licenses": [
"MIT"
],
"directory_id": "6e9dc0b30bdfb5d947caace3afb74a28a01d0b7c",
"extension": "py",
"fi... | 2.46875 | stackv2 | import json
import numpy as np
import re
model = {
"harmonic": {"polynomial" : {
"exponents": [[2]],
"coefs": [0.5]
}},
"cubic_decay": {"polynomial" : {
"exponents": [[2],[3]],
"coefs": [0.5, 1.0/6.0]
}},
"anharmonic": {"polynomial" : {
"exponents": [[2],[3],[4]]... | 147 | 29 | 116 | 19 | 1,144 | python | [{"finding_id": "codeql_py/overly-large-range_b29b219ae1bc1f49_c1284382", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
128
] | [
null
] | [
52
] | [
55
] | |
2024-11-18T21:23:32.361624+00:00 | 1,682,129,739,000 | 4359e3e6d47cba187e6c95247c413309ec424283 | 2 | {
"blob_id": "4359e3e6d47cba187e6c95247c413309ec424283",
"branch_name": "refs/heads/master",
"committer_date": 1682129739000,
"content_id": "82096cb065040ae2286bdf48a732eebdd5f94ea5",
"detected_licenses": [
"MIT"
],
"directory_id": "7226485bcbac3ad5c832b0bcb6079e050d0950a1",
"extension": "py",
"fi... | 2.40625 | stackv2 | import os
import secrets
from PIL import Image
from flask import render_template, url_for, flash, redirect, request, abort
from flaskblog import app, db, bcrypt
from flaskblog.forms import RegistrationForm, LoginForm, UpdateAccountForm, PostForm, CommentForm
from flaskblog.models import User, Post, Comment
from flask_l... | 305 | 39.75 | 150 | 19 | 2,620 | python | [{"finding_id": "codeql_py/url-redirection_c23c8f71df0da571_bcd4d620", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
97
] | [
null
] | [
29
] | [
38
] | |
2024-11-18T21:23:40.797789+00:00 | 1,469,964,188,000 | 152595d06583aebf7b20cdde674c232fd6b7f3ff | 2 | {
"blob_id": "152595d06583aebf7b20cdde674c232fd6b7f3ff",
"branch_name": "refs/heads/master",
"committer_date": 1469964188000,
"content_id": "3624749e8c3ed8c9c79986ca4f6fb9d0c0380861",
"detected_licenses": [
"MIT"
],
"directory_id": "e399e13c326c5aa6f5994c729db65cbdafc35c80",
"extension": "py",
"fi... | 2.46875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import os
import json
import logging
import contextlib
import traceback
import tornado
from jinja2 import Environment, FileSystemLoader, TemplateNotFound
from ..status import OK
from ..const import LOG_NAME
log = logging.getLogger(LOG_NAME)
def debug_wrapper(func):
... | 125 | 25.95 | 76 | 14 | 697 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_37f8fe0127575ebb_d53d0590", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
43
] | [
null
] | [
15
] | [
66
] | |
2024-11-18T21:23:41.042696+00:00 | 1,666,592,384,000 | 24b07d103a27ac261db1c999a2eac2b8387af79e | 3 | {
"blob_id": "24b07d103a27ac261db1c999a2eac2b8387af79e",
"branch_name": "refs/heads/master",
"committer_date": 1666592384000,
"content_id": "61022bd093e815562389baefee2d9886e89d7170",
"detected_licenses": [
"MIT"
],
"directory_id": "c35d3b8dd68b305729f340da5e53139ff8c8eb17",
"extension": "py",
"fi... | 2.890625 | stackv2 | #!/usr/bin/python3
from argparse import ArgumentParser, Action
import sys
import random
from hashlib import md5
# We need a crypt module, but Windows doesn't have one by default. Try to find
# one, and tell the user if we can't.
try:
import crypt
except ImportError:
try:
import fcrypt as crypt
except ImportE... | 220 | 29.8 | 118 | 16 | 1,902 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_459bcb58b9f90a6f_d63d3d3c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 7 | true | [
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
57,
60,
72,
81,
89,
94,
139
] | [
null,
null,
null,
null,
null,
null,
null
] | [
14,
17,
18,
21,
21,
21,
12
] | [
37,
43,
38,
29,
29,
29,
56
] | |
2024-11-18T21:23:43.206727+00:00 | 1,420,490,827,000 | 0208dae8d4f1b6352851c7289bedd13f2d631776 | 3 | {
"blob_id": "0208dae8d4f1b6352851c7289bedd13f2d631776",
"branch_name": "refs/heads/master",
"committer_date": 1420490827000,
"content_id": "41c13f7777cbe4faaa2cb6263fd114b3e95fbae9",
"detected_licenses": [
"MIT"
],
"directory_id": "bf57d6243379bad4fdebc790d2515f0a5860091d",
"extension": "py",
"fi... | 2.765625 | stackv2 | from flask import Flask
from flask import request, redirect
import os, subprocess, time
app = Flask(__name__)
PYTHON_PATH = '/home/dsa/Projects/notorious-app/bin/python2'
ROOT_DIR = '/home/dsa/Projects/notorious-app/notorious/data/'
@app.route("/")
def hello():
return "Hello World!"
##Stuff for reading notes
@ap... | 74 | 27.53 | 118 | 12 | 545 | python | [{"finding_id": "codeql_py/command-line-injection_0f9b5fecd97000aa_6f830d9f", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 6 | true | [
"CWE-078",
"CWE-079",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/command-line-injection",
"py/reflective-xss",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).",
"This path depends on a [user-provided value](1).",
"This path depends on... | [
65,
37,
24,
42,
43,
44
] | [
null,
null,
null,
null,
null,
null
] | [
35,
16,
18,
31,
25,
18
] | [
42,
42,
22,
35,
29,
22
] | |
2024-11-18T21:23:45.442627+00:00 | 1,627,856,637,000 | 6c8aad0f29dfc4e7d42e18fd909d78ee6e430e90 | 3 | {
"blob_id": "6c8aad0f29dfc4e7d42e18fd909d78ee6e430e90",
"branch_name": "refs/heads/main",
"committer_date": 1627856637000,
"content_id": "e21b2322cf5b287c3ddecf4bc6378247f58d2c28",
"detected_licenses": [
"MIT"
],
"directory_id": "8e334a34508bd419ba200106ad93dfbee9a99ca5",
"extension": "py",
"file... | 2.796875 | stackv2 |
import uuid
import socket
import hashlib
import logging
import sqlite3
import argparse
from datetime import date
from datetime import datetime
import pynmea2
# import bluetooth
# Configuration
BUFF_SIZE = 1024 # 4 KiB
# Setup logging
logger = logging.getLogger()
logger.setLevel(logging.DEBUG)
streamhandler = ... | 188 | 27.99 | 155 | 21 | 1,141 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_16f1f3720281f7ed_322d7a86", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
122
] | [
null
] | [
34
] | [
52
] | |
2024-11-18T21:37:23.705654+00:00 | 1,586,881,421,000 | f7a5a8dcac16ff26ff3df603dc3f352d79bd1e30 | 2 | {
"blob_id": "f7a5a8dcac16ff26ff3df603dc3f352d79bd1e30",
"branch_name": "refs/heads/master",
"committer_date": 1586881421000,
"content_id": "ade5593d888f2c6137abcb968a7295d8354805da",
"detected_licenses": [
"MIT"
],
"directory_id": "e6d052d2e02720a9ca282a85091b52b7e898904f",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/env python3
import os
import subprocess
import sys
import tempfile
import time
import json
from datetime import datetime
from jinja2 import Template
class HealthError(Exception):
""" This gets thrown if there is something wrong with the health of a service."""
def get_options():
options = {}
... | 170 | 32.29 | 103 | 21 | 1,246 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_51b966a3617aa6b3_1266d5d3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
39
] | [
null
] | [
16
] | [
27
] | |
2024-11-18T21:58:57.242235+00:00 | 1,594,135,608,000 | 01806ee36699d523ff509a8c8db93c3c1a46d1f7 | 3 | {
"blob_id": "01806ee36699d523ff509a8c8db93c3c1a46d1f7",
"branch_name": "refs/heads/master",
"committer_date": 1594135608000,
"content_id": "d04927db31d4a6ff6ff048fef26defb4b217de05",
"detected_licenses": [
"MIT"
],
"directory_id": "8d6a47cbe764cbc8c32234546f74c95f5e4cbeb3",
"extension": "py",
"fi... | 2.734375 | stackv2 | import anndata
import pandas as pd
import numpy as np
import os, sys
import scanpy.api as sc
sc.settings.verbosity = 0
from datasetuploader import FileType
class MexUploader(FileType):
"""
Called by datasetuploader.py (factory) when a TAR archive (mexfiles_are_inside.tar) is being uploaded.
"""
def... | 102 | 34.29 | 115 | 20 | 764 | python | [{"finding_id": "codeql_py/tarslip_e02cd42639277d9f_7d12ac44", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
58
] | [
null
] | [
28
] | [
33
] | |
2024-11-18T21:59:14.113103+00:00 | 1,693,318,965,000 | 04bff02b7171de0893ac0d13f302435fc9fc1cef | 3 | {
"blob_id": "04bff02b7171de0893ac0d13f302435fc9fc1cef",
"branch_name": "refs/heads/master",
"committer_date": 1693318965000,
"content_id": "646652a3644edc7e09a44bb0ef52c92c8ff2b1c8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "29eac50cc208d8aaebde699e8c851ed84b2de591",
"extension": "py"... | 2.71875 | stackv2 | """
About the AudioMNIST corpus
The AudioMNIST dataset consists of 30000 audio recordings
(ca. 9.5 hours) of spoken digits (0-9) in English with 50 repetitions
per digit for each of the 60 different speakers. Recordings were
collected in quiet offices with a RØDE NT-USB microphone as
mono channel signal at a sampling ... | 146 | 31.95 | 88 | 16 | 1,206 | python | [{"finding_id": "codeql_py/tarslip_9c12721d438d4772_038cb6ec", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
68
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T22:11:30.407869+00:00 | 1,619,788,571,000 | c3a908761959c8b1bb596f83dd7ce67c0ac75ca4 | 3 | {
"blob_id": "c3a908761959c8b1bb596f83dd7ce67c0ac75ca4",
"branch_name": "refs/heads/main",
"committer_date": 1619788571000,
"content_id": "b24077ab0c0114a52f79535ec7020ec30b4f4569",
"detected_licenses": [
"MIT"
],
"directory_id": "108376f7eaa5b60ef95d931f7bb9206dcabfd372",
"extension": "py",
"file... | 3.234375 | stackv2 | """This module does to work with dataset"""
import os
import logging
import string
import math
import re
import pandas as pd
import nltk
from nltk.tokenize import word_tokenize
from nltk.stem import WordNetLemmatizer
try:
nltk.find("stopwords")
except LookupError:
nltk.download("stopwords")
try:
nltk.find... | 287 | 31.37 | 85 | 17 | 1,916 | python | [{"finding_id": "codeql_py/overly-large-range_da311be49b8e8864_1a320cf5", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
108
] | [
null
] | [
53
] | [
57
] | |
2024-11-18T22:24:09.855408+00:00 | 1,676,139,610,000 | f484770ecac8a0e8cc5089c84272823aa6819b64 | 3 | {
"blob_id": "f484770ecac8a0e8cc5089c84272823aa6819b64",
"branch_name": "refs/heads/master",
"committer_date": 1676139610000,
"content_id": "59d06ad9e8b6f5096de9bf299d56059284adc1a1",
"detected_licenses": [
"MIT"
],
"directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9",
"extension": "py",
"fi... | 2.578125 | stackv2 | import os
def readCfg(location):
# Make sure file exists...
if not os.path.exists(location):
return False
with open(location) as f:
cfg= {}
for line in f:
line = line.strip()
# Ignore invalid lines
if line and not line.startswith("#") and '=' in line:
cfg[line.split('=', 1)[0]] = line.split('=', ... | 18 | 24.56 | 56 | 17 | 130 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4313b170b3ee7a88_0d525b66", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
18
] | [
null
] | [
8
] | [
41
] | |
2024-11-18T22:24:15.134787+00:00 | 1,511,418,281,000 | 6358080c8f7c140c30df5a384467ec322b67e515 | 3 | {
"blob_id": "6358080c8f7c140c30df5a384467ec322b67e515",
"branch_name": "refs/heads/master",
"committer_date": 1511418281000,
"content_id": "bc64e29127d18d229172262bc4d9d496c71f1b0c",
"detected_licenses": [
"MIT"
],
"directory_id": "23bced53597c0cd9440292e6f9ad7338b82ddc50",
"extension": "py",
"fi... | 3.1875 | stackv2 | """
This file is responsible for managing the encryption and the security of the application.
The file implements functions which allow for encryption and decryption of messages using
XOR, AES and RSA standards.
"""
import hashlib
import binascii
import Crypto.Cipher.XOR
from Crypto.Cipher import AES
from Crypto.P... | 222 | 38.79 | 130 | 21 | 2,099 | python | [{"finding_id": "codeql_py/weak-crypto-key_9a9599e1d0e213c5_c2f31790", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
24
] | [
null
] | [
11
] | [
47
] | |
2024-11-18T22:24:18.996603+00:00 | 1,600,032,070,000 | f777248e146e7c798ca83597105a031650c680ee | 3 | {
"blob_id": "f777248e146e7c798ca83597105a031650c680ee",
"branch_name": "refs/heads/master",
"committer_date": 1600032070000,
"content_id": "234ed477653ff69e23a23a28680f5acf6ead768c",
"detected_licenses": [
"MIT"
],
"directory_id": "dcaa3a59f41675ccaf5edb7fd98221369d4ac309",
"extension": "py",
"fi... | 2.59375 | stackv2 | from datetime import datetime, timedelta
from math import floor
from dotenv import load_dotenv
from cryptography.fernet import Fernet
from flask import Flask, request, jsonify, abort
from flask_sqlalchemy import SQLAlchemy
from flask_cors import CORS
import bcrypt
import os
# Uncomment the following code block to inst... | 243 | 33.23 | 106 | 18 | 1,815 | python | [{"finding_id": "codeql_py/reflective-xss_43bf192b08da2fdf_b62c8a2c", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
109,
123,
139
] | [
null,
null,
null
] | [
16,
16,
16
] | [
34,
28,
28
] | |
2024-11-18T22:24:19.123442+00:00 | 1,529,942,469,000 | ff691e7d3efb6ae3bf8a8330f49cb5493e72ef63 | 3 | {
"blob_id": "ff691e7d3efb6ae3bf8a8330f49cb5493e72ef63",
"branch_name": "refs/heads/master",
"committer_date": 1529942469000,
"content_id": "6c265a96191bdc13729bc8a782c01be4ac7f1d72",
"detected_licenses": [
"MIT"
],
"directory_id": "16617077b64f0ca90c1eb4ef317a87c3a1455404",
"extension": "py",
"fi... | 2.625 | stackv2 | """
aiohttp demo server.
"""
import logging
from aiohttp import web
from smsdemo.constants import POST_PATH, SIGNATURE_HEADER_KEY
from smsdemo.message import SMSMessage
from smsdemo.util import (
ServerConfig, SMSSendError,
parse_signature, generate_signature,
async_send,
)
async def receive_and_echo(r... | 58 | 28.4 | 84 | 12 | 375 | python | [{"finding_id": "codeql_py/log-injection_cedc44ada460e15f_d6264840", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
38
] | [
null
] | [
62
] | [
65
] | |
2024-11-18T22:24:24.326253+00:00 | 1,528,426,972,000 | 558150d870bd1537c09b4c1eebcb77865afaf938 | 3 | {
"blob_id": "558150d870bd1537c09b4c1eebcb77865afaf938",
"branch_name": "refs/heads/master",
"committer_date": 1528426972000,
"content_id": "2e18eed7f1517072d8b4f5615e07fa01641191bc",
"detected_licenses": [
"MIT"
],
"directory_id": "75144eaef1e1211f281fa4fe43f36901f69dfafa",
"extension": "py",
"fi... | 2.640625 | stackv2 | import os
import sys
import path
import csv
from sklearn.cluster import KMeans
import numpy as np
import matplotlib.pyplot as plt
import requests
from Coordinate import Coordinate
from User import User
from Cluster import Cluster
from BusPath import BusPath
class PathFinder:
databasePath: str = path.Path.getcwd()... | 147 | 33.9 | 139 | 29 | 1,115 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_2ec0576ee41111c4_bb18a203", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive data (private)](4) as clear text."
] | [
75
] | [
79
] | [
28
] | [
87
] | |
2024-11-18T22:24:25.881154+00:00 | 1,517,088,256,000 | 3e6786a685356482b888042126dda86e94167bdc | 3 | {
"blob_id": "3e6786a685356482b888042126dda86e94167bdc",
"branch_name": "refs/heads/master",
"committer_date": 1517088256000,
"content_id": "99016adea74932f2781e4ad1c7a35ca6ab220d33",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "157e8d06c85426bacf21a0f84b0be993ae300d5d",
"extension": "py"... | 2.53125 | stackv2 | #!/usr/bin/python3
from flask import Flask, jsonify, request, abort
import time
import os
from googleapiclient import discovery
from oauth2client.client import GoogleCredentials
from pprint import pprint
def get_input(inputfile):
try:
with open(inputfile, 'r') as input:
data = input.read()
... | 176 | 29.39 | 118 | 15 | 1,174 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d0e5fdc60fc75863_0e7c71fe", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
128
] | [
null
] | [
24
] | [
53
] | |
2024-11-18T22:36:04.404960+00:00 | 1,671,450,258,000 | 547d09f35d9999c9139104c1f46d698cc8df26d9 | 2 | {
"blob_id": "547d09f35d9999c9139104c1f46d698cc8df26d9",
"branch_name": "refs/heads/master",
"committer_date": 1671450258000,
"content_id": "86c42c03739aa0a52b7dd99f6c579f5b2398e3ce",
"detected_licenses": [
"MIT"
],
"directory_id": "c6df8b3a5fdc19936a5bdfc6599d790c55cada90",
"extension": "py",
"fi... | 2.4375 | stackv2 | import glob
import json
import logging
import os
import re
import subprocess
import jinja2
import rich
import nf_core.utils
log = logging.getLogger(__name__)
def render_template(component_type, object_attrs, file_paths):
"""
Create new module/subworkflow files with Jinja2.
"""
# Run jinja2 for each... | 177 | 45.08 | 119 | 19 | 1,861 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2bd02b4cec4645ed_2b26c745", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
21
] | [
23
] | [
11
] | [
6
] | |
2024-11-18T22:36:19.987585+00:00 | 1,530,817,588,000 | 25124bdda2e4921c4b27342e0b7a2de9bba1eece | 2 | {
"blob_id": "25124bdda2e4921c4b27342e0b7a2de9bba1eece",
"branch_name": "refs/heads/master",
"committer_date": 1530820829000,
"content_id": "b145fa4aada0ec33e47f076967cc0261787d553f",
"detected_licenses": [
"BSD-3-Clause-Clear"
],
"directory_id": "97afa3222a3ab29ac697dbef533fc0b8b3aac764",
"extensio... | 2.359375 | stackv2 | from flask import Flask, request
from threading import Thread
from slackclient import SlackClient
from bubbles import initiate_bubbles, understand_message, finish_pending_bubbles, give_help
import logging
logging.basicConfig(level=logging.INFO)
app = Flask(__name__)
@app.route('/readiness_check', methods=['GET'])
def... | 48 | 29.27 | 91 | 16 | 348 | python | [{"finding_id": "codeql_py/flask-debug_c1c481125fd3b737_9bc0569d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
48,
27
] | [
null,
null
] | [
5,
16
] | [
49,
38
] | |
2024-11-18T22:36:33.987654+00:00 | 1,559,042,663,000 | fa1a6d8d4a63c617adb08fd6ac1007223c250f35 | 2 | {
"blob_id": "fa1a6d8d4a63c617adb08fd6ac1007223c250f35",
"branch_name": "refs/heads/master",
"committer_date": 1559042663000,
"content_id": "63765d5682b77bbb2f611f803139cce4543a1493",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "eeaa5086dc12873c60a2878469408aed4c7c8126",
"extension": "py"... | 2.421875 | stackv2 | #!/usr/bin/python3
# encoding: utf-8
"""
@version: v1.0
@author: W_H_J
@license: Apache Licence
@contact: 415900617@qq.com
@software: PyCharm
@file: routes.py
@time: 2019/5/27 17:51
@describe: 路由规则
"""
import sys
import os
import sys
from werkzeug.urls import url_parse
from app.forms import EditProfileFor... | 125 | 27.97 | 77 | 16 | 928 | python | [{"finding_id": "codeql_py/url-redirection_fb65e3ef76f932bd_b503638b", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
72
] | [
null
] | [
25
] | [
34
] | |
2024-11-18T22:36:36.773294+00:00 | 1,656,837,129,000 | 72f8f641163b9fa1d262f5b527907a4604162cba | 3 | {
"blob_id": "72f8f641163b9fa1d262f5b527907a4604162cba",
"branch_name": "refs/heads/master",
"committer_date": 1656837129000,
"content_id": "778e84094abfab667d01cd53a28f8008f70100a0",
"detected_licenses": [
"MIT"
],
"directory_id": "53ca843a8011f6a563bd47ad5f6b013512cea9a8",
"extension": "py",
"fi... | 3.21875 | stackv2 | from base64 import b64encode
CONTENT_TYPE_VALUE = "application/json"
class AuthType:
NoAuth = ""
BasicAuth = "basic"
class NoAuth:
def __init__(self):
self.header = {
"content-type": CONTENT_TYPE_VALUE,
}
class BasicAuth:
def __init__(self, user_name, password):
... | 44 | 22.59 | 81 | 13 | 255 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ec387defc625c338_c7e989c9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
43,
44
] | [
null,
null
] | [
11,
11
] | [
34,
37
] | |
2024-11-18T20:23:12.461189+00:00 | 1,554,819,392,000 | 6e4f4d79e66d3da08e35b3b51cd84ac5a37c72ac | 3 | {
"blob_id": "6e4f4d79e66d3da08e35b3b51cd84ac5a37c72ac",
"branch_name": "refs/heads/master",
"committer_date": 1554819392000,
"content_id": "b254bd44e4c6f3cd575cd40f6c5319863beb508e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5adb2bd05702cb98114305b3b4d08c518e867811",
"extension": "py"... | 2.765625 | stackv2 | '''
Copyright 2019 Jacques Supcik
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software... | 77 | 29.47 | 77 | 12 | 590 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a3faf6f66c4f4a02_693495e9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
45
] | [
57
] | [
11
] | [
6
] | |
2024-11-18T20:23:22.698135+00:00 | 1,556,549,981,000 | 19b7ed0278153cd5127988c405ba82cc5c38df36 | 3 | {
"blob_id": "19b7ed0278153cd5127988c405ba82cc5c38df36",
"branch_name": "refs/heads/master",
"committer_date": 1556549981000,
"content_id": "4cac09f1f4f1a3d2b87abf742c64b8e8d12c0d1c",
"detected_licenses": [
"MIT"
],
"directory_id": "be548c3bac49514e0570cd66fdb60f8434df33a6",
"extension": "py",
"fi... | 2.734375 | stackv2 | import os
import re
import shutil
import sys
import mistune
from jinja2 import Environment, FileSystemLoader
from jinja2.ext import Extension
from aurora import utils
from aurora.defaults import DEFAULTS
class FrontMatterExtension(Extension):
""" Frontmatter are not rendered by Jinja, instead we parse them ours... | 150 | 36.59 | 79 | 21 | 1,184 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0e8bc0b4c5765fce_fd885223", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
51
] | [
54
] | [
20
] | [
30
] | |
2024-11-18T21:22:39.547101+00:00 | 1,678,943,819,000 | d57787c1eac834d5d0d4219aa0078fc91cd5138c | 2 | {
"blob_id": "d57787c1eac834d5d0d4219aa0078fc91cd5138c",
"branch_name": "refs/heads/master",
"committer_date": 1678943819000,
"content_id": "416f4dd47096ebab36727aa280d15d60306d4948",
"detected_licenses": [
"MIT"
],
"directory_id": "7ddece1802cc6a684cf027443636a1c0819e38fb",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/env python
__author__ = "hloverflow"
__credits__ = ["stephenbradshaw"]
from base64 import b64decode, b64encode
from Crypto.Cipher import AES
from Crypto import Random
from flask import Flask, request
from lxml import etree
import cgi
import traceback
app = Flask(__name__)
# Config stuff
KEY = Random.new(... | 119 | 25.75 | 101 | 15 | 887 | python | [{"finding_id": "codeql_py/xxe_f8fd498b5c7480dc_3832f184", "tool_name": "codeql", "rule_id": "py/xxe", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "XML parsing depends on a [user-provided value](1) without guarding against external entity expansion.", "remediation": "", "locat... | 4 | true | [
"CWE-611",
"CWE-611",
"CWE-209",
"CWE-215"
] | [
"py/xxe",
"py/xxe",
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"XML parsing depends on a [user-provided value](1) without guarding against external entity expansion.",
"XML parsing depends on a [user-provided value](1) without guarding against external entity expansion.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Fl... | [
57,
96,
77,
119
] | [
null,
null,
null,
null
] | [
29,
29,
12,
5
] | [
37,
37,
16,
40
] | |
2024-11-18T21:23:13.731335+00:00 | 1,616,254,252,000 | b81988a611c8d7e7689c8d2e52ffd8cdafc335c2 | 3 | {
"blob_id": "b81988a611c8d7e7689c8d2e52ffd8cdafc335c2",
"branch_name": "refs/heads/master",
"committer_date": 1616254252000,
"content_id": "c98886db47fbf7c312c0f5cedba13e8e0bde6e5f",
"detected_licenses": [
"MIT"
],
"directory_id": "6ea97e4fd9f60aa5b8ca5c1563d6312312505e7c",
"extension": "py",
"fi... | 2.734375 | stackv2 | from flask import flash, redirect, render_template, request, url_for
from flask_login import current_user, login_required, login_user, logout_user
from werkzeug.urls import url_parse
from app.extensions import db
from app.models import Employee
from . import auth
from .forms import LoginForm, RegistrationForm
@auth... | 90 | 37.06 | 81 | 19 | 659 | python | [{"finding_id": "codeql_py/url-redirection_5e75b99c076e055b_c3a20f58", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
73
] | [
null
] | [
29
] | [
38
] | |
2024-11-18T21:51:39.529514+00:00 | 1,560,692,757,000 | 2891aef239729f79cb8b1834cd843d69004b3302 | 3 | {
"blob_id": "2891aef239729f79cb8b1834cd843d69004b3302",
"branch_name": "refs/heads/master",
"committer_date": 1560692757000,
"content_id": "c3f227ad7cc11cda982d500cde2a0dfb808a9143",
"detected_licenses": [
"MIT"
],
"directory_id": "5784c1bbce149e27d1e32953b799422e9bad6f1e",
"extension": "py",
"fi... | 2.734375 | stackv2 |
# -*- coding: utf-8 -*-
import socket
import threading
from logging import getLogger
from reopenwebnet import messages
from reopenwebnet.password import calculate_password
_LOGGER = getLogger(__name__)
""" Terminology:
request = string sent to gateway
response = string sent from gateway
frame = a string re... | 249 | 31.23 | 128 | 17 | 1,780 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4fc437ab9c3972e3_435620cc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
149
] | [
null
] | [
34
] | [
38
] | |
2024-11-18T21:51:44.945582+00:00 | 1,678,776,456,000 | 16ad2a7e86f21b2a50ac5d7451c091557662f785 | 2 | {
"blob_id": "16ad2a7e86f21b2a50ac5d7451c091557662f785",
"branch_name": "refs/heads/main",
"committer_date": 1678776456000,
"content_id": "fcb63ddf300a2c939264d92073f25fd7a6294227",
"detected_licenses": [
"MIT"
],
"directory_id": "306b52c3f52b62ad1178851631d6617b29a01178",
"extension": "py",
"file... | 2.359375 | stackv2 | from http.server import BaseHTTPRequestHandler
import os
class Server(BaseHTTPRequestHandler):
def do_GET(self):
if self.path == '/':
self.path = '/index.html'
try:
split_path = os.path.splitext(self.path)
request_extension = split_path[1]
if request_e... | 23 | 31.57 | 52 | 18 | 160 | python | [{"finding_id": "codeql_py/path-injection_7a312ec3262786f3_611dfdd9", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
11
] | [
null
] | [
26
] | [
39
] | |
2024-11-18T21:51:45.583352+00:00 | 1,497,647,926,000 | 90659e885be6cdf76aba310f338b29d3ff1c89c5 | 3 | {
"blob_id": "90659e885be6cdf76aba310f338b29d3ff1c89c5",
"branch_name": "refs/heads/master",
"committer_date": 1497647926000,
"content_id": "998f44fe68b75c47feddc64a51acdf8c7e662cde",
"detected_licenses": [
"MIT"
],
"directory_id": "6e938c65a7c16c59f87549a0f7bf9b171e45cf5c",
"extension": "py",
"fi... | 3.046875 | stackv2 | #!/usr/bin/env python3
"""
The program for taking the information
about letters on mail server using POP3 protocol.
"""
import sys
from socket import socket, AF_INET, SOCK_STREAM, timeout
from argparse import ArgumentParser
from ssl import wrap_socket
from logging import warning, error
from os import linesep
from lett... | 153 | 27.67 | 89 | 15 | 1,043 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_828337fb4e612e18_b9a6faf3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-327",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/insecure-default-protocol",
"py/insecure-default-protocol"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.",
"Call to deprecated method ssl.wrap_socket does ... | [
133,
76,
80
] | [
null,
null,
null
] | [
26,
24,
24
] | [
40,
41,
41
] | |
2024-11-18T22:02:46.271634+00:00 | 1,629,287,100,000 | 0b4625dc04fc541ed518f7fae80b70f473632b7b | 2 | {
"blob_id": "0b4625dc04fc541ed518f7fae80b70f473632b7b",
"branch_name": "refs/heads/master",
"committer_date": 1629287100000,
"content_id": "465470c14fbf002b13a0df71ace4a268e9b648c1",
"detected_licenses": [
"MIT"
],
"directory_id": "98fe597cf62897cf2cdd91f5b8700badde4a665d",
"extension": "py",
"fi... | 2.40625 | stackv2 | import os
from flask import Flask, request, Response
import requests
import json
from flask_caching import Cache
app = Flask(__name__)
app.config.from_mapping(
{"DEBUG": True, "CACHE_TYPE": "simple", "CACHE_DEFAULT_TIMEOUT": 5400})
cache = Cache(app)
def get_stream_links(file_id, base_url):
import urllib.pa... | 103 | 27.59 | 79 | 15 | 760 | python | [{"finding_id": "codeql_py/full-ssrf_90d1575b2eeea722_d70fc730", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 3 | true | [
"CWE-918",
"CWE-079",
"CWE-918"
] | [
"py/full-ssrf",
"py/reflective-xss",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
90,
98,
33
] | [
null,
null,
null
] | [
9,
9,
9
] | [
56,
43,
26
] | |
2024-11-18T22:16:42.898325+00:00 | 1,616,522,795,000 | 36ecc833a282953c71e5517ae2f4a0ec509336de | 3 | {
"blob_id": "36ecc833a282953c71e5517ae2f4a0ec509336de",
"branch_name": "refs/heads/master",
"committer_date": 1616522795000,
"content_id": "e90f6cbc2478724d43b12f2d77305b664ccf709b",
"detected_licenses": [
"MIT"
],
"directory_id": "130ae389f952e2b83b1c26ba3e43f593559413b9",
"extension": "py",
"fi... | 2.875 | stackv2 | ''' Example of Spotify client credentials flow.
User can search artist names available in Spotify.
Basic flow:
Get authorization -> get access token -> access endpoints with token
Note:
Used in server-to-server authentication. Only can access endpoints
that do not serve user data. Advantage of this flow ... | 128 | 25.48 | 107 | 17 | 744 | python | [{"finding_id": "codeql_py/log-injection_d93c9611d7b07f59_4dcd0cb9", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
114
] | [
null
] | [
21
] | [
27
] | |
2024-11-18T22:27:44.334923+00:00 | 1,524,867,612,000 | 9e779d2de70201d2e462e22d86bb79d6913eb608 | 2 | {
"blob_id": "9e779d2de70201d2e462e22d86bb79d6913eb608",
"branch_name": "refs/heads/master",
"committer_date": 1524867612000,
"content_id": "4505d5f371bdf0c7326dc4a658e624febebe0638",
"detected_licenses": [
"MIT"
],
"directory_id": "df19c4e2ec0b27c392623faaf43f547c227362a3",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/env python
# Example Redis authentication
#
# To use, add this to mosquitto.conf:
#
# auth_plugin /path/to/auth_plugin_pyauth.so
# auth_opt_pyauth_module redis_auth
#
# Example:
#
# auth_plugin /usr/mosquitto_pyauth/auth_plugin_pyauth.so
# auth_opt_pyauth_module redis_auth
#
# Then start the daem... | 95 | 32.71 | 128 | 15 | 886 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_ed78bfea66d03ebe_01024b6b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally e... | [
51,
89
] | [
null,
null
] | [
26,
27
] | [
50,
60
] | |
2024-11-18T22:28:15.613350+00:00 | 1,294,775,243,000 | 331163211bffdb4392203ffe95aef6dd6cf8464b | 3 | {
"blob_id": "331163211bffdb4392203ffe95aef6dd6cf8464b",
"branch_name": "refs/heads/master",
"committer_date": 1294775243000,
"content_id": "d7cf65ea9ea0e49ebc9790fcdb3b165adefdebbe",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "c9675e4346f2db1ef268754b09035d7d39310121",
"extension": "p... | 2.734375 | stackv2 | from base64 import b64decode
try:
from hashlib import sha256
except ImportError: # Python < 2.5
try:
from Crypto.Hash import SHA256
sha256 = SHA256.new
except ImportError:
print "Update to python 2.5+, or install PyCrypto."
raise ImportError, "No SHA256"
from rivr.http impo... | 80 | 26.15 | 76 | 14 | 470 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_27f70bd4d6b34fec_dc49a1c3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
56
] | [
null
] | [
23
] | [
31
] | |
2024-11-18T22:44:20.563008+00:00 | 1,310,995,980,000 | c95f190520f6051cce88fd37a1375f9ceb20c327 | 3 | {
"blob_id": "c95f190520f6051cce88fd37a1375f9ceb20c327",
"branch_name": "refs/heads/master",
"committer_date": 1310995980000,
"content_id": "bb73ad752c4040aafa4b763f180e362d03427245",
"detected_licenses": [
"MIT"
],
"directory_id": "ed6244b52b8dc2648c70ed5fe1c87e50028f8aa5",
"extension": "py",
"fi... | 2.765625 | stackv2 | import hashlib, time, random
def generate_nonce(bits, randomness=None):
"This could be stronger"
if bits%8 != 0:
raise ValueError, "bits must be a multiple of 8"
nonce = hashlib.sha1(str(randomness) + str(time.time()) +
str(random.random()) ).hexdigest()
nonce = nonce[:bits/4]
... | 117 | 36.08 | 73 | 16 | 1,207 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_bf7601efee4f90c9_7dadfd00", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally ex... | [
37,
39
] | [
null,
null
] | [
39,
40
] | [
40,
41
] | |
2024-11-18T22:44:24.519619+00:00 | 1,481,470,044,000 | 615b563840dc21c45c2fbc6df66f546b7943f0cb | 3 | {
"blob_id": "615b563840dc21c45c2fbc6df66f546b7943f0cb",
"branch_name": "refs/heads/master",
"committer_date": 1481470044000,
"content_id": "83af9b993b228210be72aa5e3cde339744f38168",
"detected_licenses": [
"MIT"
],
"directory_id": "c8223d2daa74d83c6245d74118d46672c5a2c3a3",
"extension": "py",
"fi... | 3.15625 | stackv2 | #!/usr/bin/env python
#
# Initially based on sudoku-password card
#
# This software is in the public domain
#
# python password-card.py -c 100 -p 13 -n 10
#
# Alexandre Dulaunoy (a<AT>foo.be)
from optparse import OptionParser
import sys
from string import ascii_uppercase, ascii_lowercase, digits, punctuation
from ran... | 51 | 36.92 | 133 | 14 | 516 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cd9602dfd8feda21_4cc47960", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
48
] | [
null
] | [
26
] | [
32
] | |
2024-11-18T22:44:25.159893+00:00 | 1,563,267,321,000 | b425700e81323ee94ab979f8ee0b59dc629f43a3 | 3 | {
"blob_id": "b425700e81323ee94ab979f8ee0b59dc629f43a3",
"branch_name": "refs/heads/master",
"committer_date": 1563267321000,
"content_id": "18945a59ff8093eff66e51999fcf976e41f1585a",
"detected_licenses": [
"MIT"
],
"directory_id": "46175d29093d824f3563230e43d5a7af799e6549",
"extension": "py",
"fi... | 3.1875 | stackv2 | # --------------
##File path for the file
file_path
def read_file(path):
file=open(path,'r')
sentence=file.readline()
file.close()
return sentence
sample_message=read_file(file_path)
#Code starts here
# --------------
#Code starts here
file_path_1
file_path_2
message_1=read_file(file_path_1)
message... | 119 | 17.61 | 70 | 12 | 595 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_53ffaa95c8da333f_3df945e2", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec... | [
110,
111,
28,
52,
77,
99
] | [
null,
null,
null,
null,
null,
null
] | [
13,
11,
7,
7,
7,
7
] | [
23,
21,
19,
19,
19,
19
] | |
2024-11-18T22:44:47.591325+00:00 | 1,639,073,433,000 | c0252944dc5f5213e799bab96efb55e411cdeb79 | 3 | {
"blob_id": "c0252944dc5f5213e799bab96efb55e411cdeb79",
"branch_name": "refs/heads/master",
"committer_date": 1639073433000,
"content_id": "c9f11080039a39f702cf2c093843a4f62a02a3f9",
"detected_licenses": [
"MIT"
],
"directory_id": "808f0471df8fdf6c904f55169dc58c4f824ccb58",
"extension": "py",
"fi... | 2.84375 | stackv2 | #!/usr/bin/env python3
import sys
import getpass
import argparse
import json
import os
import requests
from requests.auth import HTTPBasicAuth
from jinja2 import Template
class imgRequestError(Exception):
pass
def parse_args():
"""
CLI argument handling
"""
desc = 'Generate an HTML report of C... | 93 | 31.72 | 117 | 13 | 737 | python | [{"finding_id": "codeql_py/request-without-cert-validation_d59f33cb4b46388b_651900e4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-079"
] | [
"py/request-without-cert-validation",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
70,
63
] | [
null,
null
] | [
17,
16
] | [
91,
46
] | |
2024-11-18T20:37:01.910805+00:00 | 1,516,135,417,000 | 842d9d45f95e9b66ef1f38c895a1e687ab8afc9a | 3 | {
"blob_id": "842d9d45f95e9b66ef1f38c895a1e687ab8afc9a",
"branch_name": "refs/heads/master",
"committer_date": 1516135417000,
"content_id": "10bb7d5ca798609813c1f999094e72b57462e6a7",
"detected_licenses": [],
"directory_id": "806a0d8e792f1a173c3e51bc7f75f3a1b2163ee0",
"extension": "py",
"filename": "cli... | 2.5625 | stackv2 | from flask import Flask
from flask_opentracing import FlaskTracer
import lightstep.tracer
import opentracing
import urllib2
app = Flask(__name__)
# one-time tracer initialization code
ls_tracer = lightstep.tracer.init_tracer(group_name="example client", access_token="{your_lightstep_token}")
# this tracer does not tr... | 66 | 24.41 | 108 | 13 | 403 | python | [{"finding_id": "codeql_py/partial-ssrf_d712a6a748c204d7_fa310470", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
32
] | [
null
] | [
13
] | [
33
] | |
2024-11-18T20:59:58.815570+00:00 | 1,639,557,940,000 | 9b611560f61eff9b3113e16c48dd684ca2b38c0c | 3 | {
"blob_id": "9b611560f61eff9b3113e16c48dd684ca2b38c0c",
"branch_name": "refs/heads/master",
"committer_date": 1639557940000,
"content_id": "5c4f781b74f737227d6e66bd9a42a7c921445214",
"detected_licenses": [
"MIT"
],
"directory_id": "54b4dfc5238cbfc0dc641474662e48266d748195",
"extension": "py",
"fi... | 3.0625 | stackv2 | #!/usr/bin/env python
# coding: utf-8
# # Discount Fetcher
# ## Modules:
# 1. Source website API/location
# 2. Data cleansing
# 3. Logging and reporting
# 4. Notification
# In[1]:
# !pip install html5lib
# In[2]:
import os
import requests
from dotenv import load_dotenv
# In[3]:
from bs4 import BeautifulSo... | 155 | 17.62 | 88 | 16 | 759 | python | [{"finding_id": "codeql_py/request-without-cert-validation_eaa92e32d4f52238_a43c2de5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
64
] | [
null
] | [
13
] | [
89
] | |
2024-11-18T21:01:22.309040+00:00 | 1,606,162,494,000 | 8e191b33a57e50c5e2ca4e5b4c140b18e34ba75a | 3 | {
"blob_id": "8e191b33a57e50c5e2ca4e5b4c140b18e34ba75a",
"branch_name": "refs/heads/master",
"committer_date": 1606162494000,
"content_id": "4ffb3daa84d97c8e193ec249c6b3daca76be42ac",
"detected_licenses": [
"MIT"
],
"directory_id": "3d08c317ea23fc5c10511badb2b518803db3a0ba",
"extension": "py",
"fi... | 2.8125 | stackv2 | import logging
import jinja2
def render_html_factory(som, template_paths):
"""Create a render function using a som and a list of template dirs.
:param som: site object model to use as source of contents
:param template_paths: paths where to find the templates
"""
def render_html(root_src_path, ... | 35 | 30.14 | 74 | 14 | 230 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f3c03aa371ca772e_6e8a7822", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25
] | [
null
] | [
15
] | [
48
] | |
2024-11-18T21:01:26.067584+00:00 | 1,466,464,396,000 | 05d7f686f55c96e9636faf590a37c235c15032cf | 3 | {
"blob_id": "05d7f686f55c96e9636faf590a37c235c15032cf",
"branch_name": "refs/heads/master",
"committer_date": 1466464396000,
"content_id": "b9e8d837155b0dd9b8a1011ef84578d9ca7ea363",
"detected_licenses": [
"MIT"
],
"directory_id": "4f41123b78d09f01658e29ba3646e8044ef9c8f0",
"extension": "py",
"fi... | 2.53125 | stackv2 | from flask import Flask, request, redirect, render_template, session, flash
from mysql import MySQLConnector
import re
app = Flask(__name__)
mysql = MySQLConnector(app,'emaildb')
app.secret_key = "983248g923fiohf3u29idd21321"
EMAIL_REGEX = re.compile(r'^[a-zA-Z0-9\.\+_-]+@[a-zA-Z0-9\._-]+\.[a-zA-Z]*$')
@app.route('... | 47 | 28.34 | 98 | 14 | 360 | python | [{"finding_id": "codeql_py/flask-debug_b208d628b2e7e662_3ce82592", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-117"
] | [
"py/flask-debug",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1)."
] | [
47,
44
] | [
null,
null
] | [
null,
45
] | [
20,
57
] | |
2024-11-18T21:01:30.662086+00:00 | 1,512,547,770,000 | 3b1c2104419d937f28a6065311ce3e5f8448b008 | 3 | {
"blob_id": "3b1c2104419d937f28a6065311ce3e5f8448b008",
"branch_name": "refs/heads/master",
"committer_date": 1512547770000,
"content_id": "601a1064b8c784f72e76e086b42cffb1d4d259b0",
"detected_licenses": [
"MIT"
],
"directory_id": "f2341c3b1e0d0aad971c82f4cb2eb53f507927dd",
"extension": "py",
"fi... | 2.59375 | stackv2 | import json
import requests
import random
import hashlib
#从百度申请
appid = '----------'
secretKey = '------------'
def trans(conent):
url = "http://api.fanyi.baidu.com/api/trans/vip/translate"
salt = random.randint(32768,65536)
sign = appid + conent +str(salt)+secretKey
sign = sign.encode("UTF-8")
m ... | 24 | 27.04 | 110 | 19 | 208 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_84e69c834b381979_38ffa081", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
16
] | [
null
] | [
14
] | [
18
] | |
2024-11-18T21:25:36.673595+00:00 | 1,625,855,121,000 | 583dfc01e066f98e362b6faf02d4ecf9fe1109c7 | 3 | {
"blob_id": "583dfc01e066f98e362b6faf02d4ecf9fe1109c7",
"branch_name": "refs/heads/master",
"committer_date": 1625855121000,
"content_id": "08aeca7c3e0428d68969bb798e3aff04f8cb7f24",
"detected_licenses": [
"MIT"
],
"directory_id": "c430fa5eb15dd6423b88f292b240a901bf5ab410",
"extension": "py",
"fi... | 2.6875 | stackv2 | """Update the README.md with recent stargazers."""
import json
import os
from typing import List
import requests
from jinja2 import Environment, FileSystemLoader
url: str = "https://api.github.com/graphql"
query: str = """
{
user(login: "Dineshkarthik") {
repositories(first: 100, isFork: false, isLocked: false... | 104 | 27.56 | 79 | 19 | 718 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f13879f31e9db373_58f8acc9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
92
] | [
null
] | [
11
] | [
42
] | |
2024-11-18T21:51:13.161083+00:00 | 1,554,230,087,000 | 92408cbc9c3ab5357054421d704c9c0d9d2f208c | 2 | {
"blob_id": "92408cbc9c3ab5357054421d704c9c0d9d2f208c",
"branch_name": "refs/heads/master",
"committer_date": 1554230087000,
"content_id": "aebc241f153b79969684a2d2b54eef2159a4379d",
"detected_licenses": [
"MIT"
],
"directory_id": "82d128bb0732f56e0d0934cc160cea29d9f656e8",
"extension": "py",
"fi... | 2.421875 | stackv2 | import traceback
import flask
def run_server(host, port, obj):
assert hasattr(obj, "get_http_endpoints"), "expected obj to have get_http_endpoints"
obj_functions = obj.get_http_endpoints()
app = flask.Flask(__name__)
@app.route('/', defaults={'path': ''}, methods=("GET", "POST"))
@app.route('/<p... | 37 | 34.24 | 101 | 18 | 307 | python | [{"finding_id": "codeql_py/stack-trace-exposure_30ec1c29b467f497_8b8be443", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
35
] | [
null
] | [
34
] | [
101
] | |
2024-11-18T21:51:18.633548+00:00 | 1,606,162,917,000 | 36bc5cd62c9945fb420e7a84c1a8d9e2b1e41f69 | 2 | {
"blob_id": "36bc5cd62c9945fb420e7a84c1a8d9e2b1e41f69",
"branch_name": "refs/heads/master",
"committer_date": 1606162917000,
"content_id": "5e7ef92d723e2a0ebfd82c43c938793a7d95cef9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "87080ce7f439b76565bde1dfad49c3df85cc2ea2",
"extension": "py"... | 2.46875 | stackv2 | import os
import sys
import time
import logging
import ccxt
from flask import Flask
from ccxt.base.errors import NetworkError
logger = logging.getLogger('werkzeug')
if "gunicorn" in os.environ.get("SERVER_SOFTWARE", ""):
logger = logging.getLogger("gunicorn.error")
EXCHANGE = os.getenv("EXCHANGE", None)
API_KEY ... | 120 | 30.02 | 91 | 20 | 921 | python | [{"finding_id": "codeql_py/stack-trace-exposure_3ef1a97aa5124444_606a012b", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
65,
120
] | [
null,
null
] | [
16,
5
] | [
34,
24
] | |
2024-11-18T22:00:23.744644+00:00 | 1,662,129,430,000 | d629b7003b6b9d31a0a322cdbfcc715273ce2d86 | 3 | {
"blob_id": "d629b7003b6b9d31a0a322cdbfcc715273ce2d86",
"branch_name": "refs/heads/master",
"committer_date": 1662129430000,
"content_id": "7c445031132246f7ae4b4a8a5a6c77f8c8d16121",
"detected_licenses": [
"MIT"
],
"directory_id": "171192a6e15466d084c588838e39d1d4c0661630",
"extension": "py",
"fi... | 2.703125 | stackv2 | #! /usr/bin/env python
import re
from apkcli.plugins.base import Plugin
class PluginUrls(Plugin):
name = "urls"
description = "Extract URLs from the DEX files"
def add_arguments(self, parser):
self.parser = parser
def run(self, args, a, d, dx):
dex_values = list(a.get_all_dex())
... | 25 | 28.64 | 122 | 19 | 203 | python | [{"finding_id": "codeql_py/overly-large-range_a93603fdd9df2f28_27c43a45", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
20
] | [
null
] | [
68
] | [
71
] | |
2024-11-18T22:01:12.515849+00:00 | 1,634,194,187,000 | ec96e9a89d6c2b521eef3e07c48181afeee297c7 | 2 | {
"blob_id": "ec96e9a89d6c2b521eef3e07c48181afeee297c7",
"branch_name": "refs/heads/master",
"committer_date": 1634194187000,
"content_id": "3d54523f73c77712394f86a220d892dc05f29adf",
"detected_licenses": [
"MIT"
],
"directory_id": "f11ade7c5d05f8bf438b25057044974f7a8733e2",
"extension": "py",
"fi... | 2.421875 | stackv2 | """Class of TwitterAuthWebClientInterceptor."""
from threading import Lock
from typing import List, Optional
from stweet.auth import SimpleAuthTokenProvider, AuthTokenProvider
from stweet.exceptions.too_many_requests_exception import TooManyRequestsException
from stweet.http_request import RequestsWebClient, WebClient... | 88 | 41.31 | 93 | 15 | 817 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_aa09116fbee258e0_086c2e4e", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://api.twitter.com](1) may be at an arbitrary posi... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [http://api.twitter.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [https://api.twitter.com](1) may be at an arbitrary position in the sanitized URL."
] | [
45,
46
] | [
null,
null
] | [
16,
19
] | [
63,
67
] | |
2024-11-18T22:15:07.542134+00:00 | 1,674,135,460,000 | 3ec20f047fba9ed2ec1026ca82340436b68e7bac | 3 | {
"blob_id": "3ec20f047fba9ed2ec1026ca82340436b68e7bac",
"branch_name": "refs/heads/master",
"committer_date": 1674135460000,
"content_id": "66ba21c4a51d45cc7f6549b3142c476539617847",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "704bff0cb5c5c500dda60b3ebe2882f455f710ae",
"extension": "p... | 3.03125 | stackv2 | # Author: Harold Clark
# Copyright Harold Clark 2019
#
from database import database
from person import person
from operator import attrgetter
import sys
import os
class employee(person):
"""employee object subclassed from person"""
def __init__(self,
eid=None,
firstname=None... | 187 | 30.98 | 104 | 16 | 1,319 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_71413a16b45f9a1c_2a7924d7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
185
] | [
null
] | [
11
] | [
12
] | |
2024-11-18T22:25:59.322363+00:00 | 1,647,430,922,000 | 2fa502b70c3aa2c00c2b32a12b41bdee225cf774 | 3 | {
"blob_id": "2fa502b70c3aa2c00c2b32a12b41bdee225cf774",
"branch_name": "refs/heads/master",
"committer_date": 1647430922000,
"content_id": "03c7d02456f939aaa55186bf29b6fde38bf7eaa6",
"detected_licenses": [
"MIT"
],
"directory_id": "dc64ef12ec9062a7de187a3ab8bef202b3ff2127",
"extension": "py",
"fi... | 2.5625 | stackv2 | import requests
import json
import spacy
from prodigy import get_config
rest_url = "http://ske.herkules.arz.oeaw.ac.at/run.cgi"
spacy_model = "de_core_news_sm"
config = get_config()
try:
user = config['api_keys']['ske_user']
except KeyError:
user = "user"
try:
pw = config['api_keys']['ske_pw']
except Key... | 83 | 28.81 | 81 | 15 | 603 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_868036755ba52a33_4aecd4a5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
78
] | [
null
] | [
11
] | [
15
] | |
2024-11-18T22:26:00.187734+00:00 | 1,607,728,338,000 | 519e35b9bee4e71287a478ea6f026dd15001e641 | 3 | {
"blob_id": "519e35b9bee4e71287a478ea6f026dd15001e641",
"branch_name": "refs/heads/master",
"committer_date": 1607728338000,
"content_id": "63cadd7c32555dd50890283bfbd6126d01b2cd55",
"detected_licenses": [
"MIT"
],
"directory_id": "fdf7a5c98b3b4127bc1dedbd91f5815f32e05d62",
"extension": "py",
"fi... | 2.546875 | stackv2 | import requests
import urllib.parse
import os
import time
import sys
import yaml
import re
from sqlalchemy.sql import text
from sqlalchemy.ext.declarative import declarative_base
from sqlalchemy import create_engine, MetaData, Table
from sqlalchemy.orm import sessionmaker, mapper
if len(sys.argv) != 2:
print("Us... | 226 | 32.36 | 149 | 16 | 1,909 | python | [{"finding_id": "codeql_py/request-without-cert-validation_d850d0d6c541bb0a_a5c7944f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
205
] | [
null
] | [
13
] | [
78
] | |
2024-11-18T22:26:23.544325+00:00 | 1,568,100,651,000 | 043ff67491f1cf60cc61df674092096e4d40d18c | 3 | {
"blob_id": "043ff67491f1cf60cc61df674092096e4d40d18c",
"branch_name": "refs/heads/master",
"committer_date": 1568100651000,
"content_id": "2ed1b30f4ee72d0c4a40199a1052c00033d3daf7",
"detected_licenses": [
"MIT"
],
"directory_id": "ccc58ba90a41f24b80936ef328aa5cb7424aa72e",
"extension": "py",
"fi... | 2.796875 | stackv2 | import pymongo
from pymongo.errors import DuplicateKeyError
from flask import Flask, jsonify, request
from check_hash_server import check_hash_server
from search_db import searchdb
import logging
app = Flask(__name__)
logging.basicConfig(filename="database_server_log.txt",
format='%(asctime)s %(m... | 164 | 29.59 | 74 | 22 | 1,112 | python | [{"finding_id": "codeql_py/log-injection_5072a2eb5d49f1e1_994cfafe", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
129,
149
] | [
null,
null
] | [
53,
62
] | [
55,
68
] | |
2024-11-18T22:26:26.286044+00:00 | 1,682,973,176,000 | 70a9eb2d3139faec04ef7daa89342f13f525cb8d | 2 | {
"blob_id": "70a9eb2d3139faec04ef7daa89342f13f525cb8d",
"branch_name": "refs/heads/master",
"committer_date": 1683589554000,
"content_id": "f9ed4fb915e3efcea96f09fb882d8a605d48ca4a",
"detected_licenses": [
"MIT"
],
"directory_id": "14386bc6bfa3edb5240cee6e0abe983660f6f4b5",
"extension": "py",
"fi... | 2.390625 | stackv2 | import os
import uuid
import zipfile
from flask import Flask, request, render_template, jsonify, redirect, url_for
from constants import DEFAULT_ERROR_MESSAGE
from utils import get_parsed_file, empty_directory
app = Flask(__name__)
IS_PROD = os.environ.get("IS_PROD", False)
def allowed_file(filename):
allowed_... | 93 | 29.33 | 106 | 17 | 605 | python | [{"finding_id": "codeql_py/stack-trace-exposure_7a051d542248dde3_c3f0af5a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-022",
"CWE-022"
] | [
"py/stack-trace-exposure",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
70,
41,
46
] | [
null,
null,
null
] | [
20,
19,
23
] | [
28,
31,
35
] | |
2024-11-18T20:39:41.026490+00:00 | 1,629,388,914,000 | 28d5bbcb8bd10860d0b4e7073a17616e4db29463 | 3 | {
"blob_id": "28d5bbcb8bd10860d0b4e7073a17616e4db29463",
"branch_name": "refs/heads/master",
"committer_date": 1629388914000,
"content_id": "ae73da620f0c3cec67649af9df410f0c9ddf647f",
"detected_licenses": [
"MIT"
],
"directory_id": "1408fc7fea7d92e93e97dae5f8dc154f8a53dc17",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/env python3
# Script to initialize database and users, from the siteconfig.json file
import json
import os.path
import sqlite3
import hashlib
import random
import string
siteconfig = json.load(open(os.environ.get("LEXONOMY_SITECONFIG",
"siteconfig.json"), encodin... | 55 | 38.89 | 116 | 14 | 536 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_706fb5fdd1cbc67b_0321fb79", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
51,
47
] | [
null,
null
] | [
15,
29
] | [
93,
53
] | |
2024-11-18T20:39:59.859088+00:00 | 1,610,520,206,000 | 1d252437158d06cd408539be78756df5e909ab7f | 3 | {
"blob_id": "1d252437158d06cd408539be78756df5e909ab7f",
"branch_name": "refs/heads/master",
"committer_date": 1610520206000,
"content_id": "c73d7a725952303e8d3850097c8908317ac79903",
"detected_licenses": [
"MIT"
],
"directory_id": "13e26d0e870e32aded067bbdb70563b3bc276ea5",
"extension": "py",
"fi... | 2.65625 | stackv2 | # -*- coding: utf-8 -*-
# Form implementation generated from reading ui file 'Interface.ui'
#
# Created by: PyQt5 UI code generator 5.14.2
#
# WARNING! All changes made in this file will be lost!
from PyQt5 import QtCore, QtGui, QtWidgets
import pyqtgraph as pg
import requests
from datetime import datetime
alpha_v... | 147 | 40.44 | 115 | 17 | 1,333 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ad320bec12c7e308_b0bcca38", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
78,
81
] | [
null,
null
] | [
15,
15
] | [
58,
65
] | |
2024-11-18T20:52:12.516482+00:00 | 1,566,324,962,000 | 522f1d77ed9239ac4bf1e2ba5aa4d7c0604b43eb | 3 | {
"blob_id": "522f1d77ed9239ac4bf1e2ba5aa4d7c0604b43eb",
"branch_name": "refs/heads/master",
"committer_date": 1566324962000,
"content_id": "531999fc3c153faaa6bd6fe70d704e56918069ac",
"detected_licenses": [
"MIT"
],
"directory_id": "39b197b6c6b8c594b6e3313c818d2d29dbe11413",
"extension": "py",
"fi... | 2.734375 | stackv2 | import aiohttp
import aiofiles
import asyncio
import os
async def download_html(session: aiohttp.ClientSession, url: str):
# Get http
async with session.get(url, ssl=False) as res:
filename = f'output/{os.path.basename(url)}.html'
# Async write to file, using url as filename
async with... | 56 | 22.77 | 66 | 16 | 320 | python | [{"finding_id": "codeql_py/request-without-cert-validation_ff615973785ca9b4_bcf625fc", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
9
] | [
null
] | [
16
] | [
43
] | |
2024-11-18T20:52:18.923227+00:00 | 1,637,373,938,000 | 8b883e0155a415328cba1353357bac0f7a3ca102 | 3 | {
"blob_id": "8b883e0155a415328cba1353357bac0f7a3ca102",
"branch_name": "refs/heads/master",
"committer_date": 1637373938000,
"content_id": "b9ec889c3f3a1ed171a606712df98add2f25cbd3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6ee06ad2bbc15cc0f829f99198947ffe8cffe395",
"extension": "py"... | 2.765625 | stackv2 | # -*- coding:utf-8 -*-
import os
import json
import requests
import threading
from ..randheader.randheader import get_ua
STATUS_CODES = [200, 206, 401, 305, 407] # HTTP响应状态码,判断认为存在风险链接的状态码
RESULT = []
THREADMAX = threading.BoundedSemaphore(32) # 限制线程的最大数量为32个
def get_html(url=''):
"""
判断URL访问是否... | 86 | 23.53 | 109 | 15 | 588 | python | [{"finding_id": "codeql_py/request-without-cert-validation_04aaee6ca857a2ed_99781bff", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
35
] | [
null
] | [
24
] | [
107
] | |
2024-11-18T21:08:09.565972+00:00 | 1,646,696,264,000 | 5e888f3581b308cf6a271fa03a980dba907bd298 | 2 | {
"blob_id": "5e888f3581b308cf6a271fa03a980dba907bd298",
"branch_name": "refs/heads/master",
"committer_date": 1646696264000,
"content_id": "f7af14d1c97fd868a5c267d974be586b812342ac",
"detected_licenses": [
"MIT"
],
"directory_id": "19a1a1077cab71e48b8a04482d790bd20b17037e",
"extension": "py",
"fi... | 2.421875 | stackv2 | import json
from importlib import import_module
import six
from django.conf import settings
from django.core.exceptions import ImproperlyConfigured
from rest_framework import serializers
from task_api.models import TaskInfo
from task_api.params import ParameterNotValidError
BACKGROUND_TASKS = getattr(settings, 'TASK... | 72 | 37.1 | 120 | 18 | 544 | python | [{"finding_id": "codeql_py/stack-trace-exposure_bf5e3e519a50f141_aedf0432", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
67
] | [
null
] | [
51
] | [
110
] | |
2024-11-18T21:08:17.488880+00:00 | 1,595,650,634,000 | a30cfbe9a009c9c04bd8c6833aec8fed21d1a1b5 | 3 | {
"blob_id": "a30cfbe9a009c9c04bd8c6833aec8fed21d1a1b5",
"branch_name": "refs/heads/master",
"committer_date": 1595650634000,
"content_id": "c32e4e827a293348a058cb2ecae6939822b564d3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bc7387a0892f441918f6ee4f861060d1619ad808",
"extension": "py"... | 2.546875 | stackv2 | #!/usr/bin/python3
# Inspired by:
# - https://github.com/sagaragarwal94/python_rest_flask/blob/master/server.py
# - https://www.codementor.io/sagaragarwal94/building-a-basic-restful-api-in-python-58k02xsiq
# - https://blog.miguelgrinberg.com/post/designing-a-restful-api-with-python-and-flask
from flask import F... | 124 | 35.29 | 112 | 19 | 1,065 | python | [{"finding_id": "codeql_py/sql-injection_95df07c9eb05df45_8f805c12", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
90
] | [
95
] | [
30
] | [
36
] | |
2024-11-18T21:08:19.251189+00:00 | 1,592,926,118,000 | 371b41f5eb84ee0b2e8154a57d81df929f310220 | 2 | {
"blob_id": "371b41f5eb84ee0b2e8154a57d81df929f310220",
"branch_name": "refs/heads/master",
"committer_date": 1592926118000,
"content_id": "8dfc125eefe08735fc7cff613ddc162c492c9666",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "afdabf47805d81586e1f7e507437fac3a5fbbe5c",
"extension": "py"... | 2.40625 | stackv2 | from bcrypt import checkpw
from flask import jsonify, render_template, redirect, request, url_for, flash
from flask_login import current_user, login_required, login_user, logout_user
from app import db, login_manager
from app.base.models import User
from app.users import blueprint
from app.users.utils import save_pic... | 122 | 31.24 | 100 | 17 | 837 | python | [{"finding_id": "codeql_py/url-redirection_e8a7d2e28b8fe18c_7aefeb15", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
23
] | [
null
] | [
29
] | [
38
] | |
2024-11-18T21:08:23.400605+00:00 | 1,549,457,205,000 | a11ecefc3094b718e36a81a8fc2ff641395c9e6c | 3 | {
"blob_id": "a11ecefc3094b718e36a81a8fc2ff641395c9e6c",
"branch_name": "refs/heads/master",
"committer_date": 1549457205000,
"content_id": "fcc0a5522da8201e5973bda162b74b3be674a90e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e70b71ca8cb2c651182bc110d5b68249a15a8c93",
"extension": "py"... | 2.765625 | stackv2 | from .._display import session_line
# TODO: document
def extract(filepath, verbose=True):
import bz2
import tarfile
import os
with session_line("Extracting {}... ".format(filepath), disable=not verbose):
try:
tar = tarfile.open(filepath)
tar.extractall()
f... | 34 | 23.09 | 81 | 16 | 171 | python | [{"finding_id": "codeql_py/tarslip_09506a3ba7f6f574_c3d44cda", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
14
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T21:31:32.344660+00:00 | 1,634,027,184,000 | 09217f29e1854cc8e616919b9d0add6676f4558f | 3 | {
"blob_id": "09217f29e1854cc8e616919b9d0add6676f4558f",
"branch_name": "refs/heads/master",
"committer_date": 1634027184000,
"content_id": "5f4ed6919394663ddab1e36dd4910442e268fd89",
"detected_licenses": [
"MIT"
],
"directory_id": "b9bc4a0bfbd61499583debd27e00aa0e2cb50c94",
"extension": "py",
"fi... | 3.34375 | stackv2 | ################################################
# The vocalAssistant python module defines the
# vocal assistant for the imtreat python package
################################################
import pyttsx3
# Specified class to define the vocal assistance
class vocalAssistantClass:
# Initialize a vocalAssistantCl... | 76 | 24.87 | 78 | 13 | 471 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b2210aa01c11cf0e_769c0408", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
54
] | [
null
] | [
10
] | [
40
] | |
2024-11-18T21:31:59.110535+00:00 | 1,482,353,276,000 | e04d8d167ae89b244867a833f18f03394db13a04 | 3 | {
"blob_id": "e04d8d167ae89b244867a833f18f03394db13a04",
"branch_name": "refs/heads/master",
"committer_date": 1482353276000,
"content_id": "68f4d2a45062c3b629ef38ad0718c37ef6451a09",
"detected_licenses": [
"MIT"
],
"directory_id": "01b3c74df48671032fa0fe403224304832ee7be6",
"extension": "py",
"fi... | 2.546875 | stackv2 | from flask import render_template, redirect, url_for, request, abort
from urllib.parse import urlparse, urljoin
from imp_flask.blueprints import home_index
from imp_flask.forms.login import Login
from imp_flask.core.auth import do_login, do_logout
from imp_flask.core import flash
# See http://flask.pocoo.org/snippet... | 43 | 33.67 | 115 | 16 | 330 | python | [{"finding_id": "codeql_py/url-redirection_a5a8ddb367d8e63f_ed6c165d", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
34
] | [
null
] | [
29
] | [
59
] | |
2024-11-18T21:33:01.274457+00:00 | 1,581,027,314,000 | be431e112c09388931411e5a556643530bc54a2f | 3 | {
"blob_id": "be431e112c09388931411e5a556643530bc54a2f",
"branch_name": "refs/heads/master",
"committer_date": 1581027573000,
"content_id": "515b472a088aa7c812216abdea0c44ce3bcd8adc",
"detected_licenses": [
"MIT"
],
"directory_id": "f4bce8a845723044857d3f0f0699eef66d540d64",
"extension": "py",
"fi... | 3 | stackv2 | """
Common utilities.
"""
from os.path import basename, normpath
import pathlib
from shutil import copyfileobj
from urllib.error import HTTPError
from urllib.request import urlopen
import zipfile
import tarfile
from sklearn.datasets import get_data_home
def fetch_file(dataname, urlname, subfolder=None, data_home=Non... | 164 | 27.3 | 77 | 15 | 989 | python | [{"finding_id": "codeql_py/tarslip_843faced7c15852a_036afa3f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
101
] | [
null
] | [
13
] | [
28
] | |
2024-11-18T21:33:06.918694+00:00 | 1,602,441,241,000 | a410cbf27e60ff58c79f63a678037aec0c008739 | 3 | {
"blob_id": "a410cbf27e60ff58c79f63a678037aec0c008739",
"branch_name": "refs/heads/main",
"committer_date": 1602441241000,
"content_id": "0df14b6b0ee435701e49d0c5778329cbc020eafc",
"detected_licenses": [
"MIT"
],
"directory_id": "7be8d70e493e50424a08fb7851c91980177ec6ef",
"extension": "py",
"file... | 2.84375 | stackv2 | import nltk
from nltk.corpus import stopwords
from nltk.cluster.util import cosine_distance
from nltk import sent_tokenize
from nltk import word_tokenize
from nltk.corpus import words
import numpy as np
import networkx as nx
from collections import Counter
import re
def deEmojify(text):
regrex_pattern = re.compile... | 125 | 36.29 | 83 | 13 | 1,107 | python | [{"finding_id": "codeql_py/overly-large-range_2d6d4269897f4f0d_25389883", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class."
] | [
14,
14,
14
] | [
null,
null,
null
] | [
35,
38,
41
] | [
39,
42,
45
] | |
2024-11-18T22:26:06.552571+00:00 | 1,603,994,673,000 | a94265b332b4f15e06461e9d9318859eaee506a5 | 2 | {
"blob_id": "a94265b332b4f15e06461e9d9318859eaee506a5",
"branch_name": "refs/heads/master",
"committer_date": 1603994673000,
"content_id": "aaf6833bccc77143b54950e732fcc21a373768c0",
"detected_licenses": [
"MIT"
],
"directory_id": "e923d2e6177718ca6d23d419c954e119a9236f84",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/env python3
# Utility to set the home position
# Date Who Description
# =============================================================================
# 09/29/20 NH Initial commit, fixed args
from pymavlink import mavutil
import datetime as dt
import argparse
import time
import serial
import pynmea2
impo... | 78 | 31.42 | 174 | 16 | 766 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_624726987903e01f_f0f670a2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
46
] | [
null
] | [
8
] | [
22
] | |
2024-11-18T22:42:08.982535+00:00 | 1,346,799,942,000 | 937fd1735662f339c25129c041d134f5bf1ce8b4 | 3 | {
"blob_id": "937fd1735662f339c25129c041d134f5bf1ce8b4",
"branch_name": "refs/heads/master",
"committer_date": 1346799942000,
"content_id": "6b74501d78c1933c268ed1ae796c7a5e9e53b5c2",
"detected_licenses": [
"MIT"
],
"directory_id": "a73c128361b37300259c131dfd3e063ccd6f1e31",
"extension": "py",
"fi... | 2.75 | stackv2 | #!/usr/bin/python
import sys
import paramiko
from datetime import date
from optparse import OptionParser
MONTHLY_CAP = float(250000)
DAILY_CAP = MONTHLY_CAP/30
def get_ssh_conn():
key = paramiko.RSAKey.from_private_key_file('/var/lib/nagios/.ssh/id_rsa')
ssh=paramiko.SSHClient()
ssh.set_missing_host_key_... | 113 | 34.24 | 109 | 14 | 1,191 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_69497255418f70d0_04de0333", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
14
] | [
null
] | [
5
] | [
62
] | |
2024-11-18T22:42:10.910682+00:00 | 1,619,299,319,000 | f53e3119d2508b1da4248ccc6cdcf5a2bcf10e6f | 3 | {
"blob_id": "f53e3119d2508b1da4248ccc6cdcf5a2bcf10e6f",
"branch_name": "refs/heads/master",
"committer_date": 1619299319000,
"content_id": "794cf44882962f9234b2b0838423c7435a230281",
"detected_licenses": [
"MIT"
],
"directory_id": "e9e4b6eee59db271aa3c0ba23ce3d1517f370565",
"extension": "py",
"fi... | 2.671875 | stackv2 | import praw, pickle
from requests_html import HTMLSession
from psaw import PushshiftAPI
class Crawler:
def __init__(self, cid, sec, user, pwd, uage):
"""
A crawler object based on the praw Reddit class.
"""
self.reddit = praw.Reddit(client_id= cid,
... | 117 | 36.6 | 130 | 18 | 902 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_81285d37be89f91b_a8714083", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://imgur.com](1) may be at an arbitrary position i... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [http://imgur.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [https://imgur.com](1) may be at an arbitrary position in the sanitized URL."
] | [
40,
40
] | [
null,
null
] | [
12,
56
] | [
52,
97
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.