added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T20:31:25.795104+00:00 | 1,616,963,985,000 | 78388d3eb547f55cf1dffe7a13bd1321020f6967 | 3 | {
"blob_id": "78388d3eb547f55cf1dffe7a13bd1321020f6967",
"branch_name": "refs/heads/main",
"committer_date": 1616963985000,
"content_id": "1eab881fce150ec34aaf8b04d6edb99f03f5d14a",
"detected_licenses": [
"MIT"
],
"directory_id": "c2d3c690a4b21091eed6039b778baa286d428a5d",
"extension": "py",
"file... | 2.796875 | stackv2 | """
This script generates an OAuth2 refresh token for the Google Fit API.
Use this script to generate a 'secrets' JSON blob for the Fivetran connector.
"""
import argparse
import json
import requests
from urllib.parse import urlparse, parse_qs
SCOPES = 'https://www.googleapis.com/auth/fitness.activity.read'
REDIR... | 77 | 29.09 | 79 | 12 | 542 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c70b02ce60c52c7f_ff116872", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
66
] | [
null
] | [
11
] | [
40
] | |
2024-11-18T20:31:50.052328+00:00 | 1,506,438,863,000 | 1d7190072519eacd894b775d3c4a703b5cd386a2 | 3 | {
"blob_id": "1d7190072519eacd894b775d3c4a703b5cd386a2",
"branch_name": "refs/heads/master",
"committer_date": 1506438863000,
"content_id": "0a287122fa489412a101ff3a451c84a14ca5cd57",
"detected_licenses": [
"MIT"
],
"directory_id": "2d64d46d2b8afb8332622618b8e944ffc9ba62bd",
"extension": "py",
"fi... | 2.515625 | stackv2 | import os
import re
from flask import Flask, render_template, redirect, url_for, abort, request
from create_post import read_file, md_to_html, get_file_date
from ConfigParser import SafeConfigParser
from datetime import date, datetime
app = Flask(__name__)
parser = SafeConfigParser()
parser.read('config.txt')
posts =... | 124 | 32.69 | 101 | 14 | 972 | python | [{"finding_id": "codeql_py/path-injection_a64d2c71a45afaf4_97dcc9cd", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
113
] | [
null
] | [
44
] | [
48
] | |
2024-11-18T20:31:50.368768+00:00 | 1,643,884,757,000 | 791756570424b0dceb0ee7cff4ed31a1c91fcc94 | 3 | {
"blob_id": "791756570424b0dceb0ee7cff4ed31a1c91fcc94",
"branch_name": "refs/heads/master",
"committer_date": 1643884757000,
"content_id": "50b2bd18f086b828da0cb8186db7e1c1172714d9",
"detected_licenses": [
"MIT"
],
"directory_id": "259460171c62f27eaa7bf2d03e25f1e9f0ed118b",
"extension": "py",
"fi... | 2.71875 | stackv2 | import random
import jinja2
jinja_env = jinja2.Environment()
jinja_env.undefined = jinja2.StrictUndefined
# Fix an issue where 'random' filter is being inlined, resulting in the
# same value being generated every time.
# cf https://github.com/pallets/jinja/pull/478
@jinja2.pass_context
def do_random(context, seq)... | 25 | 22.44 | 71 | 12 | 138 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_1478b2c0ba7f08c0_e6d039da", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
6
] | [
null
] | [
13
] | [
33
] | |
2024-11-18T20:53:38.832029+00:00 | 1,596,493,863,000 | 18db63aeb018cdf35e882d142d6029cb77b7adbf | 3 | {
"blob_id": "18db63aeb018cdf35e882d142d6029cb77b7adbf",
"branch_name": "refs/heads/master",
"committer_date": 1596493863000,
"content_id": "a1bff860c5345364212d0660d73ac421a98ad5ed",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "de6660c1649f7fb723b5c9ad63e2bb97d66b4edd",
"extension": "py",
... | 2.5625 | stackv2 | import urllib.request
from bs4 import BeautifulSoup
import csv
from time import sleep
import requests
import ssl
ssl._create_default_https_context = ssl._create_unverified_context
manifest_arr = []
def scrape_for_page(base_url):
flg = True
page = 1
while flg:
sleep(1)
url = base_url +... | 75 | 21.83 | 77 | 17 | 448 | python | [{"finding_id": "codeql_py/request-without-cert-validation_9218d07399f79c6a_a266ff11", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
27
] | [
null
] | [
13
] | [
44
] | |
2024-11-18T21:10:25.052788+00:00 | 1,593,189,160,000 | 37b5bc26d420ef012827e8d7db24acd23f8ab6c8 | 2 | {
"blob_id": "37b5bc26d420ef012827e8d7db24acd23f8ab6c8",
"branch_name": "refs/heads/master",
"committer_date": 1593189160000,
"content_id": "db1117f4654e4dd0f7bb81fa2987014d923792a2",
"detected_licenses": [
"MIT"
],
"directory_id": "03a19f1b29630ee2ee1a028eb281e2c8addf7759",
"extension": "py",
"fi... | 2.46875 | stackv2 | from flask import Flask, render_template, send_file, send_from_directory, request
import os
import stat
app = Flask(__name__)
app.config['UPLOAD_FOLDER'] = 'C:/Users/MAHIEDHAR NANDYALA/Desktop/'
app.config['MAX_CONTENT-PATH'] = 500
# Make the WSGI interface available at the top level so wfastcgi can get it.
wsgi_app ... | 57 | 32.18 | 89 | 16 | 444 | python | [{"finding_id": "codeql_py/flask-debug_be1066790b4c2e8f_3f23de04", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 6 | true | [
"CWE-215",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-pro... | [
57,
32,
33,
38,
44,
53
] | [
null,
null,
null,
null,
null,
null
] | [
5,
22,
31,
23,
46,
16
] | [
49,
36,
45,
37,
54,
26
] | |
2024-11-18T21:11:16.981622+00:00 | 1,378,538,826,000 | 64595eca07a54760db3b4b7684f853e020a225ba | 2 | {
"blob_id": "64595eca07a54760db3b4b7684f853e020a225ba",
"branch_name": "refs/heads/master",
"committer_date": 1378538826000,
"content_id": "a5ded05e0345e600b1b03fdd89d5b02961ff121d",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "b8581b4aa5e06e85ccd274f7980c9f7d8be174fe",
"extension": "p... | 2.328125 | stackv2 | import httplib
import logging
import socket
import requests
import requests.exceptions
import requests.packages.urllib3.exceptions
from tasa.store import Queue
from tasa.worker import BaseWorker
CONNECTION_TIMEOUT = 10
logger = logging.getLogger(__name__)
class PrecheckHTTP(BaseWorker):
qinput = Queue('preche... | 102 | 35.38 | 80 | 19 | 807 | python | [{"finding_id": "codeql_py/request-without-cert-validation_cc358f5f34b5a33f_017f644e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
26,
68
] | [
27,
69
] | [
17,
17
] | [
43,
43
] | |
2024-11-18T21:47:40.639449+00:00 | 1,570,611,266,000 | c801a122fc68ce228035e4cdebf80f3ca078e5b4 | 2 | {
"blob_id": "c801a122fc68ce228035e4cdebf80f3ca078e5b4",
"branch_name": "refs/heads/master",
"committer_date": 1570611266000,
"content_id": "c805c239f9963d1aa645dd78dde14e2531dc1495",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a345cea74f69f61d5b29f7ac8b2fe031df9e9519",
"extension": "py"... | 2.375 | stackv2 | #! -*- coding: utf-8 -*-
import json
import logging
import tornado.web
from tornado.httpserver import HTTPServer
from segment import Segment
PORT = 3333
logging.basicConfig(level='INFO')
segment = Segment(words_path='/data/gump/project-data/machinery_segment/word_tree.json')
class MachinerySegmentHandler(tornado.we... | 43 | 31.02 | 88 | 16 | 300 | python | [{"finding_id": "codeql_py/log-injection_6ce77945d74f1997_87b94a21", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
21
] | [
null
] | [
30
] | [
66
] | |
2024-11-18T21:47:42.627288+00:00 | 1,532,849,436,000 | f5584134e5445dfabe5cb756c18fdea281454e47 | 3 | {
"blob_id": "f5584134e5445dfabe5cb756c18fdea281454e47",
"branch_name": "refs/heads/master",
"committer_date": 1532849436000,
"content_id": "5006d6ad58ee612d04045d071ab63cf5ffdc2900",
"detected_licenses": [
"MIT"
],
"directory_id": "8e345f38d01009811aa29aebdbde4cdaf8d56b5f",
"extension": "py",
"fi... | 2.625 | stackv2 | from logging import basicConfig, getLogger, DEBUG, INFO
import os, sys, json
from SimpleHTTPServer import SimpleHTTPRequestHandler
import SocketServer
import gitlab
basicConfig(level=DEBUG)
getLogger('urllib3').setLevel(INFO)
logger = getLogger(__name__)
# ---------------------------
# Gitlab service
# --------------... | 137 | 29.38 | 91 | 16 | 1,003 | python | [{"finding_id": "codeql_py/log-injection_cf2c0a51f7be59c7_281b67f0", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
54,
58,
58
] | [
null,
null,
null
] | [
40,
42,
49
] | [
52,
47,
54
] | |
2024-11-18T21:47:43.663293+00:00 | 1,607,314,005,000 | bc14cb99d2a86964ec0a75ee5f0cec891df2beba | 2 | {
"blob_id": "bc14cb99d2a86964ec0a75ee5f0cec891df2beba",
"branch_name": "refs/heads/master",
"committer_date": 1607314005000,
"content_id": "67edef1b4281b8eecd1fb867ec7c4251a6833390",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5bf1bc86ebc43462502df4092fb120060e040967",
"extension": "py"... | 2.421875 | stackv2 | #!/usr/bin/env python
#
# utility that creates a folder that contains the common folder and
# all the files of the example
#
from sys import argv
import re
import sys
import os
import os.path
path = os.getcwd()
actual_folder = path
folder_created = path + '_backup'
route = argv[0].split('common')
if(not os.path.i... | 75 | 20.91 | 114 | 20 | 464 | python | [{"finding_id": "codeql_py/overly-permissive-file_cd9d50cea1974f5c_bcdf5a88", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
23
] | [
null
] | [
2
] | [
33
] | |
2024-11-18T22:28:56.441099+00:00 | 1,595,209,071,000 | 28d5f32afbefbb5137a0c94851de809cfdb40cb4 | 3 | {
"blob_id": "28d5f32afbefbb5137a0c94851de809cfdb40cb4",
"branch_name": "refs/heads/master",
"committer_date": 1595209071000,
"content_id": "cf4e703d59f728c372edc257aee99590897aa084",
"detected_licenses": [
"MIT"
],
"directory_id": "d9e6190c487dea22e038658d6acc4af77ce3ff0a",
"extension": "py",
"fi... | 2.578125 | stackv2 | import wk
class NodeMetaClass(type):
def __new__(cls, name, bases, attrs):
debug=False
if name == None:
debug=True
dict_attrs=['_attrs','environment']
for name in dict_attrs:
if name in attrs.keys():
_attrs = attrs[name]
tmp_d... | 417 | 26.63 | 132 | 20 | 2,458 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_838f9f8586d2be3b_9fc87d48", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
160
] | [
null
] | [
15
] | [
28
] | |
2024-11-18T22:29:35.770323+00:00 | 1,347,995,879,000 | a2a3952272cfe24836c4193594125ddfa79f56a6 | 3 | {
"blob_id": "a2a3952272cfe24836c4193594125ddfa79f56a6",
"branch_name": "refs/heads/master",
"committer_date": 1347995879000,
"content_id": "ebde24af41c32559d664d4d8af03b19f0abb2912",
"detected_licenses": [
"MIT"
],
"directory_id": "30e70a7b27351672274fb273e7885d8bfb48df16",
"extension": "py",
"fi... | 2.875 | stackv2 | from oauth import oauth
from oauthtwitter import OAuthApi
import pprint
consumer_key = "" # TODO put your consumer_key
consumer_secret = ""# TODO put your consumer_secret
twitter = OAuthApi(consumer_key, consumer_secret)
# Get the temporary credentials for our next few calls
temp_credentials = twitter.getRequestToke... | 21 | 34.67 | 71 | 8 | 160 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1f14ec5b1650bc54_4609ef4f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
19,
20
] | [
null,
null
] | [
7,
7
] | [
52,
66
] | |
2024-11-18T22:29:37.758074+00:00 | 1,590,731,292,000 | 4f302e977ca9b8226e2af75fe1118dfd58cbb446 | 3 | {
"blob_id": "4f302e977ca9b8226e2af75fe1118dfd58cbb446",
"branch_name": "refs/heads/master",
"committer_date": 1590731292000,
"content_id": "f9f4a0b4d6afa6a657d0fe33389f9dd8104793d3",
"detected_licenses": [
"MIT"
],
"directory_id": "f0854088824dce4c897c66788cbd5edf5671925a",
"extension": "py",
"fi... | 2.84375 | stackv2 | import re
import nltk
from typing import List
# TODO: Fix pathing of this
try:
nltk.data.find('stopwords')
nltk.data.find('wordnet')
nltk.data.find('averaged_perceptron_tagger')
except LookupError:
nltk.download('stopwords')
nltk.download('wordnet')
nltk.download('averaged_perceptron_tagger')
... | 230 | 31.77 | 95 | 21 | 1,851 | python | [{"finding_id": "codeql_py/overly-large-range_1aceb75bdfe717da_f3166992", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range ... | [
84,
84,
84,
84
] | [
null,
null,
null,
null
] | [
26,
29,
32,
41
] | [
30,
33,
36,
45
] | |
2024-11-18T22:40:26.220487+00:00 | 1,553,017,635,000 | 34b4c7a1c76d6ab3be86bd4b4305105356ecc929 | 2 | {
"blob_id": "34b4c7a1c76d6ab3be86bd4b4305105356ecc929",
"branch_name": "refs/heads/master",
"committer_date": 1553017635000,
"content_id": "15e2ca20e82b2e316bfb57eac19af569eb30472a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d41f2ecb7e44dc9693696be204e63eac731c308d",
"extension": "py"... | 2.46875 | stackv2 | from __future__ import print_function
import base64
import json
from shutil import which
from time import sleep
from blessings import Terminal
from kubernetes import client, config
from kubernetes.client.rest import ApiException
from nephos.helpers.misc import execute, input_files, pretty_print
TERM = Terminal()
... | 320 | 31.33 | 104 | 17 | 2,350 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fc4cd28c8e4c432d_defd9844", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
253
] | [
null
] | [
15
] | [
74
] | |
2024-11-18T22:40:33.782903+00:00 | 1,610,988,347,000 | 9de1106a5491a9266fb0fdc8bf29a5cc168e0bc3 | 3 | {
"blob_id": "9de1106a5491a9266fb0fdc8bf29a5cc168e0bc3",
"branch_name": "refs/heads/main",
"committer_date": 1610988347000,
"content_id": "376c6a1b10bb5ce4e3b9292beeafe96baaf61830",
"detected_licenses": [
"MIT"
],
"directory_id": "82011c23c8c874223bb22a41d94381a5dbd84875",
"extension": "py",
"file... | 2.625 | stackv2 | import os
import csv
from flask import Flask, request
server = Flask(__name__)
@server.route("/analyze", methods = ['POST'])
def analyze():
data = request.get_json(force=True)
file_name = data['input_file_name']
with open("../" + file_name) as f:
return f.read(), 200
@server.route("/status/<id>")
... | 28 | 31.68 | 122 | 16 | 268 | python | [{"finding_id": "codeql_py/path-injection_a2f181e260271d57_c30a81de", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
10,
17
] | [
null,
null
] | [
15,
15
] | [
32,
70
] | |
2024-11-18T22:41:01.561585+00:00 | 1,518,643,136,000 | 285d3c031064b5cf17e4552ae10818fe237be12e | 3 | {
"blob_id": "285d3c031064b5cf17e4552ae10818fe237be12e",
"branch_name": "refs/heads/master",
"committer_date": 1518643136000,
"content_id": "ba3b1b75035c8c739c2733d45b223b8558f9a6d3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "31809f2d661ff02bd3d4b273b2925c28d6760b88",
"extension": "py"... | 2.609375 | stackv2 | import os
import random
from io import BytesIO
from flask import Flask, jsonify, helpers
from PIL import Image, ImageDraw, ImageFont
app = Flask(__name__)
STATIC_IMAGE_PATH = "static/images"
@app.route("/images/<string:category>/<string:width_height>", methods=['GET'])
def maker_resize(category, width_height):
... | 160 | 23.47 | 98 | 13 | 947 | python | [{"finding_id": "codeql_py/flask-debug_5275b12a4d8d0a86_db0e500d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provide... | [
160,
70,
91,
142
] | [
null,
null,
null,
null
] | [
5,
27,
27,
39
] | [
24,
51,
51,
80
] | |
2024-11-18T22:41:15.859438+00:00 | 1,421,389,290,000 | d4b41304dabedcb091aa37e80440b1515d77f98c | 3 | {
"blob_id": "d4b41304dabedcb091aa37e80440b1515d77f98c",
"branch_name": "refs/heads/master",
"committer_date": 1421389290000,
"content_id": "44778e8b4fabbe63b8938bf8e8bca6342ace382a",
"detected_licenses": [
"Unlicense"
],
"directory_id": "41492de22a7b44f1f5c704bcd2c720812d8cad50",
"extension": "py",... | 3.015625 | stackv2 | __author__ = 'christianbuia'
import random
from Crypto.Cipher import AES
def pkcs7_padding(message_bytes, block_size):
pad_length = block_size - (len(message_bytes) % block_size)
if pad_length != block_size:
for i in range(0, pad_length):
message_bytes += bytes([pad_length])
return... | 104 | 35.46 | 120 | 17 | 824 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_565de85eda155eaa_736ce899", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
30,
37
] | [
null,
null
] | [
12,
32
] | [
54,
55
] | |
2024-11-18T20:55:06.668190+00:00 | 1,605,324,016,000 | 19169b0517696be7e8675d05574d9541ebc524e4 | 3 | {
"blob_id": "19169b0517696be7e8675d05574d9541ebc524e4",
"branch_name": "refs/heads/main",
"committer_date": 1605324016000,
"content_id": "652cc41e23e86ccd9bd214893dbb134283176d2d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "78405d2c05b647970aee0a0534274c9768bb5017",
"extension": "py",
... | 2.546875 | stackv2 | import json
from jinja2 import Environment, FileSystemLoader
def flatten_tree(tree, props=None):
if props is None:
props = list(tree.keys())
props.remove("fields")
# flatten properties in json tree
if "fields" in tree.keys():
for field_name, field in tree["fields"].items():
... | 39 | 31.23 | 74 | 16 | 303 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_292fc0b1dc556499_92724add", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
31
] | [
34
] | [
13
] | [
2
] | |
2024-11-18T21:07:32.954351+00:00 | 1,581,952,252,000 | 94182bf222e34ed7d98d24978088f943738d1823 | 3 | {
"blob_id": "94182bf222e34ed7d98d24978088f943738d1823",
"branch_name": "refs/heads/master",
"committer_date": 1581952252000,
"content_id": "38c2e3c936a28d238c60a208952079332ebaccd4",
"detected_licenses": [
"MIT"
],
"directory_id": "d6ebf49a1f6c3cf35bf4f869021f7717900cef25",
"extension": "py",
"fi... | 3.171875 | stackv2 | import argparse
import requests
import re
import sys
import urlparse
from pyquery import PyQuery as pq
"""
This function takes a relative url and extracts all verses from that page as a tsv.
# See: http://stackoverflow.com/questions/5203105/printing-a-utf-8-encoded-string
$ export PYTHONIOENCODING=UTF-8
$ python proc... | 81 | 30.28 | 131 | 12 | 667 | python | [{"finding_id": "codeql_py/overly-large-range_6de03ed1cb5845c0_0c680f98", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
44
] | [
null
] | [
30
] | [
33
] | |
2024-11-18T21:33:04.212180+00:00 | 1,586,446,540,000 | 9d5a40814cb3dcada9a6a5bf45b71ebf81d9ce43 | 3 | {
"blob_id": "9d5a40814cb3dcada9a6a5bf45b71ebf81d9ce43",
"branch_name": "refs/heads/master",
"committer_date": 1586446540000,
"content_id": "9c71dbe50985f0c4effbbf3069abb8f9ad1412b8",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "feb27ba530ebb0d400654e2bb62467e6de65095b",
"extension": "p... | 2.828125 | stackv2 | #!/usr/bin/env python2
import ftplib, argparse, sys, threading
def login(h, u, p):
try:
f = ftplib.FTP(h)
f.login(u, p)
print("[+] Login accepted: %s:%s:%s" % (h,u,p))
f.quit()
return True
except Exception, e:
print("[-] Login failed: %s:%s:%s" % (h,u,p))
... | 45 | 34.07 | 123 | 16 | 425 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_400b94bf9342effc_1f1a13fb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
38
] | [
null
] | [
11
] | [
48
] | |
2024-11-18T21:33:20.991152+00:00 | 1,625,336,184,000 | 652bb4774b1a26adf66b31922f59ed50f92066eb | 2 | {
"blob_id": "652bb4774b1a26adf66b31922f59ed50f92066eb",
"branch_name": "refs/heads/main",
"committer_date": 1625336184000,
"content_id": "659083534bfb74267aac45c809e4f3eddc06ce1e",
"detected_licenses": [
"MIT"
],
"directory_id": "9e85e35b0467e667fc3522ba0d4f026ca3906a35",
"extension": "py",
"file... | 2.359375 | stackv2 | """This module contains views used by the filesharing app."""
import string
from django.contrib import messages
from django.contrib.auth import authenticate, login, logout
from django.contrib.auth.decorators import login_required
from django.contrib.auth.mixins import LoginRequiredMixin
from django.contrib.auth.model... | 453 | 33.73 | 96 | 18 | 3,155 | python | [{"finding_id": "codeql_py/url-redirection_b8ce9e2da4112eac_4c619bea", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 5 | true | [
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends o... | [
314,
326,
339,
342,
368
] | [
null,
null,
null,
null,
null
] | [
41,
37,
41,
37,
13
] | [
53,
49,
53,
49,
87
] | |
2024-11-18T21:55:38.501301+00:00 | 1,631,865,524,000 | 9fe5357ebee65f4502afab1f3eb3c8b6e2563766 | 3 | {
"blob_id": "9fe5357ebee65f4502afab1f3eb3c8b6e2563766",
"branch_name": "refs/heads/master",
"committer_date": 1631865524000,
"content_id": "217fd7b2a7f3147d02d1002557719e31a9636991",
"detected_licenses": [
"MIT"
],
"directory_id": "7371393b03d17a4a2decc5e905a6f83f79a70792",
"extension": "py",
"fi... | 2.859375 | stackv2 | from transferfile.transfile_interface import TransferFileInterface
from pathlib import Path
import paramiko
import os
class Sftp(TransferFileInterface):
def __init__(
self,
host,
username=None,
password=None,
port=22,
load_system_host_keys=False,
rsa_file=Non... | 78 | 29.95 | 120 | 16 | 528 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_3174bd944cb84c5a_f6cfbd53", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
24
] | [
null
] | [
9
] | [
75
] | |
2024-11-18T21:55:39.507417+00:00 | 1,587,118,652,000 | 040eb71e09c70413c4254072db3fbaffe1727edd | 3 | {
"blob_id": "040eb71e09c70413c4254072db3fbaffe1727edd",
"branch_name": "refs/heads/master",
"committer_date": 1587118652000,
"content_id": "6c7cd84db66dd39eba0f5653c41042171d2928eb",
"detected_licenses": [
"MIT"
],
"directory_id": "890cba8306b547ecec61a5641c0b7aec021bc81c",
"extension": "py",
"fi... | 2.578125 | stackv2 | import RPi.GPIO as GPIO
import json
from flask import Flask
from time import sleep
import requests
import threading
GPIO.setwarnings(False)
GPIO.setmode(GPIO.BCM)
with open('light-ctrl.conf') as f:
cfg = json.load(f,)
switch_override = []
sensor_state = {}
def fetch_sensor_state(sensors):
if type(sensors) ... | 243 | 29.98 | 113 | 23 | 1,815 | python | [{"finding_id": "codeql_py/reflective-xss_63d37049f385fc99_3de064b3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-918"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
239,
240,
91
] | [
null,
null,
null
] | [
19,
12,
23
] | [
70,
53,
95
] | |
2024-11-18T21:55:40.245708+00:00 | 1,485,421,828,000 | 5fc00ebbfc01633e8c7b224f84317622777063de | 3 | {
"blob_id": "5fc00ebbfc01633e8c7b224f84317622777063de",
"branch_name": "refs/heads/master",
"committer_date": 1485421971000,
"content_id": "316eef24a1a02778a46bf688bebd2d81b90e8754",
"detected_licenses": [
"MIT"
],
"directory_id": "dbb5fd33ae579f0fcc59db166d77325d95ccb9fa",
"extension": "py",
"fi... | 2.59375 | stackv2 | from django.conf import settings
from time import time
from jose import jwt
import hmac
import base64
import hashlib
class AuthenticationMixin(object):
"""
Profile Authentication related logic.
Author: Ahmed H. Ismail
"""
def generate_token(self, expiration):
"""
Generates an auth... | 53 | 34.92 | 104 | 20 | 427 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_893adda48cd3e83a_0ad38c39", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computational... | [
24,
49
] | [
null,
null
] | [
17,
13
] | [
51,
50
] | |
2024-11-18T21:55:48.033176+00:00 | 1,545,390,127,000 | f4b615f03da14d3816f398a2ae316633de0a3485 | 3 | {
"blob_id": "f4b615f03da14d3816f398a2ae316633de0a3485",
"branch_name": "refs/heads/master",
"committer_date": 1545390127000,
"content_id": "537d5565925ed1ef0732d5c57dcf3d50fcb70454",
"detected_licenses": [
"MIT"
],
"directory_id": "b2dafa0cdb9735b77810412f5cb95be113129c7d",
"extension": "py",
"fi... | 2.75 | stackv2 | # -*- coding: utf-8 -*-
import requests
import six
import argparse
def __get_tokens(client_id, client_secret, domain):
code_url = 'https://{}.bitrix24.ru/oauth/authorize/?response_type=code&client_id={}'.format(domain, client_id)
print(code_url)
input_func = input
if six.PY2:
input_func = raw... | 49 | 34.47 | 114 | 13 | 412 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c7f31dc15bd17696_0ec35d43", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
30
] | [
null
] | [
15
] | [
24
] | |
2024-11-18T21:55:55.293768+00:00 | 1,512,332,126,000 | 2c027efcecd55cfc97d29ec79e0e50bde4b6ef63 | 3 | {
"blob_id": "2c027efcecd55cfc97d29ec79e0e50bde4b6ef63",
"branch_name": "refs/heads/master",
"committer_date": 1512332126000,
"content_id": "d53ac5216babc8203222826bb404cc87dab37552",
"detected_licenses": [
"MIT"
],
"directory_id": "b665a3eb3afec4df95d4032321fa932c7519add7",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
from datetime import datetime
from rebel import Database, SqliteDriver
import json, hashlib
class User(object):
def __init__(self, db):
driver = SqliteDriver(db)
self.db = Database(driver)
def all(self):
_user = self.db.query('sele... | 73 | 31.27 | 125 | 14 | 544 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d4d9159326a89612_c0338419", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp... | [
28,
36,
60
] | [
null,
null,
null
] | [
32,
32,
32
] | [
40,
40,
40
] | |
2024-11-18T22:55:03.123152+00:00 | 1,691,146,618,000 | b89cb55ebd1d84aaea9932c6496670e049c26871 | 2 | {
"blob_id": "b89cb55ebd1d84aaea9932c6496670e049c26871",
"branch_name": "refs/heads/master",
"committer_date": 1691146618000,
"content_id": "2550da8f63579a37bde5a9e07c3a8c9232e57814",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0aa67381bf9b6afbc7dd3dbf3bd9bf4b4951106c",
"extension": "py"... | 2.375 | stackv2 | #!/usr/bin/env python3
import argparse
import json
import os
import re
from datetime import datetime
from jinja2 import Environment, FileSystemLoader
from typing import NamedTuple, Optional, Tuple
from urllib.error import URLError
from urllib.request import urlopen, Request
from urllib.parse import urljoin
RELEASE_UR... | 173 | 33.58 | 138 | 16 | 1,653 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_dd76df3ec38ad34a_8afa24ca", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
157
] | [
null
] | [
11
] | [
74
] | |
2024-11-18T23:06:16.107692+00:00 | 1,614,246,187,000 | bc2a1d46f5ed928ca94398917c6ad28d20d0d210 | 2 | {
"blob_id": "bc2a1d46f5ed928ca94398917c6ad28d20d0d210",
"branch_name": "refs/heads/master",
"committer_date": 1614246265000,
"content_id": "d33752573578fa557e6238a92e55ddb008be670f",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "e9dc99e5cc88c0ab93614ddd4b1ba43e6276a0d9",
"extension": "p... | 2.40625 | stackv2 | from contextlib import suppress
from enum import Enum
from os import path
from typing import Dict, List
import pandas as pd
import snowflake.connector
from jinja2 import Template
from pydantic import Field, SecretStr, constr, create_model
from snowflake.connector import DictCursor
from toucan_connectors.toucan_connec... | 171 | 37.19 | 155 | 18 | 1,352 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_09fe3a370e7ca6c6_3d1c72c7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
117,
161,
162
] | [
null,
null,
null
] | [
28,
22,
23
] | [
54,
52,
42
] | |
2024-11-18T23:06:16.294422+00:00 | 1,467,229,552,000 | 543937bdfb40646903e85f706e0abed9f441da15 | 3 | {
"blob_id": "543937bdfb40646903e85f706e0abed9f441da15",
"branch_name": "refs/heads/master",
"committer_date": 1467229552000,
"content_id": "4b46b088cd9aedb30b47f2113131d13737b2fa09",
"detected_licenses": [
"MIT"
],
"directory_id": "0b11e32fa95c4e70a400cc3ae82a3f90cc35c7f7",
"extension": "py",
"fi... | 2.703125 | stackv2 | import os
import requests
import urllib
import spotify
import threading
import logging
from time import sleep
IMPORTIO_API_INDIEPOP_URL = (
'https://api.import.io/store/data/'
'c3914ba4-3da3-4fee-8120-fcb6bfb66d3f/_query?input/webpage/'
'url=http%3A%2F%2Fsomafm.com%2Findiepop%2Fsonghistory.html'
'&_us... | 142 | 29.16 | 77 | 20 | 997 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7baba5b26f34c666_da9ca1c0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
89,
92,
116
] | [
null,
null,
null
] | [
21,
24,
25
] | [
66,
74,
56
] | |
2024-11-18T20:56:51.043030+00:00 | 1,571,778,998,000 | 28fefc8bcad874b7b0d54670f95e6d14abe47654 | 3 | {
"blob_id": "28fefc8bcad874b7b0d54670f95e6d14abe47654",
"branch_name": "refs/heads/master",
"committer_date": 1571778998000,
"content_id": "c6c713f35ec25a0a86edd2bef159d935e69cabe3",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "3ceb39175ad4541afd2386b704b71ea0e68154d8",
"extension": "p... | 2.703125 | stackv2 | from flask import Flask, render_template, request, make_response
import werkzeug
app = Flask(__name__)
@app.route("/")
def index():
return render_template('index.html')
@app.route("/vulnerable")
def vulnerable():
username = request.args.get('username')
if username == None:
resp = make_response('... | 32 | 25 | 64 | 14 | 196 | python | [{"finding_id": "codeql_py/reflective-xss_1e07f00ebdcb86d0_8e652973", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
25
] | [
null
] | [
30
] | [
52
] | |
2024-11-18T20:56:53.722023+00:00 | 1,558,545,746,000 | 485c625d3fc3891d8dcc0f7d6635094a943d7b5d | 3 | {
"blob_id": "485c625d3fc3891d8dcc0f7d6635094a943d7b5d",
"branch_name": "refs/heads/master",
"committer_date": 1558545746000,
"content_id": "ff8256e9914275378c406e448fb9b423177ca907",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cd210e0701e44c58cb101776b42d4a9a2f2d4e8a",
"extension": "py"... | 2.515625 | stackv2 | from flask import Flask,render_template, request, session, redirect, url_for
import hashlib
import flask_login
import socket
app = Flask(__name__)
login_manager = flask_login.LoginManager()
login_manager.init_app(app)
app.config['SECRET_KEY'] = '7d441f27d441f27567d441f2b6176a'
users = {'admin': {'password': '69bc0cc4... | 80 | 25.19 | 80 | 17 | 512 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d4e8618fd30abc08_7d68bd6e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp... | [
39,
67
] | [
null,
null
] | [
34,
34
] | [
67,
67
] | |
2024-11-18T22:43:31.556720+00:00 | 1,558,399,096,000 | 5f74e98d89efba50a260f0bcfdeaf391b0ff7442 | 2 | {
"blob_id": "5f74e98d89efba50a260f0bcfdeaf391b0ff7442",
"branch_name": "refs/heads/master",
"committer_date": 1558399096000,
"content_id": "6ea0fc8fd9713ee50b76d92f6075dcb17890c5f2",
"detected_licenses": [
"MIT"
],
"directory_id": "e823af0cec977a59b4481b24e7edd7a2f3d792d7",
"extension": "py",
"fi... | 2.46875 | stackv2 | import requests
from flask_restful import Resource, reqparse
import database
class ClientController(Resource):
def get(self, data):
return
def post(self, data):
if len(database.chunkServers) == 0:
return "Service unavailable", 503
headers = {"data": data}
for chun... | 22 | 26.14 | 118 | 17 | 135 | python | [{"finding_id": "codeql_py/full-ssrf_a5bf11f90631f886_0b05b3f0", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
17
] | [
null
] | [
13
] | [
119
] | |
2024-11-18T22:44:09.770600+00:00 | 1,546,528,694,000 | 280ac97cb827c5cd58926d52d060c6f545b1dddc | 2 | {
"blob_id": "280ac97cb827c5cd58926d52d060c6f545b1dddc",
"branch_name": "refs/heads/master",
"committer_date": 1546528694000,
"content_id": "b4b644d88d18f03c6dcc675e4c47ad9b76a0a335",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "01e4e7e6e5e38c6b94cfc2b3057ead67602f387d",
"extension": "py"... | 2.421875 | stackv2 | from flask import Flask, request, abort, redirect, url_for, Response
from flask_cors import CORS
import requests
app = Flask(__name__)
CORS(app)
def __fetch(url="https://ambitionbox.com", params={}, user_agent=None):
headers_Get = {
'User-Agent': user_agent,
'Accept': 'text/html,application/xhtml+... | 64 | 26.11 | 116 | 12 | 454 | python | [{"finding_id": "codeql_py/full-ssrf_8b57f89f88e7c197_64da90a5", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 2 | true | [
"CWE-918",
"CWE-079"
] | [
"py/full-ssrf",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
19,
43
] | [
null,
null
] | [
13,
20
] | [
66,
29
] | |
2024-11-18T23:10:38.352708+00:00 | 1,616,478,137,000 | f5cd50a9d0c9eeabeb8376039e4ecdc6fd300e79 | 4 | {
"blob_id": "f5cd50a9d0c9eeabeb8376039e4ecdc6fd300e79",
"branch_name": "refs/heads/main",
"committer_date": 1616478137000,
"content_id": "fe4706d456e9b4fa57d8f98e8bab744b28f1502d",
"detected_licenses": [
"MIT"
],
"directory_id": "9cf71eb560638ea1de3edf9d08dc05e16f4fc845",
"extension": "py",
"file... | 3.671875 | stackv2 | #!/usr/bin/env python3
'''Miscelaneous helper functions and home of the Timer class'''
import hashlib
import time
from typing import Union
def hash_password(password) -> Union[str,None]:
'''applies md5 hash to the password string and returns a str representation of the resulting
hex if type(password) == str, o... | 82 | 35.71 | 98 | 13 | 647 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_753085f9e70fd860_382d7a03", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
10
] | [
null
] | [
24
] | [
41
] | |
2024-11-18T23:10:51.525323+00:00 | 1,577,540,709,000 | 5090f1e36577d8ed4839c9b6436a77bd38e34a00 | 3 | {
"blob_id": "5090f1e36577d8ed4839c9b6436a77bd38e34a00",
"branch_name": "refs/heads/master",
"committer_date": 1577540709000,
"content_id": "86403cc9fbd8f89e53bcf79530c42cb974328a76",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4cae499b3d084a970f92355919d6957be1c11972",
"extension": "py"... | 2.921875 | stackv2 | from flask import Flask, render_template, request
from collections import Counter
import string
app = Flask(__name__)
indexes = []
paragraphs = []
words = []
class DataProcessing:
# lower casing, removing punctuation and splitting word
def pre_process(self, document):
# d = dict()
document =... | 79 | 23.33 | 85 | 16 | 411 | python | [{"finding_id": "codeql_py/flask-debug_a979302ff9ad666f_951d3893", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
79,
59
] | [
null,
null
] | [
5,
12
] | [
24,
20
] | |
2024-11-18T22:29:50.642721+00:00 | 1,555,118,244,000 | 70184fcc89b775461ccf65cdb6c3d23bd07bbb3e | 4 | {
"blob_id": "70184fcc89b775461ccf65cdb6c3d23bd07bbb3e",
"branch_name": "refs/heads/master",
"committer_date": 1555118244000,
"content_id": "bc95ddc8c57c89382184ef6ce23877d54d18f5c8",
"detected_licenses": [
"MIT"
],
"directory_id": "77741ac3384cf80ba9f5684f896e4b6500064582",
"extension": "py",
"fi... | 3.78125 | stackv2 | def info_print(name, age, sex):
print(f'名字是{name},年龄{age},性别{sex}')
return 0
info_print('健康', 18, '男')
info_print(age=18, name='健康', sex='男')
info_print('健康', age=18, sex='男')
def info_print1(name, age, sex='男'): # 参数带有默认值
print(f'名字是{name},年龄{age},性别{sex}')
return 0
info_print1('健康', 1... | 17 | 18.06 | 57 | 9 | 124 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_03a11ba3356e1f6f_d7256d55", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
2,
12
] | [
null,
null
] | [
11,
11
] | [
39,
39
] | |
2024-11-18T22:29:55.366219+00:00 | 1,614,112,873,000 | 7d498e395ee19a1cdfe68e4bc0ac6b421dfa49ca | 3 | {
"blob_id": "7d498e395ee19a1cdfe68e4bc0ac6b421dfa49ca",
"branch_name": "refs/heads/master",
"committer_date": 1614112873000,
"content_id": "c19965c6e1a1c532eddbcb3eb68fcf74806dfb2e",
"detected_licenses": [
"MIT"
],
"directory_id": "9cb5ac5f0bb5c47acb5f6859e190b5ee14b59a38",
"extension": "py",
"fi... | 2.59375 | stackv2 |
import psycopg2
# Database Connection Info
database = ''
username = ''
password = ''
host = ''
port = ####
conn_string = "dbname='%s' user='%s' host='%s' password='%s' port='%s'" % (database, username, host, password, port)
def lambda_handler(event, context):
print(conn_string)
# connect to database
con... | 57 | 32.23 | 123 | 13 | 471 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_40bb390868c68675_43dc48be", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
14
] | [
null
] | [
11
] | [
22
] | |
2024-11-18T23:10:16.616772+00:00 | 1,621,068,058,000 | 6f7aa72c092cd81d6a802f57dbafcfaa8bcd7662 | 3 | {
"blob_id": "6f7aa72c092cd81d6a802f57dbafcfaa8bcd7662",
"branch_name": "refs/heads/main",
"committer_date": 1621068058000,
"content_id": "baeb2de11b8ed8b709ce015293f9d32726345b34",
"detected_licenses": [
"MIT"
],
"directory_id": "f38c880a56b50880d7574b48cc3cedcf3c1f2ae8",
"extension": "py",
"file... | 2.828125 | stackv2 | import pymysql
# https://flask.palletsprojects.com/en/1.1.x/
from flask import Flask, jsonify
# init Flask app
app = Flask(__name__)
# routes as endpoints
@app.route('/')
def home():
return 'Hello World!'
@app.route('/moviesjson')
def movies_json():
with pymysql.connect(
host='localhost',
... | 119 | 28.61 | 80 | 18 | 709 | python | [{"finding_id": "codeql_py/flask-debug_7f23bc130a6915a3_30e834de", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
119,
89,
115
] | [
null,
null,
null
] | [
null,
24,
12
] | [
20,
58,
19
] | |
2024-11-18T23:15:57.240196+00:00 | 1,594,292,524,000 | 98087fb1089ac75d4e2deef6eb240bfb89d24141 | 3 | {
"blob_id": "98087fb1089ac75d4e2deef6eb240bfb89d24141",
"branch_name": "refs/heads/master",
"committer_date": 1594292524000,
"content_id": "452030bb1a3df37f30f717ff362cadbf4929cdf9",
"detected_licenses": [
"MIT"
],
"directory_id": "ca989c3603366bb6bc7c568bddd61c3bbc528e1b",
"extension": "py",
"fi... | 2.546875 | stackv2 |
# Copyright: (c) 2020, Michal Muransky <michal.muransky@pan-net.eu>
# MIT License (see COPYING or https://mit-license.org/)
DOCUMENTATION = r'''
---
module: tfvars_facts
short_description: Translate the Terraform tfavrs file to Ansible Local Facts (JSON).
version_added: "2.4"
description:
- This Ansible modul... | 155 | 26.59 | 137 | 16 | 1,071 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0b3694a1339c6f13_74c1cde7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
140
] | [
null
] | [
16
] | [
46
] | |
2024-11-18T22:30:26.847530+00:00 | 1,607,370,592,000 | 4209dc56d1d5882370f923f918676ae3a55e03a0 | 3 | {
"blob_id": "4209dc56d1d5882370f923f918676ae3a55e03a0",
"branch_name": "refs/heads/master",
"committer_date": 1607370595000,
"content_id": "226584fd4d9051528c5187f1b0b7e2fabd1e42b0",
"detected_licenses": [
"MIT"
],
"directory_id": "acd162bde09e0e321b7d9da330b190ad6e1d8b8f",
"extension": "py",
"fi... | 2.96875 | stackv2 | """
TODO: Add documentation
"""
import sys
from jinja2 import Template
from util import read_config, _read_template, _read_csv
def _create_table():
pass
def create_leaderboard(config_path, output_path):
"""
Create a leaderboard for the given ``config`` file.
:param config_path:
`str` repres... | 62 | 24.63 | 75 | 14 | 382 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_1ceae0e707a990ee_0aa30518", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
52,
57
] | [
null,
null
] | [
16,
18
] | [
53,
51
] | |
2024-11-18T22:30:30.092107+00:00 | 1,500,637,441,000 | 69420948de3f06987be94a30cbc4d1129d4e1116 | 2 | {
"blob_id": "69420948de3f06987be94a30cbc4d1129d4e1116",
"branch_name": "refs/heads/master",
"committer_date": 1500637441000,
"content_id": "b464cabf3b927b7dce998fa6952f3f8091b31a30",
"detected_licenses": [
"MIT"
],
"directory_id": "03ae294fbcec21933b288ff54aff428c191a7e16",
"extension": "py",
"fi... | 2.453125 | stackv2 | from jinja2 import Environment, FileSystemLoader, BaseLoader
import logging
import os
class AbstractProfileDataProvider:
def get_profile_data(self, profile_name: str, **kwargs):
raise NotImplementedError
class JinjaProfileDataProvider(AbstractProfileDataProvider):
def __init__(self, template_loade... | 25 | 35.68 | 102 | 17 | 180 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_27bc1fc353d8d233_5385a08f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
17
] | [
null
] | [
27
] | [
80
] | |
2024-11-18T23:36:51.175901+00:00 | 1,613,858,196,000 | 2b16cec31b784ea9b0970334abc88d984c32473e | 3 | {
"blob_id": "2b16cec31b784ea9b0970334abc88d984c32473e",
"branch_name": "refs/heads/main",
"committer_date": 1613858196000,
"content_id": "3a5a99edcdfaf5bdf1e6ced30170f7b317b81f5e",
"detected_licenses": [
"MIT"
],
"directory_id": "7b9ce8efa4c25421ec173c0472b3edf7a6552608",
"extension": "py",
"file... | 2.8125 | stackv2 | #!/usr/bin/python
"""
Import the needed Python3 packages
"""
from functools import wraps
from secrets import config, db, host, pwd, user
import mysql.connector
from cryptography.fernet import Fernet
from flask import Flask, request
from flask_restful import Api, Resource, reqparse
"""
backend = Define the Flask va... | 258 | 34.02 | 161 | 16 | 1,889 | python | [{"finding_id": "codeql_py/flask-debug_9dc0f59e4c75f22e_04c9da37", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-089"
] | [
"py/flask-debug",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This SQL query depends on a [user-provided value](1)."
] | [
258,
73
] | [
null,
null
] | [
null,
26
] | [
49,
29
] | |
2024-11-18T23:37:07.370883+00:00 | 1,597,951,578,000 | afc0ac2fa9f7599e7690eec27444edb53e681148 | 3 | {
"blob_id": "afc0ac2fa9f7599e7690eec27444edb53e681148",
"branch_name": "refs/heads/master",
"committer_date": 1597951578000,
"content_id": "ef7092aa0b62696903bac5bccda797d14d8ecb44",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ad1a60c1c124948689451bb8daed9720a7a5d7ed",
"extension": "py"... | 2.625 | stackv2 | import settings
from flask import Flask
from flask import render_template
import requests
import logging
logging.basicConfig(level=logging.INFO)
BASE_URL = settings.QAW_API_URL
app = Flask(__name__)
@app.route("/")
def hello():
return "Hello World!"
@app.route("/teams/<tags>")
def teams(tags='python'):
ne... | 61 | 25.33 | 89 | 17 | 409 | python | [{"finding_id": "codeql_py/reflective-xss_ba0d3462810250d7_29621db2", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 5 | true | [
"CWE-079",
"CWE-918",
"CWE-918",
"CWE-117",
"CWE-117"
] | [
"py/reflective-xss",
"py/partial-ssrf",
"py/partial-ssrf",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [... | [
44,
29,
48,
23,
39
] | [
null,
null,
null,
null,
null
] | [
12,
13,
12,
18,
18
] | [
62,
30,
29,
49,
57
] | |
2024-11-18T21:14:06.543907+00:00 | 1,619,469,977,000 | 5c439fc5a46015805e73547c1cc244c6b39afa3d | 3 | {
"blob_id": "5c439fc5a46015805e73547c1cc244c6b39afa3d",
"branch_name": "refs/heads/main",
"committer_date": 1619469977000,
"content_id": "a978f1752561d7d4074a38eb9d60de6d96196d5a",
"detected_licenses": [
"MIT"
],
"directory_id": "948ba4784eff35477eb3c378de6dc9d057461160",
"extension": "py",
"file... | 2.609375 | stackv2 | import base64, cv2, json, flask, requests
import numpy as np
# from PIL import Image
from flask import Flask, request
from urllib.parse import unquote
import tflite_runtime.interpreter as tflite
autoTrainingApiUrl = "http://127.0.0.1:5001/storeDetails"
metricApiUrl = "http://127.0.0.1:5002"
emotionNames = ["Afraid", "... | 169 | 39.36 | 115 | 17 | 1,641 | python | [{"finding_id": "codeql_py/stack-trace-exposure_dac98ec09b82d3b7_340e6065", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
27,
148,
158
] | [
null,
null,
null
] | [
34,
34,
34
] | [
69,
74,
75
] | |
2024-11-18T21:14:12.104944+00:00 | 1,515,820,601,000 | bd7b48ae70f6cef4cd854539c2acf5683745075b | 2 | {
"blob_id": "bd7b48ae70f6cef4cd854539c2acf5683745075b",
"branch_name": "refs/heads/master",
"committer_date": 1515820601000,
"content_id": "c0c26dac03408782a5fd196fc24de0597bdb6a7d",
"detected_licenses": [
"MIT"
],
"directory_id": "68f47bb52b2167f1c90d334318e127cd8ae78112",
"extension": "py",
"fi... | 2.4375 | stackv2 | import requests
import hashlib
import random
class Translate(object):
def __init__(self):
pass
def translate(self, q):
appid = '20171011000087545'
secretKey = '3fKGqzXDd_TFHeiCPQQv'
httpClient = None
myurl = 'http://fanyi-api.baidu.com/api/trans/vip/translate'
... | 27 | 27.3 | 106 | 13 | 237 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d25214533b934143_77ac2747", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
22
] | [
null
] | [
19
] | [
23
] | |
2024-11-18T21:57:24.941751+00:00 | 1,521,480,584,000 | efb0f3a76dd7248d6e9dcfa40739c57ebb483c12 | 3 | {
"blob_id": "efb0f3a76dd7248d6e9dcfa40739c57ebb483c12",
"branch_name": "refs/heads/master",
"committer_date": 1521480584000,
"content_id": "1a090dd8b169aede28f5392a4ce7bf711261e964",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5cf26db7dd5d1820a84e5b8ff0d2643a2ae7ef16",
"extension": "py"... | 2.546875 | stackv2 | from urllib import request
from urllib.error import HTTPError
from urllib.parse import urlencode
import argparse
from utils.queries import KNOWLEDGE_BASE_API, RESOURCE_QUERY
PROPERTY_WHITELIST = ["http://xmlns.com/foaf/0.1/isPrimaryTopicOf"]
class Counter:
def __init__(self):
self.value = 0
sel... | 106 | 26.13 | 119 | 16 | 654 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_806b836c3ad58f27_ff0494d8", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [wikidata.dbpedia.org](1) may be at an arbitrary positi... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [wikidata.dbpedia.org](1) may be at an arbitrary position in the sanitized URL."
] | [
38
] | [
null
] | [
48
] | [
83
] | |
2024-11-18T21:57:31.181692+00:00 | 1,691,653,936,000 | c11e1ee7fc9cdb2bf8ca18b5197addf0b10c23fe | 3 | {
"blob_id": "c11e1ee7fc9cdb2bf8ca18b5197addf0b10c23fe",
"branch_name": "refs/heads/master",
"committer_date": 1691653936000,
"content_id": "84891a642e021c08e5adf3d6731b26f10ac08159",
"detected_licenses": [
"MIT"
],
"directory_id": "278aa5dae5e5e302f25d330250633130dfde253d",
"extension": "py",
"fi... | 2.578125 | stackv2 | from bin.service import Environment
from bin.service import RegEx
from bin.service import Ranking
import json
import re
import time
import datetime
class Map:
"""Service Desk Ticket Mapper"""
def __init__(self):
self.environment = Environment.Environment()
self.regex = RegEx.RegEx()
s... | 233 | 41.96 | 111 | 25 | 1,984 | python | [{"finding_id": "codeql_py/redos_eb13ed8af6a5a7d6_194b376d", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetition... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetitions of 'a'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'a@a' and containing many repetitions of 'a'."
] | [
198,
198
] | [
null,
null
] | [
29,
45
] | [
32,
48
] | |
2024-11-18T21:57:32.799950+00:00 | 1,589,400,592,000 | d57c91886786e206634b8f045103750ac3f7d964 | 2 | {
"blob_id": "d57c91886786e206634b8f045103750ac3f7d964",
"branch_name": "refs/heads/master",
"committer_date": 1589400592000,
"content_id": "061afe98bad16a16e7e95a6b4b578437886bd564",
"detected_licenses": [
"MIT"
],
"directory_id": "ccb619d9a0033d4747be13879ef1073aadecedd9",
"extension": "py",
"fi... | 2.375 | stackv2 | import os
import sys
import asyncio
import repltalk
from forms import SearchDatabase
from flask import Flask, render_template, request
def log_error(a, b, c, d):
errTemplate = """
Error Occured - {0}
Type: {1}
Exception: {2}
Traceback:
{3}
"""
with open('logs/err_log.txt', 'w') as fh:
res = errTemplate.format(a, ... | 92 | 25.1 | 65 | 21 | 680 | python | [{"finding_id": "codeql_py/stack-trace-exposure_6965da1e0f3259f6_4f1328b0", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
81,
92
] | [
88,
null
] | [
12,
5
] | [
52,
40
] | |
2024-11-18T21:58:05.941723+00:00 | 1,487,064,121,000 | 84fdde41afc7f0ecf57a62087bffadb7a87217fb | 4 | {
"blob_id": "84fdde41afc7f0ecf57a62087bffadb7a87217fb",
"branch_name": "refs/heads/master",
"committer_date": 1487064199000,
"content_id": "4ef515c16bf3731c9b907a24b48a9a0b6a25959a",
"detected_licenses": [
"MIT"
],
"directory_id": "d0f87ffb2b501469659df7962e779012acdeda62",
"extension": "py",
"fi... | 3.609375 | stackv2 | from base64 import b64decode
from Crypto.Cipher import AES
from S2C09 import pkcs7_pad, pkcs7_unpad
from S1C07 import aes_ecb_decrypt
def aes_ecb_encrypt(data, key):
"""Encrypts the given data with AES-ECB, using the given key.
The data is always PKCS 7 padded before being encrypted.
"""
cipher = AES.... | 71 | 35.17 | 95 | 14 | 651 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_a7721bf73b4d34cd_a10a2d57", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
12
] | [
null
] | [
12
] | [
59
] | |
2024-11-18T21:58:08.747784+00:00 | 1,488,551,368,000 | 9e215ee58c1f0849da381fb5ce1dfd1b16cae4fe | 2 | {
"blob_id": "9e215ee58c1f0849da381fb5ce1dfd1b16cae4fe",
"branch_name": "refs/heads/master",
"committer_date": 1488551368000,
"content_id": "436be67d1683c562df555dd29c50cf4cd673c5a0",
"detected_licenses": [
"MIT"
],
"directory_id": "bcad9833af16bd8cfecc7e6a9c1843ce50c7689b",
"extension": "py",
"fi... | 2.34375 | stackv2 | import os
import sys
import argparse
import centinel
import centinel.models
import centinel.views
import config
import logging
from logging.handlers import RotatingFileHandler
if (2, 7, 9) > sys.version_info:
print ("WARNING: Python is older than 2.7.9, "
"using older SSL version. This is "
... | 77 | 29.73 | 82 | 15 | 568 | python | [{"finding_id": "codeql_py/insecure-protocol_5bd56c89e25e8efc_f34cfe18", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to SSL.Context](1).", "remediation": "", "locat... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 specified by [call to SSL.Context](1)."
] | [
68
] | [
null
] | [
23
] | [
52
] | |
2024-11-18T21:58:29.887523+00:00 | 1,687,448,383,000 | eae51fa8fa0b50dd77545d0e21180804fb0d697c | 2 | {
"blob_id": "eae51fa8fa0b50dd77545d0e21180804fb0d697c",
"branch_name": "refs/heads/master",
"committer_date": 1687448383000,
"content_id": "410215ade2f9729069492f8e00da4b5c3e4a8895",
"detected_licenses": [
"MIT"
],
"directory_id": "432d22b796ad62dd034472e97182e51663b2125f",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/env python
"""check various endpoints on HP MSA devices (1040,2050,2052) """
import argparse
import types
import sys
import xml.dom.minidom
import requests
import hashlib
from requests.auth import HTTPDigestAuth
from requests.packages.urllib3.exceptions import InsecureRequestWarning,InsecurePlatformWarning,S... | 228 | 34.6 | 140 | 22 | 1,647 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_53b8aebc24dc07fd_0ae86804", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 3 | true | [
"CWE-327",
"CWE-295",
"CWE-295"
] | [
"py/weak-sensitive-data-hashing",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
30,
37,
71
] | [
null,
41,
76
] | [
20,
17,
13
] | [
66,
14,
10
] | |
2024-11-18T21:58:29.940526+00:00 | 1,603,199,471,000 | 77cac6ed80756784145918dca0d227e66ffca3cc | 2 | {
"blob_id": "77cac6ed80756784145918dca0d227e66ffca3cc",
"branch_name": "refs/heads/master",
"committer_date": 1603199471000,
"content_id": "11ea3f931caf8ec0ea55e5ae00343d924506b575",
"detected_licenses": [
"MIT"
],
"directory_id": "61ad58a5434415a9ef5c3e429f0314dee0b44d38",
"extension": "py",
"fi... | 2.46875 | stackv2 | """Flask API for geospatial utils."""
import logging
from distutils.util import strtobool
from os import getenv
from caching import cache_file
from flask import Flask, Response, jsonify, request
from flask_caching import Cache
from flask_cors import CORS
from timer import timed
from zonal_stats import calculate_s... | 126 | 25.14 | 88 | 13 | 895 | python | [{"finding_id": "codeql_py/flask-debug_799363830a07b34b_6cf807b2", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-117"
] | [
"py/flask-debug",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1)."
] | [
126,
53
] | [
null,
null
] | [
5,
22
] | [
49,
48
] | |
2024-11-18T23:10:59.638449+00:00 | 1,522,935,759,000 | aa4d5e2fec6c98e40da71dfc349e5460f1ba0115 | 2 | {
"blob_id": "aa4d5e2fec6c98e40da71dfc349e5460f1ba0115",
"branch_name": "refs/heads/master",
"committer_date": 1522935759000,
"content_id": "358b96fc0656b1f5d2df0e63c0330a900a548404",
"detected_licenses": [
"MIT"
],
"directory_id": "993a216c56f7a01dd2aee213b326159e5c2f3b13",
"extension": "py",
"fi... | 2.5 | stackv2 | from flask import Flask, request, make_response, jsonify
from functools import wraps
import os
import json
app = Flask(__name__)
g_data_cache={}
g_data_args_cache={}
DATA_CACHE = 1
ARGS_CACHE = 2
def _get_data(path, cachetype=DATA_CACHE):
global g_data_cache
global g_data_args_cache
cache = g_data_cache... | 76 | 29.12 | 137 | 15 | 554 | python | [{"finding_id": "codeql_py/flask-debug_05135f6120162090_7f4caa9e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
76,
24
] | [
null,
null
] | [
5,
23
] | [
51,
29
] | |
2024-11-18T23:11:01.935969+00:00 | 1,612,750,612,000 | 66d2c42e3ce3ffb63eaecae41ead4143c03f0d45 | 3 | {
"blob_id": "66d2c42e3ce3ffb63eaecae41ead4143c03f0d45",
"branch_name": "refs/heads/master",
"committer_date": 1612750612000,
"content_id": "adf1b825da8c4dd9dec1342e25aeac2871049b42",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5e8dc13985ddfef5101d4ed167e2e9844fba5ae2",
"extension": "py"... | 2.65625 | stackv2 | import os
from flask import Flask, request, send_file, redirect, render_template
import easyocr
import PIL
from PIL import Image, ImageOps
import base64
import numpy as np
import io
from queue import Queue, Empty
import time
import threading
UPLOAD_FOLDER = 'static/uploads'
app = Flask(__name__, template_folder='tem... | 165 | 27.12 | 92 | 18 | 1,126 | python | [{"finding_id": "codeql_py/reflective-xss_3df2f942b087fb53_77480a19", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 4 | true | [
"CWE-079",
"CWE-079",
"CWE-601",
"CWE-601"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
131,
151,
82,
99
] | [
null,
null,
null,
null
] | [
16,
12,
29,
29
] | [
88,
20,
40,
40
] | |
2024-11-18T22:05:53.082588+00:00 | 1,603,938,510,000 | 7885589d024795af448357fc9f41af643d053aed | 2 | {
"blob_id": "7885589d024795af448357fc9f41af643d053aed",
"branch_name": "refs/heads/master",
"committer_date": 1603938510000,
"content_id": "f98de551a107211d6a81c8a615063be8b56079b1",
"detected_licenses": [
"MIT"
],
"directory_id": "f809f02b8a7c2c4a3afe00da7f25020db05b3fe3",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/env python3
import os
import json
import random
import requests
import logging
from flask import Flask, jsonify, request, Response
from functools import wraps
logging.basicConfig(level=logging.INFO, format='%(asctime)s %(levelname)s: %(message)s')
logger = logging.getLogger(__name__)
block_size = os.geten... | 79 | 24.35 | 88 | 13 | 513 | python | [{"finding_id": "codeql_py/partial-ssrf_9a5be1546cebe159_74b020bc", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
27
] | [
null
] | [
7
] | [
65
] | |
2024-11-18T22:05:59.058298+00:00 | 1,382,086,108,000 | 88a3efd9f41c2613d561600164d2ab38f1914d84 | 2 | {
"blob_id": "88a3efd9f41c2613d561600164d2ab38f1914d84",
"branch_name": "refs/heads/master",
"committer_date": 1382086108000,
"content_id": "0d73583511e85602cf8b521e4167f6678e5d070e",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "ebcd1a743c9730d7b7cecc074719cdc11b3596f5",
"extension": "p... | 2.46875 | stackv2 | # encoding: utf-8
"""
_util.py
Created by liut on 2010-12-04.
Copyright (c) 2010-2013 liut. All rights reserved.
"""
import os
from _wand import NewMagickWand,MagickReadImage,MagickToMime,\
MagickGetImageFormat,MagickGetImageWidth,MagickGetImageHeight,MagickGetImageCompressionQuality
__all__ = [
'check_dirs', 'save... | 261 | 25.4 | 94 | 14 | 1,957 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_50db05a6b6f88ccb_e00e00ec", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (id)](2) is used in a hashing algorithm (SHA1) that is insecure."
] | [
200
] | [
null
] | [
14
] | [
52
] | |
2024-11-18T22:36:00.346441+00:00 | 1,520,250,202,000 | bd4582e51f18cd12339b125c73bea0f8e09e58b3 | 3 | {
"blob_id": "bd4582e51f18cd12339b125c73bea0f8e09e58b3",
"branch_name": "refs/heads/master",
"committer_date": 1520250202000,
"content_id": "5f9000ae390ca424205a63cbe97990f23bef7efb",
"detected_licenses": [
"MIT"
],
"directory_id": "e36021c72acb43a774bb687386d2d9b8bba73769",
"extension": "py",
"fi... | 3.015625 | stackv2 | #!/usr/bin/env python3
"""
file system operations
# from jplib import fs
"""
import io
import json
import os
import re
import stat
import sys
from urllib.parse import urlparse
from jplib.dateandtime import get_timestamp_from_year_to_second
IMAGE_EXTENSIONS = ['jpg', 'jpeg', 'png', 'gif'] # can be extended
BYTE... | 273 | 25.99 | 117 | 15 | 1,919 | python | [{"finding_id": "codeql_py/overly-large-range_0670080eb5c0d351_a13484bd", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
247
] | [
null
] | [
58
] | [
61
] | |
2024-11-18T22:48:31.633737+00:00 | 1,449,919,061,000 | 29d664a54daf42cbe93eeb07bccc45dd9140b580 | 2 | {
"blob_id": "29d664a54daf42cbe93eeb07bccc45dd9140b580",
"branch_name": "refs/heads/master",
"committer_date": 1449919061000,
"content_id": "015783bd7c81005fe5f1883a6627442ed7ebe949",
"detected_licenses": [
"MIT"
],
"directory_id": "b70e74a12ff1c9e558f7c1a688773e590064df9e",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/env python
# encoding: utf-8
"""
flask-ckeditor
~~~~~~~~~~~~~~
在flask中集成ckeditor编辑器
"""
# from flask import what I want
from flask import request, url_for, make_response
import os
import random
import datetime
class CKEditor(object):
"""
class CKEditor
~~~~~~~~~~~~~~
... | 85 | 28.04 | 81 | 18 | 560 | python | [{"finding_id": "codeql_py/reflective-xss_37071f18491b0665_f11c4c29", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 5 | true | [
"CWE-079",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/reflective-xss",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user... | [
83,
64,
72,
66,
69
] | [
null,
null,
null,
null,
null
] | [
34,
35,
30,
33,
32
] | [
37,
42,
38,
40,
39
] | |
2024-11-18T22:48:59.040926+00:00 | 1,563,328,611,000 | acc0a1056e4a45b79dec6562927c11543eb94511 | 3 | {
"blob_id": "acc0a1056e4a45b79dec6562927c11543eb94511",
"branch_name": "refs/heads/master",
"committer_date": 1563328611000,
"content_id": "edab137093cef2a48d88818ef3e924dec0040fd5",
"detected_licenses": [
"MIT"
],
"directory_id": "725638c276593e319c4dcbd85390425aa084d1f4",
"extension": "py",
"fi... | 2.65625 | stackv2 | import logging
from flask import Flask
from flask import jsonify
import requests
app = Flask(__name__)
logger = logging.getLogger(__name__)
@app.route("/", methods=["GET"])
def hello():
app.logger.info("Home executed.")
return "Hello World!"
@app.route("/githubuser/<string:username>")
def user(username):... | 27 | 21.96 | 118 | 13 | 139 | python | [{"finding_id": "codeql_py/partial-ssrf_4612c18a1978de57_6d155362", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
20
] | [
null
] | [
16
] | [
72
] | |
2024-11-18T22:49:04.380136+00:00 | 1,596,493,863,000 | 21c11cf0a37734144eefbb3ecefb01d426808f2d | 2 | {
"blob_id": "21c11cf0a37734144eefbb3ecefb01d426808f2d",
"branch_name": "refs/heads/master",
"committer_date": 1596493863000,
"content_id": "577e5e35e90349f8e68af8d8c2a6b599a6274c07",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "de6660c1649f7fb723b5c9ad63e2bb97d66b4edd",
"extension": "py",
... | 2.421875 | stackv2 | import requests
from bs4 import BeautifulSoup
import csv
from time import sleep
import sys
sys.path.append('../../classes')
import notify
# import ssl
# ssl._create_default_https_context = ssl._create_unverified_context
manifest_arr = []
def scrape_for_page(url):
flg = True
print("page\t" + url)
sleep(... | 74 | 19.91 | 117 | 18 | 394 | python | [{"finding_id": "codeql_py/request-without-cert-validation_48606ba33af82559_5a4792ca", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
21
] | [
null
] | [
9
] | [
39
] | |
2024-11-18T22:49:07.603492+00:00 | 1,626,408,674,000 | c35b392abf89451eea1bc2dc97a037c72de77904 | 3 | {
"blob_id": "c35b392abf89451eea1bc2dc97a037c72de77904",
"branch_name": "refs/heads/master",
"committer_date": 1626408674000,
"content_id": "ebe2b04b9afeec550865a20875a8b58692c9476f",
"detected_licenses": [
"MIT"
],
"directory_id": "c84fc063e169af3177b9be64ef1e890087732ae0",
"extension": "py",
"fi... | 3.171875 | stackv2 | # date:2020.5.25
# author:pmy
# aim:爬取google图片
#问题在于,不能保证所爬为所见
from selenium import webdriver
import time
import os
import requests
# 修改keyword便可以修改搜索关键词 建议也修改存储目录
keyword = 'cat'
# url = 'https://www.google.com.hk/search?q=' + keyword + '&source=lnms&tbm=isch'
url = 'https://www.google.com/search?q=' + keyword + '&s... | 106 | 32.7 | 103 | 29 | 833 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_8100a1e83bf910b9_8b79dfa1", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://encrypted-tbn0.gstatic.com](1) may be at an ar... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [https://encrypted-tbn0.gstatic.com](1) may be at an arbitrary position in the sanitized URL."
] | [
69
] | [
70
] | [
71
] | [
82
] | |
2024-11-18T23:25:56.196911+00:00 | 1,642,038,498,000 | dafa3d12440011776d6515c1009f96105e41da03 | 2 | {
"blob_id": "dafa3d12440011776d6515c1009f96105e41da03",
"branch_name": "refs/heads/master",
"committer_date": 1642038498000,
"content_id": "aa4a3613e8d69ebc80f44a458c6ab06de32c3154",
"detected_licenses": [
"MIT"
],
"directory_id": "19fc08817156353e0ee8900222b29e7a232397d8",
"extension": "py",
"fi... | 2.4375 | stackv2 | import wx
import re, random, os, importlib
import utility
# This module was developed by squinting directly at both the MCP spec
# at http://www.moo.mud.org/mcp2/mcp2.html and tkMOO-light's plugins/mcp21.tcl
# file, to which this code bears more than a little resemblance and owes
# more than a little debt.
# my $s... | 284 | 35.77 | 113 | 21 | 2,487 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1ab4e6b299e8e691_feb9fd58", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
63
] | [
null
] | [
19
] | [
66
] | |
2024-11-18T23:26:03.884703+00:00 | 1,458,888,773,000 | ff35c51c9d2bb0bf7d7a63cbac9baf127a552482 | 3 | {
"blob_id": "ff35c51c9d2bb0bf7d7a63cbac9baf127a552482",
"branch_name": "refs/heads/master",
"committer_date": 1458888773000,
"content_id": "58220c81a5bd54beea258445ee9d50548da5cc16",
"detected_licenses": [
"MIT"
],
"directory_id": "d246785713a23bff91ae0c21e0db95c6b9c11276",
"extension": "py",
"fi... | 2.53125 | stackv2 | from jinja2 import Environment, FileSystemLoader
import json
import datetime
import re
def get(config):
template_loader = FileSystemLoader(searchpath=config.TEMPLATE_DIR)
env = Environment(
loader=template_loader,
extensions=['jinja2.ext.loopcontrols'])
env.filters['tojson'] = tojson
env.filters['isdisjoint']... | 41 | 24.61 | 67 | 11 | 248 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fe6d6dab6e4a2866_87f08d5d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
8
] | [
10
] | [
8
] | [
42
] | |
2024-11-18T22:48:25.875005+00:00 | 1,546,440,779,000 | 667ac8baf415295bc8753c6fc36249b50238ff8c | 4 | {
"blob_id": "667ac8baf415295bc8753c6fc36249b50238ff8c",
"branch_name": "refs/heads/master",
"committer_date": 1546440779000,
"content_id": "4e27d12ca0167eeef14eeab8dc9bfe483d5dc2db",
"detected_licenses": [
"MIT"
],
"directory_id": "60447371d8295e6b82984a5fce4bbd64787ec624",
"extension": "py",
"fi... | 3.640625 | stackv2 |
class Employee:
def __init__(self,first,last,pay):
self.first = first
self.last = last
self.email = first+last+'@123.com'
self.pay = pay
def fullname(self):
return('{} {}'.format(self.first,self.last))
emp_1 = Employee('hello','world',1900)
emp_2 = Employee(... | 22 | 17.95 | 52 | 11 | 118 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a75399d1347b3c68_21a6fef6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
18,
19
] | [
null,
null
] | [
7,
7
] | [
12,
12
] | |
2024-11-18T22:48:31.117172+00:00 | 1,634,732,996,000 | c22bc4ae295ace126a2b15aafd4fbf7414f9f19d | 2 | {
"blob_id": "c22bc4ae295ace126a2b15aafd4fbf7414f9f19d",
"branch_name": "refs/heads/main",
"committer_date": 1634732996000,
"content_id": "d3e67c2b5e42194f966fa81edff130fe0ce40372",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a15147ebb4175506570d068bde7dc7b32c6037cc",
"extension": "py",
... | 2.3125 | stackv2 | import sys
from os import getgid, getuid
from pathlib import Path
from pwd import getpwuid
from click import INT
from typer import confirm, prompt
from kolombo.console import debug, enable_debug, finished, info, started, step
from kolombo.util import run
_virtual_configs = {
"addresses": "bob@example.com bob@exa... | 89 | 35.01 | 83 | 14 | 803 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_968f5aa440d7d0dd_c6ae3089", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
73
] | [
null
] | [
27
] | [
40
] | |
2024-11-18T22:27:52.248246+00:00 | 1,557,732,043,000 | 623b5548b19536d7811f82f31fa5c2d327cf320a | 3 | {
"blob_id": "623b5548b19536d7811f82f31fa5c2d327cf320a",
"branch_name": "refs/heads/master",
"committer_date": 1557732043000,
"content_id": "22f42f1fa14a572037c5f50399a77632e427224d",
"detected_licenses": [
"MIT"
],
"directory_id": "af19ee648bd568eaff881ec2d46d73a9fc6e1b4c",
"extension": "py",
"fi... | 3 | stackv2 | # Open3D: www.open3d.org
# The MIT License (MIT)
# See license file or visit www.open3d.org for details
# examples/Python/Basic/mesh_sampling.py
import numpy as np
import os
import urllib.request
import gzip
import tarfile
import shutil
import time
from open3d import *
def create_mesh_plane():
mesh = TriangleMes... | 106 | 37.05 | 85 | 15 | 1,034 | python | [{"finding_id": "codeql_py/tarslip_b21fd9fbc193825d_06b78333", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
44
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T22:14:52.895829+00:00 | 1,568,274,392,000 | a4ec2af29b8161aeed85fc34049450d04952a3af | 2 | {
"blob_id": "a4ec2af29b8161aeed85fc34049450d04952a3af",
"branch_name": "refs/heads/master",
"committer_date": 1568274392000,
"content_id": "94773a0d14a5db730db52272693b7c76462ad57a",
"detected_licenses": [
"MIT"
],
"directory_id": "8245b4195a0c6be2ea8a6621e62d49026414b8fd",
"extension": "py",
"fi... | 2.34375 | stackv2 | """
Decrypt a pdf given the pkcs12 cert + password
note that this works only for pdfs in a specific format.
I tested this with encryptedWithCertificateAes128.pdf from the itext distribution
Usage:
python3 decryptpdf.py encryptedWithCertificateAes128.pdf test.p12 kspass
Copyright (c) 2016 Willem Hengeveld <itsme... | 110 | 33.35 | 104 | 16 | 1,219 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_9eab437bddf460ee_557c67e6", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm ARC2](1) is broken or weak, and should not be used.", "... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The cryptographic algorithm ARC2](1) is broken or weak, and should not be used."
] | [
94
] | [
null
] | [
17
] | [
40
] | |
2024-11-18T22:55:27.797482+00:00 | 1,626,684,314,000 | 5ef307ca33a7f0aaebce4af9afa22495a851842b | 3 | {
"blob_id": "5ef307ca33a7f0aaebce4af9afa22495a851842b",
"branch_name": "refs/heads/master",
"committer_date": 1626684314000,
"content_id": "8ea9f890523ee2e918d4db187dbd9efe7d1ddcd5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6846952897c2d33e8b015117a3828fae5730d80b",
"extension": "py"... | 2.640625 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Thu May 6 12:18:04 2021
@author: Koma
"""
import os
from Crypto.PublicKey import RSA
from Crypto import Random
from Crypto.Cipher import PKCS1_OAEP
class initialKeys():
def __init__(self, name, path):
self.name = name
self.path = path
# -------... | 60 | 33.27 | 70 | 17 | 447 | python | [{"finding_id": "codeql_py/weak-crypto-key_908c72e80a837bb2_01085a6f", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
24
] | [
null
] | [
15
] | [
61
] | |
2024-11-18T22:55:30.718013+00:00 | 1,617,191,113,000 | 5dc479cd4327d14f9b0909ab64a9e0adc2572017 | 3 | {
"blob_id": "5dc479cd4327d14f9b0909ab64a9e0adc2572017",
"branch_name": "refs/heads/master",
"committer_date": 1617191113000,
"content_id": "75ed60d39b4de8aba93cb68584bea20c68a64f89",
"detected_licenses": [
"MIT"
],
"directory_id": "3a01bf5a4c204c78094dc6ef44b927a97b2e4320",
"extension": "py",
"fi... | 2.703125 | stackv2 | #------------------------------------------------------------------------------#
# Author : Nicklas Sindlev Andersen #
#------------------------------------------------------------------------------#
#
#--------------------------------------------------------------------------... | 133 | 43.58 | 86 | 19 | 1,029 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_db14c0b2c5a111a6_953f0823", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
55
] | [
60
] | [
31
] | [
14
] | |
2024-11-18T22:55:33.514532+00:00 | 1,609,238,528,000 | 60e2cafe45f6c86cec188a3b7b2b4f7696b0ca61 | 3 | {
"blob_id": "60e2cafe45f6c86cec188a3b7b2b4f7696b0ca61",
"branch_name": "refs/heads/master",
"committer_date": 1609238528000,
"content_id": "8499bc31b71581af2af06aef0ec7c1656f55609d",
"detected_licenses": [
"MIT"
],
"directory_id": "bd492d9ef0a1b21627114b2ab6987b3a02662ba4",
"extension": "py",
"fi... | 2.578125 | stackv2 | # -*- coding: utf-8 -*-
"""Charge logging script
This script will download the get_vehicle_status every 5 minutes
and log them locally. Based on the Charge Off-Peak script.
This script is independent from visualization script in order to run it on different computers
"""
import jlrpy
import threading
import datetim... | 84 | 30.75 | 111 | 15 | 668 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5350dfaa75c1014e_8515ffa7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
67
] | [
null
] | [
24
] | [
73
] | |
2024-11-18T22:55:39.894527+00:00 | 1,553,272,167,000 | f712624f08e022edd5664cf166ab006dcfd48dfa | 3 | {
"blob_id": "f712624f08e022edd5664cf166ab006dcfd48dfa",
"branch_name": "refs/heads/master",
"committer_date": 1553272167000,
"content_id": "2a607100341a4c00e48664f4768585024ec952b7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "68361cd3f7fd49295dca1da3345324f10ff15e1e",
"extension": "py"... | 2.671875 | stackv2 | """
This script transforms JSON from the pa11ycrawler into a beautiful HTML
report.
"""
import re
import argparse
import json
import logging
import collections
import hashlib
from path import Path
from jinja2 import Environment, PackageLoader
from pa11ycrawler.util import pa11y_counts
log = logging.getLogger(__name__)... | 162 | 32.85 | 97 | 20 | 1,267 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_93ca01670b870b7a_a2d63c16", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
96
] | [
null
] | [
11
] | [
73
] | |
2024-11-18T23:24:00.033872+00:00 | 1,595,812,990,000 | 9bb509f5dc8d7b08af787721246355ebecee57de | 3 | {
"blob_id": "9bb509f5dc8d7b08af787721246355ebecee57de",
"branch_name": "refs/heads/master",
"committer_date": 1595812990000,
"content_id": "49e05ebc42400e72aad1b492be8d3a6bf2141ba3",
"detected_licenses": [
"MIT"
],
"directory_id": "976628c3df55a8611159dc5a93965dff4809bb7f",
"extension": "py",
"fi... | 3.3125 | stackv2 | import binascii
from Crypto.Cipher import AES
from ..config import AES_KEY
def encrypt_with_key(key, plain_text):
mod = len(plain_text) % 16
if mod > 0:
# 补齐16的倍数
zero = '\0' * (16 - mod)
plain_text += zero
aes = AES.new(key.encode(), AES.MODE_ECB)
cipher_text = binascii.hexl... | 48 | 22.79 | 83 | 14 | 294 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_9884d249b97441e7_00b586f1", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
15,
21
] | [
null,
null
] | [
36,
18
] | [
68,
62
] | |
2024-11-18T23:55:47.718818+00:00 | 1,480,343,863,000 | adb1b3decbd900314339eeb5c0644f5e57820028 | 2 | {
"blob_id": "adb1b3decbd900314339eeb5c0644f5e57820028",
"branch_name": "refs/heads/master",
"committer_date": 1480343863000,
"content_id": "e71456e21f4738351ebc9db8b0cdccf2f71d6efe",
"detected_licenses": [
"MIT"
],
"directory_id": "7926fa95138db21c3a56a1ecd5921e092ef05e89",
"extension": "py",
"fi... | 2.5 | stackv2 | import requests
import json
api_key = 'NmQ5N2I1YWQtZWU4Zi00ZTJkLTgwZjAtYjM0OGZkOTc1ZDJk'
username = raw_input('Please set the username: ')
playlist_name = raw_input('Please enter playlist name: ')
found = False
r = requests.get('http://api.napster.com/v2.0/members/'+username+'?apikey='+api_key)
GUID = r.json()['member... | 37 | 29.51 | 98 | 11 | 312 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f049225951aebbb0_8f57ba37", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
14
] | [
null
] | [
7
] | [
95
] | |
2024-11-19T00:07:06.674165+00:00 | 1,462,310,070,000 | 16e7a9603ad224088e5967658be5647b2604f1a3 | 2 | {
"blob_id": "16e7a9603ad224088e5967658be5647b2604f1a3",
"branch_name": "refs/heads/master",
"committer_date": 1462310070000,
"content_id": "01f3cdd3050eea02ff0f0187ecbd150bf930aba9",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "d2627ebbcbf46e6cdef158ff5e1bcbc3b5c7a90d",
"extension": "p... | 2.3125 | stackv2 | from gluon import *
import re, hashlib, base64
import rsa
import cPickle as pickle
from uuid import uuid4
try:
import ast
have_ast=True
except:
have_ast=False
regex_field = re.compile('{{(\w+)(\:\w+)?\!?}}')
regex_email = re.compile('[^\s<>"\',;]+\@[^\s<>"\',;]+',re.IGNORECASE)
def uuid():
return str... | 104 | 37.14 | 117 | 19 | 973 | python | [{"finding_id": "codeql_py/weak-crypto-key_672458d8b5d69b97_17ae7b73", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
20
] | [
null
] | [
24
] | [
41
] | |
2024-11-19T00:34:19.167983+00:00 | 1,623,691,598,000 | d7efc7ac1885f4dd696650ed608c92c9dc651cc4 | 4 | {
"blob_id": "d7efc7ac1885f4dd696650ed608c92c9dc651cc4",
"branch_name": "refs/heads/main",
"committer_date": 1623691598000,
"content_id": "c19be4137c1afaa498085426455c047c88c38d0c",
"detected_licenses": [
"MIT"
],
"directory_id": "c26b3a7d446fbfd71ce11e04129358c17dd6239a",
"extension": "py",
"file... | 3.78125 | stackv2 | '''
Description: Exercises 15 & 16 (Tkinter GUI)
Version: 1.0.2.20210124
Author: Arvin Zhao
Date: 2021-01-19 17:18:58
Last Editors: Arvin Zhao
LastEditTime: 2021-01-24 18:03:29
'''
from tkinter import Button, Tk, Label, Entry, StringVar, OptionMenu, Listbox
from tkinter.constants import END
class Home:
'''
The hom... | 91 | 23.96 | 80 | 15 | 736 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c0c4cd49cb49ffd2_b3373071", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
75
] | [
null
] | [
15
] | [
22
] | |
2024-11-19T00:34:41.165716+00:00 | 1,637,477,487,000 | 856d9f9c0285fe94d4f6487d7e0e212780be9e7f | 3 | {
"blob_id": "856d9f9c0285fe94d4f6487d7e0e212780be9e7f",
"branch_name": "refs/heads/main",
"committer_date": 1637477487000,
"content_id": "3fd130ea8ec30e27f512831ab07f4a5bda51681c",
"detected_licenses": [
"MIT"
],
"directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b",
"extension": "py",
"file... | 2.59375 | stackv2 | from flask import Flask, request, redirect, g
import sqlite3
import os
import uuid
app = Flask(__name__)
SCHEMA = """CREATE TABLE files (
id text primary key,
path text
);
"""
def db():
g_db = getattr(g, '_database', None)
if g_db is None:
g_db = g._database = sqlite3.connect("database.db")
retu... | 74 | 21.42 | 88 | 14 | 432 | python | [{"finding_id": "codeql_py/path-injection_b469805acc7a7665_0deb9ebd", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
59
] | [
null
] | [
15
] | [
41
] | |
2024-11-18T23:28:25.898269+00:00 | 1,593,422,349,000 | 0ea0660fc43c6e8e789e67d6e26fe1679f0ee0a8 | 3 | {
"blob_id": "0ea0660fc43c6e8e789e67d6e26fe1679f0ee0a8",
"branch_name": "refs/heads/master",
"committer_date": 1593422349000,
"content_id": "fe74e25543c80b0bc0ac23ee4fda302b2355b3ba",
"detected_licenses": [
"MIT"
],
"directory_id": "a728aa2d9826fdb3645ac61064b107115cf5c4a3",
"extension": "py",
"fi... | 2.640625 | stackv2 | import os
import datetime
import json
import pandas as pd
day_span = 2
num_stations = 5
measurements_dir = os.path.join(os.path.dirname(__file__), 'Measurements')
def get_neighbour(file_name, shift):
fileList = os.listdir(measurements_dir)
try:
index = fileList.index(file_name)
if index + shif... | 97 | 47.54 | 171 | 23 | 1,165 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dde0a895fd3be5ce_2ab13544", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
32
] | [
null
] | [
45
] | [
47
] | |
2024-11-18T23:28:31.209076+00:00 | 1,691,771,582,000 | 7a2be1bb90eea3f4cbc1d2957fef758e03fae75b | 3 | {
"blob_id": "7a2be1bb90eea3f4cbc1d2957fef758e03fae75b",
"branch_name": "refs/heads/master",
"committer_date": 1691834263000,
"content_id": "29fe737319dc1cb6643d77dc279dd9185a6fe175",
"detected_licenses": [
"Apache-2.0",
"MIT"
],
"directory_id": "3b44d7e0f8e5bc7ee9a6b922dc888db2b540871f",
"exten... | 2.6875 | stackv2 | # coding:utf-8
# Simple utility to convert json schema using jinja2 template
from __future__ import print_function
import argparse
import glob
import os
import json
import yaml
import jinja2
THIS_DIR = os.path.dirname(os.path.abspath(__file__))
def process_properties(properties):
if not properties:
retu... | 139 | 27.04 | 78 | 19 | 758 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_788e516abfae1c4c_b394219e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
101
] | [
103
] | [
14
] | [
26
] | |
2024-11-18T23:28:38.970343+00:00 | 1,449,221,421,000 | 49ffb9d8f0848968561d3548b3bcc24ec17ff435 | 3 | {
"blob_id": "49ffb9d8f0848968561d3548b3bcc24ec17ff435",
"branch_name": "refs/heads/master",
"committer_date": 1449221421000,
"content_id": "e58f711949284cbe1e7e0ba09a632abbc08cde83",
"detected_licenses": [
"ISC"
],
"directory_id": "7f1a92608dd899726e40aafadf2fe385e212ccc6",
"extension": "py",
"fi... | 3.234375 | stackv2 | #!/usr/bin/env python
import hashlib
from inputs import day4 as secret_key
m = hashlib.md5()
found_5 = False
found_6 = False
for i in range(100000000):
val = hashlib.md5(secret_key+str(i)).hexdigest()
if not found_5 and val.startswith('00000'):
found_5 = True
print("{} starts with 5 zeros and... | 19 | 28.95 | 87 | 13 | 167 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_135b26276ebc244a_0e30a298", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
11
] | [
null
] | [
23
] | [
40
] | |
2024-11-19T01:11:28.575192+00:00 | 1,613,657,802,000 | 8af714a64df08a98d19f215b436c393ed3f8931e | 2 | {
"blob_id": "8af714a64df08a98d19f215b436c393ed3f8931e",
"branch_name": "refs/heads/main",
"committer_date": 1613657802000,
"content_id": "517e7d8b3438235af873fc2429c833f47b33ce3e",
"detected_licenses": [
"MIT"
],
"directory_id": "77b35ee961733db0e1c76b02f36425910fb69308",
"extension": "py",
"file... | 2.359375 | stackv2 | #!/usr/bin/python3
# -*- coding: utf-8 -*-
# coding=utf-8
import os
import json
from datetime import date
from common import md5hd,loadconfig
import cgi, cgitb
def listdir(root,path):
config=loadconfig(root)
result=[]
listdir=os.listdir('.')
for i in listdir:
if not(i in config['forcehide'... | 44 | 21.2 | 84 | 22 | 248 | python | [{"finding_id": "codeql_py/path-injection_8fc2d9add77cd925_54e19a56", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
42
] | [
null
] | [
14
] | [
23
] | |
2024-11-19T01:11:33.695543+00:00 | 1,505,479,684,000 | eafe9753df995b72db95d8f66fdebc0a7e2b2aea | 3 | {
"blob_id": "eafe9753df995b72db95d8f66fdebc0a7e2b2aea",
"branch_name": "refs/heads/master",
"committer_date": 1505479684000,
"content_id": "b231e84b32c8725aca5e99ad0a46b830e9b876d1",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "74ff391cd93191dd1d2e0b8e957ab37850887ffc",
"extension": "p... | 3.015625 | stackv2 | #!/usr/bin/env python
# Author: Euaggelos Mouroutsos
# Secure Communication Project
# Implementation of a cryptographic utility
# Copyright (c) 2015, Euaggelos Mouroutsos
# All rights reserved.
# Redistribution and use in source and binary forms, with or without modification,
# are permitted provided that the follow... | 76 | 37.46 | 105 | 13 | 685 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_e9a8fad41b0c9c0d_12cb5e64", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
64,
73
] | [
null,
null
] | [
19,
18
] | [
43,
49
] | |
2024-11-18T23:11:00.818932+00:00 | 1,657,504,556,000 | 8f8e93006b88073ff762af8ec830a42051b78631 | 3 | {
"blob_id": "8f8e93006b88073ff762af8ec830a42051b78631",
"branch_name": "refs/heads/master",
"committer_date": 1657504556000,
"content_id": "047e1fd9e58d600f282f25133081e1d148689e24",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7fb2b9fff72919345c910b93089eb50d1a3ec64c",
"extension": "py"... | 3.046875 | stackv2 | #!/bin/env python3
try:
import bcrypt, base64
except ImportError:
raise ImportError("Missing 'bcrypt' or 'base64' libraries ")
# Password Format: 5char-5char-5char-5char
MYPASSWORD = b"a1b2c-3d4e5-f6g7h-8i9ab"
# Generate ascii encoded encrypted password with random salt
encrypted_password = bcrypt.hashpw(MYP... | 16 | 27.25 | 64 | 9 | 135 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9a5a810b3b9865b3_9b952a50", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
16
] | [
null
] | [
39
] | [
51
] | |
2024-11-18T23:11:14.920882+00:00 | 1,629,214,842,000 | 1c3369fa82d9cc4300b506c43719eba5630ecc5d | 3 | {
"blob_id": "1c3369fa82d9cc4300b506c43719eba5630ecc5d",
"branch_name": "refs/heads/master",
"committer_date": 1629214842000,
"content_id": "2e88a28d431e681aa8ba7300b4e1f436e6a4127c",
"detected_licenses": [
"MIT"
],
"directory_id": "3bdd67ba31d0cff2934cbb57e3ec4a35a8554444",
"extension": "py",
"fi... | 2.53125 | stackv2 | import requests
import json
import re
from api import cfg
CLIENT_ID = 'mao line bot'
CLIENT_VER = '1.0'
API_URL = 'https://safebrowsing.googleapis.com/v4/threatMatches:find?key=%s' % (cfg['google_api_key'])
PLATFORM_TYPES = ['ANY_PLATFORM']
THREAT_ENTRY_TYPES = ['URL']
THREAT_TYPES = [
'MALWARE',
'SOC... | 72 | 24.03 | 112 | 14 | 512 | python | [{"finding_id": "codeql_py/overly-large-range_b2041e6a3dbccd0f_5577352e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
33
] | [
null
] | [
54
] | [
57
] | |
2024-11-19T01:21:43.365976+00:00 | 1,673,345,931,000 | b58d7b966f3198e76dfe96580fed39664bb9ec13 | 2 | {
"blob_id": "b58d7b966f3198e76dfe96580fed39664bb9ec13",
"branch_name": "refs/heads/master",
"committer_date": 1673359073000,
"content_id": "3f60c45dea38aa0dee2125315288d1ad1209096c",
"detected_licenses": [
"MIT"
],
"directory_id": "ebf5002ce06c285cb0ca03ac7e5545253e8662ff",
"extension": "py",
"fi... | 2.34375 | stackv2 | import os
import asyncio
import requests
from datetime import datetime
import tornado.web
from tornado_sqlalchemy import SQLAlchemy
from tornado_sqlalchemy import SessionMixin
from pybrake.middleware.tornado import init_app
from sqlalchemy import Column, Integer, String
city_list = ["pune", "austin", "santabarbara",... | 92 | 27.92 | 80 | 14 | 598 | python | [{"finding_id": "codeql_py/reflective-xss_60eec7e76481ed65_0c0d7296", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-918"
] | [
"py/reflective-xss",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
65,
62
] | [
null,
64
] | [
24,
14
] | [
32,
10
] | |
2024-11-19T01:21:51.433245+00:00 | 1,594,022,993,000 | 8249e3f3e99fbcf58985afc51a4d5997ed635de1 | 3 | {
"blob_id": "8249e3f3e99fbcf58985afc51a4d5997ed635de1",
"branch_name": "refs/heads/master",
"committer_date": 1594022993000,
"content_id": "571079596d1c9ff4db738f9d12cdb31e1759cfd8",
"detected_licenses": [
"MIT"
],
"directory_id": "ed35e9edeb3b4e01f7478a1046b31bb5e957e213",
"extension": "py",
"fi... | 2.71875 | stackv2 | #!/usr/bin/env python3
import re
import sys
import requests
from time import sleep
from shodan import Shodan
from datetime import datetime
from threading import Thread, activeCount
# Shodan API Key (change according to your Shodan API key)
api_key = ''
# Shodan search query
search_query = 'http.title:"BIG-IP®- Red... | 93 | 28.97 | 160 | 19 | 768 | python | [{"finding_id": "codeql_py/request-without-cert-validation_de64aea46ca0fa27_5335b8dd", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
49,
51
] | [
null,
null
] | [
13,
17
] | [
161,
104
] | |
2024-11-19T00:24:53.300999+00:00 | 1,634,217,370,000 | 454c7a82a9d3c5398ed1058eceeaaf540ef487b9 | 3 | {
"blob_id": "454c7a82a9d3c5398ed1058eceeaaf540ef487b9",
"branch_name": "refs/heads/master",
"committer_date": 1634217370000,
"content_id": "21df88f781ed43d4f832b176e21c9cc17a69bdc4",
"detected_licenses": [
"MIT"
],
"directory_id": "e8f3ec89630aa5a5b5a4eeedacfac3e55f105264",
"extension": "py",
"fi... | 2.515625 | stackv2 | ## The script can be run with Python 3.5 or higher version.
## The script requires 'requests' library to make the API calls. The library can be installed using the command: pip install requests.
import argparse
import requests
import time
import login.login_api as login_api
def get_usage():
return ("\nThe comman... | 149 | 40.83 | 143 | 22 | 1,275 | python | [{"finding_id": "codeql_py/request-without-cert-validation_7826240710cc46c1_e4897119", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
41,
58,
87
] | [
null,
null,
null
] | [
32,
40,
29
] | [
125,
129,
100
] | |
2024-11-19T00:36:48.567401+00:00 | 1,542,523,581,000 | c160b7af00f99ab0d402bf990f70a465915f3e2d | 3 | {
"blob_id": "c160b7af00f99ab0d402bf990f70a465915f3e2d",
"branch_name": "refs/heads/master",
"committer_date": 1542965228000,
"content_id": "72b8e493b6d6d4d11d18265549d770498784e32c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "377eec02ac9c908f4aad06768f019ae2f685eb55",
"extension": "py"... | 2.609375 | stackv2 | import argparse
import configparser
import traceback
import sys
import tempfile
from typing import Dict, Any
from os import path, remove
from zulipterminal.core import Controller
def parse_args() -> argparse.Namespace:
description = '''
Starts Zulip-Terminal.
'''
formatter_class = argparse.Ra... | 156 | 29.78 | 78 | 17 | 1,168 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_31247c63d6d74464_557e1437", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text."
] | [
77
] | [
80
] | [
17
] | [
38
] | |
2024-11-19T00:51:23.056571+00:00 | 1,541,427,421,000 | 21a4be2ce76a10dc8b75fe97588bd8ae9d1c689e | 3 | {
"blob_id": "21a4be2ce76a10dc8b75fe97588bd8ae9d1c689e",
"branch_name": "refs/heads/master",
"committer_date": 1541427421000,
"content_id": "62e43e35d2b28d1159aa1e7b99b21ab8096d1f00",
"detected_licenses": [
"MIT"
],
"directory_id": "4bb0f9785c7802703b515d269798a8d8c69e67ae",
"extension": "py",
"fi... | 2.640625 | stackv2 | from flask import Flask, request
import data.init_users
app = Flask(__name__)
@app.route('/response', methods=['POST'])
def receive_SMS():
# Receives SMS from users who wants to register to use the service
sms = request.get_json()
phonenum, message = sms['phone'], sms['content']
init_users(phonenum, message)
p... | 19 | 22.89 | 72 | 11 | 108 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_79b8de67575e7c62_65952c05", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-215"
] | [
"py/clear-text-logging-sensitive-data",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
14,
18
] | [
null,
null
] | [
8,
2
] | [
72,
21
] | |
2024-11-19T01:02:28.763794+00:00 | 1,319,839,311,000 | bdf602d658d9d7905b9127b68879886d2a882645 | 2 | {
"blob_id": "bdf602d658d9d7905b9127b68879886d2a882645",
"branch_name": "refs/heads/master",
"committer_date": 1319839311000,
"content_id": "eedfe7a4326a5a00941e42518f702ff31d16f0d5",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "60fa6288d7745ea0f51f23bb6d9ef561c2c55b73",
"extension": "p... | 2.453125 | stackv2 | import cgi
_builtin_renderers = {}
error_formatters = []
#
# JSON rendering engine
#
class JsonRenderer(object):
def __init__(self, path, extra_vars):
pass
def render(self, template_path, namespace):
from jsonify import encode
return encode(namespace)
_builtin_renderers['json'] ... | 189 | 29.53 | 150 | 16 | 1,240 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fc7d458b147bebd3_ce2ddb0d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
110
] | [
null
] | [
24
] | [
66
] | |
2024-11-18T23:48:42.081937+00:00 | 1,623,166,327,000 | f06a22c422dbf4152cc06fadcdacb09ef2ff5f05 | 3 | {
"blob_id": "f06a22c422dbf4152cc06fadcdacb09ef2ff5f05",
"branch_name": "refs/heads/main",
"committer_date": 1623166327000,
"content_id": "ef429fda1150c6112a88b6c3592aca88a1ad4f50",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c82b789c5055ef0b5bd137dc62be01ea3fdbed9e",
"extension": "py",
... | 2.71875 | stackv2 | import requests
from geopy.geocoders import Nominatim
import json
import os
import sys
def reverse_geocode(coordinates):
api_key = os.environ.get('POSITIONSTACK_API')
lat, lng = [x.strip() for x in coordinates.split(',')[:2]]
query = f'http://api.positionstack.com/v1/reverse?access_key={api_key}&query={lat... | 33 | 26.42 | 112 | 14 | 233 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_45ff97acace66466_6d273092", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
17
] | [
null
] | [
11
] | [
14
] | |
2024-11-19T01:51:50.098163+00:00 | 1,412,591,981,000 | 8e7a63c7138bc500e84c450a8b1ae8bb874a7020 | 2 | {
"blob_id": "8e7a63c7138bc500e84c450a8b1ae8bb874a7020",
"branch_name": "refs/heads/master",
"committer_date": 1412591981000,
"content_id": "2dbe87c742647ba5ac8963b43c029b3f3a8e0db6",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "75396ddf9cd7ecfcb9466a67010e9cf94707ae63",
"extension": "p... | 2.34375 | stackv2 | #!/usr/bin/env python
# -*- encoding: utf-8 -*-
import pkg_resources
werkzeug = pkg_resources.get_distribution("werkzeug")
import re
import json
import base64
import struct
from os.path import isfile
from hashlib import sha1
from werkzeug.wrappers import Request as _Request, Response
from werkzeug.exceptions import... | 119 | 28.55 | 85 | 18 | 821 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_eac6f410b7089799_e4fc790c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
53
] | [
null
] | [
38
] | [
41
] | |
2024-11-19T01:51:52.774501+00:00 | 1,603,495,225,000 | 6c53949fe2bc5183359999761be620a376e738c0 | 3 | {
"blob_id": "6c53949fe2bc5183359999761be620a376e738c0",
"branch_name": "refs/heads/main",
"committer_date": 1603495225000,
"content_id": "e759aba6b62e1c20fe370293a40605b058e00ece",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1804b5702536c4b28c2b96ffa6b0e429b754865e",
"extension": "py",
... | 2.734375 | stackv2 | """
Simple Flask web site
"""
import flask # The basic framework for http requests, storing cookies, etc
import logging # For monitoring and debugging
from werkzeug.utils import secure_filename
import os
import tempfile
from skeleton import runner, runner2 ### import our project file
import pandas
UPLOAD_FOLDER = ... | 156 | 27.51 | 75 | 13 | 1,058 | python | [{"finding_id": "codeql_py/log-injection_6380697eb4022c07_a14c0f17", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
65
] | [
null
] | [
26
] | [
64
] | |
2024-11-19T01:51:56.716553+00:00 | 1,609,267,873,000 | 89c4d7d0ac107ff279186521048c19e75bfea667 | 2 | {
"blob_id": "89c4d7d0ac107ff279186521048c19e75bfea667",
"branch_name": "refs/heads/master",
"committer_date": 1609267873000,
"content_id": "542af0b494f5376d0ab21c128f921d3f248adf3b",
"detected_licenses": [
"MIT"
],
"directory_id": "d0c00685d91b73273acd8d0eaa1f4190afca2bc2",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/python3
# vougen
# This is for to create Mikrotik Hotspot User & the voucher for it.
# It can write the created user(s) directly on the Mikrotik Routers
# Developed by Pezhman Shafigh
# January 2019
from tkinter import *
from tkinter import ttk
from tkinter import messagebox
import subprocess
from reportl... | 338 | 38.58 | 122 | 19 | 3,797 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_398243a6a57e7c52_553395b9", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](1) as clear text."
] | [
253
] | [
null
] | [
39
] | [
51
] | |
2024-11-19T01:52:01.473986+00:00 | 1,505,858,569,000 | 4a2370e1201ebd438b36785b335a26f5cb36f22c | 2 | {
"blob_id": "4a2370e1201ebd438b36785b335a26f5cb36f22c",
"branch_name": "refs/heads/master",
"committer_date": 1505858569000,
"content_id": "f1072423b57374f5fd00b6a6895fe4589fcb11f4",
"detected_licenses": [
"MIT"
],
"directory_id": "25e10810e6763931e2b57d93d8df84736ee1b855",
"extension": "py",
"fi... | 2.4375 | stackv2 | '''
Created on Aug 31, 2017
@author: paul
'''
from jinja2 import Environment, FileSystemLoader
import yaml
import sys
import csv
ENV = Environment(loader=FileSystemLoader('.'))
with open("CTP.yaml") as _:
config = yaml.load(_)
trainAssetToNetwork = csv.DictReader(open("CTPassetToNetwork.csv"))
trainVars = {}
... | 34 | 19.74 | 67 | 10 | 188 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c02f612037993a7f_1224f738", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
12
] | [
null
] | [
7
] | [
48
] | |
2024-11-19T01:40:01.174180+00:00 | 1,576,626,927,000 | bc34ac2ae0eb04e6d45dd646972d95a08210e81a | 2 | {
"blob_id": "bc34ac2ae0eb04e6d45dd646972d95a08210e81a",
"branch_name": "refs/heads/master",
"committer_date": 1576626927000,
"content_id": "f37f3081b4527e46240e7866d21b88a1c5b1147a",
"detected_licenses": [
"MIT"
],
"directory_id": "43a663d89c115452fdbfcb7e1c71252b573fac67",
"extension": "py",
"fi... | 2.359375 | stackv2 | from urllib.request import urlopen, urlretrieve
from urllib.parse import urlparse
from typing import Iterable
from subprocess import Popen, PIPE
from threading import Thread
from traceback import print_exc
import json
import sys
import platform
import tarfile
import zipfile
import os
import os.path
import venv
import t... | 348 | 35.64 | 94 | 20 | 2,575 | python | [{"finding_id": "codeql_py/tarslip_7e4e23b4bcbe7a61_5bb643ef", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
298
] | [
null
] | [
36
] | [
55
] | |
2024-11-19T01:40:02.041482+00:00 | 1,659,864,747,000 | f1524d306e07e95b0a7d58d55b98d156134bcd41 | 4 | {
"blob_id": "f1524d306e07e95b0a7d58d55b98d156134bcd41",
"branch_name": "refs/heads/master",
"committer_date": 1659864747000,
"content_id": "8b6bf15146c1a4544fd797794736a1ea41d393ff",
"detected_licenses": [
"MIT"
],
"directory_id": "d1ed14daed2b2ebc0f7f7e5810f0715a57ac30c4",
"extension": "py",
"fi... | 4.28125 | stackv2 | """
Regular Expressions
“Knowing [regular expressions] can mean the difference between solving a problem in 3 steps and solving it
in 3,000 steps. When you’re a nerd, you forget that the problems you solve with a couple keystrokes can
take other people days of tedious, error-prone work to slog through.”
"""
def i... | 302 | 33.01 | 127 | 11 | 2,844 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c7227b4a2f4bbe9c_6b8c389d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
286
] | [
null
] | [
7
] | [
19
] | |
2024-11-19T00:32:59.001134+00:00 | 1,476,299,887,000 | b47ade29440be7db812b0031ab2b9eb43a22bb79 | 2 | {
"blob_id": "b47ade29440be7db812b0031ab2b9eb43a22bb79",
"branch_name": "refs/heads/master",
"committer_date": 1476299887000,
"content_id": "6f20e6c094f9973abcd7054318daef2cbbec61c9",
"detected_licenses": [
"MIT"
],
"directory_id": "9e4e37fd214ea5e840ec3a2c82003ce4af7a11f5",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/env python
################################################################################
#
# A poorly written Slack integration that enables adding
# IP addresses to a Palo Alto dynamic blacklist located on a remote server.
#
# Curently built to run from /opt/blockip/
#
# https://github.com/ecapuano/sl... | 265 | 36.65 | 142 | 21 | 2,648 | python | [{"finding_id": "codeql_py/full-ssrf_0ffc300302900317_9b8093e8", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 45 | true | [
"CWE-918",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE... | [
"py/full-ssrf",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-inje... | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIU... | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MED... | [
"The full URL of this request depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This l... | [
253,
59,
67,
67,
77,
77,
84,
99,
99,
99,
113,
113,
121,
133,
143,
143,
143,
143,
159,
159,
159,
159,
161,
173,
184,
187,
190,
195,
200,
204,
207,
212,
212,
212,
212,
212,
216,
218,
233,
238,
246,
246,
255,
256,
260
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null... | [
7,
61,
74,
85,
61,
72,
56,
69,
74,
77,
59,
69,
51,
53,
70,
81,
94,
114,
72,
83,
96,
116,
79,
47,
50,
44,
40,
44,
66,
63,
62,
62,
65,
77,
90,
100,
62,
49,
63,
62,
67,
75,
46,
48,
46
] | [
65,
73,
83,
89,
70,
76,
60,
73,
76,
82,
68,
73,
53,
55,
72,
93,
103,
119,
74,
95,
105,
121,
81,
49,
52,
46,
42,
47,
69,
66,
65,
64,
76,
89,
99,
105,
64,
64,
65,
64,
74,
87,
53,
57,
53
] | |
2024-11-19T00:32:59.902299+00:00 | 1,613,810,838,000 | 8c559b11c24939aab882a22c3afb49d756ac7c3b | 2 | {
"blob_id": "8c559b11c24939aab882a22c3afb49d756ac7c3b",
"branch_name": "refs/heads/master",
"committer_date": 1613810838000,
"content_id": "5323d80d89da0e6714919670140882fd439ddf25",
"detected_licenses": [
"MIT"
],
"directory_id": "fa339d9eea1f93b012da221cafb6c6ac542d53be",
"extension": "py",
"fi... | 2.34375 | stackv2 | # coding: utf-8
import json
from flask import request
from apps import app
import logging
logging.getLogger("request_handler")
# 设置请求钩子
@app.before_request
def before_request():
if request.method.lower() == "get":
if request.args:
parameter = request.args.to_dict(flat=True)
loggin... | 37 | 26.05 | 74 | 18 | 225 | python | [{"finding_id": "codeql_py/log-injection_6b5152d43c2f045b_62199358", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
20
] | [
null
] | [
26
] | [
61
] | |
2024-11-19T00:33:07.644205+00:00 | 1,481,123,732,000 | b365dcac2b3b6f54c133d81a726bd2e951bf3982 | 3 | {
"blob_id": "b365dcac2b3b6f54c133d81a726bd2e951bf3982",
"branch_name": "refs/heads/master",
"committer_date": 1481123732000,
"content_id": "7dd81ece5cc39938fc6750fc3b97e6f7968c085e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "50789291ac0cc4a9298f35db7f9cea37b69dbd1f",
"extension": "py"... | 2.84375 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
import sys, random, json, urllib2, codecs
generateChars = u"abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
sqlBoilerplate = """SET NAMES 'utf8mb4';
use students;
INSERT INTO students(forename, surname, email, gender, group_id, exam_results, birth_year, is_fore... | 75 | 32.28 | 167 | 16 | 739 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_97a65a351ec140cb_7496b47e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
71
] | [
null
] | [
12
] | [
29
] | |
2024-11-19T01:18:09.103392+00:00 | 1,520,584,727,000 | ca04f03399adfdb28c036d1b37a7a4f5f87a6777 | 2 | {
"blob_id": "ca04f03399adfdb28c036d1b37a7a4f5f87a6777",
"branch_name": "refs/heads/master",
"committer_date": 1520584727000,
"content_id": "3cd15190d91f1d46bea5cd51700d799455c711ad",
"detected_licenses": [
"ZPL-2.1"
],
"directory_id": "eb732d45c3b61d843acb9486400241f531f81a98",
"extension": "py",
... | 2.421875 | stackv2 | ### -*- coding: utf-8 -*- #############################################
# Developed by Maksym Polshcha (maxp@sterch.net)
# All right reserved, 2012-2014
#######################################################################
"""Client classes for the Zope 3 based
"""
__author__ = """Polscha Maxim (maxp@sterch.net)
... | 137 | 40.74 | 139 | 15 | 1,409 | python | [{"finding_id": "codeql_py/insecure-protocol_f7de07c28ed24f7e_f037c1bf", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.wrap_socket](1).", "remediation": "", "l... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.wrap_socket](1)."
] | [
131
] | [
null
] | [
25
] | [
109
] | |
2024-11-19T00:25:34.622768+00:00 | 1,568,540,884,000 | b4c981205ebd71573e218ae432aab5f91f31c250 | 2 | {
"blob_id": "b4c981205ebd71573e218ae432aab5f91f31c250",
"branch_name": "refs/heads/master",
"committer_date": 1568540884000,
"content_id": "8db049829b12ab6dc322d7f36df7521433900443",
"detected_licenses": [
"MIT"
],
"directory_id": "b8545bf4b35de29f4b91ecedaa0cf22f44d3c8ab",
"extension": "py",
"fi... | 2.46875 | stackv2 |
import os
import sys
from collections import OrderedDict
import binarybrain as bb
import urllib.request
import tarfile
import gzip
import shutil
if 'ipykernel' in sys.modules:
from tqdm import tqdm_notebook as tqdm
else:
from tqdm import tqdm
def wget(url, filename):
with urllib.request.urlopen(url) as r... | 191 | 36.1 | 149 | 19 | 1,566 | python | [{"finding_id": "codeql_py/tarslip_217dc5da4cce3410_1b56baae", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
24
] | [
null
] | [
9
] | [
14
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.