added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T20:43:40.467709+00:00 | 1,625,684,080,000 | f47a78f99bb063145054d6c1a4909a3604872889 | 3 | {
"blob_id": "f47a78f99bb063145054d6c1a4909a3604872889",
"branch_name": "refs/heads/master",
"committer_date": 1625684080000,
"content_id": "a1a2acce92e204afcd02c3aceac2f5aac70bfc39",
"detected_licenses": [
"MIT"
],
"directory_id": "eef22868da208704e00cdd56996b8b5aa3e5fbfe",
"extension": "py",
"fi... | 2.921875 | stackv2 | # -*- coding: utf-8 -*-
'''
Author: David J. Morfe
Application Name: gomaps.utils
Functionality Purpose: Provides utility functions with some also useful for external consumption
Version: Beta
'''
#5/25/20
import requests, time, os, sys, re
import pyppdf.patch_pyppeteer
from requests_html import HTMLSession
from urlli... | 303 | 36.68 | 105 | 18 | 2,878 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_5861509ce01938d9_9b47d6aa", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor... | 5 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This string, which is used as a regular expression [here](1), has an unescaped '.' before 'google.com/map', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'google.com/maps/preview/place/', so it might match more hosts than expected.",
"This regular expression... | [
16,
83,
112,
136,
144
] | [
null,
null,
null,
null,
null
] | [
9,
15,
15,
15,
34
] | [
39,
63,
63,
63,
68
] | |
2024-11-18T20:43:46.767846+00:00 | 1,551,027,209,000 | dbb8445b7a4968d090b610a7a63e69e3aa0b752b | 3 | {
"blob_id": "dbb8445b7a4968d090b610a7a63e69e3aa0b752b",
"branch_name": "refs/heads/master",
"committer_date": 1551027209000,
"content_id": "ed08bdcdccea2a016b848ec09c12947be2423970",
"detected_licenses": [
"MIT"
],
"directory_id": "b6f95db62b7dccb6e721d4df00753893fa6be967",
"extension": "py",
"fi... | 2.671875 | stackv2 | import json
import urllib.request
import pandas as pd
import dash_app as app
config = json.load(open("../api_key.json"))
def alpha_url(symbol,interval):
base_query = "https://www.alphavantage.co/query"
function = "?function=TIME_SERIES_INTRADAY"
api_key = "&apikey="+config['alphavantage']
symbol_quer... | 24 | 25.54 | 84 | 11 | 160 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_966dab3438968379_370f1383", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
20
] | [
null
] | [
7
] | [
10
] | |
2024-11-18T20:43:47.680058+00:00 | 1,515,319,031,000 | 831c617583bb6e90265a9156c5b926d3a9fe04f2 | 2 | {
"blob_id": "831c617583bb6e90265a9156c5b926d3a9fe04f2",
"branch_name": "refs/heads/master",
"committer_date": 1515319031000,
"content_id": "6e15099ce124ca6015caafab14449e2d29734a92",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "757bbc0b7a9aff3ebe426f5bfe606df165fd0735",
"extension": "py"... | 2.46875 | stackv2 | #!/usr/bin/python
# coding: utf-8
"""
File: demo.py
Author: zhangxu01 <zhangxu01@zhihu.com>
Date: 2017-08-28 22:59
Description: demo
"""
import random
import time
import urllib
import requests
import tornado
from tornado import gen, web
from tornado.httpclient import AsyncHTTPClient, HTTPRequest
@gen.coroutine
def ... | 102 | 23.72 | 97 | 16 | 648 | python | [{"finding_id": "codeql_py/reflective-xss_1653feac48e4d373_cbdca39e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
77
] | [
null
] | [
20
] | [
81
] | |
2024-11-18T20:44:06.850587+00:00 | 1,669,000,724,000 | d606314dda61c762ad17ffc869258def04c7e2a1 | 3 | {
"blob_id": "d606314dda61c762ad17ffc869258def04c7e2a1",
"branch_name": "refs/heads/master",
"committer_date": 1669000724000,
"content_id": "fe30c26741c3ef12eca37b6d00d617271b104d84",
"detected_licenses": [
"MIT"
],
"directory_id": "4cfd9c42794fa07cc3f5a6cb73119604037be347",
"extension": "py",
"fi... | 2.984375 | stackv2 | #!/usr/bin/env python
# (c) Stefan Countryman (2018)
"""
Take my heirarchically-organized passwords directory and dump everything to a
.netrc-formatted file.
"""
import os
SECRETPATH = os.path.expanduser("~/secrets")
OUTFILE = os.path.join(SECRETPATH, ".netrc")
def load_secrets(secretpath):
"""Load passwords a... | 59 | 33.8 | 77 | 21 | 469 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ba09e8be90fff258_3a326180", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.",
"This expression stores [sensitive data ... | [
45,
49
] | [
null,
null
] | [
24,
36
] | [
48,
70
] | |
2024-11-18T20:57:29.651326+00:00 | 1,610,032,405,000 | 21868acaa615bb2b7a2341f68b826fb7013f617c | 4 | {
"blob_id": "21868acaa615bb2b7a2341f68b826fb7013f617c",
"branch_name": "refs/heads/master",
"committer_date": 1610032405000,
"content_id": "aa6a0def38499f0f7313f40b365916795f2c8949",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6312546e116a8c692890b1fc12e2ca681b7a455a",
"extension": "py"... | 3.859375 | stackv2 |
class Student(object):
__sex = '男'
def __init__(self, name, age):
self.name = name
self.age = age
def study(self, course_name):
print("%s正在学习%s." %(self.name, course_name))
def watch_movie(self):
if (self.age > 16):
print('%s在看鬼灭之刃.' %self.name)
else:
print('%s在看火影忍者.' %self... | 30 | 17.77 | 48 | 14 | 186 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_04ba1871a6149abb_69ec66d8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
23
] | [
null
] | [
9
] | [
27
] | |
2024-11-18T20:57:31.482104+00:00 | 1,615,267,844,000 | a44310d3a7c880513478931cf52be73efcd378cd | 3 | {
"blob_id": "a44310d3a7c880513478931cf52be73efcd378cd",
"branch_name": "refs/heads/master",
"committer_date": 1615267844000,
"content_id": "e9a054c6bb87d140fab1106785e0b151806be1cd",
"detected_licenses": [
"MIT"
],
"directory_id": "12b95692086d5c10d956d88647af83a91d279a0e",
"extension": "py",
"fi... | 2.609375 | stackv2 | from flask import Flask, request, make_response
from datetime import datetime, timedelta
app = Flask(__name__)
@app.route('/')
def index():
response = make_response('<h1>This document is response test.</h1>')
return response
@app.route('/write_cookie/<cv>')
def write_cookie(cv):
response = make_respons... | 32 | 22 | 72 | 11 | 181 | python | [{"finding_id": "codeql_py/cookie-injection_c824a269fb2d5dd8_ece718fb", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "... | 2 | true | [
"CWE-020",
"CWE-079"
] | [
"py/cookie-injection",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cookie is constructed from a [user-supplied input](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
18,
28
] | [
null,
null
] | [
31,
12
] | [
33,
17
] | |
2024-11-18T20:57:39.630943+00:00 | 1,514,466,647,000 | 308a2accdb646444b2402bdebdbd5e71633d562d | 3 | {
"blob_id": "308a2accdb646444b2402bdebdbd5e71633d562d",
"branch_name": "refs/heads/master",
"committer_date": 1514466647000,
"content_id": "35a54eeb032a3ae80c2099994a84af5220ac5d04",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "12a1a5a0b4e4565f73d893f9340fab5a4664faf6",
"extension": "py"... | 2.515625 | stackv2 | """The registration module contains classes for image registration.
Image registration aims to align two images using a particular transformation.
miapy currently supports multi-modal rigid registration, i.e. align two images of different modalities
using a rigid transformation (rotation, translation, reflection, or t... | 111 | 50.97 | 139 | 24 | 1,190 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_95840f2758c39a0d_0509032d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
61
] | [
null
] | [
47
] | [
56
] | |
2024-11-18T20:57:53.910868+00:00 | 1,486,578,496,000 | e8592199918d127ec0421cd32798201605a9129d | 3 | {
"blob_id": "e8592199918d127ec0421cd32798201605a9129d",
"branch_name": "refs/heads/master",
"committer_date": 1486578496000,
"content_id": "c9ff2e59e7d34585ce65dbf7dc5107e50a6b7c0d",
"detected_licenses": [
"Unlicense"
],
"directory_id": "6d92507615e7fa2cf132fed44be5e49290273471",
"extension": "py",... | 2.875 | stackv2 | import requests
from pyblynkrestapi.BlynkClient import TCP_Client
import threading
import collections
import json
import logging
class PyBlynkException(Exception):
pass
PinHandler = collections.namedtuple('PinHandler', 'pin_number handler')
class PyBlynkRestApi(object):
"""
http://docs.blynkapi.apiary.i... | 239 | 32.87 | 95 | 15 | 1,740 | python | [{"finding_id": "codeql_py/request-without-cert-validation_932d2834968dd502_be036307", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
105,
198,
236
] | [
null,
null,
null
] | [
13,
20,
20
] | [
75,
95,
95
] | |
2024-11-18T20:58:03.936446+00:00 | 1,585,751,880,000 | 8cf9e6f059648360ababfcee9cea47c8ec837661 | 3 | {
"blob_id": "8cf9e6f059648360ababfcee9cea47c8ec837661",
"branch_name": "refs/heads/master",
"committer_date": 1585751880000,
"content_id": "0dc06b42c7b5d489f549209521e899a83f41e57d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a8d2258e596a9bf0c25810ec05a250b662f515b1",
"extension": "py"... | 2.53125 | stackv2 | import os
from django.http import HttpResponse
from django.utils.datastructures import MultiValueDictKeyError
from rest_framework import status
from rest_framework.response import Response
from rest_framework.views import APIView
from presqt.api_v1.utilities import (get_process_info_data, process_token_validation)
fr... | 77 | 33.27 | 106 | 17 | 535 | python | [{"finding_id": "codeql_py/path-injection_1dfc65f1b73360d1_8d1e4312", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
71
] | [
null
] | [
42
] | [
55
] | |
2024-11-18T20:58:12.616908+00:00 | 1,502,045,005,000 | a7fc095bfe9738c1e7c60ba38a3fa9e94b85d8f0 | 3 | {
"blob_id": "a7fc095bfe9738c1e7c60ba38a3fa9e94b85d8f0",
"branch_name": "refs/heads/master",
"committer_date": 1502045005000,
"content_id": "c0f2db0278a92dfdf3da0d3ad83f600b0a1a9d09",
"detected_licenses": [
"MIT"
],
"directory_id": "9785e19de95ee0bf1be3296506db93b304b59ab2",
"extension": "py",
"fi... | 2.875 | stackv2 | #!/usr/bin/python
"""Copyright® Anas Yousef 2017"""
from urllib.request import urlopen
from bs4 import BeautifulSoup
from selenium import webdriver
from selenium.common.exceptions import *
from time import sleep
import urllib.parse
class RetrieveAdInfo:
def __init__(self, keyword, location=None, page=1):
... | 194 | 30.27 | 120 | 20 | 1,311 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b86d23e37f96fb51_0debf28e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
188
] | [
null
] | [
24
] | [
119
] | |
2024-11-18T20:58:14.931038+00:00 | 1,469,899,427,000 | 41356ed946627629c778b740ac25176e82c0cdd8 | 3 | {
"blob_id": "41356ed946627629c778b740ac25176e82c0cdd8",
"branch_name": "refs/heads/master",
"committer_date": 1469899427000,
"content_id": "149167f0d57847f49f41e6e1ab7706a66c1ed0c5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cf19eaebb169ded234e7f659fb668714d5353cce",
"extension": "py"... | 2.671875 | stackv2 | """
Rewrite of manager.py
Does configuration based on static topology.
"""
from paramiko import SSHClient, AutoAddPolicy
from scp import SCPClient
import json
import argparse
from janus.network.network_driver import JanusNetworkDriver
import time
###########################################
################ Globals ##... | 148 | 36.7 | 136 | 17 | 1,431 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_b80bba9af522968d_3f30b896", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
61
] | [
null
] | [
5
] | [
53
] | |
2024-11-18T20:58:19.579637+00:00 | 1,579,687,772,000 | bb6dcc753d3db1bb03b0e16e7114e125575220e1 | 2 | {
"blob_id": "bb6dcc753d3db1bb03b0e16e7114e125575220e1",
"branch_name": "refs/heads/master",
"committer_date": 1579687772000,
"content_id": "351afcc706261b47ff5034cfda3e51a842b3a21c",
"detected_licenses": [
"MIT"
],
"directory_id": "1f4018ed21de2d7e23bd9f1a8e024656701472bf",
"extension": "py",
"fi... | 2.3125 | stackv2 | # --------------------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for license information.
# --------------------------------------------------------------------... | 68 | 48.81 | 114 | 12 | 683 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c1d5cc9934402d64_ff58e900", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
40
] | [
null
] | [
26
] | [
53
] | |
2024-11-18T20:58:35.561916+00:00 | 1,547,883,187,000 | 055ef6bedab5b99a1d3547c0def843f8d7a1bc82 | 2 | {
"blob_id": "055ef6bedab5b99a1d3547c0def843f8d7a1bc82",
"branch_name": "refs/heads/master",
"committer_date": 1547883187000,
"content_id": "9baade530ee1cb1aac45f587d1975eea0f4bbc74",
"detected_licenses": [
"MIT"
],
"directory_id": "50529d41d7b49acbb8b326df9dc8cc84a9f2dd46",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!C:\Python36\python
print("Content-type:text/html")
print("")
import cgi, cgitb, mysql.connector
import datetime
print("""
<html>
<head>
<title>Mess management</title>
</head>
<body>
""")
now = datetime.datetime.now()
print ("Current date: "+now.strftime("%Y-%m-%d"))
... | 40 | 21.48 | 88 | 13 | 232 | python | [{"finding_id": "codeql_py/sql-injection_23e777dc8356fd8b_e0bb7866", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
31
] | [
null
] | [
20
] | [
25
] | |
2024-11-18T21:10:10.868263+00:00 | 1,587,376,040,000 | bc44df5a5cc12fb1aee098d5fa39e5ee804d761b | 3 | {
"blob_id": "bc44df5a5cc12fb1aee098d5fa39e5ee804d761b",
"branch_name": "refs/heads/master",
"committer_date": 1587376040000,
"content_id": "2bebcbd74af821cea4d40da891dbcd1b91c97166",
"detected_licenses": [
"MIT"
],
"directory_id": "00a19ab9cd6378bdf46cbadf0f62b8c8d8b295ac",
"extension": "py",
"fi... | 2.8125 | stackv2 | """ Simulate the YunTemp.
This is an extremely simple server that might be used for testing the arduino webserver interface.
It is based on flask. So before running it, you should run a
::
pip install flask, flask_basicauth
If you want to run it you can just start it through:
::
python yuntemp.py
This will... | 148 | 26.82 | 98 | 15 | 1,281 | python | [{"finding_id": "codeql_py/flask-debug_b03715544a9a1f8a_30f5ff3f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 6 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).\nCross-site scripting vulnerability due to a [user-pr... | [
148,
60,
81,
102,
123,
144
] | [
null,
null,
null,
null,
null,
null
] | [
5,
12,
12,
12,
12,
12
] | [
35,
32,
32,
32,
32,
32
] | |
2024-11-18T21:10:21.989021+00:00 | 1,604,738,542,000 | a911a361da2bda864ad8ce591fcf2118c1c71a98 | 2 | {
"blob_id": "a911a361da2bda864ad8ce591fcf2118c1c71a98",
"branch_name": "refs/heads/master",
"committer_date": 1604738542000,
"content_id": "6b736d3bf92bdbdd00994c0a00e38027b2af3b9c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "34d35c27c7b27e0cc896851366fc148c73c1d2bf",
"extension": "py"... | 2.484375 | stackv2 | import argparse
import hashlib
import io
import os
import tarfile
import time
import urllib3
import requests
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
with open('audio_example.mp3', 'rb') as f:
EXAMPLE_HASH = hashlib.sha256(f.read()).hexdigest()
class TemplateFiller:
def __new__... | 254 | 32.76 | 113 | 18 | 1,886 | python | [{"finding_id": "codeql_py/tarslip_29c10bbcbd9747f8_18d4759c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
208
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T21:10:32.449720+00:00 | 1,610,900,842,000 | fed46df0e78daeade7ae50259bf48c24098dc21c | 2 | {
"blob_id": "fed46df0e78daeade7ae50259bf48c24098dc21c",
"branch_name": "refs/heads/main",
"committer_date": 1610900842000,
"content_id": "f1f445338124a5fd77ebccd84f2e6f834da4ee30",
"detected_licenses": [
"MIT"
],
"directory_id": "aefa5e8a6d04305cc86fa38079bf68af77bee565",
"extension": "py",
"file... | 2.421875 | stackv2 | import os
from flask import Flask, render_template, request, redirect, url_for, session, flash
from werkzeug.utils import secure_filename
import pandas as pd
import shutil
from flask import send_from_directory
import imghdr
import HTN1.model23
length = 4
verbose = 0
UPLOAD_FOLDER = 'uploads'
allowed_extensions = se... | 133 | 26.34 | 102 | 17 | 846 | python | [{"finding_id": "codeql_py/url-redirection_8469f5d1713f1059_b1b2e2ff", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 3 | true | [
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
43,
50,
66
] | [
null,
null,
null
] | [
29,
29,
29
] | [
40,
40,
40
] | |
2024-11-18T21:10:33.878990+00:00 | 1,551,429,560,000 | 368246cd304868a49ae2752bf20ebf87f5984e25 | 3 | {
"blob_id": "368246cd304868a49ae2752bf20ebf87f5984e25",
"branch_name": "refs/heads/master",
"committer_date": 1551429560000,
"content_id": "01426fb4cc20dc496f86dc2dbe8536abb4e81b0c",
"detected_licenses": [
"MIT"
],
"directory_id": "f187c46651c99be86418741eeaf315be8977339e",
"extension": "py",
"fi... | 2.53125 | stackv2 | from flask import Flask, redirect, render_template, url_for, flash, request
import requests
import boto3
import os
import decision_trees
ALLOWED_EXTENSIONS = set(['csv'])
render_result = False
# initializes app and connect to db
app = Flask(__name__)
@app.route('/')
# Returns the dashboard page which displays all 4 ... | 114 | 37.18 | 156 | 14 | 1,042 | python | [{"finding_id": "codeql_py/flask-debug_8b0f2d5232f8a6b9_6396e3a6", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 10 | true | [
"CWE-215",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-918"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-pro... | [
111,
57,
58,
61,
63,
75,
77,
97,
100,
87
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
5,
24,
20,
20,
19,
20,
19,
16,
16,
11
] | [
51,
38,
30,
34,
29,
34,
29,
32,
32,
28
] | |
2024-11-18T21:10:51.478884+00:00 | 1,541,371,451,000 | c1f2c19e4a5ca3cc8fdb201f7409f24094ae75cc | 3 | {
"blob_id": "c1f2c19e4a5ca3cc8fdb201f7409f24094ae75cc",
"branch_name": "refs/heads/master",
"committer_date": 1541371451000,
"content_id": "ca182f621fcc0326d0acb6b6f3787ad01339f9b7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "29a1456effe92a36c93678f186b7575f5eb9fe7f",
"extension": "py"... | 2.65625 | stackv2 | from flask import Flask,render_template
from flask import jsonify,request
from model import Model1
# LR name of file , Model name of class
clf1 = Model1()
# 5at object mn el class elli hya Model fe clf
app = Flask(__name__)
#@app.route("/home")
#def index():
# return render_template('from.html')
@app.route("/rea... | 117 | 22.03 | 69 | 15 | 859 | python | [{"finding_id": "codeql_py/reflective-xss_374d7a7362598e09_b8f01f69", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
68
] | [
79
] | [
9
] | [
11
] | |
2024-11-18T21:10:59.672090+00:00 | 1,511,194,045,000 | 1714d0a92cff0f1015855fcf1fccb2022a63c925 | 3 | {
"blob_id": "1714d0a92cff0f1015855fcf1fccb2022a63c925",
"branch_name": "refs/heads/master",
"committer_date": 1511194045000,
"content_id": "b809cf6f3fb6a7d5cb8fda73cf195b9526f2530d",
"detected_licenses": [
"MIT"
],
"directory_id": "049c3e71141e336f6e504fe9330c9436a310e4d2",
"extension": "py",
"fi... | 2.5625 | stackv2 | #!/usr/bin/env python3
# Unique bot
import chatServer_snotbot as c
import random, re
from alle_reviews import reviews
# Sleep and output functions
def sleep(n):
c.sleep(n)
def output(s):
c.output(s)
# Setup and Response function
def setup():
global alle_software
global level
level = 1
... | 422 | 27.32 | 176 | 15 | 2,816 | python | [{"finding_id": "codeql_py/overly-large-range_67e8cbdbe37a70f1_3a80b753", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
411
] | [
null
] | [
45
] | [
48
] | |
2024-11-18T21:11:01.266587+00:00 | 1,387,383,090,000 | ae066982406a3f79eb70e1d0c2daa814c28a4bfd | 3 | {
"blob_id": "ae066982406a3f79eb70e1d0c2daa814c28a4bfd",
"branch_name": "refs/heads/master",
"committer_date": 1387383090000,
"content_id": "9f0f71aeceb6f800070d44b0b358e7d6104f56f4",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "6ffb56219714b7a58730293bc86b3d0aaa5351ba",
"extension": "p... | 2.515625 | stackv2 | # -*- coding: utf-8 -*-
# Copyright (c) 2012-2013 Infrae. All rights reserved.
# See also LICENSE.txt
# Helpers for cs_youtube ...
import urlparse
from AccessControl import ModuleSecurityInfo
module_security = ModuleSecurityInfo(
'Products.SilvaExternalSources.codesources.youtube')
# correct urls have a path ... | 112 | 33.7 | 91 | 16 | 1,086 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_de23f0b7f5b8ef69_d138ad28", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com](1) may be at an arbitrary position in the... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [youtube.com](1) may be at an arbitrary position in the sanitized URL."
] | [
92
] | [
null
] | [
8
] | [
49
] | |
2024-11-18T21:11:17.205041+00:00 | 1,519,355,646,000 | 92eb76ea19fadb73f7278095a93edcca0c8086a8 | 3 | {
"blob_id": "92eb76ea19fadb73f7278095a93edcca0c8086a8",
"branch_name": "refs/heads/master",
"committer_date": 1519355646000,
"content_id": "958582da9ce6e44a5c4d3f4e136ce7c61b4e205e",
"detected_licenses": [
"MIT"
],
"directory_id": "0cf08e3c68d0494be6310e16bdc57a086d8a2c7c",
"extension": "py",
"fi... | 3.03125 | stackv2 | import sys
import requests
from requests import ConnectionError
from .config_reader import ConfigurationReader
class NewsPulling:
"""Pull news from the internet depending on the source specified."""
def __init__(self, source):
self.source = source
def pull_news(self):
config = Configur... | 93 | 35.65 | 74 | 19 | 726 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_223d4b337faea79b_6d91fb58", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensi... | [
22,
79,
85,
88,
91
] | [
null,
null,
null,
null,
null
] | [
19,
23,
23,
23,
23
] | [
22,
49,
37,
49,
56
] | |
2024-11-18T19:03:18.637538+00:00 | 1,576,843,463,000 | 159a3ecfb8bb9488e1b1ca17cf61087910eb37a5 | 2 | {
"blob_id": "159a3ecfb8bb9488e1b1ca17cf61087910eb37a5",
"branch_name": "refs/heads/master",
"committer_date": 1576843463000,
"content_id": "38c8d5c04e4cf8dd7243b78343d9ac27e3fd5d70",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "8e8c5719c80636c390f5bb26b3e5a33ea97ca4e5",
"extension": "p... | 2.328125 | stackv2 | #!/usr/bin/env python3
# (c) Copyright IBM Corporation 2016
# LICENSE: BSD-3, https://opensource.org/licenses/BSD-3-Clause
# Use the dashDB analytics REST API to check that the dashDB Spark support
# is configured and accessible
import warnings
import sys, os
import json, requests
from requests.auth import HTTPBasicA... | 61 | 44.51 | 119 | 14 | 696 | python | [{"finding_id": "codeql_py/request-without-cert-validation_6119465c77cf2028_1a667c04", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
19,
26
] | [
20,
27
] | [
12,
17
] | [
33,
49
] | |
2024-11-18T19:03:28.827667+00:00 | 1,624,934,840,000 | 2a51db4ed6e222ae84196487ddd1fff88c274e13 | 3 | {
"blob_id": "2a51db4ed6e222ae84196487ddd1fff88c274e13",
"branch_name": "refs/heads/main",
"committer_date": 1624934840000,
"content_id": "8f3d155d74046d97f9b4b54625ade9029be7fe0f",
"detected_licenses": [
"MIT"
],
"directory_id": "21c4c2e96b5364088c2295efeef93d54a32147e1",
"extension": "py",
"file... | 2.71875 | stackv2 | import os
import time
from gcpprojectautomation import helpers
import googleapiclient.discovery
import json
import pprint
import logging as log
import googleapiclient.errors
class GCPProject(object):
"""
Class for creating new GCP Projects.
Assumes that the following commands have been run:
gcloud au... | 327 | 40.92 | 141 | 18 | 2,726 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f802243e5f66013f_9540e0c9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
267
] | [
null
] | [
22
] | [
67
] | |
2024-11-18T19:28:49.985997+00:00 | 1,533,582,882,000 | 3a83001ae8bc539058cfcbfc2a54c76b0c8362af | 3 | {
"blob_id": "3a83001ae8bc539058cfcbfc2a54c76b0c8362af",
"branch_name": "refs/heads/master",
"committer_date": 1533582882000,
"content_id": "8d80d3f6b6d94e274edab39950f874f1173bd879",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fee60412c2d7d0c5c6cd444159823b9cd4777b5c",
"extension": "py"... | 2.53125 | stackv2 | """Make authenticated requests to eclipse backends."""
import functools
import multiprocessing
import argparse
import json
import os
import requests
import math
import time
import hashlib
from common.id_token import get_id_token
from common.secret_keys import IDEUM_APP_SECRET
def get_arguments():
parser = argpar... | 58 | 37.41 | 104 | 17 | 528 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e5a2798f55409780_4776cca5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
32,
40
] | [
null,
null
] | [
9,
9
] | [
71,
69
] | |
2024-11-18T19:28:51.996898+00:00 | 1,441,165,020,000 | 45523cc1f1418ce16385af2556e636bec369382e | 2 | {
"blob_id": "45523cc1f1418ce16385af2556e636bec369382e",
"branch_name": "refs/heads/master",
"committer_date": 1441165020000,
"content_id": "01b2f1821ad0b161b2eba80c9a1e71ba3f9f4ca8",
"detected_licenses": [
"MIT"
],
"directory_id": "aa89d67372cfbd8c85eddbae54eac70e0a6618ae",
"extension": "py",
"fi... | 2.375 | stackv2 | # -*- coding: utf-8 -*-
import json
import tornado.httpserver
import tornado.ioloop
import tornado.options
import tornado.web
import hashlib
from tornado.options import define, options
define("port", default=8090, help="run on the given port", type=int)
class MainHandler(tornado.web.RequestHandler):
def post(self... | 39 | 30.18 | 68 | 13 | 264 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_a4662e1a41e5689f_dc0d707b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
19
] | [
null
] | [
32
] | [
62
] | |
2024-11-18T19:29:02.486492+00:00 | 1,496,186,151,000 | b046d2b2aab48f6a4e3b4a12c50b4f2e04b69966 | 3 | {
"blob_id": "b046d2b2aab48f6a4e3b4a12c50b4f2e04b69966",
"branch_name": "refs/heads/master",
"committer_date": 1496186151000,
"content_id": "e26383408be045bae07d98bed25ead8754b3b7fc",
"detected_licenses": [
"MIT"
],
"directory_id": "96281240d2adcd8c5ba028c40a92b48b3a039083",
"extension": "py",
"fi... | 2.765625 | stackv2 | #!/usr/bin/env python
"""
Script to check repair status on multiple nodes.
Uses SSH to connect to nodes and look for range_repair.py status output file. Aggregates status information for all
nodes.
Example:
./check_repair_status.py status.json cass-1.example.com cass-2.example.com cass-3.example.com
"""
import js... | 341 | 33.54 | 117 | 16 | 2,848 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_94ffa9e09d53c7e0_ec07129d", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
328
] | [
null
] | [
5
] | [
62
] | |
2024-11-18T20:18:25.002835+00:00 | 1,620,288,461,000 | 6fd081783059d3ab69ec99e0fd1d18f105e41a54 | 3 | {
"blob_id": "6fd081783059d3ab69ec99e0fd1d18f105e41a54",
"branch_name": "refs/heads/main",
"committer_date": 1620288461000,
"content_id": "de88cf4487de85a7125265440a2ff1601ce2537c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9d33f3525e04b4c8e527c2a1837a8ced83b6ae3d",
"extension": "py",
... | 2.53125 | stackv2 | import datetime
import time
import tkinter as tk
from datetime import date
from hashlib import sha256
from tkinter import messagebox
import requests
def get_calendar():
response = requests.get(
f"https://cdn-api.co-vin.in/api/v2/appointment/sessions/public/calendarByPin?pincode={PINCODE}&date={date.today... | 171 | 33.25 | 147 | 19 | 1,397 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ddbaf18976665709_a855c7ae", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text."
] | [
149
] | [
null
] | [
11
] | [
58
] | |
2024-11-18T20:18:58.949870+00:00 | 1,530,372,529,000 | 63dfb38f1896a540cdfd6ae5942795d870b7a48b | 3 | {
"blob_id": "63dfb38f1896a540cdfd6ae5942795d870b7a48b",
"branch_name": "refs/heads/master",
"committer_date": 1530372529000,
"content_id": "1b27e94970f249701b54e766adb87ffcbeefe49b",
"detected_licenses": [
"MIT"
],
"directory_id": "f5d4228f8ecea6b094eb9d178e8f220827fc180a",
"extension": "py",
"fi... | 3.15625 | stackv2 | '''
Script from Justin Seitz's https://learn.automatingosint.com/ Course
and Modified for Python 3 by Micah Hoffman
'''
from twitter_keys import *
import csv
import json
import requests
import time
logfile = 'rockville.csv'
latitude = 39.106011097700915
longitude = -77.09330247246095
radius = 2
#
# Send requ... | 133 | 23.44 | 89 | 18 | 786 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_52ff41d7cdd312b4_87540cc1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text."
] | [
124
] | [
null
] | [
19
] | [
25
] | |
2024-11-18T20:29:51.276148+00:00 | 1,541,499,522,000 | 16730b57dbbab7d7a878fd2c0e315e3b159ae81b | 2 | {
"blob_id": "16730b57dbbab7d7a878fd2c0e315e3b159ae81b",
"branch_name": "refs/heads/master",
"committer_date": 1541499522000,
"content_id": "3bfb36b2267be90ce40061da1b61ed09be5019ac",
"detected_licenses": [
"MIT"
],
"directory_id": "4e9de2eb339cbc6e87cc868a0ec17c9f4f0a85da",
"extension": "py",
"fi... | 2.421875 | stackv2 | #!/usr/bin/env python
from __future__ import print_function
import shutil
import subprocess
import begin
import jinja2
import os
import sys
from os import path
import jinja2
from jinja2 import Environment, FileSystemLoader, StrictUndefined
script_dir = os.path.realpath(os.path.dirname(os.path.realpath(__file__)))
prin... | 120 | 34.88 | 151 | 23 | 878 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4c6fe1a027a901a0_e7d31d4d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
62
] | [
67
] | [
11
] | [
6
] | |
2024-11-18T19:07:04.110446+00:00 | 1,457,436,103,000 | ba20653a3995434ba2ed96ca601c7b315da7b70c | 3 | {
"blob_id": "ba20653a3995434ba2ed96ca601c7b315da7b70c",
"branch_name": "refs/heads/master",
"committer_date": 1457436103000,
"content_id": "d571b25e7067415075f8a5adc42ba3c422c3f10d",
"detected_licenses": [
"MIT"
],
"directory_id": "606ee1ed0f44dc1dc1e12d4a8f8c21c06cc84ba6",
"extension": "py",
"fi... | 2.703125 | stackv2 | #!/usr/bin/env python
from __future__ import print_function
from collections import namedtuple
from common import config
from common.response import text_response, populate_html, redirect
import os
import hashlib
import cgi
import MySQLdb
import Cookie
def process_input():
# Load email and password from form
... | 137 | 31.49 | 77 | 17 | 873 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_e65632b85cd04f1f_88d92aaa", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
90
] | [
null
] | [
42
] | [
67
] | |
2024-11-18T19:07:06.287251+00:00 | 1,637,516,607,000 | 500ac4c871612f48a65aacd2a8db4a3f254c5109 | 3 | {
"blob_id": "500ac4c871612f48a65aacd2a8db4a3f254c5109",
"branch_name": "refs/heads/main",
"committer_date": 1637516616000,
"content_id": "ca8e632237a06f12ec38f0f4d5535a972979fd4d",
"detected_licenses": [
"MIT"
],
"directory_id": "5d50db581c8c26785eaf3010e31832eab13ade89",
"extension": "py",
"file... | 3.0625 | stackv2 | from typing import Dict
from event_handlers import EventsHandler
from config import SIMULATION_END
from person import Person
import sys
from events import (
break_the_ice,
generate_initial_popultaion,
)
import events as global_vars
def run_simul(events: EventsHandler, population: Dict[bytes, Person]):
p... | 56 | 27.86 | 87 | 18 | 380 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eecde35c579f0976_aeef69b5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
38
] | [
null
] | [
11
] | [
58
] | |
2024-11-18T19:07:12.740888+00:00 | 1,554,907,091,000 | ce9549775e410977a2fcf7939d65777e29669bc8 | 3 | {
"blob_id": "ce9549775e410977a2fcf7939d65777e29669bc8",
"branch_name": "refs/heads/master",
"committer_date": 1554907091000,
"content_id": "e85a6be1abd68bfaacf168e8d8931db7278a208c",
"detected_licenses": [
"MIT"
],
"directory_id": "beab20d8b774139a450e4ba3717fd59797dad099",
"extension": "py",
"fi... | 2.78125 | stackv2 | #!/usr/bin/env python3
# To use it,
# > virtualenv template
# > source template/bin/activate
# > python template.py -h
from configparser import ConfigParser
from pprint import pprint
import argparse
import io
import os
import sys
import jinja2
from jinja2 import Template
from jinja2 import Environment
def construc... | 52 | 31.81 | 135 | 16 | 394 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a59f4cbc0c58c920_37dc035d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
42
] | [
null
] | [
11
] | [
100
] | |
2024-11-18T19:07:18.851497+00:00 | 1,561,413,529,000 | 0076f26e3e4624f0cc448074f97c3a03f1a6ac25 | 3 | {
"blob_id": "0076f26e3e4624f0cc448074f97c3a03f1a6ac25",
"branch_name": "refs/heads/master",
"committer_date": 1561413529000,
"content_id": "143ed1d2b37bef8d9ebbf26317c138e2895a11fb",
"detected_licenses": [
"MIT"
],
"directory_id": "4f31f0d4230c25ad72cac25f1d844a7be941cb30",
"extension": "py",
"fi... | 2.984375 | stackv2 | import os.path
import datetime as dt
from jinja2 import Environment, FileSystemLoader
from notes_parser import MODULE_DIR, parse_file
OUTPUT_DIR = os.path.join(MODULE_DIR, 'output')
def output_plaintext(clippings_file: str, output_filename: str) -> str:
parsed_data = parse_file(clippings_file)
output_text... | 92 | 28.73 | 105 | 17 | 666 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0293399af4d066f6_f797aa61", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
46
] | [
null
] | [
11
] | [
106
] | |
2024-11-18T19:07:32.381157+00:00 | 1,611,690,861,000 | 5a61be47eb5ede2a532053db79c39144e3a4cc18 | 2 | {
"blob_id": "5a61be47eb5ede2a532053db79c39144e3a4cc18",
"branch_name": "refs/heads/master",
"committer_date": 1611690861000,
"content_id": "d108ff5e783dc5540ce7cd50755b45a47a2db40c",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "54e3f890369cd9025c15831cc676d31c195992c4",
"extension": "p... | 2.34375 | stackv2 | import itertools
import os
import xml
import xmltodict
from pk_db import db, cur
from pk_logging import logging
from pk_tools import canonical_party_name
logger_mps = logging.getLogger('mps_data')
names_list = []
forces_list = []
mails_list = []
url_list = []
assembly_list = []
dob_list = []
all_mps = sorted(map(i... | 145 | 41.61 | 132 | 21 | 1,583 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3f2fa5fcb5b3377e_183c9739", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
117
] | [
null
] | [
27
] | [
29
] | |
2024-11-18T19:07:37.773221+00:00 | 1,686,257,721,000 | cbf740740b2921e57defd547d31a309e29c34d2d | 2 | {
"blob_id": "cbf740740b2921e57defd547d31a309e29c34d2d",
"branch_name": "refs/heads/master",
"committer_date": 1686257721000,
"content_id": "15bfe190b67233442a7de79333700c19b4fab05b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "de621146f8931deef6e9ed0836a37d9e4614dc52",
"extension": "py"... | 2.34375 | stackv2 | # SPDX-FileCopyrightText: 2023 Geoffrey Lentner
# SPDX-License-Identifier: Apache-2.0
"""Manage remote connections and data."""
# type annotations
from __future__ import annotations
from typing import Tuple, Optional, Type, Union, IO
from types import TracebackType
# standard libs
import os
import sys
from dataclas... | 192 | 34.07 | 109 | 21 | 1,459 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_699ea486088875c5_a5c4d20c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
103
] | [
null
] | [
9
] | [
65
] | |
2024-11-18T19:07:49.185753+00:00 | 1,690,361,673,000 | 482603493cfd3919c9bf2b0f460662db5f654a62 | 3 | {
"blob_id": "482603493cfd3919c9bf2b0f460662db5f654a62",
"branch_name": "refs/heads/master",
"committer_date": 1690361673000,
"content_id": "b9f15be533f2031ebe1de6abc7d5c15587904221",
"detected_licenses": [
"MIT"
],
"directory_id": "4d1e0a5c4b36c0062b996adccddc85c720470eca",
"extension": "py",
"fi... | 2.703125 | stackv2 | import hashlib
import json
from urllib.request import urlopen
from urllib.parse import urlencode
class PickException(Exception):
def __init__(self, message):
super().__init__()
self.message = message
def __str__(self):
return self.message
class Picker:
def __init__(self, key, se... | 64 | 31.08 | 78 | 20 | 507 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_88a6682c51d8ffaf_cba6b444", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
62
] | [
null
] | [
18
] | [
47
] | |
2024-11-18T19:07:53.634605+00:00 | 1,633,142,806,000 | 6e0def712e13ef2040d934d2f43c8c29587be646 | 2 | {
"blob_id": "6e0def712e13ef2040d934d2f43c8c29587be646",
"branch_name": "refs/heads/main",
"committer_date": 1633142806000,
"content_id": "81ee22cbbd3b09f473bf56ba13d622eaf10c000b",
"detected_licenses": [
"MIT"
],
"directory_id": "baf554a9397b89f839928a64eb06df37194c60c2",
"extension": "py",
"file... | 2.4375 | stackv2 | import functools
from flask import Blueprint
from flask import g
from flask import request
from flask import session
from flask import abort
from flask import jsonify
from server.models.users import User
bp = Blueprint("auth", __name__, url_prefix="/api/auth")
def login_required(view):
@functools.wraps(view)
... | 76 | 22.41 | 79 | 14 | 415 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_30561a18de43ac64_4fac45f9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
41
] | [
null
] | [
25
] | [
33
] | |
2024-11-18T19:07:56.459837+00:00 | 1,513,068,698,000 | 4c7cc1722c9616cca617016185d1551ac50e3210 | 3 | {
"blob_id": "4c7cc1722c9616cca617016185d1551ac50e3210",
"branch_name": "refs/heads/master",
"committer_date": 1513068698000,
"content_id": "0c2b9ab411333369d4932133cd1ac7455cdfa32e",
"detected_licenses": [
"MIT"
],
"directory_id": "92249895acbc3186da130e0178923fd3d2e8ea16",
"extension": "py",
"fi... | 3.21875 | stackv2 | """Simple Python 3 web crawler, to be scan for s3 buckets in sites.
Prerequisites:
pip install requests
pip install beautifulsoup4
"""
import collections
import string
from timeit import default_timer
from urllib.parse import urldefrag, urljoin, urlparse
import bs4
import requests
import redis
import re
#---------... | 204 | 32.28 | 111 | 18 | 1,539 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_9e59059edb5d1ec0_2bfb3a97", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'amazonaws.com', so it might match m... | 2 | true | [
"CWE-020",
"CWE-295"
] | [
"py/incomplete-hostname-regexp",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'amazonaws.com', so it might match more hosts than expected.",
"This request may run without certificate validation because [it is disabled](1)."
] | [
135,
54
] | [
null,
null
] | [
25,
24
] | [
57,
67
] | |
2024-11-18T19:08:00.648488+00:00 | 1,599,053,344,000 | 45174647691d78bd30ae689419fddbf40ad69631 | 2 | {
"blob_id": "45174647691d78bd30ae689419fddbf40ad69631",
"branch_name": "refs/heads/master",
"committer_date": 1599053344000,
"content_id": "be7e5020d5865a05f0e4212c8027a9e7017e38c1",
"detected_licenses": [
"BSD-2-Clause",
"BSD-3-Clause"
],
"directory_id": "7efc23306e80c89cc7f35851786d321bf5949e0b... | 2.40625 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
import yaml
import lxml.html
import requests
if __name__ == '__main__':
f = open("account.yaml", "r+")
conf = yaml.load(f, Loader=yaml.BaseLoader)
f.close()
session = requests.session()
login_url = 'https://healthcare.mb.softbank.jp/v3/web_login'
summary_... | 34 | 33.03 | 90 | 15 | 355 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_811463fc13a32598_a4c282f5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
27
] | [
null
] | [
13
] | [
47
] | |
2024-11-18T19:18:13.616693+00:00 | 1,624,023,365,000 | 7d2d0aa095836700bab00c47977f68a986fc9fe7 | 2 | {
"blob_id": "7d2d0aa095836700bab00c47977f68a986fc9fe7",
"branch_name": "refs/heads/master",
"committer_date": 1624023365000,
"content_id": "c5e48c91098cb5bfe991674aef8dfc14f95dd1da",
"detected_licenses": [
"MIT"
],
"directory_id": "ccd9502bfc9739a33c1cca37843dc1298d4ec148",
"extension": "py",
"fi... | 2.5 | stackv2 | import re
import os
import sys
import crc16
import base64
import qrcode
from unicodedata import normalize
from amzqr import amzqr
from PIL import Image
from io import BytesIO
def validate_cpf(numbers):
cpf = [int(char) for char in numbers if char.isdigit()]
if len(cpf) != 11:
return False
if cpf =... | 215 | 31.89 | 118 | 21 | 1,759 | python | [{"finding_id": "codeql_py/overly-large-range_47486a0aa2e6b986_c4ba1b65", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with Z-z in the same character class, and is equivalent to \\[A... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with Z-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a\\].",
"Suspicious character range that is equivalent to \\[Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
45,
45
] | [
null,
null
] | [
23,
27
] | [
26,
30
] | |
2024-11-18T19:18:16.102464+00:00 | 1,629,395,660,000 | 7c7ca660187d381fbe296fe9c5e3a709533fad3c | 2 | {
"blob_id": "7c7ca660187d381fbe296fe9c5e3a709533fad3c",
"branch_name": "refs/heads/master",
"committer_date": 1629395660000,
"content_id": "28c4e2e39dbacbefbcb4893c75931f4679fe6761",
"detected_licenses": [
"MIT"
],
"directory_id": "f1d5cdb817af2ec9c2230f5329aca854a83500a9",
"extension": "py",
"fi... | 2.390625 | stackv2 | import os
from flask import Flask, request, flash, redirect, render_template
from fastai.vision.all import *
from fastai.vision.core import PILImage
from fastai.vision.all import load_learner
from werkzeug.utils import secure_filename
from api.utils.constants import UPLOAD_FOLDER, ALLOWED_EXTENSIONS
from api.utils.co... | 61 | 32.74 | 87 | 16 | 456 | python | [{"finding_id": "codeql_py/url-redirection_c8e22e89a0b44336_e39eacb0", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
38,
45
] | [
null,
null
] | [
29,
29
] | [
40,
40
] | |
2024-11-18T19:18:19.320868+00:00 | 1,610,956,299,000 | cf9d856deb3fb154732888d197ba323e049e8f81 | 3 | {
"blob_id": "cf9d856deb3fb154732888d197ba323e049e8f81",
"branch_name": "refs/heads/master",
"committer_date": 1610956299000,
"content_id": "a901e27ab4f1afda3fcf9b5701cb1917cae1f657",
"detected_licenses": [
"MIT"
],
"directory_id": "bda67259374747a7e901a7ba5de64e79ecfa747b",
"extension": "py",
"fi... | 2.703125 | stackv2 | import re
def extract_libraries(files):
"""Extracts a list of imports that were used in the files
Parameters
----------
files : []string
Full paths to files that need to be analysed
Returns
-------
dict
imports that were used in the provided files, mapped against the lang... | 35 | 26.17 | 94 | 14 | 236 | python | [{"finding_id": "codeql_py/overly-large-range_038bcc26b5f0ed7d_2e374201", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
21
] | [
null
] | [
40
] | [
43
] | |
2024-11-18T19:18:21.645064+00:00 | 1,606,191,340,000 | 047b19f2175501c063264b7f8fbd1538668a4407 | 2 | {
"blob_id": "047b19f2175501c063264b7f8fbd1538668a4407",
"branch_name": "refs/heads/master",
"committer_date": 1606191340000,
"content_id": "28df7419cb51cc8e2fc06c18410d837a26ec6a53",
"detected_licenses": [
"MIT"
],
"directory_id": "282bedae1df74d4d922262e371153b8a81813423",
"extension": "py",
"fi... | 2.5 | stackv2 | import tarfile
import os
import argparse
import io
from typing import Optional, Union
from mpi4py import MPI
KB = 1024
MB = 1024 * KB
# Extract buffer size
#TAR_BUF_SIZE = 128 * KB
# MPI_Bcast buffer size
BCAST_BUF_SIZE = 1 * MB
# File read buffer size
READ_BUF_SIZE = 4 * MB
def main():
parser = argparse.Arg... | 99 | 24.09 | 83 | 17 | 583 | python | [{"finding_id": "codeql_py/tarslip_5d89fd9b85c68a28_46027ef7", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
35
] | [
null
] | [
13
] | [
14
] | |
2024-11-18T19:18:53.732789+00:00 | 1,626,728,074,000 | f7a4e191f336d0705fadd74914658200e2690e30 | 2 | {
"blob_id": "f7a4e191f336d0705fadd74914658200e2690e30",
"branch_name": "refs/heads/master",
"committer_date": 1626728074000,
"content_id": "f7aa4311fe48bc8845463fb4f42f902f59bd8342",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "17e1dc3cf392321906c4f073a51209cd48398d66",
"extension": "p... | 2.375 | stackv2 | #!/usr/bin/env python
import jinja2
import os
import copy
import logging
from ansible.module_utils.basic import AnsibleModule
from s3vaultlib.metadata.ec2 import EC2Metadata
from s3vaultlib.connection.connectionmanager import ConnectionManager
from s3vaultlib.s3vaultlib import S3Vault
logging.basicConfig(level=logging... | 186 | 32.32 | 111 | 14 | 1,388 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_38314625dc8a1ad4_28538316", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
147
] | [
null
] | [
20
] | [
58
] | |
2024-11-18T19:29:45.332428+00:00 | 1,498,583,690,000 | 5d6c9a2cf3ab01eb7f939661487ffe9f43f3384c | 3 | {
"blob_id": "5d6c9a2cf3ab01eb7f939661487ffe9f43f3384c",
"branch_name": "refs/heads/master",
"committer_date": 1498583690000,
"content_id": "16892b595afa61fabd7648a1575c12ff52d742cc",
"detected_licenses": [
"MIT"
],
"directory_id": "df88376c864ca81f9829d5d0e927914d5a5cb057",
"extension": "py",
"fi... | 2.546875 | stackv2 | import re
import webbrowser
import os
dir_path = os.path.dirname(os.path.realpath(__file__))
openJson = open(dir_path + '\\subscriptions.txt')
url = openJson.read()
writeFile = open(dir_path + '\\outputList.txt', 'w+')
urls = re.findall(
'http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F... | 25 | 24.52 | 90 | 11 | 190 | python | [{"finding_id": "codeql_py/overly-large-range_434ddb026d9a9d68_65e7798b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
12
] | [
null
] | [
36
] | [
39
] | |
2024-11-18T19:29:52.275829+00:00 | 1,614,143,606,000 | 95448c5e7f43c92b3333695fea250894f450cb84 | 2 | {
"blob_id": "95448c5e7f43c92b3333695fea250894f450cb84",
"branch_name": "refs/heads/master",
"committer_date": 1614143606000,
"content_id": "417a928a03fa41ddea4ae3cfd941e353e5fd2aec",
"detected_licenses": [
"MIT"
],
"directory_id": "6e798e8c687a88151df2a8b5483ffabc0814b559",
"extension": "py",
"fi... | 2.421875 | stackv2 | import os
import sys
import json
import subprocess
import random
import configparser
from flask import Flask
from flask import render_template
from flask import jsonify
from flask import request
from subprocess import PIPE
####################################
# Configuration
####################################
eosi... | 106 | 29.92 | 150 | 15 | 748 | python | [{"finding_id": "codeql_py/command-line-injection_de1485f80520d044_02f61063", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 1 | true | [
"CWE-078"
] | [
"py/command-line-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1)."
] | [
33
] | [
null
] | [
30
] | [
37
] | |
2024-11-18T19:44:30.860998+00:00 | 1,407,031,552,000 | d7970de4687dd546920d85a6e13d37fa839369f3 | 3 | {
"blob_id": "d7970de4687dd546920d85a6e13d37fa839369f3",
"branch_name": "refs/heads/master",
"committer_date": 1407816989000,
"content_id": "b6c27f3230f85506c14b3de00fd3848d432483e1",
"detected_licenses": [
"MIT"
],
"directory_id": "54ecef3639f4d6922c878fff6bca6bd465178f87",
"extension": "py",
"fi... | 2.984375 | stackv2 | #!/usr/bin/python
import os
import hashlib
import getpass
import pyperclip
from pbkdf2 import crypt
password_length = 16
base_phrase = getpass.getpass("Enter base phrase: ")
sanity_check = hashlib.sha256()
sanity_check.update(base_phrase)
print sum([ord(x) for x in sanity_check.digest()])
valid_characters = 'abcd... | 33 | 22.18 | 119 | 14 | 215 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_3dabe6f54cb228bf_ed536ebf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
14
] | [
null
] | [
21
] | [
32
] | |
2024-11-18T19:57:58.201871+00:00 | 1,651,089,253,000 | fd79756493fe73b64f2e84872f962fae3a1b8e99 | 3 | {
"blob_id": "fd79756493fe73b64f2e84872f962fae3a1b8e99",
"branch_name": "refs/heads/master",
"committer_date": 1651089253000,
"content_id": "66dcbdf4254c941c1182488e4219641601044f33",
"detected_licenses": [
"MIT"
],
"directory_id": "e38d932eaf0718e864846a9c81192c5d4276d02e",
"extension": "py",
"fi... | 2.875 | stackv2 | import re
import requests
import urllib
from django.http import JsonResponse
from django.views.decorators.csrf import csrf_exempt
from rest_framework.decorators import api_view
from robots_scraper.models import WebSite
@api_view(['GET', 'POST', 'DELETE'])
@csrf_exempt
def handle_website(request, website_id=None):
... | 130 | 26.75 | 113 | 19 | 783 | python | [{"finding_id": "codeql_py/full-ssrf_0f57a13392440c98_6407edc9", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
45
] | [
null
] | [
13
] | [
30
] | |
2024-11-18T19:58:23.879731+00:00 | 1,511,764,149,000 | 64cb5f6863c88541090f639dd2df059428c4b567 | 2 | {
"blob_id": "64cb5f6863c88541090f639dd2df059428c4b567",
"branch_name": "refs/heads/master",
"committer_date": 1511764149000,
"content_id": "b7b997d44ce741bb6ef36ffdad5b66463826b63e",
"detected_licenses": [
"MIT"
],
"directory_id": "cebb9bcb10cdf5b216bcb4349dc3fe4cf4c28773",
"extension": "py",
"fi... | 2.421875 | stackv2 | import requests
from bs4 import BeautifulSoup
import ast
import os.path
import datetime
import time
import smtplib
from email.mime.text import MIMEText
import pandas as pd
import csv
import re
import pprint
import configparser
pp = pprint.PrettyPrinter(indent=4)
config = configparser.ConfigParser()
config.read('config... | 176 | 36.58 | 122 | 27 | 1,541 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_77e1d098318afd19_df724561", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
69
] | [
null
] | [
22
] | [
28
] | |
2024-11-18T20:10:12.400235+00:00 | 1,567,484,108,000 | 6b386f8a277787fbb4e94cf19b903ddc27641421 | 3 | {
"blob_id": "6b386f8a277787fbb4e94cf19b903ddc27641421",
"branch_name": "refs/heads/master",
"committer_date": 1567484108000,
"content_id": "8095effd104d5bf28bfb0b3d50a63813eb400806",
"detected_licenses": [
"MIT"
],
"directory_id": "31322bcbd3eb8db61028b2a34854963438364068",
"extension": "py",
"fi... | 2.59375 | stackv2 | import time
import requests
from hashlib import md5
class LoginSohu:
"""
搜狐新闻登录
- 采用移动端浏览器Web页面进行登录
- 无验证码,密码采用md5加密
"""
# 会话对象
session = requests.session()
def __init__(self, username, password, **kwargs):
self.username = username
self.password_md5 = self._get_passwor... | 111 | 37.23 | 164 | 19 | 1,126 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_35d264853df01496_1fc72f77", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
89
] | [
null
] | [
20
] | [
53
] | |
2024-11-18T20:10:25.125618+00:00 | 1,584,910,631,000 | caf5a8f0d8a243afc80631517a81dd9e79e91ef6 | 2 | {
"blob_id": "caf5a8f0d8a243afc80631517a81dd9e79e91ef6",
"branch_name": "refs/heads/master",
"committer_date": 1584910631000,
"content_id": "4e6c44064cf7146e18161b57328ca93d1399029a",
"detected_licenses": [
"MIT"
],
"directory_id": "e3886b4c32f0b6512fb72a45f803fc6e4c9361d6",
"extension": "py",
"fi... | 2.34375 | stackv2 | from flask import redirect, send_file
import sys
import redis
from jwt import decode, InvalidTokenError
from uuid import uuid4
from flask import Flask
from flask import request
JWT_SECRET = "TESTSECRET"
SESSION_ID = "session_id"
app = Flask(__name__)
db = redis.Redis(host='serwer_redis', port=6380, decode_response... | 102 | 32.19 | 94 | 15 | 901 | python | [{"finding_id": "codeql_py/url-redirection_10b920a24dad5aff_0c11207b", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 5 | true | [
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-022"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"This path depends on a [user-provid... | [
65,
68,
71,
75,
84
] | [
null,
null,
null,
null,
null
] | [
25,
25,
25,
21,
27
] | [
54,
55,
51,
87,
39
] | |
2024-11-18T20:10:38.865117+00:00 | 1,504,089,357,000 | 1363faf9a8e05e1331d74a38d55c348a5ecafa6f | 3 | {
"blob_id": "1363faf9a8e05e1331d74a38d55c348a5ecafa6f",
"branch_name": "refs/heads/master",
"committer_date": 1504089357000,
"content_id": "ab7fbc783fdc1a98ae79d5c374394f11a7ddafcd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4b5dcb620b1df529af2d65b97aff97113f5184d6",
"extension": "py"... | 2.578125 | stackv2 | import yaml
import os
import re
from upseto import gitwrapper
class Manifest:
_FILENAME = "solvent.manifest"
def __init__(self, data):
assert isinstance(data, dict)
assert 'requirements' in data
self._data = data
self._assertValid()
def requirements(self):
return ... | 79 | 33.72 | 108 | 17 | 613 | python | [{"finding_id": "codeql_py/overly-large-range_256d87c357663829_6ad2dade", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\w in the same character class."
] | [
24
] | [
null
] | [
75
] | [
78
] | |
2024-11-18T20:23:11.383316+00:00 | 1,464,699,269,000 | a2a2db11a640e4c3cc4dd99a8426e98e606a4f01 | 2 | {
"blob_id": "a2a2db11a640e4c3cc4dd99a8426e98e606a4f01",
"branch_name": "refs/heads/master",
"committer_date": 1464699297000,
"content_id": "2907ecf22b35b5259a5be79ff193c80550688c71",
"detected_licenses": [
"MIT"
],
"directory_id": "5e1bb1efe834d21feb04567180d37aa382662ce1",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/env python
#coding=utf-8
import numpy as np
import matplotlib.pyplot as plt
import jinja2
import tempfile
import subprocess
import shutil
import os
import pandas as pd
import argparse
parser = argparse.ArgumentParser()
parser.add_argument('participants', help='CSV file with participants')
parser.add_argume... | 47 | 27.62 | 101 | 12 | 325 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2dae978c7772f44e_0d2fd829", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
22
] | [
null
] | [
9
] | [
52
] | |
2024-11-18T20:23:12.255756+00:00 | 1,635,777,141,000 | 1eb8069ccba6e6a58493579c1f3fa7b99704dd8e | 2 | {
"blob_id": "1eb8069ccba6e6a58493579c1f3fa7b99704dd8e",
"branch_name": "refs/heads/main",
"committer_date": 1635777141000,
"content_id": "d627795e45759a12c94cc8e85f1fc113c28f24c0",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "7ccb0479c958d12ca03217ebfb6d83ee36e12013",
"extension": "py"... | 2.390625 | stackv2 | '''
Created on 17 Mar 2021
@author: thomasgumbricht
'''
from sys import exit
import os
import json
from geoimagine.gis import kt_gis as ktgis
from geoimagine.zipper import UnZip
def JsonParams(jsonPath):
'''
'''
# Opening JSON file
f = open(jsonPath, "r")
# returns JSON ob... | 280 | 26.06 | 133 | 21 | 1,904 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3f1aba761f5f8b7a_60f06fb7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
265
] | [
null
] | [
12
] | [
19
] | |
2024-11-18T20:23:25.588786+00:00 | 1,635,469,194,000 | 59603c082a4b286d1c21575078a376d1f4941785 | 3 | {
"blob_id": "59603c082a4b286d1c21575078a376d1f4941785",
"branch_name": "refs/heads/main",
"committer_date": 1635469194000,
"content_id": "91c21487ef718abf958b553fbe4fd63b7eb54ce5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "91622b9643c3204fd98e69c3d65bfb3c93028320",
"extension": "py",
... | 2.578125 | stackv2 | #!/usr/bin/env python
# -*- encoding: utf-8 -*-
"""
@Description: 网络代理请求的基类
@Date :2021/09/15
@Author :xhunmon
@Mail :xhunmon@gmail.com
"""
import requests
from my_fake_useragent import UserAgent
class Net(object):
"""
基类,封装常用接口
"""
TIMEOUT = 8
def __init__(self, timeout=8):
... | 71 | 35.08 | 111 | 14 | 678 | python | [{"finding_id": "codeql_py/request-without-cert-validation_ce5ee001cb575c96_60c02a20", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2).\nThis request may run without certificate validation because [it is disabled](1) by [this value](3).\nThis request may run without certificate validation because [it is disabled](1) by [this value](4).\nThis request... | [
67,
70
] | [
68,
71
] | [
20,
20
] | [
66,
49
] | |
2024-11-18T20:23:26.956047+00:00 | 1,591,667,478,000 | 6ee1a2392faa14b0021a11a7c5c9690ec03370f3 | 3 | {
"blob_id": "6ee1a2392faa14b0021a11a7c5c9690ec03370f3",
"branch_name": "refs/heads/master",
"committer_date": 1591667478000,
"content_id": "0661fa47bcd84a6e5f800e7cb731ce06e207595c",
"detected_licenses": [
"MIT"
],
"directory_id": "ba48e2272ccb1f087b6ad2500f1e276e396b4437",
"extension": "py",
"fi... | 2.59375 | stackv2 | from topic.models import Topic
from backend.utils import replace
from article.models import Article
from article.permissions import IsVerified
from article.paginators import RecentArticleListAPIPaginator
from article.serializers import ArticleListSerializer, ArticleDetailSerializer
from django.db.models import QuerySe... | 130 | 33.28 | 105 | 22 | 864 | python | [{"finding_id": "codeql_py/stack-trace-exposure_7b32a73753938627_9e5a8117", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
84
] | [
null
] | [
21
] | [
68
] | |
2024-11-18T20:23:30.210557+00:00 | 1,524,630,762,000 | 430da1234aec6d085107b2bbb73200f09b19521f | 2 | {
"blob_id": "430da1234aec6d085107b2bbb73200f09b19521f",
"branch_name": "refs/heads/master",
"committer_date": 1524630762000,
"content_id": "efcc0063a03cff01e27411c2cd3483e25527fcbd",
"detected_licenses": [
"MIT"
],
"directory_id": "ff3ffad039f127eb530db22abd9ea69f058be131",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/python2
from flask import Flask, render_template, make_response, jsonify
import datetime, random, time
from threading import Timer, Thread
import RPi.GPIO as GPIO
import serial
#from flask_cors import CORS
import logging, chromalog, re
import random
from serial import SerialException
chromalog.basicConfig(le... | 282 | 25.81 | 145 | 16 | 2,195 | python | [{"finding_id": "codeql_py/flask-debug_8cdacd223715138d_672fce93", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-117",
"CWE-117"
] | [
"py/flask-debug",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on... | [
275,
151,
172
] | [
null,
null,
null
] | [
3,
14,
14
] | [
46,
124,
128
] | |
2024-11-18T20:23:34.324080+00:00 | 1,596,670,551,000 | 4702b2b26418d6366f4d59d750c4f415c4b7c461 | 2 | {
"blob_id": "4702b2b26418d6366f4d59d750c4f415c4b7c461",
"branch_name": "refs/heads/master",
"committer_date": 1596670551000,
"content_id": "ae30b7e4066b7fedca65e68237e05a4b472ff9e0",
"detected_licenses": [
"MIT"
],
"directory_id": "79b7f4551fc8b9e65b1511a52aec377c6974f68e",
"extension": "py",
"fi... | 2.484375 | stackv2 | import pdfkit
import mongoengine as mongo
import celery.decorators
import logging
from jinja2 import Template
import os
from ccl_scratch_tools import Scraper
from . import common as common
from . import scrape, settings
connect_db = common.connect_db
def convert_cert(template,
username,
... | 115 | 34.67 | 131 | 15 | 803 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_132d06f7f6dfe6d3_748df905", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
51
] | [
null
] | [
20
] | [
68
] | |
2024-11-18T20:50:17.986038+00:00 | 1,597,256,332,000 | 153194ee06574fbcaaf1040ec636a5d91c5913e6 | 3 | {
"blob_id": "153194ee06574fbcaaf1040ec636a5d91c5913e6",
"branch_name": "refs/heads/master",
"committer_date": 1597256332000,
"content_id": "098fad5791e195bdfa2782a1aa9c258f7edd580c",
"detected_licenses": [
"Unlicense"
],
"directory_id": "f0e408a2701eddd17393809e0127dfd4c0b4fcb4",
"extension": "py",... | 3.109375 | stackv2 | #!/usr/bin/env Python
#
import requests
import sys
def getAPICCookie(ip_addr, username, password, usetls):
protocol='http'
if usetls:
protocol='https'
url = protocol+'://'+ip_addr+'/api/aaaLogin.xml'
xml_string = "<aaaUser name='%s' pwd='%s'/>" % (username, password)
req = requests.post(ur... | 39 | 27.21 | 76 | 13 | 307 | python | [{"finding_id": "codeql_py/request-without-cert-validation_9d271a0f45e8dfcb_eb83a037", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
13
] | [
null
] | [
11
] | [
60
] | |
2024-11-18T20:50:39.807296+00:00 | 1,661,013,711,000 | b817a1ee4f71fe93650d87a799b8dbe5e747689b | 2 | {
"blob_id": "b817a1ee4f71fe93650d87a799b8dbe5e747689b",
"branch_name": "refs/heads/master",
"committer_date": 1661013711000,
"content_id": "bcd5c85cd62d3e4fe34f4f11b6b3830a509d0996",
"detected_licenses": [
"Apache-2.0",
"BSD-3-Clause",
"BSD-2-Clause",
"MIT"
],
"directory_id": "e2b9de8b9be... | 2.34375 | stackv2 | """
Build YAML experiment config from template
python data_preparation/make_config.py \
--class_config $CONFIG_CLASS \
--in_template $CONFIG_IN_TEMPLATE \
--out_config_dir $CONFIG_DIR \
--all_datasets_json $DATASETS_JSON_PATH \
--train=$TRAIN \
--valid=$VALID \
--infer $INFER \
--num_epo... | 175 | 29.43 | 83 | 16 | 1,196 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2b029bd564ba9560_ec4b48e8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
129
] | [
133
] | [
11
] | [
6
] | |
2024-11-18T20:50:43.932781+00:00 | 1,399,384,966,000 | cc1a3571f1dceaf8e83dc33cde963bfb016aca30 | 3 | {
"blob_id": "cc1a3571f1dceaf8e83dc33cde963bfb016aca30",
"branch_name": "refs/heads/master",
"committer_date": 1399384966000,
"content_id": "68ea31e9c252da3676c828afb6b22240a93d5015",
"detected_licenses": [
"MIT"
],
"directory_id": "1419e1240b900920798e8475086421828e1a259f",
"extension": "py",
"fi... | 2.5625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import time
import os
import hashlib
import requests
from urllib import quote
BASE_LIST = ['http://v%d.api.upyun.com' % i for i in range(4)]
BASE_AUTO, BASE_TELECOM, BASE_CNC, BASE_CTT = BASE_LIST
def get_datetime():
'''
>>> print get_datetime()
'''
retur... | 239 | 28.13 | 88 | 19 | 1,688 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b511c044c98f4f4b_c2b61ef6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp... | [
23,
226
] | [
null,
null
] | [
35,
27
] | [
41,
33
] | |
2024-11-18T20:50:45.903281+00:00 | 1,562,313,676,000 | 15e93e56b8d12c6455dcf41a4ccfd6ea50319a19 | 3 | {
"blob_id": "15e93e56b8d12c6455dcf41a4ccfd6ea50319a19",
"branch_name": "refs/heads/master",
"committer_date": 1562313676000,
"content_id": "3a19f0746441973e20b6f8dc54497cd276727706",
"detected_licenses": [
"MIT"
],
"directory_id": "0a6d7a4f375d1bf52374e918daa2c49007deb3a9",
"extension": "py",
"fi... | 2.703125 | stackv2 | # -*- coding: utf-8 -*-
from geopy.geocoders import Bing
import pandas as pd
import time
from geopy.exc import GeopyError
import os
# Remove Key
def removeRow(df, name):
print("Removing", name)
df = df.set_index("Unnamed: 0")
if (name in df.index):
df.drop(name, axis=0, inplace=True)
df.reset_... | 74 | 38.15 | 97 | 18 | 699 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a2a657c4bfa3c12e_d45c9497", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
50
] | [
51
] | [
24
] | [
70
] | |
2024-11-18T20:50:52.661562+00:00 | 1,618,893,053,000 | 89b280fa5d6d87d29c01787a2f36f1c9cbbdfa5d | 2 | {
"blob_id": "89b280fa5d6d87d29c01787a2f36f1c9cbbdfa5d",
"branch_name": "refs/heads/master",
"committer_date": 1618893053000,
"content_id": "d89264cb48aab77de9c5b0db608616833cf07a28",
"detected_licenses": [
"Unlicense"
],
"directory_id": "2d44d9a11a218b244de3f3c52e8b9103d88a61c6",
"extension": "py",... | 2.390625 | stackv2 | #! <venv>/bin python3.8
# -*- coding: utf-8 -*-
"""
Created on 6/4/21 10:30 am
@author: David Wong
"""
from time import sleep
from bs4 import BeautifulSoup
from tqdm.auto import tqdm
import logging
import requests
import random
import urllib
import pendulum
class Scraper:
"""JobsScraper is a simple job postin... | 186 | 31.6 | 134 | 22 | 1,500 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8523ecde830ceec8_0fc8acff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
158
] | [
null
] | [
30
] | [
55
] | |
2024-11-18T20:51:08.689876+00:00 | 1,599,646,175,000 | 9381d4d4ea03f25058cfd94e2ccc19027cbce29f | 3 | {
"blob_id": "9381d4d4ea03f25058cfd94e2ccc19027cbce29f",
"branch_name": "refs/heads/master",
"committer_date": 1599646175000,
"content_id": "51a6b269bff84a70877af5199a5be5259b0d5190",
"detected_licenses": [
"MIT"
],
"directory_id": "df9b9a6ded45bc745f07c90b636dfb7b51dd0e91",
"extension": "py",
"fi... | 2.859375 | stackv2 | import requests
import json
import datetime as dt
from typing import List, Tuple
from src.utils.timeUtils import convertEpochMsToDt
class TempHumApiFetcher():
tokenUrl: str = ''
apiBaseUrl: str = ''
clientId: str = ''
clientSecret: str = ''
def __init__(self, tokenUrl, apiBaseUrl, clientId, clien... | 56 | 37.36 | 115 | 17 | 514 | python | [{"finding_id": "codeql_py/request-without-cert-validation_3b4977c0a2c58b5c_6c86fd05", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
37,
44
] | [
38,
45
] | [
33,
21
] | [
116,
60
] | |
2024-11-18T20:51:23.156972+00:00 | 1,683,486,871,000 | f33a1ae2c735751616ae723d4ffb536697038b5a | 4 | {
"blob_id": "f33a1ae2c735751616ae723d4ffb536697038b5a",
"branch_name": "refs/heads/master",
"committer_date": 1690286346000,
"content_id": "6a5364e58274bb24a2e59c2255f6158433651a54",
"detected_licenses": [
"MIT"
],
"directory_id": "126884e6916e9d78201527419681c0369bc61e9a",
"extension": "py",
"fi... | 3.65625 | stackv2 | import requests
import hashlib
from decouple import config
def send_request(start_char):
"""
The function sends a request to the API with the URL containing
first 5 characters of the hashed password
"""
# Concatenating first 5 characters of hashed password to the URL
url = "https://api.pwnedpa... | 77 | 27.29 | 80 | 15 | 494 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_436a3b905f25334d_bfb61e0a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
50
] | [
null
] | [
29
] | [
54
] | |
2024-11-18T20:51:24.396627+00:00 | 1,601,536,004,000 | a767e59d23a0ad67d46b064c8ad4f8638d087853 | 3 | {
"blob_id": "a767e59d23a0ad67d46b064c8ad4f8638d087853",
"branch_name": "refs/heads/master",
"committer_date": 1601536004000,
"content_id": "2e44ff77cde5e14e483ca4342a57a1affce7a5e3",
"detected_licenses": [
"MIT"
],
"directory_id": "08bf1bb59fc5081f3a9c22e14a8a79ffa9b315e6",
"extension": "py",
"fi... | 2.53125 | stackv2 | #! python3
import re
import os
import sys
import time
import json
import glob
import datetime
import urllib3
from getpass import getpass
import requests
from pprint import pprint
from pathlib import Path
from bs4 import BeautifulSoup
from selenium import webdriver
# CONSTANTS #
urllib3.disable_warnings(urllib3.excepti... | 370 | 33.74 | 134 | 25 | 3,219 | python | [{"finding_id": "codeql_py/request-without-cert-validation_0e3945df1118a10f_623b1c2e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
274,
277,
281,
316
] | [
null,
null,
null,
null
] | [
16,
16,
16,
34
] | [
96,
91,
91,
86
] | |
2024-11-18T21:13:45.988276+00:00 | 1,480,413,743,000 | 52b374f3754c1689630c862c0b7a104d525dcddf | 2 | {
"blob_id": "52b374f3754c1689630c862c0b7a104d525dcddf",
"branch_name": "refs/heads/master",
"committer_date": 1480413743000,
"content_id": "7e8841edc86402660646f7804cc186ce86daeb18",
"detected_licenses": [
"MIT"
],
"directory_id": "845e20f1cfa0980244f68643577dd7ca909194b5",
"extension": "py",
"fi... | 2.4375 | stackv2 | import json
import uuid
from django.conf import settings
from django.contrib.auth import authenticate, get_user_model, login, logout
import requests
from rest_framework import permissions, views, response, status
from . import exceptions
from . import models
from . import serializers
FACEBOOK_API_BASE_URL = 'https... | 361 | 35.53 | 79 | 17 | 2,557 | python | [{"finding_id": "codeql_py/partial-ssrf_66ddb12291b3e976_8086013d", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
41,
56
] | [
45,
60
] | [
12,
12
] | [
31,
31
] | |
2024-11-18T21:13:55.135280+00:00 | 1,431,452,657,000 | f0b77a0b5ab5d264a60546f8d6052abf9a435605 | 3 | {
"blob_id": "f0b77a0b5ab5d264a60546f8d6052abf9a435605",
"branch_name": "refs/heads/master",
"committer_date": 1431452657000,
"content_id": "1615fc29db1cbcf0b7b4d642576f726fe25bb374",
"detected_licenses": [
"MIT",
"Apache-2.0"
],
"directory_id": "63787d06202762d8a4770715a2bde46add21c0b7",
"exten... | 2.859375 | stackv2 | """Utilities for all Let's Encrypt."""
import collections
import errno
import os
import stat
from letsencrypt.client import errors
Key = collections.namedtuple("Key", "file pem")
# Note: form is the type of data, "pem" or "der"
CSR = collections.namedtuple("CSR", "file data form")
def make_or_verify_dir(directory,... | 84 | 27.56 | 78 | 17 | 568 | python | [{"finding_id": "codeql_py/overly-permissive-file_5a99a09c9366ccb7_55dd7720", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world writable.", "remediation": "", "location": {... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in open sets file to world writable."
] | [
71
] | [
null
] | [
22
] | [
78
] | |
2024-11-18T21:13:56.885758+00:00 | 1,481,808,044,000 | fe3e1ab2cc23bbf5d0cd89cf1b35c500efa05ad1 | 2 | {
"blob_id": "fe3e1ab2cc23bbf5d0cd89cf1b35c500efa05ad1",
"branch_name": "refs/heads/master",
"committer_date": 1481808044000,
"content_id": "aeb0eac663477d345875f8355da5d2a7804ac7e5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "67a13b702c0e1463d286032caaef0e8404081d04",
"extension": "py"... | 2.375 | stackv2 | # coding: utf8
import requests
from bs4 import BeautifulSoup
header = {
'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.112 Safari/537.36',
'Referer': 'http://www.bing.com/',
}
max_fetch_cnt = 3
def process_baidu(p, titles, answers, scores):
url = '... | 99 | 37.02 | 126 | 14 | 1,136 | python | [{"finding_id": "codeql_py/request-without-cert-validation_ec7b088870d351e7_0c28f67c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 6 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
15,
33,
49,
62,
75,
88
] | [
null,
null,
null,
null,
null,
null
] | [
9,
9,
9,
9,
9,
9
] | [
71,
71,
71,
71,
71,
71
] | |
2024-11-18T21:14:18.725458+00:00 | 1,425,326,912,000 | b932e549112e1e4de8785a6c7914ccb4c5db91b3 | 3 | {
"blob_id": "b932e549112e1e4de8785a6c7914ccb4c5db91b3",
"branch_name": "refs/heads/master",
"committer_date": 1425326912000,
"content_id": "87b4220271163f11c65e19fa7de148e3d1d0a207",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0a25ea42bd8aff27c939b7de9d9a8ea036b0c66f",
"extension": "py"... | 2.640625 | stackv2 | # Copyright (C) 2013-2014 Computer Sciences Corporation
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by a... | 44 | 37.48 | 81 | 10 | 412 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_c6e30bf56ecdfbac_218b168f", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES](1) is broken or weak, and should not be used.", "r... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The cryptographic algorithm DES](1) is broken or weak, and should not be used.",
"[The cryptographic algorithm DES](1) is broken or weak, and should not be used.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expe... | [
23,
30,
37
] | [
null,
null,
null
] | [
17,
17,
19
] | [
43,
47,
27
] | |
2024-11-18T21:14:38.062640+00:00 | 1,535,636,981,000 | c22ab24aebd4805577697b03bd57b1aadc282f9a | 3 | {
"blob_id": "c22ab24aebd4805577697b03bd57b1aadc282f9a",
"branch_name": "refs/heads/master",
"committer_date": 1535636981000,
"content_id": "d8ff135ee1275e66fec46d5bfae619e004f1c133",
"detected_licenses": [
"MIT"
],
"directory_id": "ddba588a14077e0ff7da53dfba0f68c241a9c188",
"extension": "py",
"fi... | 2.515625 | stackv2 | from os import remove
from sys import argv
import sqlite3
import string
from random import *
import hashlib
class bcolors:
HEADER = '\033[95m'
OKBLUE = '\033[94m'
OKGREEN = '\033[92m'
WARNING = '\033[93m'
FAIL = '\033[91m'
ENDC = '\033[0m'
BOLD = '\033[1m'
UNDERLINE = '\033[4m'
conn =... | 65 | 28.43 | 75 | 14 | 570 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_c06860f4c9fa4d42_d25092a3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
38
] | [
null
] | [
13
] | [
47
] | |
2024-11-18T21:14:39.161460+00:00 | 1,427,476,439,000 | 3757100303a3c7b7d526fa59341e8b2890533914 | 3 | {
"blob_id": "3757100303a3c7b7d526fa59341e8b2890533914",
"branch_name": "refs/heads/master",
"committer_date": 1427476439000,
"content_id": "f1779340c812f5ffc7759d573c7489109d1b0709",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d641144662f4ef4951bb7fed6fdc9fed392508be",
"extension": "py"... | 2.546875 | stackv2 | import oauth2 as oauth
from urllib import urlencode
import hashlib
import random
# TODO: Create test cases for all functionality.
API_ROOT = "https://api.linkedin.com/"
API_VERSION = "v1"
API_ENDPOINTS = {
}
class LinkedinException(Exception):
pass
class LinkedinAPI(object):
"""Method sig: (key, secret... | 88 | 27.41 | 79 | 16 | 491 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_291c44a6c7fd603a_fd87ea33", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
87
] | [
88
] | [
13
] | [
67
] | |
2024-11-18T21:14:42.117718+00:00 | 1,453,322,053,000 | fb62fda53ed09493bb17041c0c9426fd42f4a4b6 | 2 | {
"blob_id": "fb62fda53ed09493bb17041c0c9426fd42f4a4b6",
"branch_name": "refs/heads/master",
"committer_date": 1453322053000,
"content_id": "9d96605e9f1b3e6b7641622c578e8925bf0b543d",
"detected_licenses": [
"MIT"
],
"directory_id": "b7c699b390e33eb194aa43206b3bd149c1087aca",
"extension": "py",
"fi... | 2.34375 | stackv2 | from flask import Flask
from flask import request
from Model.Database import Database as DB
import Credentials
app = Flask(__name__)
db = DB(Credentials.user, Credentials.password)
@app.route('/')
def index():
return 'index'
@app.route('/echo', methods=['POST'])
def echo():
"""
receive data and sent it... | 36 | 16.56 | 61 | 10 | 146 | python | [{"finding_id": "codeql_py/reflective-xss_de5c606a3d1af30b_0acd74d7", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
24,
29
] | [
null,
null
] | [
12,
12
] | [
24,
24
] | |
2024-11-18T21:14:43.534728+00:00 | 1,603,021,697,000 | 393e5f220e5b58329c6a89f65bc6793402ac680c | 2 | {
"blob_id": "393e5f220e5b58329c6a89f65bc6793402ac680c",
"branch_name": "refs/heads/main",
"committer_date": 1603021697000,
"content_id": "f292082dd765d109ebc65c503370e4c43651f032",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7ce19387d1dce9ab9cf8f6c190e25a8f4c876973",
"extension": "py",
... | 2.3125 | stackv2 | from rest_framework.response import Response
from rest_framework.decorators import api_view
from rest_framework import status
import uuid
from datetime import datetime
from . import models
@api_view(['GET'])
def get_products(request):
return Response({"Addidas Shoes", }, status=status.HTTP_200_OK)
@api_view(['PO... | 38 | 37.13 | 108 | 14 | 308 | python | [{"finding_id": "codeql_py/stack-trace-exposure_abbfa33551b91548_701dc62a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
31
] | [
null
] | [
25
] | [
58
] | |
2024-11-18T21:14:45.593234+00:00 | 1,595,841,840,000 | 5c7c7171732549886b6d32ee8b1427cd45cf78ce | 2 | {
"blob_id": "5c7c7171732549886b6d32ee8b1427cd45cf78ce",
"branch_name": "refs/heads/master",
"committer_date": 1595841840000,
"content_id": "7a3d9092dcc1e5a639aacd3c2ca78cca1d66815c",
"detected_licenses": [
"MIT"
],
"directory_id": "217abebf67b6c303ace85b99180bc34a6521fd65",
"extension": "py",
"fi... | 2.421875 | stackv2 | #!/usr/bin/python
# from BaseHTTPServer import BaseHTTPRequestHandler,HTTPServer
from http.server import HTTPServer, BaseHTTPRequestHandler
from os import curdir, sep, listdir, path
import sqlite3
from datetime import date, datetime, timezone
import json
import ssl
import base64
import zlib
PORT_NUMBER = 3000
# wher... | 251 | 34.97 | 126 | 23 | 1,927 | python | [{"finding_id": "codeql_py/insecure-default-protocol_10428d2de2632a7c_78fe4cf7", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 3 | true | [
"CWE-327",
"CWE-022",
"CWE-022"
] | [
"py/insecure-default-protocol",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-prov... | [
242,
145,
151
] | [
null,
null,
null
] | [
17,
36,
26
] | [
93,
59,
50
] | |
2024-11-18T21:14:45.711561+00:00 | 1,661,514,131,000 | dfc96a63f559d10c0f208de1715c8b09dcb58abb | 3 | {
"blob_id": "dfc96a63f559d10c0f208de1715c8b09dcb58abb",
"branch_name": "refs/heads/main",
"committer_date": 1661514131000,
"content_id": "22110063894611e60174346e56677011e78a75ee",
"detected_licenses": [
"MIT"
],
"directory_id": "cd5488da6366c98f33dbc8372189306daed49eea",
"extension": "py",
"file... | 2.515625 | stackv2 | #! /usr/bin/env python3.6
"""
server.py
Stripe Sample.
Python 3.6 or newer required.
"""
import stripe
import json
import os
from flask import Flask, render_template, jsonify, request, send_from_directory
from dotenv import load_dotenv, find_dotenv
# Setup Stripe python client library
load_dotenv(find_dotenv())
str... | 95 | 35.22 | 122 | 16 | 711 | python | [{"finding_id": "codeql_py/stack-trace-exposure_42bd2fc8f359f186_48e5b764", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
76
] | [
null
] | [
30
] | [
36
] | |
2024-11-18T20:10:39.075646+00:00 | 1,632,139,049,000 | 869ac19c8fbe599ac886759a3d5a24d5c451e430 | 3 | {
"blob_id": "869ac19c8fbe599ac886759a3d5a24d5c451e430",
"branch_name": "refs/heads/main",
"committer_date": 1632139049000,
"content_id": "435d22602220831423c0c52443533209ef453176",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "92224b8a8f444ff6aec56cc77ea1a9022748df33",
"extension": "py",
... | 2.625 | stackv2 | from text_processing import text_normalizer
import re
class AuthorNormalizer:
def __init__(self):
self.affiliation_markers =["universit", "institu", "college", "academy", "r&d", "foundation", "research center", "hochschul", \
"centre", "center", "organisat", "dept", "department", "wo... | 110 | 52.65 | 172 | 25 | 1,356 | python | [{"finding_id": "codeql_py/redos_a898bdf04b3cda90_530f9654", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '9'.", "remediati... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '9'."
] | [
65
] | [
null
] | [
40
] | [
43
] | |
2024-11-18T20:10:47.580821+00:00 | 1,558,200,462,000 | 9302d2f330afce89d3053364f9584d412d00423a | 3 | {
"blob_id": "9302d2f330afce89d3053364f9584d412d00423a",
"branch_name": "refs/heads/master",
"committer_date": 1558200462000,
"content_id": "038dc4ba9acda815a57deffd9a2cfffccc1fb7ac",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3a8640051b2a38701972ecb5abc4cf70d45265c2",
"extension": "py"... | 2.65625 | stackv2 | #!/usr/bin/env python
# coding: utf-8
import os
from flask import request, abort, jsonify
from app.auxiliary.query_tools import initialProcessing, logFail, logSuccess
# Загрузка компонента
@initialProcessing
def storage_upload(parameters, start_time, query_id):
if 'file' not in request.files or not request.files... | 133 | 31.23 | 93 | 16 | 1,032 | python | [{"finding_id": "codeql_py/path-injection_f0a0f2191206ff1e_cb488bb6", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 8 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](... | [
28,
33,
59,
64,
66,
92,
93,
95
] | [
null,
null,
null,
null,
null,
null,
null,
null
] | [
23,
32,
27,
15,
32,
23,
19,
32
] | [
40,
49,
44,
32,
49,
40,
36,
49
] | |
2024-11-18T20:48:14.131721+00:00 | 1,612,316,278,000 | 787165e5d8939a1f7da06e21b2688c3248e25161 | 2 | {
"blob_id": "787165e5d8939a1f7da06e21b2688c3248e25161",
"branch_name": "refs/heads/master",
"committer_date": 1612316278000,
"content_id": "e29111a3fcf3a0861997a36c7797af26bdf9ade6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6974a05d9dad610eb5acddfe800418d3f407011b",
"extension": "py"... | 2.5 | stackv2 | #!/usr/bin/env python
#
#
# For debugging we use the bottom left corner pixel and:
#
# show red dot if failed to get data
# show blue dot if failed to refresh the cookie.
# show orange when we start refreshing data.
# show yellow when login fails.
#
#
# ver 1.1 added dispaly of ip address on boot in... | 219 | 21.74 | 89 | 18 | 1,408 | python | [{"finding_id": "codeql_py/request-without-cert-validation_d41d85d0b440d29a_6bbcb4ef", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
90,
114,
175
] | [
null,
null,
null
] | [
14,
8,
22
] | [
67,
66,
90
] | |
2024-11-18T21:25:49.536118+00:00 | 1,631,012,259,000 | 43228c4adcfa7194cd0b3ce5003b99aab5f2568b | 2 | {
"blob_id": "43228c4adcfa7194cd0b3ce5003b99aab5f2568b",
"branch_name": "refs/heads/main",
"committer_date": 1631012259000,
"content_id": "55e3c0254e1b22857418b2206ff70961f1d66a8c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "78d820008a9212c44fe7f5bda79a52f9480a2490",
"extension": "py",
... | 2.40625 | stackv2 | from flask import Flask, request, jsonify
from common.initialize_blockchain import initialize_blockchain
from common.io_blockchain import get_blockchain_from_memory
from node.new_block_validation.new_block_validation import NewBlock, NewBlockException
from node.transaction_validation.transaction_validation import Tran... | 204 | 36.9 | 109 | 14 | 1,794 | python | [{"finding_id": "codeql_py/stack-trace-exposure_afea1ad4b2dfbc48_09eafb55", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
42,
58
] | [
null,
null
] | [
16,
16
] | [
45,
47
] | |
2024-11-18T21:26:08.826597+00:00 | 1,690,212,521,000 | 2f05a8fbda798de1b4358d9bcf4ae6f93fc235be | 2 | {
"blob_id": "2f05a8fbda798de1b4358d9bcf4ae6f93fc235be",
"branch_name": "refs/heads/main",
"committer_date": 1690212521000,
"content_id": "463d8f19b47e9cf1a217e04be34bdd9026c1acf6",
"detected_licenses": [
"MIT"
],
"directory_id": "aba557099e087f9068bfff60e9274d0fd54c08a5",
"extension": "py",
"file... | 2.34375 | stackv2 | # -*- coding: utf-8 -*-
#!/usr/bin/python
# import copy
# import getopt
import json
import os.path
# import re
import sys
import codecs
from jinja2 import Environment, FileSystemLoader
from openpyxl import load_workbook
from enum import Enum
class OpType(Enum):
cs = 1
json = 2
all_json_data_list = []
def... | 283 | 32.39 | 90 | 22 | 2,196 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0b64765437d023d8_409351dc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 5 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially... | [
83,
124,
159,
169,
180
] | [
null,
null,
null,
null,
null
] | [
11,
11,
11,
11,
11
] | [
53,
53,
53,
53,
53
] | |
2024-11-18T21:52:15.819275+00:00 | 1,592,883,061,000 | 7a3f65073c4a5262afd4f47ebb54e264b4dbe8fa | 2 | {
"blob_id": "7a3f65073c4a5262afd4f47ebb54e264b4dbe8fa",
"branch_name": "refs/heads/master",
"committer_date": 1592883061000,
"content_id": "979cfebb5e05d9b12ddfcdf66600aa20a05ad9a1",
"detected_licenses": [
"MIT"
],
"directory_id": "11451e28df549695a79848b9976659b483d1b305",
"extension": "py",
"fi... | 2.4375 | stackv2 | import pymongo
import random
import datetime
handler = pymongo.MongoClient().mongo_cyh.people_info
last_name_list = '王,张,李,赵,朱,慕容,夏侯,诸葛,公孙,南宫,欧阳'.split(',')
first_name_list = '一,二,三,四,六,七,八,九,十,十一,十二,十三,十四,十五,十六,十七,十八,十九,二十'.split(',')
place_list = [
'山东济南',
'贵州贵阳',
'广东广州',
'河北邯郸',
'四川成都',
'... | 42 | 26.79 | 78 | 14 | 325 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aeb1e9e3aec8909b_a355edff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
41
] | [
null
] | [
7
] | [
16
] | |
2024-11-18T21:52:17.672490+00:00 | 1,608,765,164,000 | 3ad4e855432b376d045bcc9f69e7fec34ed95b05 | 3 | {
"blob_id": "3ad4e855432b376d045bcc9f69e7fec34ed95b05",
"branch_name": "refs/heads/main",
"committer_date": 1608765164000,
"content_id": "72aaa40e1f8519f9961637bdcff9f01b3cbbe6ce",
"detected_licenses": [
"MIT"
],
"directory_id": "dfa3e0ed7bd9e1f28ab0a7876b889f22c205ed3b",
"extension": "py",
"file... | 2.59375 | stackv2 | #!/usr/bin/python3
import os
import sys
import json
import requests
import urllib3
import logging
from pythonjsonlogger import jsonlogger
urllib3.disable_warnings()
def setup_logging(log_level):
logger = logging.getLogger(__name__)
logger.setLevel(log_level)
logHandler = logging.StreamHandler(sys.stdo... | 268 | 35.12 | 120 | 20 | 2,031 | python | [{"finding_id": "codeql_py/request-without-cert-validation_092d486b66a2bbd9_a82fb8ab", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 5 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
33,
102,
130,
165,
196
] | [
34,
107,
134,
172,
201
] | [
24,
40,
34,
33,
39
] | [
87,
35,
24,
28,
32
] | |
2024-11-18T21:52:19.548185+00:00 | 1,590,999,428,000 | c83c766bc7971c0b2fdf0b46f3d85d442f6d62f2 | 3 | {
"blob_id": "c83c766bc7971c0b2fdf0b46f3d85d442f6d62f2",
"branch_name": "refs/heads/master",
"committer_date": 1590999428000,
"content_id": "9173bfee0cf3fc045e3d892421dfb043d14dcd2e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "133e8c9df1d1725d7d34ea4317ae3a15e26e6c66",
"extension": "py"... | 2.78125 | stackv2 | # -*- coding: utf-8 -*-
import tornado.httpserver
import tornado.options
import tornado.web
import tornado.ioloop
from tornado.options import define, options
define("port", default=8000, help="run on the given port", type=int)
#定义处理类型
class IndexHandler(tornado.web.RequestHandler):
#添加一个处理get请求方式的方法
def get(... | 28 | 26.75 | 68 | 12 | 208 | python | [{"finding_id": "codeql_py/reflective-xss_1ef8d80b6d8fc303_2cd8b6bd", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
17
] | [
null
] | [
20
] | [
49
] | |
2024-11-18T21:52:29.867871+00:00 | 1,620,055,036,000 | b469290f65382c858ffe76e669a4f575dc1f1254 | 3 | {
"blob_id": "b469290f65382c858ffe76e669a4f575dc1f1254",
"branch_name": "refs/heads/main",
"committer_date": 1620055036000,
"content_id": "b42b3e5fdccf7db9ad7bba7c7dfc58cf3f504f26",
"detected_licenses": [
"MIT"
],
"directory_id": "628ef23809589f6bff6e8591fbba3341bcb5d32d",
"extension": "py",
"file... | 3.40625 | stackv2 | import sys
valid_password = 0
for line in sys.stdin:
(count, char, password) = line.rstrip().split(" ")
(min, max) = count.split("-")
min = int(min) -1
max = int(max) -1
char = char.replace(":", '')
or_pass = (password[min] == char) or (password[max] == char)
and_pass = (password[min] == ... | 38 | 22.53 | 66 | 12 | 236 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dcbe0b3a9225ceca_f4fdff63", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
38,
22
] | [
null,
null
] | [
11,
7
] | [
25,
21
] | |
2024-11-18T21:52:32.515729+00:00 | 1,581,442,209,000 | 9f7897e7ffca61109d748a2dc41b70233b0c8a5d | 3 | {
"blob_id": "9f7897e7ffca61109d748a2dc41b70233b0c8a5d",
"branch_name": "refs/heads/master",
"committer_date": 1581442209000,
"content_id": "76411d51833b5760847c32c0d3cb2827e0bdd1e4",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "2bd906cea0b84c73235fade7b4093ad3334f4cd0",
"extension": "p... | 2.71875 | stackv2 | #!/usr/bin/env python3
##############################################################################
# Dump data from Tesla Powerwall
##############################################################################
# Simon Moore, Nov 2019
##############################################################################
# ... | 90 | 34.8 | 97 | 17 | 737 | python | [{"finding_id": "codeql_py/request-without-cert-validation_76c5e30699a56322_6c0e672a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
34,
38,
42
] | [
null,
null,
null
] | [
16,
16,
16
] | [
90,
98,
90
] | |
2024-11-18T20:31:28.838290+00:00 | 1,596,414,430,000 | c17de6972a4e6583584733dfbd8422196a9d88ae | 3 | {
"blob_id": "c17de6972a4e6583584733dfbd8422196a9d88ae",
"branch_name": "refs/heads/master",
"committer_date": 1596414430000,
"content_id": "504ccf9fd6e2264b2f61b52dafd9af43dfb2130c",
"detected_licenses": [
"MIT"
],
"directory_id": "c2e3ad610498312000564141c14ae3d9e9c8b254",
"extension": "py",
"fi... | 3.484375 | stackv2 | # Python program to find current
# weather details of any city
# using openweathermap api
# import required modules
import requests, json
from astral.sun import sun
from astral import LocationInfo
from datetime import datetime, timedelta, date
#Load the config file
with open("config.json") as f:
configs = js... | 83 | 28.87 | 120 | 25 | 618 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_070301235b1669ba_2ab47e7d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
79,
83
] | [
null,
null
] | [
17,
11
] | [
25,
12
] | |
2024-11-18T20:59:44.853091+00:00 | 1,675,073,725,000 | fab48e15e5b56213d9f5257f7580b07409e7e8a9 | 2 | {
"blob_id": "fab48e15e5b56213d9f5257f7580b07409e7e8a9",
"branch_name": "refs/heads/master",
"committer_date": 1675073725000,
"content_id": "0ba855523f58dc28cbc9c555ab1285552de5aafe",
"detected_licenses": [
"MIT"
],
"directory_id": "754b5b837d8aabb9eaddde5ea48898a2aaa54dd0",
"extension": "py",
"fi... | 2.40625 | stackv2 | import sys
import json
import requests
from flask import Flask
from flask import request
from lib.tracing import init_tracer, flask_to_scope
import opentracing
from opentracing.ext import tags
from opentracing_instrumentation.client_hooks import install_all_patches
from flask_opentracing import FlaskTracer
app = Flas... | 58 | 24.83 | 72 | 13 | 372 | python | [{"finding_id": "codeql_py/partial-ssrf_d0ddfa671d379d51_d30850d1", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
52
] | [
null
] | [
9
] | [
41
] | |
2024-11-18T21:10:52.888907+00:00 | 1,558,197,109,000 | 0f3355a4754157b08f8348864179a40e10553112 | 3 | {
"blob_id": "0f3355a4754157b08f8348864179a40e10553112",
"branch_name": "refs/heads/master",
"committer_date": 1558197109000,
"content_id": "c0e08257c4f764a67a55113ee0bdef185d90ca34",
"detected_licenses": [
"MIT"
],
"directory_id": "32fe3550b3c3cd9e586833141d26941996e04bc0",
"extension": "py",
"fi... | 2.671875 | stackv2 | #!/usr/bin/env python3
"""
Installer of Unlock, a daemon to decrypt CoreStorage (HFS+) and APFS volumes automatically when macOS starts.
"""
import sys
import os
import pathlib
import shutil
import argparse
script_name = "com.juanjonol.unlock.py"
plist_name = "com.juanjonol.unlock.plist"
script_folder = "/Library/Pr... | 70 | 30.26 | 109 | 12 | 529 | python | [{"finding_id": "codeql_py/overly-permissive-file_40bf290c6784cda7_ee6d0d14", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable.",
"Overly permissive mask in chmod sets file to world readable."
] | [
52,
58
] | [
null,
null
] | [
2,
2
] | [
29,
28
] | |
2024-11-18T21:23:36.302736+00:00 | 1,598,503,977,000 | a060e6b5ca339e1854b665a33219d97e3039d4d2 | 3 | {
"blob_id": "a060e6b5ca339e1854b665a33219d97e3039d4d2",
"branch_name": "refs/heads/master",
"committer_date": 1598503977000,
"content_id": "4759cda779f103be230813e6f0f70fa48d27a9f7",
"detected_licenses": [
"MIT"
],
"directory_id": "dcc2b1930f62dca1911ff4496e2c6f996fe49773",
"extension": "py",
"fi... | 2.53125 | stackv2 | from typing import List
from urllib.parse import urljoin
from uuid import UUID
import requests
import urllib3
from urllib3 import exceptions
from .utils import parse_int
urllib3.disable_warnings(exceptions.InsecureRequestWarning)
class MachineInfo(object):
def __init__(self, parsed_json: dict):
self._s... | 130 | 30.3 | 85 | 13 | 927 | python | [{"finding_id": "codeql_py/request-without-cert-validation_ae69fc2c3f2b7433_ad0a0942", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
110,
116,
122,
128
] | [
null,
null,
null,
null
] | [
16,
16,
16,
16
] | [
74,
74,
74,
74
] | |
2024-11-18T21:37:21.598213+00:00 | 1,399,044,405,000 | 5039300e5beae14acf45962abeee68059b55c4a8 | 2 | {
"blob_id": "5039300e5beae14acf45962abeee68059b55c4a8",
"branch_name": "refs/heads/master",
"committer_date": 1399044405000,
"content_id": "357fdfb40f98cb3bffe4ecb44a63d08591bf988a",
"detected_licenses": [
"MIT"
],
"directory_id": "9d6793fc743be3f2b4a88530a39b441eb5aa9512",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python
from random import choice
from tornado.ioloop import IOLoop
from tornado.web import Application, RequestHandler
class StatusHandler(RequestHandler):
def prepare(self):
status = choice([x for x in self.request.uri.split('/') if x != ''])
self.set_status(int(status))
se... | 21 | 23.67 | 76 | 16 | 119 | python | [{"finding_id": "codeql_py/reflective-xss_1a4b8ca39a994758_e6c4ce86", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
11
] | [
null
] | [
20
] | [
26
] | |
2024-11-18T21:37:42.906237+00:00 | 1,388,082,605,000 | be046403b41461ca94782db3313b1330a8cc5fff | 3 | {
"blob_id": "be046403b41461ca94782db3313b1330a8cc5fff",
"branch_name": "refs/heads/master",
"committer_date": 1388082605000,
"content_id": "f2bc2f2541cf174d4b35d78f3d5d89bcf3a99240",
"detected_licenses": [
"MIT"
],
"directory_id": "f9cb962e3b889a981a79b5c3cf0f32097d48896f",
"extension": "py",
"fi... | 2.5625 | stackv2 | import hashlib
import time
import requests
from requests.auth import AuthBase
class MasheryAuth(AuthBase):
"""
Adds ``apikey`` and ``sig`` query parameters to the request
"""
def __init__(self, key, secret):
self.key = key
self.secret = secret
def __call__(self, r):
para... | 72 | 21.36 | 83 | 12 | 372 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_a270a87a543cfe1e_6fd499e8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
31
] | [
null
] | [
18
] | [
29
] | |
2024-11-18T21:59:00.197234+00:00 | 1,514,298,457,000 | f31b494d07e6ad676c059b9ce932cc56e6b4dcd3 | 3 | {
"blob_id": "f31b494d07e6ad676c059b9ce932cc56e6b4dcd3",
"branch_name": "refs/heads/master",
"committer_date": 1514298457000,
"content_id": "a3b47f241b48cce5c703a84bd8797c77b74c313f",
"detected_licenses": [
"MIT"
],
"directory_id": "8c1638a363c0abed46506f8e87aa652e0153711b",
"extension": "py",
"fi... | 3.109375 | stackv2 | import hashlib, binascii, getpass
max_iter = 100000
def blocking_func(block, size_t):
for i in range(0, len(block), size_t):
yield block[i: i + size_t]
''' The function generate_tuples generates two keys and XOR them
to produce the final key.
'''
def generate_tuples(h, w):
... | 102 | 24.91 | 103 | 13 | 901 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_bb5e6acf73592c40_d97e56a6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
38
] | [
null
] | [
29
] | [
41
] | |
2024-11-18T22:11:26.352779+00:00 | 1,538,252,373,000 | c8627e75b95a86ad40e30847d19119b4df0e49ef | 3 | {
"blob_id": "c8627e75b95a86ad40e30847d19119b4df0e49ef",
"branch_name": "refs/heads/master",
"committer_date": 1538252373000,
"content_id": "f07d4e5ee4f75508bbf735311d545b40398bf6ff",
"detected_licenses": [
"MIT"
],
"directory_id": "f32f431f63be7dff9e385ced4b5a24e66a7ce27f",
"extension": "py",
"fi... | 2.515625 | stackv2 | import base64
import datetime
import json
import re
import time
import zlib
from decimal import Decimal
import hmac
import hashlib
from kaira.baseconv import base62
_PROTECTED_TYPES = (
type(None), int, float, Decimal, datetime.datetime, datetime.date, datetime.time,
)
_SEP_UNSAFE = re.compile(r'^[A-z0-9-_=]*$')
... | 214 | 32.6 | 91 | 15 | 1,772 | python | [{"finding_id": "codeql_py/overly-large-range_b6d1a16b11ae925c_6781f8d5", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 2 | true | [
"CWE-020",
"CWE-327"
] | [
"py/overly-large-range",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](3) is used in a hashing algorith... | [
16,
74
] | [
null,
null
] | [
30,
24
] | [
33,
41
] | |
2024-11-18T22:11:56.157998+00:00 | 1,587,911,379,000 | 0b0a636fe83e48bc6c17607b70e650c58563b9b0 | 3 | {
"blob_id": "0b0a636fe83e48bc6c17607b70e650c58563b9b0",
"branch_name": "refs/heads/master",
"committer_date": 1587911379000,
"content_id": "ae16f3c7d9252af2bce93719bdcdc24dfa2ee340",
"detected_licenses": [
"MIT"
],
"directory_id": "3f326610c1674ca52a4e70c22af84826f501b164",
"extension": "py",
"fi... | 2.78125 | stackv2 | import numpy as np
from PIL import Image
import os
import io
import json
import glob
import h5py
from torchmeta.utils.data import Dataset, ClassDataset, CombinationMetaDataset
from torchvision.datasets.utils import download_url
from torchmeta.datasets.utils import get_asset
class CUB(CombinationMetaDataset):
"""... | 241 | 38.66 | 95 | 22 | 2,207 | python | [{"finding_id": "codeql_py/tarslip_7730de01fcfbbc1f_d9c47de5", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
186
] | [
null
] | [
13
] | [
14
] | |
2024-11-18T22:35:55.831658+00:00 | 1,539,209,579,000 | 6459b2b002e3c72c330b622c6b27e27c7ab814e9 | 2 | {
"blob_id": "6459b2b002e3c72c330b622c6b27e27c7ab814e9",
"branch_name": "refs/heads/master",
"committer_date": 1539209579000,
"content_id": "40921f4dc2b50b548d4053dbf66fc809b5891f6e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2af0517e42ca4136ccfe4e8c921ac1ccf3789ca9",
"extension": "py"... | 2.4375 | stackv2 | #!/usr/bin/env python
#
# Copyright 2018-2018, 2018 The Python-SportRadar Developers
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless ... | 59 | 34.29 | 117 | 16 | 477 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cf6881952b488da6_22dde60b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
59
] | [
null
] | [
23
] | [
35
] | |
2024-11-18T22:35:57.026480+00:00 | 1,569,175,199,000 | d03708b443261f83beadebd85a6a4c065426b670 | 3 | {
"blob_id": "d03708b443261f83beadebd85a6a4c065426b670",
"branch_name": "refs/heads/master",
"committer_date": 1569175199000,
"content_id": "bd896e0f21e575969a27a7d749c0e132b3968213",
"detected_licenses": [
"Unlicense"
],
"directory_id": "20f0f7ad99206c6d81b353cddfa3ccc699cb4741",
"extension": "py",... | 3.09375 | stackv2 | import serial
# Parts of the code, copy modified from:
# | http://www.danmandle.com/blog/getting-gpsd-to-work-with-python/
# | Written by Dan Mandle http://dan.mandle.me September 2012
# | License: GPL 2.0
from gps import *
from time import *
import time
import threading
gpsd = None #seting the global variab... | 63 | 30.94 | 96 | 16 | 497 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_edb43e0f8a734961_4c732ddd", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
55
] | [
null
] | [
28
] | [
32
] | |
2024-11-18T22:36:31.349587+00:00 | 1,576,439,980,000 | 07ff8a25ddce0244d8246ad1f62fa9335c5c8176 | 3 | {
"blob_id": "07ff8a25ddce0244d8246ad1f62fa9335c5c8176",
"branch_name": "refs/heads/master",
"committer_date": 1576439980000,
"content_id": "c1e826ea73f6c1dd8439c24ca9cbb262e9358b92",
"detected_licenses": [],
"directory_id": "1b635b357bec29ac3841657b18fbf50b276221da",
"extension": "py",
"filename": "app... | 2.53125 | stackv2 | from flask import Flask, request, jsonify, json, make_response
from prediction import get_prediction_from_url
import requests, urllib2
app = Flask(__name__)
@app.route("/")
def home():
return "Hello, World!"
@app.route("/localPrediction/",methods=['GET', 'POST'])
def check():
content=request.json
url = content[... | 53 | 26.55 | 119 | 16 | 397 | python | [{"finding_id": "codeql_py/full-ssrf_26222ebf8e0bb77c_4919d4bd", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
39
] | [
null
] | [
10
] | [
71
] | |
2024-11-18T22:36:32.803599+00:00 | 1,594,134,916,000 | 23f4bdf47a4c1ad7286de1490ad75749c0417919 | 3 | {
"blob_id": "23f4bdf47a4c1ad7286de1490ad75749c0417919",
"branch_name": "refs/heads/master",
"committer_date": 1594134916000,
"content_id": "2fa2f58de0a61f44101f702794f2816ed85826c6",
"detected_licenses": [
"MIT"
],
"directory_id": "bf02c24bb92e834debee16b94a46ddd44a5a9bf2",
"extension": "py",
"fi... | 2.578125 | stackv2 | #!/usr/bin/env python3
import os
import sys
from itertools import zip_longest
from platform import release
import yaml
from jinja2 import Environment, FileSystemLoader, Template, TemplateNotFound
from git import Repo, GitConfigParser, Remote, Blob, Object
class RestrictedFileSystemLoader(FileSystemLoader):
def ... | 235 | 32.85 | 123 | 18 | 1,780 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4e16cf24a7b705c8_281f6212", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
54
] | [
62
] | [
20
] | [
10
] | |
2024-11-18T22:36:42.127884+00:00 | 1,684,079,210,000 | 1be5bcc67c842a65ce5e1241efcc030c0104fee4 | 3 | {
"blob_id": "1be5bcc67c842a65ce5e1241efcc030c0104fee4",
"branch_name": "refs/heads/master",
"committer_date": 1684079210000,
"content_id": "5174dc5749f5dad467f23b6c19318955fcc9493c",
"detected_licenses": [
"MIT"
],
"directory_id": "63f5bb00e4a2cf72b7b7c6c102d011094eb52a26",
"extension": "py",
"fi... | 2.65625 | stackv2 | import concurrent.futures
import argparse
import shutil
import os
from typing import Dict, List
from flask import Flask
from flask_cors import CORS
import magic
from termcolor import cprint
from tempfile import TemporaryDirectory
import imagehash
from PIL import Image, ExifTags
import sqlite3
from jinja2 import FileSys... | 447 | 28.69 | 79 | 21 | 3,010 | python | [{"finding_id": "codeql_py/path-injection_5720d67697e3d2e9_70fdd8d8", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 3 | true | [
"CWE-022",
"CWE-022",
"CWE-079"
] | [
"py/path-injection",
"py/path-injection",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
313,
313,
343
] | [
null,
null,
null
] | [
21,
32,
15
] | [
30,
67,
63
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.