added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T21:14:05.282366+00:00 | 1,480,279,077,000 | b16a29dd058d5f3c5c7883edeb4a6e15a38cd8be | 2 | {
"blob_id": "b16a29dd058d5f3c5c7883edeb4a6e15a38cd8be",
"branch_name": "refs/heads/master",
"committer_date": 1480279077000,
"content_id": "539c605c758a442b5595b33036cb293164cab21b",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "c8e383a7d1e3e36de6cb40234cce2e172d451485",
"extension": "p... | 2.3125 | stackv2 | from flask import Flask, jsonify, render_template, request
import nest
import os
import json
import anyjson
app = Flask(__name__)
def prep(data):
data_zipped = zip(*data)
return map(lambda x: {'x':x[0], 'y':x[1]}, data_zipped)
@app.template_filter('neurons')
def neurons_filter(nodes):
return filter(lambd... | 108 | 32.68 | 144 | 18 | 908 | python | [{"finding_id": "codeql_py/path-injection_a0518993bd678a70_81b6c36d", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
60
] | [
null
] | [
19
] | [
46
] | |
2024-11-18T21:58:02.609213+00:00 | 1,428,657,598,000 | ee783a15a048af021a21c955971c3e031781abe8 | 2 | {
"blob_id": "ee783a15a048af021a21c955971c3e031781abe8",
"branch_name": "refs/heads/master",
"committer_date": 1428657598000,
"content_id": "4fa2be419a4ef23c7f8bffacf32d72923e9bfca5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "aaf5107fe1fc21b9eacb6e47edd6ed2ff1609b9b",
"extension": "py"... | 2.46875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import pyaudio
from jinja2.loaders import FileSystemLoader
from jinja2 import Environment
import wave
import multiprocessing
import sys
import os.path
from datetime import datetime
import urlparse
import Queue
import BaseHTTPServer
from threading import Thread
from alex.... | 265 | 34.65 | 111 | 23 | 1,873 | python | [{"finding_id": "codeql_py/path-injection_d6aa285e53cae3a2_9b78b610", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "remed... | 2 | true | [
"CWE-022",
"CWE-079"
] | [
"py/path-injection",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
250,
255
] | [
null,
256
] | [
59,
15
] | [
63,
44
] | |
2024-11-18T21:58:19.317268+00:00 | 1,586,696,969,000 | c4be9ba27decc35c3e95fcccc4bb3d473de721b2 | 3 | {
"blob_id": "c4be9ba27decc35c3e95fcccc4bb3d473de721b2",
"branch_name": "refs/heads/master",
"committer_date": 1586696969000,
"content_id": "1dcc22ab2dd8c9ce2683cae157ba6b7d9d9dd354",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8cced97a617f980cca7b5e1342ac15e2ffbf8d33",
"extension": "py"... | 2.5625 | stackv2 | import json
import requests
class Pishahang():
"""
Pishahang Related Interfaces
"""
def __init__(self, host, port=4002, requests_port=32001, policy_port=8899):
self._host = host
self._port = port
self.policy_port = policy_port
self._requests_port = requests_port
... | 452 | 36.46 | 127 | 16 | 3,724 | python | [{"finding_id": "codeql_py/request-without-cert-validation_44fe3862d7c1481c_2b550ec4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 11 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"... | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
43,
90,
121,
167,
198,
234,
281,
342,
382,
413,
444
] | [
null,
null,
null,
null,
null,
null,
null,
343,
383,
null,
null
] | [
17,
17,
17,
17,
17,
17,
17,
17,
17,
17,
17
] | [
97,
103,
97,
103,
111,
97,
103,
60,
60,
87,
87
] | |
2024-11-18T21:58:30.047147+00:00 | 1,568,393,168,000 | d9d46c05795a3d0ddb7fb56cbcc6eece1cf39ff6 | 2 | {
"blob_id": "d9d46c05795a3d0ddb7fb56cbcc6eece1cf39ff6",
"branch_name": "refs/heads/master",
"committer_date": 1568393168000,
"content_id": "919fac990cdc59748f2a1eca89df09d8f120dd5a",
"detected_licenses": [
"MIT"
],
"directory_id": "9c3c83007c5bf0f36635b0045b2aad7f8a11ac11",
"extension": "py",
"fi... | 2.484375 | stackv2 | import os
from flask import Flask, render_template, request, make_response, session, url_for, redirect, flash, abort
from werkzeug.utils import secure_filename
app = Flask(__name__)
app.secret_key = 'wohohoho'
#upload
ALLOWED_EXTENSION = set(['txt', 'pdf', 'png', 'jpg', 'jpeg', 'gif'])
app.config['UPLOAD_FOLDER'] ='... | 33 | 29.97 | 106 | 16 | 224 | python | [{"finding_id": "codeql_py/url-redirection_b2b2ffd1ae01887c_f873540c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
23,
26
] | [
null,
null
] | [
29,
29
] | [
40,
40
] | |
2024-11-18T23:10:54.530735+00:00 | 1,689,382,387,000 | 1d9c106838ba75f1d2d69b3426c2016767ac525e | 3 | {
"blob_id": "1d9c106838ba75f1d2d69b3426c2016767ac525e",
"branch_name": "refs/heads/master",
"committer_date": 1689574133000,
"content_id": "f40b2762c119a1f0462d144f1ffb83fab2fb9977",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fcc3ff96160f23866b5ebd8dc08058968ec77b79",
"extension": "py"... | 2.578125 | stackv2 | #!/usr/bin/env python3
import argparse
import logging
import os
import random
import string
from getpass import getpass
from uuid import UUID
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.primitives.ciphers.aead import AESGCM
from c... | 199 | 28.48 | 112 | 15 | 1,286 | python | [{"finding_id": "codeql_py/overly-permissive-file_87ed76b99bc0b73e_f247c0a1", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in open sets file to world readable."
] | [
81
] | [
null
] | [
20
] | [
84
] | |
2024-11-18T22:36:01.814069+00:00 | 1,693,565,690,000 | ed274999857a9a5e4f17306606b75b5242f15a43 | 3 | {
"blob_id": "ed274999857a9a5e4f17306606b75b5242f15a43",
"branch_name": "refs/heads/main",
"committer_date": 1693565690000,
"content_id": "b5f044cfcf4522c3c4e83143900be38c0b6762c8",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "749af8e81d5ccd2d8714a34434a9c77772df551b",
"extension": "py"... | 2.640625 | stackv2 | """
Generate a release note template. The key parameters are
RELEASE, VERSION, MILESTONE BRANCH, and LAST_COMMIT_SHA.
LAST_COMMIT_SHA is the sha of the commit used to produce the previous
version. This is used to determine the time stamp where commits in the
current release begin.
Requires PyGitHub, dateparser and j... | 188 | 31.79 | 79 | 18 | 1,454 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_58ff362848e1f88e_fc12123e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
184
] | [
null
] | [
9
] | [
28
] | |
2024-11-18T22:49:02.244337+00:00 | 1,574,718,049,000 | 60c6b170f2c5d3c2bab87e0e326ded29ac198f6c | 2 | {
"blob_id": "60c6b170f2c5d3c2bab87e0e326ded29ac198f6c",
"branch_name": "refs/heads/master",
"committer_date": 1574718049000,
"content_id": "e5a0921aea711c2ad62549dcf03a3d7cf96be7fc",
"detected_licenses": [
"MIT",
"Apache-2.0"
],
"directory_id": "82aab270f50e2c80ac58fc0a073ccdb9706a06d3",
"exten... | 2.34375 | stackv2 | from collections import defaultdict
import json
import logging
from jose import (
jwk,
jwt,
)
import tornado.ioloop
from tornado.web import (
Application,
HTTPError,
RequestHandler,
)
logger = logging.getLogger()
logger.setLevel("DEBUG")
with open("./data/iam-prod-keys.json") as kf:
KEYS = ... | 115 | 27.02 | 78 | 18 | 747 | python | [{"finding_id": "codeql_py/log-injection_0cd5cde94e621406_52cbdc2a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
82
] | [
null
] | [
22
] | [
78
] | |
2024-11-18T22:49:05.271783+00:00 | 1,624,262,469,000 | 0d8b1e8bf91afaa483cbbf2ee11e219f6828d251 | 3 | {
"blob_id": "0d8b1e8bf91afaa483cbbf2ee11e219f6828d251",
"branch_name": "refs/heads/main",
"committer_date": 1624262469000,
"content_id": "cb91886a2ed470007a296880097afec0ee7f873a",
"detected_licenses": [
"MIT"
],
"directory_id": "55bce9ee72b4d62dacfddc23265aeaccab181ef1",
"extension": "py",
"file... | 2.515625 | stackv2 | from typing import Union, Any, Optional
from datetime import datetime, timedelta
from jose import jwt
from app.core.config import settings
import hashlib
ALGORITHM = "HS256"
def get_password_hash(password: str) -> str:
return hashlib.sha256(password.encode("utf-8")).hexdigest()
def verify_password(password: ... | 31 | 27.23 | 81 | 14 | 198 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_fd03c521826740ec_3249fadb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
13
] | [
null
] | [
27
] | [
51
] | |
2024-11-18T23:26:06.092008+00:00 | 1,544,927,333,000 | c0b5aa02d930b8f92741de41bc63378593145625 | 3 | {
"blob_id": "c0b5aa02d930b8f92741de41bc63378593145625",
"branch_name": "refs/heads/master",
"committer_date": 1544927333000,
"content_id": "d11195ace10f4f56a0b426c4936d6b54b192f637",
"detected_licenses": [
"ISC"
],
"directory_id": "4bff1ef564e0d0c101d5a3091f3d2fbc4a61c01d",
"extension": "py",
"fi... | 2.53125 | stackv2 | """
Python code generator
"""
from jinja2 import Environment, PackageLoader # type: ignore
from .CodeGeneratorBase import CodeGeneratorBase
from ..GeneratorHelpers import make_delimiter_comment_func, make_jinja2_filter, map_format_filter
from ..SemanticGraph import Array, BuiltinType, BuiltinTypeCategory, Enum, Inte... | 92 | 35.86 | 145 | 21 | 802 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d02058b22c3ebe6a_258b2a85", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
27
] | [
null
] | [
15
] | [
70
] | |
2024-11-18T22:14:46.773550+00:00 | 1,635,165,339,000 | 13d8ccf1a1561cbdb515ae787601ad2ec7698708 | 3 | {
"blob_id": "13d8ccf1a1561cbdb515ae787601ad2ec7698708",
"branch_name": "refs/heads/main",
"committer_date": 1635165339000,
"content_id": "ca079f0d907d3be4a6c5a25bbcb8ea7ab91e7768",
"detected_licenses": [
"MIT"
],
"directory_id": "f1aad75219cdfae4aa7fc2cfbb47ce258245b40e",
"extension": "py",
"file... | 2.90625 | stackv2 | import pandas as pd
import qrcode
import shutil
import os
import random
from pathlib import Path
import hashlib as hl
class recipient:
_username = ""
_password_hash = 0
database = pd.DataFrame()
loginConfirm = False
userId = ""
def __init__(self, username:str, password:str, new_user=False):
... | 109 | 30.76 | 135 | 16 | 815 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_03532b6653759988_02fdd082", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
19
] | [
null
] | [
38
] | [
55
] | |
2024-11-18T22:15:00.864180+00:00 | 1,575,064,916,000 | c875976a2f1dea4fcec2b823ac65156277e6d8f1 | 3 | {
"blob_id": "c875976a2f1dea4fcec2b823ac65156277e6d8f1",
"branch_name": "refs/heads/master",
"committer_date": 1575064916000,
"content_id": "bdb2a32416a2282ff4f06079f41f41e1d8e174ae",
"detected_licenses": [
"MIT"
],
"directory_id": "c74146189c9b05700d27c5dc8610c3c2fa5eaa1d",
"extension": "py",
"fi... | 2.515625 | stackv2 | import json
import logging
import os
import sys
import boto3
import urllib3
urllib3.disable_warnings()
logger = logging.getLogger()
logger.setLevel(logging.INFO)
http_pool = urllib3.PoolManager()
secretsmanager_client = boto3.client('secretsmanager')
def changeSyntheticStatus(new_status):
logger.info(f"Start... | 92 | 35.14 | 168 | 15 | 701 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bf5bd0b0cb0089fa_3f817288", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
34
] | [
null
] | [
17
] | [
87
] | |
2024-11-18T22:55:28.091534+00:00 | 1,579,281,654,000 | a603651ad77da40910a9c9cf20775490501c4e9a | 2 | {
"blob_id": "a603651ad77da40910a9c9cf20775490501c4e9a",
"branch_name": "refs/heads/master",
"committer_date": 1579281654000,
"content_id": "fbe4685b08540381080014c6b5694d0c1e3825b9",
"detected_licenses": [
"MIT"
],
"directory_id": "30da5b2ae0372a75b2534c2a078b314311e16666",
"extension": "py",
"fi... | 2.40625 | stackv2 | from helpers import save_data, get_date_30_days_now, compress_image
from variables import GITLAB_SERVER, PRIVATE_TOKEN
import requests
import gitlab
import json
import time
import os
def fetch_users(gl):
'''
Download all the users on the https://gitlab.gnome.org.
'''
start = time.time()
print... | 196 | 27.94 | 132 | 18 | 1,292 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_d2e457b6991775ab_db8b463f", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://secure.gravatar.com/](1) may be at an arbitrar... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [https://secure.gravatar.com/](1) may be at an arbitrary position in the sanitized URL."
] | [
155
] | [
null
] | [
16
] | [
68
] | |
2024-11-18T22:55:37.992446+00:00 | 1,463,764,021,000 | 1947013920984864682e58a1b81c43939a7fb11c | 2 | {
"blob_id": "1947013920984864682e58a1b81c43939a7fb11c",
"branch_name": "refs/heads/master",
"committer_date": 1463764863000,
"content_id": "439e335e024c618f72f9743889acf5d637ebaede",
"detected_licenses": [
"MIT"
],
"directory_id": "117e825f8ce73b4c5a2d25318c3289c6812d255a",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/python
# Init script for Sky Pi
import logging
import os
import time
import threading
import sys
import subprocess
import picamera
import Adafruit_BMP.BMP085 as BMP085
from gps import *
fileId = ""
speakLock = threading.Lock()
speakProcess = None
gpsd = None
# NOTE(nox): Speaking
def speakWorker(msg):
... | 176 | 29.22 | 156 | 18 | 1,381 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0ec2fd1243a249bb_7c491ea7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
131
] | [
135
] | [
23
] | [
34
] | |
2024-11-18T23:18:22.056247+00:00 | 1,622,498,568,000 | c0c4908ce46a9422e1c8c0465450c34e142b9a99 | 2 | {
"blob_id": "c0c4908ce46a9422e1c8c0465450c34e142b9a99",
"branch_name": "refs/heads/master",
"committer_date": 1622498568000,
"content_id": "4d38bb784d521d54b182401d607a0be4c8814a21",
"detected_licenses": [
"MIT"
],
"directory_id": "040c03640a7c2c0442da99e33f70813ce7264fcc",
"extension": "py",
"fi... | 2.46875 | stackv2 | """Module with main classes related to Authentication."""
import datetime
import getpass
import hashlib
import logging
import time
from functools import wraps
from http import HTTPStatus
import jwt
from flask import jsonify, request
from kytos.core.config import KytosConfig
from kytos.core.events import KytosEvent
_... | 364 | 31.83 | 78 | 19 | 2,324 | python | [{"finding_id": "codeql_py/stack-trace-exposure_1ee8b6d9df24a94d_aca78c37", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/stack-trace-exposure",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a ... | [
40,
114,
157,
269
] | [
null,
null,
null,
null
] | [
28,
40,
55,
40
] | [
42,
57,
63,
48
] | |
2024-11-18T23:18:23.534481+00:00 | 1,383,228,849,000 | b114574768ca963dcf1bd8699c56593fb7cf35a0 | 3 | {
"blob_id": "b114574768ca963dcf1bd8699c56593fb7cf35a0",
"branch_name": "refs/heads/master",
"committer_date": 1383228849000,
"content_id": "bdf8c28b129a0bf328a954baf365baf3296230b3",
"detected_licenses": [
"MIT"
],
"directory_id": "f440795011dfdaeb83d37cda9c6d609f5f53bf34",
"extension": "py",
"fi... | 2.671875 | stackv2 | # -*- coding: utf-8 -*-
from __future__ import print_function
from sys import argv
import re
import urllib2
__author__ = 'frank'
try:
url = argv[1]
except Exception:
exit('url needed')
page = urllib2.urlopen(url).read() + '<link href=xxxx>'
def convert(_page):
return _page
def get_page_charset(_page)... | 83 | 29.2 | 92 | 17 | 726 | python | [{"finding_id": "codeql_py/redos_1d1ea7490ce07757_1c6c572f", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<' and containing many repetition... | 2 | true | [
"CWE-1333",
"CWE-116"
] | [
"py/redos",
"py/bad-tag-filter"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '<' and containing many repetitions of '\\n'.",
"This regular expression does not match script end tags like </script\\t\\n bar>."
] | [
48,
40
] | [
null,
null
] | [
26,
25
] | [
36,
62
] | |
2024-11-19T00:07:12.705630+00:00 | 1,612,320,812,000 | 8982160c1e876f0d278e43481f94e9ed8c6ad291 | 3 | {
"blob_id": "8982160c1e876f0d278e43481f94e9ed8c6ad291",
"branch_name": "refs/heads/master",
"committer_date": 1612320812000,
"content_id": "8b4dc09acd8346308710b2e789cbfe5175a51597",
"detected_licenses": [
"MIT"
],
"directory_id": "4614c0b6af0a31d62a19afd2d62267d2ff5a4915",
"extension": "py",
"fi... | 2.65625 | stackv2 | import os
import requests
import json
# NASA API auth
from roti_rot import rot13
from flask import Flask
from flask import render_template
# File upload example
from flask import flash, request, redirect, url_for, send_from_directory
from werkzeug.utils import secure_filename
app = Flask(__name__)
# region - authe... | 122 | 28.21 | 94 | 16 | 759 | python | [{"finding_id": "codeql_py/url-redirection_7986260415b7770a_264ba766", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
76,
82
] | [
null,
null
] | [
29,
29
] | [
40,
40
] | |
2024-11-19T00:05:01.337994+00:00 | 1,633,175,377,000 | c658446cd43da2cd56536985905821fa69ac6f88 | 3 | {
"blob_id": "c658446cd43da2cd56536985905821fa69ac6f88",
"branch_name": "refs/heads/main",
"committer_date": 1633175377000,
"content_id": "fd6145ae42a686688d9518bdec2ae7142523c3bc",
"detected_licenses": [
"MIT"
],
"directory_id": "06584f5c1d0092830e67150ccb0d67b4a5851e24",
"extension": "py",
"file... | 3.09375 | stackv2 | #'////////////////////////////////////////////////////////////////////////////
#' FILE: ghReleaseDownloader.py
#' AUTHOR: David Ruvolo
#' CREATED: 2021-09-10
#' MODIFIED: 2021-10-02
#' PURPOSE: Find and download release from a Github repo
#' STATUS: working
#' PACKAGES: os, requests, datatable, datetime, tarfile
#' COM... | 145 | 32.94 | 86 | 20 | 1,112 | python | [{"finding_id": "codeql_py/tarslip_d81849d3da01a3d4_0e1b6541", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
141
] | [
null
] | [
13
] | [
17
] | |
2024-11-18T23:48:08.522513+00:00 | 1,587,414,925,000 | 43a70c9140bd6b94d864758fff8845c540c331bb | 3 | {
"blob_id": "43a70c9140bd6b94d864758fff8845c540c331bb",
"branch_name": "refs/heads/master",
"committer_date": 1587414925000,
"content_id": "93417078fa15d236a5d86e105548b89c77c29f71",
"detected_licenses": [
"Unlicense"
],
"directory_id": "5b176e39e0f431f9f9a489724f16d24fa0324ef3",
"extension": "py",... | 2.546875 | stackv2 | import requests
import signal
import http.cookies
from http.server import HTTPServer, BaseHTTPRequestHandler
from util_functions import success
gl_crawler_base = None
class HTTPProxy(BaseHTTPRequestHandler):
def __init__(self, request, client_address, server):
BaseHTTPRequestHandler.__init__(self, reque... | 136 | 26.68 | 78 | 15 | 764 | python | [{"finding_id": "codeql_py/http-response-splitting_115d4ac854fe8096_0f2cb134", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is con... | 6 | true | [
"CWE-113",
"CWE-113",
"CWE-295",
"CWE-295",
"CWE-918",
"CWE-918"
] | [
"py/http-response-splitting",
"py/http-response-splitting",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is constructed from a [user-provided value](2).",
"This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is constructed from a [user-provided value](2).",
"This request may run without certificate va... | [
69,
69,
25,
43,
25,
43
] | [
null,
null,
29,
49,
29,
49
] | [
30,
35,
16,
16,
16,
16
] | [
33,
52,
41,
25,
41,
25
] | |
2024-11-19T00:44:08.869564+00:00 | 1,629,509,139,000 | 23388a0b483ea98528bfcfaf219aa6251ef66448 | 3 | {
"blob_id": "23388a0b483ea98528bfcfaf219aa6251ef66448",
"branch_name": "refs/heads/main",
"committer_date": 1629509139000,
"content_id": "897607d301814f7ef432fbcaf586e27f31349286",
"detected_licenses": [
"MIT"
],
"directory_id": "8691a95b5c76160f2018b64533e0f01be3f63a5b",
"extension": "py",
"file... | 2.546875 | stackv2 | import os
import requests
from flask import Blueprint, render_template, request, url_for, redirect
from flask_login import login_required, current_user
main = Blueprint("main", __name__)
# Constants for TMDB API
API_KEY = "2cdd90f4142bcd5916204135c23506df"
BASE_URL = "https://api.themoviedb.org/3"
class MovieRequ... | 187 | 29.97 | 108 | 17 | 1,350 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_17ea28179444a166_9b69c336", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 8 | true | [
"CWE-312",
"CWE-312",
"CWE-918",
"CWE-918",
"CWE-918",
"CWE-918",
"CWE-918",
"CWE-918"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of ... | [
138,
150,
86,
89,
167,
168,
171,
172
] | [
null,
null,
null,
null,
null,
null,
null,
null
] | [
23,
23,
24,
24,
20,
21,
20,
21
] | [
43,
43,
70,
67,
64,
67,
61,
64
] | |
2024-11-19T00:44:19.443944+00:00 | 1,576,626,927,000 | 9b64c92224fafef8e9d685e464b6bea7166acb99 | 3 | {
"blob_id": "9b64c92224fafef8e9d685e464b6bea7166acb99",
"branch_name": "refs/heads/master",
"committer_date": 1576626927000,
"content_id": "58a6b4ea58cc7769f69e16a2edbeb6ce10bfbe7f",
"detected_licenses": [
"MIT"
],
"directory_id": "43a663d89c115452fdbfcb7e1c71252b573fac67",
"extension": "py",
"fi... | 2.640625 | stackv2 | """
KnotBook Installer Script Version 3 for Python 3.7+
v3.0:
- Using 2 repositories for separate part of the app
- Auto-install and auto-update functions
- Windows only for now
- Removed checks for virtualenv
- Program jars are now in libs/ folder
v3.1:
- Organize code into functions
v3.2:
- Change ve... | 225 | 33.17 | 107 | 18 | 1,850 | python | [{"finding_id": "codeql_py/tarslip_f78bff7ed1766fe9_2da60875", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
161
] | [
null
] | [
34
] | [
51
] | |
2024-11-18T23:05:27.049692+00:00 | 1,672,757,582,000 | 14433a3db1b8d426dbccae2db5f96ef78f0a87a7 | 4 | {
"blob_id": "14433a3db1b8d426dbccae2db5f96ef78f0a87a7",
"branch_name": "refs/heads/master",
"committer_date": 1672757582000,
"content_id": "a15443ad855c07ee5bf6645803d6f57fbf1bfe8e",
"detected_licenses": [
"MIT"
],
"directory_id": "c05a809b1cd6b5a2883bf4cbbdd3dc2cac32e095",
"extension": "py",
"fi... | 3.53125 | stackv2 | # -*- encoding: utf-8 -*-
"""Retrieves secrets from AWS via credstash, and returns a dictionary.
Typical usage:
from credstash_envvar_helper import get_credstash_config
config_dict = get_credstash_config(name.of.secret)
DB_USER = config_dict.get('DB_USER', 'some.default.value')
DB_PASS = config_dict.get('... | 94 | 31.82 | 78 | 14 | 692 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cf860d49d989768e_d64672f4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
94
] | [
null
] | [
11
] | [
44
] | |
2024-11-18T23:05:45.903377+00:00 | 1,496,855,641,000 | 51fcd752a64eaafd638f0baf4190626aecc51997 | 2 | {
"blob_id": "51fcd752a64eaafd638f0baf4190626aecc51997",
"branch_name": "refs/heads/master",
"committer_date": 1496855641000,
"content_id": "5cdcc5d62ad756890b0ace2cce8b3f82094ade3d",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "7eb39cb250022bbea16e14e257590ccf12ef57f6",
"extension": "py",
... | 2.453125 | stackv2 | from apps import App
import requests
class Main(App):
def __init__(self, name=None, device=None):
self.user_id = "No user id provided"
self.user_access_token = "No user access provided"
App.__init__(self, name, device)
def add_facebook_user(self, args={}):
if all(key in ["use... | 23 | 36 | 80 | 17 | 201 | python | [{"finding_id": "codeql_py/request-without-cert-validation_8d1ef4ee6ffc70f0_a7bef041", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
23
] | [
null
] | [
21
] | [
53
] | |
2024-11-18T23:11:08.974907+00:00 | 1,336,337,542,000 | 488271e3e6310d508092e258693be3bf44e7b200 | 2 | {
"blob_id": "488271e3e6310d508092e258693be3bf44e7b200",
"branch_name": "refs/heads/master",
"committer_date": 1336337542000,
"content_id": "4b5a8a79811d567504c21f685744352da2493316",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "39c1b69115ac9e85b2462f640ef11d52797ab461",
"extension": "p... | 2.4375 | stackv2 | import os
from django import forms
from django.utils.translation import ugettext as _
from file_manager import utils
class DirectoryFileForm(forms.Form):
link = forms.ChoiceField(help_text=_('Link Destination'))
def __init__(self, file, *args, **kwargs):
self.file = file
self.document_roo... | 175 | 29.16 | 104 | 17 | 1,086 | python | [{"finding_id": "codeql_py/path-injection_1e2bf82f514beddf_5c1e815a", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 6 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](... | [
50,
55,
99,
104,
124,
145
] | [
null,
null,
null,
null,
null,
null
] | [
26,
26,
26,
26,
26,
22
] | [
30,
32,
30,
32,
30,
26
] | |
2024-11-18T23:11:09.090034+00:00 | 1,618,116,826,000 | 9488a82dc8bae46f81c6e68fabf23fa5c02ba351 | 2 | {
"blob_id": "9488a82dc8bae46f81c6e68fabf23fa5c02ba351",
"branch_name": "refs/heads/master",
"committer_date": 1618116826000,
"content_id": "91848d34741946daa7ad70519b7ff5dcf9b845bb",
"detected_licenses": [
"MIT"
],
"directory_id": "e054582f760d5938c6de77b89ce26ad5fb1d1235",
"extension": "py",
"fi... | 2.421875 | stackv2 | import gc
import pycom
import socket
import ssl
import sys
import time
import _thread
import uos
try:
from network import LTE
except:
print("No LTE Modem")
def start_lte():
if uos.uname().sysname == 'FiPy':
try:
lte_comms = LteComms()
print("LTE communication being setup")
... | 286 | 30.49 | 137 | 17 | 2,226 | python | [{"finding_id": "codeql_py/insecure-default-protocol_218ebb4e8d733c16_8ae5c2c1", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
190
] | [
null
] | [
13
] | [
31
] | |
2024-11-19T00:11:39.711393+00:00 | 1,578,368,437,000 | 74007e93522595eebc2c87059bd11de250f44414 | 3 | {
"blob_id": "74007e93522595eebc2c87059bd11de250f44414",
"branch_name": "refs/heads/master",
"committer_date": 1578368437000,
"content_id": "5a7745aff82f5146d2eca2575fb45e8cee75a947",
"detected_licenses": [
"MIT"
],
"directory_id": "f06b56b66c8575b42761d2a261e4ae9484452594",
"extension": "py",
"fi... | 2.984375 | stackv2 | import logging
import json
from flask import request, jsonify;
from codeitsuisse import app;
import math
found = []
logger = logging.getLogger(__name__)
@app.route('/gun-control', methods=['POST'])
def evaluate():
data = request.get_json();
logging.info("data sent for evaluation {}".format(data))
input... | 106 | 22.41 | 67 | 14 | 742 | python | [{"finding_id": "codeql_py/log-injection_68f6f14da06f8458_ce3c673f", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
16
] | [
null
] | [
18
] | [
60
] | |
2024-11-19T00:24:49.965674+00:00 | 1,627,082,805,000 | 7a30f6af94e81a9d01cd365a24cfcfcb982a46e2 | 3 | {
"blob_id": "7a30f6af94e81a9d01cd365a24cfcfcb982a46e2",
"branch_name": "refs/heads/main",
"committer_date": 1627082805000,
"content_id": "2b9fc85e7831e60154c0bbd6a21a1761bb1293d5",
"detected_licenses": [
"MIT"
],
"directory_id": "e4b31fc6962c37c2624b6f7b5900eb16647274fd",
"extension": "py",
"file... | 2.5625 | stackv2 | import requests
import pymysql
CIUDAD = "Maldonado"
API_KEY = "92ecbd09b28050e849ee353088902383"
BASE_URL = "https://api.openweathermap.org/data/2.5/weather?"
URL = BASE_URL + "q=" + CIUDAD + "&appid=" + API_KEY
response = requests.get(URL)
if response.status_code == 200:
data = response.json()
global... | 24 | 25.42 | 61 | 9 | 184 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d6f8ebef9a40817d_e235dbd4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
24
] | [
null
] | [
7
] | [
14
] | |
2024-11-19T00:37:02.142989+00:00 | 1,607,546,660,000 | a670aab8251c530e70964db1e06be5105fc20607 | 3 | {
"blob_id": "a670aab8251c530e70964db1e06be5105fc20607",
"branch_name": "refs/heads/master",
"committer_date": 1607546915000,
"content_id": "b09bb671fe65d3f9096f4a8fdee391b1ed79f179",
"detected_licenses": [
"MIT"
],
"directory_id": "bf9a4dc9200e5afe6a1abbf0f70d441dd13c97f7",
"extension": "py",
"fi... | 2.65625 | stackv2 | #!/usr/bin/env python
import os
import imp
import requests
from http.server import HTTPServer, BaseHTTPRequestHandler
host_target = os.environ["AIS_TARGET_URL"]
mod = imp.load_source("function", "/code/%s.py" % os.getenv("MOD_NAME"))
transform = getattr(mod, os.getenv("FUNC_HANDLER"))
class S(BaseHTTPRequestHandle... | 49 | 26.29 | 75 | 12 | 317 | python | [{"finding_id": "codeql_py/partial-ssrf_b72ba6cae4cc3754_bc5c658a", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
34
] | [
null
] | [
23
] | [
60
] | |
2024-11-19T01:02:10.176663+00:00 | 1,539,528,440,000 | a50cbf4046b3effe3ba4b385fd47ab9dd79236c2 | 3 | {
"blob_id": "a50cbf4046b3effe3ba4b385fd47ab9dd79236c2",
"branch_name": "refs/heads/master",
"committer_date": 1539528440000,
"content_id": "38b681c2a6ee1dba6163b8421a0b36cf8d970ddb",
"detected_licenses": [
"MIT"
],
"directory_id": "4b7d286e39fc7b9dc4a7dca4a2dd59f8d27d62b6",
"extension": "py",
"fi... | 2.859375 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Thu Sep 20 11:29:13 2018
@author: Hidde
"""
# Face Recognition with Flask, wohoo!
# Thanks for the example @ Aegitgey https://github.com/ageitgey/
from flask import Flask, jsonify, request, redirect, render_template, url_for
from face_compare import face_recog
ALLOWED_EXTENSI... | 50 | 29.16 | 115 | 13 | 389 | python | [{"finding_id": "codeql_py/url-redirection_35562f7eda7e71ae_92223fb6", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
32,
37
] | [
null,
null
] | [
29,
29
] | [
40,
40
] | |
2024-11-19T01:02:16.677083+00:00 | 1,578,520,212,000 | 23543c50dca496e80809d4d02088c236d003ad94 | 3 | {
"blob_id": "23543c50dca496e80809d4d02088c236d003ad94",
"branch_name": "refs/heads/master",
"committer_date": 1578520212000,
"content_id": "e90b21264a09a5c245045cabc63835dc3bad5611",
"detected_licenses": [
"MIT"
],
"directory_id": "8bc97a164f70a5f33087f6f6db11641b501a4245",
"extension": "py",
"fi... | 2.96875 | stackv2 | """
A thin wrapper around the built-in http.server module.
"""
import http.server
import logging
import ssl
from typing import Tuple
def run_server(address: Tuple[str, str], cert_path: str) -> None:
"""Start an HTTP server over SSL/TLS using the given PEM certificate."""
logging.info('Running server at http... | 18 | 28.89 | 86 | 10 | 124 | python | [{"finding_id": "codeql_py/insecure-default-protocol_edba65ea3198e5a2_23f16fb4", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
17
] | [
null
] | [
20
] | [
87
] | |
2024-11-19T01:02:24.000325+00:00 | 1,438,550,038,000 | 0e4e4cf34b6edad8cf6662e49068c2b60752f2e0 | 3 | {
"blob_id": "0e4e4cf34b6edad8cf6662e49068c2b60752f2e0",
"branch_name": "refs/heads/master",
"committer_date": 1438550038000,
"content_id": "53cce56f5773206092dc5f888ec655ec87404124",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "c0b01d576c49e6793fc3259f5cc0b2c087b7664d",
"extension": "p... | 2.65625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
from flask import Flask, render_template, request, url_for
from datetime import datetime
import hashlib, markdown, operator, pagination, os, sys
app = Flask(__name__)
app.config.from_object('config.ProductionConfig')
app.template_folder = app.config['TEMPLATE_PATH']
# -... | 170 | 32.15 | 90 | 15 | 1,321 | python | [{"finding_id": "codeql_py/path-injection_f71011235068b417_e0db7f2e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
67
] | [
null
] | [
15
] | [
52
] | |
2024-11-18T23:48:44.528982+00:00 | 1,645,166,668,000 | cb0a3096dc483156c42ea0bbc44962690c9542e3 | 2 | {
"blob_id": "cb0a3096dc483156c42ea0bbc44962690c9542e3",
"branch_name": "refs/heads/main",
"committer_date": 1645166668000,
"content_id": "9909b8db14e3c66c30720a7d539ed5a80980872a",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "93596aca572b1477a7498c7d35d90b1cf361bcf5",
"extension": "py"... | 2.390625 | stackv2 | #!/usr/bin/env python3
import os
import sys
import traceback
import argparse
import ssl
import socket
import hashlib
import types
from urllib.parse import urlsplit
import datetime
import pytz
import platform
if platform.system() == 'Darwin':
import certifi
# This has been a tested on Ubuntu 18.04 LTS
# on MacOS... | 261 | 37.15 | 141 | 19 | 2,169 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_edf2635bccd47ffc_34e93f37", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (certificate)](1) is used in a hashing algorithm (MD5) that is in... | 4 | true | [
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/insecure-protocol",
"py/insecure-default-protocol"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (certificate)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (certificate)](2) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (certificate)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (certificate)](2) is use... | [
71,
72,
91,
67
] | [
null,
null,
null,
null
] | [
41,
43,
20,
24
] | [
53,
55,
31,
49
] | |
2024-11-19T01:51:58.139009+00:00 | 1,664,660,026,000 | 76b975567a8897b9464845ed4682532c64673361 | 3 | {
"blob_id": "76b975567a8897b9464845ed4682532c64673361",
"branch_name": "refs/heads/master",
"committer_date": 1664660026000,
"content_id": "eb6d0499365805bc8ce5da7a50a9122d2fc16ed7",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "67e76c827181fb3be7290ae13d58ef261e543924",
"extension": "p... | 2.515625 | stackv2 | #/u/GoldenSights
from PIL import Image
import io
import urllib.request
import praw
import time
import traceback
''' USER CONFIGURATION '''
APP_ID = ""
APP_SECRET = ""
APP_URI = ""
APP_REFRESH = ""
# https://www.reddit.com/comments/3cm1p8/how_to_make_your_bot_use_oauth2/
USERAGENT = ""
#This is a short description of... | 294 | 34.37 | 107 | 18 | 2,526 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_2823612d4df5fb22_cbfc1f7e", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [imgur.com](1) may be at an arbitrary position in the s... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [imgur.com](1) may be at an arbitrary position in the sanitized URL."
] | [
270
] | [
null
] | [
24
] | [
43
] | |
2024-11-19T01:52:14.207987+00:00 | 1,693,928,169,000 | 8f1768d8575487d83c19db1c707703237583b9e4 | 3 | {
"blob_id": "8f1768d8575487d83c19db1c707703237583b9e4",
"branch_name": "refs/heads/main",
"committer_date": 1693928169000,
"content_id": "56ca08f29132f85b340d947ac8b380fd1d1dcb9b",
"detected_licenses": [
"MIT"
],
"directory_id": "091a6200be74bf6577c86f623665bcc24e16b02b",
"extension": "py",
"file... | 2.5625 | stackv2 | # SPDX-FileCopyrightText: 2022 Liz Clark for Adafruit Industries
# SPDX-License-Identifier: MIT
import time
import ssl
import board
import touchio
import pwmio
from analogio import AnalogIn
import adafruit_requests
import socketpool
import wifi
from adafruit_io.adafruit_io import IO_HTTP, AdafruitIO_RequestError
from ... | 133 | 26.56 | 80 | 12 | 995 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_875e3b9b9131d65d_fa6becbc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
30,
32
] | [
null,
null
] | [
7,
7
] | [
43,
43
] | |
2024-11-19T00:55:26.825876+00:00 | 1,690,184,465,000 | 7cd8e4a4c90443ae80114b2035d42d7950f24c5b | 3 | {
"blob_id": "7cd8e4a4c90443ae80114b2035d42d7950f24c5b",
"branch_name": "refs/heads/master",
"committer_date": 1690184465000,
"content_id": "cc15c65db5e71b78d2ebc827086097c54389c31a",
"detected_licenses": [
"MIT"
],
"directory_id": "370e5ebcd200d912ffde73793e001d419d98f6e5",
"extension": "py",
"fi... | 3.265625 | stackv2 | import hashlib
from typing import List
def md5(password: str):
return hashlib.md5(password.encode("utf8")).hexdigest()
def sha256(password: str):
return hashlib.sha256(password.encode("utf8")).hexdigest()
def generate_failsafe_password(passwords: List[str]):
result = ""
passwords = sorted(passwords)... | 28 | 24.68 | 69 | 13 | 168 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7997683103949770_cf38b4e9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-327",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is ... | [
28,
5,
8
] | [
null,
null,
null
] | [
11,
24,
27
] | [
53,
47,
50
] | |
2024-11-19T01:40:00.688695+00:00 | 1,598,606,422,000 | 7395e98b80c2033801342e0c6cf0f2cc2254d6c2 | 2 | {
"blob_id": "7395e98b80c2033801342e0c6cf0f2cc2254d6c2",
"branch_name": "refs/heads/master",
"committer_date": 1598606422000,
"content_id": "e5929b18279de5e9d43ecaf1f04f434e9438d984",
"detected_licenses": [
"BSD-3-Clause",
"MIT",
"Apache-2.0"
],
"directory_id": "a6f61e90bd62b88de8d30d9451b4b68... | 2.484375 | stackv2 | from datetime import datetime
from jinja2 import Environment, BaseLoader
from plugins import base
"""
reconf_plugin の詳細画面 仕様追加項目
# 表
- 行の追加
* step_name ` _prepare` 追加 ... galaxy の prepare job
* step_name ` _total_reconf` 追加 ... galaxy の各stepのreconf job を合計したもの
- カラム追加
* reconfigure cost .. 各stepの実働時間と 動的... | 367 | 31.2 | 90 | 16 | 3,345 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5d82c7d48a726f0c_96360088", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
51
] | [
null
] | [
14
] | [
46
] | |
2024-11-18T23:43:33.473885+00:00 | 1,523,254,106,000 | ce06946e1c1a9880b900f504e003c088799526e4 | 3 | {
"blob_id": "ce06946e1c1a9880b900f504e003c088799526e4",
"branch_name": "refs/heads/master",
"committer_date": 1523254106000,
"content_id": "caace0b9526c4a86469c33d51fbea66ae072ef6c",
"detected_licenses": [
"MIT"
],
"directory_id": "86bd596545d61eb5d1bcbc5f5c5e081cbc62d637",
"extension": "py",
"fi... | 2.65625 | stackv2 | import argparse
import os
import logging
import requests
import tarfile
import numpy as np
from io import BytesIO
from concurrent.futures import ThreadPoolExecutor, wait
from PIL import Image
from sklearn.utils import shuffle
from settings import FILES_DIR, VGG_19_CHECKPOINT_URL, VGG_19_CHECKPOINT_FILENAME, IMAGE_DA... | 87 | 28.84 | 104 | 17 | 602 | python | [{"finding_id": "codeql_py/tarslip_167fc28eeb97218b_2f945a74", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
33
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T23:43:36.557175+00:00 | 1,619,740,767,000 | 552656933b7f34daa86f59a8c94c17642a3cc3f2 | 3 | {
"blob_id": "552656933b7f34daa86f59a8c94c17642a3cc3f2",
"branch_name": "refs/heads/master",
"committer_date": 1619740767000,
"content_id": "3087a0367cec862bc1dd592065954c511b0aa7d5",
"detected_licenses": [
"MIT"
],
"directory_id": "ec7f8bdf2edc4873f41130c71a11a0590f8fff56",
"extension": "py",
"fi... | 2.765625 | stackv2 | from ddpg import DDPG as Agent
import gym
# Register gym environment. By specifying kwargs,
# you are able to choose which patient to simulate.
# patient_name must be 'adolescent#001' to 'adolescent#010',
# or 'adult#001' to 'adult#010', or 'child#001' to 'child#010'
from gym.envs.registration import register
register... | 43 | 33.49 | 99 | 13 | 429 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a29da1ef6289aa15_fa0b76a0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
33,
41
] | [
null,
null
] | [
29,
15
] | [
39,
25
] | |
2024-11-19T00:33:03.956755+00:00 | 1,380,488,026,000 | f1e4523fe85598ac6b1bfe025862b5e5c67957e6 | 3 | {
"blob_id": "f1e4523fe85598ac6b1bfe025862b5e5c67957e6",
"branch_name": "refs/heads/master",
"committer_date": 1380488026000,
"content_id": "d01a7b8b87a0a51a30477c0ba9bbf8f092865315",
"detected_licenses": [
"MIT"
],
"directory_id": "df9f9fd0ddf40130dd11f5aa9bf40af19c5d0098",
"extension": "py",
"fi... | 3 | stackv2 | from hashlib import md5
from os.path import splitext
from uuid import uuid4
get_md5 = lambda text: md5(text).hexdigest()
get_file_extension = lambda path: splitext(path)[1][1:]
def generate_filename(
base_folder,
filename,
with_path=True,
get_name=False,
easy=None):
"""
... | 51 | 28.63 | 74 | 14 | 349 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_4f201eb855174493_2d5bc6b0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure."
] | [
5
] | [
null
] | [
28
] | [
32
] | |
2024-11-19T01:18:05.547300+00:00 | 1,569,509,712,000 | 97d6abae5dff6fede538b785979a677cab15a1f8 | 3 | {
"blob_id": "97d6abae5dff6fede538b785979a677cab15a1f8",
"branch_name": "refs/heads/master",
"committer_date": 1569509712000,
"content_id": "c77662939a0f4814fc7e650ef8b54fcff902836a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "74ae9d0bee235c6cba3310a20da1601eb22a9bbd",
"extension": "py"... | 2.59375 | stackv2 | #! /usr/bin/python
"""This module has everything that this repo has to offer"""
import sys
import os
import subprocess
from time import sleep
import click
import paramiko
DESTINATION_USER = os.environ.get("USER")
if DESTINATION_USER is None:
sys.exit("There's no destination user set. Set the environment variable ... | 217 | 33.03 | 108 | 15 | 1,657 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_ea5307482396e492_d9ce6f9d", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
135
] | [
null
] | [
5
] | [
65
] | |
2024-11-19T01:54:18.451850+00:00 | 1,461,096,077,000 | e1a3793b856d00e13626df8da904c3cbca84e969 | 3 | {
"blob_id": "e1a3793b856d00e13626df8da904c3cbca84e969",
"branch_name": "refs/heads/master",
"committer_date": 1461096144000,
"content_id": "777ef65fac8b758e1823fd2bc9a71e7f725d8019",
"detected_licenses": [
"MIT"
],
"directory_id": "b39efa926c1c1b5c5d8c8503aee6085972344ab0",
"extension": "py",
"fi... | 2.765625 | stackv2 | """Template rendering for dummies."""
from jinja2 import Environment
from jinja2 import FileSystemLoader
class Renderer:
"""A simple template renderer."""
def __init__(self, template_directory):
"""Make a new template renderer."""
self.env = Environment(loader=FileSystemLoader(template_direct... | 31 | 28.29 | 75 | 13 | 184 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_26af09918f4715c0_2e19a341", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
11
] | [
null
] | [
20
] | [
76
] | |
2024-11-19T00:25:35.372448+00:00 | 1,527,395,575,000 | a3e63fdbce2ecdb38ffd3fed7e2448a522154ccf | 2 | {
"blob_id": "a3e63fdbce2ecdb38ffd3fed7e2448a522154ccf",
"branch_name": "refs/heads/master",
"committer_date": 1528597792000,
"content_id": "35a3b4e74846f33768ad84ded626fca336ca2dbb",
"detected_licenses": [
"MIT"
],
"directory_id": "e5dc073203ae46b02e5b2e751c6f0b58dccb4cc1",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/env python
import sys
import os
import json
import glob
import argparse
from jinja2 import Environment, FileSystemLoader
def listify(input):
if not input:
return []
for el in input:
if isinstance(input, (tuple, list)):
return input
else:
return [in... | 49 | 21.51 | 75 | 16 | 241 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_87f91362f7302b2a_06e655f4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25
] | [
27
] | [
13
] | [
6
] | |
2024-11-19T00:25:38.052975+00:00 | 1,630,021,883,000 | 56f08e7f1fb3da852f7cff9f7c633b0492454883 | 2 | {
"blob_id": "56f08e7f1fb3da852f7cff9f7c633b0492454883",
"branch_name": "refs/heads/master",
"committer_date": 1630021883000,
"content_id": "dedca761387ea0af1115f08f9e99f1d44a306f82",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f59d08729735b9fd246ba6895b4acde387e56095",
"extension": "py"... | 2.3125 | stackv2 | #!/usr/bin/env python3
# Import ATC classes
try:
from scripts.datautils import DATAutils
from scripts.dataneeded import DataNeeded
from scripts.loggingpolicy import LoggingPolicy
from scripts.enrichment import Enrichment
except:
from data.atc_data.scripts.datautils import DATAutils
from data.at... | 102 | 31.42 | 98 | 16 | 753 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_6f2e8df7e43e1e05_a761b534", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
61
] | [
null
] | [
15
] | [
72
] | |
2024-11-19T01:02:47.066228+00:00 | 1,436,304,996,000 | 24c849f26a3a4c4d0288eeaf3652ce99cfc8847a | 2 | {
"blob_id": "24c849f26a3a4c4d0288eeaf3652ce99cfc8847a",
"branch_name": "refs/heads/master",
"committer_date": 1436304996000,
"content_id": "7b29b16e7e77621442eb2a05015ed63cdcf8be0b",
"detected_licenses": [
"MIT"
],
"directory_id": "f34455f19b5224fcd4c1a16c4bbc0097396eeb13",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python
from collections import OrderedDict
import json
import os
from jinja2 import Environment, PackageLoader
from clan.utils import GLOBAL_ARGUMENTS, format_comma, format_duration, format_percent, load_field_definitions
class DiffCommand(object):
def __init__(self):
self.args = None
... | 211 | 32.59 | 119 | 24 | 1,410 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4808939222f27bb8_8493b42a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
146,
186
] | [
150,
null
] | [
15,
15
] | [
10,
69
] | |
2024-11-19T00:50:19.063767+00:00 | 1,634,049,995,000 | 79a0b5927083fa49978d8d369b2d202f271cbcce | 3 | {
"blob_id": "79a0b5927083fa49978d8d369b2d202f271cbcce",
"branch_name": "refs/heads/master",
"committer_date": 1634049995000,
"content_id": "430c504cafba5ff34815a29ad9b0d722fb320651",
"detected_licenses": [
"MIT"
],
"directory_id": "ea0204cf8b83fb4081b5b6ba3432e63a04fae348",
"extension": "py",
"fi... | 2.90625 | stackv2 | import re
from nltk.tokenize import word_tokenize
from nltk.corpus import stopwords
from bs4 import BeautifulSoup
REMOVE_STOP = False
QUESTION_WORDS = ["what", "when", "where", "why", "how", "who"]
STOPWORDS = set(stopwords.words("english"))
for w in QUESTION_WORDS:
STOPWORDS.remove(w)
# replace URL with a spec... | 66 | 26.32 | 105 | 12 | 493 | python | [{"finding_id": "codeql_py/overly-large-range_1c0452507d7eb2e5_45526f42", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
15
] | [
null
] | [
57
] | [
60
] | |
2024-11-19T01:30:50.270292+00:00 | 1,394,919,310,000 | 962fa8e3479b56d14da056672125c4a385e1977c | 3 | {
"blob_id": "962fa8e3479b56d14da056672125c4a385e1977c",
"branch_name": "refs/heads/master",
"committer_date": 1394919310000,
"content_id": "b8165055f687557e75ce8f226f12621691198b48",
"detected_licenses": [
"MIT"
],
"directory_id": "8df7f9c760df7a7b78f10e8fde5aadf75d284107",
"extension": "py",
"fi... | 3.21875 | stackv2 | # Low Power WiFi Datalogger
# Arduino Yun-based Datalogger
# Created by Tony DiCola (tony@tonydicola.com)
# Quick and dirty script to connect to an Arduino Yun-based datalogger
# and retrieve data every minute. The YunDataLogger class is useful outside
# this script in other tools, such as an IPython notebook that ... | 77 | 36.17 | 96 | 16 | 638 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_fe32fbe76a6fb7a7_15dd7279", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
24
] | [
null
] | [
9
] | [
74
] | |
2024-11-19T00:04:33.103025+00:00 | 1,547,772,960,000 | db0bf9b3846fb90c46a1f01006c3115875326647 | 3 | {
"blob_id": "db0bf9b3846fb90c46a1f01006c3115875326647",
"branch_name": "refs/heads/main",
"committer_date": 1547772960000,
"content_id": "93213e41b7c717c84b62e7c23cd528fd7d65b974",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "0c54562aee4c3e47c1d71b5338406e19233ba885",
"extension": "py",
"... | 2.59375 | stackv2 | from bottle import error, request, route, run, template
import json
from random import choice, randint
import requests
import socket
HOSTNAME = socket.gethostname()
#hostname = '0.0.0.0'
HOSTPORT = 8080
ENDPOINT = 'http://wordtools-api:8081' # api layer host/port set in compose file
# global variables representing ... | 149 | 26.38 | 93 | 16 | 1,082 | python | [{"finding_id": "codeql_py/partial-ssrf_47ca4ed6c198386e_ed35d3aa", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 4 | true | [
"CWE-918",
"CWE-918",
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
49,
61,
101,
115
] | [
null,
null,
null,
null
] | [
19,
19,
19,
19
] | [
47,
47,
47,
47
] | |
2024-11-19T00:27:14.876130+00:00 | 1,645,546,104,000 | 74e2a21b93352e516838dd0d054247f3d4b04553 | 3 | {
"blob_id": "74e2a21b93352e516838dd0d054247f3d4b04553",
"branch_name": "refs/heads/main",
"committer_date": 1645546104000,
"content_id": "a6ff9c69a6a138c4a8ed84b9c29df783c93d16e6",
"detected_licenses": [
"MIT"
],
"directory_id": "74b6a6c3b53968dbad988fca701fb55e40810e21",
"extension": "py",
"file... | 2.84375 | stackv2 | import os
from getpass import getpass
# in windows use cls to clear, all others use clear
# from stackoverflow answer https://stackoverflow.com/a/2084628 (accessed 27.02.2020)
def clear():
os.system("cls" if os.name == "nt" else "clear")
# Get info about database and/or etl
# etl = 1
# only db = 2
def get_info... | 112 | 31.34 | 116 | 25 | 937 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_934df7af215efd6e_3c7511cd", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
28
] | [
null
] | [
13
] | [
32
] | |
2024-11-19T00:27:20.606959+00:00 | 1,247,030,234,000 | 637647e2e6c3ea99068446409579b45c85c637a8 | 3 | {
"blob_id": "637647e2e6c3ea99068446409579b45c85c637a8",
"branch_name": "refs/heads/master",
"committer_date": 1247030234000,
"content_id": "5cf63a3d893258549c58235040413aa370aa8dfd",
"detected_licenses": [
"MIT"
],
"directory_id": "2809f1074d146e997b522578d44d2b94efe2ca7e",
"extension": "py",
"fi... | 2.828125 | stackv2 | #!/usr/bin/env python
"""
A remote debugging protocol and server for Python.
This code is meant to be easily integrated into existing code
simply by running start_remote_debugger().
Currently only supports one connection at a time, to avoid creating
too many threads.
Author: Christopher Swenson (chris@caswenson.com... | 263 | 27.02 | 112 | 17 | 1,855 | python | [{"finding_id": "codeql_py/insecure-default-protocol_c10898d34453569b_e27fb15e", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-200"
] | [
"py/insecure-default-protocol",
"py/insecure-default-protocol",
"py/bind-socket-all-network-interfaces"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.",
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.",
"'' binds a socket to all interfaces."
] | [
144,
215,
211
] | [
null,
null,
null
] | [
11,
9,
3
] | [
29,
81,
21
] | |
2024-11-19T00:40:29.968043+00:00 | 1,503,992,841,000 | dc53e723ddc2512f3c4a129616e748cdd9650097 | 3 | {
"blob_id": "dc53e723ddc2512f3c4a129616e748cdd9650097",
"branch_name": "refs/heads/master",
"committer_date": 1504020384000,
"content_id": "da1857097317da60b41e8685aa55028807b8c907",
"detected_licenses": [
"Unlicense"
],
"directory_id": "46c5d1d0f0f23b8229ad2e615f7ab553b3353338",
"extension": "py",... | 2.71875 | stackv2 | #!/usr/bin/python
import jinja2
templateLoader = jinja2.FileSystemLoader( searchpath="template" )
templateEnv = jinja2.Environment( loader=templateLoader )
templateVars = {
"license_info": "This site is released under the GNU General Public License",
"title": "Toulibre rulez",
"news": []
}
templateI... | 30 | 31.43 | 81 | 9 | 250 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0c5b8fece3934770_5c43473a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
6
] | [
null
] | [
15
] | [
58
] | |
2024-11-19T01:15:16.708047+00:00 | 1,596,263,126,000 | 0dc0205ec437ef7d4f96bf12936d1ee797d8dbe0 | 4 | {
"blob_id": "0dc0205ec437ef7d4f96bf12936d1ee797d8dbe0",
"branch_name": "refs/heads/master",
"committer_date": 1596263126000,
"content_id": "cbfad30438f5954d9e29b88ab06f55e58029184f",
"detected_licenses": [
"MIT"
],
"directory_id": "3369567ceb0bba84ce5b45a600e2643ebd6b3f92",
"extension": "py",
"fi... | 4.03125 | stackv2 | import random #We have to import this module for generating random numbers
print("-----------------------------------REDWOOD CITY-------------------------------------")
print("")
num = int(input("Press 1 to continue : ")) #a condition to begin the game
if num == 1:
age = 0;
name = input("Enter your ... | 179 | 31.75 | 100 | 17 | 1,297 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_816b63f02a62747c_7d7913c7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priva... | [
51,
108
] | [
null,
null
] | [
29,
25
] | [
32,
28
] | |
2024-11-19T01:15:22.305334+00:00 | 1,498,424,345,000 | 1ceda4c283db32b196ac9fcc86dcc315e5972df2 | 2 | {
"blob_id": "1ceda4c283db32b196ac9fcc86dcc315e5972df2",
"branch_name": "refs/heads/master",
"committer_date": 1498424345000,
"content_id": "34978d2a01e870677e964f1008c0d14654617813",
"detected_licenses": [
"MIT"
],
"directory_id": "2100443dd6cbd55587f7ea8d875fc4bbe70b5423",
"extension": "py",
"fi... | 2.328125 | stackv2 | import imghdr
import json
import logging
import mimetypes
import os
from pathlib import Path
import flask
from flask import g
from flask import send_from_directory, abort, send_file, Blueprint
import beets
from beets.library import PathQuery
my_dir = Path(os.path.abspath(__file__)).parent
STATIC_FOLDER = os.path.absp... | 109 | 30.83 | 107 | 16 | 833 | python | [{"finding_id": "codeql_py/path-injection_9cb8e527e5d53d65_bc31abe7", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 5 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
63,
67,
95,
99,
102
] | [
null,
null,
null,
null,
null
] | [
9,
58,
31,
13,
62
] | [
13,
62,
41,
23,
72
] | |
2024-11-19T00:43:51.246056+00:00 | 1,456,646,481,000 | b09f6b058f381895568ca48856a96ee04a1339bd | 3 | {
"blob_id": "b09f6b058f381895568ca48856a96ee04a1339bd",
"branch_name": "refs/heads/master",
"committer_date": 1456646481000,
"content_id": "e467bf842a408fb5c8fef0bbf4e9814e247ee921",
"detected_licenses": [
"MIT"
],
"directory_id": "82838b661189a296362612d1c2aea09cd05c0bbe",
"extension": "py",
"fi... | 2.515625 | stackv2 | from django.http import HttpResponse
from django.views.generic.base import RedirectView
from django.core.urlresolvers import reverse
from faker import Faker
class GoView(RedirectView):
def get_redirect_url(self, *args, **kwargs):
to_url = self.request.GET.get("to", self.request.META.get("HTTP_HOST"))... | 51 | 27.75 | 109 | 15 | 341 | python | [{"finding_id": "codeql_py/url-redirection_8258d3bca4aace18_1e129a19", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a ... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](2).",
"Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](2)."
] | [
24,
51
] | [
null,
null
] | [
16,
16
] | [
22,
28
] | |
2024-11-19T01:31:58.524504+00:00 | 1,634,640,024,000 | 9912ffa844a81eadfde9b6e2e5248c45a8368040 | 3 | {
"blob_id": "9912ffa844a81eadfde9b6e2e5248c45a8368040",
"branch_name": "refs/heads/master",
"committer_date": 1634640024000,
"content_id": "07d8fe06aa75da922052594ce62f87b238fbebdf",
"detected_licenses": [
"MIT"
],
"directory_id": "449cb8a2ac9d4149baff3a5271ca040c0a483791",
"extension": "py",
"fi... | 2.546875 | stackv2 | import sys
import requests
import json
import re
# TODO: add more options like place of API-key, show relevant/time ordered comments, show only to-level comments, max number of comments etc...
# TODO: add a simple mode: no need for a regex. Like grep default. But also make it possible to use a regex with an cli-option... | 55 | 33.24 | 174 | 18 | 456 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fc5bbf00ad745f2e_a56fde46", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
42,
48
] | [
null,
null
] | [
19,
27
] | [
26,
58
] | |
2024-11-19T01:32:22.029452+00:00 | 1,527,705,910,000 | 4b843d396d9667b1ddc89013b8833aaaa8ddedc6 | 3 | {
"blob_id": "4b843d396d9667b1ddc89013b8833aaaa8ddedc6",
"branch_name": "refs/heads/master",
"committer_date": 1527705910000,
"content_id": "f1c144b21841c9db2475dcef331b4aa292c49d07",
"detected_licenses": [
"MIT"
],
"directory_id": "3ddf4f75214c93f108148baa32a0a455df2e284f",
"extension": "py",
"fi... | 3.03125 | stackv2 | #!/usr/bin/env python
"""
.. module:: doUtils.sshConn
:platform: Unix
:synopsis: class SshConn -- an ssh connection.
.. moduleauthor:: John Kimball <jjkimball@acm.org>
class SshConn -- an ssh connection.
Wrap it up in an object to provide a bit higher level of abstraction
than paramiko. (And a tiny subset the... | 118 | 28.08 | 103 | 11 | 770 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_6b755c48bb9258cb_08b0e3bc", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to WarningPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to WarningPolicy may be unsafe."
] | [
66
] | [
null
] | [
9
] | [
75
] | |
2024-11-19T01:32:22.081091+00:00 | 1,486,731,445,000 | 2a2676dddecd6710e2dddeec5abcd1bef2130854 | 3 | {
"blob_id": "2a2676dddecd6710e2dddeec5abcd1bef2130854",
"branch_name": "refs/heads/master",
"committer_date": 1486731445000,
"content_id": "3c1891aafdd0c6aeea4e95a4bd01cd88298f8431",
"detected_licenses": [
"MIT"
],
"directory_id": "85bf1c44e96ab7a66f154f3a320efa00fcd10ba1",
"extension": "py",
"fi... | 2.78125 | stackv2 | import hmac
import hashlib
import random
import string
from google.appengine.ext import ndb
# for hmac on cookies - should be somewhere else
SECRET_KEY = "Fdh3nhUsLhy"
def make_secure_val(val):
""" use hmac with secret key to create a secure cookie """
return "{}|{}".format(val, hmac.new(SECRET_KEY, val).he... | 254 | 31.58 | 79 | 20 | 1,739 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_0fc2b7d810825ad3_18edf73e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
36
] | [
null
] | [
24
] | [
40
] | |
2024-11-19T01:32:30.585297+00:00 | 1,623,227,758,000 | a69314abdbd71244d14f7bc64042429c73004712 | 3 | {
"blob_id": "a69314abdbd71244d14f7bc64042429c73004712",
"branch_name": "refs/heads/main",
"committer_date": 1623227758000,
"content_id": "6e11a68e010c5d6d220435ce36637119e8d33352",
"detected_licenses": [
"MIT-0"
],
"directory_id": "df240bdb7d41d6ee9ea70d0bdd7ba59a54e96971",
"extension": "py",
"fi... | 2.671875 | stackv2 | import os
from flask import Flask, request
import pickle
import numpy as np
import requests
from io import BytesIO
from PIL import Image
from settings import APP_ROOT
app = Flask(__name__)
@app.route("/")
def hello():
return "Hi"
@app.route("/predict",methods=['POST','GET'])
def predict():
try:
# lab... | 56 | 30.84 | 104 | 20 | 426 | python | [{"finding_id": "codeql_py/stack-trace-exposure_420a86bce8333d4c_ca4915b1", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-918"
] | [
"py/stack-trace-exposure",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"The full URL of this request depends on a [user-provided value](1)."
] | [
53,
33
] | [
null,
null
] | [
16,
24
] | [
22,
46
] | |
2024-11-19T01:32:40.872698+00:00 | 1,596,970,729,000 | 066ff58b084c5b06750358678541fdfba6e2e23a | 2 | {
"blob_id": "066ff58b084c5b06750358678541fdfba6e2e23a",
"branch_name": "refs/heads/master",
"committer_date": 1596973736000,
"content_id": "fc031a82c5c72489a0c97049088eafdd91fe129e",
"detected_licenses": [
"MIT"
],
"directory_id": "1591d2db6b49076eb8b630f292e9a8217ae0f008",
"extension": "py",
"fi... | 2.359375 | stackv2 | from __future__ import absolute_import
import re
import bs4
from six import StringIO
from six import PY3
from fulltext.util import BaseBackend
class Backend(BaseBackend):
def is_visible(self, elem):
if isinstance(elem, (bs4.element.ProcessingInstruction,
bs4.element.Docty... | 37 | 22.27 | 67 | 14 | 184 | python | [{"finding_id": "codeql_py/bad-tag-filter_05c4f844600164b1_9ef9340d", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match comments containing newlines.", "remediation": "", "location": {"file_pat... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match comments containing newlines."
] | [
22
] | [
null
] | [
22
] | [
31
] | |
2024-11-19T01:43:48.379047+00:00 | 1,554,967,637,000 | aa5e66d3afd1a754d985c7220e387386839ec07d | 3 | {
"blob_id": "aa5e66d3afd1a754d985c7220e387386839ec07d",
"branch_name": "refs/heads/master",
"committer_date": 1554967637000,
"content_id": "769661c4b4772b89744a598591a9b6879641c9c0",
"detected_licenses": [
"MIT"
],
"directory_id": "504ef5e8ca5bc73bb01f1b3604cbd7c72a02a441",
"extension": "py",
"fi... | 2.921875 | stackv2 | # coding: ISO-8859-1
"""
Ce programme permet de faire tourner un serveur de discussion instantanée.
"""
import multiprocessing
import socket
import queue
import sys
import os
import traceback
#------------------------------------------------------------------------------
# GESTION DES CLIENTS
#-------... | 344 | 34.66 | 120 | 20 | 2,858 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5a0e296bf10476c6_d2c64bbe", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 2 | true | [
"CWE-312",
"CWE-200"
] | [
"py/clear-text-storage-sensitive-data",
"py/bind-socket-all-network-interfaces"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.",
"'' binds a socket to all interfaces."
] | [
191,
322
] | [
null,
null
] | [
14,
9
] | [
18,
39
] | |
2024-11-19T01:44:10.696074+00:00 | 1,636,094,997,000 | 2687c2e4a341525ba1ad67c943fb88b72856c1d7 | 3 | {
"blob_id": "2687c2e4a341525ba1ad67c943fb88b72856c1d7",
"branch_name": "refs/heads/main",
"committer_date": 1636094997000,
"content_id": "cf5bc63f555ba02d4285db3bf83c8ba5978553f7",
"detected_licenses": [
"MIT"
],
"directory_id": "5d456b5ac4c2f3491cdc6219b6b09e7afcd1a065",
"extension": "py",
"file... | 3.359375 | stackv2 | #!/usr/bin/env python
# -*- encoding: utf-8 -*-
'''
@File : input_check.py
@Author : Billy Zhou
@Time : 2021/08/22
@Desc : None
'''
import getpass
def input_pwd(tip_words='Please input your password:'):
"""Add tip_words to getpass.getpass()"""
return getpass.getpass(tip_words)
def input_... | 95 | 36.64 | 88 | 17 | 874 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_25c77816057df2b3_0ee2026e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
90
] | [
null
] | [
18
] | [
51
] | |
2024-11-19T02:20:32.757382+00:00 | 1,693,558,388,000 | eabde4cd0bc1fe537d30f18c5716312c8a8032c4 | 3 | {
"blob_id": "eabde4cd0bc1fe537d30f18c5716312c8a8032c4",
"branch_name": "refs/heads/master",
"committer_date": 1693558388000,
"content_id": "081334c6d589e893bde0dcaeb1a48071b5afca65",
"detected_licenses": [
"MIT"
],
"directory_id": "fe1255be53e17f09c8215666eae397f3ad1961b0",
"extension": "py",
"fi... | 3.25 | stackv2 | import requests
import faster_than_requests
import pycurl
import time
print("Normal Requests")
timeStart = time.perf_counter()
for _ in range(10):
res = requests.get('https://twitter.com/')
print(".")
timeEnd = time.perf_counter() - timeStart
averageTime = timeEnd / 10
timeEnd = round(timeEnd, 4)
print(f"Made... | 41 | 26.15 | 72 | 9 | 323 | python | [{"finding_id": "codeql_py/request-without-cert-validation_2c510af6168efd84_fc8455dd", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
23
] | [
null
] | [
5
] | [
39
] | |
2024-11-19T00:59:38.448746+00:00 | 1,612,969,713,000 | c23f69dabb4b5832155adb23eeac47e19f9a8582 | 3 | {
"blob_id": "c23f69dabb4b5832155adb23eeac47e19f9a8582",
"branch_name": "refs/heads/main",
"committer_date": 1612969713000,
"content_id": "90776569b94ef821ac713cc5c9ce105f88ffcd5f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6eb56f2e3f14f2373be07fe95b1c6fedf1e2d49f",
"extension": "py",
... | 2.640625 | stackv2 | from django.conf import settings
from django.http import HttpResponse, JsonResponse
from django.shortcuts import render
import json
# Create your views here.
from django.views import View
from .models import UserProfile
from tools.login_dec import login_check
import hashlib
import jwt
import time
class UserView(View)... | 124 | 32.64 | 138 | 20 | 1,155 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1ffd170209bbe2ef_6f0e86aa", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
77
] | [
null
] | [
20
] | [
39
] | |
2024-11-19T01:00:05.650924+00:00 | 1,676,139,610,000 | f560cea6be5c10fbe93ba3dd4fa47ff9f41b3f62 | 2 | {
"blob_id": "f560cea6be5c10fbe93ba3dd4fa47ff9f41b3f62",
"branch_name": "refs/heads/master",
"committer_date": 1676139610000,
"content_id": "4bd454e286313e9503b42789a007a5794440956a",
"detected_licenses": [
"MIT"
],
"directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9",
"extension": "py",
"fi... | 2.375 | stackv2 | # Note that this script attempts to delete directories (Folders) called 'temp' and 'dateutil'
# within Pythonista as part of installation. It will also overwrite files in directories
# named 'github' and 'githubista'. If you are using Pythonista 1.3 or above please check
# that you have not created any Folders with th... | 143 | 39.48 | 105 | 14 | 1,380 | python | [{"finding_id": "codeql_py/tarslip_b1065ef6f9e0bbbb_3081dcbd", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
39
] | [
null
] | [
3
] | [
10
] | |
2024-11-19T01:11:45.829864+00:00 | 1,616,208,186,000 | 26c25af53714e397f07e5cb36c47da6228f8db92 | 3 | {
"blob_id": "26c25af53714e397f07e5cb36c47da6228f8db92",
"branch_name": "refs/heads/main",
"committer_date": 1616208186000,
"content_id": "5dd4ef5f0be0738f5eafbcacf190a609a89fee9e",
"detected_licenses": [
"Unlicense"
],
"directory_id": "607383c35bb85da0d3150030fe811ebbd47558ce",
"extension": "py",
... | 2.671875 | stackv2 | import json
import requester
import urllib.parse
import time
import dataHandler
import csv
from html.parser import HTMLParser
BASE_URL = 'https://govsalaries.com'
STATE = 'KS'
EMPLOYER = 'olathe'
#https://govsalaries.com/search?employer=%s&year=%s&employee=%s&state=%s
class htmlParserSearch(HTMLParser):
allPage... | 147 | 37.13 | 148 | 20 | 1,410 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cf4e0ffff08d76ed_cafd4eff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
53,
58
] | [
54,
null
] | [
31,
27
] | [
70,
93
] | |
2024-11-19T01:11:53.166683+00:00 | 1,573,674,631,000 | b30475de898ce0811e444db8105b664dfa1f8af3 | 3 | {
"blob_id": "b30475de898ce0811e444db8105b664dfa1f8af3",
"branch_name": "refs/heads/master",
"committer_date": 1573674631000,
"content_id": "031bccbc02d77f91eb5ca2179478592b2e4eb0fa",
"detected_licenses": [
"MIT"
],
"directory_id": "dbb5f45fa1c0b80991c74b9ec213b169daa1f903",
"extension": "py",
"fi... | 2.703125 | stackv2 | """This is the docstring"""
import datetime
from flask import jsonify, request, g
from ..utils.auth import requires_auth
from ..utils.tools import fileUpload, enrich_posts
from ..utils.db_handler import insert_post_to_db, find_related_posts, like_post
from .. import app
@app.route('/post', methods=['GET'])
@requires_... | 75 | 31.52 | 87 | 17 | 554 | python | [{"finding_id": "codeql_py/stack-trace-exposure_0db11d3b7fd1dfaf_bc602084", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
61
] | [
null
] | [
30
] | [
82
] | |
2024-11-19T01:21:25.731046+00:00 | 1,470,733,901,000 | d3db86c70d69971f5aaf140ae421e48ce1462141 | 3 | {
"blob_id": "d3db86c70d69971f5aaf140ae421e48ce1462141",
"branch_name": "refs/heads/master",
"committer_date": 1470733901000,
"content_id": "9edb24b4ff15510ec3932cfce8aff3c6759c6c7d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "907c55c4807ae75dbd3d34f333f9f839988115da",
"extension": "py"... | 2.515625 | stackv2 | #!/usr/bin/env python
# -*- coding: UTF-8 -*-
#
# Copyright 2016 sadikovi
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless requir... | 434 | 34.67 | 100 | 16 | 3,365 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_6195a7deab16c196_4998e0e2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
150
] | [
null
] | [
7
] | [
78
] | |
2024-11-19T02:10:46.016773+00:00 | 1,547,839,873,000 | 51379e5e89b218ee6686886a0cb101ef0174ac05 | 3 | {
"blob_id": "51379e5e89b218ee6686886a0cb101ef0174ac05",
"branch_name": "refs/heads/master",
"committer_date": 1547839873000,
"content_id": "c7dbd2376f576c4a51b251292558db08afd3d273",
"detected_licenses": [
"MIT"
],
"directory_id": "8c438afe56141a6ad35c576364fc911f1168a221",
"extension": "py",
"fi... | 2.625 | stackv2 | import requests, json
import os, time
from functools import wraps
from flask import Flask, request, abort, jsonify
import MySQLdb
from flask_cors import CORS
# API_KEY = b'HahaTeehee'
#
# def require_apikey(api_function):
# @wraps(api_function)
# def decorated_function(*args, **kwargs):
# if request.he... | 120 | 30.48 | 96 | 19 | 886 | python | [{"finding_id": "codeql_py/stack-trace-exposure_c26be80ffa65fdd3_d3003c69", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-089",
"CWE-089"
] | [
"py/stack-trace-exposure",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
113,
43,
62
] | [
null,
null,
null
] | [
24,
21,
25
] | [
32,
26,
30
] | |
2024-11-19T02:10:47.121050+00:00 | 1,519,102,425,000 | 31da94b2d9667c845d70954cf9e8bcb42ae45a6e | 3 | {
"blob_id": "31da94b2d9667c845d70954cf9e8bcb42ae45a6e",
"branch_name": "refs/heads/master",
"committer_date": 1519102425000,
"content_id": "5a5bc91c5a57a6501ea9ff04d5a277f20460d81a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b71f22b5e549c1a96a016edff91dfcb9981416b9",
"extension": "py"... | 2.609375 | stackv2 | import json
import os
from pprint import pprint
import datetime
from lolhrgraph import riot
from lolhrgraph.fitbit import FitbitClient
def read_auth_info():
with open(
os.path.join(
os.path.dirname(os.path.abspath(__file__)),
"..",
"api_keys.txt"
... | 87 | 31.86 | 118 | 17 | 655 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6dd329d14843ead2_64e64b34", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
83
] | [
null
] | [
11
] | [
63
] | |
2024-11-19T02:45:25.157033+00:00 | 1,602,309,535,000 | 8049d00a53629d2f1ee5f971a36347914ac76424 | 3 | {
"blob_id": "8049d00a53629d2f1ee5f971a36347914ac76424",
"branch_name": "refs/heads/main",
"committer_date": 1602309535000,
"content_id": "9fa0cb89a9b756c36053a4f0056b4f351ed38b20",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cd400ab19901bf8ea44891147504ecac4751cc99",
"extension": "py",
... | 3.421875 | stackv2 | #!/usr/bin/python
import ftplib
def bruteLogin(hostname,passwdFile):
try:
pF = open(passwdFile,"r")
except:
print ("[-] File Does not Exist")
for line in pF.readlines():
userName = line.split(':')[0]
passWord = line.split(':')[1].strip("\n")
print ("Trying: "+userName +"/"+passWord)
try:
ftp = ftp... | 30 | 22.87 | 80 | 15 | 190 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7a5e24343385f0b5_4d1b752b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
15,
19
] | [
null,
null
] | [
10,
11
] | [
43,
80
] | |
2024-11-19T02:45:48.634804+00:00 | 1,549,790,591,000 | d62262129c5416f05cdf79683fb5763cfea541af | 5 | {
"blob_id": "d62262129c5416f05cdf79683fb5763cfea541af",
"branch_name": "refs/heads/master",
"committer_date": 1549790591000,
"content_id": "a8a34ce25818b8c3e090bfd4d354f46691e07802",
"detected_licenses": [
"MIT"
],
"directory_id": "1a86d2331697edfce24f41da3d68f59606a1c04a",
"extension": "py",
"fi... | 4.84375 | stackv2 | # 3. Extended Person Info
def get_info():
name = input()
age = int(input())
town = input()
salary = float(input())
return name, age, town, salary
def age_range(age):
teen_cap = int(18)
adult_cap = int(70)
if age < teen_cap:
age_label = "teen"
elif age >= adult_cap:
... | 40 | 22.45 | 129 | 10 | 262 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_05a2b4338e97e9bc_185bd335", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.\nThis expression logs [sensitive data (private)]... | [
38
] | [
null
] | [
11
] | [
129
] | |
2024-11-19T02:57:19.127234+00:00 | 1,557,425,600,000 | 12cba66710b60515451a6a0a870bcd65e8831f85 | 3 | {
"blob_id": "12cba66710b60515451a6a0a870bcd65e8831f85",
"branch_name": "refs/heads/master",
"committer_date": 1557425635000,
"content_id": "c43fa7a97cce75af703960c283e8812918d60b35",
"detected_licenses": [
"MIT"
],
"directory_id": "740775b5ddbeec286a8068b2b52b391c496be0ae",
"extension": "py",
"fi... | 3.078125 | stackv2 | import math
from htmlmin.minify import html_minify
from jinja2 import Template
from unipath import Path
from whiskyton import app
class Chart(object):
def __init__(
self,
reference=None,
comparison=None,
sides=12,
width=330,
height=260,
margin=60,
... | 257 | 35.03 | 79 | 19 | 2,089 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_772af25ace63573d_d9df84ee", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
102
] | [
null
] | [
28
] | [
57
] | |
2024-11-19T02:57:19.203084+00:00 | 1,622,579,127,000 | 31b1d6eacf822257972b26b59eb3b398cdfb73f1 | 2 | {
"blob_id": "31b1d6eacf822257972b26b59eb3b398cdfb73f1",
"branch_name": "refs/heads/master",
"committer_date": 1622579127000,
"content_id": "a513a0ad46e5234e14c956be9bf3790d39c1cdab",
"detected_licenses": [
"MIT"
],
"directory_id": "077de683e22b356fe2eb95b4add06138239181cd",
"extension": "py",
"fi... | 2.421875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import json
import os
import traceback
from flask import Flask, Blueprint, render_template, request
from orquesta.specs import native as specs
from orquesta.composers import native
from networkx.drawing.nx_agraph import to_agraph
from yaml.scanner import ScannerError
ap... | 74 | 27.32 | 90 | 15 | 516 | python | [{"finding_id": "codeql_py/stack-trace-exposure_760d5137bb7beb8e_350ed0dc", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
32,
74
] | [
null,
null
] | [
12,
5
] | [
30,
75
] | |
2024-11-19T02:57:27.194635+00:00 | 1,567,555,904,000 | 346eb8469dd689d4524543f01180227416028374 | 3 | {
"blob_id": "346eb8469dd689d4524543f01180227416028374",
"branch_name": "refs/heads/master",
"committer_date": 1567555904000,
"content_id": "a5baca131f5043e72d69803a2739c59935fec5b1",
"detected_licenses": [
"MIT"
],
"directory_id": "1ce5ed679a79b80cfa4aa361206075c186b41eed",
"extension": "py",
"fi... | 3.078125 | stackv2 | import socket #importa modulo socket
from OpenSSL import SSL
TCP_IP = '127.0.0.1' # endereço IP do servidor
TCP_PORTA = 24000 # porta disponibilizada pelo servidor
TAMANHO_BUFFER = 1024
# Criação de socket TCP do cliente
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
# Configurando SSL
context = SSL.... | 36 | 25.72 | 62 | 10 | 264 | python | [{"finding_id": "codeql_py/insecure-protocol_0bffef3e76b20772_c06aae31", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv2 allowed by [call to SSL.Context](1).\nInsecure SSL/TLS protocol ve... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version SSLv2 allowed by [call to SSL.Context](1).\nInsecure SSL/TLS protocol version SSLv3 allowed by [call to SSL.Context](1).\nInsecure SSL/TLS protocol version TLSv1 allowed by [call to SSL.Context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to SSL.Context](1)."
] | [
17
] | [
null
] | [
26
] | [
33
] | |
2024-11-19T03:12:10.625043+00:00 | 1,457,072,435,000 | 98cc5a2c5a36530f460420e44d0423e7be0447a7 | 2 | {
"blob_id": "98cc5a2c5a36530f460420e44d0423e7be0447a7",
"branch_name": "refs/heads/master",
"committer_date": 1457072435000,
"content_id": "245b950f81cbcee25af54cb643859c634384e5c6",
"detected_licenses": [
"MIT"
],
"directory_id": "62118404fc3b42f069cc7e0a42e4462ad726d836",
"extension": "py",
"fi... | 2.375 | stackv2 | # -*- coding: utf-8 -*-
from flask import Flask, request, redirect, url_for, session, flash, abort
from flask.templating import render_template
from threading import BoundedSemaphore
from hashlib import md5
from importlib import import_module
from lib.stuff import *
centipede = Flask(__name__)
centipede.config.from... | 216 | 34.05 | 122 | 22 | 1,685 | python | [{"finding_id": "codeql_py/flask-debug_c99fa684424dc760_32dde34b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 5 | true | [
"CWE-215",
"CWE-327",
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/flask-debug",
"py/weak-sensitive-data-hashing",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"Untrusted URL redirecti... | [
216,
58,
120,
145,
155
] | [
null,
null,
null,
null,
null
] | [
5,
48,
29,
29,
21
] | [
65,
88,
45,
45,
37
] | |
2024-11-19T03:12:12.958561+00:00 | 1,389,840,907,000 | f2bb56d117e51bfe37fbaacfaff08056842c096d | 3 | {
"blob_id": "f2bb56d117e51bfe37fbaacfaff08056842c096d",
"branch_name": "refs/heads/master",
"committer_date": 1389840907000,
"content_id": "c0acd4bd7f014fb78ae0e41d550033befe2ada29",
"detected_licenses": [
"Unlicense"
],
"directory_id": "7ed68882fc4c17b9419d6dac3c6efa0a888571fe",
"extension": "py",... | 2.515625 | stackv2 | #!/usr/bin/env python
import argparse
import os
import sys
import paramiko
import socket
import subprocess
import yaml
import logging
import logging.handlers
def parse_options():
parser = argparse.ArgumentParser(description="""
Server backup script - Flip Hess 2014 - <flip@fliphess.com>
""")
pa... | 139 | 30.02 | 108 | 14 | 1,067 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_3bdb8d6643fdecd4_3aac3fae", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
85
] | [
null
] | [
5
] | [
65
] | |
2024-11-19T03:12:21.404676+00:00 | 1,531,920,661,000 | feebb414dd8d0e050fcff0ed2c104f5052badd2e | 3 | {
"blob_id": "feebb414dd8d0e050fcff0ed2c104f5052badd2e",
"branch_name": "refs/heads/master",
"committer_date": 1531920661000,
"content_id": "d0fa339260f668775a5293fe878eb8515d17c20b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "da4ff770ce9ab179b9961f2bd0fb0e18e8f62aca",
"extension": "py"... | 2.640625 | stackv2 | #/user/bin/env/python
#-*- coding:utf-8 -*-
'''
author:baizhou
'''
import random
import uuid
import hashlib
def get_random_color():
R = random.randrange(255)
G = random.randrange(255)
B = random.randrange(255)
return (R,G,B)
def get_random_str():
uuid_val = uuid.uuid4()
uuid_str = str(uuid).e... | 24 | 16.21 | 40 | 10 | 120 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_002f966b60a73f9a_8d241d0e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure."
] | [
21
] | [
null
] | [
16
] | [
24
] | |
2024-11-19T03:12:22.317981+00:00 | 1,461,973,208,000 | 96fd38a827263e1e1d795e141fc74f9a8d251eb2 | 3 | {
"blob_id": "96fd38a827263e1e1d795e141fc74f9a8d251eb2",
"branch_name": "refs/heads/master",
"committer_date": 1461973208000,
"content_id": "77f0a7084e17c876f7de746c9d9e31bd3353f4e2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "55e4eca63c759dc299f789a16b146c966ae97503",
"extension": "py"... | 2.578125 | stackv2 | import hashlib
import json
import falcon
import mongoengine as mongo
from fields import PasswordField
class User(mongo.Document):
username = mongo.StringField(required=True)
first_name = mongo.StringField(required=False)
last_name = mongo.StringField()
email = mongo.EmailField(required=True)
passw... | 44 | 31.43 | 69 | 16 | 292 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_8894b61c16c64428_e6d85196", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
18
] | [
null
] | [
33
] | [
57
] | |
2024-11-19T01:33:43.599312+00:00 | 1,587,091,801,000 | 62d4bc9e21eb248b0e87317cee91de06b110ccf3 | 2 | {
"blob_id": "62d4bc9e21eb248b0e87317cee91de06b110ccf3",
"branch_name": "refs/heads/master",
"committer_date": 1587091801000,
"content_id": "00bafce2913721cfc65ceaedbce739e840b1dc85",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "684a67c3936bfaf9971084216f59532a7bc4c493",
"extension": "py"... | 2.375 | stackv2 | # app.py
from flask import Flask, request, jsonify, flash, abort
from flask_cors import *
from datetime import datetime as dt, timedelta
import base64
import os.path
from database_objects.dbcontext import DatabaseContext
from utils.auth_handler import AuthHandler
from utils.iex_handler import IEXHandler
from models.un... | 155 | 31.89 | 109 | 15 | 1,205 | python | [{"finding_id": "codeql_py/reflective-xss_30e1347e2e4bdb63_84ddf7a8", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-022"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
59,
74,
114
] | [
null,
null,
null
] | [
12,
12,
27
] | [
63,
68,
37
] | |
2024-11-19T01:57:28.347910+00:00 | 1,544,976,950,000 | 18abafaae3cc852961b8e6c3b1ba7c974e3467a3 | 3 | {
"blob_id": "18abafaae3cc852961b8e6c3b1ba7c974e3467a3",
"branch_name": "refs/heads/master",
"committer_date": 1544976950000,
"content_id": "6b51acd2b6ff0f66da18605cc224444578e327ff",
"detected_licenses": [
"MIT",
"BSD-3-Clause",
"Apache-2.0",
"BSD-2-Clause"
],
"directory_id": "03e4331a8d5... | 2.984375 | stackv2 | # -*- coding: utf-8 -*-
from __future__ import absolute_import
from __future__ import division
from __future__ import print_function
from __future__ import unicode_literals
import psutil
from builtins import input
from past.builtins import basestring
from datetime import datetime
from functools import reduce
import ... | 342 | 25.8 | 90 | 16 | 2,541 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_266040b517917896_afda1031", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
274
] | [
null
] | [
22
] | [
47
] | |
2024-11-19T02:11:44.133124+00:00 | 1,604,293,412,000 | 1a6d7b509db49744d9124cd04eb4154428245945 | 3 | {
"blob_id": "1a6d7b509db49744d9124cd04eb4154428245945",
"branch_name": "refs/heads/master",
"committer_date": 1604293412000,
"content_id": "c646d61842ecba0986ba19a06915dc558b8f5774",
"detected_licenses": [
"MIT"
],
"directory_id": "944ac5ed66cd97418a8b91c52d7e6dae68f50f50",
"extension": "py",
"fi... | 3.046875 | stackv2 | import hashlib
import os
import base64
import re
import multiprocessing
import time
from multiprocessing import Pool
from Crypto.Cipher import AES
from Crypto.Util.Padding import pad, unpad
MULTIPLE_OF_BYTE = 16
def generate_key(password):
# 将密码转为md5值作为密钥
md5 = hashlib.md5()
md5.update(password.encode('... | 166 | 36.01 | 117 | 18 | 1,615 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_b855953f0f3934d0_f58069b8", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.\n[The block mode ... | 4 | true | [
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.\n[The block mode ECB](2) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[Sensitive data (password)](1) ... | [
66,
83,
97,
18
] | [
null,
null,
null,
null
] | [
24,
38,
44,
16
] | [
46,
78,
61,
40
] | |
2024-11-19T02:32:43.336376+00:00 | 1,585,151,456,000 | 605bc072d2ca23066375e23f347672dfa1089941 | 3 | {
"blob_id": "605bc072d2ca23066375e23f347672dfa1089941",
"branch_name": "refs/heads/master",
"committer_date": 1585151456000,
"content_id": "4d953e2e4da7d7586ef08471b6a3d3a7aaac98ed",
"detected_licenses": [
"MIT"
],
"directory_id": "9e0de4513a1ef42d4187ddb0096522c6e9929a5f",
"extension": "py",
"fi... | 2.53125 | stackv2 | # from .app import create_app
# NOTE that when you deploy you have to get rid of the relative
# references so from app instead of from .app
import os
import json
# Third Party Modules
import requests
from flask import Flask, render_template, request, jsonify
from flask_cors import CORS, cross_origin
# from decouple i... | 106 | 34.92 | 84 | 18 | 804 | python | [{"finding_id": "codeql_py/flask-debug_adb229f64b8ccc3e_cf0b04d9", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-918",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
106,
60,
71
] | [
null,
63,
74
] | [
5,
24,
24
] | [
32,
50,
30
] | |
2024-11-19T02:32:47.435176+00:00 | 1,691,502,290,000 | 7ad2f9f868fbdfa7a4dc9f2902db88c8a39d29e4 | 3 | {
"blob_id": "7ad2f9f868fbdfa7a4dc9f2902db88c8a39d29e4",
"branch_name": "refs/heads/master",
"committer_date": 1691502290000,
"content_id": "2df1459d096892194c4562f1dc9e88ccf232ff2f",
"detected_licenses": [
"MIT"
],
"directory_id": "a6e96b3f391931d7ac0c95d3bd1fc1956818f55e",
"extension": "py",
"fi... | 2.546875 | stackv2 | import os
import sys
from six.moves import urllib
import tarfile
def maybe_download_and_extract(data_url, model_dir):
"""
Download and extract model tar file
"""
dest_directory = model_dir
if not os.path.exists(dest_directory):
os.makedirs(dest_directory)
filename = data_url.split('/')... | 26 | 34.35 | 81 | 18 | 209 | python | [{"finding_id": "codeql_py/tarslip_0973442dfd40eb00_1411c3ba", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
26
] | [
null
] | [
5
] | [
35
] | |
2024-11-19T02:32:50.544316+00:00 | 1,613,078,874,000 | 4a8df7e46de501e558f031872dcdbf903078053e | 2 | {
"blob_id": "4a8df7e46de501e558f031872dcdbf903078053e",
"branch_name": "refs/heads/main",
"committer_date": 1613078874000,
"content_id": "2fdd4ed54334245c5a7deaa75e540a02c6e52050",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "745e0199f4b22e20dd45cc0de08d356baf00ea4c",
"extension": "py",
... | 2.4375 | stackv2 | import requests
import sys
import json
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
fhir_server = sys.argv[1]
token = sys.argv[2]
headers = {"Authorization": "Bearer " + token}
def get_response_json_object(url):
r = requests.get(url, headers=headers, verify=False)
return ... | 37 | 26.35 | 86 | 13 | 249 | python | [{"finding_id": "codeql_py/request-without-cert-validation_285a08b771124d7a_51009a30", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
14
] | [
null
] | [
6
] | [
54
] | |
2024-11-19T02:33:29.266511+00:00 | 1,485,977,243,000 | fea6a87f2ba1fcdd3a0ef75ab170b38e247d0163 | 3 | {
"blob_id": "fea6a87f2ba1fcdd3a0ef75ab170b38e247d0163",
"branch_name": "refs/heads/master",
"committer_date": 1485977243000,
"content_id": "c83fbf3bc60e17855683f2cb96d5e1563c37fc60",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4188999c3a13c19759db613a952c4c2c7a449f9b",
"extension": "py"... | 2.609375 | stackv2 |
#==============================================================================
# Title: app.py
# Description: This is the logic of the Mrs Miggins vote app using
# Python and specifically flask.
#
# Author: Rob Edwards (@clijockey)
# Date: 01/0... | 78 | 24.86 | 80 | 14 | 497 | python | [{"finding_id": "codeql_py/cookie-injection_5f5d3a55fe4c0778_a3ff1ee7", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-020"
] | [
"py/cookie-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cookie is constructed from a [user-supplied input](1)."
] | [
68
] | [
null
] | [
33
] | [
41
] | |
2024-11-19T02:33:31.774619+00:00 | 1,469,049,325,000 | 55e25edcb8b6046ba802a7de5528868f5ffd16c6 | 3 | {
"blob_id": "55e25edcb8b6046ba802a7de5528868f5ffd16c6",
"branch_name": "refs/heads/master",
"committer_date": 1469049325000,
"content_id": "1d59178b26cf40c544b2703de6cf26fb6d19a157",
"detected_licenses": [
"MIT"
],
"directory_id": "637b57ca9624c67d3fcfe86e1f044e006ad99127",
"extension": "py",
"fi... | 2.65625 | stackv2 | #!/usr/bin/env python
import json
import jinja2
import logging
import urllib
import webapp2
from google.appengine.api import urlfetch
class MainHandler(webapp2.RequestHandler):
def get(self):
self.response.write("Please use the search page.")
class SearchHandler(webapp2.RequestHandler):
def get(s... | 83 | 28.05 | 75 | 15 | 549 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_7f0d8e66cfdd3cdf_6309a17b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
77
] | [
null
] | [
13
] | [
76
] | |
2024-11-19T02:33:37.101807+00:00 | 1,503,604,214,000 | 45bba362e889f4b97dede674950b40497557aa26 | 3 | {
"blob_id": "45bba362e889f4b97dede674950b40497557aa26",
"branch_name": "refs/heads/master",
"committer_date": 1503604214000,
"content_id": "056feaac08316f03c8fba97312e4ff1e3e8e9c8a",
"detected_licenses": [
"MIT"
],
"directory_id": "9e531146a2fd79ab1edb3326ed3b71709ea2ecf2",
"extension": "py",
"fi... | 2.9375 | stackv2 | """
The flask application package.
"""
from configparser import ConfigParser
from flask import Flask,render_template,Config,session,request,abort
import base64
from functools import wraps
from flask import g,request,redirect,url_for
import itsdangerous
class LibConfig(Config):
"""
LibServer inherits this Con... | 169 | 32.49 | 156 | 21 | 1,175 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a9949334fbc39780_3dcf0c4c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
130
] | [
null
] | [
15
] | [
67
] | |
2024-11-19T02:33:41.343340+00:00 | 1,452,842,979,000 | c875516873c0e1035967c152afbd135b6d02cd52 | 2 | {
"blob_id": "c875516873c0e1035967c152afbd135b6d02cd52",
"branch_name": "refs/heads/master",
"committer_date": 1452842979000,
"content_id": "a3abf8ed1adbcdb3abb26d25fe4704b16bf62395",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "3bd9771c1ed72d12a03df2e63b0a14412c43d3a9",
"extension": "p... | 2.328125 | stackv2 | from django.shortcuts import render
from django.http import JsonResponse
from .models import User
import logging
from django.views.decorators.csrf import csrf_exempt
logger = logging.getLogger(__name__)
# Create your views here.
@csrf_exempt
def do_auth(request):
'''
You can test this view with the supplied... | 74 | 32.43 | 109 | 21 | 449 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_82954c4bfe4f605e_7e045d00", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
26
] | [
30
] | [
21
] | [
22
] | |
2024-11-19T02:46:15.998399+00:00 | 1,398,192,007,000 | 17f3b64ba2db53a50d252ff576959a59215d1ed5 | 3 | {
"blob_id": "17f3b64ba2db53a50d252ff576959a59215d1ed5",
"branch_name": "refs/heads/master",
"committer_date": 1398192007000,
"content_id": "494058be3d15c45925f21b024a6c3546f59d297f",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "3404978caf496d4c64a09a4b86a0ffec248e1f3a",
"extension": "p... | 2.765625 | stackv2 | """Rest interface for accessing a remote library.
Copyright (c) 2013 Clarinova. This file is licensed under the terms of the
Revised BSD License, included in this distribution as LICENSE.txt
"""
from ambry.client.siesta import API
import ambry.client.exceptions
import requests
import json
class NotFound(Exception)... | 592 | 28.39 | 111 | 19 | 3,770 | python | [{"finding_id": "codeql_py/request-without-cert-validation_97106c07c3c2418f_9af02f8e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
230,
378,
475
] | [
null,
null,
null
] | [
13,
17,
13
] | [
57,
66,
62
] | |
2024-11-19T02:59:14.536322+00:00 | 1,543,773,337,000 | 105dc0076802dd045e6f23d7ae3774fa33772c60 | 3 | {
"blob_id": "105dc0076802dd045e6f23d7ae3774fa33772c60",
"branch_name": "refs/heads/master",
"committer_date": 1543773337000,
"content_id": "7d995456649398d7e768e0e451d3a34804a87c16",
"detected_licenses": [
"MIT"
],
"directory_id": "0e41b75da7928a9eda65753b81d8f584a80b3cf2",
"extension": "py",
"fi... | 2.84375 | stackv2 | # coding:utf-8
def sleep(t: int):
import time
import xprint as xp
xp.wr(xp.Fore.LIGHTBLUE_EX +
' - [' + '-' * t + '] sleep 0/%s s' % t + '\r')
xp.fi()
for i in range(1, t + 1):
time.sleep(1)
xp.wr(xp.Fore.LIGHTBLUE_EX +
' - [' + '>' * i + '-' * (t - i) + ']... | 265 | 21.69 | 95 | 19 | 1,518 | python | [{"finding_id": "codeql_py/overly-large-range_18431b0a95c76412_c0ffbb25", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
251
] | [
null
] | [
47
] | [
50
] | |
2024-11-19T02:59:16.930159+00:00 | 1,693,381,172,000 | 13151accd70c73952d657a48af2cc5bfda855290 | 2 | {
"blob_id": "13151accd70c73952d657a48af2cc5bfda855290",
"branch_name": "refs/heads/main",
"committer_date": 1693381172000,
"content_id": "3b3466d3e40ab65002a9009b684219c23f2e0eea",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9f8bfd5e566a6e69beb9d3f695ee048a63237f79",
"extension": "py",
... | 2.453125 | stackv2 | from typing import Any, Dict, Optional
from jinja2 import Environment, FileSystemLoader, StrictUndefined
def render_from_file(
path: str,
template: str,
jinja_filters: Optional[Dict[str, Any]] = None,
**kwargs: Any
) -> str:
jinja_filters = jinja_filters or {}
env = Environment(
loade... | 28 | 28.46 | 82 | 12 | 197 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_980b1c5e3be0cb18_4afc65e2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13,
25
] | [
15,
null
] | [
11,
11
] | [
6,
67
] | |
2024-11-19T02:59:18.559179+00:00 | 1,683,048,260,000 | 9c5b2125595afd03a0c34e22ff4b70b85405e929 | 2 | {
"blob_id": "9c5b2125595afd03a0c34e22ff4b70b85405e929",
"branch_name": "refs/heads/main",
"committer_date": 1683048260000,
"content_id": "676a8c888cf93f1bb9354b2d358fcca4dbe94a92",
"detected_licenses": [
"MIT"
],
"directory_id": "235f9c47a55833b744537ac101a2558324c3de8a",
"extension": "py",
"file... | 2.453125 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
#
# A library for access to noaa weather api
#
# Copyright (C) 2011 Lorenzo Carbonell
# lorenzo.carbonell.cerezo@gmail.com
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the ... | 137 | 51.46 | 149 | 17 | 1,587 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_910a40fdf9ee5b40_c41628b5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
32
] | [
null
] | [
11
] | [
26
] | |
2024-11-19T02:59:19.417029+00:00 | 1,566,429,141,000 | ae3d04d7ae5d3fdc7fd72302d56817d7d1218c30 | 3 | {
"blob_id": "ae3d04d7ae5d3fdc7fd72302d56817d7d1218c30",
"branch_name": "refs/heads/master",
"committer_date": 1566429141000,
"content_id": "d379d456bb9e98a72b69d69ef32275410774e1d8",
"detected_licenses": [
"MIT"
],
"directory_id": "3b5011649143412d462a7832e0f581ca962b16c6",
"extension": "py",
"fi... | 2.796875 | stackv2 | #!/bin/env python3
from flask import Flask, jsonify
import requests
app = Flask(__name__)
char_request = lambda cid: requests.get("https://www.dndbeyond.com/character/{}/json".format(cid))
@app.route('/')
def index():
return 'Hello, World'
@app.route('/sheets/<int:character>/')
def sheet(character):
req = ... | 26 | 24.31 | 106 | 10 | 168 | python | [{"finding_id": "codeql_py/partial-ssrf_e3cbfb89d19a9eea_da06568b", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
8
] | [
null
] | [
28
] | [
99
] | |
2024-11-19T02:59:21.054066+00:00 | 1,486,661,443,000 | bd6751eb48df9e9b88fd99938d1e79d4573b3e05 | 2 | {
"blob_id": "bd6751eb48df9e9b88fd99938d1e79d4573b3e05",
"branch_name": "refs/heads/master",
"committer_date": 1486661443000,
"content_id": "2314cb8862320fc018cf000be3da54ef36c160e3",
"detected_licenses": [
"MIT"
],
"directory_id": "aa1f5f78593d56f1d394441a2d6ecffdd3b526c5",
"extension": "py",
"fi... | 2.34375 | stackv2 | import os
import json
from bottle import static_file, request, Bottle
from dataflow import config, scribe
def readhtml(file):
with open(os.path.join(config.template_dir, file), 'r') as fl:
html = fl.read()
return html
def savejson(file, data):
with open(os.path.join(config.static_dir, 'scripts', ... | 62 | 32.18 | 81 | 13 | 456 | python | [{"finding_id": "codeql_py/path-injection_e11efe3d75d96bd0_eb9a488b", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
13
] | [
null
] | [
15
] | [
63
] | |
2024-11-19T02:59:29.304891+00:00 | 1,567,523,827,000 | a59a6e7a8eae3e1cdfb8f036b9968f8c87e84bf0 | 2 | {
"blob_id": "a59a6e7a8eae3e1cdfb8f036b9968f8c87e84bf0",
"branch_name": "refs/heads/master",
"committer_date": 1567523827000,
"content_id": "420ce7b5c89bceed51ad86eab5c1efef2a7681c6",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "1c2faab6d311d4ed896a0f1bf52d10e8f9bcf7db",
"extension": "p... | 2.34375 | stackv2 | # Copyright (c) Andreas Hilboll
from jupyterhub.auth import Authenticator
from tornado import gen
from paramiko import SSHClient, AuthenticationException, AutoAddPolicy
from traitlets import Int, Unicode
class SSHAuthenticator(Authenticator):
server_address = Unicode(
config=True,
help='Address o... | 29 | 30.52 | 71 | 17 | 175 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_315c8b9414655b7d_dca0822a", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
22
] | [
null
] | [
13
] | [
61
] | |
2024-11-19T02:59:47.376603+00:00 | 1,573,505,451,000 | 9501396a0d875d5e565a22492e20e6005678e1f1 | 2 | {
"blob_id": "9501396a0d875d5e565a22492e20e6005678e1f1",
"branch_name": "refs/heads/master",
"committer_date": 1573505451000,
"content_id": "020814589569ae0cf102a5efa47532eadd812c0c",
"detected_licenses": [
"MIT"
],
"directory_id": "aa531263ed0743019e212ac1b6d24cd7cbacdde6",
"extension": "py",
"fi... | 2.40625 | stackv2 | from __future__ import print_function
import sys
import names
import random
from faker import Faker
fake = Faker()
print("use amtprojectone;")
print("INSERT INTO Viewer(Firstname, Lastname, Username, Genre, Birthdate, OwnerID) VALUES ")
nbIteration = int(sys.argv[1])
for i in xrange(nbIteration):
profile = fake.si... | 47 | 36.98 | 125 | 22 | 456 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ea15a76049cb9620_1668f4d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
17
] | [
null
] | [
11
] | [
118
] | |
2024-11-19T02:59:50.274199+00:00 | 1,583,106,948,000 | 8302c3c1ec3122c85f9f8fa4f86064d4b40f7f62 | 3 | {
"blob_id": "8302c3c1ec3122c85f9f8fa4f86064d4b40f7f62",
"branch_name": "refs/heads/master",
"committer_date": 1583106948000,
"content_id": "8aae0703af2d5591c8c027be3357326004b8daa0",
"detected_licenses": [
"MIT"
],
"directory_id": "2afba3cdf1a036fecf26c2bf74d0c54d13f8caa3",
"extension": "py",
"fi... | 2.828125 | stackv2 | import configparser
import twython
class TweetVacAuthException(Exception):
"""An error with authorization occurred."""
class TweetVacHttpException(Exception):
"""An error with with a http request occurred."""
class TweetVac(object):
"""A vacuum for sucking down tweets using Twitter's API"""
def _... | 232 | 37.61 | 111 | 18 | 1,776 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c5e9ca69f1531f57_9f158699", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text."
] | [
225
] | [
null
] | [
15
] | [
69
] | |
2024-11-19T03:12:07.876958+00:00 | 1,631,854,394,000 | 4e07f40175e6d920652aeafafdf9f56bf45c8606 | 3 | {
"blob_id": "4e07f40175e6d920652aeafafdf9f56bf45c8606",
"branch_name": "refs/heads/master",
"committer_date": 1631854394000,
"content_id": "e4dd844172b5e78c6dd897aa11336c88969263a2",
"detected_licenses": [
"MIT"
],
"directory_id": "b2ff37406e50976b8db1c75bde4297f5039f7391",
"extension": "py",
"fi... | 2.6875 | stackv2 | from flask import Flask,render_template
app = Flask(__name__)
@app.route('/new')
def index():
return render_template('index.html')
@app.route('/contact/<string:value>')
def method_name(value):
return f"this is the string {value}"
@app.route('/int/<int:int>')
def about(int):
return f"this is integer {int... | 25 | 18.36 | 43 | 9 | 121 | python | [{"finding_id": "codeql_py/flask-debug_f0a68a4f1648efbb_8652246f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a ... | [
25,
11,
15,
19
] | [
null,
null,
null,
null
] | [
5,
12,
12,
12
] | [
34,
41,
36,
44
] | |
2024-11-19T03:12:15.393747+00:00 | 1,602,371,727,000 | 5796b8be159ce155a9894086d63cc06616b70e81 | 3 | {
"blob_id": "5796b8be159ce155a9894086d63cc06616b70e81",
"branch_name": "refs/heads/master",
"committer_date": 1602371727000,
"content_id": "6d4c18f8bb6453fef02faa2bd7731b00b971e0bd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "67a7ebf702ce3fd3b7d198313e3c5d444ca7ac0c",
"extension": "py"... | 2.78125 | stackv2 | import hashlib, string, random
def encrypt( password, salt=None ):
if not salt:
salt = "".join( random.sample(string.ascii_uppercase \
+ string.ascii_lowercase \
+ string.digits, 8) )
return salt+"|"+hashlib.sha256( (salt+password).encode("utf-8") ).hexdigest()
def encrypt_phpass( password, salt... | 55 | 31.47 | 78 | 17 | 573 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_aec2a28139e89748_bd9b9e0d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
8,
21,
23
] | [
null,
null,
null
] | [
34,
20,
21
] | [
65,
51,
50
] | |
2024-11-19T03:24:44.217167+00:00 | 1,633,125,881,000 | 8d847af02e187d68495ad7ba7f35c6512c443169 | 3 | {
"blob_id": "8d847af02e187d68495ad7ba7f35c6512c443169",
"branch_name": "refs/heads/main",
"committer_date": 1633125881000,
"content_id": "2ffe1a717e5619de71e3c4bf97a86518e5ef3621",
"detected_licenses": [
"MIT"
],
"directory_id": "bdcffa912b9fdf274d6aeaca13f5772140991ea9",
"extension": "py",
"file... | 2.6875 | stackv2 | # Copyright Pincer 2021-Present
# Full MIT License can be found in `LICENSE` at the project root.
from __future__ import annotations
from dataclasses import dataclass, field
from datetime import datetime
from re import match
from typing import Any, Callable, Dict, Iterable, Union, Optional, TYPE_CHECKING
from ..exce... | 598 | 23.19 | 80 | 18 | 3,358 | python | [{"finding_id": "codeql_py/overly-large-range_434f0dedebb59d85_c357d420", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
45
] | [
null
] | [
34
] | [
38
] | |
2024-11-19T03:24:51.660186+00:00 | 1,620,642,354,000 | 9df8bc19886395cb598a0976b084d77787a8deae | 3 | {
"blob_id": "9df8bc19886395cb598a0976b084d77787a8deae",
"branch_name": "refs/heads/master",
"committer_date": 1620642354000,
"content_id": "d15292d151a35fd2db74ba8df248c8594d9f6d7e",
"detected_licenses": [
"MIT"
],
"directory_id": "cb473bc294f98e4130cdf7b9097e769b7d324331",
"extension": "py",
"fi... | 2.78125 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
from getpass import getpass
from rich.console import Console
from rich.table import Table
from rich.text import Text
import os
import re
import math
import argparse
def parseArgs():
parser = argparse.ArgumentParser()
parser.add_argument('-p', '--password', nargs=... | 224 | 34.9 | 121 | 20 | 2,267 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b86a8befee5cd979_9722da63", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
179
] | [
null
] | [
19
] | [
55
] | |
2024-11-19T03:35:17.964631+00:00 | 1,501,918,883,000 | 0cc809ea94fb79ccedd876c308332a2f77f97f99 | 3 | {
"blob_id": "0cc809ea94fb79ccedd876c308332a2f77f97f99",
"branch_name": "refs/heads/master",
"committer_date": 1501918883000,
"content_id": "cd2a016037a5f5d5b181bfdd8d7687e774c94cd4",
"detected_licenses": [
"MIT"
],
"directory_id": "5054f565b1386fbca34203ac45d22a42e42614a7",
"extension": "py",
"fi... | 2.6875 | stackv2 | ### Author - Raghav Maheshwari ###
from AudioIO import speak
from os import chdir
#from pytube import YouTube
from pprint import pprint
from settings import MP4_DIR
import requests
from os import chdir, system
from bs4 import BeautifulSoup
from google import lucky
from settings import MP4_DIR
from selenium import webd... | 154 | 31.36 | 107 | 18 | 1,251 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c6bb8fe31af31bfa_3f145e26", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
91
] | [
null
] | [
11
] | [
99
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.