added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T03:35:19.946750+00:00 | 1,633,063,693,000 | fdf123a8bcd7064eac93d4208eede62515095475 | 3 | {
"blob_id": "fdf123a8bcd7064eac93d4208eede62515095475",
"branch_name": "refs/heads/main",
"committer_date": 1633063693000,
"content_id": "2f01b8a0f744c7c52c659905f2e401c0897097a5",
"detected_licenses": [
"MIT"
],
"directory_id": "c962eef1c9dd1865862a743034a14f24e8eb82da",
"extension": "py",
"file... | 2.5625 | stackv2 | import config
import pandas as pd
import pickle
import numpy as np
from keras.preprocessing.sequence import pad_sequences
from keras.models import load_model
import config
import re
import requests
from bs4 import BeautifulSoup
import time
import json
from flask import Flask
from flask import request
from flask_c... | 229 | 30.09 | 155 | 14 | 1,740 | python | [{"finding_id": "codeql_py/polynomial-redos_08f45ce98cf2be58_5121bc9a", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin... | 2 | true | [
"CWE-1333",
"CWE-918"
] | [
"py/polynomial-redos",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with 'http://' and with many repetitions of 'http://a'.",
"The full URL of this request depends on a [user-provided value](1)."
] | [
66,
37
] | [
null,
null
] | [
54,
12
] | [
57,
42
] | |
2024-11-19T01:26:45.386665+00:00 | 1,329,480,561,000 | 62dacc51211d7ed6c9db1028b8c18cfd72a318ce | 2 | {
"blob_id": "62dacc51211d7ed6c9db1028b8c18cfd72a318ce",
"branch_name": "refs/heads/master",
"committer_date": 1329480561000,
"content_id": "116aabfce6b7da37a48de722fbb44d4c2afd9324",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "83a7fb7ccaa9072fe8b69a402c63fe8934c99900",
"extension": "p... | 2.34375 | stackv2 | # coding: utf-8
import os, sys, urllib, urllib2, hashlib, json, logging, datetime
from logging.handlers import SMTPHandler, RotatingFileHandler
from .parsexml import xml2dict
DEBUG = True
#ROOT_DIR = os.path.dirname(os.path.abspath(__file__))
LOG_DIR = '/tmp/toplogs'
if not os.path.isdir(LOG_DIR):
os.mkdir(LOG_... | 144 | 30.88 | 104 | 17 | 1,037 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_5f0167068c47561d_ad923402", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure."
] | [
48
] | [
null
] | [
28
] | [
31
] | |
2024-11-19T01:37:40.430992+00:00 | 1,388,171,628,000 | 4bbe21369dce94a416ee0818e35d3fb14a2c1f7d | 3 | {
"blob_id": "4bbe21369dce94a416ee0818e35d3fb14a2c1f7d",
"branch_name": "refs/heads/master",
"committer_date": 1388171628000,
"content_id": "eab0d52a7c0cc1202719633526bbf4343600770a",
"detected_licenses": [
"MIT"
],
"directory_id": "488fba6998125eb6812b6fce4ca8005072c633ae",
"extension": "py",
"fi... | 2.671875 | stackv2 | # -*- mode:python; tab-width: 2; coding: utf-8 -*-
"""
BtlRoute
"""
from __future__ import absolute_import
__author__ = "Carlos Martín"
__license__ = "See LICENSE for details"
__version__ = "0.12.2"
# Import here any required modules.
import re
__all__ = ['FilterMixin', 'Path']
class Filters(object):
"""Sing... | 266 | 26.59 | 82 | 18 | 1,799 | python | [{"finding_id": "codeql_py/redos_e023a8354e84cc4c_40b12b92", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<::' and containing many repetiti... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '<::' and containing many repetitions of '='."
] | [
150
] | [
null
] | [
20
] | [
28
] | |
2024-11-19T01:37:51.046638+00:00 | 1,491,685,193,000 | 68b3fece33dc231d74c490ad90deb14c39c64b76 | 3 | {
"blob_id": "68b3fece33dc231d74c490ad90deb14c39c64b76",
"branch_name": "refs/heads/master",
"committer_date": 1491685193000,
"content_id": "3aaef57fc05d8d385ab91f77d649a87f02196fd1",
"detected_licenses": [
"MIT"
],
"directory_id": "4d3f030d1aeb411ae2963911a1331675b7541b78",
"extension": "py",
"fi... | 2.546875 | stackv2 | #!/usr/bin/env python
__author__ = 'mm'
"""
Simple HTTP server returning JSON formatted list of data from the router
"""
import sys
sys.path.append('../py')
import B593
import datetime
import calendar
import getopt, os
import json
from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer
from Queue import Queue... | 73 | 31.58 | 146 | 18 | 566 | python | [{"finding_id": "codeql_py/path-injection_4648a348873a01f2_a657b73f", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
35
] | [
null
] | [
26
] | [
50
] | |
2024-11-19T01:37:51.476888+00:00 | 1,692,877,319,000 | 3d602aab14b8e30289dfa75dd2a8ee3ebf9aed70 | 3 | {
"blob_id": "3d602aab14b8e30289dfa75dd2a8ee3ebf9aed70",
"branch_name": "refs/heads/master",
"committer_date": 1692877319000,
"content_id": "7d214bf75b9b5a1f3667199ace953b1b2b63766d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2c7d0bb7332d4006b1d9c5768ee86e2838ebf3a2",
"extension": "py"... | 2.578125 | stackv2 | #!/usr/bin/env python3
"""This script is used by the "shutdown" hook test, to act as a dummy job being started
in a Deployment that belongs to a Krake Application.
"""
import os.path
import time
import requests
import socketserver
from http.server import BaseHTTPRequestHandler
endpoint_env = "KRAKE_SHUTDOWN_URL"
toke... | 68 | 26.75 | 87 | 16 | 429 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e630943dc77f7c85_fe68f6f9", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
40
] | [
42
] | [
16
] | [
6
] | |
2024-11-19T01:38:32.944672+00:00 | 1,612,188,557,000 | 1fedd9a5f69922fda16f34afeab2d66f7844ea02 | 2 | {
"blob_id": "1fedd9a5f69922fda16f34afeab2d66f7844ea02",
"branch_name": "refs/heads/master",
"committer_date": 1612188557000,
"content_id": "bd83ed580ee241d7bccf7170f916c7c26cd0e7da",
"detected_licenses": [
"MIT"
],
"directory_id": "69bf0b06f5a417b955d3b1448735dfe14651462d",
"extension": "py",
"fi... | 2.3125 | stackv2 | import psutil
from appJar import gui
import config
import requests as req
import json
import platform
import sysInfo
app = gui(title="CMM Hub", showIcon=False)
navBarElements = []
navBarElementsCallName = []
currentContainer = ""
def get_size(bytes, suffix="B"):
"""
Scale bytes to its proper format
e.g:
... | 77 | 28.03 | 88 | 13 | 564 | python | [{"finding_id": "codeql_py/request-without-cert-validation_024376e2713320f5_24124fe5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
32,
40,
51
] | [
null,
41,
null
] | [
15,
15,
15
] | [
77,
73,
51
] | |
2024-11-19T01:38:40.374691+00:00 | 1,557,752,354,000 | 911721b22f017ff4bd0d1b5a8442728f368113cd | 3 | {
"blob_id": "911721b22f017ff4bd0d1b5a8442728f368113cd",
"branch_name": "refs/heads/master",
"committer_date": 1557752354000,
"content_id": "4e022eaf77fab81b2d88ac03089faeb41a72225c",
"detected_licenses": [
"MIT"
],
"directory_id": "17e26aaeb019647b4a7f142febc8025f95fee1e6",
"extension": "py",
"fi... | 3.484375 | stackv2 | #!/usr/bin/env python3.6
import pyperclip
from user import User
def create_user (account,username,password,email):
"""
Function for creating a new user object
"""
new_user= User(account,username,password,email)
return new_user
def save_user(user):
"""
Function for saving user
"""
use... | 91 | 40.58 | 143 | 19 | 822 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b10ebe7c7221ec70_d96cd96a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
49,
67
] | [
null,
null
] | [
19,
25
] | [
140,
107
] | |
2024-11-19T01:38:45.257391+00:00 | 1,548,648,064,000 | 31a0a58c815d327865274c0e598007f596f8a876 | 3 | {
"blob_id": "31a0a58c815d327865274c0e598007f596f8a876",
"branch_name": "refs/heads/master",
"committer_date": 1548648064000,
"content_id": "29db9a561e24afa6d811aeff05ee249defa2f6e1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a68ef14a3732fd0c6c237457663a3e6fdb0cbe19",
"extension": "py"... | 2.640625 | stackv2 | #!/usr/bin/env python3
#
# formatted with black
#
import json
import requests
import sys
from os import getenv
def get_nest_access_token(
client_id,
client_secret,
authorization_code,
grant_type="authorization_code",
url="https://api.home.nest.com/oauth2/access_token",
):
print(
"Cli... | 129 | 32.27 | 87 | 18 | 932 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ee5fee01717679e4_3bf5c503", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
21
] | [
23
] | [
9
] | [
10
] | |
2024-11-19T01:52:03.695723+00:00 | 1,530,876,699,000 | 8b622403fcfa02273486fdcc35933c82fa6a0f3a | 4 | {
"blob_id": "8b622403fcfa02273486fdcc35933c82fa6a0f3a",
"branch_name": "refs/heads/master",
"committer_date": 1530876699000,
"content_id": "c774cb98a316f9a236300134f2fe45e303b1495c",
"detected_licenses": [
"MIT"
],
"directory_id": "5f3f6781ae2d55aee04e8bc909b6db2d9d2bfe22",
"extension": "py",
"fi... | 3.984375 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Mon Jun 11 01:37:09 2018
@author: sushy
"""
secretWord = 'apple'
lettersGuessed = ['e', 'i', 'k', 'p', 'r', 's']
def getGuessedWord(sW, lG):
'''
sW: string, the word the user is guessing
lG: list, what letters have been guessed so far
returns: string, comprised ... | 37 | 24.81 | 102 | 11 | 253 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b68b63dd392afe9d_da6d735a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
36
] | [
null
] | [
7
] | [
49
] | |
2024-11-19T01:52:25.966287+00:00 | 1,541,349,170,000 | 315edb8d31281fe7e858ec76e5b0d1c4c2fedf7b | 2 | {
"blob_id": "315edb8d31281fe7e858ec76e5b0d1c4c2fedf7b",
"branch_name": "refs/heads/master",
"committer_date": 1541349170000,
"content_id": "cdbf00932f4b8efc55a29c976d5d25d6fa81a220",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "4c3f27ec4b7a513de1da2956632ace87951a65f9",
"extension": "p... | 2.5 | stackv2 | """
Simple server with interface allowing users to submit data for processing and to see status and reports when ready.
The purpose of the Frontend is to do the following:
1. Provide an interface for users to upload their data files to the Backend Storage.
2. Provide an interface for users to view the status and resul... | 451 | 31.66 | 133 | 17 | 3,528 | python | [{"finding_id": "codeql_py/url-redirection_5297600f9697531f_3c142c9d", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
422
] | [
null
] | [
25
] | [
36
] | |
2024-11-19T01:52:26.158375+00:00 | 1,523,620,506,000 | 285189c9b9c920afc253984600e76642f212fff1 | 2 | {
"blob_id": "285189c9b9c920afc253984600e76642f212fff1",
"branch_name": "refs/heads/master",
"committer_date": 1523620506000,
"content_id": "b881ac5e7872f2d2914eca3815e7f73db54d1b51",
"detected_licenses": [
"MIT"
],
"directory_id": "5d738ec9141cd5d7faba0030f5155b3ab3fc1ea0",
"extension": "py",
"fi... | 2.421875 | stackv2 | import logging
from jinja2 import Environment, FileSystemLoader
from .iproute import get_peer_addr
from .pingc import PingHost
class Bird:
def __init__(self, psk, port, ifnames, template_paths=['.']):
self._psk = psk
self._ifname_addr = dict()
self._ifname_stat = dict()
self._jinj... | 50 | 34.56 | 73 | 17 | 412 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e3bceb615ae062a1_35d8340e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
15
] | [
23
] | [
10
] | |
2024-11-19T01:52:29.366609+00:00 | 1,551,104,224,000 | 6ff60f9348d5b30e43e90740c8fed32075e2b788 | 3 | {
"blob_id": "6ff60f9348d5b30e43e90740c8fed32075e2b788",
"branch_name": "refs/heads/master",
"committer_date": 1551104224000,
"content_id": "e7cef68eb5f055d358a2b8c5e50035ed74b773eb",
"detected_licenses": [
"MIT"
],
"directory_id": "23433470bcf602226c6bc3a26f18cb9a112e5038",
"extension": "py",
"fi... | 2.53125 | stackv2 | from flask import Flask, request, render_template
# import nltk
# nltk.download('stopwords')
from interception2 import intrsp
from stemmer2 import stemm_match
from word_vec2 import wrd_vec_match
app = Flask(__name__)
@app.route('/')
def indx():
# return 'HEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEELP!!'
return render... | 61 | 23.61 | 149 | 17 | 441 | python | [{"finding_id": "codeql_py/reflective-xss_87b1dc9278b7ddc8_ab76c0c0", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
21
] | [
57
] | [
12
] | [
4
] | |
2024-11-19T01:52:30.475080+00:00 | 1,600,056,443,000 | e74feadd4edb9bf4571129d85ba79ba442d474e7 | 3 | {
"blob_id": "e74feadd4edb9bf4571129d85ba79ba442d474e7",
"branch_name": "refs/heads/master",
"committer_date": 1600056443000,
"content_id": "2c8338ad88e6bf3ca51006def1ce5fa09d38c71f",
"detected_licenses": [
"MIT"
],
"directory_id": "112329facb543bf2c6c0147060fed2c49e45636a",
"extension": "py",
"fi... | 3.1875 | stackv2 | import sqlite3
import time
import hashlib
import re
import math
import os.path
import datetime
import random
import string
from getpass import getpass
from command1 import *
from command2 import *
from command4 import *
from command5 import *
connection = None
cursor = None
def connect(path):
global connection, ... | 219 | 29.84 | 156 | 16 | 1,554 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_21f047d89d94fbd0_b0fb2fdb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
105
] | [
null
] | [
11
] | [
68
] | |
2024-11-19T02:04:19.375035+00:00 | 1,620,890,096,000 | 18199ff5197eb24f1319377564015a74b5717049 | 2 | {
"blob_id": "18199ff5197eb24f1319377564015a74b5717049",
"branch_name": "refs/heads/main",
"committer_date": 1620890096000,
"content_id": "23240e86efbec11fdcadec424c5cf413ee2fc0f5",
"detected_licenses": [
"MIT"
],
"directory_id": "fa2e0a7c7ee37fc2e656ac7aa98467f6b6386204",
"extension": "py",
"file... | 2.421875 | stackv2 | #!/usr/bin/env python
# -*- coding:UTF-8 -*-
#
# @AUTHOR: Rabbir
# @FILE: /root/Github/rab_python_packages/rab_ssr.py
# @DATE: 2021/05/10 Mon
# @TIME: 14:11:24
#
# @DESCRIPTION: 共通包 Linux 服务器端 SSR 订阅的使用
# 整体是对 https://github.com/senjianlu/auto-SSR-update 的封装
import os
import json
import base64
import re... | 402 | 29.16 | 80 | 22 | 3,269 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b40a1f3af038af07_f4b15d51", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
269,
358
] | [
null,
null
] | [
19,
27
] | [
27,
35
] | |
2024-11-19T02:04:19.649431+00:00 | 1,540,569,281,000 | e93afa5809afd75508faadff82e26a0b463215c4 | 2 | {
"blob_id": "e93afa5809afd75508faadff82e26a0b463215c4",
"branch_name": "refs/heads/master",
"committer_date": 1540569322000,
"content_id": "3ad35288a348df0f0855a387adb1b1faa68c0de2",
"detected_licenses": [
"BSD-3-Clause",
"Apache-2.0"
],
"directory_id": "684c9beb8bd972daeabe5278583195b9e652c0c5",... | 2.359375 | stackv2 | #!/usr/bin/python
#
# Copyright 2017 The Cobalt Authors. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless req... | 159 | 33.5 | 80 | 15 | 1,262 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b7ff4937ab76d7bb_baa41019", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
115
] | [
116
] | [
14
] | [
70
] | |
2024-11-19T02:04:46.167005+00:00 | 1,621,294,373,000 | 57d514a145018a271cdfbe941b720a82a951d6b8 | 3 | {
"blob_id": "57d514a145018a271cdfbe941b720a82a951d6b8",
"branch_name": "refs/heads/main",
"committer_date": 1621294373000,
"content_id": "877256d12104900482bb4d2a63da0cdf06611e6b",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "b1c580f5c21ebc4aa8f909f416d1a2bf52348cf8",
"extension": "py",
"... | 2.84375 | stackv2 | import os
import json
from pprint import pprint
from dateutil.parser import parse as parse_datetime
import requests
from app import APP_ENV
from dotenv import load_dotenv
from pgeocode import Nominatim as Geocoder
from pandas import isnull
load_dotenv()
COUNTRY_CODE = os.getenv("COUNTRY_CODE", default="US")
ZIP_CODE... | 222 | 37.72 | 124 | 17 | 2,039 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_de40008d4750242d_ef683496", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 9 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (p... | [
207,
211,
215,
215,
215,
218,
222,
222,
222
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
11,
11,
15,
43,
66,
11,
15,
45,
68
] | [
94,
76,
36,
59,
88,
80,
38,
61,
90
] | |
2024-11-19T02:04:46.335987+00:00 | 1,549,562,932,000 | fcf8bc7579df44ea7ca3615b8bd2ea3bf2a2649c | 2 | {
"blob_id": "fcf8bc7579df44ea7ca3615b8bd2ea3bf2a2649c",
"branch_name": "refs/heads/master",
"committer_date": 1549562932000,
"content_id": "4e2411e93d7339567f042ae783ef7a98e5dcf825",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "150b9f5a070c2e80e018a98003f01d9cec600eb1",
"extension": "py"... | 2.359375 | stackv2 | import time
import json
import logging
import threading
from os.path import basename, dirname
import paramiko
class WatchGerrit(threading.Thread):
""" Threaded job; listens for Gerrit events and puts them in a queue """
def __init__(self, options, queue):
options['port'] = int(options['port']) # co... | 106 | 39.61 | 109 | 22 | 885 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_efbd390889854f78_93577079", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation",
"py/paramiko-missing-host-key-validation"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
34,
59
] | [
null,
null
] | [
13,
17
] | [
73,
77
] | |
2024-11-19T02:04:47.732593+00:00 | 1,544,332,345,000 | ce99aabf507f468aa5f57cfdb7c31470496f031a | 4 | {
"blob_id": "ce99aabf507f468aa5f57cfdb7c31470496f031a",
"branch_name": "refs/heads/master",
"committer_date": 1544332345000,
"content_id": "4cfb05e327ab49c7db8130db3dbd7b87988f9770",
"detected_licenses": [
"Unlicense"
],
"directory_id": "ce4633ab17411109562b291f523b60d5089f876c",
"extension": "py",... | 3.765625 | stackv2 | import pandas as pd
import stats as st
import utilities as ut
# City & File Mapping
CITY_DATA = {
'chicago': 'chicago.csv',
'new york city': 'new_york_city.csv',
'washington': 'washington.csv'
}
# Cities List Constant
CITIES_LIST = ('chicago', 'new york city', 'washington')
# Months List Constant
MONTHS_LI... | 229 | 31.08 | 96 | 19 | 1,681 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_be6b7baf5f2a88df_5c7ef9e2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
151
] | [
null
] | [
27
] | [
58
] | |
2024-11-19T02:28:34.015804+00:00 | 1,551,318,940,000 | e969c19b2e4db4f3f2faf8752adb4efec66c4370 | 4 | {
"blob_id": "e969c19b2e4db4f3f2faf8752adb4efec66c4370",
"branch_name": "refs/heads/master",
"committer_date": 1551318940000,
"content_id": "1f98b48da715f218a61d98a58b2cdb0691b91442",
"detected_licenses": [
"MIT"
],
"directory_id": "e4b019d2fd32e8e317dbbf4e440de1ff1686939c",
"extension": "py",
"fi... | 3.640625 | stackv2 | import glob
import os
from jinja2 import Template
def discover_pages():
print('compiling pages list...')
pages = []
all_content_docs = glob.glob("content/*.html") # returns list of filepaths
for doc in all_content_docs:
# create dictionary with input filepath, output filepath, and title
... | 85 | 28.89 | 98 | 17 | 564 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b6a87c333f2ee5be_f42115bd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
52
] | [
null
] | [
16
] | [
39
] | |
2024-11-19T02:28:51.664440+00:00 | 1,520,550,707,000 | a9bd8e0ac46cce5cde5a185048bf27407d5ce3a4 | 2 | {
"blob_id": "a9bd8e0ac46cce5cde5a185048bf27407d5ce3a4",
"branch_name": "refs/heads/master",
"committer_date": 1520550707000,
"content_id": "7c92c3931cbea39e190e88e55125fce32789b9bc",
"detected_licenses": [
"BSD-3-Clause",
"MIT"
],
"directory_id": "12a6c836d4781f4e722aabc2083eb4d0da5b2f73",
"ext... | 2.390625 | stackv2 | import paramiko
import re
import csv
import slycat.web.client
import getpass
import cPickle as pickle
parser = slycat.web.client.ArgumentParser()
parser.add_argument("file", default="-", help="Input CSV file. Default: %(default)s")
parser.add_argument("--port", default=22, help="port number. Default: %(default)s")
p... | 103 | 32.04 | 114 | 19 | 849 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_929c922dc2cbee9a_05a91622", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
67
] | [
null
] | [
5
] | [
65
] | |
2024-11-19T02:36:50.653390+00:00 | 1,691,771,980,000 | 37106647a12fced25a38543d44fcd682f23b0a4a | 3 | {
"blob_id": "37106647a12fced25a38543d44fcd682f23b0a4a",
"branch_name": "refs/heads/master",
"committer_date": 1692017358000,
"content_id": "c650100895482c5fb84426ba6db455d2b947eb42",
"detected_licenses": [
"MIT"
],
"directory_id": "4b5bb05caf4aa20e923029b67084721556ae71dc",
"extension": "py",
"fi... | 3.421875 | stackv2 | import base64
import hashlib
import secrets
import string
def create():
alphabet = string.digits + string.ascii_letters
password = ''.join(secrets.choice(alphabet) for i in range(128))
salt = ''.join(secrets.choice(alphabet) for i in range(64))
hashed_and_salted_bytes = hashlib.pbkdf2_hmac(
'... | 21 | 28.9 | 85 | 11 | 172 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eadd4c4c9710a93d_8cf02ded", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
16
] | [
null
] | [
11
] | [
43
] | |
2024-11-19T02:36:55.631177+00:00 | 1,608,297,335,000 | 2564e219b80547a5fd825158e5fba2f6be22a1f4 | 4 | {
"blob_id": "2564e219b80547a5fd825158e5fba2f6be22a1f4",
"branch_name": "refs/heads/main",
"committer_date": 1608297335000,
"content_id": "4692ad8e076294521faaf02d28e79f96bf0ad031",
"detected_licenses": [
"MIT"
],
"directory_id": "4d2d32c083fd34aa449e822ab0aa38461a380f51",
"extension": "py",
"file... | 3.53125 | stackv2 |
passwordFile = open('passwords.txt', 'r')
passwords = passwordFile.readlines()
valid = 0
for policy_line in passwords:
parts = policy_line.split(" ")
range = parts[0].split("-")
check1 = int(range[0]) - 1
check2 = int(range[1]) - 1
chr = parts[1].replace(":", "")
password = parts[2]
if (pa... | 21 | 34.1 | 122 | 18 | 213 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aecd8e997cddf564_2c4a25f7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
14,
18
] | [
15,
19
] | [
15,
15
] | [
62,
62
] | |
2024-11-19T02:37:06.206979+00:00 | 1,618,319,006,000 | 248f3ea8612296ad58ea7ed66730dd4634103698 | 2 | {
"blob_id": "248f3ea8612296ad58ea7ed66730dd4634103698",
"branch_name": "refs/heads/main",
"committer_date": 1618621379000,
"content_id": "f04bdff5aa6c04034cce45865cc504e967a95097",
"detected_licenses": [
"MIT"
],
"directory_id": "6fba889e6e2bfd3236d252037f5a404cdb404e16",
"extension": "py",
"file... | 2.453125 | stackv2 | #!/usr/bin/python3
import base64
import os
import time
from enum import Enum
from http import HTTPStatus
from urllib import parse
import requests
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
DEFAULT_TOKEN_EXPIRE_SECONDS = 7 * (60 * 60 * 24) # default 7 days
DEFAULT_RUN_APP_TIME... | 364 | 36.01 | 128 | 21 | 2,864 | python | [{"finding_id": "codeql_py/request-without-cert-validation_0d4041ac546800ae_adf14174", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 6 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
345,
347,
349,
351,
360,
362
] | [
null,
null,
null,
358,
null,
null
] | [
20,
20,
20,
20,
20,
20
] | [
90,
103,
102,
14,
79,
101
] | |
2024-11-19T02:37:47.290304+00:00 | 1,595,627,998,000 | b9fd3519c8fd89b928a096b46c4d4a3cae13566b | 3 | {
"blob_id": "b9fd3519c8fd89b928a096b46c4d4a3cae13566b",
"branch_name": "refs/heads/master",
"committer_date": 1595627998000,
"content_id": "8b1420f6bd0c71e0d99924f88a8ea0894a6df8b2",
"detected_licenses": [
"MIT"
],
"directory_id": "0bde8f7d71458eb7ec7ee0d0fe950c9715250c67",
"extension": "py",
"fi... | 2.640625 | stackv2 | import os
import csv
import nltk,re, pprint
import pandas as pd
from geopy import distance
from geopy.geocoders import GoogleV3
def get_senser_data_file():
filePath = r'C:\Users\Alienware\Desktop\master-project\ThessalonikiSharedFolder\TrafficData\Data'
List_file = []
List_name_loc = []
for i in os.list... | 79 | 38.43 | 116 | 26 | 785 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_562402bca3f1f0b5_60b89fd6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
21,
78
] | [
null,
null
] | [
11,
7
] | [
24,
53
] | |
2024-11-19T02:37:47.462331+00:00 | 1,629,870,680,000 | b88a08bd1b672706aed5eba0271732858fefba05 | 2 | {
"blob_id": "b88a08bd1b672706aed5eba0271732858fefba05",
"branch_name": "refs/heads/master",
"committer_date": 1629870680000,
"content_id": "fe2ed92937314d2f5868ac99169c13239c708e49",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "7d9c3d08cbab3628e9adb3fd93dc07b87c08fecd",
"extension": "p... | 2.375 | stackv2 | from __future__ import absolute_import
from __future__ import unicode_literals
import os
from jinja2 import Environment, FileSystemLoader
def render_template(name, context, template_root):
env = Environment(loader=FileSystemLoader(template_root))
return env.get_template(name).render(context)
class Privile... | 96 | 28.08 | 111 | 14 | 718 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_7be008e4c423870f_f58fe0d1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
10
] | [
null
] | [
11
] | [
62
] | |
2024-11-19T03:00:16.154779+00:00 | 1,686,694,082,000 | 3f271cde7daece79a87c4b63b1ce2e813555f503 | 3 | {
"blob_id": "3f271cde7daece79a87c4b63b1ce2e813555f503",
"branch_name": "refs/heads/main",
"committer_date": 1686694082000,
"content_id": "882009c83b1b42b89fc4186ad3dba4f5652e04d9",
"detected_licenses": [
"MIT"
],
"directory_id": "f4bcc3ace24d84ab7326043d086ce7effdfd1a8f",
"extension": "py",
"file... | 2.921875 | stackv2 | # -*- coding: utf-8 -*-
from datetime import datetime
from operator import itemgetter
from pathlib import Path
from string import ascii_lowercase
from typing import Any, Dict, Union
from jinja2 import Environment, FileSystemLoader
from markupsafe import escape
from logya.util import cache
env = Environment(
lst... | 122 | 34.37 | 119 | 16 | 1,020 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c9d44adecba7ce45_b51f2a1d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
14
] | [
17
] | [
7
] | [
2
] | |
2024-11-19T03:11:30.450561+00:00 | 1,644,176,150,000 | 52966d3dc17088a63947905730c4dbd72011aff8 | 2 | {
"blob_id": "52966d3dc17088a63947905730c4dbd72011aff8",
"branch_name": "refs/heads/master",
"committer_date": 1644176150000,
"content_id": "b680fb0b2e8d7f70ceb3f3daf72ba74e88abb9e9",
"detected_licenses": [
"MIT"
],
"directory_id": "0e905c7ae1169f9e00fa4f3cafad360051aa5d50",
"extension": "py",
"fi... | 2.484375 | stackv2 | import os
from pathlib import Path
from threading import Thread
import atexit
from time import sleep
from anki_export import ApkgReader
import pyexcel_xlsxwx
from flask import Flask, request, Response, send_from_directory, jsonify
TMP_PREFIX = "tmp_"
app = Flask(__name__)
@app.get("/<path:path>")
def download_file... | 80 | 25.29 | 80 | 19 | 472 | python | [{"finding_id": "codeql_py/flask-debug_76e51684d6435ec7_06b11dac", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 5 | true | [
"CWE-215",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-pro... | [
80,
23,
43,
25,
56
] | [
null,
null,
null,
null,
null
] | [
5,
12,
12,
14,
15
] | [
35,
49,
39,
41,
36
] | |
2024-11-19T03:11:32.398394+00:00 | 1,557,850,051,000 | 072737f028f92a04ad4a743d4f9788373a16afc8 | 2 | {
"blob_id": "072737f028f92a04ad4a743d4f9788373a16afc8",
"branch_name": "refs/heads/master",
"committer_date": 1557850051000,
"content_id": "01c7ddab83fca0aad283ad559305db5651a48cf6",
"detected_licenses": [
"MIT"
],
"directory_id": "7ccc1cddb3628d905f8c950780e76c90471d0566",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/perl
# -*- coding:utf-8 -*-
import os
import random
import subprocess
import pexpect
import time
from flask import Flask, request
if 'SPEAKER_MAC' not in os.environ:
print('Environment SPEAKER_MAC must be set.')
exit(1)
if 'PLAYLIST' not in os.environ:
print('Environment PLAYLIST must be set.')
ex... | 181 | 22.39 | 60 | 18 | 1,201 | python | [{"finding_id": "codeql_py/reflective-xss_fd4dca62aef66c3e_96c2ee2d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
156
] | [
null
] | [
10
] | [
21
] | |
2024-11-19T03:11:43.156978+00:00 | 1,689,089,854,000 | 613145686851f36e91992c1a83aac5755ca83da1 | 3 | {
"blob_id": "613145686851f36e91992c1a83aac5755ca83da1",
"branch_name": "refs/heads/master",
"committer_date": 1689089854000,
"content_id": "d7786c80bd039f5cfcff281c9485cbf54bf9149a",
"detected_licenses": [
"BSD-3-Clause",
"BSD-2-Clause"
],
"directory_id": "8d585fa3b2419d9b993be2f2652e448cfeedc8b2... | 2.671875 | stackv2 | """
***
Modified generic daemon class
***
Author: http://www.jejik.com/articles/2007/02/a_simple_unix_linux_daemon_in_python/
www.boxedice.com
www.datadoghq.com
License: http://creativecommons.org/licenses/by-sa/3.0/
"""
# Core modules
from contextlib import... | 378 | 32.05 | 134 | 21 | 2,623 | python | [{"finding_id": "codeql_py/overly-permissive-file_d65d222d366983ad_ee69d08e", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
367
] | [
null
] | [
13
] | [
41
] | |
2024-11-19T03:11:59.017838+00:00 | 1,422,809,470,000 | 3ad2cbfe89ab907a552961cfc6de0845d7cf6661 | 3 | {
"blob_id": "3ad2cbfe89ab907a552961cfc6de0845d7cf6661",
"branch_name": "refs/heads/master",
"committer_date": 1422809470000,
"content_id": "9e6b43205bc3cb1b6ce9586dec4d04313e62e9a4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9f15474b328c0fcb5ea061cd7205bd3613b86383",
"extension": "py"... | 3.390625 | stackv2 | import re
def remove_urls(text):
"""
Remove all URLs from a `text`. Return clean text and URLs list.
Parameters:
text -- the text to be cleaned.
"""
# Regex to identify URLs
regex = ('http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+]|[!*\(\),]|'
'(?:%[0-9a-fA-F][0-9a-fA-F]))+')
urls... | 19 | 23.26 | 67 | 11 | 135 | python | [{"finding_id": "codeql_py/overly-large-range_40f0cfea7514bc9f_184e876b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
12
] | [
null
] | [
45
] | [
49
] | |
2024-11-19T03:12:00.431691+00:00 | 1,571,830,048,000 | e05fd28a54555000d5f63f2a8c58dbcbca88406c | 2 | {
"blob_id": "e05fd28a54555000d5f63f2a8c58dbcbca88406c",
"branch_name": "refs/heads/master",
"committer_date": 1571830048000,
"content_id": "8f6341d26d2fb6c73e4dc866aef739201d479c40",
"detected_licenses": [
"MIT"
],
"directory_id": "5a8d6ea029248e1cd0f97e20d7e8ac98c53c2705",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/env python
# encoding: utf-8
import random
import hashlib
from api import NetEase
cookie_path = "~/.netease-music_api/cookie"
def md5(passwd):
md = hashlib.md5()
md.update(passwd)
return md.hexdigest()
def change_user():
#file = open('163.md')
file = open('account.txt')
try:
... | 34 | 17.91 | 43 | 12 | 166 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_9ad10fe8ebb00e87_b1004f8e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](3) is used in a hashing algorithm (MD5) that ... | [
12
] | [
null
] | [
15
] | [
21
] | |
2024-11-19T03:12:08.502694+00:00 | 1,602,466,970,000 | 7bb071085298651752b571394ba836b27deee809 | 3 | {
"blob_id": "7bb071085298651752b571394ba836b27deee809",
"branch_name": "refs/heads/master",
"committer_date": 1602466970000,
"content_id": "abf8c79619c4cb9fcc2fb09c8cc3496b63cf7c2d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4944178c246ab0811939b32cd192b7ce692b93cd",
"extension": "py"... | 2.609375 | stackv2 | #!/usr/bin/env python3
# Licensed to the Apache Software Foundation (ASF) under one
# or more contributor license agreements. See the NOTICE file
# distributed with this work for additional information
# regarding copyright ownership. The ASF licenses this file
# to you under the Apache License, Version 2.0 (the
# "... | 275 | 43.83 | 115 | 22 | 2,430 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_bc846378603814de_a33ff845", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (s... | [
270,
104,
112,
132,
161,
166
] | [
null,
null,
null,
null,
162,
167
] | [
23,
38,
38,
34,
25,
34
] | [
49,
113,
99,
76,
79,
90
] | |
2024-11-19T03:12:08.875710+00:00 | 1,598,916,760,000 | dfd595a3ebdc18535a7e53c4013495af78f952dd | 2 | {
"blob_id": "dfd595a3ebdc18535a7e53c4013495af78f952dd",
"branch_name": "refs/heads/master",
"committer_date": 1598916760000,
"content_id": "46317ad90d9d713de17c66cf06743fcffe8fad4a",
"detected_licenses": [
"MIT"
],
"directory_id": "7fae9557bf3ffde771a1b84eb0560427a5714faf",
"extension": "py",
"fi... | 2.4375 | stackv2 | import winsound
import requests
import glob
import os
from os.path import join
import threading
import time
from argparse import ArgumentParser
VERSION = "1.3"
print("SayThat {} (C)Mya-Mya(2020)".format(VERSION))
CWD = os.path.dirname(__file__)
SOUNDS_DIR = join(CWD, "sounds", "")
VOICE_CACHES_DIR = join(CWD, "voice_... | 139 | 29.95 | 115 | 16 | 1,247 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0118b18cb97c91c5_02654ae5", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
88
] | [
null
] | [
28
] | [
33
] | |
2024-11-19T03:12:14.050346+00:00 | 1,628,768,563,000 | 1d0ed6b02d09b43c22d4ca2a4ec7aa6249542237 | 5 | {
"blob_id": "1d0ed6b02d09b43c22d4ca2a4ec7aa6249542237",
"branch_name": "refs/heads/master",
"committer_date": 1628768563000,
"content_id": "59c7b2cce0dfa62f99f6448235d21a5d42312298",
"detected_licenses": [
"Unlicense"
],
"directory_id": "e1ea171018f0a32f0149da127ee2d3e5c69cb2f6",
"extension": "py",... | 4.65625 | stackv2 | #!/usr/bin/env python3
"""
Exercise 01: Number Guessing Game
A simple guessing game, showing basic input / output and use of a function from a built-in module.
"""
from random import randint
def guessing_game():
secret = randint(0, 100)
while True:
guess = int(input('Enter your guess: '))
... | 28 | 22.89 | 102 | 14 | 160 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_653f6b47607afb93_5e1adcd0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
19
] | [
null
] | [
19
] | [
79
] | |
2024-11-19T03:12:39.275514+00:00 | 1,626,150,944,000 | 361a180457cd2c00737f4b57bd0cdccdc57dffc3 | 3 | {
"blob_id": "361a180457cd2c00737f4b57bd0cdccdc57dffc3",
"branch_name": "refs/heads/main",
"committer_date": 1626150944000,
"content_id": "b3d1a774903e842f7a7e53a4ff8d51180ae40d72",
"detected_licenses": [
"MIT"
],
"directory_id": "b2c3bf9266888ba8a511f1d87179b8e70f1a1584",
"extension": "py",
"file... | 3.171875 | stackv2 | import os
import re
import sys
# Get the source directory
while True:
try:
pwd = input("Choose the main folder with the tasks files: ")
if re.match(re.compile(r'/[a-zA-z0-9]+/*'), pwd):
break
else:
print("\nThis is not a folder! " +
"Try something ... | 40 | 29.43 | 70 | 16 | 289 | python | [{"finding_id": "codeql_py/overly-large-range_1c039ba2cd1522d9_fa6409ed", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
10
] | [
null
] | [
39
] | [
42
] | |
2024-11-19T03:12:53.886177+00:00 | 1,608,776,908,000 | a5b57822cc2c0e2d6b2dd77cf2b53b920bcded11 | 2 | {
"blob_id": "a5b57822cc2c0e2d6b2dd77cf2b53b920bcded11",
"branch_name": "refs/heads/master",
"committer_date": 1608776908000,
"content_id": "ea4e7cf37c23e30bc3131d187466c5d92de7404c",
"detected_licenses": [
"MIT"
],
"directory_id": "3c3ed5ac26edbd8e4607283412cc5b56c0ef0569",
"extension": "py",
"fi... | 2.328125 | stackv2 | # #!/usr/bin/python
# -*- coding: utf-8 -*-
# ScrapHacks
# Web Scrapping Examples
#
# Copyright 2017-2018 Isaac de la Pena <isaacdlp@agoraeafi.com>
#
# Licensed under the MIT License (the "License")
# you may not use this file except in compliance with the License.
#
# Unless required by applicable law or agreed to i... | 112 | 35.67 | 120 | 19 | 1,145 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_2768620243c55c26_668c2a85", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.quefondos.com](1) may be at an arbitrary position ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [www.quefondos.com](1) may be at an arbitrary position in the sanitized URL."
] | [
80
] | [
null
] | [
18
] | [
44
] | |
2024-11-19T03:25:17.946866+00:00 | 1,631,715,152,000 | 49a9c474225a97ccba13cd7a9acc157d098faf0e | 2 | {
"blob_id": "49a9c474225a97ccba13cd7a9acc157d098faf0e",
"branch_name": "refs/heads/main",
"committer_date": 1631715152000,
"content_id": "eee1e4b15a369e342fa27f754d31d44f8bcbb34d",
"detected_licenses": [
"MIT"
],
"directory_id": "85f7fdc67860ab9c2e13891755e44aa381ad1b4c",
"extension": "py",
"file... | 2.484375 | stackv2 | import urllib3
import bs4
ORACC_PROJECT_NAME = ""
SUPERSCRIPTS_TO_UNICODE_CHARS = {
"<super>1</super>": "\U0001F600",
"<super>m</super>": "\U0001F600",
"<super>d</super>": "\U0001F601",
"<super>f</super>": "\U0001F602",
"<super>ki</super>": "\U0001F603",
"<super>kur</super>": "\U0001F604",
... | 144 | 30.48 | 111 | 16 | 1,368 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c25115dc0387a806_2e544e36", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [oracc.org](1) may be at an arbitrary position in the s... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [oracc.org](1) may be at an arbitrary position in the sanitized URL.",
"The string [oracc.museum.upenn.edu](1) may be at an arbitrary position in the sanitized URL."
] | [
35,
35
] | [
null,
null
] | [
13,
44
] | [
40,
84
] | |
2024-11-19T03:25:22.184997+00:00 | 1,654,443,654,000 | 283e0b353c3d40c8ecfa1e760ef8c9a5d01c4393 | 3 | {
"blob_id": "283e0b353c3d40c8ecfa1e760ef8c9a5d01c4393",
"branch_name": "refs/heads/main",
"committer_date": 1654443654000,
"content_id": "928f73f74d4265c29019a324b56e1a9fbe0e9dec",
"detected_licenses": [
"MIT"
],
"directory_id": "ec279d450c7ef443d6c6daa925140363cadda78f",
"extension": "py",
"file... | 2.796875 | stackv2 | #!/usr/bin/python3
import sys
import yaml
import jinja2
class XtermColors(object):
increments = (0, 95, 135, 175, 215, 255)
def __init__(self):
self.palette = {}
i = 16
for r in self.increments:
for g in self.increments:
for b in self.increments:
... | 73 | 28.77 | 70 | 19 | 578 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_830798e81d919052_25991469", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
42
] | [
46
] | [
10
] | [
6
] | |
2024-11-19T03:35:43.684648+00:00 | 1,670,547,015,000 | d17a836796bdafff1b6e20e61770571867c6d2b3 | 3 | {
"blob_id": "d17a836796bdafff1b6e20e61770571867c6d2b3",
"branch_name": "refs/heads/master",
"committer_date": 1670547015000,
"content_id": "a37ec51050092db06754acea11cb4074da7f7b31",
"detected_licenses": [
"MIT"
],
"directory_id": "4803733b75ab7825409317d131574325fddb0c99",
"extension": "py",
"fi... | 3.1875 | stackv2 | import sys
import re
from typing import List
def is_valid(cand: str) -> bool:
if not re.match(r'.*((.)\2.*){2}', cand):
return False
values = list(map(ord, cand))
ascend_strs = zip(*(values[i:] for i in range(3)))
for ascend_str in ascend_strs:
pairs = zip(*(ascend_str[i:] for i in ra... | 44 | 23.23 | 79 | 15 | 286 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c8d55407eecf60a4_856ad493", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
40
] | [
null
] | [
15
] | [
47
] | |
2024-11-19T03:35:45.919135+00:00 | 1,598,351,477,000 | e22f2cd5246dff5ac6ab4f745f1a273b8ee4f6d1 | 3 | {
"blob_id": "e22f2cd5246dff5ac6ab4f745f1a273b8ee4f6d1",
"branch_name": "refs/heads/master",
"committer_date": 1598351477000,
"content_id": "bd1a8bc5f67db74f7fa3bc3020dec78357ed182c",
"detected_licenses": [
"MIT"
],
"directory_id": "aeaa0e28061b2d34eb20b273f78de25837921f5b",
"extension": "py",
"fi... | 2.578125 | stackv2 | import socket
import struct
import binascii
STRING_ONE_TAB="\t"
STRING_TWO_TAB="\t\t"
STRING_THREE_TAB="\t\t\t"
def get_mac_addr(mac_raw):
byte_str = map('{:02x}'.format, mac_raw)
mac_addr = ':'.join(byte_str).upper()
return mac_addr
class Ethernet():
"""class for separate ethernet frame"""
def... | 152 | 36.94 | 154 | 14 | 1,506 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d606cd8646abe198_754a183b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priva... | [
24,
70,
71
] | [
null,
null,
null
] | [
13,
15,
15
] | [
116,
118,
123
] | |
2024-11-19T01:28:46.107680+00:00 | 1,532,048,082,000 | f02bbf0b4769b7ec665a6a2b489117da467db744 | 3 | {
"blob_id": "f02bbf0b4769b7ec665a6a2b489117da467db744",
"branch_name": "refs/heads/master",
"committer_date": 1532048082000,
"content_id": "c8c704db4c69fefd90dcca3a32d4ad687fbf732e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ecc87e6a23ffb71e8b1e7a8d0f0946e5e7bcec79",
"extension": "py"... | 2.75 | stackv2 | from flask import Blueprint, url_for, request, render_template, make_response, Response, redirect, abort
from flask.json import jsonify
from jinja2 import Template
blue = Blueprint('first_blue', __name__)
@blue.route('/')
def index():
return "Hello Flask"
@blue.route('/hello/<int:a>')
def hello(a):
print(a... | 112 | 18.96 | 104 | 11 | 627 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_133adafb31fc4288_eaf14d04", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
62
] | [
null
] | [
12
] | [
46
] | |
2024-11-19T01:28:48.526493+00:00 | 1,614,245,244,000 | a0e84ef5a0fc58a020a06b88db8a5e500b26f7e4 | 3 | {
"blob_id": "a0e84ef5a0fc58a020a06b88db8a5e500b26f7e4",
"branch_name": "refs/heads/main",
"committer_date": 1614245244000,
"content_id": "df6cc5f5929a96173c55aed64d6ae3eb2c47ab07",
"detected_licenses": [
"MIT"
],
"directory_id": "b24c548ae145c61edaecfdc306a8434f18250e24",
"extension": "py",
"file... | 3.046875 | stackv2 | #!/usr/bin/env python3
'''
this code has been taken from the following link:
"https://github.com/pakesson/diy-ecb-penguin/blob/master/encrypt_image.py"
and updated slightly
128 bit aes encryption is used in this code
'''
from PIL import Image
from cryptography.hazmat.primitives.ciphers import Cipher,algorithms,... | 63 | 28.43 | 74 | 13 | 467 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_fffb09eacbae358a_e38a691a", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ECB](2) is broken or weak, and should not be used."
] | [
34
] | [
null
] | [
16
] | [
45
] | |
2024-11-19T01:29:29.834731+00:00 | 1,615,517,706,000 | 8eb1b8a086079e0ddd2bc1706a165e5102708146 | 3 | {
"blob_id": "8eb1b8a086079e0ddd2bc1706a165e5102708146",
"branch_name": "refs/heads/master",
"committer_date": 1615517706000,
"content_id": "0e445c2ed0a0e706f570c35273344cad26d7d9ea",
"detected_licenses": [
"MIT"
],
"directory_id": "f0a54fa8580357d129f6701a107fe02d063e0ea7",
"extension": "py",
"fi... | 3.03125 | stackv2 | """
需求:
就是设计一个爬虫,给功能如下,
1.抓取网页上关于光电企业信息(岗位,各岗位的薪资、技能要求、工资、地点等信息)
2.将这些信息存入数据库
3.对数据库的数据进一步分析,提炼,并将信息转换为散点图和柱状图,并加入了tkinter图形操作界面
ps:拉钩网的cookie很容易失效,所以要特别注意
"""
import json
import time
import requests
from tqdm import tqdm
# 1.1、先爬取拉勾的数据,是一个ajax动态加载的网站
headers = {
'Host': 'ww... | 85 | 35.69 | 134 | 34 | 973 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6652bc03c6a90612_2724d694", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
68
] | [
null
] | [
25
] | [
32
] | |
2024-11-19T01:29:33.722841+00:00 | 1,643,430,461,000 | 251496446374064791ae6f64d37293c606750c12 | 2 | {
"blob_id": "251496446374064791ae6f64d37293c606750c12",
"branch_name": "refs/heads/master",
"committer_date": 1643430461000,
"content_id": "ac4c74a40b3312c2dc36115cf825e9f4fe691485",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b858793614fad1ab610a67347faf4d04353c356b",
"extension": "py"... | 2.4375 | stackv2 | # -*- coding: utf-8 -*-
"""
-------------------------------------------------
File Name: queue
Description : queue view
Author : JHao
date: 2018/8/27
-------------------------------------------------
Change Activity:
2018/8/27: queue view
-------------------------... | 142 | 36.15 | 106 | 14 | 1,181 | python | [{"finding_id": "codeql_py/cookie-injection_77747a1d3e18a4a1_821bb41e", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/cookie-injection",
"py/cookie-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cookie is constructed from a [user-supplied input](1).",
"Cookie is constructed from a [user-supplied input](1)."
] | [
41,
114
] | [
null,
null
] | [
29,
29
] | [
43,
38
] | |
2024-11-19T01:30:10.278862+00:00 | 1,518,633,968,000 | e9c31b6eb490b728d62414dbf3bb89a52105ce00 | 3 | {
"blob_id": "e9c31b6eb490b728d62414dbf3bb89a52105ce00",
"branch_name": "refs/heads/master",
"committer_date": 1518633968000,
"content_id": "c9504293bc46314acb610f2ea08ceb204eea7979",
"detected_licenses": [
"MIT"
],
"directory_id": "33a704bedd001cd0985518f4ec0ac4083993a150",
"extension": "py",
"fi... | 2.609375 | stackv2 | from utils import (
create_folder,
set_name,
unique_everseen,
is_valid_url,
get_html,
get_elements,
get_page_links,
get_image_links,
get_imagebam_htmlcode_links
)
import os
import re
import sys
import urllib
def download_file(url, name, dest=".", number=1):
print " {0}) In: {1... | 164 | 28.47 | 85 | 17 | 1,171 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c09728a31fdba0ef_f23a2f96", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [imagebam.com](1) may be at an arbitrary position in th... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [imagebam.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [imagevenue.com](1) may be at an arbitrary position in the sanitized URL."
] | [
59,
117
] | [
null,
null
] | [
47,
43
] | [
66,
64
] | |
2024-11-19T01:30:14.247803+00:00 | 1,675,953,919,000 | fb1a1350a3b5aedad4df973d333083694d209980 | 3 | {
"blob_id": "fb1a1350a3b5aedad4df973d333083694d209980",
"branch_name": "refs/heads/master",
"committer_date": 1675953919000,
"content_id": "4449f7778938a463f03036b7ddabf586c1f7f99a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3ad26eac4ed1465de5c405f5c4bd35e9ad6f755e",
"extension": "py"... | 2.890625 | stackv2 | #!/usr/bin/python3
# BY NOMO
from netmiko import Netmiko
from getpass import getpass
from datetime import datetime
import re
import os
import sys
import socket
# Function for DNS resolution
def hostnameLookup(hostname):
try:
socket.gethostbyname(hostname)
return 1 # If lo... | 93 | 21.66 | 80 | 15 | 499 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6f0d0655e74cf871_ef902e8f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
75,
93
] | [
null,
null
] | [
11,
7
] | [
54,
75
] | |
2024-11-19T01:30:25.972606+00:00 | 1,573,513,563,000 | 52b3795fb52c2c29358d338814d434a756059553 | 2 | {
"blob_id": "52b3795fb52c2c29358d338814d434a756059553",
"branch_name": "refs/heads/master",
"committer_date": 1573513563000,
"content_id": "7e471e0017351134567960cb4830bb12985cb90a",
"detected_licenses": [
"MIT"
],
"directory_id": "1c286eaf9d5a9338343efeb7fe16c98c06ebdc30",
"extension": "py",
"fi... | 2.390625 | stackv2 | # -*- coding: utf-8 -*-
from __future__ import unicode_literals
from django.db import models
import datetime
import time
import random
from hashlib import sha512
from player.Logger import Logger
# Create your models here.
USER_TYPE_WEB = 1
USER_TYPE_SKYPE = 2
USER_TYPES = (
(USER_TYPE_WEB, 'Web'),
(USER_TYPE_SKYP... | 156 | 26.75 | 98 | 18 | 1,044 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_95a07557ef01f187_78a7d5dd", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
39
] | [
null
] | [
17
] | [
47
] | |
2024-11-19T01:55:08.054771+00:00 | 1,588,165,161,000 | f14124c9ebcb0702f2ac9e4f8f4c7ec07f32283c | 3 | {
"blob_id": "f14124c9ebcb0702f2ac9e4f8f4c7ec07f32283c",
"branch_name": "refs/heads/master",
"committer_date": 1588165161000,
"content_id": "532c6c4f5cf58d02baf790069de14f6134924431",
"detected_licenses": [
"MIT"
],
"directory_id": "7fb46a8df03990089e3e09602fbbf00e2b9ec294",
"extension": "py",
"fi... | 2.71875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import hashlib
import pandas as pd
import numpy as np
from urlparse import urlparse, urljoin
from flask import request, flash, redirect, url_for
def md5(password):
return hashlib.md5(password).hexdigest()
def get_data_array(mydate,myvalue):
return [mydate.encode(... | 62 | 26.56 | 68 | 15 | 501 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_2c587f6f1cce76c9_724917c9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
11
] | [
null
] | [
24
] | [
32
] | |
2024-11-19T02:06:57.635295+00:00 | 1,630,659,756,000 | f93c41008a6a77927da28ce45091eff0c2e7e5a1 | 2 | {
"blob_id": "f93c41008a6a77927da28ce45091eff0c2e7e5a1",
"branch_name": "refs/heads/main",
"committer_date": 1630659756000,
"content_id": "77de35ce4ddff15ac1695adb50e8654c698ad856",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e98e55957ee6aff35a0cd095b45b621a9f87008b",
"extension": "py",
... | 2.375 | stackv2 | #
# Copyright (c) 2021 Facebook, Inc. and its affiliates.
#
# This file is part of NeuralDB.
# See https://github.com/facebookresearch/NeuralDB for further info.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy... | 165 | 36.12 | 104 | 23 | 1,331 | python | [{"finding_id": "codeql_py/overly-large-range_dbdb83cb80f59e3f_7f11d8f5", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:\\]."
] | [
57
] | [
null
] | [
97
] | [
100
] | |
2024-11-19T02:07:10.201128+00:00 | 1,567,097,049,000 | 53d565e0a80e8d6fd95202c0f3fca705b9fe18c7 | 3 | {
"blob_id": "53d565e0a80e8d6fd95202c0f3fca705b9fe18c7",
"branch_name": "refs/heads/master",
"committer_date": 1567097049000,
"content_id": "2eedccf3bf2cfb54d9efd19220774948cc630ad1",
"detected_licenses": [
"MIT"
],
"directory_id": "f4ddba94acd7584abf4de2a64fc3974a56619ddf",
"extension": "py",
"fi... | 2.75 | stackv2 | from bs4 import BeautifulSoup
import requests
import csv
source = requests.get(
'https://www.knowles.com/subdepartment/dpt-microphones/subdpt-sisonic-surface-mount-mems', verify=False).text
soup = BeautifulSoup(source, 'lxml')
# print(soup.prettify().encode('utf8'))
csv_file = open('kevin_scrape_knpart.csv', 'w'... | 31 | 33.94 | 113 | 17 | 267 | python | [{"finding_id": "codeql_py/request-without-cert-validation_6ec9903dd825b4d7_ffc19ebd", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
5
] | [
6
] | [
10
] | [
109
] | |
2024-11-19T02:31:14.080480+00:00 | 1,606,835,148,000 | fc02dbc4f19fd80f09484e2322504555feeac6eb | 3 | {
"blob_id": "fc02dbc4f19fd80f09484e2322504555feeac6eb",
"branch_name": "refs/heads/master",
"committer_date": 1606835148000,
"content_id": "aff5361b082d67ec571c768ee2298183f4fa9492",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "6bf3f959f56bca0a05fe174c10f7ee97cb545899",
"extension": "p... | 2.875 | stackv2 | import aiorcon
import asyncio
import string
import time
import sys
import getopt
from itertools import chain, product
ip = "127.0.0.1"
port = "20175"
chars = "string.ascii_lowercase"
lenght = 4
def ip_port_parse(ip_input):
global ip
global port
ip = ip_input.split(':', 1)[0]
port = ip_input[ip_input.... | 76 | 23.14 | 71 | 15 | 461 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e26ea9762edf7efe_042b6208", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
38
] | [
null
] | [
31
] | [
43
] | |
2024-11-19T02:31:15.795879+00:00 | 1,687,675,916,000 | eeff2b5a3fbff93b62d6d49e4c96c302ee24e2a6 | 2 | {
"blob_id": "eeff2b5a3fbff93b62d6d49e4c96c302ee24e2a6",
"branch_name": "refs/heads/master",
"committer_date": 1687675916000,
"content_id": "5225032566c07cbd72794c8fbbf41c09f47da5d9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8cae186abe4880375ccbea9b404a2f5f349a40ab",
"extension": "py"... | 2.359375 | stackv2 | import os
from typing import Optional
import uvicorn
from diskcache import Cache
from fastapi import FastAPI
from fastapi import File
from fastapi import UploadFile
from starlette.middleware.cors import CORSMiddleware
from starlette.requests import Request
from starlette.responses import FileResponse
from operations.co... | 123 | 31.34 | 97 | 14 | 982 | python | [{"finding_id": "codeql_py/stack-trace-exposure_6e950fee99ccd09f_65947d6d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 7 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-022"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
49,
59,
70,
81,
98,
120,
46
] | [
null,
null,
null,
null,
null,
null,
null
] | [
16,
16,
16,
16,
16,
16,
29
] | [
48,
48,
48,
48,
48,
48,
37
] | |
2024-11-19T02:32:00.618511+00:00 | 1,567,675,198,000 | b74e55bd349de547c38026e8780a3bdf8a56babe | 3 | {
"blob_id": "b74e55bd349de547c38026e8780a3bdf8a56babe",
"branch_name": "refs/heads/master",
"committer_date": 1567675198000,
"content_id": "327a81524de588f8151b09ae480e0dc5152bfdbe",
"detected_licenses": [
"MIT"
],
"directory_id": "2d0fece181a920e3a862bfbd9537b685376a6321",
"extension": "py",
"fi... | 2.921875 | stackv2 | import requests
import os
def get_credentials(filepath='credentials.txt', debug=0):
with open(filepath, "r") as f:
data = f.readlines()
username = data[0].strip()
password = data[1].strip()
if (debug):
print("Fetched username [%r] and password [%r]" % (username, password))
... | 32 | 26 | 108 | 11 | 217 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2e44a0901b512f76_ec77a639", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-295"
] | [
"py/clear-text-logging-sensitive-data",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This request may run without certificate validation because [it is disabled](1)."
] | [
11,
24
] | [
null,
null
] | [
15,
13
] | [
79,
50
] | |
2024-11-19T02:32:01.777275+00:00 | 1,439,493,910,000 | f0ee89d711830d6534b8f8f5f8e15f4f34efb70b | 3 | {
"blob_id": "f0ee89d711830d6534b8f8f5f8e15f4f34efb70b",
"branch_name": "refs/heads/master",
"committer_date": 1439493910000,
"content_id": "769a0774d7e6dab960d40ce87429200281cc23b3",
"detected_licenses": [
"MIT"
],
"directory_id": "f17e5ab56de5a41c4f777f6057b2eea4972e41c2",
"extension": "py",
"fi... | 2.78125 | stackv2 | import os
import shutil
import jinja2
from saliere.core import UsageError
class Templatizer:
"""Template manager.
Handles all the template related operations.
"""
def __init__(self, template_path_list=None, template_type=None):
"""Initializer.
:param template_path_list: the list o... | 174 | 36.68 | 119 | 18 | 1,283 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0a677fafe1a887e5_a9f137e7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
63
] | [
null
] | [
25
] | [
95
] | |
2024-11-19T02:32:19.101569+00:00 | 1,686,710,351,000 | 0e9c6227dd2a12527403c933051a924c26433a23 | 4 | {
"blob_id": "0e9c6227dd2a12527403c933051a924c26433a23",
"branch_name": "refs/heads/master",
"committer_date": 1686710351000,
"content_id": "f397ade110e233d2a0f8be6335a12be2cc41ea88",
"detected_licenses": [
"MIT"
],
"directory_id": "9df9957c066dffd2ef44461412361d03c3fdc9d7",
"extension": "py",
"fi... | 3.875 | stackv2 | import random
import string
def generate_password(length):
"""Generate a random password with the given length."""
characters = string.ascii_letters + string.digits + string.punctuation
password = ''.join(random.choice(characters) for _ in range(length))
return password
def save_password(username, pas... | 22 | 33.18 | 78 | 11 | 161 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b7670753da7f1444_c52cd8fe", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text."
] | [
13
] | [
null
] | [
17
] | [
44
] | |
2024-11-19T02:32:46.660000+00:00 | 1,451,420,670,000 | 25adc91c208df986161d88ca6ea373ff137b3a69 | 3 | {
"blob_id": "25adc91c208df986161d88ca6ea373ff137b3a69",
"branch_name": "refs/heads/master",
"committer_date": 1451420670000,
"content_id": "77888ef26490a5c50513cb2ba56914953b12cd24",
"detected_licenses": [
"MIT"
],
"directory_id": "6dad21adece86687a165472fb107153215553d82",
"extension": "py",
"fi... | 2.703125 | stackv2 | import six
import json
import time
import hashlib
from six.moves import urllib
from . import exceptions
def set_key(key):
if len(key) != 32:
raise exceptions.MixpanelKeyInvalid(
"API key must be 32 characters long.")
Request._api_key = key
def set_secret(secret):
if len(secret) != 3... | 167 | 27.76 | 76 | 18 | 1,038 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_816fd8cdd6cc3682_8493a812", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
123
] | [
null
] | [
25
] | [
40
] | |
2024-11-19T02:32:52.211458+00:00 | 1,558,362,205,000 | 5d9304c65c03e873db76553fe9115a6101cc96a1 | 2 | {
"blob_id": "5d9304c65c03e873db76553fe9115a6101cc96a1",
"branch_name": "refs/heads/master",
"committer_date": 1558362205000,
"content_id": "61c92e87e5ab4bc9473fe5fada99de4b2bf0509b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b65de565d19980c9002c672dc4342728e279babf",
"extension": "py"... | 2.34375 | stackv2 | import requests
from flask import Flask, request, Response
import os
import json
import datetime
import logger as log
import dateutil.relativedelta
app = Flask(__name__)
logger = log.init_logger("dynamic-url-proxy", os.environ.get("LOGLEVEL", "INFO"))
methods = [
"GET",
"POST",
"PUT",
"DELETE",
"... | 109 | 27.61 | 83 | 18 | 684 | python | [{"finding_id": "codeql_py/stack-trace-exposure_14b6342bcf3b98ae_1c79f869", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-094",
"CWE-215",
"CWE-918"
] | [
"py/stack-trace-exposure",
"py/code-injection",
"py/flask-debug",
"py/full-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This code execution depends on a [user-provided value](1).",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"The full URL of this request depe... | [
31,
58,
87,
63
] | [
null,
null,
91,
70
] | [
18,
40,
9,
13
] | [
31,
45,
52,
31
] | |
2024-11-19T02:32:54.223272+00:00 | 1,621,492,255,000 | 4547981433552bfa255912740be9b900548fb79e | 2 | {
"blob_id": "4547981433552bfa255912740be9b900548fb79e",
"branch_name": "refs/heads/master",
"committer_date": 1621492255000,
"content_id": "1a10d3717369b46c10936f4aa9a3889ffb597ab2",
"detected_licenses": [
"MIT"
],
"directory_id": "eec83dac18ddecd0b8ee8679f9b9d10f7506b64b",
"extension": "py",
"fi... | 2.484375 | stackv2 | import sys
import ConfigParser
import os
from io import StringIO
from neo4j.v1 import GraphDatabase, basic_auth, CypherError
from passlib.hash import argon2
def setup_neo4j_driver(host, port, password):
default_password = 'neo4j' # Travis will use a fresh Neo4j, with the default password.
local_password = pas... | 52 | 37.96 | 122 | 17 | 508 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_328e755558fc7229_f3dbb8a4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
31
] | [
null
] | [
83
] | [
97
] | |
2024-11-19T02:32:56.689544+00:00 | 1,689,348,860,000 | 414436c7bdf53e13fb24f69ca29aab525330772f | 2 | {
"blob_id": "414436c7bdf53e13fb24f69ca29aab525330772f",
"branch_name": "refs/heads/master",
"committer_date": 1689348860000,
"content_id": "e982dd22a83fbc5fb5ea0a4138d6744204690f0d",
"detected_licenses": [
"MIT"
],
"directory_id": "f6bc15034ee1809473279c87e13cc3131bc3675c",
"extension": "py",
"fi... | 2.359375 | stackv2 | """Database models for the users app."""
from __future__ import annotations
from hashlib import blake2b
from pathlib import PurePath
from secrets import token_hex
from django.conf import settings
from django.contrib.auth.models import User
from django.db import models
from django.urls import reverse
from MangAdvent... | 146 | 26.77 | 75 | 18 | 915 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_46979b66bfa4df9f_b042ea3a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (BLAKE2B) that is i... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (BLAKE2B) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
77
] | [
null
] | [
17
] | [
30
] | |
2024-11-19T02:43:29.362431+00:00 | 1,502,469,488,000 | ddf50aba836260d93ca494c0855a47eaf5c62589 | 3 | {
"blob_id": "ddf50aba836260d93ca494c0855a47eaf5c62589",
"branch_name": "refs/heads/master",
"committer_date": 1502469488000,
"content_id": "52adbd8da456fc8f2b7aa1aa4e5097c258170bc7",
"detected_licenses": [
"MIT"
],
"directory_id": "d7b5940c376b758c47bf3e06a5bd013380c72b1d",
"extension": "py",
"fi... | 2.8125 | stackv2 | import hashlib
from web_interface import persistents
def login_persistent(username: str, password: str) -> bool:
db = persistents.get_connection()
cursor = db.cursor()
cursor.execute("""SELECT `password` FROM `users` WHERE `username`=%s;""", username)
result = cursor.fetchone()
if result:
... | 19 | 27.32 | 87 | 11 | 138 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_246b435ce611f30d_e1be20dc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
18
] | [
null
] | [
14
] | [
40
] | |
2024-11-19T02:43:34.425794+00:00 | 1,620,654,499,000 | 2c46634edf23310df51f31836e218446925db38c | 3 | {
"blob_id": "2c46634edf23310df51f31836e218446925db38c",
"branch_name": "refs/heads/main",
"committer_date": 1620654499000,
"content_id": "8c8f8b8f3e8f2fb29b2aeb138a97a71673649e41",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "14c7357a7fca6bb06b01bfc5a895b5809db26da5",
"extension": "py",
... | 2.734375 | stackv2 | # Have Cassandra running, run this a server (python3 capAnalysis.py), and use HTTP requests to run a writer or reader off of it ("http://localhost:5000/{{path}}").
# Imports
import os, sys, datetime, time, string, random, uuid, csv, subprocess, requests
from datetime import datetime as dt
# pip3 install cassandra-driv... | 132 | 39.89 | 177 | 19 | 1,151 | python | [{"finding_id": "codeql_py/path-injection_f1a93b855dc0bd4c_59fb1a08", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 4 | true | [
"CWE-022",
"CWE-089",
"CWE-089",
"CWE-089"
] | [
"py/path-injection",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
93,
38,
47,
54
] | [
null,
null,
null,
null
] | [
15,
21,
21,
28
] | [
23,
26,
26,
76
] | |
2024-11-19T02:54:50.543077+00:00 | 1,620,054,465,000 | 053edbfd1d82e1688bbb124e751039c859d5b672 | 3 | {
"blob_id": "053edbfd1d82e1688bbb124e751039c859d5b672",
"branch_name": "refs/heads/master",
"committer_date": 1620054465000,
"content_id": "6465aaff3e1db7898ee24717cedac1afd474ed06",
"detected_licenses": [
"MIT"
],
"directory_id": "762577e133e930480c297b92eda63598f5a6f13e",
"extension": "py",
"fi... | 2.75 | stackv2 | import gzip
import socket
import ssl
import sys
import zlib
try:
import brotli
except ImportError:
brotli = None
def request(url):
# 1. Parse scheme
scheme, url = url.split(":", 1)
assert scheme in ["http", "https", "data"], f"Unknown scheme {scheme}"
port = 80 if scheme == "http" else 443
... | 151 | 27.63 | 87 | 16 | 1,074 | python | [{"finding_id": "codeql_py/insecure-protocol_d926d0b75de3eb54_ee401567", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)."
] | [
37
] | [
null
] | [
18
] | [
21
] | |
2024-11-19T02:55:07.316825+00:00 | 1,389,174,712,000 | 21ea4e51e0e9137cf55c9a03661fe4dd68571acf | 2 | {
"blob_id": "21ea4e51e0e9137cf55c9a03661fe4dd68571acf",
"branch_name": "refs/heads/master",
"committer_date": 1389174712000,
"content_id": "4c7293eefa81c2d3538a587a274b1e191c9be45b",
"detected_licenses": [
"MIT"
],
"directory_id": "1b6931e6cc61962f06b7d10d52a2607b863b76ef",
"extension": "py",
"fi... | 2.3125 | stackv2 | import webapp2
import jinja2
from google.appengine.api import users
from google.appengine.ext.blobstore import blobstore
from models import Album, Photo, Comment
from utils import get_user, DEFAULT_DOMAIN_KEY
from photos import delete_photo
env = jinja2.Environment(
loader=jinja2.FileSystemLoader('templates')
)... | 409 | 24.23 | 89 | 16 | 2,103 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_6d0c593b4ef247e9_e1492c8f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
12
] | [
14
] | [
7
] | [
2
] | |
2024-11-19T02:55:22.464564+00:00 | 1,513,246,917,000 | 8ea10c19c46ca08730b1160624c67dbd13dc0cf2 | 2 | {
"blob_id": "8ea10c19c46ca08730b1160624c67dbd13dc0cf2",
"branch_name": "refs/heads/master",
"committer_date": 1513246917000,
"content_id": "070334e6e1582bd75aad004cd8728f92d8930025",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ec5a5879a6c99aa8fdcd0f952fa7f7a6ea4801b0",
"extension": "py"... | 2.453125 | stackv2 | import json
import uuid
from flask import Flask, request, redirect, url_for, jsonify, send_from_directory
from flask_cors import CORS
from werkzeug.utils import secure_filename
import os
from utils.mongoUtil import get_mongo_client
UPLOAD_FOLDER = '../../data/files'
ALLOWED_EXTENSIONS = set(['txt', 'pdf', 'png', 'jpg... | 169 | 30.4 | 151 | 19 | 1,355 | python | [{"finding_id": "codeql_py/flask-debug_2b2e26e5ad43af39_228c4d3c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-601",
"CWE-601",
"CWE-022"
] | [
"py/flask-debug",
"py/url-redirection",
"py/url-redirection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
165,
39,
46,
77
] | [
169,
null,
null,
null
] | [
5,
29,
29,
15
] | [
6,
40,
40,
23
] | |
2024-11-19T02:55:29.605583+00:00 | 1,600,216,488,000 | 6bcc05314c7f5f763220a51c28247892bda08b81 | 3 | {
"blob_id": "6bcc05314c7f5f763220a51c28247892bda08b81",
"branch_name": "refs/heads/master",
"committer_date": 1600216488000,
"content_id": "59bc6c8dea722de5a3b19cacbdca2d74ba544163",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "798ec3fbb9ef7cb376616a58427e9359c323ba89",
"extension": "py"... | 2.703125 | stackv2 | """Orange and Rockland Utility Smart Energy Meter"""
import requests
import logging
import asyncio
from pyppeteer import launch
import os
import json
import pyotp
_LOGGER = logging.getLogger(__name__)
class MeterError(Exception):
pass
class Meter(object):
"""A smart energy meter of Orange and Rockland Util... | 151 | 39.95 | 152 | 15 | 1,405 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_97a94de57bff8a74_f4994791", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
47
] | [
null
] | [
40
] | [
53
] | |
2024-11-19T02:55:37.879356+00:00 | 1,571,081,910,000 | 555b22d6ef0ad9272d73bb95964c87358dfbfc66 | 3 | {
"blob_id": "555b22d6ef0ad9272d73bb95964c87358dfbfc66",
"branch_name": "refs/heads/master",
"committer_date": 1571081910000,
"content_id": "db6246a6677b4cf9b9e4dd0efcb261d625c3598a",
"detected_licenses": [
"MIT"
],
"directory_id": "c3261fb977ae26d7a40e619dace8fa06df738882",
"extension": "py",
"fi... | 2.859375 | stackv2 | #!/python
""" Download script for google drive shared links
Thank you @turdus-merula and Andrew Hundt!
https://stackoverflow.com/a/39225039/623735
"""
import sys
import requests
from tqdm import tqdm
from nlpia.loaders import get_url_title
def get_url_filename(url=None, driveid=None):
url = url or 'https://dri... | 72 | 31.5 | 110 | 22 | 592 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_43e55cbf67ce1596_fc8c5fea", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://drive.google.com](1) may be at an arbitrary po... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [https://drive.google.com](1) may be at an arbitrary position in the sanitized URL."
] | [
15
] | [
null
] | [
8
] | [
50
] | |
2024-11-19T02:55:48.762599+00:00 | 1,476,954,738,000 | d4efabea4a0da4a7f3e891edb4338210af17ee2a | 2 | {
"blob_id": "d4efabea4a0da4a7f3e891edb4338210af17ee2a",
"branch_name": "refs/heads/master",
"committer_date": 1476954738000,
"content_id": "e64952cd639d96affe46c5ce4f5e487ac7bfc940",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0f4e6f36eb4f651fc725191f242f217fef0f667d",
"extension": "py"... | 2.484375 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
DOCUMENTATION = '''
---
module: ipa_sudocmd
author: Thomas Krahn (@Nosmoht)
short_description: Manage FreeIPA sudo command
description:
- Add, modify or delete sudo command within IPA server using IPA API.
options:
sudocmd:
description:
- Sudo Command.
aliases: [... | 244 | 30.03 | 119 | 21 | 1,796 | python | [{"finding_id": "codeql_py/request-without-cert-validation_dbbc45823c91e820_bc5ea766", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
108,
128
] | [
null,
null
] | [
17,
17
] | [
81,
120
] | |
2024-11-19T02:55:54.755190+00:00 | 1,600,057,345,000 | ba50a3d1f2721da10f63d6445ad3d8bf5933143c | 2 | {
"blob_id": "ba50a3d1f2721da10f63d6445ad3d8bf5933143c",
"branch_name": "refs/heads/master",
"committer_date": 1600057345000,
"content_id": "f2110dd5a156da3685680754986e5a688374bd0a",
"detected_licenses": [
"MIT"
],
"directory_id": "25257c49dd6caeb708de5be93f705a928db2fc35",
"extension": "py",
"fi... | 2.375 | stackv2 | from updater import Receiver
from flask import Flask
from symbols import SymbolManager
import tornado.ioloop
import tornado.web
import json
import time
import argparse
import logging
import sys
logFormatter = logging.Formatter("%(asctime)s [%(threadName)-12.12s] [%(levelname)-5.5s] %(message)s")
log = logging.getLo... | 131 | 31.7 | 107 | 16 | 948 | python | [{"finding_id": "codeql_py/log-injection_6097990511913514_8682978c", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
30
] | [
null
] | [
18
] | [
69
] | |
2024-11-19T03:10:23.112685+00:00 | 1,511,999,316,000 | 13fbc6e257b4ef597d9572fedcee70600959a41d | 3 | {
"blob_id": "13fbc6e257b4ef597d9572fedcee70600959a41d",
"branch_name": "refs/heads/master",
"committer_date": 1511999316000,
"content_id": "73c301cc3ae66bd7a47e549cf56ab8331570e003",
"detected_licenses": [
"MIT"
],
"directory_id": "235d1ba278f62e73d40eb61d3d7627ce332847b3",
"extension": "py",
"fi... | 2.609375 | stackv2 | import paramiko, getpass
from paramiko_server import ParamikoServer
import time
class LoginServer(ParamikoServer):
def __init__(self, utup, cpus, roots, credentials):
super(LoginServer, self).__init__(utup, cpus, roots, credentials)
if 'password' not in credentials:
credentials['passwor... | 57 | 41.11 | 128 | 18 | 587 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2153f842c51a3320_1f928c8e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
13
] | [
null
] | [
9
] | [
69
] | |
2024-11-19T03:10:51.162821+00:00 | 1,612,534,924,000 | 473cb47ce3c0547f3389b5345e11ae6192586209 | 3 | {
"blob_id": "473cb47ce3c0547f3389b5345e11ae6192586209",
"branch_name": "refs/heads/master",
"committer_date": 1612534924000,
"content_id": "f70285bf0c127bd9449019b899b0766290314975",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "72576634167525e0f39c5e87f706ab7aeaf14f36",
"extension": "py"... | 2.859375 | stackv2 | import argparse, subprocess, os, re
from jinja2 import Environment, FileSystemLoader
def GetBaseName(full_path):
return os.path.basename(full_path)
class PlantUMLCodeGeneration():
class StateType():
def __init__(self):
self.entry = None
self.during = None
self.exit... | 255 | 42.45 | 117 | 23 | 2,340 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_1c7e7151f40960f1_76e0d4dd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
216
] | [
218
] | [
15
] | [
10
] | |
2024-11-19T03:21:44.389401+00:00 | 1,596,983,909,000 | bf7243aae3650b14461bed5a1b0a11b69b9dfc73 | 3 | {
"blob_id": "bf7243aae3650b14461bed5a1b0a11b69b9dfc73",
"branch_name": "refs/heads/master",
"committer_date": 1596983909000,
"content_id": "cf862328b34e87e29deb93f806da2302d8f8e364",
"detected_licenses": [
"MIT"
],
"directory_id": "b2fae8c81889ba3d693d0a64be29d4bc1d857555",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
import codecs
import os
import shutil
from update_archive import update_archive
headers = {'Accept': '*/*',
'Accept-Language': 'en-US,en;q=0.8',
'Cache-Control': 'max-age=0',
'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/5... | 263 | 37.84 | 152 | 29 | 2,455 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_bb41961989857f66_d00fc541", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [v.qq.com](1) may be at an arbitrary position in the sa... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [v.qq.com](1) may be at an arbitrary position in the sanitized URL."
] | [
114
] | [
null
] | [
30
] | [
52
] | |
2024-11-19T03:22:15.686126+00:00 | 1,445,980,126,000 | 11f152904a45a47a108afe247739dd50785a0f11 | 2 | {
"blob_id": "11f152904a45a47a108afe247739dd50785a0f11",
"branch_name": "refs/heads/master",
"committer_date": 1445980126000,
"content_id": "0426b50a1f114aea638f619ca42ac552699d2e87",
"detected_licenses": [
"MIT"
],
"directory_id": "311df915ca62ea3c5d57a18e6844cd425f262870",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/env python
#
# This file is part of ravstack. Ravstack is free software available under
# the terms of the MIT license. See the file "LICENSE" that was provided
# together with this source file for the licensing terms.
#
# Copyright (c) 2015 the ravstack authors. See the file "AUTHORS" for a
# complete list.... | 174 | 30.79 | 87 | 16 | 1,305 | python | [{"finding_id": "codeql_py/overly-permissive-file_b768eb668f03e18c_1cd4460f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
80
] | [
null
] | [
9
] | [
33
] | |
2024-11-19T03:22:23.510670+00:00 | 1,668,183,595,000 | 645ad86bc9b5420a0aae52cdfeb21363deda84fd | 3 | {
"blob_id": "645ad86bc9b5420a0aae52cdfeb21363deda84fd",
"branch_name": "refs/heads/master",
"committer_date": 1668183595000,
"content_id": "60206ac63a3bb50ce86818af585b609d1c08f4c3",
"detected_licenses": [
"MIT"
],
"directory_id": "b4df029484ef5e4e2ae6027920cb12de7a6bc5ff",
"extension": "py",
"fi... | 3.234375 | stackv2 | import re
from typing import List
def is_increasing(text: str) -> bool:
return text == "".join(sorted(text))
def matches_pattern(text: str) -> bool:
return re.search(r'(\d)\1', text) is not None
def get_number_of_matching_passwords(passwords: List[str]) -> int:
return len([p for p in passwords if is_inc... | 23 | 35.74 | 88 | 12 | 231 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fb70c2d87c94c18f_e196dbe3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
22,
23
] | [
null,
null
] | [
11,
11
] | [
54,
61
] | |
2024-11-19T03:43:56.183962+00:00 | 1,526,857,263,000 | 1b45b534bbe67819795c872d7871166d051b6b27 | 3 | {
"blob_id": "1b45b534bbe67819795c872d7871166d051b6b27",
"branch_name": "refs/heads/master",
"committer_date": 1526857263000,
"content_id": "83612026052a4064c281ae3bf5c7718a2d8d001b",
"detected_licenses": [
"MIT"
],
"directory_id": "f0a935d0ec6febe9d5480ecc5c3bd7c990db9d29",
"extension": "py",
"fi... | 2.875 | stackv2 | import sqlite3
import flask
import jinja2
import sys
import json
app = flask.Flask(__name__)
class Product:
def __init__(self, prod_id):
conn = sqlite3.connect('product.db')
c = conn.cursor()
statement = "SELECT * FROM product WHERE product.product_id = '{}';".format(prod_id)... | 76 | 26.22 | 94 | 14 | 486 | python | [{"finding_id": "codeql_py/flask-debug_c4a8bcf2a0692379_302af64b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-089"
] | [
"py/flask-debug",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This SQL query depends on a [user-provided value](1)."
] | [
75,
16
] | [
null,
null
] | [
5,
19
] | [
35,
28
] | |
2024-11-19T03:44:26.877728+00:00 | 1,581,333,533,000 | 12d2fdda0e98c0ce295ded06f75391d2be28fa72 | 3 | {
"blob_id": "12d2fdda0e98c0ce295ded06f75391d2be28fa72",
"branch_name": "refs/heads/master",
"committer_date": 1581333533000,
"content_id": "75c0072b82c4cac725a7cdc239fd8b5be5556625",
"detected_licenses": [
"MIT"
],
"directory_id": "3bf3eb0ddd454f9afa6728d5dee28e04ae2e104e",
"extension": "py",
"fi... | 2.78125 | stackv2 | import boto3
import paramiko
import time
import uuid
import datetime
import os
import xbow
class ConnectedInstance(object):
""" An Instance you can talk to"""
def __init__(self, instance, username=None, key_filename=None):
"""
Create a ConnectedInstance.
Args:
instance (bo... | 298 | 37.43 | 157 | 18 | 2,287 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_5d1e56315bf35610_61f0c47f", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation",
"py/paramiko-missing-host-key-validation"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
38,
220
] | [
null,
null
] | [
9,
5
] | [
77,
68
] | |
2024-11-19T01:44:09.158528+00:00 | 1,579,221,197,000 | d9e9068fe69cc2d5194743a94197ccec11f5e783 | 3 | {
"blob_id": "d9e9068fe69cc2d5194743a94197ccec11f5e783",
"branch_name": "refs/heads/master",
"committer_date": 1579221197000,
"content_id": "acdca10a045aec326c92a1ef1bcd67f693469ad5",
"detected_licenses": [
"MIT"
],
"directory_id": "e47e807fe01f0bbfc00bc0f008d18766eb8d4c0c",
"extension": "py",
"fi... | 2.671875 | stackv2 | #!/usr/bin/python
import argparse
import json
import re
import readline
import requests
import sys
import time
cmdlist = ["exit", "help", "dump_old", "dump_new", "postgresqli", "mysqli", "mssqli", "nosqli", "mutation", "edges", "node", "$regex", "$ne", "__schema"]
def auto_completer(text, state):
options = [x fo... | 62 | 39.53 | 179 | 15 | 676 | python | [{"finding_id": "codeql_py/request-without-cert-validation_d43dd328124fa4c9_cd8edfeb", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
33,
38
] | [
null,
null
] | [
13,
13
] | [
73,
90
] | |
2024-11-19T02:57:56.965738+00:00 | 1,610,952,174,000 | 4962089b4b5cb8ece1b9bf85f7ed15eaa7d9a574 | 3 | {
"blob_id": "4962089b4b5cb8ece1b9bf85f7ed15eaa7d9a574",
"branch_name": "refs/heads/main",
"committer_date": 1610952174000,
"content_id": "163cc0678a911ba7ca34dd1bd9945ebff006921a",
"detected_licenses": [
"MIT"
],
"directory_id": "ee229768cb61e1c303d601431bf71861533a1038",
"extension": "py",
"file... | 3.0625 | stackv2 | #Importing all the packages
import math
import json
import statistics
import time
# Asking user to select for modes
print("===Welcome to Hospital Management===")
print("Select your login option.")
print("★ Admin")
print("★ Doctor")
print("★ Patient")
print("====================================")
# Login Function
wor... | 167 | 25.11 | 125 | 13 | 1,099 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4250096d86d671c5_6a18a597", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
142
] | [
null
] | [
90
] | [
105
] | |
2024-11-19T02:57:57.544256+00:00 | 1,628,795,358,000 | f690b3cd3b2a99926963604c4e00f2eea3cdb584 | 3 | {
"blob_id": "f690b3cd3b2a99926963604c4e00f2eea3cdb584",
"branch_name": "refs/heads/main",
"committer_date": 1628795358000,
"content_id": "25d3300205169361723967775be68663e49b3866",
"detected_licenses": [
"MIT"
],
"directory_id": "e63c2b260a8dbc2a61243761f7c8e41a474dcf88",
"extension": "py",
"file... | 2.53125 | stackv2 | import os, csv, io
from flask import Flask
from flask import request, redirect, url_for
from werkzeug.utils import secure_filename
from csv_test import *
# UPLOAD_FOLDER = '/home/pi/flaskproject/hackthehack/uploads'
app = Flask(__name__)
# app.config['UPLOAD_FOLDER'] = UPLOAD_FOLDER
def allowed_file(filename):
r... | 46 | 28.67 | 72 | 18 | 337 | python | [{"finding_id": "codeql_py/url-redirection_9abbc39990dc7daa_c39981c9", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
24,
29
] | [
null,
null
] | [
20,
20
] | [
31,
31
] | |
2024-11-19T03:22:41.698590+00:00 | 1,580,625,927,000 | 61e98a7921095a8567bc4d223404ec7929439439 | 2 | {
"blob_id": "61e98a7921095a8567bc4d223404ec7929439439",
"branch_name": "refs/heads/master",
"committer_date": 1580625927000,
"content_id": "2d83364df011411eb319f847688c16e9858f4ecc",
"detected_licenses": [
"MIT"
],
"directory_id": "08d54bd3934dbbd6ae28dbf77833c53733169ca1",
"extension": "py",
"fi... | 2.359375 | stackv2 | import json
import os
import typing as t
from urllib.parse import urljoin
from Cryptodome.Hash import SHA1
from Cryptodome.PublicKey import RSA
from Cryptodome.Signature import PKCS1_v1_5
from requests import Response, request
def get_url(path: str) -> str:
return urljoin(os.environ.get("BASE_URL", ""), path)
... | 49 | 28.71 | 78 | 12 | 376 | python | [{"finding_id": "codeql_py/weak-crypto-key_2d4efd67ab34375c_e86be250", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
20
] | [
null
] | [
11
] | [
49
] | |
2024-11-19T03:22:59.047973+00:00 | 1,609,960,024,000 | 86beaf7396dba944c719c95cc963921bb0c393b4 | 2 | {
"blob_id": "86beaf7396dba944c719c95cc963921bb0c393b4",
"branch_name": "refs/heads/master",
"committer_date": 1609960024000,
"content_id": "0b5f02f2b4138084c68d64e477822a03e742a7cf",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9a167f56c823a4d5b8a63a5139dc68fa141b539a",
"extension": "py"... | 2.46875 | stackv2 | # Copyright 2020 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the License);
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, sof... | 113 | 26.86 | 80 | 9 | 747 | python | [{"finding_id": "codeql_py/redos_30d4076846fe6d44_6dbc0c46", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'A_' and containing many repetitio... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'A_' and containing many repetitions of '_'."
] | [
33
] | [
null
] | [
58
] | [
60
] | |
2024-11-19T03:44:11.351560+00:00 | 1,619,462,815,000 | 7144289b9e9b6f23e908982c39458bae5c092e53 | 3 | {
"blob_id": "7144289b9e9b6f23e908982c39458bae5c092e53",
"branch_name": "refs/heads/master",
"committer_date": 1619462815000,
"content_id": "6ac73944379d0ce71302e106c15276cd77b6223d",
"detected_licenses": [
"MIT"
],
"directory_id": "bfff7f7aee7c4cb87854b159f1b79a897678f6a9",
"extension": "py",
"fi... | 3.0625 | stackv2 | import random as rn
import string
from enum import Enum
import sys
import os
from PIL import Image, ImageDraw, ImageFont
class OutOfRange(Exception):
pass
class Utils:
def exit(self):
return sys.exit()
def clear(self):
os.system("cls" if os.name == "nt" else "clear")
class Picker:
... | 267 | 29.72 | 122 | 20 | 1,780 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9e88cf3b86516a2a_b26d01e7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
227
] | [
null
] | [
15
] | [
67
] | |
2024-11-19T01:34:43.959400+00:00 | 1,540,810,469,000 | 87ad1ca99bdb79fda49af2c4717e9019e62f7c2c | 2 | {
"blob_id": "87ad1ca99bdb79fda49af2c4717e9019e62f7c2c",
"branch_name": "refs/heads/master",
"committer_date": 1540810469000,
"content_id": "2382bbf9601c9299481e2d428cf6fa8c76d249c8",
"detected_licenses": [
"MIT"
],
"directory_id": "b36a6a0cbd53e420129615f6b1576e1f56169c63",
"extension": "py",
"fi... | 2.4375 | stackv2 | # coding=utf-8
import logging
import datetime
import re
from collections import defaultdict, OrderedDict
from copy import copy
import requests
from .models import Route, DataProviderUrl,\
DataProviderTypes as p_types, RouteTypes, Point, Platform, Directions, RoutePoint, RouteWeekDimension, GeoDirections, \
... | 436 | 28.66 | 123 | 24 | 2,760 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b0d3678194f010a1_1b7d7136", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.",
"This expression logs [sensitive data (p... | [
244,
253
] | [
null,
null
] | [
25,
32
] | [
67,
83
] | |
2024-11-19T01:34:53.548542+00:00 | 1,452,949,877,000 | 2d6b67bd2e53489de4babf72bb7944482b45ceec | 3 | {
"blob_id": "2d6b67bd2e53489de4babf72bb7944482b45ceec",
"branch_name": "refs/heads/master",
"committer_date": 1452950113000,
"content_id": "980e24f41564cb294a327fa9c8026fda8acb4a7d",
"detected_licenses": [
"MIT"
],
"directory_id": "1d9a5fc68bdae20c95a6239cf9db84acc5417cbb",
"extension": "py",
"fi... | 2.53125 | stackv2 | #! /usr/bin/env python3
import cherrypy
import os
import configparser
import json
from database import Database
from jinja2 import Environment, FileSystemLoader
class Server():
'''
Server Configuration:
comic_url -> Base URL specified in server.conf
transcript_url -> Transcipt URL specifie... | 134 | 32.66 | 79 | 18 | 954 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3c859b96dcdc697c_78b77563", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
111
] | [
null
] | [
11
] | [
51
] | |
2024-11-19T01:35:09.095186+00:00 | 1,421,765,532,000 | 139d8713ba09005e9ec374ab5587191e324c88cf | 2 | {
"blob_id": "139d8713ba09005e9ec374ab5587191e324c88cf",
"branch_name": "refs/heads/master",
"committer_date": 1421765532000,
"content_id": "2dadecd3f50fa883ae9c0303f6135bcbb973ab5a",
"detected_licenses": [
"MIT"
],
"directory_id": "a65208db8be9970ac8adab4167687589a6564808",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
'''URL handlers'''
import tornado.web
from tornado.options import options
import os
from io import BytesIO
import model
import plist
def get_manifest_url(identifier):
'''Get manifest url'''
url_format = 'https://{}/manifest/{}.plist'
return url_format.form... | 122 | 23.78 | 74 | 14 | 653 | python | [{"finding_id": "codeql_py/reflective-xss_50f5db7ea1866a0a_340e40e2", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-022"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
54,
80,
87
] | [
null,
null,
null
] | [
24,
24,
23
] | [
70,
71,
47
] | |
2024-11-19T01:55:44.672957+00:00 | 1,632,582,877,000 | 6d8dc175541eded1fe5183c9ea4e5d768cd77831 | 2 | {
"blob_id": "6d8dc175541eded1fe5183c9ea4e5d768cd77831",
"branch_name": "refs/heads/main",
"committer_date": 1632582877000,
"content_id": "dd2f67c4b2e4896dfc0df22b1035493837c2b9d6",
"detected_licenses": [
"MIT"
],
"directory_id": "939da916db5e9e4b6aa417ae5ecf2f387dfe686e",
"extension": "py",
"file... | 2.421875 | stackv2 | from datetime import datetime, timedelta, date
import re
import aiohttp
from async_timeout import timeout
import logging
import json
logger = logging.getLogger(__name__)
from voluptuous import Optional
BASEURL="https://www.alphaess.com/api"
HEADER = {
"Content-Type": "application/json",
"Connection": "keep-... | 241 | 34.6 | 134 | 25 | 1,607 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bf883d588d277ef6_4df28d99", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
40
] | [
null
] | [
87
] | [
95
] | |
2024-11-19T02:17:16.046439+00:00 | 1,507,175,842,000 | 546ec4b20566ab46aa9a582fee926fb188b5c8ee | 3 | {
"blob_id": "546ec4b20566ab46aa9a582fee926fb188b5c8ee",
"branch_name": "refs/heads/master",
"committer_date": 1507175842000,
"content_id": "e32346ab761d7db0ece3b766f2a8f1ba781a642a",
"detected_licenses": [
"MIT"
],
"directory_id": "1e8bc69a1c308cba736991231c2e536ad0d35832",
"extension": "py",
"fi... | 2.796875 | stackv2 | from collections import defaultdict
import random
from tqdm import tqdm
random.seed(2324)
kb = defaultdict(list)
id2str = defaultdict(str)
def readFB(filename):
print("Reading file from 2M Freebase")
fin = open(filename)
lineid = 0
for line in tqdm(fin.readlines()):
linesplit = line.strip().s... | 130 | 33.88 | 133 | 21 | 1,098 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fbd0ccfb380b61ab_91442057", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.freebase.com](1) may be at an arbitrary position i... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [www.freebase.com](1) may be at an arbitrary position in the sanitized URL."
] | [
44
] | [
null
] | [
8
] | [
45
] | |
2024-11-19T02:17:35.931095+00:00 | 1,445,352,847,000 | 2b5c44253f0ea1ab1e0bdcec111f6fe14904fb24 | 2 | {
"blob_id": "2b5c44253f0ea1ab1e0bdcec111f6fe14904fb24",
"branch_name": "refs/heads/master",
"committer_date": 1445352847000,
"content_id": "d6a14283b6dd52776623d522bcccf01f1f44987b",
"detected_licenses": [
"MIT"
],
"directory_id": "cc58a89d909fc205a8c9863092da89d1ac635f9f",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python
from flask import Flask
from flask.ext import restful
from flask import request
from flask.ext.cors import CORS
import pandas as pd
import sqlite3
import os
currentpath = os.getcwd()
conn = sqlite3.connect(currentpath+'/example.db')
app = Flask("sqlproxy")
api = restful.Api(app)
cors = CORS(app)... | 35 | 25.46 | 75 | 14 | 223 | python | [{"finding_id": "codeql_py/sql-injection_a679a3bf895cd61d_288250bf", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 2 | true | [
"CWE-089",
"CWE-089"
] | [
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
21,
28
] | [
null,
null
] | [
36,
36
] | [
41,
41
] | |
2024-11-19T02:18:06.630666+00:00 | 1,627,985,363,000 | 4a4a04f322608e206b6ccf3b375ea4339ce225c5 | 2 | {
"blob_id": "4a4a04f322608e206b6ccf3b375ea4339ce225c5",
"branch_name": "refs/heads/main",
"committer_date": 1627985363000,
"content_id": "b9d293bbd9121bdf4a8770433dbaa1bc95eead21",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "78e3a2a69ea889f83dcafa05050656d7f68e2cfc",
"extension": "py",
... | 2.359375 | stackv2 | import ssl
from django.shortcuts import render
from django.http import HttpResponse, JsonResponse
from django.views.decorators.csrf import csrf_exempt
from django.conf import settings
import json
import os
import requests
import yaml
from ephem import *
from datetime import datetime, timedelta
import datetime
from wea... | 263 | 37.84 | 142 | 18 | 2,392 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f904459e1d68bf62_71322e56", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
35,
52,
69
] | [
null,
null,
null
] | [
22,
18,
17
] | [
65,
61,
48
] | |
2024-11-19T02:18:21.923949+00:00 | 1,567,025,889,000 | 36629484783a4e2652dbdbda4c59cc993cf1cfb6 | 2 | {
"blob_id": "36629484783a4e2652dbdbda4c59cc993cf1cfb6",
"branch_name": "refs/heads/master",
"committer_date": 1567026152000,
"content_id": "4c554ce1cd462b7bab4bddd50b412ec34bb89a30",
"detected_licenses": [
"MIT"
],
"directory_id": "2059cbbc305dbb3816b67a5a6d756ae6c4bc4630",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""Core functionality."""
import os
import sys
import argparse
import importlib
from pkg_resources import require, resource_filename, resource_listdir
import cclib
from jinja2 import Environment, FileSystemLoader, TemplateNotFound
__version__ = require(__name__)[0].ver... | 344 | 28.11 | 93 | 21 | 2,397 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ffdec563bb5196cd_afe5a59f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
330
] | [
332
] | [
17
] | [
6
] | |
2024-11-19T02:30:10.135141+00:00 | 1,446,797,416,000 | 34621f486d44ce1bbc914f061ffa85f0627ae1f2 | 3 | {
"blob_id": "34621f486d44ce1bbc914f061ffa85f0627ae1f2",
"branch_name": "refs/heads/master",
"committer_date": 1446797416000,
"content_id": "93a3a8f043d8accd0d4fd5a8694cbebe84d4ac55",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "19f62f881c042a7b34fa9cd5af7466bd32680f57",
"extension": "py"... | 2.96875 | stackv2 | """
generate-cdc-pyspark.py
generate-cdc-script.py is a Python module which reads dataset config from a YAML document (see config.yaml in this project)
, and then creates a Spark program in either PigLatin or PySpark which compares incoming text based delimited datasets with current versions of the
same object stored... | 120 | 39.49 | 159 | 12 | 1,352 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2a2d14b926d1c669_0d93d0f6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
99
] | [
null
] | [
15
] | [
58
] | |
2024-11-19T02:30:35.001395+00:00 | 1,440,779,620,000 | d1a9efe926c0e48156cd74be032d5ad6d1be419a | 3 | {
"blob_id": "d1a9efe926c0e48156cd74be032d5ad6d1be419a",
"branch_name": "refs/heads/master",
"committer_date": 1440779620000,
"content_id": "257eb34dd2d85fb20a7b8b5f8f543f79a719bb6f",
"detected_licenses": [
"MIT"
],
"directory_id": "2c4e01e80a5733d800f89afa457d573d69352e7e",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
import sys
import re
import MDToLatexTemplates as Templates
import subprocess
def match(string, regex):
return True if re.match(re.compile(regex), string) else False
def ConvertMetadata(text):
metadata_regex = r'^---\n(.*\n)+---$'
if match(text, metadata_regex):
metadat... | 145 | 26.61 | 101 | 21 | 1,187 | python | [{"finding_id": "codeql_py/redos_c2abad5d5ef1ad5c_0e05d29e", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '|' and containing many repetition... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '|' and containing many repetitions of '|'."
] | [
47
] | [
null
] | [
22
] | [
24
] | |
2024-11-19T02:31:15.717506+00:00 | 1,415,082,636,000 | 7c1cbd00834a71219493fbfa2b7fa21d8e7b77f6 | 2 | {
"blob_id": "7c1cbd00834a71219493fbfa2b7fa21d8e7b77f6",
"branch_name": "refs/heads/master",
"committer_date": 1415082636000,
"content_id": "fcead2abdda747496f103ea435b9b7556b95ff86",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3fdc7d0ea9c526b00e55a0ba6f97e2b15eb6e6ca",
"extension": "py"... | 2.34375 | stackv2 | from datetime import datetime
import flask
import json
import requests
from sharebears import app
import authn_google
import authz
import db
from db import PaginatedSequence
import filters
from github_client import GitHubClient
from post_processor import PostProcessor
from renderable_item import RenderablePost
import... | 200 | 29.84 | 109 | 14 | 1,445 | python | [{"finding_id": "codeql_py/url-redirection_e5305a19e42f3f3a_dc943f59", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
172
] | [
null
] | [
25
] | [
33
] | |
2024-11-19T02:41:54.942004+00:00 | 1,574,644,947,000 | 92721c214a8d4eb60b4f21269acc78c4211951c4 | 3 | {
"blob_id": "92721c214a8d4eb60b4f21269acc78c4211951c4",
"branch_name": "refs/heads/master",
"committer_date": 1574644947000,
"content_id": "9f65ed27b69e4e86a1be79ef37824e92c7957031",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2462e0d46b4ce8639dda517a4eb3edab59adbaf0",
"extension": "py"... | 2.828125 | stackv2 | #!/usr/bin/env python
"""
This is an example application of how to make use of Bottle to provide
sub-request authentication with NGINX, particularly with a Gitea
SQLite3 database.
Copyright (c) 2019, Robert Cope/Cope Systems.
License: Apache (see LICENSE file)
"""
from vendor import bottle
from sqlite3 import dbapi2 a... | 170 | 27.45 | 86 | 18 | 1,068 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_904d65f02e2c51a1_ead69d71", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
71
] | [
73
] | [
13
] | [
37
] | |
2024-11-19T02:41:58.231905+00:00 | 1,565,692,352,000 | ed10432af0154549d231b5ba594a36ebc8666419 | 3 | {
"blob_id": "ed10432af0154549d231b5ba594a36ebc8666419",
"branch_name": "refs/heads/master",
"committer_date": 1565692352000,
"content_id": "c270f3902e7c027f776d7dc032f94848f0276528",
"detected_licenses": [
"MIT"
],
"directory_id": "cb936481b04270d1574a355ecef016dc2fd0df28",
"extension": "py",
"fi... | 2.625 | stackv2 | from flask import render_template,redirect,url_for,flash,request
from . import auth
from ..models import User
from .forms import RegistrationForm,LoginForm
from .. import db
from flask_login import login_user,logout_user,login_required
@auth.route('/create_account', methods = ['GET','POST'])
def register():
"""
... | 44 | 31.89 | 104 | 16 | 306 | python | [{"finding_id": "codeql_py/url-redirection_e7d11657af248fa2_519a9731", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
33
] | [
null
] | [
29
] | [
78
] | |
2024-11-19T02:42:24.284727+00:00 | 1,688,589,423,000 | 156feb6611a3258f3b013f3b1fe9e144dda47600 | 3 | {
"blob_id": "156feb6611a3258f3b013f3b1fe9e144dda47600",
"branch_name": "refs/heads/master",
"committer_date": 1688589423000,
"content_id": "f9bbcc5cd89a6e83e2dceb05b64c636aab081340",
"detected_licenses": [
"MIT"
],
"directory_id": "fd5c2d6e8a334977cda58d4513eb3385b431a13a",
"extension": "py",
"fi... | 2.6875 | stackv2 | from jinja2 import Environment, FileSystemLoader
import unicodedata
import psycopg2
import re
import os.path
EXCLUDED_SUMMARY_LEVELS = ['190'] # if they don't work, put 'em here
def write_profile_sitemaps(output_dir,db_connect_string='postgresql://census:censuspassword@localhost:5432/census'):
''' Builds sitemap ... | 167 | 34.87 | 137 | 25 | 1,505 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3825b6c5a093e462_17f73e7d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
78
] | [
null
] | [
11
] | [
54
] | |
2024-11-19T02:50:45.578667+00:00 | 1,542,109,373,000 | 8aa9cc10ba083ba52d353bf3e24a3a71e8cecc31 | 3 | {
"blob_id": "8aa9cc10ba083ba52d353bf3e24a3a71e8cecc31",
"branch_name": "refs/heads/master",
"committer_date": 1542109373000,
"content_id": "6920907d4ad6e19292d37508bad75f1c1e47fc9d",
"detected_licenses": [
"MIT"
],
"directory_id": "17e16fbd0d8f2286a4650ef7afab5436b110dcaa",
"extension": "py",
"fi... | 2.671875 | stackv2 | from flask import Flask, render_template, request, session
from flask_session import Session
import sys
import datetime
app = Flask(__name__)
app.config["SESSION_PERMANENT"] = False
app.config["SESSION_TYPE"] = "filesystem"
Session(app)
# notes = [] # global variable, not a good implementation
@app.route("/")
def... | 81 | 22.23 | 67 | 14 | 451 | python | [{"finding_id": "codeql_py/reflective-xss_e2c72b9da22246fe_2e6626b9", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
26
] | [
null
] | [
12
] | [
39
] | |
2024-11-18T18:05:57.525880+00:00 | 1,553,022,348,000 | 8a43408b665d5577742802e15b616a5b207f4c3f | 2 | {
"blob_id": "8a43408b665d5577742802e15b616a5b207f4c3f",
"branch_name": "refs/heads/master",
"committer_date": 1553022348000,
"content_id": "501f373dd525cad2aabefca061a4abfce3ceeff8",
"detected_licenses": [
"MIT"
],
"directory_id": "2bf629f8314314aac716841c07a4ef096499171e",
"extension": "py",
"fi... | 2.5 | stackv2 | # import necessary libraries
# import pandas as pd
# import numpy as np
from sqlalchemy.ext.automap import automap_base
from sqlalchemy.orm import Session
from sqlalchemy import create_engine, func
from sqlalchemy import MetaData
from sqlalchemy import inspect
from sqlalchemy import Column, Integer, String, Float
from... | 116 | 27.39 | 111 | 14 | 766 | python | [{"finding_id": "codeql_py/sql-injection_d2b3e3d1b42ad2f8_8f2af73d", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
100
] | [
null
] | [
70
] | [
73
] | |
2024-11-18T18:06:02.149314+00:00 | 1,557,370,014,000 | b50af62a121f88e1c0449733076c412decf0a06f | 2 | {
"blob_id": "b50af62a121f88e1c0449733076c412decf0a06f",
"branch_name": "refs/heads/master",
"committer_date": 1557370014000,
"content_id": "0b15b27d39f4ca749956b29210a69338690ba153",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c701117930e431c6c29a7c4d39eee31451babc83",
"extension": "py"... | 2.4375 | stackv2 | import asyncio
from datetime import datetime as dt
import discord
from discord.ext import commands
from gw2api import Gw2API, requestGW2AccountData
from cogs.utils.checks import embed_perms
from database import database as db
from utils.api import *
with open('./database/db_settings.json') as json_file:
config_da... | 294 | 47.56 | 129 | 21 | 3,250 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cefaecc01d1ad30e_56ed927a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
291
] | [
null
] | [
23
] | [
29
] | |
2024-11-18T18:16:09.556468+00:00 | 1,624,305,752,000 | 575fc5ccae7b52c58bcbb51c76c0bd545a0dda8c | 2 | {
"blob_id": "575fc5ccae7b52c58bcbb51c76c0bd545a0dda8c",
"branch_name": "refs/heads/main",
"committer_date": 1624305752000,
"content_id": "4f6763b80eb7206275dafe36672a2f3bc4bbee68",
"detected_licenses": [
"MIT"
],
"directory_id": "775ef6f866f774152b8b4e1bd14b132ab10d2933",
"extension": "py",
"file... | 2.328125 | stackv2 | # -*- coding: utf-8 -*-
#!/usr/bin/python3.9
################################################################################
## Crypto tools and control flows for hacking - Vintage 2021 Python 3.9 ##
################################################################################
# Licenced under... | 420 | 38 | 153 | 17 | 3,618 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6080f285a6f41591_688617f0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally ... | [
322,
328,
334
] | [
null,
null,
null
] | [
21,
21,
21
] | [
29,
29,
29
] | |
2024-11-18T19:31:08.675992+00:00 | 1,548,738,117,000 | c6d2be81fb784772c4bdd1d289cd1f1890626415 | 3 | {
"blob_id": "c6d2be81fb784772c4bdd1d289cd1f1890626415",
"branch_name": "refs/heads/master",
"committer_date": 1548738117000,
"content_id": "c2cb0fa6e7af177b46e1768ad5682005e8131de5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "210e1cffcd8a705c2a8a1485ed5532b9169f5d10",
"extension": "py"... | 2.515625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
Convenience utility functions for whoville, not really intended for external use
"""
from __future__ import absolute_import, unicode_literals
import logging
import json
import time
import copy
import base64
import six
from six.moves import reduce
import os
import ruam... | 421 | 34.31 | 88 | 20 | 3,436 | python | [{"finding_id": "codeql_py/request-without-cert-validation_fbecdac4c08449a7_bb25d478", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
205
] | [
null
] | [
20
] | [
61
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.