added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T02:10:32.075588+00:00 | 1,444,422,043,000 | 85c02d618eefde45ef1d54092bf2ae1d8641e555 | 3 | {
"blob_id": "85c02d618eefde45ef1d54092bf2ae1d8641e555",
"branch_name": "refs/heads/master",
"committer_date": 1444422043000,
"content_id": "f8442f00b4f1f7c1c03bfbe4d0afa8ca065dbe51",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e21d8158cc647096f2cd9e38e6760669ec8f919c",
"extension": "py"... | 2.703125 | stackv2 | # quick and simple extraction of tor nodes from directory
# with insert into QRadar reference collections.
#
# you'll need the TorCtl python package
# from https://gitweb.torproject.org/pytorctl.git/
# and you'll need to have tor installed on the same
# host where this script runs.
# in the config file (tor_referenc... | 131 | 38.11 | 119 | 18 | 1,279 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b66afee6ca1646af_2f53d40d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
58,
60,
72
] | [
null,
null,
null
] | [
20,
24,
20
] | [
81,
84,
88
] | |
2024-11-19T02:10:38.432003+00:00 | 1,538,641,048,000 | a330c44db795e6fdd17745a7f1ca1218f147c155 | 2 | {
"blob_id": "a330c44db795e6fdd17745a7f1ca1218f147c155",
"branch_name": "refs/heads/master",
"committer_date": 1538641048000,
"content_id": "f913905a34d33c18f3d0aef8c90f545c4ed96c1b",
"detected_licenses": [
"MIT"
],
"directory_id": "57763770d98626025a0596638da17e0ef1a6c831",
"extension": "py",
"fi... | 2.484375 | stackv2 | """
Heroku app for GNIB and VISA appointments
Also handles Facebook Messenger bot GVisaBot (same page)
Author: Harshvardhan Pandit
See blog posts at https://harshp.com/dev/projects/gnib-appointments/
The framework used here is bottle.
It is small, it is light, it gets the job done.
There are two parts being handled ... | 342 | 31.7 | 79 | 19 | 2,757 | python | [{"finding_id": "codeql_py/reflective-xss_371aa6b56147a177_f7700eb6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 5 | true | [
"CWE-079",
"CWE-079",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)... | [
254,
331,
107,
170,
217
] | [
null,
null,
110,
173,
222
] | [
16,
12,
16,
16,
20
] | [
46,
26,
54,
54,
62
] | |
2024-11-19T02:10:45.019446+00:00 | 1,546,093,689,000 | 64a37ad221c3346766f2c56a4f98da093a3cea64 | 2 | {
"blob_id": "64a37ad221c3346766f2c56a4f98da093a3cea64",
"branch_name": "refs/heads/master",
"committer_date": 1546093689000,
"content_id": "34d114db6ce71d2749eb2d621f313fb28102b7be",
"detected_licenses": [
"MIT"
],
"directory_id": "ebb5955543f6c09d7ee12b8f58d824604ef4606e",
"extension": "py",
"fi... | 2.421875 | stackv2 | from flask import Flask, request, make_response
from server_config import *
import random
import hashlib
import time
import pymysql
# session表
session = {}
session_time = {}
MAX_TIME = 10000
# 维护session表
def check_session_time():
for key, value in session_time.items():
now = int(time.time())
if (no... | 275 | 39.55 | 134 | 18 | 2,493 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_72f49acef06a211d_5008a324", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 9 | true | [
"CWE-327",
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089"
] | [
"py/weak-sensitive-data-hashing",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on ... | [
55,
83,
88,
111,
122,
141,
153,
190,
203
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
24,
23,
24,
23,
28,
23,
28,
23,
28
] | [
77,
26,
71,
26,
31,
26,
31,
26,
31
] | |
2024-11-19T02:45:18.482932+00:00 | 1,616,713,997,000 | 8af8db3a208c3266664953cf50f94ac1084137f7 | 3 | {
"blob_id": "8af8db3a208c3266664953cf50f94ac1084137f7",
"branch_name": "refs/heads/master",
"committer_date": 1616713997000,
"content_id": "ae19f21eb50ea34ca625f3df6d2f72a3808c00d7",
"detected_licenses": [
"MIT"
],
"directory_id": "b9b3e4fbf1c160e5f4e19c6088a33bfba68ecd3e",
"extension": "py",
"fi... | 2.75 | stackv2 | import hashlib
from json import dumps, dump
from typing import List, Dict, Tuple
from pathlib import Path
from os import makedirs, listdir
from copy import deepcopy
from yaml import load
from markdown import markdown
from emoji import emojize
from jinja2 import Template
def get_card_files(card_dir: str = "./cards") ... | 127 | 29.68 | 84 | 16 | 963 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3bea6a291b54da40_e546a5f1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
67,
73
] | [
null,
null
] | [
31,
31
] | [
77,
76
] | |
2024-11-19T03:12:07.064966+00:00 | 1,602,081,962,000 | 1f1f9a44a896abea7874bf40832f4118ea51ac99 | 2 | {
"blob_id": "1f1f9a44a896abea7874bf40832f4118ea51ac99",
"branch_name": "refs/heads/master",
"committer_date": 1602083645000,
"content_id": "adb4e201909f1c2be14967dcfc5e01dccd161997",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9f2b60915d0b14c951716d3967e9911729e60334",
"extension": "py"... | 2.359375 | stackv2 | #!/usr/bin/env python3
import waiting
import requests
import utils
import deployment_options
SERVICE = "assisted-service"
TIMEOUT = 60 * 15
REQUEST_TIMEOUT = 2
SLEEP = 3
def handle_arguments():
return deployment_options.load_deployment_options()
def wait_for_request(url: str) -> bool:
res = requests.get(... | 42 | 27.52 | 116 | 11 | 245 | python | [{"finding_id": "codeql_py/request-without-cert-validation_af874e2f75fc9b3f_bede3408", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
20
] | [
null
] | [
11
] | [
67
] | |
2024-11-19T03:12:14.847579+00:00 | 1,541,671,468,000 | f93fdb5605364a3e18f2c750c8bbacc4a0ddd2f6 | 3 | {
"blob_id": "f93fdb5605364a3e18f2c750c8bbacc4a0ddd2f6",
"branch_name": "refs/heads/master",
"committer_date": 1541671468000,
"content_id": "e4661907f634c617ec74e652ff5dd9370ab90009",
"detected_licenses": [
"MIT"
],
"directory_id": "8b1b1a9d8ed82d9fca94a6b311b57c9b5a736f91",
"extension": "py",
"fi... | 2.546875 | stackv2 | #coding=utf8
import requests
import os
'''
通过mysql的配置文件得知了数据的存储目录。通过直接读取数据库文件可以获取到数据库内的信息。
'''
linux_path_from_root = '''/etc/shadow
/etc/sysconfig/network-scripts/ifcfg-eth0
/etc/hosts
/etc/my.cnf
/proc/self/cmdline
/proc/self/environ
/proc/verison
/proc/self/cwd
/proc/net/arp
/proc/sched_debug
/proc/self/fd/0
/proc... | 76 | 19.92 | 106 | 18 | 473 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5f3daec27ec0d6b6_17e81100", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
58
] | [
null
] | [
18
] | [
34
] | |
2024-11-19T01:57:29.187954+00:00 | 1,441,983,510,000 | b06be6dd28230c27e54510ef97c3e6fc3e7d1820 | 3 | {
"blob_id": "b06be6dd28230c27e54510ef97c3e6fc3e7d1820",
"branch_name": "refs/heads/master",
"committer_date": 1441983510000,
"content_id": "9eccebaad1d313e56dc6fc4d9a4d344ac8dfd1bc",
"detected_licenses": [
"MIT"
],
"directory_id": "245cdf87efb544823663503fb14dc515a2c67e2f",
"extension": "py",
"fi... | 2.703125 | stackv2 | """
CAS module for bottle
History :
Original module for Cherrypy developped by : James Macdonell and Marc Santoro
Bottle Adaptation : SnarkTurne
2013-08-27 : Typos corrections, bug correction in the TestCASAuth method
2013-07-16 : Converted to a real bottle plugin
2013-07-08 : Added redirection to the re... | 220 | 31.28 | 114 | 15 | 1,750 | python | [{"finding_id": "codeql_py/partial-ssrf_d4cd15b785c68aa5_74695739", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
185
] | [
null
] | [
27
] | [
73
] | |
2024-11-19T02:10:48.392749+00:00 | 1,571,469,991,000 | 4b65188f2ae75ddaedea170f1ac4bd9fced30800 | 3 | {
"blob_id": "4b65188f2ae75ddaedea170f1ac4bd9fced30800",
"branch_name": "refs/heads/master",
"committer_date": 1571469991000,
"content_id": "10c3cb2067c3fb110a77f61ad4c6ad462c5562e5",
"detected_licenses": [
"MIT"
],
"directory_id": "9795fe1532849a046895cfb0d4b359144ad575dd",
"extension": "py",
"fi... | 2.78125 | stackv2 | import re
from pprint import pprint
# comment_pattern = '\/comment(?:s)?(?:\/)?'
# comment_regex = re.compile(comment_pattern)
# url = 'http://boingboing.net/comments/feed'
# result = comment_regex.search(url)
# if result:
# print(result.string)
# r = comment_regex.sub('/', url)
# print(r)
bracketNameRegex = re... | 20 | 23.85 | 98 | 8 | 140 | python | [{"finding_id": "codeql_py/redos_3ff387ca114ed494_4491199d", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of 'a'.", "remediati... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of 'a'.",
"This part of the regular expression may cause exponential backtracking on strings starting with '(' and containing many repetitions of 'a'."
] | [
15,
15
] | [
null,
null
] | [
37,
63
] | [
40,
66
] | |
2024-11-19T02:11:01.601344+00:00 | 1,587,498,305,000 | eabb808ae7cb957d41d1ca434c3de0f63448716a | 2 | {
"blob_id": "eabb808ae7cb957d41d1ca434c3de0f63448716a",
"branch_name": "refs/heads/master",
"committer_date": 1587498305000,
"content_id": "b2eecafbf94570fca77f6f7b1a32cd1362a4dff5",
"detected_licenses": [
"MIT"
],
"directory_id": "1bec933de08a67007c1159c86231b9eed418898a",
"extension": "py",
"fi... | 2.40625 | stackv2 | from flask import request, make_response
import requests, json
from app import app
def ussd_proceed(response):
return "CON {}".format(response)
def ussd_stop(response):
return "END {}".format(response)
def get_pin():
response = "Welcome to HealthRadar\n"
response += "Enter Please enter PIN to veri... | 207 | 29.86 | 117 | 18 | 1,623 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8cb1acb966ea99ce_04346249", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-079"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
134,
151,
205
] | [
null,
null,
null
] | [
15,
15,
26
] | [
23,
22,
34
] | |
2024-11-19T02:11:20.329591+00:00 | 1,625,239,609,000 | 09d8bd86cef0d35253215bc52afaa57819655061 | 2 | {
"blob_id": "09d8bd86cef0d35253215bc52afaa57819655061",
"branch_name": "refs/heads/master",
"committer_date": 1625239609000,
"content_id": "b3ed6a1e01704a6f2454d25d6a06ba5aa27184f1",
"detected_licenses": [
"MIT"
],
"directory_id": "045717b393a584c855828b1c8ce89043bda283fd",
"extension": "py",
"fi... | 2.359375 | stackv2 | import asyncio
from bs4 import BeautifulSoup
import requests, re
from io import BytesIO
from PIL import Image
async def download_image(link):
return Image.open(BytesIO(requests.get(link).content)).convert("RGB")
async def parser_nuklir(nuklir):
try:
source=requests.get(f"https://nhentai.net/g/{nuklir}"... | 30 | 42.03 | 97 | 23 | 368 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_ff526c88437b7cd8_da644603", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'nhentai.net/galleries/', so it migh... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'nhentai.net/galleries/', so it might match more hosts than expected."
] | [
27
] | [
null
] | [
36
] | [
78
] | |
2024-11-19T02:11:40.748861+00:00 | 1,479,419,969,000 | bb90daa75c2861107f8a6245aed253045e09a5a8 | 3 | {
"blob_id": "bb90daa75c2861107f8a6245aed253045e09a5a8",
"branch_name": "refs/heads/master",
"committer_date": 1479340770000,
"content_id": "c0e128c55514692029153247a6b2331f8f21e092",
"detected_licenses": [
"MIT"
],
"directory_id": "8ead93f9e4555ef24a31ffa343e0e72d048813d5",
"extension": "py",
"fi... | 3.09375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""app.py: challenge #4"""
__author__ = "Carlan Calazans"
__copyright__ = "Copyright 2016, Carlan Calazans"
__credits__ = ["Carlan Calazans"]
__license__ = "MIT"
__version__ = "1.0.0"
__maintainer__ = "Carlan Calazans"
__email__ = "carlancalazans at gmail dot com"
__status... | 44 | 27.32 | 107 | 18 | 345 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e1ebd2b279d40374_56ea63d0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text."
] | [
44
] | [
null
] | [
8
] | [
52
] | |
2024-11-19T02:11:51.930322+00:00 | 1,420,837,889,000 | 933b021191a217cc2655077886519561140bc47d | 2 | {
"blob_id": "933b021191a217cc2655077886519561140bc47d",
"branch_name": "refs/heads/master",
"committer_date": 1420837889000,
"content_id": "01a3781a108e0fe68d69f926e53479cdebcdf0ba",
"detected_licenses": [
"MIT"
],
"directory_id": "79fdeda6e02e8ccd1cee877ed961a5ba05ec5364",
"extension": "py",
"fi... | 2.46875 | stackv2 | from procyon.starsystemmaker import math_helpers
import dna_helpers
import json
import world
import numpy
#-----------------------------------------
#TODO: Grandparents
#TODO: Nanny or Caretaker if ec > high
#TODO: What to do with education? Job?
#TODO: Create city
#TODO: Ranks or royalty
#TODO: Adoptions
#TODO: Same... | 183 | 41.22 | 176 | 23 | 1,807 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9805359efb53f05f_97fa9f42", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.\nThis expression logs [sensitive data (private)]... | [
177
] | [
null
] | [
15
] | [
18
] | |
2024-11-19T02:32:43.439586+00:00 | 1,283,452,776,000 | 03f1a017f48a66916a1e852038a230688dbb4e7a | 2 | {
"blob_id": "03f1a017f48a66916a1e852038a230688dbb4e7a",
"branch_name": "refs/heads/master",
"committer_date": 1283452776000,
"content_id": "835b4a80b59329cae1ceaef333cfb7613463c8ac",
"detected_licenses": [
"MIT"
],
"directory_id": "f65b780524278af066e8d1bc7021e57554768867",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/python
import urllib2
from BeautifulSoup import BeautifulSoup
import time
import re
import sys
import os
email_file = open("hos_email.txt", "w")
programNum = 0
foundPID = False
for line in sys.stdin:
email_file.write(line)
#print line
findProgram = re.search(r'^Subject: \[Hearts of Space Play... | 119 | 30.75 | 131 | 15 | 1,182 | python | [{"finding_id": "codeql_py/overly-permissive-file_9f3b3991d4d0484c_98c30f9f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
117
] | [
null
] | [
null
] | [
30
] | |
2024-11-19T02:33:00.708328+00:00 | 1,675,538,888,000 | 858c70688ba678e3ff06521819cb33410b681b5a | 2 | {
"blob_id": "858c70688ba678e3ff06521819cb33410b681b5a",
"branch_name": "refs/heads/master",
"committer_date": 1675538888000,
"content_id": "25894901f2a65279cd298f6f2ef1e0f3e3bacaf9",
"detected_licenses": [
"MIT"
],
"directory_id": "c3e2321d8fd78a345a04dd6bed68b0c04196c9d5",
"extension": "py",
"fi... | 2.40625 | stackv2 | import hashlib
import shortuuid
from django.conf import settings
from provider.constants import EXPIRE_DELTA, EXPIRE_DELTA_PUBLIC, EXPIRE_CODE_DELTA
from django.utils import timezone
def now():
return timezone.now()
def short_token():
"""
Generate a hash that can be used as an application identifier
... | 50 | 25.62 | 83 | 12 | 305 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d06f95b49b3f7bc4_753b182b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."... | 4 | true | [
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.",
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.",
"[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.",
"[Sensitive data (secret)](1) is used in a hashing alg... | [
17,
18,
26,
27
] | [
null,
null,
null,
null
] | [
25,
17,
25,
17
] | [
56,
51,
56,
51
] | |
2024-11-19T02:33:28.024043+00:00 | 1,556,031,284,000 | c8221523ad30b28bb9c318d7ca2a10e71f4af627 | 2 | {
"blob_id": "c8221523ad30b28bb9c318d7ca2a10e71f4af627",
"branch_name": "refs/heads/master",
"committer_date": 1556031284000,
"content_id": "83a1c16c6d2ebe75b1caea86e835df60bc970d13",
"detected_licenses": [
"MIT"
],
"directory_id": "3851c075c2571fa969fed49dc16fbab0d539c406",
"extension": "py",
"fi... | 2.421875 | stackv2 | # Work with Python 3.6
import logging
import discord
import datetime
from environs import Env
from commands import wiki
import logging
logger = logging.getLogger('discord')
logger.setLevel(logging.WARNING)
handler = logging.FileHandler(filename='discord.log', encoding='utf-8', mode='w')
handler.setFormatter(logging.... | 87 | 28.86 | 111 | 18 | 586 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_76a77648bd5c2dbe_a2848476", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [pastebin.com](1) may be at an arbitrary position in th... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [pastebin.com](1) may be at an arbitrary position in the sanitized URL."
] | [
44
] | [
null
] | [
57
] | [
90
] | |
2024-11-19T02:46:08.603462+00:00 | 1,502,165,950,000 | 3a20ac0833a94845efbe7d13562cd21b53c4acb6 | 3 | {
"blob_id": "3a20ac0833a94845efbe7d13562cd21b53c4acb6",
"branch_name": "refs/heads/master",
"committer_date": 1502165950000,
"content_id": "1ca7d16a185f73da4e7d7f8b4124ec78ac5653e3",
"detected_licenses": [
"MIT"
],
"directory_id": "f364efa2e49e0e61ed7cf616718f8dca4cee7755",
"extension": "py",
"fi... | 3.03125 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Fri Jul 28 23:31:15 2017
@author: jorge
"""
#%% libraries
import pandas as pd
import os
import numpy as np
import csv
import sys
import random
from time import gmtime, strftime
from os.path import expanduser
import math
#%% Clear terminal
os.system('clear')
#%% chance workdire... | 243 | 27.61 | 132 | 17 | 2,048 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e13b829801f3ada4_23b300ad", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
242
] | [
null
] | [
16
] | [
24
] | |
2024-11-19T02:46:15.931697+00:00 | 1,570,741,043,000 | d64b4786a0365897efea4fc786e660fd8cc37613 | 3 | {
"blob_id": "d64b4786a0365897efea4fc786e660fd8cc37613",
"branch_name": "refs/heads/master",
"committer_date": 1570741043000,
"content_id": "5cbb154fe75381e600ae89bef2dd0fae7bb79bbb",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "13381dab28b63e11abf7f4fccb6c29a66476b117",
"extension": "py"... | 2.53125 | stackv2 | from flask import Flask, request, make_response, jsonify, abort, render_template
from produce.fill_queue import publish_to_queue
import os
import logging
logging.basicConfig(level=logging.DEBUG)
app = Flask(__name__)
app.debug = True
@app.errorhandler(404)
def not_found(error):
return make_response(jsonify({'er... | 41 | 27.88 | 80 | 13 | 268 | python | [{"finding_id": "codeql_py/flask-debug_985889bb48f338a4_9392245b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-117"
] | [
"py/flask-debug",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1)."
] | [
41,
19
] | [
null,
null
] | [
5,
21
] | [
51,
28
] | |
2024-11-19T02:59:14.326400+00:00 | 1,387,065,358,000 | 452fd13b8f625a2b84c8192ec64b0b6d2749bbdb | 3 | {
"blob_id": "452fd13b8f625a2b84c8192ec64b0b6d2749bbdb",
"branch_name": "refs/heads/master",
"committer_date": 1387065358000,
"content_id": "bc0f2319b7edb3004e82d82b5ab6a524d0044c35",
"detected_licenses": [
"MIT"
],
"directory_id": "6c17fb8787b4bf3521795ae0c16e7fde6a7958d4",
"extension": "py",
"fi... | 3.25 | stackv2 | # -*- coding: utf-8 -*-
"""
.. module:: tone_sorter
:platform: Unix, Windows
:synopsis: Takes a CSV file containing Hanzi and Pinyin phrases annotated
with tones and sorts them in descending order. Phrases with
more syllables gets sorted after phrases with fewer. A phrase
... | 133 | 35.07 | 89 | 17 | 1,165 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_4fd9251e68f69fe1_a2bed20c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://lingomi.com](1) may be at an arbitrary position... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [http://lingomi.com](1) may be at an arbitrary position in the sanitized URL."
] | [
57
] | [
null
] | [
12
] | [
53
] | |
2024-11-19T02:59:26.512242+00:00 | 1,515,480,258,000 | bab0f8daa82c60372fbc4959f1cb76b011089a35 | 3 | {
"blob_id": "bab0f8daa82c60372fbc4959f1cb76b011089a35",
"branch_name": "refs/heads/master",
"committer_date": 1515480258000,
"content_id": "4a5c35d8d3e5dd270c3bc791478064512968a479",
"detected_licenses": [
"MIT"
],
"directory_id": "c030117985d5ed1fed2a7b16d839a5cf8cb89313",
"extension": "py",
"fi... | 2.515625 | stackv2 | # -*- coding:utf-8 -*-
from pathlib import Path
from datetime import date
import logging
import click
from jinja2 import Environment, FileSystemLoader
from git import Repo
from .cli import act, ROOT
Logger = logging.getLogger(__name__)
BASIC_PATH = 'content'
JINJA2_ENV = Environment(
loader=FileSystemLoader(str(... | 48 | 30.02 | 78 | 14 | 379 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_78bd04ba6d7aa102_ba756b44", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
14
] | [
16
] | [
14
] | [
2
] | |
2024-11-19T02:59:46.371273+00:00 | 1,616,598,138,000 | 0009fc5f0cac704bdf618b0b3e070acd277c4254 | 3 | {
"blob_id": "0009fc5f0cac704bdf618b0b3e070acd277c4254",
"branch_name": "refs/heads/master",
"committer_date": 1616598138000,
"content_id": "e36c51c50460b267bf7a87352f68b74e9d07218d",
"detected_licenses": [
"MIT"
],
"directory_id": "af330a4fc9ee17f5249c428a89dcaafb50c5f8f0",
"extension": "py",
"fi... | 2.578125 | stackv2 | """
Download the Dockerfile and dependency files to build locally or on device.
https://docs.microsoft.com/en-us/azure/machine-learning/how-to-deploy-and-where#generate-a-dockerfile-and-dependencies
"""
from azureml.core import Workspace
from azureml.core.model import Model
from azureml.core.model import InferenceConf... | 53 | 34.15 | 118 | 12 | 390 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3d9f2f07c531ecbd_d49e1883", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
38
] | [
null
] | [
24
] | [
36
] | |
2024-11-19T02:59:53.623451+00:00 | 1,634,497,865,000 | 4abe3ff0e994d87f3c70fbacc4b623a301d8a385 | 2 | {
"blob_id": "4abe3ff0e994d87f3c70fbacc4b623a301d8a385",
"branch_name": "refs/heads/master",
"committer_date": 1634497865000,
"content_id": "59a6f5d44254ed20ada0b9f5241b0db6593eeb46",
"detected_licenses": [
"MIT"
],
"directory_id": "9ee5c351e72afafbcb2e85ab2180151789b27624",
"extension": "py",
"fi... | 2.421875 | stackv2 | import requests
import html
from bs4 import BeautifulSoup
from rest_framework.views import APIView
from rest_framework.response import Response
from rest_framework import authentication, permissions, status
from pwa_store_backend.users.models import User
import re
manifest_regex = r"\/manifest.([^&]*)"
class PwaInfoV... | 52 | 32.71 | 102 | 16 | 364 | python | [{"finding_id": "codeql_py/full-ssrf_8c9a15c773a5779b_2a5f1099", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/full-ssrf",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"The full URL of this request depends on a [user-provided value](1)."
] | [
20,
43
] | [
null,
null
] | [
13,
17
] | [
41,
34
] | |
2024-11-19T02:59:54.756555+00:00 | 1,629,833,584,000 | 21edd32fe5c069fd069dc713634ac6d639cc3fb0 | 4 | {
"blob_id": "21edd32fe5c069fd069dc713634ac6d639cc3fb0",
"branch_name": "refs/heads/master",
"committer_date": 1629833584000,
"content_id": "07d264cc2f132e43e4568e5c53f8689efeb294a2",
"detected_licenses": [
"MIT"
],
"directory_id": "e3a4b7b49706f555b7a38a6ea7da11f8b2d2422b",
"extension": "py",
"fi... | 3.796875 | stackv2 | from copy import deepcopy
class Address:
def __init__(self, street, suite, city) -> None:
self.street = street
self.suite = suite
self.city = city
def __str__(self) -> str:
return f'{self.street}, Suite #{self.suite}, {self.city}'
class Employee:
def __init__(self, name,... | 54 | 25.37 | 76 | 11 | 335 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_77180803310389dd_038e8e6c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
53,
54
] | [
null,
null
] | [
11,
11
] | [
15,
15
] | |
2024-11-19T03:12:11.754300+00:00 | 1,572,160,904,000 | 670ee6a4f1087cc4b969758251510146b7618702 | 2 | {
"blob_id": "670ee6a4f1087cc4b969758251510146b7618702",
"branch_name": "refs/heads/master",
"committer_date": 1572160904000,
"content_id": "95d67be74eb932ff04c076fb28617a4792bfb309",
"detected_licenses": [
"MIT"
],
"directory_id": "ec666f536e7d15de253b64c5eb6228de74669962",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
# @Time : 2019/9/19 19:29
# @Author : Lin Luo
# @Site :
# @File : login
# @Software: PyCharm
from flask import session
from sqlalchemy import and_
from hashlib import sha256
from application import db
from common.db_models.users import Users
class Authorization... | 44 | 23.91 | 109 | 23 | 270 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_e12bf3902a1205d2_d3bcaed4", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
26
] | [
null
] | [
71
] | [
95
] | |
2024-11-19T03:12:12.880828+00:00 | 1,693,221,508,000 | 3e2680a627ac036bc086634a4e3e2abbcded2762 | 2 | {
"blob_id": "3e2680a627ac036bc086634a4e3e2abbcded2762",
"branch_name": "refs/heads/main",
"committer_date": 1693221508000,
"content_id": "445d80111fb1c358ef9c4d7ab1be457c7abd7063",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "35b6013c1943f37d1428afd2663c8aba0a02628d",
"extension": "py",
... | 2.375 | stackv2 | # Copyright 2022 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, s... | 163 | 34.6 | 106 | 16 | 1,259 | python | [{"finding_id": "codeql_py/flask-debug_bb5796bab5038d1d_9c4b2731", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-117"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
163,
158,
127
] | [
null,
null,
null
] | [
5,
30,
24
] | [
53,
89,
69
] | |
2024-11-19T03:12:13.691783+00:00 | 1,552,130,440,000 | 97c4913427d7ad91fbe20b30101977dbb05e9377 | 3 | {
"blob_id": "97c4913427d7ad91fbe20b30101977dbb05e9377",
"branch_name": "refs/heads/master",
"committer_date": 1552130440000,
"content_id": "b6ab215f2096df7894165cd024e21a244122ac11",
"detected_licenses": [
"MIT"
],
"directory_id": "8880c1d706b6ed565cd974c1b2155b033911c756",
"extension": "py",
"fi... | 3.140625 | stackv2 | #!/usr/bin/env python3
import os
import getpass
import crypt
from models.person import Person
class Admin(Person):
def __init__(self, name, surname):
super().__init__(name, surname)
def __str__(self):
return super().__str__() + ":admin"
def admin_menu(info):
while True: ... | 128 | 33.23 | 96 | 17 | 984 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0c0a7b3b411bd8b2_1f9ae93f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
122
] | [
null
] | [
20
] | [
60
] | |
2024-11-19T03:12:17.491014+00:00 | 1,621,339,200,000 | d5b50f9591308ac7627c8dfe67c5ca01a08f1b10 | 3 | {
"blob_id": "d5b50f9591308ac7627c8dfe67c5ca01a08f1b10",
"branch_name": "refs/heads/main",
"committer_date": 1621339200000,
"content_id": "0075780408e5fb0346ee917819c012a1cdc3aae4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6671be3a542925342379d5f6fc691acfebbe281f",
"extension": "py",
... | 2.609375 | stackv2 | import logging
from typing import Dict
from src.database import queries
from src.exceptions.exceptions import UnrecognizedEventOperation
def _get_user(message: Dict) -> Dict:
return {
'id': message.get('user_id'),
'first_name': message.get('first_name'),
'last_name': message.get('last_nam... | 49 | 28.24 | 64 | 17 | 305 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9f5e518682309833_bed08a7b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
37,
41,
45
] | [
null,
null,
null
] | [
26,
26,
26
] | [
61,
61,
61
] | |
2024-11-19T03:24:56.110782+00:00 | 1,632,075,226,000 | 3b6e104830a0070781a6a4e7f5c3b339e344b18e | 3 | {
"blob_id": "3b6e104830a0070781a6a4e7f5c3b339e344b18e",
"branch_name": "refs/heads/main",
"committer_date": 1632075226000,
"content_id": "26539e6b919dbac2b192db29ea2440c82bd1d620",
"detected_licenses": [
"MIT"
],
"directory_id": "d94d6ec19fffa86a4c595284275ac92c72dfa624",
"extension": "py",
"file... | 2.625 | stackv2 | #!/usr/bin/env python
# coding: utf-8
# In[ ]:
import pandas as pd
import nltk
nltk.download('punkt')
nltk.download('stopwords')
nltk.download('averaged_perceptron_tagger')
nltk.download('wordnet')
import re
import string
import random
from nltk.tokenize import WordPunctTokenizer
from nltk.tag import pos_tag
from nl... | 142 | 24.58 | 98 | 13 | 1,024 | python | [{"finding_id": "codeql_py/overly-large-range_eaf09facd2763463_a27f378e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range ... | [
89,
89,
89,
89
] | [
null,
null,
null,
null
] | [
30,
33,
36,
45
] | [
34,
37,
40,
49
] | |
2024-11-19T03:35:08.896371+00:00 | 1,617,744,169,000 | a5ab2b8a179efadea854201a42fbad3238ea2424 | 3 | {
"blob_id": "a5ab2b8a179efadea854201a42fbad3238ea2424",
"branch_name": "refs/heads/master",
"committer_date": 1617744169000,
"content_id": "5384e364a5339b478efe4aa60c214149538c4f87",
"detected_licenses": [
"MIT"
],
"directory_id": "024d6dd6fb7101a0544384a8029b71a3aaad44df",
"extension": "py",
"fi... | 2.6875 | stackv2 | from flask import Flask, request, redirect
from werkzeug.utils import secure_filename
import os
import json
from face_util import compare_faces, face_rec, find_facial_features, find_face_locations
import re
import base64
app = Flask(__name__)
UPLOAD_FOLDER = 'received_files'
ALLOWED_EXTENSIONS = ['png', 'jpg', 'jpeg'... | 149 | 37.3 | 122 | 19 | 1,293 | python | [{"finding_id": "codeql_py/flask-debug_e0b684e3fd2d599f_fe1b2bc8", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 7 | true | [
"CWE-215",
"CWE-1333",
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-022"
] | [
"py/flask-debug",
"py/polynomial-redos",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '\\r\\n\\r\\n' and with many repetitions of '\\r\\n\\r\\na'.",
"Untrusted URL redi... | [
149,
36,
68,
73,
115,
122,
59
] | [
null,
null,
null,
null,
null,
null,
null
] | [
null,
89,
33,
33,
29,
29,
23
] | [
49,
98,
44,
44,
40,
40,
27
] | |
2024-11-19T01:26:44.857603+00:00 | 1,669,564,287,000 | 0bcf2afeb10ec107e2045c2c5c621af822029663 | 3 | {
"blob_id": "0bcf2afeb10ec107e2045c2c5c621af822029663",
"branch_name": "refs/heads/main",
"committer_date": 1669564287000,
"content_id": "80e3da9f324322c7378c69784fa6536939b0fbe5",
"detected_licenses": [
"MIT"
],
"directory_id": "cc6c123ffc1952c705e6a2e480dd30bf270fa088",
"extension": "py",
"file... | 3.203125 | stackv2 | from typing import Tuple, Union, Dict, List
import pandas as pd
from pathlib import Path
SALARY_COLUMNS = ['Annual Salary at Employment FTE',
'Annual Salary at Full FTE']
FY_COLUMN = 'Fiscal Year'
SF_COLUMN = 'State Fund Ratio'
UNIQUE_COLUMN = ['Name', 'year', 'uid']
def main(filename: str):
... | 270 | 33.09 | 83 | 18 | 2,200 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_69f594281004dbbc_5556818f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
81
] | [
null
] | [
19
] | [
49
] | |
2024-11-19T01:26:54.827293+00:00 | 1,595,517,319,000 | 707d525df29c4194db0cf24faf4ab3684faf777a | 3 | {
"blob_id": "707d525df29c4194db0cf24faf4ab3684faf777a",
"branch_name": "refs/heads/master",
"committer_date": 1595517319000,
"content_id": "c6c225bc160b66445c2b960b01dc05f1b0c6923c",
"detected_licenses": [
"MIT"
],
"directory_id": "4128ed43ee0ab84500c160c47ef824394ab73a41",
"extension": "py",
"fi... | 3.046875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
# Copyright (c) 2020, Marcelo Lares
# License: MIT
# Full text: https://github.com/mlares/aegis/blob/master/LICENSE
"""AEGIS: Academic Exam Generator for Interchange and Shuffe.
The purpose is to compose a collection of exams from a set of several
versions of a number ... | 353 | 31.11 | 79 | 20 | 2,414 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0c6108076311f14c_aaa412b4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
91
] | [
101
] | [
27
] | [
68
] | |
2024-11-19T01:27:04.128643+00:00 | 1,612,128,478,000 | d6661ca28af94fbbcf77ef273dbe65960c5d1aea | 2 | {
"blob_id": "d6661ca28af94fbbcf77ef273dbe65960c5d1aea",
"branch_name": "refs/heads/main",
"committer_date": 1612128478000,
"content_id": "af3f113f8b5d2424f72268b0b175e47e6ac039c1",
"detected_licenses": [
"MIT"
],
"directory_id": "2b7e244e8cdf4d1125f1297174f9417168eaac1d",
"extension": "py",
"file... | 2.328125 | stackv2 | from fastapi import FastAPI
from fastapi.responses import HTMLResponse
from yaml import dump, safe_load
from jinja2 import Environment, FileSystemLoader, exceptions
app = FastAPI()
try:
with open("app.yaml", "r") as stream:
_data = safe_load(stream)
except yaml.YAMLError as exc:
print(exc)
file_loade... | 62 | 25.1 | 65 | 13 | 377 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_65f4692c53f56f5b_93e975b9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
15
] | [
null
] | [
7
] | [
38
] | |
2024-11-19T01:37:38.984482+00:00 | 1,615,452,799,000 | 52955a36cf2ba0bf09e7a31e63d323832a03b92c | 3 | {
"blob_id": "52955a36cf2ba0bf09e7a31e63d323832a03b92c",
"branch_name": "refs/heads/master",
"committer_date": 1615452799000,
"content_id": "cc3cee208f8d045be7d96ddd071142f994b70be1",
"detected_licenses": [
"MIT"
],
"directory_id": "d96e3c41a884e8a067f597075c2737b0b9519e43",
"extension": "py",
"fi... | 3.171875 | stackv2 | #coding: utf-8
'''
提取12306网站内对应站台名称
使用: python get_station_name.py > station.py
'''
import re
import requests
from pprint import pprint
url = 'https://kyfw.12306.cn/otn/resources/js/framework/station_name.js?station_version=1.9081'
#发送get请求,不判断证书
response = requests.get(url, verify=False)
#使用正则表达式提取所有站点 汉... | 25 | 23.12 | 95 | 10 | 234 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e0966f707cea7a09_38536cf6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
14
] | [
null
] | [
12
] | [
43
] | |
2024-11-19T01:37:39.553186+00:00 | 1,557,995,648,000 | 64054d0e52d939667f2dc090c146d45b871a958b | 2 | {
"blob_id": "64054d0e52d939667f2dc090c146d45b871a958b",
"branch_name": "refs/heads/master",
"committer_date": 1557995648000,
"content_id": "164640ea5e3a6e7e9321014d253f1b5885e8159a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "523fb59f4e08cca7ae2771c84bb40ec0a7b2e66e",
"extension": "py"... | 2.328125 | stackv2 | from __future__ import print_function
from bottle import post, run, request
from urllib2 import HTTPError
import json
import os
import time
import inferFCN as infer
# -- The following variables should be correctly initialized before starting the service! --
# paths to the model's file and prototxt
modelFile = '/home... | 127 | 35.31 | 129 | 18 | 1,115 | python | [{"finding_id": "codeql_py/reflective-xss_b41580b427dacdf9_169b7a98", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-022"
] | [
"py/reflective-xss",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
125,
69
] | [
null,
null
] | [
12,
41
] | [
58,
49
] | |
2024-11-19T01:37:53.293722+00:00 | 1,612,626,156,000 | 937142e400ea25d9293e64ec797b8e9dedc3b142 | 2 | {
"blob_id": "937142e400ea25d9293e64ec797b8e9dedc3b142",
"branch_name": "refs/heads/master",
"committer_date": 1612626156000,
"content_id": "2cec1bc1988846c4d484b22e35f130a45139a1f3",
"detected_licenses": [
"MIT"
],
"directory_id": "4f674ae175b633fc5b1c5614344fe1ab114c1752",
"extension": "py",
"fi... | 2.453125 | stackv2 | import flask
from flask import request, jsonify
import json
import joblib
import re
import requests
from pprint import pprint
from datetime import datetime
import matplotlib.pyplot as plt
import seaborn as sns
import tensorflow as tf
import numpy as np
from sklearn.metrics.pairwise import cosine_similarity
from tensorf... | 200 | 32.2 | 105 | 21 | 1,595 | python | [{"finding_id": "codeql_py/polynomial-redos_11693592bf7cfe0a_4a2cb212", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin... | 1 | true | [
"CWE-1333"
] | [
"py/polynomial-redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '<' and with many repetitions of '</'."
] | [
72
] | [
null
] | [
34
] | [
38
] | |
2024-11-19T01:37:54.417805+00:00 | 1,512,601,831,000 | 8bf43b6efa9a1f2cdefe0e5bd9a5a9c80ec9d8d5 | 3 | {
"blob_id": "8bf43b6efa9a1f2cdefe0e5bd9a5a9c80ec9d8d5",
"branch_name": "refs/heads/master",
"committer_date": 1512601831000,
"content_id": "cb7e4c5e2abab40247db24ad09abe78a609d764a",
"detected_licenses": [
"MIT"
],
"directory_id": "b7d8f79073a360378bbd2857d639e921d31ec1d2",
"extension": "py",
"fi... | 3.015625 | stackv2 | from flask import Flask, jsonify
from redis import Redis
app = Flask(__name__)
redis = Redis(host='redis', port=6379, decode_responses=True)
# click count stored in redis db
@app.route('/')
def hello():
count = redis.incr('hits')
return 'Hello World! I have been seen {} times.\n'.format(count)
# return txt ... | 34 | 22.21 | 68 | 10 | 220 | python | [{"finding_id": "codeql_py/flask-debug_1f7a1556b411cb64_1036af55", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2)."
] | [
34,
24
] | [
null,
null
] | [
5,
13
] | [
40,
60
] | |
2024-11-19T01:37:54.768397+00:00 | 1,543,748,079,000 | c7cbe35abdd439e9d0f984e59ab0225c6fa037ce | 3 | {
"blob_id": "c7cbe35abdd439e9d0f984e59ab0225c6fa037ce",
"branch_name": "refs/heads/master",
"committer_date": 1543748079000,
"content_id": "85137e33a4efc7801dfb8c768db78aebdd9f56fa",
"detected_licenses": [
"MIT"
],
"directory_id": "fd0bbe26f70fee6c5fe5519463d400c20345f947",
"extension": "py",
"fi... | 2.875 | stackv2 | # coding:utf-8
"""
Baidu Transelation
"""
import random
import json
from hashlib import md5
import requests
def transelate(text,from_='zh',to_='en'):
appid = '20160712000025083'
secretKey = 'qHmm1FXf_rp8rhR7O6jh'
url = 'https://fanyi-api.baidu.com/api/trans/vip/translate'
q = text
from_la... | 48 | 21.29 | 73 | 17 | 327 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_f7c1a331ff6ae455_a0640e76", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
24
] | [
null
] | [
15
] | [
19
] | |
2024-11-19T01:38:05.028773+00:00 | 1,518,376,715,000 | 199f5d03f838c6d6875184cb1634ee1945b9698b | 2 | {
"blob_id": "199f5d03f838c6d6875184cb1634ee1945b9698b",
"branch_name": "refs/heads/master",
"committer_date": 1518376715000,
"content_id": "3ca71de77601ccc27e6b08d76ccb1262b46e582c",
"detected_licenses": [
"MIT"
],
"directory_id": "546b248c3f124d27b2e9a138561515b00005d283",
"extension": "py",
"fi... | 2.40625 | stackv2 | from Crypto.PublicKey import RSA
from Crypto import Random
import base64
from Crypto.Hash import SHA256
def instantwallet():
new_key = RSA.generate(1024, Random.new().read)
public_key = new_key.publickey().exportKey("PEM")
private_key = new_key.exportKey("PEM")
keys = []
wallet_id = SHA256.new(pub... | 32 | 22.19 | 66 | 11 | 211 | python | [{"finding_id": "codeql_py/weak-crypto-key_dc4d825b9ed5b3c1_3edf6bd2", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
8
] | [
null
] | [
15
] | [
52
] | |
2024-11-19T01:38:47.332050+00:00 | 1,637,477,487,000 | b54209ad5c53a70e2db55ab261b28b5c72af5e8a | 3 | {
"blob_id": "b54209ad5c53a70e2db55ab261b28b5c72af5e8a",
"branch_name": "refs/heads/main",
"committer_date": 1637477487000,
"content_id": "e3093ebd5b3088945173f624b5dcb827714bdeb1",
"detected_licenses": [
"MIT"
],
"directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b",
"extension": "py",
"file... | 2.796875 | stackv2 | #!/usr/bin/env python3
from os import getenv
from Crypto.Cipher import AES
BLOCK_SIZE = 16
FLAG = getenv("FLAG")
KEY = getenv("KEY")
padding = lambda msg: msg + "0" * (BLOCK_SIZE - len(msg) % BLOCK_SIZE)
encrypt = lambda plain: AES.new(KEY, AES.MODE_ECB).encrypt(plain).hex()
print("[SUPPORT] Password Reset")
accoun... | 23 | 19.61 | 71 | 12 | 126 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_92b4650726a43086_702caee4", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
11
] | [
null
] | [
25
] | [
66
] | |
2024-11-19T01:38:47.695136+00:00 | 1,606,413,117,000 | dcca5ab196166d5dc1c11dc7ec4d4eae086e3535 | 2 | {
"blob_id": "dcca5ab196166d5dc1c11dc7ec4d4eae086e3535",
"branch_name": "refs/heads/master",
"committer_date": 1606413117000,
"content_id": "83e636211a40c52f7aff210b9fc26b9ca0e7e180",
"detected_licenses": [
"MIT"
],
"directory_id": "321dbc32e11315099cad71508896384882ec4c56",
"extension": "py",
"fi... | 2.359375 | stackv2 |
import time
import json
import hmac
import base64
import urllib3
import requests
from pprint import pprint
from abc import ABCMeta
# NOTE: If we remove the `verify=False` parameter from the `requests.request()`
# function, we are getting an error when working with a specific wallet
# requester (TODO: Verify which on... | 127 | 25.46 | 79 | 17 | 740 | python | [{"finding_id": "codeql_py/request-without-cert-validation_21423040c3881f19_9caa84ef", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
52
] | [
57
] | [
16
] | [
10
] | |
2024-11-19T01:52:09.838248+00:00 | 1,537,130,167,000 | d290edb499d221ce33887e8dc3126a95f8901829 | 3 | {
"blob_id": "d290edb499d221ce33887e8dc3126a95f8901829",
"branch_name": "refs/heads/master",
"committer_date": 1537130167000,
"content_id": "a5ac2936435d56f6ee85935cc90bd2db1b292e37",
"detected_licenses": [
"MIT"
],
"directory_id": "b9316a97a3a85d59ffa55f2252372bb4315f57e1",
"extension": "py",
"fi... | 2.828125 | stackv2 | # -*- coding: utf-8 -*-
"""
This file contains utility functions for use in the Pyramid view handling
"""
import hashlib
from os.path import exists
import datetime
def error_dict(error_type='generic_errors', errors=''):
"""
Create a basic error dictionary for standard use with the intent of being passed to s... | 60 | 32.2 | 118 | 11 | 446 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_4d67563891f53273_0b7577ef", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
42
] | [
null
] | [
14
] | [
38
] | |
2024-11-19T01:52:14.204496+00:00 | 1,524,775,341,000 | a594499f44f5e8572e438fc833b392afa6b69e7d | 3 | {
"blob_id": "a594499f44f5e8572e438fc833b392afa6b69e7d",
"branch_name": "refs/heads/master",
"committer_date": 1524775341000,
"content_id": "eb136bfc7a112bf2499052a0601746e6a7924c23",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f581fecab505a86118c55bc73946b621430ebdb8",
"extension": "py"... | 2.6875 | stackv2 | """
Module that implements SSH client.
"""
import socket
from contextlib import contextmanager
from paramiko import SSHClient, AutoAddPolicy, AuthenticationException, \
SSHException
from twindb_backup import LOG
from twindb_backup.ssh.exceptions import SshClientException
class SshClient(object):
"""
SSH... | 196 | 32.22 | 77 | 22 | 1,282 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_d96f40d7ea4a7db4_e6057d9d", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
47
] | [
null
] | [
9
] | [
59
] | |
2024-11-19T01:52:22.717304+00:00 | 1,618,248,988,000 | e8a1c7622106045fc09c45ba30981de17f9b5626 | 2 | {
"blob_id": "e8a1c7622106045fc09c45ba30981de17f9b5626",
"branch_name": "refs/heads/main",
"committer_date": 1618248988000,
"content_id": "4628b1b2f4900969a14664d0e91fe014c9c6f965",
"detected_licenses": [
"MIT"
],
"directory_id": "54e8192b80b3c60f5d060ff45fbfb7b8858e46a3",
"extension": "py",
"file... | 2.390625 | stackv2 | from flask import Flask, render_template, request, session, redirect, Markup, jsonify
from sqlalchemy import create_engine
from sqlalchemy.orm import scoped_session, sessionmaker
import requests
from xml.etree import ElementTree
app = Flask(__name__ ,template_folder='template')
app.secret_key = 'key'
app.config["SE... | 219 | 28.22 | 115 | 17 | 1,500 | python | [{"finding_id": "codeql_py/xml-bomb_b94c6411ec117293_6e4fa89e", "tool_name": "codeql", "rule_id": "py/xml-bomb", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "XML parsing depends on a [user-provided value](1) without guarding against uncontrolled entity expansion.", "remediatio... | 4 | true | [
"CWE-776",
"CWE-776",
"CWE-918",
"CWE-918"
] | [
"py/xml-bomb",
"py/xml-bomb",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"XML parsing depends on a [user-provided value](1) without guarding against uncontrolled entity expansion.",
"XML parsing depends on a [user-provided value](1) without guarding against uncontrolled entity expansion.",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL o... | [
127,
157,
126,
156
] | [
null,
null,
null,
null
] | [
35,
35,
11,
11
] | [
46,
46,
28,
28
] | |
2024-11-19T01:52:24.318677+00:00 | 1,537,379,067,000 | c8b995ff639e58d9fa7f6bcffab6cc53db47cfb1 | 3 | {
"blob_id": "c8b995ff639e58d9fa7f6bcffab6cc53db47cfb1",
"branch_name": "refs/heads/master",
"committer_date": 1537379067000,
"content_id": "e73ae322e7334d0df3215b3818c63c50c6770dbf",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "22df28c0c47d856cf751a106607ac8ca98679e93",
"extension": "py"... | 2.71875 | stackv2 | #!/usr/bin/env python3
# author: @netmanchris
""" Copyright 2015 Hewlett Packard Enterprise Development LP
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/lic... | 133 | 38.83 | 119 | 15 | 1,282 | python | [{"finding_id": "codeql_py/request-without-cert-validation_2d706ca5c9f2e515_2b134a4c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
65,
98
] | [
null,
null
] | [
17,
13
] | [
78,
74
] | |
2024-11-19T01:52:27.175773+00:00 | 1,600,352,318,000 | 6bb0b06d58fa8fb33b3193243651a82ce2d72cab | 3 | {
"blob_id": "6bb0b06d58fa8fb33b3193243651a82ce2d72cab",
"branch_name": "refs/heads/master",
"committer_date": 1600352318000,
"content_id": "57cba3eddab698b155f64dc56f53501286729cdb",
"detected_licenses": [
"Unlicense"
],
"directory_id": "e9bdeadeb5e5dfe7078b0a4bbd4c80cb33e6bf81",
"extension": "py",... | 2.71875 | stackv2 | # -*- coding: utf-8 -*-
import requests
import codecs
import os
import jinja2
import base64
dirname = os.path.dirname(__file__)
# Open LaTeX template file.
latex_template_path = os.path.join(dirname, "template.tex")
with codecs.open(latex_template_path, "r", "utf-8") as f:
latex_template = f.read()
# Jinja2 t... | 130 | 25.9 | 87 | 16 | 890 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9d39343d08408b40_72488d81", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
20
] | [
32
] | [
13
] | [
2
] | |
2024-11-19T02:04:20.413119+00:00 | 1,561,410,866,000 | 579e11a2192a17adefdc3e0f7792c0c67fcc0931 | 3 | {
"blob_id": "579e11a2192a17adefdc3e0f7792c0c67fcc0931",
"branch_name": "refs/heads/master",
"committer_date": 1561410866000,
"content_id": "893545943fae7a3a59b03942c88e11b9758a5682",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5f1a2083fd30149ee9a4db638229e229b9b07fae",
"extension": "py"... | 2.65625 | stackv2 | # Copyright 2018 Flight Lab authors.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in w... | 97 | 31.65 | 80 | 15 | 708 | python | [{"finding_id": "codeql_py/insecure-temporary-file_3365ff0b40bf4dde_a7677eaa", "tool_name": "codeql", "rule_id": "py/insecure-temporary-file", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated function tempfile.mktemp may be insecure.", "remediation": "", "location": ... | 2 | true | [
"CWE-377",
"CWE-079"
] | [
"py/insecure-temporary-file",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Call to deprecated function tempfile.mktemp may be insecure.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
40,
90
] | [
null,
null
] | [
24,
18
] | [
55,
43
] | |
2024-11-19T02:04:48.859739+00:00 | 1,557,760,034,000 | 707dfc9311f8907b141fd94d7e09eda840e4a4d0 | 3 | {
"blob_id": "707dfc9311f8907b141fd94d7e09eda840e4a4d0",
"branch_name": "refs/heads/master",
"committer_date": 1557760034000,
"content_id": "6cd99c68e836b6abefca43d547feb3b075a3c116",
"detected_licenses": [
"MIT"
],
"directory_id": "cfe4e1c14efb5984107be31ebd9084ca5ff78717",
"extension": "py",
"fi... | 3.015625 | stackv2 | """
IMDB Text Classification
AutoKeras
May 2019
Vocab from [Stanford](http://ai.stanford.edu/~amaas/data/sentiment/)
Preprocessed data from [Keras](https://keras.io/datasets/)
"""
import os
import re
import urllib
import zipfile
import tarfile
import numpy as np
import pandas as pd
import tensorflow as tf
from kera... | 101 | 29.98 | 114 | 15 | 853 | python | [{"finding_id": "codeql_py/tarslip_1f1cffbe6a9bcf1d_7371f19d", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
54
] | [
null
] | [
13
] | [
16
] | |
2024-11-19T02:04:57.912644+00:00 | 1,632,155,768,000 | a02b1e5449a2364f60d949afec71773aab5f01db | 3 | {
"blob_id": "a02b1e5449a2364f60d949afec71773aab5f01db",
"branch_name": "refs/heads/main",
"committer_date": 1632155768000,
"content_id": "12a43e3ed2ab2ec5316ccea0bb06fa299a21f2bb",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "a3412a9c6fda7478bd2005935718d21b05b0dd01",
"extension": "py"... | 2.6875 | stackv2 |
from flask import Flask,request,jsonify
import requests
from bs4 import BeautifulSoup
app = Flask(__name__)
star_ratings = [[0,1399,1],[1400,1599,2],[1600,1799,3],[1800,1999,4],[2000,2199,5],[2200,2499,6],[2500,3000,7]]
def codechef(username):
global star_ratings
url = "https://codechef.com/users/{}".format(u... | 79 | 20.49 | 111 | 17 | 544 | python | [{"finding_id": "codeql_py/partial-ssrf_535d1eadbb03b9f8_34e43f38", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
14
] | [
null
] | [
9
] | [
27
] | |
2024-11-19T02:28:03.740094+00:00 | 1,445,445,696,000 | a4b91ee75b4b8b7ab8d6ba5ea06438ac501308ac | 2 | {
"blob_id": "a4b91ee75b4b8b7ab8d6ba5ea06438ac501308ac",
"branch_name": "refs/heads/master",
"committer_date": 1445445696000,
"content_id": "334139ffa7d1b350904940504f9b794f77467634",
"detected_licenses": [
"MIT"
],
"directory_id": "03b4289c407cf7b2b7e8c2ef59307c1d67fae089",
"extension": "py",
"fi... | 2.328125 | stackv2 | # coding: utf-8
from django.shortcuts import render, get_object_or_404
from django.utils import timezone
# Create your views here.
from django.http import HttpResponse
from django.views.generic.list import ListView
# import the add note form
from note.forms import AddForm, NoteForm, NOTETYPE_PRIVATE, NOTETYPE_PUBLI... | 221 | 32.46 | 99 | 21 | 1,765 | python | [{"finding_id": "codeql_py/stack-trace-exposure_d10193e59b5c8220_9704f3e7", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
190
] | [
null
] | [
37
] | [
99
] | |
2024-11-19T02:28:07.657591+00:00 | 1,590,880,377,000 | 692319aafa0e7097cb76198c28735312ba125660 | 3 | {
"blob_id": "692319aafa0e7097cb76198c28735312ba125660",
"branch_name": "refs/heads/master",
"committer_date": 1590880377000,
"content_id": "d97d48a5ff28f4a71a33d6b5b4f499d53ca07549",
"detected_licenses": [
"MIT"
],
"directory_id": "26cf4c7bf8c54339f30c38295a88fac175a552cc",
"extension": "py",
"fi... | 2.765625 | stackv2 | import webapp2
import jinja2
import os
import logging
from google.appengine.ext import db
from google.appengine.api import memcache
jinja_environment = jinja2.Environment(
loader=jinja2.FileSystemLoader(os.path.dirname(__file__)))
KEY_BASE = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ-_"
BASE ... | 100 | 31 | 87 | 17 | 715 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_6b641d19ff791941_4c572d5c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
8
] | [
9
] | [
21
] | [
63
] | |
2024-11-19T02:28:19.285241+00:00 | 1,484,555,227,000 | 221d04edc11e325e050730c9a45a8ae6c7dc5a82 | 3 | {
"blob_id": "221d04edc11e325e050730c9a45a8ae6c7dc5a82",
"branch_name": "refs/heads/master",
"committer_date": 1484555227000,
"content_id": "b763a82f5aa8f0cc86e795924cd851d709dd674f",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "dd897f1cc598e0c9d7a3c7341fff13bd6fc46d64",
"extension": "p... | 2.671875 | stackv2 | # -*- coding: utf-8 -*-
import os
import tarfile
from importlib.util import find_spec
from abc import ABCMeta, abstractmethod
from tempfile import mkstemp
__version__ = "0.0"
class IFetcher(metaclass=ABCMeta):
def __init__(self, src_container, src_path, dest_path, buffer_len):
self.srcContainer = src_co... | 171 | 39.64 | 146 | 18 | 1,400 | python | [{"finding_id": "codeql_py/tarslip_0a460625685ddfd5_8a5245c9", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
36
] | [
null
] | [
17
] | [
18
] | |
2024-11-19T02:28:42.425142+00:00 | 1,687,809,092,000 | 74d8b60fd08a2a890781427550469b627259cc7e | 3 | {
"blob_id": "74d8b60fd08a2a890781427550469b627259cc7e",
"branch_name": "refs/heads/main",
"committer_date": 1687809092000,
"content_id": "4cddf9b2b26f7425c5d1d075d86106c2abf026e3",
"detected_licenses": [
"MIT"
],
"directory_id": "077beb02d73045eb97261a1c5e7021bfe709e55c",
"extension": "py",
"file... | 2.5625 | stackv2 | import os
import sys
from do_signin import do_signin
parent_path = os.path.dirname(
os.path.dirname(
os.path.abspath(__file__)
)
)
# isort: split
if parent_path not in sys.path:
sys.path.append(parent_path)
from pyonepassword.api.exceptions import ( # noqa: E402
OPItemGetException,
OPSig... | 44 | 27.98 | 84 | 13 | 325 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bf0cefa105423c18_8df59657", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
32,
40
] | [
null,
null
] | [
15,
15
] | [
28,
28
] | |
2024-11-19T02:36:52.318388+00:00 | 1,585,992,867,000 | e539610413b88281324d4c31632f2ee4d8c6dc33 | 2 | {
"blob_id": "e539610413b88281324d4c31632f2ee4d8c6dc33",
"branch_name": "refs/heads/master",
"committer_date": 1585992867000,
"content_id": "57e630a460ea929cdda035eb5519421717d0d778",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "70ed9058ba87710748c6d6b244c32b2d6fb0fe57",
"extension": "p... | 2.359375 | stackv2 | from django.db import models
import datetime
import random
import hashlib
class LastFmUser(models.Model):
"""
Represents a user from that great site, last.fm.
"""
# As seen on last.fm
username = models.CharField(max_length=255, unique=True)
# Null if no update wanted, else used to pr... | 159 | 30.71 | 123 | 15 | 1,098 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_27a988ae62b7f8e3_1c43c00d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally e... | [
152,
155
] | [
null,
null
] | [
34,
42
] | [
54,
62
] | |
2024-11-19T02:36:54.261494+00:00 | 1,486,591,293,000 | 92263c3bb22a5d5f251e36915840ed2da48b5809 | 2 | {
"blob_id": "92263c3bb22a5d5f251e36915840ed2da48b5809",
"branch_name": "refs/heads/master",
"committer_date": 1486591293000,
"content_id": "04a407418e56909b6d029114d30d5d212ab758d5",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "d326efadbb397f9332a62aa12aad53c1aae184fc",
"extension": "p... | 2.484375 | stackv2 | import sys
from tumblpy import Tumblpy
key = raw_input('App Consumer Key: ')
secret = raw_input('App Consumer Secret: ')
if not 'skip-auth' in sys.argv:
t = Tumblpy(key, secret)
callback_url = raw_input('Callback URL: ')
auth_props = t.get_authentication_tokens(callback_url=callback_url)
auth_url =... | 47 | 30.77 | 106 | 10 | 365 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_52159431313906c0_a2b0c1dc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
30,
31
] | [
null,
null
] | [
11,
11
] | [
54,
68
] | |
2024-11-19T02:36:59.294244+00:00 | 1,601,102,765,000 | a42a077bfea016862141b1f1c9ac7ff9082ccce4 | 2 | {
"blob_id": "a42a077bfea016862141b1f1c9ac7ff9082ccce4",
"branch_name": "refs/heads/master",
"committer_date": 1601102765000,
"content_id": "88db7b735b5b8511971575832a9685f26b1c40e8",
"detected_licenses": [
"MIT"
],
"directory_id": "812cb375bbdc4b6cc676579c587e2fe3354dd2dd",
"extension": "py",
"fi... | 2.4375 | stackv2 | from flask import Flask
import fastbook
fastbook.setup_book()
#hide
from fastbook import *
from fastai.vision.all import *
from utils import *
from downloadFromGoogleDrive import GoogleDriveDownloader
from flask import request, redirect, render_template
import os, sys
app = Flask(__name__)
GOOGLE_DRIVE_MODEL_FILE_... | 61 | 28.57 | 101 | 14 | 450 | python | [{"finding_id": "codeql_py/path-injection_5500832419228caa_66f0050e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
39
] | [
null
] | [
20
] | [
28
] | |
2024-11-19T02:37:09.961322+00:00 | 1,504,674,294,000 | a90f02ed9d5ce18b4963602bbe4628c9562ae5d4 | 2 | {
"blob_id": "a90f02ed9d5ce18b4963602bbe4628c9562ae5d4",
"branch_name": "refs/heads/master",
"committer_date": 1504674294000,
"content_id": "cc36be2d20d1eaa24bb86a7882d436ecd82a3f6d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "af992648b5ee5a8d05ad3b0189bba55485d398a3",
"extension": "py"... | 2.484375 | stackv2 | # -*- coding: utf-8 -*-
import paramiko
import socket
import os
import pysftp
import logging
# 控制paramiko日志级别,调试的时候建议改成DEBUG级别
logging.getLogger("paramiko").setLevel(level=logging.INFO)
'''
Function Name: paramikoAPI
Author: jagerzhang
Description: remote command and file transfer API Base on paramiko and sftp
Date: ... | 209 | 34.14 | 142 | 28 | 1,415 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_f46a9a2a5f7aab90_c22094f5", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
23
] | [
null
] | [
9
] | [
69
] | |
2024-11-19T02:37:11.499452+00:00 | 1,611,762,228,000 | cbf99c896ed9783e39d409a0973dc5a5d21a94f3 | 2 | {
"blob_id": "cbf99c896ed9783e39d409a0973dc5a5d21a94f3",
"branch_name": "refs/heads/main",
"committer_date": 1611762236000,
"content_id": "c3cfba485c3df49466ed7251e1f27123ab79d38d",
"detected_licenses": [
"MIT"
],
"directory_id": "031b3b901964c33ac65471bcb7584571eb82436d",
"extension": "py",
"file... | 2.5 | stackv2 | # !/usr/bin/python
# -*- coding: utf-8 -*-
# @Time : 2020/9/18 12:02
# @Author : WardenAllen
# @File : pluto_ssh.py
# @Brief :
import paramiko
from io import StringIO
class PlutoSSH :
# paramiko's SSHClient() object.
__ssh = object
def __init__(self):
self.__ssh = paramiko.SSHClient()
... | 36 | 32.67 | 82 | 13 | 330 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_109e2e446acd5bca_da9d8c32", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation",
"py/paramiko-missing-host-key-validation"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
18,
30
] | [
null,
null
] | [
9,
9
] | [
73,
73
] | |
2024-11-19T02:37:14.394554+00:00 | 1,620,188,745,000 | 6e3a4853912776ed5e2a0495af84f0c6f8cd0a77 | 3 | {
"blob_id": "6e3a4853912776ed5e2a0495af84f0c6f8cd0a77",
"branch_name": "refs/heads/main",
"committer_date": 1620188745000,
"content_id": "179f95d2d7445c6bcaf4c962d8573fbf507a367a",
"detected_licenses": [
"MIT"
],
"directory_id": "28b4fd2381865b6b9e4da4d2f6c3b5a4f154e943",
"extension": "py",
"file... | 2.71875 | stackv2 | import json
from flask import Flask, request, Response
from emotion_analysis import analyze_emotion
from polarity_analysis import analyze_polarity
from flask_cors import CORS, cross_origin
app = Flask(__name__)
cors = CORS(app)
app.config["CORS_HEADERS"] = "Content-Type"
@app.route("/api/emotions", methods=["POST"])
@... | 35 | 28.43 | 58 | 14 | 244 | python | [{"finding_id": "codeql_py/stack-trace-exposure_bd61879d3a851952_c2538de9", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
31
] | [
null
] | [
13
] | [
38
] | |
2024-11-19T02:37:43.066443+00:00 | 1,653,138,333,000 | 1750e20c9600ae757cdcf7f20f98bbfc2bccc969 | 3 | {
"blob_id": "1750e20c9600ae757cdcf7f20f98bbfc2bccc969",
"branch_name": "refs/heads/master",
"committer_date": 1653138333000,
"content_id": "55e873e19504aac546ecce53440cbeaaffe1ecaf",
"detected_licenses": [
"MIT"
],
"directory_id": "c8645c4b185097c369070ebc6a476a1a336c0eaa",
"extension": "py",
"fi... | 2.578125 | stackv2 | import requests
import pathlib
import sys
import os
import urllib3
base_url = "https://www.mpba.mp.br/sites/default/files/biblioteca/portal-transparencia/contracheque/"
cod_meses = {
"01": "",
"02": "_0",
"03": "_1",
"04": "_2",
"05": "_3",
"06": "_4",
"07": "_5",
"08": "_6",
"09": ... | 112 | 26.49 | 101 | 20 | 755 | python | [{"finding_id": "codeql_py/request-without-cert-validation_d2307421611b940a_739bf498", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
74
] | [
null
] | [
20
] | [
73
] | |
2024-11-19T02:37:43.453801+00:00 | 1,594,231,035,000 | 2d6b5656c084409f8d2447277e21670151a16911 | 3 | {
"blob_id": "2d6b5656c084409f8d2447277e21670151a16911",
"branch_name": "refs/heads/master",
"committer_date": 1594231035000,
"content_id": "2598d129baad152182ae4fd5c8f67e707b2739bb",
"detected_licenses": [
"MIT"
],
"directory_id": "d0c8f370fa1b588137d4bbc163c3a74bb8f7974c",
"extension": "py",
"fi... | 2.859375 | stackv2 | import requests, ctypes, datetime, sys
from random import randint
SPI_SETDESKWALLPAPER = 20
#note: save your backgrounds in this folder, named [weather]x.jpg x being number of rand range.
BACKGROUND_PATH = r'C:\Users\Katherine\Documents\_Python Projects\Set_Background\\'
API_KEY = #Your API Key Here
API_ADDRESS='htt... | 41 | 32.44 | 116 | 16 | 371 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_304eb33bea8ca676_b9fb0445", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
37
] | [
null
] | [
11
] | [
22
] | |
2024-11-19T02:37:46.442220+00:00 | 1,509,906,453,000 | 898d3df2ac9a7b65e6e00505cdd6cd62bf25556a | 2 | {
"blob_id": "898d3df2ac9a7b65e6e00505cdd6cd62bf25556a",
"branch_name": "refs/heads/master",
"committer_date": 1509906453000,
"content_id": "d5d81b910191237902187201df916e0935243f47",
"detected_licenses": [
"MIT"
],
"directory_id": "b9d7956c49af807daa5a8841df141675c39073e7",
"extension": "py",
"fi... | 2.4375 | stackv2 | import re
import httplib
import urllib2
import urllib
from urlparse import urlparse
from bs4 import BeautifulSoup
from collections import deque
import webbrowser
import socket
import requests
import hashlib
import logging
logging.captureWarnings(True)
from whoosh.index import create_in
from whoosh.fields import *
impor... | 65 | 27.97 | 114 | 15 | 494 | python | [{"finding_id": "codeql_py/request-without-cert-validation_2b7c453f8cc70ac6_4e7e8c6c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
36
] | [
null
] | [
14
] | [
58
] | |
2024-11-19T02:49:16.985033+00:00 | 1,514,541,511,000 | 76d12cde13f46b73b3ba4a8310fade81bdd0a2ff | 2 | {
"blob_id": "76d12cde13f46b73b3ba4a8310fade81bdd0a2ff",
"branch_name": "refs/heads/master",
"committer_date": 1514541511000,
"content_id": "76da77ef5e1e07c0b3a9466a1552c630de68ad21",
"detected_licenses": [
"MIT"
],
"directory_id": "61aefba322ecc140b6e80737a32c86c7ddb825ff",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
'''
Inspired by: https://www.digitalocean.com/community/tutorials/how-to-set-up-an-openvpn-server-on-ubuntu-16-04
Inspired by: https://blog.remibergsma.com/2013/02/27/improving-openvpn-security-by-revoking-unneeded-certificates/
This script will:
- generate and register ... | 146 | 31.34 | 114 | 15 | 1,122 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9bde5948e328a9eb_79a55992", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
48
] | [
null
] | [
20
] | [
50
] | |
2024-11-19T02:49:18.488658+00:00 | 1,634,550,691,000 | 0ee054bab57dbcaaf71b8df3ec67e9a403604dd6 | 3 | {
"blob_id": "0ee054bab57dbcaaf71b8df3ec67e9a403604dd6",
"branch_name": "refs/heads/master",
"committer_date": 1634550691000,
"content_id": "f31fb223a731161fed181ecc0db7692da3054cde",
"detected_licenses": [
"MIT"
],
"directory_id": "9d1ecbe43ce68d6c72c4c1bdeda0d32f4768e916",
"extension": "py",
"fi... | 2.875 | stackv2 | # -*- coding: utf-8 -*-
# 上传代码
import requests
import hmac
import hashlib
import json
import time
import os
class JFile:
def __init__(self, app_token, app_key, url):
self.url = url
self.app_token = app_token
self.app_key = app_key
self.session = requests.Session()
@staticmet... | 231 | 35.69 | 120 | 17 | 2,094 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_cd107f907555f7f3_13ed1d79", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
99,
161
] | [
null,
null
] | [
59,
59
] | [
84,
84
] | |
2024-11-19T02:49:19.891472+00:00 | 1,471,543,369,000 | 51060ebd4daee02e489c411f82ebad74f55a76a5 | 3 | {
"blob_id": "51060ebd4daee02e489c411f82ebad74f55a76a5",
"branch_name": "refs/heads/master",
"committer_date": 1471543369000,
"content_id": "20e4452a8e8d72a53fc546306ab2f47b4a6031ec",
"detected_licenses": [
"MIT"
],
"directory_id": "66b348706641bf6c0fdc24bdb6a3f024194b5c5e",
"extension": "py",
"fi... | 2.78125 | stackv2 | """ Secret rendering """
import os
from jinja2 import Template
from aomi.helpers import problems
def template(client, src, dest, vault_path):
"""Writes a template using variables from a vault path"""
template_src = Template(open(os.path.abspath(src), 'r').read())
secrets = client.read(vault_path)
if n... | 75 | 34.53 | 75 | 18 | 639 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b1a171f96a57fbea_3c668080", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-079"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"Using jinja2 templates with autoe... | [
35,
52,
54,
62,
9
] | [
null,
null,
null,
null,
null
] | [
52,
19,
23,
15,
20
] | [
58,
50,
45,
75,
68
] | |
2024-11-19T03:00:14.113693+00:00 | 1,594,897,435,000 | f3f032f7809e0cf417c616a89bfea8d32e753880 | 3 | {
"blob_id": "f3f032f7809e0cf417c616a89bfea8d32e753880",
"branch_name": "refs/heads/master",
"committer_date": 1594897435000,
"content_id": "4457e9ae9dbd8c03f149c3c5e2238e151da92706",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6e19bd92cff11242dc5af87b491471e6a5eddbc8",
"extension": "py"... | 2.703125 | stackv2 | # stdlib
import datetime
# libs
# local
COMMAND_COLOUR = '\033[0m'
DEFAULT_COLOUR = '\033[93m'
PROMPT_COLOUR = '\033[92m'
ROCKY_COLOUR = '\033[1;36m'
SUCCESS_COLOUR = '\033[32m'
WARNING_COLOUR = '\033[91m'
def colour(string: str) -> str:
"""
Converts string to its coloured version
"""
string = strin... | 123 | 28.15 | 111 | 18 | 948 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b1d1dd012c7ae540_a5d8ca02", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
122
] | [
null
] | [
26
] | [
30
] | |
2024-11-19T03:00:26.641413+00:00 | 1,635,489,833,000 | e840ecf854ed9088a8bb3760d12e485a1aec685a | 3 | {
"blob_id": "e840ecf854ed9088a8bb3760d12e485a1aec685a",
"branch_name": "refs/heads/main",
"committer_date": 1635489833000,
"content_id": "a854cc07bc0d3a100db3f5aa94845b45d3b4b2e3",
"detected_licenses": [
"MIT"
],
"directory_id": "7450507347f0dab2b4241506b370c4b9c94ba1d2",
"extension": "py",
"file... | 2.75 | stackv2 | '''
@author Kamal Kant
@date OCT 28 2021
@description flask app for handling audio and text of the asr
'''
from flask import Flask,render_template,request,jsonify
import os
app = Flask(__name__)
UPLOAD_ROOT_FOLDER = 'waves/english/'
# ALLOWED_EXTENSIONS = {'wav', 'mp3'}
@app.route("/")
def hello():
return ren... | 33 | 23.06 | 62 | 11 | 194 | python | [{"finding_id": "codeql_py/flask-debug_05fa0b7a0ee28c48_4f7bf9fc", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
33,
29
] | [
null,
null
] | [
null,
12
] | [
22,
54
] | |
2024-11-19T03:00:30.573907+00:00 | 1,560,110,956,000 | 89b37dcdce09eaf25747f5eff3909d66496c5632 | 3 | {
"blob_id": "89b37dcdce09eaf25747f5eff3909d66496c5632",
"branch_name": "refs/heads/master",
"committer_date": 1560110956000,
"content_id": "a29f2f379718ea725e1348915c6d7c6b37dc203f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ffa4b9bd50470a53aca6eecaa63df8c8e231e36a",
"extension": "py"... | 3.25 | stackv2 | #!/usr/bin/env python3
"""Simple script to query mac address with macaddress.io API
Script flow is
* Read arguments
* Query API
* Print Company Name as Output
Example:
./mac_addr_tool.py $(cat .api_key) 4F:3B:61:34:FD:E0
"""
import argparse
import re
import requests
import sys
def main():
parser = argparse.Arg... | 56 | 33.3 | 100 | 13 | 523 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5b4ab77e208d04ab_a917ee0c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data ... | [
33,
42,
46,
50,
53
] | [
null,
null,
null,
null,
null
] | [
11,
15,
15,
15,
15
] | [
67,
55,
49,
79,
49
] | |
2024-11-19T03:00:31.062605+00:00 | 1,462,467,060,000 | 0816773a5a09d0e19d83b3c90ee5b79ef7af7b8a | 2 | {
"blob_id": "0816773a5a09d0e19d83b3c90ee5b79ef7af7b8a",
"branch_name": "refs/heads/master",
"committer_date": 1462467060000,
"content_id": "81859a853fc41ed36fa2820bd3cfc9a4c93f8384",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8330b39fdb22e8c537c668861e81c099094051b4",
"extension": "py"... | 2.46875 | stackv2 | """
This file contains functions to facilitate the uploading of Static Large
Objects (SLO).
"""
import os
import json
from tempfile import NamedTemporaryFile
from django.conf import settings
from django.http import JsonResponse, HttpResponse
from django.shortcuts import render_to_response
from django.template import R... | 315 | 32.09 | 79 | 19 | 2,179 | python | [{"finding_id": "codeql_py/stack-trace-exposure_ebb693f8087ac451_93aa30f7", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
88,
101,
269
] | [
null,
null,
null
] | [
29,
29,
29
] | [
30,
30,
30
] | |
2024-11-19T03:11:22.230172+00:00 | 1,577,640,571,000 | 49c1957d403ee9fad709d744c80d634f6cced2d4 | 2 | {
"blob_id": "49c1957d403ee9fad709d744c80d634f6cced2d4",
"branch_name": "refs/heads/master",
"committer_date": 1577640571000,
"content_id": "c69fccc73481a3b36845de0fe9016c0e25fa1240",
"detected_licenses": [
"MIT"
],
"directory_id": "c5af4a9e23fba9fe61c7f105f6512c9b64e84501",
"extension": "py",
"fi... | 2.390625 | stackv2 | from flask import Flask, jsonify, abort, make_response
from flask_restful import Api, Resource, reqparse, marshal
from flasgger import swag_from
from flask_jwt_extended import jwt_required, get_jwt_identity
from app import db
from models import models
from utils.secure_creds import get_hashed_password
from resources.... | 64 | 47.58 | 126 | 17 | 616 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c01fcd1334e500cf_3104d71d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
42
] | [
null
] | [
15
] | [
24
] | |
2024-11-19T03:11:26.755995+00:00 | 1,524,833,664,000 | 697427340cc518607d94997599ff91839349cd3d | 3 | {
"blob_id": "697427340cc518607d94997599ff91839349cd3d",
"branch_name": "refs/heads/master",
"committer_date": 1525248457000,
"content_id": "cb3edbcd77cf05ed5b25235b7c04c74a1ab51f80",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6caf80a79f396fe3190719797c0525e8bd5f60f9",
"extension": "py"... | 2.703125 | stackv2 | import sys, csv, re, gzip
from os import listdir, sep
splitter = re.compile(r"[?!.]")
data_size = 0
def read_sentences(file_path):
global data_size
print('reading sentences from {}'.format(file_path))
g = gzip.open(file_path, 'r')
for l in g:
dicti = eval(l)
grade = dicti['overall']
line = dicti... | 57 | 22.68 | 89 | 21 | 406 | python | [{"finding_id": "codeql_py/overly-large-range_5e085d8096a6be96_49b7a1a8", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with A-\\u00d6 in the same character class.", "remediation": ""... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with A-\\u00d6 in the same character class.",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z{{|}}~\\u007f\\u0080\\u0081\\u0082\\u0083...."
] | [
19,
19
] | [
null,
null
] | [
33,
36
] | [
36,
39
] | |
2024-11-19T03:11:39.472493+00:00 | 1,688,583,611,000 | 693dd78587f39dd4c8c181f6a90448b4572e2bc5 | 2 | {
"blob_id": "693dd78587f39dd4c8c181f6a90448b4572e2bc5",
"branch_name": "refs/heads/master",
"committer_date": 1688583611000,
"content_id": "a03514293714b8cdf72fa25e0c740bb53580204d",
"detected_licenses": [
"MIT"
],
"directory_id": "6ca924d3c3b56e12e838e7c271da25fc91b5687a",
"extension": "py",
"fi... | 2.3125 | stackv2 | # coding: utf-8
"""
Base para desarrollo de modulos externos.
Para obtener el modulo/Funcion que se esta llamando:
GetParams("module")
Para obtener las variables enviadas desde formulario/comando Rocketbot:
var = GetParams(variable)
Las "variable" se define en forms del archivo package.json
Para modifica... | 387 | 31.15 | 156 | 23 | 2,653 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_ea0acdc482bb39db_46b2ba52", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [database.windows.net](1) may be at an arbitrary positi... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [database.windows.net](1) may be at an arbitrary position in the sanitized URL."
] | [
80
] | [
null
] | [
12
] | [
56
] | |
2024-11-19T03:11:50.306660+00:00 | 1,609,818,556,000 | 8901c39c3133ebe37b4c593718a5026b9de84a49 | 2 | {
"blob_id": "8901c39c3133ebe37b4c593718a5026b9de84a49",
"branch_name": "refs/heads/main",
"committer_date": 1609818556000,
"content_id": "bf6c4ab5e190769f9feb389f0b085008b46e7455",
"detected_licenses": [
"MIT"
],
"directory_id": "024527d4565061c746ca8fc611213fbf2b37e5ac",
"extension": "py",
"file... | 2.453125 | stackv2 | import os
from flask import Flask
from flask import (
request, json
)
import requests
def create_app(test_config=None):
# create and configure the app
app = Flask(__name__, instance_relative_config=True)
app.config.from_mapping(
SECRET_KEY='dev',
DATABASE=os.path.join(app.instance_p... | 78 | 26.58 | 103 | 20 | 452 | python | [{"finding_id": "codeql_py/partial-ssrf_147598b416b5b7d4_caba3c03", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
60
] | [
null
] | [
21
] | [
38
] | |
2024-11-19T03:11:53.639517+00:00 | 1,511,584,480,000 | 6f59e8b68a34c6c9e2a6448e10f0172528e222d2 | 3 | {
"blob_id": "6f59e8b68a34c6c9e2a6448e10f0172528e222d2",
"branch_name": "refs/heads/master",
"committer_date": 1511584480000,
"content_id": "06ea41bf03ce495bf48cb15e690cff1eb614fdc1",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "8110353305c60a5ae8adce62aaf53eda2676177e",
"extension": "p... | 2.703125 | stackv2 | # Imports a tab delimited data file containing
# reactor data to output formatted input for
# Cycamore Reactors.
from pyne import nucname as nn
import csv
import jinja2
import os
import sys
def import_csv(in_csv, delimit):
""" Imports contents of a comma delimited csv file
to a 2D list.
Parameters
---... | 354 | 30.22 | 78 | 20 | 2,487 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9f28cd0c3f7a34a5_2c8dac43", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
46
] | [
null
] | [
27
] | [
58
] | |
2024-11-19T03:12:14.426673+00:00 | 1,614,256,753,000 | a18dfd3991194fb03f751c9b40968952dd3e2486 | 3 | {
"blob_id": "a18dfd3991194fb03f751c9b40968952dd3e2486",
"branch_name": "refs/heads/main",
"committer_date": 1614256753000,
"content_id": "854e17e9805fe300dfbc2d20bc487b09267def69",
"detected_licenses": [
"MIT"
],
"directory_id": "0e2704eb41a028a3e76c03c4eccc01653f8034fc",
"extension": "py",
"file... | 2.703125 | stackv2 | #!/usr/bin/python
import subprocess
import time
import logging
import os
import glob
import sys
# append the path to the main script to the system path so other modules can get pulled in when executing via cron
sys.path.append(os.path.split(os.path.realpath(__file__))[0])
start_time = time.time()
# Some critical bu... | 189 | 37.56 | 126 | 17 | 1,705 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_666bee20f1e81c53_25b3482b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive dat... | [
74,
84,
116,
119,
121,
175
] | [
75,
null,
null,
null,
null,
null
] | [
22,
13,
21,
30,
23,
13
] | [
50,
88,
70,
59,
73,
98
] | |
2024-11-19T03:12:18.220466+00:00 | 1,324,020,222,000 | 2a6e34b33ab80acf7168ddb6bbaf17e8d368fb05 | 3 | {
"blob_id": "2a6e34b33ab80acf7168ddb6bbaf17e8d368fb05",
"branch_name": "refs/heads/master",
"committer_date": 1324020222000,
"content_id": "97d5e1a60e0fb392b2b1667d26a135336173020a",
"detected_licenses": [
"ZPL-2.1"
],
"directory_id": "af5e25b019c7d2ab7d5a961ae2e8bacc1cde2045",
"extension": "py",
... | 2.8125 | stackv2 | import re
from cssmin import cssmin
class KeywordMapper:
def __init__(self, regexp, encoder):
if isinstance(regexp, (str, unicode)):
self.regexp = re.compile(regexp)
else:
self.regexp = regexp
self.encoder = encoder
self.mapping = {}
def analyseKeywords... | 397 | 38.84 | 134 | 20 | 3,639 | python | [{"finding_id": "codeql_py/redos_d104125e01d9641d_beb54c7e", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with ''' and containing many repetition... | 4 | true | [
"CWE-1333",
"CWE-1333",
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos",
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with ''' and containing many repetitions of '\\\\\\n'.",
"This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\\\n'.",
"This part of... | [
301,
302,
345,
346
] | [
null,
null,
null,
null
] | [
32,
32,
28,
28
] | [
48,
48,
44,
44
] | |
2024-11-19T03:12:53.611356+00:00 | 1,460,011,851,000 | 73ce8eb4ab5f791e96cb303fdc8e8aa44fb67f5b | 2 | {
"blob_id": "73ce8eb4ab5f791e96cb303fdc8e8aa44fb67f5b",
"branch_name": "refs/heads/master",
"committer_date": 1460011851000,
"content_id": "d157bf200440fcf7dd04d117e0dedc436b7f3a18",
"detected_licenses": [
"MIT"
],
"directory_id": "5a15828b57bbaa8b41716a274be6b92e72e8d672",
"extension": "py",
"fi... | 2.453125 | stackv2 | # MobiBook.py
import os
import sys
from glob import glob
from urllib import urlencode
import subprocess
import httplib
import re
from time import sleep
from bs4 import BeautifulSoup
from mobi.mobi import Mobi
from customexceptions import *
class MobiBook(object):
amazonASINPat = re.compile(r'data\-asin=\"([a-zA-z... | 194 | 36.28 | 144 | 19 | 1,724 | python | [{"finding_id": "codeql_py/overly-large-range_152ab424528d3816_5fe455c1", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
16
] | [
null
] | [
52
] | [
55
] | |
2024-11-19T03:35:47.612302+00:00 | 1,511,506,760,000 | 8cee31d0e5cb6578811e4f8503c24022999946f7 | 3 | {
"blob_id": "8cee31d0e5cb6578811e4f8503c24022999946f7",
"branch_name": "refs/heads/master",
"committer_date": 1511506760000,
"content_id": "4dddbbf61365e66f9e77f4f44580738c0cbf9a95",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "473df8252b80b24823456be24a6cd26b543b448d",
"extension": "p... | 2.796875 | stackv2 | from bs4 import BeautifulSoup
import re
import os
import shutil
from utils import *
source_dir = "files"
results_dir = "clean"
base_url = "https://ce3-wiki.herokuapp.com/"
wiki_url = "http://eop.wikidot.com/"
def setup_dir(directory):
if not os.path.exists(directory):
os.makedirs(directory)
else:
... | 93 | 24.11 | 70 | 17 | 539 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_184cf2e6a7cf6340_5d0c74ed", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This string, which is used as a regular expression [here](1), has an unescaped '.' before 'wikidot.com/', so it might match more hosts than expected."
] | [
10
] | [
null
] | [
13
] | [
36
] | |
2024-11-19T01:29:19.688172+00:00 | 1,446,655,339,000 | a13859b9769f3c5a44e0c855dfd1676818ed8d4e | 3 | {
"blob_id": "a13859b9769f3c5a44e0c855dfd1676818ed8d4e",
"branch_name": "refs/heads/master",
"committer_date": 1446655339000,
"content_id": "fe93867a26f017d7b0c514eea8185ef7b36540d2",
"detected_licenses": [
"MIT"
],
"directory_id": "b3f53748ed5d09ed646b47f87e2306921c2efbd5",
"extension": "py",
"fi... | 2.515625 | stackv2 | from xml.etree import ElementTree
import yaml
from jinja2 import Template
class Pipeline(object):
def __init__(self, settings_file):
self.pipeline_group = None
self.structure = None
self.element = None
self.materials = None
self.stage = None
self.job = None
s... | 102 | 38.35 | 86 | 19 | 795 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e0d52af870865a5e_a5d29305", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
19
] | [
null
] | [
24
] | [
75
] | |
2024-11-19T01:30:13.487224+00:00 | 1,623,772,574,000 | a45e6c3d2b79b2d4a67a55750c5c456bdfbc0ca1 | 4 | {
"blob_id": "a45e6c3d2b79b2d4a67a55750c5c456bdfbc0ca1",
"branch_name": "refs/heads/main",
"committer_date": 1623772574000,
"content_id": "4cd4bc2e5beb3c43cd7839ea2e03df23f68d4f05",
"detected_licenses": [
"MIT"
],
"directory_id": "081e0928e4f3130a71427425f82638973a76c5b8",
"extension": "py",
"file... | 3.5 | stackv2 | # working with GIT
# git config --global user.name "Krystof Edouwossi"
# git config --global user.email "kwadjooe@gmail.com"
# git init
# git add *.*
# git status
# git commit -m "Initial commit"
# git log
# git log --oneline
# git log --online -n 3
# git checkout hash_number identify [Detach from the master branch]... | 54 | 30.72 | 87 | 11 | 473 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0e5a5711efdca6c1_aa80439e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
33
] | [
null
] | [
7
] | [
85
] | |
2024-11-19T01:30:18.119988+00:00 | 1,493,046,739,000 | c887ce17266654b9b0cdded21bd091660a8a415a | 3 | {
"blob_id": "c887ce17266654b9b0cdded21bd091660a8a415a",
"branch_name": "refs/heads/master",
"committer_date": 1493046739000,
"content_id": "85543eba16bb3d9c4f732f9c71028b28fe497033",
"detected_licenses": [
"MIT"
],
"directory_id": "e9482f69dba6b0bf777b755690e5c9900ac62f2e",
"extension": "py",
"fi... | 2.578125 | stackv2 | from threading import Timer
from packtpub import PacktpubController
import time, base64, cherrypy
class Root(object):
def __init__(self, pull_delay):
cherrypy.engine.subscribe('stop', self.stop)
self.status = ""
self.timer = None
self.users = [];
self.next_pull_time = 0
self.pull_delay = pull_delay
def ... | 127 | 26.82 | 101 | 19 | 1,018 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b1b64f062c05d08b_5eb6ced1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
82
] | [
null
] | [
22
] | [
42
] | |
2024-11-19T01:30:34.720797+00:00 | 1,570,603,712,000 | 76b5d366238ab737db761b511ada56a6df1d9b4e | 3 | {
"blob_id": "76b5d366238ab737db761b511ada56a6df1d9b4e",
"branch_name": "refs/heads/master",
"committer_date": 1570603712000,
"content_id": "84b01480b7e29825e0ceee3021b69c84e3fe218a",
"detected_licenses": [
"MIT"
],
"directory_id": "d0006f6334136db2240806e0557164e7989187a1",
"extension": "py",
"fi... | 2.609375 | stackv2 | import gmail
import requests
# import ConfigParser
import configparser
import os
import html2text
from library.config_parser import configSectionParser
from openpyxl import load_workbook, worksheet
from flask import Flask
from flask import jsonify
#INIT CONFIG
config = configparser.ConfigParser()
config.read("config/... | 144 | 24.79 | 80 | 18 | 843 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_753f47d59c8ba712_ad5f9f5d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
45
] | [
null
] | [
23
] | [
52
] | |
2024-11-19T01:54:56.206277+00:00 | 1,523,140,777,000 | 4ca9c9f7699f8c58aa688e9ccda38542d601fd81 | 2 | {
"blob_id": "4ca9c9f7699f8c58aa688e9ccda38542d601fd81",
"branch_name": "refs/heads/master",
"committer_date": 1523140777000,
"content_id": "bc334749699505fa9f49cb94a81f7f3dfcc3985c",
"detected_licenses": [
"MIT"
],
"directory_id": "b64b8974658451c3dead32d76137cfc35b09eb14",
"extension": "py",
"fi... | 2.390625 | stackv2 | from flask import Flask, request
from flask_restful import Api
import os
from src.PdfHandler import PdfHandler
app = Flask(__name__)
api = Api(app)
local_dir = 'C:/test/local/'
pdf_handler = PdfHandler()
@app.route('/tasks', methods=['POST', 'DELETE'])
def api_task():
if request.method == 'POST':
print... | 35 | 21.74 | 79 | 17 | 195 | python | [{"finding_id": "codeql_py/path-injection_fe8fa0bf259c5766_f91a27f5", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
21,
27
] | [
null,
null
] | [
35,
19
] | [
45,
77
] | |
2024-11-19T01:54:56.973505+00:00 | 1,605,253,690,000 | 7c07c1f862d7c03bac74badd74e5187c1797ae6a | 3 | {
"blob_id": "7c07c1f862d7c03bac74badd74e5187c1797ae6a",
"branch_name": "refs/heads/main",
"committer_date": 1605253690000,
"content_id": "0a818b7dc072b58c7de83a21598084050011d0a9",
"detected_licenses": [
"MIT"
],
"directory_id": "747139140194a79f6eefe519e84f4adf544109e9",
"extension": "py",
"file... | 2.65625 | stackv2 |
#!/usr/local/bin/python
# -*- coding: utf-8 -*-
__author__ = 'mvheimburg'
from concurrent import futures
import sys
from os import environ, path
import flask
from flask import request, jsonify
from flask_cors import CORS
import yaml
from pythonpath import add_dir_to_pythonpath
from definitions import ROOT_DIR
dat... | 114 | 26.71 | 76 | 13 | 789 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_808bcf71bf57a689_7be1ff10", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secre... | [
50,
65,
66,
67,
68
] | [
null,
null,
null,
null,
null
] | [
11,
7,
7,
7,
7
] | [
21,
25,
27,
33,
35
] | |
2024-11-19T01:55:09.220924+00:00 | 1,551,540,879,000 | 474c110e90c8eede86778ed323238150b828daba | 3 | {
"blob_id": "474c110e90c8eede86778ed323238150b828daba",
"branch_name": "refs/heads/master",
"committer_date": 1551540879000,
"content_id": "b90a10c9808ab4fc7a4d03131c46fddf41379252",
"detected_licenses": [
"MIT"
],
"directory_id": "78b7e9e7c58324e77a151e8fb3ae55709605900b",
"extension": "py",
"fi... | 2.640625 | stackv2 |
import csv
from weibo_data.models import *
def run():
weibo_datas = WeiboData.objects.all()
weibo_users = WbUser.objects.all()
uid2weibo_user = {w.uid: w for w in weibo_users}
head = ['微博id', '用户id', '昵称', '性别', '生日', '所在地', '简介', '注册时间', '关注数', '粉丝数', '微博数', '头像',
'联系信息', '教育信息', '工作信息', ... | 48 | 33.65 | 97 | 14 | 452 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_111e49f936472ae8_eac39b6e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
47
] | [
null
] | [
19
] | [
23
] | |
2024-11-19T01:55:09.645769+00:00 | 1,629,466,743,000 | 5ac9dbefdce8fadd2cf7589469c34674e19e3f46 | 3 | {
"blob_id": "5ac9dbefdce8fadd2cf7589469c34674e19e3f46",
"branch_name": "refs/heads/main",
"committer_date": 1629466743000,
"content_id": "291dab652cedfdb46cb0015e73ef9b9ee5a33653",
"detected_licenses": [
"MIT"
],
"directory_id": "62cde56e54ee6f166f3e84c3adf8d1687bee035f",
"extension": "py",
"file... | 2.59375 | stackv2 | from mediaaccount import MediaAccountClient
import sys,getopt
import logging
logging.basicConfig(
level=logging.DEBUG,
format="%(asctime)s [%(levelname)s] %(message)s",
handlers=[
logging.StreamHandler(sys.stdout)
]
)
def main(argv):
verbose = False
apiKey = None
all = Fals... | 59 | 25.83 | 102 | 15 | 416 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d8259ed5e45f15d4_a4fc4b03", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
47
] | [
null
] | [
11
] | [
42
] | |
2024-11-19T02:06:44.893877+00:00 | 1,620,046,732,000 | d9b2eae2222344643aa8b3bc8f21e3075b9bc5b7 | 2 | {
"blob_id": "d9b2eae2222344643aa8b3bc8f21e3075b9bc5b7",
"branch_name": "refs/heads/master",
"committer_date": 1620046732000,
"content_id": "b7e961723f2550ed7e2086e37353deaf68b647d4",
"detected_licenses": [
"MIT"
],
"directory_id": "6a305c526bb20d648bc2a750406fa5bfcc0daf81",
"extension": "py",
"fi... | 2.359375 | stackv2 | from flask import Blueprint, request
from databases.models import shipstationAddresses
import requests
import dropbox
import csv
import os
import json
import pandas as pd
from datetime import date, datetime
from appdb import db
# Blueprint Configuration
ss_bp = Blueprint('ssaddresses_bp', __name__,
... | 75 | 36.92 | 144 | 17 | 703 | python | [{"finding_id": "codeql_py/stack-trace-exposure_ad33eb9eb316c964_843d347f", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-918"
] | [
"py/stack-trace-exposure",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"The full URL of this request depends on a [user-provided value](1)."
] | [
49,
31
] | [
null,
null
] | [
25,
16
] | [
38,
77
] | |
2024-11-19T02:07:00.754219+00:00 | 1,612,481,476,000 | 6bf47858b5569b9f5d9884021fb7a0dae611cf69 | 2 | {
"blob_id": "6bf47858b5569b9f5d9884021fb7a0dae611cf69",
"branch_name": "refs/heads/main",
"committer_date": 1612481476000,
"content_id": "2e60283db39d9f25facd6d5c6d2413e68ec42eb8",
"detected_licenses": [
"MIT"
],
"directory_id": "2a0545bd4cc8137334007d49763f0ec6dce0f5f8",
"extension": "py",
"file... | 2.4375 | stackv2 | """
This python script defines a PolicyGenerator, which is used to
generates iam yaml files for all the users
"""
import logging
import re
import sys
from collections import defaultdict
from pathlib import (
Path,
PurePath,
)
from policy import INDENT
from policy_group import (
PolicyGroup, )
from person... | 219 | 34.46 | 102 | 18 | 1,616 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_946724b26d604c17_20259e45", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
151,
94
] | [
null,
95
] | [
28,
30
] | [
35,
75
] | |
2024-11-19T02:07:16.395060+00:00 | 1,617,527,183,000 | 84e32f201143807c9338061c3f261de6a72600a0 | 2 | {
"blob_id": "84e32f201143807c9338061c3f261de6a72600a0",
"branch_name": "refs/heads/main",
"committer_date": 1617527183000,
"content_id": "4780981da7da35dfd61304aadd0a1d2d476cfda2",
"detected_licenses": [
"MIT"
],
"directory_id": "22389b45317289e52249b875c288ec253057752b",
"extension": "py",
"file... | 2.359375 | stackv2 | import requests
import json
def setu_api(r18):
# 单个插件测试请将API_KEY.json复制到api目录下
# 0为非 R18,1为 R18,2为混合
with open("API_KEY.json",'r') as load_f:
load_dict = json.load(load_f)
key = load_dict["LDST_API_KEY"]
json_con = requests.get(f"https://api.lolicon.app/setu/?apikey={key}&r18={r18}")
... | 22 | 30.77 | 84 | 11 | 226 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f443020f6ea0d124_69a2b586", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
22
] | [
null
] | [
11
] | [
22
] | |
2024-11-19T02:31:36.032893+00:00 | 1,524,498,944,000 | d8c305768f401fb3b3bd56037857e435b86bca28 | 3 | {
"blob_id": "d8c305768f401fb3b3bd56037857e435b86bca28",
"branch_name": "refs/heads/master",
"committer_date": 1524498944000,
"content_id": "175ed291c497cf7c34aa6429bbcc03f84f2f7c6c",
"detected_licenses": [
"MIT"
],
"directory_id": "fa87a6440b735c135703acdd757531d5fc6a5049",
"extension": "py",
"fi... | 3.265625 | stackv2 | import socket
import hashlib
from Crypto.Cipher import AES
import ssl
KEY = hashlib.sha256("some random password").digest() #this will convert any pnemonic string which the user wants to choose as password to a 32 bit encrypted object
IV = "abcdefghijklmnop" #Initialization vector should always be 16 bit
obj = AES.n... | 35 | 35.91 | 164 | 11 | 349 | python | [{"finding_id": "codeql_py/insecure-default-protocol_f037677a73abf8c9_d9af606a", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
16
] | [
null
] | [
13
] | [
84
] | |
2024-11-19T02:31:58.584306+00:00 | 1,543,230,153,000 | a798dbb7a1ea449442ed1cfa77c2f01b1fa26f3f | 2 | {
"blob_id": "a798dbb7a1ea449442ed1cfa77c2f01b1fa26f3f",
"branch_name": "refs/heads/master",
"committer_date": 1543230153000,
"content_id": "c36b52a2a1db2fa71ea5ff1dfaf849842e67dce1",
"detected_licenses": [
"MIT"
],
"directory_id": "c5658dcc258b35610e40bb3bbe416f16423b5413",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/bin/env/python3
# -*- coding: utf-8 -*-
import re
import copy
from random import choice
from datetime import datetime
import requests
import pandas as pd
requests.packages.urllib3.disable_warnings()
session = requests.Session()
login_url = "https://cas.dgut.edu.cn/home/Oauth/getToken/appid/shixun.html"
id_url = "... | 102 | 29.67 | 110 | 13 | 926 | python | [{"finding_id": "codeql_py/request-without-cert-validation_deeb699438923a5e_3b68119b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 6 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
58,
61,
62,
67,
81,
95
] | [
null,
null,
null,
null,
null,
null
] | [
18,
18,
5,
15,
25,
19
] | [
58,
76,
73,
52,
68,
94
] | |
2024-11-19T02:32:40.872389+00:00 | 1,557,408,287,000 | 0c28988d28108e8ff8c2bcf3582e2050199f424d | 2 | {
"blob_id": "0c28988d28108e8ff8c2bcf3582e2050199f424d",
"branch_name": "refs/heads/master",
"committer_date": 1557408287000,
"content_id": "17951703a6c3aeb8da06591a2341aba89cb8a810",
"detected_licenses": [
"MIT"
],
"directory_id": "d7cfcb21216999ea71e064c1d7470da6918e5fe5",
"extension": "py",
"fi... | 2.359375 | stackv2 | """
Routes and views for the flask application.
"""
from datetime import datetime
from flask import render_template, jsonify, request, session, redirect, url_for
import json
from FlaskWebProject import app
from PgoInventories import PgoInventories
import hashlib
pi = PgoInventories()
app.config['JSON_AS_ASCII'] = Fal... | 117 | 31.69 | 127 | 21 | 962 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1757d79b7d0dc91e_908ca204", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
36
] | [
null
] | [
29
] | [
115
] | |
2024-11-19T02:32:48.489807+00:00 | 1,434,545,256,000 | 592587a36d22e62b93fa017231f79f9faab600df | 2 | {
"blob_id": "592587a36d22e62b93fa017231f79f9faab600df",
"branch_name": "refs/heads/master",
"committer_date": 1434545256000,
"content_id": "e397cadfc5db6d773a1ad747f90eb61bb43c1f29",
"detected_licenses": [
"MIT"
],
"directory_id": "a4509a288077562104532e397902b5f726d1eac2",
"extension": "py",
"fi... | 2.46875 | stackv2 | # coding: utf-8
from flask import send_file, Flask, make_response, request, render_template
from werkzeug import secure_filename
app = Flask(__name__)
INTERNAL_IP = '192.168.31.159'
INTERNAL_PORT = '5000'
INTERNAL_URL = 'http://{}:{}/get_files'.format(INTERNAL_IP,
INTERNA... | 40 | 29.23 | 90 | 17 | 290 | python | [{"finding_id": "codeql_py/path-injection_1c41c464025ba7e8_5be24710", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
31
] | [
null
] | [
23
] | [
49
] | |
2024-11-19T02:32:48.869563+00:00 | 1,634,064,777,000 | 85b2a4173d733339ee03344777d573853386cd41 | 3 | {
"blob_id": "85b2a4173d733339ee03344777d573853386cd41",
"branch_name": "refs/heads/master",
"committer_date": 1634064777000,
"content_id": "7ec5bd839081cebbff6a9a51ac009f4b8f40bb02",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "f82ea50d91fd10f69853ebe563040d48f3d684b7",
"extension": "p... | 2.609375 | stackv2 | from __future__ import unicode_literals
import array
from collections import defaultdict
import io
import logging
import os
import zipfile
import six
from six.moves.urllib.request import urlretrieve
import torch
from tqdm import tqdm
import tarfile
from .utils import reporthook
logger = logging.getLogger(__name__)
... | 400 | 40.2 | 98 | 22 | 3,794 | python | [{"finding_id": "codeql_py/tarslip_744014190d89e70f_e98b4aaf", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
262
] | [
null
] | [
25
] | [
28
] | |
2024-11-19T02:33:01.908775+00:00 | 1,612,863,917,000 | 3ed5a56971a31812b517828a5394d9a692d10dd4 | 3 | {
"blob_id": "3ed5a56971a31812b517828a5394d9a692d10dd4",
"branch_name": "refs/heads/main",
"committer_date": 1612863917000,
"content_id": "f8156d833ba2cf60153f2014e85c940ac2bd2e4d",
"detected_licenses": [
"MIT"
],
"directory_id": "4c7ce27e5ca0a058b7abe7d495fa19f0ded8e348",
"extension": "py",
"file... | 2.9375 | stackv2 | import os
import threading
import time
import serial
import micropyGPS
import subprocess
import pigpio
import bme280
from output1_csv import write_position
from acc import bmx055 #
pi = pigpio.pi()
#ポート番号の定義
Sw_pin = 23 #変数"Sw_pin"に23を格納
pi.set_mode( Sw_pin, pigpio.INPUT )
pi.set_pull_up_do... | 162 | 28.23 | 127 | 13 | 1,724 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_09a18439d2be584f_e841853b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
85
] | [
null
] | [
15
] | [
73
] | |
2024-11-19T02:43:29.303034+00:00 | 1,607,501,811,000 | 57dafdf10adea93c92726e88b81e7a78e48c45fa | 2 | {
"blob_id": "57dafdf10adea93c92726e88b81e7a78e48c45fa",
"branch_name": "refs/heads/master",
"committer_date": 1607501811000,
"content_id": "ea1afa5d25817eccf1294e126b2947cb86697602",
"detected_licenses": [
"MIT"
],
"directory_id": "5df88ebfa3dd3a9dfb750f46cc29a075dc22b0e3",
"extension": "py",
"fi... | 2.46875 | stackv2 | #!/usr/bin/env python3
import subprocess
import psutil
from PIL import Image
import ST7735
from bme280 import BME280
from ltr559 import LTR559
from pms5003 import PMS5003
from pms5003 import ReadTimeoutError as pmsReadTimeoutError
from enviroplus import gas
from fastapi import FastAPI
app = FastAPI()
pms5003 = PMS5... | 136 | 22.54 | 98 | 17 | 917 | python | [{"finding_id": "codeql_py/stack-trace-exposure_7236e1fcf4b6ee52_a79ae976", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
53,
70,
102,
120
] | [
56,
73,
105,
123
] | [
16,
16,
16,
16
] | [
10,
10,
10,
10
] | |
2024-11-19T02:54:55.877806+00:00 | 1,626,845,089,000 | a73f8364bf3b0381766960d58afe8312335f5136 | 2 | {
"blob_id": "a73f8364bf3b0381766960d58afe8312335f5136",
"branch_name": "refs/heads/master",
"committer_date": 1626845089000,
"content_id": "d997d09dfe1a1a35d92c9051b5a96c97641708fa",
"detected_licenses": [
"MIT"
],
"directory_id": "1e3c667895b672871ac9b5601cd84e62d30f6d60",
"extension": "py",
"fi... | 2.34375 | stackv2 | from sklearn.feature_extraction.text import CountVectorizer
from sklearn.metrics.pairwise import cosine_similarity
import numpy as np
import nltk
from nltk.tokenize import word_tokenize
from nltk.corpus import stopwords
import textract
from itertools import chain
from pyresparser import ResumeParser
from flask import F... | 173 | 28.78 | 102 | 17 | 1,245 | python | [{"finding_id": "codeql_py/reflective-xss_7d0a5d278b384570_fa8bce4e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
161
] | [
null
] | [
12
] | [
17
] | |
2024-11-19T02:54:56.443311+00:00 | 1,627,917,523,000 | 972242a08fbac2181e0e35b83c913e9ad6f9a8d3 | 3 | {
"blob_id": "972242a08fbac2181e0e35b83c913e9ad6f9a8d3",
"branch_name": "refs/heads/main",
"committer_date": 1627917523000,
"content_id": "94918800deb86325d3ede178fa989e89d115218c",
"detected_licenses": [
"MIT"
],
"directory_id": "ff792a8033a09d4edc9edb00a31935e6a70d2d1f",
"extension": "py",
"file... | 2.53125 | stackv2 | #!/usr/bin/python
# -*- coding: latin-1 -*-
from __future__ import division # need for seconds calculation (could be removed with Python 2.7)
__author__ = 'fermin'
# This program stores everything it receives by HTTP in a given URL (pased as argument),
# Then return the accumulated data upon receiving 'GET <host>:<... | 382 | 28.17 | 137 | 23 | 2,892 | python | [{"finding_id": "codeql_py/reflective-xss_25941360e0ed99c1_6df67440", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
313
] | [
null
] | [
12
] | [
14
] | |
2024-11-19T02:55:10.542957+00:00 | 1,441,408,413,000 | 266367cf4a569da61de5b5a2b1081e6c91091845 | 3 | {
"blob_id": "266367cf4a569da61de5b5a2b1081e6c91091845",
"branch_name": "refs/heads/master",
"committer_date": 1441408413000,
"content_id": "1312a4046f392dadf0a4e438b1f5d1e3d1f68fdb",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "d62bd8dc71370f0f77b0c36c95ff4e31960b45a6",
"extension": "p... | 2.546875 | stackv2 | import copy
import os
import tarfile
import urllib2
import zipfile
from calcrepo import index
from calcrepo import output
class CalcRepository:
"""A class for adding new calcpkg repositories"""
def __init__(self, name, url):
self.name = name
self.url = url
self.output = output.CalcpkgOutput(True, False)
... | 188 | 28.64 | 121 | 21 | 1,436 | python | [{"finding_id": "codeql_py/tarslip_d93d8fb44546bd0f_08140066", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)."
] | [
152
] | [
null
] | [
6
] | [
13
] | |
2024-11-19T02:55:36.789166+00:00 | 1,522,568,697,000 | 4931ab6b055ea7d2ced80bd74fcd8ffd6c1431c8 | 2 | {
"blob_id": "4931ab6b055ea7d2ced80bd74fcd8ffd6c1431c8",
"branch_name": "refs/heads/master",
"committer_date": 1522568888000,
"content_id": "2d26ecbcc9a291bf81dc48e1145fb175a853eba3",
"detected_licenses": [
"MIT"
],
"directory_id": "c5b093fc2267235ac058e14de78ca1e67a4658ee",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/env python
from flask import Flask, request, Response
import requests
import xml.etree.ElementTree as et
import logging
import sys
import os
from urlparse import urlparse, parse_qs
import kml2bmw
logging.basicConfig(filename='/var/log/kml2bmw/kml2bmw.log',level=logging.DEBUG)
app = Flask(__name__)
@app.... | 57 | 24.07 | 85 | 16 | 338 | python | [{"finding_id": "codeql_py/log-injection_31ed76abc1985199_531f7474", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
21
] | [
null
] | [
22
] | [
55
] | |
2024-11-19T02:55:38.731219+00:00 | 1,515,485,676,000 | 66dee6db71152ff73e0b95b075bd5a869e0dcdf1 | 2 | {
"blob_id": "66dee6db71152ff73e0b95b075bd5a869e0dcdf1",
"branch_name": "refs/heads/master",
"committer_date": 1515485676000,
"content_id": "067dd1a06e24ae55dfc3b2f243c70fb4ac2e76d4",
"detected_licenses": [
"MIT"
],
"directory_id": "23a56e0555d6b27aa444d8396ec32f9d2b678a39",
"extension": "py",
"fi... | 2.453125 | stackv2 | import yaml
import json
import logging
from timeit import default_timer as timer
from multiprocessing import Process, Manager
from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer
from compas_fabrication.fabrication.robots.rfl import SimulationCoordinator, SimulationError
logging.basicConfig(format='%(process)... | 101 | 38.61 | 113 | 20 | 930 | python | [{"finding_id": "codeql_py/log-injection_4924e862c7e3dd01_2c5eef69", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
39
] | [
null
] | [
39
] | [
48
] | |
2024-11-19T02:56:00.530063+00:00 | 1,454,671,087,000 | 7f53a571e72627509d2b0f45ce9f797b44865b95 | 3 | {
"blob_id": "7f53a571e72627509d2b0f45ce9f797b44865b95",
"branch_name": "refs/heads/master",
"committer_date": 1454671087000,
"content_id": "618387c7a9cd016c69a6034faf54c20f1898fd47",
"detected_licenses": [
"MIT"
],
"directory_id": "77a26359b319cd5e127a93a130b28f641b1caf51",
"extension": "py",
"fi... | 2.765625 | stackv2 | import json
import base64
def load_docker_conf(dockercfg_path):
dockercfg_json = None
with open(dockercfg_path) as data_file:
dockercfg_json = json.load(data_file)
return dockercfg_json
def generate_secret(dockercfg_json):
auths_removed_dict = dockercfg_json.get('auths')
if not auths_... | 75 | 23.73 | 151 | 13 | 488 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_37a2c16ac190e98a_94a62480", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text."
] | [
28
] | [
null
] | [
41
] | [
52
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.