added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T21:14:08.964789+00:00 | 1,567,760,578,000 | 0a573b841f611615015c23719ec053a60497af53 | 2 | {
"blob_id": "0a573b841f611615015c23719ec053a60497af53",
"branch_name": "refs/heads/master",
"committer_date": 1567760578000,
"content_id": "289773bd758cf354ca8cfa74d91417c92c4c36cb",
"detected_licenses": [
"MIT"
],
"directory_id": "d5302d7f629218a3ebf1a3b94b9f60d0b0650f7b",
"extension": "py",
"fi... | 2.421875 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""
基本流程:
1、模拟请求登录的验证码地址,无验证码验证的可请求登录页面,获取到验证码流和cookie信息
2、将验证码流提交验证码识别平台进行验证
3、模拟请求登录地址,带上自动识别的验证码、请求验证码的cookie信息(这点很重要)、header信息和账号信息
4、登录成功后同样每次请求后台地址必须带上cookie,获取对应数据
"""
from website.LoginInterFace import *
import requests
import logging
import sys
import re
cla... | 135 | 34.91 | 108 | 19 | 1,314 | python | [{"finding_id": "codeql_py/request-without-cert-validation_8be8261bbe13b781_bb9c7823", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
70
] | [
75
] | [
15
] | [
23
] | |
2024-11-18T21:14:14.816541+00:00 | 1,628,111,887,000 | e325342c4ff452a6ce323b108d8568682b6ffeaa | 2 | {
"blob_id": "e325342c4ff452a6ce323b108d8568682b6ffeaa",
"branch_name": "refs/heads/master",
"committer_date": 1628111887000,
"content_id": "f109cf9634c467e96ac6b3a7f8a2ec80f5348f12",
"detected_licenses": [
"MIT"
],
"directory_id": "29bc0c3e4e6260a78f16747195cb717c1ed48ec1",
"extension": "py",
"fi... | 2.46875 | stackv2 | #!/usr/bin/env python
"""
Created on Apr 2, 2013
Revised on Apr 7, 2017 + include EASE2 support
@author: DGL
"""
from .loadsir import loadsir
from .ease2helper import ease2_map_info
import numpy as np
import sys
import argparse
def sirstring(a, cnt):
"""
sirstring(a,cnt)
decodes and returns a string sta... | 268 | 31.33 | 88 | 21 | 2,992 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4ebcbb299c3519d2_26c45176", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
152
] | [
null
] | [
34
] | [
46
] | |
2024-11-18T21:14:17.198020+00:00 | 1,453,191,948,000 | 84bde9376ff7306ed0d639423955395662380f43 | 3 | {
"blob_id": "84bde9376ff7306ed0d639423955395662380f43",
"branch_name": "refs/heads/master",
"committer_date": 1453191948000,
"content_id": "a340409e598ccf11abfd6a7fc8f4ffcce1e1fc83",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cbc0d870328533a1c5855401f4ab97e167b5a5d8",
"extension": "py"... | 2.609375 | stackv2 | # -*- coding=utf-8 -*-
#!/bin/env python
from jinja2 import Environment, FileSystemLoader
from collections import OrderedDict
class PolicyBase(object):
def __init__(self,pid=None):
env = Environment(loader=FileSystemLoader('.'))
self.template = env.get_template('templates/policydocument.tpl')
... | 70 | 30.77 | 91 | 15 | 471 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e73aeb7a00c6a048_df2d2eaa", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
9
] | [
null
] | [
15
] | [
56
] | |
2024-11-18T21:14:19.014925+00:00 | 1,386,254,397,000 | 48600a8d8077938caab4a7762b88afe56708e0bc | 3 | {
"blob_id": "48600a8d8077938caab4a7762b88afe56708e0bc",
"branch_name": "refs/heads/master",
"committer_date": 1386254397000,
"content_id": "4b98b2a4bd823fc444ed9afbb4941ebf8b1a1bd7",
"detected_licenses": [
"Unlicense"
],
"directory_id": "c0c9b9bcc9d9e3f06afb6b81bf4f06823f0bf98a",
"extension": "py",... | 2.5625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
Staples is a simple static site generator based on the idea of processors
mapped to types of files. It includes a basic server for development, and
has no external requirements itself, beyond the Python Standard Library.
Specific processors, such as the included Django... | 456 | 29.87 | 123 | 19 | 3,183 | python | [{"finding_id": "codeql_py/http-response-splitting_8ae2be90b3247aed_95342197", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).", "remediation": "", "lo... | 2 | true | [
"CWE-113",
"CWE-022"
] | [
"py/http-response-splitting",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This HTTP header is constructed from a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
386,
384
] | [
null,
null
] | [
46,
22
] | [
51,
31
] | |
2024-11-18T21:14:30.832710+00:00 | 1,376,590,789,000 | 4fe4f3a0ef17c2d2ee892df644d6cc52ed0fec35 | 2 | {
"blob_id": "4fe4f3a0ef17c2d2ee892df644d6cc52ed0fec35",
"branch_name": "refs/heads/master",
"committer_date": 1376590789000,
"content_id": "267e3165aaa04948286823e1d33a8a8659836230",
"detected_licenses": [
"MIT"
],
"directory_id": "823b51b38e83eee6bfea1ee18dc06717e0e60c5a",
"extension": "py",
"fi... | 2.46875 | stackv2 | '''
Created on Aug 4, 2013
@author: rajath
'''
import os
import getpass
import re
import lxml.html
from xml.sax import saxutils
import xml.etree.ElementTree as et
import logging
from pytrie import SortedStringTrie as trie
# TODO: write a function to map facebook user-ids with their usernames
# and display them while ... | 202 | 29.38 | 122 | 18 | 1,432 | python | [{"finding_id": "codeql_py/overly-large-range_3c193e718e8113a1_a81d5725", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
28
] | [
null
] | [
41
] | [
44
] | |
2024-11-18T20:10:37.927305+00:00 | 1,577,271,887,000 | 461af33b151d4e9afaa8ab695b08edb4ad8e5b3f | 3 | {
"blob_id": "461af33b151d4e9afaa8ab695b08edb4ad8e5b3f",
"branch_name": "refs/heads/master",
"committer_date": 1577271887000,
"content_id": "661a15c81412fa5e2685d19a76e56118834df51a",
"detected_licenses": [
"MIT"
],
"directory_id": "2f86b0fb9a026578ea9cc3a033ee5581fdfff9a8",
"extension": "py",
"fi... | 2.6875 | stackv2 | """
Health check for Horizon.
Healthy: Corresponding stellar-core is 'Synced'
Unhealthy: Corresponding stellar-core is not 'Synced'
"""
import json
import time
import os
import requests
from flask import Flask
from flask_cors import CORS
APP = Flask(__name__)
CORS(APP)
START_TIMESTAMP = time.time()
# Load configura... | 78 | 31.51 | 85 | 15 | 623 | python | [{"finding_id": "codeql_py/stack-trace-exposure_e703339f4f241f69_d0cff367", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
41
] | [
null
] | [
16
] | [
76
] | |
2024-11-18T20:10:48.198614+00:00 | 1,558,084,818,000 | 8615d5a2f86847d4abb737457721d81deb49fab6 | 3 | {
"blob_id": "8615d5a2f86847d4abb737457721d81deb49fab6",
"branch_name": "refs/heads/master",
"committer_date": 1558084818000,
"content_id": "eec498b901944bbeff9b06e66fdcc1baac0876da",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "eb5f8e2c97a262d8a15214216942001e9e454738",
"extension": "py"... | 3.078125 | stackv2 | import dpkt
from dpkt.compat import compat_ord
import datetime
import socket
"""Convert a MAC address to a readable/printable string
Args:
address (str): a MAC address in hex form (e.g. '\x01\x02\x03\x04\x05\x06')
Returns:
str: Printable/readable MAC address
"""
def mac_addr(address... | 66 | 33.02 | 123 | 15 | 562 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_373f33a2d709b6dd_a175c7ca", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
45,
45
] | [
null,
null
] | [
35,
54
] | [
52,
71
] | |
2024-11-18T20:10:51.943682+00:00 | 1,610,876,177,000 | 78c03c5eca73094c20355c2f0246fe5e3e966693 | 3 | {
"blob_id": "78c03c5eca73094c20355c2f0246fe5e3e966693",
"branch_name": "refs/heads/master",
"committer_date": 1610876177000,
"content_id": "2e38e2c68ac25eaf4bb6d9ec3ea7d3add9c5b6aa",
"detected_licenses": [
"MIT"
],
"directory_id": "98c56063c82f976c4b3d5ee101510a2d93585e5f",
"extension": "py",
"fi... | 3.03125 | stackv2 | import requests
from flask import render_template, request
from app import app
@app.route('/pokemon', methods=['GET', 'POST'])
def pokemon():
pokemon = []
if request.method == 'POST' and 'pokemon_color' in request.form:
color = request.form.get('pokemon_color')
pokemon = get_pokemon_of_color(c... | 25 | 28.08 | 80 | 12 | 173 | python | [{"finding_id": "codeql_py/partial-ssrf_4e7b11b16df4a1f7_fe0ee1f2", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
16
] | [
null
] | [
9
] | [
81
] | |
2024-11-18T20:48:27.661001+00:00 | 1,572,544,430,000 | dce9e7bfd6a6dd7b40e2adf014808b77d028862e | 3 | {
"blob_id": "dce9e7bfd6a6dd7b40e2adf014808b77d028862e",
"branch_name": "refs/heads/master",
"committer_date": 1572544430000,
"content_id": "b70b39990feb3cd8d19faf8518f7610a8f39f2d4",
"detected_licenses": [
"MIT"
],
"directory_id": "0090e851ba8ec7a19e048e0535bc39910bab661e",
"extension": "py",
"fi... | 2.859375 | stackv2 | # -*- coding: utf-8 -*-
from branca.element import CssLink, Figure, JavascriptLink, MacroElement
from folium.utilities import parse_options
from jinja2 import Template
class MousePosition(MacroElement):
"""Add a field that shows the coordinates of the mouse position.
Uses the Leaflet plugin by Ardhi Lukia... | 85 | 37.87 | 153 | 12 | 707 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_bee839351de26d27_211b75f4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
44
] | [
55
] | [
17
] | [
9
] | |
2024-11-18T20:48:30.540740+00:00 | 1,517,555,853,000 | a35455019fa696852125363246d2150d70ef6b30 | 2 | {
"blob_id": "a35455019fa696852125363246d2150d70ef6b30",
"branch_name": "refs/heads/master",
"committer_date": 1517555853000,
"content_id": "9aef1dfe73bf108984044fbceb82dda0c795c48c",
"detected_licenses": [
"MIT"
],
"directory_id": "628d63ce8027b6cc95c7b4f085aea69a8a5bbd40",
"extension": "py",
"fi... | 2.421875 | stackv2 | # -*- coding: utf-8 -*-
import re
import os
import json
import pandas
import codecs
import pickle
import random
# import crawler
import hashlib
import data_io as dio
import pagehome as ph
from utility import email_getter
from utility import get_clean_text
from utility import homepage_neg
from utility import homepage_... | 169 | 28.69 | 127 | 18 | 1,288 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a194966d1a742378_b613a4ba", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
66
] | [
null
] | [
21
] | [
48
] | |
2024-11-18T20:48:32.791377+00:00 | 1,530,040,931,000 | 5164f4f1b652558825554514b7e3e036cc2eea4d | 3 | {
"blob_id": "5164f4f1b652558825554514b7e3e036cc2eea4d",
"branch_name": "refs/heads/master",
"committer_date": 1530040931000,
"content_id": "6acb0cd33d39d4337a4a40383143e39d3f31abdd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fc9658815f23791bc3777399e8246790f438ee95",
"extension": "py"... | 2.78125 | stackv2 | #!/usr/bin/python
# -*- coding: UTF-8 -*-
import sys
import getopt
import time
import Utils
import ClassifierManager as cm
PERFORM_KNN = False
PERFORM_SVM = True
PERFORM_MLP = False
PERFORM_CROSS_KNN = False
PERFORM_CROSS_SVM = False
def usage():
print ('Usage: main.py -i <inputfile>')
sys.exit(2)
def m... | 168 | 27.95 | 121 | 22 | 1,226 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b988a5b8c71abaf0_ec5f4b14", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
48
] | [
null
] | [
11
] | [
95
] | |
2024-11-18T21:11:38.571122+00:00 | 1,625,124,971,000 | 3ac2479769176da62c68291bd0ac58b554ab1a2f | 3 | {
"blob_id": "3ac2479769176da62c68291bd0ac58b554ab1a2f",
"branch_name": "refs/heads/master",
"committer_date": 1625124971000,
"content_id": "7c02d6de3aab3f74d4637263e8fab362b90a6225",
"detected_licenses": [
"MIT"
],
"directory_id": "2a80fd7190a9a74749d1fbe0ef1e1619e00c77a4",
"extension": "py",
"fi... | 2.6875 | stackv2 | #!/usr/bin/env python3
"""SciCat Module"""
import json
import sys
from urllib import parse
import requests
class SciCat:
"""SciCat Client"""
def __init__(self, base_url):
self.base_url = base_url
self.access_token = ""
def login(self, username, password):
"""Login"""
end... | 71 | 31.96 | 74 | 17 | 522 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_58d038ff17e341bd_971261ee", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
22,
36
] | [
null,
null
] | [
15,
15
] | [
22,
22
] | |
2024-11-18T21:25:54.904882+00:00 | 1,677,701,364,000 | 33656e63d7e52c6ad2938988b4a0f1d41335e28a | 2 | {
"blob_id": "33656e63d7e52c6ad2938988b4a0f1d41335e28a",
"branch_name": "refs/heads/master",
"committer_date": 1677701364000,
"content_id": "78aeeb2ea5e3b92af092a52fb4303ea7b989648c",
"detected_licenses": [],
"directory_id": "71bf09f4ca1a87800187e1ca746ca456f4cb2e46",
"extension": "py",
"filename": "che... | 2.359375 | stackv2 | # (C) Datadog, Inc. 2010-2017
# All rights reserved
# Licensed under Simplified BSD License (see LICENSE)
# stdlib
from collections import namedtuple
import time
# 3p
import paramiko
# project
from checks import AgentCheck
class CheckSSH(AgentCheck):
OPTIONS = [
('host', True, None, str),
('po... | 120 | 35.53 | 102 | 18 | 880 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_9c4855e574f4a20c_8bc694cd", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
75
] | [
null
] | [
13
] | [
73
] | |
2024-11-18T21:25:56.242657+00:00 | 1,615,410,275,000 | d6dcdcde2150f8b10b838379fba2e8cc2213d685 | 3 | {
"blob_id": "d6dcdcde2150f8b10b838379fba2e8cc2213d685",
"branch_name": "refs/heads/main",
"committer_date": 1615410275000,
"content_id": "8fd77253bbbd85d5dfc072af55a6726f11b7826d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "185e28b3c4f27e8ff3698441df63343546abe832",
"extension": "py",
... | 2.765625 | stackv2 | def matcher(url):
return "amazon.com" in url
def get_meta_data(page, url: str) -> dict:
page.goto(url)
price = -1
is_currently_unavailable = "Currently unavailable" in page.query_selector(".a-color-price").inner_text()
if not is_currently_unavailable:
price = page.evaluate(
"... | 31 | 32.16 | 119 | 13 | 232 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_e02d2cecb7be0a2e_9419696d", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [amazon.com](1) may be at an arbitrary position in the ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [amazon.com](1) may be at an arbitrary position in the sanitized URL."
] | [
2
] | [
null
] | [
12
] | [
31
] | |
2024-11-18T21:26:07.375012+00:00 | 1,594,146,464,000 | 0e6dd7f0d1c3d3a2e81101d584f20bc9e6fae64d | 3 | {
"blob_id": "0e6dd7f0d1c3d3a2e81101d584f20bc9e6fae64d",
"branch_name": "refs/heads/master",
"committer_date": 1594146464000,
"content_id": "072324ddfeca4b53803324a67255f8e89c0770e5",
"detected_licenses": [
"MIT"
],
"directory_id": "d98eb7d2631a283f5e90667e634bd981c0c343b5",
"extension": "py",
"fi... | 2.65625 | stackv2 | # some consntants (like host urls) go here.
REAL_HOST = 'https://toloka.yandex.ru'
SANDBOX_HOST = 'https://sandbox.toloka.yandex.ru'
DEFAULT_ACCEPT_MSG = 'Thank you!'
# naive but let's do it:
# we obtain api from settings, there they are obtained from env
from django.conf import settings
from django.template.loader im... | 129 | 36.56 | 124 | 14 | 1,069 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5aee6f12a64f2d27_4b8fb1ff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
48
] | [
null
] | [
25
] | [
37
] | |
2024-11-18T21:26:12.601663+00:00 | 1,411,981,927,000 | 4ea1c02fa75068b426d7d35c7be3bc37398eaea1 | 3 | {
"blob_id": "4ea1c02fa75068b426d7d35c7be3bc37398eaea1",
"branch_name": "refs/heads/master",
"committer_date": 1411981927000,
"content_id": "01e8c29b7d4bff1774a6dedcb41af09778fab981",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "915578da45451fa444183a6697ac328e50c9d4aa",
"extension": "py"... | 2.59375 | stackv2 | # -*- coding: utf-8 -*-
from urllib2 import urlopen, Request
def fetch_html(url):
req = Request(url)
req.add_header('user-agent', 'Mozilla/5.0 (X11; Linux x86_64; rv:29.0) Gecko/20100101 Firefox/29.0')
resp = urlopen(req, None, 10)
if resp.code != 200:
raise "HTTP " + resp.code
return resp... | 60 | 30.23 | 109 | 15 | 512 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4d7b51e6a0bf2b8d_6c7958e7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
52
] | [
null
] | [
11
] | [
52
] | |
2024-11-18T21:51:47.808322+00:00 | 1,602,199,486,000 | 7579c68f8d60518512dd13b23017f1d08567750a | 2 | {
"blob_id": "7579c68f8d60518512dd13b23017f1d08567750a",
"branch_name": "refs/heads/master",
"committer_date": 1602199486000,
"content_id": "7ffc704a29e01d58ebd2b8a6c6d044a1ef713fc7",
"detected_licenses": [
"MIT"
],
"directory_id": "d5874c822a12025969babe02dfc9aeef7406c3f0",
"extension": "py",
"fi... | 2.40625 | stackv2 | import json, datetime, time, jwt
import hashlib, time, os, re, base64
import phonenumbers, smtplib
from .sql import sql
from .mail import Mailer
mailer_user = os.getenv("MAILER_USER")
mailer_pass = os.getenv("MAILER_PASS")
mailer_host = os.getenv("MAILER_HOST")
mailer_port = os.getenv("MAILER_PORT")
class user:
d... | 195 | 40.41 | 138 | 19 | 2,180 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_791818ed2404f016_5791ad0c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-327",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) th... | [
124,
170,
179
] | [
null,
null,
null
] | [
22,
92,
33
] | [
30,
126,
55
] | |
2024-11-18T21:52:22.474809+00:00 | 1,677,075,880,000 | 7ecd976375f4d59825b8a2bfcbbd29751d48af2c | 3 | {
"blob_id": "7ecd976375f4d59825b8a2bfcbbd29751d48af2c",
"branch_name": "refs/heads/master",
"committer_date": 1677075880000,
"content_id": "688f7b24dcda9276199f038ff3dce9cb2c56dcae",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "22e9789d64ef180d3ff97c4e84a3e8c96db22973",
"extension": "py"... | 2.515625 | stackv2 | '''
Function:
千千音乐下载: http://music.taihe.com/
Author:
Charles
微信公众号:
Charles的皮卡丘
'''
import time
import hashlib
import requests
from .base import Base
from ..utils import seconds2hms, filterBadCharacter
'''千千音乐下载类'''
class Qianqian(Base):
def __init__(self, config, logger_handle, **kwargs):
su... | 102 | 40.6 | 138 | 27 | 1,080 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_8cf73eeaab11e018_17f06ed8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
91,
93
] | [
null,
null
] | [
32,
32
] | [
60,
120
] | |
2024-11-18T20:59:45.312651+00:00 | 1,617,370,807,000 | 8905169e535f1d127c3ea92ffa6e70ad9988fbfb | 3 | {
"blob_id": "8905169e535f1d127c3ea92ffa6e70ad9988fbfb",
"branch_name": "refs/heads/main",
"committer_date": 1617370807000,
"content_id": "08b186011e0f24c3805ffde4be38fc20cb5ac484",
"detected_licenses": [
"MIT"
],
"directory_id": "6f9f6f0600a561b0e5f9846ec156650291e2d4f7",
"extension": "py",
"file... | 2.703125 | stackv2 | import utils
from sparky import Sparky
data_root = "C:/src/Datasets/D1NAMO/"
diabetes = "diabetes_subset/"
healthy = "healthy_subset/"
outpath = './output/patientList.json'
base_url = 'http://192.168.0.101:7200/repositories/patient'
# utils.createBasicSet(data_root, diabetes, healthy, outpath)
consent_required_info... | 70 | 25.69 | 94 | 16 | 471 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_acce21bb456e9904_b6dba3f4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
70
] | [
null
] | [
7
] | [
55
] | |
2024-11-18T21:10:50.488091+00:00 | 1,516,388,819,000 | 366cb246717fd2a0543a5a9be030615cd9d3043a | 2 | {
"blob_id": "366cb246717fd2a0543a5a9be030615cd9d3043a",
"branch_name": "refs/heads/master",
"committer_date": 1516388819000,
"content_id": "f967f10b52176b57ca7922dd5b2f84d5a4ac534d",
"detected_licenses": [
"MIT"
],
"directory_id": "3fbc59f12ff60ec995e7c7a2130056035e4d1069",
"extension": "py",
"fi... | 2.359375 | stackv2 | from django.contrib.auth.models import User
from django.contrib.auth import authenticate as django_authenticate
import hashlib
from inventory.models import DataHubLegacyUser, App
from core.db.manager import DataHubManager
from social.backends.utils import load_backends
from operator import itemgetter
from django.conf i... | 235 | 31.23 | 77 | 14 | 1,617 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_345b5bbc37ba3960_510bcd4b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
153
] | [
null
] | [
40
] | [
48
] | |
2024-11-18T21:10:53.975177+00:00 | 1,448,616,927,000 | a1232ef1d594fe479e6443908928cce2061de8b2 | 2 | {
"blob_id": "a1232ef1d594fe479e6443908928cce2061de8b2",
"branch_name": "refs/heads/master",
"committer_date": 1448616927000,
"content_id": "bb313ccaadb19f7447914b867fd9896cf16952c4",
"detected_licenses": [
"MIT"
],
"directory_id": "d20ca4202527ae3c06e1d72b5e3a2d7f4a3687e2",
"extension": "py",
"fi... | 2.328125 | stackv2 |
import cgi
import datetime
import BaseHTTPServer
import SocketServer
import webbrowser
import json
import re
import bio
PORT = 8421
STATE = 'state/state.json'
class Session(object):
processor = None # class variable
def __init__(self):
# get current state
try:
f = open(STATE, 'r')
self.stat... | 164 | 30.72 | 157 | 19 | 1,355 | python | [{"finding_id": "codeql_py/path-injection_82faaaa914dde911_9a52069f", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
100
] | [
null
] | [
17
] | [
40
] | |
2024-11-18T21:23:46.470646+00:00 | 1,547,301,786,000 | a5011196c66ff51cc24f883004cd99984be07bac | 2 | {
"blob_id": "a5011196c66ff51cc24f883004cd99984be07bac",
"branch_name": "refs/heads/master",
"committer_date": 1547301786000,
"content_id": "490e16a8c2e604cb83af372b18d24ef38fa4a368",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d08f40a5247d84bc87f0d2fc88a52a0dc3dfb8e9",
"extension": "py"... | 2.484375 | stackv2 | from flask import Flask, url_for, send_from_directory, request, jsonify
from flask_cors import CORS
import logging, os
from werkzeug import secure_filename
import numpy as np
from keras.models import load_model
import sys
import json
import cv2
app = Flask(__name__)
CORS(app)
file_handler = logging.FileHandler('server... | 59 | 32.2 | 76 | 14 | 470 | python | [{"finding_id": "codeql_py/path-injection_b04f6b9478c7dc2f_d9608b83", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
53
] | [
null
] | [
19
] | [
76
] | |
2024-11-18T21:23:48.896787+00:00 | 1,628,738,884,000 | 04196b1157aecc05f87925726953af626f61f2eb | 3 | {
"blob_id": "04196b1157aecc05f87925726953af626f61f2eb",
"branch_name": "refs/heads/master",
"committer_date": 1628738884000,
"content_id": "ba6ff17e1d978a2deaf08346cb77fd5ba4a7cde5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e39828e8e1fc2c2b8a7c0551ab013684bc73dcee",
"extension": "py"... | 2.984375 | stackv2 | '''
Key wrapping and unwrapping as defined in RFC 3394.
Also a padding mechanism that was used in openssl at one time.
The purpose of this algorithm is to encrypt a key multiple times to add an extra layer of security.
'''
import struct
# TODO: dependency flexibility; make pip install aes_keywrap[cryptography], etc... | 80 | 36.41 | 99 | 17 | 1,046 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_981bea22215d759d_a38badd5", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 4 | true | [
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
21,
44,
61,
70
] | [
null,
null,
null,
null
] | [
17,
21,
17,
16
] | [
36,
64,
45,
77
] | |
2024-11-18T21:23:51.133908+00:00 | 1,564,934,455,000 | 86ab1c3b87e977badc0981e828b650cfbfed2f6f | 2 | {
"blob_id": "86ab1c3b87e977badc0981e828b650cfbfed2f6f",
"branch_name": "refs/heads/master",
"committer_date": 1564934455000,
"content_id": "f978803d3dfd2fc8c5519b36ec256436312d2fa8",
"detected_licenses": [
"MIT"
],
"directory_id": "7e203250edd2811777dfa0fc8ef05595bd4086fb",
"extension": "py",
"fi... | 2.40625 | stackv2 | from flask import Flask, request, jsonify, abort
from marshmallow import Schema, fields, validate
from flasgger import swag_from, Swagger
import db
app = Flask(__name__)
Swagger(app)
class PropertySchema(Schema):
name = fields.String(required=True, validate=validate.Length(3, 120))
address = fields.String(r... | 112 | 30.96 | 76 | 13 | 885 | python | [{"finding_id": "codeql_py/reflective-xss_8425337db154453e_3730cc66", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 4 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
39,
67,
84,
112
] | [
null,
null,
null,
null
] | [
12,
12,
12,
12
] | [
32,
27,
39,
34
] | |
2024-11-18T21:37:19.661113+00:00 | 1,391,903,005,000 | 81d40f3deae01996b2c321a064e566800cc94513 | 3 | {
"blob_id": "81d40f3deae01996b2c321a064e566800cc94513",
"branch_name": "refs/heads/master",
"committer_date": 1391903005000,
"content_id": "0c3a4dc57f973b8426d6045e3447308594a1c0f1",
"detected_licenses": [
"MIT"
],
"directory_id": "424b0701f10270a6f950d25a9527c07f3cdf381f",
"extension": "py",
"fi... | 2.578125 | stackv2 | #!/usr/bin/env python
# THIS CODE HAS NOT BEEN TESTED AND MAY NOT WORK.
# EVEN IF IT DOES, YOU SHOULDN'T RUN IT.
# IT IS INTENDED TO BE A GUIDE, NOT AN IMPLEMENTATION.
from base64 import b64decode, b64encode
from smtplib import SMTP
from tornado.web import RequestHandler
from moth import Moth
class LoginHandler(Re... | 48 | 31.4 | 80 | 16 | 389 | python | [{"finding_id": "codeql_py/cookie-injection_a497791ef36f3ffc_c8bfe07d", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-020"
] | [
"py/cookie-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cookie is constructed from a [user-supplied input](1)."
] | [
28
] | [
null
] | [
42
] | [
47
] | |
2024-11-18T21:37:41.004797+00:00 | 1,538,952,043,000 | c5cb6c49746de6f736ba692c9802305dab4cf225 | 3 | {
"blob_id": "c5cb6c49746de6f736ba692c9802305dab4cf225",
"branch_name": "refs/heads/master",
"committer_date": 1538952043000,
"content_id": "593c57de72c49371f5ad5cca982e315e160ae8da",
"detected_licenses": [
"MIT"
],
"directory_id": "234f041fc54dec896d287af621b27688d306fae4",
"extension": "py",
"fi... | 2.765625 | stackv2 | #!/usr/bin/python3
from bs4 import BeautifulSoup
import requests
import platform
import sys
import re
import os
MAC_URL = "http://standards-oui.ieee.org/oui.txt"
# MAC_URL_WIRESHARK = "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=blob_plain;f=manuf"
if platform.system() == "Windows":
MAC_ADDRESS_PAT... | 79 | 28.29 | 101 | 16 | 653 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_58446ce45eb87c16_d0f07ee0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
76
] | [
null
] | [
15
] | [
34
] | |
2024-11-18T21:59:12.386541+00:00 | 1,469,148,093,000 | 3bbd351e8f24d3457927e8e8f319cc09759bfeb6 | 2 | {
"blob_id": "3bbd351e8f24d3457927e8e8f319cc09759bfeb6",
"branch_name": "refs/heads/master",
"committer_date": 1469148093000,
"content_id": "5775172772e9f87f67be061f432e2f5845e9fa09",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ca63f76403209294dad1204de4bbf28b8b1e7f74",
"extension": "py"... | 2.3125 | stackv2 | import re
import os
import subprocess
import time
from jinja2 import Template
from boto import ec2
from .config import CONFIG
SSH_ARGS = '-i configs/%s.pem -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null' % CONFIG["AWS_KEYNAME"]
AWS_USER = CONFIG["AWS_USER"]
def get_command_from_template(command_templa... | 120 | 29.88 | 114 | 13 | 936 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d568d51bd8b16e41_f700d94d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
17
] | [
null
] | [
31
] | [
57
] | |
2024-11-18T21:59:14.492732+00:00 | 1,549,562,932,000 | c6483147d08f1b8b31f936f88456501c61e6e7ac | 2 | {
"blob_id": "c6483147d08f1b8b31f936f88456501c61e6e7ac",
"branch_name": "refs/heads/master",
"committer_date": 1549562932000,
"content_id": "c9da769d653575bda9df5073d6d4bfc5c74e0a83",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "150b9f5a070c2e80e018a98003f01d9cec600eb1",
"extension": "py"... | 2.4375 | stackv2 | import json
import logging
import threading
from os.path import basename
try:
from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer
except ImportError:
from http.server import BaseHTTPRequestHandler, HTTPServer
class GitlabHTTPHandler(BaseHTTPRequestHandler):
def do_POST(self):
self.send_... | 86 | 32.07 | 97 | 21 | 634 | python | [{"finding_id": "codeql_py/log-injection_985eb90699a6c4f0_b76f86d1", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
25
] | [
null
] | [
42
] | [
47
] | |
2024-11-18T22:11:26.936051+00:00 | 1,594,393,585,000 | 1b1f507f5b78574fff97ca664042ce2ad5c7d170 | 3 | {
"blob_id": "1b1f507f5b78574fff97ca664042ce2ad5c7d170",
"branch_name": "refs/heads/master",
"committer_date": 1594393585000,
"content_id": "37a39c70b751dc22b1734d409c9237e48ff8ee2f",
"detected_licenses": [
"MIT"
],
"directory_id": "f768b75f1953bec78a5d67bc26ad6d59abe92cb9",
"extension": "py",
"fi... | 3.28125 | stackv2 | # --------------
##File path for the file
file_path
#Code starts here
def read_file(path):
file = open(file_path,"r")
sentence = file.readline()
return sentence
file.close()
sample_message= str(read_file(file_path))
print(sample_message)
# --------------
#Code starts here
file_path_1
file_... | 137 | 16.99 | 70 | 11 | 668 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_3225f16842684603_9720daea", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec... | [
130,
37,
66,
90,
114
] | [
null,
null,
null,
null,
null
] | [
16,
7,
23,
24,
23
] | [
26,
19,
35,
36,
35
] | |
2024-11-18T22:11:27.180715+00:00 | 1,417,328,636,000 | 371d35d8288c219b3fa3dbd545fba56e3ff2274d | 2 | {
"blob_id": "371d35d8288c219b3fa3dbd545fba56e3ff2274d",
"branch_name": "refs/heads/master",
"committer_date": 1417328636000,
"content_id": "fca8d89142e2ac44351a0d1244a8fd7f7cf14bea",
"detected_licenses": [
"MIT"
],
"directory_id": "f0499f169a3b987b4017b9c7b974fefcf5faae36",
"extension": "py",
"fi... | 2.390625 | stackv2 | import uuid
import hashlib
from django.db import models
# Create your models here.
class User(models.Model):
email = models.EmailField(unique = True)
password_hash = models.CharField(max_length = 128, null = True, blank = True, default = "")
password_salt = models.CharField(max_length = 32, null = True, blank = T... | 52 | 33.96 | 92 | 12 | 435 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_cb7fdb12de59121b_fdc2f0d3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computational... | [
25,
34
] | [
null,
null
] | [
27,
27
] | [
33,
33
] | |
2024-11-18T22:11:36.607920+00:00 | 1,481,998,550,000 | f1749cec31084f829c04f24b93cc6c144cf7cb5a | 2 | {
"blob_id": "f1749cec31084f829c04f24b93cc6c144cf7cb5a",
"branch_name": "refs/heads/master",
"committer_date": 1481998550000,
"content_id": "87d50367e2fe6f1a9f385e87abc6f80972b5a2ed",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a75acdb2bb8811f82214a879c6f99a11a03ed438",
"extension": "py"... | 2.4375 | stackv2 | #!/usr/bin/python
import MySQLdb as db
import commands
import time #different cursor or connection concept
import os # creates php file
import re
config=open('../db.conf','r')
A=config.read()
host=re.search(r'\s*\$host\s*=\s*\"(.*)\"\s*;',A).groups(0)[0]
username=re.search(r'\s*\$username\s*=\s*\"(.*)\"\s*;',A).groups(... | 86 | 33.38 | 131 | 10 | 928 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_3e05dc618b2ef2e5_efa47c41", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text."
] | [
16,
45
] | [
null,
null
] | [
9,
9
] | [
128,
128
] | |
2024-11-18T22:11:53.736555+00:00 | 1,528,303,595,000 | bdb67dda6414f1009b1c2ae40254ecf36ce54c11 | 2 | {
"blob_id": "bdb67dda6414f1009b1c2ae40254ecf36ce54c11",
"branch_name": "refs/heads/master",
"committer_date": 1528303595000,
"content_id": "f63c3cdbb4e2f2ac86a3674a77fd51328ce04870",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "08f455b3c434262ea02d7deceedf2fea5c649eb0",
"extension": "py"... | 2.390625 | stackv2 | #!/usr/bin/env python
import urllib
import json
import os
from flask import Flask
from flask import request
from flask import make_response
# Flask app should start in global layout
app = Flask(__name__)
@app.route('/webhook', methods=['POST'])
def webhook():
req = request.get_json(silent=True, force=True)
... | 72 | 24.25 | 107 | 16 | 509 | python | [{"finding_id": "codeql_py/flask-debug_a69f818a6b045364_c097dbe2", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
72,
27
] | [
null,
null
] | [
5,
23
] | [
51,
26
] | |
2024-11-18T22:24:07.943546+00:00 | 1,571,318,270,000 | 587efcd8c24bb00485fa5e3917096ae7abe43233 | 3 | {
"blob_id": "587efcd8c24bb00485fa5e3917096ae7abe43233",
"branch_name": "refs/heads/master",
"committer_date": 1571318270000,
"content_id": "9b783a988a54813eefa7a513d136c7aec6511d61",
"detected_licenses": [
"Unlicense"
],
"directory_id": "309be3b754bbc9df38f8d0e666dab988e82a6eb7",
"extension": "py",... | 2.8125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import random
import tweepy
import sys
import os
consumer_key = os.environ['consumer_key']
consumer_secret = os.environ['consumer_secret']
access_token = os.environ['access_token']
access_token_secret = os.environ['access_token_secret']
print(consumer_key)
print(consumer... | 49 | 23.98 | 106 | 13 | 288 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_31ef7571f51391a1_0dd693b9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
15,
17
] | [
null,
null
] | [
7,
7
] | [
22,
26
] | |
2024-11-18T22:24:16.479848+00:00 | 1,632,355,434,000 | a804c697fd9f21153df08099e450ac6e4edd4396 | 3 | {
"blob_id": "a804c697fd9f21153df08099e450ac6e4edd4396",
"branch_name": "refs/heads/master",
"committer_date": 1632355434000,
"content_id": "a6afcf3b45fb91f159c853a922b7f6f623c59eae",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1a808f78b315ed6fda85279f589d5939ee9e464e",
"extension": "py"... | 2.9375 | stackv2 | import requests
import json
from requests.exceptions import Timeout
from requests.exceptions import HTTPError
from botocore.exceptions import ClientError
from datetime import date
import csv
import os
import boto3
import logging
logger = logging.getLogger()
logger.setLevel(logging.DEBUG)
class Asteroids:
"""Clien... | 155 | 39.64 | 158 | 19 | 1,335 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6a79be3ceab9a74b_7d5148a5", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
103
] | [
null
] | [
25
] | [
54
] | |
2024-11-18T22:35:57.755028+00:00 | 1,548,513,576,000 | 152686f819c988efa071845d5cde91a0bf28ee2c | 3 | {
"blob_id": "152686f819c988efa071845d5cde91a0bf28ee2c",
"branch_name": "refs/heads/master",
"committer_date": 1548513576000,
"content_id": "e5931fb5c8745fb04cd455921d977ed8a2608c2d",
"detected_licenses": [
"MIT"
],
"directory_id": "dcdf2ea1527f6ffab6d5794099a1f688c589035a",
"extension": "py",
"fi... | 2.75 | stackv2 | from __future__ import print_function
from __future__ import division
from future import standard_library
import json
import sys
import os
from flask import Flask, request
from bs4 import BeautifulSoup
import nltk
from nltk.stem.snowball import SnowballStemmer
from nltk.stem import WordNetLemmatizer
from nltk.corpus i... | 315 | 26.71 | 107 | 21 | 2,101 | python | [{"finding_id": "codeql_py/unsafe-deserialization_f16610b2941d591a_b7b4d736", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio... | 1 | true | [
"CWE-502"
] | [
"py/unsafe-deserialization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Unsafe deserialization depends on a [user-provided value](1)."
] | [
234
] | [
null
] | [
34
] | [
46
] | |
2024-11-18T22:36:51.490408+00:00 | 1,499,800,282,000 | f0bf6c8ca0e7cb02e151d5eed762ed5af6b1dcbd | 3 | {
"blob_id": "f0bf6c8ca0e7cb02e151d5eed762ed5af6b1dcbd",
"branch_name": "refs/heads/master",
"committer_date": 1499800282000,
"content_id": "5445dc7d0b23898c931b00cdb4e486fba2ff9b1b",
"detected_licenses": [
"MIT"
],
"directory_id": "db40683c3c876b1f370c3bb5c2c3256c01e6afdb",
"extension": "py",
"fi... | 2.953125 | stackv2 | ''' data formatting helper functions '''
import copy
import logging
from markdown import markdown
import re
from flask import render_template as flask_render_template
from grimoire import app, graph, templates
def grimoire_date(props, date_key='date'):
'''
get a nicely formatted year for a grimoire
:par... | 298 | 29.52 | 89 | 18 | 2,255 | python | [{"finding_id": "codeql_py/overly-large-range_c048960977ae93ec_de91be19", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
49,
51
] | [
null,
null
] | [
19,
23
] | [
22,
26
] | |
2024-11-18T20:23:19.920766+00:00 | 1,410,099,843,000 | dddeebedaee10616cd18afe95402e0a6bc8086b1 | 4 | {
"blob_id": "dddeebedaee10616cd18afe95402e0a6bc8086b1",
"branch_name": "refs/heads/master",
"committer_date": 1410099843000,
"content_id": "7e3fa778b7d18373f65bc21d2f4219b7957f267e",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "2a620ed4fa653473ac5d73969dec733f6a17dc18",
"extension": "py",
... | 3.9375 | stackv2 | # -*- coding: UTF-8 -*-
#######################################################################
# This programme creates a random password for you #
# respecting the parametres you set at the start #
# License : GNU CC 3.0 #
# Author... | 56 | 41.41 | 80 | 9 | 467 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c7f00655d2911db6_8a76d60d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
56
] | [
null
] | [
7
] | [
15
] | |
2024-11-18T20:23:21.191091+00:00 | 1,487,256,485,000 | 4f120d6adcb31c7778d5ffb308348dd05490a780 | 3 | {
"blob_id": "4f120d6adcb31c7778d5ffb308348dd05490a780",
"branch_name": "refs/heads/master",
"committer_date": 1487256485000,
"content_id": "7b07082c8bc78b8b0be5e29af19b5146d3c85671",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1b936e32de2eaf2b346541c1450b33f0c26eb85b",
"extension": "py"... | 2.75 | stackv2 | #####
# splunkkvstore.py - Class for manipulating kvstore collections in Splunk
#####
import sys
import requests
import json
import logging
logging.getLogger(__name__)
class splunkkvstore(object):
# On instaniation, only collect the details. Do not do anything until login is called.
def __init__(self,url,*args):
... | 207 | 32.01 | 140 | 20 | 1,711 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f80732f944a1f8ce_93b141c8", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
35,
41,
47
] | [
null,
null,
null
] | [
15,
15,
15
] | [
111,
125,
114
] | |
2024-11-18T20:23:29.098000+00:00 | 1,623,325,391,000 | a9fd2ec3fde8e10b0687b18eb1c18d5df1cee538 | 3 | {
"blob_id": "a9fd2ec3fde8e10b0687b18eb1c18d5df1cee538",
"branch_name": "refs/heads/master",
"committer_date": 1623325391000,
"content_id": "2c3566e68b342dcbbf8e54637829b8e78a5b77b1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "179bbe34e21d044c3e4c1cd0455e3fae897a07be",
"extension": "py"... | 2.578125 | stackv2 | import json
import logging
import os
from time import sleep
import threading
from http.server import HTTPServer, BaseHTTPRequestHandler
http_server = None
request_event = threading.Event()
response_event = threading.Event()
response_result = None
response_status = "initial"
request_num = 0
request_filename = None
cl... | 95 | 29.71 | 104 | 17 | 656 | python | [{"finding_id": "codeql_py/bind-socket-all-network-interfaces_bdbbe86132345da6_7c7f8751", "tool_name": "codeql", "rule_id": "py/bind-socket-all-network-interfaces", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "'' binds a socket to all interfaces.", "remediation": "", "location": {"... | 2 | true | [
"CWE-200",
"CWE-117"
] | [
"py/bind-socket-all-network-interfaces",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"'' binds a socket to all interfaces.",
"This log entry depends on a [user-provided value](1)."
] | [
50,
91
] | [
null,
null
] | [
5,
19
] | [
20,
52
] | |
2024-11-18T20:23:35.499453+00:00 | 1,531,844,929,000 | 4e0138cbb12cc1dfb491662535fd4dcd4ac95943 | 2 | {
"blob_id": "4e0138cbb12cc1dfb491662535fd4dcd4ac95943",
"branch_name": "refs/heads/master",
"committer_date": 1531844929000,
"content_id": "b83928db965c82b8a9818cd3e7cb869ccc83b2dc",
"detected_licenses": [
"MIT"
],
"directory_id": "30559336aaa8d10c1966cc5c90c6ebd712edf1bb",
"extension": "py",
"fi... | 2.421875 | stackv2 | #!/usr/bin/env python
# coding: utf8
import requests
def getCCResponse(url):
try:
response = requests.get(url, headers={
'user-agent': 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.157 Safari/537.36',
'accept-language': 'en-US,en;q=0.9',
... | 30 | 32.33 | 134 | 14 | 300 | python | [{"finding_id": "codeql_py/request-without-cert-validation_0f6f594c9f9f965b_b28f9ef9", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
9
] | [
16
] | [
20
] | [
59
] | |
2024-11-18T20:23:39.898520+00:00 | 1,629,945,293,000 | 511167e1f6f686889db7ce72cd9abebe6960ebaf | 3 | {
"blob_id": "511167e1f6f686889db7ce72cd9abebe6960ebaf",
"branch_name": "refs/heads/main",
"committer_date": 1629945293000,
"content_id": "8d12f1f0c5d3203a61bec8b2901eb4c679090cdc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b8016eb306bf10b1beb3af98b26729be1d6caca5",
"extension": "py",
... | 2.84375 | stackv2 | #!/usr/bin/env python3
"""Generate the dockerfiles from a jinja template."""
from pathlib import Path
from jinja2 import Environment, FileSystemLoader, Markup
import os
import yaml
import logging
log = logging.getLogger(__name__)
class DisplayablePath(object):
"""Utility to print file folders as a tree."""
... | 212 | 32.94 | 79 | 17 | 1,460 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9d1964d5a4c9a046_50186672", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
190
] | [
null
] | [
11
] | [
42
] | |
2024-11-18T21:22:36.735783+00:00 | 1,566,577,628,000 | 30f310227029ffdb9d11bada2bb062801c56144b | 2 | {
"blob_id": "30f310227029ffdb9d11bada2bb062801c56144b",
"branch_name": "refs/heads/master",
"committer_date": 1566577628000,
"content_id": "dd16c9b2165fbef15a767fc448f9eeb603c81a92",
"detected_licenses": [
"MIT"
],
"directory_id": "9fe04a6eeb852778a460f0365d7262f800d33d4c",
"extension": "py",
"fi... | 2.484375 | stackv2 | import flask
import pickle
from flask import render_template
from flask import request
from tensorflow.keras.models import load_model
import numpy as np
from PIL import Image
import requests
from io import StringIO
from io import BytesIO
app = flask.Flask(__name__)
classes = pickle.load(open('classes.pkl', 'rb'))
mo... | 51 | 21.51 | 86 | 12 | 309 | python | [{"finding_id": "codeql_py/flask-debug_9e0a6ebaa3b4f2ca_ea9a06fb", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"The full URL of this request depends on a [user-provided value](1)."
] | [
51,
28
] | [
null,
null
] | [
5,
16
] | [
36,
33
] | |
2024-11-18T21:23:07.891838+00:00 | 1,608,674,081,000 | 0cc8966c8cddc324f212ec9b55b045f69ae2ae59 | 3 | {
"blob_id": "0cc8966c8cddc324f212ec9b55b045f69ae2ae59",
"branch_name": "refs/heads/master",
"committer_date": 1608674081000,
"content_id": "8697f3ce81aa89b8cc97c6cb2892bd32eb31232a",
"detected_licenses": [
"MIT"
],
"directory_id": "3de20dded3c85f1fa8417fb845b1678eca9147d1",
"extension": "py",
"fi... | 3.03125 | stackv2 | from ansible_vault import Vault
from jinja2 import Template
import yaml
class JinjaTemplate():
def __init__(self, template_file, variable_files, vault=None):
"""
Intializes Template class with a template file,
and a variable file.
IE:
from template import JinjaTemplat... | 39 | 32.69 | 71 | 17 | 267 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_cf8741c9218cbc6b_e4cbe934", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
35
] | [
null
] | [
25
] | [
51
] | |
2024-11-18T21:23:20.433335+00:00 | 1,496,171,300,000 | 13ceb15f8f247e38fd04004df97c0a38a6a7993e | 2 | {
"blob_id": "13ceb15f8f247e38fd04004df97c0a38a6a7993e",
"branch_name": "refs/heads/master",
"committer_date": 1496171300000,
"content_id": "2e8abd2e045c9f80b3c58f00c8fdea0cd69b765b",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "b9bc6d06e003d0b2bcc13369e0b4d6779a2564ec",
"extension": "p... | 2.5 | stackv2 | #!/usr/bin/env python
import simplejson
import logging
import os
from jinja2 import Environment, FileSystemLoader
from dateutil import parser
from datetime import datetime
custom_loader = FileSystemLoader(os.path.join(os.path.dirname(__file__), "../static/templates"))
env = Environment(loader=custom_loader)
logging... | 56 | 31.61 | 144 | 14 | 395 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0112f874b2101988_97795d3f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
12
] | [
null
] | [
7
] | [
40
] | |
2024-11-18T21:51:12.136989+00:00 | 1,641,173,991,000 | 9dc4f1cd96026626b3e39511b93e05bbc0b3d063 | 2 | {
"blob_id": "9dc4f1cd96026626b3e39511b93e05bbc0b3d063",
"branch_name": "refs/heads/master",
"committer_date": 1641173991000,
"content_id": "bfb31c1bb722782294b2c264537e2b49308e515d",
"detected_licenses": [
"MIT"
],
"directory_id": "64253c1f50d76dad575112825aa54bbaaafd3e06",
"extension": "py",
"fi... | 2.328125 | stackv2 | import base64
import os
from datetime import datetime
from hashlib import sha512
from peewee import (PostgresqlDatabase, BooleanField, CharField, DateTimeField,
ForeignKeyField, Model, DoesNotExist) # TextField
from tornado.ioloop import IOLoop
from config import constants
peewee_db = PostgresqlDatabase(constant... | 169 | 30.86 | 110 | 16 | 1,234 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_541b2a8d6a98e0f5_d533c54d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
92
] | [
null
] | [
23
] | [
53
] | |
2024-11-18T21:51:15.382947+00:00 | 1,389,861,027,000 | 8aa8cb342a59fa79045b983f2010490ab4258fca | 3 | {
"blob_id": "8aa8cb342a59fa79045b983f2010490ab4258fca",
"branch_name": "refs/heads/master",
"committer_date": 1389861027000,
"content_id": "d705eb2289affe5840302ca02b8f102d35241cef",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5d7d118f3ac0650362d8905d9d91c41c9239ae0f",
"extension": "py"... | 3.140625 | stackv2 | from binascii import b2a_hex, a2b_hex
from Crypto.Cipher import DES
import sys
#key = '12345678'
while 1:
key = raw_input('Please input the key(8 bytes): ')
if key == '12345678':
file = open('history', 'r')
try:
text = file.read()
finally:
file.close()
... | 24 | 26.54 | 126 | 12 | 187 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_c27d9978cdf4a3d6_4dcf3886", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES](1) is broken or weak, and should not be used.", "r... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The cryptographic algorithm DES](1) is broken or weak, and should not be used."
] | [
18
] | [
null
] | [
22
] | [
43
] | |
2024-11-18T21:51:23.394162+00:00 | 1,448,766,090,000 | 90a6b7bb8d52d8cbd731819d8b24a57aa182e65a | 3 | {
"blob_id": "90a6b7bb8d52d8cbd731819d8b24a57aa182e65a",
"branch_name": "refs/heads/master",
"committer_date": 1448766090000,
"content_id": "e21a3e68be6d47f35d8b674706f5ee6b7431e546",
"detected_licenses": [
"MIT"
],
"directory_id": "f3c79b1a94e4aa260c9edc90208886d627b50f63",
"extension": "py",
"fi... | 2.515625 | stackv2 |
from datetime import datetime
import sys
import os
from bottle import Bottle, route, run, template, request, get, post, view
import sae
import sae.kvdb
kv = sae.kvdb.Client()
app = Bottle()
@app.route('/')
def hello():
return "Hello, world! - Bottle"
def diary_lines():
content = []
for i in kv.getke... | 100 | 19.37 | 80 | 11 | 536 | python | [{"finding_id": "codeql_py/reflective-xss_63b2b6a44a835a41_67f8faf9", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
84,
90,
95
] | [
null,
null,
null
] | [
12,
12,
12
] | [
30,
35,
27
] | |
2024-11-18T21:51:29.920380+00:00 | 1,517,911,027,000 | 2939c5be3e613576ec23b612634d7029635cd92a | 2 | {
"blob_id": "2939c5be3e613576ec23b612634d7029635cd92a",
"branch_name": "refs/heads/master",
"committer_date": 1517911027000,
"content_id": "c3bcef921fd41cb07a36b226791db76c78683761",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a76d5ad8c47c5835766cc5fbf095fe39837f8759",
"extension": "py"... | 2.4375 | stackv2 | from django.shortcuts import render
from django.views.generic import View
from .models import Upload
from django.http import HttpResponsePermanentRedirect, HttpResponse
import random
import string
import json
import datetime
# index
class HomeView(View):
# get请求直接获得首页
def get(self, request):
return re... | 94 | 29.11 | 115 | 18 | 739 | python | [{"finding_id": "codeql_py/path-injection_7d6aca8a7d5adef0_6ef454c6", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
28
] | [
null
] | [
23
] | [
44
] | |
2024-11-18T21:51:36.233001+00:00 | 1,590,692,702,000 | 2e689d5e61bea82c434570a34b1eb0911b3b7bbf | 3 | {
"blob_id": "2e689d5e61bea82c434570a34b1eb0911b3b7bbf",
"branch_name": "refs/heads/master",
"committer_date": 1590692702000,
"content_id": "096e52be61b5377d47b0ee4b0eec5a958ca5a55f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e2edfbcf7a16587dc308a4811934fa27e4d5399f",
"extension": "py"... | 2.59375 | stackv2 | from apscheduler.triggers.interval import IntervalTrigger
import logging
import psycopg2
from environs import Env
import psycopg2.extras
psycopg2.extras.register_uuid()
env = Env()
env.read_env()
PG_HOST = env("PG_HOST")
PG_USER = env("PG_USER")
PG_PASSWORD = env("PG_PASSWORD")
PG_DB = env("PG_DB")
PG_PORT = env.int... | 75 | 24.25 | 81 | 14 | 450 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cd7ca862fb392d54_1f06bb50", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
20
] | [
null
] | [
11
] | [
29
] | |
2024-11-18T21:52:02.997109+00:00 | 1,586,712,385,000 | 121ba8e8cbfbc2f969fc21e851ec292993d8942c | 4 | {
"blob_id": "121ba8e8cbfbc2f969fc21e851ec292993d8942c",
"branch_name": "refs/heads/master",
"committer_date": 1586712385000,
"content_id": "4b3f38fb3246d48285276a2965265b506e727605",
"detected_licenses": [
"MIT"
],
"directory_id": "922b720bd91840c901f16e4c8649e773f5d21a77",
"extension": "py",
"fi... | 4.34375 | stackv2 | import datetime
x = datetime.datetime.now()
print("Current date and Time is" , x)
# dir(datatype) can give the functions applicable using that datatype
# help(datatype.functionName can give you the documentation of that function
# dir(__builtins__) to know the built in funtions of python
student_grades=[9.8,8.3,10]
... | 296 | 27.54 | 134 | 10 | 2,611 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f9b355edceda5ca6_e87ebf11", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
248
] | [
null
] | [
11
] | [
34
] | |
2024-11-18T22:02:40.456714+00:00 | 1,548,730,633,000 | e1f1a5a164f202ead6152ec3d619a34426c8a622 | 2 | {
"blob_id": "e1f1a5a164f202ead6152ec3d619a34426c8a622",
"branch_name": "refs/heads/master",
"committer_date": 1548730633000,
"content_id": "b55d57f75e19ab35405e8798bb87bd6cfc8e56f5",
"detected_licenses": [
"MIT"
],
"directory_id": "e1a5cf18513b69223216e5c212d0096771ffa7ac",
"extension": "py",
"fi... | 2.4375 | stackv2 | import rsa
import gnupg
import requests
from Main.utils import get_user_dir
from Security.EncryptionDecryptionService import EncryptionDecryption
import os
import random
import sys
class KeyServiceInterface:
# get the AES public key of a account
@staticmethod
def getPublickey(account):
raise NotI... | 159 | 31.71 | 96 | 17 | 1,272 | python | [{"finding_id": "codeql_py/weak-crypto-key_d3400b4132f61638_6566f36e", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable.", "remediation": "", ... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable."
] | [
67
] | [
null
] | [
27
] | [
43
] | |
2024-11-18T22:16:26.452925+00:00 | 1,597,613,643,000 | 496bef682c3a496a6ff642c0dd8395e7ec3fa4b2 | 3 | {
"blob_id": "496bef682c3a496a6ff642c0dd8395e7ec3fa4b2",
"branch_name": "refs/heads/master",
"committer_date": 1597613643000,
"content_id": "9b37e9524c5b31dee30cc5cc6c467b291bc73cb5",
"detected_licenses": [
"MIT"
],
"directory_id": "2363d5007e9d9e2ca10541c815eeb11cfbd96334",
"extension": "py",
"fi... | 2.515625 | stackv2 | from flask import render_template, request, url_for, flash, redirect # import the Flask class
from intellivo_package import app, db, bcrypt, socketio
from intellivo_package.models import User, UserPref
from intellivo_package.forms import RegistrationForm, LoginForm, ProfileForm
from flask_login import login_user, curre... | 93 | 39.62 | 132 | 18 | 792 | python | [{"finding_id": "codeql_py/url-redirection_6346e3f345782691_9c401763", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
43
] | [
null
] | [
29
] | [
38
] | |
2024-11-18T22:16:38.962911+00:00 | 1,635,588,200,000 | 9a0b8ba25cbc64355e3e1999ab6893e0debbe8b5 | 3 | {
"blob_id": "9a0b8ba25cbc64355e3e1999ab6893e0debbe8b5",
"branch_name": "refs/heads/master",
"committer_date": 1635588200000,
"content_id": "ad05127fb009f41378c7db57e38ab129ebc79047",
"detected_licenses": [
"MIT"
],
"directory_id": "5676e967d357068aada5b1d937e8d733fd2c38f4",
"extension": "py",
"fi... | 3.171875 | stackv2 | import sys
import traceback
from hashlib import sha256, md5
from random import randint
def get_trace():
print("Exception in code:")
print("-" * 60)
traceback.print_exc(file=sys.stdout)
print("-" * 60)
def gen_hash(_str: str) -> str:
"""
:param _str:
:return:
"""
return sha256(_s... | 79 | 21.09 | 88 | 16 | 435 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_0d788d898aad6eb9_24f07c7a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
59
] | [
null
] | [
16
] | [
38
] | |
2024-11-18T22:27:43.278634+00:00 | 1,632,378,784,000 | ad0ed285d42f451d65960a5cbf06181d49725786 | 2 | {
"blob_id": "ad0ed285d42f451d65960a5cbf06181d49725786",
"branch_name": "refs/heads/master",
"committer_date": 1632378784000,
"content_id": "330ecfd5a81ff5d061ed3560d4a9c97b87284e5b",
"detected_licenses": [
"MIT"
],
"directory_id": "1a35d253d9b52e579a90f71c64cd3d11b7617ce5",
"extension": "py",
"fi... | 2.359375 | stackv2 | """Entry point for Iris."""
import base64
import json
import logging
import os
import typing
import flask
import util.gcp_utils
from plugin import Plugin
from util import pubsub_utils, gcp_utils, utils
from util.config_utils import iris_prefix, is_project_included
logging.basicConfig(
format=f"%(levelname)s [{ir... | 193 | 31.46 | 104 | 18 | 1,415 | python | [{"finding_id": "codeql_py/flask-debug_21f79c4e99cfd4fa_e8326c08", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/flask-debug",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
193,
101,
109,
141
] | [
null,
null,
null,
null
] | [
5,
56,
26,
76
] | [
53,
66,
29,
86
] | |
2024-11-18T22:27:48.193737+00:00 | 1,477,908,654,000 | 1789833ad640ec8b34113186aff8907688f1f9ce | 3 | {
"blob_id": "1789833ad640ec8b34113186aff8907688f1f9ce",
"branch_name": "refs/heads/master",
"committer_date": 1477908654000,
"content_id": "07b441b9da493e7c8d7287a8692f0d1074d58f18",
"detected_licenses": [
"MIT"
],
"directory_id": "257b4cb470ad5955c6c91fa518bcc2c3cf2e406f",
"extension": "py",
"fi... | 3.015625 | stackv2 | from math import sqrt
import re
import requests
from celery import Celery
app = Celery('tasks', backend='redis', broker='redis://192.168.25.21:6379/0')
app.conf.CELERY_RESULT_BACKEND = "redis://192.168.25.21:6379/0"
html_link_regex = re.compile('<a\s(?:.*?\s)*?href=[\'"](.*?)[\'"].*?>')
@app.task
def sqrt_task(value... | 31 | 25.81 | 77 | 11 | 258 | python | [{"finding_id": "codeql_py/redos_09b305234266bb2f_c04ad66a", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<a ' and containing many repetiti... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '<a ' and containing many repetitions of ' '."
] | [
9
] | [
null
] | [
38
] | [
41
] | |
2024-11-18T22:27:48.585142+00:00 | 1,620,383,802,000 | ca0c72314bc7774b7ac4565f98f1498f5ac3439f | 3 | {
"blob_id": "ca0c72314bc7774b7ac4565f98f1498f5ac3439f",
"branch_name": "refs/heads/master",
"committer_date": 1620383802000,
"content_id": "aeafb8a99d54d6dd0b347e012f69b29385fa9fe7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a497c714ca490efb905eb45c2d6ea3587b366555",
"extension": "py"... | 2.703125 | stackv2 | import pandas as pd
import re
def read_tsv(tsv_file):
tsv = pd.read_csv(tsv_file, sep='\t', comment='#', quoting=3).rename(columns={'GND-ID': 'ID'})
parts = extract_doc_links(tsv_file)
urls = [part['url'] for part in parts]
return tsv, urls
def write_tsv(tsv, urls, tsv_out_file):
if 'conf' ... | 87 | 26.72 | 120 | 20 | 644 | python | [{"finding_id": "codeql_py/overly-large-range_5ad72397cf6fdd87_ad9817a2", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
54
] | [
null
] | [
64
] | [
67
] | |
2024-11-18T22:28:12.309809+00:00 | 1,562,259,945,000 | f608378dbd478c160bb5d66ca2c6891c73201932 | 3 | {
"blob_id": "f608378dbd478c160bb5d66ca2c6891c73201932",
"branch_name": "refs/heads/master",
"committer_date": 1562259945000,
"content_id": "66106427aacc1c773159953d3ae6a4328e026c4c",
"detected_licenses": [
"MIT"
],
"directory_id": "2b0a07275ab6ec7435b95123765163a5b96f3ecd",
"extension": "py",
"fi... | 2.671875 | stackv2 | """
A RESTful gateway for the NOAA National Data Buoy Center API. The gateway transforms tabular data from
the NOAA API into JSON or XML encoded objects.
"""
import requests
import arrow
import flask
import flask_restful
from src.json2xml import Json2xml
import json
__author__ = "Robert Daniel Pickard"
__copyright__... | 260 | 40.55 | 118 | 23 | 2,416 | python | [{"finding_id": "codeql_py/flask-debug_b179256a5832e322_35209f53", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)."
] | [
257,
189
] | [
null,
null
] | [
5,
24
] | [
47,
54
] | |
2024-11-18T22:44:03.771939+00:00 | 1,519,226,517,000 | a77504f569615186778680bdb45175e7e39c8d30 | 2 | {
"blob_id": "a77504f569615186778680bdb45175e7e39c8d30",
"branch_name": "refs/heads/master",
"committer_date": 1519226517000,
"content_id": "d7b754a7c9b876d42f50bda0f3a160f516df76b1",
"detected_licenses": [
"MIT"
],
"directory_id": "d701b94a4fdae9df97b658281d2fc1532e3f705f",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python
import importlib
import select
from contextlib import contextmanager
from functools import partial
from multiprocessing import Process, Queue
import click
import psycopg2
import psycopg2.extensions
from jinja2 import Template
from psycopg2.extras import RealDictCursor
TRIGGER_FUNCTION = """
... | 237 | 28.81 | 94 | 16 | 1,515 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3f976480c3542d7e_5781924d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
51,
60
] | [
57,
70
] | [
24,
22
] | [
5,
5
] | |
2024-11-18T22:44:05.906426+00:00 | 1,512,146,918,000 | 7a4962e2ebc2fc67274ed359097a1f8c528e3ee5 | 2 | {
"blob_id": "7a4962e2ebc2fc67274ed359097a1f8c528e3ee5",
"branch_name": "refs/heads/master",
"committer_date": 1512146918000,
"content_id": "5649b81cc75cbfcae27f2de437fb8e0e91d9317f",
"detected_licenses": [
"Artistic-2.0"
],
"directory_id": "f37a00d8d7e7a9f6692efbf689bf8449e8846ffb",
"extension": "p... | 2.5 | stackv2 | #!/usr/bin/env python
import re
import sys
import urllib2
from jinja2 import Template
from jinja2 import Environment
from jinja2 import FileSystemLoader
from lxml import etree
from weasyprint import HTML
from weasyprint import CSS
#---------------------------------------------------------------------
#
# Usage:
... | 60 | 20.82 | 70 | 11 | 289 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d8c8876b2a5797c3_859233f5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
57
] | [
null
] | [
7
] | [
48
] | |
2024-11-18T22:44:16.760869+00:00 | 1,564,347,937,000 | f0ae6d543a0690cace706ffeb459e7b9505288ef | 2 | {
"blob_id": "f0ae6d543a0690cace706ffeb459e7b9505288ef",
"branch_name": "refs/heads/master",
"committer_date": 1564347937000,
"content_id": "0718a71b0d02880cbb04e29443da7044c2bab0a8",
"detected_licenses": [
"MIT"
],
"directory_id": "09f545ee0f616af9e35cce2136d9a65041d50435",
"extension": "py",
"fi... | 2.40625 | stackv2 | import os
from server import app, db
from functools import wraps
from flask import request, jsonify
import hashlib
import binascii
from .models import User
@app.route('/device/register', methods=['POST'])
def register_user():
secret = os.environ.get('AUTH_SECRET')
auth_secret = request.form.get("auth_secret"... | 66 | 30.61 | 78 | 17 | 525 | python | [{"finding_id": "codeql_py/stack-trace-exposure_243f9a5aba9e7a80_464cfe2b", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
25
] | [
null
] | [
24
] | [
43
] | |
2024-11-18T22:44:41.377720+00:00 | 1,517,284,779,000 | dbca245c60fc610f0d655cf2e1f3336602127697 | 3 | {
"blob_id": "dbca245c60fc610f0d655cf2e1f3336602127697",
"branch_name": "refs/heads/master",
"committer_date": 1517284779000,
"content_id": "f6e2274f0af60dcabce0e4eda4726c84c7595655",
"detected_licenses": [
"MIT"
],
"directory_id": "3b262dcc50ee326360ba254bc9d5d66a8bf180c8",
"extension": "py",
"fi... | 2.578125 | stackv2 | from __future__ import absolute_import
from __future__ import print_function
import six
import rake
import readTxt
import operator
import io
import pandas as pd
import nltk
from nltk.stem import WordNetLemmatizer
import re
import os
import os.path
import spacy
from spacy.lang.en import English
lemmatizer = WordNetLemm... | 105 | 21.26 | 82 | 21 | 734 | python | [{"finding_id": "codeql_py/overly-large-range_9c7ced2553603df6_b9eaf3f6", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
31
] | [
null
] | [
23
] | [
26
] | |
2024-11-18T22:44:48.138092+00:00 | 1,478,349,666,000 | 8f3bf6a34ee26bb56ad4cc1ded4add7e41acb23a | 3 | {
"blob_id": "8f3bf6a34ee26bb56ad4cc1ded4add7e41acb23a",
"branch_name": "refs/heads/master",
"committer_date": 1478349666000,
"content_id": "669647f7620c2bcef355e4a255c54f5123a6c0a5",
"detected_licenses": [
"MIT"
],
"directory_id": "97cf29766280cc9651e93994d84ea5e387674287",
"extension": "py",
"fi... | 2.546875 | stackv2 | # coding=utf-8
"""
crumhorn configuration bundler.
Raw configurations ("package specification") are read in, and bundled into a "Machine Spec", which can be handled by the other crumhorn tools (e.g. prepare and launch)
Usage:
compile <package> [--from=<base_configuration>]
compile <package... | 105 | 35.67 | 171 | 21 | 806 | python | [{"finding_id": "codeql_py/tarslip_b02b861a460871a0_4256eede", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
77
] | [
null
] | [
21
] | [
25
] | |
2024-11-18T22:44:52.094662+00:00 | 1,609,822,689,000 | cc0ebd5391e5ad93785d4367171d2f9636aa6815 | 3 | {
"blob_id": "cc0ebd5391e5ad93785d4367171d2f9636aa6815",
"branch_name": "refs/heads/master",
"committer_date": 1609822689000,
"content_id": "7cd655b64a7fbc16774791b635989c4ec7a898dc",
"detected_licenses": [
"MIT"
],
"directory_id": "160db316cac4c856b9e8ade699a5e7e309e9f063",
"extension": "py",
"fi... | 3.03125 | stackv2 | #!/usr/bin/env python
#### DESCRIPTION ####
# Python Script to calculate a CDB invesment, considering the initial investment date, the CDB rate, ...
# an evaluation date and the CDI daily rate from a csv file.
# Programming Language: Python 3.8
# Wep Framework: Flask 1.1.2 - Werkzeug 1.0.1
__author__ = "Thiago Neves"... | 148 | 39.48 | 133 | 24 | 1,456 | python | [{"finding_id": "codeql_py/log-injection_e4f8cc410b8c2535_7bc29ae7", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
51,
81,
129
] | [
null,
83,
null
] | [
21,
25,
21
] | [
115,
86,
99
] | |
2024-11-18T20:24:12.112677+00:00 | 1,427,989,315,000 | 77510d44cbed3e4f695bf2928c074d29d7d3d443 | 3 | {
"blob_id": "77510d44cbed3e4f695bf2928c074d29d7d3d443",
"branch_name": "refs/heads/master",
"committer_date": 1427989315000,
"content_id": "5f4729d7f9c87a7429b4996c6a8b56703160da32",
"detected_licenses": [
"MIT"
],
"directory_id": "7b6466793d09dd16a1340377d953951ed2b9aca1",
"extension": "py",
"fi... | 2.53125 | stackv2 | # Copyright (c) 2014 Red Hat, Inc. and/or its affiliates.
# Copyright (c) 2015 Anthony Towns
# Written by Anthony Towns <aj@erisian.com.au>
# See LICENSE file.
from __future__ import print_function
import requests
try:
from urlparse import urlparse, parse_qs
except ImportError:
from urllib.parse import urlpar... | 186 | 35.76 | 79 | 14 | 1,494 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_634848686d3be093_a4d8e76f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (pas... | [
171,
175
] | [
null,
176
] | [
15,
15
] | [
65,
67
] | |
2024-11-18T20:36:59.074698+00:00 | 1,680,537,173,000 | e3ea038a90e6b4c590c1e3e697ed8834029cf13b | 3 | {
"blob_id": "e3ea038a90e6b4c590c1e3e697ed8834029cf13b",
"branch_name": "refs/heads/master",
"committer_date": 1680537173000,
"content_id": "b375cacb0d10a9bb1eebfd2aaa6a46222ab98ad7",
"detected_licenses": [
"MIT"
],
"directory_id": "2676552613e2cc0031889985416e7860ace765c5",
"extension": "py",
"fi... | 2.546875 | stackv2 | #!/usr/bin/env python
'''
Compliance Checker Web
~~~~~~~~~~~~~~~~~~~~~~
'''
from cchecker_web import cchecker_web
from cchecker_web.processing import compliance_check
from flask import request, jsonify
from flask import current_app as app
from hashlib import sha1
from datetime import datetime
import base64
import os
... | 113 | 32.06 | 131 | 17 | 832 | python | [{"finding_id": "codeql_py/stack-trace-exposure_51dea8a0d89fbc54_20901704", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/stack-trace-exposure",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
76,
68,
69,
70
] | [
null,
null,
null,
null
] | [
59,
31,
25,
26
] | [
85,
56,
50,
34
] | |
2024-11-18T20:59:42.447557+00:00 | 1,558,272,125,000 | b3d84088648d90e46e308f32029d2f4b63a5da2c | 2 | {
"blob_id": "b3d84088648d90e46e308f32029d2f4b63a5da2c",
"branch_name": "refs/heads/master",
"committer_date": 1558272125000,
"content_id": "62289cbe2561a34f9a9bf96117dcabdc11f023e6",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "64dde30fb5b4e8b754ce66bbb913f7b09e6bb404",
"extension": "p... | 2.328125 | stackv2 | import datetime
import json
from haystack.generic_views import SearchView
from django.http import HttpResponse
from haystack.query import SearchQuerySet
from op_scraper.models import Person, Law, Debate
from offenesparlament.constants import ES_DEFAULT_LIMIT
# import the logging library
import logging
# Get an inst... | 257 | 33.31 | 80 | 23 | 1,854 | python | [{"finding_id": "codeql_py/log-injection_259fec3fc657ca91_85d84bde", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
78,
89
] | [
79,
90
] | [
21,
21
] | [
47,
46
] | |
2024-11-18T21:00:01.887486+00:00 | 1,596,258,418,000 | f0a91da23dd6dbbc06935f30956a97fcdf3ab400 | 2 | {
"blob_id": "f0a91da23dd6dbbc06935f30956a97fcdf3ab400",
"branch_name": "refs/heads/master",
"committer_date": 1596258418000,
"content_id": "4bc47741a04eadf5ab379045b6769c645b76917b",
"detected_licenses": [
"MIT"
],
"directory_id": "b042a014d668bd2d9e07bcfc756022137e5b0f97",
"extension": "py",
"fi... | 2.453125 | stackv2 | import pymongo
import os
from dotenv import load_dotenv
from pymongo import MongoClient
from pdb import set_trace as breakpoint
load_dotenv()
DB_USER = os.getenv("MONGO_USER", default="OOPS")
DB_PASSWORD = os.getenv("MONGO_PASSWORD", default="OOPS")
CLUSTER_NAME = os.getenv("MONGO_CLUSTER_NAME", default="OOPS")
con... | 48 | 21.65 | 117 | 8 | 247 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8ff14fbd4d938a8f_56533570", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
16
] | [
null
] | [
15
] | [
29
] | |
2024-11-18T21:00:37.962804+00:00 | 1,428,328,565,000 | 0dbe54e25ee6a29748adb6b311f2301da6df21f0 | 3 | {
"blob_id": "0dbe54e25ee6a29748adb6b311f2301da6df21f0",
"branch_name": "refs/heads/master",
"committer_date": 1428328565000,
"content_id": "a839a587404ea89ffd0c77610cffb8903322858d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3d5b5c66a2a253ebac4adc5ea32ce4581876a90a",
"extension": "py"... | 2.59375 | stackv2 | '''
Created on July 11th, 2013
@author: Layne
@edited: Ryan Wallner
'''
import logging
import paramiko, base64
import time
logger = logging.getLogger(__name__)
class ssh_client:
client = None
host = None
username = None
password = None
def __init__(self, host, port, username, password):
... | 70 | 27.47 | 83 | 18 | 448 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a431a85f761a2167_65073d62", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 2 | true | [
"CWE-295",
"CWE-312"
] | [
"py/paramiko-missing-host-key-validation",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
28,
30
] | [
null,
null
] | [
9,
75
] | [
74,
83
] | |
2024-11-18T21:00:59.744410+00:00 | 1,620,825,391,000 | 84bca459ce7bbfb11d628175bbe7ac19b3567ac2 | 2 | {
"blob_id": "84bca459ce7bbfb11d628175bbe7ac19b3567ac2",
"branch_name": "refs/heads/main",
"committer_date": 1620825391000,
"content_id": "d53e2dc6bf4c98edeb02dc7b5fe4eb07c42ae5a5",
"detected_licenses": [
"MIT"
],
"directory_id": "a477a06e78e1a3ae03e43946f45f50e0cbc131a3",
"extension": "py",
"file... | 2.40625 | stackv2 | import os
import time
import json
import socket
import requests
import threading
import pandas as pd
from configparser import ConfigParser
start_global = 0.0
api_invoke_add = []
api_invoke_delete = []
rule_apply = []
total_time = []
global_time = []
type_test = []
def change_format_float_list(old_list):
new_lis... | 232 | 30.25 | 132 | 15 | 1,641 | python | [{"finding_id": "codeql_py/request-without-cert-validation_931809ff6d2290fb_61d3284c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
76,
112
] | [
null,
null
] | [
13,
13
] | [
69,
71
] | |
2024-11-18T21:01:14.001692+00:00 | 1,604,511,005,000 | 7bd29fba3b293cb01832924aa397949be58c18dd | 3 | {
"blob_id": "7bd29fba3b293cb01832924aa397949be58c18dd",
"branch_name": "refs/heads/master",
"committer_date": 1604511005000,
"content_id": "4a3c55f89454c83e81bbf1a0bcee24d7846b5229",
"detected_licenses": [
"MIT"
],
"directory_id": "230cf2718488f8a65da09ba9fcc53a980dc8bf4d",
"extension": "py",
"fi... | 3.25 | stackv2 | #!/usr/bin/env python
from password_trucker import User
from password_trucker import Credentials
def create_user(username,password):
'''
function to creat new user
'''
new_user = User(username,password)
return new_user
def save_user(user):
'''
function to save contact
'''
user.save_user()
def user... | 183 | 26.95 | 165 | 19 | 1,055 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_499a96c76083e556_be07d68f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
123
] | [
null
] | [
15
] | [
82
] | |
2024-11-18T21:01:30.417591+00:00 | 1,557,977,720,000 | 87cd751bdc85b7d2b26b4a5d75e13664506b6f7a | 3 | {
"blob_id": "87cd751bdc85b7d2b26b4a5d75e13664506b6f7a",
"branch_name": "refs/heads/master",
"committer_date": 1557977720000,
"content_id": "f4fe58a0efe83d0fb76467db1ebdc9168dfd5fd7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d4d421ef14e5155a9c8252fb28c432d736d62f74",
"extension": "py"... | 2.640625 | stackv2 | import os
from django.views.generic import View
from tools.decorator import allow_origin
from django.utils.decorators import method_decorator
from tools.pygal_process import create_wordcloud, create_pie, create_bar, jieba_top10_bar
# 导入分页模块
from django.core.paginator import Paginator, PageNotAnInteger, InvalidPage, Emp... | 210 | 38.14 | 141 | 21 | 2,035 | python | [{"finding_id": "codeql_py/path-injection_9b4a59ba004e7120_e9fc04d9", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 4 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
87,
94,
101,
108
] | [
null,
null,
null,
null
] | [
35,
35,
35,
35
] | [
72,
69,
70,
81
] | |
2024-11-18T21:25:32.453168+00:00 | 1,567,518,891,000 | 561dfd5f0d8207470ff7280d289085ee1feddd54 | 4 | {
"blob_id": "561dfd5f0d8207470ff7280d289085ee1feddd54",
"branch_name": "refs/heads/master",
"committer_date": 1567518891000,
"content_id": "ce31d5ca705049645ff5da6d3d45b0da65653b9b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d162efc9eae434bfa8271e6aba3b0d21d7fb55ff",
"extension": "py"... | 3.765625 | stackv2 | '''
AES有三种密钥长度16(*AES-128*), 24 (*AES-192*), 和 32 (*AES-256*)
在对字符进行加密时,密码和明文长度必须为16,24,或32
因此要对密码和明文进行预处理,确保密码长度为16,24或32,明文长度为16,24或32的整数倍
这里以16(*AES-128*),ECB模式为例
密钥长度16,明文长度为16的整数倍,若不足则补齐
'''
from Crypto.Cipher import AES
from binascii import unhexlify,hexlify
# 按字节数补齐,输入字符串,返回字节类型
def align(string, isKey=False):... | 45 | 37.67 | 123 | 13 | 792 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_5919d799ab4bdbfb_7c8648b9", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
31,
42
] | [
null,
null
] | [
16,
16
] | [
37,
37
] | |
2024-11-18T21:51:18.220185+00:00 | 1,601,489,671,000 | 608fac76d006c609e6512e789a286df4ab067947 | 2 | {
"blob_id": "608fac76d006c609e6512e789a286df4ab067947",
"branch_name": "refs/heads/master",
"committer_date": 1601489671000,
"content_id": "fc336d4d6fea4700d2be77544dd4c9b244985d92",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3c20918197b26c9dda30cc762ff3d5c482b4a179",
"extension": "py"... | 2.5 | stackv2 | # CPSC 449 Project 2 Mircoblog Microservices
# by Josef Jankowski and William Timani
# Josef Jankowski: josefj1519@csu.fullerton.edu
# William Timani: williamtimani@csu.fullerton.edu
# users.py contains the users microservice and flask init.
import click
import flask_api
import pugsql
from flask import request
from ... | 119 | 42.37 | 112 | 15 | 1,297 | python | [{"finding_id": "codeql_py/stack-trace-exposure_98860654755c0dae_a2ad50d0", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-209",
"CWE-079",
"CWE-079"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [u... | [
55,
96,
97,
109
] | [
null,
null,
null,
null
] | [
16,
16,
12,
12
] | [
60,
60,
102,
102
] | |
2024-11-18T22:00:17.797752+00:00 | 1,469,452,260,000 | b79c1e095d5e1c47770a34276dabe972e8e168ee | 3 | {
"blob_id": "b79c1e095d5e1c47770a34276dabe972e8e168ee",
"branch_name": "refs/heads/master",
"committer_date": 1469452260000,
"content_id": "41d6190e70fb6b6de5474a272a13a1333a7207f5",
"detected_licenses": [
"MIT"
],
"directory_id": "6435acba07d44a7c6f8bf8f3ada1f8c84b66daa7",
"extension": "py",
"fi... | 2.734375 | stackv2 | from flask import Flask
from flask import request
from flask import jsonify
from collections import defaultdict
import json
import random
import operator
import logging
app = Flask(__name__)
# set up logger
logger = logging.getLogger('reco_server')
logger.setLevel(logging.DEBUG)
hdlr = logging.FileHandler('logs/reco... | 174 | 29.9 | 82 | 19 | 1,191 | python | [{"finding_id": "codeql_py/flask-debug_a0e33dc65fb8e60d_358c7d89", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 7 | true | [
"CWE-215",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/flask-debug",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry de... | [
174,
53,
58,
66,
72,
79,
82
] | [
null,
null,
null,
null,
null,
null,
null
] | [
5,
21,
17,
21,
17,
21,
17
] | [
40,
52,
55,
52,
48,
52,
60
] | |
2024-11-18T22:00:26.749544+00:00 | 1,430,896,146,000 | cf9bab2e81966ab3299dcfd7801382596836ab73 | 3 | {
"blob_id": "cf9bab2e81966ab3299dcfd7801382596836ab73",
"branch_name": "refs/heads/master",
"committer_date": 1430896146000,
"content_id": "5191ff3587c53ac6b9b3f085f4212e049a4fc92b",
"detected_licenses": [
"MIT"
],
"directory_id": "1fb402f9624307c0f7ba0f2757dce204a1be13aa",
"extension": "py",
"fi... | 2.671875 | stackv2 | from flask import Flask
from bs4 import BeautifulSoup
import requests
import os
app = Flask(__name__)
@app.route("/")
def hello():
return "Hello World!"
@app.route('/<username>')
def catch_all(username):
r = requests.get("http://www.github.com/" + username)
data = r.text
soup = BeautifulSoup(data)
... | 23 | 22.52 | 58 | 13 | 144 | python | [{"finding_id": "codeql_py/reflective-xss_b2a8fa62c23569d7_d6be25ea", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-918"
] | [
"py/reflective-xss",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
19,
15
] | [
null,
null
] | [
12,
10
] | [
50,
59
] | |
2024-11-18T22:00:45.293539+00:00 | 1,620,207,929,000 | 9d4b760b384613382ccc6c02140fd4b17d592b8c | 3 | {
"blob_id": "9d4b760b384613382ccc6c02140fd4b17d592b8c",
"branch_name": "refs/heads/main",
"committer_date": 1620207929000,
"content_id": "7cbeafc7aa93f42eeeed2e3bafc87c945d88a1f4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9810a97b4a02d1760b1541690b6ad9c4be1264e0",
"extension": "py",
... | 2.8125 | stackv2 | import tkinter as tk
from tkinter import ttk
import tkinter.font as tkFont
import hashlib
from . import interactive
from . import const
class RegistPage(tk.Frame):
'''
注册页
'''
def __init__(self,parent,root):
super().__init__(parent)
self.root = root
titleFont = tkFont.Font(famil... | 62 | 42.97 | 89 | 14 | 808 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1679a29cfe5fb4c3_e9816a01", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
51
] | [
null
] | [
18
] | [
26
] | |
2024-11-18T22:00:46.158810+00:00 | 1,542,404,260,000 | 9b377c0eea23e316505321d0d4d2c53d529088ea | 3 | {
"blob_id": "9b377c0eea23e316505321d0d4d2c53d529088ea",
"branch_name": "refs/heads/master",
"committer_date": 1542404260000,
"content_id": "546fd98f0588cb47670a3e7f8a7644263bae9bc9",
"detected_licenses": [
"MIT"
],
"directory_id": "88f8f85ed82691a2e62122bd926128d8b32469a0",
"extension": "py",
"fi... | 2.625 | stackv2 | from flask import Flask, jsonify, request
from db_patient import Patient
import heart_server_helpers
import datetime
from email.utils import parseaddr
app = Flask(__name__)
@app.route("/api/new_patient", methods=["POST"])
def new_patient():
"""
add a new patient to the patient database via post
:return: ... | 187 | 30.57 | 77 | 14 | 1,374 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9524c2e1040b673e_5546a52a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
129
] | [
null
] | [
11
] | [
25
] | |
2024-11-18T22:01:02.639612+00:00 | 1,590,076,270,000 | d41f76eec04931df6030d10c401d6c2c54a11bb3 | 3 | {
"blob_id": "d41f76eec04931df6030d10c401d6c2c54a11bb3",
"branch_name": "refs/heads/master",
"committer_date": 1590076270000,
"content_id": "5cb19da94719fa9b2dabe987e9963ec45864641b",
"detected_licenses": [
"MIT"
],
"directory_id": "04a82c022b5291a2a43f4e0ddad457f7a2cd8621",
"extension": "py",
"fi... | 2.96875 | stackv2 | """
Nozomi
View Template Module
author: hugh@blinkybeach.com
"""
from typing import Optional
from jinja2 import Environment, FileSystemLoader
from nozomi.rendering.context import Context
LOADER = FileSystemLoader('templates')
STAGE_1_ENVIRONMENT = Environment( # Static context
loader=LOADER,
block_start_strin... | 51 | 32.69 | 80 | 14 | 387 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4f8157158b0ac738_d06c4575", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
11,
18
] | [
17,
24
] | [
23,
23
] | [
2,
2
] | |
2024-11-18T22:15:03.107425+00:00 | 1,631,320,899,000 | 3abf28eec7f4dbdd6163dc9de83aef02eb87b883 | 3 | {
"blob_id": "3abf28eec7f4dbdd6163dc9de83aef02eb87b883",
"branch_name": "refs/heads/master",
"committer_date": 1631320899000,
"content_id": "0ad4d413fa45ba0ef9ae38b8aee7a20cf23f9a21",
"detected_licenses": [
"MIT"
],
"directory_id": "5878c8a3b016aeeee6e3aa7e8492d4acc17e4b6d",
"extension": "py",
"fi... | 2.6875 | stackv2 | import sys
import requests
import random
from html.parser import HTMLParser
import html
from urllib.parse import unquote
from datetime import datetime
class MyHTMLParser(HTMLParser):
def __init__(self, title):
HTMLParser.__init__(self)
self.house_codes = list()
self.sale_status = list()
... | 97 | 36.62 | 151 | 19 | 971 | python | [{"finding_id": "codeql_py/request-without-cert-validation_7b8d04d774f073f4_3ae0d344", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
66,
77
] | [
null,
null
] | [
21,
21
] | [
100,
85
] | |
2024-11-18T22:26:17.598564+00:00 | 1,596,250,139,000 | ca6e301236a88c31ddb17a30cdaa31e0180df62b | 3 | {
"blob_id": "ca6e301236a88c31ddb17a30cdaa31e0180df62b",
"branch_name": "refs/heads/master",
"committer_date": 1596250139000,
"content_id": "b24e50102d32d47659f194c05ad51d177e24d439",
"detected_licenses": [
"MIT"
],
"directory_id": "6109e62b890d685f171e20ddcebab054c9cf9907",
"extension": "py",
"fi... | 2.9375 | stackv2 | from flask import Flask
from flask import request
import requests
import json
app = Flask(__name__)
@app.route('/')
def index():
return 'Hello, world!'
@app.route('/tester')
def tester():
url = 'http://127.0.0.1:5000/test'
myobj = {'string_to_cut': 'iamyourlyftdriver'}
x = requests.post(url, data = ... | 33 | 20.94 | 50 | 13 | 207 | python | [{"finding_id": "codeql_py/reflective-xss_11f036979487a3c0_82c09e1a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
30
] | [
null
] | [
12
] | [
29
] | |
2024-11-18T22:26:23.591861+00:00 | 1,424,510,995,000 | 1c96026f5fb29ffbee4a6de63427df3581d6b3ac | 3 | {
"blob_id": "1c96026f5fb29ffbee4a6de63427df3581d6b3ac",
"branch_name": "refs/heads/master",
"committer_date": 1424510995000,
"content_id": "3f7d4185511288293c66cbac2d3b708dfb97e7cf",
"detected_licenses": [
"MIT"
],
"directory_id": "dad89c3a042bebf552a1b8317990f7af623f757b",
"extension": "py",
"fi... | 2.78125 | stackv2 | """Script to generate upcoming training pages.
This should be executed from _includes/ directory.
"""
import os
import yaml
from jinja2 import Template
SOURCE = "upcoming.yml"
TEMPLATE_ROOT = "src/templates"
def parse_upcoming():
d = yaml.load(open(SOURCE).read())
upcoming = d.pop('upcoming') or {}
for... | 56 | 23.04 | 79 | 13 | 327 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e7db76ba5045c78d_341d212a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
32
] | [
null
] | [
9
] | [
36
] | |
2024-11-18T22:26:24.115135+00:00 | 1,623,800,216,000 | 7a9690d7585dedb33445a20c7fd7a9f22f740484 | 3 | {
"blob_id": "7a9690d7585dedb33445a20c7fd7a9f22f740484",
"branch_name": "refs/heads/main",
"committer_date": 1623800216000,
"content_id": "f427132b01897a5c8f88f0290a37d6879257dc9f",
"detected_licenses": [
"MIT"
],
"directory_id": "c13b3193b352e57bacee4cc09781a5d8ed436b50",
"extension": "py",
"file... | 2.765625 | stackv2 | # Marketo Monitor by CyberBitz
# https://github.com/CyberBitz/MarketoMonitor
import requests
from os import system, name
import os
from bs4 import BeautifulSoup
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
def clear():
if name == 'nt':
_ = system('cls')
else:
... | 95 | 26.35 | 97 | 15 | 735 | python | [{"finding_id": "codeql_py/request-without-cert-validation_53a04e1f29749807_a4a9982e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
49
] | [
null
] | [
20
] | [
51
] | |
2024-11-18T22:26:25.897484+00:00 | 1,582,310,294,000 | 97b62d1d75f39f09389b08ffc7c862dac709e680 | 3 | {
"blob_id": "97b62d1d75f39f09389b08ffc7c862dac709e680",
"branch_name": "refs/heads/master",
"committer_date": 1582310294000,
"content_id": "bf2d0555de003a1e8eeb525175d257475373338c",
"detected_licenses": [
"MIT"
],
"directory_id": "2f536a48cba850f3b26d216cc6427d86decce1c2",
"extension": "py",
"fi... | 2.78125 | stackv2 | # pydb/__init__.py
from flask import Flask, jsonify, request
from flask_cors import CORS
from pydb.db import load_db, write_db
def handle_get(dbtup, key, path):
db = dbtup[0]
ret = {}
# print(path)
if path != [] and path != [""]:
ret[key] = []
# For every item in the list
for ... | 210 | 23.52 | 73 | 21 | 1,344 | python | [{"finding_id": "codeql_py/stack-trace-exposure_88e11d7aaa0f068e_b5c9a1b9", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
188,
203
] | [
null,
null
] | [
20,
20
] | [
59,
55
] | |
2024-11-18T20:40:08.282971+00:00 | 1,593,706,608,000 | 5161994cb664b2ef3de0039ece30a638a39d4354 | 2 | {
"blob_id": "5161994cb664b2ef3de0039ece30a638a39d4354",
"branch_name": "refs/heads/master",
"committer_date": 1593706608000,
"content_id": "a634cde9d5fee03653c7a1f2a2cfdf8638fbf030",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e303b8f3c8b3c0c8db5b0a785a4a204c90104a95",
"extension": "py"... | 2.484375 | stackv2 | #
# Copyright (C) 2020 Arm Mbed. All rights reserved.
# SPDX-License-Identifier: Apache-2.0
#
"""Module in charge of mbed_config.h file generation."""
import pathlib
import jinja2
from typing import Iterable, Any
from mbed_build._internal.config.config import Config
from mbed_build._internal.config.assemble_build_con... | 65 | 36.45 | 116 | 13 | 540 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c9d99ee61cc44f6c_72dbf4f4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
54
] | [
null
] | [
11
] | [
98
] | |
2024-11-18T20:52:19.793517+00:00 | 1,583,591,792,000 | 9591bf1f751156994bc99f385f45e8c64caf5316 | 2 | {
"blob_id": "9591bf1f751156994bc99f385f45e8c64caf5316",
"branch_name": "refs/heads/master",
"committer_date": 1583591792000,
"content_id": "d73db0b6e2c3941c7c6c3e55bd157a0e16e2faec",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "10b78b99eb4d9a5ce9f4e59d10629c5ed660e11c",
"extension": "py"... | 2.453125 | stackv2 | # -*- encoding:utf-8 -*-
# @Time : 2019/10/7 22:12
# @Author : gfjiang
# @Site :
# @File : deploy_model.py
# @Software: PyCharm
import flask
import io
import cv2.cv2 as cv
from PIL import Image
import numpy as np
import cvtools
import os
import os.path as osp
from threading import Thread
from werkzeug.utils... | 190 | 32.61 | 80 | 20 | 1,539 | python | [{"finding_id": "codeql_py/path-injection_53ba9022f7434216_d012b033", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
170
] | [
null
] | [
31
] | [
66
] | |
2024-11-18T20:52:21.548746+00:00 | 1,543,226,501,000 | 564d0493292e6a9fdfdcd4f2383145f31f9bc721 | 2 | {
"blob_id": "564d0493292e6a9fdfdcd4f2383145f31f9bc721",
"branch_name": "refs/heads/master",
"committer_date": 1543226501000,
"content_id": "fda09c1599eca7afdbca9cfe8eef4f8b28a40356",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "cf443423120842938068c03bf394f58d065e9695",
"extension": "py",
... | 2.34375 | stackv2 | # Import JanusVR from URL/filesystem
import os
import urllib.request as urlreq
import gzip
import bpy
from mathutils import Vector, Matrix
from math import radians
import re
import bs4
import traceback
def s2v(s):
try:
return [float(c) for c in s.split(" ")]
except:
return [0,0,0]
def s2p(s):
v = s2v(s)
retur... | 371 | 32.57 | 163 | 27 | 3,709 | python | [{"finding_id": "codeql_py/bad-tag-filter_1cbcfcd08bead7c9_8c9d5740", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression only parses --> and not --!> as a HTML comment end tag.", "remediation": "", "location":... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression only parses --> and not --!> as a HTML comment end tag."
] | [
225
] | [
null
] | [
18
] | [
23
] | |
2024-11-18T20:52:25.709853+00:00 | 1,653,310,950,000 | 7977b31215245a5bdbc4bc92ba3ab7952d7ca955 | 2 | {
"blob_id": "7977b31215245a5bdbc4bc92ba3ab7952d7ca955",
"branch_name": "refs/heads/master",
"committer_date": 1653310950000,
"content_id": "d9df7f79ddb175e122cd9abe4792df726ced6861",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "118d26ad95a5cad30f092595aacdf95d1be29f9a",
"extension": "py"... | 2.375 | stackv2 | #!/usr/bin/python3
# Copyright (c) 2020 Zorglub42 {contact(at)zorglub42.fr}.
#
# All rights reserved. This program and the accompanying materials
# are made available under the terms of the Apache License, Version 2.0
# which accompanies this distribution, and is available at
# http://www.apache.org/licenses/LICENSE-2.... | 124 | 30.73 | 88 | 22 | 870 | python | [{"finding_id": "codeql_py/request-without-cert-validation_ee693d5fb0831c47_16dd3b4c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
32
] | [
40
] | [
16
] | [
22
] | |
2024-11-18T21:08:10.251210+00:00 | 1,591,009,269,000 | 6b78fab49ae333d24ee37456f90e0d611b98bc31 | 3 | {
"blob_id": "6b78fab49ae333d24ee37456f90e0d611b98bc31",
"branch_name": "refs/heads/master",
"committer_date": 1591009269000,
"content_id": "c66399d885da0d7741848afd7c8b03e651404c48",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f59c05d676079f6cbcf7dd13df8186db01a91a7b",
"extension": "py"... | 2.765625 | stackv2 | import time
from Utilization.format import Format
import requests
from threading import Thread, Lock
lock = Lock()
class MyThread(Thread):
def __init__(self, threadID, ip, port):
Thread.__init__(self)
self.threadID = threadID
self.ip = ip
self.port = port
def run(self):
... | 76 | 23.34 | 100 | 20 | 465 | python | [{"finding_id": "codeql_py/request-without-cert-validation_df8f946084071d16_025c4ed4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
34
] | [
null
] | [
13
] | [
69
] | |
2024-11-18T21:08:12.481327+00:00 | 1,615,931,372,000 | 78b79b510915ba2bcabd5236b98f178c0faf0bb1 | 3 | {
"blob_id": "78b79b510915ba2bcabd5236b98f178c0faf0bb1",
"branch_name": "refs/heads/main",
"committer_date": 1615931372000,
"content_id": "68e8261fce9d79d734541d701e33cbe5b083474e",
"detected_licenses": [
"MIT"
],
"directory_id": "e0b6c406957cd0bc262bd4997026936ed42ab3a4",
"extension": "py",
"file... | 3.0625 | stackv2 | # olympics-api.py
# Claire Williams and Antonia Ritter
# Feb 2 2021
import flask
import json
import psycopg2
from collections import defaultdict
app = flask.Flask(__name__)
def query_database(query):
'''
Given an SQL query, returns a list of results
'''
from config import password
from config ... | 131 | 28.47 | 115 | 12 | 872 | python | [{"finding_id": "codeql_py/flask-debug_a405f6bf5bae352b_cd3c1390", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-089"
] | [
"py/flask-debug",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This SQL query depends on a [user-provided value](1)."
] | [
131,
29
] | [
null,
null
] | [
5,
24
] | [
52,
29
] | |
2024-11-18T21:08:18.191984+00:00 | 1,534,362,627,000 | c8a18744f1fa49f840eafc504c44cc32ce7cc089 | 3 | {
"blob_id": "c8a18744f1fa49f840eafc504c44cc32ce7cc089",
"branch_name": "refs/heads/master",
"committer_date": 1534362627000,
"content_id": "2eb20386e9b12814d8a1d978d4fcfab07a9c4b6f",
"detected_licenses": [
"MIT"
],
"directory_id": "26e16d2a514501a7e7474efbc73b7c5dec0c95ba",
"extension": "py",
"fi... | 2.609375 | stackv2 | from django.core.management.base import BaseCommand
from query_flight.models import Airport
import requests
from bs4 import BeautifulSoup
from io import StringIO
import pandas as pd
def get_verify(proxies):
if proxies is None:
return None
else:
return False
class Command(BaseCommand):
''... | 101 | 39.38 | 112 | 19 | 867 | python | [{"finding_id": "codeql_py/request-without-cert-validation_6d93fff0bba164e4_bdbe2218", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2).",
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
29,
51
] | [
null,
null
] | [
23,
20
] | [
72,
69
] | |
2024-11-18T21:08:19.594183+00:00 | 1,660,497,860,000 | 0d5e83ab6e08256f330de690bad4d930e1e16a4a | 3 | {
"blob_id": "0d5e83ab6e08256f330de690bad4d930e1e16a4a",
"branch_name": "refs/heads/master",
"committer_date": 1660497860000,
"content_id": "e923405d8f320802aee984afbc2f1aee496a1713",
"detected_licenses": [
"MIT"
],
"directory_id": "4888ce75982ccb2064baa15b7dbd112f7c12d53c",
"extension": "py",
"fi... | 2.828125 | stackv2 | import mysql.connector
import boto3
import json
from botocore.exceptions import ClientError
def get_secret():
secret_name = "MySecretName"
region_name = "us-east-1"
session = boto3.session.Session()
client = session.client(
service_name='secretsmanager',
region_name=region_name,
)
... | 51 | 34.08 | 108 | 15 | 362 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8b86e9551e404dac_a6a9a232", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
22
] | [
null
] | [
19
] | [
75
] | |
2024-11-18T21:31:24.817970+00:00 | 1,499,176,175,000 | bb0f92606fb10da8cf63c6357811b45c3fc4a608 | 3 | {
"blob_id": "bb0f92606fb10da8cf63c6357811b45c3fc4a608",
"branch_name": "refs/heads/master",
"committer_date": 1499176175000,
"content_id": "209f82a73f80ea32eeec689295e8a9035efed47b",
"detected_licenses": [
"MIT"
],
"directory_id": "170b73df6ccd2eb65b60c0e01c521b9ff251ef1c",
"extension": "py",
"fi... | 2.578125 | stackv2 | import rnftools.rnfformat
import re
reg_lrn = re.compile(r"^([!-?A-^`-~]*)__([0-9a-f]+)__([!-?A-^`-~]+)__([!-?A-^`-~]*)$")
reg_prefix_part = re.compile(r"^[!-?A-^`-~]*$")
reg_id_part = re.compile(r"^[0-9a-f]+$")
reg_segmental_part = re.compile(r"^(?:(\([0-9FRN,]*\))(?:,(?!$)|$))+$")
reg_suffix_part = re.compile(r"^(?:... | 122 | 30.16 | 110 | 20 | 1,100 | python | [{"finding_id": "codeql_py/overly-large-range_031de43df9fd83b8_ea47db75", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^\\].", "remediation": "", "locatio... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^\\]."... | [
4,
4,
4,
5
] | [
null,
null,
null,
null
] | [
30,
59,
75,
37
] | [
33,
62,
78,
40
] | |
2024-11-18T21:31:34.989164+00:00 | 1,604,128,666,000 | 80db503622782d7521905223a67cf4225be8930e | 3 | {
"blob_id": "80db503622782d7521905223a67cf4225be8930e",
"branch_name": "refs/heads/master",
"committer_date": 1604128666000,
"content_id": "003058a2b09454847708c68470a2557c42857ef1",
"detected_licenses": [
"MIT"
],
"directory_id": "fedd110ada88d15f702e5fb9ec0e5367eac35148",
"extension": "py",
"fi... | 2.953125 | stackv2 | #!/usr/bin/env python3
import os
from Crypto.Cipher import AES
KEY = os.urandom(16)
FLAG = open('./flag', 'rb').read()
def pad(m):
padlen = -len(m) % 16
return m + bytes([0] * padlen)
def main():
aes = AES.new(KEY, AES.MODE_ECB)
while True:
message = bytes.fromhex(input('message = ').str... | 23 | 18.61 | 60 | 15 | 129 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_f412a3ffcda5d8d6_213225b5", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
17
] | [
null
] | [
18
] | [
50
] | |
2024-11-18T21:32:28.864676+00:00 | 1,594,890,189,000 | f8e9ae21da7315a7c397e9d1bdc188797869e76e | 2 | {
"blob_id": "f8e9ae21da7315a7c397e9d1bdc188797869e76e",
"branch_name": "refs/heads/master",
"committer_date": 1594890189000,
"content_id": "3e960267eb29dba5a29a48230abdccbafaa706fe",
"detected_licenses": [
"Unlicense"
],
"directory_id": "3718e95565860e75a59686e27c9191ef71b0e65c",
"extension": "py",... | 2.421875 | stackv2 | import requests
from bs4 import BeautifulSoup
import json
# from urllib.request import urlretrieve
import shutil
import re
import os.path
from pathlib import Path
TOONILY = ('toonily', 'https://toonily.com/webtoon/{0}/chapter-{1}/')
WEBTOON = ('webtoon', 'https://www.webtoon.xyz/read/{0}/chapter-{1}/')
TEMP_PAGES_HTM... | 197 | 32.85 | 122 | 31 | 1,775 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_bed0e5789fb2b387_bdeaedfc", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
91
] | [
null
] | [
18
] | [
25
] | |
2024-11-18T21:32:59.563989+00:00 | 1,630,770,563,000 | 47c3106ea276fb143006aaedaddde0c32654218d | 2 | {
"blob_id": "47c3106ea276fb143006aaedaddde0c32654218d",
"branch_name": "refs/heads/master",
"committer_date": 1630770563000,
"content_id": "26e706720eff3c4a3abdca25b6f0715276766a6b",
"detected_licenses": [
"MIT"
],
"directory_id": "5d5afc33d3448d0e680fe25741e829e2c7fc7af3",
"extension": "py",
"fi... | 2.375 | stackv2 | from flask import (Blueprint, request, redirect, render_template, url_for, flash, session, render_template_string)
from flask.views import MethodView
from flaskblog import db
from flaskblog import auth
from flaskblog import db_util
from flaskblog.decorator import anonymous_required, login_required
import hashlib
user... | 117 | 28.94 | 123 | 14 | 722 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_2f61d3e257f82bb2_77260e38", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-601"
] | [
"py/weak-sensitive-data-hashing",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
54,
36
] | [
null,
null
] | [
39,
25
] | [
56,
33
] | |
2024-11-18T21:33:12.674820+00:00 | 1,350,226,616,000 | ce188124065c7cbc3207e3751767e909cd3fc71c | 3 | {
"blob_id": "ce188124065c7cbc3207e3751767e909cd3fc71c",
"branch_name": "refs/heads/master",
"committer_date": 1350226616000,
"content_id": "3cf85ffa75845ee1279e84f73a346d96446c0901",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "51ea667423fe8e046a4f23afbd2a8fc710f19de5",
"extension": "p... | 2.5625 | stackv2 | import stat
import os
import re
from os import path
from shutil import copy2
from jinja2 import Environment
jinja2_env = Environment(
block_start_string="{{%",
block_end_string="%}}",
variable_start_string="{{{",
variable_end_string="}}}",
trim_blocks=True,
)
jinja2_renderer = jinja2_env.from_str... | 70 | 36.09 | 108 | 14 | 559 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4224d39d9be88dc4_d4468808", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
9
] | [
15
] | [
14
] | [
2
] | |
2024-11-18T21:49:03.277626+00:00 | 1,603,092,128,000 | c00cc5c538a68f7f0b43f5500f4d130ef6ec7568 | 3 | {
"blob_id": "c00cc5c538a68f7f0b43f5500f4d130ef6ec7568",
"branch_name": "refs/heads/master",
"committer_date": 1603092128000,
"content_id": "72a523b84de03f9353094dde9f1a6ff7ccc8cb0d",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "3c920e16e1687530861bc14fe0bc297a4493045c",
"extension": "py",
... | 2.8125 | stackv2 | #!/usr/bin/env python
""" SoG client
* runs a simple client that connect to a SoG server
* connection is persistent
ToDo:
* improve connection timeout
* offiscate/encode password input??
*
"""
import getpass
import time
import socket
import traceback
from common.attributes import AttributeHelper
fr... | 177 | 31.41 | 84 | 17 | 1,132 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_22381142cd94d553_f4a9d8e7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
66
] | [
null
] | [
23
] | [
52
] | |
2024-11-18T22:26:06.708234+00:00 | 1,592,877,153,000 | 1a12182e691c3d6e4168d3034308406f802318f8 | 3 | {
"blob_id": "1a12182e691c3d6e4168d3034308406f802318f8",
"branch_name": "refs/heads/master",
"committer_date": 1592877153000,
"content_id": "4820441433956a194d94c5edbefd47af68cc5543",
"detected_licenses": [
"MIT"
],
"directory_id": "fe8a15f759df698d0d562fc6c6c949e4e591b350",
"extension": "py",
"fi... | 2.53125 | stackv2 | import struct
from Crypto.Cipher import ARC4, DES, DES3, AES, Blowfish, XOR
from Crypto.PublicKey import RSA
from pbkdf2 import PBKDF2
# RSA
def decrypt_rsa(key, data):
rsa_key = RSA.importKey(key)
return rsa_key.decrypt(data)
# XOR
def decrypt_xor(key, data):
cipher = XOR.new(key)
return cipher.de... | 155 | 22.12 | 75 | 19 | 1,117 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_199aea48d08c845b_d2e7cf96", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "... | 4 | true | [
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used.\n[The block mode ECB](3) is broken or weak, and should not be used.\n[The cryptog... | [
23,
33,
42,
48
] | [
null,
null,
null,
null
] | [
12,
12,
12,
12
] | [
32,
32,
32,
32
] | |
2024-11-18T20:31:42.119313+00:00 | 1,480,189,918,000 | cf3f84ddee14f8eb4939dc4f34e655d5d2e02b10 | 2 | {
"blob_id": "cf3f84ddee14f8eb4939dc4f34e655d5d2e02b10",
"branch_name": "refs/heads/master",
"committer_date": 1480189918000,
"content_id": "2d66b63b08c09f3691c444733efc31593bbb779a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4812063ad3ba87f676ec71b5943dce520377b613",
"extension": "py"... | 2.390625 | stackv2 | from flask import Flask, abort, request
import os.path
import dbconf
cnx = dbconf.dbconnect
app = Flask(__name__)
#
# Based on http://flask.pocoo.org/docs/0.11/quickstart/#routing
#
@app.route('/package-inventory/<hostname>/<pkgname>', methods=["GET"])
def get_inventory_package(hostname):
fn = "cache/%s" % hostna... | 27 | 20.37 | 70 | 12 | 154 | python | [{"finding_id": "codeql_py/path-injection_4af8aa4c348c3235_0415ea89", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
14,
15
] | [
null,
null
] | [
23,
19
] | [
25,
21
] | |
2024-11-18T20:53:30.480614+00:00 | 1,678,040,170,000 | 4bf663eb3cb7a06d0c2543492275ae857a58e7c4 | 2 | {
"blob_id": "4bf663eb3cb7a06d0c2543492275ae857a58e7c4",
"branch_name": "refs/heads/master",
"committer_date": 1678040170000,
"content_id": "7da30cdbe36dacc1891e9446f42351bbc24d8ca9",
"detected_licenses": [
"MIT"
],
"directory_id": "4022d3dd583ea0324f0d38d90421d2dccbd3d47f",
"extension": "py",
"fi... | 2.375 | stackv2 | from flask import (
Blueprint,
current_app,
Response,
redirect,
url_for,
request,
render_template,
flash,
)
from sqlalchemy.sql.expression import func
from conekt import blast_thread
from conekt.models.sequences import Sequence
from conekt.forms.blast import BlastForm
import os
import ... | 133 | 28.05 | 95 | 20 | 847 | python | [{"finding_id": "codeql_py/path-injection_c53c646f0a1af7c4_b92c76a7", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 4 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
108,
108,
112,
120
] | [
null,
null,
null,
null
] | [
23,
51,
19,
31
] | [
35,
63,
31,
38
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.