added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T02:45:54.667420+00:00 | 1,675,884,890,000 | 75578213a5bfbf12a01c80d41c834f2d2376e6c1 | 3 | {
"blob_id": "75578213a5bfbf12a01c80d41c834f2d2376e6c1",
"branch_name": "refs/heads/master",
"committer_date": 1675884890000,
"content_id": "9e95f155c90cd24687a5de8cfa631fe2f7c86fa8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "30b06187f8c6f30de84b8a93f24bce5562afa947",
"extension": "py"... | 3.09375 | stackv2 | """
Module to GET and configure IP static routes.
"""
import requests
import json
from src import common
def get_ip_route(baseurl, cookie_header):
"""
Get ip static route data
:param baseurl: imported baseurl variable
:param cookie_header: Parse cookie resulting from successful loginOS.login_os(baseu... | 86 | 36.63 | 110 | 14 | 821 | python | [{"finding_id": "codeql_py/request-without-cert-validation_4f76f55624e3cf19_de1a73bc", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
19,
62
] | [
null,
null
] | [
11,
19
] | [
59,
99
] | |
2024-11-19T02:57:26.499795+00:00 | 1,575,098,394,000 | 01b7f09552e7e8c54457c5e3157ae27a312d8fca | 2 | {
"blob_id": "01b7f09552e7e8c54457c5e3157ae27a312d8fca",
"branch_name": "refs/heads/master",
"committer_date": 1575098394000,
"content_id": "282d74b2fb07d8c000fd613cbd311d36d5649282",
"detected_licenses": [
"MIT"
],
"directory_id": "c374596e06c02cf5d6ea8cc97ab19f4580042d96",
"extension": "py",
"fi... | 2.328125 | stackv2 | from flask import Flask, render_template, request, redirect, url_for, session, make_response
from flask_mysqldb import MySQL
from flask_mail import Mail, Message
import MySQLdb.cursors
import re
import uuid
import hashlib
import datetime
app = Flask(__name__)
app.secret_key = 'seocho'
app.config['threaded'] = True
... | 226 | 46.44 | 159 | 18 | 2,336 | python | [{"finding_id": "codeql_py/polynomial-redos_f80c8adc7ff094cc_62d58091", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma... | 5 | true | [
"CWE-1333",
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/polynomial-redos",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '?'.",
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password... | [
97,
42,
58,
88,
183
] | [
null,
null,
null,
null,
null
] | [
50,
29,
37,
29,
33
] | [
55,
42,
50,
42,
46
] | |
2024-11-19T03:12:15.349130+00:00 | 1,530,820,845,000 | f09ed1fc27f682d548eeaf3cb9f62845195c7a56 | 2 | {
"blob_id": "f09ed1fc27f682d548eeaf3cb9f62845195c7a56",
"branch_name": "refs/heads/master",
"committer_date": 1530820845000,
"content_id": "15ec32708d96f55770359939345e7bb26bbb560d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e7a3bd71560d94e2c74e30228bd6bc454ef5823c",
"extension": "py"... | 2.40625 | stackv2 | #!/usr/bin/env python
# Copyright 2017, Timothy Schutt.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicab... | 87 | 31.54 | 105 | 14 | 675 | python | [{"finding_id": "codeql_py/path-injection_7ee3741d29e8b72e_a3e4e5cb", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
62,
63
] | [
null,
null
] | [
27,
18
] | [
38,
29
] | |
2024-11-19T03:12:23.393672+00:00 | 1,598,439,094,000 | e154fb357dfd69dfa834e8a978ddf785d24e049d | 2 | {
"blob_id": "e154fb357dfd69dfa834e8a978ddf785d24e049d",
"branch_name": "refs/heads/master",
"committer_date": 1598439094000,
"content_id": "aff3a825112cc72f1aff7a6a596aaa29072ca4da",
"detected_licenses": [
"MIT"
],
"directory_id": "310b11ea8391743ecf89efe3c78ea268af1ac653",
"extension": "py",
"fi... | 2.375 | stackv2 | from selenium import webdriver
from selenium.webdriver.common.keys import Keys
import time
import os.path
if not os.path.isfile('passewords.txt'):
passes = []
for i in range(0,26):
for j in range(0, 26):
for k in range(0,26):
for l in range(0,26):
password = "kar505"
password = password + chr(or... | 64 | 19.11 | 98 | 24 | 381 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_790750d54f936a69_a947f679", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
19,
48
] | [
null,
null
] | [
11,
42
] | [
26,
50
] | |
2024-11-19T01:33:45.078271+00:00 | 1,624,715,675,000 | 31a364da7788817414ad649f0984b62a6bb31073 | 2 | {
"blob_id": "31a364da7788817414ad649f0984b62a6bb31073",
"branch_name": "refs/heads/main",
"committer_date": 1624715675000,
"content_id": "4934f07b20ea94e6ae079aa95aee8044fa35621a",
"detected_licenses": [
"MIT"
],
"directory_id": "fe8590fd315ad500c0973205258679a2cf650b84",
"extension": "py",
"file... | 2.40625 | stackv2 | import os
import re
import sys
import json
import argparse
import requests
import threading
from requests.packages.urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
# UCM Exploit Loader
#$top_parser = argparse.ArgumentParser(description='')
#$top_parser... | 103 | 35.86 | 135 | 16 | 977 | python | [{"finding_id": "codeql_py/request-without-cert-validation_0c92538a207d5588_42d0aed3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
31,
77
] | [
null,
78
] | [
20,
20
] | [
79,
76
] | |
2024-11-19T01:33:52.676607+00:00 | 1,410,720,751,000 | 9d6e9ef69b17ddf974b1ccd682514a5cf791eeb8 | 2 | {
"blob_id": "9d6e9ef69b17ddf974b1ccd682514a5cf791eeb8",
"branch_name": "refs/heads/master",
"committer_date": 1410720751000,
"content_id": "10142c1f0bc59490e9eb954de6fa670990f7de2f",
"detected_licenses": [
"MIT"
],
"directory_id": "d1119777cc0ea85603bdcfffdd63f2dba47a5575",
"extension": "py",
"fi... | 2.390625 | stackv2 | from flask import Flask, flash, url_for, request, render_template
from flask.ext.mail import Mail
from flask.ext.mail import Message
import shutil
import sqlite3 as sqlite
import random
import re
import os
app = Flask(__name__)
""" CONFIGURATION SETTINGS """
app.secret_key = 'qoifj329fOKo32fkAOKQokweoekfeofkeokfewoFK... | 126 | 35.01 | 124 | 24 | 1,107 | python | [{"finding_id": "codeql_py/path-injection_b73fdabb61d328db_1ee8741e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
99
] | [
null
] | [
27
] | [
49
] | |
2024-11-19T01:57:15.453336+00:00 | 1,449,560,411,000 | 85e6e336b216cd94a58f3f6b46fbeac4da9f2f69 | 3 | {
"blob_id": "85e6e336b216cd94a58f3f6b46fbeac4da9f2f69",
"branch_name": "refs/heads/master",
"committer_date": 1449560411000,
"content_id": "fbf45bdd20432e795e7ac87758f41b0a100133f2",
"detected_licenses": [
"MIT"
],
"directory_id": "18a83132fb83ab84dc8e1cdd5d01a80a3d38a387",
"extension": "py",
"fi... | 2.953125 | stackv2 | #!/usr/bin/python
from BaseHTTPServer import BaseHTTPRequestHandler,HTTPServer
import httplib
import threading
from socket import socket
PORT_NUMBER = 8080
class test_server:
def __init__(self):
self.ip = "192.168.56.11"
self.test_server_timer()
def tcp_test(self, server_info):
cpos... | 88 | 28.19 | 78 | 17 | 596 | python | [{"finding_id": "codeql_py/partial-ssrf_32302a782dcfc34d_9133c8b4", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).",
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)."
] | [
58,
60
] | [
null,
null
] | [
17,
17
] | [
67,
56
] | |
2024-11-19T01:57:18.723369+00:00 | 1,635,354,168,000 | 84a8bfc8debd514cb4ecd6313cdda1faba080973 | 3 | {
"blob_id": "84a8bfc8debd514cb4ecd6313cdda1faba080973",
"branch_name": "refs/heads/main",
"committer_date": 1635354168000,
"content_id": "6f8952a1dc73059cec250bea1ce5d3ec6c9276ae",
"detected_licenses": [
"MIT"
],
"directory_id": "abbd09cd2487ba36567c423838a723ae342b1f4a",
"extension": "py",
"file... | 2.5625 | stackv2 | # Importing functions from the class bottle
from bottle import run, get, post, request
import random
@get("/") # Can use same method name because of the decorator
def do():
print(type(random.randint(1, 1000000)))
return str(random.randint(1, 1000000))
@post("/signin")
def do():
# Getting the form data
... | 21 | 24.52 | 62 | 12 | 155 | python | [{"finding_id": "codeql_py/reflective-xss_8983521354411905_799a2200", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
17
] | [
null
] | [
12
] | [
57
] | |
2024-11-19T01:57:30.538440+00:00 | 1,631,285,027,000 | 0dc268e98b9b1a34015f8ff5acf28218087279f3 | 2 | {
"blob_id": "0dc268e98b9b1a34015f8ff5acf28218087279f3",
"branch_name": "refs/heads/main",
"committer_date": 1631285027000,
"content_id": "f2f7776900bffc800c8172d4d4ec247e68626163",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "00d5657ec98861de165deaa449dc27ccbd289173",
"extension": "py",
... | 2.40625 | stackv2 | import sql
import mysql.connector
from flask import Flask, render_template, request
from datetime import datetime
import webbrowser
app = Flask(__name__)
url = 'http://localhost:5000/'
webbrowser.register('chrome',
None,
webbrowser.BackgroundBrowser("C:\Program Files\Google\Chr... | 317 | 32.79 | 118 | 21 | 3,119 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e98c6924e7f69642_cffda85a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-215",
"CWE-079"
] | [
"py/clear-text-logging-sensitive-data",
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
23,
317,
76
] | [
null,
null,
null
] | [
11,
null,
12
] | [
16,
20,
15
] | |
2024-11-19T02:11:11.710063+00:00 | 1,378,625,988,000 | 786807f2b28b3f42fbf7615dba37b3856b9b39f0 | 3 | {
"blob_id": "786807f2b28b3f42fbf7615dba37b3856b9b39f0",
"branch_name": "refs/heads/master",
"committer_date": 1378625988000,
"content_id": "4d10e34eb24cb6dfe80922d3d4ef79a6bd14f672",
"detected_licenses": [
"MIT"
],
"directory_id": "117939bcb843b73048bce5ad4cfdac46864690b3",
"extension": "py",
"fi... | 2.65625 | stackv2 | #!/bin/python
# Include the Dropbox SDK libraries
from dropbox import client, rest, session
import os, sys
# Get your app key and secret from the Dropbox developer website
APP_KEY = ''
APP_SECRET = ''
TOKEN = './access.txt'
# ACCESS_TYPE should be 'dropbox' or 'app_folder' as configured for your app
ACCESS_TYPE = 'dro... | 96 | 27.3 | 89 | 17 | 694 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8d476b3f4c9a037a_b6c9551e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
29
] | [
null
] | [
12
] | [
61
] | |
2024-11-19T02:11:17.594633+00:00 | 1,692,829,188,000 | 12cc8172d72f533add79c33e586d7e60980bd684 | 3 | {
"blob_id": "12cc8172d72f533add79c33e586d7e60980bd684",
"branch_name": "refs/heads/master",
"committer_date": 1692829188000,
"content_id": "91787d916009a44f5105416fefcd1344ed6c7a4c",
"detected_licenses": [
"MIT",
"Python-2.0"
],
"directory_id": "4207698ab3d15c6d81bb205264b7de8297ba47e3",
"exten... | 3.140625 | stackv2 | import os
import tarfile
import zipfile
import requests
import subprocess
from tqdm import tqdm
from urllib.parse import urlparse
def download_file(url: str, directory: str):
"""
Download the file at ``url`` to ``directory``.
Extract to the file content ``directory`` if the original file
is a tar, tar... | 102 | 26.91 | 74 | 15 | 653 | python | [{"finding_id": "codeql_py/tarslip_efa9ebe797c1d246_c656051a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
61
] | [
null
] | [
13
] | [
14
] | |
2024-11-19T02:11:19.825883+00:00 | 1,573,503,738,000 | fea1a2176867e0bfe50b79639584e71727e6995d | 4 | {
"blob_id": "fea1a2176867e0bfe50b79639584e71727e6995d",
"branch_name": "refs/heads/master",
"committer_date": 1573503738000,
"content_id": "044a6886d3f49b24f5910e8f84dc33bdb0eee81c",
"detected_licenses": [
"MIT"
],
"directory_id": "78ed7dbe33d1b8df474de7df4806ddada0b9799a",
"extension": "py",
"fi... | 3.84375 | stackv2 | #!/use/bin/env python3
import random
import time
def word_processing(secret_word, alphabet, letter, hashed, losing, man):
"""Handling of word arrays. hashing, validation and removing.
Args:
secret_word (str): The word to be guessed,
alphabet (str): The remaining letters of the alphabet avail... | 205 | 34.27 | 121 | 17 | 1,670 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_13c40aeb0f46405e_cafdc6bb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (secret)](5) a... | [
87,
193
] | [
88,
194
] | [
15,
15
] | [
100,
100
] | |
2024-11-19T02:33:11.586170+00:00 | 1,465,250,310,000 | b8176f2bbdcded444af424dbfb7d0fda690403c0 | 3 | {
"blob_id": "b8176f2bbdcded444af424dbfb7d0fda690403c0",
"branch_name": "refs/heads/master",
"committer_date": 1465250310000,
"content_id": "edd48d2811ddddd236ecbfc59c553b8cf13eb02b",
"detected_licenses": [
"MIT"
],
"directory_id": "275a1843e55c9bf351f28b6d89981c842549320d",
"extension": "py",
"fi... | 2.71875 | stackv2 | """
Views for Messy.
"""
from django.http import HttpResponseRedirect, JsonResponse
from messy import stats_writer
def get_stats(request):
"""
Gets the aggregate message stats.
Note: This is the high-traffic view - notice how we don't hit
the database from here.
"""
stats_url = stats_wr... | 36 | 26.17 | 95 | 14 | 211 | python | [{"finding_id": "codeql_py/stack-trace-exposure_f9a779539b37556e_a0a156dd", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
35
] | [
null
] | [
29
] | [
71
] | |
2024-11-19T02:33:33.403431+00:00 | 1,399,125,678,000 | 11afc5f45b07db794c707a281e2ec17a2b77e9f5 | 3 | {
"blob_id": "11afc5f45b07db794c707a281e2ec17a2b77e9f5",
"branch_name": "refs/heads/master",
"committer_date": 1399125678000,
"content_id": "d7430ec759ab935ba7007750dae82b01cde8c5d9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3c016bef96922caf0081b01845fd8f4b464caeee",
"extension": "py"... | 2.5625 | stackv2 | #!/usr/bin/python
import optparse
import sys
import os
import logging
import cmd
from cli import cmdinterpretor
log = logging.getLogger(__name__)
#this is the entry point of the commandline client.
# 1. enter in to stratos shell session
# 2. use the 'stratos' a unix command
def authenticate_authorize():
pars... | 54 | 25.63 | 115 | 11 | 323 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2b379e927a699e9a_18623401", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
27
] | [
null
] | [
11
] | [
27
] | |
2024-11-19T02:46:04.879535+00:00 | 1,576,101,020,000 | e408e3e2eca3c780e00537a2a7054bb0d5635eb2 | 3 | {
"blob_id": "e408e3e2eca3c780e00537a2a7054bb0d5635eb2",
"branch_name": "refs/heads/master",
"committer_date": 1576101020000,
"content_id": "34a9b7f29806460bc5e005a3e92dc02de0b47878",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fbe8d9693f3b1fcf6c158be13e837083161f7b7c",
"extension": "py"... | 2.65625 | stackv2 | """
Fakes for Product service
"""
import logging
import sys
from flask import Flask, jsonify, make_response
from flask_api import status # HTTP Status Codes
APP = Flask(__name__)
if not APP.debug:
print('Setting up logging...')
# Set up default logging for submodules to use STDOUT
# datefmt='%m/%d/%Y... | 45 | 32.49 | 76 | 13 | 371 | python | [{"finding_id": "codeql_py/log-injection_6aa4212679cbe7cd_fcf0f2b5", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
35
] | [
null
] | [
21
] | [
76
] | |
2024-11-19T02:46:07.001546+00:00 | 1,691,280,063,000 | 23b8fefe9a41cd289d538a684b5bfe908ea52aad | 3 | {
"blob_id": "23b8fefe9a41cd289d538a684b5bfe908ea52aad",
"branch_name": "refs/heads/master",
"committer_date": 1691280063000,
"content_id": "bdf3a0838ec942b9966655538a47690e3a5cd91f",
"detected_licenses": [
"MIT"
],
"directory_id": "66265bfa22babb308128fe25ca9734de1885f55b",
"extension": "py",
"fi... | 2.546875 | stackv2 | import text2text as t2t
import numpy as np
import socket
import threading
from flask import Flask, request
app = Flask(__name__)
@app.route("/", methods=['GET', 'POST'])
def hello():
return {"result": "Hello, this Text2Text at your service."}
@app.route('/Indexer/<action>', methods=['POST'])
def indexer(action):
... | 47 | 31.55 | 76 | 16 | 373 | python | [{"finding_id": "codeql_py/stack-trace-exposure_635669d1904001be_21124820", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-079"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
27,
41,
28
] | [
null,
null,
null
] | [
12,
12,
10
] | [
30,
30,
51
] | |
2024-11-19T02:46:08.369503+00:00 | 1,560,946,716,000 | 5c2a21d109e4dc324e62bb960a5641220de4e7f5 | 3 | {
"blob_id": "5c2a21d109e4dc324e62bb960a5641220de4e7f5",
"branch_name": "refs/heads/master",
"committer_date": 1560946716000,
"content_id": "51394e18f4f36f9d572352dda8c9e038525e73f2",
"detected_licenses": [
"MIT"
],
"directory_id": "c4eed0aed2d425be16cbdf2530e4d379a07a0bb6",
"extension": "py",
"fi... | 2.921875 | stackv2 | import argparse
import json
import math
from functools import lru_cache
from urllib.parse import urlencode
from urllib.request import urlopen
class AirportService:
def __init__(self, longitude, latitude):
self.location = MapCoordinate(longitude, latitude)
def get_nearest_airports_in_radius(self, rad... | 135 | 38.97 | 119 | 17 | 1,199 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_be10785823f928f0_f8d37946", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text."
] | [
125
] | [
126
] | [
11
] | [
58
] | |
2024-11-19T02:46:17.434430+00:00 | 1,591,629,585,000 | 2cce1bbc8fc032e2437d38653ca2c704c3d0b43c | 3 | {
"blob_id": "2cce1bbc8fc032e2437d38653ca2c704c3d0b43c",
"branch_name": "refs/heads/master",
"committer_date": 1591629585000,
"content_id": "c7f0e1b4357ef8f26465784378ce3b0638622786",
"detected_licenses": [
"MIT"
],
"directory_id": "9613e620edca9b1fbf95176b99823c5efd8eeca0",
"extension": "py",
"fi... | 3.234375 | stackv2 | # --------------
#Header files
import pandas as pd
import numpy as np
import matplotlib.pyplot as plt
#path of the data file- path
data = pd.read_csv(path)
data['Gender'].replace('Agender','-',inplace=True)
gender_count = data.Gender.value_counts()
print(gender_count)
#print(gender_count.value())
plt.bar(gender_count... | 59 | 22.8 | 55 | 9 | 371 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e2012ecac8f03e09_de167751", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
12
] | [
null
] | [
7
] | [
19
] | |
2024-11-19T02:46:21.973191+00:00 | 1,615,770,945,000 | 784ce8737d49ea0b70965c3622a44e7b1b0e606d | 3 | {
"blob_id": "784ce8737d49ea0b70965c3622a44e7b1b0e606d",
"branch_name": "refs/heads/main",
"committer_date": 1615770945000,
"content_id": "e51fd6d924a1f3ab13f9d7d32adc569719674054",
"detected_licenses": [
"MIT"
],
"directory_id": "259599777731d3da82147fee63a45f7ae1a856c8",
"extension": "py",
"file... | 3.140625 | stackv2 | entirety = False
GenderList = {}
ReligionsList = {}
PoliticalPartiesList = {}
AgesList = {}
JobsList = {}
runs = 0
def i(j):
global runs
runs +=1
if runs%5 == 0:
print("Data so far")
try:
print(Percentage)
print(GenderList)
print(ReligionsList)
... | 73 | 33.63 | 141 | 13 | 633 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_014f8dfbf2d94d0b_7a4a2965", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
16,
73
] | [
null,
null
] | [
19,
34
] | [
29,
54
] | |
2024-11-19T02:59:16.104189+00:00 | 1,485,876,871,000 | 23b5aa6a4ee863c6903377d076c71faf0ccc2147 | 3 | {
"blob_id": "23b5aa6a4ee863c6903377d076c71faf0ccc2147",
"branch_name": "refs/heads/master",
"committer_date": 1485876871000,
"content_id": "7c48b6f6cfc168ff9304346cb8b30849d8ef83e2",
"detected_licenses": [
"MIT"
],
"directory_id": "b0f6410c2b8c8d8e6fc186e686fcede14de14703",
"extension": "py",
"fi... | 2.546875 | stackv2 | """ -*- coding: utf-8 -*- """
from pprint import pprint
from python2awscli import bin_aws
from python2awscli import must
class BaseRDS(object):
def __init__(self, name, region, engine, size, username, password, gb, zone, groups, public=True):
self.id = None # DbiResourceId
self.name = name # DB... | 60 | 38.6 | 102 | 13 | 519 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_818449454da7f20c_c9c3da93", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
59
] | [
null
] | [
15
] | [
44
] | |
2024-11-19T02:59:46.678735+00:00 | 1,666,803,535,000 | fa333c86290bb5c9c21062d64d206197f5469670 | 2 | {
"blob_id": "fa333c86290bb5c9c21062d64d206197f5469670",
"branch_name": "refs/heads/master",
"committer_date": 1666803535000,
"content_id": "9d57417b7a923f06622f53be8b340589816070c4",
"detected_licenses": [
"MIT"
],
"directory_id": "e5bf3b41c8634e9e9d3952a17bb66dc3625e956c",
"extension": "py",
"fi... | 2.3125 | stackv2 | import urllib2, sys, re
from bs4 import BeautifulSoup
text = ''.join((x for x in open("provider.coffee")))
urls = set(re.findall("""['"](https://api.tabletopsimulator.com/[^'"]*)['"]""", text))
if False: #this used to transpose urls
urls = set(re.findall("""['"](http://berserk-games.com/[^'"]*)['"]""", text))
... | 77 | 29.36 | 103 | 17 | 582 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_7aab1a39ac08861d_3af6301b", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'tabletopsimulator.com/', so it migh... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'tabletopsimulator.com/', so it might match more hosts than expected."
] | [
5
] | [
null
] | [
31
] | [
71
] | |
2024-11-19T02:59:52.827149+00:00 | 1,557,223,405,000 | 91d13e0d1a65b518ed642073214da9a9ff339e9d | 2 | {
"blob_id": "91d13e0d1a65b518ed642073214da9a9ff339e9d",
"branch_name": "refs/heads/master",
"committer_date": 1557223405000,
"content_id": "b7ac22a972d213df613e890c756244d7b23f8b46",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7daa78561e9d69e88ba1e0509ecdf35ea8dc2638",
"extension": "py"... | 2.328125 | stackv2 | # -*- coding: utf-8 -*-
#
# Copyright 2017 Ricequant, Inc
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable ... | 95 | 36.89 | 109 | 20 | 836 | python | [{"finding_id": "codeql_py/tarslip_a3bf725815b21650_63b476bd", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
92
] | [
null
] | [
5
] | [
8
] | |
2024-11-19T02:59:57.975551+00:00 | 1,693,739,470,000 | cc6ce5464f165a4e9b2d089d1391c25b06110da1 | 3 | {
"blob_id": "cc6ce5464f165a4e9b2d089d1391c25b06110da1",
"branch_name": "refs/heads/main",
"committer_date": 1693739478000,
"content_id": "a7a96ec9223a9bd3df2d6f0a828703b46bfaf0cd",
"detected_licenses": [
"MIT"
],
"directory_id": "72f37781f43fe688ee6560c6531f0cd90e3dbc93",
"extension": "py",
"file... | 2.671875 | stackv2 | import os
import sys
sys.path.append(os.path.realpath("."))
import inquirer # noqa
text = inquirer.text(message="Enter your username")
print(text)
password = (inquirer.password(message="Please enter your password"),)
print(password)
checkbox = inquirer.checkbox(message="Please define your type of project?", choice... | 20 | 29.6 | 118 | 9 | 133 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0f691e1bc9f91d69_684ea741", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
12
] | [
null
] | [
7
] | [
15
] | |
2024-11-19T02:59:59.429410+00:00 | 1,556,652,329,000 | f6610ec125362b115a1034fd008fef158459e9f5 | 2 | {
"blob_id": "f6610ec125362b115a1034fd008fef158459e9f5",
"branch_name": "refs/heads/master",
"committer_date": 1556652329000,
"content_id": "86b6e64b355eab05c29cf7537dc96b1c4af8a26d",
"detected_licenses": [
"MIT"
],
"directory_id": "e0669caf276c10ce2f92f69742e4c3b16f5a4dce",
"extension": "py",
"fi... | 2.40625 | stackv2 | from todolist import app
from flask import session, request, render_template, redirect,url_for
import datetime,time,uuid,hashlib
from todolist.connection import Connection
from todolist.session import mySession
sqlCon = Connection()
mySession = mySession()
@app.before_request
def make_session_permanent():
session... | 106 | 28.37 | 111 | 17 | 673 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_4a87a894755ecf7c_f8eb8c1d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computational... | [
37,
61
] | [
null,
null
] | [
13,
13
] | [
53,
53
] | |
2024-11-19T03:12:16.830657+00:00 | 1,544,413,377,000 | 51ca4f32c74f76267affc1bff4a7273ccd842f01 | 3 | {
"blob_id": "51ca4f32c74f76267affc1bff4a7273ccd842f01",
"branch_name": "refs/heads/master",
"committer_date": 1544413377000,
"content_id": "7ebd07acc3147af6f55f7b9cbf3839d0a12f7b4e",
"detected_licenses": [
"MIT"
],
"directory_id": "d0c67273eff0f64a89c36b8980fd897e6b438e29",
"extension": "py",
"fi... | 2.703125 | stackv2 | import sys
import numpy as np
from PIL import Image
import torch
import torch.nn as nn
import torch.nn.functional as F
from train import Network
from torch.autograd import Variable
from torchvision import transforms, utils
import cv2
from train import Network
GENDER_MODEL_PATH = "./gender_est_model.pt"
RACE_MODEL_P... | 77 | 30.51 | 125 | 13 | 649 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_91f90ab5eaa482ac_208cc912", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
26,
28
] | [
null,
null
] | [
11,
11
] | [
27,
27
] | |
2024-11-19T03:24:51.660278+00:00 | 1,558,372,548,000 | 2e6eb84c5726b384276a4bbf3176c87b01a571df | 4 | {
"blob_id": "2e6eb84c5726b384276a4bbf3176c87b01a571df",
"branch_name": "refs/heads/master",
"committer_date": 1558372548000,
"content_id": "0beb2e5d1c6691b977643880569296ac1495c958",
"detected_licenses": [
"MIT"
],
"directory_id": "73cd7ebe847adf267a3f9d9a5176d1421e1e93b3",
"extension": "py",
"fi... | 3.921875 | stackv2 | '''
Created on Aug 6, 2018
@author: david avalos
'''
#import abstract library
from abc import abstractmethod, ABC
class Employee(ABC):
def __init__(self, name, salary):
self.name = name
self.salary = salary
print("Employee", self.name, "created with salary of",self.salary)
@a... | 53 | 18.02 | 74 | 10 | 228 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_76a62ce73554a45e_d6379f08", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
14
] | [
null
] | [
63
] | [
74
] | |
2024-11-19T03:24:53.717185+00:00 | 1,692,107,468,000 | ee284899a172a7c1052528aeeb2fd615568cf302 | 2 | {
"blob_id": "ee284899a172a7c1052528aeeb2fd615568cf302",
"branch_name": "refs/heads/master",
"committer_date": 1692107468000,
"content_id": "5fe779edeb706e13e4dec281ec95b79dac1ac836",
"detected_licenses": [
"MIT"
],
"directory_id": "8454441f899c3beb9fcea26cffc2f4c3cf75ff6a",
"extension": "py",
"fi... | 2.3125 | stackv2 | import paramiko
import datetime
import subprocess # run it locally if you want, use this for Bash commands
def run_netflow_cmd(command):
rwflow_server_ip = "1.2.3.4" # SiLK box
user_name="netflow"
keyfile="/home/marius/.ssh/id_rsa"
ssh = paramiko.SSHClient()
ssh.set_missing_host_key_policy(par... | 26 | 31.81 | 81 | 13 | 203 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_0da05d3b9dbb7e0e_8bf9788c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
11
] | [
null
] | [
5
] | [
62
] | |
2024-11-19T03:35:16.482770+00:00 | 1,479,106,070,000 | faaad29d64cd3d9c5d504e01928e8565ce1922a5 | 3 | {
"blob_id": "faaad29d64cd3d9c5d504e01928e8565ce1922a5",
"branch_name": "refs/heads/master",
"committer_date": 1479106070000,
"content_id": "ec9b711e816a3982c19cf621c5cb272a7cfbcc71",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fc750d8824d4d2c271173c105f1212a336b10896",
"extension": "py"... | 2.53125 | stackv2 | #!/usr/bin/python
#-*- encoding:utf-8-*-
try:
from bs4 import BeautifulSoup as BS
except ImportError:
raise RuntimeError('bs4 is required, May use pip install it.')
import os
import sys
import re
import shutil
import threading
import time
import urllib2
#储存路径
DIR = "./userImgs"
#下载图片全局变量,dict[filename] ... | 183 | 25.92 | 151 | 18 | 1,489 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_75f4a488e8c9c58e_f277fbef", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'doubanio.com/icon/u', so it might m... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'doubanio.com/icon/u', so it might match more hosts than expected."
] | [
77
] | [
null
] | [
25
] | [
66
] | |
2024-11-19T01:27:01.904876+00:00 | 1,516,224,837,000 | 0a78324dc5686050ef4db0ed8bd1f20d4ad0968a | 3 | {
"blob_id": "0a78324dc5686050ef4db0ed8bd1f20d4ad0968a",
"branch_name": "refs/heads/master",
"committer_date": 1516224837000,
"content_id": "9e73322360525a391dd78bb656c350bb50eeecf3",
"detected_licenses": [
"MIT"
],
"directory_id": "f6ab8ac78d54a7cee4253a17ad92595bce3c54af",
"extension": "py",
"fi... | 3.015625 | stackv2 | """
module containing functions to parse and order ipvX to a country
"""
import os
import random
import ipaddress
import lzma
import zipfile
import tarfile
import GeoIP as gi
def extract_file(args):
"""
decompresses a file
:param args: file obj
:return: None
"""
input_file = args['filename']
... | 148 | 27.29 | 93 | 22 | 1,042 | python | [{"finding_id": "codeql_py/tarslip_3104174b95e9aa7c_3608e150", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/tarslip",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
34,
37
] | [
null,
null
] | [
13,
13
] | [
14,
14
] | |
2024-11-19T01:38:33.169702+00:00 | 1,521,092,175,000 | c59b3f381a8eba6dfbc601ff0fa5a60162ca1f30 | 2 | {
"blob_id": "c59b3f381a8eba6dfbc601ff0fa5a60162ca1f30",
"branch_name": "refs/heads/master",
"committer_date": 1521092175000,
"content_id": "8360a910a3f494030380a4342d9254e6b7c95c22",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "69fa0436ce6b5d3eb3a17e18ac456813da3158ce",
"extension": "p... | 2.40625 | stackv2 | from flask import Flask, jsonify, request, abort
import train
import solve
import threading
import json
import requests
app = Flask(__name__)
@app.route('/')
def hello_world():
return 'Hello World!'
@app.route('/train', methods=['POST'])
def post_train():
if not request.json or 'id' not in request.json or ... | 75 | 22.33 | 82 | 12 | 482 | python | [{"finding_id": "codeql_py/code-injection_bb027c087a4f9389_febae61e", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 2 | true | [
"CWE-094",
"CWE-094"
] | [
"py/code-injection",
"py/code-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1).",
"This code execution depends on a [user-provided value](1)."
] | [
23,
44
] | [
null,
null
] | [
21,
21
] | [
45,
45
] | |
2024-11-19T01:38:39.045501+00:00 | 1,476,471,924,000 | 2c6b783342a822d4db463852a0678517f1539bbe | 2 | {
"blob_id": "2c6b783342a822d4db463852a0678517f1539bbe",
"branch_name": "refs/heads/master",
"committer_date": 1476472766000,
"content_id": "a295f7aa90763a23bbb8d451d50be24ed933c2ed",
"detected_licenses": [
"MIT"
],
"directory_id": "bc1497ddd58503c9c33cce838911d88b73a078a8",
"extension": "py",
"fi... | 2.359375 | stackv2 | # -*- coding: utf-8 -*-
"""
onboarder
~~~~~~~~
app.views (app)
"""
import os, json
from os.path import abspath
import argparse
from datetime import datetime
import tornado.ioloop
import tornado.web
import numpy as np
from sqlalchemy import create_engine
from sqlalchemy.orm import sessionmaker
from indis... | 162 | 36.83 | 153 | 19 | 1,333 | python | [{"finding_id": "codeql_py/stack-trace-exposure_a26614062f99059f_3ca6c67b", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
58,
61,
94,
98
] | [
null,
63,
null,
100
] | [
24,
24,
24,
24
] | [
53,
15,
53,
15
] | |
2024-11-19T01:51:54.164748+00:00 | 1,621,902,996,000 | 8c6f6b9c7c728927b0db0966555805adc0bd7f93 | 3 | {
"blob_id": "8c6f6b9c7c728927b0db0966555805adc0bd7f93",
"branch_name": "refs/heads/master",
"committer_date": 1621902996000,
"content_id": "231766d89baeef3999e647ce60317eea04fdfae1",
"detected_licenses": [
"MIT"
],
"directory_id": "c4f3944d86f9cca33f8b5c2230e3273cbd44b70e",
"extension": "py",
"fi... | 2.59375 | stackv2 | import socketserver
import http.server
import logging
import cgi
from selenium import webdriver
PORT = 80
driver = webdriver.Chrome("chromedriver.exe")
class ServerHandler(http.server.SimpleHTTPRequestHandler):
def do_GET(self):
logging.error(self.headers)
http.server.SimpleHTTPRequestHandler.do_G... | 68 | 30.85 | 113 | 22 | 471 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_06f8b8c2b97c0bfc_d039372c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-117",
"CWE-117"
] | [
"py/clear-text-logging-sensitive-data",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
38,
12,
16
] | [
null,
null,
null
] | [
49,
23,
23
] | [
55,
35,
35
] | |
2024-11-19T01:52:28.953847+00:00 | 1,517,849,199,000 | 3de3e59ee6cf9367d8934fffa08878d324a6662a | 3 | {
"blob_id": "3de3e59ee6cf9367d8934fffa08878d324a6662a",
"branch_name": "refs/heads/master",
"committer_date": 1517849199000,
"content_id": "7d526725e2e2a8580afb18b130e2ece11a5f3333",
"detected_licenses": [
"MIT"
],
"directory_id": "754d29c13eedd66cbb4c3e04246de5561ae9012d",
"extension": "py",
"fi... | 2.9375 | stackv2 | import requests
from flask import Flask, render_template, request
from textteaser import TextTeaser
from bs4 import BeautifulSoup
from readability import Document
app = Flask(__name__)
def summarize_url(url, arc90=False):
# arc90 helps us get the content of the article without the comments and shit
# used in Saf... | 66 | 28.06 | 102 | 13 | 510 | python | [{"finding_id": "codeql_py/full-ssrf_3a0d6f4b91bb2952_0e2b4a6a", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
22
] | [
null
] | [
7
] | [
24
] | |
2024-11-19T01:52:29.567040+00:00 | 1,523,362,344,000 | dce88c58a8449c212b320f568137cccb46605f42 | 2 | {
"blob_id": "dce88c58a8449c212b320f568137cccb46605f42",
"branch_name": "refs/heads/master",
"committer_date": 1523362344000,
"content_id": "f8e9e6dded2335c7db21bbdbea5d6aa77f3368f7",
"detected_licenses": [
"MIT"
],
"directory_id": "d5bedf2ab61a06497ffe27c166882239b6b38828",
"extension": "py",
"fi... | 2.40625 | stackv2 | import sys
import os
import datetime
from services import *
from geopy.geocoders import Nominatim
from terminaltables import AsciiTable
sys.path.insert(0, os.path.abspath('..'))
from clint.arguments import Args
from clint.textui import puts, colored, indent, prompt, validators
d_format ='%Y-%m-%d %H:%M:%S'
class ... | 104 | 43.79 | 146 | 29 | 960 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9329e80ce3fbc9b3_d103e232", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
81
] | [
null
] | [
31
] | [
105
] | |
2024-11-19T02:04:19.026203+00:00 | 1,563,371,647,000 | 04eacec34a5d7bbbafa69836e17ecc8f13c1b635 | 2 | {
"blob_id": "04eacec34a5d7bbbafa69836e17ecc8f13c1b635",
"branch_name": "refs/heads/master",
"committer_date": 1563371647000,
"content_id": "61f3a6c7d196c38112c7565eea315db0ab9a91b0",
"detected_licenses": [
"MIT"
],
"directory_id": "3725249ab7f1333e91e5b8b678d936dc516f68ea",
"extension": "py",
"fi... | 2.359375 | stackv2 | import os
import json
import shutil
from jinja2 import Environment, FileSystemLoader
curDir = os.path.abspath(os.path.dirname(__file__))
def makeDocs(ctx, dstDir):
jinjaEnv = Environment(
loader=FileSystemLoader(os.path.join(curDir, "templates")),
trim_blocks=True,
lstrip_blocks=True,
... | 44 | 37.14 | 114 | 16 | 403 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c80e7f867366246e_9f0fb88e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
9
] | [
14
] | [
16
] | [
6
] | |
2024-11-19T02:04:25.306258+00:00 | 1,650,875,990,000 | dc008d3b182eb0160a41b151238a7558e78dc202 | 3 | {
"blob_id": "dc008d3b182eb0160a41b151238a7558e78dc202",
"branch_name": "refs/heads/master",
"committer_date": 1650875990000,
"content_id": "d290a969195891acc1e9f8d3aea5cfda4b1405ed",
"detected_licenses": [
"BSD-2-Clause-Views",
"BSD-2-Clause"
],
"directory_id": "2b5cf299bc4cd2d07b30656ebf1b26a4b3... | 2.8125 | stackv2 | """Export training center XML file (TCX)."""
import numpy as np
import jinja2
from datetime import datetime
class TcxExport:
"""Export training center XML file (TCX)."""
def __init__(self):
pass
def dumps(self, activity):
env = jinja2.Environment(
loader=jinja2.PackageLoader("... | 35 | 26.43 | 64 | 14 | 251 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_46f23cbb434e7988_61b413dd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
14
] | [
15
] | [
65
] | |
2024-11-19T02:28:15.604655+00:00 | 1,437,687,856,000 | a2fa21786ab80141ccccfee7cc62da19669d73eb | 3 | {
"blob_id": "a2fa21786ab80141ccccfee7cc62da19669d73eb",
"branch_name": "refs/heads/master",
"committer_date": 1437687856000,
"content_id": "497725ac50f7c4e8868d0ff1bf55671f1a70d7f2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "40b9e20473c3fc91b2817a06822990641e52d5de",
"extension": "py"... | 2.53125 | stackv2 | """`main` is the top level module for your Flask application."""
# Import the Flask Framework
from flask import Flask
from flask import request
from slacker import Slacker
import json
import datetime
from secret_keys import SLACK_API_TOKEN, HEADLINE_TOKEN, HEADLINE_CHANNEL
app = Flask(__name__)
slack = Slacker(SLACK_... | 62 | 38.6 | 156 | 15 | 626 | python | [{"finding_id": "codeql_py/reflective-xss_b5b4d08c6fcb49f9_bce5063a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
21,
23
] | [
null,
null
] | [
16,
16
] | [
77,
101
] | |
2024-11-19T02:28:20.828782+00:00 | 1,565,799,624,000 | f1972d93ffb5dad29434f57a4eeec5a01ba8bf48 | 2 | {
"blob_id": "f1972d93ffb5dad29434f57a4eeec5a01ba8bf48",
"branch_name": "refs/heads/master",
"committer_date": 1565799624000,
"content_id": "0dfc8712f721aaac783029033809421723079102",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0c930f21df721affa68a217073ec2bfc3d6a38f4",
"extension": "py"... | 2.34375 | stackv2 | import pickle
import logging
import hashlib
import numpy as np
import os
from pathlib import Path
import spacy
import shutil
import sys
import tarfile
import tempfile
import torch
from typing import Dict, List
sys.path.append("nbsvm")
from nltk import word_tokenize
from nltk.stem import WordNetLemmatizer
from nltk.ste... | 236 | 34.04 | 107 | 16 | 1,996 | python | [{"finding_id": "codeql_py/log-injection_23f26014c5b2ce59_75d51b68", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-022"
] | [
"py/log-injection",
"py/log-injection",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
200,
207,
104
] | [
null,
null,
null
] | [
21,
21,
13
] | [
40,
48,
21
] | |
2024-11-19T02:28:27.323442+00:00 | 1,565,234,090,000 | f60e2409ed46ffe10198c71d3518d362823d9266 | 3 | {
"blob_id": "f60e2409ed46ffe10198c71d3518d362823d9266",
"branch_name": "refs/heads/master",
"committer_date": 1565234090000,
"content_id": "37dca5f26c9df30d6ec6ba530a652e8cfd014c2c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b78f1dc27dd140aaef6f89747779a2e2e7427d5d",
"extension": "py"... | 2.640625 | stackv2 | from bs4 import BeautifulSoup
import csv
from unidecode import unidecode
from activityAnalysis import *
import requests
def write_activity_to_csv(dic):
for title in dic:
if title.lower() == 'youtube':
write_youtube(dic)
elif title.lower() == 'search':
write_search(dic)
... | 459 | 34.64 | 161 | 26 | 3,456 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c0c4838bfd769561_571d8e28", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [news.google.com](1) may be at an arbitrary position in... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [news.google.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [www.youtube.com](1) may be at an arbitrary position in the sanitized URL."
] | [
362,
362
] | [
null,
null
] | [
44,
79
] | [
75,
110
] | |
2024-11-19T02:28:53.371210+00:00 | 1,684,830,589,000 | 62cc2196e6f868dd6d051255b8d60096aaa4fec3 | 3 | {
"blob_id": "62cc2196e6f868dd6d051255b8d60096aaa4fec3",
"branch_name": "refs/heads/master",
"committer_date": 1684830589000,
"content_id": "9e3ec71d21b06a3b2cc2fdbbf7907ed80c870a8e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9b9a146193ac75059a4ea645616e399b5c7518c0",
"extension": "py"... | 3.015625 | stackv2 | """
A Scrapper instance is an entity that collects data from the resources.
"""
import abc
import requests
import gevent
import gevent.monkey
import pymongo
import pymongo.errors
import logging
import urllib3
from requests.exceptions import ConnectionError, Timeout, TooManyRedirects
from textblob import TextBlob
from s... | 215 | 37.85 | 146 | 22 | 1,727 | python | [{"finding_id": "codeql_py/request-without-cert-validation_cd6c5275e7f8960c_f90b0147", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
159
] | [
null
] | [
32
] | [
63
] | |
2024-11-19T02:36:44.833567+00:00 | 1,480,959,145,000 | 1b447d1ade2b79cf22c3fc7cdd8d805c6da34e18 | 3 | {
"blob_id": "1b447d1ade2b79cf22c3fc7cdd8d805c6da34e18",
"branch_name": "refs/heads/master",
"committer_date": 1480959145000,
"content_id": "5339ffc32e562e4f6bc6dcb27a99b1c14e193470",
"detected_licenses": [
"MIT"
],
"directory_id": "009de54196cb8c8dc1403287fe2b35a98c2e1c74",
"extension": "py",
"fi... | 2.765625 | stackv2 | from base64 import b64encode, b64decode
from binascii import hexlify
from pathlib import Path
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
from cryptography.hazmat.backends import default_backend
from typing import Sequence
import os
current_dir = str(Path(__file__).parent)
hex_to_byte... | 51 | 27.1 | 76 | 12 | 365 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_d3b5dac4d605efd9_c42f23df", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
34,
42
] | [
null,
null
] | [
11,
11
] | [
39,
38
] | |
2024-11-19T02:36:45.531970+00:00 | 1,691,667,291,000 | 55266be94b6ff895621315d4195e5013042907c5 | 2 | {
"blob_id": "55266be94b6ff895621315d4195e5013042907c5",
"branch_name": "refs/heads/master",
"committer_date": 1691667291000,
"content_id": "744b66d8d743243dab41d9d882c50e13c24a566c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5adddcc7d2e86f8e773c2e2ceb0c49d99dd0a23c",
"extension": "py"... | 2.453125 | stackv2 | # Copyright © 2023 Ory Corp
# SPDX-License-Identifier: Apache-2.0
from flask import Flask, request, jsonify
import requests
import os
# load google cloud logging if running on GCP
if os.getenv('ENABLE_CLOUD_LOGGING', ''):
# set up the Google Cloud Logging python client library
import google.cloud.logging
... | 96 | 31.11 | 88 | 17 | 759 | python | [{"finding_id": "codeql_py/stack-trace-exposure_55834e664a357abf_8fb472d0", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 5 | true | [
"CWE-209",
"CWE-312",
"CWE-918",
"CWE-117",
"CWE-117"
] | [
"py/stack-trace-exposure",
"py/clear-text-logging-sensitive-data",
"py/partial-ssrf",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expressio... | [
54,
68,
86,
44,
68
] | [
null,
null,
null,
null,
null
] | [
24,
22,
16,
18,
22
] | [
79,
59,
46,
36,
59
] | |
2024-11-19T02:37:08.151153+00:00 | 1,554,003,541,000 | a9fb357aae7a3085feb923c6e2d9932a0b31568d | 4 | {
"blob_id": "a9fb357aae7a3085feb923c6e2d9932a0b31568d",
"branch_name": "refs/heads/master",
"committer_date": 1554003541000,
"content_id": "8a2a89dfe2b13a762a4b2feacb810cccecc5670b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c9f8da2afef52eca81b75d2ba6028e098a1c25b1",
"extension": "py"... | 3.859375 | stackv2 | '''
https://www.hackerrank.com/challenges/the-birthday-bar/submissions/code/102134070
Function Description
Complete the birthday function in the editor below. It should return an integer denoting the number of ways Lily can divide the chocolate bar.
birthday has the following parameter(s):
s: an array of integers, ... | 79 | 19 | 142 | 16 | 443 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d2d2d7414d8d4afc_feeefc49", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
57
] | [
null
] | [
16
] | [
34
] | |
2024-11-19T02:37:22.834277+00:00 | 1,582,863,713,000 | 4ae233b483192859c331110c6c5626e13b968ec9 | 3 | {
"blob_id": "4ae233b483192859c331110c6c5626e13b968ec9",
"branch_name": "refs/heads/master",
"committer_date": 1582863713000,
"content_id": "7310c31c20c447bd8a6e1902bcd892eb60c77b8e",
"detected_licenses": [
"MIT"
],
"directory_id": "801ccabc3294eba22e1c7296e632e5d3e49a5cfa",
"extension": "py",
"fi... | 2.515625 | stackv2 | from flask import Flask, render_template
from flask import jsonify
from flask import request
from SentimentNet import SentimentAnalyzer
SN = SentimentAnalyzer(cuda=False)
app = Flask(__name__)
@app.route("/sentiment", methods=['GET','POST'])
def sentiment():
if request.method=="GET":
sent = request.args.g... | 23 | 27.22 | 48 | 13 | 159 | python | [{"finding_id": "codeql_py/flask-debug_a139b7a02ef4fba4_0704d96f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
23,
20
] | [
null,
null
] | [
5,
16
] | [
49,
43
] | |
2024-11-19T02:37:38.753823+00:00 | 1,632,563,111,000 | f7a420a00e7468317b87b3b0e9466f06345332b4 | 3 | {
"blob_id": "f7a420a00e7468317b87b3b0e9466f06345332b4",
"branch_name": "refs/heads/master",
"committer_date": 1632563111000,
"content_id": "47fb11c47d69b3cf165c2a5165a2e51618955278",
"detected_licenses": [
"MIT"
],
"directory_id": "0b40a67331654b85a6bdf6c027b387c4f2d3bc4f",
"extension": "py",
"fi... | 2.703125 | stackv2 | import os
import glob
import datetime
from flask import Flask, render_template, redirect, send_from_directory
from pathlib import Path
from thumbnail import create_thumb
base_path = "/media"
thumb_path = os.path.join(base_path, ".thumb")
Path(thumb_path).mkdir(parents=True, exist_ok=True)
app = Flask(__name__)
def _... | 113 | 29.35 | 88 | 16 | 882 | python | [{"finding_id": "codeql_py/reflective-xss_65f3c2c6876e78ea_11b16460", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-022"
] | [
"py/reflective-xss",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
92,
97
] | [
null,
null
] | [
12,
15
] | [
51,
17
] | |
2024-11-19T02:49:20.664197+00:00 | 1,547,708,953,000 | f08e927b729837427958a068b71925f8dc98556e | 2 | {
"blob_id": "f08e927b729837427958a068b71925f8dc98556e",
"branch_name": "refs/heads/master",
"committer_date": 1547708953000,
"content_id": "7004d83b1155b054c903641e97cd95bc67ca610e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9bae0ecb6846cf85e5fa561c4fd829cf0c97904a",
"extension": "py"... | 2.359375 | stackv2 | #-*- coding:utf-8 -*-
#from googletrans import Translator
import os
import _thread
import shutil
import http.client
import hashlib
import urllib
import urllib.request
import random
import json
import multiprocessing
import sys
typ = sys.getfilesystemencoding()
# reload(sys)
# sys.setdefaultencoding( "utf-8" )
#
# tr... | 178 | 31.6 | 153 | 21 | 1,434 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_25b1bd2f1e320119_96c42320", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
41
] | [
null
] | [
15
] | [
44
] | |
2024-11-19T02:49:21.512560+00:00 | 1,615,217,680,000 | 1d4f184d4309bcbe2cbdaa81eb3b23cf0264dd13 | 3 | {
"blob_id": "1d4f184d4309bcbe2cbdaa81eb3b23cf0264dd13",
"branch_name": "refs/heads/main",
"committer_date": 1615217680000,
"content_id": "36ff9491ce6f0d4be07656205f1d2cab4d5a9f30",
"detected_licenses": [
"MIT"
],
"directory_id": "d77104b7bf6c1f955710cd432d1c3f3088763180",
"extension": "py",
"file... | 2.609375 | stackv2 | import tkinter as tk
from tkinter import Message, ttk
import json
import hashlib
import datetime
import random
from tkinter import messagebox
from tkinter.font import names
def now():
dt = datetime.datetime.now()
return dt.strftime("%Y-%m-%d %H:%M:%S")
def sha(password):
hash = hashlib.sha1(password.enc... | 244 | 40 | 120 | 18 | 2,645 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_3ce0f9ae495c7cda_d2b5084b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
17
] | [
null
] | [
25
] | [
49
] | |
2024-11-19T03:00:22.914759+00:00 | 1,693,585,381,000 | 3e3a1eb075d45db485f8e164e22aada96a5207a3 | 3 | {
"blob_id": "3e3a1eb075d45db485f8e164e22aada96a5207a3",
"branch_name": "refs/heads/main",
"committer_date": 1693585381000,
"content_id": "491d6d7066b2866874df467daaea3ea94bb29f1c",
"detected_licenses": [
"Apache-2.0",
"MIT"
],
"directory_id": "d51f530078404a24f1844b53b037bbfed238a784",
"extensi... | 2.625 | stackv2 | # Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
# SPDX-License-Identifier: Apache-2.0
"""
Purpose
Shows how to implement an AWS Lambda function that uses AWS IoT Greengrass Core SDK
to get a secret.
"""
# snippet-start:[greengrass.python.secret-resource-access.complete]
import greengrasssdk
sec... | 31 | 33.71 | 87 | 10 | 248 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fc2b6f0659a2bec6_c32f75c5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
30
] | [
null
] | [
11
] | [
34
] | |
2024-11-19T03:00:25.423787+00:00 | 1,547,730,615,000 | 4a6fe359f89700c8253ab9173e79d67ed31cf68e | 3 | {
"blob_id": "4a6fe359f89700c8253ab9173e79d67ed31cf68e",
"branch_name": "refs/heads/master",
"committer_date": 1547730615000,
"content_id": "0ad3fd00ea9e078218b0e8b4dbef307b5c9fa0ba",
"detected_licenses": [
"MIT"
],
"directory_id": "bd4a20f6f24d1797acc85050a41f29ea337ea500",
"extension": "py",
"fi... | 2.734375 | stackv2 | # -*- coding: utf-8 -*-
"""
A routing layer for the RDocumentation bot, heavily inspired by the Python
[onboarding bot tutorial](https://github.com/slackapi/Slack-Python-Onboarding-Tutorial)
"""
import json
import bot
import re
from flask import Flask, request, make_response, render_template
import sys
pyBot = bot.Bot... | 129 | 39.75 | 95 | 24 | 1,108 | python | [{"finding_id": "codeql_py/flask-debug_9a3803d9b908d6b9_4a5af538", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a ... | [
129,
67,
106,
116
] | [
null,
null,
null,
null
] | [
5,
26,
30,
23
] | [
24,
33,
54,
30
] | |
2024-11-19T03:11:21.296862+00:00 | 1,539,161,942,000 | d865bd2a782c51f4e8c89c10acf09e79ab47edbd | 3 | {
"blob_id": "d865bd2a782c51f4e8c89c10acf09e79ab47edbd",
"branch_name": "refs/heads/master",
"committer_date": 1539161942000,
"content_id": "3c5785371e439e22ac8e0f5da635fd270704c6fa",
"detected_licenses": [
"MIT"
],
"directory_id": "be458fdbec0c36f91de7c0aa4c1f7e80dcc27f28",
"extension": "py",
"fi... | 2.515625 | stackv2 | import os
from yaml import load
from jinja2 import Template
from napalm_base import get_network_driver
from pprint import pprint
inventory_f=open('python_inventory.yml', 'r')
inventory_s=inventory_f.read()
inventory_f.close()
python_inventory=load(inventory_s)
f=open('validate.j2')
s=f.read()
f.close()
validate_templ... | 118 | 31.69 | 151 | 14 | 855 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_039e2a8c0d3edd58_7fbe93a2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
15
] | [
null
] | [
19
] | [
30
] | |
2024-11-19T03:11:32.334885+00:00 | 1,490,938,492,000 | e3c532bdd95de5eb3553b9f06ec3a28fee48a477 | 2 | {
"blob_id": "e3c532bdd95de5eb3553b9f06ec3a28fee48a477",
"branch_name": "refs/heads/master",
"committer_date": 1490938492000,
"content_id": "b1a31e04d47f6d68b068910c2a1aab377ea81915",
"detected_licenses": [
"MIT"
],
"directory_id": "3f10e950e89411a0ba1379d29a8853c54b15883f",
"extension": "py",
"fi... | 2.375 | stackv2 | # Copyright (c) Microsoft. All rights reserved. Licensed under the MIT license.
# See LICENSE in the project root for license information.
import requests
import uuid
import json
from connect.data import get_email_text
from collections import Counter
from collections import OrderedDict
from flask import request
# The... | 207 | 31.59 | 115 | 18 | 1,573 | python | [{"finding_id": "codeql_py/request-without-cert-validation_89df4d184f6a55ca_a238ba44", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
43,
102,
140,
201
] | [
null,
null,
null,
null
] | [
16,
16,
16,
16
] | [
83,
114,
113,
116
] | |
2024-11-19T03:12:13.678665+00:00 | 1,552,304,249,000 | cfacb6223a40abe48d2b1c7fb43e0b89d12c01a0 | 2 | {
"blob_id": "cfacb6223a40abe48d2b1c7fb43e0b89d12c01a0",
"branch_name": "refs/heads/master",
"committer_date": 1552304249000,
"content_id": "fd27df6be15a72f7c5544a7e4aff906e644c7d93",
"detected_licenses": [
"MIT"
],
"directory_id": "872f3d0a47f8a63f620e41a9da82820e451e4c51",
"extension": "py",
"fi... | 2.5 | stackv2 | import os
import shutil
import stat
from abc import abstractmethod
from tempfile import TemporaryDirectory
import click
from git import Git, Repo
from jinja2 import Template
class BaseCommand:
@abstractmethod
def run(self):
pass
class InitprojectCommand(BaseCommand):
PROJECT_KEY_NAME = 'projec... | 79 | 39.44 | 99 | 19 | 622 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_042a88fb3cbf267e_286667ee", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
54
] | [
null
] | [
28
] | [
45
] | |
2024-11-19T03:12:16.414649+00:00 | 1,587,904,803,000 | eba897e0b236c1cc7c6e6407a50a1616d1c3197f | 3 | {
"blob_id": "eba897e0b236c1cc7c6e6407a50a1616d1c3197f",
"branch_name": "refs/heads/master",
"committer_date": 1587904803000,
"content_id": "557f6b604058fd2c888cbc2fc52a6c55f5ef8f00",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5847263d7fcbe0b76c039be9bbdbae6f55176d81",
"extension": "py"... | 2.734375 | stackv2 | import pickle
import json
from nltk.tokenize import word_tokenize
from nltk.tag import pos_tag
from nltk.stem.wordnet import WordNetLemmatizer
from nltk.corpus import stopwords
import re
import string
import scholarly
SUBJECT_STRING = 'Iran nuclear deal'
def remove_noise(tweet_tokens, stop_words=()):
cleaned_to... | 75 | 31.91 | 122 | 17 | 565 | python | [{"finding_id": "codeql_py/overly-large-range_95e389d9297492d3_58148246", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
18
] | [
null
] | [
55
] | [
59
] | |
2024-11-19T03:12:29.323843+00:00 | 1,570,632,696,000 | 8e5048efc3afe3f6c6ce7bb16768bdbeb7a509f3 | 3 | {
"blob_id": "8e5048efc3afe3f6c6ce7bb16768bdbeb7a509f3",
"branch_name": "refs/heads/master",
"committer_date": 1570632696000,
"content_id": "f58d4af6a53b1c5f7761a8189bf3dba3fec34c8d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "631ff7c9cd31f2ff2ec772ddd5e4c2dbb3982b36",
"extension": "py"... | 2.765625 | stackv2 | # -*- coding: utf-8 -*-
## ---------------------------------------------------------------------------
## Copyright 2019 Dynatrace LLC
##
## Licensed under the Apache License, Version 2.0 (the "License");
## you may not use this file except in compliance with the License.
## You may obtain a copy of the License at
##
#... | 145 | 35.85 | 84 | 15 | 1,180 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6d98785011014749_f471c4bf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
128,
134
] | [
null,
null
] | [
27,
27
] | [
78,
77
] | |
2024-11-19T03:12:41.761495+00:00 | 1,682,077,038,000 | 28da0c960c52b71b45643dbee9a3a1961defcd0b | 3 | {
"blob_id": "28da0c960c52b71b45643dbee9a3a1961defcd0b",
"branch_name": "refs/heads/master",
"committer_date": 1682077038000,
"content_id": "9d90550a400c4c19935208280ed2a05689ce5224",
"detected_licenses": [
"MIT"
],
"directory_id": "7bfbc82845f91a0bf9e56bf4226ea0d445a4e4f8",
"extension": "py",
"fi... | 2.78125 | stackv2 | # -*- coding: utf-8 -*-
"""
@file
@brief Helpers for :epkg:`Flask`.
"""
import ctypes
import traceback
import threading
from flask import Response
def Text2Response(text):
"""
Converts a text into plain text.
@param text text to convert
@return textReponse
"""
retu... | 81 | 27.84 | 104 | 12 | 538 | python | [{"finding_id": "codeql_py/stack-trace-exposure_68651bbff8553f2a_ffc13854", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
19
] | [
null
] | [
21
] | [
25
] | |
2024-11-19T03:12:44.138462+00:00 | 1,429,623,089,000 | 9e7faac8c5b8497420db02922e46bb8b8809b9b0 | 3 | {
"blob_id": "9e7faac8c5b8497420db02922e46bb8b8809b9b0",
"branch_name": "refs/heads/master",
"committer_date": 1429623089000,
"content_id": "7f3679e3d72d8644bd636b2b4aa4df9785fb7fa7",
"detected_licenses": [
"MIT"
],
"directory_id": "03b24442f28fd1ef0e6335038c9cc0736d7500c1",
"extension": "py",
"fi... | 2.578125 | stackv2 | #!/usr/bin/env python
from __future__ import print_function
import sys
import os
import random
import string
from boto.kms.exceptions import NotFoundException
from boto.kms import connect_to_region
from base64 import b64encode
PASSWORD_LENGTH = 128
def main():
if 'KMS_KEY_ID' not in os.environ:
print(... | 50 | 29.7 | 93 | 15 | 361 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b66052d9471067c3_ae9e03a2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
41
] | [
null
] | [
15
] | [
33
] | |
2024-11-19T03:12:47.664085+00:00 | 1,612,185,931,000 | aad99a87f0d4272faa6eae3f5c2964259792f49e | 3 | {
"blob_id": "aad99a87f0d4272faa6eae3f5c2964259792f49e",
"branch_name": "refs/heads/main",
"committer_date": 1612185931000,
"content_id": "8f3559cf5f993208f4ae40e93fdfd7da7ad466b3",
"detected_licenses": [
"MIT"
],
"directory_id": "e3b15840aa0c024c43dec0ebcd23e7440a6aceef",
"extension": "py",
"file... | 2.609375 | stackv2 | import argparse
import re
from pathlib import Path
from typing import Generator
from typing import Optional
from typing import Sequence
from typing import Set
from typing import Tuple
from pre_commit_dbt.utils import add_filenames_args
REGEX_COMMENTS = r"(/\*([^*]|[\r\n]|(\*+([^*/]|[\r\n])))*\*+/|[ \t]*--.*)"
REGEX_S... | 78 | 27.53 | 88 | 14 | 559 | python | [{"finding_id": "codeql_py/redos_2f3c7cd1e779587d_16be4cc2", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '/**' and containing many repetiti... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '/**' and containing many repetitions of '\\n*'.",
"This part of the regular expression may cause exponential backtracking on strings starting with '/*' and containing many repetitions of '\\n'."
] | [
12,
12
] | [
null,
null
] | [
41,
24
] | [
55,
58
] | |
2024-11-19T03:12:55.538183+00:00 | 1,616,228,478,000 | bf901b0561e86e3bc393e862fbf041e195f80adc | 3 | {
"blob_id": "bf901b0561e86e3bc393e862fbf041e195f80adc",
"branch_name": "refs/heads/master",
"committer_date": 1616228478000,
"content_id": "675bfb010e554a5248a7d94601184211a913e37e",
"detected_licenses": [
"MIT"
],
"directory_id": "8bab0bc3808712bac1c1fb5c60543353cdfcd827",
"extension": "py",
"fi... | 2.765625 | stackv2 | """Github OAuth authentication"""
import json
import urllib.request, urllib.parse, urllib.error
import httplib2
import os
from flask import request, \
session as login_session, \
flash, \
redirect, \
url_for
from pemoi import app
from .pmoi_auth... | 96 | 39.92 | 98 | 16 | 919 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7f3a18b631c27372_1b486ae3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
39
] | [
null
] | [
11
] | [
80
] | |
2024-11-19T03:35:47.349008+00:00 | 1,428,447,357,000 | 0b4dddbbf9bc6d69729e9b76f14de0b212fba3ff | 3 | {
"blob_id": "0b4dddbbf9bc6d69729e9b76f14de0b212fba3ff",
"branch_name": "refs/heads/master",
"committer_date": 1428447357000,
"content_id": "aaf31c5f9c356095fc9ffb8dd670204b3642b1fe",
"detected_licenses": [
"MIT"
],
"directory_id": "4855eab2c4c5b832a7e73364026455caaad49e2c",
"extension": "py",
"fi... | 2.921875 | stackv2 | from jinja2 import Environment, FileSystemLoader
from collections import defaultdict
import glob
import os
credits = ""
print "Getting lines..."
with open(os.path.expanduser("~\\Documents\\GitHub\\TheLegendofAdlez\\Credits.txt"), "r") as creditsfile:
credits = creditsfile.read()
lines = []
for line in credits.... | 161 | 29.86 | 171 | 26 | 1,383 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3c38e9d374ddbfe5_ae9cd41e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
115
] | [
null
] | [
7
] | [
56
] | |
2024-11-19T03:36:00.611733+00:00 | 1,565,183,620,000 | 531a57f321c21fff6925022b2290d0e3c0e977d2 | 3 | {
"blob_id": "531a57f321c21fff6925022b2290d0e3c0e977d2",
"branch_name": "refs/heads/master",
"committer_date": 1565183620000,
"content_id": "e11324934bbf09967e1a49322643006a0e997592",
"detected_licenses": [
"MIT"
],
"directory_id": "8fe2af32a03703f10ec12fee1c422814909760e2",
"extension": "py",
"fi... | 2.5625 | stackv2 | import sqlite3
import utils
from flask import Flask
from flask import make_response
app = Flask(__name__)
def return_link(title, pdf_loc):
link_text = "View " + title + " PDF"
print(title)
link_location = "\'http://127.0.0.1:5000/%s\'" % (pdf_loc + title)
link = "<a href=" + link_location + " target... | 103 | 27.95 | 114 | 11 | 930 | python | [{"finding_id": "codeql_py/path-injection_598dde4fc096e961_a2913efa", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
86
] | [
null
] | [
21
] | [
34
] | |
2024-11-19T01:28:58.365378+00:00 | 1,460,139,412,000 | f8afcebcd256e6e4fe81509f0df9410810ca8917 | 2 | {
"blob_id": "f8afcebcd256e6e4fe81509f0df9410810ca8917",
"branch_name": "refs/heads/master",
"committer_date": 1460139412000,
"content_id": "cf26798239fece86ad2ebc2bf7b4d599812c98ed",
"detected_licenses": [
"BSD-3-Clause",
"BSD-2-Clause-Views",
"BSD-2-Clause",
"MIT"
],
"directory_id": "761... | 2.359375 | stackv2 | # -*- coding: utf-8 -*-
"""
:mod:`h.buildext` is a utility to build the Hypothesis browser extensions. It
is exposed as the command-line utility hypothesis-buildext.
"""
from __future__ import print_function
import argparse
import codecs
import json
import logging
import os
import os.path
import shutil
import sys
fr... | 273 | 31.44 | 86 | 14 | 1,959 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_019533dc33c3e0cd_84f3f50c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25
] | [
null
] | [
13
] | [
63
] | |
2024-11-19T01:29:20.788910+00:00 | 1,591,456,474,000 | 2e17cce315eae0be2f8440db6bc22650f890ad46 | 3 | {
"blob_id": "2e17cce315eae0be2f8440db6bc22650f890ad46",
"branch_name": "refs/heads/master",
"committer_date": 1591456474000,
"content_id": "2a96db140b67c0258e86b451c8cc95c1104dbeaf",
"detected_licenses": [
"MIT"
],
"directory_id": "5516d8f8864e7bccb0ddd67bc40dcdc96c864f71",
"extension": "py",
"fi... | 2.640625 | stackv2 | from flask import Blueprint, render_template, redirect, url_for, request, flash
#import rabbitmq
auth = Blueprint('auth', __name__)
from flask_login import login_user, logout_user, login_required
from werkzeug.security import generate_password_hash, check_password_hash
from flask import render_template, flash, redirect... | 88 | 31.55 | 108 | 13 | 683 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_21ca0864ad15e965_11e65bad", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp... | [
27,
61
] | [
null,
null
] | [
29,
29
] | [
46,
46
] | |
2024-11-19T01:29:26.990919+00:00 | 1,501,176,654,000 | cc5b123aa7cfc37c0af9fb7ef5f664695d3174ba | 3 | {
"blob_id": "cc5b123aa7cfc37c0af9fb7ef5f664695d3174ba",
"branch_name": "refs/heads/master",
"committer_date": 1501176654000,
"content_id": "68e8b4e50a754e5b6d8dc7667c56d9db88e57b0b",
"detected_licenses": [
"MIT"
],
"directory_id": "0c6b7c6634c8ba94348a464b273105c23c942c6d",
"extension": "py",
"fi... | 2.65625 | stackv2 | # -*- coding: utf-8 -*-
import hashlib
import logging
import xml.etree.cElementTree as ET
ACCOUNT_FILE = 'storj_account_conf.xml'
class AccountManager:
__logger = logging.getLogger('%s.AccountManager' % __name__)
def __init__(self, login_email=None, password=None):
self.login_email = login_email... | 77 | 29.96 | 78 | 17 | 498 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d1e1182c95241a88_d34be634", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
26
] | [
null
] | [
32
] | [
61
] | |
2024-11-19T01:29:30.022065+00:00 | 1,586,354,446,000 | 37cd3d958722bb3dd61bd93bf72a820b17fa4487 | 3 | {
"blob_id": "37cd3d958722bb3dd61bd93bf72a820b17fa4487",
"branch_name": "refs/heads/master",
"committer_date": 1586354446000,
"content_id": "a5e5eaf57ebd4225a6240ce9c17e18a3d7094023",
"detected_licenses": [
"MIT"
],
"directory_id": "79301a8c17f46924c45838c4c2496e7e898d9a5a",
"extension": "py",
"fi... | 2.71875 | stackv2 | import requests
from dnac_config import DNAC_IP, DNAC_PORT, DNAC_USER, DNAC_PASSWORD
from DNA_Token import get_auth_token
def get_device_list():
"""Building out function to retrieve list of devices. Using requests.get to make a call to the network device Endpoint"""
token = get_auth_token() # Get Token
ur... | 55 | 42.02 | 141 | 13 | 648 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c6072ebff8dced3b_d1aeb4ba", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
11,
20,
30
] | [
null,
null,
null
] | [
12,
10,
12
] | [
56,
74,
56
] | |
2024-11-19T01:29:31.735192+00:00 | 1,452,847,350,000 | a3fd777854eb7601447a868bf02e009d24e3058a | 3 | {
"blob_id": "a3fd777854eb7601447a868bf02e009d24e3058a",
"branch_name": "refs/heads/master",
"committer_date": 1452847350000,
"content_id": "acfd4fd226313fc4f501f6bd52af6f7d37be5c42",
"detected_licenses": [
"MIT"
],
"directory_id": "541559405ada4e7a52e6aa0fbc3cdc1a42d1b9ee",
"extension": "py",
"fi... | 3.0625 | stackv2 | """
install.py
This file let users to set up machineInfo.config and ojdatabase.config file
"""
from bash import bash
def set_MachineInfo():
bash('test -d machineInfo.config && rm -r machineInfo.config')
num = raw_input("Please input the total number of the judges:\n")
if num > 0:
try:
... | 40 | 35.55 | 77 | 19 | 357 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b6219b93351e54c0_320a1a42", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
32
] | [
null
] | [
21
] | [
48
] | |
2024-11-19T01:29:50.339873+00:00 | 1,621,623,703,000 | 2801afb471240bd6febc6e03ad6d1515acadd856 | 2 | {
"blob_id": "2801afb471240bd6febc6e03ad6d1515acadd856",
"branch_name": "refs/heads/master",
"committer_date": 1621623703000,
"content_id": "a9754cb8309c7210b6247711578c86e9ee7b48a6",
"detected_licenses": [
"MIT"
],
"directory_id": "540ecc97c1f7aef6edef070db35c1a9b19941fe7",
"extension": "py",
"fi... | 2.453125 | stackv2 | """
Alex Eidt
Runs the Flask Application for the UW Course Planner Web App.
"""
import re
import json
import os
import uwtools
import pandas as pd
from create_tree import create_tree, graph_department
from schedule import get_combinations
from schedule import main as check_schedules
from flask import Flask, redirect... | 255 | 32.67 | 100 | 22 | 1,953 | python | [{"finding_id": "codeql_py/polynomial-redos_4434b6a9cb1b3a05_445b8cfa", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/polynomial-redos",
"py/polynomial-redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of ' '.",
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'A'."
] | [
114,
196
] | [
null,
null
] | [
42,
36
] | [
48,
46
] | |
2024-11-19T01:29:55.776011+00:00 | 1,628,315,275,000 | d9794c8058795cf84cd2d2877caf1db780ef1136 | 3 | {
"blob_id": "d9794c8058795cf84cd2d2877caf1db780ef1136",
"branch_name": "refs/heads/master",
"committer_date": 1628315275000,
"content_id": "b61747c433997555255a539c1356cfb7137783f2",
"detected_licenses": [
"MIT"
],
"directory_id": "c5bea4b013e426e16829579fcc6f22371facd82b",
"extension": "py",
"fi... | 3 | stackv2 | # -*- coding: utf-8 -*-
"""mimerender example for Flask. Run this server and then try:
$ curl -iH "Accept: application/html" localhost:8080/x
...
Content-Type: text/html
...
<html><body>Hello, x!</body></html>
$ curl -iH "Accept: application/xml" localhost:8080/x
...
Content-Type: appl... | 53 | 21.83 | 86 | 11 | 342 | python | [{"finding_id": "codeql_py/reflective-xss_8eb67578aa441949_c63f7584", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
49
] | [
null
] | [
12
] | [
47
] | |
2024-11-19T01:30:09.247493+00:00 | 1,529,367,668,000 | 091206ac4585c2add4674c5cbe074f7f3a4f1631 | 2 | {
"blob_id": "091206ac4585c2add4674c5cbe074f7f3a4f1631",
"branch_name": "refs/heads/master",
"committer_date": 1529367668000,
"content_id": "e6f0b81dadc6b1e210042a370ac138b2368e480c",
"detected_licenses": [
"Apache-2.0",
"MIT"
],
"directory_id": "b262b4cfaf48c2fc817b4590b64760dc027886f7",
"exten... | 2.3125 | stackv2 | import base64, json, sqlite3, ssl, urllib, urllib2, requests
dbPath='/opt/sweetsecurity/server/SweetSecurity.db'
def getCreds():
creds={'user': None, 'pass': None}
conn = sqlite3.connect(dbPath)
c = conn.cursor()
for httpUserData in c.execute('SELECT * from configuration where object = "webUser"'):
creds['user'... | 31 | 32.74 | 87 | 12 | 268 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f7c64adfe7142518_b2ae28e1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
28,
30
] | [
null,
null
] | [
9,
11
] | [
43,
78
] | |
2024-11-19T01:30:12.700582+00:00 | 1,683,873,005,000 | 3c13a036ada0eea6a632c9ac6925a132d528e09a | 3 | {
"blob_id": "3c13a036ada0eea6a632c9ac6925a132d528e09a",
"branch_name": "refs/heads/master",
"committer_date": 1683873005000,
"content_id": "9ee0259bf3a482878a323ccbe92bb7a6fc588c96",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "929cbe87319d7a5bb1d691074fde2a9b6b48cec7",
"extension": "py"... | 2.625 | stackv2 | import requests
import json
from .base import BaseExtractor
from ...models import DocumentEntity, Entity, Utterance, DocumentTaxonomy
import logging
log = logging.getLogger(__name__)
class CalaisExtractor(BaseExtractor):
""" Use the OpenCalais API to extract entities and other
useful goodies from a document... | 160 | 30.29 | 111 | 19 | 1,087 | python | [{"finding_id": "codeql_py/request-without-cert-validation_9bcfc3852dc499ed_340ac42e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
97
] | [
104
] | [
19
] | [
33
] | |
2024-11-19T01:30:22.851703+00:00 | 1,648,580,279,000 | 2b7f2ccb300d0bb442a806de61ebe3ca8e0f811b | 2 | {
"blob_id": "2b7f2ccb300d0bb442a806de61ebe3ca8e0f811b",
"branch_name": "refs/heads/master",
"committer_date": 1648580279000,
"content_id": "d26a82c5176580f79d7693682bf7c5e5a9a1e229",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2a1b9c3ca8a48c283c5261ff9c283a8172de750f",
"extension": "py"... | 2.359375 | stackv2 | # -*- coding: utf-8 -*-
#
# Copyright 2012-2015 Spotify AB
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law... | 161 | 33.09 | 99 | 23 | 1,369 | python | [{"finding_id": "codeql_py/overly-permissive-file_c3b5f4280cab7ad0_bc14155f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
108
] | [
null
] | [
9
] | [
33
] | |
2024-11-19T01:30:37.249767+00:00 | 1,431,101,619,000 | 2e326bfa33ad87cfb74e2e2f60fba57f0fd13b56 | 3 | {
"blob_id": "2e326bfa33ad87cfb74e2e2f60fba57f0fd13b56",
"branch_name": "refs/heads/master",
"committer_date": 1431101619000,
"content_id": "00c0efd09f160905c42f7d5d15cf75c702dce747",
"detected_licenses": [
"MIT"
],
"directory_id": "07e584ae13b64c350263a37f078d5229e9e378fb",
"extension": "py",
"fi... | 2.75 | stackv2 | #!/usr/bin/python
"""
Pushover API module and command line tool
"""
from urllib2 import Request, HTTPError, URLError, build_opener, ProxyBasicAuthHandler, ProxyHandler, install_opener
from urllib import urlencode
from json import loads
from argparse import ArgumentParser
from ConfigParser import ConfigParser, Error as ... | 240 | 35.52 | 122 | 19 | 1,907 | python | [{"finding_id": "codeql_py/overly-large-range_8fcb84d26c2c5a08_18f18808", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
105
] | [
null
] | [
73
] | [
76
] | |
2024-11-19T01:54:52.179910+00:00 | 1,625,718,140,000 | 3514250c000512b0cb611efc6b4d9e0581d56523 | 4 | {
"blob_id": "3514250c000512b0cb611efc6b4d9e0581d56523",
"branch_name": "refs/heads/main",
"committer_date": 1625718140000,
"content_id": "d38cae0bdea8fe170ee0510fae2066f52ebcdc1e",
"detected_licenses": [
"MIT"
],
"directory_id": "5f8035fbabc92bca96b387ba6c12bc7657becd69",
"extension": "py",
"file... | 4.15625 | stackv2 | # Password generator program
import random
def generate_password():
capital_letters = ['A','B','C','D','E','F','G','H','I','J','K','L','M','N','O','P','Q','R','S','T','U','V','W','X','Y','Z']
lowercase = ['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','u','v','w','x','y','z']
... | 28 | 30.57 | 127 | 10 | 278 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f448309d61b37751_36c4abad", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
24
] | [
null
] | [
11
] | [
46
] | |
2024-11-19T01:55:23.733037+00:00 | 1,617,538,893,000 | 367884b6ed758f7ea5696d6e24dfc7a5fe0f2539 | 3 | {
"blob_id": "367884b6ed758f7ea5696d6e24dfc7a5fe0f2539",
"branch_name": "refs/heads/main",
"committer_date": 1617538893000,
"content_id": "4c8e82977a1392cabf522dd1025a64705bbd4007",
"detected_licenses": [
"Unlicense"
],
"directory_id": "f455faf7ea663f52f57a8611a7663193d4defbea",
"extension": "py",
... | 2.859375 | stackv2 | #!/usr/bin/env python2
import os
import socket
import ssl
import urllib2
from collections import defaultdict
from textwrap import dedent
class OnamaeDDNSError(Exception):
"""Error in the interaction with DDNS server.
Note that the server may response with error due to the previous command.
This class... | 124 | 25.25 | 80 | 14 | 816 | python | [{"finding_id": "codeql_py/insecure-default-protocol_e58b76d82d2e617c_7afbd6cd", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
94
] | [
null
] | [
19
] | [
40
] | |
2024-11-19T01:55:24.005999+00:00 | 1,566,452,419,000 | 8ace170b0e203dc058958d8dcbcfcbb7cf8824f7 | 3 | {
"blob_id": "8ace170b0e203dc058958d8dcbcfcbb7cf8824f7",
"branch_name": "refs/heads/master",
"committer_date": 1566452419000,
"content_id": "a6e2a3a9dd7f98f6a7731524d7e87ec88ec53921",
"detected_licenses": [
"MIT"
],
"directory_id": "11193c6bfaf16ca8c764ddfc146541ca755d1210",
"extension": "py",
"fi... | 2.71875 | stackv2 | import hashlib
from binascii import hexlify, unhexlify
import sys
from .account import PrivateKey
from .base58 import Base58, base58decode
import logging
log = logging.getLogger(__name__)
try:
from Crypto.Cipher import AES
except ImportError:
raise ImportError("Missing dependency: pycrypto")
SCRYPT_MODULE = N... | 119 | 33.97 | 87 | 15 | 1,235 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_0cfa912e85cd91b7_34441dfe", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
41,
106,
107
] | [
null,
null,
null
] | [
12,
22,
22
] | [
26,
49,
49
] | |
2024-11-19T02:06:41.350579+00:00 | 1,540,222,734,000 | d7cdba6e0cf7d39183b0ea347c07ca0be2578c90 | 3 | {
"blob_id": "d7cdba6e0cf7d39183b0ea347c07ca0be2578c90",
"branch_name": "refs/heads/master",
"committer_date": 1540222734000,
"content_id": "cfb1c573b830cb966bcdd83905d2083f3c68be70",
"detected_licenses": [
"MIT"
],
"directory_id": "a301b63c8f905f077c4f714b5cb0e2eb5425af77",
"extension": "py",
"fi... | 2.6875 | stackv2 | import discord
import re
import urllib.parse as urlparse
import clashroyale
creditIcon = "https://i.imgur.com/TP8GXZb.png"
credits = "Bot by GR8 | Titan"
class friendlink:
"""Automatically convert Clash Royale friend links to beautiful embeds"""
def __init__(self, bot):
self.bot = bot
self.r... | 77 | 36.27 | 137 | 19 | 666 | python | [{"finding_id": "codeql_py/overly-large-range_36682e530319e26c_e3e7b875", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
29
] | [
null
] | [
57
] | [
60
] | |
2024-11-19T02:06:46.946954+00:00 | 1,497,738,898,000 | 140c40257640e71fa41badc57501581f55b90774 | 3 | {
"blob_id": "140c40257640e71fa41badc57501581f55b90774",
"branch_name": "refs/heads/master",
"committer_date": 1497738898000,
"content_id": "327cc22b7ca8dc81473cd8b513a06e990a923200",
"detected_licenses": [
"MIT"
],
"directory_id": "e6a624344aeaa3fc3cf41fb91ad0ebaaa98f9db5",
"extension": "py",
"fi... | 2.625 | stackv2 | import re
import pickle
import praw
from tables import Table, _trash, _header_regex, _summons_regex
from utils import ioencode, get_post_text, lprint, fdate
class TableSource(object):
def __init__(self, praw_ref, descriptor):
self.source = praw_ref
self.desc = descriptor
self.tables = []... | 197 | 35.9 | 133 | 21 | 1,635 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_05c8fa0739e5e10d_d940e9ac", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [reddit.com](1) may be at an arbitrary position in the ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [reddit.com](1) may be at an arbitrary position in the sanitized URL."
] | [
127
] | [
null
] | [
16
] | [
44
] | |
2024-11-19T02:07:14.656322+00:00 | 1,606,000,599,000 | 763153f15540bde2d52c480a23fc65dd72c8225b | 3 | {
"blob_id": "763153f15540bde2d52c480a23fc65dd72c8225b",
"branch_name": "refs/heads/main",
"committer_date": 1606000599000,
"content_id": "9f7109b4552a6c93f247fa201119834c99fe4059",
"detected_licenses": [
"MIT"
],
"directory_id": "803c3442e28bf42ff00e79f8dd517335dd085631",
"extension": "py",
"file... | 2.796875 | stackv2 | from flask import Flask, render_template, request
app = Flask(__name__)
@app.route("/home")
@app.route("/")
def index():
framework= "Flask"
return render_template("index.html", framework=framework)
@app.route("/contact", methods=["POST"])
def contact():
name = request.form.get("name")
return render_t... | 30 | 22 | 61 | 10 | 173 | python | [{"finding_id": "codeql_py/flask-debug_830abb36acd13f13_c98eaa9c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
30,
18,
24
] | [
null,
20,
27
] | [
5,
12,
12
] | [
24,
8,
8
] | |
2024-11-19T02:07:23.949645+00:00 | 1,503,156,813,000 | e070de3dc5882f3164398045ceb30174123aab36 | 3 | {
"blob_id": "e070de3dc5882f3164398045ceb30174123aab36",
"branch_name": "refs/heads/master",
"committer_date": 1503156875000,
"content_id": "03b4d90126ae491a868fcea225958415a647dd12",
"detected_licenses": [
"MIT"
],
"directory_id": "9bdccad0486f29eb555dce0865effcb95346f416",
"extension": "py",
"fi... | 2.953125 | stackv2 | import httplib
import json
import logging
import time
from datetime import datetime, timedelta
class TimeController:
def __init__(self, config):
self._config = config
self._current_date = None
self._sunrise = None
self._sunset = None
fetched_location = False
while ... | 110 | 40.73 | 118 | 17 | 996 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_57a2c6323dbd23b2_915c6760", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text."
] | [
40
] | [
null
] | [
22
] | [
108
] | |
2024-11-19T02:07:24.093517+00:00 | 1,586,627,607,000 | e444b830a6c05f66f6873cd5bf1a733618d18ce2 | 3 | {
"blob_id": "e444b830a6c05f66f6873cd5bf1a733618d18ce2",
"branch_name": "refs/heads/master",
"committer_date": 1586627607000,
"content_id": "80cab0ffad1bb6b57c73d939526909d073886afc",
"detected_licenses": [
"MIT"
],
"directory_id": "08a5885f0bbb6f7f00f3a87414c05af783bd807e",
"extension": "py",
"fi... | 2.671875 | stackv2 | from app import app
from flask import render_template, request
import requests
import urllib.request
from bs4 import BeautifulSoup
import pandas as pd
import numpy as np
def getRoundPairings(round_id):
ENDPOINT = "https://mtgmelee.com/Tournament/GetRoundPairings/" + \
str(round_id)
r = requests.post(u... | 210 | 39.71 | 110 | 26 | 2,107 | python | [{"finding_id": "codeql_py/full-ssrf_6a7403d93c0bd7bd_5f63c10d", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
122
] | [
null
] | [
20
] | [
48
] | |
2024-11-19T02:31:38.096747+00:00 | 1,516,502,295,000 | 446eb4dee85a4026a0387051950613d4d3dab668 | 2 | {
"blob_id": "446eb4dee85a4026a0387051950613d4d3dab668",
"branch_name": "refs/heads/master",
"committer_date": 1516502295000,
"content_id": "a5370a67246cada73ef4d9776af3efa7f2d5891f",
"detected_licenses": [
"MIT"
],
"directory_id": "fcbe5c8d2a3e1a4d96aa5f8664bf64913451ca89",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/env python
# -*- coding: UTF-8 -*-
# =============================================================================
# title : magicblueshell.py
# description : Python tool to control Magic Blue bulbs over Bluetooth
# author : Benjamin Piouffle
# date : 23/11/2015
# usage ... | 344 | 39.42 | 79 | 20 | 2,844 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_48ee74030be1bee5_d04b963f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
165
] | [
null
] | [
30
] | [
73
] | |
2024-11-19T02:31:48.347278+00:00 | 1,505,515,880,000 | 2bc183157a70b1f3a407adc83a009de323ade81a | 2 | {
"blob_id": "2bc183157a70b1f3a407adc83a009de323ade81a",
"branch_name": "refs/heads/master",
"committer_date": 1505515880000,
"content_id": "afe91dc8e59f7f851691aea25d735e9dafa88007",
"detected_licenses": [
"MIT"
],
"directory_id": "af0d0e9455b0d3ff31df35e0097afec5fa964fd0",
"extension": "py",
"fi... | 2.5 | stackv2 | from flask import Flask
from flask import jsonify
app = Flask(__name__)
@app.route("/")
def hello():
return jsonify(response="Hello World!")
@app.route('/_get_current_user')
def get_current_user():
return jsonify(username='g.user.username',
email='g.user.email',
id='g.us... | 19 | 24.16 | 59 | 10 | 108 | python | [{"finding_id": "codeql_py/reflective-xss_d3f80f70f4cfe419_51aeb3cd", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
19
] | [
null
] | [
12
] | [
31
] | |
2024-11-19T02:31:57.473426+00:00 | 1,611,930,514,000 | 8f6e3024615aa3573a25a2a543dd3965855c90c6 | 3 | {
"blob_id": "8f6e3024615aa3573a25a2a543dd3965855c90c6",
"branch_name": "refs/heads/main",
"committer_date": 1611930514000,
"content_id": "22f9e5d7f00db706ef33be5242f6b967264897f9",
"detected_licenses": [
"MIT"
],
"directory_id": "af0ac2076f500fc7f8d81d100559bc97b810c8d7",
"extension": "py",
"file... | 2.671875 | stackv2 | import multiprocessing
import time
import requests
# test login: vgwgsrnpxyybjnahtz@twzhhq.online
CONCURRENCY = False
class PassWordBreaker:
def __init__(
self,
user_agent="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.183 Safari/537.... | 73 | 30.86 | 141 | 16 | 527 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a2a59f50c196a0cd_bfc1160d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive d... | [
53,
36,
51
] | [
null,
null,
null
] | [
28,
57,
42
] | [
61,
73,
50
] | |
2024-11-19T02:32:01.728029+00:00 | 1,586,462,048,000 | 767b505f878db69dbb157797095b6dc61ddcf4b7 | 3 | {
"blob_id": "767b505f878db69dbb157797095b6dc61ddcf4b7",
"branch_name": "refs/heads/master",
"committer_date": 1586462048000,
"content_id": "af7fead0aaa96e7446adea5d048dfa3392f33715",
"detected_licenses": [
"MIT"
],
"directory_id": "8816062816e29a3291739e6800d08f8d93ef8f78",
"extension": "py",
"fi... | 3 | stackv2 | '''
Created on May 18, 2019
@author: Winterberger
'''
import csv
import json
compromised_users = []
# Collect Compromised users from passwords.csv which we mysteriously obtained from The Fender
with open("passwords.csv") as password_file:
password_csv = csv.DictReader(password_file)
for password_row in pa... | 56 | 33.75 | 93 | 11 | 536 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ca975cca543bbc3f_d9631805", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
23
] | [
null
] | [
37
] | [
53
] | |
2024-11-19T02:32:02.766022+00:00 | 1,381,813,060,000 | 4e8f98988d377dd2d815aa296f41d0bf51bf99eb | 4 | {
"blob_id": "4e8f98988d377dd2d815aa296f41d0bf51bf99eb",
"branch_name": "refs/heads/master",
"committer_date": 1381813060000,
"content_id": "40f1a01b87703baa0304480811fdac49f5af7181",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "61f56656a487e097062fc0fc3a1afc428ca7b954",
"extension": "py"... | 3.53125 | stackv2 | #!/usr/bin/python
# Copyright 2010 Google Inc.
# Licensed under the Apache License, Version 2.0
# http://www.apache.org/licenses/LICENSE-2.0
# Google's Python Class
# http://code.google.com/edu/languages/google-python-class/
import sys
import re
import glob
"""Baby Names exercise
Define the extract_names() function... | 150 | 28.37 | 102 | 17 | 1,257 | python | [{"finding_id": "codeql_py/redos_4499335fa0e52dd9_6686378d", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<tr align=\"a\"><td>9</td><td>' a... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '<tr align=\"a\"><td>9</td><td>' and containing many repetitions of 'a'.",
"This part of the regular expression may cause exponential backtracking on strings starting with '<tr align=\"a\"><td>9</td><td>a</td><td>' an... | [
88,
88
] | [
null,
null
] | [
62,
77
] | [
65,
80
] | |
2024-11-19T02:32:13.445479+00:00 | 1,526,589,505,000 | f789144a026850e4b31987a4776e13db8442d36d | 2 | {
"blob_id": "f789144a026850e4b31987a4776e13db8442d36d",
"branch_name": "refs/heads/master",
"committer_date": 1526589505000,
"content_id": "30caee17cd28e213ae2acf484c9464a914157d84",
"detected_licenses": [
"BSD-3-Clause",
"BSD-2-Clause"
],
"directory_id": "41504e165a28df18b6c8e0abc15ddba7a9c54561... | 2.3125 | stackv2 | import datetime
import json
import os
from django.contrib.auth.models import User
import requests
from rest_framework.authentication import TokenAuthentication, get_authorization_header
from rest_framework import exceptions
from rest_framework.authtoken.models import Token
from nbrepo import settings
class GenePatt... | 127 | 37.87 | 109 | 17 | 887 | python | [{"finding_id": "codeql_py/stack-trace-exposure_d33fef6901a33ad8_297b5530", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
124
] | [
null
] | [
51
] | [
52
] | |
2024-11-19T02:32:21.141658+00:00 | 1,554,344,765,000 | 44080f236ad60d6d98ec17c7c2b801b34bd6d355 | 3 | {
"blob_id": "44080f236ad60d6d98ec17c7c2b801b34bd6d355",
"branch_name": "refs/heads/master",
"committer_date": 1554344765000,
"content_id": "31fa05325d6657837928b5e520a59e90af9fe49a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d9cd69824fb3760ef3f2ce7b14f113a8891edf05",
"extension": "py"... | 2.5625 | stackv2 | # coding: utf-8
'''Email templating and dispatch.'''
from smtplib import SMTP
from email.mime import multipart, text
from jinja2 import Environment, FileSystemLoader
from .config import config
from .log import logger
# Create a logger.
log = logger(__name__) # pylint: disable=invalid-name
# Create the Jinja environm... | 49 | 29.57 | 66 | 13 | 369 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_66c43f7fbe1ebfa6_42f49130", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
14
] | [
16
] | [
17
] | [
2
] | |
2024-11-19T02:32:49.792712+00:00 | 1,623,250,408,000 | 526b26975300171ccb9bb3307f8167d3cd932343 | 3 | {
"blob_id": "526b26975300171ccb9bb3307f8167d3cd932343",
"branch_name": "refs/heads/master",
"committer_date": 1623250408000,
"content_id": "08a0c75ad98447235d6ac7d072208eeb8f6c930b",
"detected_licenses": [
"MIT"
],
"directory_id": "36a5ce70b1ba4e217a650602c0b71a60fb8c55c5",
"extension": "py",
"fi... | 3.09375 | stackv2 | class Employee:
default_db_file = "employee_file.txt"
@classmethod
def get_all(cls, file_name=None):
results = []
if not file_name:
file_name = cls.default_db_file
with open(file_name, "r") as f:
lines = [
line.strip("\n").split(",") + [inde... | 66 | 29.18 | 87 | 20 | 429 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5aa6401aef47249e_7e02c4b5", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
58
] | [
null
] | [
26
] | [
31
] | |
2024-11-19T02:32:50.022103+00:00 | 1,596,908,550,000 | a869ec138c6e1cd64c378d14c39b1ec4cbb51cb0 | 3 | {
"blob_id": "a869ec138c6e1cd64c378d14c39b1ec4cbb51cb0",
"branch_name": "refs/heads/master",
"committer_date": 1596908550000,
"content_id": "d21424bc5fb8ef470e5199f57e47c7c446ce1fa3",
"detected_licenses": [
"MIT"
],
"directory_id": "17c2a23007c39dbf93d0eb7ca5d5193f0f7069e3",
"extension": "py",
"fi... | 3.265625 | stackv2 | #!/usr/bin/python
'''
FileName: PasswordValidator.py
Author: John Delgado
Created Date: 8/5/2020
Version: 1.0 Initial Development
This program will be checking a list of passwords from a file and validating each line in that file that it meets the all the requirements below.
If any of the requirements are not met the... | 105 | 47.28 | 166 | 15 | 894 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a462e46583b71d90_68f1c0cb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
97
] | [
null
] | [
15
] | [
121
] | |
2024-11-19T02:32:56.623620+00:00 | 1,684,531,919,000 | 31dcf234b7379d2fc70c95ff24b094e6ddb96c9d | 2 | {
"blob_id": "31dcf234b7379d2fc70c95ff24b094e6ddb96c9d",
"branch_name": "refs/heads/master",
"committer_date": 1684829346000,
"content_id": "80e0542e6e8794fc69784df9940671e3a5acc55f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6df06b8581a29e93f8d375211ec6ac2626839592",
"extension": "py"... | 2.359375 | stackv2 | # Copyright 2013: Mirantis Inc.
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required b... | 307 | 34.79 | 79 | 19 | 2,341 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_bb4114466a89479a_2f05f622", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
123
] | [
null
] | [
13
] | [
79
] | |
2024-11-19T02:43:33.336118+00:00 | 1,621,584,733,000 | e1c3c6b4a2337ea92b44be079e85167cd61fba81 | 3 | {
"blob_id": "e1c3c6b4a2337ea92b44be079e85167cd61fba81",
"branch_name": "refs/heads/master",
"committer_date": 1621584733000,
"content_id": "0ea1c999054d297289ea84334e37e354dd4a2953",
"detected_licenses": [
"MIT"
],
"directory_id": "f4a554440e3c382375ad8eeabcee6aaadb3113ba",
"extension": "py",
"fi... | 3 | stackv2 | import json
import hashlib
import change_password
import user_register
with open('userinfo_files/userinfo.json') as f:
user_data = json.load(f)
def valid_user(username):
for key in user_data.keys():
if username == key:
return True
def valid_password(password):
hash_password = hash... | 56 | 26.27 | 96 | 13 | 320 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_eefd8526c969b6e6_dbb955d2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
19
] | [
null
] | [
36
] | [
53
] | |
2024-11-19T02:43:40.051707+00:00 | 1,557,999,727,000 | fbdec075a38e1a3e42a75006aafc40bd7d0d65f5 | 2 | {
"blob_id": "fbdec075a38e1a3e42a75006aafc40bd7d0d65f5",
"branch_name": "refs/heads/master",
"committer_date": 1557999727000,
"content_id": "77065b0b433f253513470720da414a989da10478",
"detected_licenses": [
"MIT"
],
"directory_id": "2d5983f97f55be79880f17c56df2eb9353038d10",
"extension": "py",
"fi... | 2.359375 | stackv2 | """Main application access point"""
import json
import logging
import os
import time
import werkzeug
import werkzeug.exceptions
from flask import Flask, render_template, request, send_from_directory, Markup
# import kolme_muusaa.settings as s
__WEB_APP_PATH__ = os.path.dirname(os.path.realpath(__file__))
# __WEB_AP... | 238 | 38.21 | 115 | 31 | 1,802 | python | [{"finding_id": "codeql_py/log-injection_fc04a06e220b2f0a_b2ff92ac", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 6 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depen... | [
103,
118,
128,
131,
135,
138
] | [
null,
null,
null,
null,
null,
null
] | [
22,
42,
38,
38,
35,
30
] | [
60,
70,
50,
50,
95,
69
] | |
2024-11-19T02:55:09.153971+00:00 | 1,513,766,205,000 | 2300a937f58f37b17e4dc0f0fad3e9c1cdb09fe3 | 3 | {
"blob_id": "2300a937f58f37b17e4dc0f0fad3e9c1cdb09fe3",
"branch_name": "refs/heads/master",
"committer_date": 1513766205000,
"content_id": "77954512672482e319ba7ad3ae0ef18e379f2665",
"detected_licenses": [
"MIT"
],
"directory_id": "0b124e847a5f37a75798e5cac95319833f1373e1",
"extension": "py",
"fi... | 2.609375 | stackv2 | # -*- coding: utf-8 -*-
import requests
from bs4 import BeautifulSoup
import time
import thread
def download_imag(number):
global img_flag,succes_flag
print('save numner: ' + str(number) + ' img, img_flag = ' + str(img_flag))
requests.packages.urllib3.disable_warnings()
URL = "https://www.db.yugioh-c... | 67 | 29.79 | 156 | 14 | 583 | python | [{"finding_id": "codeql_py/request-without-cert-validation_9a9e66f416f0d260_2ae16d8f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
14
] | [
null
] | [
11
] | [
61
] | |
2024-11-19T02:55:51.820968+00:00 | 1,557,416,174,000 | c3d1d3dbd5120c7f39d7e3d987c6d9d12d082c11 | 3 | {
"blob_id": "c3d1d3dbd5120c7f39d7e3d987c6d9d12d082c11",
"branch_name": "refs/heads/master",
"committer_date": 1557416174000,
"content_id": "f476aff17f9d22a92fb3193777cea45183834317",
"detected_licenses": [
"MIT"
],
"directory_id": "36ceedd21d979a50a07e3f597817d5f87f1c38fe",
"extension": "py",
"fi... | 2.796875 | stackv2 | #!/usr/bin/env python3
import requests
import urllib
import json
import time
import os
from huffman_code import Node, Huffman
TOKEN = os.environ['SECRET_TOKEN']
URL = "https://api.telegram.org/bot{}/".format(TOKEN)
HELP = """
/help
/encode <text>
"""
def make_request(url):
response = requests.get(url)
retur... | 139 | 29.12 | 121 | 23 | 973 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_062408304d39f5de_ccd2d4e0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
82,
87,
87,
87
] | [
null,
null,
null,
null
] | [
19,
15,
24,
29
] | [
53,
22,
27,
33
] | |
2024-11-19T02:56:06.020286+00:00 | 1,507,066,426,000 | a86f3bb226e50f85abcdab8bf82ce1e5b3141750 | 3 | {
"blob_id": "a86f3bb226e50f85abcdab8bf82ce1e5b3141750",
"branch_name": "refs/heads/master",
"committer_date": 1507066426000,
"content_id": "b37fe81f94985f3639c01a016506c8a772b79679",
"detected_licenses": [
"MIT"
],
"directory_id": "842748f8cbd95ed6f73e44847dca2a45b1fc16de",
"extension": "py",
"fi... | 2.59375 | stackv2 | import websocket
import json
import requests
import urllib
import os
import logging
# Suppress InsecureRequestWarning
from requests.packages.urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
###VARIABLES THAT YOU NEED TO SET MANUALLY IF NOT ON HEROKU##... | 88 | 31.73 | 120 | 22 | 680 | python | [{"finding_id": "codeql_py/request-without-cert-validation_0d505d532b3deb7d_2dcb4f8e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
49
] | [
50
] | [
9
] | [
72
] | |
2024-11-19T03:10:23.179961+00:00 | 1,505,695,309,000 | 1dc3da6bb1f59228753d91a365ebefc43fa3f5dc | 3 | {
"blob_id": "1dc3da6bb1f59228753d91a365ebefc43fa3f5dc",
"branch_name": "refs/heads/master",
"committer_date": 1505695309000,
"content_id": "8fe172663a6f380d951323146f173c46589f91ff",
"detected_licenses": [
"MIT"
],
"directory_id": "d4c8e8e39d2634ea406362893985d42a31758df0",
"extension": "py",
"fi... | 2.75 | stackv2 | # coding: utf8
import json
import os
import time
import random
import socket
import hashlib
try:
lib = __import__('pandas')
globals()['pd'] = lib
except ImportError:
pandas_import_error_msg = \
'''
Este script utiliza la libreria de Python Pandas.
Por favor ejecuta:
$ sudo -H pip install pand... | 258 | 29.09 | 104 | 19 | 1,880 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_58197a46e6a631a9_86cc827d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
181
] | [
null
] | [
24
] | [
28
] | |
2024-11-19T03:21:49.927168+00:00 | 1,629,008,195,000 | f9bf4de1b1803210fd51ab452c1854e92165d0ea | 2 | {
"blob_id": "f9bf4de1b1803210fd51ab452c1854e92165d0ea",
"branch_name": "refs/heads/master",
"committer_date": 1629008195000,
"content_id": "fa49ab34f7f73cf954128d68dc72855ccfd225a3",
"detected_licenses": [
"MIT"
],
"directory_id": "60486f841ed4d1f30dfd196966a825f182138a67",
"extension": "py",
"fi... | 2.3125 | stackv2 | from django.shortcuts import render, redirect, reverse
from django.http import HttpResponse
from django.contrib import messages
from django.views import View
from django.contrib.auth.models import User
from django.contrib.auth import authenticate, login, logout
from django.db import connection
from django.core.mail imp... | 95 | 32.93 | 95 | 19 | 743 | python | [{"finding_id": "codeql_py/sql-injection_0a3b92c09142a6ad_3a8a58c1", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 3 | true | [
"CWE-089",
"CWE-089",
"CWE-089"
] | [
"py/sql-injection",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
32,
73,
93
] | [
null,
null,
null
] | [
20,
19,
18
] | [
23,
22,
21
] | |
2024-11-19T03:22:20.283140+00:00 | 1,614,224,878,000 | 5d5a7e7de70d648f556317d91b208a90b5bc4579 | 3 | {
"blob_id": "5d5a7e7de70d648f556317d91b208a90b5bc4579",
"branch_name": "refs/heads/main",
"committer_date": 1614224878000,
"content_id": "a4e0359a6aaa410c53502ef046988dd9601a230d",
"detected_licenses": [
"MIT"
],
"directory_id": "1c66f40f7d12b94ddb8f71ea2dfef661c7d198ec",
"extension": "py",
"file... | 2.6875 | stackv2 | def createAccounts(detailsNewUser):
# This module will take the information that the user provided and build a
# PowerShell script to create the new account in example.com. The
# PowerShell script will be saved in and run from the user's home directory.
import subprocess, os
from pathlib import Pat... | 105 | 49.3 | 174 | 15 | 1,449 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_67e6703d8ae8fe4e_4b7021aa", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitiv... | [
80,
81
] | [
null,
null
] | [
19,
19
] | [
38,
39
] | |
2024-11-19T03:43:59.170293+00:00 | 1,662,976,500,000 | edbafdb77ba70ab5c1cada54621079db382228f2 | 3 | {
"blob_id": "edbafdb77ba70ab5c1cada54621079db382228f2",
"branch_name": "refs/heads/master",
"committer_date": 1662976500000,
"content_id": "8ffd8dcbbf27a46a62760b475d856ddf4f020ddc",
"detected_licenses": [
"MIT"
],
"directory_id": "f7db2ff3ca2d4885ecf9a856e28e67bc1a4b7764",
"extension": "py",
"fi... | 2.859375 | stackv2 | """
Partly adapted from https://github.com/ebmdatalab/html-template-demo
"""
from datetime import date
import markupsafe
import jinja2
from lxml import html
definitions = {
"Chemical Items": "number of prescribed items containing this chemical",
"Subparagraph Items": "count of all prescribed items "
"from... | 372 | 26.41 | 79 | 18 | 2,370 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0d3e811a2e2a5b9a_30f14a4e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
359
] | [
null
] | [
20
] | [
45
] | |
2024-11-19T03:44:11.478850+00:00 | 1,578,756,581,000 | d091edb736ddac959e41a6c940173b7175accea5 | 3 | {
"blob_id": "d091edb736ddac959e41a6c940173b7175accea5",
"branch_name": "refs/heads/master",
"committer_date": 1578756581000,
"content_id": "9a6491092f868cee23e3dc129103b0a90731c1b0",
"detected_licenses": [
"MIT"
],
"directory_id": "deb152a6c7354c1219f3e2a79124113fb5e7e14f",
"extension": "py",
"fi... | 2.6875 | stackv2 | from flask import Flask, request
import requests
import os
import io
app = Flask(__name__)
token = '' # <-- Telegram bot token
URL = 'https://api.telegram.org/{}/'.format(token)
os.environ['GOOGLE_APPLICATION_CREDENTIALS'] = '' # <-- Path to google private key json file
def get_bot_info():
getBotInfoRequest = r... | 108 | 31.2 | 114 | 13 | 784 | python | [{"finding_id": "codeql_py/flask-debug_f340dac09c5df406_7aadcac3", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 5 | true | [
"CWE-215",
"CWE-022",
"CWE-022",
"CWE-918",
"CWE-918"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of th... | [
107,
38,
51,
31,
35
] | [
null,
null,
null,
null,
null
] | [
5,
15,
18,
17,
16
] | [
24,
24,
27,
102,
115
] | |
2024-11-19T03:44:25.088467+00:00 | 1,606,219,351,000 | 6c0ec1db621bf275b8c7b80e6a00ec8eac40fabf | 3 | {
"blob_id": "6c0ec1db621bf275b8c7b80e6a00ec8eac40fabf",
"branch_name": "refs/heads/master",
"committer_date": 1606219351000,
"content_id": "5f881c36db30c3fb4e5ca39c4e76657213c8b849",
"detected_licenses": [
"MIT"
],
"directory_id": "cabf40224181947a4462271ee3a629a61c806c48",
"extension": "py",
"fi... | 2.6875 | stackv2 |
from flask import Flask, render_template, request, Response
from werkzeug.utils import secure_filename
import yake
from highlight import TextHighlighter
from wordcloud import WordCloud, STOPWORDS, ImageColorGenerator
import nltk
nltk.download('stopwords')
from nltk.corpus import stopwords
import random
import os
impor... | 69 | 30.87 | 117 | 15 | 486 | python | [{"finding_id": "codeql_py/flask-debug_3c15f9de162973ba_9793f346", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
69,
29
] | [
null,
null
] | [
5,
19
] | [
24,
46
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.