added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T19:28:47.998678+00:00 | 1,632,656,060,000 | 9194de1deb2f2e84522e797413edc3a0c7eaf9a8 | 2 | {
"blob_id": "9194de1deb2f2e84522e797413edc3a0c7eaf9a8",
"branch_name": "refs/heads/master",
"committer_date": 1632656060000,
"content_id": "67ec47543165a2ee5a720a06f44de76260e4fb32",
"detected_licenses": [
"MIT"
],
"directory_id": "88ec732d185d1323833ba1a5113edde32a86e28f",
"extension": "py",
"fi... | 2.390625 | stackv2 | # importing stuff
from flask import *
import matplotlib
from matplotlib import *
from config import *
matplotlib.use("agg")
import numpy as np
import matplotlib.pyplot as plt
import os
import traceback
# Adding a blueprint to start the graph function
beta_flat_graph_runner = Blueprint("beta_flat_graph_runner", __name... | 429 | 34.39 | 172 | 18 | 3,219 | python | [{"finding_id": "codeql_py/stack-trace-exposure_9399841198c0dbf7_c2e420c1", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 20 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-079"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
101,
137,
158,
176,
194,
209,
225,
262,
281,
298,
314,
330,
336,
352,
367,
382,
403,
417,
419,
153
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
23,
23,
23,
23,
23,
23,
23,
23,
27,
27,
27,
27,
23,
23,
23,
23,
23,
34,
30,
28
] | [
29,
29,
29,
29,
29,
29,
29,
29,
33,
33,
33,
33,
29,
29,
29,
29,
29,
40,
36,
66
] | |
2024-11-18T19:28:54.186003+00:00 | 1,587,578,191,000 | 60b27b1e7bf2d78aa7e5ee6a41bd27949d4058ef | 3 | {
"blob_id": "60b27b1e7bf2d78aa7e5ee6a41bd27949d4058ef",
"branch_name": "refs/heads/master",
"committer_date": 1587578191000,
"content_id": "b7460072476f425bd16d4eeb5d0e8247d4f989ac",
"detected_licenses": [
"MIT"
],
"directory_id": "914d02bff6baea3eebff24d7bdda01391c5a37e7",
"extension": "py",
"fi... | 2.953125 | stackv2 | """Pre-made Dataset Provider.
"""
import pandas as pd
import tarfile
import os
from os.path import dirname, abspath
__all__ = ['init',
'reset',
'ls',
'load']
def init():
"""
Summary
`unipy` package has some famous datasets. This function unzip the embedded
dataset to... | 161 | 25.12 | 82 | 20 | 1,099 | python | [{"finding_id": "codeql_py/tarslip_99267a7285730576_57cb64b5", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/tarslip",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
42,
68
] | [
null,
null
] | [
5,
5
] | [
8,
8
] | |
2024-11-18T19:39:54.160423+00:00 | 1,478,031,871,000 | 95d97db8a63ec3bbcd6d8b14b4d07fcdbbe37782 | 3 | {
"blob_id": "95d97db8a63ec3bbcd6d8b14b4d07fcdbbe37782",
"branch_name": "refs/heads/master",
"committer_date": 1478031871000,
"content_id": "80b512af526711b136be9f12d8712af5e155bbc5",
"detected_licenses": [
"MIT"
],
"directory_id": "76f4a12df4e0c09f36bccfcbf4bb694b1e41462b",
"extension": "py",
"fi... | 2.5625 | stackv2 | __author__ = "Maxim Averin"
# -- coding: utf-8 --
import codecs
import datetime
import requests
import json
import re
import sys
from datetime import timedelta
from time import strftime
from bs4 import BeautifulSoup
import config
# constants
BASE_URL = "https://www.googleapis.com/youtube/v3/search?part=snippet"
BASE... | 124 | 25.85 | 90 | 19 | 809 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_933865028ee60b27_25f671a8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
91
] | [
null
] | [
19
] | [
29
] | |
2024-11-18T19:39:57.959640+00:00 | 1,353,390,388,000 | c29e948533081b3e8e1ebb688b624d3f2cc29b66 | 2 | {
"blob_id": "c29e948533081b3e8e1ebb688b624d3f2cc29b66",
"branch_name": "refs/heads/master",
"committer_date": 1353390388000,
"content_id": "a9076a8e7eb16d129bcd71f854c0cd2285c18a02",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "e949fd8c208ca0d33aee149003bd729b02c0f5ed",
"extension": "p... | 2.4375 | stackv2 | # -*- coding: utf-8 -*-
from __future__ import unicode_literals
import json
import collections
import sqlsoup
from sqlalchemy.exc import IntegrityError
from bottle import (response, request, route, run)
DBURL = 'postgresql+psycopg2://testuser:testpass@localhost/test'
DB = sqlsoup.SQLSoup(DBURL)
DEFAULT_LIMIT=1000
DE... | 124 | 28.19 | 71 | 17 | 863 | python | [{"finding_id": "codeql_py/stack-trace-exposure_676abc325c78a5df_258b2254", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
73,
102
] | [
null,
null
] | [
16,
24
] | [
54,
54
] | |
2024-11-18T20:18:05.788310+00:00 | 1,552,507,532,000 | 93ebb69a5b52e729e15f20befee4c00ebabe41db | 2 | {
"blob_id": "93ebb69a5b52e729e15f20befee4c00ebabe41db",
"branch_name": "refs/heads/master",
"committer_date": 1552507532000,
"content_id": "23c41a977c4fa2de1f6f395d2ba4b5abf166c339",
"detected_licenses": [
"MIT"
],
"directory_id": "2457894c4e7a6d367500b5c27c5cd7b4fc8ecdb3",
"extension": "py",
"fi... | 2.359375 | stackv2 | import logging
import requests
from flask import render_template, request
from app.views.utils import URL
logger = logging.getLogger(__name__)
def new_message():
if request.method == 'POST':
return _new_message_post(request)
else:
return render_template(
"new_message.html",
... | 71 | 25.07 | 97 | 12 | 422 | python | [{"finding_id": "codeql_py/request-without-cert-validation_53bf6321a96df5ac_2f261cc8", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
31,
47
] | [
null,
null
] | [
16,
16
] | [
98,
83
] | |
2024-11-18T20:18:57.041364+00:00 | 1,630,595,592,000 | 3e7d72fce07eca65bd39aa60793d551c1b2bda81 | 3 | {
"blob_id": "3e7d72fce07eca65bd39aa60793d551c1b2bda81",
"branch_name": "refs/heads/main",
"committer_date": 1630595592000,
"content_id": "15c167ed8f2526ebbef2bbb86ed34d572b41ed0d",
"detected_licenses": [
"MIT"
],
"directory_id": "7791bc4edf6b546e1aac6b5b417ba0a0fff67513",
"extension": "py",
"file... | 2.796875 | stackv2 | """Reads from keys.json that can be generated with quick_start.py"""
import json
import traceback
try:
f=open('settings/keys.json')
keys=json.load(f)
f.close()
except:
traceback.print_exc()
keys={'public':'', 'secret':''}
def key():
"""Returns public api key for binance
Returns:
... | 32 | 16.44 | 68 | 10 | 131 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d429fe082cad77c0_7f5598f7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
32
] | [
null
] | [
11
] | [
22
] | |
2024-11-18T20:29:36.906972+00:00 | 1,693,555,511,000 | 6865386a5c6b3052fd8d49085d6b251a97015431 | 2 | {
"blob_id": "6865386a5c6b3052fd8d49085d6b251a97015431",
"branch_name": "refs/heads/master",
"committer_date": 1693555511000,
"content_id": "120a23f733e516ca00b5d8902f06130200d88e61",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "2feaddc19de5490a1b55af08079d7e1d866f4c2d",
"extension": "p... | 2.421875 | stackv2 | import os
import shutil
import tarfile
from pathlib import Path
from pkg_resources import resource_filename
from walt.common.tools import failsafe_makedirs, failsafe_symlink
TFTP_ROOT = "/var/lib/walt/"
PXE_PATH = TFTP_ROOT + "pxe/"
NODES_PATH = TFTP_ROOT + "nodes/"
TFTP_STANDBY_DIR = Path(TFTP_ROOT + "tftp-standby")... | 147 | 39.19 | 87 | 14 | 1,486 | python | [{"finding_id": "codeql_py/tarslip_a18154a196eb1d3f_11e6db55", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
23
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T20:29:38.386041+00:00 | 1,659,650,880,000 | b41abce1928253f8f3a1c2634f4b9425fc556942 | 2 | {
"blob_id": "b41abce1928253f8f3a1c2634f4b9425fc556942",
"branch_name": "refs/heads/master",
"committer_date": 1659650880000,
"content_id": "bed53c44722ef282c3200f650ef0e7406243759e",
"detected_licenses": [
"Apache-2.0",
"MIT",
"BSD-3-Clause"
],
"directory_id": "0c44da76a30138ebaee6700e2e33df5... | 2.46875 | stackv2 | """
* @section LICENSE
*
* @copyright
* Copyright (c) 2019 Intel Corporation
*
* @copyright
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* @copyright
* http://www.apache.org... | 177 | 37.31 | 151 | 18 | 1,391 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_de136c55e368bc6d_b02a6bd6", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-022"
] | [
"py/clear-text-storage-sensitive-data",
"py/tarslip"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
162,
96
] | [
null,
null
] | [
26,
9
] | [
43,
48
] | |
2024-11-18T20:29:50.402069+00:00 | 1,592,133,270,000 | 2078085e2eaa260ba0c13fd0a613556247934136 | 3 | {
"blob_id": "2078085e2eaa260ba0c13fd0a613556247934136",
"branch_name": "refs/heads/master",
"committer_date": 1592133270000,
"content_id": "9552b33ddaace961bb54b3f00a1a9089efa7713f",
"detected_licenses": [
"MIT"
],
"directory_id": "e59b12f314b32e0e69d0dfce6dd0eb53f2f784f1",
"extension": "py",
"fi... | 2.5625 | stackv2 | from flask import Flask
from flask import request
import requests
app = Flask(__name__)
@app.route('/register/<node>', methods=['POST'])
def register(node):
print("name : ", node , '\tip:', request.remote_addr )
return 'REGISTER SUCCESS'
@app.route('/<node>/alive', methods=['POST'])
def alive(node):
print... | 38 | 27.68 | 91 | 16 | 268 | python | [{"finding_id": "codeql_py/full-ssrf_c3ea04f26ba45e14_b0d4d414", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
24
] | [
null
] | [
13
] | [
91
] | |
2024-11-18T19:07:07.652425+00:00 | 1,540,892,492,000 | 52d3b360a2dcdd7a810e0d7dc295ef6b3447363b | 2 | {
"blob_id": "52d3b360a2dcdd7a810e0d7dc295ef6b3447363b",
"branch_name": "refs/heads/master",
"committer_date": 1540892749000,
"content_id": "d35c7bff3c976c6bc92ae65277cbee209593ca28",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d8176ecf9769ef5a56057abfc5b75c4657c6e206",
"extension": "py"... | 2.421875 | stackv2 | import utils.logs as logs
try:
import requests
requests.packages.urllib3.disable_warnings()
except:
print "[-]Failed to import requests module"
def api_request(url, method, headers, body=None):
try:
if method.upper() == "GET":
auth_request = requests.get(url, headers=headers,
... | 27 | 36.56 | 79 | 14 | 193 | python | [{"finding_id": "codeql_py/request-without-cert-validation_49a78cb15237633b_b0a1e690", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
14,
17,
20,
23
] | [
15,
18,
21,
null
] | [
28,
28,
28,
28
] | [
77,
78,
77,
80
] | |
2024-11-18T19:07:19.871067+00:00 | 1,548,331,697,000 | 22759f12919b2daf9b2b652dc394ced1e973e9fe | 3 | {
"blob_id": "22759f12919b2daf9b2b652dc394ced1e973e9fe",
"branch_name": "refs/heads/master",
"committer_date": 1548331697000,
"content_id": "33f954e373ba485cc7b406861194527e100709eb",
"detected_licenses": [
"MIT"
],
"directory_id": "64c223ec184cff9d5c74061a6e5e95cc624ef0b5",
"extension": "py",
"fi... | 2.65625 | stackv2 | import base64
import requests
import data_manager as ds
def get_auth_header(token):
# Creating the authorization header
auth = f'riot:{token}'.encode()
b64encoded = base64.b64encode(auth).decode()
authorization_header = f'Basic {b64encoded}'
return authorization_header
def __request(relative_... | 39 | 23.92 | 79 | 12 | 233 | python | [{"finding_id": "codeql_py/request-without-cert-validation_d9e38db2d3876473_cef8fc57", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
27,
29
] | [
null,
null
] | [
20,
20
] | [
68,
80
] | |
2024-11-18T19:07:55.961105+00:00 | 1,571,769,061,000 | 9441a21e69aecf16f43a33a708fe55f04f0d0f4b | 3 | {
"blob_id": "9441a21e69aecf16f43a33a708fe55f04f0d0f4b",
"branch_name": "refs/heads/master",
"committer_date": 1571769061000,
"content_id": "a47e053190681a60921376b619031c3697962f4d",
"detected_licenses": [
"MIT"
],
"directory_id": "0546958d1b9b5e62abc76efe9137bafc6a6cb1e8",
"extension": "py",
"fi... | 3 | stackv2 | from user import Login, AddUser
# from run import Login,
def create_login(fname,lname,phone,email,password):
'''
Function to create a new login#
'''
new_login = Login(fname,lname,phone,email,password)
return new_login
def save_login(login):
'''
Function to save login
'''
login.save_l... | 114 | 32.91 | 158 | 19 | 787 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_98907354c5b821bd_d9cb41b4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
78,
91,
102
] | [
null,
null,
null
] | [
27,
23,
23
] | [
96,
71,
68
] | |
2024-11-18T19:08:01.517365+00:00 | 1,387,893,877,000 | 391e9421b1826e27f6501e498ebc957d69f79b4a | 3 | {
"blob_id": "391e9421b1826e27f6501e498ebc957d69f79b4a",
"branch_name": "refs/heads/master",
"committer_date": 1387893877000,
"content_id": "42b89e5fdfaf06aa7894423395f6e308873f26b8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a00aa062e34fe155b576028fd1774c10f76fb4e4",
"extension": "py"... | 2.609375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
from abc import ABCMeta, abstractmethod
import hmac
import hashlib
import base64
import collections
import six
from six.moves.urllib import parse
import requests
class AttributeInvokeMixin(object):
def __getattr__(self, name):
def handle(*args, **kwargs):
... | 190 | 28.28 | 75 | 16 | 1,134 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_c2c76740ac176a4b_9fd441b3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
113,
157
] | [
null,
null
] | [
18,
13
] | [
28,
34
] | |
2024-11-18T19:08:03.006959+00:00 | 1,637,015,209,000 | c59e7d50ad14d13eb6ee272b7c82e781e37dcfcf | 2 | {
"blob_id": "c59e7d50ad14d13eb6ee272b7c82e781e37dcfcf",
"branch_name": "refs/heads/main",
"committer_date": 1637015209000,
"content_id": "0174ceefad3cd1f3fbb9bdd1bbeab37da47cdeff",
"detected_licenses": [
"MIT"
],
"directory_id": "65a603dbbca020e5e1f7c0d594543b8dddc98de6",
"extension": "py",
"file... | 2.421875 | stackv2 | from flask import render_template, url_for, flash, redirect, request
from flaskblog import app, db, bcrypt
from flaskblog.forms import RegistrationForm, LoginForm
from flaskblog.models import User
from flask_login import login_user, current_user, logout_user, login_required
import csv
from newsapi import NewsApiClient
... | 169 | 32.1 | 97 | 16 | 1,233 | python | [{"finding_id": "codeql_py/url-redirection_b7a0d2644eba1e6a_9712fc72", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
34
] | [
null
] | [
29
] | [
38
] | |
2024-11-18T19:18:11.639049+00:00 | 1,636,391,227,000 | a478d66609f1037fccb5c5390d9b0c261ddd167a | 2 | {
"blob_id": "a478d66609f1037fccb5c5390d9b0c261ddd167a",
"branch_name": "refs/heads/main",
"committer_date": 1636391227000,
"content_id": "a0ba791c81507f830a9b63a3160f33a4f1dd72a6",
"detected_licenses": [
"MIT"
],
"directory_id": "f9e17a2fc63e7a9af107984aa60f4df943828949",
"extension": "py",
"file... | 2.484375 | stackv2 | #!/usr/bin/env python3
######################################################################
## Author: Carl Schaefer, Smithsonian Institution Archives
######################################################################
import sys
import time
import os
import re
import hashlib
import xml_common
COMMON_PATH_SEP =... | 177 | 26.51 | 84 | 16 | 1,410 | python | [{"finding_id": "codeql_py/overly-large-range_b2a3fef43467a493_6f4d9bf9", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[\\u000e\\u000f\\u0010\\u0011\\u0012\\u0013\\u0014\\u... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[\\u000e\\u000f\\u0010\\u0011\\u0012\\u0013\\u0014\\u0015\\...."
] | [
47
] | [
null
] | [
49
] | [
52
] | |
2024-11-18T19:18:12.742679+00:00 | 1,603,312,826,000 | 24138b090e23b69f75180c9c7acd00d80d110914 | 2 | {
"blob_id": "24138b090e23b69f75180c9c7acd00d80d110914",
"branch_name": "refs/heads/main",
"committer_date": 1603312826000,
"content_id": "5d57ca3c64605edde1e7265704e7bcb78d740f7b",
"detected_licenses": [
"MIT",
"BSD-3-Clause",
"Apache-2.0"
],
"directory_id": "426e8cf277306486b47939f66b7329c13... | 2.46875 | stackv2 | from flask import request, Response
from flask_restful import Resource
import json
import traceback
from ..servicos.carga_processos import carregar_dados_processos, carregar_dados_processo
class CarregarProcessos(Resource):
def post(self):
try:
body = json.loads(request.get_data().decode('UTF... | 45 | 36.29 | 132 | 16 | 381 | python | [{"finding_id": "codeql_py/reflective-xss_42f1fd2d430b1b16_494fe9e6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
18,
35
] | [
null,
null
] | [
29,
29
] | [
48,
48
] | |
2024-11-18T19:18:30.303558+00:00 | 1,620,382,196,000 | e3ca051a8af74cf595fca08dbca60f586d2110b1 | 2 | {
"blob_id": "e3ca051a8af74cf595fca08dbca60f586d2110b1",
"branch_name": "refs/heads/master",
"committer_date": 1620382196000,
"content_id": "d674657c098aaa8f904d4e8d38d5ef6ee38eaaa3",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "67807a6fb1fe74223e2901feafde9d749822430e",
"extension": "p... | 2.3125 | stackv2 | """OpenAPI core contrib django requests module"""
import re
from six.moves.urllib.parse import urljoin
from openapi_core.contrib.django.compat import (
get_headers, get_current_scheme_host,
)
from openapi_core.validation.request.datatypes import (
RequestParameters, OpenAPIRequest,
)
# https://docs.djangopro... | 57 | 32.47 | 77 | 16 | 416 | python | [{"finding_id": "codeql_py/redos_51e486a500a4910b_c2da62a7", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<' and containing many repetition... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '<' and containing many repetitions of ':'."
] | [
23
] | [
null
] | [
46
] | [
49
] | |
2024-11-18T19:18:44.312959+00:00 | 1,686,792,379,000 | ac6c5ba8c689e44882084e6f79631d14f0190a05 | 3 | {
"blob_id": "ac6c5ba8c689e44882084e6f79631d14f0190a05",
"branch_name": "refs/heads/main",
"committer_date": 1686792379000,
"content_id": "b01dc4cf31c0db23dddf63fbc0b21da1250d4106",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "aa5a8163c450a7ca7f4d3e7483213bb3642e0824",
"extension": "py",
... | 3.03125 | stackv2 | import json
import random
from flask import Flask, request
from pymessenger.bot import Bot
with open('keys.json', 'r') as file:
ACCESS_TOKEN = json.loads(file.read())['facebook']['token']
VERIFY_TOKEN = 'tensy'
app = Flask(__name__)
bot = Bot(ACCESS_TOKEN)
# Получать сообщения, посылаемые фейсбуком нашему боту ... | 62 | 39.32 | 122 | 19 | 593 | python | [{"finding_id": "codeql_py/reflective-xss_0e15241db8ed0ea3_16ce103a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
23
] | [
null
] | [
16
] | [
43
] | |
2024-11-18T19:19:10.454544+00:00 | 1,513,529,801,000 | 309d1ca589f603349e506bdfee6f6d3650031c9f | 2 | {
"blob_id": "309d1ca589f603349e506bdfee6f6d3650031c9f",
"branch_name": "refs/heads/master",
"committer_date": 1513529801000,
"content_id": "14f5a3c7c8e7ee00040b09f67182fa49911bdbd1",
"detected_licenses": [
"MIT"
],
"directory_id": "9a73f1f9790ff2dd8a42c362e72392dabeaf0267",
"extension": "py",
"fi... | 2.4375 | stackv2 | from __future__ import print_function
import argparse
import csv
import hashlib
import json
import os
import requests
import sys
import time
"""
MIT License
Copyright (c) 2017 Chapin Bryce, Preston Miller
Please share comments and questions at:
https://github.com/PythonForensics/PythonForensicsCookbook
or em... | 198 | 33.66 | 78 | 17 | 1,528 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1aed89885a3daff6_ac050b5f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
59,
92
] | [
60,
93
] | [
15,
15
] | [
17,
17
] | |
2024-11-18T19:19:15.892316+00:00 | 1,634,720,730,000 | a4d8b7b5c6046f15cbc61f77367e4ffb7c770ab4 | 3 | {
"blob_id": "a4d8b7b5c6046f15cbc61f77367e4ffb7c770ab4",
"branch_name": "refs/heads/master",
"committer_date": 1634720730000,
"content_id": "f5e28c14bc6d82fde03ec23d6d6e293ecb086ab1",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "f21e52e4900888dcf1d99d2187dc5d1f7e5ff4f2",
"extension": "p... | 2.875 | stackv2 | """
Methods for code generation (using jinja2 templates).
"""
import os
import posixpath
import time
import jinja2
import sympy
from cellmlmanip.model import Quantity
from cellmlmanip.parser import SYMPY_SYMBOL_DELIMITER, Transpiler
from cellmlmanip.printer import Printer
# Tell cellmlmanip to create _exp objects ins... | 406 | 36.64 | 119 | 20 | 3,457 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9dafc700e74443a8_d9364e73", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
30
] | [
41
] | [
24
] | [
10
] | |
2024-11-18T19:29:46.242729+00:00 | 1,607,594,828,000 | db13dfc1d4bca8451d4be3ec424dea52ee2c1d44 | 2 | {
"blob_id": "db13dfc1d4bca8451d4be3ec424dea52ee2c1d44",
"branch_name": "refs/heads/master",
"committer_date": 1607701910000,
"content_id": "111ad59c92e863d9f8b5215806174086aed35a19",
"detected_licenses": [
"MIT"
],
"directory_id": "1f0f7359e2ef181d8c8b5f0f39ce9dc489eff2cb",
"extension": "py",
"fi... | 2.453125 | stackv2 | import logging
import fileinput
import glob
import re
import os
import ast
import json
import subprocess
import urllib.request
import requests
import yaml
from jinja2 import Environment, FileSystemLoader
logging.basicConfig(level=logging.INFO)
JinjaEnv = Environment(
loader=FileSystemLoader(f"{os.path.join(os.p... | 303 | 32.67 | 86 | 21 | 2,276 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_85a255a045ce2c41_85382d47", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
18
] | [
21
] | [
12
] | [
2
] | |
2024-11-18T19:29:48.422122+00:00 | 1,522,313,801,000 | 5d50aff47cc47ebe178e9f67c5610843cbdd1ec6 | 3 | {
"blob_id": "5d50aff47cc47ebe178e9f67c5610843cbdd1ec6",
"branch_name": "refs/heads/master",
"committer_date": 1522313801000,
"content_id": "f87fd9e4fe34654f269b0a835928f84a35ed7e0c",
"detected_licenses": [
"MIT"
],
"directory_id": "1c96fbe22e76e5bb180c4316c10136dff349ac19",
"extension": "py",
"fi... | 2.765625 | stackv2 | # -*- coding:utf-8 -*-
import tornado.web
import tornado.ioloop
import tornado.options
import tornado.httpserver
from tornado.web import url
import json
tornado.options.define("port", type=int, default=9999, help="端口号")
class IndexHandler(tornado.web.RequestHandler):
def post(self):
"""
只能获取Conte... | 92 | 35.26 | 122 | 16 | 932 | python | [{"finding_id": "codeql_py/code-injection_f19cc35c04723711_81f1fa47", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 5 | true | [
"CWE-094",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/code-injection",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulne... | [
41,
62,
63,
71,
72
] | [
null,
null,
null,
null,
null
] | [
29,
20,
20,
20,
20
] | [
55,
55,
55,
55,
54
] | |
2024-11-18T19:29:52.685084+00:00 | 1,591,384,099,000 | c764c10d7a79689306c2c57908ecb660e70f347e | 2 | {
"blob_id": "c764c10d7a79689306c2c57908ecb660e70f347e",
"branch_name": "refs/heads/master",
"committer_date": 1591384099000,
"content_id": "72f2c7df5f639b489f7423c2d4af3816b0b8ff13",
"detected_licenses": [
"BSD-3-Clause",
"MIT",
"Apache-2.0"
],
"directory_id": "e72fbfb7d6881f24e089966bde1540f... | 2.3125 | stackv2 | # Copyright Philip Morris Products S.A. 2019
import re
import os
import pickle
import numpy as np
from names_dataset import NameDataset
from .address_parser import parse_address
from .Config import Config
class NER:
def __init__(self, config=None):
if config is None:
config = Config()
... | 362 | 34.07 | 120 | 18 | 3,350 | python | [{"finding_id": "codeql_py/redos_46c8e57ab8e654aa_324af5bb", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'www.' and containing many repetit... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'www.' and containing many repetitions of '-'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'www.-.' and containing many repetitions of '-'."
] | [
24,
24
] | [
null,
null
] | [
47,
118
] | [
77,
148
] | |
2024-11-18T19:44:30.647229+00:00 | 1,606,721,286,000 | 22c9268459d2fcd4837a8ccc713b3a239322bec3 | 2 | {
"blob_id": "22c9268459d2fcd4837a8ccc713b3a239322bec3",
"branch_name": "refs/heads/main",
"committer_date": 1606721286000,
"content_id": "7f1b57e1143bc90ba3bab038e79c1b753c4a6cba",
"detected_licenses": [
"MIT"
],
"directory_id": "e19389510318f9cd8b971af9938a139a569f7c14",
"extension": "py",
"file... | 2.453125 | stackv2 | import flask
from flask import Flask, request, render_template
from sklearn.externals import joblib
import numpy as np
from scipy import misc
import imageio
import keras
import matplotlib.pyplot as plt
import webbrowser
import urllib.request
# 모델 로드
# ml/model.py 선 실행 후 생성
from keras.preprocessing.image import ... | 157 | 29.89 | 112 | 18 | 1,174 | python | [{"finding_id": "codeql_py/flask-debug_32eea6a39183a1a9_aa1f901c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
157,
52
] | [
null,
null
] | [
5,
19
] | [
51,
42
] | |
2024-11-18T19:44:31.368077+00:00 | 1,579,788,327,000 | ff6443344cf4e0b710c623e1bbd1edf2626ac92a | 3 | {
"blob_id": "ff6443344cf4e0b710c623e1bbd1edf2626ac92a",
"branch_name": "refs/heads/master",
"committer_date": 1579788327000,
"content_id": "0a4b61137443b47b2ddb45ca5fbc83797d87a4f0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1d5e2bc58bf70f6b4f441021fb3acca395950ac3",
"extension": "py"... | 2.5625 | stackv2 | import os
import errno
import configparser
from jinja2 import Environment, PackageLoader
from .config_schema import validate_config
_CONFIG = None
def make_config_file_dir(config_file):
# Create parent directory if not present
if not os.path.exists(os.path.dirname(os.path.realpath(config_file))):
... | 140 | 23.68 | 87 | 16 | 740 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_10ec0e064f309ec9_5feaeafd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
42
] | [
null
] | [
11
] | [
37
] | |
2024-11-18T19:44:40.036588+00:00 | 1,526,876,344,000 | 6614152b86d1227031eeb366d3670e752280201c | 3 | {
"blob_id": "6614152b86d1227031eeb366d3670e752280201c",
"branch_name": "refs/heads/master",
"committer_date": 1526876344000,
"content_id": "3f8701c80e121902580a5167031a126311fb432b",
"detected_licenses": [
"MIT"
],
"directory_id": "be6325e3959ec1cc5db0a97ead0618a120df5737",
"extension": "py",
"fi... | 2.78125 | stackv2 | """ User Managment API """
import json, re
from flask import jsonify, request
from flask_restful import Resource
from aaxus import rest_api
from flask_restful import Resource, reqparse
from flask_jwt_extended import jwt_required, get_jwt_identity
from aaxus.models.user import User
parser = reqparse.RequestParser()
par... | 129 | 41.42 | 102 | 22 | 1,068 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3fb544c15cea7399_b31462f7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
68
] | [
null
] | [
24
] | [
35
] | |
2024-11-18T19:57:58.151672+00:00 | 1,515,688,260,000 | 7cd1c60b8b00fee70cccf5dbc8e4cbe3689a434c | 3 | {
"blob_id": "7cd1c60b8b00fee70cccf5dbc8e4cbe3689a434c",
"branch_name": "refs/heads/master",
"committer_date": 1515688260000,
"content_id": "9e39971141cab340818f99774ffead3d35022c0b",
"detected_licenses": [
"MIT"
],
"directory_id": "b9a8f866f6d84b782fe7db0c6bcc926c0d3266d8",
"extension": "py",
"fi... | 2.625 | stackv2 | # -*- coding: utf-8 -*-
import base64
import hashlib
import os
import smbpasswd
from cherrypy.process import wspbus, plugins
__all__ = ['PasswordEnginePlugin']
class PasswordEnginePlugin(plugins.SimplePlugin):
"""
The PasswordEnginePlugin is used to generate hashes for supported
algorithms in the LDAP s... | 56 | 26.77 | 90 | 17 | 357 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7f56ba8f228f11eb_051983b8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
52
] | [
null
] | [
34
] | [
38
] | |
2024-11-18T19:58:28.081619+00:00 | 1,623,723,447,000 | 6a2a5b8c86b9bd7a71db4a539d6f8b065d2aaf7c | 3 | {
"blob_id": "6a2a5b8c86b9bd7a71db4a539d6f8b065d2aaf7c",
"branch_name": "refs/heads/main",
"committer_date": 1623723447000,
"content_id": "ef0084c8dd2c624a690daad7a5334afdff1c8c24",
"detected_licenses": [
"MIT"
],
"directory_id": "ac4f4db6e8be59551fbca6789ac49c088ae66a84",
"extension": "py",
"file... | 2.859375 | stackv2 | # General utility functions for all parts of the pipeline
import os
import shutil as sh
import sys
import time
import warnings
import subprocess
import datetime
DATETIME_FORMAT = '%Y%m%d'
def printf(str):
"""Calls print on given argument and then flushes
stdout buffer to ensure printed message is displayed r... | 413 | 29.7 | 158 | 16 | 3,040 | python | [{"finding_id": "codeql_py/overly-permissive-file_5f5c0f2faee4baca_e551396e", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
69
] | [
null
] | [
13
] | [
38
] | |
2024-11-18T20:10:09.265369+00:00 | 1,619,442,662,000 | e9316af3bc40bd6e53aac99d6506d3e0fa0260f7 | 3 | {
"blob_id": "e9316af3bc40bd6e53aac99d6506d3e0fa0260f7",
"branch_name": "refs/heads/master",
"committer_date": 1619442662000,
"content_id": "7cb2b182141b0e2b3e74244d8f98562b04a0eed9",
"detected_licenses": [
"MIT"
],
"directory_id": "152ebad48730a9cf32090f3cc540afb61e8ab497",
"extension": "py",
"fi... | 3.328125 | stackv2 | import re
from typing import Callable, List, Union
from inspect import getmembers, isfunction
import importlib
from RecordMapper.builders import BuiltinFunctions
class InvalidFunctionError(Exception):
"""
An exception that represents an invalid string reference for a function.
"""
pass
class Fu... | 98 | 39.12 | 113 | 15 | 808 | python | [{"finding_id": "codeql_py/overly-large-range_f2499292cf36b402_32964643", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class, and is equivalent to \\['... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\w in the same character class, and is equivalent to \\['()*+,\\-.\\/0-9:\\]."
] | [
33
] | [
null
] | [
59
] | [
62
] | |
2024-11-18T20:23:11.041444+00:00 | 1,538,240,695,000 | 5fdc7cc8c6485892e277e4dd08f44f3dcd421de0 | 3 | {
"blob_id": "5fdc7cc8c6485892e277e4dd08f44f3dcd421de0",
"branch_name": "refs/heads/master",
"committer_date": 1538240695000,
"content_id": "d44094797c31c91778a35f1ed0072b40f0b743b7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ea20d0c2cc3a1d1aecc490c6a7536034e2e22484",
"extension": "py"... | 2.765625 | stackv2 | import json
import re
from http.server import HTTPServer, BaseHTTPRequestHandler
from actuator import actuator
def date_to_ms(date):
return 999
def ms_to_date(milliseconds):
return 'foo GMT'
hdr_map = [
('request_id', 'X-Correlation-ID'),
('from', 'Authorization'),
('to', 'To')
]
class HamHa... | 66 | 29 | 99 | 15 | 536 | python | [{"finding_id": "codeql_py/polynomial-redos_0e7bea64f5e1fd04_f7706073", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma... | 1 | true | [
"CWE-1333"
] | [
"py/polynomial-redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'."
] | [
44
] | [
null
] | [
48
] | [
68
] | |
2024-11-18T20:49:26.531277+00:00 | 1,631,104,864,000 | 572f8275a30ef495d24a74f4092e480ed2115772 | 3 | {
"blob_id": "572f8275a30ef495d24a74f4092e480ed2115772",
"branch_name": "refs/heads/main",
"committer_date": 1631104864000,
"content_id": "fbcf09b0b8de1a5ec6972ef379f5b09495b2009c",
"detected_licenses": [
"MIT"
],
"directory_id": "c0e7bf4e499b5c7e824a67e4cc5a430669917178",
"extension": "py",
"file... | 3.453125 | stackv2 | # Load input file
f = open('day2_input.txt', 'r')
inputStrings = f.read().split('\n')[:-1]
# Set vars
numPasscodes = len(inputStrings)
numCodesPartTwo = 0
# Loop trough passwords
for passString in inputStrings:
passList = passString.split(" ")
passRangeTemp = passList[0].split("-")
passRange = [int(i) for... | 35 | 24.77 | 110 | 10 | 276 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4b45e1925becf368_1b10e6c3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
32
] | [
null
] | [
7
] | [
32
] | |
2024-11-18T20:49:38.228968+00:00 | 1,474,486,532,000 | 9e4a46f7bc6773649e51f3b523fa8aaa10f52062 | 2 | {
"blob_id": "9e4a46f7bc6773649e51f3b523fa8aaa10f52062",
"branch_name": "refs/heads/master",
"committer_date": 1474486532000,
"content_id": "528c14fcd0d1b09208689ff30defd86084e2a099",
"detected_licenses": [
"MIT"
],
"directory_id": "edcd3847115ae76b68195bdda54e04ed06a04318",
"extension": "py",
"fi... | 2.3125 | stackv2 | import json
from dateutil.parser import parse as parse_date
from django.contrib.contenttypes.models import ContentType
from django.core.cache import cache
from django.http import Http404
from django.utils import timezone, dateparse
from rest_framework import viewsets
from rest_framework.permissions import IsAdminUse... | 204 | 34.51 | 122 | 18 | 1,485 | python | [{"finding_id": "codeql_py/stack-trace-exposure_8d06484a3fbf9dd2_6f361c5e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
138
] | [
null
] | [
13
] | [
21
] | |
2024-11-18T20:49:41.248262+00:00 | 1,619,314,241,000 | 24842d8ceaee738f36e389af1367fd4ea2a3c25f | 2 | {
"blob_id": "24842d8ceaee738f36e389af1367fd4ea2a3c25f",
"branch_name": "refs/heads/master",
"committer_date": 1619314241000,
"content_id": "71c8f8f2acf5f43b286f431b1c672baef16a0898",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ce735585440c77569bdfb4cad59802b846b8ea0e",
"extension": "py"... | 2.359375 | stackv2 | from flask import Flask, jsonify, request, current_app
from functools import wraps
from werkzeug.routing import BaseConverter
from werkzeug.contrib.fixers import ProxyFix
import yaml
import re
import datetime
import logging
import os
import sys
import Queue
import threading
# Configuration and static variables
def op... | 187 | 30.86 | 79 | 17 | 1,349 | python | [{"finding_id": "codeql_py/log-injection_89e5041e854a025a_f55dee29", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
148
] | [
null
] | [
40
] | [
52
] | |
2024-11-18T20:50:28.545173+00:00 | 1,596,214,886,000 | a4767508011cae4e32c5feb163814f6c2d6c3c12 | 3 | {
"blob_id": "a4767508011cae4e32c5feb163814f6c2d6c3c12",
"branch_name": "refs/heads/master",
"committer_date": 1596214886000,
"content_id": "8fc90e7f5bc20afc4920a488526e9cecd4cfb672",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "227d6243a236cb5c210e2918ac59049de2ad2fad",
"extension": "p... | 2.75 | stackv2 | import hashlib
from DB import Query
class Credentials:
@staticmethod
def passwordHasher(username, passwd):
query = Query()
shaObj = hashlib.sha256()
shaObj.update(passwd.encode())
print(shaObj.hexdigest())
result = query.userValidate(username, shaObj.hexdigest())
... | 44 | 28.5 | 83 | 13 | 280 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1155930ae9ff3a70_a09f10a2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
9,
26
] | [
null,
null
] | [
23,
23
] | [
38,
38
] | |
2024-11-18T20:50:29.922704+00:00 | 1,633,938,367,000 | 48a3d05ef9a89953cefb33a22f26fd4f7423cc87 | 3 | {
"blob_id": "48a3d05ef9a89953cefb33a22f26fd4f7423cc87",
"branch_name": "refs/heads/master",
"committer_date": 1633938377000,
"content_id": "9993ceda13c23cb0fd2ef16451f415a2671558fc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d7fa504c3426d9bb2e3237858cf5349a79d3b0ae",
"extension": "py"... | 2.515625 | stackv2 | import os.path
import logging
from jinja2 import FileSystemLoader, Environment, exceptions
logger = logging.getLogger(__name__)
def render(charm_dir, source, context):
"""
Render a template.
The context should be a dict containing the values to be replaced in the
template.
"""
templates_dir ... | 24 | 28 | 76 | 12 | 143 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_10bbe3b73fbbf4cd_963e32f6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
16
] | [
null
] | [
20
] | [
71
] | |
2024-11-18T20:50:38.605189+00:00 | 1,692,107,468,000 | 6d750e89b06318b214831ace72ca360e36502c5f | 2 | {
"blob_id": "6d750e89b06318b214831ace72ca360e36502c5f",
"branch_name": "refs/heads/master",
"committer_date": 1692107468000,
"content_id": "ccfc609a7a41f0da3a05de42924f0c17eb86a03b",
"detected_licenses": [
"MIT"
],
"directory_id": "8454441f899c3beb9fcea26cffc2f4c3cf75ff6a",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/env python3
import sys
import time
import getpass
import paramiko
import string
ssh = paramiko.SSHClient()
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
ssh.connect('109.233.57.94',
username='dockesc',
password='B9Go9eGS')
shell = ssh.invoke_shell()
# shell.settimeout(0.... | 48 | 22.71 | 76 | 16 | 308 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_bfabc7cdad1ca821_973342a2", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
10
] | [
null
] | [
null
] | [
58
] | |
2024-11-18T20:50:52.284521+00:00 | 1,620,160,061,000 | 3131fdd19e286f8473706a359b04e61c9ff1112d | 3 | {
"blob_id": "3131fdd19e286f8473706a359b04e61c9ff1112d",
"branch_name": "refs/heads/main",
"committer_date": 1620160061000,
"content_id": "ba9d2a1801107a9278dc40b6344cf7ce7615012e",
"detected_licenses": [
"MIT"
],
"directory_id": "885b63cc836f4d8f95247d8407096c7053b30c26",
"extension": "py",
"file... | 2.875 | stackv2 | """API functions"""
import requests
import os
import datetime
import pandas as pd
from pickle import load
from fastapi import APIRouter, HTTPException, Depends
from pydantic import BaseModel, BaseSettings, SecretStr
from bs4 import BeautifulSoup
from app.ml import City, validate_city
from app.data.files.state_abbr imp... | 320 | 29.54 | 149 | 16 | 2,284 | python | [{"finding_id": "codeql_py/partial-ssrf_4d75cb8df4c94fb5_367758bf", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
97
] | [
null
] | [
16
] | [
33
] | |
2024-11-18T20:50:55.994607+00:00 | 1,622,321,349,000 | cc742ef42113959bc2004b7b4142c59fbb3b7f6d | 3 | {
"blob_id": "cc742ef42113959bc2004b7b4142c59fbb3b7f6d",
"branch_name": "refs/heads/main",
"committer_date": 1622321349000,
"content_id": "8797d00a9f6d86bb2213d1d67bec4fe06ad20372",
"detected_licenses": [
"MIT"
],
"directory_id": "f9bd964e087ca2987c302ea51b22585c73dd6be9",
"extension": "py",
"file... | 2.5625 | stackv2 | import re
import string
from contractions import CONTRACTION_MAP
from collections import Counter
from spacy.lang.en.stop_words import STOP_WORDS
import numpy as np
import torch
import random
def initialize():
torch.manual_seed(0)
np.random.seed(0)
random.seed(0)
def expand_contractions(text):
contra... | 103 | 27.28 | 90 | 15 | 757 | python | [{"finding_id": "codeql_py/overly-large-range_1e8bad12956fb1cd_16f5c0bd", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range ... | [
53,
53,
53,
53
] | [
null,
null,
null,
null
] | [
34,
37,
40,
49
] | [
38,
41,
44,
53
] | |
2024-11-18T20:51:12.867038+00:00 | 1,544,615,245,000 | 928d14ca7e31f624d81c081096ccb531a3bf9721 | 3 | {
"blob_id": "928d14ca7e31f624d81c081096ccb531a3bf9721",
"branch_name": "refs/heads/master",
"committer_date": 1544615245000,
"content_id": "6719e18826af5698f3a3c9b73b888ad6b860ab9e",
"detected_licenses": [
"MIT"
],
"directory_id": "fd1be7a6a93b8467b25c281f07dd879db64bfb32",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/env python
import argparse
try:
import ConfigParser
except ImportError:
import configparser as ConfigParser
from jinja2 import Environment, FileSystemLoader
parser = argparse.ArgumentParser(description='Get variables from config file and update input file')
parser.add_argument('-c', '--config', re... | 24 | 31.88 | 112 | 12 | 166 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_136bc6cb1447182d_e7b108c9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
19
] | [
null
] | [
7
] | [
89
] | |
2024-11-18T21:13:47.785551+00:00 | 1,559,811,670,000 | f223977f3ddc0c5baebfd207dcbc0789f13379b7 | 2 | {
"blob_id": "f223977f3ddc0c5baebfd207dcbc0789f13379b7",
"branch_name": "refs/heads/master",
"committer_date": 1559811670000,
"content_id": "4e8e4129594b1c4828272a6c285a0b1b83f88f3d",
"detected_licenses": [
"MIT"
],
"directory_id": "5da8533a6896e11f24825c0c727ead460d517cc7",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/python3.6
"""
Generates static site from CodeCommit source and deploys to production S3 Bucket
Many thanks to MMusket and Alestic from which i adapted their code.
https://github.com/mmusket/s3-hosting-guide
https://github.com/alestic/aws-lambda-codepipeline-site-generator-hugo
"""
from __future__ import pri... | 174 | 34.95 | 116 | 14 | 1,495 | python | [{"finding_id": "codeql_py/overly-permissive-file_7ae8853b0a696d0d_62c92509", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
89
] | [
null
] | [
5
] | [
29
] | |
2024-11-18T21:13:52.523848+00:00 | 1,571,908,514,000 | 5f4c1e43fed967ca067fb802bb7c1511ed9e9b22 | 3 | {
"blob_id": "5f4c1e43fed967ca067fb802bb7c1511ed9e9b22",
"branch_name": "refs/heads/master",
"committer_date": 1571908514000,
"content_id": "3329321e7135b2f94a62c8af5405b18637fda8ee",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "113226d1db872a013e85c3ca355f20159bcbd3d5",
"extension": "py"... | 2.890625 | stackv2 | # -*- coding: utf-8 -*-
# @Time : 2019/9/27 12:32
# @Author :
# @Site :
# @File : CodeGeneratorCore.py
# @Software: PyCharm
import os
from jinja2 import Environment, FileSystemLoader
class CoreCodeGenerator(object):
def __init__(self, template_dir):
self.jinja = None
self.template_dir = tem... | 64 | 25.12 | 76 | 15 | 401 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_cd05d0a8fe55e072_e19dedd9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
29
] | [
null
] | [
22
] | [
77
] | |
2024-11-18T21:14:10.896961+00:00 | 1,586,877,692,000 | 8ab137d91c4baa94c458cb40e7c65ff4f0984925 | 3 | {
"blob_id": "8ab137d91c4baa94c458cb40e7c65ff4f0984925",
"branch_name": "refs/heads/master",
"committer_date": 1586877692000,
"content_id": "b839b6bdc59cbf7c465b3a05bdb30f3a011c165c",
"detected_licenses": [
"MIT"
],
"directory_id": "8bcb090f8645378dcec756424ccc64e608580528",
"extension": "py",
"fi... | 2.515625 | stackv2 | import os
import sys
import random
import string
import subprocess
DOCKER_COMPOSE_PATH = "/srv/deployment/docker-compose.yml"
class DeployService:
def __init__(self):
self.fetchDockerComposeServices()
self.checkDockerComposeFile()
self.loginEnabled = False
def fetchDockerCom... | 74 | 36.22 | 130 | 17 | 598 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3b06a91c9b9520dc_dd51933d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text."
] | [
49
] | [
null
] | [
19
] | [
22
] | |
2024-11-18T21:14:18.052103+00:00 | 1,635,079,698,000 | 672e38b959cdf56b1d96317e21914944195db36a | 2 | {
"blob_id": "672e38b959cdf56b1d96317e21914944195db36a",
"branch_name": "refs/heads/master",
"committer_date": 1635081679000,
"content_id": "2f7ec5a0824990fa30180a9452d5aea565cc1c4e",
"detected_licenses": [
"MIT"
],
"directory_id": "d22f8cd1a834f706d2c0cd77a814414cb4650265",
"extension": "py",
"fi... | 2.5 | stackv2 | import base64
import os
from dataclasses import dataclass, field
from hashlib import sha3_512
import pymongo
from common import datatypes
from common.document import Document, DocumentDefaults
@dataclass
class AccountDefaults(DocumentDefaults):
last_server: Int8 = None
last_character: Int32 = None
salt:... | 76 | 26.08 | 96 | 19 | 470 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_3677a38c2a526832_0dce2842", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA3512) that is i... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA3512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA3512) that is insecure for password hashing, since it is not a computationally... | [
54,
66
] | [
null,
null
] | [
51,
53
] | [
75,
77
] | |
2024-11-18T21:14:41.989265+00:00 | 1,619,629,925,000 | 9fb7620bffd4a8347cf58b0c6836c9d67c39f9cf | 3 | {
"blob_id": "9fb7620bffd4a8347cf58b0c6836c9d67c39f9cf",
"branch_name": "refs/heads/master",
"committer_date": 1619629925000,
"content_id": "473a2cceafe3ebc425c75e9d281bcc51b3e2eba7",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "c1e3edd93807e06299bc9443a1d71a5e04220c51",
"extension": "p... | 3.1875 | stackv2 | #!/usr/bin/env python3
from os import path
import sqlite3
from sys import argv
# Usage:
# ./user-lookup.py <USER> <PASSWORD>
# Look up the secret word for the given user, assuming the given password is
# correct. Reset the database by deleting the file "users.db".
DB_FILE = "users.db"
if not path.exists(DB_FILE):
... | 41 | 20.56 | 76 | 9 | 228 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_898c308870f658bd_8901e950", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
38
] | [
null
] | [
11
] | [
30
] | |
2024-11-18T21:14:44.528986+00:00 | 1,604,074,443,000 | 7bd32891a0325694dbf5324bb8d1a5cedcb12358 | 3 | {
"blob_id": "7bd32891a0325694dbf5324bb8d1a5cedcb12358",
"branch_name": "refs/heads/master",
"committer_date": 1604074443000,
"content_id": "67d3a8ab745ff0edd01fdf1dd9650b5cd05d46d4",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "17b660ab0b2f1ae3552dc003e0b84e88e9d3350c",
"extension": "p... | 2.71875 | stackv2 | """
abc-classroom.distribute
========================
Take a template directory and distribute it
"""
import os
import subprocess
import jinja2
# current directory
HERE = os.path.dirname(os.path.abspath(__file__))
def find_notebooks(base_path):
"""Find all notebooks below base_path and return path to them"""
... | 62 | 24.05 | 78 | 16 | 346 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4a1c72512815db27_17b049b1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
34
] | [
null
] | [
9
] | [
34
] | |
2024-11-18T20:10:35.114368+00:00 | 1,540,952,731,000 | 66cde5d27fed71b6eb202e26bdee5bcc775477b0 | 3 | {
"blob_id": "66cde5d27fed71b6eb202e26bdee5bcc775477b0",
"branch_name": "refs/heads/master",
"committer_date": 1540952731000,
"content_id": "8811c8fb6c9665fa88359e7023bd69d78283d383",
"detected_licenses": [
"MIT"
],
"directory_id": "b247cd521420ae9206dd744b8a8c7abe49f2c3c4",
"extension": "py",
"fi... | 2.859375 | stackv2 | ###
import utils
import re
import itertools
import numpy as np
from sklearn.model_selection import train_test_split as sklearn_train_test_split
from keras.preprocessing.sequence import pad_sequences
def preprocessing(data_df, is_training):
### Create embedding matrix
def text_wordlist(text):
"""
... | 144 | 33.9 | 88 | 19 | 1,318 | python | [{"finding_id": "codeql_py/overly-large-range_ddc1e234ff93f762_27ad715e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=\\]."
] | [
22
] | [
null
] | [
43
] | [
46
] | |
2024-11-18T20:10:55.354739+00:00 | 1,617,998,526,000 | bc058e104d80a7ef11f3bb9904b6ffc6d078e5ef | 3 | {
"blob_id": "bc058e104d80a7ef11f3bb9904b6ffc6d078e5ef",
"branch_name": "refs/heads/master",
"committer_date": 1617998625000,
"content_id": "8227b19f2e9fcafcc6653264b13f6552826e1561",
"detected_licenses": [
"MIT"
],
"directory_id": "6a7066c0f05de9df4adda0e542a6de4e067e2c05",
"extension": "py",
"fi... | 2.5625 | stackv2 | from base64 import standard_b64encode
from flask import Flask, jsonify, redirect, render_template, request
from predict import get_prediction
from transform import thumbnailify_image, draw_bounding_boxes, img_from_ndarray, imgdata_from_ndarray
app = Flask(__name__)
@app.route('/', methods=['GET', 'POST'])
def uploa... | 66 | 37.59 | 140 | 17 | 603 | python | [{"finding_id": "codeql_py/stack-trace-exposure_c8d02a8a465cc0d2_08005356", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-209",
"CWE-601",
"CWE-601"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provid... | [
22,
59,
16,
53
] | [
null,
null,
null,
null
] | [
28,
28,
29,
29
] | [
79,
79,
40,
40
] | |
2024-11-18T21:11:51.894572+00:00 | 1,595,592,683,000 | a2cc5493bf34bbcdf2dcfc94eec2a8d5dc03d1c6 | 4 | {
"blob_id": "a2cc5493bf34bbcdf2dcfc94eec2a8d5dc03d1c6",
"branch_name": "refs/heads/master",
"committer_date": 1595592683000,
"content_id": "fd04bff696a08c777299621f8dee5c78b138ba9f",
"detected_licenses": [
"MIT"
],
"directory_id": "f891182f29b1f7f195b5b87c94e5f9a58cd96b5a",
"extension": "py",
"fi... | 3.9375 | stackv2 | # program used to check if password is present in pwned database
#used pwned api
import hashlib
import requests
"""Returns number of times password was seen in pwned database.
Args:
password: password to check
Returns:
count: number of times the password was seen in the pwned database.
... | 47 | 23.51 | 84 | 15 | 287 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0cbea1046c743d39_cab3ecc2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that i... | [
42,
20
] | [
null,
null
] | [
9,
27
] | [
64,
51
] | |
2024-11-18T21:25:55.879539+00:00 | 1,426,279,497,000 | 5fe516b43f53d30857cd6fda7e6e2067a4c06ae8 | 3 | {
"blob_id": "5fe516b43f53d30857cd6fda7e6e2067a4c06ae8",
"branch_name": "refs/heads/master",
"committer_date": 1426279497000,
"content_id": "6d8c1fe11047e54fa8f539ca4e42ad4b26af6b12",
"detected_licenses": [
"MIT"
],
"directory_id": "53218b16d6aa0e6fefee2de272f4221e73b3c2d6",
"extension": "py",
"fi... | 2.65625 | stackv2 | import arrow
import jinja2
import json
if __name__ == "__main__":
# Load the template
template_loader = jinja2.FileSystemLoader('.')
template_env = jinja2.Environment(loader=template_loader)
index_template = template_env.get_template('index.tpl.html')
# Load the delays
with open('dela... | 57 | 31.49 | 71 | 17 | 406 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d2bb8e90c64454e9_c4718364", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
9
] | [
null
] | [
20
] | [
62
] | |
2024-11-18T21:26:04.851083+00:00 | 1,429,354,017,000 | 466fb6f1a9428f405629f2cdbf52bd7b2bd7607e | 2 | {
"blob_id": "466fb6f1a9428f405629f2cdbf52bd7b2bd7607e",
"branch_name": "refs/heads/master",
"committer_date": 1429354017000,
"content_id": "1c27ec7f951d07e917478ed051571f5f4dbc3ee7",
"detected_licenses": [
"MIT"
],
"directory_id": "469dee03907f000a5d99ca3fca41a312f69ce291",
"extension": "py",
"fi... | 2.359375 | stackv2 | """Code to push events to users."""
import logging
import flask
import pusher
from google.appengine.api import namespace_manager
from google.appengine.ext import ndb
from common import public_creds
from appengine import pusher_client, rest
# pylint: disable=invalid-name
blueprint = flask.Blueprint('pushrpc', __nam... | 183 | 29.5 | 77 | 14 | 1,344 | python | [{"finding_id": "codeql_py/log-injection_dee21070a5d8cf43_ab2f24f8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
60,
107,
135
] | [
null,
null,
null
] | [
49,
44,
65
] | [
55,
52,
77
] | |
2024-11-18T21:51:44.238115+00:00 | 1,621,805,076,000 | 089120813c98fba4e1386addf0f2da3a647bda73 | 3 | {
"blob_id": "089120813c98fba4e1386addf0f2da3a647bda73",
"branch_name": "refs/heads/master",
"committer_date": 1621805076000,
"content_id": "7f020c399a747575f1f1a691c2fc58ff42bcf4b2",
"detected_licenses": [
"MIT"
],
"directory_id": "e639315f446f344a320811b75264659e758920c2",
"extension": "py",
"fi... | 2.5625 | stackv2 | import streamlit as st
import pandas as pd
import json
import os
from datetime import datetime
import dicescoring
import numpy as np
import io
# from sklearn.metrics import (accuracy_score, auc, f1_score, precision_score, recall_score,
# mean_absolute_error, mean_squared_error, r2_score)
s... | 110 | 42.85 | 136 | 21 | 1,069 | python | [{"finding_id": "codeql_py/path-injection_7a20548954870160_e54d3538", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
72
] | [
null
] | [
27
] | [
46
] | |
2024-11-18T21:51:47.569910+00:00 | 1,554,504,134,000 | 05e60a1b004d2d8d479d13fcdc8203cf91f54224 | 3 | {
"blob_id": "05e60a1b004d2d8d479d13fcdc8203cf91f54224",
"branch_name": "refs/heads/master",
"committer_date": 1554504134000,
"content_id": "e4c6be08cf38bc65819ee10df162072d722e68db",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6c0625e2a550b28be0769e9a47131f239e7012e3",
"extension": "py"... | 2.640625 | stackv2 | # -*- coding: utf-8 -*-
# Copyright 2019, Paul B. Monday
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable l... | 62 | 27.13 | 80 | 13 | 428 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a08eaad9b921454c_ba6f9238", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
44,
54
] | [
null,
null
] | [
11,
11
] | [
12,
12
] | |
2024-11-18T21:52:17.374164+00:00 | 1,553,947,852,000 | 37a91b4720b8d0ac45212675c2ff0061e012bffd | 3 | {
"blob_id": "37a91b4720b8d0ac45212675c2ff0061e012bffd",
"branch_name": "refs/heads/master",
"committer_date": 1553947852000,
"content_id": "5737d47a6dec7c3c6888ca703069c0a432b60436",
"detected_licenses": [
"MIT"
],
"directory_id": "19ba74fb79e6d850b72bbd7b1cb45cfc4778a4a0",
"extension": "py",
"fi... | 3.015625 | stackv2 | """
Make a smaller bibliography for all those proposals. To run simply use:
> bibchen path/to/file.tex
"""
import os
import argparse
import subprocess
# Define the acceptable fontsizes. TODO: Accept a number too?
fontsizes = ['Huge', 'huge', 'LARGE', 'Large', 'large', 'normalsize',
'small', 'footnotesi... | 160 | 34.23 | 78 | 15 | 1,466 | python | [{"finding_id": "codeql_py/overly-permissive-file_d9d5dc2cf90fb9b9_4ec2c0ed", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable.",
"Overly permissive mask in chmod sets file to world readable."
] | [
84,
148
] | [
null,
null
] | [
5,
5
] | [
33,
33
] | |
2024-11-18T21:52:24.979728+00:00 | 1,507,164,480,000 | 13d5220c3f0581e3b45856fa1c26ed2771010af1 | 3 | {
"blob_id": "13d5220c3f0581e3b45856fa1c26ed2771010af1",
"branch_name": "refs/heads/master",
"committer_date": 1507164480000,
"content_id": "3e84cc1068601ab97c079d43639f6adbdfebdf39",
"detected_licenses": [
"MIT"
],
"directory_id": "38e13c018a6ce591199ed3792d21956d2bab470d",
"extension": "py",
"fi... | 2.609375 | stackv2 | import youtube_dl
from pymongo import MongoClient
from flask import Flask, request
import time
import json
app = Flask(__name__)
ydl_opts={}
client = MongoClient()
db = client.rXive
@app.route("/")
def index():
return "Hello, world"
@app.route("/getlink", methods=["POST","GET"])
def url_post_handle():
if req... | 39 | 23 | 66 | 14 | 230 | python | [{"finding_id": "codeql_py/flask-debug_2d4e1d097a2b8a80_0ee2a953", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
39,
20
] | [
null,
null
] | [
5,
16
] | [
24,
40
] | |
2024-11-18T21:52:30.405992+00:00 | 1,613,975,265,000 | 5d02555a7ea74f29825ed320c3e4235c26335ea7 | 3 | {
"blob_id": "5d02555a7ea74f29825ed320c3e4235c26335ea7",
"branch_name": "refs/heads/main",
"committer_date": 1613975265000,
"content_id": "bf6cfd33e2b323ec41a53611ae5c552c88a3eaec",
"detected_licenses": [
"MIT"
],
"directory_id": "718ab122e93039871d4a009c7444a5e3e7e9eed6",
"extension": "py",
"file... | 2.625 | stackv2 | #!/usr/bin/python3
import logging, time, os, subprocess
from systemd import journal
import RPi.GPIO as GPIO
# constants
LEVER_PIN = 4
LOG_FILE = '/var/log/veni-sh/remote_access-block.log'
SSH_TUNNEL_CMD = ['/usr/bin/ssh', '-N', '-F', '/home/veni-sh/.ssh/config', 'sanvewxyz-rpi-veni000-ssh-tunnel']
SSH_TUNNEL_CONNECT_... | 79 | 27.48 | 110 | 16 | 562 | python | [{"finding_id": "codeql_py/overly-permissive-file_9e9757e7cf93ef2a_d0ac4dab", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to group readable."
] | [
20
] | [
null
] | [
null
] | [
26
] | |
2024-11-18T21:00:04.940244+00:00 | 1,678,033,293,000 | 210870f675d9be99d3b2f52f8e5a4042e9254044 | 3 | {
"blob_id": "210870f675d9be99d3b2f52f8e5a4042e9254044",
"branch_name": "refs/heads/master",
"committer_date": 1678033293000,
"content_id": "7e5c15a07bea4d059d8a1b87b69b293c850624ad",
"detected_licenses": [
"MIT"
],
"directory_id": "561f1571906c68e5ea09b6b2400821f47e2dd0b8",
"extension": "py",
"fi... | 3.078125 | stackv2 | #!/usr/bin/python3
from bs4 import BeautifulSoup
import requests
import platform
import sys
import re
import os
MAC_URL = "http://standards-oui.ieee.org/oui.txt"
def usage():
print("Usage: MACLookup [MAC ADDRESS]")
print("\nAccepted formats:"
"\n\t- MACLookup FC:FB:FB:01:FA:21"
"\n\t- MAC... | 68 | 30.16 | 88 | 16 | 557 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0b6affac548c0de4_abf8b985", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
65
] | [
null
] | [
19
] | [
38
] | |
2024-11-18T21:10:28.171557+00:00 | 1,439,391,453,000 | 06606c1679c10609820710b57e49e4d0576157b5 | 2 | {
"blob_id": "06606c1679c10609820710b57e49e4d0576157b5",
"branch_name": "refs/heads/master",
"committer_date": 1439391453000,
"content_id": "03bee0ced2b8db9d23917777c4a049cf7dcd2319",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "f84f2212eed70db49f5165d68c4625062936644e",
"extension": "p... | 2.40625 | stackv2 | """
Copyright (c) 2015 Red Hat, Inc
All rights reserved.
This software may be modified and distributed under the terms
of the BSD license. See the LICENSE file for details.
"""
import json
import argparse
import pkg_resources
from base64 import b64encode
def generate_json(args):
with open(args.cert, "r") as fpc... | 71 | 29.06 | 90 | 18 | 436 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_284f61d108bb7ecb_95043b2a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
30
] | [
null
] | [
11
] | [
43
] | |
2024-11-18T21:10:29.214413+00:00 | 1,693,598,748,000 | e986d3fedca92f087d3809c13a95b48adea026ca | 2 | {
"blob_id": "e986d3fedca92f087d3809c13a95b48adea026ca",
"branch_name": "refs/heads/master",
"committer_date": 1693598748000,
"content_id": "948e1f985c3d4e4825952c69910bb7a5be651c94",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2cdfd562d865036e6f0862c9f377dd1e88e2eb32",
"extension": "py"... | 2.453125 | stackv2 | #!/usr/bin/env python3
"""
Quick script for ingesting LiLT metadata.
Author: Matt Post
July 2020
"""
import csv
import lxml.etree as etree
import os
import shutil
import sys
import anthology
from anthology.utils import make_simple_element, indent, compute_hash_from_file
from normalize_anth import normalize
from likel... | 124 | 34.08 | 93 | 18 | 984 | python | [{"finding_id": "codeql_py/overly-permissive-file_9fdd29f718ad8dc7_e8ec880e", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
98
] | [
null
] | [
13
] | [
39
] | |
2024-11-18T21:10:29.861661+00:00 | 1,384,897,808,000 | ff349b1d71eff5b31bede22ad91b49927f825fb2 | 3 | {
"blob_id": "ff349b1d71eff5b31bede22ad91b49927f825fb2",
"branch_name": "refs/heads/master",
"committer_date": 1384897808000,
"content_id": "fe28b2c7f285d4412e5062c6216c868fdaef346a",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "99fe041f58bf5d60729172945261e6d13d847e62",
"extension": "p... | 2.53125 | stackv2 | # -*- coding: utf-8 -*-
"""
---------------------------
volt.plugin.builtins.atomic
---------------------------
Atom feed generator plugin.
:copyright: (c) 2012 Wibowo Arindrarto <bow@bow.web.id>
:license: BSD
"""
from __future__ import with_statement
import os
import sys
from datetime import datetime
from jinja2 ... | 96 | 28.64 | 84 | 17 | 628 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_212a84745ea895bb_7c75032e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
81
] | [
82
] | [
15
] | [
72
] | |
2024-11-18T21:10:34.421763+00:00 | 1,619,524,079,000 | 8bcf42adcd4c0151a9ab385ad0895b0e53586187 | 2 | {
"blob_id": "8bcf42adcd4c0151a9ab385ad0895b0e53586187",
"branch_name": "refs/heads/master",
"committer_date": 1619524079000,
"content_id": "af3938c10e454613039f09a8632bb87599e0dfd3",
"detected_licenses": [
"MIT"
],
"directory_id": "6c978a74e94771c37b387b9ed7b09411dffe814d",
"extension": "py",
"fi... | 2.5 | stackv2 | import numpy as np
import sys
import config
from packageopt import *
ARGS = sys.argv[1:] # ticker date
_SECCODES = list(np.unique(ARGS[::2]))
_DATES = list(np.unique([int(x) for x in ARGS[1::2]]))
HYPERPARAMS = {
'DATE_INITIAL': 20190603, # initial date of start calculation
'TIME_INITIAL': 11000000... | 190 | 44.46 | 140 | 22 | 2,074 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_65de34741c8ed3ea_230448fc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
185
] | [
null
] | [
19
] | [
26
] | |
2024-11-18T21:10:49.748812+00:00 | 1,574,806,421,000 | 30dfdd5b95ce815c8eba40defdecf9e1c13b752f | 2 | {
"blob_id": "30dfdd5b95ce815c8eba40defdecf9e1c13b752f",
"branch_name": "refs/heads/master",
"committer_date": 1574806421000,
"content_id": "45be5ee19b26bad5fc2227c8d743860dd58e6b7f",
"detected_licenses": [
"MIT"
],
"directory_id": "a36b2939b42064bc5c45a6951136d8bd55891d3d",
"extension": "py",
"fi... | 2.3125 | stackv2 | from flask import Flask, render_template, url_for, flash, redirect, request, jsonify
from sqlalchemy import create_engine
from sqlalchemy.orm import sessionmaker
from db_setup import Base, Plant, Device
import psutil
import datetime
import water
import os
app = Flask(__name__, static_url_path='/static')
# Connect to ... | 398 | 31.2 | 112 | 19 | 2,808 | python | [{"finding_id": "codeql_py/flask-debug_dc8751968cf4eca4_05963ecf", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a ... | [
398,
177,
309,
312
] | [
null,
null,
null,
null
] | [
5,
16,
16,
16
] | [
50,
33,
84,
32
] | |
2024-11-18T21:10:51.858324+00:00 | 1,565,212,670,000 | 236673ec6cd33a8818bb9f9d3841f39906a0cf50 | 2 | {
"blob_id": "236673ec6cd33a8818bb9f9d3841f39906a0cf50",
"branch_name": "refs/heads/master",
"committer_date": 1565212670000,
"content_id": "8fd4bd4b3822b819ea7a04731baf4144cc125002",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "720c1db25c75f1a048e2c2091b92f791b8e86421",
"extension": "p... | 2.484375 | stackv2 | from flask import render_template, url_for, flash, redirect,request
from flaskblog import app, db, b_c
from flaskblog.forms import RegistrationForm, LoginForm, UpdateAccountForm
from flaskblog.models import User, Post
from flask_login import login_user, current_user, logout_user, login_required
posts=[
{
'author': ... | 101 | 27.32 | 85 | 16 | 700 | python | [{"finding_id": "codeql_py/url-redirection_a8c84d7201d8ef20_4bdadaf9", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
70
] | [
null
] | [
20
] | [
29
] | |
2024-11-18T21:23:31.107605+00:00 | 1,531,834,965,000 | 22cb31d138ed6ebd3ee35efb67e53b4954b4aa29 | 2 | {
"blob_id": "22cb31d138ed6ebd3ee35efb67e53b4954b4aa29",
"branch_name": "refs/heads/master",
"committer_date": 1531834965000,
"content_id": "51e6df9196e9c36af4d2a69ea980908df51aa7e9",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "3f15d04cf44a6f56249efa121813c00edb23f3ac",
"extension": "p... | 2.421875 | stackv2 | from flask import Flask, request, Response, render_template
import sdv
import StringIO
import urllib2
import json
app = Flask(__name__, static_folder='public', static_url_path='')
@app.route('/validate', methods=['POST', 'GET'])
def validate_ws():
post_data = request.get_data()
url = request.args.get('url')
... | 58 | 29.43 | 105 | 15 | 414 | python | [{"finding_id": "codeql_py/stack-trace-exposure_27e58ce310ab6bd9_1ef5fbcf", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-215",
"CWE-918"
] | [
"py/stack-trace-exposure",
"py/flask-debug",
"py/full-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"The full URL of this request depends on a [user-provided value](1)."
] | [
21,
58,
53
] | [
null,
null,
null
] | [
21,
5,
29
] | [
40,
37,
49
] | |
2024-11-18T21:23:35.989536+00:00 | 1,677,702,854,000 | 74576914d7117caffb09a9fd3646d33320db26ff | 3 | {
"blob_id": "74576914d7117caffb09a9fd3646d33320db26ff",
"branch_name": "refs/heads/main",
"committer_date": 1677702854000,
"content_id": "c3be753f91fb8ca61fd9bdfb9d70f7bfec6a83ca",
"detected_licenses": [
"MIT"
],
"directory_id": "2e42938e48b54fc2fbdc72c0c251f63d43710f68",
"extension": "py",
"file... | 2.65625 | stackv2 | """Module to deal with ipsw files."""
import os
import shutil
import sys
import requests
from bs4 import BeautifulSoup
from remotezip import RemoteZip
def grab_file(url: str, filename: str) -> str:
"""Partialzip file from remote server."""
if "developer.apple.com" in url:
return None
with RemoteZ... | 139 | 28.71 | 79 | 16 | 1,001 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_31fe6f174e8b91ac_805e9554", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [developer.apple.com](1) may be at an arbitrary positio... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [developer.apple.com](1) may be at an arbitrary position in the sanitized URL."
] | [
13
] | [
null
] | [
8
] | [
36
] | |
2024-11-18T21:23:41.645235+00:00 | 1,586,429,096,000 | a0477608ceca2c17dffba3a42221dd06ba7b2fc3 | 2 | {
"blob_id": "a0477608ceca2c17dffba3a42221dd06ba7b2fc3",
"branch_name": "refs/heads/master",
"committer_date": 1586429096000,
"content_id": "0fa7f4941abc9bc5503d5dc5b015dee38421f0de",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4079e201f56d367b1106b93fec93765d8afd8543",
"extension": "py"... | 2.359375 | stackv2 | '''
Copyright 2019 IBM Corporation
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
di... | 143 | 36.31 | 116 | 17 | 1,198 | python | [{"finding_id": "codeql_py/stack-trace-exposure_380705fd69dcc9ae_db8bba43", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
80,
135,
142
] | [
null,
null,
null
] | [
20,
20,
5
] | [
28,
28,
59
] | |
2024-11-18T21:37:21.850978+00:00 | 1,608,648,615,000 | 9e19c7cd9d7570bbc35afdd4ae5a20a434573a34 | 3 | {
"blob_id": "9e19c7cd9d7570bbc35afdd4ae5a20a434573a34",
"branch_name": "refs/heads/master",
"committer_date": 1608648615000,
"content_id": "ca0a33cdc955b57ba103c03ee557fc7035d032f1",
"detected_licenses": [
"MIT"
],
"directory_id": "91c2d18fe74a943f2087abf099c54410436ef874",
"extension": "py",
"fi... | 2.515625 | stackv2 | from flask import Flask, jsonify, request, send_file
from bs4 import BeautifulSoup
from ics import Calendar, Event
import requests
import urllib3
import urllib
app = Flask(__name__)
app.config["calendar"] = "/my.ics"
@app.route('/api/calendar/<string:year>/<string:month>')
def checkOutput(year, month):
if int(m... | 45 | 28.18 | 118 | 18 | 363 | python | [{"finding_id": "codeql_py/path-injection_91db16ff8e50a9ce_1f265aef", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "remed... | 3 | true | [
"CWE-022",
"CWE-022",
"CWE-918"
] | [
"py/path-injection",
"py/path-injection",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).",
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request dep... | [
39,
42,
17
] | [
null,
null,
null
] | [
15,
22,
12
] | [
23,
30,
119
] | |
2024-11-18T21:59:06.449302+00:00 | 1,598,912,874,000 | d055dbe207aab1227876f9c3e24e7a725e9be2ee | 3 | {
"blob_id": "d055dbe207aab1227876f9c3e24e7a725e9be2ee",
"branch_name": "refs/heads/master",
"committer_date": 1598912874000,
"content_id": "4a63861c9cd3870f5a769a417dce9d00ca1ad6de",
"detected_licenses": [
"MIT"
],
"directory_id": "62db3d7eb8f50a66a6eb898d93d212dd7215d2cf",
"extension": "py",
"fi... | 2.609375 | stackv2 | #! /usr/bin/env python3
from flask import Flask, request, abort, jsonify
import database as db
import json
FEVER_START: str = 'FEVER_START_EVENT'
FEVER_END: str = 'FEVER_END_EVENT'
app = Flask(__name__)
app.config["JSON_SORT_KEYS"] = False
@app.route('/temperature', methods=['GET'])
def show_raw_temperature():
... | 186 | 30.11 | 112 | 17 | 1,283 | python | [{"finding_id": "codeql_py/flask-debug_952187c39f2340f0_1bd7d35a", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
186,
50
] | [
null,
null
] | [
5,
12
] | [
35,
20
] | |
2024-11-18T21:59:07.912770+00:00 | 1,599,194,318,000 | fe80d4d52bbfcac77932ae40f57e2be351a44a71 | 5 | {
"blob_id": "fe80d4d52bbfcac77932ae40f57e2be351a44a71",
"branch_name": "refs/heads/master",
"committer_date": 1599194318000,
"content_id": "4f4640d537cf2547d8b0842080f1493297d393aa",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "a9d4e47aebbfac7d5f442da3bc5639e1ec65d508",
"extension": "p... | 4.65625 | stackv2 | # Python List
# List in python is implemented to store the sequence of various type of data.
# However, python contains six data types that are capable to store the sequences
# but the most common and reliable type is list.
#
# A list can be defined as a collection of values or items of different types.
# The items in ... | 32 | 51.19 | 166 | 8 | 459 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fd48214141d05430_ab11ffaa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
19
] | [
null
] | [
7
] | [
84
] | |
2024-11-18T22:11:29.480366+00:00 | 1,660,096,781,000 | 8158c40afed82906dc46c62aef69ea507329a26e | 2 | {
"blob_id": "8158c40afed82906dc46c62aef69ea507329a26e",
"branch_name": "refs/heads/master",
"committer_date": 1660096781000,
"content_id": "0333e56168b0dd62d908a26063b1e8d29ed68a2a",
"detected_licenses": [
"MIT"
],
"directory_id": "dbc68435b68ab570c927972d2df910d4d11d08a0",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/python
import jinja2
import json
with open('source.json') as f:
data = json.load(f)
#with open('gov.json') as f:
# data2 = json.load(f)
templateLoader = jinja2.FileSystemLoader(searchpath="./")
templateEnv = jinja2.Environment(loader=templateLoader)
TEMPLATE_FILE = "template.tf"
template = templateEnv.... | 17 | 25.82 | 88 | 9 | 113 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_267d9409ff7a4682_99a72d62", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
12
] | [
null
] | [
15
] | [
56
] | |
2024-11-18T22:11:37.809793+00:00 | 1,488,776,568,000 | e15313eaf096fca692f9a3cae34489a17d47ce85 | 2 | {
"blob_id": "e15313eaf096fca692f9a3cae34489a17d47ce85",
"branch_name": "refs/heads/master",
"committer_date": 1488776568000,
"content_id": "5f0ce62d4753c5763ec1375a10319f9afcb6963c",
"detected_licenses": [
"MIT"
],
"directory_id": "65e351098b00365664545dd461543382df1ed624",
"extension": "py",
"fi... | 2.421875 | stackv2 | from flask import request, jsonify
from functools import wraps
from voluptuous import Any, Schema, Required, Optional, MultipleInvalid, Invalid
sample_schema = Schema({
Required('id'): int,
})
def validate_json(f):
@wraps(f)
def wrapper(*args, **kw):
try:
request.json
except E... | 32 | 24.94 | 80 | 20 | 188 | python | [{"finding_id": "codeql_py/stack-trace-exposure_141fefc2f57dc691_7890b463", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
29
] | [
null
] | [
32
] | [
49
] | |
2024-11-18T22:24:02.596262+00:00 | 1,584,362,848,000 | d40b3321dd46c4e7b6cf2748fc87c78a8ca27d82 | 2 | {
"blob_id": "d40b3321dd46c4e7b6cf2748fc87c78a8ca27d82",
"branch_name": "refs/heads/master",
"committer_date": 1584362848000,
"content_id": "846aca1278e2bb3f9ea135b64a52018a1b7fdd21",
"detected_licenses": [
"MIT"
],
"directory_id": "3aee8e0a28080b7e2098ce02737ea06e6963dfa5",
"extension": "py",
"fi... | 2.390625 | stackv2 | import oyaml as yaml
from pathlib import Path
from jsonpath_ng import parse
from jinja2 import Template
from . import template, exceptions
class FileLoader:
file_types = ["*.yaml", "*.yml"]
def __init__(self, file_path):
self.file_path = file_path
def load_raw_data(self):
files = []
... | 133 | 30.12 | 98 | 19 | 929 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f0341fdcaa4b2e39_8508df37", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
53
] | [
null
] | [
16
] | [
40
] | |
2024-11-18T22:24:21.139780+00:00 | 1,436,426,683,000 | bedd73debcf94e68afeca7711776e089855d4c34 | 2 | {
"blob_id": "bedd73debcf94e68afeca7711776e089855d4c34",
"branch_name": "refs/heads/master",
"committer_date": 1436426683000,
"content_id": "5292781a3656ece5f62dbd4a9bb5e1b47b3e7f8c",
"detected_licenses": [
"MIT"
],
"directory_id": "c2d1a7df02977119e4feb82a8d625275b9089c7a",
"extension": "py",
"fi... | 2.453125 | stackv2 | from contextlib import contextmanager
from cryptography.fernet import Fernet
from getpass import getpass
from hashlib import sha512
from inspect import signature
import pickle
import sqlite3
from bottle import redirect, abort, request, response
class InvalidUserException(Exception):
def __init__(self):
s... | 385 | 32.98 | 117 | 17 | 2,771 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6af3433d59a08097_21f8d63c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
18
] | [
null
] | [
19
] | [
66
] | |
2024-11-18T22:36:04.148619+00:00 | 1,502,568,572,000 | 36ed280f9eaa78f62da86d049cff2e1f93e12828 | 3 | {
"blob_id": "36ed280f9eaa78f62da86d049cff2e1f93e12828",
"branch_name": "refs/heads/master",
"committer_date": 1502568572000,
"content_id": "bfa425aceca4f3ccf598736bf7f1360f25088070",
"detected_licenses": [
"MIT"
],
"directory_id": "9608f41ba6eb30fdae5c93d3265d280b4901046d",
"extension": "py",
"fi... | 2.71875 | stackv2 | #!/usr/bin/env python3
from flask import Flask
from flask import request
from flask import session
from flask import make_response
from flask import redirect
from flask import abort
print('Starting flask app named {}'.format(__name__))
app = Flask(__name__)
@app.route('/')
def index():
response = '''
<html>
... | 89 | 18.21 | 66 | 10 | 461 | python | [{"finding_id": "codeql_py/reflective-xss_57a00dc710a07e53_6e16900b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
34,
65
] | [
null,
null
] | [
30,
12
] | [
38,
20
] | |
2024-11-18T22:36:34.275746+00:00 | 1,630,193,894,000 | 73bc6d4f211b613fcacea4fda9dda85a28aa1365 | 3 | {
"blob_id": "73bc6d4f211b613fcacea4fda9dda85a28aa1365",
"branch_name": "refs/heads/main",
"committer_date": 1630193894000,
"content_id": "390f454e0a63727389954d2c12f2d11c3a34ed9e",
"detected_licenses": [
"MIT"
],
"directory_id": "49a8de5d915edad5c750fa1262d9c26f0ad52078",
"extension": "py",
"file... | 2.859375 | stackv2 | import re, requests, json, subprocess, os, ffmpeg
from pytube import YouTube
class YTToMP3:
def __init__(self, limit_size=None):
self.limit_size = limit_size
self.newfiles = []
self.error_message = ""
'''
Downloads and converts to MP3 a video from YouTube
'''
def downlo... | 107 | 27.98 | 127 | 14 | 696 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_c03a7cc2d513ee42_5b75da52", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before '(www.youtube|youtube).com/', so it ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before '(www.youtube|youtube).com/', so it might match more hosts than expected."
] | [
64
] | [
null
] | [
19
] | [
65
] | |
2024-11-18T20:23:13.801281+00:00 | 1,534,606,762,000 | 90adb677851b507b15e244a2cc7ef6b34dacf3b6 | 2 | {
"blob_id": "90adb677851b507b15e244a2cc7ef6b34dacf3b6",
"branch_name": "refs/heads/master",
"committer_date": 1593772977000,
"content_id": "7a40bcde6bef099867bbd9c0df1f0c302049198e",
"detected_licenses": [
"MIT"
],
"directory_id": "fb205cacd4dff57e2e8d4eb0119d48dd82fc3600",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/env python
"""Usage: tvnplayer [-o FILE | -p COMMAND] [--debug] [URL]
-h --help Show this help
-o --output FILE Write stream to FILE; if - is used as FILE,
stream will be written to standard output
-p --player COMMAND Pass stream URL to player
--debug ... | 188 | 26.94 | 78 | 15 | 1,216 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_1f1c53af86969a58_fe900b1c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://tvnplayer.pl](1) may be at an arbitrary positio... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [http://tvnplayer.pl](1) may be at an arbitrary position in the sanitized URL."
] | [
152
] | [
null
] | [
8
] | [
52
] | |
2024-11-18T20:23:15.489495+00:00 | 1,592,353,250,000 | 87725dcff9f5fe8520aebb3dc204263e12f93e80 | 2 | {
"blob_id": "87725dcff9f5fe8520aebb3dc204263e12f93e80",
"branch_name": "refs/heads/master",
"committer_date": 1592353250000,
"content_id": "4a71a2360b2f3e90b4a2e31a98b3a07a489cada8",
"detected_licenses": [
"MIT"
],
"directory_id": "eefb87d222df22f7810f0dbc374350bdfb88ae09",
"extension": "py",
"fi... | 2.46875 | stackv2 | import asyncio
import aiohttp
import newrelic.agent
import logging
import sys
from config import get_config
logger = logging.getLogger()
logger.setLevel(logging.INFO)
handler = logging.StreamHandler(sys.stdout)
handler.setLevel(logging.INFO)
logger.addHandler(handler)
def send_summary_event(app, stats):
newreli... | 92 | 33.68 | 97 | 15 | 665 | python | [{"finding_id": "codeql_py/request-without-cert-validation_81c59ffdd730fafe_187d2f20", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
26
] | [
null
] | [
16
] | [
70
] | |
2024-11-18T20:23:27.335374+00:00 | 1,445,379,883,000 | 9851d4690478a42849da9b93eda78ca1fb9882d1 | 3 | {
"blob_id": "9851d4690478a42849da9b93eda78ca1fb9882d1",
"branch_name": "refs/heads/master",
"committer_date": 1445379883000,
"content_id": "6e714ac83db064ee9023bd13ef04ab52fdc8c3c7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fd40bd3288927d9dcce742e225fad77cbaa46116",
"extension": "py"... | 2.5625 | stackv2 | # -*- coding: utf-8 -*-
import requests
from colorama import Fore
LAST_FM_API_ROOT = "http://ws.audioscrobbler.com/2.0/"
LAST_FM_LOVED_TRACKS = LAST_FM_API_ROOT + "?method=user.getLovedTracks" \
"&api_key=%s" \
"&limit=%d" \
... | 57 | 29.42 | 105 | 13 | 409 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ee05016ae6114384_fc451148", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
24
] | [
null
] | [
15
] | [
50
] | |
2024-11-18T20:23:28.476817+00:00 | 1,602,864,476,000 | 4a45106f510aa3bed819b152f9b2742dddfadcb2 | 2 | {
"blob_id": "4a45106f510aa3bed819b152f9b2742dddfadcb2",
"branch_name": "refs/heads/master",
"committer_date": 1602864476000,
"content_id": "a8b8b2d823b60b910487ac6a4ed76164bef67c6f",
"detected_licenses": [
"MIT"
],
"directory_id": "35a0b95f5a13f2cf3ae92d554a65fac00262b5db",
"extension": "py",
"fi... | 2.421875 | stackv2 | import random
import re
from userbot import bot
from asyncio import sleep
from userbot.events import register
EMOJI_PATTERN = re.compile(
"["
"\U0001F1E0-\U0001F1FF" # flags (iOS)
"\U0001F300-\U0001F5FF" # symbols & pictographs
"\U0001F600-\U0001F64F" # emoticons
"\U0001F680-\U0001F6FF" # trans... | 147 | 21.12 | 98 | 16 | 1,096 | python | [{"finding_id": "codeql_py/overly-large-range_a1588c3fd3c8fbef_a611deac", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 9 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range ... | [
9,
9,
9,
9,
9,
9,
9,
10,
10
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
6,
9,
12,
15,
18,
21,
24,
6,
9
] | [
10,
13,
16,
19,
22,
25,
28,
10,
13
] | |
2024-11-18T20:23:32.457453+00:00 | 1,620,232,995,000 | 1abbb95d46686be78646b3cb0fc37a5fa61d1b45 | 3 | {
"blob_id": "1abbb95d46686be78646b3cb0fc37a5fa61d1b45",
"branch_name": "refs/heads/master",
"committer_date": 1620232995000,
"content_id": "30b98f4b18ce1eadcdd7aa9772f32b0976442d47",
"detected_licenses": [
"MIT"
],
"directory_id": "205e940e19e22bdf6d18fdb2a8d24f2fc646fabb",
"extension": "py",
"fi... | 2.890625 | stackv2 | """A url shortener flask app"""
import re
import os
import string
import random
import hashlib
import datetime
import gunicorn
from urllib.parse import unquote
from pymongo import MongoClient
from flask import render_template
from flask import Flask,redirect,request
app = Flask('app')
client = MongoClient("replace_yo... | 96 | 26.8 | 116 | 13 | 699 | python | [{"finding_id": "codeql_py/overly-large-range_68cefeb2397f1dc7_f88b4666", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 2 | true | [
"CWE-020",
"CWE-215"
] | [
"py/overly-large-range",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
21,
92
] | [
null,
null
] | [
54,
5
] | [
57,
24
] | |
2024-11-18T20:23:32.520700+00:00 | 1,331,484,556,000 | 3b9376b6e876284e9018d919d933195e8b8d6582 | 3 | {
"blob_id": "3b9376b6e876284e9018d919d933195e8b8d6582",
"branch_name": "refs/heads/master",
"committer_date": 1331484556000,
"content_id": "2a05fbbfde43f91caf72f1b75a141de71ab1be20",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1c6c022bea08430db4d66de6cb57f7218a97be30",
"extension": "py"... | 2.640625 | stackv2 | #!/usr/bin/env python
#
# Communicates with the arduino and responds to changes in Office
# Communicator. You can pass in an optional port, default is 8123.
#
# Examples:
#
# server.py # port 8123
# server.py 8181 # port 8181
#
import BaseHTTPServer
import urlparse
import urllib
import string
import cgi
impo... | 103 | 26.95 | 69 | 17 | 669 | python | [{"finding_id": "codeql_py/path-injection_345deb88c2d0c7a7_db322c6e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
74,
75
] | [
null,
null
] | [
35,
30
] | [
40,
35
] | |
2024-11-18T20:23:41.007241+00:00 | 1,543,144,419,000 | 64b1877ab958643168f564c40b1a7c5cc9666b3d | 3 | {
"blob_id": "64b1877ab958643168f564c40b1a7c5cc9666b3d",
"branch_name": "refs/heads/master",
"committer_date": 1543144419000,
"content_id": "a9d399f88c6386e0b119af5ed615be17641b216a",
"detected_licenses": [
"MIT"
],
"directory_id": "4a28f2e0184b69d51493c431c3ebb65fee1fa333",
"extension": "py",
"fi... | 2.6875 | stackv2 | from flask import Flask, jsonify, request
import requests
import hashlib
import json
import sys
import os
import io
import logging
import redis
import ast
import configparser
# START APP
app = Flask(__name__)
# CONFIGURATION FILE
config = configparser.ConfigParser()
config.read('/data/config.ini')
# CONFIGURATION PR... | 67 | 25.07 | 86 | 15 | 469 | python | [{"finding_id": "codeql_py/flask-debug_9e0cf78c42c3f47c_dfcd9bf5", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-295",
"CWE-918"
] | [
"py/flask-debug",
"py/request-without-cert-validation",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This request may run without certificate validation because [it is disabled](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
65,
50,
50
] | [
null,
null,
null
] | [
2,
10,
10
] | [
54,
87,
87
] | |
2024-11-18T21:22:30.824539+00:00 | 1,493,496,314,000 | ff67be6778408540c58101a8875115b45f831798 | 2 | {
"blob_id": "ff67be6778408540c58101a8875115b45f831798",
"branch_name": "refs/heads/master",
"committer_date": 1493496314000,
"content_id": "4a53a03f3b7fba55077537cdb4f63213feacff9b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "51781ae6f344ddb3a76b2e06b6dc6620f96fb069",
"extension": "py"... | 2.40625 | stackv2 | import click
import configparser
import os
from .api import *
@click.group()
@click.option('--credentials', help='Path to credentials file', default='~/.spark-oktawave-credentials')
@click.pass_context
def cli(ctx, credentials):
ctx.obj['config'] = configparser.RawConfigParser()
ctx.obj['config'].read(os.path.... | 90 | 36.24 | 104 | 18 | 800 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_71de7297150c7912_f8d97251", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
68
] | [
null
] | [
11
] | [
58
] | |
2024-11-18T21:51:09.013818+00:00 | 1,579,065,740,000 | cd42ce2c8376f2a006e11cd62b588825444f0af0 | 3 | {
"blob_id": "cd42ce2c8376f2a006e11cd62b588825444f0af0",
"branch_name": "refs/heads/master",
"committer_date": 1579065740000,
"content_id": "94df64417f32cfc8c8aca022cbb57881ba92dbd0",
"detected_licenses": [
"MIT"
],
"directory_id": "4fdec7ebfd1aac9ad283982c87686591994e3d26",
"extension": "py",
"fi... | 2.96875 | stackv2 | import unittest
import pandas as pd
import random
import numpy as np
def read_data(filename="../data/zipcode.csv.gz"):
df = pd.read_csv(filename,index_col="zip")
df.index = df.index.map(str)
# df.index.astype('str', copy=False)
# df['latitude'] = pd.to_numeric(df['latitude'])
# df['longitude'] = pd... | 108 | 37.1 | 110 | 19 | 1,142 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6220b510fa7243c1_adc6a266", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 7 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (p... | [
88,
88,
88,
88,
99,
99,
99
] | [
null,
null,
null,
null,
null,
null,
null
] | [
27,
30,
43,
57,
27,
30,
38
] | [
28,
41,
55,
64,
28,
36,
45
] | |
2024-11-18T21:51:29.753810+00:00 | 1,554,064,173,000 | 0221d3e1b8b3bde5e227587f7510b35ed26e144c | 4 | {
"blob_id": "0221d3e1b8b3bde5e227587f7510b35ed26e144c",
"branch_name": "refs/heads/master",
"committer_date": 1554064173000,
"content_id": "82677f393d756f2306f58677b893eb673a4e89c1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "442aab7993bc275cbd48ce9c110d5c449ba70d4a",
"extension": "py"... | 3.765625 | stackv2 | import random
secret = random.randint(1,99)
print("Guess Secret number:", secret)
past_guesses ={}
guess = -1
while guess != secret:
guess = int(input("make a guess:"))
if guess in past_guesses:
past_guesses[guess]==1
print("You guessed that", past_guesses[guess], 'times')
else:
pas... | 19 | 26.16 | 63 | 14 | 128 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7f078639c6fc1b7c_9c7b2e11", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
3
] | [
null
] | [
31
] | [
37
] | |
2024-11-18T21:51:34.281188+00:00 | 1,609,852,025,000 | fa2ba25f3aa298b28ebe67e1bdc1c73cf8e43aa7 | 2 | {
"blob_id": "fa2ba25f3aa298b28ebe67e1bdc1c73cf8e43aa7",
"branch_name": "refs/heads/main",
"committer_date": 1609852025000,
"content_id": "cb16371f4631bf7e2b02e4bd247c638e2b8a21bb",
"detected_licenses": [
"MIT"
],
"directory_id": "430ad6a1a5ba1b847d0e314fe662c38ef34f3849",
"extension": "py",
"file... | 2.421875 | stackv2 | import requests
import re
import os
import time
requests.packages.urllib3.disable_warnings()
headers = {'Connection': 'close',
'Cache-Control': 'max-age=0',
'Upgrade-Insecure-Requests': '1',
'User-Agent': 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_3) AppleWebKit/537.36 (KHTML, like ... | 71 | 29.65 | 114 | 15 | 642 | python | [{"finding_id": "codeql_py/request-without-cert-validation_04050f6cc648b22b_09b3a483", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
56
] | [
null
] | [
23
] | [
89
] | |
2024-11-18T21:51:35.603898+00:00 | 1,536,970,479,000 | 43fb078d9e870d22446130203b9920d2e5e35d78 | 3 | {
"blob_id": "43fb078d9e870d22446130203b9920d2e5e35d78",
"branch_name": "refs/heads/master",
"committer_date": 1536970479000,
"content_id": "b8f0c08108f9c928271943655db5079ecdb4f340",
"detected_licenses": [
"MIT"
],
"directory_id": "68aa8a68bfa5a8624af166aef8d61648666e1988",
"extension": "py",
"fi... | 2.546875 | stackv2 | import traceback
import pickle
import json
from tornado.web import RequestHandler
from tornado.web import authenticated
from tornado.gen import coroutine
import sys
class SuperController(RequestHandler):
"""Utilice esta clase para factorizar metodos comunes de entre los controladores."""
def get_user(self):... | 77 | 30.35 | 101 | 14 | 483 | python | [{"finding_id": "codeql_py/stack-trace-exposure_4b6cdfdda34faf2a_05ebd123", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
41,
60
] | [
null,
null
] | [
20,
20
] | [
94,
46
] | |
2024-11-18T21:51:41.415623+00:00 | 1,594,056,299,000 | f8a308fe0e564a167f59342c13caa9d2080a0c0e | 2 | {
"blob_id": "f8a308fe0e564a167f59342c13caa9d2080a0c0e",
"branch_name": "refs/heads/master",
"committer_date": 1594056299000,
"content_id": "f223b009357f219b651b8f4f164f51bf72d21bfd",
"detected_licenses": [
"MIT"
],
"directory_id": "89f4a8bd73f28ef661575bb124fa9b56de7bb241",
"extension": "py",
"fi... | 2.46875 | stackv2 | import os
import subprocess
from flask import Flask, request, redirect, url_for, send_from_directory, after_this_request
from werkzeug.utils import secure_filename
UPLOAD_FOLDER = '/tmp/uploads/'
ALLOWED_EXTENSIONS = set(['png', 'jpg', 'jpeg'])
app = Flask(__name__)
app.config['UPLOAD_FOLDER'] = UPLOAD_FOLDER
app.con... | 84 | 39.98 | 173 | 16 | 798 | python | [{"finding_id": "codeql_py/url-redirection_267b701271e35cfb_0de48612", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
38,
44
] | [
null,
null
] | [
29,
29
] | [
40,
40
] | |
2024-11-18T21:52:08.780827+00:00 | 1,690,045,444,000 | b0433417c2b2499efbaccea5a8bd9245aca1bc51 | 3 | {
"blob_id": "b0433417c2b2499efbaccea5a8bd9245aca1bc51",
"branch_name": "refs/heads/master",
"committer_date": 1690045444000,
"content_id": "bbcbf2fc8e320a8a970eb7b221a93f618ba22bc8",
"detected_licenses": [
"Unlicense"
],
"directory_id": "f0ef841cd2121cd92947d1df5993693a73e5940f",
"extension": "py",... | 3.25 | stackv2 | """
Implementation of the Yubico OTP algorithm. This can generate and parse OTP
structures.
>>> from binascii import unhexlify
>>> key = b'0123456789abcdef'
>>> otp = OTP(unhexlify(b'0123456789ab'), 5, 0x0153f8, 0, 0x1234)
>>> _ = repr(otp) # coverage
>>> _ = str(otp) # coverage
>>> token = encode_otp(otp, key, b'cc... | 239 | 28.47 | 113 | 13 | 1,832 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_efc15f5fa2505702_7e299179", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
63,
93
] | [
null,
null
] | [
11,
11
] | [
50,
50
] | |
2024-11-18T21:52:10.297800+00:00 | 1,610,407,053,000 | 5b2cc1fd460ed4fe5f8c9c6508d1c2375c3b40b5 | 2 | {
"blob_id": "5b2cc1fd460ed4fe5f8c9c6508d1c2375c3b40b5",
"branch_name": "refs/heads/master",
"committer_date": 1610407053000,
"content_id": "2644dc08b28bd82eca4bcbf23ac0e29f70a74606",
"detected_licenses": [
"MIT"
],
"directory_id": "71324aca11e16d6da17b0440e72d0107f5af6e04",
"extension": "py",
"fi... | 2.359375 | stackv2 | import json
from abc import abstractmethod
from django.contrib.auth import authenticate, login
from django.shortcuts import render
from django.http import QueryDict
from rest_framework.views import APIView as _APIView
from rest_framework.response import Response
from .serializers import UserLoginSerializer
class C... | 104 | 28.97 | 80 | 17 | 605 | python | [{"finding_id": "codeql_py/stack-trace-exposure_abb937d9ddd5a3ed_7aa1d748", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user."
] | [
50
] | [
null
] | [
25
] | [
29
] | |
2024-11-18T22:28:15.450147+00:00 | 1,583,310,809,000 | 99150f2948a3ecaf8baa3011171f1a4d8ec32303 | 2 | {
"blob_id": "99150f2948a3ecaf8baa3011171f1a4d8ec32303",
"branch_name": "refs/heads/master",
"committer_date": 1583310809000,
"content_id": "66ac05ec1bf7248c7c4fa1a47c1f91e1f79c3457",
"detected_licenses": [
"MIT"
],
"directory_id": "140d57227526e158c80d9b88082de37d7908a9f3",
"extension": "py",
"fi... | 2.359375 | stackv2 | import random
import shutil
import string
from pathlib import Path
from flask import Flask, request, render_template, send_from_directory, jsonify
DATASET_PATH = '/mnt/dataset/wabisabi/'
MOVED_PATH = '/mnt/dataset/moved/'
MOSAIC_PATH = '/mnt/dataset/mosaic/'
app = Flask(__name__)
def get_random_string(digit=8):
... | 120 | 23.44 | 95 | 14 | 724 | python | [{"finding_id": "codeql_py/flask-debug_ed5a441bd4cbec31_50afefea", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 9 | true | [
"CWE-215",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-pro... | [
120,
29,
29,
39,
39,
33,
43,
94,
103
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
5,
25,
47,
25,
45,
29,
29,
21,
21
] | [
51,
45,
65,
43,
65,
46,
46,
36,
36
] | |
2024-11-18T22:44:40.700632+00:00 | 1,530,799,317,000 | d7a39163206f7cd49c0c19661748c29da64e1dab | 3 | {
"blob_id": "d7a39163206f7cd49c0c19661748c29da64e1dab",
"branch_name": "refs/heads/master",
"committer_date": 1530799317000,
"content_id": "14e288049d5160d73213210c02bd3f68f2d97154",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "22741ae8cafcb6fa8fc1e409182a14ee4853e7d5",
"extension": "p... | 3.125 | stackv2 | from flask import Flask, request
from sklearn import tree
import json
app = Flask(__name__)
@app.route('/query-example')
def query_example():
language = request.args.get('language')
return '''<h1>The language value is {}</h1>'''.format(language)
@app.route('/scikit-example', methods = ['POST','GET'])
def skikit_ex... | 107 | 29.11 | 102 | 17 | 1,087 | python | [{"finding_id": "codeql_py/reflective-xss_5e9b73238e0b56db_db571fc2", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 4 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
9,
23,
69,
89
] | [
null,
null,
70,
94
] | [
9,
14,
10,
9
] | [
65,
69,
73,
100
] | |
2024-11-18T22:44:40.996776+00:00 | 1,620,164,757,000 | 03637819df7d7ed80d2ab22e654baa655f7dfa37 | 3 | {
"blob_id": "03637819df7d7ed80d2ab22e654baa655f7dfa37",
"branch_name": "refs/heads/master",
"committer_date": 1620164757000,
"content_id": "8fe1aca958455f3a01c740cb22c64ae5a87720a2",
"detected_licenses": [
"MIT"
],
"directory_id": "3651699f385eed05a1bb24b92c4ed5178f970551",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/env python3
import os
import jinja2
import json
import jsonschema
from cidc_schemas.json_validation import (
load_and_validate_schema,
_load_dont_validate_schema,
)
from cidc_schemas.constants import SCHEMA_DIR
DOCS_DIR = os.path.dirname(os.path.abspath(__file__))
ROOT_DIR = os.path.join(DOCS_DIR, "... | 127 | 33.05 | 89 | 18 | 892 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4421d1f3f0697891_5b4ce7de", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
77
] | [
null
] | [
19
] | [
60
] | |
2024-11-18T22:44:50.415872+00:00 | 1,609,313,540,000 | 888c4cc6363f6f015f76c80042ebbb5685808ac9 | 2 | {
"blob_id": "888c4cc6363f6f015f76c80042ebbb5685808ac9",
"branch_name": "refs/heads/main",
"committer_date": 1609313540000,
"content_id": "155332c69d97f07053a770207335cd4a2599546f",
"detected_licenses": [
"MIT"
],
"directory_id": "018eb1dbf449a06e2516740a0799b1fdba8d1a9e",
"extension": "py",
"file... | 2.4375 | stackv2 | from rest_framework import status
from rest_framework.response import Response
from rest_framework.views import APIView
from train_data.services.services import service_result
import traceback
class PredictTillDate(APIView):
@staticmethod
def post(request):
try:
# file_storage_utility.crea... | 33 | 40.45 | 119 | 18 | 257 | python | [{"finding_id": "codeql_py/stack-trace-exposure_02cf8fe5fa8f7dd1_93fd77a9", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
33
] | [
null
] | [
29
] | [
69
] | |
2024-11-18T21:00:02.307873+00:00 | 1,601,832,800,000 | 534e3cfa69df7d864af505b5d91e3dbc6e0a4f42 | 2 | {
"blob_id": "534e3cfa69df7d864af505b5d91e3dbc6e0a4f42",
"branch_name": "refs/heads/master",
"committer_date": 1601832800000,
"content_id": "063d83c067f1f4fc24572bd478976958aad493e8",
"detected_licenses": [
"MIT"
],
"directory_id": "19ffebe7bdd3cf3bac532029a2602e0eb4d6a576",
"extension": "py",
"fi... | 2.390625 | stackv2 | import sys
if sys.version_info.major == 2:
from warnings import filterwarnings
filterwarnings("ignore", module=".*paramiko.*")
from paramiko import SSHClient, AutoAddPolicy
from .abstractshell import AbstractShell
from .abstractremoteshell import AbstractRemoteShell
from .shellresult import ShellResult
from .q... | 62 | 38.44 | 120 | 16 | 560 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_5b4312a0eea90214_a8ba4c2c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
32
] | [
null
] | [
9
] | [
66
] | |
2024-11-18T21:00:28.555723+00:00 | 1,609,415,291,000 | 7f492bf451476974c0c41450d84162b7e27bbcf0 | 3 | {
"blob_id": "7f492bf451476974c0c41450d84162b7e27bbcf0",
"branch_name": "refs/heads/master",
"committer_date": 1609415291000,
"content_id": "d28eb850049b634f50b99d8cd9665560679f0b7c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bd6201cb3b1fc8973dae628998c9cf3b7b97c06b",
"extension": "py"... | 3.125 | stackv2 | #!/usr/bin/env python3
"""
module for yaml functions
"""
import yaml
from pprint import pprint
def load_yaml(file_yaml):
with open(file_yaml, 'r') as f:
handle_yaml = yaml.safe_load(f)
return handle_yaml
def print_output(output):
print("*" * 24)
print("Map of learned MAC addresses")
... | 38 | 27 | 86 | 16 | 295 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2d1e2c192deac2fd_7ac35b48", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
23
] | [
null
] | [
15
] | [
73
] | |
2024-11-18T21:01:07.404920+00:00 | 1,499,115,609,000 | 2a82dcf59cc67c2c41ce4840b0b87222eaa196fa | 2 | {
"blob_id": "2a82dcf59cc67c2c41ce4840b0b87222eaa196fa",
"branch_name": "refs/heads/master",
"committer_date": 1499115609000,
"content_id": "3233d6c742e41033c2ad8f06a472cb5d4895a753",
"detected_licenses": [
"MIT"
],
"directory_id": "605ec13aa1e2c5f11b0c87a6f003c2c3794cfb96",
"extension": "py",
"fi... | 2.40625 | stackv2 | from flask import Flask, request, redirect, jsonify, url_for, flash
from sqlalchemy import create_engine
from sqlalchemy.orm import sessionmaker
from models import Base, Category, Item, User
from flask import session as login_session
import random
import string
import oath_logins.google as google
import oath_logins.fac... | 262 | 34.14 | 79 | 19 | 1,892 | python | [{"finding_id": "codeql_py/url-redirection_2fb7fd0eb547a3b6_1d7e6e4a", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
190
] | [
null
] | [
29
] | [
54
] | |
2024-11-18T21:01:32.888606+00:00 | 1,523,134,364,000 | 240d533a9506261cde90950d842c5376d79a85f1 | 3 | {
"blob_id": "240d533a9506261cde90950d842c5376d79a85f1",
"branch_name": "refs/heads/master",
"committer_date": 1523134364000,
"content_id": "663ef02fd29fe32d0056edb4eafbe50cd244b7cc",
"detected_licenses": [
"MIT"
],
"directory_id": "4f50579b9cc51f9f80ab7f6f771c1321d2be8fa0",
"extension": "py",
"fi... | 2.984375 | stackv2 | from Crypto import Random
from Crypto.Cipher import AES
from Crypto.Hash import SHA256
from Crypto.Util import Padding
def encrypt_file(input_path, output_path, password, chunk_size=4096):
cipher = AESCipher(password, chunk_size)
inp = open(input_path, "rb")
out = open(output_path, "wb")
data = inp.rea... | 73 | 34.7 | 77 | 15 | 627 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7ea0cb806822a349_5ce4ae75", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
35
] | [
null
] | [
31
] | [
55
] | |
2024-11-18T21:25:35.344660+00:00 | 1,541,759,793,000 | 2d70e776d281097dad32a69e247fb7bba78026ac | 3 | {
"blob_id": "2d70e776d281097dad32a69e247fb7bba78026ac",
"branch_name": "refs/heads/master",
"committer_date": 1541759793000,
"content_id": "f61eaf46c7fbd5d5c4d73b199fd14ea326084647",
"detected_licenses": [
"MIT"
],
"directory_id": "59a4745867d194a4ecfc6bee5a8f034d9c13aec9",
"extension": "py",
"fi... | 2.859375 | stackv2 | """Storage and version control helper methods."""
import os
import time
import shutil
import hashlib
import tarfile
import tensorflow as tf
from git import Repo
def git_revision_hash():
"""Return the git revision id/hash.
Returns:
str: Git revision hash.
"""
repo = Repo('.', search_parent_di... | 165 | 25.28 | 100 | 17 | 957 | python | [{"finding_id": "codeql_py/tarslip_0ac7a3417460dcf9_46803330", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/tarslip",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
160,
163
] | [
null,
null
] | [
29,
29
] | [
30,
30
] | |
2024-11-18T22:00:16.296231+00:00 | 1,572,528,895,000 | f6d2fea9bc4dedc8918ea0ea48bf96da9c4c6996 | 3 | {
"blob_id": "f6d2fea9bc4dedc8918ea0ea48bf96da9c4c6996",
"branch_name": "refs/heads/master",
"committer_date": 1572528895000,
"content_id": "89bc834d7139dd8654fad53259a49710b2a02c61",
"detected_licenses": [
"MIT"
],
"directory_id": "f4789abb93c804e6431f9e80f20427d04f54a81f",
"extension": "py",
"fi... | 2.5625 | stackv2 | """Implements login function and links users to measurement"""
from flask import Blueprint, flash, render_template, redirect, url_for, request, abort, send_file, session
from sqlalchemy.exc import IntegrityError
from flask_login import LoginManager, login_user, logout_user, UserMixin, current_user
from ..db import db, ... | 223 | 34.13 | 121 | 20 | 1,751 | python | [{"finding_id": "codeql_py/url-redirection_bc5c9f6f4c2a6ff2_dd274db4", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
91,
104
] | [
null,
null
] | [
25,
33
] | [
53,
61
] | |
2024-11-18T22:00:17.504135+00:00 | 1,473,605,065,000 | 6779a47a2746f92d6ef6c18658988142ce4f8ec7 | 3 | {
"blob_id": "6779a47a2746f92d6ef6c18658988142ce4f8ec7",
"branch_name": "refs/heads/master",
"committer_date": 1473605065000,
"content_id": "52e84ffa73e0e954df6ccfa6782b969861d00871",
"detected_licenses": [
"MIT"
],
"directory_id": "c2a6adcfb2319b67922c646ebfb70a8f189c5e12",
"extension": "py",
"fi... | 2.578125 | stackv2 | from __future__ import unicode_literals
from __future__ import print_function
from __future__ import absolute_import
from fs.errors import FSError
from .console import Cell
from .compat import text_type, implements_to_string
from .reader import DataReader
import weakref
import re
_re_fs_path = re.compile(r'^(?:\{(.*... | 110 | 25.09 | 65 | 18 | 634 | python | [{"finding_id": "codeql_py/redos_2b7ac3784038efc4_e2005c22", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '{{' and containing many repetitio... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '{{' and containing many repetitions of '}}{{'."
] | [
13
] | [
null
] | [
35
] | [
38
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.