added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T01:26:10.162693+00:00 | 1,500,900,157,000 | 270bc355fedc95938eec03b6c2a031423e4609fc | 3 | {
"blob_id": "270bc355fedc95938eec03b6c2a031423e4609fc",
"branch_name": "refs/heads/master",
"committer_date": 1500900157000,
"content_id": "eae39620d98036db4518756b3cadcd7bb2a7ba2f",
"detected_licenses": [
"MIT"
],
"directory_id": "a7cd37781c6e8aa85e02d1a1148a0fed7b6f7e5e",
"extension": "py",
"fi... | 2.625 | stackv2 | from __future__ import print_function
import matplotlib.pyplot as plt
import numpy as np
import os
import sys
import tensorflow as tf
import tarfile
from IPython.display import display, Image
from scipy import ndimage
from sklearn.linear_model import LogisticRegression
from six.moves.urllib.request import urlretrieve
f... | 244 | 37.52 | 102 | 18 | 2,507 | python | [{"finding_id": "codeql_py/tarslip_1548a07e239d9a98_3084accf", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
43
] | [
null
] | [
5
] | [
8
] | |
2024-11-19T01:51:51.679640+00:00 | 1,521,555,169,000 | a3a3069e8600778fb14e921fe27efb6b1ef6d1d5 | 2 | {
"blob_id": "a3a3069e8600778fb14e921fe27efb6b1ef6d1d5",
"branch_name": "refs/heads/master",
"committer_date": 1521555169000,
"content_id": "d62e39ad1e86f71e1b31cc34e177f39925fa2619",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "45f5fb6063f2991e3f49b2b8e5f623420ed38adf",
"extension": "py"... | 2.3125 | stackv2 | # Copyright 2018 Pedro Cuadra - pjcuadra@gmail.com
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or a... | 250 | 28.16 | 74 | 17 | 1,722 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_6162fe5829875252_d5773439", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
233
] | [
238
] | [
11
] | [
6
] | |
2024-11-19T01:52:01.262682+00:00 | 1,619,530,383,000 | 637117c5b9058aa2ea8a768dbff41a2edb37de06 | 2 | {
"blob_id": "637117c5b9058aa2ea8a768dbff41a2edb37de06",
"branch_name": "refs/heads/master",
"committer_date": 1619530383000,
"content_id": "e4065a2eb63a9cd2cf9b3d0f2fba5623b74e74f3",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "e859db4db6030c90454e9b43f0ab6bdf7247d6b3",
"extension": "py",
... | 2.3125 | stackv2 | from flask import Flask, render_template, jsonify, request
from importlib import import_module
from flask_cors import CORS
app = Flask(__name__,static_folder='downloads')
CORS(app)
@app.route('/', methods=['GET', 'POST'])
def index():
return render_template('index.html')
@app.route('/translate', methods=['POST']... | 54 | 39.07 | 83 | 16 | 527 | python | [{"finding_id": "codeql_py/flask-debug_fd6f876973b4f360_476c7819", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
54,
49
] | [
null,
null
] | [
5,
15
] | [
24,
57
] | |
2024-11-19T00:55:26.075518+00:00 | 1,635,164,994,000 | 161e44b47b5724d1c4c90084517b06f6901c880b | 3 | {
"blob_id": "161e44b47b5724d1c4c90084517b06f6901c880b",
"branch_name": "refs/heads/main",
"committer_date": 1635164994000,
"content_id": "4baecc27f6715b8c884e6567113abd6cdb53b2eb",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7e92dc0e8980c2b7233b3905fdfd993d13de903b",
"extension": "py",
... | 3.046875 | stackv2 | import requests
from bs4 import BeautifulSoup as bs
import re
text = requests.get('https://gnu.org').text
def strip_tags(html):
soup = bs(html, 'html.parser')
strip = soup.get_text()
return strip
def remove_puncs(text):
remove_punc3 = r"[^A-z0-9 ]+"
text = re.sub(remove_punc3, ' ', text)
text = re.sub(r'[\s]+'... | 18 | 20.39 | 43 | 9 | 113 | python | [{"finding_id": "codeql_py/overly-large-range_dfd0a66408c19d5c_be6815ca", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
13
] | [
null
] | [
21
] | [
24
] | |
2024-11-19T01:40:02.390869+00:00 | 1,517,203,494,000 | fd30159ce823a3e25463e61f00f44bbd67a493ea | 3 | {
"blob_id": "fd30159ce823a3e25463e61f00f44bbd67a493ea",
"branch_name": "refs/heads/master",
"committer_date": 1517203494000,
"content_id": "fdd21e0b383dbb011edaf4eca47043bcdb809b89",
"detected_licenses": [
"MIT"
],
"directory_id": "7c435e57540e9ac6382f2d9d77c1fa17e989de26",
"extension": "py",
"fi... | 2.796875 | stackv2 | """
The REST api server for the coderunner
@author eLIPSE
"""
from json import dumps
from os import environ
from typing import Dict
from flask import Flask, request
from codesandbox.sandbox import run_code, run_gui_code
# Load environment variables
import codesandbox.settings
API_KEY = environ.get("API_KEY")
app =... | 75 | 21.84 | 69 | 14 | 404 | python | [{"finding_id": "codeql_py/stack-trace-exposure_3a7b2be5bedc6ab7_f1e156b2", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
63
] | [
null
] | [
16
] | [
51
] | |
2024-11-18T23:43:34.528695+00:00 | 1,606,811,570,000 | 60d0122dd1bd8a773ef5658a56dca0f79a1cf117 | 2 | {
"blob_id": "60d0122dd1bd8a773ef5658a56dca0f79a1cf117",
"branch_name": "refs/heads/master",
"committer_date": 1606811570000,
"content_id": "4c66445d99470255f3d69089524dd996beb896b3",
"detected_licenses": [
"MIT"
],
"directory_id": "be496d11a15cfcdc52a1d9e9a2d6a0a81756c612",
"extension": "py",
"fi... | 2.328125 | stackv2 | from pyqrcode import QRCode
import io
from django.http import HttpResponse
from django.utils.datastructures import MultiValueDictKeyError
from rest_framework.decorators import api_view
from rest_framework.response import Response
from rest_framework import status, generics, permissions
from PIL import Image, ImageDraw,... | 101 | 34.96 | 101 | 16 | 863 | python | [{"finding_id": "codeql_py/stack-trace-exposure_0ee7ca5d81380d2f_723f8f83", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
63
] | [
null
] | [
25
] | [
54
] | |
2024-11-19T00:33:01.177866+00:00 | 1,692,327,102,000 | 5516cfd67e3142e4000d6c707c4575fe42b46698 | 2 | {
"blob_id": "5516cfd67e3142e4000d6c707c4575fe42b46698",
"branch_name": "refs/heads/master",
"committer_date": 1692327102000,
"content_id": "e223823fead2f0b3551f92d4cc2b9dd095055713",
"detected_licenses": [
"MIT"
],
"directory_id": "f54127042008716625281af36d272afbd1d68754",
"extension": "py",
"fi... | 2.46875 | stackv2 | """
Welcome to the app!
This extremely un-Pythonic __init__.py file sets up our primary Flask object
for use by the other elements of the API.
Keep in mind that order of imports is critical here, since Flask is subject
to so-called circular imports/mutual import references.
"""
# standard librar... | 169 | 29.16 | 80 | 15 | 1,123 | python | [{"finding_id": "codeql_py/reflective-xss_7ff7cddbb750f93f_d6ae54c7", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2)."
] | [
120
] | [
null
] | [
20
] | [
68
] | |
2024-11-19T01:18:04.264484+00:00 | 1,631,126,026,000 | 7ee4870a85edd28af6815ed1ab798a46e637d676 | 3 | {
"blob_id": "7ee4870a85edd28af6815ed1ab798a46e637d676",
"branch_name": "refs/heads/master",
"committer_date": 1631126026000,
"content_id": "06b4886081e59971ec4681a4a30bad07b7908dbf",
"detected_licenses": [
"MIT",
"CC0-1.0"
],
"directory_id": "251f5c092d4b7760cec8c2b6324e5290b917721f",
"extensio... | 2.6875 | stackv2 | # -*- coding: utf-8 -*-
import re
import scrapy
from locations.items import GeojsonPointItem
from locations.hours import OpeningHours
OPEN_STREET_MAP_OPENING_HOURS_SINGLE_DAY_REGEX = r'([a-zA-Z,]+)\s([\d:]+)-([\d:]+)'
STORES_REGEX = r'https://stores.footlocker.com/.+/.+/.+/.+.html'
class FootLockerSpider(scrapy.Sp... | 96 | 40.51 | 119 | 16 | 868 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_efc30b7d223f3fde_f16b88d9", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This string, which is used as a regular expression [here](1), has an unescaped '.' before 'footlocker.com/', so it might match more hosts than expected."
] | [
10
] | [
null
] | [
18
] | [
64
] | |
2024-11-19T00:25:29.412239+00:00 | 1,540,966,306,000 | a3f4f16857036dc768262d99ad3a6672f64ff0b8 | 2 | {
"blob_id": "a3f4f16857036dc768262d99ad3a6672f64ff0b8",
"branch_name": "refs/heads/master",
"committer_date": 1540966306000,
"content_id": "59fcd8e4dfae3b94acf75bca338580ac0a136b54",
"detected_licenses": [
"MIT"
],
"directory_id": "17445cb52e37ddd20db8edb98f0bf19af934b53b",
"extension": "py",
"fi... | 2.40625 | stackv2 | # -*- coding: utf-8 -*-
import jinja2
from distutils.dir_util import copy_tree
t_loader = jinja2.FileSystemLoader(searchpath='templates/')
t_env = jinja2.Environment(loader=t_loader)
def publish(name, content):
with open('release/' + name, 'wb') as f:
f.write(content.encode('utf8'))
def copy_statics()... | 67 | 19.37 | 59 | 12 | 368 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_38b208c4bfa8c2fb_d01ad4db", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
7
] | [
null
] | [
9
] | [
44
] | |
2024-11-19T00:28:40.704430+00:00 | 1,632,263,687,000 | be950aa9862290095c048a000b2021a5857df229 | 3 | {
"blob_id": "be950aa9862290095c048a000b2021a5857df229",
"branch_name": "refs/heads/master",
"committer_date": 1632263687000,
"content_id": "8f47610da9e4a18421759137c79ce82ccdb87784",
"detected_licenses": [
"MIT"
],
"directory_id": "5418d1de3cf27af5112055d2c26a9686a7fb451e",
"extension": "py",
"fi... | 2.546875 | stackv2 | import os
import shutil
import json
import time
import socket
from config import Config
def compilation_argv(source_path, binary_path, language):
if language == 'cpp':
return ['g++-9', source_path, '-o', binary_path, '-std=c++17', '-Wall', '-Wextra', '-O2']
elif language == 'java':
return ['/... | 160 | 38.64 | 107 | 18 | 1,370 | python | [{"finding_id": "codeql_py/overly-permissive-file_a3248277c5312440_cb556847", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 3 | true | [
"CWE-732",
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable."
] | [
46,
88,
94
] | [
null,
null,
null
] | [
13,
9,
9
] | [
43,
30,
30
] | |
2024-11-19T00:50:17.852983+00:00 | 1,597,857,227,000 | bb74dfce7c66cd1e5fe7f99de7a6c813edc8bad8 | 3 | {
"blob_id": "bb74dfce7c66cd1e5fe7f99de7a6c813edc8bad8",
"branch_name": "refs/heads/master",
"committer_date": 1597857227000,
"content_id": "850fec04565254215e030a32c64bb1d26779e98b",
"detected_licenses": [
"MIT"
],
"directory_id": "94aa56c66cc3933a20bec541f226f1976a352c4d",
"extension": "py",
"fi... | 2.71875 | stackv2 | import os
import argparse
import glob
import json
import csv
def main(path):
graph = {}
files=glob.glob(os.path.join(path, '**/manifest.json'), recursive=True)
for json_file in files:
folder = os.path.dirname(json_file)
folder = folder.replace(path, '')
try:
manifest = j... | 46 | 37.13 | 114 | 18 | 393 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_9fe783bb0d3f4673_aeb08671", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://raw.githubusercontent](1) may be at an arbitra... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [https://raw.githubusercontent](1) may be at an arbitrary position in the sanitized URL."
] | [
20
] | [
null
] | [
16
] | [
59
] | |
2024-11-19T00:51:35.627069+00:00 | 1,580,343,630,000 | 54c105c28ba8fe71b1cea92d292cfb8cd7750443 | 3 | {
"blob_id": "54c105c28ba8fe71b1cea92d292cfb8cd7750443",
"branch_name": "refs/heads/master",
"committer_date": 1580343630000,
"content_id": "b4dfe0f1fe50284f3082a7d5a7fd169860d59da8",
"detected_licenses": [
"MIT"
],
"directory_id": "0d9d88d592fbd92d04b775652f16b4fd74963002",
"extension": "py",
"fi... | 3.171875 | stackv2 | import sys
import json
import math
import geopy
from geopy.distance import VincentyDistance
from geopy.geocoders import Nominatim
import openpyxl
geolocator = Nominatim()
def geo_reverse_print(lat, lon):
print ("\n")
print(str('%.6f' % lat) + "," + str('%.6f' % lon))
location = geolocator.reverse(str('%.6... | 149 | 26.99 | 104 | 14 | 1,281 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_309455feede3a800_0e450945", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
95
] | [
null
] | [
16
] | [
38
] | |
2024-11-19T01:30:50.074340+00:00 | 1,442,126,369,000 | 3f0f7cc65c64615d140d625c0eb08aa7f6a0e891 | 3 | {
"blob_id": "3f0f7cc65c64615d140d625c0eb08aa7f6a0e891",
"branch_name": "refs/heads/master",
"committer_date": 1442126369000,
"content_id": "ca370f28ce7c7be87861211accbad87f55c07718",
"detected_licenses": [
"BSD-3-Clause",
"MIT"
],
"directory_id": "223c9f393aa048c6193bc44fb60be06c214559f9",
"ext... | 2.5625 | stackv2 | import requests
from bs4 import BeautifulSoup
BASE = "http://rocketpun.ch/"
get_soup = lambda url: BeautifulSoup(requests.get(url, verify=False).text)
def main_task(Recruit, db_session):
for recruit in get_list():
instance = Recruit.query.filter_by(id=recruit[3]).first()
if instance:
p... | 43 | 31.51 | 85 | 16 | 315 | python | [{"finding_id": "codeql_py/request-without-cert-validation_38b7b1f673e6bda9_3bce8f38", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
5
] | [
null
] | [
38
] | [
69
] | |
2024-11-19T01:54:57.304491+00:00 | 1,549,979,592,000 | c407b2bfbf18214b0805af993cbb63a88a60fca3 | 3 | {
"blob_id": "c407b2bfbf18214b0805af993cbb63a88a60fca3",
"branch_name": "refs/heads/master",
"committer_date": 1549979592000,
"content_id": "3372ab7dc7f0ed9990a960ec7f66e5d78b876a54",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0a3bf0a6f10eb143c9291090125946538ee73279",
"extension": "py"... | 2.765625 | stackv2 | import argparse
import io
import requests
import pathlib
import shutil
import tempfile
import tarfile
EXPECTED_SIZE = 320807981
URL = "http://www.cs.columbia.edu/~kedzie/pubmed.tar.gz"
CHUNK_SIZE = 32768
def main():
parser = argparse.ArgumentParser()
parser.add_argument("--data-dir", type=pathlib.Path, requ... | 48 | 27.54 | 71 | 15 | 323 | python | [{"finding_id": "codeql_py/tarslip_836a488f412e1da3_53171a9b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
44
] | [
null
] | [
13
] | [
15
] | |
2024-11-19T02:00:55.843583+00:00 | 1,594,900,108,000 | ed7c9f1ef621515d29f073b9072179aa0b8d1e15 | 3 | {
"blob_id": "ed7c9f1ef621515d29f073b9072179aa0b8d1e15",
"branch_name": "refs/heads/master",
"committer_date": 1594900108000,
"content_id": "2c0969dd1e1941bb3c43f35f91194fea3546dcb9",
"detected_licenses": [
"MIT"
],
"directory_id": "da872e4e4d3bf0ff2acadd7ef5df778f52446c90",
"extension": "py",
"fi... | 2.859375 | stackv2 | import os
from datetime import datetime
import click
import requests
IMAGE_FOLDER = os.path.join(os.path.expanduser('~/Pictures'), 'NASA')
URL = 'https://api.nasa.gov/'
POD_ENDPOINT = 'planetary/apod'
API_KEY = 'DEMO_KEY'
if not os.path.exists(IMAGE_FOLDER):
os.makedirs(IMAGE_FOLDER)
def get_info(date=datetime... | 92 | 29.29 | 95 | 22 | 584 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_62294a63b603a65c_e935cc81", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
83
] | [
null
] | [
42
] | [
46
] | |
2024-11-19T02:01:07.577823+00:00 | 1,468,851,656,000 | 4bf6119faef7163450decb3d1896785c42361f3d | 3 | {
"blob_id": "4bf6119faef7163450decb3d1896785c42361f3d",
"branch_name": "refs/heads/master",
"committer_date": 1468851656000,
"content_id": "b09ab81f7f22c54be9e7a88f57222e7cb93f4fdb",
"detected_licenses": [
"MIT"
],
"directory_id": "1abf3b2e695ba535973a622682771734eca26abd",
"extension": "py",
"fi... | 2.640625 | stackv2 | import sys
def ask_execution_mode(config):
print("What is the execution mode (once/scheduler):", end="", flush=True)
config['ExecutionMode'] = sys.stdin.readline().strip('\n')
if not (config['ExecutionMode'] == 'once' or config['ExecutionMode'] == 'scheduler'):
print("Sorry, only once or scheduler... | 101 | 38.49 | 117 | 13 | 934 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_39200dd41234ecf8_9fa14abb", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
80
] | [
null
] | [
13
] | [
80
] | |
2024-11-19T02:01:08.668456+00:00 | 1,575,731,252,000 | 273d2fbd4d51e3eeb6453f6b5819184695b8312c | 3 | {
"blob_id": "273d2fbd4d51e3eeb6453f6b5819184695b8312c",
"branch_name": "refs/heads/master",
"committer_date": 1575731252000,
"content_id": "97718e5148ff673c5c3397361b1f8265f6fa7a61",
"detected_licenses": [
"MIT"
],
"directory_id": "e1d197184d50339a91c60681af6b58906de36612",
"extension": "py",
"fi... | 2.625 | stackv2 | class MainWindow(Frame):
def __init__(self, master):
super(MainWindow, self).__init__(master)
self.grid()
self.configure(padx = 20, pady = 20)
self.createFoodMenuList()
#self.create_customer_widgets()
self.create_menu()
self.add_menu(master)
def createFood... | 234 | 47.39 | 164 | 13 | 3,052 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d1b70b8cf9ff3972_678a9f39", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
162
] | [
null
] | [
44
] | [
52
] | |
2024-11-19T00:27:23.289932+00:00 | 1,579,281,839,000 | 36614acf1f89420b9d6b3579aad0a6c083cd473c | 3 | {
"blob_id": "36614acf1f89420b9d6b3579aad0a6c083cd473c",
"branch_name": "refs/heads/master",
"committer_date": 1579281839000,
"content_id": "96234749203de31f32e65420c3c62f9519578289",
"detected_licenses": [
"MIT"
],
"directory_id": "1652b5abd9caee429aa0b08cea6fd7dcf2e173d2",
"extension": "py",
"fi... | 2.8125 | stackv2 | import logging
from uber_rides.session import Session
from uber_rides.client import UberRidesClient
from kalliope.core.NeuronModule import NeuronModule, InvalidParameterException
logging.basicConfig()
logger = logging.getLogger("kalliope")
class Uber (NeuronModule):
def __init__(self, **kwargs):
super(U... | 119 | 39.27 | 137 | 22 | 894 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8eeb95c8fea17d7e_37cc98f7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text."
] | [
26
] | [
null
] | [
22
] | [
40
] | |
2024-11-19T00:40:26.619671+00:00 | 1,547,732,952,000 | fa4d757de2e3ef7eb738c4520b2913efef6e1f04 | 2 | {
"blob_id": "fa4d757de2e3ef7eb738c4520b2913efef6e1f04",
"branch_name": "refs/heads/master",
"committer_date": 1547732952000,
"content_id": "aebacbff88644f6b11b87656284f7f87a822a746",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "7f56b5f6f8f6159573732daff5c5b0f322da19c6",
"extension": "p... | 2.375 | stackv2 | import hmac
import hashlib
from django.conf import settings
from django.contrib.auth.models import User
from .models import TurnusersLt
def sync_new_user_to_coturn(sender, instance, **kwargs):
##
# NOTE: Do not use this for REST API. You do not need to sync users if you are using the REST API.
#
#
... | 43 | 47.19 | 149 | 20 | 445 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_c0c44a0ac6363523_89e63241", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
39
] | [
null
] | [
62
] | [
86
] | |
2024-11-19T01:17:22.795519+00:00 | 1,459,684,593,000 | e803aff1afbdb39dce7e2ccfd650879a065fc21c | 3 | {
"blob_id": "e803aff1afbdb39dce7e2ccfd650879a065fc21c",
"branch_name": "refs/heads/master",
"committer_date": 1459684593000,
"content_id": "3d51f4adf1bf60e042320f0347f8c2c6c68aef7d",
"detected_licenses": [
"MIT"
],
"directory_id": "b64e39f9e28a8697b4bcaf5dab9ba50295954585",
"extension": "py",
"fi... | 2.578125 | stackv2 | import tarfile
import os
import resize
ROOT = "/home/efrat/Documents/19.11.15"
DEST = "/home/efrat/Documents/images"
TUMB = "/home/efrat/Documents/thumbs"
def untar(f):
zip = tarfile.open(f)
zip.extractall(DEST)
for root, subFolders, files in os.walk(ROOT):
for f in files:
filename, file_extension = os... | 23 | 18.65 | 48 | 16 | 134 | python | [{"finding_id": "codeql_py/tarslip_f449b6cd2e6ab4ee_110eb555", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
12
] | [
null
] | [
2
] | [
5
] | |
2024-11-19T01:17:39.432490+00:00 | 1,305,665,737,000 | 208d4ebab8e86280572b432b411d69ef712895bc | 2 | {
"blob_id": "208d4ebab8e86280572b432b411d69ef712895bc",
"branch_name": "refs/heads/master",
"committer_date": 1305665737000,
"content_id": "be9fe9bcfc2dba9a8c1105700f59b2c55b382f7d",
"detected_licenses": [
"BSD-2-Clause",
"BSD-3-Clause",
"MIT"
],
"directory_id": "a78df507e855bccd780821c16e70e... | 2.375 | stackv2 | import urllib2
import urllib
import time
import thread
import tempfile
import shutil
import os
import lib.jsonrpclib as jsonrpclib
import utils
from base_media_backend import BaseMediaBackend
class XBMCMediaBackend(BaseMediaBackend):
"""
The XBMC media backend uses a hybride Web_Server_HTTP_API / JSON-RPC AP... | 263 | 33.18 | 103 | 16 | 1,883 | python | [{"finding_id": "codeql_py/overly-permissive-file_38909339896394a6_a586667b", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
37
] | [
null
] | [
9
] | [
38
] | |
2024-11-19T01:17:42.169940+00:00 | 1,596,878,729,000 | d730a4c748dcb9d3d33c92fad1530c8649c4e32c | 3 | {
"blob_id": "d730a4c748dcb9d3d33c92fad1530c8649c4e32c",
"branch_name": "refs/heads/master",
"committer_date": 1596878729000,
"content_id": "c7c63dbda49f0a4473abce02ccb9eab25b30125c",
"detected_licenses": [
"MIT"
],
"directory_id": "fbbf3619246a346047bdee9f355343ddd8f81d97",
"extension": "py",
"fi... | 2.515625 | stackv2 | #!/usr/bin/env python3
"""Commands to create and store the various kinds of secrets we need.
Uses google secretsmanager api.
See: https://cloud.google.com/secret-manager/docs
"""
# python -m tools.secrets
from pathlib import Path
from sha3 import keccak_256
import argparse
import coincurve
import google.oauth2.crede... | 198 | 34.49 | 128 | 20 | 1,763 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2c6a159ea2b918e8_65e7820f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
74
] | [
null
] | [
15
] | [
59
] | |
2024-11-19T00:43:48.743615+00:00 | 1,612,000,640,000 | 18b6fac5f0b960914032ae6f376b9e1f17b3d3c1 | 3 | {
"blob_id": "18b6fac5f0b960914032ae6f376b9e1f17b3d3c1",
"branch_name": "refs/heads/main",
"committer_date": 1612000640000,
"content_id": "087ea4751446eb907c4419d34729635c0649a1e8",
"detected_licenses": [
"MIT"
],
"directory_id": "12aee78382d00aba87d6e25b5cc6cf9215070e84",
"extension": "py",
"file... | 2.78125 | stackv2 | import requests
from flask import Flask, request
CLIENT_ID = ''
CLIENT_SECRET = ''
GITHUB_TOKEN_URL = 'https://github.com/login/oauth/access_token'
app = Flask(__name__)
@app.route('/')
def index():
return '<a href="https://github.com/login/oauth/authorize?client_id={}"> Login with Github</a>'.format(CLIENT_ID... | 26 | 29.31 | 118 | 10 | 188 | python | [{"finding_id": "codeql_py/flask-debug_55813f091fe27f02_7a6d5b15", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
26,
23
] | [
null,
null
] | [
5,
13
] | [
24,
64
] | |
2024-11-19T00:43:54.146798+00:00 | 1,591,360,824,000 | b8db7cebe24c92a94bd5300278998fd528ee3758 | 3 | {
"blob_id": "b8db7cebe24c92a94bd5300278998fd528ee3758",
"branch_name": "refs/heads/master",
"committer_date": 1591360824000,
"content_id": "4fb3a32f1f78d3155e6ba8fc594e7d1a6fe0ab45",
"detected_licenses": [
"MIT"
],
"directory_id": "987d257ff869b115a2aced532b8b4bef6e9a07cd",
"extension": "py",
"fi... | 2.890625 | stackv2 | # -*- coding: utf-8 -*-
"""
使用方法:命令行中输入:文件名 -n <小偶像名字全部或部分>
或者直接使用下方def searchmember
print(searchmember("小偶像名字全部或部分"))
命令行示例:
root# python3 CQBot_hzx/searchMember.py -n 洪珮雲
result are as follows:
room name: 聊天室A
room id: 67313743
ownerId:63558
ownerName:洪珮雲
root# python3 CQBot_hzx/searchMember.py -n 洪
result are as... | 88 | 25.62 | 165 | 18 | 752 | python | [{"finding_id": "codeql_py/request-without-cert-validation_38613c8e96459f08_7eb40464", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
58
] | [
63
] | [
20
] | [
24
] | |
2024-11-19T01:44:11.786895+00:00 | 1,689,731,420,000 | aa5e1e6cec253d6ec614410b344bec92752cff25 | 2 | {
"blob_id": "aa5e1e6cec253d6ec614410b344bec92752cff25",
"branch_name": "refs/heads/master",
"committer_date": 1689731420000,
"content_id": "3371dfafff73fdcdf9b9f86b93513c19585a3aef",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5aaa665087a055a44e9048aba662b49e63041336",
"extension": "py"... | 2.46875 | stackv2 | # Copyright 2018 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, ... | 70 | 36.44 | 80 | 13 | 570 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_0c6a784a95c80e59_bcc71a12", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [app.k8s.io/](1) may be at an arbitrary position in the... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [app.k8s.io/](1) may be at an arbitrary position in the sanitized URL."
] | [
64
] | [
null
] | [
7
] | [
48
] | |
2024-11-19T00:59:43.534631+00:00 | 1,499,171,653,000 | d0cd9aa843aabbebe4d6bcfb39234d68c706ebeb | 2 | {
"blob_id": "d0cd9aa843aabbebe4d6bcfb39234d68c706ebeb",
"branch_name": "refs/heads/master",
"committer_date": 1499171653000,
"content_id": "ba8d088df915d0c111e443f8913899fb5f93d002",
"detected_licenses": [
"MIT"
],
"directory_id": "3dd75f923e205d5e552e68f019a936f8adb04ff4",
"extension": "py",
"fi... | 2.328125 | stackv2 | # -*- coding: utf-8 -*-
# sudo /srv/homeassistant/bin/python /home/homeassistant/.homeassistant/check_motion_config.py
"""
# Este script está preparado para ejecutarse en el boot, de forma que corrija la configuración de cámaras en MotionEye
hasta que se implemente la edición de comando en final de evento ('on_event_e... | 84 | 41.95 | 118 | 21 | 975 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ca6ad899ae2288e6_42455bdf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
69
] | [
null
] | [
31
] | [
114
] | |
2024-11-19T00:59:46.874926+00:00 | 1,574,195,918,000 | 828299c628c31bde4c06e842c6e044abf3d1ab01 | 2 | {
"blob_id": "828299c628c31bde4c06e842c6e044abf3d1ab01",
"branch_name": "refs/heads/master",
"committer_date": 1574195918000,
"content_id": "dcd9380711bb23f255740649dafa35c1ed94ae66",
"detected_licenses": [
"MIT"
],
"directory_id": "056fb3d8021848b225be8d52217d25e63196c5fd",
"extension": "py",
"fi... | 2.375 | stackv2 | import torch
import numpy as np
from decimal import Decimal, getcontext
import base64
import zlib
import math
import copy
from baseconvert import base
torch.hub.list('pytorch/fairseq')
import fairseq
from fairseq.search import Sampling
# def text2decimal(text):
# compressed_text_data = text.encode('utf-8')#zlib.co... | 296 | 42.75 | 141 | 25 | 3,390 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_78198de719dafcd7_9e0e5f3f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
248
] | [
null
] | [
11
] | [
22
] | |
2024-11-19T01:00:02.476718+00:00 | 1,627,394,632,000 | 93ed8e4f072711edaad83ebe565ca3f3a952481f | 4 | {
"blob_id": "93ed8e4f072711edaad83ebe565ca3f3a952481f",
"branch_name": "refs/heads/main",
"committer_date": 1627394632000,
"content_id": "7960da8daabee3bdf5c23751f7635bf3af6d4551",
"detected_licenses": [
"MIT"
],
"directory_id": "f56544a64dc497ef59786008781b402850225efd",
"extension": "py",
"file... | 3.765625 | stackv2 | import re
# dummy user data
userData = [("helo", "helo@x.com", 17), ("alex", "alex@y.com", -20), ("nova", "novaz.com", 20)]
# custom exception class
class NotUniqueUsernameException (Exception):
def __init__ (self, name):
self.name = name
def __str__ (self):
return "Username (%s) already exists." % (self.name)
... | 57 | 26.33 | 95 | 12 | 449 | python | [{"finding_id": "codeql_py/redos_54c0aff1e7b1fe8b_1577d75c", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "remediati... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'a@' and containing many repetitions of '_'."
] | [
44,
44
] | [
null,
null
] | [
20,
37
] | [
34,
51
] | |
2024-11-19T01:21:25.990378+00:00 | 1,546,491,077,000 | 536b8b299db4a2c20d23c2fdc98a5b1c9e19793f | 2 | {
"blob_id": "536b8b299db4a2c20d23c2fdc98a5b1c9e19793f",
"branch_name": "refs/heads/master",
"committer_date": 1546491077000,
"content_id": "2d114abfa559e86c378e6ab13964585b369e8d32",
"detected_licenses": [
"MIT"
],
"directory_id": "1b6461df367242527e93da2a0c51d850948bedf2",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/env python2
import os
import operator
from flask import Flask, request, jsonify, send_from_directory
from flask_pymongo import PyMongo, ASCENDING
from flask_socketio import SocketIO
from flask_cors import CORS
from bson.objectid import ObjectId
from models.user import User
from models.meme import Meme
fro... | 409 | 30.49 | 119 | 16 | 2,715 | python | [{"finding_id": "codeql_py/path-injection_0252c0f137bf5a4a_a67187a6", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
403
] | [
null
] | [
27
] | [
59
] | |
2024-11-19T01:21:38.931777+00:00 | 1,601,120,102,000 | bc1ceecf6c3390baff0b79fa36467dc713ed2ba5 | 3 | {
"blob_id": "bc1ceecf6c3390baff0b79fa36467dc713ed2ba5",
"branch_name": "refs/heads/master",
"committer_date": 1601120102000,
"content_id": "8b6c28be214f9ae8f9face189cab834a333c478a",
"detected_licenses": [
"MIT"
],
"directory_id": "841a9976e31f6359d46538b107e1268792b6715d",
"extension": "py",
"fi... | 2.6875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import logging
from telegram import (ReplyKeyboardMarkup, ReplyKeyboardRemove)
from telegram.ext import (Updater, CommandHandler, MessageHandler, Filters,
ConversationHandler)
from weather import getWeatherAtCoords
# Enable logging
logging.basi... | 99 | 29.13 | 83 | 17 | 647 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8a7265fec1b17f1a_83de786e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
34,
35
] | [
null,
null
] | [
61,
17
] | [
83,
40
] | |
2024-11-19T01:33:50.138493+00:00 | 1,594,772,042,000 | 15b92d5fed7d59a724014d12f06b453617ea3238 | 2 | {
"blob_id": "15b92d5fed7d59a724014d12f06b453617ea3238",
"branch_name": "refs/heads/master",
"committer_date": 1594772042000,
"content_id": "48c25a2923a77e5592008d4b262bc4871d8073be",
"detected_licenses": [
"MIT"
],
"directory_id": "4d86100281031513ea24cc98dcaf16183fb49671",
"extension": "py",
"fi... | 2.328125 | stackv2 | #from __future__ import print_function , unicode_literal
import jinja2
import time
import csv
cancel = False
device_list= []
with open ('dev_list.yml' , 'w') as f:
f.writelines("---\n\n")
file = csv.reader(open('switches-list.csv'),delimiter = ',')
next(file)
for line in file :
dev_name = line[2]
... | 28 | 26.64 | 95 | 11 | 196 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e6f71c781eba8355_4f7ed96c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25
] | [
null
] | [
20
] | [
45
] | |
2024-11-19T01:56:36.611348+00:00 | 1,502,625,880,000 | d29f60d0341e267111c66fb5af5b2a3a58c829b5 | 3 | {
"blob_id": "d29f60d0341e267111c66fb5af5b2a3a58c829b5",
"branch_name": "refs/heads/master",
"committer_date": 1502625880000,
"content_id": "c92d3233e4f1cbb8f4ad463a1b991356f4fef5d3",
"detected_licenses": [
"MIT"
],
"directory_id": "c511110f326b6e2fe702e05321498b35d8448699",
"extension": "py",
"fi... | 2.609375 | stackv2 | # coding=utf-8
import sublime
import sublime_plugin
import re
class QuickGotoCommand(sublime_plugin.TextCommand):
def doCommand(self, edit, prifix, reg, show_files = True):
for sel in self.view.sel():
if sel.empty():
sel = self.view.word(sel)
word_sel = self.view.sub... | 39 | 39.72 | 130 | 17 | 393 | python | [{"finding_id": "codeql_py/overly-large-range_97e2376d0dc618c8_dd4482ab", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[+,\\-.\\/0-9\\].", "remediation": "", "location": {"... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[+,\\-.\\/0-9\\].",
"Suspicious character range that is equivalent to \\[@A-Z\\\\[\\\\\\\\]^_`a-z{{\\]."
] | [
38,
38
] | [
null,
null
] | [
42,
47
] | [
45,
50
] | |
2024-11-19T01:56:38.938546+00:00 | 1,585,167,064,000 | e98e476a1f5a35f7bef9f1ffbc71391ad0544b91 | 2 | {
"blob_id": "e98e476a1f5a35f7bef9f1ffbc71391ad0544b91",
"branch_name": "refs/heads/master",
"committer_date": 1585167064000,
"content_id": "67f755aca2ab287e0c876f8c81aff3700ea7de57",
"detected_licenses": [
"MIT"
],
"directory_id": "eb57e632fb351db1975ad0e15bd480759bbc153b",
"extension": "py",
"fi... | 2.34375 | stackv2 | from rest_framework import status, viewsets
from rest_framework.decorators import action
from rest_framework.exceptions import NotFound, ValidationError
from rest_framework.response import Response
from .mixins import (
RetrieveMixin,
ListMixin
)
from .. import services
from ..models import Task
from ..seriali... | 183 | 27.92 | 72 | 15 | 1,051 | python | [{"finding_id": "codeql_py/stack-trace-exposure_2837e8ffb9ef959d_60faef37", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
87,
177
] | [
null,
null
] | [
35,
35
] | [
38,
38
] | |
2024-11-19T01:56:44.540745+00:00 | 1,670,472,964,000 | 2706e9640500f1906dd295330987f59eb22ab335 | 3 | {
"blob_id": "2706e9640500f1906dd295330987f59eb22ab335",
"branch_name": "refs/heads/master",
"committer_date": 1670472964000,
"content_id": "ed368771aff16c6f0581b5a479d24ee310fd2ed0",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "77a2199488e00a2d71ce92bfc2cb1e5d1067ee3f",
"extension": "p... | 2.65625 | stackv2 | """Endpoint decorators
The Dorest project
:copyright: (c) 2020 Ichise Laboratory at NII & AIST
:author: Rungsiman Nararatwong
"""
import importlib
from functools import wraps
from typing import Any, Callable, List
from django.conf import settings
from rest_framework import status
from rest_framework.request import ... | 70 | 41.3 | 142 | 26 | 616 | python | [{"finding_id": "codeql_py/stack-trace-exposure_7d818c0362a564ba_37f6554c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
55
] | [
null
] | [
37
] | [
59
] | |
2024-11-19T01:56:49.401150+00:00 | 1,623,728,711,000 | bd748a5c4d82d352d14e0754f562a1d4b5a53370 | 3 | {
"blob_id": "bd748a5c4d82d352d14e0754f562a1d4b5a53370",
"branch_name": "refs/heads/main",
"committer_date": 1623728711000,
"content_id": "e36b6b1e49720795ee9a6e770b85afed0b6b7945",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "7dc65f7a42a151f24a35cf16e112ee3ad9c2d8de",
"extension": "py"... | 2.53125 | stackv2 | import os
import sys
from pathlib import Path
import hashlib
from base64 import b64encode, b64decode
from Cryptodome.Cipher import AES
from Cryptodome.Random import get_random_bytes
from Crypto.Util.Padding import pad, unpad
from PyQt5 import QtWidgets
from PyQt5.QtCore import Qt
from PyQt5.QtWidgets import QMainWindow... | 238 | 40.16 | 131 | 20 | 2,318 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_8a33c7ca6dcc0e0c_2594ef04", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
132,
156
] | [
null,
null
] | [
35,
32
] | [
63,
56
] | |
2024-11-19T02:10:27.260436+00:00 | 1,450,238,644,000 | 851dd24a12c51b9efab2ab2e33d46001bcd2c382 | 2 | {
"blob_id": "851dd24a12c51b9efab2ab2e33d46001bcd2c382",
"branch_name": "refs/heads/master",
"committer_date": 1450238644000,
"content_id": "f9040a5daceefb40a674938fab9ee19d66f7e9a9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8e4dd269b102620b824d6b2c5888e1e45b302657",
"extension": "py"... | 2.3125 | stackv2 | #!/usr/bin/env python
import cv2
import numpy as np
import argparse
import math
import pickle
from sklearn.decomposition import PCA
from nmf_support import *
import sys, os
if __name__ == '__main__':
#------------------------------------------------------
# Args parser
#--------------------------------------... | 100 | 32.23 | 107 | 16 | 942 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1a5269b93d4ed303_f817c5bd", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
94
] | [
null
] | [
18
] | [
107
] | |
2024-11-19T02:10:27.975659+00:00 | 1,590,045,474,000 | a86d9f07365229b0380de3aa2b1a6e371fe5ac59 | 3 | {
"blob_id": "a86d9f07365229b0380de3aa2b1a6e371fe5ac59",
"branch_name": "refs/heads/master",
"committer_date": 1590045474000,
"content_id": "152105459826610c9db711965acd7bc3baf6a5a0",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "528db1ec466269f0137d49da9737aa51ee55e55e",
"extension": "p... | 2.5625 | stackv2 | import datetime
import json
import numpy as np
import traceback
from cloudvolume import CloudVolume
# Import local modules
import process
import config
from flask import Flask, request, make_response, jsonify
app = Flask(__name__)
@app.route("/")
def hello():
"""Return service running."""
running = datetim... | 91 | 25.18 | 92 | 17 | 553 | python | [{"finding_id": "codeql_py/stack-trace-exposure_dd1dd39fecd2c8e9_55a1a8ae", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
55,
67,
81
] | [
null,
null,
null
] | [
16,
16,
38
] | [
33,
33,
56
] | |
2024-11-19T02:10:34.032892+00:00 | 1,610,153,756,000 | 9559546f91fac0ed3a8e55bd05ad17f40268f7ab | 3 | {
"blob_id": "9559546f91fac0ed3a8e55bd05ad17f40268f7ab",
"branch_name": "refs/heads/main",
"committer_date": 1610153756000,
"content_id": "baafe768b7c5e8d73f5f8fbd2137d86fdb548378",
"detected_licenses": [
"MIT"
],
"directory_id": "e8e940333c4f74e4ac3ef08182b6258dc89e0438",
"extension": "py",
"file... | 2.671875 | stackv2 | from flask import Flask, render_template, request, url_for, redirect
from flask_restful import Resource, Api
from flask_cors import CORS
import requests
import json
app = Flask(__name__)
CORS(app) ## To allow direct AJAX calls
@app.route("/", methods=["GET"])
def home():
url = "http://localhost:8000/api/books"
... | 50 | 23.12 | 70 | 13 | 299 | python | [{"finding_id": "codeql_py/flask-debug_046465d12fe62385_e7d5ed5d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
50,
45
] | [
null,
null
] | [
4,
10
] | [
25,
41
] | |
2024-11-19T02:45:49.415934+00:00 | 1,669,357,592,000 | a375c0926b28abba8b25eef8d1c124017713fa14 | 3 | {
"blob_id": "a375c0926b28abba8b25eef8d1c124017713fa14",
"branch_name": "refs/heads/master",
"committer_date": 1669357592000,
"content_id": "564747ddf028fcd6adc9a3a852b962332cd87076",
"detected_licenses": [
"MIT"
],
"directory_id": "a7b17fc8b67f344869a88500c5d92dd1fc5294b2",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/python3
import base64
import os
import shutil
## 模板套用函数
def alter(file,old_str,new_str):
with open(file,'r+',encoding='utf-8') as ca:
wc = ca.readlines()
with open('new','w+',encoding='utf-8') as cb:
for i in wc:
if old_str in i:
i = i.rep... | 78 | 32.23 | 74 | 16 | 644 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_9046de90b19eb278_81555247", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
14,
64
] | [
null,
null
] | [
30,
11
] | [
31,
64
] | |
2024-11-19T02:45:49.918719+00:00 | 1,572,169,189,000 | 505287c95aa285c1c8fbdb9b910b1d17af8e3b1a | 3 | {
"blob_id": "505287c95aa285c1c8fbdb9b910b1d17af8e3b1a",
"branch_name": "refs/heads/master",
"committer_date": 1572169189000,
"content_id": "8a1f5fe393e205116416e77ecb2978d84dcf43ec",
"detected_licenses": [
"MIT"
],
"directory_id": "bee81a13f17874edd0b4a79cf2afc35c7dcb9cee",
"extension": "py",
"fi... | 2.859375 | stackv2 | from flask import Flask
from waitress import serve
DESARROLLO=True
PUERTO_ACCESO=5000
app = Flask(__name__)
@app.route("/health")
def health_ok():
return "ok McKay"
@app.route("/")
def hello():
return "¡Hola mundo!"
@app.route("/echo/<texto>")
def echo(texto):
return(texto)
if __name__ == '__main__':
if DESAR... | 25 | 17.6 | 70 | 12 | 139 | python | [{"finding_id": "codeql_py/flask-debug_108fe733be94e42b_14545381", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
23,
19
] | [
null,
null
] | [
3,
9
] | [
22,
14
] | |
2024-11-19T02:57:21.526457+00:00 | 1,636,642,615,000 | 435d9cffb81cd7cac4753753539268d98b90301c | 4 | {
"blob_id": "435d9cffb81cd7cac4753753539268d98b90301c",
"branch_name": "refs/heads/master",
"committer_date": 1636642615000,
"content_id": "ab4266509b0fd7e7596bf8b0236b2c2321193aa2",
"detected_licenses": [
"MIT"
],
"directory_id": "5c45555b9ab5e3627123830b83d9a7cc285902f9",
"extension": "py",
"fi... | 3.796875 | stackv2 |
class Person:
def __init__(self, name, age, height, weight, gender):
self.name = name
self.age = age
self.height = height
self.weight = weight
self.gender = gender
try:
if isinstance(age, str):
self.age = int(age)
if isinsta... | 45 | 28.93 | 119 | 16 | 390 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cf6565a709ca3baf_021a91b7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
42
] | [
null
] | [
33
] | [
54
] | |
2024-11-19T03:12:09.210165+00:00 | 1,534,322,369,000 | afa612e042f904ec9c5a397640dfd9fd8e84bcd9 | 3 | {
"blob_id": "afa612e042f904ec9c5a397640dfd9fd8e84bcd9",
"branch_name": "refs/heads/master",
"committer_date": 1534322369000,
"content_id": "ea3b0f4f6810e1e5908617887dc8f06558e2a1d4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "dc2f4a77e8b1dd50817db99b51d980884aedc13f",
"extension": "py"... | 3.375 | stackv2 | import string as sg
import random
import json
class PassGenerator():
file_name = None
mypasslist = []
def __init__(self, file_name):
self.file_name = file_name
while True:
menu = self.input_control_error("""
Please select an action:
1 - Create new passw... | 99 | 29.71 | 107 | 19 | 608 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f1800bfdf5464ee9_aedb1965", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
79,
85
] | [
null,
null
] | [
19,
23
] | [
42,
46
] | |
2024-11-19T03:12:09.491947+00:00 | 1,516,840,744,000 | 4c1f82be585f548749c8715455da0839c0b2446d | 2 | {
"blob_id": "4c1f82be585f548749c8715455da0839c0b2446d",
"branch_name": "refs/heads/master",
"committer_date": 1516840744000,
"content_id": "53feb44712a38d508405c7ffd44ee93781c0b80b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "911731c86674e0809b5c1c7f30b8553c2e8d5745",
"extension": "py"... | 2.46875 | stackv2 | """ module that defines a bottle routing app that can grafted onto cherrypy """
import logging
from functools import wraps
from datetime import datetime
from bottle import Bottle, request, response, static_file
from webdep import PUBDIR
from webdep.templates import INDEX_TEMPLATE, ERROR_TEMPLATE
# get instance of ... | 92 | 25.33 | 79 | 13 | 531 | python | [{"finding_id": "codeql_py/log-injection_e748ea4717b33db3_5a3be5fb", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
27,
46
] | [
33,
52
] | [
22,
19
] | [
14,
10
] | |
2024-11-19T01:33:39.117271+00:00 | 1,597,227,470,000 | c8bf7988224ac8d2297a3ee16734734f585d003f | 3 | {
"blob_id": "c8bf7988224ac8d2297a3ee16734734f585d003f",
"branch_name": "refs/heads/master",
"committer_date": 1597227470000,
"content_id": "ac03741c9d483b9e10fea0a573c43d78d3d6f548",
"detected_licenses": [
"MIT"
],
"directory_id": "08d6af60974955e32c1a33b593f393f1b94f4696",
"extension": "py",
"fi... | 2.734375 | stackv2 | import os
import json
from sqlalchemy import create_engine
import snowflake.connector
import configparser
try:
import boto3
except ImportError as e:
print('Cannot import boto3, if you want to use credsman_connect, please'
' ensure that boto3 is installed')
class SnowConn:
_alchemy_engine = None... | 320 | 39.12 | 126 | 17 | 2,687 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_44dd161fc94f6fa5_f3528c0c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text."
] | [
305
] | [
306
] | [
17
] | [
60
] | |
2024-11-19T01:33:40.478971+00:00 | 1,431,585,205,000 | 6edc021c423602aba1efe6483c891f297b7b506f | 2 | {
"blob_id": "6edc021c423602aba1efe6483c891f297b7b506f",
"branch_name": "refs/heads/master",
"committer_date": 1431585205000,
"content_id": "f6faa3d90970afe74aacc4084dbec4c660b1a6b2",
"detected_licenses": [
"MIT"
],
"directory_id": "ca86f17aca0e22160a599f23ec6975a53ac96dfc",
"extension": "py",
"fi... | 2.3125 | stackv2 | #setup.py
#!/usr/bin/python
#Quam Sodji Copyright 2015
import subprocess
import os
import time
import shutil
"""Configure the pieces for hostname generator"""
#### Modifiable fields ###########
DS_repo_path = 'Full path to DS Repo'
############### Paths ###############
Biplist_url = 'https://bitbucket.org/wooster/b... | 85 | 28.06 | 97 | 11 | 600 | python | [{"finding_id": "codeql_py/overly-permissive-file_6a4f55629dd43667_04fda36b", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable."
] | [
55,
82
] | [
null,
null
] | [
5,
15
] | [
28,
57
] | |
2024-11-19T01:33:44.676706+00:00 | 1,507,621,189,000 | 94a41b64da8ed21c98ca25ce08c9d868a933edd1 | 3 | {
"blob_id": "94a41b64da8ed21c98ca25ce08c9d868a933edd1",
"branch_name": "refs/heads/master",
"committer_date": 1507621189000,
"content_id": "798d5fbae6aa2647fd7f94391dc2cb46ff0ffc20",
"detected_licenses": [
"MIT"
],
"directory_id": "21c8a6e3d6bf280e749f0a6ed38308cd99c7435a",
"extension": "py",
"fi... | 2.53125 | stackv2 | import bcrypt
import random
import requests
from .config import (KEEHOST_URL, KEEHOST_APIKEY, SUPERADMIN, TOKEN_LENGTH, TOKEN_CHARSET)
from flask import (Flask, request, jsonify)
app = Flask(__name__)
@app.route('/')
def root():
""" Login service root route """
return jsonify({})
def valid_field(field):
... | 86 | 34.53 | 155 | 23 | 651 | python | [{"finding_id": "codeql_py/partial-ssrf_1c8207bcf0181b53_c09b5e90", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 4 | true | [
"CWE-918",
"CWE-918",
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
31,
34,
62,
81
] | [
null,
null,
65,
83
] | [
17,
21,
25,
17
] | [
135,
133,
80,
104
] | |
2024-11-19T01:57:31.545323+00:00 | 1,589,208,401,000 | 108923cd8b9a42eb606bca1dd452bdd7f385db71 | 2 | {
"blob_id": "108923cd8b9a42eb606bca1dd452bdd7f385db71",
"branch_name": "refs/heads/master",
"committer_date": 1589208401000,
"content_id": "986bc4ea8a20b4e206e5317a261145d9e81d84ad",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "6fe6605aab63a5cd6251ca4074765bf3fe11933a",
"extension": "p... | 2.390625 | stackv2 | from flask import Flask, Response, request, abort
from urllib.parse import urlparse
from werkzeug.routing import Rule
import os
import psutil
import requests
import sys
def get_routes():
routes = {}
for process in psutil.process_iter(attrs=["environ"]):
try:
host = process.info["environ"][... | 83 | 25.05 | 78 | 13 | 490 | python | [{"finding_id": "codeql_py/flask-debug_b1245be957e2ee85_93fe0ace", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 6 | true | [
"CWE-215",
"CWE-918",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/flask-debug",
"py/partial-ssrf",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"... | [
62,
41,
32,
38,
38,
38
] | [
69,
48,
null,
null,
null,
null
] | [
5,
27,
46,
49,
65,
75
] | [
6,
6,
54,
63,
73,
79
] | |
2024-11-19T02:11:24.498880+00:00 | 1,551,364,562,000 | 7102781873ebc438db0973c51c006c4494b40e6a | 3 | {
"blob_id": "7102781873ebc438db0973c51c006c4494b40e6a",
"branch_name": "refs/heads/master",
"committer_date": 1551459421000,
"content_id": "c394d9fc449e0aafc34397a27055cbd313b381b1",
"detected_licenses": [
"MIT"
],
"directory_id": "033728a8a9f35da6e0905e40ce6fa1e7c7a3112c",
"extension": "py",
"fi... | 2.953125 | stackv2 | """
Provides FacePP Demo.
"""
from __future__ import print_function, unicode_literals
import json
from . import FacePP, exceptions
def face_detection(app):
"""
Detect and analyze human faces within the image that you provided.
"""
print('[Face Detection]')
img_url = 'https://www.faceplusplus.c... | 230 | 32.93 | 111 | 15 | 1,844 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b9bfd01620545108_fb3b582c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
28,
115,
174
] | [
null,
null,
null
] | [
30,
30,
30
] | [
51,
51,
51
] | |
2024-11-19T02:11:31.169345+00:00 | 1,549,246,818,000 | d106af1a129315c339f8a50e1a74afc7215069fc | 3 | {
"blob_id": "d106af1a129315c339f8a50e1a74afc7215069fc",
"branch_name": "refs/heads/master",
"committer_date": 1549246818000,
"content_id": "e8af40400d57111c705b61330a68580f9ef1e32f",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "6b7726eb1ab13a86634e435e14abeb80a5bf3588",
"extension": "p... | 2.9375 | stackv2 | """
app module maintains the initiation of flask application and data ingestion and cleansing process
Author: Srinivas Rao Cheeti
email: srinivascheeti1@gmail.com
Date: Feb 2, 2019
"""
from flask import Flask, request, jsonify, render_template
from flask import abort
import logging
try:
import app_worker
except... | 152 | 38.2 | 114 | 17 | 1,367 | python | [{"finding_id": "codeql_py/flask-debug_4f6d262f3dffac82_2c52e130", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/flask-debug",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).",
"This log entry depends on a [user-provided value](1).",
"This log entry depend... | [
149,
62,
79,
113
] | [
null,
null,
null,
null
] | [
9,
18,
18,
18
] | [
49,
95,
114,
94
] | |
2024-11-19T02:11:44.173767+00:00 | 1,556,439,984,000 | 4806cb5640a6a1794266468b32225d31a95a5152 | 2 | {
"blob_id": "4806cb5640a6a1794266468b32225d31a95a5152",
"branch_name": "refs/heads/master",
"committer_date": 1556439984000,
"content_id": "8c79df4849b8fa3194ff4b7ce111831b5032a533",
"detected_licenses": [
"MIT"
],
"directory_id": "0579a04f2d9b1e2769d5f8361ba8d970f46dab23",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/env python3
import logging
import os
import random
import string
import sys
import twilio.rest
from profanityfilter import ProfanityFilter
sys.path.append(os.path.join(os.path.dirname(__file__), './..')) # noqa: I003
import mqtt_json # noqa: E402,I001
logger = logging.getLogger('sms-print-gateway')
SEN... | 79 | 32.65 | 86 | 12 | 616 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c1e57d932cb122e6_d8bb2ed0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
77
] | [
null
] | [
18
] | [
60
] | |
2024-11-19T02:11:49.792102+00:00 | 1,550,313,461,000 | e06669585e4813211fde20c44034bd9e7362e2c0 | 3 | {
"blob_id": "e06669585e4813211fde20c44034bd9e7362e2c0",
"branch_name": "refs/heads/master",
"committer_date": 1550313461000,
"content_id": "c9d301e0a9f97d52bea18cdcf4ac8109e763728b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bba2bffcdf2867a586550323211518fb69ef8474",
"extension": "py"... | 2.515625 | stackv2 | import tensorflow as tf
import numpy as np
import os.path
import hashlib
import sys
import tarfile
import time
from io import BytesIO
from six.moves import urllib
from tensorflow.python.platform import gfile
from PIL import Image
# DATA_URL = 'http://download.tensorflow.org/models/image/imagenet/inception-v3-2016-03-... | 110 | 36.65 | 104 | 18 | 984 | python | [{"finding_id": "codeql_py/tarslip_9136cb0252f95922_2265041f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
47
] | [
null
] | [
5
] | [
35
] | |
2024-11-19T02:33:43.465356+00:00 | 1,634,394,652,000 | 50a7ad4f3355289a9d1462c02d39bd2bd077366b | 3 | {
"blob_id": "50a7ad4f3355289a9d1462c02d39bd2bd077366b",
"branch_name": "refs/heads/master",
"committer_date": 1634394652000,
"content_id": "4a15f429d8063cb5824490e339b34e7092ccf450",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ad105c4dca820dfda688c569c4f23e484c666b5f",
"extension": "py"... | 2.765625 | stackv2 | import re
import os
import logging
from distutils.version import StrictVersion
WARNING_LEVEL = 'Low'
ID_PREFIX = 'coverity'
def get_error_indices(raw_input_file):
"""This function gets the indices of the first line of all Coverity warnings.
Inputs:
- raw_input_file: Full path to the file containing ... | 250 | 37.79 | 112 | 22 | 2,164 | python | [{"finding_id": "codeql_py/overly-permissive-file_2825f8cadd54d442_cf8540c7", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 3 | true | [
"CWE-732",
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable."
] | [
100,
166,
231
] | [
null,
null,
null
] | [
5,
5,
5
] | [
38,
38,
38
] | |
2024-11-19T02:59:18.036905+00:00 | 1,469,028,459,000 | 9b9b8cc665ddf8039e47ed3bb6b3892bcb39115e | 3 | {
"blob_id": "9b9b8cc665ddf8039e47ed3bb6b3892bcb39115e",
"branch_name": "refs/heads/master",
"committer_date": 1469028459000,
"content_id": "97c919f979b89f346c627ff399346dc9fbd97ba6",
"detected_licenses": [
"MIT"
],
"directory_id": "e319d0ac37bc57e0c04c2356ba105a62106eb650",
"extension": "py",
"fi... | 2.515625 | stackv2 | #!/usr/bin/env python
import json
import jinja2
import logging
import webapp2
from google.appengine.api import urlfetch
class MainHandler(webapp2.RequestHandler):
def get(self):
"""Respond to HTML GET requests"""
logging.info("===== %s.get()" % self.__class__.__name__)
template = jinja_env.g... | 44 | 25.73 | 113 | 15 | 287 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c584fd16b167ae5b_80203f9d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
40
] | [
null
] | [
13
] | [
76
] | |
2024-11-19T02:59:26.170632+00:00 | 1,692,279,512,000 | f2f04cd3086d2cb16d7e1678bbf950a1f0fd7a5d | 3 | {
"blob_id": "f2f04cd3086d2cb16d7e1678bbf950a1f0fd7a5d",
"branch_name": "refs/heads/master",
"committer_date": 1692279512000,
"content_id": "6b5ceae2918535bd5030f0126fa25eab8c87b063",
"detected_licenses": [
"MIT"
],
"directory_id": "82a40fd597a3edb2a2edda2a87e055f89ea98a79",
"extension": "py",
"fi... | 2.84375 | stackv2 | "Various utility functions."
import datetime
import email.message
import hashlib
import smtplib
import string
import uuid
import unicodedata
import couchdb2
import marko
from publications import constants
from publications import settings
import publications.database
def get_iuid():
"Return a unique instance ... | 286 | 30.63 | 85 | 20 | 1,925 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_25c7fb2634104271_0cce11ca", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
27,
28
] | [
null,
null
] | [
29,
19
] | [
70,
43
] | |
2024-11-19T02:59:34.672313+00:00 | 1,588,011,334,000 | 1d2fb6afddbf061ec357d726446b338c1b15ce4c | 2 | {
"blob_id": "1d2fb6afddbf061ec357d726446b338c1b15ce4c",
"branch_name": "refs/heads/master",
"committer_date": 1588011334000,
"content_id": "fedd77aafe8f59ec7d2b47c4be01cf35317dbb3d",
"detected_licenses": [
"MIT"
],
"directory_id": "0244cdfb081766eb977af5baf0365162c6838ae1",
"extension": "py",
"fi... | 2.484375 | stackv2 | from flask import Flask, render_template, request
import requests
import json
from multiprocessing import Pool
from functools import partial
app = Flask(__name__)
@app.route("/")
def init():
return render_template("index.html")
@app.route('/api/v1/about', methods=["GET"])
def about_view():
return render_te... | 110 | 30.66 | 109 | 18 | 790 | python | [{"finding_id": "codeql_py/stack-trace-exposure_f175e457d2a0b0ee_1b6fef59", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 9 | true | [
"CWE-209",
"CWE-209",
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-918",
"CWE-918",
"CWE-918"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"... | [
36,
46,
108,
26,
28,
32,
56,
72,
83
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
16,
16,
5,
24,
24,
24,
20,
24,
24
] | [
27,
27,
40,
66,
69,
67,
47,
96,
94
] | |
2024-11-19T02:59:54.526642+00:00 | 1,665,525,302,000 | a06208e130d935284d02adf8c00bc8b3a8378efd | 3 | {
"blob_id": "a06208e130d935284d02adf8c00bc8b3a8378efd",
"branch_name": "refs/heads/master",
"committer_date": 1665525302000,
"content_id": "5d0f254a5ea052efe1d0a71e8e3923a04c99cb22",
"detected_licenses": [
"MIT"
],
"directory_id": "4529969633702504c4352de00d68025966b6d660",
"extension": "py",
"fi... | 3.046875 | stackv2 | from hashlib import md5
from Crypto.Cipher import AES
KEY_LEN = max(AES.key_size)
def derive_password(passwd, salt):
pwd = passwd.strip()
max_len = KEY_LEN + AES.block_size
# Add salt to passwd
pwd = pwd.encode("ascii", "ignore") + salt
md5_digest = md5(pwd).digest()
d = md5_digest + pwd
... | 21 | 21.9 | 60 | 12 | 138 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_e8db9d20a6c5a9d4_a01edaf3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp... | [
13,
17
] | [
null,
null
] | [
22,
17
] | [
25,
18
] | |
2024-11-19T02:59:57.806342+00:00 | 1,635,520,500,000 | ce9268b814677299c1eed447fe28322263570abe | 2 | {
"blob_id": "ce9268b814677299c1eed447fe28322263570abe",
"branch_name": "refs/heads/master",
"committer_date": 1635520516000,
"content_id": "b8488c0e510241f1083b5893e9af193e63e3997c",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "ee1b623579d614941806cbd3ad95a172f6cd535d",
"extension": "p... | 2.4375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import os
import logging
from flask import Flask, request
import telepot
from reddit import authenticate, get_posts
from dotenv import load_dotenv
from storit import Storit
MSG_DB = 'last'
SUBS_DB = 'subs'
load_dotenv()
def get_last_message(user_id):
store = St... | 123 | 25.61 | 111 | 17 | 781 | python | [{"finding_id": "codeql_py/log-injection_142514920d776f15_b04f634a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 4 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
35,
42,
78,
80
] | [
null,
null,
null,
null
] | [
19,
23,
31,
23
] | [
53,
59,
64,
64
] | |
2024-11-19T02:59:59.946249+00:00 | 1,578,152,212,000 | 5145bf964e3db42e24255257b49f72dc2a5ff382 | 4 | {
"blob_id": "5145bf964e3db42e24255257b49f72dc2a5ff382",
"branch_name": "refs/heads/master",
"committer_date": 1578152212000,
"content_id": "aaf0f291f3fca7a9037e634df7448f40298886a1",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "0d85c29a7189a1c430b4b846cb35bf502586449d",
"extension": "p... | 3.6875 | stackv2 | # -*- coding: utf-8 -*-
"""
code
====
FSIC parser to operate on Python code blocks extracted from code chunks, in
order to generate class definition-compatible code.
"""
import re
def translate(block, period='period'):
"""Convert the code in `block` to a model-compatible code block.
Parameters
=======... | 259 | 33.86 | 80 | 18 | 1,995 | python | [{"finding_id": "codeql_py/overly-large-range_efea468d142c2f70_f0398b46", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
53,
69,
84
] | [
null,
null,
null
] | [
64,
103,
117
] | [
67,
106,
120
] | |
2024-11-19T03:24:50.999061+00:00 | 1,626,939,468,000 | e12e4890617502946ddb80114224b5075646f1c4 | 2 | {
"blob_id": "e12e4890617502946ddb80114224b5075646f1c4",
"branch_name": "refs/heads/main",
"committer_date": 1626939468000,
"content_id": "ed9ecf1ed963814ee0295d260e5aa8eff7d17d5b",
"detected_licenses": [
"MIT",
"Apache-2.0"
],
"directory_id": "f3df26a7cd7e0e76a6a283d7f33f0d49348f84f3",
"extensi... | 2.328125 | stackv2 | """
NeuralWOZ
Copyright (c) 2021-present NAVER Corp.
Apache License v2.0
"""
import nltk
from nltk.translate.bleu_score import sentence_bleu
import re
BOOLEAN = {
"hotel-parking": {
"yes": [r"(include|have) (free )?parking"],
"no": [r"doesn't need to (include|have) (free )?parking"],
},
"... | 235 | 31.39 | 93 | 19 | 1,822 | python | [{"finding_id": "codeql_py/redos_b595b5dd387d4956_25d5e217", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<span class='emphasis'>' and cont... | 6 | true | [
"CWE-1333",
"CWE-1333",
"CWE-1333",
"CWE-1333",
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos",
"py/redos",
"py/redos",
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '<span class='emphasis'>' and containing many repetitions of '0'.",
"This part of the regular expression may cause exponential backtracking on strings starting with '<span class='emphasis'>same' and containing many re... | [
137,
137,
178,
178,
229,
229
] | [
null,
null,
null,
null,
null,
null
] | [
37,
52,
41,
56,
37,
74
] | [
48,
63,
52,
67,
48,
85
] | |
2024-11-19T03:24:52.940625+00:00 | 1,589,939,159,000 | 02b275e29a668d6ee6d90fa9b3bfdf8022bac72e | 3 | {
"blob_id": "02b275e29a668d6ee6d90fa9b3bfdf8022bac72e",
"branch_name": "refs/heads/master",
"committer_date": 1589939159000,
"content_id": "6bd74d575a679f31b2e2f0d15d39046ff7feaffb",
"detected_licenses": [
"MIT"
],
"directory_id": "c616586cfc1f6f03ce50a4ca57f6f53f2df8e8ae",
"extension": "py",
"fi... | 2.75 | stackv2 | import os
import sys
from logging.config import dictConfig
from io import StringIO
from flask import Flask, request, jsonify
# Logs configuration
dictConfig({
"version": 1,
"formatters": {
"console": {
"format": "[%(asctime)s] [%(levelname)s] %(module)s: %(message)s"
}
},
"... | 83 | 23.72 | 77 | 16 | 459 | python | [{"finding_id": "codeql_py/stack-trace-exposure_d0eacd214bdff63b_2300d6e0", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-094",
"CWE-117",
"CWE-117"
] | [
"py/stack-trace-exposure",
"py/code-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This code execution depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
83,
64,
49,
57
] | [
null,
null,
null,
null
] | [
24,
14,
29,
13
] | [
59,
29,
71,
64
] | |
2024-11-19T03:35:19.189151+00:00 | 1,557,584,629,000 | 0b1d78b7cac88006971f39304ce08afae2277efe | 3 | {
"blob_id": "0b1d78b7cac88006971f39304ce08afae2277efe",
"branch_name": "refs/heads/master",
"committer_date": 1557584629000,
"content_id": "336fb847641a5a134d0abeb78c7c95b73df0233b",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "ac4cc4bcf556e6047467be9b4469d32dac79ebda",
"extension": "p... | 2.546875 | stackv2 | """
Provides HTML rendered.
"""
from __future__ import absolute_import, print_function, unicode_literals
from future.builtins import super
from functools import partial
import jinja2
import random
import docta.renderers.base as base
import docta.utils.fs as fs
import docta.utils.md2 as md
import docta.utils.meta as met... | 196 | 30.02 | 88 | 16 | 1,286 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_38600f122cb99e1a_c285ce08", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
26
] | [
null
] | [
22
] | [
64
] | |
2024-11-19T01:38:01.979210+00:00 | 1,537,770,942,000 | 5508976491e704b8d8461dc30786f630d3716631 | 3 | {
"blob_id": "5508976491e704b8d8461dc30786f630d3716631",
"branch_name": "refs/heads/master",
"committer_date": 1537770942000,
"content_id": "d4cd54f507a6caadf8ec212c11eb06f3e97b095d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "01f85c8e6264fc7e79d47ca3a28e11e064c61f37",
"extension": "py"... | 2.625 | stackv2 | from __future__ import print_function
import os,sys,gzip,requests,zipfile,tarfile
from tqdm import tqdm
from six.moves import urllib
import time
'''
This script is mainly used in cooperation with codes from https://github.com/zsdonghao/text-to-image
download flower dataset from : http://www.robots.ox.ac.uk/~vgg/data/f... | 125 | 27.36 | 120 | 19 | 998 | python | [{"finding_id": "codeql_py/tarslip_c86190a5b8ea1f33_22eefa49", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
95
] | [
null
] | [
4
] | [
7
] | |
2024-11-19T01:38:33.170907+00:00 | 1,559,699,051,000 | 51af30a542366af84bbe53ff74b164ec1a9ce391 | 3 | {
"blob_id": "51af30a542366af84bbe53ff74b164ec1a9ce391",
"branch_name": "refs/heads/master",
"committer_date": 1559699051000,
"content_id": "3237abc59ab4b6d9d494de3b7a533bae453bb5dd",
"detected_licenses": [
"MIT"
],
"directory_id": "2be3ce6c98b762eb633b1cdb813eb3323b448dd8",
"extension": "py",
"fi... | 2.578125 | stackv2 | #Name:PRADEEP RAVICHANDRAN
#CSE 6331-Cloud Computing
import os
from flask import Flask, render_template, request
import sqlite3 as sql
import pandas as pd
import random
import time
import redis
import sqlite3, csv, base64
application = Flask(__name__)
con=sqlite3.connect('eq.db')
#creating cursor to perform database... | 176 | 29.74 | 108 | 16 | 1,287 | python | [{"finding_id": "codeql_py/flask-debug_eb81f241300584a4_4ec3e3c9", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-089"
] | [
"py/flask-debug",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This SQL query depends on a [user-provided value](1)."
] | [
175,
45
] | [
null,
null
] | [
5,
20
] | [
32,
30
] | |
2024-11-19T01:38:39.982446+00:00 | 1,538,555,542,000 | bdfa5bcf915c108124961a3f1a8e3042a05b48a2 | 3 | {
"blob_id": "bdfa5bcf915c108124961a3f1a8e3042a05b48a2",
"branch_name": "refs/heads/master",
"committer_date": 1538555542000,
"content_id": "195db9e73f7e864f5090ed044e36c15ca5ddb2c0",
"detected_licenses": [
"MIT"
],
"directory_id": "63a09660186533789ffcce770769c2a84d385e61",
"extension": "py",
"fi... | 2.53125 | stackv2 | import requests
import user_agents
from flask import Flask
from flask import request
from flask import jsonify
freegeoip_endpoint = 'https://freegeoip.net/'
cors_value = '*'
app = Flask(__name__)
def ua_string_to_dict(ua_string):
ua_object = {}
ua_object['browser'] = {}
ua_object['os'] = {}
ua_objec... | 102 | 24.98 | 66 | 12 | 681 | python | [{"finding_id": "codeql_py/partial-ssrf_a992b8aae21cf4dc_aa4cbf29", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
62
] | [
null
] | [
9
] | [
56
] | |
2024-11-19T01:39:09.323297+00:00 | 1,600,269,333,000 | 59c7305bf30745335759ba575f8dc294f45cadd2 | 2 | {
"blob_id": "59c7305bf30745335759ba575f8dc294f45cadd2",
"branch_name": "refs/heads/master",
"committer_date": 1600269333000,
"content_id": "e02ccf597d4800bb968b7405e80634ceb213d3cb",
"detected_licenses": [
"Unlicense"
],
"directory_id": "99f5bf878df022fb01655e42e3ddd952ed1f1a18",
"extension": "py",... | 2.4375 | stackv2 | # coding: utf-8 t-sz环境登录,py颜色打印
import requests,time
url="http://t.oa.quanhoo.com/v2/message/countMsgNumByIsRead?token=97ebe773-25ae-4e31-9506-0ab6eb1cb688177"
url1="http://t-sz.oa.quanhoo.com/login/login"
#get请求
# r= requests.get(url)
# print(r.text)
print ('当前时间:'+time.strftime("%Y-%m-%d %H:%M:%S", time.localtime(... | 74 | 30.59 | 106 | 17 | 935 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f3e0a6a7fb45c4a2_a1666e04", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
27,
44
] | [
null,
null
] | [
9,
9
] | [
55,
72
] | |
2024-11-19T01:52:20.273076+00:00 | 1,600,010,212,000 | 71cfdc85af24f268b5035983b5602214baaad858 | 4 | {
"blob_id": "71cfdc85af24f268b5035983b5602214baaad858",
"branch_name": "refs/heads/master",
"committer_date": 1600010212000,
"content_id": "0c63b78bea7dd0d44a27a6c38fc9858435fa44bb",
"detected_licenses": [
"MIT"
],
"directory_id": "f5119813068b61ccea08a24962570a2f5e9cb87f",
"extension": "py",
"fi... | 4.3125 | stackv2 | #!/usr/bin/python3
while True :
password = input("Make up a secure password: ")
print("You entered: ", password)
# initialize
has_capital = False
has_digit = False
# check length
gt_6 = len(password) >= 6
if gt_6 is True :
print("Password length check passed")
# check alp... | 41 | 26.24 | 80 | 10 | 273 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_04c4739bd8f1b399_46058e0c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
5
] | [
null
] | [
28
] | [
36
] | |
2024-11-19T02:28:26.129263+00:00 | 1,650,992,645,000 | 443e865ab8b7fda06613577f285e73591a492a5b | 2 | {
"blob_id": "443e865ab8b7fda06613577f285e73591a492a5b",
"branch_name": "refs/heads/master",
"committer_date": 1650992645000,
"content_id": "b0df38f9a2d7234be899a7e086d488ae90ccb34a",
"detected_licenses": [],
"directory_id": "0552af3d6eeda99844473b453a3eecc82dcc60da",
"extension": "py",
"filename": "uni... | 2.484375 | stackv2 | import SPARQLWrapper, logging
from biolink import NAME, VERSION
from ontobio.util.user_agent import get_user_agent
USER_AGENT = get_user_agent(name=NAME, version=VERSION, modules=[SPARQLWrapper], caller_name=__name__)
sparql = SPARQLWrapper.SPARQLWrapper("http://sparql.uniprot.org/sparql", agent=USER_AGENT)
class Pr... | 103 | 28.18 | 109 | 15 | 852 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_ab933d5f007ed33f_0c5abf74", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://www.wikidata.org](1) may be at an arbitrary pos... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [http://www.wikidata.org](1) may be at an arbitrary position in the sanitized URL."
] | [
56
] | [
null
] | [
8
] | [
48
] | |
2024-11-19T02:37:04.571655+00:00 | 1,521,404,087,000 | 2ffc148b8bd08c44c5171ff30a57f73891534eb1 | 3 | {
"blob_id": "2ffc148b8bd08c44c5171ff30a57f73891534eb1",
"branch_name": "refs/heads/master",
"committer_date": 1521404087000,
"content_id": "5c341ca8611312e9c2a18135243da8054ea7ea07",
"detected_licenses": [
"Unlicense"
],
"directory_id": "8f5ec2f1ebeec6792d9e5d65eed0f7a5fb26142f",
"extension": "py",... | 2.796875 | stackv2 | #!/usr/bin/python
# Modules
import json
from modules import *
from flasgger import Swagger
from flasgger.utils import swag_from
from flask import Flask, request, jsonify
# Create flask object
app = Flask(__name__)
Swagger(app)
@app.route("/list", methods=["GET"])
@swag_from('./specs/list.yml')
def listPets():
""... | 112 | 24.69 | 116 | 12 | 664 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_00e985e923f570a3_eab48c5f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
89,
89
] | [
null,
null
] | [
25,
42
] | [
31,
50
] | |
2024-11-19T02:37:07.586351+00:00 | 1,692,578,976,000 | f46cd5f604647fe7de22278ceacfea8a0736541a | 2 | {
"blob_id": "f46cd5f604647fe7de22278ceacfea8a0736541a",
"branch_name": "refs/heads/main",
"committer_date": 1692578976000,
"content_id": "0390dee950798be1128a3a8c0539fa616279f3d7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2dd26e031162e75f37ecb1f7dd7f675eeb634c63",
"extension": "py",
... | 2.40625 | stackv2 | # Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by appli... | 172 | 32.91 | 109 | 20 | 1,317 | python | [{"finding_id": "codeql_py/tarslip_1c08614e3a090714_37d5feec", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
92
] | [
null
] | [
9
] | [
12
] | |
2024-11-19T02:37:08.788216+00:00 | 1,478,958,292,000 | 422c86387fc9eb1c09f89b7225088fbb9605780d | 2 | {
"blob_id": "422c86387fc9eb1c09f89b7225088fbb9605780d",
"branch_name": "refs/heads/master",
"committer_date": 1478958292000,
"content_id": "53de328c6dd036162b93ffac46c8eb1fc20fa6f8",
"detected_licenses": [
"MIT"
],
"directory_id": "6e1a70888fac97b5c9cab25f72cc2c5009efe704",
"extension": "py",
"fi... | 2.375 | stackv2 | import base64
import getpass
import re
import socket
import sys
import quopri
from conf import *
import logging
import email
CRLF = '\r\n'
TERMINATOR = CRLF + '.' + CRLF
# Searches for a particular Tag in raw message
def decode(input_str):
result = ''
search_result = re.search('=\?([^\?]*)\?([^\?]*)\?([^\?]*)\?=', ... | 177 | 29.28 | 116 | 17 | 1,550 | python | [{"finding_id": "codeql_py/redos_bffcbaf180eaa680_271c0550", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'from:\\n ' and containing many re... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'from:\\n ' and containing many repetitions of 'a\\n '."
] | [
82
] | [
null
] | [
42
] | [
44
] | |
2024-11-19T02:37:16.861414+00:00 | 1,540,139,026,000 | 606df06e724646fdb6a6cea9ad5f69909cb4206c | 2 | {
"blob_id": "606df06e724646fdb6a6cea9ad5f69909cb4206c",
"branch_name": "refs/heads/master",
"committer_date": 1540139026000,
"content_id": "bffd613fc009fd7b5e70a8f8fcb46b1181223250",
"detected_licenses": [
"MIT"
],
"directory_id": "69123ccc0e1f5b9a853dfda44fc48d6d94318159",
"extension": "py",
"fi... | 2.484375 | stackv2 | # -*- coding: utf-8 -*-
# Copyright © 2011-2013 Binet Réseau
# See the LICENCE file for more informations
# This file is a part of Kaoz, a free irc notifier
import logging
import sys
import threading
import traceback
if sys.version_info < (3,):
import SocketServer as socketserver
else:
import socketserver
t... | 143 | 31.03 | 74 | 19 | 980 | python | [{"finding_id": "codeql_py/insecure-default-protocol_7ae00ca8c66d7ad1_1b9f613f", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
33
] | [
38
] | [
34
] | [
50
] | |
2024-11-19T02:37:30.268344+00:00 | 1,612,374,525,000 | b27b3f6c12993deb7fa749504d30a61dbb5836c0 | 2 | {
"blob_id": "b27b3f6c12993deb7fa749504d30a61dbb5836c0",
"branch_name": "refs/heads/master",
"committer_date": 1612374525000,
"content_id": "04f3f2977d5474728c9e656a02baaff254f60b5c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1278d2524fe6c1452ebadc960b2ac6f5b8340f5f",
"extension": "py"... | 2.390625 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Wed Feb 3 16:19:57 2021
@author: Administrator
"""
#!/usr/bin/env python
# -*- coding: utf-8 -*-
# vim: filetype=python
#if wallstreetbets can move the market
#why not join em?
#fuck investment banks and hedge funds
#they only make the rich richer
#this script scrapes the top... | 292 | 34.36 | 109 | 16 | 2,522 | python | [{"finding_id": "codeql_py/request-without-cert-validation_bbae7b396578d9c6_f7b41212", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
119
] | [
null
] | [
18
] | [
47
] | |
2024-11-19T02:37:46.895446+00:00 | 1,505,691,349,000 | e4ae4360924eae832f965b9f0e49ffea49020ef3 | 3 | {
"blob_id": "e4ae4360924eae832f965b9f0e49ffea49020ef3",
"branch_name": "refs/heads/master",
"committer_date": 1505691349000,
"content_id": "1792ecc3860607f5c7071c959a5c6dafa4bb20e5",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "1f22a882d86281f1fc18f10e8643a93e4e2cdeeb",
"extension": "p... | 2.71875 | stackv2 | from jinja2 import Template
from enum import Enum
class Type(Enum):
UINT = 0
INT = 1
CHARP = 2
FILEP = 3
VOIDP = 4
SIZET = 5
def c_type(self):
if self.value == Type.UINT.value: return 'unsigned int'
elif self.value == Type.INT.value: return 'int'
elif self.value == ... | 93 | 32.24 | 75 | 15 | 771 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_565cccdb65daf480_aba545b8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
70
] | [
null
] | [
13
] | [
31
] | |
2024-11-19T02:49:19.704377+00:00 | 1,519,138,445,000 | 20c32b24f73f8e8566b4b639b3885092f5464bd7 | 2 | {
"blob_id": "20c32b24f73f8e8566b4b639b3885092f5464bd7",
"branch_name": "refs/heads/master",
"committer_date": 1519138445000,
"content_id": "4fbff4e992646b27d08b67ac5b3c6a108dcd08fa",
"detected_licenses": [
"MIT"
],
"directory_id": "35f318af7e3f0f1419e2ec6b25db7fd864098324",
"extension": "py",
"fi... | 2.46875 | stackv2 | #! /usr/bin/env python3
# -*- coding: utf-8 -*-
'''
* __ __
* ____ / /_ ____ ___ __ __ ____ ____ ____ / /
* / __ \/ __ \ / __ `__ \/ / / / / __ \/ __ \/ __ \ / /
* / /_/ / / / / / / / / / / /_/ / / /_/ / /_/ / /_/ / /_/
* \____/_/... | 100 | 31.79 | 101 | 18 | 891 | python | [{"finding_id": "codeql_py/url-redirection_7c721cf1102f03ee_83cfbf09", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
51
] | [
null
] | [
33
] | [
57
] | |
2024-11-19T02:49:22.609384+00:00 | 1,603,728,795,000 | 67bfe65d963e65dc202141dec2d6ca3d52719bbb | 3 | {
"blob_id": "67bfe65d963e65dc202141dec2d6ca3d52719bbb",
"branch_name": "refs/heads/master",
"committer_date": 1603728795000,
"content_id": "b5651942b9ad93952f5633d119c0d1c25ebbf23b",
"detected_licenses": [
"MIT"
],
"directory_id": "ad51c409de320a2048b42d1b50871aae741c9c50",
"extension": "py",
"fi... | 3.234375 | stackv2 | #!/usr/bin/env python
"""Extend Python's built in HTTP server to save files
curl or wget can be used to send files with options similar to the following
curl -X PUT --upload-file somefile.txt http://localhost:8000
wget -O- --method=PUT --body-file=somefile.txt http://localhost:8000/somefile.txt
__Note__: curl a... | 36 | 35.06 | 93 | 14 | 321 | python | [{"finding_id": "codeql_py/path-injection_3239b1301f6e0012_50b010f0", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
28
] | [
null
] | [
19
] | [
27
] | |
2024-11-19T02:49:23.022486+00:00 | 1,466,781,446,000 | bc893ba87f331c17a4dbae6a229c556026b500d8 | 3 | {
"blob_id": "bc893ba87f331c17a4dbae6a229c556026b500d8",
"branch_name": "refs/heads/master",
"committer_date": 1466781446000,
"content_id": "8855419b32fac83b93b20ed6f8444feb75e5d666",
"detected_licenses": [
"MIT"
],
"directory_id": "66ac80dfd32a366d430c0a2c104f3b5726106a5f",
"extension": "py",
"fi... | 2.6875 | stackv2 | import sys
from jinja2 import Template
def gen_mask(end):
mask = 0
for j in range(16):
# current bit is 0 indicating passive nibble
if end % 2 == 0:
mask |= 15 << (4*j)
end >>= 1
return '{0:#x}'.format(mask)
def gen_logic(diff):
lines = []
for i in range(16):
... | 227 | 30.04 | 105 | 15 | 2,254 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_1883fd45cfc16284_5c10a5cd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
210
] | [
null
] | [
16
] | [
34
] | |
2024-11-19T02:49:27.380667+00:00 | 1,531,504,796,000 | 3744baafce6931542a7cffaaba4e54ec38bc44a3 | 2 | {
"blob_id": "3744baafce6931542a7cffaaba4e54ec38bc44a3",
"branch_name": "refs/heads/master",
"committer_date": 1531504796000,
"content_id": "412d5e4c9be7b62ed26632e7922f8033cfae5af5",
"detected_licenses": [
"MIT"
],
"directory_id": "546419d74535096182dcdf2cf40b9969c287389a",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!usr/bin/env python
##################################################################
# setup.py #
# description: for running the web server honeypot #
# author: @shipcod3 #
# greetz: ROOTCON goons and ba... | 61 | 31.85 | 80 | 15 | 437 | python | [{"finding_id": "codeql_py/log-injection_da52bc9667a14e85_e5ff48d2", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
27,
31
] | [
null,
null
] | [
22,
22
] | [
34,
34
] | |
2024-11-19T02:49:44.833324+00:00 | 1,377,942,297,000 | 489ec87a072b023318140601689561e7dfb2565c | 3 | {
"blob_id": "489ec87a072b023318140601689561e7dfb2565c",
"branch_name": "refs/heads/master",
"committer_date": 1377942297000,
"content_id": "66b914350bf831efe6034d2057d502a7a3cc53dc",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "ba6225619b05e42ae6fe4905248b859dfbbc400f",
"extension": "p... | 2.828125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
cookiecutter.generate
---------------------
Functions for generating a project from a project template.
"""
from __future__ import unicode_literals
import logging
import os
import shutil
import sys
from jinja2 import FileSystemLoader, Template
from jinja2.environment... | 135 | 30.57 | 81 | 14 | 952 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3172e10f18998016_90ecedc6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 4 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially... | [
65,
89,
113,
127
] | [
null,
null,
null,
null
] | [
19,
21,
17,
25
] | [
69,
38,
39,
41
] | |
2024-11-19T03:00:12.364251+00:00 | 1,632,236,428,000 | 064a922c91aa147ac688590b642b7b8e5e316273 | 3 | {
"blob_id": "064a922c91aa147ac688590b642b7b8e5e316273",
"branch_name": "refs/heads/main",
"committer_date": 1632236428000,
"content_id": "a938de407d8bab8cce66fc8b842256f02271a011",
"detected_licenses": [
"MIT"
],
"directory_id": "e93c6e93f612bca7f192adf539b4f489ad114ab5",
"extension": "py",
"file... | 3.0625 | stackv2 | import itertools
from time import time, sleep
import argparse
from multiprocessing import Process, Queue
import psutil
import sys
parser = argparse.ArgumentParser(description="brute force password crack")
parser.add_argument("-P", "--processes", default=psutil.cpu_count(), help="Number of processes to use")
parser.add... | 119 | 32.39 | 111 | 18 | 883 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1b9cb3dda18adcb3_42aade24", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
101
] | [
null
] | [
19
] | [
57
] | |
2024-11-19T03:00:14.477228+00:00 | 1,670,266,661,000 | 7576f57e9e2e74f3ef50d9d9214062f865f3e3d2 | 3 | {
"blob_id": "7576f57e9e2e74f3ef50d9d9214062f865f3e3d2",
"branch_name": "refs/heads/master",
"committer_date": 1670266661000,
"content_id": "5c40b73b08e69431e7222bc7082641cd03402b05",
"detected_licenses": [
"BSD-3-Clause",
"MIT"
],
"directory_id": "ebb4c52fd5e86681465917410a8afcf0f695eb5c",
"ext... | 2.953125 | stackv2 | from jupyterhub.auth import Authenticator
import hashlib
from traitlets import Dict
class DictionaryAuthenticator(Authenticator):
encrypted_passwords = Dict(config=True,
help="""dict of username -> {digest -> hashval, salt -> saltval} for authentication with SHA512"""
)
async def authenticate(sel... | 23 | 40.61 | 106 | 16 | 203 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6c557cc357fc75c2_c21c9f5a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
20
] | [
null
] | [
37
] | [
52
] | |
2024-11-19T03:00:27.805181+00:00 | 1,530,242,296,000 | d01beae606cb11849fa524540b82e41fca5850a4 | 3 | {
"blob_id": "d01beae606cb11849fa524540b82e41fca5850a4",
"branch_name": "refs/heads/master",
"committer_date": 1530242296000,
"content_id": "0e8a46e94e2c9e87e6c649b9a43d8c294d2b1a0c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d605b187d3d22ca5dabf0fd9eb1613417f71161e",
"extension": "py"... | 3.28125 | stackv2 | from urllib import request
from urllib import parse
# textPage = request.urlopen("https://fengshenfeilian.github.io/")
# print(str(textPage.read(),'utf-8'))
# headers = {
# 'X-Bmob-Application-Id': "43199c324d3bcb01bacdbd0914277ef0",
# "X-Bmob-REST-API-Key": "d4ac4f967651b0a0053a9d3c45c3efa8"
# }
# params =... | 115 | 18.39 | 66 | 12 | 745 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0df5dd32f6971340_1b3653e9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
49,
54
] | [
null,
null
] | [
7,
7
] | [
14,
15
] | |
2024-11-19T03:12:01.374428+00:00 | 1,628,177,393,000 | e04a8cba278f445a7e3ed95ce277a0dedf66991d | 2 | {
"blob_id": "e04a8cba278f445a7e3ed95ce277a0dedf66991d",
"branch_name": "refs/heads/master",
"committer_date": 1628177393000,
"content_id": "2839438fb61a9859c271f11568f27e5889b4afb4",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "825035ad37f8baf4cfd3057afa93a306523644c5",
"extension": "p... | 2.421875 | stackv2 | # -*- coding: utf-8 -*-
"""
users.py
:copyright: (c) 2014 by Aravinda VK
:license: MIT, see LICENSE for more details.
"""
import sqlite3
from glusterfsrest.config import USERS_DB
import hashlib
conn = None
cursor = None
def pwdhash(inp):
return hashlib.sha512(inp.encode("utf-8")).hexdigest()
def... | 140 | 21.35 | 70 | 12 | 748 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d9eb2cd51de6eee1_25724d69", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
19
] | [
null
] | [
27
] | [
46
] | |
2024-11-19T03:12:06.757562+00:00 | 1,624,717,874,000 | a1e557aa3bf2ec11cb9c4ba41db02006060d4715 | 3 | {
"blob_id": "a1e557aa3bf2ec11cb9c4ba41db02006060d4715",
"branch_name": "refs/heads/master",
"committer_date": 1624717874000,
"content_id": "5abd19e1354632f1e30ed6ce700cbe973b642a2d",
"detected_licenses": [
"MIT"
],
"directory_id": "7485d64206f3928d8e54877f7b94353dd23db903",
"extension": "py",
"fi... | 2.59375 | stackv2 | import requests
import argparse
import yaml
import json
import os
import sys
from urllib3.exceptions import InsecureRequestWarning
from url_normalize import url_normalize
requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning)
DEFAULT_SETTINGS_NAME = "settings.yml"
def populate_with_args(parser)... | 116 | 36.63 | 112 | 15 | 944 | python | [{"finding_id": "codeql_py/request-without-cert-validation_592c3d34db356982_94e05e09", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
59,
77,
93
] | [
62,
81,
97
] | [
16,
16,
16
] | [
42,
43,
43
] | |
2024-11-19T03:12:08.760581+00:00 | 1,618,937,398,000 | ac00c7491d3ddf0477afcf3f965a074413cbe480 | 3 | {
"blob_id": "ac00c7491d3ddf0477afcf3f965a074413cbe480",
"branch_name": "refs/heads/master",
"committer_date": 1618937398000,
"content_id": "a1a687165563ca06a8f183d6f4ff1f063ef0121e",
"detected_licenses": [
"MIT"
],
"directory_id": "4404810143d96aa4ab08675ad7efdaf2abe1576e",
"extension": "py",
"fi... | 2.53125 | stackv2 |
#
# Auth module: users, groups and menu
#
"""
MIT License
Copyright (c) 2017 Ioan Coman
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the ri... | 210 | 32.49 | 91 | 14 | 1,661 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_03e07cdc671b634f_3dad14df", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
94,
100
] | [
null,
null
] | [
28,
21
] | [
91,
80
] | |
2024-11-19T03:12:40.800387+00:00 | 1,539,137,971,000 | 99a9620ba7676054bbb3700d3fc9e6dd29c2bfff | 3 | {
"blob_id": "99a9620ba7676054bbb3700d3fc9e6dd29c2bfff",
"branch_name": "refs/heads/master",
"committer_date": 1539137971000,
"content_id": "0a796ad49bdff691b249094e548bd0772db2a405",
"detected_licenses": [
"MIT"
],
"directory_id": "1f2f180fca5d8345e887eee3252a728ab7cee2e8",
"extension": "py",
"fi... | 2.546875 | stackv2 | # FLASK FEEDBACK PROJECT
from flask import Flask, request, redirect, render_template, session, flash
from flask_debugtoolbar import DebugToolbarExtension
from sqlalchemy.exc import IntegrityError
from models import db, connect_db, User, Feedback
from formclasses import RegisterForm, LoginForm, FeedbackForm
from secret... | 202 | 25.45 | 99 | 15 | 1,104 | python | [{"finding_id": "codeql_py/url-redirection_87067b59961f33da_94e60ecb", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 3 | true | [
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
156,
177,
199
] | [
null,
null,
null
] | [
25,
25,
25
] | [
45,
45,
45
] | |
2024-11-19T03:12:52.238131+00:00 | 1,563,017,828,000 | d3f209e18e3ce27bec6d7136165b7175054a7ad3 | 2 | {
"blob_id": "d3f209e18e3ce27bec6d7136165b7175054a7ad3",
"branch_name": "refs/heads/master",
"committer_date": 1563017828000,
"content_id": "4f00fe1fd2a835b5017c585f94225afac8c416a4",
"detected_licenses": [
"MIT"
],
"directory_id": "e0c5e4837284b9a02c53ffd68443d1d50a803086",
"extension": "py",
"fi... | 2.5 | stackv2 | # -*- coding: utf-8 -*-
import os
import win32crypt
import sqlite3
SaveFileName = r"pwd.txt"
def Extract():
chrome_path = r"Google\Chrome\User Data\Default\Login Data"
file_path = os.path.join(os.environ['LOCALAPPDATA'], chrome_path)
if not os.path.exists(file_path):
return
conn = sqlite3.co... | 28 | 29.79 | 85 | 15 | 222 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5f17308d0e460f93_1d628423", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
23
] | [
null
] | [
21
] | [
48
] | |
2024-11-19T03:35:44.962185+00:00 | 1,610,825,543,000 | 275fa90c4f1d1c7449c2da8fcdbf74d5955ca5fb | 3 | {
"blob_id": "275fa90c4f1d1c7449c2da8fcdbf74d5955ca5fb",
"branch_name": "refs/heads/master",
"committer_date": 1610825543000,
"content_id": "9c81350901119b252e5247be5dd3ec1bb16d5783",
"detected_licenses": [
"MIT"
],
"directory_id": "88aac255460f2bce0bc7b2c61b342485f6b98dd6",
"extension": "py",
"fi... | 2.875 | stackv2 | from jinja2 import Environment, FileSystemLoader
import json
import re
from parser import *
import urllib
import urlparse
class DocGenerator:
""" Generate a markdown document with info on APIs from postman exported file using jinja """
_api_template = 'api_template.md'
_group_template = 'group_template.m... | 97 | 38.87 | 110 | 17 | 829 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_48773d4620e94e85_5bd2515d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
29
] | [
null
] | [
15
] | [
46
] | |
2024-11-19T03:35:45.071994+00:00 | 1,560,747,169,000 | 4cde6498a1648dcc1fd468293dbffb713d641373 | 3 | {
"blob_id": "4cde6498a1648dcc1fd468293dbffb713d641373",
"branch_name": "refs/heads/master",
"committer_date": 1560747169000,
"content_id": "0a820f5c68bb872bd3c2ec03c681c08fb8935752",
"detected_licenses": [
"MIT"
],
"directory_id": "629084b4ef5c2b2930255ce23cddb9147a29a386",
"extension": "py",
"fi... | 2.84375 | stackv2 | #File: client.py
#Author: Kripash Shrestha
#Project: Lab 2
import sys
import socket
import uuid
import hashlib
import random
import time
#grab host name to get ip of device
USER_ID = sys.argv[1]
SERVER_IP = sys.argv[2]
UDP_PORT = int(sys.argv[3])
hostname = socket.gethostname()
#Function: getClientIP
#Gets the IP of... | 270 | 38.62 | 152 | 20 | 2,691 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0d9343adc585caf1_ae1728f7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-327",
"CWE-200"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/weak-sensitive-data-hashing",
"py/bind-socket-all-network-interfaces"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensiti... | [
90,
254,
172,
47
] | [
null,
null,
null,
null
] | [
22,
16,
27,
5
] | [
41,
32,
39,
28
] | |
2024-11-19T01:29:21.826765+00:00 | 1,613,845,283,000 | cb52cbdfc2960906b6916da6cf3d5c658cdece02 | 3 | {
"blob_id": "cb52cbdfc2960906b6916da6cf3d5c658cdece02",
"branch_name": "refs/heads/master",
"committer_date": 1613845283000,
"content_id": "e256e06e777189767abba297d4b9584aa15fa639",
"detected_licenses": [
"MIT"
],
"directory_id": "ee7bea34900eaf51e2e4b062e6e975fbae690716",
"extension": "py",
"fi... | 2.78125 | stackv2 | import os, json
def getHeartRate():
mapping = {}
heartRateFiles = [i for i in os.listdir('data/user-site-export/HR/') if i.endswith("json")]
for file in heartRateFiles:
dateArr = [] ; bpmArr = []
fileName = str(file)
date = fileName[11:-5]
pathToFile = 'data/user-site-export/HR/' + fileName
with open(pathT... | 20 | 28.95 | 92 | 16 | 167 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f8f3a4f1543b0f82_b50813aa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
20
] | [
null
] | [
7
] | [
14
] | |
2024-11-19T01:29:28.569047+00:00 | 1,502,718,757,000 | 897797bfa2ddfbb8eb834483f7d84a3488f6e412 | 2 | {
"blob_id": "897797bfa2ddfbb8eb834483f7d84a3488f6e412",
"branch_name": "refs/heads/master",
"committer_date": 1502718757000,
"content_id": "e5849be6c8f5294a8396886c444439c2436acde1",
"detected_licenses": [
"MIT"
],
"directory_id": "27563c648f73d28279667d97bd37da9366f0b347",
"extension": "py",
"fi... | 2.484375 | stackv2 | # -*- coding: utf-8 -*-
from __future__ import absolute_import
from __future__ import print_function
from six.moves import input
import getpass
import solvebio
from ..client import client, SolveError
from .credentials import (
get_credentials,
delete_credentials,
save_credentials
)
def _print_msg(msg):
... | 127 | 25.91 | 68 | 15 | 781 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c0448f44e35bd95e_48c0b473", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
20
] | [
null
] | [
11
] | [
20
] | |
2024-11-19T01:29:57.132141+00:00 | 1,505,576,788,000 | 37f2e5313c56d3307975fb749cb7d93e446450b0 | 3 | {
"blob_id": "37f2e5313c56d3307975fb749cb7d93e446450b0",
"branch_name": "refs/heads/master",
"committer_date": 1505576788000,
"content_id": "223e14b867124045e8635d73a8ad3c8c90671ec1",
"detected_licenses": [
"MIT"
],
"directory_id": "a9c1596a686942e0128f795e21c67d13eb5529c4",
"extension": "py",
"fi... | 2.875 | stackv2 | # -*- coding: utf-8 -*-
# File: myutils.py
# Author: Rafał Nowak <rafal.nowak@cs.uni.wroc.pl>
import os
import logging
import tarfile
import urllib.request
import pickle
import numpy as np
# pylint:
CIFAR_DATA_URL = 'http://www.cs.toronto.edu/~kriz/cifar-10-python.tar.gz'
CIFAR_DIR_PATH = './cifar10_data/'
CIFAR_FOL... | 114 | 38.25 | 115 | 18 | 1,185 | python | [{"finding_id": "codeql_py/tarslip_3b603484116e8594_5cd9c2ef", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
98
] | [
null
] | [
9
] | [
39
] | |
2024-11-19T01:30:05.553226+00:00 | 1,492,437,253,000 | eec1660d281db4e39a0b2193752332308ad312d9 | 3 | {
"blob_id": "eec1660d281db4e39a0b2193752332308ad312d9",
"branch_name": "refs/heads/master",
"committer_date": 1492437253000,
"content_id": "d7650cb710452cda04d08aa7a1c406e171674a23",
"detected_licenses": [
"MIT"
],
"directory_id": "85f6694698cee7dbbefa5c292a8aa1934bf95ff1",
"extension": "py",
"fi... | 2.515625 | stackv2 | from flask import Flask, jsonify, request
from flask_cors import CORS
import json
import rdflib
import requests
import xml.etree.ElementTree as ET
import lxml.etree as LET
from StringIO import StringIO
from io import BytesIO
from utils import oai_root_path
app = Flask(__name__)
CORS(app)
def get_rdf(article_id):
... | 71 | 24.75 | 147 | 13 | 487 | python | [{"finding_id": "codeql_py/flask-debug_c31f863b5549b06b_25307442", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-776",
"CWE-918"
] | [
"py/flask-debug",
"py/xml-bomb",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"XML parsing depends on a [user-provided value](1) without guarding against uncontrolled entity expansion.\nXML parsing depends on a [user-provided value](2) without guarding against uncontrolled... | [
70,
19,
17
] | [
null,
null,
null
] | [
5,
26,
9
] | [
24,
48,
148
] | |
2024-11-19T01:30:10.422116+00:00 | 1,618,218,305,000 | c905f8032ce07a92d7b871b8dc3cd581e4edae4f | 3 | {
"blob_id": "c905f8032ce07a92d7b871b8dc3cd581e4edae4f",
"branch_name": "refs/heads/main",
"committer_date": 1618218305000,
"content_id": "995111a06096e226be0abaf890c52fb753923be8",
"detected_licenses": [
"MIT"
],
"directory_id": "ae84637a80c1a21af3de3f9f5ac83927fcfdd705",
"extension": "py",
"file... | 2.71875 | stackv2 | import re
from rest_framework import serializers
from api.models import Message
class MessageSerializer(serializers.ModelSerializer):
class Meta:
model = Message
fields = '__all__'
def validate_author(self, value):
regex = '^(\w|\.|\_|\-)+[@](\w|\_|\-|\.)+[.]\w{2,3}$'
if re.se... | 23 | 28.17 | 70 | 12 | 156 | python | [{"finding_id": "codeql_py/redos_d648151dbf948e05_09ae7d3b", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "remediati... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'a@' and containing many repetitions of '_'."
] | [
11,
11
] | [
null,
null
] | [
19,
36
] | [
33,
50
] | |
2024-11-19T01:30:24.878135+00:00 | 1,680,317,156,000 | a8cf0017f1c83b7f1bfa75ec17ba5b5e9ea52846 | 3 | {
"blob_id": "a8cf0017f1c83b7f1bfa75ec17ba5b5e9ea52846",
"branch_name": "refs/heads/master",
"committer_date": 1680317156000,
"content_id": "fa02be1d889e559dd96807cb612771a059df3332",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8e2e28a191fa5ec5a6c070ec7e9ccad98c8b4a0b",
"extension": "py"... | 2.78125 | stackv2 | #/usr/bin/env python
#coding=utf8
"""
# Author: kellanfan
# Created Time : Fri 29 Jun 2018 10:56:30 AM CST
# File Name: userlogin.py
# Description:
"""
import sys
import hashlib
sys.path.append('/root/python/spider/misc')
import mysql_connect
import redishelper
def hash_pass(passwd):
hash = hashlib.sha1()
h... | 78 | 23.08 | 82 | 16 | 521 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_bdb77c65b0e5ca86_9e7f1ca3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
20
] | [
null
] | [
17
] | [
39
] | |
2024-11-19T01:30:25.576082+00:00 | 1,603,851,780,000 | 105958249b8c85628e91664fc37e16b74004eb61 | 3 | {
"blob_id": "105958249b8c85628e91664fc37e16b74004eb61",
"branch_name": "refs/heads/main",
"committer_date": 1603851780000,
"content_id": "7a6ec5384445daf838e3bb4d71bf6286773b656f",
"detected_licenses": [
"MIT"
],
"directory_id": "d63f92f0d587128c13bd22237c0952de7046fd0d",
"extension": "py",
"file... | 2.578125 | stackv2 | from collections import namedtuple
import os
import random
from typing import Set
import boto3
import jinja2
import pocket
Recipe = namedtuple("Recipe", ["title", "url", "img"])
def _get_param(name: str) -> str:
"""Get a parameter from AWS Parameter store."""
ssm = boto3.client("ssm")
param = ssm.get_p... | 67 | 25.73 | 84 | 15 | 425 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d9c3bd29a0a670db_3defc6c6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
43
] | [
null
] | [
11
] | [
74
] | |
2024-11-19T01:30:26.104431+00:00 | 1,637,477,487,000 | 81c45302db09a108d3defd562231f33a159da574 | 3 | {
"blob_id": "81c45302db09a108d3defd562231f33a159da574",
"branch_name": "refs/heads/main",
"committer_date": 1637477487000,
"content_id": "56aef522c69e5713e53bbb64b1c921ba411c4376",
"detected_licenses": [
"MIT"
],
"directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b",
"extension": "py",
"file... | 2.546875 | stackv2 | import os
import time
import uuid
from flask import Flask, request, make_response, render_template, redirect
from google.cloud import storage
from peewee import *
db = SqliteDatabase("core.db")
class User(Model): # mapping from user token to their background pic url
id = AutoField()
token = CharField()
... | 83 | 35.49 | 121 | 17 | 762 | python | [{"finding_id": "codeql_py/cookie-injection_36c5d2029ea15e07_1dcfac7a", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "... | 2 | true | [
"CWE-020",
"CWE-215"
] | [
"py/cookie-injection",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cookie is constructed from a [user-supplied input](1).",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
51,
83
] | [
null,
null
] | [
30,
5
] | [
35,
53
] | |
2024-11-19T01:30:36.313346+00:00 | 1,620,055,036,000 | df804c630e8fce6989f213e067fca76c636ca695 | 3 | {
"blob_id": "df804c630e8fce6989f213e067fca76c636ca695",
"branch_name": "refs/heads/main",
"committer_date": 1620055036000,
"content_id": "2ad444d57029d5da58e5c3af0d7da6fb09c16bb7",
"detected_licenses": [
"MIT"
],
"directory_id": "628ef23809589f6bff6e8591fbba3341bcb5d32d",
"extension": "py",
"file... | 2.71875 | stackv2 | import os
parentPath = os.path.abspath(os.path.join(os.getcwd(), os.pardir))
desiredPath = "\\AdventOfCode2020\\solutions\\dag2\\dag2input.txt"
passwordList = open(parentPath + desiredPath).readlines()
trash = [i.split(' ')[1] for i in passwordList]
characterRange = [i.split(' ')[0] for i in passwordList]
maxRang... | 49 | 25.29 | 110 | 10 | 340 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3e4701747a246976_ff60232a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
49
] | [
null
] | [
7
] | [
21
] | |
2024-11-19T01:54:57.981627+00:00 | 1,622,204,169,000 | 6691b8b0fe2dd7f01419e4b60d6c8916659d2334 | 2 | {
"blob_id": "6691b8b0fe2dd7f01419e4b60d6c8916659d2334",
"branch_name": "refs/heads/master",
"committer_date": 1622204169000,
"content_id": "2e84808f17d08142b57c3fc5aeb5109b835348ab",
"detected_licenses": [
"MIT"
],
"directory_id": "db53c46cb8abb44fb9d545883ed1c70095f7c0fe",
"extension": "py",
"fi... | 2.421875 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""
Date of establishment: November 27, 2018
@author: zhangzd
"""
import cv2
import requests
import json
import threading
import time
import base64
import numpy as np
from PIL import Image, ImageDraw, ImageFont
from aip import AipSpeech
import pygame
from requests.packag... | 147 | 28.04 | 101 | 22 | 1,127 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_261f835806c5be1a_7e7f9ecd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
123
] | [
null
] | [
19
] | [
25
] | |
2024-11-19T01:55:01.219236+00:00 | 1,585,657,131,000 | 3de679151591f211fffd33c344ed7335cfae3f14 | 2 | {
"blob_id": "3de679151591f211fffd33c344ed7335cfae3f14",
"branch_name": "refs/heads/master",
"committer_date": 1585657131000,
"content_id": "b7dfa49c85bfb3c402f6a966ce46d040dfc275f6",
"detected_licenses": [
"MIT"
],
"directory_id": "6621e50390a9c963f2299d2d6c1a530ee92c4a3b",
"extension": "py",
"fi... | 2.40625 | stackv2 | #! Copyright (C) 2017 Christian Stransky
#!
#! This software may be modified and distributed under the terms
#! of the MIT license. See the LICENSE file for details.
from flask import Flask, redirect, request, make_response
from shutil import copyfile
import json
import requests
import os.path
import uuid
import urll... | 48 | 32.9 | 109 | 14 | 398 | python | [{"finding_id": "codeql_py/insecure-cookie_c501d0e6cbe50394_9f04e33a", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"... | 4 | true | [
"CWE-614",
"CWE-020",
"CWE-020",
"CWE-1004"
] | [
"py/insecure-cookie",
"py/cookie-injection",
"py/cookie-injection",
"py/client-exposed-cookie"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cookie is added to response without the 'secure' flag being set.",
"Cookie is constructed from a [user-supplied input](1).",
"Cookie is constructed from a [user-supplied input](1).",
"Sensitive server cookie is set without HttpOnly flag."
] | [
36,
36,
37,
36
] | [
null,
null,
null,
null
] | [
5,
35,
34,
5
] | [
43,
42,
39,
43
] | |
2024-11-19T01:55:02.215239+00:00 | 1,431,544,144,000 | 859b6431c16f361fafe7ae5f34249a2553af0e16 | 3 | {
"blob_id": "859b6431c16f361fafe7ae5f34249a2553af0e16",
"branch_name": "refs/heads/master",
"committer_date": 1431544144000,
"content_id": "ef204b68e606d91d32c1cef977d836e6efe21e31",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1ea679d61ab8a48ddb98e11748b343e966774496",
"extension": "py"... | 2.640625 | stackv2 | #!/usr/bin/env python
# Copyright 2010 Google Inc. All Rights Reserved.
"""Java-related scrubbers."""
__author__ = 'dbentley@google.com (Dan Bentley)'
import re
from moe.scrubber import base
from moe.scrubber import comment_scrubber
# A file is unmeaningful if it contains only package declarations, import
# declar... | 240 | 33.93 | 80 | 20 | 2,006 | python | [{"finding_id": "codeql_py/redos_5b80100a34ada6bc_91942ade", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'package' and containing many repe... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'package' and containing many repetitions of ';package'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'import' and containing many repetitions of ';import'."
] | [
15,
15
] | [
null,
null
] | [
49,
60
] | [
52,
63
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.