added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T01:55:21.872897+00:00 | 1,693,585,381,000 | d3b36431460a279c164f64a85c65de1875b21f80 | 3 | {
"blob_id": "d3b36431460a279c164f64a85c65de1875b21f80",
"branch_name": "refs/heads/main",
"committer_date": 1693585381000,
"content_id": "02c6afa11de8234fbffdc7748f0d1779c23a2f1f",
"detected_licenses": [
"Apache-2.0",
"MIT"
],
"directory_id": "d51f530078404a24f1844b53b037bbfed238a784",
"extensi... | 2.78125 | stackv2 | # Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
# SPDX-License-Identifier: Apache-2.0
import logging
from botocore.exceptions import ClientError
from flask_restful import Resource
logger = logging.getLogger(__name__)
class Analysis(Resource):
"""
Encapsulates a resource that analyzes im... | 44 | 38.68 | 90 | 18 | 381 | python | [{"finding_id": "codeql_py/log-injection_c9c360e5820b8049_24562099", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
38,
41
] | [
null,
null
] | [
76,
69
] | [
85,
78
] | |
2024-11-19T01:55:29.754909+00:00 | 1,477,232,998,000 | 85852d14ff1cd3e1dd60a3391b6e48ce2e294738 | 3 | {
"blob_id": "85852d14ff1cd3e1dd60a3391b6e48ce2e294738",
"branch_name": "refs/heads/master",
"committer_date": 1477232998000,
"content_id": "c6c2e30c22543f45cbea14b6461efe6e2a024db7",
"detected_licenses": [
"MIT"
],
"directory_id": "0c5af2015aa56978a11c797184b561ad34d18c9c",
"extension": "py",
"fi... | 2.5625 | stackv2 | from inputModel.section import Section
from inputModel.cp2kinput import CP2Kinput
from lxml import objectify
from jinja2 import Environment, FileSystemLoader
import os
import argparse
import time
def createFile(path, filename, content):
if not os.path.exists(path):
os.makedirs(path)
f = open(path + "/"... | 69 | 34.19 | 117 | 11 | 593 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_00efc64ced534ed5_e7891ad5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
29
] | [
null
] | [
13
] | [
62
] | |
2024-11-19T02:06:45.011889+00:00 | 1,584,658,742,000 | a23e5575b0b0bfe0dfcd66c2ebbf162ee33b8385 | 3 | {
"blob_id": "a23e5575b0b0bfe0dfcd66c2ebbf162ee33b8385",
"branch_name": "refs/heads/master",
"committer_date": 1584658742000,
"content_id": "b090e45e0d382c7e411dbb8de8409f35cffb9e61",
"detected_licenses": [
"MIT"
],
"directory_id": "6fe4624efbd8e7f3a7a03b6561b731f552419ef7",
"extension": "py",
"fi... | 2.875 | stackv2 |
# python app/titanic_nosql.py
from dotenv import load_dotenv
import os
import pymongo
import pandas as pd
import json
# LOAD MONGO DATABASE ENV VARS FROM ".env" FILE
load_dotenv()
DB_USER = os.getenv("MONGO_USER", default="Oooops")
DB_PASSWORD = os.getenv("MONGO_PASSWORD", default="Oooops")
CLUSTER_NAME = os.geten... | 60 | 26.85 | 141 | 11 | 426 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a29ce2ac7b596aee_1a19013d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
19
] | [
null
] | [
15
] | [
29
] | |
2024-11-19T02:07:09.806492+00:00 | 1,601,468,212,000 | ef514499755c6b3bba69d1b6a88e6a06c3e1163f | 2 | {
"blob_id": "ef514499755c6b3bba69d1b6a88e6a06c3e1163f",
"branch_name": "refs/heads/master",
"committer_date": 1601468212000,
"content_id": "6a2e8bc0660e6168f8e4f7924f7ddc78b3427d61",
"detected_licenses": [
"MIT"
],
"directory_id": "160798175c4785c3eeabd69c2b886b1df2ba4269",
"extension": "py",
"fi... | 2.40625 | stackv2 | #author:九世
#time:2019/1/13
import requests
import threading
import re
import os
import time
xj=open('domain_file/domain.txt','w')
xj.close()
def reads(file):
dk=open('doc_host/{}'.format(file),'r')
for d in dk.readlines():
sc="".join(d.split('\n'))
yield sc
headers={'user-agent':'Mozilla/5.... | 55 | 34.84 | 161 | 22 | 541 | python | [{"finding_id": "codeql_py/overly-large-range_20c919b1e40e4bde_611f056f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
37
] | [
null
] | [
36
] | [
39
] | |
2024-11-19T02:07:24.606876+00:00 | 1,485,924,583,000 | 4f715450aef50eb7d384d377e6348424135750ad | 3 | {
"blob_id": "4f715450aef50eb7d384d377e6348424135750ad",
"branch_name": "refs/heads/master",
"committer_date": 1485924583000,
"content_id": "accb35085c6fe5af4f9e7ebd6b1c7bcb741079ee",
"detected_licenses": [
"MIT"
],
"directory_id": "fc7a84574ff2f90cce13d14fcefa4c58b1ad1fb8",
"extension": "py",
"fi... | 2.828125 | stackv2 | import requests;
import os;
from getpass import getpass;
'''
FORMAT:
- action: "tunnel"
- sub-action: "get"|"post"|"session"|"login_session"
'''
class Tunnel:
def __init__(self,url=None):
self.url="https://www.google.com";
self.session = None; #to be a requests.session object
return;
def get(self,url=N... | 92 | 23.12 | 108 | 18 | 563 | python | [{"finding_id": "codeql_py/request-without-cert-validation_dfb2710026de5b7d_c1045ca9", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
25,
35,
73
] | [
null,
null,
null
] | [
11,
11,
11
] | [
41,
42,
56
] | |
2024-11-19T02:31:19.103409+00:00 | 1,489,096,058,000 | c1ca0ba5668658c0e40459cdeaecac60830aa398 | 3 | {
"blob_id": "c1ca0ba5668658c0e40459cdeaecac60830aa398",
"branch_name": "refs/heads/master",
"committer_date": 1489096058000,
"content_id": "ae10fc272ca79021fb025f6253b36756f390899d",
"detected_licenses": [
"MIT"
],
"directory_id": "804aba07d0fcd731d2e07c150817e113dd2766c4",
"extension": "py",
"fi... | 2.671875 | stackv2 | #!/usr/bin/env python3
# -*- coding: UTF-8 -*-
"""
Create Etsin API calls from LDF.fi dataset descriptions
"""
import argparse
import copy
from collections import defaultdict
import json
from pprint import pprint
import requests
from SPARQLWrapper import JSON, SPARQLWrapper
ENDPOINT = 'http://ldf.fi/service-descript... | 184 | 30.43 | 117 | 22 | 1,362 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f897224979f4bfba_0da1e654", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
182
] | [
183
] | [
11
] | [
58
] | |
2024-11-19T02:31:43.461981+00:00 | 1,678,727,967,000 | a30d2b5d5aed08290ead40ea638f2e5af73e5150 | 3 | {
"blob_id": "a30d2b5d5aed08290ead40ea638f2e5af73e5150",
"branch_name": "refs/heads/master",
"committer_date": 1678727967000,
"content_id": "9a4bb691604d85e885dc08f63ad2a14fb03ef1de",
"detected_licenses": [
"MIT"
],
"directory_id": "6e11651d3ca74090656cd460cbaec984f65767dd",
"extension": "py",
"fi... | 2.765625 | stackv2 | '''
Library borroeing logic service.
11/25/19 Created
'''
import json
import requests
import argparse
from datetime import date, timedelta
from flask import Flask
from flask import jsonify
from flask import abort
from flask import make_response
from flask import request
BORROWING_LIMIT = 4
# User-defined borrowin... | 151 | 29.36 | 128 | 16 | 1,070 | python | [{"finding_id": "codeql_py/flask-debug_59e0581975461c22_45c5de52", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
150,
76
] | [
null,
null
] | [
5,
33
] | [
54,
109
] | |
2024-11-19T02:33:06.702967+00:00 | 1,571,687,531,000 | 2103356512a48d995e2b94e8448a2bc1e0065841 | 3 | {
"blob_id": "2103356512a48d995e2b94e8448a2bc1e0065841",
"branch_name": "refs/heads/master",
"committer_date": 1571687531000,
"content_id": "b465d98b1742993d70fde96a9dbcdadcec211700",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "363db3ac4d384adee45c2ce0d92c59f21ef231f7",
"extension": "p... | 2.859375 | stackv2 | import requests
from bs4 import BeautifulSoup
import pandas as pd
import functools
from tqdm import tqdm
import json
def scrape():
soup = get_main_page()
jumpscares = get_main_table(soup)
save_jumpscares(jumpscares)
good_links = get_links(soup)
data_details = get_detailed_data(good_links)
save... | 126 | 38.25 | 103 | 24 | 1,117 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fff1bac21083f363_be6961f0", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [imdb.com](1) may be at an arbitrary position in the sa... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [imdb.com](1) may be at an arbitrary position in the sanitized URL."
] | [
74
] | [
null
] | [
19
] | [
42
] | |
2024-11-19T02:33:11.688228+00:00 | 1,529,942,469,000 | 9ed33af72bbc95669ab47a0690e59b94362bed96 | 3 | {
"blob_id": "9ed33af72bbc95669ab47a0690e59b94362bed96",
"branch_name": "refs/heads/master",
"committer_date": 1529942469000,
"content_id": "3bbaf5a78405f5250b2b84824f9cbf0d356e8d03",
"detected_licenses": [
"MIT"
],
"directory_id": "16617077b64f0ca90c1eb4ef317a87c3a1455404",
"extension": "py",
"fi... | 2.6875 | stackv2 | """
Flask demo server.
"""
from flask import Flask, request
from smsdemo.constants import POST_PATH, SIGNATURE_HEADER_KEY
from smsdemo.message import SMSMessage
from smsdemo.util import (
ServerConfig, SMSSendError,
parse_signature, generate_signature,
sync_send,
)
app = Flask(__name__)
@app.route(POS... | 58 | 26.71 | 85 | 12 | 373 | python | [{"finding_id": "codeql_py/log-injection_c4315d5b39c8da22_6098bbe8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
38
] | [
null
] | [
65
] | [
68
] | |
2024-11-19T02:43:25.081490+00:00 | 1,585,764,319,000 | b1cd212929404087a8eb4b0971b642d9a487fdde | 3 | {
"blob_id": "b1cd212929404087a8eb4b0971b642d9a487fdde",
"branch_name": "refs/heads/master",
"committer_date": 1585764319000,
"content_id": "5bb29ffa4cd87809df0f56dca228404e2eaf9356",
"detected_licenses": [
"MIT"
],
"directory_id": "9eaa2c64a777bd24a3cccd0230da5f81231ef612",
"extension": "py",
"fi... | 2.546875 | stackv2 | from flask import Flask,render_template,request,redirect
from flask_sqlalchemy import SQLAlchemy
from sqlalchemy import or_
app = Flask(__name__)
app.config['SQLALCHEMY_DATABASE_URI']="mysql://root:584023982@127.0.0.1:3306/flask"
app.config['SQLALCHEMY_COMMIT_ON_TEARDOWN']=True
db = SQLAlchemy(app)
# 根据现有的表结构构建模型类
cla... | 342 | 32.12 | 90 | 18 | 3,238 | python | [{"finding_id": "codeql_py/flask-debug_794d51adce12a44a_bb86b027", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
342,
186
] | [
null,
null
] | [
5,
21
] | [
24,
24
] | |
2024-11-19T02:43:25.334839+00:00 | 1,546,965,816,000 | 0b3b0c5425a2f8d8aa660825d8d2356bc764b447 | 3 | {
"blob_id": "0b3b0c5425a2f8d8aa660825d8d2356bc764b447",
"branch_name": "refs/heads/master",
"committer_date": 1546965816000,
"content_id": "5252c3c2251f1eac67ae19263e6133688a6dd4c3",
"detected_licenses": [
"Unlicense"
],
"directory_id": "0fcda5d5cfc7b8a55cb00cc66486e6979bbdcf56",
"extension": "py",... | 2.640625 | stackv2 | import binascii
import hashlib
import hmac
def gen_NThash(password):
_ntlm = hashlib.new("md4", password.encode("utf-16-le")).digest()
ntlm = binascii.hexlify(_ntlm)
return ntlm
def firstHMAC(username, domain, nthash):
concat = (username+domain).upper().encode("utf-16-le").hex()
fhash = hmac.n... | 18 | 23.28 | 98 | 14 | 126 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_f90c160fd1a5244b_75c39e5b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD4) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD4) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
8
] | [
null
] | [
32
] | [
60
] | |
2024-11-19T02:55:27.453770+00:00 | 1,519,305,526,000 | c56f255ed641a20f11334166688bce1fa9872734 | 2 | {
"blob_id": "c56f255ed641a20f11334166688bce1fa9872734",
"branch_name": "refs/heads/master",
"committer_date": 1519305526000,
"content_id": "6ceb3af31d15558e7abc71aec2cb66bbdb5d62c6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3fa84e5493122f259ef1cf553eefb7be59dc18f9",
"extension": "py"... | 2.34375 | stackv2 | from django.contrib.auth import get_user_model
from rest_framework import status
from rest_framework.authtoken.models import Token
from rest_framework.decorators import (
api_view,
permission_classes,
renderer_classes,
)
from rest_framework.permissions import IsAdminUser, IsAuthenticated
from rest_framewor... | 46 | 29.87 | 80 | 18 | 278 | python | [{"finding_id": "codeql_py/stack-trace-exposure_c7473ceb1581a330_9b084b55", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
46
] | [
null
] | [
25
] | [
44
] | |
2024-11-19T02:55:29.648591+00:00 | 1,628,218,081,000 | c5772c74f7f42144b35b98f2e78baffb00f6f8b8 | 2 | {
"blob_id": "c5772c74f7f42144b35b98f2e78baffb00f6f8b8",
"branch_name": "refs/heads/master",
"committer_date": 1628218081000,
"content_id": "8d9b14a1a5fdbe230b968eacd0cf9270ccdac833",
"detected_licenses": [
"MIT"
],
"directory_id": "5eb3217437641d3ac62be6b63759edfa3b8b8217",
"extension": "py",
"fi... | 2.359375 | stackv2 | import logging
from os import environ
from flask import current_app, request
def Logging():
if 'FILENAME' in current_app.config:
filename = current_app.config['FILENAME']
else:
filename = "request.log"
return filename
def MaxSizeUpload():
if 'LOG_UPLOAD_LIMIT' in current_app.config:
... | 128 | 30.52 | 85 | 26 | 823 | python | [{"finding_id": "codeql_py/log-injection_c84a8bc490e15454_9f5472a4", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
92
] | [
null
] | [
27
] | [
70
] | |
2024-11-19T03:10:19.213924+00:00 | 1,602,408,421,000 | 9f4bd85ad0fe775a50e4f171c29451161004101e | 3 | {
"blob_id": "9f4bd85ad0fe775a50e4f171c29451161004101e",
"branch_name": "refs/heads/master",
"committer_date": 1602408421000,
"content_id": "95853b5b0f2702e6598a6a643d22cd95c422b188",
"detected_licenses": [
"MIT"
],
"directory_id": "bd864512264121be1c13a84f59fd4bdc33f89429",
"extension": "py",
"fi... | 2.84375 | stackv2 | from aes.transformations import *
from aes.key_expansion import *
def do_aes_128(_in, key):
rkeys = key_expansion(key)
state = add_round_key(_in, rkeys[0])
for i in range(1, 10):
state = sub_bytes(state)
state = shift_rows(state)
state = mix_columns(state)
state = add_round_key(state, rkeys[i])
state = ... | 28 | 22.25 | 62 | 12 | 202 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_17081966b2658b16_52450556", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
28
] | [
null
] | [
7
] | [
54
] | |
2024-11-19T03:10:39.228019+00:00 | 1,556,312,323,000 | 5228a826e8b59386700e6ef24af183621b2c9b62 | 3 | {
"blob_id": "5228a826e8b59386700e6ef24af183621b2c9b62",
"branch_name": "refs/heads/master",
"committer_date": 1556312562000,
"content_id": "d8eb4daf0c98dc5af1214116ba647ca7e2a7f2ac",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "16054bb3a2783f4f0e2413dcb3b53dac75f43ff1",
"extension": "py"... | 2.6875 | stackv2 | #!/bin/env python3
import argparse
import base64
import configparser
import requests
import json
import sys
def parse_args():
'''Parse commandline arguments and return an argparse.Namespace object'''
parser = argparse.ArgumentParser()
parser.add_argument('-f', '--config', help="config file", require... | 86 | 30.48 | 82 | 13 | 589 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_43928d450728f37c_a21761a9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
73
] | [
null
] | [
15
] | [
20
] | |
2024-11-19T03:10:54.547380+00:00 | 1,617,349,439,000 | 4b494c4c098e524006d067a31abdee694be00553 | 4 | {
"blob_id": "4b494c4c098e524006d067a31abdee694be00553",
"branch_name": "refs/heads/main",
"committer_date": 1617349439000,
"content_id": "a595284f16da9159bc65884500fa0dcffba2d324",
"detected_licenses": [
"MIT"
],
"directory_id": "938650c8a8191a4203462e44ff9684b01fa61d54",
"extension": "py",
"file... | 3.84375 | stackv2 | def password_validation(string1):
result = ''
has_valid_length = False
if 6 <= len(string1) <= 10:
has_valid_length = True
has_valid_characters = True
for element in string1:
character_validation = False
for ref in range(48, 58):
if element == chr(ref):
... | 47 | 29.55 | 74 | 12 | 322 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_df86fca490ed3041_96f6b947", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
41
] | [
null
] | [
7
] | [
14
] | |
2024-11-19T03:21:54.539468+00:00 | 1,617,547,654,000 | 42e7e1e8e24a92447a5ffa798d9c51c512fd760e | 2 | {
"blob_id": "42e7e1e8e24a92447a5ffa798d9c51c512fd760e",
"branch_name": "refs/heads/master",
"committer_date": 1617547654000,
"content_id": "d0af7b5123f349b237dbf4e620375d43e268fa2e",
"detected_licenses": [
"MIT"
],
"directory_id": "becb5119fd04daf8b1b557a69112fd89b90d0538",
"extension": "py",
"fi... | 2.328125 | stackv2 | from asyncio import sleep
from concurrent.futures._base import TimeoutError
import datetime
from logging import getLogger
import os
from random import randint
from ssl import SSLError
import traceback
from typing import Optional, List
from aiogram import Bot
import httpx
from proxy_randomizer.providers import Register... | 153 | 35.42 | 96 | 16 | 1,209 | python | [{"finding_id": "codeql_py/request-without-cert-validation_11662181abad9b83_b0287a4f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
137
] | [
null
] | [
34
] | [
72
] | |
2024-11-19T03:22:05.308209+00:00 | 1,506,431,562,000 | 030f50cfd57c5797cfb9a62824d87264610dcee9 | 4 | {
"blob_id": "030f50cfd57c5797cfb9a62824d87264610dcee9",
"branch_name": "refs/heads/master",
"committer_date": 1506431562000,
"content_id": "e14f6a8478c8880449220ab6eb26c6df960ac11a",
"detected_licenses": [
"MIT"
],
"directory_id": "d738b88cbd8957cdf3741eafa9736e29a4231266",
"extension": "py",
"fi... | 3.515625 | stackv2 | """ A class that handles user details"""
class UserDetails(object):
"""a list that holds all users"""
userlist =[]
def __init__(self):
self.details={}
def signup(self,username, email, password):
self.username = username
self.email = email
self.password = password
... | 35 | 26.94 | 106 | 14 | 198 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_97e3ffafe9f80eeb_5612071d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
24
] | [
null
] | [
19
] | [
32
] | |
2024-11-19T03:22:15.347557+00:00 | 1,619,467,611,000 | 6068644051ff6ac885109d106a25f1670d7cf77c | 3 | {
"blob_id": "6068644051ff6ac885109d106a25f1670d7cf77c",
"branch_name": "refs/heads/main",
"committer_date": 1619467611000,
"content_id": "357f7802d655c64065ad8843ab3ef2d49863eb9b",
"detected_licenses": [
"MIT"
],
"directory_id": "c516df2118000e3abaa61527de7badb94680081e",
"extension": "py",
"file... | 2.953125 | stackv2 | import requests
import json
from utilities.get_token import token
app_id = 'sample'
app_secret = 'test'
hostip = '10.132.0.18'
headers = {"Content-Type":"application/json"}
payload = {"app_id":app_id,"app_secret":app_secret}
# Convert to json
payload=json.dumps(payload)
r = token(app_id,app_secret,hostip)
print(r)... | 104 | 21.38 | 83 | 8 | 580 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_07d376530f63bf62_1d371d66", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
24
] | [
null
] | [
7
] | [
17
] | |
2024-11-19T03:22:16.086996+00:00 | 1,675,435,579,000 | 3c407b5541c18a04aec5968a579c5186d76ad06e | 3 | {
"blob_id": "3c407b5541c18a04aec5968a579c5186d76ad06e",
"branch_name": "refs/heads/master",
"committer_date": 1675435579000,
"content_id": "4335de4c09725327b33d218fcf78d1d938076487",
"detected_licenses": [
"MIT"
],
"directory_id": "618598361ffaa8db8b4489b667636348a79b3e72",
"extension": "py",
"fi... | 2.6875 | stackv2 | """Low-level handling of Ceph volumes.
This module contains the Volume, Snapshot, and Image classes. Volume
represents an RBD volume that is not a snapshot. Image is an abstract
base class for both volumes and snapshots.
"""
import contextlib
import json
import os
import os.path as p
import time
import rbd
from ..u... | 377 | 29.93 | 80 | 22 | 2,699 | python | [{"finding_id": "codeql_py/overly-permissive-file_1907ea97996f2290_4c496da3", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to group readable."
] | [
367,
370
] | [
null,
null
] | [
13,
13
] | [
37,
37
] | |
2024-11-19T03:43:51.953850+00:00 | 1,552,130,440,000 | 57a353acb3a2203991e86a04cca3dabe056478a7 | 3 | {
"blob_id": "57a353acb3a2203991e86a04cca3dabe056478a7",
"branch_name": "refs/heads/master",
"committer_date": 1552130440000,
"content_id": "5508f396efa4e7f92a3f4ec9b9999de762d916d0",
"detected_licenses": [
"MIT"
],
"directory_id": "8880c1d706b6ed565cd974c1b2155b033911c756",
"extension": "py",
"fi... | 3.078125 | stackv2 | #!/usr/bin/env python3
import os
import datetime
import models
import models.doctor as doctor
from models import patient
class Appointment:
def __init__(self, time, patient_id, doctor_id, intervention, description):
self.__patient = patient_id
if not self.__patient:
print("[-] Patient ... | 451 | 27.12 | 88 | 18 | 3,044 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8306e73e2b34d4e6_298ed3e3", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive d... | [
127,
446,
264,
375,
403
] | [
null,
null,
null,
null,
null
] | [
16,
20,
11,
11,
11
] | [
37,
39,
62,
34,
39
] | |
2024-11-19T03:43:57.441928+00:00 | 1,534,801,334,000 | 5c610542512213fc718068aa7e7efdab104fb597 | 3 | {
"blob_id": "5c610542512213fc718068aa7e7efdab104fb597",
"branch_name": "refs/heads/master",
"committer_date": 1534801334000,
"content_id": "913c701cd03371f8441f7af5a6c11aac2d277865",
"detected_licenses": [
"MIT"
],
"directory_id": "644dbd3151a5044ec4030ced21caf847386f2af0",
"extension": "py",
"fi... | 3.078125 | stackv2 | #!/usr/bin/python2.7
#Gather initialPasswordView details for list of users.
#Necessary inputs:
# list of users, delineated by newline (\n)
# output file
# username of OpenIDM user to call API with
# password of OpenIDM user
import json
import getopt
import getpass
import sys
import requests
def parseIn... | 106 | 36.04 | 162 | 16 | 1,057 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_015e383cf7b9a9f8_2ce9574b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
101
] | [
null
] | [
24
] | [
33
] | |
2024-11-19T03:44:10.800702+00:00 | 1,581,581,104,000 | d332726e987148e0a2a8c632b93e9532b0745a86 | 3 | {
"blob_id": "d332726e987148e0a2a8c632b93e9532b0745a86",
"branch_name": "refs/heads/master",
"committer_date": 1581581104000,
"content_id": "ee6f81184fdc128af7c8db59ff5bcfb4f0789978",
"detected_licenses": [
"MIT"
],
"directory_id": "3e4dc27dfa9b115b5c29c5f3e64dfe8fbb13506c",
"extension": "py",
"fi... | 2.828125 | stackv2 | """
BluePrint for all Authontication routs and logic
Use "from passlib.hash import sha256_crypt" as our encryption library
User information stored in the session (Backend) as a dictionary
And accessible from any route
30% written by Alex Kohanim
70% written By Akshay Kasar
If any questions arise from this blueprint... | 152 | 34.72 | 84 | 19 | 1,124 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1ed7a480865027db_a2c6ac32", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
98,
98
] | [
null,
null
] | [
19,
30
] | [
28,
47
] | |
2024-11-19T03:44:29.480065+00:00 | 1,600,424,005,000 | 583c0c0ee827682820d8e0cc561530c5dbdd92d5 | 2 | {
"blob_id": "583c0c0ee827682820d8e0cc561530c5dbdd92d5",
"branch_name": "refs/heads/master",
"committer_date": 1600424005000,
"content_id": "fcad8f45f040d8d27d8d4563ef8ba2458fd76b43",
"detected_licenses": [
"MIT"
],
"directory_id": "f8bc57f9f0e09c7d2d6f8887b9ec657deb47e898",
"extension": "py",
"fi... | 2.40625 | stackv2 | import time
import PIL
import numpy as np
import torch
import torchvision
import torchvision.transforms as transforms
import torch.nn as nn
import torch.nn.functional as F
import torch.optim as optim
import apex
from tqdm import tqdm
import multiprocessing
num_threads = 2
BATCH_SIZE = 512
EPOCHS = 200
LEARNING_RATE = 0... | 142 | 31.19 | 94 | 15 | 1,116 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_bb47c02cf2564ec6_6ba4d73a", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
134
] | [
null
] | [
5
] | [
62
] | |
2024-11-19T01:44:07.670144+00:00 | 1,611,267,752,000 | 44a02ef082cc9aefe83b301b80acf9955a7d2c16 | 3 | {
"blob_id": "44a02ef082cc9aefe83b301b80acf9955a7d2c16",
"branch_name": "refs/heads/main",
"committer_date": 1611267752000,
"content_id": "886aa7ad96b731a4759cf870830e973b206e7518",
"detected_licenses": [
"MIT"
],
"directory_id": "bd81170f16d9e0615914e17f71f9639fb4991f72",
"extension": "py",
"file... | 2.578125 | stackv2 | from flask import Flask, send_file, request, jsonify
import firebase_admin
from firebase_admin import credentials, firestore, storage
import cv2
import os
import math
import uuid
import models
import warp_image
app = Flask(__name__)
cap = cv2.VideoCapture(0)
config = {
"apiKey": "AIzaSyC2qvy80zegkDmLkJM18CSiSj_... | 178 | 33.53 | 114 | 22 | 1,554 | python | [{"finding_id": "codeql_py/stack-trace-exposure_f89465d1664d3ce0_26a361f7", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
153,
178
] | [
null,
null
] | [
24,
24
] | [
58,
58
] | |
2024-11-19T02:08:54.218062+00:00 | 1,620,838,647,000 | dcb254c62da110c92b9177b879ddf1af116ff17b | 3 | {
"blob_id": "dcb254c62da110c92b9177b879ddf1af116ff17b",
"branch_name": "refs/heads/master",
"committer_date": 1620838647000,
"content_id": "d6705d7c8309be056ac96f459f12233fe02a1dba",
"detected_licenses": [
"Artistic-2.0"
],
"directory_id": "0af856b83413d201285bd101996d59c31cd0bfdd",
"extension": "p... | 2.671875 | stackv2 | """
This handler listens for TCP/Unix connections from the localhost and from this
agent sending us events. We will forward those events to the CorkAPI.
"""
from . import BaseHandler
from dart.common.settings import SettingsManager
from dart.common.exceptions import EventValidationException
import dart.agent.api
from ... | 308 | 43.75 | 153 | 21 | 2,702 | python | [{"finding_id": "codeql_py/overly-permissive-file_ba84f13ebc362fda_6036d278", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
99
] | [
null
] | [
9
] | [
42
] | |
2024-11-19T02:58:04.175211+00:00 | 1,615,320,201,000 | 33ad2ccad513e4e7fa47624598984520817aed27 | 3 | {
"blob_id": "33ad2ccad513e4e7fa47624598984520817aed27",
"branch_name": "refs/heads/main",
"committer_date": 1615320201000,
"content_id": "e5e2436a4c523ce2b44b1064391c515757a0d74e",
"detected_licenses": [
"MIT"
],
"directory_id": "d3004e10d4736390b424d2dc0359a3c456ed37d6",
"extension": "py",
"file... | 2.875 | stackv2 | #!/usr/bin/env python3
# Author: Lucas Roelser <roesler.lucas@gmail.com>
# URL: https://github.com/LucasRoesler/ssl-expiry-check
# Modified from serverlesscode.com/post/ssl-expiration-alerts-with-lambda/
import datetime
import fileinput
import os
import socket
import ssl
import time
def ssl_expiry_datetime(hostname: ... | 69 | 33.68 | 77 | 16 | 563 | python | [{"finding_id": "codeql_py/insecure-protocol_5a2573ad7637e718_891b873a", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)."
] | [
17
] | [
null
] | [
12
] | [
19
] | |
2024-11-19T03:10:15.840339+00:00 | 1,507,809,967,000 | f49ec24b4db05293cddcaa746d2e70f591d7edb9 | 2 | {
"blob_id": "f49ec24b4db05293cddcaa746d2e70f591d7edb9",
"branch_name": "refs/heads/master",
"committer_date": 1507809967000,
"content_id": "85ae3b7bec05f8c3fa32e69c3c0b494a193b5971",
"detected_licenses": [
"MIT"
],
"directory_id": "5f46c0215c09070ec40e31eea90b191e2d67b095",
"extension": "py",
"fi... | 2.359375 | stackv2 | import requests
import logging
from hashlib import md5
from urllib.parse import urljoin
from urllib.parse import urlencode
class Client:
def __init__(self, key, secret, api_root='https://kkex.com'):
self.key = key
self.secret = secret
self.api_root = api_root
def make_sign(self, params... | 137 | 29.77 | 75 | 15 | 980 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6d382aaad52d364f_00f21f88", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
17
] | [
null
] | [
23
] | [
54
] | |
2024-11-19T03:10:18.787325+00:00 | 1,508,497,178,000 | c2c9290b640fb5b7f28539311a36346aca84f354 | 3 | {
"blob_id": "c2c9290b640fb5b7f28539311a36346aca84f354",
"branch_name": "refs/heads/master",
"committer_date": 1508497178000,
"content_id": "1b6e00722f67cc8fa186b3979443a4dadc59e989",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c8cbc81f58cc68a34087e7f7aa9f65eb44a5f0fd",
"extension": "py"... | 2.546875 | stackv2 | from flask import Blueprint, render_template, request, redirect, session, url_for
import bcrypt
from user.models import User
from user.forms import RegisterForm, LoginForm
user_app = Blueprint('user_app',__name__)
@user_app.route('/register', methods=('GET', 'POST'))
def register():
form = RegisterForm()
if ... | 57 | 31.75 | 81 | 18 | 384 | python | [{"finding_id": "codeql_py/url-redirection_bf2fa384b57bf96d_147e0e35", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
46
] | [
null
] | [
37
] | [
41
] | |
2024-11-19T03:10:19.593001+00:00 | 1,602,079,654,000 | 92a1e3a9f3f599298d65a248d6d3cb7ea0f2303b | 2 | {
"blob_id": "92a1e3a9f3f599298d65a248d6d3cb7ea0f2303b",
"branch_name": "refs/heads/master",
"committer_date": 1602079654000,
"content_id": "72a65b4dfe934f6f8d4c91f0d01cf231def8c6ae",
"detected_licenses": [
"MIT"
],
"directory_id": "5e382a50c521e4cd874ed4e94799e5ef062994a1",
"extension": "py",
"fi... | 2.3125 | stackv2 | """
UNDER DEVELOPMENT for issue #784 (see web/server/diagnostics_monitoring.py)
Based on https://github.com/amitsaha/aiohttp-prometheus
Clients:
- https://github.com/prometheus/client_python
- TODO: see https://github.com/claws/aioprometheus
"""
import logging
import time
import prometheus_clie... | 139 | 32.11 | 156 | 17 | 993 | python | [{"finding_id": "codeql_py/log-injection_8947ab1693ebb575_6ce70782", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
55,
57
] | [
null,
null
] | [
17,
17
] | [
31,
29
] | |
2024-11-19T03:10:35.624827+00:00 | 1,534,044,668,000 | 64b38dbb83574dc5dea45f1fe7258d12787e8fc6 | 3 | {
"blob_id": "64b38dbb83574dc5dea45f1fe7258d12787e8fc6",
"branch_name": "refs/heads/master",
"committer_date": 1534044668000,
"content_id": "86314694664f84b7337f22c2494602c13cf55bd0",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "0d590b09f807c3f7a76acb93ad99e7b667f76668",
"extension": "p... | 2.546875 | stackv2 | """Flask microframework thermos module viola lets code"""
from flask import render_template, url_for, request, redirect, flash, abort
from thermos import application, db, login_manager
from datetime import datetime
from thermos.users import Userobj
from thermos.forms import BookmarkForm, LoginForm, SignupForm
from th... | 148 | 36.72 | 115 | 17 | 1,221 | python | [{"finding_id": "codeql_py/url-redirection_f80a1a68a6291d52_9dac9aef", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
108
] | [
null
] | [
29
] | [
96
] | |
2024-11-19T03:22:35.279088+00:00 | 1,603,895,592,000 | cc8c11ad6941057fd7180411ba607cfc2c61e2f9 | 3 | {
"blob_id": "cc8c11ad6941057fd7180411ba607cfc2c61e2f9",
"branch_name": "refs/heads/main",
"committer_date": 1603895592000,
"content_id": "bd8b9346988da871ca08917741c7d8c574c421e0",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "94824c0bd3a9fa6e3ac636911999fb049e482b5d",
"extension": "py"... | 3.265625 | stackv2 | import re
class UnitParser(object):
def __init__(self):
self.__prefixDict = {
"femto": "f",
"pico": "p",
"nano": "n",
"micro": "u",
"milli": "m",
"mili": "m",
... | 99 | 31.72 | 139 | 18 | 714 | python | [{"finding_id": "codeql_py/overly-large-range_ad43da65e227de83_a43de2c1", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
47
] | [
null
] | [
27
] | [
30
] | |
2024-11-19T03:22:51.786117+00:00 | 1,591,412,869,000 | 1f31dd66bff6a5de033c59cc77782300821ac98a | 3 | {
"blob_id": "1f31dd66bff6a5de033c59cc77782300821ac98a",
"branch_name": "refs/heads/master",
"committer_date": 1591412869000,
"content_id": "925bc9c3ecad50700ec2bc4faa41da7667638493",
"detected_licenses": [
"MIT"
],
"directory_id": "6d69d1264197a5d72f3d373a026636e6c04606bd",
"extension": "py",
"fi... | 2.796875 | stackv2 | #%%
from utils.config import Config
import pandas as pd
#%%
c = Config()
c.validate_files()
#%%
df1 = pd.read_csv(c.uid_300K, nrows=1000)
#%%
# this code need to be refactored into a util
# or save a clean file to dataset
df1_columns_index = [15, 2,3,5,7,8,9,10,11,12]
df1_columns_labels = ['uid','bilayer', 'mo... | 97 | 23.53 | 138 | 12 | 729 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b9ba78d3d0e1dc0e_5817e47a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
61
] | [
null
] | [
11
] | [
52
] | |
2024-11-19T03:22:58.453867+00:00 | 1,570,377,124,000 | d14395f0b9f93e759e65ac09781b6f5f8985a342 | 2 | {
"blob_id": "d14395f0b9f93e759e65ac09781b6f5f8985a342",
"branch_name": "refs/heads/master",
"committer_date": 1570377124000,
"content_id": "49059e9ebfefb1d9160c860f4cf7ff10f6b964ee",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cb6001993ad2d30b7174dc2e6d59c9f3ea890af8",
"extension": "py"... | 2.375 | stackv2 | from apscheduler.scheduler import Scheduler
import requests
import json
GLOBAL_WEIXIN_TOKEN = ""
GLOBAL_WEIXIN_TICKET = ""
task = Scheduler()
@task.interval_schedule(seconds=0)
def startTask():
print("后台任务开始")
task.shutdown(wait=False)
getWeiXinToken()
createTask()
task.start()
def createTask():
... | 62 | 26.24 | 87 | 12 | 448 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e1d8a3f37b71fc49_ac53d29c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 8 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-295",
"CWE-295"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/request-without-cert-validation",
"py/request-without-cert... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive dat... | [
34,
38,
41,
51,
55,
57,
31,
48
] | [
null,
null,
null,
null,
null,
null,
null,
null
] | [
30,
15,
46,
36,
15,
34,
14,
14
] | [
44,
34,
81,
50,
35,
69,
42,
42
] | |
2024-11-19T03:22:59.719144+00:00 | 1,483,323,154,000 | 6cd09de418cbbef433ced230518211d954a11074 | 3 | {
"blob_id": "6cd09de418cbbef433ced230518211d954a11074",
"branch_name": "refs/heads/master",
"committer_date": 1483323154000,
"content_id": "63f8fe2dd9d28d69f0d1edeee0abbca3fdfdf8ce",
"detected_licenses": [
"MIT"
],
"directory_id": "12cc09585478603e25fd855a5c10f75c06bee77e",
"extension": "py",
"fi... | 2.78125 | stackv2 | #! /usr/bin/python
'''
boilerplate_sparkbot
This is a sample boilerplate application that provides the framework to quickly
build and deploy an interactive Spark Bot.
There are different strategies for building a Spark Bot. This boilerplate is
expects that a dedicated Spark Account be provided fo... | 248 | 34.28 | 91 | 14 | 2,108 | python | [{"finding_id": "codeql_py/flask-debug_bbe329a6d1fc0c55_df8c0a25", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
247,
99
] | [
null,
null
] | [
5,
12
] | [
58,
38
] | |
2024-11-19T01:35:19.200676+00:00 | 1,554,679,964,000 | 5e1b9512250656069398a45653fe3c0cdc384417 | 3 | {
"blob_id": "5e1b9512250656069398a45653fe3c0cdc384417",
"branch_name": "refs/heads/master",
"committer_date": 1554679964000,
"content_id": "eee602920cb5d0d0fe1abf57683a646b97adf23f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b6e73025c4cc1d060e301e38a968506622c4d410",
"extension": "py"... | 2.609375 | stackv2 | import hashlib
import time
import boto3
import json
from typing import Any, List, Dict
import pydgraph
from pydgraph import DgraphClient, DgraphClientStub
def parse_s3_event(event) -> str:
# Retrieve body of sns message
# Decode json body of sns message
print('event is {}'.format(event))
msg = json... | 186 | 28.29 | 94 | 20 | 1,341 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_50c26265a59545d7_ac8f7201", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.\... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (SHA1) that is insecure."
] | [
125
] | [
null
] | [
20
] | [
37
] | |
2024-11-19T02:07:49.329145+00:00 | 1,609,169,007,000 | ae3878fb1e5e464d30bd63b62de3e3e2b7cfe3dc | 2 | {
"blob_id": "ae3878fb1e5e464d30bd63b62de3e3e2b7cfe3dc",
"branch_name": "refs/heads/master",
"committer_date": 1609169007000,
"content_id": "704a3b046f5a124b2acfbc7106f51268e63db579",
"detected_licenses": [
"MIT"
],
"directory_id": "b8aba2bb539c731591f86e17f1517861b2ccf218",
"extension": "py",
"fi... | 2.484375 | stackv2 | # -*- coding: utf-8 -*-
"""Provider for ScienceDirect
Author: G.J.J. van den Burg
License: See LICENSE file
Copyright: 2020, G.J.J. van den Burg
"""
import re
import bs4
import urllib
import json
from ._base import Provider
from ._info import Informer
from ..exceptions import URLResolutionError
from ..log import L... | 106 | 31.18 | 113 | 15 | 829 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_55c3b45c0a8670fa_a1d68d75", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This string, which is used as a regular expression [here](1), has an unescaped '.' before 'sciencedirect.com/science/article/pii/', so it might match more hosts than expected."
] | [
43
] | [
null
] | [
10
] | [
75
] | |
2024-11-19T02:08:00.831032+00:00 | 1,470,748,856,000 | 398c4630cf31d4e7c5e20b803e52e12850725ea5 | 2 | {
"blob_id": "398c4630cf31d4e7c5e20b803e52e12850725ea5",
"branch_name": "refs/heads/master",
"committer_date": 1470748856000,
"content_id": "ceed0a7d5f06a7c1ef62fe61d8d269a80470c632",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "cf832b4edc1cb013eb425ff6a8562d7c34f883ab",
"extension": "p... | 2.484375 | stackv2 | from json import loads, dumps
from datetime import datetime
from hashlib import sha256, md5
from base64 import b64encode
from os import urandom
from elixir import (
Entity, Field, Unicode, DateTime,
UnicodeText, OneToMany, ManyToOne
)
from pecan import conf
from pbkdf2 import PBKDF2
from sqlalchemy import and_... | 182 | 27.41 | 106 | 19 | 1,202 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_f7eef70b98a77f8e_26b7872e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
134
] | [
null
] | [
26
] | [
41
] | |
2024-11-19T02:17:17.640925+00:00 | 1,508,336,239,000 | 64f2632190b9fe39690bd7b2b048f7104a38a850 | 3 | {
"blob_id": "64f2632190b9fe39690bd7b2b048f7104a38a850",
"branch_name": "refs/heads/master",
"committer_date": 1508336239000,
"content_id": "3d567adc7a21bbdc789b393ef7aee68c302a6af5",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "de738248bf68b66f4e077bcf904d435aea71ca26",
"extension": "p... | 2.859375 | stackv2 | """
Flask Serving
This file is a sample flask app that can be used to test your model with an REST API.
This app does the following:
- Look for sine wave test set
- Returns the output file generated at /output
POST req:
parameter:
- file, required, sine waves test set
"""
from __future__ import p... | 138 | 33.56 | 116 | 18 | 1,249 | python | [{"finding_id": "codeql_py/unsafe-deserialization_0b18983734577a93_a7fe9966", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio... | 2 | true | [
"CWE-502",
"CWE-502"
] | [
"py/unsafe-deserialization",
"py/unsafe-deserialization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Unsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provided value](1)."
] | [
103,
106
] | [
null,
null
] | [
44,
44
] | [
54,
54
] | |
2024-11-19T02:17:21.705738+00:00 | 1,514,234,567,000 | edcd8b759a2ed388707e699c93ca19b3738804b2 | 2 | {
"blob_id": "edcd8b759a2ed388707e699c93ca19b3738804b2",
"branch_name": "refs/heads/master",
"committer_date": 1514234567000,
"content_id": "89613c03695f35a866a24ad1af0d5c2626e6ea26",
"detected_licenses": [
"MIT"
],
"directory_id": "d40a5648e65ced277bf7895b30fec1efe4a8f2d9",
"extension": "py",
"fi... | 2.484375 | stackv2 | from pathlib import Path
from datetime import date
import configparser
import time
import requests
import os
import redditposts
import filehandler
from imgurdownloader import ImgurDownloader
CONFIG_PATH = "wally.conf"
STANDALONE_PATH = "/images/"
ALBUM_PATH = "/albums/"
def main():
config = configparser.ConfigP... | 131 | 34.02 | 80 | 18 | 938 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c407574e75547777_1aa0aa71", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [imgur.com](1) may be at an arbitrary position in the s... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [imgur.com](1) may be at an arbitrary position in the sanitized URL."
] | [
65
] | [
null
] | [
12
] | [
35
] | |
2024-11-19T02:17:31.229226+00:00 | 1,569,340,121,000 | 78e15ef89c3d79b0649cd0b0801b15bf4a790484 | 2 | {
"blob_id": "78e15ef89c3d79b0649cd0b0801b15bf4a790484",
"branch_name": "refs/heads/master",
"committer_date": 1569340121000,
"content_id": "a0988196ac828803458d48ba5022e9e1ff9deaf3",
"detected_licenses": [
"MIT"
],
"directory_id": "8e38a9b233b9c39f0b05b9c4e3e4ab76c59f3646",
"extension": "py",
"fi... | 2.421875 | stackv2 | #!/usr/bin/env python3
from hermes_python.hermes import Hermes
import hermes_python
from urls_ayto import urls_dict
import json
cache_file = "cache.json" # sets the name of the cache file
MQTT_IP_ADDR = "localhost"
MQTT_PORT = 1883
MQTT_ADDR = "{}:{}".format(MQTT_IP_ADDR, str(MQTT_PORT))
# open the cache file ... | 33 | 25.82 | 78 | 10 | 226 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_682618031af6bbcd_bde8b553", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
19
] | [
null
] | [
21
] | [
39
] | |
2024-11-19T02:17:48.982276+00:00 | 1,670,512,794,000 | 2b5e6ac5230144366e08aa44ca7746d2a07ba797 | 2 | {
"blob_id": "2b5e6ac5230144366e08aa44ca7746d2a07ba797",
"branch_name": "refs/heads/master",
"committer_date": 1670512794000,
"content_id": "21e16784ccdf4439bdd2701f6f134b5f01cce1fb",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e5aa5e735d53967862f3cac9ae71640dc85fa498",
"extension": "py"... | 2.484375 | stackv2 | import socket
import time
from paramiko import (
BadHostKeyException,
AuthenticationException,
SSHException,
SSHClient,
AutoAddPolicy,
Transport,
SFTPClient
)
from marvin.cloudstackException import internalError
from marvin.codes import (
SUCCESS,
FAILED,
INVALID_INPUT
)
from m... | 172 | 37.17 | 118 | 18 | 1,315 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_6b6ff65a521e6809_7922b39f", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
42
] | [
null
] | [
9
] | [
62
] | |
2024-11-19T02:18:21.262271+00:00 | 1,521,191,458,000 | df93a043f260dbdd91d7091808a47257d1202a48 | 2 | {
"blob_id": "df93a043f260dbdd91d7091808a47257d1202a48",
"branch_name": "refs/heads/master",
"committer_date": 1521191458000,
"content_id": "c5b00afb802ad98727c5590fcf916337dab158da",
"detected_licenses": [
"MIT"
],
"directory_id": "67538f74f62eeb6da65c671f257f695a889fadb5",
"extension": "py",
"fi... | 2.375 | stackv2 | # coding=utf-8
import os
import uuid
import magic
import urllib
import json
from random import choice
from string import digits, ascii_uppercase, ascii_lowercase
from datetime import datetime
import cropresize2
from flask import abort, Flask, request, jsonify, redirect, send_file
from flask.ext.mako import MakoTemplat... | 371 | 27.83 | 89 | 17 | 2,570 | python | [{"finding_id": "codeql_py/path-injection_8899c8cfd25b62d6_2b2d29bd", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 5 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
101,
341,
341,
347,
348
] | [
null,
null,
null,
null,
null
] | [
28,
31,
65,
27,
23
] | [
36,
39,
73,
35,
31
] | |
2024-11-19T02:29:58.440785+00:00 | 1,540,536,782,000 | ef13e371e76d2348935737bc3675a425ce672abc | 2 | {
"blob_id": "ef13e371e76d2348935737bc3675a425ce672abc",
"branch_name": "refs/heads/master",
"committer_date": 1540536782000,
"content_id": "2d5e75d0b60a17ec3bd6252a15edcd2d6695f64b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3bf873f14928493d2153df3244e1df5888191263",
"extension": "py"... | 2.421875 | stackv2 | # -*- coding: utf-8 -*-
'''
Created on 2018. 5. 11.
@author: HyechurnJang
'''
import json
import requests
try:
import requests.packages
requests.packages.urllib3.disable_warnings()
except: pass
class Genian:
def __init__(self, address, passkey):
self.address = address
self.passkey = p... | 50 | 36.38 | 167 | 15 | 515 | python | [{"finding_id": "codeql_py/request-without-cert-validation_15c50b9df2ad34cf_ffcf55c4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
26,
43
] | [
null,
null
] | [
21,
21
] | [
168,
116
] | |
2024-11-19T02:30:18.414343+00:00 | 1,581,369,433,000 | d05988f4ac3bb4ef550db31a06ad3d80f73fdb51 | 3 | {
"blob_id": "d05988f4ac3bb4ef550db31a06ad3d80f73fdb51",
"branch_name": "refs/heads/master",
"committer_date": 1581369433000,
"content_id": "0aa75c98dd7a3ee3e5fcdf574efb7bf04e9e90a5",
"detected_licenses": [
"MIT"
],
"directory_id": "8ffdc9a1fad9d7f0f07583427bc16f98b9ffcb68",
"extension": "py",
"fi... | 3.125 | stackv2 | #!/bin/python3
import math
import os
import random
import re
import sys
# Complete the birthdayCakeCandles function below.
def birthdayCakeCandles(ar):
candles = {}
biggest = 0
for size in ar:
if size not in candles:
candles[size] = 1
else:
candles[size] += 1
... | 34 | 17.97 | 50 | 16 | 164 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_55cb938125fd95b0_d6eb2e2f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
32
] | [
null
] | [
16
] | [
34
] | |
2024-11-19T02:41:40.098856+00:00 | 1,534,443,351,000 | f483263b9272e722a012980837b336ab2398bb70 | 2 | {
"blob_id": "f483263b9272e722a012980837b336ab2398bb70",
"branch_name": "refs/heads/master",
"committer_date": 1534443351000,
"content_id": "5c34f6a728d222f588256ec96ecc4ea4b6111e05",
"detected_licenses": [
"MIT"
],
"directory_id": "2112a1945b864fd5d96ea8ea32b0ea2d938449cb",
"extension": "py",
"fi... | 2.3125 | stackv2 | from __future__ import absolute_import
from __future__ import division
from __future__ import print_function
import collections
import hashlib
import os.path
import re
import tarfile
import numpy as np
import tensorflow as tf
from six.moves import urllib
from tensorflow.python.framework import graph_util
from tensorf... | 368 | 46.98 | 120 | 17 | 3,643 | python | [{"finding_id": "codeql_py/tarslip_c13b9f56d943fe90_9a187a52", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
108
] | [
null
] | [
5
] | [
35
] | |
2024-11-19T02:41:44.614840+00:00 | 1,616,361,588,000 | c9cb2ce1fb51c6a94af44b675aebb7a5e906c374 | 3 | {
"blob_id": "c9cb2ce1fb51c6a94af44b675aebb7a5e906c374",
"branch_name": "refs/heads/master",
"committer_date": 1616361588000,
"content_id": "fe348895f4d27624112689cb41356f592fba04ea",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "077802aefac503e1bf1f7fd156cdc295522b4e16",
"extension": "py"... | 2.796875 | stackv2 | import os
import redis
from flask import Flask
from flask import request
app = Flask(__name__)
db = redis.Redis(os.environ.get('REDIS_URL', 'localhost'))
@app.errorhandler(Exception)
def error_handler(error):
return str(error), 500
@app.route('/key', methods=['PUT'])
def put_key():
pair = request.json
... | 46 | 22.91 | 78 | 12 | 309 | python | [{"finding_id": "codeql_py/flask-debug_095cecae741ea52a_8c6de5cc", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a ... | [
42,
28,
35,
38
] | [
null,
null,
null,
null
] | [
5,
12,
16,
12
] | [
51,
50,
54,
62
] | |
2024-11-19T02:41:45.211085+00:00 | 1,496,357,262,000 | 38d02182ee70c5b75a017fd442b8c44eccb10968 | 3 | {
"blob_id": "38d02182ee70c5b75a017fd442b8c44eccb10968",
"branch_name": "refs/heads/master",
"committer_date": 1496357262000,
"content_id": "1835a866dbd3ac89aaa594dd80d30949a96cd416",
"detected_licenses": [
"MIT"
],
"directory_id": "83ab754cb8021cd4ea914d0a04188cebc4edcbaa",
"extension": "py",
"fi... | 3.328125 | stackv2 | import requests, json
def get_ip():
'''finds the useres IP address and returns it.'''
ipdata = requests.get('https://jsonip.com/')
ipresp = ipdata.json()
ip = ipresp.get('ip')
return ip
def geoip(ip):
'''retireves and reports users geoip information'''
resp = requests.get('http://freegeoip.net/json/' + ip)
d... | 39 | 22.15 | 70 | 10 | 257 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8c6a2b751274e800_2bcefe8e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (p... | [
28,
28,
36,
39
] | [
null,
null,
null,
null
] | [
11,
16,
7,
7
] | [
14,
19,
30,
30
] | |
2024-11-19T02:41:58.174287+00:00 | 1,509,199,130,000 | f92a388944348678adc78417b76f2aaf90bfef30 | 2 | {
"blob_id": "f92a388944348678adc78417b76f2aaf90bfef30",
"branch_name": "refs/heads/master",
"committer_date": 1509199130000,
"content_id": "9c7a27309704079e13286126f4ce681425c58aca",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4d9ca0ed1e62795411611b779fd5dff06f52cb01",
"extension": "py"... | 2.46875 | stackv2 | import re
import mongoengine as me
from mist.api.config import BANNED_EMAIL_PROVIDERS
ACTIONS = {} # This is a map of action types to action classes.
def _populate_actions():
"""Populate ACTIONS variable."""
for key, value in globals().iteritems():
if key.endswith('Action') and key != 'Action':
... | 114 | 26.83 | 79 | 15 | 705 | python | [{"finding_id": "codeql_py/redos_843c2969ad791e08_8bf610d2", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '-@-.' and containing many repetit... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '-@-.' and containing many repetitions of '-.'."
] | [
25
] | [
null
] | [
41
] | [
55
] | |
2024-11-19T02:42:21.365254+00:00 | 1,588,969,226,000 | e2e09cee12b363ab43205de133a8f21b4bbf9d77 | 3 | {
"blob_id": "e2e09cee12b363ab43205de133a8f21b4bbf9d77",
"branch_name": "refs/heads/master",
"committer_date": 1588969226000,
"content_id": "24ef86ebf896bb5f0a736774de741e155f8532d2",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "80669f62945ea8894a435ee9a5e350e4c5d50396",
"extension": "p... | 2.734375 | stackv2 | '''
Koodissa haetaan Steam Web APIn kautta käyttäjien steamID:t ja heidän käyttäjännimensä, jotka yhdistetään kirjastoksi.
'''
import pandas as pd
import requests
import util
import json
import csv
import sys
from crawler import get_chrome_driver
from review_score_crawler import crawl_review_score
def write_to_node... | 109 | 35.62 | 125 | 18 | 1,000 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a2243c87ab4d7381_3bed509f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
47,
64
] | [
null,
null
] | [
15,
23
] | [
55,
28
] | |
2024-11-19T02:42:22.782840+00:00 | 1,550,657,218,000 | a6f17453bfa213157873aabb0f66149e5bf8741b | 2 | {
"blob_id": "a6f17453bfa213157873aabb0f66149e5bf8741b",
"branch_name": "refs/heads/master",
"committer_date": 1550657218000,
"content_id": "e499e1e49d0afe447211859902f5601a98ce5f74",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6ac4cb4b870020270102c1b8d998d36fc825ead9",
"extension": "py"... | 2.34375 | stackv2 | # Copyright 2018 Jörg Franke
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, s... | 317 | 38.39 | 118 | 23 | 2,834 | python | [{"finding_id": "codeql_py/tarslip_d7d9c7ad72ca7851_4699b129", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
128
] | [
null
] | [
21
] | [
24
] | |
2024-11-18T18:05:57.591648+00:00 | 1,449,276,678,000 | 3e0aedd780c8bf4bac76e6c035ddf409fd5ec746 | 3 | {
"blob_id": "3e0aedd780c8bf4bac76e6c035ddf409fd5ec746",
"branch_name": "refs/heads/master",
"committer_date": 1449276678000,
"content_id": "4dff21d36c1deab5268bf64d68db32c1cfac5680",
"detected_licenses": [
"MIT"
],
"directory_id": "476db59a7947ae40f0f60755c000c901400d5d84",
"extension": "py",
"fi... | 2.765625 | stackv2 | #! /usr/bin/env python
# -*- coding: utf-8 -*-
# vim:fenc=utf-8
#
# Copyright © 2015 Christopher C. Strelioff <chris.strelioff@gmail.com>
#
# Distributed under terms of the MIT license.
"""
previously_approved_key.py
=================
A Python 3 example of using the discogs-client with a consumer key and secret,
as w... | 85 | 32.42 | 78 | 16 | 694 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1f573eadf788d8b4_c12fcf06", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
48
] | [
54
] | [
7
] | [
71
] | |
2024-11-18T18:06:04.594997+00:00 | 1,481,826,968,000 | 4b767f0cd94c8bca079f4c10a308ad172b0571b1 | 3 | {
"blob_id": "4b767f0cd94c8bca079f4c10a308ad172b0571b1",
"branch_name": "refs/heads/master",
"committer_date": 1481826968000,
"content_id": "b4ca2f38198449618b47e45e56009dd6441bfc87",
"detected_licenses": [
"MIT"
],
"directory_id": "698b4ecc4122062620f199eef734b456e8cdb5d5",
"extension": "py",
"fi... | 3.15625 | stackv2 | #!/usr/bin/env python3
import hashlib
puzzle = b'abbhdwsy'
bytes_for = lambda i: i.to_bytes((i.bit_length() // 8) + 1, byteorder='big')
bytes_for = lambda i: bytes(str(i), 'ascii')
i = 0
g = 0
password = [None] * 8
while g < 8:
h = hashlib.md5(puzzle + bytes_for(i)).hexdigest()
i += 1
if h.startswith('0... | 26 | 20.58 | 76 | 13 | 180 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a9510702060f1b86_add974c8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
17,
26
] | [
null,
null
] | [
18,
7
] | [
26,
24
] | |
2024-11-18T18:16:04.384633+00:00 | 1,612,401,745,000 | 875a55748e02f21026a5fc102238121170d4fd3f | 3 | {
"blob_id": "875a55748e02f21026a5fc102238121170d4fd3f",
"branch_name": "refs/heads/master",
"committer_date": 1612401745000,
"content_id": "1e5a8807365295198c079f098d64ec3a83bd1c5e",
"detected_licenses": [
"MIT"
],
"directory_id": "156ae17877294d3df6a85f07af963eaacb5235ed",
"extension": "py",
"fi... | 2.6875 | stackv2 | import os
import urllib3
from flask import Flask, request, json, make_response
from twilio.twiml.voice_response import VoiceResponse
from twilio.rest import Client
import watson_transcribe
import google_transcribe
app = Flask(__name__)
@app.route('/twilio', methods=['GET', 'POST'])
def twilio():
"""
Listen ... | 98 | 33.53 | 114 | 12 | 877 | python | [{"finding_id": "codeql_py/flask-debug_729fc457be42c273_4f129ad8", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"The full URL of this request depends on a [user-provided value](1)."
] | [
97,
70
] | [
null,
null
] | [
5,
17
] | [
68,
76
] | |
2024-11-18T19:31:07.823339+00:00 | 1,530,202,317,000 | 63dc8305e1993eda9e740b36caa14ef5f524cfa7 | 2 | {
"blob_id": "63dc8305e1993eda9e740b36caa14ef5f524cfa7",
"branch_name": "refs/heads/master",
"committer_date": 1530202317000,
"content_id": "f8da9d16d261e444891af89eace0a8172e33955a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "497421f9cbe8764f05ad4b62ba80a1d3bf4f50f0",
"extension": "py"... | 2.3125 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
'''
Author: vivek Mistry @[Vivek M.]
Date: 26-04-2018 07:01
Disclaimer:
All information, documentation, and code is provided to you AS-IS and should
only be used in an internal, non-production laboratory environment.
License:
Copyright 2017 BlueCat Networks, Inc.
Licensed u... | 67 | 31.7 | 97 | 12 | 494 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_982fcb00ab87c8c0_25408623", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
48
] | [
null
] | [
7
] | [
48
] | |
2024-11-18T20:08:58.015361+00:00 | 1,670,857,854,000 | febc28eb87ad72529715fa5885babf0788ad6ede | 2 | {
"blob_id": "febc28eb87ad72529715fa5885babf0788ad6ede",
"branch_name": "refs/heads/master",
"committer_date": 1670857854000,
"content_id": "1022b7b9992c3aa2e1e562fff70ff8e391cc4fb7",
"detected_licenses": [
"MIT"
],
"directory_id": "72b65247200e7cc9fd102522e9151ac7a7af3a00",
"extension": "py",
"fi... | 2.484375 | stackv2 | import os
from config import Config
from controllers.imageInfo import routes
from database import db
from database.entities.images import DatabaseImage
from database.entities.objectInfo import DatabaseObject
from database.models.Cars import Cars
from database.models.Coordinates import Coordinates
from database.models.O... | 105 | 36.29 | 109 | 19 | 830 | python | [{"finding_id": "codeql_py/reflective-xss_06e333df0aaa35f7_6606a9b3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-022"
] | [
"py/reflective-xss",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
46,
92
] | [
null,
null
] | [
34,
31
] | [
88,
41
] | |
2024-11-18T19:11:48.825833+00:00 | 1,685,744,582,000 | e84dc63638f36465eccf42abf9768f1ddf8c4c5e | 2 | {
"blob_id": "e84dc63638f36465eccf42abf9768f1ddf8c4c5e",
"branch_name": "refs/heads/master",
"committer_date": 1685744582000,
"content_id": "a65ec217dd4fc63db38963a661b1363991752ce7",
"detected_licenses": [
"MIT"
],
"directory_id": "ff2e1434a8a2cd259b197a7359eefebefb325fba",
"extension": "py",
"fi... | 2.421875 | stackv2 | from websockets.legacy.server import WebSocketServerProtocol
from .kernel import Kernel
from .os_components.process import Process
from .os_components.wsocket_messaging import Pqueue, TypeMessage
from .os_components.programs_constants import TProgs
from .os_constants import FileTypes
from typing import List, Optional... | 407 | 42.11 | 144 | 29 | 3,227 | python | [{"finding_id": "codeql_py/redos_4765919870babc39_56a8f78d", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '.'.", "remediati... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '.'."
] | [
122
] | [
null
] | [
38
] | [
45
] | |
2024-11-18T19:34:37.425821+00:00 | 1,490,772,099,000 | 815d446719cf7a1e31b7c20452313b8f413252a1 | 3 | {
"blob_id": "815d446719cf7a1e31b7c20452313b8f413252a1",
"branch_name": "refs/heads/master",
"committer_date": 1490772099000,
"content_id": "2f0eceb5d1176c7475a372113c486c9cf2e2849f",
"detected_licenses": [
"MIT"
],
"directory_id": "3d422cb08c5a8173354255e90f1972606995ea03",
"extension": "py",
"fi... | 2.609375 | stackv2 | from app import app, manager
js_urls_template = r"""
{% autoescape off %}
(function(globals) {
var django = globals.django || (globals.django = {});
django.urls = {{ urls_str }};
django.url = function(url_name, args) {
var url = django.urls[url_name];
if (!url) {
return undefined;
}
if... | 130 | 22.48 | 86 | 13 | 791 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b3f9ec6de823e9e1_35cfd80f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
125
] | [
null
] | [
16
] | [
42
] | |
2024-11-18T18:39:51.469873+00:00 | 1,530,437,291,000 | a22743ebe7cd72091748838600d765407c6bc3d3 | 3 | {
"blob_id": "a22743ebe7cd72091748838600d765407c6bc3d3",
"branch_name": "refs/heads/master",
"committer_date": 1530437291000,
"content_id": "15599005bac690c1d186f0d3b828ba66a315db78",
"detected_licenses": [
"MIT"
],
"directory_id": "04d4b71a09b8cae8fa1f6a1e53ced0fc0f2637d1",
"extension": "py",
"fi... | 2.6875 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Tue Dec 19 14:10:51 2017
@author: 309
"""
import numpy as np # linear algebra
import dicom
import os
import scipy.ndimage
import matplotlib.pyplot as plt
from skimage import measure
from mpl_toolkits.mplot3d.art3d import Poly3DCollection
import cv2
from sys import argv
import di... | 297 | 32.81 | 119 | 17 | 2,756 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8be0bc435d5d8b8d_413b3403", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
257
] | [
null
] | [
17
] | [
27
] | |
2024-11-18T18:39:53.251743+00:00 | 1,631,512,898,000 | bd84efd290a77019d9af7c9eea6837987a5a461c | 2 | {
"blob_id": "bd84efd290a77019d9af7c9eea6837987a5a461c",
"branch_name": "refs/heads/master",
"committer_date": 1631512898000,
"content_id": "ea619a652b42d9e3c03f59b4187435c3b383f0c7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "05402a0cbbf221c461a5b6942eb8ae1404b958b4",
"extension": "py"... | 2.4375 | stackv2 | #!/usr/bin/env python
# usage:
# python scripts/prepare_config.py \
# --in-template=./configs/templates/focal.yml \
# --out-config=./configs/_class.yml \
# --expdir=./src \
# --dataset-path=./data \
# --num-workers=4 \
# --batch-size=64 \
# --max-image-size=224 \
# --balance-strategy=102... | 93 | 25.78 | 79 | 14 | 588 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_7eec2aa3056d5ffd_83049e12", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
55
] | [
59
] | [
12
] | [
6
] | |
2024-11-18T18:39:53.526534+00:00 | 1,539,521,046,000 | 7a1b370db6677c4062eb98a2f166c7b73ae1a43f | 3 | {
"blob_id": "7a1b370db6677c4062eb98a2f166c7b73ae1a43f",
"branch_name": "refs/heads/master",
"committer_date": 1539521046000,
"content_id": "38ae4e39187a601002283dbe2fb1a68874ba47e1",
"detected_licenses": [
"Unlicense"
],
"directory_id": "cb60f8ed61702f23475847b6246d17661f02f8db",
"extension": "py",... | 3.015625 | stackv2 | #!/usr/bin/env python
import sys
flag = 'flag'
from bitstring import BitArray
import time
import signal
def write(data, endl='\n'):
sys.stdout.write(data + endl)
sys.stdout.flush()
def readline():
return sys.stdin.readline().strip()
def convert_to_bitstream(data):
return BitArray(bytes=data).bin
... | 76 | 22 | 176 | 11 | 464 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_713d549f132a7c4d_a6e1fb86", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
11
] | [
null
] | [
22
] | [
33
] | |
2024-11-18T18:39:55.201250+00:00 | 1,566,461,983,000 | 52d9dfe9762ddf0fe2be3989bd2063e77f7ac8e7 | 3 | {
"blob_id": "52d9dfe9762ddf0fe2be3989bd2063e77f7ac8e7",
"branch_name": "refs/heads/master",
"committer_date": 1566461983000,
"content_id": "03a774125dea85219ec6c34a639a20fbbb993170",
"detected_licenses": [
"MIT"
],
"directory_id": "f3584bf1e8e92e77ec98d3fcb8b896f4f2f220cd",
"extension": "py",
"fi... | 2.953125 | stackv2 | import pyperclip, re
# dicky_arya@apps.ipb.ac.id
# abc@apps.ipb.ac.id
# def@gmail.com
# 123-234-345
# 0812-9226-2530
# regex untuk phonenumber
phoneRegex = re.compile(
r'''
(
(\d{3,4}|\(\d{3,4}\)) # area code,group1
(\s|-|\.)? # separator,group2
(\d{3,4}) ... | 68 | 22.38 | 63 | 11 | 495 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1d0c345f12d253e9_058cf382", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
66
] | [
null
] | [
11
] | [
29
] | |
2024-11-18T18:39:56.903356+00:00 | 1,576,019,123,000 | e65f86b95048d11835f5db667aefd086b60da503 | 2 | {
"blob_id": "e65f86b95048d11835f5db667aefd086b60da503",
"branch_name": "refs/heads/master",
"committer_date": 1576019123000,
"content_id": "1971fce2d3037e7d46596d25313355f3650e8abe",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "41198b450282c36a1d39f361dd99fe423de989da",
"extension": "py"... | 2.421875 | stackv2 | import os
import shutil
import uuid
import subprocess
from urllib.parse import urljoin
from urllib.request import urlretrieve
import mantraml
from mantraml.core.management.commands.BaseCommand import BaseCommand
import tempfile
from pathlib import Path
import sys
import requests
import json
def find_artefacts(base_d... | 136 | 35.01 | 139 | 23 | 1,135 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_cedf8f85dd311d7b_663a7768", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [github.com](1) may be at an arbitrary position in the sanitized URL."
] | [
90
] | [
null
] | [
12
] | [
52
] | |
2024-11-18T18:40:00.876286+00:00 | 1,475,741,700,000 | 242cd362e61953e45ac4bc46c986c79b1c9c3b43 | 3 | {
"blob_id": "242cd362e61953e45ac4bc46c986c79b1c9c3b43",
"branch_name": "refs/heads/master",
"committer_date": 1475741700000,
"content_id": "550860f889604185f14b8c24fb7d8282a56ab1d8",
"detected_licenses": [
"MIT"
],
"directory_id": "afdef398a385ab51861d130805b9a30ae6eeb85f",
"extension": "py",
"fi... | 2.734375 | stackv2 | #: vim set encoding=utf-8 :
##
# Paper
# Develop apps for Pythonista using HTML, CSS and JavaScript
#
# author 0x77
# version 0.4
##
# Imports
import os
import sys
import json
import traceback
import webbrowser
from types import ModuleType
from bottle import run, route, get, post, static_file, request
__all__ ... | 410 | 29.57 | 83 | 26 | 2,450 | python | [{"finding_id": "codeql_py/stack-trace-exposure_442582d09610a488_1510a2b8", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-079"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.\n[Stack trace information](3) flows to this location and may be exposed to an external user.\n[Stack trace information](4) flows t... | [
390,
400,
390
] | [
null,
null,
null
] | [
24,
24,
24
] | [
40,
40,
40
] | |
2024-11-18T20:52:24.348772+00:00 | 1,626,865,483,000 | 82940fcdf642dd96bb77dc81a054d7c78cedda85 | 2 | {
"blob_id": "82940fcdf642dd96bb77dc81a054d7c78cedda85",
"branch_name": "refs/heads/main",
"committer_date": 1626865483000,
"content_id": "ffb1a7dad311662b5975f07a92d7588e81da6721",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6b5fbd6abf843c1208a37421c26c68f61eef901c",
"extension": "py",
... | 2.453125 | stackv2 | from flask import Flask, render_template, request
import secrets
import os
import colourmodel
import base64
import urllib.request
__DIR__ = os.path.dirname(__file__)
app = Flask(__name__)
# Create directories
if not os.path.exists(os.path.join(__DIR__, "static/img/uploads")):
os.makedirs(os.path.join(__DIR__, "... | 111 | 30.32 | 105 | 20 | 708 | python | [{"finding_id": "codeql_py/flask-debug_9de3270f11d11d8a_cdde1aaf", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 5 | true | [
"CWE-215",
"CWE-918",
"CWE-079",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/full-ssrf",
"py/reflective-xss",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"The full URL of this request depends on a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1... | [
111,
71,
98,
67,
85
] | [
null,
null,
null,
null,
null
] | [
5,
29,
20,
28,
31
] | [
24,
72,
106,
79,
82
] | |
2024-11-18T20:58:17.377671+00:00 | 1,658,782,096,000 | 078b14d310ee51f019ffbd4c35b0de9c230c2da8 | 3 | {
"blob_id": "078b14d310ee51f019ffbd4c35b0de9c230c2da8",
"branch_name": "refs/heads/master",
"committer_date": 1658782096000,
"content_id": "e77e96d480a557bf0391e67d418882c9d6d6fbe0",
"detected_licenses": [
"MIT"
],
"directory_id": "7387482e248675cc8733c55b590bd84029d84439",
"extension": "py",
"fi... | 3.453125 | stackv2 | # Implementation of the password generation algorithm of Mega Man IV and V
# as documented by Ross Angle at https://www.rocketnia.com/password-cracks/
# TODO Game state selection, sanity check, modularize, prettify, pythonify
# Although Mega Man IV and V for the most part use the same algorithm, there
# are some mino... | 132 | 40.38 | 92 | 17 | 1,590 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6806fa4a43c821d2_c35843bf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (p... | [
103,
115,
132
] | [
null,
null,
null
] | [
11,
15,
7
] | [
38,
42,
11
] | |
2024-11-18T20:15:51.741076+00:00 | 1,544,835,901,000 | 6cc6834de91c8e8120c4b59547477acbb7849c6e | 3 | {
"blob_id": "6cc6834de91c8e8120c4b59547477acbb7849c6e",
"branch_name": "refs/heads/master",
"committer_date": 1544835901000,
"content_id": "9742a6331a49ed700e4e23ab40845efd25143c96",
"detected_licenses": [
"MIT"
],
"directory_id": "26281a199908c026ff86fdc5034ec9e7d4118728",
"extension": "py",
"fi... | 2.765625 | stackv2 | import os
import flask
import stagger
import json
app = flask.Flask(__name__)
tagcycle = ["album", "artist", "track", "year", "title"]
@app.route("/upload", methods=["POST"])
def upload():
user_file = flask.request.files.getlist("user_file")[0]
new_metadata = flask.request.form.to_dict()
new_file = handle... | 52 | 31.37 | 77 | 13 | 428 | python | [{"finding_id": "codeql_py/flask-debug_722ecbda4cf204e4_5268af58", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
51,
41,
42
] | [
null,
null,
null
] | [
5,
23,
32
] | [
49,
32,
41
] | |
2024-11-18T20:16:00.973969+00:00 | 1,441,632,153,000 | 75a9a420ffb4f56b5f9e589336c6fc9da1510b37 | 3 | {
"blob_id": "75a9a420ffb4f56b5f9e589336c6fc9da1510b37",
"branch_name": "refs/heads/master",
"committer_date": 1441632153000,
"content_id": "3d2383982d74802502dfa80a52005cc455b59f2a",
"detected_licenses": [
"MIT"
],
"directory_id": "58dab1dbd8150060523d57b14bd9b5372b3efc3f",
"extension": "py",
"fi... | 2.515625 | stackv2 | from datetime import datetime
from flask import Flask, render_template, redirect, url_for, request
import os
import ConfigParser
import logging
from logging.handlers import RotatingFileHandler
#http://stackoverflow.com/questions/20646822/how-to-serve-static-files-in-flask
app = Flask(__name__, static_url_path='')
Conf... | 107 | 31.77 | 160 | 22 | 877 | python | [{"finding_id": "codeql_py/path-injection_562445667743ce91_92881901", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
25,
54
] | [
null,
null
] | [
19,
19
] | [
28,
28
] | |
2024-11-18T19:23:08.729256+00:00 | 1,401,592,216,000 | 9919e5166900563ea6ecdc4837666d70cf2ed164 | 3 | {
"blob_id": "9919e5166900563ea6ecdc4837666d70cf2ed164",
"branch_name": "refs/heads/master",
"committer_date": 1401592216000,
"content_id": "ea5c8ee1d48920dffdc579e10d87103c8d8cff75",
"detected_licenses": [
"MIT"
],
"directory_id": "35c8ccf75c4dc6c24e65ccddc870c4b24b3d4cc7",
"extension": "py",
"fi... | 3.484375 | stackv2 | # coding=utf-8
import codecs
import os
import re
from nltk import bigrams, ngrams
def get_trigrams_from_text(text):
"""
Creates trigrams form text and returns them.
@param text: the text to create trigrams from.
@return: list of trigrams
"""
# if we have no words to work with, return empty lis... | 219 | 30.8 | 117 | 21 | 1,732 | python | [{"finding_id": "codeql_py/overly-large-range_3f4e32dcb2ab156f_670f50a8", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "remedia... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
205
] | [
null
] | [
26
] | [
29
] | |
2024-11-18T19:38:37.115151+00:00 | 1,550,772,550,000 | 96953bbfb060961061cf8e08a661ad06b407997d | 3 | {
"blob_id": "96953bbfb060961061cf8e08a661ad06b407997d",
"branch_name": "refs/heads/master",
"committer_date": 1550772550000,
"content_id": "dc226f382e91673e5b0503395811800382fc6a41",
"detected_licenses": [
"MIT"
],
"directory_id": "7cc326466e66eff1b7e7113334e15652b789dc63",
"extension": "py",
"fi... | 3.390625 | stackv2 | from flask import Flask, request
app = Flask(__name__)
@app.route("/")
def hello():
return "<p>Hello World!</p><h1>Your name is: " + request.args.get('name', 'Jordan') + '</h1>'
@app.route("/dog")
def dog():
print(request.args)
html = '''
<link rel="stylesheet" href="https://stackpath.bootstrapcdn.... | 66 | 28.26 | 107 | 17 | 499 | python | [{"finding_id": "codeql_py/reflective-xss_fce71e5fe26e63f5_98b40b30", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
8,
66
] | [
null,
null
] | [
12,
12
] | [
98,
16
] | |
2024-11-18T20:10:39.190797+00:00 | 1,528,345,381,000 | 78a4a8572dd808c7a2ce664ac5c2fffb88038e4b | 3 | {
"blob_id": "78a4a8572dd808c7a2ce664ac5c2fffb88038e4b",
"branch_name": "refs/heads/master",
"committer_date": 1528345381000,
"content_id": "850bf745de4a80b7f86794a436945432269093a6",
"detected_licenses": [
"MIT"
],
"directory_id": "bdfbee26a48b73f8d629f08ddbf375cf00d4ada3",
"extension": "py",
"fi... | 3.390625 | stackv2 | from collections import defaultdict
import numpy as np
import re
import sys
class Vocab(object):
"""
Class to process one text file
"""
def __init__(self):
self.word2index = {}
self.index2word = {}
self.word_freq = defaultdict(int)
self.total_words = 0
self.unkn... | 241 | 31.21 | 102 | 26 | 1,964 | python | [{"finding_id": "codeql_py/overly-large-range_c426cd42adfd0815_a9fdda6d", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious chara... | [
163,
169,
169,
169
] | [
null,
null,
null,
null
] | [
53,
15,
18,
21
] | [
56,
19,
22,
25
] | |
2024-11-18T20:26:02.221821+00:00 | 1,603,787,970,000 | c3a146ad39508b6ff89fb89080f95dbb1658755c | 2 | {
"blob_id": "c3a146ad39508b6ff89fb89080f95dbb1658755c",
"branch_name": "refs/heads/master",
"committer_date": 1603787970000,
"content_id": "adaeb053cd9e24074e78a434f55e8de3f7097887",
"detected_licenses": [
"MIT"
],
"directory_id": "4e6af22f928c0d6618cd553c391f80ec2c4f406f",
"extension": "py",
"fi... | 2.34375 | stackv2 | from io import BytesIO
import time
from pathlib import Path
import traceback
from flask import Blueprint, jsonify, request
from modtpy.api.gcode_optimization import GcodeOptimizer
from modtpy.api.modt import ModT, Mode
import logging
from queue import LifoQueue
printer = Blueprint('printer', __name__)
class WebLog... | 127 | 26.45 | 95 | 22 | 762 | python | [{"finding_id": "codeql_py/stack-trace-exposure_372c5cf1c9a4a80c_68fc9db6", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
70
] | [
null
] | [
34
] | [
40
] | |
2024-11-18T20:26:25.661864+00:00 | 1,565,456,716,000 | 303482f58b1958ca94b4290655466a9868ca29d5 | 3 | {
"blob_id": "303482f58b1958ca94b4290655466a9868ca29d5",
"branch_name": "refs/heads/master",
"committer_date": 1565456716000,
"content_id": "f608bd5df5c4b1f806c8d7ef97585b0657a8ee8f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "70bfc97fb0ff98d817f72f27775a7b467ae66c39",
"extension": "py"... | 2.515625 | stackv2 | import network, time, machine, consts
sta_if = network.WLAN(network.STA_IF)
defaultSsid = machine.nvs_getstr("system", "wifi.ssid") or consts.WIFI_SSID
defaultPassword = machine.nvs_getstr("system", "wifi.password")
# Password is empty for unencrypted networks, so a simple or statement won't do
if defaultPassword is... | 51 | 21.57 | 79 | 10 | 310 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ce4f8d82acdfab20_2dfb1881", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text."
] | [
22
] | [
null
] | [
31
] | [
39
] | |
2024-11-18T20:26:44.043120+00:00 | 1,540,911,096,000 | f98232b4b14c696456c371c4efc20d361f994ae7 | 3 | {
"blob_id": "f98232b4b14c696456c371c4efc20d361f994ae7",
"branch_name": "refs/heads/master",
"committer_date": 1540911096000,
"content_id": "08aac48e26f165cdceb6b12184bace2df9edeb4f",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "12976b50eaeb88635a3dae404f77d3e2b6b37945",
"extension": "p... | 2.78125 | stackv2 | """API functions related to Services.
Providers are inferred by aggregating information from service plugins.
"""
from ..util import save_settings, get_settings, update_settings, parse_service_uri
from quest.database.database import get_db, db_session
from ..plugins import load_providers
import requests
import os
de... | 226 | 26.96 | 90 | 18 | 1,297 | python | [{"finding_id": "codeql_py/request-without-cert-validation_4b018ada930632d0_21035af1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
116
] | [
null
] | [
13
] | [
45
] | |
2024-11-18T20:26:51.217111+00:00 | 1,561,152,459,000 | 2f73ed3389e51b4b0200b6d1c38febf85c78453d | 3 | {
"blob_id": "2f73ed3389e51b4b0200b6d1c38febf85c78453d",
"branch_name": "refs/heads/master",
"committer_date": 1561152459000,
"content_id": "4d241f322c5c875518b9604b2c0a6209e5cdebee",
"detected_licenses": [
"MIT"
],
"directory_id": "230c116cf2d2fc793068f15a515fc26a5d85811a",
"extension": "py",
"fi... | 3.203125 | stackv2 | # TO RUN THIS SCRIPT COPY THIS COMMAND INTO THE TERMINAL -----> python robo_advisor.py
packages_setup = ['''
conda create -n stocks-env python=3.7 # (first time only)
conda activate stocks-env
pip install -r requirements.txt
pip install pytest # (only if you'll be writing tests)
python robo_advisor.py
''']
# Exa... | 234 | 41.18 | 156 | 13 | 2,305 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e284db6da7ea938f_c52d9fe3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
191,
196
] | [
null,
null
] | [
7,
7
] | [
48,
44
] | |
2024-11-18T20:26:59.143627+00:00 | 1,452,380,812,000 | f0af4bb4f49b57b43ad1ce06896db6c160b3f206 | 2 | {
"blob_id": "f0af4bb4f49b57b43ad1ce06896db6c160b3f206",
"branch_name": "refs/heads/master",
"committer_date": 1452380812000,
"content_id": "6da6a7d9dc17a276cc82e529e0afa8936dc15877",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "c1ff7f090dec3617514eb467cd7c5b8ba510ff4a",
"extension": "p... | 2.5 | stackv2 |
from django.db.models import Q
from django_reclass.models import Reclass, ReclassTemplate
from rest_framework import authentication, permissions
from rest_framework.response import Response
from rest_framework.views import APIView
from .serializers import ReclassSerializer, ReclassTemplateSerializer
def get_path(pa... | 55 | 28.33 | 100 | 22 | 324 | python | [{"finding_id": "codeql_py/stack-trace-exposure_4ae899a101c39a57_3c83c59f", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
51
] | [
null
] | [
37
] | [
54
] | |
2024-11-18T20:52:37.409724+00:00 | 1,621,482,365,000 | 478135718f8bfe23baa9bb6d85bd9155e7915d21 | 3 | {
"blob_id": "478135718f8bfe23baa9bb6d85bd9155e7915d21",
"branch_name": "refs/heads/master",
"committer_date": 1621482365000,
"content_id": "bafe233d4904d8a6197b2692d93ac1219a48b6dd",
"detected_licenses": [
"MIT"
],
"directory_id": "096d28e30a77ffd5475e6cc3f1c3d1497bef05c0",
"extension": "py",
"fi... | 2.8125 | stackv2 | import argparse
import sqlite3
from pathlib import Path
from typing import Dict
from argon2 import PasswordHasher
DB_FILE = "modernrelay.db"
USER_AND_PASSWORD: Dict[str, str] = {
"test": "test",
"test2": "test2"
}
class ParseKwargs(argparse.Action):
def __call__(self, parser, namespace, values, option_s... | 52 | 30.5 | 110 | 14 | 401 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_af836c1c23435009_12912493", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
46
] | [
null
] | [
15
] | [
53
] | |
2024-11-18T20:52:39.957321+00:00 | 1,480,225,045,000 | b181ea8d88f74edd08e773ecff1e6f8b94b90d0a | 3 | {
"blob_id": "b181ea8d88f74edd08e773ecff1e6f8b94b90d0a",
"branch_name": "refs/heads/master",
"committer_date": 1480225045000,
"content_id": "dfd24c720a003adb6a149546f6f2233e95d37663",
"detected_licenses": [
"MIT"
],
"directory_id": "e839d7b6bf1dbaf130075ff4b093ff807d89ee91",
"extension": "py",
"fi... | 2.5625 | stackv2 | import json
from urllib import request
from flask import Flask
from feedgen.feed import FeedGenerator
app = Flask(__name__)
class Api:
base_url = 'http://zhuanlan.zhihu.com'
base_api_url = base_url + '/api/columns'
def __init__(self, column_id):
self.column_id = column_id
self.info = se... | 64 | 27.86 | 100 | 16 | 469 | python | [{"finding_id": "codeql_py/partial-ssrf_58f12d0a750d1fcc_ad6be8b7", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
29,
37
] | [
null,
null
] | [
10,
10
] | [
35,
36
] | |
2024-11-18T20:52:59.082057+00:00 | 1,614,350,599,000 | 157c45218869da26dd88ef0a8a5986677f5e5dcf | 3 | {
"blob_id": "157c45218869da26dd88ef0a8a5986677f5e5dcf",
"branch_name": "refs/heads/main",
"committer_date": 1614350599000,
"content_id": "e94e4517611d27b955415a07ba74dd2fcb133b5a",
"detected_licenses": [
"MIT"
],
"directory_id": "becfe8ec93a0d03c8cb570a0914657f880bdfd33",
"extension": "py",
"file... | 2.578125 | stackv2 | import argparse
import os
import subprocess
import tempfile
import yaml
from pprint import pprint as pp
import sys
from ansible.parsing.vault import VaultLib
from ansible.constants import DEFAULT_VAULT_ID_MATCH
from ansible.parsing.vault import VaultSecret, AnsibleVaultError
class AnsibleVault():
@classmethod
... | 174 | 35.02 | 118 | 19 | 1,318 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_92653750ec80c4d3_f67b0df0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text."
] | [
41
] | [
null
] | [
27
] | [
35
] | |
2024-11-18T19:02:45.917247+00:00 | 1,606,598,439,000 | f4cd8b2c160bc909d9d75a0d1b53689cb4b41920 | 3 | {
"blob_id": "f4cd8b2c160bc909d9d75a0d1b53689cb4b41920",
"branch_name": "refs/heads/master",
"committer_date": 1606598439000,
"content_id": "7013cb0a304bb5eceb508678a5535e1f6d4b1ac8",
"detected_licenses": [
"MIT"
],
"directory_id": "fe2f13ad424ccd2df2e566890682aa11d7e35620",
"extension": "py",
"fi... | 2.875 | stackv2 | import csv
import requests
import time
from datetime import datetime
from bs4 import BeautifulSoup
# https://www.indeed.com/jobs?q={search+query}&l={location}&start={10/1000}
# Functions:
# Get inputs
# One for all
# One per page
# One per job
# One per parameter
indeed = "https://www.indeed.com/jobs?q="
"""
Returns... | 258 | 28.64 | 148 | 16 | 1,978 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b4e95d288580d6ba_f62e9857", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [greenhouse.io](1) may be at an arbitrary position in t... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [greenhouse.io](1) may be at an arbitrary position in the sanitized URL.",
"The string [myworkdayjobs.com](1) may be at an arbitrary position in the sanitized URL."
] | [
146,
148
] | [
null,
null
] | [
10,
10
] | [
32,
36
] | |
2024-11-18T19:02:47.136535+00:00 | 1,601,525,622,000 | 8a9e9bd7695c3cf1ac3393859a0351759a3bd4a4 | 2 | {
"blob_id": "8a9e9bd7695c3cf1ac3393859a0351759a3bd4a4",
"branch_name": "refs/heads/master",
"committer_date": 1601525622000,
"content_id": "348f5925457925af1d36dae5fd408100185b853d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4de03eecadc4c69caf792f4773571c2f6dbe9d68",
"extension": "py"... | 2.421875 | stackv2 | # (c) 2009-2014 Martin Wendt and contributors; see WsgiDAV https://github.com/mar10/wsgidav
# Original PyFileServer (c) 2005 Ho Chun Wei.
# Licensed under the MIT license: http://www.opensource.org/licenses/mit-license.php
"""
WSGI middleware for HTTP basic and digest authentication.
Usage::
from http_authenticato... | 410 | 41.72 | 156 | 21 | 3,774 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_df5bfa0406a1d82b_fa02f68f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
395
] | [
null
] | [
20
] | [
24
] | |
2024-11-18T19:02:52.664749+00:00 | 1,577,780,464,000 | 3324e161685bd48430e261b97c66ffc2b8fd58bf | 2 | {
"blob_id": "3324e161685bd48430e261b97c66ffc2b8fd58bf",
"branch_name": "refs/heads/master",
"committer_date": 1577780464000,
"content_id": "92734958c6d2175ad00baf64a2fe5231f3a181f4",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "15b05b728f2e039b8a5054a21136642495d144df",
"extension": "p... | 2.390625 | stackv2 | """Created originally by Ethan Chiu 10/25/16
v2.0.0 created on 8/4/18
Complete redesign for efficiency and scalability
Uses Python 3 now
v2.1.0 created on 5/10/19
Improve efficiency and design
"""
from flask import Response, Flask, render_template, request, jsonify, session, redirect, url_for
from flask_socketio impo... | 283 | 30.01 | 128 | 19 | 2,238 | python | [{"finding_id": "codeql_py/command-line-injection_399543986a2d3107_f8c13f1c", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 18 | true | [
"CWE-078",
"CWE-078",
"CWE-078",
"CWE-078",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/command-line-injection",
"py/command-line-injection",
"py/command-line-injection",
"py/command-line-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This command line depends on a [user-provided value](1).",
"This command line depends on a [user-provided value](1).",
"This command line depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).\nThis path depends... | [
219,
221,
223,
237,
102,
105,
108,
151,
166,
168,
172,
176,
224,
225,
226,
241,
244,
245
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
19,
19,
19,
19,
27,
83,
15,
15,
27,
27,
15,
15,
27,
25,
25,
19,
27,
22
] | [
22,
22,
22,
22,
40,
96,
28,
28,
38,
37,
26,
25,
51,
47,
47,
50,
37,
32
] | |
2024-11-18T19:03:03.908404+00:00 | 1,419,112,281,000 | 858a8c3cf8af4f33c91dd8af802064d716f35bd7 | 3 | {
"blob_id": "858a8c3cf8af4f33c91dd8af802064d716f35bd7",
"branch_name": "refs/heads/master",
"committer_date": 1419112281000,
"content_id": "769287fa273899109d0e261beca2fde6cf143e65",
"detected_licenses": [
"MIT"
],
"directory_id": "b17a47481e84a51dbb4c27a5522f4889f3d84f1e",
"extension": "py",
"fi... | 3.125 | stackv2 | #
# © 2011 Christopher Arndt, MIT License
#
import re
import time
from distill import PY2, PY3
class cached_property(object): # pragma: no cover
"""Decorator for read-only properties evaluated only once within TTL period.
It can be used to created a cached property like this::
import random
... | 186 | 27.39 | 80 | 16 | 1,325 | python | [{"finding_id": "codeql_py/overly-large-range_4b32d1703e0a732a_59846895", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
64,
64
] | [
null,
null
] | [
25,
30
] | [
28,
33
] | |
2024-11-18T19:14:52.786683+00:00 | 1,592,498,508,000 | cd8e90c5b3fc317f92eba5f2d5982a952efcc373 | 4 | {
"blob_id": "cd8e90c5b3fc317f92eba5f2d5982a952efcc373",
"branch_name": "refs/heads/master",
"committer_date": 1592498508000,
"content_id": "892942d328fbe0502ddc3aa7537d7513309e3d3c",
"detected_licenses": [
"MIT"
],
"directory_id": "6e27f8494393b06eb39a45dcb1738cf188c0d23e",
"extension": "py",
"fi... | 3.96875 | stackv2 | """
Read file into texts and calls.
It's ok if you don't understand how to read files.
"""
import csv
with open('texts.csv', 'r') as f:
reader = csv.reader(f)
texts = list(reader)
with open('calls.csv', 'r') as f:
reader = csv.reader(f)
calls = list(reader)
"""
TASK 3:
(080) is the area code for fixe... | 100 | 30.67 | 111 | 14 | 804 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_16917837e1207ede_3fd67772", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
71
] | [
null
] | [
11
] | [
15
] | |
2024-11-18T19:27:36.011891+00:00 | 1,568,999,835,000 | 60d4a5a05dbd5517a67976a8fbca18dc2006c5d8 | 3 | {
"blob_id": "60d4a5a05dbd5517a67976a8fbca18dc2006c5d8",
"branch_name": "refs/heads/master",
"committer_date": 1568999835000,
"content_id": "ee148ab1a5814fc80983eec1db0ed989ed6306b8",
"detected_licenses": [
"MIT"
],
"directory_id": "61650399840f2fc322cb65ba741a2dfeaf800f25",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/env python3
import argparse
from datetime import datetime
from jinja2 import (
FileSystemLoader,
Environment,
)
import os
root = os.path.dirname(os.path.abspath(__file__))
template_dir = os.path.join(root, 'templates')
env = Environment(
loader=FileSystemLoader(template_dir),
keep_trailing_n... | 149 | 27.2 | 79 | 19 | 882 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_205ab9a0ee330c6e_27402e05", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
12
] | [
15
] | [
7
] | [
2
] | |
2024-11-18T19:27:39.684616+00:00 | 1,620,838,647,000 | f8c47d69b16398f2761fe41690fb5018f87712f5 | 3 | {
"blob_id": "f8c47d69b16398f2761fe41690fb5018f87712f5",
"branch_name": "refs/heads/master",
"committer_date": 1620838647000,
"content_id": "da33dc0a041f71ec907d1fe7d386f54165146604",
"detected_licenses": [
"Artistic-2.0"
],
"directory_id": "0af856b83413d201285bd101996d59c31cd0bfdd",
"extension": "p... | 2.5625 | stackv2 | """
This handler listens for TCP connections from the world. Those connections will
send us messages for actions to perform such as rereading configurations,
rewriting configurations, starting or stopping a process, or updating
supervisord. All connections must come in with a valid and authorized client
certificate.
""... | 279 | 46.79 | 160 | 27 | 2,452 | python | [{"finding_id": "codeql_py/insecure-protocol_7ec613c669813b76_ce022038", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)."
] | [
64
] | [
null
] | [
34
] | [
37
] | |
2024-11-18T19:38:34.220110+00:00 | 1,599,053,689,000 | e485f8c2a3d1ed5f56721bfcf52bbadcac78acdb | 3 | {
"blob_id": "e485f8c2a3d1ed5f56721bfcf52bbadcac78acdb",
"branch_name": "refs/heads/master",
"committer_date": 1599053689000,
"content_id": "5bcaf7ed6969fc5806dcf75bbb2813a115eaecf4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5fe72bb13baf3649058ebe11aa86ad4fc56c69ed",
"extension": "py"... | 2.6875 | stackv2 | import argparse
from collections import Counter
import csv
import os
import torch
from torch.autograd import Variable
import torch.nn as nn
import torch.optim as optim
import torch.utils.data as data
import tarfile
import time
import urllib.request
'''
This trains a classifier using Embedding -> tanh -> Linear -> Cros... | 144 | 35.11 | 109 | 22 | 1,253 | python | [{"finding_id": "codeql_py/tarslip_20cd927be6bdd59a_8d06fcfc", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
112
] | [
null
] | [
9
] | [
11
] | |
2024-11-18T19:38:57.741595+00:00 | 1,615,112,003,000 | 0d4243fb87d0a534759053f54185c14a9e110e5a | 3 | {
"blob_id": "0d4243fb87d0a534759053f54185c14a9e110e5a",
"branch_name": "refs/heads/main",
"committer_date": 1615112003000,
"content_id": "a362b71a18eddbf847cec23b6b96fff560420f27",
"detected_licenses": [
"MIT"
],
"directory_id": "5f9753a9153be538295d9b852fadc5f29ebf9277",
"extension": "py",
"file... | 2.59375 | stackv2 | import os
import codecs
import io
import yagmail
import htmlmin
from jinja2 import Template, Environment, FileSystemLoader
from mailer.config import config
from mailer import minifier
class Mailer:
PREFIX='[Pyworks Mailer]'
TEMPLATES_ROOT_DIR = config.MAIL_TEMPLATES_ROOT
TEMPLATE_USER_REGISTERED = 'user... | 108 | 33.71 | 108 | 17 | 827 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_88a545bb72961a72_5f33b7d4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
87
] | [
null
] | [
15
] | [
46
] | |
2024-11-18T20:06:25.497511+00:00 | 1,547,982,909,000 | d6163bace7a481c24f18942fd2c8e0ae8e2fcd75 | 2 | {
"blob_id": "d6163bace7a481c24f18942fd2c8e0ae8e2fcd75",
"branch_name": "refs/heads/master",
"committer_date": 1547982909000,
"content_id": "214e88dc960e726fede8407b2f6fceaf1d186217",
"detected_licenses": [
"MIT"
],
"directory_id": "7b8f4b3779fe93a4b1e83fb9d47fb02e1bd7b9ed",
"extension": "py",
"fi... | 2.421875 | stackv2 | # @Time :2018/10/29 16:57
# @Author :lvjunjie
import hashlib
import re
import requests
class LoginApi(object):
@staticmethod
def logindmp(username, password):
"""
dmp平台账号密码登录
"""
session_sso = requests.Session()
cookie = {
"OUTFOX_SEARCH_USER_ID_NCOO": ... | 80 | 36.9 | 120 | 19 | 880 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d82797277f695d86_84099235", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
76
] | [
null
] | [
18
] | [
43
] | |
2024-11-18T20:18:16.447754+00:00 | 1,597,956,165,000 | 148ba8aacac7a84f6d9a017660a00b12347cc2f6 | 3 | {
"blob_id": "148ba8aacac7a84f6d9a017660a00b12347cc2f6",
"branch_name": "refs/heads/master",
"committer_date": 1597956165000,
"content_id": "92d8a03fb572e5728dbc4996debef84e50b3b62d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "283739c2dd298652a5358c5a2eea84d3e83bb334",
"extension": "py"... | 2.515625 | stackv2 | import time
import requests
from requests.exceptions import SSLError
timeout = 75
def wait_for_fineract():
seconds = 0
while seconds < timeout:
try:
res = requests.get('https://127.0.0.1:8443/api-docs/apiLive.htm', verify=False)
if res.ok:
print('Available aft... | 25 | 20.32 | 91 | 16 | 127 | python | [{"finding_id": "codeql_py/request-without-cert-validation_652df636bc075c66_8c77007e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
13
] | [
null
] | [
19
] | [
92
] | |
2024-11-18T20:31:13.224309+00:00 | 1,584,855,228,000 | add8df6b00188ca965eae84cf713ee54391ed7f2 | 2 | {
"blob_id": "add8df6b00188ca965eae84cf713ee54391ed7f2",
"branch_name": "refs/heads/master",
"committer_date": 1584855228000,
"content_id": "a5501eaa1bc13cc791a0112e0f0eff94ef144dcd",
"detected_licenses": [
"MIT"
],
"directory_id": "dcfcfcb00bd7550f583b007b4dd70457af21e5bb",
"extension": "py",
"fi... | 2.3125 | stackv2 | from django.shortcuts import redirect
from django.views.generic import TemplateView
from social_django.models import UserSocialAuth
from datetime import datetime, date
from django.views.generic.edit import FormView
from forms import PatientCheckInForm, PatientUpdateProfileForm
from django.core.urlresolvers import rever... | 186 | 37.25 | 117 | 20 | 1,484 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_727e2a91500bf243_51db1079", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
73,
85,
126
] | [
null,
null,
null
] | [
15,
34,
43
] | [
65,
58,
68
] | |
2024-11-18T20:31:17.120159+00:00 | 1,674,289,511,000 | 7e36988a6ba77328345ac32afcea16b405354388 | 3 | {
"blob_id": "7e36988a6ba77328345ac32afcea16b405354388",
"branch_name": "refs/heads/master",
"committer_date": 1674289877000,
"content_id": "1f7158568a13bd3908ff9978af38e8943c023755",
"detected_licenses": [
"MIT"
],
"directory_id": "adaa387eb5a359058f9b724d01d92d4c3799f865",
"extension": "py",
"fi... | 2.75 | stackv2 | #!/usr/bin/env python3
import os
from http.server import BaseHTTPRequestHandler, HTTPServer
import urllib
import ev3dev.ev3 as ev3
import time
import random
import sys
SPEED=500
HAND_SPEED=300
lm1 = ev3.LargeMotor('outD')
lm2 = ev3.LargeMotor('outB')
m1 = ev3.Motor('outA')
def driveMotor(motor, speed):
print("spe... | 115 | 22.79 | 84 | 14 | 757 | python | [{"finding_id": "codeql_py/path-injection_d8926c9ada9267fa_1ac12f6d", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
61,
73
] | [
null,
null
] | [
27,
15
] | [
35,
23
] | |
2024-11-18T20:31:20.469038+00:00 | 1,689,882,548,000 | 4be7b6183b7e5191738577375eb01f9141b3a510 | 2 | {
"blob_id": "4be7b6183b7e5191738577375eb01f9141b3a510",
"branch_name": "refs/heads/main",
"committer_date": 1689882548000,
"content_id": "38dda64b43985686a21fccb40489e4cbb3b12791",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f42cd8413ac5bec6526cc1013253d00fd9becc62",
"extension": "py",
... | 2.390625 | stackv2 | # Copyright 2020 Planet Labs, Inc.
# Copyright 2022 Planet Labs PBC.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by a... | 271 | 30.1 | 79 | 16 | 1,797 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c34d6ee03f1eb5c6_8a008ce6", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
256,
94
] | [
null,
null
] | [
22,
26
] | [
42,
79
] | |
2024-11-18T20:31:37.869818+00:00 | 1,579,069,639,000 | cc4e885623a0108493ee96206ebf6c36152f0c79 | 3 | {
"blob_id": "cc4e885623a0108493ee96206ebf6c36152f0c79",
"branch_name": "refs/heads/master",
"committer_date": 1579069639000,
"content_id": "dc63ddd67152d54650774a79c4a9b1acab49f010",
"detected_licenses": [
"MIT"
],
"directory_id": "89eee9c6be277947b61544a922c96311f04a8683",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/env python2
"""
Server code to track number of visitors.
"""
import logging
import json
import time
from flask import Flask, request, send_from_directory, g, redirect, url_for
from flask import jsonify
from pymongo import MongoClient
QUIZ_TYPES = set(['men', 'women'])
app = Flask(__name__)
def connect_db... | 183 | 25.73 | 75 | 16 | 1,076 | python | [{"finding_id": "codeql_py/log-injection_793ae355babfd859_c58c19d4", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 4 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
48,
56,
90,
104
] | [
null,
null,
null,
105
] | [
18,
25,
19,
25
] | [
62,
70,
31,
23
] | |
2024-11-18T20:44:07.273841+00:00 | 1,635,511,015,000 | 72ef619b38d9eae5ae4f53f9c893d1d0c803b9c3 | 2 | {
"blob_id": "72ef619b38d9eae5ae4f53f9c893d1d0c803b9c3",
"branch_name": "refs/heads/main",
"committer_date": 1635511015000,
"content_id": "4a567efb2a0ae78bcacabe6c7a769eeffc9b3189",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b96dd329eea7b5aa8d795d57c983d947c4b3bd3f",
"extension": "py",
... | 2.4375 | stackv2 | import hashlib
import lxml.html
from typing import Optional, List
from . import atserver
from . import atconnect
from . import aterrors
class Client:
def __init__(
self, username:str,
md5:Optional[str]=None,
password:Optional[str]=None) -> None:
if (password == None) and (md5 == None):
raise AttributeEr... | 62 | 23.58 | 67 | 21 | 415 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_976bdab1737d3661_53dd9e41", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
22
] | [
null
] | [
21
] | [
45
] | |
2024-11-18T20:44:13.782591+00:00 | 1,526,326,138,000 | 5a8bf050c45f068d52b779f2d72cb23a6ace2f6c | 3 | {
"blob_id": "5a8bf050c45f068d52b779f2d72cb23a6ace2f6c",
"branch_name": "refs/heads/master",
"committer_date": 1526326138000,
"content_id": "320a7a41aa50963da5d9482b81c631e09c8eb8dd",
"detected_licenses": [
"MIT",
"Python-2.0"
],
"directory_id": "0266f371319c28227a948fb105440ef74a3c583d",
"exten... | 2.609375 | stackv2 | """Class that handles the interaction with the CentraXX
REST API and XML import"""
import os
import codecs
import requests
from requests.auth import HTTPBasicAuth
class CXXConnectException(Exception):
"""Exception class for raising CentraXX connection
related exceptions"""
class CXXConnect():
def __init... | 68 | 39.4 | 106 | 13 | 618 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c6c0ffbba003a859_9a8e1c52", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
26,
48,
56,
67
] | [
null,
null,
null,
null
] | [
20,
20,
20,
20
] | [
85,
107,
90,
72
] | |
2024-11-18T20:44:14.633423+00:00 | 1,599,162,584,000 | 35ecee8c8d21c9faf4cb947358f30b2257069643 | 2 | {
"blob_id": "35ecee8c8d21c9faf4cb947358f30b2257069643",
"branch_name": "refs/heads/master",
"committer_date": 1601753451000,
"content_id": "f254e8d33f7962e468fa8434f6644c650363e3f3",
"detected_licenses": [
"MIT"
],
"directory_id": "395db06167c256bf0eb6a09ba54842f569fb8986",
"extension": "py",
"fi... | 2.4375 | stackv2 | # standard package
import os
# 3rd party packages
import json
from aiohttp import web
# local package
from video_downscaler import VideoDownscaler
async def downscale(request):
try:
reader = await request.multipart()
# reader.next() will `yield` the fields of the form
field = await reader.next()
filenam... | 52 | 20.69 | 64 | 17 | 305 | python | [{"finding_id": "codeql_py/stack-trace-exposure_aa940a6186a3d578_83e5d2c4", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
41
] | [
null
] | [
28
] | [
52
] | |
2024-11-18T20:44:17.640200+00:00 | 1,530,342,994,000 | 11b8f8a0fdc78a022cbafbe273ecde3c941eeea9 | 2 | {
"blob_id": "11b8f8a0fdc78a022cbafbe273ecde3c941eeea9",
"branch_name": "refs/heads/master",
"committer_date": 1530342994000,
"content_id": "ff9586f0e807d25e70c989640c320db11a50b250",
"detected_licenses": [
"MIT"
],
"directory_id": "10e01fa3e7ad61959cb162bb28c3e96473a9965f",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/usr/bin/env python3
import argparse
import os
import configparser
import requests
import getpass
import json
from bs4 import BeautifulSoup
__VERSION__ = '1.0.0'
UA_STRING = 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) ' \
'AppleWebKit/537.36 (KHTML, like Gecko) ' \
'Chrome/67.0.3396.87 ' \
... | 240 | 31.68 | 119 | 13 | 1,905 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7241ca362f7a3e7a_43d133ed", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
62
] | [
null
] | [
15
] | [
45
] | |
2024-11-18T20:58:07.422410+00:00 | 1,684,849,962,000 | a9ebec0844b6ccfb8840d6fa32e5a388039f7804 | 3 | {
"blob_id": "a9ebec0844b6ccfb8840d6fa32e5a388039f7804",
"branch_name": "refs/heads/master",
"committer_date": 1684849962000,
"content_id": "e2be4c02f27d316da84bce8b3a76e78d59169417",
"detected_licenses": [
"MIT"
],
"directory_id": "4b0a1d7bdd8a7e48ddecd8c933a64a707c4e6ef7",
"extension": "py",
"fi... | 2.640625 | stackv2 | """
:copyright: (c) 2015-2018 Damien Tougas
:license: MIT, see LICENSE.txt for more details
"""
import argparse
import pprint
import sqlite3
import sys
import feedparser
from jinja2 import Environment, FileSystemLoader
import requests
from settings import DEFAULTS
class SendyRSSPublisher(object):
def _... | 404 | 30.96 | 80 | 16 | 2,843 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0619a986ddf58765_0ece52a5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
24
] | [
null
] | [
29
] | [
78
] | |
2024-11-18T20:58:10.674372+00:00 | 1,616,439,264,000 | dcd2dd5c57a281e2e4093e02eaef91117d41d2db | 3 | {
"blob_id": "dcd2dd5c57a281e2e4093e02eaef91117d41d2db",
"branch_name": "refs/heads/main",
"committer_date": 1616439264000,
"content_id": "1a9fb15c38012398e0a9dad6074633496adcf6a1",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "ee9ea53684d23e8299d6aa9e49a05dade29edc5f",
"extension": "py"... | 3.125 | stackv2 | #!/usr/bin/python3
import requests
# site: https://badssl.com
# state should be: good
# verification: disabled
# comment: warning on command line output on disabled verification
badssl_startsite = "https://rc4.badssl.com"
https_verification = False
def verification_on():
if https_verification:
print("Ve... | 36 | 31.67 | 95 | 13 | 251 | python | [{"finding_id": "codeql_py/request-without-cert-validation_9e8ba5252f2eb17f_f0c163ba", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
22
] | [
null
] | [
9
] | [
68
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.