added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T01:54:46.944693+00:00 | 1,691,682,979,000 | 3cf4d35d8fcd8899cdfcdee1d2eae8d9e0055ae6 | 3 | {
"blob_id": "3cf4d35d8fcd8899cdfcdee1d2eae8d9e0055ae6",
"branch_name": "refs/heads/maint",
"committer_date": 1691682979000,
"content_id": "d54b91643c8e2d5004ffda7fd2a6dc1aabb62c59",
"detected_licenses": [
"BSD-3-Clause",
"MIT"
],
"directory_id": "76f23cc69dc10c44bc7cf00b78e37db04c7a9c45",
"exte... | 2.625 | stackv2 | ## NDA AWS Token Generator
## Author: NIMH Data Archives
## http://ndar.nih.gov
## License: MIT
## https://opensource.org/licenses/MIT
import binascii
import hashlib
import logging
import xml.etree.ElementTree as etree
import sys
if sys.version_info[0] == 2:
import urllib2 as urllib_request
else... | 121 | 30.55 | 89 | 12 | 838 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_631a910934060c31_a55e6d18", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
39
] | [
null
] | [
23
] | [
47
] | |
2024-11-19T01:54:56.152867+00:00 | 1,691,566,580,000 | da9f86b3f19f4b8db14bc92c69aff0bf65193052 | 3 | {
"blob_id": "da9f86b3f19f4b8db14bc92c69aff0bf65193052",
"branch_name": "refs/heads/master",
"committer_date": 1691566580000,
"content_id": "0b359a50b1ac0200430fe8605d30abb4d93450e9",
"detected_licenses": [
"MIT"
],
"directory_id": "691b82da7c38a6c109088d8426ffa26175f4ff31",
"extension": "py",
"fi... | 2.75 | stackv2 | # -*- coding: utf-8 -*-
"""
定义一些任务的执行操作,将具体的操作从tasks.py里面抽离出来
每个任务需要饮用的模块放到函数里面引用,方便单独调试函数
"""
import requests
def get_link_status(url):
"""
请求地址,返回请求状态和内容
@param url:
@return:
"""
try:
resp = requests.get(url, timeout=5, verify=False)
except Exception:
return 500, ... | 255 | 32.4 | 90 | 22 | 2,159 | python | [{"finding_id": "codeql_py/request-without-cert-validation_1fcc7e933dc682b3_f0267f36", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
16
] | [
null
] | [
16
] | [
58
] | |
2024-11-19T01:55:00.292200+00:00 | 1,626,602,180,000 | 4cc143dbe5c3ad84346deeb0ab47d8d7909a5671 | 3 | {
"blob_id": "4cc143dbe5c3ad84346deeb0ab47d8d7909a5671",
"branch_name": "refs/heads/master",
"committer_date": 1626602180000,
"content_id": "3c0775d90842c2982b4711dd629d2ecedba713a7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "26f61d8631bce66d00d7a33029228d69083a7a9e",
"extension": "py"... | 2.625 | stackv2 | from socket import *
import ssl
import threading
import time
import re
import httplib
import struct
import string
import os
import sys
import socket as Socket
import select
class handler(threading.Thread):
def __init__(self,socket, port) :
threading.Thread.__init__(self)
self.socket=socket
... | 275 | 34.16 | 117 | 20 | 2,207 | python | [{"finding_id": "codeql_py/insecure-default-protocol_054ff290e728fb8b_d1f262aa", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
42
] | [
null
] | [
20
] | [
41
] | |
2024-11-19T01:55:03.064005+00:00 | 1,591,212,845,000 | bce621904fde631fcdfb18678cc86d6d7cfbdb9e | 3 | {
"blob_id": "bce621904fde631fcdfb18678cc86d6d7cfbdb9e",
"branch_name": "refs/heads/master",
"committer_date": 1591212845000,
"content_id": "1223fcb483eaa58c00113ba07ba720ce46c96339",
"detected_licenses": [
"Unlicense"
],
"directory_id": "b0f9d8fcfe5c7638b10a4c608c63c3f13cf848ee",
"extension": "py",... | 2.5625 | stackv2 | import re
import operator
from pprint import pprint
from collections import OrderedDict
from data.attrib_errors import error_dict
from ordered_set import OrderedSet
from tf_config import langsettings
# XML RE PATTERNS
commentFullRE = re.compile(r'^<!--.*?-->$')
commentStartRE = re.compile(r'^<!--.*')
commentStopRE ... | 251 | 39.98 | 118 | 27 | 2,332 | python | [{"finding_id": "codeql_py/bad-tag-filter_74fea561533991a0_f626c1e7", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match comments containing newlines.", "remediation": "", "location": {"file_pat... | 2 | true | [
"CWE-116",
"CWE-116"
] | [
"py/bad-tag-filter",
"py/bad-tag-filter"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This regular expression does not match comments containing newlines.",
"This regular expression does not match comments containing newlines."
] | [
10,
12
] | [
null,
null
] | [
32,
32
] | [
44,
38
] | |
2024-11-19T01:55:05.676443+00:00 | 1,587,456,200,000 | d7c864b9d839d081328447a4c1cebad91357bd00 | 3 | {
"blob_id": "d7c864b9d839d081328447a4c1cebad91357bd00",
"branch_name": "refs/heads/master",
"committer_date": 1587456200000,
"content_id": "6dcca9d1fb4f782f8b68dce023ee99f6059bb8aa",
"detected_licenses": [
"MIT"
],
"directory_id": "7b7d7be57b7ea8cb86ead21eed2e3e569967504e",
"extension": "py",
"fi... | 3.390625 | stackv2 | import pyperclip
import random
class User:
"""
Class that generates instances of users.
"""
user_list = [] # Empty contact list
def __init__(self, first_name, last_name, password):
'''
__init__ method that will define properties for objects
'''
self.first_name = fir... | 121 | 28.23 | 110 | 15 | 688 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_04034a269b16f2b7_efd65f90", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
74
] | [
null
] | [
23
] | [
48
] | |
2024-11-19T01:55:15.615974+00:00 | 1,579,352,807,000 | c981201460e7d6370e3e2b31f272af2b7357966b | 4 | {
"blob_id": "c981201460e7d6370e3e2b31f272af2b7357966b",
"branch_name": "refs/heads/master",
"committer_date": 1579352807000,
"content_id": "55b67c01a91a8b2062f2c040618162859b667ba5",
"detected_licenses": [
"MIT"
],
"directory_id": "58c29c0eb774ea1ba41177e4fe08a736152e0099",
"extension": "py",
"fi... | 4.46875 | stackv2 | # to get current date and time
# we need to use the datetime library
from datetime import datetime,timedelta
current_date=datetime.now()
# the now function returns a datetime object
print('Today is: '+str(current_date))
# timedelta is used to define a period of time
one_day=timedelta(days=1)
yesterday=current_date-on... | 31 | 30.23 | 53 | 9 | 241 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f59ebcf14f60fac7_8bc96c51", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
27,
31
] | [
null,
null
] | [
7,
7
] | [
38,
48
] | |
2024-11-19T01:55:28.601143+00:00 | 1,605,757,181,000 | 3d9bd488bc7b0f5f7fb82d4b8ef7db6f6acab3d0 | 3 | {
"blob_id": "3d9bd488bc7b0f5f7fb82d4b8ef7db6f6acab3d0",
"branch_name": "refs/heads/master",
"committer_date": 1605757181000,
"content_id": "40e86470f3f9a931a47c0b618585a0fb42d2cb98",
"detected_licenses": [
"MIT"
],
"directory_id": "f0d4ba28ce781f8c8cd27e529447acac29c271db",
"extension": "py",
"fi... | 2.546875 | stackv2 | #!/usr/bin/env python
# coding: utf-8
# In[3]:
import numpy as np
import osmnx as ox, networkx as nx, geopandas as gpd, matplotlib.pyplot as plt
import networkx as nx
import pandas as pd
from folium import plugins
from folium.plugins import MarkerCluster
import json
import urllib.request
from urllib.request import R... | 103 | 26.04 | 119 | 16 | 967 | python | [{"finding_id": "codeql_py/partial-ssrf_29fa70e4c2feb476_47de49dc", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)."
] | [
44
] | [
null
] | [
33
] | [
66
] | |
2024-11-19T02:06:42.640441+00:00 | 1,527,915,296,000 | 4d76d20ccabac3441134ec1b9ffe7845813917b8 | 3 | {
"blob_id": "4d76d20ccabac3441134ec1b9ffe7845813917b8",
"branch_name": "refs/heads/master",
"committer_date": 1527915296000,
"content_id": "a221daa40eb5f6258dfd856b1326aa5fd3d130ef",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2085ed042e115bf64584ee7c6385bcbc700dc8a1",
"extension": "py"... | 2.90625 | stackv2 | from numpy import *
from numpy.random import *
import matplotlib.pyplot as plt
import pandas as pd
from .factor import *
set_printoptions(linewidth=1e99)
seed(0)
class Book:
def __init__(self, nb_contract=10):
# making
nb_contract = int(nb_contract)
age_start = uniform(20, 60, nb_contract)
gender = choice([... | 79 | 21.8 | 77 | 16 | 520 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9c84eb61d7be7a4f_b59823e7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
53
] | [
null
] | [
19
] | [
30
] | |
2024-11-19T02:06:56.057636+00:00 | 1,566,962,839,000 | a5c43d9f34e259432b2b76c452c5777a8a3357c3 | 3 | {
"blob_id": "a5c43d9f34e259432b2b76c452c5777a8a3357c3",
"branch_name": "refs/heads/master",
"committer_date": 1566962839000,
"content_id": "f4fa3744edc716698de280fe6323425d2292345f",
"detected_licenses": [
"MIT"
],
"directory_id": "05f60b5fd34aa8d7306bc34cadebcc09ea6a4e36",
"extension": "py",
"fi... | 2.703125 | stackv2 | import os
import re
from urllib.parse import urlparse
from tqdm import tqdm
import zipfile
import tarfile
import gzip
import requests
class Storage():
def __init__(self, root="", force=False):
self.root = root
if not root:
self.root = os.path.join(os.path.dirname(__file__), "../data")... | 96 | 32.89 | 79 | 18 | 692 | python | [{"finding_id": "codeql_py/tarslip_f97782c6b0e1c0d2_9ef00e1c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
83
] | [
null
] | [
17
] | [
18
] | |
2024-11-19T02:07:06.829615+00:00 | 1,514,189,573,000 | bce0394fd14abda8ba85c5b15d424fa5c3f7acc8 | 3 | {
"blob_id": "bce0394fd14abda8ba85c5b15d424fa5c3f7acc8",
"branch_name": "refs/heads/master",
"committer_date": 1514189573000,
"content_id": "c2edc69873a6095d0ffb29e265f5fe8cf5896d71",
"detected_licenses": [
"MIT"
],
"directory_id": "9ea53850ba6135ac6f5686c1a38a1029ebccb294",
"extension": "py",
"fi... | 2.515625 | stackv2 | from __future__ import print_function
from __future__ import division
from PIL import Image
import os.path
import numpy as np
import sys
import multiprocessing
from math import ceil
import ctypes
import torch.utils.data as data
from torchvision.datasets.utils import download_url, check_integrity
from multiprocessing im... | 273 | 35.96 | 147 | 19 | 2,539 | python | [{"finding_id": "codeql_py/tarslip_c1ac8a9f762487e5_905caa9b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
250
] | [
null
] | [
9
] | [
12
] | |
2024-11-19T02:07:06.939939+00:00 | 1,516,214,168,000 | e44aaf390b2962adf6f0d95d4a69c9fde7f7c534 | 3 | {
"blob_id": "e44aaf390b2962adf6f0d95d4a69c9fde7f7c534",
"branch_name": "refs/heads/master",
"committer_date": 1516214168000,
"content_id": "c3a884a426aa3544cece7c7b58cb45a60fce5e2e",
"detected_licenses": [
"MIT"
],
"directory_id": "9580c82325a6ddf57d3f06fa4914c9d66afbd73b",
"extension": "py",
"fi... | 3.375 | stackv2 | '''
Python 2
Writes to three files:
Login
Person
Clients
since they're all connected
Uses 2 instead of 3 because of faker library
'''
import string
import random
from datetime import datetime
from string import split
from faker import Faker
fake = Faker()
def GetFirstName():
nameList = split(fake.name())
... | 203 | 20.76 | 71 | 14 | 1,135 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_902357cd416100f4_5180ed74", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text.\nThis expression stores [sensitive d... | [
146,
164,
193
] | [
null,
null,
null
] | [
13,
13,
17
] | [
17,
19,
21
] | |
2024-11-19T02:07:14.766647+00:00 | 1,547,083,732,000 | 67f613b48f253fd3042a1ae5b53fd8f727e0db7b | 3 | {
"blob_id": "67f613b48f253fd3042a1ae5b53fd8f727e0db7b",
"branch_name": "refs/heads/master",
"committer_date": 1547083732000,
"content_id": "00256ebcfac8268cc43e1304be66dc0a595cdb34",
"detected_licenses": [
"MIT"
],
"directory_id": "63a9423ae09ed57bd155616b7b73d8d7c1784a8b",
"extension": "py",
"fi... | 2.84375 | stackv2 |
#pylint: disable=C0103,C0111,C0304
from flask import Flask, render_template, jsonify, request
import sqlite3
from get_lyrics import song_lyrics_and_art
from translate_words import get_translate_entry, translate
from fudge_lyrics import fudge
# from get_lyrics import song_id
app = Flask(__name__)
class Song:
de... | 96 | 24.89 | 89 | 15 | 600 | python | [{"finding_id": "codeql_py/sql-injection_b8785e41ef39986a_4332165b", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
50
] | [
56
] | [
29
] | [
12
] | |
2024-11-19T02:31:13.289581+00:00 | 1,601,755,077,000 | 787bcfc3e04b3a68f770a80fe0ca94e12b4613ef | 2 | {
"blob_id": "787bcfc3e04b3a68f770a80fe0ca94e12b4613ef",
"branch_name": "refs/heads/master",
"committer_date": 1601755077000,
"content_id": "e606c927d8f7171daa0fa4755f21e5c1d649095b",
"detected_licenses": [
"MIT"
],
"directory_id": "68e6a31213d2d294f22d35c340fd82d2d2fa438b",
"extension": "py",
"fi... | 2.40625 | stackv2 | # Flask などの必要なライブラリをインポートする
from flask import Flask, render_template, request, redirect, url_for,make_response,jsonify
import numpy as np
import os
from datetime import datetime
import werkzeug
import subprocess
import glob
import json
import hashlib
import random, string
def randomname(n):
randlst = [random.choic... | 107 | 29.66 | 97 | 15 | 872 | python | [{"finding_id": "codeql_py/command-line-injection_24bef67e886d7a5c_c40e3580", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 4 | true | [
"CWE-078",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/command-line-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
63,
62,
83,
88
] | [
null,
null,
null,
null
] | [
26,
22,
28,
26
] | [
29,
39,
45,
47
] | |
2024-11-19T02:31:19.032861+00:00 | 1,356,216,375,000 | 4ae6b7d8359c6d4f1856d36a5979cd7ecafd72cf | 2 | {
"blob_id": "4ae6b7d8359c6d4f1856d36a5979cd7ecafd72cf",
"branch_name": "refs/heads/master",
"committer_date": 1356216375000,
"content_id": "b457c625d2da694d050148be08248190f0f71eee",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7a5dd0a540ef4e9d236ddb64c999fe7f0ab26ab4",
"extension": "py"... | 2.34375 | stackv2 | # Copyright 2012 Gregory Holt
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, ... | 428 | 36.62 | 79 | 22 | 3,656 | python | [{"finding_id": "codeql_py/insecure-default-protocol_c1b1e384becfb16a_26eba64a", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 3 | true | [
"CWE-327",
"CWE-200",
"CWE-200"
] | [
"py/insecure-default-protocol",
"py/bind-socket-all-network-interfaces",
"py/bind-socket-all-network-interfaces"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.",
"'0.0.0.0' binds a socket to all interfaces.",
"'0.0.0.0' binds a socket to all interfaces."
] | [
229,
226,
290
] | [
null,
null,
null
] | [
24,
13,
13
] | [
77,
34,
34
] | |
2024-11-19T02:31:36.238179+00:00 | 1,620,527,244,000 | 98791eed4ceb35518aa94af91463a3b0d324d729 | 2 | {
"blob_id": "98791eed4ceb35518aa94af91463a3b0d324d729",
"branch_name": "refs/heads/master",
"committer_date": 1620527244000,
"content_id": "8143a47dcff2661b58e7a99b5184b23231edb679",
"detected_licenses": [
"MIT"
],
"directory_id": "9508bfd5f4066a9d9277831f2c6c34cc57d803f1",
"extension": "py",
"fi... | 2.46875 | stackv2 | from api.core.anime import *
from api.core.proxy import AnimeProxy
class K1080(AnimeSearcher):
async def search(self, keyword: str):
data, total_page = await self.get_one_page(keyword, 1)
for item in self.parse_anime_metas(data):
yield item
if total_page > 1:
tasks... | 107 | 34.18 | 120 | 20 | 919 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_cccb7c0b04515715_ea7a6f5a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [gtimg.com](1) may be at an arbitrary position in the s... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The string [gtimg.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [ydstatic.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [byingtime.com](1) may be at an arbitrary position in the sanitized URL."
] | [
98,
100,
105
] | [
null,
null,
null
] | [
12,
12,
12
] | [
30,
33,
34
] | |
2024-11-19T02:31:36.985778+00:00 | 1,452,700,976,000 | 4cdf4ce06e074e6a7489c704f82e6e36a7bb1e5a | 2 | {
"blob_id": "4cdf4ce06e074e6a7489c704f82e6e36a7bb1e5a",
"branch_name": "refs/heads/master",
"committer_date": 1452700976000,
"content_id": "c286152c0f1c184e1cab291e6cd2f46145823055",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c46b07e84d4859fa06da8fe36b597d0ca8106002",
"extension": "py"... | 2.453125 | stackv2 | # -*- coding: utf-8 -*-
import csv
import json
import logging
import os
from flask import Flask, request, jsonify, redirect
from jinja2 import Environment, PackageLoader
from doc_processor import DocumentProcessor
def setup_logging():
logging.basicConfig(level=logging.DEBUG,
format='%(as... | 97 | 27.07 | 87 | 16 | 631 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_afc78711a07ba654_e810477d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
70
] | [
null
] | [
11
] | [
51
] | |
2024-11-19T02:31:48.394053+00:00 | 1,545,960,995,000 | 37a5a018db12f0dbf80163ff767301676367f36c | 2 | {
"blob_id": "37a5a018db12f0dbf80163ff767301676367f36c",
"branch_name": "refs/heads/master",
"committer_date": 1545960995000,
"content_id": "06eff01829b7501bc09aaabfd6e3c07d4f610137",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f7230609f47bc5e479fc1eb2c3a12f81310f565f",
"extension": "py"... | 2.3125 | stackv2 | # -*- coding: utf-8 -*-
import sys
import os
import pickle
import argparse
import itertools
import math
import random
import shutil
import cv2
from tqdm import tqdm
import pandas as pd
import numpy as np
import SimpleITK as sitk
from skmultilearn.model_selection import iterative_train_test_split
from skmultilearn.mode... | 258 | 30.73 | 146 | 20 | 1,814 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e54fd24a8a9bbc7d_62d02109", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text."
] | [
124,
150
] | [
null,
null
] | [
24,
24
] | [
28,
28
] | |
2024-11-19T02:31:58.140580+00:00 | 1,488,660,525,000 | 0e2a9b13e44d3607b8f7e79cbbec1321719320d1 | 3 | {
"blob_id": "0e2a9b13e44d3607b8f7e79cbbec1321719320d1",
"branch_name": "refs/heads/master",
"committer_date": 1488660525000,
"content_id": "5e187eb4306de9c3357040bff57ff19bcdb5adf9",
"detected_licenses": [
"MIT"
],
"directory_id": "40cb1e3d21f70fc41b7752c95e1e17bc237ded56",
"extension": "py",
"fi... | 3.03125 | stackv2 | #!/usr/bin/env python
import sys, os, glob
from makdown2 import markdown
from jinja2 import Environment, FileSystemLoader
def main():
if len(sys.argv) != 3:
print "Usage: %s <docs dir> <output dir>" % (sys.argv[0])
return 1
# Get a list of documents and parse their content.
documents = []... | 46 | 32.63 | 117 | 17 | 387 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_196b7e5a3d36c65f_261d7e83", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
37
] | [
null
] | [
11
] | [
88
] | |
2024-11-19T02:32:15.338921+00:00 | 1,633,368,287,000 | ff972c295af50b80922e8654c78b34e26edf7531 | 3 | {
"blob_id": "ff972c295af50b80922e8654c78b34e26edf7531",
"branch_name": "refs/heads/main",
"committer_date": 1633368287000,
"content_id": "defe73e8951002e0e068a27be48608dbabe0bdbd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fa72697feef44fdba1bf4e5c8064d25b65a6cb83",
"extension": "py",
... | 2.765625 | stackv2 | """
Ravel application abstractions
"""
import cmd
import importlib
import os
import re
import sys
import time
import tempfile
import psycopg2
import sqlparse
from sqlparse.tokens import Keyword
import ravel.util
from ravel.log import logger
from ravel.cmdlog import cmdLogger
def mk_watchcmd(db, args):
"""Constr... | 334 | 33.65 | 142 | 19 | 2,594 | python | [{"finding_id": "codeql_py/overly-permissive-file_9a6ba3848e100466_51ae583a", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
48
] | [
null
] | [
5
] | [
31
] | |
2024-11-19T02:32:17.817899+00:00 | 1,541,622,978,000 | 2c7dbeeadb8df7cd8d82b7b4b509211202f324c5 | 3 | {
"blob_id": "2c7dbeeadb8df7cd8d82b7b4b509211202f324c5",
"branch_name": "refs/heads/master",
"committer_date": 1541622994000,
"content_id": "d961002e0e47ccb4d67ec7cd643e0abfd7bfd479",
"detected_licenses": [
"MIT"
],
"directory_id": "88df81bd5a85138b26f5a61df78cc971571b17f2",
"extension": "py",
"fi... | 2.59375 | stackv2 | #!/usr/bin/env python
#
# Bottle session manager. See README for full documentation.
#
# Written by: Sean Reifschneider <jafo@tummy.com>
#
# License: 3-clause BSD
# Updated with JSON by Justin Winokur
from __future__ import with_statement
import bottle
import time
try:
import cPickle as pickle
except ImportE... | 243 | 32.53 | 79 | 24 | 1,751 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_814426e85d953f87_5690752b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
221
] | [
null
] | [
30
] | [
36
] | |
2024-11-19T02:32:40.254958+00:00 | 1,625,951,753,000 | 60d68aea94f1463b6559c03a3ca28a53d248241d | 3 | {
"blob_id": "60d68aea94f1463b6559c03a3ca28a53d248241d",
"branch_name": "refs/heads/main",
"committer_date": 1625951753000,
"content_id": "adee05a5435467f9b7cbf1de1318208c03849393",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e3d6d6e8b30376a9254f7f70da8936d6e8430d89",
"extension": "py",
... | 2.75 | stackv2 | #!/usr/bin/env python3
import requests
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
import json
import re
from ipwhois import IPWhois
import ipaddress
from tqdm import tqdm
def get_minimum_set_ranges(ranges):
'''
Purpose: For a given array of IP ranges, go through the... | 152 | 31.04 | 126 | 26 | 1,110 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_d758cf193e1687af_152044f8", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'microsoft.com', so it might match m... | 5 | true | [
"CWE-020",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/incomplete-hostname-regexp",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'microsoft.com', so it might match more hosts than expected.",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run with... | [
54,
53,
57,
76,
102
] | [
null,
null,
null,
null,
null
] | [
34,
9,
14,
9,
9
] | [
97,
106,
58,
81,
85
] | |
2024-11-19T02:32:47.589504+00:00 | 1,602,199,814,000 | 06002acf4a7c37a567638bb26294529b6bd7e011 | 2 | {
"blob_id": "06002acf4a7c37a567638bb26294529b6bd7e011",
"branch_name": "refs/heads/master",
"committer_date": 1602199814000,
"content_id": "e015b3c32ef51bd92611acc978e5a37455da7a00",
"detected_licenses": [
"MIT"
],
"directory_id": "7ddfc4083c49291f3a4afddfe43537a896f7dd6d",
"extension": "py",
"fi... | 2.3125 | stackv2 | from flask import Blueprint, render_template, redirect, url_for, request, abort, flash
from flask_login import current_user, login_user, logout_user, login_required
from urllib.parse import urlparse, urljoin
from app.forms import LoginForm, RegisterForm, AddLicenseForm, EditLicenseForm, RemoveLicenseForm, SetupForm
fro... | 243 | 31.96 | 108 | 17 | 1,688 | python | [{"finding_id": "codeql_py/url-redirection_f978e9f2566ab9d7_0deaffd9", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
210
] | [
null
] | [
29
] | [
68
] | |
2024-11-19T02:32:48.298350+00:00 | 1,625,186,378,000 | 06bff5483f10baac3cf2e69afdcb70e2e68e18c1 | 3 | {
"blob_id": "06bff5483f10baac3cf2e69afdcb70e2e68e18c1",
"branch_name": "refs/heads/main",
"committer_date": 1625186378000,
"content_id": "17a0d04c79b33cc4d35d5a7c40271e8378c0d396",
"detected_licenses": [
"MIT"
],
"directory_id": "e7eded45940c450ea893fce1de04dcf2b46dc218",
"extension": "py",
"file... | 2.515625 | stackv2 | # https://learn.adafruit.com/mqtt-in-circuitpython/circuitpython-wifi-usage
# https://learn.adafruit.com/mqtt-in-circuitpython/connecting-to-a-mqtt-broker
# required from adafruit_bundle:
# - adafruit_requests
# - adafruit_minimqtt
# - adafruit_bus_device
# - adafruit_register
# - adafruit_si7021
import time
import ssl... | 85 | 29.25 | 78 | 12 | 636 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2782a3e5a2c5b089_4ad331ba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
28,
30
] | [
null,
null
] | [
7,
7
] | [
43,
43
] | |
2024-11-19T02:32:58.898099+00:00 | 1,619,724,489,000 | d484680ded022002de67f1a9861e25dd776c46e4 | 2 | {
"blob_id": "d484680ded022002de67f1a9861e25dd776c46e4",
"branch_name": "refs/heads/master",
"committer_date": 1619724489000,
"content_id": "bef6c7f359e4c53a6d90dda7bf62a2f8b163a2ed",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "61ac3b99bf55ff8b8ecf029eba8c40b23310644e",
"extension": "py"... | 2.5 | stackv2 | from flask import Flask, request, jsonify, render_template
import logging
import datetime as dt
from typing import Dict, List
from models import (
SELF_TEST_INPUT,
Descriptors600Model,
Word2vecModel,
Descriptors3000Model,
DescriptorsAllModel,
DescriptorsWithTaxonomiesModel,
JustTaxonomiesMo... | 109 | 32.35 | 104 | 14 | 943 | python | [{"finding_id": "codeql_py/stack-trace-exposure_f16c76ca8fa4db5a_0e450975", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
71
] | [
null
] | [
20
] | [
27
] | |
2024-11-19T02:33:02.131772+00:00 | 1,692,207,092,000 | 16f374e03cf86bd89b3dfb7d609fb35a26de7202 | 2 | {
"blob_id": "16f374e03cf86bd89b3dfb7d609fb35a26de7202",
"branch_name": "refs/heads/master",
"committer_date": 1692207092000,
"content_id": "b2167557ab9894f0c504cf77e48fb86f5a2ad204",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "30dd4bdf3c18f3b6aa9b0c858043d61b571e2e10",
"extension": "py"... | 2.40625 | stackv2 | #!/usr/bin/env python3
from os import environ, listdir, mkdir
from os.path import isdir, exists, join
from shutil import copytree, make_archive, rmtree
from sys import argv, exit
from jinja2 import Environment, FileSystemLoader
SRCDIR = '../src'
DISTDIR = '../_dist'
ARTIFACT_PREFIX = 'kubestack-starter-'
def repla... | 92 | 31.72 | 78 | 14 | 668 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_cf8e933136eb1835_02e437ed", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
16
] | [
null
] | [
13
] | [
60
] | |
2024-11-19T02:33:11.157007+00:00 | 1,623,069,389,000 | af6d7c6416d30accc682e9e5d907dac2607d56e1 | 3 | {
"blob_id": "af6d7c6416d30accc682e9e5d907dac2607d56e1",
"branch_name": "refs/heads/master",
"committer_date": 1623069389000,
"content_id": "fe11aeefc07b8cb78cf6f374725e8270862f5a2a",
"detected_licenses": [
"MIT"
],
"directory_id": "d4af15bfec86981d5a8690423c05aa09910967af",
"extension": "py",
"fi... | 3.015625 | stackv2 |
import base64
import random
import string
from Crypto.Cipher import AES
class MundisCryptographerException(Exception):
def __init__(self, dErrArguments):
Exception.__init__(self, "Error: {0} | {1}".format(
dErrArguments[0], dErrArguments[1]
))
self.dErrArguments = dErrArgum... | 46 | 29.48 | 86 | 14 | 360 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_aa38546e502b3e92_d92ca657", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
40,
45
] | [
null,
null
] | [
33,
16
] | [
53,
54
] | |
2024-11-19T02:43:26.446219+00:00 | 1,674,133,668,000 | 86e0e42ad85e1f60ae61516b1ce5119b90560fd2 | 2 | {
"blob_id": "86e0e42ad85e1f60ae61516b1ce5119b90560fd2",
"branch_name": "refs/heads/master",
"committer_date": 1674133668000,
"content_id": "2a28527337d34a2ad47155a618eb5ec0016c7435",
"detected_licenses": [
"MIT"
],
"directory_id": "8b7aeb654fb3ee738eabc0e2ad69524b4d9f857c",
"extension": "py",
"fi... | 2.3125 | stackv2 | import os
import threading
import time
import requests
from altfe.interface.root import interRoot
from app.lib.core.dl.model.dler import Dler
requests.packages.urllib3.disable_warnings()
class DlDler(Dler):
def __init__(self, url, folder="./downloads/", name=None, dlArgs=Dler.TEMP_dlArgs, dlCacheDir=None, dlRe... | 215 | 32.57 | 120 | 22 | 1,778 | python | [{"finding_id": "codeql_py/request-without-cert-validation_8ec11482ca3adab2_e5b7f13a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
134
] | [
null
] | [
23
] | [
121
] | |
2024-11-19T02:43:30.498148+00:00 | 1,564,492,103,000 | 63fa7589e98e982bc37d5330359f8ba7c9928a09 | 2 | {
"blob_id": "63fa7589e98e982bc37d5330359f8ba7c9928a09",
"branch_name": "refs/heads/master",
"committer_date": 1564492103000,
"content_id": "4e9bdad57d8442de71ab1e45bf3ce6655708da9d",
"detected_licenses": [
"MIT"
],
"directory_id": "726ff9baca48a7db3b36ab27fc25de1ed10d5bb9",
"extension": "py",
"fi... | 2.453125 | stackv2 | #
# linter.py
# Linter for SublimeLinter3, a code checking framework for Sublime Text 3
#
# Written by Bastiaan Veelo
# Copyright (c) 2016-2018 Bastiaan Veelo
#
# License: MIT
#
"""This module exports the Epcomp plugin class."""
from SublimeLinter.lint import Linter, util
import re
import logging
logger = logging.g... | 96 | 27.06 | 79 | 13 | 686 | python | [{"finding_id": "codeql_py/overly-large-range_f62f7b85a1ae36a0_56299565", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
80
] | [
null
] | [
33
] | [
36
] | |
2024-11-19T02:43:32.340533+00:00 | 1,622,481,233,000 | 06151d447faddd036c4e2e8ab6489453ec6e16fc | 3 | {
"blob_id": "06151d447faddd036c4e2e8ab6489453ec6e16fc",
"branch_name": "refs/heads/master",
"committer_date": 1622481233000,
"content_id": "22bb855b31d5cd5d1ea843703c4a2053135bc2d8",
"detected_licenses": [
"MIT"
],
"directory_id": "0341f6d22d598bcf43856b75d96756135b3cdffb",
"extension": "py",
"fi... | 3.328125 | stackv2 | """
Program to brute-force attack an computer through ssh.
From: https://null-byte.wonderhowto.com/how-to/sploit-make-ssh-brute-forcer-python-0161689/
"""
import paramiko
import sys
import os
import socket
import logging
DEFAULT_SSH_PORT = 22
LINE = "\n------------------------------------\n"
INPUT_HOST = "[*] Ente... | 119 | 26.19 | 91 | 18 | 678 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_cdfb6c202cd252a9_c5617425", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 4 | true | [
"CWE-295",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/paramiko-missing-host-key-validation",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive da... | [
59,
70,
97,
102
] | [
null,
null,
null,
null
] | [
5,
22,
27,
27
] | [
62,
65,
34,
34
] | |
2024-11-19T02:43:39.112216+00:00 | 1,428,644,705,000 | 6917cbb1d1d407ac7c397d22f9fc30fb3ed7c6e6 | 3 | {
"blob_id": "6917cbb1d1d407ac7c397d22f9fc30fb3ed7c6e6",
"branch_name": "refs/heads/master",
"committer_date": 1428644705000,
"content_id": "8c1c227dde6271764118bf42e155c97bef7b6fde",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "81fca9e543fab1967c12c6a7147e7e5c1525e552",
"extension": "py"... | 2.96875 | stackv2 | #!/usr/bin/env python
import sys
import argparse
import json
import os
from jinja2 import Template
def main(argv=None):
"""Command-line tool to apply a source context and/or OS environment variables to Jinja 2 templates.
-h
"""
if argv is None:
argv = sys.argv
parser = argparse.ArgumentPa... | 37 | 37.35 | 150 | 16 | 299 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5948b14cf5d36e5c_cd7bafa7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
29
] | [
null
] | [
20
] | [
45
] | |
2024-11-19T02:43:39.980835+00:00 | 1,568,670,754,000 | b68ac3d1e8e3bfa216d689776eaf763d0b678844 | 3 | {
"blob_id": "b68ac3d1e8e3bfa216d689776eaf763d0b678844",
"branch_name": "refs/heads/master",
"committer_date": 1568670754000,
"content_id": "0f05441f97f8ee1cae582ca7c2e38edc5dc9deb2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "362e8a29e503fa48f34548fa23da7060ab1e961d",
"extension": "py"... | 2.6875 | stackv2 | import re
from lib.modules.IndicatorModule import *
class Module(IndicatorModule):
def __init__(self, name, event_json):
super().__init__(name=name, event_json=event_json)
def run(self):
self.logger.debug('Running the {} indicator module'.format(self.name))
for i in self.event_json[... | 23 | 43.26 | 131 | 21 | 226 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_ffd9ee5c0f97d930_a8f44616", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [dropbox.com](1) may be at an arbitrary position in the... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [dropbox.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [dropbox.com](1) may be at an arbitrary position in the sanitized URL."
] | [
17,
17
] | [
null,
null
] | [
20,
55
] | [
47,
73
] | |
2024-11-19T02:43:41.269346+00:00 | 1,588,404,460,000 | 5f7c6e532675b341f3a29e43e5500f1890048ff7 | 2 | {
"blob_id": "5f7c6e532675b341f3a29e43e5500f1890048ff7",
"branch_name": "refs/heads/master",
"committer_date": 1588404460000,
"content_id": "0cd94dd7eda950c46288c05adc7bc23f2c9bfeaf",
"detected_licenses": [
"MIT"
],
"directory_id": "9cd7bfe4b9b772c34c7cda0344f1d0d9fa9566f7",
"extension": "py",
"fi... | 2.484375 | stackv2 | """
This is a quick and dirty way to get a nice list of rankings for movies using the
Open Movie Database API. You can provide either a list of movies, or point the script at
a folder. It will do a half-way-decent job of trying to clean up the file names for submission.
On a failed submit, the movie will have a score o... | 272 | 35.48 | 151 | 23 | 2,072 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_af175217568f92c6_6d642f85", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
184
] | [
null
] | [
39
] | [
62
] | |
2024-11-19T02:43:41.327359+00:00 | 1,591,479,692,000 | d7d2217de6c2ef858f224e2f1231b0f0424f1baf | 3 | {
"blob_id": "d7d2217de6c2ef858f224e2f1231b0f0424f1baf",
"branch_name": "refs/heads/master",
"committer_date": 1591479692000,
"content_id": "1b1d3bdec256063348b4229d128eba45dc5fdcfa",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "8540aa90255a544d084a6d54ea25d641fe06c145",
"extension": "p... | 2.984375 | stackv2 | from threading import Thread
import os
import collections
import queue
import paramiko
from getpass import getpass
import time
print("Modules are imported successfully")
class deviceCommand():
def __init__(self, command, waitingTimeToGetOutput = 5):
self.command = command
self.commandOutput = "u... | 145 | 37.48 | 169 | 19 | 1,236 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_feee755165cc3750_d5fb76cb", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
35
] | [
null
] | [
17
] | [
86
] | |
2024-11-19T02:43:41.596235+00:00 | 1,587,073,228,000 | 6c24973a28241766190a2574269b8750c314096e | 3 | {
"blob_id": "6c24973a28241766190a2574269b8750c314096e",
"branch_name": "refs/heads/master",
"committer_date": 1587073228000,
"content_id": "27efba1a2739f93d773d3fe8065bed31c9aa7906",
"detected_licenses": [
"MIT"
],
"directory_id": "ca00924df51213990efe21449be98f73680ea9a9",
"extension": "py",
"fi... | 2.84375 | stackv2 | from django.db import models
from django.urls import reverse
__author__ = 'brleinad'
import re
import json
import os
import requests
import ipinfo
from . import defaults
"""
# TODO: Give the output in JSON
# TODO: Error handling: MP API not working, no routes near location, etc
# TODO: add weather fo... | 340 | 30.25 | 135 | 17 | 2,452 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_79dffe69c921107e_bef31440", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
252,
253,
254
] | [
null,
null,
null
] | [
15,
15,
15
] | [
52,
45,
46
] | |
2024-11-19T02:55:03.768248+00:00 | 1,622,574,258,000 | 0a4b30b21d9f3f83789a4779ab2ab595e39a0b37 | 2 | {
"blob_id": "0a4b30b21d9f3f83789a4779ab2ab595e39a0b37",
"branch_name": "refs/heads/main",
"committer_date": 1622574258000,
"content_id": "e823f4da2864718470511eefcf87e477cb23db6e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "07d8d2cb1b74ac7d539d8e08acf3a39ab5756719",
"extension": "py",
... | 2.34375 | stackv2 | #!/usr/bin/env python3
# Written by Jon S. Nelson, jnelson@carbonblack.com (C) 2020
# This script is a POC to show off the Live Query API, and has
# essentially implemented query packs.
#
# This script cannot be run by itself, and you should just leverage
# the container that sets up everything for you.
##########... | 276 | 30.22 | 118 | 18 | 2,204 | python | [{"finding_id": "codeql_py/path-injection_cf8838fc2f8031c8_fe5af8e9", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 5 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
160,
163,
169,
171,
231
] | [
null,
null,
null,
null,
null
] | [
27,
25,
15,
19,
28
] | [
52,
50,
20,
27,
32
] | |
2024-11-19T02:55:16.748279+00:00 | 1,578,436,380,000 | b6d25287ab5f9f54cf99d5e44a7655fccd2b0c80 | 2 | {
"blob_id": "b6d25287ab5f9f54cf99d5e44a7655fccd2b0c80",
"branch_name": "refs/heads/master",
"committer_date": 1578436380000,
"content_id": "6ca3dae635a5f6486f26f89970f2974a453cd65e",
"detected_licenses": [
"MIT"
],
"directory_id": "a8a1865b9e5ffbe347a47e62ba0b7f6e1947ce5e",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!flask/bin/python
from flask import Flask
#from Flask_cors import Flask_cors
app = Flask(__name__, static_url_path='', static_folder='.')
#pp= Flask(__name__)
#CORS(app)
@app.route('/')
def index():
return "Hello, World!, Johhny"
@app.route('/empl/<int:id>')
def getEmply(id):
return "you want book with "+ s... | 18 | 20 | 60 | 9 | 102 | python | [{"finding_id": "codeql_py/flask-debug_a04eeb062b47c162_14fbfab3", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
18,
15
] | [
null,
null
] | [
5,
12
] | [
24,
42
] | |
2024-11-19T02:55:20.270138+00:00 | 1,358,900,631,000 | 36e112c96f18ac46a9978ef1ecbc4085c4657e22 | 3 | {
"blob_id": "36e112c96f18ac46a9978ef1ecbc4085c4657e22",
"branch_name": "refs/heads/master",
"committer_date": 1358900631000,
"content_id": "fe06886011a041c419fd1efa55d9317e6ce40929",
"detected_licenses": [
"MIT"
],
"directory_id": "72bef212057cefc3c84cc035d722d5f1bc2688e6",
"extension": "py",
"fi... | 3.265625 | stackv2 | """ brining.py
Provides inplace augmentation of python classes with automated
Python to Json, and Json to Python object mapping via
either class decorator or inherited mixin class. This also supports
nested augmented or 'brined' objects
Optional hinting is also provided via a Python class name ... | 478 | 31.47 | 91 | 18 | 3,469 | python | [{"finding_id": "codeql_py/overly-permissive-file_7c02637add4fc2dd_b955d9a0", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in open sets file to world readable."
] | [
367
] | [
null
] | [
17
] | [
76
] | |
2024-11-19T02:55:44.129712+00:00 | 1,685,389,282,000 | 601cb25ed097ee07a9016db902b77c3bb8aac773 | 3 | {
"blob_id": "601cb25ed097ee07a9016db902b77c3bb8aac773",
"branch_name": "refs/heads/master",
"committer_date": 1685389282000,
"content_id": "20fd3706ec008044c871be52b3759ff71b81d93d",
"detected_licenses": [
"MIT"
],
"directory_id": "58075d7b7182c12852ebf522ccbff3a8136213c8",
"extension": "py",
"fi... | 2.796875 | stackv2 | #!/usr/bin/env python3
#
import re
import os
class Object():
def __init__(self):
self.properties = dict()
pass
def parse(self,ss):
self.ss = ss
def property(self,key,val=None):
if(key in self.properties):
if(val):
self.properties[key] = cal
... | 226 | 20.62 | 86 | 17 | 1,140 | python | [{"finding_id": "codeql_py/redos_2e6d23124de1b5e3_32f97a9a", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\!'."
] | [
84
] | [
null
] | [
51
] | [
64
] | |
2024-11-19T03:10:19.617639+00:00 | 1,688,035,442,000 | 4d08f418d5d9451346b236a57d9ef67253d9bbfb | 3 | {
"blob_id": "4d08f418d5d9451346b236a57d9ef67253d9bbfb",
"branch_name": "refs/heads/master",
"committer_date": 1688035442000,
"content_id": "50ca4496dfb63b1cb23c72bb8af0ca1f0abbee36",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cb5e707b5555b844603477b5eeecedc6aaf77a84",
"extension": "py"... | 2.609375 | stackv2 | # This is taken from aws-transfer-custom-idp-secrets-manger-apig.template.yml CloudFormation Template.
# Modified to allow configuration of SSM base path
import os
import json
import boto3
import base64
from botocore.exceptions import ClientError
secret_base_path = os.getenv("SECRET_BASE_PATH", "SFTP/")
def lambda_h... | 101 | 38.07 | 147 | 16 | 857 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_97b6b4bc3c8114c8_a55a308f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
85
] | [
null
] | [
11
] | [
46
] | |
2024-11-19T03:10:33.738228+00:00 | 1,606,561,859,000 | 339e1cb25211a75543d956392014d17db76e8978 | 3 | {
"blob_id": "339e1cb25211a75543d956392014d17db76e8978",
"branch_name": "refs/heads/master",
"committer_date": 1606561859000,
"content_id": "efbe1adb90218a626c11a753162612fed8defd8c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "81741787c8355591a38f3105d79e14c06d121a46",
"extension": "py"... | 2.671875 | stackv2 | import paramiko
ssh_clients = {}
class SSHClient():
def __init__(self, ssh_credentials):
self.ssh_credentials = ssh_credentials
def create_client(self, ip_address, timeout=None):
ssh_client = paramiko.SSHClient()
ssh_client.set_missing_host_key_policy(paramiko.AutoAddPolicy())
... | 63 | 33.05 | 85 | 16 | 441 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_77b6ccfc501a91b8_b1a664d1", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
13
] | [
null
] | [
9
] | [
73
] | |
2024-11-19T03:10:56.035504+00:00 | 1,611,747,481,000 | 192ad7687ed3e9b6f362b855623cf39d6861be73 | 2 | {
"blob_id": "192ad7687ed3e9b6f362b855623cf39d6861be73",
"branch_name": "refs/heads/main",
"committer_date": 1611747481000,
"content_id": "7aab5945f393fa5b467535a4ba8a8e321a95fa32",
"detected_licenses": [
"MIT"
],
"directory_id": "987c9aebc8d8354671e74cd4f5dabce037053752",
"extension": "py",
"file... | 2.5 | stackv2 | # coding: utf-8
import os
import sys
import json
from dotenv import load_dotenv
import base64
import hashlib
import hmac
from flask import Flask, request, abort
from linebot import (
LineBotApi
)
from linebot.exceptions import (
InvalidSignatureError
)
from linebot.models import (
TextSendMessage,
)
app... | 88 | 23.82 | 76 | 16 | 567 | python | [{"finding_id": "codeql_py/flask-debug_103ff2b4f940ab52_597902f0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-117"
] | [
"py/flask-debug",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1)."
] | [
88,
60
] | [
null,
null
] | [
5,
21
] | [
53,
44
] | |
2024-11-19T03:21:49.492539+00:00 | 1,587,103,879,000 | 14946e8ef9e2ff3ce6ccf24258cd7806b4bfcde6 | 2 | {
"blob_id": "14946e8ef9e2ff3ce6ccf24258cd7806b4bfcde6",
"branch_name": "refs/heads/master",
"committer_date": 1587103879000,
"content_id": "0b0fce0a5074f8ab40e3cca557c2824fba2d0b51",
"detected_licenses": [
"MIT"
],
"directory_id": "9303827c475fa510670e5238d465bc98eb98216b",
"extension": "py",
"fi... | 2.375 | stackv2 | from selenium import webdriver
from selenium.webdriver.chrome.options import Options
from PIL import Image
from jinja2 import Markup, Environment
from markdown import markdown
from base64 import b64encode
from sys import platform
import io
import os
import logging
import requests
import zipfile
import fire
from pkg_res... | 242 | 29.11 | 97 | 19 | 1,601 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_7b606c5408dce705_3f980f5e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
133
] | [
null
] | [
11
] | [
24
] | |
2024-11-19T03:21:52.722894+00:00 | 1,517,963,551,000 | 26046548807ac4d2f78ca6a79fbc256a95777226 | 2 | {
"blob_id": "26046548807ac4d2f78ca6a79fbc256a95777226",
"branch_name": "refs/heads/master",
"committer_date": 1517963551000,
"content_id": "ebaf4242dbec461a67f82c290cd94feb560de2d3",
"detected_licenses": [
"MIT"
],
"directory_id": "4eeafb73b40d1bd79c6e0e88566178f873263a2a",
"extension": "py",
"fi... | 2.40625 | stackv2 | from contextlib import contextmanager
import fire
import subprocess
from influxdb import InfluxDBClient, DataFrameClient
import logging
from gpumon.nvidia_dmon import nvidia_run_dmon_poll
from gpumon.influxdb_interface import create_influxdb_writer
logging.basicConfig(level=logging.INFO)
logger = logging.getLogger(__... | 127 | 32.67 | 112 | 14 | 867 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_499c5eedc510a3e4_96d51e1d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
57,
110
] | [
null,
null
] | [
17,
21
] | [
29,
112
] | |
2024-11-19T03:22:04.936275+00:00 | 1,618,317,418,000 | 6927fc328b1153f1792d16f8be93e2b294883a4e | 3 | {
"blob_id": "6927fc328b1153f1792d16f8be93e2b294883a4e",
"branch_name": "refs/heads/master",
"committer_date": 1618317418000,
"content_id": "71c812b6312bdb2e520e59b6957d1a130e21e48a",
"detected_licenses": [
"MIT"
],
"directory_id": "feac862f76780add20bde84c17096796b735e899",
"extension": "py",
"fi... | 3.25 | stackv2 | import pyperclip
from user_details import User, Details
def new_user(fname,lname,password):
'''
create new user
'''
n_user = User(fname,lname,password)
return n_user
def save_user(user):
'''
save new user account
'''
User.save_user_details(user)
def verify_user(fname,password):
... | 164 | 33.48 | 154 | 27 | 1,052 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7845dcaae59ced32_fc4f58c7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (p... | [
76,
127,
135
] | [
null,
null,
null
] | [
19,
31,
39
] | [
89,
117,
154
] | |
2024-11-19T03:22:06.838917+00:00 | 1,589,723,107,000 | 15ba340291230bf6f9befd992259ee108543982a | 2 | {
"blob_id": "15ba340291230bf6f9befd992259ee108543982a",
"branch_name": "refs/heads/master",
"committer_date": 1589723107000,
"content_id": "c18a26002d63a98d150287d0935296f26ab46f4c",
"detected_licenses": [
"MIT"
],
"directory_id": "aa17c8067ee7e4b032d41ecb5181aad0db59a2b4",
"extension": "py",
"fi... | 2.40625 | stackv2 | import BaseHTTPServer
import logging
import os
import SocketServer
import ssl
from powergslb.server.http.handler import HTTPRequestHandler
import powergslb.system
__all__ = ['HTTPServerThread', 'ThreadingHTTPServer']
class HTTPServerThread(powergslb.system.AbstractThread):
"""
PowerGSLB server thread
"... | 46 | 32.52 | 113 | 14 | 338 | python | [{"finding_id": "codeql_py/insecure-default-protocol_3a1b22ca204ddb38_1cee96ee", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
35
] | [
36
] | [
34
] | [
114
] | |
2024-11-19T03:22:07.042263+00:00 | 1,619,104,956,000 | 42880350a9fc7cff5c9b3bce07baa47bfa0a202d | 3 | {
"blob_id": "42880350a9fc7cff5c9b3bce07baa47bfa0a202d",
"branch_name": "refs/heads/master",
"committer_date": 1619104956000,
"content_id": "f7a7019cc3ef4786d37e6bf1c473ecc3afb90c76",
"detected_licenses": [
"MIT"
],
"directory_id": "e0e3691fa789d0089922fa82a32675242a0aa424",
"extension": "py",
"fi... | 2.734375 | stackv2 | import paramiko as pmk
username = raw_input("Username: ")
password = raw_input("Password: ")
hostnames = ["hostname1","hostname2","hostname3"]
commands = ["hostname","nproc","ps aux","exit"]
client = pmk.SSHClient()
client.set_missing_host_key_policy(pmk.AutoAddPolicy())
for hostname in hostnames:
try:
... | 37 | 28.03 | 79 | 20 | 235 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_882f96b442f2c04f_60922c8e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
13
] | [
null
] | [
null
] | [
56
] | |
2024-11-19T03:22:21.587090+00:00 | 1,688,333,341,000 | c3e196ad0c756ee449339ae9f34086ea557beaf4 | 3 | {
"blob_id": "c3e196ad0c756ee449339ae9f34086ea557beaf4",
"branch_name": "refs/heads/master",
"committer_date": 1688333341000,
"content_id": "e190eb4abe4c396319f3c1017a592e46b2403762",
"detected_licenses": [
"MIT"
],
"directory_id": "b706ea1c20606c9e32742f6a356afffa32368674",
"extension": "py",
"fi... | 2.78125 | stackv2 | """
Create a json file for displaying family as a javascript zoomable sunburst.
Direction can be ancestors or descendants.
Colors can be plain, gender, or 6 levels.
The "6 levels" is a research concept from Yvette Hoitink
https://www.dutchgenealogy.nl/six-levels-ancestral-profiles/
The 6 level values should be stored ... | 439 | 30.19 | 116 | 19 | 3,647 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a1315978d080a164_e8f9907b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
281,
376,
376
] | [
null,
null,
null
] | [
12,
15,
21
] | [
52,
19,
32
] | |
2024-11-19T03:43:57.116748+00:00 | 1,642,295,364,000 | 32ad34df571945b96f0fd753509bc309021fe538 | 2 | {
"blob_id": "32ad34df571945b96f0fd753509bc309021fe538",
"branch_name": "refs/heads/master",
"committer_date": 1642295364000,
"content_id": "e826b2dad4ca7269e4392bb685996a5871df16e8",
"detected_licenses": [
"MIT"
],
"directory_id": "b86af7b533294f141d90053a611e4957db046961",
"extension": "py",
"fi... | 2.375 | stackv2 | # ----------------------------------------------------------------------------
# - Open3D: www.open3d.org -
# ----------------------------------------------------------------------------
# The MIT License (MIT)
#
# Copyright (c) 2018-2021 www.open3d.org
#
# Permission i... | 262 | 32.21 | 85 | 19 | 2,304 | python | [{"finding_id": "codeql_py/tarslip_9c4523258e3dbac8_01885ad6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
190
] | [
null
] | [
13
] | [
16
] | |
2024-11-19T03:44:29.413356+00:00 | 1,560,267,660,000 | 29d1aa6479886c6cfe8cecc05994076eb1909fe8 | 3 | {
"blob_id": "29d1aa6479886c6cfe8cecc05994076eb1909fe8",
"branch_name": "refs/heads/master",
"committer_date": 1560267660000,
"content_id": "919b7b625a34863cf890bc08343500f8d6273ee7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "82a5a74e3ba67aecb0525aa01f3a2bec26c78522",
"extension": "py"... | 2.59375 | stackv2 | """
manage.py
Tool that you use to Access the Database and the Backend
"""
from pobarajpomosh import create_app, db, socketio
from pobarajpomosh.auth.models import Role, User
from pobarajpomosh.posts.models import Post, Comment
from pobarajpomosh.volunteers.models import MessageCounter, ChatSessionsCounter
from pobara... | 108 | 26.35 | 107 | 15 | 681 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4044ed8d60fad95e_9e57bcf1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
52,
66
] | [
null,
null
] | [
11,
11
] | [
87,
93
] | |
2024-11-19T01:44:04.274487+00:00 | 1,563,364,248,000 | 9c37ce7351c1444ce3374ec0059e75616befd917 | 2 | {
"blob_id": "9c37ce7351c1444ce3374ec0059e75616befd917",
"branch_name": "refs/heads/master",
"committer_date": 1563364248000,
"content_id": "92e289c470d8b29844c1188c02944c6c675e3564",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d09d94cd96cd4c6dcc9642573ef8ff1d4d549545",
"extension": "py"... | 2.375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import copy
import json
import logging
import time
from datetime import datetime, timedelta, date
import requests
from helpers.entity_api_consumer import get_description_entities
api_version = 2
api_key='###############################'
def get_categories():
resp =... | 172 | 34.91 | 140 | 19 | 1,454 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_351aab08a62de165_f9cd4660", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 7 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [s... | [
161,
166,
22,
38,
58,
92,
113
] | [
null,
null,
null,
null,
null,
null,
null
] | [
34,
38,
20,
22,
30,
22,
30
] | [
61,
65,
70,
25,
118,
25,
112
] | |
2024-11-19T01:44:07.165063+00:00 | 1,618,826,746,000 | 1dde560e9e613fdafde410458ed663c5ac87cfe2 | 3 | {
"blob_id": "1dde560e9e613fdafde410458ed663c5ac87cfe2",
"branch_name": "refs/heads/main",
"committer_date": 1618826746000,
"content_id": "70c402e9c664593be38797d5700de97a93baeda3",
"detected_licenses": [
"MIT"
],
"directory_id": "cff574502201553b7c19ce5895d96f4dcf409f2b",
"extension": "py",
"file... | 3.140625 | stackv2 | """
A module to perform IP to hostname resolution of network device,
utilizing Cisco DNA Center platform Northbound API (Intent).
"""
import re
import time
from ipaddress import IPv4Address
from ipaddress import AddressValueError
import requests
from requests.auth import HTTPBasicAuth
class DNACHandler():
"""
... | 131 | 31.01 | 85 | 20 | 848 | python | [{"finding_id": "codeql_py/request-without-cert-validation_90d4e4a9d733e740_99e1d3a4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
31,
55
] | [
32,
null
] | [
24,
28
] | [
50,
76
] | |
2024-11-19T02:08:20.477759+00:00 | 1,621,457,805,000 | bb0c4c3d9838530d2e505dbd38657a6090cba952 | 3 | {
"blob_id": "bb0c4c3d9838530d2e505dbd38657a6090cba952",
"branch_name": "refs/heads/master",
"committer_date": 1621457805000,
"content_id": "1f9cc46e4cf8674269b4e9830d730021a6775040",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8fe886aad50a804d09c576f4b009d8b314ab8122",
"extension": "py"... | 2.578125 | stackv2 | import os
import shutil
import yaml
from typing import Dict, TextIO, List
from base64 import b64decode
import json
import k8s_request_data
def clean_nones(value: Dict) -> Dict:
"""
Recursively remove all None values from dictionaries and lists, and returns
the result as a new dictionary or list.
"""
... | 125 | 32.2 | 87 | 20 | 987 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_2d9dcd434b300c85_9b5277d0", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
87
] | [
null
] | [
36
] | [
87
] | |
2024-11-19T02:21:32.617105+00:00 | 1,508,870,692,000 | 1fee950bdc12f1493e520dd3bb8cc6fd3ea3db9f | 3 | {
"blob_id": "1fee950bdc12f1493e520dd3bb8cc6fd3ea3db9f",
"branch_name": "refs/heads/master",
"committer_date": 1508870692000,
"content_id": "82d489d7160cb27c5fb25c2d821c5921fed479bc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cd6e804095ea16a65c11eadc17c94dc899ba974f",
"extension": "py"... | 2.515625 | stackv2 | # coding: utf-8
import warnings
import os
from flask import Flask, request
from subprocess import call
import chatbot
import messenger
app = Flask(__name__)
FACEBOOK_TOKEN = "page token generated on messenger page of facebook app dashboard"
bot = None
@app.route('/', methods=['GET'])
def verify():
if request.ar... | 53 | 33.92 | 101 | 15 | 443 | python | [{"finding_id": "codeql_py/flask-debug_33d32a5dfddabb85_e5409239", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
53,
18
] | [
null,
null
] | [
5,
16
] | [
35,
53
] | |
2024-11-19T02:21:38.066846+00:00 | 1,586,745,483,000 | 0521d4001186e8f1f6c1b7bc4b45eec3cc8576b2 | 2 | {
"blob_id": "0521d4001186e8f1f6c1b7bc4b45eec3cc8576b2",
"branch_name": "refs/heads/master",
"committer_date": 1586745483000,
"content_id": "f85f2cf9ba94e525fb46062cadf7e80add94a0e4",
"detected_licenses": [
"MIT"
],
"directory_id": "b0994d40e48bf5940d3c2a8d4a9a2c319a18786f",
"extension": "py",
"fi... | 2.375 | stackv2 | import json
import re
import time
import uuid
import shortuuid
from django.http import HttpResponse, JsonResponse
from rest_framework.views import APIView
import pymongo
import pymysql
class Data:
def __init__(self, request):
self.header = request.META
self.request = request.data
params = {}... | 192 | 35.2 | 108 | 20 | 1,752 | python | [{"finding_id": "codeql_py/stack-trace-exposure_b37fab73ce2e129a_77d6973f", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-079"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-... | [
179,
180,
176
] | [
null,
null,
null
] | [
33,
29,
33
] | [
36,
32,
61
] | |
2024-11-19T02:58:16.223153+00:00 | 1,419,583,884,000 | 2e2732170862f146843587537bae8501b6287dec | 4 | {
"blob_id": "2e2732170862f146843587537bae8501b6287dec",
"branch_name": "refs/heads/master",
"committer_date": 1419583884000,
"content_id": "5b9aca0f3ed16a8295671c596374af4af3d89953",
"detected_licenses": [
"MIT"
],
"directory_id": "1df8e2971d799814ecaa576cd9918c2617ad2f30",
"extension": "py",
"fi... | 3.515625 | stackv2 | # -*- coding: utf-8 -*-
import hashlib, uuid
# 对密码进行加密
# password 是密码明文
# salt 是随即字符串
# algo 是不同的加密算法
def hash_password(password, salt=None, algo=0):
# 设置 salt
if salt is None:
salt = uuid.uuid4().hex
# 根据不同的 algo 调用不同的加密算法
if algo==0:
hash_object = hashlib.md5(password + salt)
elif algo==1:
hash_object = ha... | 35 | 24.94 | 47 | 12 | 284 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_69801030ff76e017_a506827d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 5 | true | [
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
13,
15,
17,
19,
21
] | [
null,
null,
null,
null,
null
] | [
29,
30,
32,
32,
32
] | [
44,
45,
47,
47,
47
] | |
2024-11-19T03:10:01.993330+00:00 | 1,523,028,792,000 | 57ac9406143b299120a5cca0b52e67aa92e12f70 | 3 | {
"blob_id": "57ac9406143b299120a5cca0b52e67aa92e12f70",
"branch_name": "refs/heads/master",
"committer_date": 1523028792000,
"content_id": "5081d21358655412a4c9cff819c378ed69f41d8d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3fb658810d383fc4e83c09ac005bb77f9d6af068",
"extension": "py"... | 2.5625 | stackv2 | """
Copyright (C) 2013-2018 Calliope contributors listed in AUTHORS.
Licensed under the Apache 2.0 License (see LICENSE file).
plotting.py
~~~~~~~~~~~
Functionality to plot model data.
"""
import os
import re
import plotly.offline as pltly
import jinja2
from calliope.analysis.plotting.capacity import plot_capacit... | 126 | 28.01 | 79 | 14 | 879 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_1595280aaae849a5_26df8a5e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
49
] | [
null
] | [
25
] | [
50
] | |
2024-11-19T03:10:36.608054+00:00 | 1,509,961,243,000 | 1bb0e4cc5da8af6f20595d0abaa36f7717eaa757 | 2 | {
"blob_id": "1bb0e4cc5da8af6f20595d0abaa36f7717eaa757",
"branch_name": "refs/heads/master",
"committer_date": 1509961243000,
"content_id": "d8907660a609315642b29957197a80256e8f4901",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8da0c6b88f6de10c5680a97ed6d7b4cb8d087ed9",
"extension": "py"... | 2.46875 | stackv2 | # -*- coding: utf-8 -*-
import sys
import json
import pip._vendor.requests as requests
from flask import Flask, request, session
from dbhelper import DBHelper
from url_constants import UrlConstants
from url_constants import EnvConstants
from log_status import StatusType
from watson_analyser import WatsonAnalyzer
from ... | 133 | 37.88 | 119 | 22 | 1,094 | python | [{"finding_id": "codeql_py/flask-debug_392bd41e474a1db7_c9ba01f0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
133,
26
] | [
null,
null
] | [
5,
16
] | [
24,
50
] | |
2024-11-19T03:22:32.408968+00:00 | 1,671,296,432,000 | db824c8e9ffeadb89e45d9a0fdceac11f6f54445 | 2 | {
"blob_id": "db824c8e9ffeadb89e45d9a0fdceac11f6f54445",
"branch_name": "refs/heads/master",
"committer_date": 1671296432000,
"content_id": "51995acd0c1382e5d061d47d74371f9029dfecbe",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1cd6e354bd77538aad35f530de74cf4c97a62fa3",
"extension": "py"... | 2.328125 | stackv2 | import argparse
import os
import stat
import shutil
import gzip
import json
import re
import io
DEFAULT_EXCLUDE_EXTENSIONS = [".map"]
class Main:
def __init__(self, args):
self.args = args
self.total_src_size = 0
self.total_dst_size = 0
def log(self, *params):
if self.args.ve... | 204 | 35.46 | 99 | 25 | 1,629 | python | [{"finding_id": "codeql_py/bad-tag-filter_8e52d67bfabb73ad_ea418c4b", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match upper case <SCRIPT> tags."
] | [
33
] | [
null
] | [
32
] | [
61
] | |
2024-11-19T03:22:33.188220+00:00 | 1,647,949,026,000 | 7b8031d3cbda4435e4a45c2db16982de1c1af00d | 3 | {
"blob_id": "7b8031d3cbda4435e4a45c2db16982de1c1af00d",
"branch_name": "refs/heads/master",
"committer_date": 1647949026000,
"content_id": "8622b3e0c7f7f092169f23e85f9646da92c71f06",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "95506c75d782b6e3d3f957416ec8d0fdc87bba00",
"extension": "py"... | 2.65625 | stackv2 | """
Classes for Authenticating and Interrogating Platform9 Management Plane
Tested with python 2.7 and 3.7.0 on OSX and Ubuntu 16.04 and 18.04
Maintainer: tom.christopoulos@platform9.com
"""
import re
import requests
import urllib3
from ..exceptions import UserAuthFailure
from ..exceptions import DUCommFailure
from ..... | 146 | 45.9 | 100 | 23 | 1,392 | python | [{"finding_id": "codeql_py/request-without-cert-validation_29c836de06674875_908be973", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
116,
130
] | [
118,
null
] | [
37,
38
] | [
66,
96
] | |
2024-11-19T03:22:35.502795+00:00 | 1,634,394,922,000 | 544737a782b18263a9aad2e0325c5cfbc62196bd | 3 | {
"blob_id": "544737a782b18263a9aad2e0325c5cfbc62196bd",
"branch_name": "refs/heads/master",
"committer_date": 1634394922000,
"content_id": "b06331670d5d23c01dacb1234d2148e40e49ace5",
"detected_licenses": [
"MIT"
],
"directory_id": "2a0b58049fec0cca5a8ce2605e7970ea57a375cc",
"extension": "py",
"fi... | 2.59375 | stackv2 | from flask import render_template, url_for , flash , redirect, request, abort
from flaskblog.forms import RegistrationForm , LoginForm , PostForm
from flaskblog import app,db,bcrypt
from flaskblog.models import User, Post
from flask_login import login_user, current_user,logout_user ,login_required
@app.route("/")
@ap... | 124 | 33.44 | 110 | 16 | 953 | python | [{"finding_id": "codeql_py/url-redirection_cd20d433af6d2e52_8ebc17a5", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
48
] | [
null
] | [
29
] | [
38
] | |
2024-11-19T03:22:41.132575+00:00 | 1,514,953,869,000 | bebed04316caa64bac2722f763c8db76eeb529e6 | 2 | {
"blob_id": "bebed04316caa64bac2722f763c8db76eeb529e6",
"branch_name": "refs/heads/master",
"committer_date": 1514953869000,
"content_id": "6c307f3cd44ab28f12d4ba546789aa207b41f416",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ee3fd0dc8c7c09a304765fe13f65fd1da81f5af0",
"extension": "py"... | 2.421875 | stackv2 | # -*- coding: utf-8 -*-
import os
import subprocess
DEVNULL = open(os.devnull, 'w')
PEER_SETTING_DIR = '/etc/ppp/peers/'
def find_active_pptp_connection():
fd = subprocess.Popen("ps -ax | grep '/usr/sbin/pppd call'", shell=True, stdout=subprocess.PIPE)
tunnel_dict = {}
for line in fd.stdout.readlines... | 243 | 29.02 | 107 | 18 | 1,564 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1420468d4fa16700_a83def1a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
141
] | [
null
] | [
37
] | [
54
] | |
2024-11-19T03:22:43.651737+00:00 | 1,562,316,729,000 | c5828b00ebe1b465d28a4d9f5d40e357873de494 | 3 | {
"blob_id": "c5828b00ebe1b465d28a4d9f5d40e357873de494",
"branch_name": "refs/heads/master",
"committer_date": 1562316729000,
"content_id": "4a008f6bca8ca47c26ec717fb1b7ebc477554e59",
"detected_licenses": [
"MIT"
],
"directory_id": "5e7100cffde0c5b7119c97f14e92295e8b4a1d4b",
"extension": "py",
"fi... | 2.53125 | stackv2 | import sys
import re
import urllib2, urlparse, gzip
from StringIO import StringIO
from HTMLParser import HTMLParser
# The script generates a list of the PDB-IDs together with the Pfam- and InterPro-IDs
# Executio: python pdbListFamGO.py pdblist_AB
class SmartRedirectHandler(urllib2.HTTPRedirectHandler):
def http... | 106 | 26.58 | 86 | 19 | 826 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c8ed46fe806597e9_5f83159b", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [pfam.xfam.org](1) may be at an arbitrary position in t... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [pfam.xfam.org](1) may be at an arbitrary position in the sanitized URL.",
"The string [www.ebi.ac.uk](1) may be at an arbitrary position in the sanitized URL."
] | [
74,
86
] | [
null,
null
] | [
5,
9
] | [
28,
32
] | |
2024-11-19T03:22:55.229025+00:00 | 1,296,056,659,000 | cbb4f160fed4db99342f4d0c0edce335b8c20ec7 | 3 | {
"blob_id": "cbb4f160fed4db99342f4d0c0edce335b8c20ec7",
"branch_name": "refs/heads/master",
"committer_date": 1296056659000,
"content_id": "9d250618bf1c87dc65a785b68fe905845dac76c8",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "b4e87d4d8ad99a0ca90c9837da1d6d7f218eb5d3",
"extension": "p... | 2.53125 | stackv2 | from os import urandom
from base64 import b64encode, b64decode
from django.conf import settings
from django.utils.dateformat import format, time_format
from django.utils.encoding import smart_str
from django.forms.util import flatatt
from PIL import Image
def encrypt(plaintext):
from Crypto.Cipher import ARC4
... | 91 | 28.29 | 111 | 16 | 720 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_b12cf2401d73ac11_10fccf8e", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.",
"[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used."
] | [
21,
29
] | [
null,
null
] | [
50,
21
] | [
73,
45
] | |
2024-11-19T03:23:01.787404+00:00 | 1,550,658,412,000 | 66282734f8251bca43e4c5104a386ed9255d61c4 | 3 | {
"blob_id": "66282734f8251bca43e4c5104a386ed9255d61c4",
"branch_name": "refs/heads/master",
"committer_date": 1550658412000,
"content_id": "3f3c797fd2ec987bb547c7cc9be6a398cfe37979",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "678d9f7788141e3413293aa3a081d99273f74802",
"extension": "p... | 3.328125 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
# author: Mohammad Modallal <m.modallal@redcrow.co>
from xlrd import open_workbook
import xlwt
import re
import sys, getopt, codecs, os
import csv
from itertools import izip
class DataInput(object):
'''
Class DataInput Description:
This class represe... | 75 | 39.41 | 142 | 16 | 607 | python | [{"finding_id": "codeql_py/overly-large-range_b25a6a7d6b340551_d1c2be24", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\w in the same character class.",
"Suspicious character range that overlaps with \\w in the same character class."
] | [
73,
73
] | [
null,
null
] | [
30,
33
] | [
33,
36
] | |
2024-11-19T03:44:13.531260+00:00 | 1,611,601,676,000 | ae04dc042fbae486a2f324ce309aca29743a2f75 | 2 | {
"blob_id": "ae04dc042fbae486a2f324ce309aca29743a2f75",
"branch_name": "refs/heads/master",
"committer_date": 1611601676000,
"content_id": "2849aff83483c7e6bb62f14f6a85e89a0964eacf",
"detected_licenses": [
"MIT"
],
"directory_id": "201dac99f7b67a3a334f0f833bd3c2d8350c5800",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/env python
"""Define hooks to be run after project generation."""
import json
import os # noqa
import secrets
import sys # noqa
from pathlib import Path
from cookiecutter.main import cookiecutter
try:
import gitlab # noqa
except ModuleNotFoundError: # pragma: no cover
pass
class MainProcess:... | 123 | 35.77 | 86 | 25 | 945 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_cdaf3dc3bba1bfd4_ce2b7817", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text."
] | [
81
] | [
null
] | [
66
] | [
78
] | |
2024-11-19T03:44:42.040016+00:00 | 1,590,547,547,000 | 29d73799ec4b6c7225868ced3b4b55fc72a6e7a8 | 3 | {
"blob_id": "29d73799ec4b6c7225868ced3b4b55fc72a6e7a8",
"branch_name": "refs/heads/master",
"committer_date": 1590547547000,
"content_id": "3be83094ae20c6d6547061256f0f747f490a66a0",
"detected_licenses": [
"MIT"
],
"directory_id": "f5fb0d5af5211e81bd54a529851ddf68441c5044",
"extension": "py",
"fi... | 2.609375 | stackv2 | # !/usr/bin/python
# -*- coding: UTF-8 -*-
import json
import requests
def parse_tkl(sign_server, password):
headers = {
"content-type": "application/json;charset=utf-8"
}
payload = {
"password": password
}
print("解析淘口令参数:" + json.dumps(payload))
res = requests.post(sign_serve... | 33 | 26.06 | 79 | 12 | 252 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d6db60f2882e48f7_5f8220ba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
15
] | [
null
] | [
11
] | [
43
] | |
2024-11-19T01:34:43.700439+00:00 | 1,489,417,273,000 | 96ffd8d9186171e297871b78ef05b722b9175cb3 | 3 | {
"blob_id": "96ffd8d9186171e297871b78ef05b722b9175cb3",
"branch_name": "refs/heads/master",
"committer_date": 1489417273000,
"content_id": "ca51399a3855987411f3403de845a40d49df43ee",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3d728aa3a7c009356a529c7a93378307cef327ae",
"extension": "py"... | 2.546875 | stackv2 |
import http.server
import socketserver
import json
import http.client
class testHTTPRequestHandler(http.server.BaseHTTPRequestHandler):
# GET
OPENFDA_API_URL= "api.fda.gov"
OPENFDA_API_EVENT= "/drug/event.json"
OPENFDA_API_LYRICA= "search=patient.drug.medicinalproduct:" "LYRICA""&limit=10"
def ... | 160 | 33.07 | 154 | 16 | 1,288 | python | [{"finding_id": "codeql_py/partial-ssrf_fe52a8b30685643f_116a5854", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
51
] | [
null
] | [
9
] | [
112
] | |
2024-11-19T01:34:46.822079+00:00 | 1,456,540,050,000 | 878980bd0ecad0585c6d03424efc60bfe418b9ee | 3 | {
"blob_id": "878980bd0ecad0585c6d03424efc60bfe418b9ee",
"branch_name": "refs/heads/master",
"committer_date": 1456540050000,
"content_id": "cd0c108cf240182ca4bfa7895c1eb5d7b3c5baad",
"detected_licenses": [
"MIT"
],
"directory_id": "9a2fbd12c156f0c59b6ba0c725aa6fc17747f997",
"extension": "py",
"fi... | 2.578125 | stackv2 | from flask import Flask
from flask import request
from flask import render_template
import subprocess
import time
import re
import csv
import datetime
# Create a temporary AP to harvest MAC Address
def createHotspot(wifiName):
# Set the interface to monitor mode
subprocess.call('ifconfig wlan0 down', shell=Tru... | 168 | 31.23 | 86 | 15 | 1,516 | python | [{"finding_id": "codeql_py/command-line-injection_0750f77ebab50806_5154c4b0", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 2 | true | [
"CWE-078",
"CWE-312"
] | [
"py/command-line-injection",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
21,
47
] | [
null,
null
] | [
22,
18
] | [
36,
26
] | |
2024-11-19T01:35:02.377331+00:00 | 1,632,184,119,000 | d4e868dffd51fb4b102cff8dfab27a84b822754d | 3 | {
"blob_id": "d4e868dffd51fb4b102cff8dfab27a84b822754d",
"branch_name": "refs/heads/main",
"committer_date": 1632184119000,
"content_id": "1025794a043bc827e0ff0a3f7762274af14fe37c",
"detected_licenses": [
"MIT"
],
"directory_id": "a83034e4dc46ddc25bfa19b3470534f77afa509c",
"extension": "py",
"file... | 2.859375 | stackv2 | import requests
import pprint
pre_key = "?api_key="
api_key = #CHECK REPO FOR STEPS TO GET YOUR OWN API_KEY
api_base_url = "https://na1.api.riotgames.com"
summonerName = input("Enter the summoner name of the in-game player: ")
summoner_endpoint_path = f"/lol/summoner/v4/summoners/by-name/{summonerName}"
summoner_end... | 51 | 29.16 | 110 | 16 | 470 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d11e78af38f2b15e_ce78a948", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
38
] | [
null
] | [
7
] | [
16
] | |
2024-11-19T01:55:45.696090+00:00 | 1,635,200,572,000 | a77408ba57313679354905c5d982616118956057 | 3 | {
"blob_id": "a77408ba57313679354905c5d982616118956057",
"branch_name": "refs/heads/main",
"committer_date": 1635200572000,
"content_id": "e18b149354f5e2b3864317e44d6d91a6a66f2de0",
"detected_licenses": [
"MIT"
],
"directory_id": "7fc239a423a5ba7011f0f0f374878705f2b28da1",
"extension": "py",
"file... | 3 | stackv2 | """Downloads all laws from the Albanian website."""
from datetime import date
import json
from os import path
from pathlib import Path
import re
from bs4 import BeautifulSoup
import requests
# Cherian wuz here
START_URL = 'https://euralius.eu/index.php/en/library/albanian-legislation/category/360-laws'
BASE_URL = 'h... | 96 | 32.71 | 99 | 15 | 750 | python | [{"finding_id": "codeql_py/overly-large-range_1239842c06d0ff23_9ec82464", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
27
] | [
null
] | [
92
] | [
95
] | |
2024-11-19T02:17:17.121898+00:00 | 1,553,093,976,000 | 5f61748c9cbc52372d9820b386361305661303c1 | 2 | {
"blob_id": "5f61748c9cbc52372d9820b386361305661303c1",
"branch_name": "refs/heads/master",
"committer_date": 1553093976000,
"content_id": "5d748496632ded2d8a226510098bc2376c06daeb",
"detected_licenses": [
"Apache-2.0",
"BSD-3-Clause",
"BSD-2-Clause",
"Python-2.0"
],
"directory_id": "84f9... | 2.390625 | stackv2 | #!/usr/bin/env python
# coding:utf-8
# N.B. : Some of these docstrings are written in reSTructured format so that
# Sphinx can use them directly with fancy formatting.
"""
This module defines a REST API for the multimedia storage system as defined by
the CANARIE API specification. See :
https://collaboration.canarie.... | 177 | 36.1 | 79 | 17 | 1,385 | python | [{"finding_id": "codeql_py/log-injection_299acdfd9c47640f_deeef6b0", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
125
] | [
126
] | [
21
] | [
35
] | |
2024-11-19T02:17:38.898234+00:00 | 1,488,140,659,000 | a172f96b0af897cef970cc22da7c19969bc2852a | 3 | {
"blob_id": "a172f96b0af897cef970cc22da7c19969bc2852a",
"branch_name": "refs/heads/master",
"committer_date": 1488140659000,
"content_id": "f25f6c30f0e1df3c531bb7e6f4ac347761cc5ed6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "89029bd0c3e069603c199e596bc0f045c6190bef",
"extension": "py"... | 3.015625 | stackv2 | import MySentenceStemmer
from nltk.corpus import stopwords
import MyConvertUnicode
import re
#
# Remove stop words
# Stem using (MySentenceStemmer)
# Convert unicode
# convert all words into lower case
# do not take words mix with symbols etc.
class MyTextPreProcess:
def __init__(self):
self.convert = MyConve... | 38 | 24.45 | 79 | 15 | 294 | python | [{"finding_id": "codeql_py/redos_cc0347237e9dd2c8_63779957", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetition... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetitions of '0'."
] | [
28
] | [
null
] | [
26
] | [
35
] | |
2024-11-19T02:29:53.992315+00:00 | 1,643,135,593,000 | ff2f940559a30d6bcd4fe802547700df6ae7c096 | 4 | {
"blob_id": "ff2f940559a30d6bcd4fe802547700df6ae7c096",
"branch_name": "refs/heads/master",
"committer_date": 1643135593000,
"content_id": "0106c923c69eaceea91933e0f8013ffe25dd4883",
"detected_licenses": [
"MIT"
],
"directory_id": "f0db8faa9412731ff59afc48942981e39607b7d2",
"extension": "py",
"fi... | 4.1875 | stackv2 | #!/usr/bin/env python3
"""
Program to demonstrate Basics of Input/Output
"""
# Importing Modules
import datetime
# Calculating the date
todays_date = datetime.datetime.now()
today = todays_date.strftime('%c')
first = "First's"
last = 'Last"s'
# print(f'Contains both Single and Double Quotes: {first} {last}')
... | 36 | 25.39 | 66 | 9 | 214 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8a4dc3d3f7fbadee_f283f389", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
33,
34
] | [
null,
null
] | [
7,
7
] | [
29,
28
] | |
2024-11-19T02:29:55.805616+00:00 | 1,607,364,880,000 | 40f45aed355c8a95f9b4bc8a68debab49be12aa3 | 2 | {
"blob_id": "40f45aed355c8a95f9b4bc8a68debab49be12aa3",
"branch_name": "refs/heads/master",
"committer_date": 1607364883000,
"content_id": "f27583a71c460fff5477a0535a29dc6820383710",
"detected_licenses": [
"MIT"
],
"directory_id": "07d84be7ee8a75136faa118fa2ade3455d765889",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/env python
"""\
Tabhouse
A site to find quality guitar tabs.
"""
from datetime import datetime
from logging import error, info
from logging.config import dictConfig
from urllib import urlencode
from flask import (Flask, g, request, render_template, redirect, url_for,
jsonify)
from raven.contrib.flask i... | 85 | 27.87 | 155 | 15 | 619 | python | [{"finding_id": "codeql_py/log-injection_f4d857daf99f7c0a_e0be9fb2", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 5 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
62,
65,
73,
73,
79
] | [
null,
null,
null,
null,
null
] | [
20,
43,
59,
72,
100
] | [
21,
44,
70,
88,
116
] | |
2024-11-19T02:30:01.700938+00:00 | 1,505,931,456,000 | b41b853abf4c934a796059d2b12b02da60d73904 | 2 | {
"blob_id": "b41b853abf4c934a796059d2b12b02da60d73904",
"branch_name": "refs/heads/master",
"committer_date": 1505931456000,
"content_id": "86c5a5cff2bbeff3c33823568eca0c24e5fba01d",
"detected_licenses": [
"MIT"
],
"directory_id": "ec198dc6ad14be07d4e628414ebfdc9d8ad9a1fa",
"extension": "py",
"fi... | 2.390625 | stackv2 | """
@package api
Case Vaults Query API Controllers
These API will be called by the central hub
"""
import sys
import asyncio
import aiohttp
import async_timeout
import retrying
import json
import ssl
from api import log
from flask import Blueprint, jsonify, request, g
from api.database import CaseVaultCollection
from... | 115 | 24.27 | 136 | 20 | 662 | python | [{"finding_id": "codeql_py/partial-ssrf_c7341bf8fc02aae6_96d62ba3", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
114
] | [
null
] | [
20
] | [
121
] | |
2024-11-19T02:30:07.873361+00:00 | 1,641,935,650,000 | 813aab676df71c8a7a725dc2e0d2937d69072814 | 2 | {
"blob_id": "813aab676df71c8a7a725dc2e0d2937d69072814",
"branch_name": "refs/heads/master",
"committer_date": 1641935650000,
"content_id": "9f8b4a97cc6a92ab321f2bf74135e32710491f70",
"detected_licenses": [
"MIT"
],
"directory_id": "44cd8296bf02274fcce4604a0bce7e79c8b5ba00",
"extension": "py",
"fi... | 2.390625 | stackv2 | from flask import request, url_for, jsonify
from flask_api import FlaskAPI, status, exceptions
from models import sessions
from datetime import datetime
from models import notes
from bson import ObjectId
app = FlaskAPI(__name__)
@app.route('/active_sessions', methods=['GET'])
def active_sessions():
redis = sessi... | 64 | 21.2 | 62 | 13 | 335 | python | [{"finding_id": "codeql_py/flask-debug_7ac251632e9e6a00_9bd6d3b0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
64,
34,
47
] | [
null,
null,
null
] | [
5,
16,
16
] | [
51,
45,
20
] | |
2024-11-19T02:30:10.370602+00:00 | 1,590,926,149,000 | 5a7cab64d18b5aaff3567cfc8c17897729dd3f59 | 3 | {
"blob_id": "5a7cab64d18b5aaff3567cfc8c17897729dd3f59",
"branch_name": "refs/heads/master",
"committer_date": 1590926149000,
"content_id": "845fbf30dc32e7eb49261b4cc7def4ae9e71f9cb",
"detected_licenses": [
"MIT"
],
"directory_id": "028f73e0ff424a8527291474fff68f73ed9e0174",
"extension": "py",
"fi... | 2.546875 | stackv2 | import pymongo
import os
import sqlite3
from dotenv import load_dotenv
load_dotenv()
conn = sqlite3.connect(os.path.join(os.path.dirname(
__file__), 'rpg_db.sqlite3'))
curs = conn.cursor()
mongo_username = os.getenv('mongo_username')
mongo_password = os.getenv('mongo_password')
mongo_host = os.getenv('mongo_host... | 135 | 30.36 | 112 | 11 | 1,105 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2c45c705af52c77a_12b76bef", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
17
] | [
null
] | [
5
] | [
101
] | |
2024-11-19T02:41:45.246933+00:00 | 1,693,416,671,000 | dedbc8b80f6302583cd331e841a0aef3c9525742 | 3 | {
"blob_id": "dedbc8b80f6302583cd331e841a0aef3c9525742",
"branch_name": "refs/heads/master",
"committer_date": 1693416671000,
"content_id": "24f86e640455c533df5822208223aca802abab95",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "2337351b228818e41be3002bd38f68f77c2aa074",
"extension": "p... | 2.625 | stackv2 | # ----------------------------------------------------------------------
# Crypto-related snippets
# ----------------------------------------------------------------------
# Copyright (C) 2007-2020 The NOC Project
# See LICENSE for details
# ----------------------------------------------------------------------
# Pyth... | 90 | 32.11 | 118 | 16 | 871 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_f99a796b2d81f4a8_48b9caff", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
60
] | [
null
] | [
22
] | [
42
] | |
2024-11-19T02:41:51.761767+00:00 | 1,687,708,541,000 | b12b9980d8ec2b640072cf3489802adfeb13e909 | 2 | {
"blob_id": "b12b9980d8ec2b640072cf3489802adfeb13e909",
"branch_name": "refs/heads/main",
"committer_date": 1687708541000,
"content_id": "72461575a9fbc7f9627fddb4bc38e9b0366ac3e7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9a3a5b08d61e4b2148c4a28d8ae0f9f2ae36fb1a",
"extension": "py",
... | 2.328125 | stackv2 | # Copyright (c) Istituto Nazionale di Fisica Nucleare (INFN). 2019-2020
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required ... | 153 | 36.51 | 140 | 16 | 1,266 | python | [{"finding_id": "codeql_py/request-without-cert-validation_d20dca1b97e9b169_db41ce97", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
31
] | [
null
] | [
20
] | [
69
] | |
2024-11-19T02:41:52.344831+00:00 | 1,589,236,487,000 | dd0249711c7faee4e854e81a894373f0bf16fe52 | 3 | {
"blob_id": "dd0249711c7faee4e854e81a894373f0bf16fe52",
"branch_name": "refs/heads/master",
"committer_date": 1589236487000,
"content_id": "3c0b5260fa59db278f7251e0a68f168ad6028c12",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fd593378f42d2e73fa3b00921901f0f0b784fb6a",
"extension": "py"... | 2.546875 | stackv2 | import ftplib
#ftp cracker by wigans victor
#twitter account: @victorwigansH
#email:wigansvictor@gmail.com
#opensource code
print("---------------------------------------------")
print("--- VICTOR WIGANS BRUTE FORCE FTP CRACKER ---")
print("---------------------------------------------")
print("\n")
print("Follo ... | 59 | 21.75 | 64 | 13 | 391 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ffe516d83f4cd0aa_c24d3344", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
35,
49
] | [
null,
null
] | [
7,
19
] | [
13,
32
] | |
2024-11-18T18:16:12.501135+00:00 | 1,607,011,154,000 | 8dc83c4501527a3635fddbd2f9da9f4b3cd44660 | 3 | {
"blob_id": "8dc83c4501527a3635fddbd2f9da9f4b3cd44660",
"branch_name": "refs/heads/master",
"committer_date": 1607011154000,
"content_id": "6893ee6b0c64ce2f79a17f3168a24c997e1c8d0c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "98ec89cb5b180493ecb39d2d96229038d00a9745",
"extension": "py"... | 2.53125 | stackv2 | # coding=utf-8
import requests
import re
import os
import json
import time
class Getlinks(object):
def __init__(self, url):
self.url = url
self.headers = {
'User-Agent': "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.87 Safari/537.36"... | 185 | 30.82 | 142 | 20 | 1,617 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_e7a0ff879ee1d406_13970b0e", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'ygdy8.com/html/gndy/', so it might ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'ygdy8.com/html/gndy/', so it might match more hosts than expected."
] | [
59
] | [
null
] | [
42
] | [
85
] | |
2024-11-18T18:59:39.652834+00:00 | 1,505,417,848,000 | 900289243d57be9a731c6792f20eb9fbc94c3e0f | 2 | {
"blob_id": "900289243d57be9a731c6792f20eb9fbc94c3e0f",
"branch_name": "refs/heads/master",
"committer_date": 1505417848000,
"content_id": "d0d6f0f4b87c8bf9ec9df3e52407952f2e02ad93",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d80b76f8e0b6d978f278b432199785871e803e64",
"extension": "py"... | 2.484375 | stackv2 | #!/usr/bin/env python
import urllib
import json
import os
from flask import Flask
from flask import request
from flask import make_response
# Flask app should start in global layout
app = Flask(__name__)
@app.route('/webhook', methods=['POST'])
def webhook():
req = request.get_json(silent=True, force=True)
... | 80 | 33.61 | 173 | 20 | 663 | python | [{"finding_id": "codeql_py/flask-debug_f3a43771af556c85_0184a327", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
80,
26
] | [
null,
null
] | [
5,
23
] | [
51,
26
] | |
2024-11-18T18:59:41.336574+00:00 | 1,414,088,826,000 | 7f1c41557aaaca73752f4f4bec5a6562d42f1bd2 | 2 | {
"blob_id": "7f1c41557aaaca73752f4f4bec5a6562d42f1bd2",
"branch_name": "refs/heads/master",
"committer_date": 1414088826000,
"content_id": "b3c9106a7ddab7f420abbb190ae99cf123600aad",
"detected_licenses": [
"MIT"
],
"directory_id": "4595499ebe2a857735ed47dd1418bd9fac7843ce",
"extension": "py",
"fi... | 2.375 | stackv2 | #!/usr/bin/env python3
from flask import Flask, jsonify, render_template, request, current_app
import schemepy
import schemepy.reader as rd
import schemepy.evaluator as ev
import imp
import time
import sys
sys.setrecursionlimit(100000)
DEBUG = True
SECRET_KEY = '$(secret_key)'
app = Flask(__name__)
app.config.from_ob... | 61 | 23.02 | 71 | 12 | 335 | python | [{"finding_id": "codeql_py/stack-trace-exposure_e4de1b7a4e176b85_b86390e2", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
38,
50,
61
] | [
null,
null,
null
] | [
27,
27,
5
] | [
30,
30,
24
] | |
2024-11-18T19:11:49.184996+00:00 | 1,565,375,507,000 | e66d1ef676a9d487a59a5df6b2893473ef8fe688 | 3 | {
"blob_id": "e66d1ef676a9d487a59a5df6b2893473ef8fe688",
"branch_name": "refs/heads/master",
"committer_date": 1565375507000,
"content_id": "0b9d1e65cba4d20a5419b2e48bf83e3753a13c7d",
"detected_licenses": [
"MIT"
],
"directory_id": "dd63ac24f975649208233685218246a425c073ce",
"extension": "py",
"fi... | 3.375 | stackv2 | #!/usr/bin/env python
"""
pw_chckr.py - Checks the password strength using a REST API call to www.passable.io
Copyright (c) 2017 World Wide Technology, Inc.
All rights reserved.
author: "joel.king@wwt.com (@joelwking)"
written: 23 May 2016
description:
This program checks the vulnera... | 125 | 31.82 | 120 | 19 | 977 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_13bf5cbacd2699b7_a9c13b15", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-295"
] | [
"py/weak-sensitive-data-hashing",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"This request may run without certificate validation because [it is disabled](1)."
] | [
75,
95
] | [
null,
null
] | [
16,
13
] | [
26,
61
] | |
2024-11-18T19:23:57.237808+00:00 | 1,594,738,172,000 | ab1d07c9c96d87f8674b417ac0b7e529aeef92bd | 3 | {
"blob_id": "ab1d07c9c96d87f8674b417ac0b7e529aeef92bd",
"branch_name": "refs/heads/master",
"committer_date": 1594738172000,
"content_id": "6601fca00c94547ec08b3f3efa8dca2ea027deda",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "12bae15732e1b78e33628d5edae38bbf464c354d",
"extension": "py"... | 2.515625 | stackv2 | from selenium import webdriver
import requests,os,time,re
try:
os.mkdir("çalınanlartxt")
except OSError:
print("")
queryparameter = input("Anahtar Kelime : ")
print("Tarama İşlemi Başlatılıyor")
chrome_options = webdriver.ChromeOptions()
chrome_options.add_argument("--headless")
chrome = webdriver.Chrome(option... | 49 | 47.08 | 169 | 18 | 760 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_cdafb7d0269cd86d_0ffd1e37", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://throwbin.io](1) may be at an arbitrary positio... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [https://throwbin.io](1) may be at an arbitrary position in the sanitized URL."
] | [
25
] | [
null
] | [
8
] | [
51
] | |
2024-11-18T19:58:20.506031+00:00 | 1,564,334,988,000 | f29a6aa42d79f615b4acb5f66ae0effb04046315 | 3 | {
"blob_id": "f29a6aa42d79f615b4acb5f66ae0effb04046315",
"branch_name": "refs/heads/master",
"committer_date": 1564334988000,
"content_id": "575d94dbf0937e3bf2ee5e83a26a37b09aa88569",
"detected_licenses": [
"MIT"
],
"directory_id": "5ef476b1342ec84036d867308a5b3a07fc8a7b63",
"extension": "py",
"fi... | 3.3125 | stackv2 | import urllib.request
import json
def characters_get():
""" Gets character list from the rickandmorty API """
url = 'https://rickandmortyapi.com/api/character/'
resp = urllib.request.urlopen(url)
data = json.loads(resp.read().decode())
#print(data)
return data
def characters_save(data, file_... | 49 | 25.65 | 83 | 15 | 340 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_f2008426b3d517a3_7baecb5f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
18
] | [
26
] | [
24
] | [
14
] | |
2024-11-18T19:58:34.460083+00:00 | 1,599,559,903,000 | 70d37eb0dbdc99ebbb121afbe31e5bb7d7113cc1 | 2 | {
"blob_id": "70d37eb0dbdc99ebbb121afbe31e5bb7d7113cc1",
"branch_name": "refs/heads/master",
"committer_date": 1599559903000,
"content_id": "c44e1f29f9566c13b3f8816e2b7ebaad2d4aaddd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e26be7519d530377db3b31da291cee026b314137",
"extension": "py"... | 2.390625 | stackv2 | import logging
from flask import Blueprint, current_app, send_from_directory
bp = Blueprint("serving", __name__)
log = logging.getLogger(__name__)
# Caching: We want the browser to always check if the index.html file it has
# is the latest one. Also we want this check to use the ETag header and not
# the Last-Modif... | 27 | 32.37 | 76 | 10 | 219 | python | [{"finding_id": "codeql_py/log-injection_825ab3c856cd6b54_13dfad6c", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
23
] | [
null
] | [
58
] | [
62
] | |
2024-11-18T19:58:37.543849+00:00 | 1,607,018,482,000 | ea3f7baf759ed8563f65b8f82bcd362287d95517 | 3 | {
"blob_id": "ea3f7baf759ed8563f65b8f82bcd362287d95517",
"branch_name": "refs/heads/main",
"committer_date": 1607018482000,
"content_id": "1251366e0d998b01683aee1c219aa5afed03e9c6",
"detected_licenses": [
"MIT"
],
"directory_id": "3e352bd226ddd11ef6dc3d0bf3507c83975bea98",
"extension": "py",
"file... | 2.75 | stackv2 | import json
import os
from google.auth.transport import requests
from google.oauth2 import id_token
from requests_oauthlib import OAuth1Session
class SocialValidation:
"""Social validation"""
@staticmethod
def google_auth_validation(access_token):
"""
Provides support for verifying `Open... | 54 | 30.22 | 100 | 16 | 330 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c9449342a394087b_3539a8d6", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [accounts.google.com](1) may be at an arbitrary positio... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [accounts.google.com](1) may be at an arbitrary position in the sanitized URL."
] | [
50
] | [
null
] | [
16
] | [
54
] | |
2024-11-18T19:34:26.684737+00:00 | 1,497,620,021,000 | 4a7c779f193c1529181bb2ed7b2a7f511538eaa3 | 2 | {
"blob_id": "4a7c779f193c1529181bb2ed7b2a7f511538eaa3",
"branch_name": "refs/heads/master",
"committer_date": 1497620021000,
"content_id": "2ea924fa8e4d92723acd9c59c03e8c720fe8aae7",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "be4b394066275072f995a6fa90fd0e9adb68371d",
"extension": "p... | 2.359375 | stackv2 | import hashlib
from django.db import models
from django.utils.translation import ugettext_lazy as _
from orchestra.core import validators
from . import settings
class Database(models.Model):
""" Represents a basic database for a web application """
MYSQL = 'mysql'
POSTGRESQL = 'postgresql'
nam... | 82 | 32.46 | 92 | 17 | 571 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_383ab887741db54f_c53a6dff", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
78
] | [
null
] | [
35
] | [
59
] | |
2024-11-18T18:39:32.757565+00:00 | 1,540,588,181,000 | 12be3df4e946ac8f5ceeabf061c1f1152ff7ed55 | 3 | {
"blob_id": "12be3df4e946ac8f5ceeabf061c1f1152ff7ed55",
"branch_name": "refs/heads/master",
"committer_date": 1540588181000,
"content_id": "1bea7ae98c010ebbc2b29f4230971e19281b17e1",
"detected_licenses": [
"MIT"
],
"directory_id": "f7e02915cff671abb3cd1967e8b3d1744b31ce35",
"extension": "py",
"fi... | 2.875 | stackv2 | # begin the table
f = open('theanswer.txt','w')
print("<table>", file=f)
# column headers
# print("<th>", file=f)
# print("<td>Last Name</td>", file=f)
# print("<td>First Name</td>", file=f)
# print("<td>Year</td>", file=f)
# print("<td>Graduation Year</td>", file=f)
# print("<td>Position</td>", file=f)
# print("<td>... | 55 | 26.96 | 45 | 9 | 510 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_82bb468b83f89135_c00095a8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
46
] | [
null
] | [
11
] | [
35
] | |
2024-11-18T18:39:42.342910+00:00 | 1,688,039,474,000 | e7f6bd1f4f212e34c4559b0c9f67d707c4bb6009 | 3 | {
"blob_id": "e7f6bd1f4f212e34c4559b0c9f67d707c4bb6009",
"branch_name": "refs/heads/master",
"committer_date": 1688039474000,
"content_id": "257924163232ef01d52ab8985fa62dfc494fb19b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fedc097c85f12de797d4becd31de47f80013a488",
"extension": "py"... | 2.890625 | stackv2 | '''
Created on Jun 27, 2016
@author: dj
'''
from os import path
from urllib import request as urlrequest
import requests
# The default API key for demo purpose.
api_key = "demo"
input_file_path = "../../../../Temp"
api_key_file = "AlphaVantage_ApiKey.txt"
input_file = path.join(input_file_path, api_key_file)
if p... | 61 | 22.13 | 104 | 12 | 376 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e8083c5a965178ca_f8027f5d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 7 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive dat... | [
24,
34,
49,
52,
54,
55,
57
] | [
null,
null,
null,
null,
null,
null,
null
] | [
28,
20,
20,
21,
29,
26,
26
] | [
35,
23,
23,
25,
41,
37,
35
] | |
2024-11-18T18:39:48.259654+00:00 | 1,605,803,304,000 | 78b47abca3b7d2754e8af5abd6228f4150f1fcef | 2 | {
"blob_id": "78b47abca3b7d2754e8af5abd6228f4150f1fcef",
"branch_name": "refs/heads/master",
"committer_date": 1605803304000,
"content_id": "df8165d4d2f9c8d18570b960b7b6086ddded45b2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cb92ae7d588ede5ee3c914699bcb9d56b245257f",
"extension": "py"... | 2.484375 | stackv2 | import tkinter as tk
from tkinter import filedialog
from fpdf import FPDF
from os.path import isfile
import json
import datetime
from random import randrange
import re
test_path = "E:\\Files\\Programming\\FbMessengerToPDF\\data\\messages\\inbox\\AliseGilot_A6kYU9nD4A"
# colors = {'name':[fillColor[],drawColor[],textC... | 96 | 32.43 | 126 | 17 | 980 | python | [{"finding_id": "codeql_py/overly-large-range_0eb4a935adb81d81_be091384", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range ... | [
49,
49,
49,
49
] | [
null,
null,
null,
null
] | [
30,
33,
36,
45
] | [
34,
37,
40,
49
] | |
2024-11-18T18:39:57.334094+00:00 | 1,412,730,780,000 | ac2306a90027398a6f312e0dfc49f1628baddf9f | 3 | {
"blob_id": "ac2306a90027398a6f312e0dfc49f1628baddf9f",
"branch_name": "refs/heads/master",
"committer_date": 1412730780000,
"content_id": "12d0eeba4c467be2233a70f1a54d54895e26556a",
"detected_licenses": [
"Unlicense"
],
"directory_id": "a7e2cbfbd10fcc1a952a94ce52819687918b7f0e",
"extension": "py",... | 2.640625 | stackv2 | import os, datetime
import re
from flask import Flask, request, render_template, redirect, abort, flash, json
from unidecode import unidecode
# mongoengine database module
from flask.ext.mongoengine import MongoEngine
app = Flask(__name__) # create our flask app
app.config['CSRF_ENABLED'] = True
app.config['SECRE... | 324 | 20.4 | 94 | 16 | 1,891 | python | [{"finding_id": "codeql_py/url-redirection_78ab7500958e4794_f39cfb3a", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 4 | true | [
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
133,
141,
168,
176
] | [
null,
null,
null,
null
] | [
19,
19,
19,
19
] | [
35,
35,
35,
35
] | |
2024-11-18T18:47:03.389600+00:00 | 1,516,944,526,000 | 78f3fa3ceadcd4d4dd789380f2b26d6507983ce9 | 4 | {
"blob_id": "78f3fa3ceadcd4d4dd789380f2b26d6507983ce9",
"branch_name": "refs/heads/master",
"committer_date": 1516944526000,
"content_id": "76657929000dc08822192882fd7fec57f81b9e7d",
"detected_licenses": [
"MIT"
],
"directory_id": "1031eadac1f662149388e4d889f3d86dbce295aa",
"extension": "py",
"fi... | 4.4375 | stackv2 | # Hangman script with modularization
# Import the random library
import random
def get_secret_word():
# function that chooses a random secret word from a list
words = ["light", "electric", "shock", "wire", "round", "circuit", "voltage", "white", "pieces",
"yellow", "science", "engineering", "war... | 122 | 28.65 | 122 | 11 | 855 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bb2c1b5e86e1ed73_6fa8c6d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](... | [
40,
78,
108,
109
] | [
null,
null,
null,
null
] | [
39,
28,
37,
44
] | [
50,
48,
47,
51
] | |
2024-11-18T18:47:04.046716+00:00 | 1,598,111,330,000 | 614776a20828434f360678dcfd445930a95e2ad0 | 3 | {
"blob_id": "614776a20828434f360678dcfd445930a95e2ad0",
"branch_name": "refs/heads/master",
"committer_date": 1598111330000,
"content_id": "07b55a20b6669b33dc6b0096e9a4d796ad15ee8a",
"detected_licenses": [
"MIT"
],
"directory_id": "0558c1d8186aaeabcc8deb0361fc2a939ec9a12a",
"extension": "py",
"fi... | 2.734375 | stackv2 | #!/usr/bin/python3
#Imports the 'random' Builtin Module
import random
import pyperclip
from random import choice
from pyperclip import copy
import tqdm
from tqdm import *
import time
import colored
from colored import fg,bg,attr
characters = list("abcdefghijk!@#$%^&*()lmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ~`_+d|\<... | 67 | 28.3 | 98 | 15 | 579 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e24ef0245ea96370_1dcf6c30", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
50
] | [
null
] | [
15
] | [
33
] | |
2024-11-18T19:10:01.006728+00:00 | 1,558,327,967,000 | f7d23cbdf3a5425b81f7ad4aec16f672732deef1 | 3 | {
"blob_id": "f7d23cbdf3a5425b81f7ad4aec16f672732deef1",
"branch_name": "refs/heads/master",
"committer_date": 1558327967000,
"content_id": "7ab5254d258343fd58485add0c6a4bc5d72a8775",
"detected_licenses": [
"MIT"
],
"directory_id": "afd99f08f48b3487862ba90e89a34b982cf64a2f",
"extension": "py",
"fi... | 2.828125 | stackv2 | # -*- coding: utf-8 -*-
'''
Created on 2019年01月07日
@author: Zhukun Luo
Jiangxi university of finance and economics
'''
import os
import sys
import numpy as np
PATH = "/home/agnostic/Workspaces/MyEclipse CI/Spark-machine-learning/chapter04/data"
from pyspark import SparkContext
from pyspark import SparkConf
from pyspa... | 88 | 33.93 | 85 | 13 | 863 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4179807b7a6a8e63_a890373a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
40
] | [
null
] | [
7
] | [
18
] | |
2024-11-18T19:10:01.197637+00:00 | 1,693,417,914,000 | 94c9e8258b80005a6a8a82b64cfb8f619422df22 | 3 | {
"blob_id": "94c9e8258b80005a6a8a82b64cfb8f619422df22",
"branch_name": "refs/heads/master",
"committer_date": 1693417914000,
"content_id": "ecc1b21d6ff3d1243eecfc74580090f1b6a93feb",
"detected_licenses": [
"CC0-1.0",
"MIT"
],
"directory_id": "71acb7214efd91c0d327f6d8958e1798eadb4401",
"extensio... | 2.65625 | stackv2 | import re
import scrapy
from locations.hours import OpeningHours
from locations.items import Feature
class FiveBelowSpider(scrapy.Spider):
name = "five_below"
item_attributes = {"brand": "Five Below", "brand_wikidata": "Q5455836"}
allowed_domains = ["locations.fivebelow.com"]
start_urls = ("https://... | 83 | 42.82 | 107 | 17 | 791 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_4e47f468af001b68_d14f7233", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'fivebelow.com/', so it might match ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'fivebelow.com/', so it might match more hosts than expected."
] | [
18
] | [
null
] | [
30
] | [
65
] | |
2024-11-18T19:49:10.051829+00:00 | 1,682,070,135,000 | a26768d353ae4108dacb90cea8948d574ba6d885 | 3 | {
"blob_id": "a26768d353ae4108dacb90cea8948d574ba6d885",
"branch_name": "refs/heads/master",
"committer_date": 1682070135000,
"content_id": "4ea2ee85bc71a9284d5e6be019dee1d2d9c6569a",
"detected_licenses": [
"MIT"
],
"directory_id": "3995c0c9517ff5c8e8b8d449add8c059b66c29d9",
"extension": "py",
"fi... | 2.625 | stackv2 | """This module deals with handling the representation of metadata formats for OAI"""
import re
from lxml import etree
NS_OAIPMH = 'http://www.openarchives.org/OAI/2.0/'
NS_XSI = 'http://www.w3.org/2001/XMLSchema-instance'
NS_OAIDC = 'http://www.openarchives.org/OAI/2.0/oai_dc/'
NS_DC = "http://purl.org/dc/elements/1.... | 85 | 34.51 | 127 | 16 | 844 | python | [{"finding_id": "codeql_py/overly-large-range_3aba68d18d77ba1b_eae3e087", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class."
] | [
49
] | [
null
] | [
53
] | [
56
] | |
2024-11-18T20:15:47.943654+00:00 | 1,595,948,986,000 | 321633b2c4c76cfb03304bdbdc8d890d1c6bd7fc | 3 | {
"blob_id": "321633b2c4c76cfb03304bdbdc8d890d1c6bd7fc",
"branch_name": "refs/heads/master",
"committer_date": 1595948986000,
"content_id": "ada087ed5d716cc5be86da3a31e188c69ac57de7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b0b8ad28d81d7fd9ba5fbd6ecbc7c8ee2f6391b0",
"extension": "py"... | 2.75 | stackv2 | import uuid
from flask import Blueprint, render_template, request, flash, redirect, url_for,current_app
from app.forms import RegisterForm, LoginForm,UploadForm,RePassWord,ChangeEmail,RecoverPassword,RestePassword
from app.models import Users
from app.extensions import db,photos
from app.email import send_mail
from fl... | 206 | 32.55 | 119 | 17 | 1,773 | python | [{"finding_id": "codeql_py/url-redirection_863b948e4f628166_07a37b9b", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
59
] | [
null
] | [
29
] | [
78
] | |
2024-11-18T20:15:51.125454+00:00 | 1,480,549,145,000 | d527bd3548c2a110d3daa66fca550ec3dfe881fb | 3 | {
"blob_id": "d527bd3548c2a110d3daa66fca550ec3dfe881fb",
"branch_name": "refs/heads/master",
"committer_date": 1480549145000,
"content_id": "f1b0bf5e9b816585829cb46b3dca09b7963e3e63",
"detected_licenses": [
"MIT"
],
"directory_id": "af3103cde939e5922c0233e889bd6233c7790c57",
"extension": "py",
"fi... | 2.890625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
# title :miscron.py
# description : Runs commands to a server
# author :Chris Sprance / Entrada Interactive
# usage : This script is CLI for server administaration to run it from a command line do:
# misrcon.py -i [ip] --port [admin port] -p... | 129 | 40.05 | 114 | 16 | 1,281 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6bec786eece29627_4e0ec245", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
90
] | [
null
] | [
27
] | [
62
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.