added string | created int64 | id string | int_score int64 | metadata dict | score float64 | source string | text string | num_lines int64 | avg_line_length float64 | max_line_length int64 | ast_depth int64 | length int64 | lang string | sast_codeql_findings string | sast_codeql_findings_count int64 | sast_codeql_success bool | sast_codeql_error string | cwe_ids list | rule_ids list | confidences list | severities list | messages list | line_starts list | line_ends list | column_starts list | column_ends list |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T20:26:56.617264+00:00 | 1,483,634,444,000 | 0d9fbc7ad4ccad1128aed87c28d408244e5c7def | 2 | {
"blob_id": "0d9fbc7ad4ccad1128aed87c28d408244e5c7def",
"branch_name": "refs/heads/master",
"committer_date": 1483634444000,
"content_id": "0e6bb7e73f9e3c578deeb0e910622d133398ce26",
"detected_licenses": [
"MIT"
],
"directory_id": "584726bafeacc7a48c448e9d40649a8faeeacac6",
"extension": "py",
"fi... | 2.453125 | stackv2 | import pywikibot
import traceback
import re
from .subject import Subject
from ....cache.redis_cache import RedisCache
from ....util.translate_util import seealsoer, sortcat, catadder, dater, translator, get_lang
from jinja2 import Template
from collections import defaultdict, OrderedDict
from pywikibot.textlib import... | 125 | 42.58 | 120 | 20 | 1,416 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_85541640adc98699_5795abff", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25
] | [
null
] | [
20
] | [
64
] | |
2024-11-18T20:52:03.508874+00:00 | 1,631,095,385,000 | c0a376266a6292cd7290b4f6f28daa8f7a2edbac | 3 | {
"blob_id": "c0a376266a6292cd7290b4f6f28daa8f7a2edbac",
"branch_name": "refs/heads/master",
"committer_date": 1631095437000,
"content_id": "9c6e78e9d0123e390e6d2c2cd4af48c3b90f8eeb",
"detected_licenses": [
"MIT"
],
"directory_id": "ffa9ca3a9eaeb0abe750ad7a7ace717651474e27",
"extension": "py",
"fi... | 2.75 | stackv2 | #!/usr/bin/python3
# Scripts for the evaluation of accuracies on MuST-SHE.
# If using, please consider citing:
# - M. Gaido, B. Savoldi et al., "Breeding Gender-aware Direct Speech Translation Systems", COLING 2020
# Version: 1.0
import argparse
import csv
def sentence_level_scores(in_f, tsv_f):
sentences = []
... | 142 | 42.99 | 117 | 18 | 1,333 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1e3788a547102329_2db3f6be", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text."
] | [
116
] | [
null
] | [
15
] | [
103
] | |
2024-11-18T20:52:14.202983+00:00 | 1,557,626,990,000 | 60df5c15a6852d59528fdee6a32b843fd2881584 | 3 | {
"blob_id": "60df5c15a6852d59528fdee6a32b843fd2881584",
"branch_name": "refs/heads/master",
"committer_date": 1557626990000,
"content_id": "43617d7b0744bb11a10c1692220434373c9ad5ec",
"detected_licenses": [
"MIT"
],
"directory_id": "0d4a32392bd5bef3faa621389f6b62cc914fd267",
"extension": "py",
"fi... | 2.5625 | stackv2 | from flask import Flask, g, render_template, request
import sqlite3, json
from flask import jsonify
import os
from functools import wraps
DATABASE = "./database.db"
# Create app
app = Flask(__name__)
app.config['DEBUG'] = True
app.config['SECRET_KEY'] = 'secret-key'
def auth_required(f):
@wraps(f)
def decorated(*... | 100 | 33.12 | 157 | 19 | 800 | python | [{"finding_id": "codeql_py/sql-injection_bb8986e299d12f79_eee8d195", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 3 | true | [
"CWE-089",
"CWE-089",
"CWE-089"
] | [
"py/sql-injection",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2).",
"This SQL query depends on a [user-provided value](1)."
] | [
62,
74,
95
] | [
null,
null,
null
] | [
25,
27,
21
] | [
157,
143,
81
] | |
2024-11-18T20:52:15.583680+00:00 | 1,588,403,009,000 | a21ad5c87393b1a53b7d48835aaf7eb5ac8245db | 3 | {
"blob_id": "a21ad5c87393b1a53b7d48835aaf7eb5ac8245db",
"branch_name": "refs/heads/master",
"committer_date": 1588403009000,
"content_id": "859ab28f2f2e2354915e3576f4131110720f8763",
"detected_licenses": [
"MIT"
],
"directory_id": "acef0dabbdc685c0c3119e666e26d438cb30cb8b",
"extension": "py",
"fi... | 3.125 | stackv2 | # --------------
##File path for the file
file_path
#Code starts here
def read_file(path):
file = open(path,'r')
sentence=file.readline()
file.close()
return sentence
sample_message=read_file(file_path)
print(sample_message)
#Code ends here
# --------------
#Code starts here
file_path_1
file_pat... | 151 | 17.09 | 70 | 12 | 725 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a65d752b5d8110de_253ba2c4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive dat... | [
38,
68,
97,
126,
140
] | [
null,
null,
null,
null,
null
] | [
7,
7,
7,
7,
7
] | [
19,
19,
19,
19,
17
] | |
2024-11-18T20:52:20.438510+00:00 | 1,692,016,061,000 | a1642e82e1afe6a6f6eab6434c94b4ebd9ed01f4 | 2 | {
"blob_id": "a1642e82e1afe6a6f6eab6434c94b4ebd9ed01f4",
"branch_name": "refs/heads/main",
"committer_date": 1692099260000,
"content_id": "b2f8f0c87970d0f56a47db7bc5029694afea5482",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "32d76924805a35549baee6ef5197c6e4e8be6849",
"extension": "py",
... | 2.34375 | stackv2 | """Package for making catalog of dataservices available in an API."""
import logging
import os
from typing import Any
from aiohttp import hdrs, web
from aiohttp_middlewares import cors_middleware, error_middleware
from dotenv import load_dotenv
import jwt
from multidict import MultiDict
from .resources.catalogs impor... | 89 | 32.4 | 90 | 14 | 643 | python | [{"finding_id": "codeql_py/log-injection_580dea947cc9c1f5_8167642a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)."
] | [
34
] | [
null
] | [
23
] | [
67
] | |
2024-11-18T20:52:26.400669+00:00 | 1,606,309,683,000 | 4539be0834df707f7a80731f49eb0964cc871e78 | 3 | {
"blob_id": "4539be0834df707f7a80731f49eb0964cc871e78",
"branch_name": "refs/heads/master",
"committer_date": 1606309683000,
"content_id": "37dcf065bfba56b5b1569f4559050677a012abf8",
"detected_licenses": [
"MIT"
],
"directory_id": "6587177426940819637c02bd9817af077bc32b88",
"extension": "py",
"fi... | 3.296875 | stackv2 | from info import Info
from user import User
import string
import random
def created_account(fname,lname,email):
new_user = User(fname,lname,email)
return new_user
def create_credentials(facebookp,emailp,instagrampas,twitterpas,facebookusername,instagramusername,twitusername):
new_cred = Info(facebookp,email... | 145 | 28.86 | 138 | 19 | 765 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1e698853c6803a0e_e2956e59", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
136
] | [
null
] | [
19
] | [
43
] | |
2024-11-18T19:02:38.795096+00:00 | 1,478,803,748,000 | d328658c683e53e5847d53861dde0023d1a527bd | 3 | {
"blob_id": "d328658c683e53e5847d53861dde0023d1a527bd",
"branch_name": "refs/heads/master",
"committer_date": 1478803748000,
"content_id": "6604d3d9f4f79214fb5d2713fb398bca42e3175c",
"detected_licenses": [
"MIT"
],
"directory_id": "5684739cad4faea795e5e624e8413a968fc63ec4",
"extension": "py",
"fi... | 2.59375 | stackv2 | __author__ = 'teemu kanstren'
import configparser
from file_data import FileData
from argparse import ArgumentParser
# pip install scp for paramiko
import paramiko
from scp import SCPClient
import os
import sys
#attribute names for configuration file
KEY_DESTINATION_IP="dst_ip"
KEY_DESTINATION_PORT="dst_port"
KEY_DES... | 341 | 39.66 | 177 | 18 | 3,135 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_6bad9419d110bc4e_9ed85ff3", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
58
] | [
null
] | [
5
] | [
65
] | |
2024-11-18T19:02:47.909377+00:00 | 1,675,884,890,000 | 4ce528e0eefe7742dc0a97e85b24a328a4d45789 | 2 | {
"blob_id": "4ce528e0eefe7742dc0a97e85b24a328a4d45789",
"branch_name": "refs/heads/master",
"committer_date": 1675884890000,
"content_id": "6f86689455d3442edc85dcb51d1d5db50f814c73",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "30b06187f8c6f30de84b8a93f24bce5562afa947",
"extension": "py"... | 2.5 | stackv2 | import requests
import json
import base64
def anycli(baseurl, cmd, cookie_header):
"""
Send cli commands supported on ArubaOS switch via REST API.
All configuration and execution commands in non-interactive mode are supported.
This is not supported for : crypto, copy, process-tracking, recopy, redo, r... | 128 | 35.73 | 115 | 14 | 1,125 | python | [{"finding_id": "codeql_py/request-without-cert-validation_317433541b6778e3_bdc560d6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
27,
84,
100
] | [
null,
85,
null
] | [
16,
21,
16
] | [
91,
45,
74
] | |
2024-11-18T19:02:50.643643+00:00 | 1,563,841,049,000 | f8a9f35238a4a3ead5238486593505d5481bded2 | 4 | {
"blob_id": "f8a9f35238a4a3ead5238486593505d5481bded2",
"branch_name": "refs/heads/master",
"committer_date": 1563841049000,
"content_id": "c8ba76318579e2cc7c634056058689d610e8df60",
"detected_licenses": [
"MIT"
],
"directory_id": "399d513e2be674688b6d007a58ab943db0432837",
"extension": "py",
"fi... | 3.75 | stackv2 | #Pass-stor: created by Lee Baldwin
#import python random module
#to generate random string
from random import sample
#by using a large number of characters
#we can create a much harder password
strchars = 'abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ_*+=!@#$%^&'
def pwdgen(pwdlen = 8, pwdnums = 1,... | 42 | 23.33 | 86 | 13 | 264 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d5e18b6ed714eb79_5861a7b4", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
38,
35
] | [
null,
null
] | [
16,
11
] | [
35,
23
] | |
2024-11-18T19:02:54.033755+00:00 | 1,618,866,631,000 | 019cf553fcf094e84300dd26f86111fce5f4438d | 2 | {
"blob_id": "019cf553fcf094e84300dd26f86111fce5f4438d",
"branch_name": "refs/heads/main",
"committer_date": 1618866631000,
"content_id": "d972269d20b9a6edb7d978d399147fd50856059d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2e9a8973728c2b4566596b0d8c78a8c32355e65a",
"extension": "py",
... | 2.46875 | stackv2 | """Resource module for resultat view."""
import logging
from aiohttp import web
import aiohttp_jinja2
from sprint_webserver.services import InnstillingerService
class Innstillinger(web.View):
"""Class representing the Innstillinger resource."""
async def get(self) -> web.Response:
"""Get route func... | 62 | 31.87 | 76 | 16 | 426 | python | [{"finding_id": "codeql_py/log-injection_ee39aafa06397269_51820541", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
53
] | [
null
] | [
23
] | [
70
] | |
2024-11-18T19:14:26.215154+00:00 | 1,588,736,697,000 | e7aa14dd7a8c89587a1ff3f5d2699ffbc4ba8cb1 | 4 | {
"blob_id": "e7aa14dd7a8c89587a1ff3f5d2699ffbc4ba8cb1",
"branch_name": "refs/heads/master",
"committer_date": 1588736697000,
"content_id": "63e8f491e93e3e980aff3d49d2d5360fc28765b1",
"detected_licenses": [
"MIT"
],
"directory_id": "f2cf867ff36ddf2f1647d7ca23a8fb0921577c7f",
"extension": "py",
"fi... | 4.3125 | stackv2 | """
For this problem you will modify a function that creates a password
the password needs to include features from the input list
that contains information about the person.
Passwords need to have 3 random special characters
contain jumbled strings from the input
include 2-4 numbers
be of... | 63 | 34.68 | 176 | 13 | 574 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_05504007113fc6b9_38530ea9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
63
] | [
null
] | [
11
] | [
36
] | |
2024-11-18T19:14:31.931431+00:00 | 1,634,117,700,000 | 6246096622900c9e450606deb56a085b2980b3e1 | 2 | {
"blob_id": "6246096622900c9e450606deb56a085b2980b3e1",
"branch_name": "refs/heads/main",
"committer_date": 1634117700000,
"content_id": "ec5388f56b01a76c5e55a8f061ebbe654742fb13",
"detected_licenses": [
"MIT"
],
"directory_id": "fbc90dcef77b42ba9a8021c471a405d3607be9e0",
"extension": "py",
"file... | 2.484375 | stackv2 | import re
from aiocqhttp.exceptions import Error
import ujson
import httpx
import asyncio
from hashlib import md5
from typing import Tuple
from loguru import logger
from retrying import retry
from bs4 import BeautifulSoup
from nonebot import MessageSegment
import config
from src.plugins.pixiv import utils
@retry
as... | 345 | 32.52 | 157 | 33 | 3,055 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_4adbf0401854074d_327064d1", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'pximg.net/imgaz/upload', so it migh... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'pximg.net/imgaz/upload', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'pximg.net/c/768x1200_80/img-master/img/', so it might match more hosts than expected."
] | [
92,
232
] | [
null,
null
] | [
37,
36
] | [
80,
106
] | |
2024-11-18T19:14:34.922111+00:00 | 1,609,831,014,000 | 7475d9d71f52e20ad6a911958d5dfcbd15005b70 | 2 | {
"blob_id": "7475d9d71f52e20ad6a911958d5dfcbd15005b70",
"branch_name": "refs/heads/main",
"committer_date": 1609831014000,
"content_id": "90202642361809add2fdbfa2fd8d0ca034147d23",
"detected_licenses": [
"MIT"
],
"directory_id": "2a3efc60a28f836a593e83cb9a5312983d6c96c2",
"extension": "py",
"file... | 2.46875 | stackv2 | #coding=utf-8
from flask import Flask,request
from datetime import datetime
import logging
from commands.defcmd import *
from flask_babel import *
import sys
sys.path.append('config')
from config import *
app = Flask(__name__)
app.config.from_pyfile('settings.cfg')
babel = Babel(app)
status_str = ""
def error_log(ap... | 63 | 22.32 | 63 | 10 | 407 | python | [{"finding_id": "codeql_py/flask-debug_d30f11aa7315149b_12d14ad7", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-117"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
63,
54,
19
] | [
null,
null,
null
] | [
5,
12,
21
] | [
51,
18,
48
] | |
2024-11-18T19:14:45.331626+00:00 | 1,616,495,279,000 | d73fc9d7ea6d4d97c99bc9d4f17227c237b692f5 | 3 | {
"blob_id": "d73fc9d7ea6d4d97c99bc9d4f17227c237b692f5",
"branch_name": "refs/heads/main",
"committer_date": 1616495279000,
"content_id": "766d4e81e47d098a9bcbd2f244ac54272f9a3172",
"detected_licenses": [
"MIT"
],
"directory_id": "0804c9f4d46e15a93a4322808b487eb00c28da95",
"extension": "py",
"file... | 2.53125 | stackv2 | from flask import Flask, render_template, request, make_response
app =Flask(__name__)
@app.route('/')
def index():
return render_template('index.html')
@app.route('/setcookie', methods=['POST', 'GET'])
def setcookie():
if request.method=='POST':
user= request.form['name']
resp = make_response(... | 18 | 29.94 | 64 | 14 | 122 | python | [{"finding_id": "codeql_py/insecure-cookie_2468e68c60e9a394_f2559e31", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"... | 3 | true | [
"CWE-614",
"CWE-020",
"CWE-1004"
] | [
"py/insecure-cookie",
"py/cookie-injection",
"py/client-exposed-cookie"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cookie is added to response without the 'secure' flag being set.",
"Cookie is constructed from a [user-supplied input](1).",
"Sensitive server cookie is set without HttpOnly flag."
] | [
13,
13,
13
] | [
null,
null,
null
] | [
9,
35,
9
] | [
40,
39,
40
] | |
2024-11-18T19:27:37.831344+00:00 | 1,647,468,409,000 | 3052f7fd8a818f285b733b6065e77e2c22698c61 | 3 | {
"blob_id": "3052f7fd8a818f285b733b6065e77e2c22698c61",
"branch_name": "refs/heads/main",
"committer_date": 1647468951000,
"content_id": "b841ad558f946b85f167618e2afd272c2d3b4858",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "5cfd0afd93894cb055a34000b1ecea8131102509",
"extension": "py"... | 2.765625 | stackv2 | """Classes that download data from usaspending.gov"""
import pathlib
import warnings
import zipfile
import requests
from us_hep_funding.constants import (
DOE_CONTRACTS_STR,
NSF_GRANTS_STR,
RAW_DATA_PATH,
USASPENDING_BASEURL,
)
class UsaSpendingDataDownloader:
"""A downloader for getting data f... | 55 | 26.84 | 79 | 15 | 354 | python | [{"finding_id": "codeql_py/request-without-cert-validation_6c1c8b819f4b4fe9_451b73ba", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
37
] | [
null
] | [
21
] | [
74
] | |
2024-11-18T19:27:44.323441+00:00 | 1,548,309,149,000 | 3d627502f19a29fb5a0f807dee460f3725408b7d | 3 | {
"blob_id": "3d627502f19a29fb5a0f807dee460f3725408b7d",
"branch_name": "refs/heads/master",
"committer_date": 1548309149000,
"content_id": "5da3d59165a1164a9db2f5690b7e8315a62e9232",
"detected_licenses": [
"MIT"
],
"directory_id": "843fa640f541c11334ec5dc3082e67ef5269df16",
"extension": "py",
"fi... | 3.28125 | stackv2 | from flask import Flask,request
#create app with Flask
app=Flask(__name__)
#use python app decorator to create api route
# '\api' specifies the end point and methods specify that it will be used for
# POST requests
@app.route('/api',methods={'POST'})
def say_hello():
#data sent as json so we use get_json to extr... | 19 | 33.37 | 90 | 10 | 168 | python | [{"finding_id": "codeql_py/flask-debug_2fdef3d9ffcd928f_88056a35", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
19,
15
] | [
null,
null
] | [
5,
12
] | [
35,
36
] | |
2024-11-18T19:27:51.508207+00:00 | 1,690,649,430,000 | c32eba0df9c6f427064ba38a8707ba7443271158 | 2 | {
"blob_id": "c32eba0df9c6f427064ba38a8707ba7443271158",
"branch_name": "refs/heads/main",
"committer_date": 1690649430000,
"content_id": "c00cbfff9aadbc60b89b8faf88c4e8ceef00949d",
"detected_licenses": [
"MIT"
],
"directory_id": "af2082be2d5cbe39f41b82e84e22bbdf79b49639",
"extension": "py",
"file... | 2.421875 | stackv2 | # -*- coding: utf-8 -*-
"""
extension
~~~~
Flask-CORS is a simple extension to Flask allowing you to support cross
origin resource sharing (CORS) using a simple decorator.
:copyright: (c) 2016 by Cory Dolphin.
:license: MIT, see LICENSE for more details.
"""
import logging
from urllib.parse imp... | 201 | 37.97 | 93 | 20 | 1,635 | python | [{"finding_id": "codeql_py/log-injection_9cfe19abf0618035_4f5643c7", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
195
] | [
null
] | [
23
] | [
35
] | |
2024-11-18T19:38:22.735555+00:00 | 1,438,974,824,000 | 3d76fb906e8b80590afec7a6b2b487069ba9723d | 2 | {
"blob_id": "3d76fb906e8b80590afec7a6b2b487069ba9723d",
"branch_name": "refs/heads/master",
"committer_date": 1438974824000,
"content_id": "912b260ba153df52ad03773f01d72bc2ce39fd34",
"detected_licenses": [
"MIT"
],
"directory_id": "458b30867c97c6691174ed5353bba96d4cd3c259",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/env python
"""axis_frame_join
Generates an AXI Stream frame join module with a specific number of input ports
Usage: axis_frame_join [OPTION]...
-?, --help display this help and exit
-p, --ports specify number of ports
-n, --name specify module name
-o, --output specify output file nam... | 428 | 30.42 | 174 | 14 | 3,316 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5dae9ecf0de11bd5_8748c17f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
73
] | [
415
] | [
9
] | [
5
] | |
2024-11-18T19:38:46.991572+00:00 | 1,466,900,467,000 | 34f8eedf375c0bc2b4a4db4a2d14a03ed8b658f6 | 2 | {
"blob_id": "34f8eedf375c0bc2b4a4db4a2d14a03ed8b658f6",
"branch_name": "refs/heads/master",
"committer_date": 1466900467000,
"content_id": "b56ca1e30a70fbd757be3ba423e7295c66a29fa9",
"detected_licenses": [
"MIT"
],
"directory_id": "d20f9d253ee13bf9e6cf87e5eb0f8966e3059a21",
"extension": "py",
"fi... | 2.46875 | stackv2 | import os
from flask import render_template, current_app, request, redirect, url_for, flash, session, send_from_directory
from flask_login import login_user
from . import home
from .forms import LoginForm
from app.models.user import User
from app import mongo
@home.route('/static/favicon.ico')
def favicon():
retu... | 40 | 31.82 | 111 | 16 | 280 | python | [{"finding_id": "codeql_py/url-redirection_6d9ba0d9cc0ed726_cc61ab9c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
30
] | [
null
] | [
29
] | [
84
] | |
2024-11-18T20:06:08.969104+00:00 | 1,608,888,084,000 | efe7baf15f614eb8ab5466a5f934ce6836008048 | 2 | {
"blob_id": "efe7baf15f614eb8ab5466a5f934ce6836008048",
"branch_name": "refs/heads/main",
"committer_date": 1608888084000,
"content_id": "0a356d1836b0bf25b32f9510a964957e87dadd8d",
"detected_licenses": [
"MIT"
],
"directory_id": "5fe857a4c66116269debfd3f7bbc64712fd65efe",
"extension": "py",
"file... | 2.4375 | stackv2 | #!/usr/bin/python3
# -*- coding: utf-8 -*-
# @Time : 2020/11/6 20:24
# @Author : lin
# @FileName: collect_paper.py
from selenium import webdriver
from selenium.webdriver.chrome.options import Options
from selenium.webdriver.chrome.service import Service
import os,time,requests
from lxml import etree
def Read_conf... | 166 | 38.66 | 140 | 24 | 1,623 | python | [{"finding_id": "codeql_py/request-without-cert-validation_abcc63256be22fa8_6cec1aad", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
132
] | [
null
] | [
24
] | [
89
] | |
2024-11-18T20:06:17.769803+00:00 | 1,625,817,536,000 | 3b64434a0126f8d093ac8bc1c869232c9a23f07f | 2 | {
"blob_id": "3b64434a0126f8d093ac8bc1c869232c9a23f07f",
"branch_name": "refs/heads/main",
"committer_date": 1625817536000,
"content_id": "9c0d40e52724f58531dcb757bb0550d99b0c4dd5",
"detected_licenses": [
"MIT"
],
"directory_id": "26d6c34df00a229dc85ad7326de6cb5672be7acc",
"extension": "py",
"file... | 2.484375 | stackv2 | # --------------------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for license information.
# --------------------------------------------------------------------... | 74 | 28.55 | 94 | 13 | 461 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ff908b366f7f63cf_2b3fdfe8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
43
] | [
null
] | [
16
] | [
49
] | |
2024-11-18T20:06:30.536638+00:00 | 1,573,829,005,000 | 21f583271bd21590245f3dc0c498028858f88029 | 3 | {
"blob_id": "21f583271bd21590245f3dc0c498028858f88029",
"branch_name": "refs/heads/master",
"committer_date": 1573829005000,
"content_id": "f3791c1237dc54fae2f51ef7cfaa5cb41ec871fc",
"detected_licenses": [
"MIT"
],
"directory_id": "590f26e35955b1cf0c9bf3e83c4686b12c52367b",
"extension": "py",
"fi... | 2.765625 | stackv2 | from collections import namedtuple
User = namedtuple("User", "name email password role")
BROKER = "broker"
ADMIN = "admin"
admins = [
User("Matías B", "matias@siprop.com", "totally safe password", ADMIN),
User("Franco F", "franco@siprop.com", "pass123", ADMIN),
]
brokers = [
User("faralla", "admin@f... | 44 | 22.98 | 74 | 11 | 283 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_59390815ef0eac7e_7b6c64ea", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
43,
43
] | [
null,
null
] | [
11,
26
] | [
24,
34
] | |
2024-11-18T20:31:14.947309+00:00 | 1,569,644,119,000 | f0fb6776d758f176fc0134397c028a9178f18982 | 2 | {
"blob_id": "f0fb6776d758f176fc0134397c028a9178f18982",
"branch_name": "refs/heads/master",
"committer_date": 1569644119000,
"content_id": "af51d79361f4ee51e56c06a675ef0fc79ec975b9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bcb214111c6c0a1fcf6aced5010a4712fd2d223f",
"extension": "py"... | 2.3125 | stackv2 | import os
from sqlalchemy import create_engine
from sqlalchemy.orm import scoped_session, sessionmaker
from sqlalchemy.ext.declarative import declarative_base
from sqlalchemy.exc import OperationalError
username = os.getenv('POSTGRES_USERNAME')
password = os.getenv('POSTGRES_PASSWORD')
database = os.getenv('POSTGRES_D... | 38 | 29.03 | 77 | 10 | 229 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8d3e8c70a9574ff5_aaf85303", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
31
] | [
null
] | [
11
] | [
55
] | |
2024-11-18T20:31:15.547113+00:00 | 1,584,644,465,000 | 828931dc3ab7a875880875f2f49c36402ec5250d | 3 | {
"blob_id": "828931dc3ab7a875880875f2f49c36402ec5250d",
"branch_name": "refs/heads/master",
"committer_date": 1584644465000,
"content_id": "1be7bb91b8a6b8ee3ee1dcae20552576ce1a5ef4",
"detected_licenses": [
"MIT"
],
"directory_id": "ee2416bb4cdf88f942ee9c4049d0ee944fcf0331",
"extension": "py",
"fi... | 2.703125 | stackv2 | #!/usr/bin/env python
# Copyright 2019 Pascal Audet & Helen Janiszewski
#
# This file is part of OBStools.
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including wi... | 263 | 38.46 | 82 | 18 | 2,213 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cb54595fa31e73a5_6d4b78a5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
192
] | [
193
] | [
15
] | [
41
] | |
2024-11-18T20:31:21.232717+00:00 | 1,605,548,080,000 | d5c86dff386344157ceeb31e34978588bd810477 | 3 | {
"blob_id": "d5c86dff386344157ceeb31e34978588bd810477",
"branch_name": "refs/heads/master",
"committer_date": 1605548080000,
"content_id": "7f5e1084c42ab4041bc178047bf68c59e98dd3df",
"detected_licenses": [
"MIT"
],
"directory_id": "cbe7302c7e96267318ced4f8938233b063a742b4",
"extension": "py",
"fi... | 2.5625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""DAR Server (based on Flask)
"""
import sys
import logging
import threading
from flask import Flask, request, jsonify
import click
from core import BASE_DIR, cfg, log, dbg_hand
from dar import Dar, TodoState
#############
# Flask App #
#############
app = Flask(__na... | 201 | 29.11 | 104 | 15 | 1,410 | python | [{"finding_id": "codeql_py/stack-trace-exposure_343441cecba0db55_ff18e79c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
122,
142
] | [
null,
null
] | [
16,
16
] | [
39,
39
] | |
2024-11-18T20:31:27.246963+00:00 | 1,583,296,855,000 | ee694130e1786d597e876658e8cb6f481ec34a9e | 2 | {
"blob_id": "ee694130e1786d597e876658e8cb6f481ec34a9e",
"branch_name": "refs/heads/master",
"committer_date": 1583296855000,
"content_id": "d460524469912efdede64f2818389693b468ea73",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "282808bbabf5c2692e22d85dbaae78bea5f38f4b",
"extension": "py"... | 2.34375 | stackv2 | # Copyright Istio Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, soft... | 254 | 31.98 | 79 | 20 | 1,818 | python | [{"finding_id": "codeql_py/tarslip_882b08e9f3a9734f_04d65939", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
114
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T20:31:28.155832+00:00 | 1,634,117,700,000 | 1bc72a0a1e17e79b92abb898068298c833815e75 | 2 | {
"blob_id": "1bc72a0a1e17e79b92abb898068298c833815e75",
"branch_name": "refs/heads/main",
"committer_date": 1634117700000,
"content_id": "44c3a3954bc1f23a87f81a00cf82195c4255eae9",
"detected_licenses": [
"MIT"
],
"directory_id": "fbc90dcef77b42ba9a8021c471a405d3607be9e0",
"extension": "py",
"file... | 2.484375 | stackv2 | import hashlib
import random
import httpx
import asyncio
from retrying import retry
import config
api_id = config.baidu_translate_api_id
secret_key = config.baidu_translate_secret_key
@retry(stop_max_attempt_number=5)
async def baidu_translate(text: str) -> str:
"""调用百度翻译api进行翻译
Args:
text (str): 需... | 50 | 23.98 | 76 | 13 | 341 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_feff8e8d49087159_6a5a4cd8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure."
] | [
37
] | [
null
] | [
32
] | [
45
] | |
2024-11-18T20:43:41.525250+00:00 | 1,383,612,817,000 | 03d51af3d30193d5a8af95b4164ec97498cf1d5e | 3 | {
"blob_id": "03d51af3d30193d5a8af95b4164ec97498cf1d5e",
"branch_name": "refs/heads/master",
"committer_date": 1383612817000,
"content_id": "c3d06b436165ad23969ce231388e5c2270708a98",
"detected_licenses": [
"MIT"
],
"directory_id": "041549b4f6090e16bd215b2b98c11fb52f8385da",
"extension": "py",
"fi... | 2.640625 | stackv2 | #! /usr/bin/env python
"""
The terminal just accepts pings from the timer app
"""
import os
import time
## www.pubnub.com - PubNub Real-time push service in the cloud.
# coding=utf8
## PubNub Real-time Push APIs and Notifications Framework
## Copyright (c) 2010 Stephen Blum
## http://www.pubnub.com/
## --------------... | 565 | 25.83 | 121 | 21 | 3,513 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_385b7ced9df3d760_6f5e03ad", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
102
] | [
108
] | [
37
] | [
15
] | |
2024-11-18T20:43:45.828180+00:00 | 1,487,233,270,000 | 35e20d1f4d4608d3cb760c67ec9f386c593894f0 | 4 | {
"blob_id": "35e20d1f4d4608d3cb760c67ec9f386c593894f0",
"branch_name": "refs/heads/master",
"committer_date": 1487233270000,
"content_id": "91d54ef516ebdda5858d7ff3f0a592ff3bbc1f01",
"detected_licenses": [
"MIT"
],
"directory_id": "a4b161f6a2975073709814187ed01b1ddec3bd2a",
"extension": "py",
"fi... | 4.40625 | stackv2 | def isWord(secretWord, lettersGuessed):
'''
secretWord: string, the word the user is guessing
lettersGuessed: list, what letters have been guessed so far
returns: boolean, True if lettersGuessed[-1] in secretWord;
False otherwise
'''
if len(lettersGuessed) > 0:
x = False
fo... | 90 | 33.42 | 87 | 19 | 690 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_048cf19548bf2bbf_13789338", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
85
] | [
null
] | [
19
] | [
84
] | |
2024-11-18T20:43:51.008408+00:00 | 1,447,188,028,000 | 5bfd7527c34940dfc4a754c27285b00511b1c1e6 | 3 | {
"blob_id": "5bfd7527c34940dfc4a754c27285b00511b1c1e6",
"branch_name": "refs/heads/master",
"committer_date": 1447188028000,
"content_id": "c447a9065ea55c6a9c42fb848e06dd19c79e34b4",
"detected_licenses": [
"MIT"
],
"directory_id": "57f5c2885d893beab0e1daeb1b90b29ae0ac1b54",
"extension": "py",
"fi... | 2.65625 | stackv2 | import os
from django.db import models
from django.contrib.auth.models import User
import uuid
import math
def make_uuid():
"""
Makes a unique integer identifier
"""
return str(uuid.uuid1().int >> 64)
class Locations(models.Model):
"""
Creates the model of the Location object(s).
"""
... | 109 | 31.78 | 119 | 17 | 834 | python | [{"finding_id": "codeql_py/path-injection_d25064b027c8e2bd_00d3e22c", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
92,
93
] | [
null,
null
] | [
27,
23
] | [
39,
35
] | |
2024-11-18T20:43:57.501899+00:00 | 1,572,712,668,000 | 864e3b145e889014c8a026795b58010b20fed07b | 2 | {
"blob_id": "864e3b145e889014c8a026795b58010b20fed07b",
"branch_name": "refs/heads/master",
"committer_date": 1572712668000,
"content_id": "c108bc80c4b2610f80c549ba0cf31ea5d3c05c27",
"detected_licenses": [
"MIT"
],
"directory_id": "b133f6fdf3e3e8a3630c4416ba71c4829b523169",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/python
from flask import Flask, render_template, request, Response
from flask_socketio import SocketIO
from flask_restful import Resource, Api
from urlparse import urlparse
import requests
requests.packages.urllib3.disable_warnings()
app = Flask(__name__)
api = Api(app)
socketio = SocketIO(app, cors_allo... | 70 | 23.44 | 89 | 16 | 423 | python | [{"finding_id": "codeql_py/full-ssrf_b1d51d3926a9f893_e424162f", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 2 | true | [
"CWE-918",
"CWE-295"
] | [
"py/full-ssrf",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
46,
46
] | [
null,
null
] | [
24,
24
] | [
90,
90
] | |
2024-11-18T20:43:59.773388+00:00 | 1,627,238,523,000 | 0a83335c10f0fb8165255ae22b67f5213d680a90 | 2 | {
"blob_id": "0a83335c10f0fb8165255ae22b67f5213d680a90",
"branch_name": "refs/heads/main",
"committer_date": 1627238523000,
"content_id": "096a9bc70a3ebcede3519370a278830e2f914c7f",
"detected_licenses": [
"MIT"
],
"directory_id": "ce00d0a458996174283445922e4deaa449c08858",
"extension": "py",
"file... | 2.359375 | stackv2 | import os
from logging.config import dictConfig
from flask import Flask, request
from feistel import Feistel
FLAG = os.environ["FLAG"].encode()
KEY = bytes.fromhex(os.environ["KEY"])
dictConfig({
'version': 1,
'formatters': {'default': {
'format': '[%(asctime)s] %(levelname)s in %(module)s: %(messa... | 56 | 27.02 | 95 | 14 | 420 | python | [{"finding_id": "codeql_py/log-injection_6ff097633357909a_1132f2bf", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 5 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
35,
41,
45,
49,
55
] | [
null,
null,
null,
null,
null
] | [
26,
26,
26,
21,
21
] | [
91,
86,
92,
95,
59
] | |
2024-11-18T20:44:07.267362+00:00 | 1,574,361,476,000 | dc8e820c719204ca73b34822362c646c86d035a6 | 3 | {
"blob_id": "dc8e820c719204ca73b34822362c646c86d035a6",
"branch_name": "refs/heads/master",
"committer_date": 1574361476000,
"content_id": "4d07945dc57384f7ad307df295f9c617e1231c28",
"detected_licenses": [
"MIT",
"Apache-2.0"
],
"directory_id": "0e8e04b56fbcde4ed4301c56387164b44c02eca3",
"exten... | 2.875 | stackv2 | from flask import Flask, request
from cobe.brain import Brain
import json
import datetime
app = Flask(__name__)
'''
STANDARD API HOME MESSAGE
'''
@app.route('/')
def index():
return "Please reference API documentation"
'''
PURPOSE: Provide the api for the chatbot
METHOD: Using HTTP for the REST API requests
OUT... | 76 | 26.79 | 75 | 16 | 507 | python | [{"finding_id": "codeql_py/flask-debug_eb46790e6d58c456_e83138d8", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
76,
72
] | [
null,
null
] | [
5,
16
] | [
49,
36
] | |
2024-11-18T20:44:18.094432+00:00 | 1,559,308,338,000 | b571e302ad2c7704f06370ce66584a563b33f24b | 3 | {
"blob_id": "b571e302ad2c7704f06370ce66584a563b33f24b",
"branch_name": "refs/heads/master",
"committer_date": 1559308338000,
"content_id": "0ce2d31aafa7975a7ed2d086e0bef4a70e5a32f9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "66190ffd320eb5d30835bdf0423352e072f8fb65",
"extension": "py"... | 2.5625 | stackv2 | import requests
from dcosdeploy.auth import get_base_url, get_auth
class SecretsAdapter(object):
def __init__(self):
self.base_url = get_base_url() + "/secrets/v1/"
self._cache_secrets_list = None
def list_secrets(self):
"""Retrive a list of secrets names"""
if not self._cache... | 62 | 39.19 | 137 | 17 | 530 | python | [{"finding_id": "codeql_py/request-without-cert-validation_cd0672feaf610c4d_10a4662c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 5 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
13,
24,
46,
48,
56
] | [
null,
null,
null,
null,
null
] | [
24,
20,
24,
24,
20
] | [
112,
107,
76,
138,
110
] | |
2024-11-18T20:57:31.096111+00:00 | 1,577,023,156,000 | 3528e808369c02a50e744d4f2e28634d55b8844d | 3 | {
"blob_id": "3528e808369c02a50e744d4f2e28634d55b8844d",
"branch_name": "refs/heads/master",
"committer_date": 1577023156000,
"content_id": "9c9a05470e2269f0d25008b056c1ee3213df6a04",
"detected_licenses": [
"MIT"
],
"directory_id": "890844d4d519f5b4cab71bdd86c04ce808b5ca2e",
"extension": "py",
"fi... | 3.171875 | stackv2 | from flask import Flask, request, json, jsonify, redirect, url_for, abort
from werkzeug.routing import BaseConverter
app = Flask(__name__)
@app.route('/')
def index():
return 'index'
"""
转换器: init方法用来重写regex属性,自定义匹配的正则规则
to_python方法用来把url路由中用户输入的/demo3/1,2,3转换为一个列表[1,2,3],方便后台使用
to_... | 95 | 21.44 | 73 | 12 | 790 | python | [{"finding_id": "codeql_py/reflective-xss_5957564126556277_aabcca18", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
56,
61,
66
] | [
null,
null,
null
] | [
12,
12,
12
] | [
32,
32,
33
] | |
2024-11-18T20:58:04.545519+00:00 | 1,631,915,449,000 | b9f27a78c7f7544a61b37fc1e62e9bc7953296cc | 3 | {
"blob_id": "b9f27a78c7f7544a61b37fc1e62e9bc7953296cc",
"branch_name": "refs/heads/master",
"committer_date": 1631915449000,
"content_id": "41a71fa9b037cc50d354f5b5eeb16030e7ce1853",
"detected_licenses": [
"MIT"
],
"directory_id": "cc8461174a59712685768ee2ea77f0b0e3368386",
"extension": "py",
"fi... | 2.703125 | stackv2 | from flask import Flask, send_from_directory, request
import os
app = Flask(__name__)
@app.route("/downloads")
def baixar_arquivo():
arquivo = request.args.get('arquivo')
print(f"Abrindo o arquivo {arquivo}.")
try:
return send_from_directory('arquivos', arquivo)
except FileNotFoundError as x:
... | 16 | 25.69 | 55 | 12 | 113 | python | [{"finding_id": "codeql_py/reflective-xss_cafafad3297f3287_9cf9daeb", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
13
] | [
null
] | [
16
] | [
54
] | |
2024-11-18T20:58:15.835345+00:00 | 1,473,033,750,000 | 4e23b1e532f0dfd2313444ef66aa15f2baa6d725 | 3 | {
"blob_id": "4e23b1e532f0dfd2313444ef66aa15f2baa6d725",
"branch_name": "refs/heads/master",
"committer_date": 1473033750000,
"content_id": "4a289006fdc2a324287d5a898f8607d94980cc3e",
"detected_licenses": [
"MIT"
],
"directory_id": "d5b7633eba97497907bf3af78d977fe63571d66f",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/env python3
import os
import collections
import jinja2 as jinja
import markdown
import markdown.extensions.meta
from shutil import copy2
import logger
import sswag_config as configs
def main():
# make output directory
os.makedirs(configs.www_root, exist_ok=True)
# generate templates and pag... | 178 | 37.17 | 118 | 18 | 1,508 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_684daab59e720ca1_6ce951b4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
61
] | [
null
] | [
17
] | [
80
] | |
2024-11-18T20:58:31.545577+00:00 | 1,565,041,293,000 | 8edab040e741761538739a168748e5a07a749c79 | 2 | {
"blob_id": "8edab040e741761538739a168748e5a07a749c79",
"branch_name": "refs/heads/master",
"committer_date": 1565041293000,
"content_id": "62e4ba5aafeac3d50a8ea80a5f079883411666f6",
"detected_licenses": [
"MIT"
],
"directory_id": "581e10caf0549325ca825cb51e0e91fea372b786",
"extension": "py",
"fi... | 2.40625 | stackv2 | import json
import os
from django.contrib.auth.forms import UserCreationForm, PasswordResetForm
from django.core.exceptions import ValidationError
from django.core.validators import validate_email
from rest_framework.views import APIView
from rest_framework.response import Response
from django.contrib.auth import auth... | 178 | 33.53 | 118 | 20 | 1,176 | python | [{"finding_id": "codeql_py/path-injection_4cb4912e8b11e628_158e228b", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
112,
115
] | [
null,
null
] | [
22,
26
] | [
53,
73
] | |
2024-11-18T20:58:37.954479+00:00 | 1,423,547,294,000 | ae9a904348cc9cf61b22a5cc5fa52c0dd21052ec | 2 | {
"blob_id": "ae9a904348cc9cf61b22a5cc5fa52c0dd21052ec",
"branch_name": "refs/heads/master",
"committer_date": 1423547294000,
"content_id": "bd8869f862e7fdfa9d3878175c44744681c1cb64",
"detected_licenses": [
"MIT"
],
"directory_id": "d03369949462326a5a1e9cf445224309aa17a08d",
"extension": "py",
"fi... | 2.453125 | stackv2 | # -*- coding: utf-8 -*-
from __future__ import absolute_import, unicode_literals
import hashlib
from wechatpy.utils import to_binary
from .base import BaseWeChatAPI
class WeChatCustomService(BaseWeChatAPI):
def add_account(self, account, nickname, password):
"""
添加客服账号
详情请参考
http... | 117 | 27.18 | 76 | 13 | 975 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_4c0afb69cdc7e13c_026644d9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp... | [
23,
45,
67
] | [
null,
null,
null
] | [
32,
32,
32
] | [
40,
40,
40
] | |
2024-11-18T20:58:41.841191+00:00 | 1,632,333,685,000 | 03b8fb241088f01947f400ab6d639f78af9d4c77 | 2 | {
"blob_id": "03b8fb241088f01947f400ab6d639f78af9d4c77",
"branch_name": "refs/heads/master",
"committer_date": 1632333685000,
"content_id": "2005d5211de1b3fcfb71d786dee286f8a34c7c00",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f4980b90cd78e8512649c7a35614e8a8df2b7854",
"extension": "py"... | 2.484375 | stackv2 | from typing import Any, Optional, Dict, Callable
from nornir.core.task import Result, Task
from jinja2 import Environment, FileSystemLoader, StrictUndefined
FiltersDict = Optional[Dict[str, Callable[..., str]]]
def template_file(
task: Task,
template: str,
path: str,
jinja_filters: Optional[Filters... | 45 | 29.09 | 90 | 14 | 312 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_6973e387f8db3a51_7a78c07f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
38
] | [
40
] | [
15
] | [
10
] | |
2024-11-18T21:10:10.652525+00:00 | 1,666,929,698,000 | db4b0e1923d335083df2e38df394815db7878503 | 2 | {
"blob_id": "db4b0e1923d335083df2e38df394815db7878503",
"branch_name": "refs/heads/master",
"committer_date": 1666929698000,
"content_id": "9768659ce39aad63ca3d1e20e86905b4aa310fcf",
"detected_licenses": [
"MIT"
],
"directory_id": "bd9a09a3f1a8b2b5166c540ada93cc5b30591605",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
'''
name: dedecms版本探测
referer: unknow
author: Lucifer
description: 亿邮邮件系统存在弱口令账户信息泄露,导致非法登录
'''
import re
import sys
import requests
class dedecms_version_BaseVerify:
def __init__(self, url):
self.url = url
def check_ver(self, arg):
ver_histroy =... | 62 | 31.08 | 148 | 17 | 725 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e1501091226d3046_c8b341ca", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
51
] | [
null
] | [
19
] | [
83
] | |
2024-11-18T21:10:22.139521+00:00 | 1,540,538,927,000 | 56eb269ac6fc4563de02c736ef5e1bb7750e2af5 | 3 | {
"blob_id": "56eb269ac6fc4563de02c736ef5e1bb7750e2af5",
"branch_name": "refs/heads/master",
"committer_date": 1540538927000,
"content_id": "45c3079fed1d1aa9892247049426125f3b413df2",
"detected_licenses": [
"MIT"
],
"directory_id": "4e27031f12022ccd55355351debf4c2f76d09c2d",
"extension": "py",
"fi... | 2.53125 | stackv2 | # 作者: Charles
# 公众号: Charles的皮卡丘
# 酷狗音乐:
# -http://www.kugou.com/
import re
import os
import click
import urllib
import requests
from contextlib import closing
'''
输入:
-songname: 歌名
-downnum: 歌曲下载数量
-savepath: 歌曲保存路径
-app: Cmd/Demo中使用
返回值:
-downednum: 歌曲实际下载数量
'''
class kugou():
def __init__(self):
self.head... | 107 | 33.48 | 148 | 25 | 1,100 | python | [{"finding_id": "codeql_py/request-without-cert-validation_bb48cd8ab269a2ea_26bd14a0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
71
] | [
null
] | [
18
] | [
93
] | |
2024-11-18T21:10:29.851083+00:00 | 1,542,670,614,000 | f8b1b5a74874fad47bf41c3d8b9c6fea4e123563 | 3 | {
"blob_id": "f8b1b5a74874fad47bf41c3d8b9c6fea4e123563",
"branch_name": "refs/heads/master",
"committer_date": 1542670614000,
"content_id": "e009927c36f6fe5b730ef6cf2b5ff5a83cd92fd2",
"detected_licenses": [
"MIT"
],
"directory_id": "fdb486c199378321fc4a81a1e2aa1fb3244ab812",
"extension": "py",
"fi... | 3.484375 | stackv2 | def part1_valid(pw):
words = pw.split()
return len(set(words)) == len(words)
def part2_valid(pw):
words = pw.split()
sorted_words = [''.join(sorted(w)) for w in words]
return len(set(sorted_words)) == len(words)
def count_valid_passwords(lines, validator):
return sum(1 for pw in lines if val... | 24 | 23.83 | 54 | 11 | 155 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_46acc4d7d939c610_3a2f6bc5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
19,
22
] | [
20,
23
] | [
11,
11
] | [
51,
51
] | |
2024-11-18T21:10:30.889247+00:00 | 1,633,665,949,000 | b84583f9ed94f573664841591c1a32dd100d0738 | 3 | {
"blob_id": "b84583f9ed94f573664841591c1a32dd100d0738",
"branch_name": "refs/heads/main",
"committer_date": 1633665949000,
"content_id": "82306cbdc4bebfd3840ab0f873901614737a4644",
"detected_licenses": [
"MIT"
],
"directory_id": "0116df7d131878ccc098cc5995ee9ab0445824fb",
"extension": "py",
"file... | 2.859375 | stackv2 | import socket
import argparse
import subprocess
import ssl
class ServerRat:
def __init__(self, listen_host, listen_port):
self.listen_host = listen_host
self.listen_port = int(listen_port)
def create_server_socket(self):
with socket.socket(socket.AF_INET, socket.SOCK_STREAM) as serve... | 86 | 36.98 | 113 | 20 | 590 | python | [{"finding_id": "codeql_py/insecure-protocol_05856cf8250dcc2a_d56e8800", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)."
] | [
41
] | [
null
] | [
18
] | [
25
] | |
2024-11-18T21:11:02.222452+00:00 | 1,584,651,463,000 | ac50f97cc3f601744067fd98d67a2905aa66f4ac | 2 | {
"blob_id": "ac50f97cc3f601744067fd98d67a2905aa66f4ac",
"branch_name": "refs/heads/master",
"committer_date": 1584651463000,
"content_id": "48ce26034ac22eb1a2ef72347618255f7b042d31",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ec70c0d61147640844f5d82925e752cf999bc887",
"extension": "py"... | 2.3125 | stackv2 | import os
import tempfile
import tarfile
from contextlib import closing
from flask import request, make_response, send_file
from data.database import configure
from config_app.c_app import app, config_provider
from config_app.config_endpoints.api import resource, ApiResource, nickname
from config_app.config_util.ta... | 69 | 30.81 | 98 | 18 | 447 | python | [{"finding_id": "codeql_py/tarslip_a3296c9afb1a90c1_795619ce", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
60
] | [
null
] | [
13
] | [
23
] | |
2024-11-18T21:11:03.462264+00:00 | 1,537,380,949,000 | f191241b71f8295c127a2fe4bffc3416034bd03e | 3 | {
"blob_id": "f191241b71f8295c127a2fe4bffc3416034bd03e",
"branch_name": "refs/heads/master",
"committer_date": 1537380949000,
"content_id": "794f81527deaf78650cbef16e6f600fb42c7be49",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e7208f2e6c03c171b18708991b30829095284d1c",
"extension": "py"... | 2.84375 | stackv2 | #!/usr/bin/env python
"""
Alternate solution to the OS Upgrade Example. This was the one I created during my initial
planning and experimentation.
"""
from __future__ import print_function, unicode_literals
from getpass import getpass
from datetime import datetime
import re
import sys
from netmiko import ConnectHandle... | 156 | 28.18 | 93 | 14 | 1,034 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_71832aecff68da03_2c138eed", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
52,
101
] | [
null,
null
] | [
11,
11
] | [
66,
24
] | |
2024-11-18T19:03:27.506358+00:00 | 1,622,326,434,000 | ea85c58618a5d2b2ea610862d5be9cff3336bd67 | 3 | {
"blob_id": "ea85c58618a5d2b2ea610862d5be9cff3336bd67",
"branch_name": "refs/heads/main",
"committer_date": 1622326434000,
"content_id": "daae885dd6dd4ca1844f804de67a75c281b239d1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8afc1a63aef20b4f38ae700f5832d16bdd443a01",
"extension": "py",
... | 2.546875 | stackv2 | #!/usr/bin/env python
##############################################################################
# Copyright (c) 2021 Intel Corporation
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at... | 129 | 34.67 | 137 | 18 | 1,131 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9adf81bbcce6c25d_82314c03", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
101,
118
] | [
null,
null
] | [
23,
27
] | [
102,
106
] | |
2024-11-18T19:03:28.873840+00:00 | 1,578,739,034,000 | 8c6ca85b2af1eb69ca2f37914a56a583ea20953a | 2 | {
"blob_id": "8c6ca85b2af1eb69ca2f37914a56a583ea20953a",
"branch_name": "refs/heads/master",
"committer_date": 1578739034000,
"content_id": "0b23366ae86df1a6b29e16d40bb9c4b767d88464",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e1517a4f37fe141e1fed134e05954be841a0d3b5",
"extension": "py"... | 2.421875 | stackv2 | import paramiko
class node_manager:
'''
exec command on ssh client
@param self
@param command - command to execute
@return stdout form ssh
'''
def exec(self, command):
ssh_stdin, ssh_stdout, ssh_stderr = self.ssh.exec_command(command)
#wait to complete
return ssh_std... | 134 | 23.52 | 94 | 14 | 805 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_8609a13501a04eb8_acdc843c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
35
] | [
null
] | [
9
] | [
71
] | |
2024-11-18T19:03:40.678761+00:00 | 1,604,940,240,000 | ca995157bd939a13b353756c98ed651986372fee | 2 | {
"blob_id": "ca995157bd939a13b353756c98ed651986372fee",
"branch_name": "refs/heads/master",
"committer_date": 1604940240000,
"content_id": "7b758ee6ce2e9f9525a9acaccaab2f87247a3add",
"detected_licenses": [
"MIT"
],
"directory_id": "b5e773f542be774d547232ddb63c699b0bf7eb0a",
"extension": "py",
"fi... | 2.453125 | stackv2 | import logging
from pathlib import Path
import mondrian
import boto3
import pandas as pd
import tempfile
from warehouse.components.constants import TRAINING_PERCENTAGE
mondrian.setup(excepthook=True)
logger = logging.getLogger()
class PipelineConfig:
""" Configuration settings for the whole pipeline
"""
... | 216 | 32.61 | 88 | 22 | 1,455 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dbb71c727d93734a_f08417bc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
89,
92
] | [
null,
94
] | [
26,
17
] | [
65,
48
] | |
2024-11-18T20:18:21.928345+00:00 | 1,629,579,239,000 | d7fd0f2d059942bf5024cd4476b40004ee0ce717 | 2 | {
"blob_id": "d7fd0f2d059942bf5024cd4476b40004ee0ce717",
"branch_name": "refs/heads/main",
"committer_date": 1629579239000,
"content_id": "171c44d9b3f64241a77789d82a7c292088241b5a",
"detected_licenses": [
"MIT"
],
"directory_id": "ec27b985c55977c51fc7f37f8aa58312033ede3d",
"extension": "py",
"file... | 2.484375 | stackv2 | #!/usr/bin/env python3
import mysql.connector
import os.path
from db_tunnel import DatabaseTunnel
DB_HOST = "cs.westminstercollege.edu"
DB_SSH_PORT = 2322
DB_SSH_USER = "student"
DB_PORT = 3306
# Default connection information (can be overridden with command-line arguments)
DB_SSH_KEYFILE = "id_rsa.cmpt307"
DB_NAME ... | 252 | 35.55 | 169 | 18 | 2,215 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9f481ba0f52dad6a_7856002f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
231
] | [
null
] | [
15
] | [
152
] | |
2024-11-18T19:07:24.313422+00:00 | 1,544,590,835,000 | af97f4b7037540ba22de7037c42b7c7ba76758f7 | 2 | {
"blob_id": "af97f4b7037540ba22de7037c42b7c7ba76758f7",
"branch_name": "refs/heads/master",
"committer_date": 1544590835000,
"content_id": "138df68f640a568640fba6925efba7074f05636d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "85eea88d68939ba6b9ffdebe2c6d81c5dcd059f2",
"extension": "py"... | 2.484375 | stackv2 | """
Rackspace Cloud Files
"""
import logging
import requests
import hashlib
from rcbu.common.command import Command
class CloudFiles(Command):
"""
Primary Cloud Files API Class
"""
def __init__(self, sslenabled, authenticator):
"""
Setup the CloudFiles API Class in the same manner as... | 132 | 42.58 | 138 | 26 | 1,276 | python | [{"finding_id": "codeql_py/request-without-cert-validation_9279a2647bec3b04_fb3de512", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
95
] | [
null
] | [
23
] | [
81
] | |
2024-11-18T19:07:42.577611+00:00 | 1,596,959,736,000 | acfe6b87e67d44725cf32b033726dfb16d31865d | 3 | {
"blob_id": "acfe6b87e67d44725cf32b033726dfb16d31865d",
"branch_name": "refs/heads/master",
"committer_date": 1596959736000,
"content_id": "b36320b9a664767f9d9de0600b060b52361ed93a",
"detected_licenses": [
"MIT"
],
"directory_id": "4a14bc1f48ad153a13f5663ecd9f4da6c9208c45",
"extension": "py",
"fi... | 2.921875 | stackv2 | import os
import tarfile
from src.data.helpers import DATA_DIR
import pandas as pd
def unpack_tar_file(file: str = "cal_housing.tgz"):
"""
Unpack zipped file into present directory.
"""
file = os.path.join(DATA_DIR, "raw", file)
with tarfile.open(file) as tar:
tar.extractall(path="raw")
... | 40 | 24.15 | 88 | 11 | 254 | python | [{"finding_id": "codeql_py/tarslip_1023ed5d5d413e8e_d11843b6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
13
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T19:07:47.553865+00:00 | 1,616,413,730,000 | d63c5acc326e0a0f8c7a8a922f4f5e00ec260ad0 | 2 | {
"blob_id": "d63c5acc326e0a0f8c7a8a922f4f5e00ec260ad0",
"branch_name": "refs/heads/master",
"committer_date": 1616413730000,
"content_id": "f16aeb4d95a01361cb8d8e69c4b0a26dd53a5178",
"detected_licenses": [
"MIT"
],
"directory_id": "2990c16d3d1fce981f06ab121ba6b6538bc10152",
"extension": "py",
"fi... | 2.359375 | stackv2 | import subprocess
import uuid
from flask import Flask, Response, request
app = Flask(__name__)
@app.route('/', methods=['GET', 'POST'])
def home():
voice = request.form.get("voice")
message = request.form.get("message")
supported_voices = ['anna', 'alan', 'aleksandr', 'anatol', 'azamat', 'elena', 'irin... | 36 | 30.75 | 97 | 13 | 298 | python | [{"finding_id": "codeql_py/command-line-injection_a6e833a7c493c163_32a8f18d", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 2 | true | [
"CWE-078",
"CWE-209"
] | [
"py/command-line-injection",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
25,
32
] | [
null,
null
] | [
36,
25
] | [
49,
32
] | |
2024-11-18T19:07:49.531768+00:00 | 1,579,383,462,000 | 069dab840d956ee512d5242c901909cc2655ba9e | 3 | {
"blob_id": "069dab840d956ee512d5242c901909cc2655ba9e",
"branch_name": "refs/heads/master",
"committer_date": 1579383462000,
"content_id": "6bf221001103d1bbe9c794f6f8a37782c5be318c",
"detected_licenses": [
"Unlicense"
],
"directory_id": "f34e78f489c03c91496d06213e644023b156376a",
"extension": "py",... | 2.8125 | stackv2 |
#----------------------------------------------------------
import hashlib
#--------------------------------#encript password#---------------------------------
#sha1------------------------------------------------------
def encrypt_password_sha1(password):
encrypt=hashlib.sha1(password.encode())
return encry... | 36 | 33.08 | 84 | 10 | 208 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_f341a9433b3c7401_d8c72a3f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 6 | true | [
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA224) that is insecure for password hashing, since it is not a computationally... | [
9,
14,
19,
24,
29,
34
] | [
null,
null,
null,
null,
null,
null
] | [
26,
28,
28,
28,
28,
25
] | [
43,
45,
45,
45,
45,
42
] | |
2024-11-18T19:07:54.972930+00:00 | 1,599,146,539,000 | d9211532cf6a050b86bdd0eea98eab77af96ce70 | 3 | {
"blob_id": "d9211532cf6a050b86bdd0eea98eab77af96ce70",
"branch_name": "refs/heads/master",
"committer_date": 1599146539000,
"content_id": "9cf4734fdaa1bc45a76de15c5d6b912ef6402091",
"detected_licenses": [
"MIT"
],
"directory_id": "bb315a23cb30cb5f2db80b1df6181b8d57f1dcb1",
"extension": "py",
"fi... | 2.9375 | stackv2 | from flask import Flask, request
import pandas as pd
import numpy as np
import json
app = Flask(__name__)
columns = ['Age', 'Fare', 'FamilySize', 'IsMother', 'IsMale', 'Deck_A',
'Deck_B', 'Deck_C', 'Deck_D', 'Deck_E', 'Deck_F', 'Deck_G', 'Deck_Z',
'Pclass_1', 'Pclass_2', 'Pclass_3', 'Title_Lady'... | 43 | 27 | 80 | 12 | 364 | python | [{"finding_id": "codeql_py/flask-debug_80e648a1de528901_addd4cc2", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
38,
21,
34
] | [
null,
null,
null
] | [
5,
12,
12
] | [
36,
27,
27
] | |
2024-11-18T19:07:55.619738+00:00 | 1,576,571,068,000 | 40d22852c609e5c7a8530c87086b5da1922f0408 | 3 | {
"blob_id": "40d22852c609e5c7a8530c87086b5da1922f0408",
"branch_name": "refs/heads/master",
"committer_date": 1576571068000,
"content_id": "54fd47e439f554aa22f32d7e9faedcddecb2e624",
"detected_licenses": [
"MIT"
],
"directory_id": "373d47e348ceb326b43a4871ac2a5ea78833fb92",
"extension": "py",
"fi... | 2.6875 | stackv2 | try:
import os
import logging
from functools import wraps
from flask import Flask, request, abort
from waitress import serve
from twilio.request_validator import RequestValidator
from telegram import ParseMode
from telegram.ext import Updater, CommandHandler
except ImportError as err:
... | 147 | 34 | 92 | 15 | 1,180 | python | [{"finding_id": "codeql_py/log-injection_fd7fc4af966e081d_428bd935", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 5 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
91,
100,
109,
123,
132
] | [
null,
null,
null,
null,
null
] | [
40,
48,
17,
45,
17
] | [
59,
67,
33,
64,
33
] | |
2024-11-18T19:07:59.918157+00:00 | 1,594,900,708,000 | 3c342ac7448b3e04a48518b8bc41e9300c2de088 | 4 | {
"blob_id": "3c342ac7448b3e04a48518b8bc41e9300c2de088",
"branch_name": "refs/heads/master",
"committer_date": 1594900708000,
"content_id": "5a206bb2947d085713431bd681c001c839c7a90b",
"detected_licenses": [
"MIT"
],
"directory_id": "d335ca3095778973bc47e07632b184409f2009a5",
"extension": "py",
"fi... | 3.984375 | stackv2 | import random
def generatePassword(pwlength):
alphabet = "abcdefghijklmnopqrstuvwxyz"
passwords = []
for i in pwlength:
password = ""
for j in range(i):
next_letter_index = random.randrange(len(alphabet))
password = password + alphabet[next_letter_index... | 61 | 25.52 | 95 | 17 | 370 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_016d68588763abac_32db30e0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (p... | [
43,
59
] | [
null,
null
] | [
11,
16
] | [
56,
57
] | |
2024-11-18T19:18:41.486119+00:00 | 1,508,943,623,000 | cff18336f931aa382296c7059dcbc268e3856450 | 3 | {
"blob_id": "cff18336f931aa382296c7059dcbc268e3856450",
"branch_name": "refs/heads/master",
"committer_date": 1508943623000,
"content_id": "73730c20873173b0b53cf4d9caf1b0176b53a7e4",
"detected_licenses": [
"MIT"
],
"directory_id": "265e4551126101d29e3bce79641a4ed720ea5289",
"extension": "py",
"fi... | 2.71875 | stackv2 | from flask import Flask, render_template, request
from flask_sqlalchemy import SQLAlchemy
from sqlalchemy.dialects.postgresql import UUID as pgUUID, TEXT
import uuid
import os
import hashlib
import base64
app = Flask(__name__)
app.debug = True
app.config["SQLALCHEMY_DATABASE_URI"] = "postgresql://dbadmin@localhost:543... | 153 | 35.24 | 117 | 16 | 1,170 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_9a36fbd9c30129ef_0b88f31e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
46
] | [
null
] | [
21
] | [
45
] | |
2024-11-18T19:18:44.981933+00:00 | 1,561,385,893,000 | a33706eb41d47cd89aac35c267ad60b11bb5a5fa | 4 | {
"blob_id": "a33706eb41d47cd89aac35c267ad60b11bb5a5fa",
"branch_name": "refs/heads/master",
"committer_date": 1561385893000,
"content_id": "790c28b55d314170ea807611560eda7af16dbf0b",
"detected_licenses": [
"MIT"
],
"directory_id": "c7840ff29c6389021d9e1cae23d4ade7c8003f22",
"extension": "py",
"fi... | 3.5625 | stackv2 | """A simple CLI app to practice grammatical genders of German nouns."""
import argparse
import json
import pathlib
import pandas as pd
class WordList:
"""Data structure to store a pandas dataframe and some structural details.
Args:
path (pathlib.Path or None): The path (without suffix) to a wor... | 420 | 31.45 | 91 | 17 | 2,908 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_176e9349ad131f3f_6dc76a5e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
72,
354
] | [
null,
null
] | [
21,
19
] | [
47,
66
] | |
2024-11-18T19:18:53.385969+00:00 | 1,581,519,785,000 | 2f4ec1f55546a4f0f2e2177e41d633ab28f5edfe | 2 | {
"blob_id": "2f4ec1f55546a4f0f2e2177e41d633ab28f5edfe",
"branch_name": "refs/heads/master",
"committer_date": 1581519785000,
"content_id": "760800305040675675bcbd1597705f0befced090",
"detected_licenses": [
"MIT"
],
"directory_id": "f7e30fb3b0de1e7afbf5a498fadff96ee6834ca1",
"extension": "py",
"fi... | 2.5 | stackv2 | import sys
import re
import os
from sockpot.server import Server
from sockpot.dummy import Dummy, dummy
from sockpot.conf.utils import import_by_path
def find_calee(*sysargs):
args = ' '.join(sysargs)
path_matcher = re.compile('--path\s*=\s*([a-zA-z0-9_\-./]+)')
posix_path = path_matcher.search(args)
... | 63 | 33.27 | 107 | 17 | 573 | python | [{"finding_id": "codeql_py/overly-large-range_365f48f8b424eedb_8c0a451b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 5 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that overlaps wi... | [
12,
17,
40,
45,
50
] | [
null,
null,
null,
null,
null
] | [
50,
54,
50,
50,
55
] | [
53,
57,
53,
53,
58
] | |
2024-11-18T19:18:57.471197+00:00 | 1,635,536,659,000 | 1edb35fad9c06d16c3237ba5a6b3dd599ed5adbb | 3 | {
"blob_id": "1edb35fad9c06d16c3237ba5a6b3dd599ed5adbb",
"branch_name": "refs/heads/main",
"committer_date": 1635536659000,
"content_id": "3526560a57b8fbe05f66dfcd989503f0cf001cd1",
"detected_licenses": [
"MIT"
],
"directory_id": "246096c11c7ac7bd47fdf81f0be5faede3588f40",
"extension": "py",
"file... | 2.984375 | stackv2 | import pickle
import random
import re
import string
from time import time
import nltk
from nltk import NaiveBayesClassifier, classify
from nltk.corpus import stopwords, twitter_samples
from nltk.stem.wordnet import WordNetLemmatizer
from nltk.tag import pos_tag
from nltk.tokenize import word_tokenize
# # nltk.downloa... | 117 | 32.88 | 102 | 16 | 907 | python | [{"finding_id": "codeql_py/overly-large-range_9db84700781825eb_21554c2a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
35
] | [
null
] | [
59
] | [
63
] | |
2024-11-18T19:19:00.530283+00:00 | 1,620,112,302,000 | bff5f1a816f120d31d8ff6d267fcbed61ae9c9a3 | 2 | {
"blob_id": "bff5f1a816f120d31d8ff6d267fcbed61ae9c9a3",
"branch_name": "refs/heads/main",
"committer_date": 1620112302000,
"content_id": "4e8ae2888ed4910cada595c444f9327366ef7a10",
"detected_licenses": [
"MIT"
],
"directory_id": "aeac5b7244679951726389920cd7b300fc8ea271",
"extension": "py",
"file... | 2.484375 | stackv2 |
from flask import Flask, render_template, request, Response
from flask_pymongo import PyMongo
import json
from werkzeug.security import generate_password_hash, check_password_hash #Cifrar y descifrar contraseñas de usuario
from bson import json_util
from bson.objectid import ObjectId
app= Flask(__name__)
app.config['... | 56 | 25.52 | 116 | 14 | 348 | python | [{"finding_id": "codeql_py/flask-debug_7823abf1d7a2510b_0cde62be", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
56,
28
] | [
null,
null
] | [
5,
16
] | [
24,
24
] | |
2024-11-18T19:19:13.689585+00:00 | 1,399,218,215,000 | ac3ee25da414e8a87669df8715cf01aa6d1d84e5 | 3 | {
"blob_id": "ac3ee25da414e8a87669df8715cf01aa6d1d84e5",
"branch_name": "refs/heads/master",
"committer_date": 1399218425000,
"content_id": "ccd8c5fef9e7b0bbb2b89c5f53d4d14053afa3b9",
"detected_licenses": [
"MIT"
],
"directory_id": "26903b08fe5380848b80b77749184f4cd3873466",
"extension": "py",
"fi... | 2.90625 | stackv2 | """
marvin.views.movies
~~~~~~~~~~~~~~~~~~~
Endpoints related to movies.
"""
# pylint: disable=no-self-use
from ..models import Movie
from flask import request
from flask.ext.restful import Resource
from logging import getLogger
_logger = getLogger('marvin.views.movies')
class MovieDetailView(Resourc... | 77 | 34.88 | 117 | 22 | 565 | python | [{"finding_id": "codeql_py/log-injection_ca003fd96479a67d_2bc048db", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 4 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
55,
58,
64,
67
] | [
null,
null,
null,
null
] | [
55,
68,
105,
87
] | [
67,
80,
117,
99
] | |
2024-11-18T19:29:38.734434+00:00 | 1,607,973,911,000 | e8a3a4d7ba84a92e6ad4cad9d949e78da1fb6d16 | 3 | {
"blob_id": "e8a3a4d7ba84a92e6ad4cad9d949e78da1fb6d16",
"branch_name": "refs/heads/master",
"committer_date": 1607973911000,
"content_id": "b0312487ba80aa91a297b79fa8f71dc7dc6e6d1e",
"detected_licenses": [
"MIT"
],
"directory_id": "8991bc83219cab6f99cc3da3c93f25fa9dcdf9f2",
"extension": "py",
"fi... | 3.140625 | stackv2 | from flask import render_template, request, session, redirect
from qa327 import app
import qa327.backend as bn
import datetime
import re
"""
This file defines the front-end part of the service.
It elaborates how the services should handle different
http requests from the client (browser) through templating.
The html ... | 447 | 32.6 | 114 | 15 | 3,326 | python | [{"finding_id": "codeql_py/overly-large-range_c3304b57373b359d_79ca934f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[\\/0-9\\].", "remediation": "", "location": {"file_p... | 6 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-1333",
"CWE-1333"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/redos",
"py/polynomial-redos"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[\\/0-9\\].",
"Suspicious character range that is equivalent to \\[\\/0-9\\].",
"Suspicious character range that is equivalent to \\[#$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\].",
"Suspicious character range that is equivalent to \\[\\/0-9\\].",
"This part of t... | [
82,
82,
83,
84,
82,
85
] | [
null,
null,
null,
null,
null,
null
] | [
36,
61,
29,
38,
53,
21
] | [
40,
65,
33,
42,
76,
26
] | |
2024-11-18T19:29:48.297565+00:00 | 1,598,981,849,000 | bfe61566f60b919a4c1f6b56d4af04aca646b178 | 2 | {
"blob_id": "bfe61566f60b919a4c1f6b56d4af04aca646b178",
"branch_name": "refs/heads/master",
"committer_date": 1598981849000,
"content_id": "1cd881f9de0a9712cd0134bcbb0c0a721c25ff49",
"detected_licenses": [
"MIT"
],
"directory_id": "685ad3792a6d256616c66a7194f3769024be1590",
"extension": "py",
"fi... | 2.3125 | stackv2 | from app import app
from flask import render_template, jsonify, request, url_for, redirect, flash
from app.forms import loginForm
from app.datafile_functions import get_data
from flask_login import login_user, logout_user, current_user
from app.models import User
from werkzeug.urls import url_parse
@app.route('/index... | 59 | 30.73 | 84 | 16 | 398 | python | [{"finding_id": "codeql_py/url-redirection_bf96d112be9170c0_9f29899f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
36
] | [
null
] | [
25
] | [
34
] | |
2024-11-18T19:44:29.184831+00:00 | 1,526,723,543,000 | abebc64175f21103e4cd4370fc7d4f2a84b81873 | 2 | {
"blob_id": "abebc64175f21103e4cd4370fc7d4f2a84b81873",
"branch_name": "refs/heads/master",
"committer_date": 1526723543000,
"content_id": "15534d4c5205f3ce542860a62b0885c7fcfd50ee",
"detected_licenses": [
"MIT"
],
"directory_id": "541ec83ef9a5804c9bd83546ad849b54483a8c1b",
"extension": "py",
"fi... | 2.390625 | stackv2 | from flask import Flask, render_template, request
app = Flask(__name__)
@app.route("/")
@app.route("/index")
@app.route("/home")
def index():
return render_template("landing.html")
@app.route("/about")
def about():
return render_template('about.html')
@app.route("/contact")
def contact():
return "This i... | 32 | 21.91 | 105 | 12 | 177 | python | [{"finding_id": "codeql_py/flask-debug_eed86b5ac40c65f5_6698d0f5", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
32,
28
] | [
null,
null
] | [
5,
12
] | [
24,
106
] | |
2024-11-18T19:44:33.696597+00:00 | 1,634,065,187,000 | dcbdf4ce3218c6a3a75af072c9a95e43aa48c702 | 2 | {
"blob_id": "dcbdf4ce3218c6a3a75af072c9a95e43aa48c702",
"branch_name": "refs/heads/main",
"committer_date": 1634065187000,
"content_id": "ec3d99e20116b05e3d08d4662e8896cb7221bbc4",
"detected_licenses": [
"BSD-3-Clause",
"Apache-2.0",
"MIT"
],
"directory_id": "ab41863bd85739c6709e41c28df1d0886... | 2.5 | stackv2 | # coding=utf-8
# Copyright 2021 The vMF Embeddings Authors.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicabl... | 89 | 32.07 | 86 | 13 | 744 | python | [{"finding_id": "codeql_py/tarslip_073afe74a2e28863_e11feae0", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
39
] | [
null
] | [
5
] | [
8
] | |
2024-11-18T19:44:40.286429+00:00 | 1,686,609,299,000 | 923a7915dd7ec8427d01b9a77fb0bbf3e307571d | 3 | {
"blob_id": "923a7915dd7ec8427d01b9a77fb0bbf3e307571d",
"branch_name": "refs/heads/master",
"committer_date": 1686609299000,
"content_id": "cb027f8a22f77e3de556cd5d3920d44c2b8efed8",
"detected_licenses": [
"MIT"
],
"directory_id": "5ddfc1c2ecbf0cb02e2865cea853f66df0aadaba",
"extension": "py",
"fi... | 2.875 | stackv2 | from os.path import join, dirname, exists
from os import makedirs, chmod, listdir, rmdir
import shutil
from glob import glob
# Logging
from redata.commons.logger import log_stdout
# Read in default configuration settings
from ..config import config_default_dict
class MoveClass:
"""
Purpose:
Python int... | 208 | 38.92 | 103 | 21 | 1,676 | python | [{"finding_id": "codeql_py/overly-permissive-file_5bbe0b2e4c6af82e_1a6ec9f4", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
102
] | [
null
] | [
17
] | [
40
] | |
2024-11-18T19:44:42.742293+00:00 | 1,611,157,635,000 | 21f759da8c88a96a4722df1503cccac48607733b | 3 | {
"blob_id": "21f759da8c88a96a4722df1503cccac48607733b",
"branch_name": "refs/heads/main",
"committer_date": 1611157635000,
"content_id": "66b9a464aee1b908abcbd2220bdba741c9f49748",
"detected_licenses": [
"MIT"
],
"directory_id": "e0f3eb917171b15612bc36f20d3e696e5d962ccb",
"extension": "py",
"file... | 3.140625 | stackv2 | from tkinter import *
from tkinter import messagebox
from random import choice, randint, shuffle
import pyperclip
# ------------------ CONSTANTS ------------------ #
GREEN = "#7CDAB8"
RED = "#EE6587"
FONT = ("Helvetica", 13, "normal")
VALIDATION_FONT = ("Helvetica", 11, "normal")
# ------------------ PASSWORD GENERAT... | 149 | 35.56 | 119 | 17 | 1,339 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6ea18026602b5535_71bae21a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
53
] | [
null
] | [
28
] | [
65
] | |
2024-11-18T20:10:19.908378+00:00 | 1,599,027,999,000 | 867ea48c299ca6b6ba857a2d64c935e03688defb | 3 | {
"blob_id": "867ea48c299ca6b6ba857a2d64c935e03688defb",
"branch_name": "refs/heads/master",
"committer_date": 1599027999000,
"content_id": "43c27e53f8550c5399fe505f8fe0a363740d0432",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "eda91e45e20469c6c6d230d0dd9370c3e7c5bbe4",
"extension": "py"... | 2.953125 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Mon Jul 13 13:58:52 2020
@author: ganeshmaruti
"""
### SPAM DETECTION PROJECT USING BAG OF WORDS AND TFIFDF ALGORITHMS
#importing necessary Libraries
import pandas as pd
import re
import nltk
from nltk.corpus import stopwords
from nltk.stem import PorterStemmer
from nltk.stem ... | 92 | 25.9 | 121 | 12 | 632 | python | [{"finding_id": "codeql_py/overly-large-range_08ade44f47a74ee9_5951f303", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
37
] | [
null
] | [
26
] | [
29
] | |
2024-11-18T20:23:16.605165+00:00 | 1,683,743,253,000 | b880fcccce9beee8e4672bcf99b727e01ffd0328 | 3 | {
"blob_id": "b880fcccce9beee8e4672bcf99b727e01ffd0328",
"branch_name": "refs/heads/master",
"committer_date": 1683743253000,
"content_id": "9ec8841338902f798e098538d54bd295ffc1bce7",
"detected_licenses": [
"MIT"
],
"directory_id": "db5cc66ffe6ce1eb4ddb056f17878ad158463732",
"extension": "py",
"fi... | 2.6875 | stackv2 | """Helper program/funtions to find endpoint in an ACI Fabric"""
import ipaddress
import requests
import xml.etree.ElementTree as ET
import warnings
import json
# Ignore HTTP warnings
warnings.filterwarnings('ignore', message='Unverified HTTPS request')
leafs = []
def get_endpoint_by_mac(endpoint, session, apic) -> ... | 242 | 34.51 | 136 | 20 | 2,190 | python | [{"finding_id": "codeql_py/request-without-cert-validation_9983ef3bc511f345_54bd0916", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 5 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
25,
26,
53,
54,
228
] | [
null,
null,
null,
null,
null
] | [
19,
21,
19,
21,
13
] | [
53,
56,
53,
56,
59
] | |
2024-11-18T20:23:27.590234+00:00 | 1,509,995,686,000 | 48b1668e9f2de835f476ef71a19eedd60bf2d97a | 3 | {
"blob_id": "48b1668e9f2de835f476ef71a19eedd60bf2d97a",
"branch_name": "refs/heads/master",
"committer_date": 1509995686000,
"content_id": "c3f79955cd99079bdc5f825a7219c960a3ddcffd",
"detected_licenses": [
"MIT"
],
"directory_id": "12e4e2729b8e0b18f3cccd86ffaff6a1a8d52e4d",
"extension": "py",
"fi... | 2.9375 | stackv2 | import requests
from lxml import html
from urllib.parse import unquote
from collections import namedtuple, deque
class SongSearchService(object):
def get_songs(self, search_string, limit=None):
raise NotImplementedError
LastFMLink = namedtuple('LastFMLink', 'artist song url')
class TuneFM(SongSearchSer... | 113 | 35.97 | 109 | 19 | 907 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_dd265ea8ddb52b64_d6c076e0", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com](1) may be at an arbitrary position in the... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [youtube.com](1) may be at an arbitrary position in the sanitized URL."
] | [
41
] | [
null
] | [
24
] | [
72
] | |
2024-11-18T20:23:27.927551+00:00 | 1,615,321,367,000 | 15783ffa9784fb54a3a5d1c1d0e8e4ae0474ffc5 | 2 | {
"blob_id": "15783ffa9784fb54a3a5d1c1d0e8e4ae0474ffc5",
"branch_name": "refs/heads/master",
"committer_date": 1615321367000,
"content_id": "c8f0a46ac39566f8b2e627ced1d5578beb30de09",
"detected_licenses": [
"MIT"
],
"directory_id": "fbd892472a3df8cecd7d5c838b650a965c83f921",
"extension": "py",
"fi... | 2.3125 | stackv2 | from flask import render_template,request,redirect,url_for,abort,flash
from . import auth
from flask_login import login_user,logout_user,login_required,current_user
from ..models import Post,User
from werkzeug.security import generate_password_hash, check_password_hash
from .forms import LoginForm,RegistrationForm
from... | 45 | 33.51 | 106 | 16 | 330 | python | [{"finding_id": "codeql_py/url-redirection_fb6336177ef5d474_65ca723a", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
31
] | [
null
] | [
29
] | [
78
] | |
2024-11-18T20:49:18.211367+00:00 | 1,612,136,636,000 | 19b4e6fbb2f387ab056672afc6590938cdc8d5bf | 3 | {
"blob_id": "19b4e6fbb2f387ab056672afc6590938cdc8d5bf",
"branch_name": "refs/heads/main",
"committer_date": 1612136636000,
"content_id": "2d2e838a625942de99c229dea81180a7a33417af",
"detected_licenses": [
"MIT"
],
"directory_id": "1c6ea8e8dc156d59f3f2e6b3591dec5d90d28bd9",
"extension": "py",
"file... | 3.4375 | stackv2 | #====================================================================
# PASSWORD MANAGER
# Author: Luca Mastroianni
# Description: Password Manager developed for my personal use.
# It reads and save data from a JSON dictionary.
#
# LICENSE: MIT
#====================================================================
imp... | 72 | 24.68 | 79 | 18 | 478 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_791baf0ef2971978_cdea5210", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
50
] | [
null
] | [
11
] | [
42
] | |
2024-11-18T20:49:28.936287+00:00 | 1,599,056,169,000 | 743b5a3f395d8b75f7496de1e0e95def715fa825 | 3 | {
"blob_id": "743b5a3f395d8b75f7496de1e0e95def715fa825",
"branch_name": "refs/heads/master",
"committer_date": 1599056169000,
"content_id": "7cd73421299c56a48cc2718cd91d197a277faec1",
"detected_licenses": [
"MIT"
],
"directory_id": "22c468e2226c07b782a4b478abc1d7be09f00e71",
"extension": "py",
"fi... | 2.625 | stackv2 | # -*- coding: utf-8 -*-
#
# This file is part of Radicale Server - Calendar Server
# Copyright © 2008 Nicolas Kandel
# Copyright © 2008 Pascal Halter
# Copyright © 2008-2013 Guillaume Ayoub
#
# This library is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as... | 171 | 36.1 | 80 | 15 | 1,571 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_84952ca8d046e153_547187a5", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
84,
97
] | [
null,
null
] | [
17,
17
] | [
25,
25
] | |
2024-11-18T20:49:30.520728+00:00 | 1,418,334,984,000 | 77dcceb8272e8badabf9f66747c74177ace5dc78 | 3 | {
"blob_id": "77dcceb8272e8badabf9f66747c74177ace5dc78",
"branch_name": "refs/heads/master",
"committer_date": 1418334984000,
"content_id": "1fe9ac67c1ebafcde4e4aae1af348c1f9e4aa087",
"detected_licenses": [
"MIT"
],
"directory_id": "9ad374cf943964fcbaf1d627e09ac5b0463b6171",
"extension": "py",
"fi... | 2.90625 | stackv2 | from flask import Flask
from flask import request
import os, sys
app = Flask(__name__)
@app.route("/")
def hello():
return "Hello World!"
@app.route('/user/<username>')
def show_user_profile(username):
return 'User %s\n' % username
@app.route("/square/<int:number>")
def squarenum(number):
return numbe... | 61 | 18.57 | 46 | 12 | 362 | python | [{"finding_id": "codeql_py/flask-debug_64fc0afcedea7128_9df68459", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-022"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value]... | [
25,
12,
16,
22
] | [
null,
null,
null,
null
] | [
5,
9,
13,
16
] | [
40,
31,
26,
39
] | |
2024-11-18T20:50:04.904065+00:00 | 1,602,274,855,000 | 1a3060833ead94d028b71280400931f8a22a2079 | 3 | {
"blob_id": "1a3060833ead94d028b71280400931f8a22a2079",
"branch_name": "refs/heads/main",
"committer_date": 1602274855000,
"content_id": "6ca4aae7f46cd97c394a1292edb07ecebae42cc6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "35bc39d1dc607a6e53e885dd7729b590517fa3ba",
"extension": "py",
... | 2.546875 | stackv2 | import requests
import os
import logging
import traceback
from flask import Flask, request
app = Flask(__name__)
gunicorn_logger = logging.getLogger('gunicorn.error')
app.logger.handlers = gunicorn_logger.handlers
app.logger.setLevel(gunicorn_logger.level)
REQUEST_TIMEOUT = int(os.getenv('REQUEST_TIMEOUT', 5))
METR... | 82 | 32.5 | 105 | 18 | 692 | python | [{"finding_id": "codeql_py/full-ssrf_02fb9781b4e261af_1aae2f51", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 5 | true | [
"CWE-918",
"CWE-079",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/full-ssrf",
"py/reflective-xss",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value]... | [
55,
82,
58,
65,
66
] | [
null,
null,
null,
null,
null
] | [
20,
12,
26,
26,
26
] | [
92,
30,
48,
48,
35
] | |
2024-11-18T20:50:27.062089+00:00 | 1,625,834,892,000 | 12cb1f7f3df2d4554b491cbeba54ea59545854f3 | 3 | {
"blob_id": "12cb1f7f3df2d4554b491cbeba54ea59545854f3",
"branch_name": "refs/heads/master",
"committer_date": 1625834892000,
"content_id": "7c094dc9f6789987096d646f2920ee372eb6f1b8",
"detected_licenses": [
"MIT"
],
"directory_id": "68c013975a380cf0e2b73e1e1703a1e0f0345a59",
"extension": "py",
"fi... | 2.65625 | stackv2 | from django.db import models
from django.contrib.auth.models import User
from django.utils import timezone
from django.dispatch import receiver
import os
import shutil
class Folder(models.Model):
name = models.CharField(max_length=128)
parent_folder = models.ForeignKey("self", null=True, blank=True, on_delete... | 113 | 29.17 | 94 | 14 | 743 | python | [{"finding_id": "codeql_py/path-injection_fa5a5b903ef9a5c2_47ea2b9e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
113
] | [
null
] | [
36
] | [
44
] | |
2024-11-18T20:50:31.258833+00:00 | 1,691,773,834,000 | e49b2d5a4aa0f8bda0f8ab8914cf01b5bd636361 | 3 | {
"blob_id": "e49b2d5a4aa0f8bda0f8ab8914cf01b5bd636361",
"branch_name": "refs/heads/master",
"committer_date": 1691773834000,
"content_id": "f82fb4aee251b8f0b428563b71cd9a2f069bbfe1",
"detected_licenses": [
"MIT"
],
"directory_id": "78c76c48d944362c23b962c788a5d1bf87989320",
"extension": "py",
"fi... | 2.546875 | stackv2 | import datetime
import logging
import requests
from ambient_api import settings
class AmbientWeatherStation:
"""
This class represents a single weather station.
"""
api_instance = None
mac_address = None
last_data = {}
info = {
'name': 'Weather Station'
}
def __init__(se... | 185 | 29.02 | 120 | 18 | 1,206 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dadff9ccc41f12de_fe2f3e85", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (p... | [
123,
125,
119,
115,
117,
121
] | [
null,
null,
null,
null,
null,
null
] | [
34,
23,
33,
31,
30,
31
] | [
41,
30,
40,
38,
37,
38
] | |
2024-11-18T20:50:41.302093+00:00 | 1,510,915,108,000 | 0bba0229ab7cd70e92aeb3e50fb1971ddbc6ea9f | 3 | {
"blob_id": "0bba0229ab7cd70e92aeb3e50fb1971ddbc6ea9f",
"branch_name": "refs/heads/master",
"committer_date": 1510915108000,
"content_id": "f52077906c02f97a002fb65f7eaf0103cfe58a26",
"detected_licenses": [
"MIT"
],
"directory_id": "43c4c5b24b696bc7e760c590faf67fbad2fbe417",
"extension": "py",
"fi... | 2.53125 | stackv2 | # -*- coding: utf-8 -*-
import os
import click
from slugify import slugify
from jinja2 import Template
from sqlalchemy import create_engine
import logging
logger = logging.getLogger('__name__')
TEMPLATE = """
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<link rel="stylesheet" type="text/css" href="... | 141 | 29.36 | 142 | 17 | 1,008 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c83de02ff287fe50_1f2dd12f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
119
] | [
null
] | [
16
] | [
34
] | |
2024-11-18T20:50:54.077972+00:00 | 1,623,701,328,000 | 2e1880b2aa70869b63e8f6ac31d4594605b060a3 | 2 | {
"blob_id": "2e1880b2aa70869b63e8f6ac31d4594605b060a3",
"branch_name": "refs/heads/master",
"committer_date": 1623701328000,
"content_id": "f387df021dbcc761e6df96e0c42652a918819ddf",
"detected_licenses": [
"MIT"
],
"directory_id": "5bb7901231ddd629d8b34f046be374efc944a04d",
"extension": "py",
"fi... | 2.3125 | stackv2 | from __future__ import absolute_import, unicode_literals
from hashlib import sha1
from pyfondy.configuration import __sign_sep__ as sep
from pyfondy.exceptions import RequestError
from uuid import uuid4
import pyfondy.utils as utils
def get_data(data, req_type):
"""
:param data: data to prepare
:param re... | 114 | 27.68 | 76 | 18 | 754 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_e201a7c0e7359808_f5c9867c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](3) is used in a hashing algorithm (SHA1) that is insecure.",
"[Sensitive data (secret)](1) is used in a hashing alg... | [
46,
52
] | [
null,
null
] | [
26,
21
] | [
50,
51
] | |
2024-11-18T20:51:14.033530+00:00 | 1,543,464,067,000 | 93d17ee9c82a6fc64329974eb27907473fe199c8 | 3 | {
"blob_id": "93d17ee9c82a6fc64329974eb27907473fe199c8",
"branch_name": "refs/heads/master",
"committer_date": 1543464067000,
"content_id": "7fd3dc3e82ba84eab3512610b3800af4d252d0ad",
"detected_licenses": [
"MIT"
],
"directory_id": "8e0c64052e9733baa88fb3fa1b991e9bf486d35e",
"extension": "py",
"fi... | 2.5625 | stackv2 | #!/usr/bin/env python3
import os
import logging
import argparse
import configparser
from mailboxresource import MailboxClient
logging.basicConfig(
filename='imapbox.log',
format='%(asctime)s - %(levelname)s: %(message)s',
datefmt='%Y-%m-%dТ%H:%M:%S%z',
level=logging.INFO,
)
def load_configuration(ar... | 150 | 25.14 | 85 | 14 | 847 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b5147fad651cce2a_0bfefa04", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive dat... | [
126,
127,
128,
129,
142,
143
] | [
null,
null,
null,
null,
null,
null
] | [
13,
13,
13,
13,
13,
13
] | [
28,
37,
28,
28,
28,
37
] | |
2024-11-18T21:13:47.062651+00:00 | 1,491,948,835,000 | 7293243e3ce10ba79b813c4f530d7dbb0436f4a1 | 2 | {
"blob_id": "7293243e3ce10ba79b813c4f530d7dbb0436f4a1",
"branch_name": "refs/heads/master",
"committer_date": 1491948835000,
"content_id": "509287bb0706055fdfad5230f8020246c1f32700",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "11034141484c7217823aaa641b7925a6a9d1555b",
"extension": "py"... | 2.46875 | stackv2 | import argparse
import json
import os
from jinja2 import Environment, FileSystemLoader
parser = argparse.ArgumentParser()
parser.add_argument("root_dir")
parser.add_argument("--images_dir", default='images')
parser.add_argument("--questions_name", default='questions.json')
parser.add_argument("--annotations_name", de... | 62 | 40.65 | 111 | 14 | 573 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9d99a2a0e4b6a151_35c7559e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
23
] | [
null
] | [
7
] | [
56
] | |
2024-11-18T21:13:52.126039+00:00 | 1,643,564,470,000 | 4213e0f55de9d8104b54c3ca9badbd7d7cec2997 | 3 | {
"blob_id": "4213e0f55de9d8104b54c3ca9badbd7d7cec2997",
"branch_name": "refs/heads/master",
"committer_date": 1643564611000,
"content_id": "b551a8c8b71a70e480955eab948a6a28f80faa46",
"detected_licenses": [
"ISC"
],
"directory_id": "0003e7c99347e93eac0bae778041cb1c2241831a",
"extension": "py",
"fi... | 2.625 | stackv2 | import csv
import os
import json
import pytz
import re
import sys
import urllib.parse
from canvasapi import Canvas
from invoke import task
@task()
def roster(c):
"""show student roster"""
course = get_canvas_course()
for enrollee in course.get_enrollments():
if enrollee.role == 'StudentEnrollment... | 148 | 28.57 | 73 | 19 | 938 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c98b451e1db9b931_7bff3f7d", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [github.com](1) may be at an arbitrary position in the sanitized URL."
] | [
81
] | [
null
] | [
22
] | [
52
] | |
2024-11-18T21:13:54.027446+00:00 | 1,566,209,287,000 | 0207a54b37fbaa1cab03cf20b4246a989cbe1dcc | 3 | {
"blob_id": "0207a54b37fbaa1cab03cf20b4246a989cbe1dcc",
"branch_name": "refs/heads/master",
"committer_date": 1566209287000,
"content_id": "ae7c2d188413258fe7f1ac875b186e68c93ed335",
"detected_licenses": [
"MIT"
],
"directory_id": "65bdcfa9b172a297ea2968a432b3fd00d4051622",
"extension": "py",
"fi... | 2.625 | stackv2 | #! /usr/bin/env python3
import argparse
import collections
import sys
import jinja2
import yaml
from .mcu import get_mcu
class Pins:
_Pin = collections.namedtuple("Pin", ['name', 'port', 'num',
'mode', 'od', 'otype',
'ospeed', ... | 184 | 33.5 | 103 | 20 | 1,426 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_28c5715b6640c10d_382b812d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
178
] | [
180
] | [
11
] | [
49
] | |
2024-11-18T21:14:19.758362+00:00 | 1,604,893,551,000 | a96c14c8c9b85a4e9e0d3d6362cf7a7dd0932824 | 4 | {
"blob_id": "a96c14c8c9b85a4e9e0d3d6362cf7a7dd0932824",
"branch_name": "refs/heads/main",
"committer_date": 1604893551000,
"content_id": "af1663e71dd65943e46ed7ea063b9a614b22111c",
"detected_licenses": [
"MIT"
],
"directory_id": "308e530cec14b8c2f6856fc80b8f9b0d3ece57e9",
"extension": "py",
"file... | 3.890625 | stackv2 | from random import randint
class BankAccount:
def __init__(self, full_name):
self.full_name = full_name
self.account_number = randint(100000000, 999999999)
self.routing_number = 98765432
self.balance = float(0)
# def deposit(self, amount):
# self.balance += float(amount)
# return f"Amoun... | 70 | 35.84 | 163 | 12 | 648 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f315cce78a24c1c3_c547f3dd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
67,
70
] | [
null,
null
] | [
7,
7
] | [
37,
36
] | |
2024-11-18T20:10:39.634310+00:00 | 1,552,207,178,000 | 4bef0b8f5ff374fa44e6d41d6e96238de635d4a0 | 2 | {
"blob_id": "4bef0b8f5ff374fa44e6d41d6e96238de635d4a0",
"branch_name": "refs/heads/master",
"committer_date": 1552207178000,
"content_id": "b5f250a049f708e4b6224534bd3fb1f292483976",
"detected_licenses": [
"MIT"
],
"directory_id": "462a3194dad478d6ab5269c16404f5579cc0fe7d",
"extension": "py",
"fi... | 2.484375 | stackv2 | import http
import logging
import os
import mpld3
from flask import Flask, request, jsonify, send_file
from indel_prediction.predictor.predict import plot_predictions as main
app = Flask(__name__)
model_path = "indel_prediction/predictor/model_output_10000_0.01000000_0.01000000_-0.607_theta.txt_cf0.txt"
@app.route... | 70 | 34.81 | 124 | 16 | 611 | python | [{"finding_id": "codeql_py/stack-trace-exposure_f4d80db398ca2965_27770fe3", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-022",
"CWE-022"
] | [
"py/stack-trace-exposure",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
64,
36,
37
] | [
null,
null,
null
] | [
24,
23,
26
] | [
41,
31,
34
] | |
2024-11-18T20:48:05.854396+00:00 | 1,693,346,738,000 | f0424d93b05fed6f7d4f6951c14936dd3adee8b2 | 3 | {
"blob_id": "f0424d93b05fed6f7d4f6951c14936dd3adee8b2",
"branch_name": "refs/heads/master",
"committer_date": 1693346738000,
"content_id": "45b088ebf2a06c37c50fa5b15009481ccdd64350",
"detected_licenses": [
"MIT"
],
"directory_id": "60d6b8501d0be546437b26a6ee1f9fab97ec3897",
"extension": "py",
"fi... | 2.546875 | stackv2 | import hashlib
import requests
from enum import Enum
from typing import Optional, Union, List
from platypush.message.response.pihole import PiholeStatusResponse
from platypush.plugins import Plugin, action
class PiholeStatus(Enum):
ENABLED = 'enabled'
DISABLED = 'disabled'
class PiholePlugin(Plugin):
... | 308 | 47.06 | 143 | 22 | 3,260 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_bc49cf3a7a8c1922_9f0dd3ed", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
42
] | [
null
] | [
46
] | [
68
] | |
2024-11-18T20:48:09.558926+00:00 | 1,618,236,580,000 | 3750cc85306c989fbc49f8305f4a5e2e9f8f4bb0 | 3 | {
"blob_id": "3750cc85306c989fbc49f8305f4a5e2e9f8f4bb0",
"branch_name": "refs/heads/master",
"committer_date": 1618236580000,
"content_id": "8b05401cfe7295ae67c94e1c7a8b7966a16d8ee7",
"detected_licenses": [
"MIT"
],
"directory_id": "398869c79284a4b9b6ec187259ecb70c90f5ed4a",
"extension": "py",
"fi... | 3.25 | stackv2 | import hashlib
import os
from cryptography.exceptions import InvalidSignature
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.primitives.asymmetric import padding, rsa
def get_key_pair(key_size=512):
"""
Returns (public key, p... | 104 | 28.42 | 101 | 16 | 641 | python | [{"finding_id": "codeql_py/weak-crypto-key_19c38b95f19cf048_32721282", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable.", "remediation": "", ... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable."
] | [
13
] | [
17
] | [
19
] | [
10
] | |
2024-11-18T20:48:22.745454+00:00 | 1,601,468,554,000 | 68ccade6ee8bb7bb8b24dad372c06fe7e33f2ef7 | 2 | {
"blob_id": "68ccade6ee8bb7bb8b24dad372c06fe7e33f2ef7",
"branch_name": "refs/heads/master",
"committer_date": 1601468554000,
"content_id": "b356e685d5d0ed1ab48318091f613381c90c4bfe",
"detected_licenses": [
"MIT"
],
"directory_id": "0ddec47170a8c576521bc8f48f13b2b32653f56e",
"extension": "py",
"fi... | 2.484375 | stackv2 | import os
from json import load
from flask import Flask, request, render_template
from logging.config import dictConfig
# Logging 設定ファイル読み込み
with open("logging.json", "r", encoding="utf-8") as f:
dictConfig(load(f))
app = Flask(__name__, instance_relative_config=True)
# 標準設定ファイル読み込み
app.config.from_object("sett... | 33 | 28.36 | 83 | 13 | 245 | python | [{"finding_id": "codeql_py/log-injection_067e1fd4cbc93abe_6e97a715", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
31
] | [
null
] | [
40
] | [
49
] | |
2024-11-18T20:48:32.504403+00:00 | 1,685,631,867,000 | d91ebf61f93f642088ef67033319db8787345f99 | 3 | {
"blob_id": "d91ebf61f93f642088ef67033319db8787345f99",
"branch_name": "refs/heads/master",
"committer_date": 1685631867000,
"content_id": "ec57591f39838bc93fa8d967015e407e1bd11ec3",
"detected_licenses": [
"MIT"
],
"directory_id": "5f1a3d7f36425a52049f3bf14f7a8cee66fb23d5",
"extension": "py",
"fi... | 2.828125 | stackv2 | """timeflux.core.manager: manage workers"""
import logging
import sys
import os
import time
import signal
import json
import yaml
from jinja2 import Template
from timeflux.core.validate import validate
from timeflux.core.worker import Worker
class Manager:
"""Load configuration and spawn workers."""
def __... | 167 | 29.22 | 106 | 16 | 1,011 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_656a67483506410a_044ccfa2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
166
] | [
null
] | [
20
] | [
38
] | |
2024-11-18T21:11:41.323308+00:00 | 1,579,825,623,000 | 5bcd3758d58119ad2017edaf2e28b6a3448bceb1 | 4 | {
"blob_id": "5bcd3758d58119ad2017edaf2e28b6a3448bceb1",
"branch_name": "refs/heads/master",
"committer_date": 1579825623000,
"content_id": "c6c727da62a7b4ee2fb97ed050c7da2cf08e5862",
"detected_licenses": [
"MIT"
],
"directory_id": "4ed0ca36dc0f7221c470a4dad9a09fc2251b1661",
"extension": "py",
"fi... | 4.0625 | stackv2 | # Exercise 34 - Birthday JSON
# For JSON
# json library
# json.dump(json_obj, file)
# json.load(file)
import json
def write_json_birthdays(f_name, birthdays):
with open(f_name, 'w') as open_file:
json.dump(birthdays, open_file)
def read_json_birthdays(f_name):
with open(f_name, 'r') as open_file:
... | 46 | 25.54 | 82 | 12 | 354 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c2bcb4aa18fab32d_d1789e28", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
40,
44
] | [
null,
null
] | [
15,
15
] | [
18,
68
] | |
2024-11-18T21:25:46.326988+00:00 | 1,651,749,196,000 | 82cf4d36b71e2ed94c26c051a265f2a4327e1cbb | 2 | {
"blob_id": "82cf4d36b71e2ed94c26c051a265f2a4327e1cbb",
"branch_name": "refs/heads/master",
"committer_date": 1651749196000,
"content_id": "21ff53f764ea45b609145713af88826cccd6fa1d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8a963ab764da000990491bf3ac3fd0600199aea4",
"extension": "py"... | 2.4375 | stackv2 | #!/usr/bin/python
import sys, os
import jinja2
import argparse
__author__ ="pkopka"
#Script render Geometry macro for Gate simulation
#Create Geomerty.mac with <n_strip> strips splited on <n_part> regions.
#JPET Geometry: max number strips - 384 Z size strip 500 mm
#python splitter.py -c <crystals_number> -o <outpu... | 43 | 34.63 | 98 | 16 | 381 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_7064cc87997d0b32_77cd3558", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
22
] | [
24
] | [
12
] | [
6
] | |
2024-11-18T21:25:51.438014+00:00 | 1,634,872,415,000 | 193b55d86a98646b5884e9dbfe06d37bdc3c84f9 | 3 | {
"blob_id": "193b55d86a98646b5884e9dbfe06d37bdc3c84f9",
"branch_name": "refs/heads/main",
"committer_date": 1634872415000,
"content_id": "b5af68de260a31987ae049546523121807777bef",
"detected_licenses": [
"MIT"
],
"directory_id": "98df7291586d5a463c6e88ec8aa2665b153a23f3",
"extension": "py",
"file... | 2.5625 | stackv2 | import os
import requests
import json
import pandas as pd
from flask import Flask, request, Response
#constants
TOKEN = '2066590284:AAFGaFTcKQilu8FAVV4FIu8aFkD2PgRu3pA'
# Info about the boot
#https://api.telegram.org/bot2066590284:AAFGaFTcKQilu8FAVV4FIu8aFkD2PgRu3pA/getMe
# get updates
#https://api.telegram.org/bot... | 138 | 28.5 | 152 | 22 | 1,174 | python | [{"finding_id": "codeql_py/partial-ssrf_cb8f6f2404fc23b4_9fddcf5d", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
30
] | [
null
] | [
9
] | [
51
] | |
2024-11-18T21:25:52.945092+00:00 | 1,618,814,537,000 | 7296b7f2e58bfcf052e880f4dc884ecba0015bcf | 2 | {
"blob_id": "7296b7f2e58bfcf052e880f4dc884ecba0015bcf",
"branch_name": "refs/heads/main",
"committer_date": 1618814537000,
"content_id": "2bc7518002e489375d9585797bbbb8bed50aba4a",
"detected_licenses": [
"MIT"
],
"directory_id": "737039ae745c0cae90b93f3dbe11815549560c60",
"extension": "py",
"file... | 2.390625 | stackv2 | """
hrit2image
"""
from glob import glob
import numpy as np
import pandas as pd
import click
import matplotlib
import matplotlib.pyplot as plt
from cartopy.crs import (
PlateCarree,
AlbersEqualArea,
AzimuthalEquidistant,
EquidistantConic,
LambertConformal,
Mercator,
Miller,
Mollweide... | 392 | 26.11 | 127 | 13 | 2,920 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b2c64fda3e064f32_132081f2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
238,
239
] | [
null,
null
] | [
11,
11
] | [
69,
67
] | |
2024-11-18T21:25:53.659976+00:00 | 1,572,904,662,000 | 8d09afe6d5d92203a44e7cb15bd349424e947e80 | 3 | {
"blob_id": "8d09afe6d5d92203a44e7cb15bd349424e947e80",
"branch_name": "refs/heads/master",
"committer_date": 1572904662000,
"content_id": "2345edd78f3349fcb77c3ba16f5597f9010abf67",
"detected_licenses": [
"MIT"
],
"directory_id": "b695f15adffeac94c19ff62537950542a52f9c55",
"extension": "py",
"fi... | 3.25 | stackv2 | #!/usr/bin/env/ python
# -*- encoding:UTF -*-
import numpy as np
def reduced_latitude(lat):
f = 1/298.257223563
b = np.arctan((1 - f)*np.tan(lat))
return b
# Lambert's formula, https://en.wikipedia.org/wiki/Geographical_distance
def lambert(c1, c2, unit='m'):
if c1[0] == c2[0] and c1[1] == c2[1]:
... | 100 | 24.71 | 87 | 16 | 817 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_025b542b95a9f9a5_c6cfc1f1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (p... | [
75,
86,
100
] | [
null,
null,
null
] | [
7,
11,
11
] | [
15,
81,
84
] | |
2024-11-18T21:25:55.706297+00:00 | 1,604,359,681,000 | befbd27b4b85b8c3782297ecb76bb7723ed09de8 | 2 | {
"blob_id": "befbd27b4b85b8c3782297ecb76bb7723ed09de8",
"branch_name": "refs/heads/master",
"committer_date": 1604359681000,
"content_id": "c4e5593eae9dbfc72558c768e8837d6dc9a886b5",
"detected_licenses": [
"MIT"
],
"directory_id": "b31e75e111f76cb55d839b46677c2bbc5861be7c",
"extension": "py",
"fi... | 2.46875 | stackv2 | from datetime import timedelta
from flask import abort, flash, redirect, render_template, request, url_for
from flask_login import LoginManager, login_required, login_user, logout_user
from werkzeug.security import check_password_hash
from multilens.ext.db.models import User
from multilens.ext.site import is_safe_url... | 73 | 28.23 | 83 | 18 | 452 | python | [{"finding_id": "codeql_py/url-redirection_ccb88e2b5989bc18_508430ee", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
38
] | [
null
] | [
29
] | [
62
] | |
2024-11-18T21:26:06.473694+00:00 | 1,676,303,643,000 | 5a08e6c4435ff72948ff19d0bb0c2032b6162f4d | 4 | {
"blob_id": "5a08e6c4435ff72948ff19d0bb0c2032b6162f4d",
"branch_name": "refs/heads/master",
"committer_date": 1676303643000,
"content_id": "e75123ce0d25c2fb70c9296bfaff63532bb975c7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4f7aa44d21ae38093869e79e10f5cdc8842d48b7",
"extension": "py"... | 3.703125 | stackv2 | import datetime
class Person(object):
def __init__(self, ssn, first_name, last_name, address= None, phone=None):
self.__ssn = ssn
self.__first_name = first_name
self.__last_name = last_name
self.__address = address
self.__phone = phone
@property
def ssn(self):
... | 110 | 29.04 | 113 | 14 | 980 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a8127822bdca594a_b392be02", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
100,
109
] | [
null,
null
] | [
11,
11
] | [
23,
23
] | |
2024-11-18T21:52:24.393525+00:00 | 1,618,472,644,000 | c2c960e58662393a1748e5351668877c7b888257 | 2 | {
"blob_id": "c2c960e58662393a1748e5351668877c7b888257",
"branch_name": "refs/heads/master",
"committer_date": 1618472644000,
"content_id": "8ee02c23866ea85c516b560718e892e26608758c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7a864f0f8f3c5e2b08d411676440ccb4cbce5336",
"extension": "py"... | 2.3125 | stackv2 | import json
import logging
import os
from datetime import datetime
import requests
from jinja2 import Template, StrictUndefined
from jsonschema import validate as json_validate
from connaisseur.util import safe_path_func
from connaisseur.exceptions import AlertSendingError, ConfigurationError
from connaisseur.image i... | 194 | 35.92 | 104 | 18 | 1,390 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_dd7f62720bba250b_aa9e7af2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
82
] | [
null
] | [
24
] | [
42
] | |
2024-11-18T21:52:29.495685+00:00 | 1,546,769,282,000 | f4c4947e0fad3f991cd0df52a8974f6e335f2831 | 3 | {
"blob_id": "f4c4947e0fad3f991cd0df52a8974f6e335f2831",
"branch_name": "refs/heads/master",
"committer_date": 1546769282000,
"content_id": "4d936948fd09c5ef2fb4a6f4cc72038a0a1b8c22",
"detected_licenses": [
"MIT"
],
"directory_id": "c3bc667239d25bb75cbaad88a7eb603c85f49fcd",
"extension": "py",
"fi... | 2.59375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import requests
from lxml import html
import urllib3
import unicodecsv as csv
import argparse
urllib3.disable_warnings()
print(
'''
==============================================
| |
| ... | 140 | 45.87 | 159 | 24 | 1,318 | python | [{"finding_id": "codeql_py/request-without-cert-validation_95a4bcbafd77bc02_656d281d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
45,
78
] | [
null,
null
] | [
24,
45
] | [
72,
103
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.