added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T02:19:52.859230+00:00 | 1,572,953,675,000 | cb5121a15eb3132e353060cece8a721b3f6c8263 | 3 | {
"blob_id": "cb5121a15eb3132e353060cece8a721b3f6c8263",
"branch_name": "refs/heads/master",
"committer_date": 1572953675000,
"content_id": "5896c7446b1d7a6f2bf15149ad0b4c0f3b18241c",
"detected_licenses": [
"MIT"
],
"directory_id": "f2925c7877b6830cf9c53402c84053e58603c738",
"extension": "py",
"fi... | 3.140625 | stackv2 | import re, functools, math
from _html import GrabHTML
class HTMLCrawler(GrabHTML):
def __init__(self):
GrabHTML.__init__(self)
self.counter = 1
avg_min_salary = []
avg_max_salary = []
for file in self.file_handlers:
print(f'Working on file: {file.name}')
... | 73 | 37.55 | 119 | 23 | 675 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_7767e8350f74d7d0_d04d1024", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
24,
21
] | [
null,
null
] | [
24,
15
] | [
32,
23
] | |
2024-11-19T02:19:56.711433+00:00 | 1,640,228,852,000 | 028775686dd8ee7519e8c369b484f826ddf8b4f1 | 2 | {
"blob_id": "028775686dd8ee7519e8c369b484f826ddf8b4f1",
"branch_name": "refs/heads/master",
"committer_date": 1640228852000,
"content_id": "452e494c3cb5fc82b30d502fde40539c05842f54",
"detected_licenses": [
"MIT"
],
"directory_id": "be9326eb2210178ac3524bd0ffeeec07e940e474",
"extension": "py",
"fi... | 2.46875 | stackv2 | # This is the buchp2 command for Bucephalus.
# It implements the 'new version of bucvac': it allows a user to 'vacuum' up
# a TeX file into the database as a PDF, with templating.
import json
import argparse
import jinja2
import tempfile
import subprocess
from pathlib import Path
from shutil import copyfile
import f... | 147 | 38.36 | 175 | 21 | 1,419 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_38bb9aa474925f0c_f97686c0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
91
] | [
null
] | [
11
] | [
76
] | |
2024-11-19T00:59:31.059786+00:00 | 1,606,380,682,000 | 5c44d05545b824ef7d36d05b6bd3781f4658a1e0 | 4 | {
"blob_id": "5c44d05545b824ef7d36d05b6bd3781f4658a1e0",
"branch_name": "refs/heads/master",
"committer_date": 1606380682000,
"content_id": "239988288f8e47ca01e90bbe1e43a9d03787f0f2",
"detected_licenses": [
"MIT"
],
"directory_id": "6bc56a48296f67a7842d1c2207869277789bc041",
"extension": "py",
"fi... | 3.625 | stackv2 | #!/usr/bin/env python3.9
from account import Account
def create_account(account_name,username,password):
'''
Function to create a new account
'''
new_account = Account(account_name,username,password)
return new_account
def save_accounts(account):
'''
Function to save account
'''
ac... | 115 | 29.82 | 146 | 17 | 591 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b7da9399ae0754a5_9634fbcb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
84
] | [
null
] | [
35
] | [
79
] | |
2024-11-19T00:59:48.831065+00:00 | 1,657,645,326,000 | cc2f7269f438cec2ab2ddbd2877cc7550c644954 | 3 | {
"blob_id": "cc2f7269f438cec2ab2ddbd2877cc7550c644954",
"branch_name": "refs/heads/master",
"committer_date": 1657645326000,
"content_id": "6931a1c42c6109c974a1d4341ba2751d2e6fbd20",
"detected_licenses": [
"Unlicense"
],
"directory_id": "d7b3193a4bd2fddb881117b59b9d6c4fa903f6fb",
"extension": "py",... | 2.609375 | stackv2 | from __future__ import absolute_import, division, print_function
import string
from ciscoconfparse import CiscoConfParse
from getpass import getpass
from netmiko import ConnectHandler
from netmiko.ssh_exception import NetMikoTimeoutException
from netmiko.ssh_exception import NetMikoAuthenticationException
import sys
#... | 139 | 32.67 | 91 | 14 | 1,072 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_099d18fb9804bbe1_9c9f40b4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text."
] | [
101
] | [
null
] | [
7
] | [
40
] | |
2024-11-19T01:21:34.050234+00:00 | 1,633,944,285,000 | 271f1c271f5eeb61797c970d1b25010e6a3ae6b7 | 3 | {
"blob_id": "271f1c271f5eeb61797c970d1b25010e6a3ae6b7",
"branch_name": "refs/heads/main",
"committer_date": 1633944285000,
"content_id": "2018100b72a609cb61322cf5d7717119bccbc736",
"detected_licenses": [
"MIT"
],
"directory_id": "ba7b9a8734bd8a4607caa2981833e1af8860b2d2",
"extension": "py",
"file... | 2.859375 | stackv2 | import re
from passlib.hash import pbkdf2_sha512
# Test regex with https://regexr.com/
class Utils:
@staticmethod
def email_is_valid(email: str) -> bool:
email_add_matcher = re.compile(r'^\w+([.-]?\w+)*@\w+([.-]?\w+)*(\.\w{2,3})+$')
return re.match(email_add_matcher, email) is not None
@... | 19 | 29.47 | 86 | 12 | 167 | python | [{"finding_id": "codeql_py/redos_3e06bf655dd045c0_30fefbf1", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetition... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetitions of 'a'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'a@a' and containing many repetitions of 'a'."
] | [
10,
10
] | [
null,
null
] | [
52,
67
] | [
55,
70
] | |
2024-11-19T01:56:39.997471+00:00 | 1,600,178,161,000 | 90cd96f42273063dba0f435399d9b86a8f253715 | 3 | {
"blob_id": "90cd96f42273063dba0f435399d9b86a8f253715",
"branch_name": "refs/heads/master",
"committer_date": 1600178161000,
"content_id": "86a068dd002b3c0f5641f0bae0aa718ee02d93bf",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fff74e87ac64ca852fd4896e0ffa82db7bdd5246",
"extension": "py"... | 2.828125 | stackv2 | """
.. module:: DataLoaderCIFAR
:synopsis: Loader the CIFAR tiny images datasets
.. moduleauthor:: Marco Melis <marco.melis@unica.it>
"""
import tarfile
from multiprocessing import Lock
import pickle
from abc import ABCMeta, abstractmethod
import numpy as np
from secml.data.loader import CDataLoader
from secml.... | 405 | 29.64 | 105 | 18 | 2,972 | python | [{"finding_id": "codeql_py/tarslip_f16f5e87deef1300_f8f8a1ad", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
266
] | [
null
] | [
9
] | [
42
] | |
2024-11-19T01:56:50.298008+00:00 | 1,596,297,771,000 | 75fc549ff43aef176ab29140cd8b257c0742cdb5 | 3 | {
"blob_id": "75fc549ff43aef176ab29140cd8b257c0742cdb5",
"branch_name": "refs/heads/master",
"committer_date": 1596297771000,
"content_id": "9b5838a134fe1324f74bf69810c32af62f0de847",
"detected_licenses": [
"MIT"
],
"directory_id": "7a18ea3d929616fa4243d28e978e2722607e731e",
"extension": "py",
"fi... | 2.5625 | stackv2 | from __future__ import print_function
import datetime
import pickle
import time
import os.path
from googleapiclient.discovery import build
from google_auth_oauthlib.flow import InstalledAppFlow
from google.auth.transport.requests import Request
import webbrowser
import re
# If modifying these scopes, delete the file t... | 138 | 31.54 | 111 | 17 | 979 | python | [{"finding_id": "codeql_py/overly-large-range_26d3fa789d2fc07d_d461971e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
22
] | [
null
] | [
53
] | [
56
] | |
2024-11-19T02:10:38.197575+00:00 | 1,629,280,618,000 | 5e3067247e729336edcc7d5fb2b88966014e3ad8 | 3 | {
"blob_id": "5e3067247e729336edcc7d5fb2b88966014e3ad8",
"branch_name": "refs/heads/main",
"committer_date": 1629280618000,
"content_id": "636b791f910802267c9985855d4f61d64bf9831a",
"detected_licenses": [
"MIT"
],
"directory_id": "f68c4d396c035deb884917bd87a522174be68c34",
"extension": "py",
"file... | 2.8125 | stackv2 | import requests
import string
url = "https://acfb1f211ffff812808f562100f20028.web-security-academy.net/"
cookie_name = "TrackingId"
s = requests.Session()
def good_guess(session, cookie, payload):
domain = cookie.domain
path = cookie.path
session.cookies.set(cookie_name, payload, domain=domain, path=pat... | 68 | 28.78 | 74 | 13 | 503 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f09debfd07431271_186ffdd0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (p... | [
53,
67
] | [
null,
null
] | [
23,
11
] | [
31,
19
] | |
2024-11-19T02:45:21.295517+00:00 | 1,540,932,846,000 | 0904ea65a381e2314b5e97c7db52f66338b7f970 | 3 | {
"blob_id": "0904ea65a381e2314b5e97c7db52f66338b7f970",
"branch_name": "refs/heads/master",
"committer_date": 1540932846000,
"content_id": "0e8c2c49b1ce13252c9ab5cdb9660671160e5c8a",
"detected_licenses": [
"MIT"
],
"directory_id": "c3218b71562f63142c039f7cd75d50fef66b3808",
"extension": "py",
"fi... | 2.90625 | stackv2 | from twython import Twython
from textblob import TextBlob
import json
import pandas as pd
# Load credentials from json file
with open("../../twitter_credentials2.json", "r") as file:
creds = json.load(file)
# Instantiate an object and print key and secret
print("CONSUMER_KEY" + creds['CONSUMER_KEY'])
print("CONS... | 55 | 26.87 | 72 | 10 | 389 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cba1d46e4f2222a4_eee92c92", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
13
] | [
null
] | [
7
] | [
51
] | |
2024-11-19T02:45:31.202999+00:00 | 1,544,312,397,000 | 81e2d21d425592bfb6d1e3ab2d14539ea017fdd4 | 2 | {
"blob_id": "81e2d21d425592bfb6d1e3ab2d14539ea017fdd4",
"branch_name": "refs/heads/master",
"committer_date": 1544312397000,
"content_id": "72370250901fcdbd27b99bb928b5295501d95472",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8da8be89e01704ea8aa7bd276509ab888f59fd92",
"extension": "py"... | 2.375 | stackv2 | from flask import Blueprint
from business.config import Config
from business.models import Team
from business.models import Schedule
from business.models import EveryGamePredictedResult
import json
import logging
schedules = Blueprint('schedules', __name__)
configuration = Config()
configuration.log_init()
logger = l... | 111 | 34.48 | 126 | 19 | 842 | python | [{"finding_id": "codeql_py/reflective-xss_384134eb25c35f60_87dbed45", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-117"
] | [
"py/reflective-xss",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
100,
55
] | [
null,
null
] | [
16,
18
] | [
31,
41
] | |
2024-11-19T02:45:50.677328+00:00 | 1,527,178,172,000 | f7c9f3f33f477831698bb1e42ba8d24b566d66b7 | 2 | {
"blob_id": "f7c9f3f33f477831698bb1e42ba8d24b566d66b7",
"branch_name": "refs/heads/master",
"committer_date": 1527178172000,
"content_id": "c439cdc72b0169e654b998297429f67a7cd83bb5",
"detected_licenses": [
"MIT"
],
"directory_id": "8ea17c0a57f3134b3f00d0be3dfc68cd24366d5b",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/env python
import csv
import json
from fabric.api import task
from jinja2 import Template
import requests
import models
FIELDNAMES = ['date', 'username', 'caption', 'instagram_url', 'image', 'image_url', 'embed_code', 'approved']
class Photo(object):
def __init__(self, **kwargs):
for field ... | 96 | 27.07 | 125 | 18 | 646 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ca0d3e9031bd38ce_bb64eb93", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
88
] | [
null
] | [
20
] | [
38
] | |
2024-11-19T03:12:11.137355+00:00 | 1,634,658,799,000 | 1a35451c8fee4cf4f53c4a2a37cf25ddd4cee64b | 3 | {
"blob_id": "1a35451c8fee4cf4f53c4a2a37cf25ddd4cee64b",
"branch_name": "refs/heads/master",
"committer_date": 1634658799000,
"content_id": "a0f5b6138da93161ef30f6f087975f37c4a645fc",
"detected_licenses": [
"Unlicense"
],
"directory_id": "f96e8a61154a53859317e60417994a4a46f7b859",
"extension": "py",... | 3.03125 | stackv2 | try:
import socket, ssl, argparse, platform, os
from urllib.parse import urlparse
except ImportError as eImp:
print(f"Ocurrió el error: {eImp}")
def ValidarSOLimpiar():
sistema= platform.system()
if sistema== "Windows":
return "cls"
else:
return "clear"
socket.setdefaulttimeout(5)
def check... | 45 | 22.73 | 75 | 13 | 280 | python | [{"finding_id": "codeql_py/insecure-protocol_a781f6cdfac323d8_18b1a02b", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)."
] | [
24
] | [
null
] | [
10
] | [
13
] | |
2024-11-19T03:12:12.475059+00:00 | 1,579,056,286,000 | ef3bbfb3d1d18c7e04ec7de5086888f67f4ee796 | 3 | {
"blob_id": "ef3bbfb3d1d18c7e04ec7de5086888f67f4ee796",
"branch_name": "refs/heads/master",
"committer_date": 1579056286000,
"content_id": "fc803d7ba9db41c1e271f340f4d2e08c5c9f4465",
"detected_licenses": [
"MIT"
],
"directory_id": "cc0b08a957e08f4da0a53718e1ff846f9d15df07",
"extension": "py",
"fi... | 2.59375 | stackv2 | import paramiko
__all__ = ["LiunxCmd"]
class LiunxCmd(object):
r'''
本模块命令,必须配置SSH免密登录方可使用。
'''
def __init__(self, host):
self.hostName = host
self.uname = 'root'
self.ssh = paramiko.SSHClient()
self.ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy()) ... | 42 | 28.52 | 90 | 14 | 299 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_13a9d5ed907f383c_6ae1c9aa", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation",
"py/paramiko-missing-host-key-validation"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
14,
22
] | [
null,
null
] | [
9,
9
] | [
71,
71
] | |
2024-11-19T01:33:41.045916+00:00 | 1,634,276,147,000 | 76502a1f50a55a3100bec8faac9d08c6042cd60e | 3 | {
"blob_id": "76502a1f50a55a3100bec8faac9d08c6042cd60e",
"branch_name": "refs/heads/main",
"committer_date": 1634276147000,
"content_id": "5d66e47295ac963f5602739f8fc410a3b89e3bc4",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "260644a4677ed85bb00749f05bc662bc099a1259",
"extension": "py"... | 2.78125 | stackv2 | import os
from nudenet import NudeDetector
from flask import Flask, request, jsonify
app = Flask(__name__)
detector = NudeDetector()
app.config["UPLOAD_FOLDER"] = "./upload"
# The main route for analyzing the images/videos
@app.route("/analyze", methods=["POST"])
def AnalyzeImage():
# For tracking media validity
... | 46 | 27.37 | 75 | 18 | 283 | python | [{"finding_id": "codeql_py/path-injection_a2879f24aa204080_8bb3769b", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1).", "remed... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1)."
] | [
24,
37
] | [
null,
null
] | [
23,
23
] | [
27,
27
] | |
2024-11-19T01:57:27.740015+00:00 | 1,677,747,292,000 | 515752d554fead9b3c405468e2b48da34e4568c7 | 2 | {
"blob_id": "515752d554fead9b3c405468e2b48da34e4568c7",
"branch_name": "refs/heads/main",
"committer_date": 1677747292000,
"content_id": "4bd4d91b506254b5c2f1e3f7ad62634133acd540",
"detected_licenses": [
"MIT"
],
"directory_id": "681fda5f88cc173454fd2a83a86086ae7ebb7288",
"extension": "py",
"file... | 2.3125 | stackv2 | from abc import ABC, abstractmethod
from httpx import HTTPError, RequestError
from jinja2 import Template
from feedforbot.constants import APP_NAME, DEFAULT_MESSAGE_TEMPLATE
from feedforbot.core.article import ArticleModel
from feedforbot.core.utils import make_post_request
from feedforbot.exceptions import Transport... | 83 | 29.35 | 79 | 22 | 511 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a693ae54211baca5_7b49e527", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
38
] | [
null
] | [
24
] | [
42
] | |
2024-11-19T02:10:59.983657+00:00 | 1,573,558,285,000 | 2193caf39a8d53f7637c1640d22fb02134f5e6c1 | 2 | {
"blob_id": "2193caf39a8d53f7637c1640d22fb02134f5e6c1",
"branch_name": "refs/heads/master",
"committer_date": 1573558285000,
"content_id": "f356d38d0c91cd893d92962acd34c09a213b3612",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "08a8240888896ef8f57b491d5d19012cac517cf7",
"extension": "p... | 2.375 | stackv2 | import logging
import os
import tarfile
import zipfile
import nltk
import six
import fastText
import torch
from torchtext import data, vocab
from torchtext.utils import download_from_url
import os
import time
import shutil
from tqdm import tqdm
import requests
logger = logging.getLogger(__name__)
class FastText(v... | 261 | 35.18 | 93 | 24 | 2,072 | python | [{"finding_id": "codeql_py/tarslip_ecdafe156e1b5d77_0c621093", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
131
] | [
null
] | [
21
] | [
24
] | |
2024-11-19T02:11:33.259702+00:00 | 1,584,888,414,000 | 90d1bba0179e6c3679c026865ead03fc8ccf9e3a | 2 | {
"blob_id": "90d1bba0179e6c3679c026865ead03fc8ccf9e3a",
"branch_name": "refs/heads/master",
"committer_date": 1584888414000,
"content_id": "b213ed8c41092f6d0307df77fac617da4f25b2c4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7670fc72439d6aecd69146d20ce438dda520514f",
"extension": "py"... | 2.359375 | stackv2 | #-*- coding: UTF-8 -*-
import socket
import json
import time
import os
import re
# str = ' 1 "command1 "'
# strs = re.findall(r'(.+?) "(.+?)" "(.+?)"', str)
# print strs
gServerAddr = "127.0.0.1:6052"
gConfigFile= "wincc.ini"
gUserName = "cdc"
gPassWord = "123456"
gDone = False
def readConfig():
global gUser... | 272 | 24.17 | 122 | 16 | 1,919 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1f49fd356cf10731_019b7fae", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text."
] | [
46
] | [
null
] | [
17
] | [
20
] | |
2024-11-19T02:11:47.726659+00:00 | 1,555,711,637,000 | 60900570d95918c24daa30a3dd31d54848593e16 | 2 | {
"blob_id": "60900570d95918c24daa30a3dd31d54848593e16",
"branch_name": "refs/heads/master",
"committer_date": 1555711637000,
"content_id": "5024dd28e4b4a8f886ab650fcfb9f15c4f9860b3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "592e9afef8cd9830d16688320f434167ac632285",
"extension": "py"... | 2.359375 | stackv2 | #Importing pre-defined classes
from flask import Flask,request,jsonify
import jsonpickle
from flask_cors import CORS,cross_origin
#Importing models
from Models.User import User
#Importing Services
from Services.jwt import Jwt
from Services.service import Service
from Services.zookeeper_handler import ZookeeperHandler... | 59 | 27.36 | 87 | 17 | 421 | python | [{"finding_id": "codeql_py/stack-trace-exposure_0fae23027537fe95_5dfde9eb", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
35,
49
] | [
null,
null
] | [
18,
18
] | [
19,
19
] | |
2024-11-19T02:33:24.529292+00:00 | 1,600,147,783,000 | d9ed4dcca38b1d7c41882b0bbb449de6b4c91898 | 2 | {
"blob_id": "d9ed4dcca38b1d7c41882b0bbb449de6b4c91898",
"branch_name": "refs/heads/master",
"committer_date": 1600147783000,
"content_id": "1af2a431b71f26bbd0e8d901778ca36ed87975ff",
"detected_licenses": [
"MIT"
],
"directory_id": "92a933c214445c50514dc54e0d695afd0e91f72a",
"extension": "py",
"fi... | 2.375 | stackv2 | # coding=utf-8
__author__ = 'wangliang'
import flask
import cookielib
import urllib2
import json
import re
import time
app = flask.Flask(__name__)
@app.route('/15days/<code>')
def fifteenDays(code):
json = get15DaysWeatherJson(code)
return json
def get15DaysWeatherJson(citycode):
req = urllib2.Request... | 121 | 33.44 | 114 | 12 | 1,222 | python | [{"finding_id": "codeql_py/partial-ssrf_741e56909687f554_29237a4d", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
21,
87
] | [
null,
null
] | [
11,
11
] | [
88,
95
] | |
2024-11-19T02:46:16.098188+00:00 | 1,671,566,848,000 | 34c173f55982a3c6ff55a6eb1e73c54f372b742d | 3 | {
"blob_id": "34c173f55982a3c6ff55a6eb1e73c54f372b742d",
"branch_name": "refs/heads/master",
"committer_date": 1671566848000,
"content_id": "bb24b01526daa9d2298f5545e9deaf78bb25ea1a",
"detected_licenses": [
"Unlicense"
],
"directory_id": "34ddec647d6ad357c1527cf713eaeaee4eb575aa",
"extension": "py",... | 3.3125 | stackv2 | from hashlib import md5
from bisect import bisect_left
def get_doors(position, hash_str):
doors = [False, False, False, False]
door_open = ['b', 'c', 'd', 'e', 'f']
conditions = [[1, 0], [1, 3], [0, 0], [0, 3]]
for i, c in zip(range(4), conditions):
doors[i] = hash_str[i] in door_open and posit... | 84 | 30.62 | 102 | 17 | 727 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b18b939065771d87_2be12adf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
27
] | [
null
] | [
25
] | [
70
] | |
2024-11-19T02:59:28.119312+00:00 | 1,585,339,049,000 | fa977437dab30ec7121e83b0aaf5c7631d89477b | 2 | {
"blob_id": "fa977437dab30ec7121e83b0aaf5c7631d89477b",
"branch_name": "refs/heads/master",
"committer_date": 1585339049000,
"content_id": "4fe7b8395c8e1bbd15e89981364e381c618170e7",
"detected_licenses": [
"MIT"
],
"directory_id": "67cd6adda52cc136cbcbd601b79b1bf5e24abbe0",
"extension": "py",
"fi... | 2.359375 | stackv2 | import functools
from flask import (
Blueprint, flash, g, redirect, render_template, request, session, url_for, make_response
)
from flask_adventure_game.map import Map
from flask_adventure_game.lexicon import scan
bp = Blueprint('engine', __name__)
@bp.route('/', methods=('GET', 'POST'))
def game():
if (req... | 48 | 31.75 | 122 | 20 | 325 | python | [{"finding_id": "codeql_py/cookie-injection_1a3b5aa6ba2d05bc_1057c238", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-020"
] | [
"py/cookie-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cookie is constructed from a [user-supplied input](1)."
] | [
38
] | [
null
] | [
41
] | [
49
] | |
2024-11-19T02:59:51.987341+00:00 | 1,628,729,747,000 | 12fe1a1cae71180ce82f3d621cc4f5cbf7a05768 | 3 | {
"blob_id": "12fe1a1cae71180ce82f3d621cc4f5cbf7a05768",
"branch_name": "refs/heads/main",
"committer_date": 1628729747000,
"content_id": "24bb97ccdbdef5954e3a099ac5d5974fb26efc63",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8036db5e0c0e9c0311798fe06d5ed6d118daaa28",
"extension": "py",
... | 3.46875 | stackv2 | from random import randint
corpo = [
'''
+-----+
| |
|
|
|
|
|
|
===========''',
'''
+-----+
| |
o |
|
|
|
|
... | 168 | 23.21 | 94 | 17 | 1,095 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_449f9aa3d714990a_0510d833", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.",
"This expression logs [sensitive data (secret)](... | [
96,
145,
154
] | [
null,
null,
157
] | [
15,
19,
19
] | [
20,
82,
66
] | |
2024-11-19T02:59:54.004986+00:00 | 1,604,460,997,000 | f71cfce1109766ff7e3da302dcaa7051497355a3 | 3 | {
"blob_id": "f71cfce1109766ff7e3da302dcaa7051497355a3",
"branch_name": "refs/heads/main",
"committer_date": 1604460997000,
"content_id": "360e4f9a023472bedc07c99804b6b8756d41e742",
"detected_licenses": [
"MIT"
],
"directory_id": "43ae50ba92cfce62cbfecdf0b910ad547573b2ff",
"extension": "py",
"file... | 2.984375 | stackv2 | import re
import string
from nltk.corpus import stopwords
from spellchecker import SpellChecker
import wordninja
spell = SpellChecker()
def remove_emoji(text):
"""
Removes emojis from text.
"""
emoji_pattern = re.compile("["
u"\U0001F600-\U0001F64F" # emoticons
... | 125 | 27.74 | 78 | 13 | 1,045 | python | [{"finding_id": "codeql_py/overly-large-range_4d5943e230481c5b_54924249", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range ... | [
15,
15,
15,
15
] | [
null,
null,
null,
null
] | [
30,
33,
36,
45
] | [
34,
37,
40,
49
] | |
2024-11-19T03:24:52.268467+00:00 | 1,634,641,630,000 | a29c32debd2e71b8e0ddd211629581fcb6771718 | 3 | {
"blob_id": "a29c32debd2e71b8e0ddd211629581fcb6771718",
"branch_name": "refs/heads/master",
"committer_date": 1634641630000,
"content_id": "f9a4d4743a64395ec509e82374f1d0cba368f53d",
"detected_licenses": [
"MIT"
],
"directory_id": "07f062ace96e01335ea33086545ac99535c82381",
"extension": "py",
"fi... | 3 | stackv2 | """
Sets up a proxy server, which automatically adds required header
to each request. It makes it possible to run videos in players
where passing in http-header is not supported
"""
from http.server import HTTPServer, SimpleHTTPRequestHandler
import requests
def proxyServer(headers, serverAddress) -> HTTPServer:
... | 65 | 31.71 | 82 | 16 | 409 | python | [{"finding_id": "codeql_py/http-response-splitting_5f9c31f57d6c3390_aff33470", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).", "remediation": "", "lo... | 3 | true | [
"CWE-113",
"CWE-113",
"CWE-918"
] | [
"py/http-response-splitting",
"py/http-response-splitting",
"py/full-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This HTTP header is constructed from a [user-provided value](1).",
"This HTTP header is constructed from a [user-provided value](1).",
"The full URL of this request depends on a [user-provided value](1)."
] | [
54,
54,
40
] | [
null,
null,
null
] | [
34,
37,
20
] | [
35,
56,
59
] | |
2024-11-19T01:26:55.753295+00:00 | 1,572,365,872,000 | e7d5ee0a9bec4ff88fcd5b76544107ab7110605b | 2 | {
"blob_id": "e7d5ee0a9bec4ff88fcd5b76544107ab7110605b",
"branch_name": "refs/heads/master",
"committer_date": 1572365872000,
"content_id": "e653ff1af5e6c6ef6cdae79e09ef3ed55c28ace2",
"detected_licenses": [
"MIT"
],
"directory_id": "91dedc18e7ac01a38f569d20a015ca78349d91f7",
"extension": "py",
"fi... | 2.4375 | stackv2 | import argparse
from os import path, chmod
import time
from subprocess import call, CalledProcessError
import sys
EXECUTABLE = "ddclient"
def parseArguments(sysArgs):
parser = argparse.ArgumentParser(description='Run ddclient')
parser.add_argument("-u", "--use",
metavar="use value",
... | 76 | 38.47 | 99 | 13 | 616 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_828f61e5fdc64a5a_d0ba99f1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
54
] | [
null
] | [
20
] | [
52
] | |
2024-11-19T01:26:57.051957+00:00 | 1,540,307,083,000 | a8521a4a16c744a000faaac2bb597d19e71b6cfd | 4 | {
"blob_id": "a8521a4a16c744a000faaac2bb597d19e71b6cfd",
"branch_name": "refs/heads/master",
"committer_date": 1540307083000,
"content_id": "be4c28b73c5550adde249f2011cd67fd1a872dec",
"detected_licenses": [
"MIT"
],
"directory_id": "646d537d8a640814a73e361e511f3639079e1708",
"extension": "py",
"fi... | 3.890625 | stackv2 | import generator
def main():
""" We want to run the generator multiple times, but without prompting for the length of the PW every time. """
# Get variables
length = generator.get_length()
runs = get_run_num()
usable_chars = generator.parse_chars()
print("Your passwords are:\n")
# Run a lo... | 34 | 28.18 | 115 | 16 | 219 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_877546bebca032eb_71152af3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
14
] | [
null
] | [
15
] | [
23
] | |
2024-11-19T01:37:33.674240+00:00 | 1,506,922,890,000 | 0781276b80593c18b9478decedfdfc86a93753a3 | 3 | {
"blob_id": "0781276b80593c18b9478decedfdfc86a93753a3",
"branch_name": "refs/heads/master",
"committer_date": 1506922890000,
"content_id": "14e80b0167f74faacb69c3a3908de1c63bcf1e44",
"detected_licenses": [
"MIT"
],
"directory_id": "09c88d10d3a1f525d1c757454c297e7194bd75b8",
"extension": "py",
"fi... | 2.640625 | stackv2 | import mimetypes, os, urllib
from repository import Repository
from flask import Flask, request, g, send_file, abort, \
render_template, Response
# default configuration
DATABASE = os.getenv('HTMLZ_REPO', '/storage/Served EBooks')
# create app object
app = Flask(__name__)
def get_repo():
# This attaches a ... | 84 | 27.43 | 87 | 14 | 569 | python | [{"finding_id": "codeql_py/stack-trace-exposure_9403f0ebd953c0c4_18d68efa", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-215",
"CWE-022"
] | [
"py/stack-trace-exposure",
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2)... | [
78,
84,
76
] | [
null,
null,
null
] | [
25,
5,
26
] | [
26,
55,
30
] | |
2024-11-19T01:37:51.696227+00:00 | 1,691,320,219,000 | 3a3186b9355355e547cf5ef6392a946a28b8f4c8 | 3 | {
"blob_id": "3a3186b9355355e547cf5ef6392a946a28b8f4c8",
"branch_name": "refs/heads/master",
"committer_date": 1691402980000,
"content_id": "44bd333062fa7cf9112a341f8f2a6be81eef4adc",
"detected_licenses": [
"MIT"
],
"directory_id": "7d2da8dbafb54fc41e455e47a610a164a2d6738d",
"extension": "py",
"fi... | 2.6875 | stackv2 | """The main fritzhome handling class."""
# -*- coding: utf-8 -*-
from __future__ import print_function
import hashlib
import logging
import time
from xml.etree import ElementTree
from requests import Session
from .errors import InvalidError, LoginError
from .fritzhomedevice import FritzhomeDevice
from .fritzhomedev... | 398 | 33.89 | 88 | 17 | 3,199 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_f8b99af41313d0c6_f790c73f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
73
] | [
null
] | [
30
] | [
37
] | |
2024-11-19T01:37:52.714419+00:00 | 1,588,181,102,000 | 9812e2bea1b2b1562783eb168a49997d833fc6e9 | 2 | {
"blob_id": "9812e2bea1b2b1562783eb168a49997d833fc6e9",
"branch_name": "refs/heads/master",
"committer_date": 1588181102000,
"content_id": "7d1500e0115751f325a7e7edb9215a82c0323be2",
"detected_licenses": [
"MIT"
],
"directory_id": "bafe5b4dc96a15026cebed08dee2dba789876ced",
"extension": "py",
"fi... | 2.390625 | stackv2 | import re
from schema import Schema, And
from boom.schema.template_config import template_config_schema
project_name_pattern = re.compile("^[a-zA-Z][a-zA-Z0-9 ]{2,}$")
project_name_path_pattern = re.compile("^[a-zA-Z0-9_]{3,}$")
author_name_pattern = re.compile("^[a-zA-Z ]{4,}$")
author_url_pattern = re.compile("^ht... | 24 | 59.29 | 118 | 14 | 335 | python | [{"finding_id": "codeql_py/overly-large-range_2a7d887ec6fe459a_e287c6ce", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 2 | true | [
"CWE-020",
"CWE-1333"
] | [
"py/overly-large-range",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].",
"This part of the regular expression may cause exponential backtracking on strings starting with 'http://' and containing many repetitions of '('."
] | [
10,
10
] | [
null,
null
] | [
65,
46
] | [
68,
111
] | |
2024-11-19T01:37:53.672271+00:00 | 1,549,834,650,000 | 4aa93edf33f4836513d8b39997e458b649135348 | 3 | {
"blob_id": "4aa93edf33f4836513d8b39997e458b649135348",
"branch_name": "refs/heads/master",
"committer_date": 1549834650000,
"content_id": "cb207c769e938514546e8d844a2e382cbe40bcca",
"detected_licenses": [
"MIT"
],
"directory_id": "d6d34e3895393b89f8b268f7a890a8d8be4e4d8d",
"extension": "py",
"fi... | 2.765625 | stackv2 | """
VirusTotal Automated Investigation for LogRhythm
Dan Crossley | daniel.crossley@logrhythm.com
Feb 2019
Version 2.0
This example should be considered a proof of concept only, and does not necessarily represent best practices recommended by LogRhythm.
Usage: VT-Investigation-SRP.py [-h HASH ] <AlarmID>
Plugin Fl... | 312 | 36.41 | 172 | 16 | 3,014 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f119fd70638ea961_eef1ef0d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 5 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
152,
175,
187,
201,
220
] | [
null,
null,
null,
null,
null
] | [
16,
5,
5,
5,
5
] | [
90,
79,
79,
79,
78
] | |
2024-11-19T01:38:51.240883+00:00 | 1,627,785,765,000 | e56e0ca80fc06d482187f1afa4bf5bf4450c0f76 | 2 | {
"blob_id": "e56e0ca80fc06d482187f1afa4bf5bf4450c0f76",
"branch_name": "refs/heads/main",
"committer_date": 1627785765000,
"content_id": "434bc1404fdd82e4de138e740af7dd3c017b4dbb",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1c956b9f0dc0f08c122372969118651c715b9e3e",
"extension": "py",
... | 2.453125 | stackv2 |
import logging
import json
from flask import jsonify, abort, Response
from server import app, cln_client
from cloudant.error import CloudantException, ResultException
from cloudant.query import Query
@app.route("/indicators/<string:symbol>")
def indicators(symbol):
if symbol is None or symbol == '':
abo... | 42 | 31.67 | 93 | 21 | 315 | python | [{"finding_id": "codeql_py/stack-trace-exposure_43f0b10f99bcfcbe_40d8ff9a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
20,
33
] | [
null,
null
] | [
24,
24
] | [
76,
70
] | |
2024-11-19T01:52:13.576237+00:00 | 1,449,276,678,000 | 196f2da03376db6a99239942a3da26d28f9c2ea7 | 3 | {
"blob_id": "196f2da03376db6a99239942a3da26d28f9c2ea7",
"branch_name": "refs/heads/master",
"committer_date": 1449276678000,
"content_id": "9d8954aef21621bb30de9a0dcbd83a48b628b2cd",
"detected_licenses": [
"MIT"
],
"directory_id": "476db59a7947ae40f0f60755c000c901400d5d84",
"extension": "py",
"fi... | 2.84375 | stackv2 | #! /usr/bin/env python
# -*- coding: utf-8 -*-
# vim:fenc=utf-8
#
# Copyright © 2015 Christopher C. Strelioff <chris.strelioff@gmail.com>
#
# Distributed under terms of the MIT license.
"""
consumer_key.py
=================
A Python 3 example of using the discogs-client with a consumer key and secret.
"""
import disc... | 100 | 31.44 | 78 | 16 | 829 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_18b9b94bb3d0a58b_fc426d94", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
39
] | [
43
] | [
7
] | [
42
] | |
2024-11-19T01:52:14.689475+00:00 | 1,570,874,876,000 | 728487bc052ac8cd3b8418f4cbf8d83af98f7348 | 2 | {
"blob_id": "728487bc052ac8cd3b8418f4cbf8d83af98f7348",
"branch_name": "refs/heads/master",
"committer_date": 1570874876000,
"content_id": "0a21ddea347f538a45fc253c2f370fc0c49ed4c0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cd1919dfabe43fbfefd473aaaafdedf37e14bfd1",
"extension": "py"... | 2.5 | stackv2 | import abc
import six
@six.add_metaclass(abc.ABCMeta)
class BaseEngine(object):
device = None
@abc.abstractmethod
def get_properties(self):
"""Return the device information
"""
def run_command(cmd, node_ip, username, password):
# Replace this code by the SSH module
import param... | 24 | 24.83 | 68 | 10 | 133 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_befa1bb11df6bcd8_3f780fae", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
20
] | [
null
] | [
5
] | [
69
] | |
2024-11-19T01:52:26.777760+00:00 | 1,608,196,159,000 | 61d037e8ec2db1a977f0f570a52a999dad8075a1 | 2 | {
"blob_id": "61d037e8ec2db1a977f0f570a52a999dad8075a1",
"branch_name": "refs/heads/main",
"committer_date": 1608196159000,
"content_id": "eac2fa4fcd6234c5ebecd22014c909c5fe1fe969",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "36a7ca671625d67d609351c564c5a8b9f3b97e96",
"extension": "py",
... | 2.34375 | stackv2 | # encoding: utf-8
"""
@author: fonttian
@contact: fonttian@gmail.com
@license: by-nc-sa
@file: app.py
@time: 2020/11/9 上午8:47
"""
import sqlite3
from flask import Flask, request, render_template, jsonify
from werkzeug.utils import secure_filename
from ODLibrary.diff import real_time_diff_detect
from Tools.ExceptionHan... | 303 | 35.78 | 118 | 16 | 2,535 | python | [{"finding_id": "codeql_py/unsafe-deserialization_cee444f9a951adc0_7d4727d4", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio... | 3 | true | [
"CWE-502",
"CWE-022",
"CWE-022"
] | [
"py/unsafe-deserialization",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Unsafe deserialization depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
266,
143,
145
] | [
null,
null,
null
] | [
27,
27,
23
] | [
36,
42,
38
] | |
2024-11-19T02:04:40.609402+00:00 | 1,514,451,608,000 | a8c928b7ecbb6cc6308ea93d91028a6c81c708f6 | 3 | {
"blob_id": "a8c928b7ecbb6cc6308ea93d91028a6c81c708f6",
"branch_name": "refs/heads/master",
"committer_date": 1514451608000,
"content_id": "e34651c17413ac64c30b4bfd4d71f7850a359819",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8380f4ff0fa27e7f0a4deb24ae0b06297ccff4e0",
"extension": "py"... | 2.8125 | stackv2 | from telegram.ext import Updater, CommandHandler, MessageHandler, Filters
import logging
import ConfigParser
import os
class Main:
def __init__(self):
# Enable logging
logging.basicConfig(format='%(asctime)s - %(name)s - %(levelname)s - %(message)s',
level=logging.INFO... | 112 | 33.61 | 112 | 13 | 834 | python | [{"finding_id": "codeql_py/overly-large-range_9ab85dac6bfbc7f4_0a4d3c79", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
86
] | [
null
] | [
59
] | [
62
] | |
2024-11-19T02:04:43.584631+00:00 | 1,504,691,342,000 | c447745a3c786134a0322e5411ce5649133b0afe | 2 | {
"blob_id": "c447745a3c786134a0322e5411ce5649133b0afe",
"branch_name": "refs/heads/master",
"committer_date": 1504691342000,
"content_id": "dc7d09327d668aacbd58a9fdf2f1851308065958",
"detected_licenses": [
"MIT"
],
"directory_id": "dc9528a772bebef92f31afd0327cbad286d4d507",
"extension": "py",
"fi... | 2.421875 | stackv2 | from . import api
from flask import request, jsonify
from ..models import File
from mongoengine import Q
from bson import objectid
import json
def retrieve_tree(file_node_current_id=None, depth=0):
file_tree = []
if file_node_current_id:
file_nodes = File.objects(Q(path__size=depth) & Q(path=objectid.... | 123 | 36 | 164 | 20 | 992 | python | [{"finding_id": "codeql_py/stack-trace-exposure_40f8a44159e07609_1296a2c5", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
113
] | [
null
] | [
28
] | [
47
] | |
2024-11-19T02:04:46.051757+00:00 | 1,614,359,396,000 | d35bd99c448b46952c0325792adb980c0f0b6d46 | 3 | {
"blob_id": "d35bd99c448b46952c0325792adb980c0f0b6d46",
"branch_name": "refs/heads/main",
"committer_date": 1614359396000,
"content_id": "f17b9bff8574fe09be6afca2f5b2be2ebcd3d87b",
"detected_licenses": [
"Unlicense"
],
"directory_id": "4ff4aa5481a1f8976a8fd691b3a1137f0f77e68f",
"extension": "py",
... | 2.734375 | stackv2 | """Handle Songlink Stuff"""
import os
from typing import Optional
import requests
from urlextract import URLExtract
EXTRACTOR = URLExtract()
def extract_link(text: str) -> Optional[str]:
"""Extract the URL for the music service"""
for url in EXTRACTOR.find_urls(text):
if \
'open.spotify... | 34 | 22.85 | 53 | 13 | 192 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c1afc7859a13c542_beb8d4a8", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [open.spotify.com](1) may be at an arbitrary position i... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [open.spotify.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [music.apple.com](1) may be at an arbitrary position in the sanitized URL."
] | [
16,
17
] | [
null,
null
] | [
13,
13
] | [
38,
37
] | |
2024-11-19T02:04:49.912798+00:00 | 1,554,101,979,000 | 481751d1bd323ba1f2b77baf143877226d0eddff | 2 | {
"blob_id": "481751d1bd323ba1f2b77baf143877226d0eddff",
"branch_name": "refs/heads/master",
"committer_date": 1554101979000,
"content_id": "f72667c78de8b3729ab0154a15e014dd9916de6b",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "450e009ae02c9722caf44779e404bfaae4d345b2",
"extension": "p... | 2.359375 | stackv2 | # Copyright (c) Jupyter Development Team.
# Distributed under the terms of the Modified BSD License.
"""Tornado handlers for invoking notebook cells as web APIs."""
import os
import json
import tornado.web
from tornado.log import access_log
from .request_utils import (parse_body, parse_args, format_request,
header... | 266 | 40.03 | 101 | 21 | 2,107 | python | [{"finding_id": "codeql_py/stack-trace-exposure_1abae5864c1b84d0_0dc59b87", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
219
] | [
null
] | [
24
] | [
32
] | |
2024-11-19T02:04:52.994348+00:00 | 1,644,921,813,000 | eb9249085104f932a73c2b885913f791a6ac6333 | 2 | {
"blob_id": "eb9249085104f932a73c2b885913f791a6ac6333",
"branch_name": "refs/heads/master",
"committer_date": 1644921813000,
"content_id": "a6de58522c97294f2755a552f2868456b0a847df",
"detected_licenses": [
"MIT"
],
"directory_id": "224af08fedb382aefa96117f2aa02713076ddcbd",
"extension": "py",
"fi... | 2.34375 | stackv2 | from flask import Flask, render_template, request, session
from flask import jsonify
from flask_cors import CORS, cross_origin
from flask_restful import Resource,Api
import sys
sys.path.insert(0, '/home/ls41/Desktop/Factoid-based-Question-Answer-Chatbot' )
from spellcheck import spellcheck as SC
from DocumentRetrievalM... | 444 | 33.67 | 133 | 23 | 3,568 | python | [{"finding_id": "codeql_py/path-injection_6995c7df24283814_c2ac28e7", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
399
] | [
null
] | [
28
] | [
39
] | |
2024-11-19T02:04:59.420955+00:00 | 1,541,777,318,000 | ee899922327c35551ae0f7963b9987efa6d27f49 | 3 | {
"blob_id": "ee899922327c35551ae0f7963b9987efa6d27f49",
"branch_name": "refs/heads/master",
"committer_date": 1541777318000,
"content_id": "db3ce80924ab3e6db9d20d5df8dc76355071e9ce",
"detected_licenses": [
"MIT"
],
"directory_id": "1f5e896a948d4bf2f9e39ab2e2d528a1ddc313c2",
"extension": "py",
"fi... | 2.6875 | stackv2 | # -*- coding: utf-8 -*-
import ast
import calendar
import config
import datetime
import os
import telebot
import logging
from flask import Flask, request
from Postgres import Postgres
from telebot import types
# locale.setlocale(locale.LC_ALL, 'ru_RU.UTF-8')
# seems like heroku does not support it
week_days = ['Поне... | 387 | 32.56 | 134 | 25 | 3,130 | python | [{"finding_id": "codeql_py/reflective-xss_ba0c0c5a2438654d_5b39aec3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
377
] | [
null
] | [
12
] | [
23
] | |
2024-11-19T02:28:25.796059+00:00 | 1,567,016,869,000 | a4300e9fd7ada32286bf1b7b2eb8c31d552efa31 | 3 | {
"blob_id": "a4300e9fd7ada32286bf1b7b2eb8c31d552efa31",
"branch_name": "refs/heads/master",
"committer_date": 1567016869000,
"content_id": "7f3bdbfbbe8bcde0e0f3820f590e563c2bd33e79",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "36a08912ecbc0425b793f6297a687324560d0685",
"extension": "p... | 2.578125 | stackv2 | # -*- coding: utf-8 -*-
"""
Functions for generating QC images and an HTML report for outputs from the
ANTs longitudinal cortical thickness pipeline
"""
import argparse
import os
import pathlib
import re
import jinja2
import nibabel as nib
from niworkflows.viz.utils import (compose_view, plot_segs,
... | 322 | 29.53 | 79 | 16 | 2,374 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_6716c333717a5e34_4e6ea714", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
310
] | [
312
] | [
11
] | [
49
] | |
2024-11-19T02:28:30.936250+00:00 | 1,586,743,084,000 | e4321e67212b93b620397c6d962a695762c74454 | 2 | {
"blob_id": "e4321e67212b93b620397c6d962a695762c74454",
"branch_name": "refs/heads/master",
"committer_date": 1586743084000,
"content_id": "e32832c0460aae61fecaf46368784b46ab91179b",
"detected_licenses": [
"MIT"
],
"directory_id": "906f7d4116b449762a0557f5435de968af91e857",
"extension": "py",
"fi... | 2.34375 | stackv2 | from jinja2 import Template
from generate_receipt import generate_receipt, verify_receipt
from simple_qr import encoding, decoding
import time
import json
import argparse
saved_QR = {}
def create_html_receipt(receipt, name, filepath):
path = encoding(receipt, name)
with open('receipt_template.html', "r") as... | 33 | 23.82 | 64 | 13 | 196 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_25fec6a424335c76_30028f1b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
15
] | [
null
] | [
9
] | [
27
] | |
2024-11-19T02:28:50.130204+00:00 | 1,662,362,316,000 | 7d05e8dbf2894588d4f8f4f2de6ace6074fc4b73 | 2 | {
"blob_id": "7d05e8dbf2894588d4f8f4f2de6ace6074fc4b73",
"branch_name": "refs/heads/master",
"committer_date": 1662362316000,
"content_id": "90272d6525a7e31845e971d84f3de1a8a17038e5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e96889bdfc11b1fefe00b23ca3ef0944f6cce3e6",
"extension": "py"... | 2.34375 | stackv2 | """
Routes related to users(admin, extractor and management).
"""
from flask import Blueprint, jsonify, request
from flask.globals import current_app
from flask.helpers import make_response
from api.models.admin import Admin
from api.models.extractor import Extractor
from api.models.management import Management
from a... | 531 | 29.44 | 168 | 17 | 3,405 | python | [{"finding_id": "codeql_py/stack-trace-exposure_014a338ac3258a87_afea890b", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
199,
221,
271,
296
] | [
null,
null,
null,
null
] | [
38,
38,
42,
42
] | [
46,
46,
50,
50
] | |
2024-11-19T02:28:52.530954+00:00 | 1,633,628,367,000 | 5457b3ef0f7ffc800bd54ce68b19a678bdfd8b9c | 3 | {
"blob_id": "5457b3ef0f7ffc800bd54ce68b19a678bdfd8b9c",
"branch_name": "refs/heads/master",
"committer_date": 1633628367000,
"content_id": "e65932c2944da1fd4ce8c58467340bbcd2bb881b",
"detected_licenses": [
"MIT"
],
"directory_id": "bf27149c253827ea87cdcedda0e9c1cf56b9e905",
"extension": "py",
"fi... | 2.890625 | stackv2 | # write your code here
import argparse
import sys
import socket
import itertools
#parser = argparse.ArgumentParser(description="hacking website passwords")
#parser.add_argument("addrress")
#parser.add_argument("port")
#parser.add_argument("password")
args = sys.argv
ipaddress = args[1]
port = int(args[2])
def make... | 67 | 29.25 | 126 | 16 | 473 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6973ab63c7507827_48ee6950", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
65
] | [
null
] | [
7
] | [
15
] | |
2024-11-19T02:36:43.985978+00:00 | 1,569,553,221,000 | 9f0c37aa9ec5d2c9a8215fee585dbf7d133f9bb7 | 2 | {
"blob_id": "9f0c37aa9ec5d2c9a8215fee585dbf7d133f9bb7",
"branch_name": "refs/heads/master",
"committer_date": 1569553221000,
"content_id": "19edf75728a62ed0eb85a897e501618971c08f17",
"detected_licenses": [
"MIT"
],
"directory_id": "c43e39443b09c2ca792335d3f407fd08dfe3f83e",
"extension": "py",
"fi... | 2.4375 | stackv2 | # -*- coding:utf-8 -*-
import urllib
import os
import hashlib
import random
import requests
import json
import sys
import re
from flask import Flask, request, render_template
def dealInput(content):
#rep = r'[^\u4e00-\u9fa5]'
#newStr = re.sub(rep, '', content)
if content == '':
return '这是一只鸟'
... | 71 | 23.24 | 146 | 20 | 480 | python | [{"finding_id": "codeql_py/flask-debug_379b0f151b4dd99c_c2b0ea43", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-327"
] | [
"py/flask-debug",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
71,
52
] | [
null,
null
] | [
5,
15
] | [
24,
35
] | |
2024-11-19T02:36:45.655530+00:00 | 1,674,509,735,000 | 9a153d3c41380fc5857fef595a9a2ddb671e6c74 | 2 | {
"blob_id": "9a153d3c41380fc5857fef595a9a2ddb671e6c74",
"branch_name": "refs/heads/master",
"committer_date": 1674509735000,
"content_id": "10a03e8e423d93f9bfdae42dd7f7a116ffff0b41",
"detected_licenses": [
"MIT"
],
"directory_id": "e29386e84639c9747b7a6b7f1ad44b3b1b8de38b",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/env python3
# ---------------------------------------------------------
# Definition off all flask app endpoints/routes
# ---------------------------------------------------------
import logging
import os
import subprocess
import time
from flask import jsonify, render_template, request
from app import ap... | 179 | 30.54 | 123 | 25 | 1,056 | python | [{"finding_id": "codeql_py/stack-trace-exposure_5aee821703a7d1bc_58aa63e4", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
164
] | [
null
] | [
20
] | [
60
] | |
2024-11-19T02:36:53.369187+00:00 | 1,636,194,556,000 | 6aa8f90d9fb335b47c49719fb515a98dd341d246 | 3 | {
"blob_id": "6aa8f90d9fb335b47c49719fb515a98dd341d246",
"branch_name": "refs/heads/main",
"committer_date": 1636194556000,
"content_id": "dc8b07888dfa325312094cf62ae485f1ffb17121",
"detected_licenses": [
"Unlicense"
],
"directory_id": "45b4ea214c86f02eb168bf9828357eff0dd283d2",
"extension": "py",
... | 3.375 | stackv2 | from Crypto.Cipher import DES
from Crypto.Cipher import DES3
from Crypto.Random import get_random_bytes
from Crypto.Util.Padding import pad
from Crypto.Util.Padding import unpad
import base64
def base64Encoding(input):
dataBase64 = base64.b64encode(input)
dataBase64P = dataBase64.decode("UTF-8")
return dataBase6... | 115 | 41.24 | 91 | 13 | 1,438 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_0e6da678457636e0_b3398340", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES](1) is broken or weak, and should not be used.", "r... | 4 | true | [
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The cryptographic algorithm DES](1) is broken or weak, and should not be used.",
"[The cryptographic algorithm DES](1) is broken or weak, and should not be used.",
"[The cryptographic algorithm DES3](1) is broken or weak, and should not be used.",
"[The cryptographic algorithm DES3](1) is broken or weak, an... | [
29,
39,
48,
58
] | [
null,
null,
null,
null
] | [
16,
19,
16,
19
] | [
64,
45,
64,
45
] | |
2024-11-19T02:37:08.514432+00:00 | 1,659,518,023,000 | 9b0b4506a7a85a968520394a952af4023c817fbb | 2 | {
"blob_id": "9b0b4506a7a85a968520394a952af4023c817fbb",
"branch_name": "refs/heads/master",
"committer_date": 1659518023000,
"content_id": "7e6f49e684408f09ccd6d71c54ba18fb9d8d791c",
"detected_licenses": [
"MIT"
],
"directory_id": "91bd14aca9d962fd21cf32def42678178c7b4f94",
"extension": "py",
"fi... | 2.390625 | stackv2 | # example_webserver.py #
########################
from flask import Flask, request
import praw
app = Flask(__name__)
CLIENT_ID = 'YOUR_CLIENT_ID'
CLIENT_SECRET = 'YOUR CLIENT SECRET'
REDIRECT_URI = 'http://127.0.0.1:65010/authorize_callback'
@app.route('/')
def homepage():
link_no_refresh = r.get_authorize_url... | 43 | 36.79 | 74 | 11 | 410 | python | [{"finding_id": "codeql_py/flask-debug_76ede0f6ab2a3e87_b6d85b9f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
43,
36
] | [
null,
null
] | [
5,
12
] | [
36,
75
] | |
2024-11-19T02:37:11.393448+00:00 | 1,582,775,915,000 | 619d2dc6a5b74e005bc8f61c95414bc631653563 | 3 | {
"blob_id": "619d2dc6a5b74e005bc8f61c95414bc631653563",
"branch_name": "refs/heads/master",
"committer_date": 1582775915000,
"content_id": "9364441528636906947484b0349595f8688ad1a9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1a27c2d9b60eb34e0f63c13f8d47d8fdf3db0a7b",
"extension": "py"... | 2.53125 | stackv2 | from flask import Flask, make_response, request
app = Flask(__name__)
@app.route('/read')
def read():
username = request.cookies.get('username', 'NOT_FOUND')
resp = app.make_response(username)
resp.mimetype = "text/plain"
return resp
@app.route('/write')
def write():
text = 'foobar'
resp =... | 22 | 18.68 | 59 | 10 | 102 | python | [{"finding_id": "codeql_py/insecure-cookie_85ccb8e8b56ff156_4af2a296", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"... | 3 | true | [
"CWE-614",
"CWE-1004",
"CWE-079"
] | [
"py/insecure-cookie",
"py/client-exposed-cookie",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cookie is added to response without the 'secure' flag being set.",
"Sensitive server cookie is set without HttpOnly flag.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
21,
21,
10
] | [
null,
null,
null
] | [
5,
5,
30
] | [
38,
38,
38
] | |
2024-11-19T02:37:17.592582+00:00 | 1,568,292,417,000 | 9acc3fd6a712637cd84d0e927328e6c36cdde18e | 3 | {
"blob_id": "9acc3fd6a712637cd84d0e927328e6c36cdde18e",
"branch_name": "refs/heads/master",
"committer_date": 1568292417000,
"content_id": "561760b546ae01f95296f5d0f243762c03771f6a",
"detected_licenses": [
"MIT"
],
"directory_id": "564cf0465e12cc41a7b0b17490207aff44c320d8",
"extension": "py",
"fi... | 2.671875 | stackv2 | import pathlib
from typing import Optional, Dict, Any, List
import sciwing.constants as constants
from questionary.prompts.common import Choice
import jinja2
import questionary
import wasabi
import autopep8
from sciwing.commands.validators import is_file_exist
PATHS = constants.PATHS
TEMPLATES_DIR = PATHS["TEMPLATES_D... | 376 | 34.51 | 104 | 19 | 2,717 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5ff69eab81726b64_6a0c47e3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
47
] | [
null
] | [
26
] | [
58
] | |
2024-11-19T02:49:09.682476+00:00 | 1,619,601,157,000 | cfdb3bb9764e92bb3f064a59f32ce363588c14b4 | 2 | {
"blob_id": "cfdb3bb9764e92bb3f064a59f32ce363588c14b4",
"branch_name": "refs/heads/main",
"committer_date": 1619601157000,
"content_id": "d1c568ad830468be19140558e59d3feca166f78e",
"detected_licenses": [
"MIT"
],
"directory_id": "64bc8a72846338f2c9527257dab8972ce019eb80",
"extension": "py",
"file... | 2.46875 | stackv2 | """
Routes and views for the flask application.
"""
import uuid
from datetime import datetime
import msal
from flask import flash, jsonify, redirect, render_template, request, session, url_for
from flask_login import current_user, login_required, login_user, logout_user
from werkzeug.urls import url_parse
from confi... | 175 | 32.21 | 99 | 16 | 1,258 | python | [{"finding_id": "codeql_py/url-redirection_6471ec0443fcf66d_bcfc6990", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
61
] | [
null
] | [
25
] | [
34
] | |
2024-11-19T02:49:14.567434+00:00 | 1,542,396,343,000 | 7539944e30166765cb83fdd6889424198fefe7a4 | 3 | {
"blob_id": "7539944e30166765cb83fdd6889424198fefe7a4",
"branch_name": "refs/heads/master",
"committer_date": 1542396343000,
"content_id": "f8fc71f236af582004b3626970aeee75ac6ce495",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "29b306797f4ee7848b8986d26d632e7e49526320",
"extension": "py"... | 2.65625 | stackv2 | #Eric Jacobson
#erjacobs@redhat.com
#29 June 2018
#
#Watch endpoints as a service (WEaaS)
#
import itertools
import resources.rabbitListener as listener
import sys
import threading
import logging
from yaml import load
from flask import Flask, Response, request
from resources.client import Client
from keystoneauth1 im... | 140 | 26.64 | 82 | 18 | 823 | python | [{"finding_id": "codeql_py/log-injection_a43c4ec62bab8c6c_d3ce488d", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
50
] | [
null
] | [
22
] | [
62
] | |
2024-11-19T02:49:26.316386+00:00 | 1,599,360,696,000 | 8cad12a28e1fddcf3feb9cb4c5826880d5c0d836 | 2 | {
"blob_id": "8cad12a28e1fddcf3feb9cb4c5826880d5c0d836",
"branch_name": "refs/heads/master",
"committer_date": 1599360696000,
"content_id": "6462defb9c172faf4d54f2f21517aa336543870d",
"detected_licenses": [
"MIT"
],
"directory_id": "f8563562fd3a563438b96c676ddcc0bc15fbcc3f",
"extension": "py",
"fi... | 2.390625 | stackv2 | from django.shortcuts import render
from django.views.generic import View
from utils import restful,files
from apps.analysis.models import NetWorkManager
import networkx as nx
import matplotlib.pyplot as plt
from datetime import datetime
import os
from django.conf import settings
class NetworkGenerate(View):
def... | 218 | 40.36 | 136 | 18 | 2,165 | python | [{"finding_id": "codeql_py/path-injection_de244aa4f9fb616c_1221ca4d", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
199,
201
] | [
null,
null
] | [
33,
25
] | [
41,
33
] | |
2024-11-19T02:49:27.589281+00:00 | 1,551,126,411,000 | 156f156fd1d3c728752b433626ef9a6381fc8ea8 | 3 | {
"blob_id": "156f156fd1d3c728752b433626ef9a6381fc8ea8",
"branch_name": "refs/heads/master",
"committer_date": 1551126411000,
"content_id": "124b44c43266a91c102e0d71bb75001bbc97e807",
"detected_licenses": [
"MIT"
],
"directory_id": "9d9b066ed87d0d380cb541d198a6779eccdbfe77",
"extension": "py",
"fi... | 2.828125 | stackv2 | #!/usr/local/bin/python
# Author: Scott Chubb scott.chubb@netapp.com
# Written for Python 3.4 and above
# No warranty is offered, use at your own risk. While these scripts have been tested in lab situations, all use cases cannot be accounted for.
# Date: 13-Feb-2018
# This scripts shows how to gather volume informatio... | 66 | 43.59 | 143 | 24 | 780 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c43581c7b99dacc3_32c01102", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
59
] | [
null
] | [
16
] | [
90
] | |
2024-11-19T03:00:31.602439+00:00 | 1,597,021,180,000 | 42150342808e964db0d5d4cc864138f60a464eb8 | 3 | {
"blob_id": "42150342808e964db0d5d4cc864138f60a464eb8",
"branch_name": "refs/heads/master",
"committer_date": 1597021180000,
"content_id": "7a35e5f99ac98f0ca4c479a32c40787d1b7d4eb9",
"detected_licenses": [
"MIT"
],
"directory_id": "d53f2ff7e9a0487457beac2e3946b0c533e31600",
"extension": "py",
"fi... | 2.578125 | stackv2 | # Version : 2.5
import re
import timelib
import Threadinglib
import json
import os
from collections import deque
import requests
import threading
import sys
from queue import Queue
def handle_url(url: str):
return "https://m.weibo.cn/status"+url[url.rindex("/"):]
def download_beta(path="", iter=""):
while i... | 131 | 28.53 | 94 | 20 | 1,040 | python | [{"finding_id": "codeql_py/overly-large-range_9b5c6dea17bc9ffb_56f8e8d8", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
61
] | [
null
] | [
59
] | [
62
] | |
2024-11-19T03:00:35.250095+00:00 | 1,601,566,429,000 | edd0742dd672f49c6f7b055656860f48fbbcd478 | 3 | {
"blob_id": "edd0742dd672f49c6f7b055656860f48fbbcd478",
"branch_name": "refs/heads/master",
"committer_date": 1601566429000,
"content_id": "44e2489b419b6eec3e0e1574cebbaee2418b0892",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "ff36e7a5769ab8001f29c3c91fc0cf965146499b",
"extension": "p... | 2.890625 | stackv2 | import os
import string
import hashlib
from django.conf import settings
def generate_random_string(length,
stringset="".join(
[string.ascii_letters+string.digits]
)):
"""
Returns a string with `length` characters chosen from ... | 22 | 27.14 | 69 | 13 | 137 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b82fa8eada16f9b4_6f92e2a0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
19
] | [
22
] | [
25
] | [
7
] | |
2024-11-19T03:11:40.435767+00:00 | 1,540,146,900,000 | a4198885927944e3adc6568d007361b39882d041 | 2 | {
"blob_id": "a4198885927944e3adc6568d007361b39882d041",
"branch_name": "refs/heads/master",
"committer_date": 1540146900000,
"content_id": "4ca61ca4a34ed50e1651d3db0c58189235254e14",
"detected_licenses": [
"MIT"
],
"directory_id": "b1441a5fd0cb78cc0478fd29e813b08ecfe4bed5",
"extension": "py",
"fi... | 2.453125 | stackv2 | # Code by
# Kelly Lehman
# @r3curs3
# 10/19/2018
import pyotp
from datetime import datetime, date, timedelta
import calendar
import json
import requests
from html.parser import HTMLParser
def get_time(tmp):
time = tmp.split()
month = dict((v,k) for k,v in enumerate(calendar.month_abbr))[time[4].strip(' ,')[0:... | 41 | 30.8 | 95 | 16 | 375 | python | [{"finding_id": "codeql_py/request-without-cert-validation_9f632ec4c0bbf778_01134091", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
36,
39,
40
] | [
null,
null,
null
] | [
13,
5,
5
] | [
44,
64,
96
] | |
2024-11-19T03:12:09.394371+00:00 | 1,461,615,745,000 | bc3dda363580cb7b58642c70dbbcd162e0f8e975 | 3 | {
"blob_id": "bc3dda363580cb7b58642c70dbbcd162e0f8e975",
"branch_name": "refs/heads/master",
"committer_date": 1461615745000,
"content_id": "b4de4c05752b438112e8db22f2b4f1d2330d7f1b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c03c4cf64f6d829c3dd22c56fecd3a0089c363dd",
"extension": "py"... | 2.546875 | stackv2 | """
next_backend Logs Resource
author: Christopher Fernandez, Lalit Jain
Logs resource for all logs associated with a specified experiment.
"""
'''
example use:
get a tripletMDS query:
curl -X GET http://localhost:8001/api/experiment/[exp_uid]/[exp_key]/logs
'''
from flask import Flask, request, send_file
from flask... | 118 | 29.86 | 100 | 18 | 778 | python | [{"finding_id": "codeql_py/code-injection_8064b84e6fc618ad_094f8419", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-094"
] | [
"py/code-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1)."
] | [
92
] | [
null
] | [
33
] | [
56
] | |
2024-11-19T03:12:11.931302+00:00 | 1,687,549,239,000 | b13a9f39d0ac3166c651e38d97eeacc747cafc39 | 3 | {
"blob_id": "b13a9f39d0ac3166c651e38d97eeacc747cafc39",
"branch_name": "refs/heads/main",
"committer_date": 1687549239000,
"content_id": "ff8a55ad880b429a5b977e16c080e3207c1dcc31",
"detected_licenses": [
"MIT"
],
"directory_id": "0cdabf8a5eed0cfd7c0316a8ebfccf6c38faf16d",
"extension": "py",
"file... | 2.671875 | stackv2 | """Test orchestration and report generation module."""
import pathlib
import datetime
import logging
import unittest
from typing import Dict, Tuple
import jinja2
import markdown
from .decorators import FIGURES
logger = logging.getLogger(__name__)
def discover_and_run(
tests_dir: str = ".", pattern: str = "test... | 93 | 38.63 | 97 | 14 | 828 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_496ec1b0f4f02b83_837e36c2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
55
] | [
null
] | [
11
] | [
76
] | |
2024-11-19T03:12:30.762874+00:00 | 1,599,025,647,000 | 5b5c3a1db71fb844cb12a3451cf6e4d09187920e | 3 | {
"blob_id": "5b5c3a1db71fb844cb12a3451cf6e4d09187920e",
"branch_name": "refs/heads/master",
"committer_date": 1599025647000,
"content_id": "bf87496355909c3edfec2c34a1c9823f7ac6e196",
"detected_licenses": [
"MIT"
],
"directory_id": "0b839a2ed7af7753c6e14db6c0bafd0256b4885c",
"extension": "py",
"fi... | 2.578125 | stackv2 | import asyncio
import configparser
from datetime import datetime
import json
import signal
import sys
import time
from urllib.parse import urlparse
RETRIES = 10
async def send_auth(reader, writer, user, password):
auth = {"params": [user, password], "id": 2, "method": "mining.authorize"}
print(f'send: {auth}... | 82 | 27.6 | 78 | 18 | 497 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d01a0823452b0a3a_adb2178c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
15
] | [
null
] | [
11
] | [
26
] | |
2024-11-19T03:12:42.117479+00:00 | 1,551,794,655,000 | b1f349b5106f4ebd32ce21179beefd3a5493ef20 | 3 | {
"blob_id": "b1f349b5106f4ebd32ce21179beefd3a5493ef20",
"branch_name": "refs/heads/master",
"committer_date": 1551794655000,
"content_id": "ef87916feb1e15d8caaf16e4a2c8c092d9eaccf4",
"detected_licenses": [
"MIT"
],
"directory_id": "25c349dcf75117ce26108e35322c266448dc7203",
"extension": "py",
"fi... | 3.234375 | stackv2 | # -*- coding: utf-8 -*-
"""
@author: Jatin Goel
File for performing operations on a resource.
This file consists of a class: **UnixResource**, which can connect to the remote
UNIX Machine, using SSH via Paramiko.
The instance of this class can be used to perform various operations on a machine, like,
#. Check... | 447 | 30.52 | 112 | 19 | 2,751 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_ddc5faa059b5753f_3ac0926b", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
126
] | [
null
] | [
9
] | [
75
] | |
2024-11-19T03:25:17.919611+00:00 | 1,633,206,486,000 | f8bd899e802640ac0b7dc304e92af468edfecea5 | 2 | {
"blob_id": "f8bd899e802640ac0b7dc304e92af468edfecea5",
"branch_name": "refs/heads/main",
"committer_date": 1633206486000,
"content_id": "3658119775d1c51791ffd18b1a3cb40b51b8de1a",
"detected_licenses": [
"MIT"
],
"directory_id": "59e3ae7b03badac86d8e476f080621ac454c2224",
"extension": "py",
"file... | 2.421875 | stackv2 | from base64 import b64encode, b64decode
from pwn import *
from string import printable
from Crypto.Cipher import AES
key = '!_SECRETSOURCE_!'
p = remote('pwn-2021.duc.tf', 31914)
# for n in range(len(key) + 1, 17):
# p.sendlineafter(b"Enter plaintext:\n", b"A"*n)
# chunk4 = b64decode(p.recvline(keepends=Fal... | 29 | 30.1 | 93 | 10 | 295 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_6d91d3ef39824788_5937ef11", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
29
] | [
null
] | [
7
] | [
31
] | |
2024-11-19T03:25:38.940123+00:00 | 1,565,838,556,000 | 1d5f8c153c19f8751a67aebfde8e58a478ef5690 | 2 | {
"blob_id": "1d5f8c153c19f8751a67aebfde8e58a478ef5690",
"branch_name": "refs/heads/master",
"committer_date": 1565838556000,
"content_id": "e4c6a55ba93b636cca6c26a18660d1c34ff3d124",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "8d5feca858f443606da87fefd600a32e956f2dc9",
"extension": "p... | 2.46875 | stackv2 | #!/usr/bin/env python
import os
import glob
import platform
import sys
# tab completion
def complete(text, state):
a = (glob.glob(text + '*') + [None])[state].replace("__init__.py", "").replace(".py", "").replace("LICENSE", "").replace(
"README.md", "").replace("config", "").replace("ptf", "").replace("re... | 193 | 33.91 | 160 | 32 | 1,902 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a9eb23589b331edd_44b03fb4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
82,
84,
88,
90
] | [
null,
null,
null,
null
] | [
15,
15,
15,
15
] | [
156,
137,
160,
139
] | |
2024-11-19T03:35:43.608877+00:00 | 1,620,894,554,000 | 2920a0d0bfa1e4bcaff6ed3178fafd3364762799 | 3 | {
"blob_id": "2920a0d0bfa1e4bcaff6ed3178fafd3364762799",
"branch_name": "refs/heads/main",
"committer_date": 1620895207000,
"content_id": "61576865a99d2e10349e73858f3fadd69b32e5d5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a7f8417ec32e03a8af39ad772e4bf51ab13f92c8",
"extension": "py",
... | 2.515625 | stackv2 | """
@version: 1.0
@author: Dfly
@site:
@software: PyCharm
@time: 2021/5/11 10:58
connect to mysql
"""
#!/usr/bin/python
# -*- coding: UTF-8 -*-
#import readConf
import readConf
from readConf import *
import pymysql.cursors
#import readConf
print(readConf.host1,readConf.port,readConf.username,readConf.password,readConf... | 52 | 17.5 | 138 | 12 | 284 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a07cc42593d973e5_b5b2b27a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
17
] | [
null
] | [
54
] | [
71
] | |
2024-11-19T01:28:49.830109+00:00 | 1,571,598,307,000 | 47f2c7f86fee62ca40c639e08b7ad4ec0525af11 | 3 | {
"blob_id": "47f2c7f86fee62ca40c639e08b7ad4ec0525af11",
"branch_name": "refs/heads/master",
"committer_date": 1571598307000,
"content_id": "3151d0554805672cd19f60eeda88ef856becc17b",
"detected_licenses": [
"MIT"
],
"directory_id": "33d975a44d8a38611b9d77a63efaa41a97e38454",
"extension": "py",
"fi... | 3 | stackv2 | import requests
import urllib
import json
from os import remove
from PIL import Image
from bs4 import BeautifulSoup
def is_connected():
try:
host = socket.gethostbyname('www.google.co.in')
socket.create_connection((host, 80))
return True
except:
pass
return False
def take_i... | 154 | 23.53 | 61 | 17 | 921 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_0aaa70fb32ce361e_c0147b4c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [imdb.com](1) may be at an arbitrary position in the sa... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [imdb.com](1) may be at an arbitrary position in the sanitized URL."
] | [
31
] | [
null
] | [
12
] | [
47
] | |
2024-11-19T01:28:54.198368+00:00 | 1,615,561,868,000 | 111a99243ff7db150f58fba07f862c7b50f604a2 | 3 | {
"blob_id": "111a99243ff7db150f58fba07f862c7b50f604a2",
"branch_name": "refs/heads/master",
"committer_date": 1615561868000,
"content_id": "0bd74ffa85bd751e35d057da813c69f170965b4e",
"detected_licenses": [
"MIT"
],
"directory_id": "87ebd5bd04fbc7981adbc768dc9a72023a747264",
"extension": "py",
"fi... | 2.65625 | stackv2 | from encryption import password_encrypt
from nfilepicker import select_folder
from getpass import getpass
from argparse import ArgumentParser
from hashlib import sha1
import sqlite3
import time
import sys
import os.path
import pyperclip
import base64
def cleanup():
cur.close()
conn.close()
def start_service... | 85 | 29.91 | 111 | 20 | 640 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_5efd15a991b651a8_a95ee77b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
37
] | [
null
] | [
9
] | [
41
] | |
2024-11-19T01:28:55.083845+00:00 | 1,560,762,188,000 | c2c99e70e32ee9e3f659a6273defc8cf50e0795a | 2 | {
"blob_id": "c2c99e70e32ee9e3f659a6273defc8cf50e0795a",
"branch_name": "refs/heads/master",
"committer_date": 1560762188000,
"content_id": "7cf3df85ee52bd36d960c87576cd13073596c871",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "b3c042be1481d0e3f26cfcad1c40d1f3bfa8b22d",
"extension": "p... | 2.421875 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
from os import getcwd, path
import os
from os import listdir
from os.path import isfile, join
import time
import json
from flask import Flask, request
from flask_restful import Resource, Api
from threading import Timer
import urllib
import subprocess
#print('install... | 106 | 24.92 | 133 | 18 | 669 | python | [{"finding_id": "codeql_py/path-injection_3024a42ea0def05c_064628a3", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
53
] | [
null
] | [
25
] | [
106
] | |
2024-11-19T01:29:17.700379+00:00 | 1,617,291,223,000 | d09c048c18f973ad6a199f51963ef42da6dbc907 | 2 | {
"blob_id": "d09c048c18f973ad6a199f51963ef42da6dbc907",
"branch_name": "refs/heads/master",
"committer_date": 1617291223000,
"content_id": "9f6379774ce2b2584db6f50481bd1e63abf96be5",
"detected_licenses": [
"MIT"
],
"directory_id": "2af5c3949877086dbd64ffb45e058805b5ee822a",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/env python3
from pathlib import Path
import click
from jinja2 import Environment, FileSystemLoader
@click.command()
@click.argument('template', type=click.Path(dir_okay=False, resolve_path=True))
@click.option('--output', type=click.Path(dir_okay=False, resolve_path=True))
def form(template, output):
... | 31 | 28 | 79 | 14 | 200 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_93d408242f6d92a2_1dc39d92", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25
] | [
null
] | [
11
] | [
63
] | |
2024-11-19T01:29:33.469420+00:00 | 1,506,047,115,000 | a02b25a8987603d70cc4ecab4ef63d1b323a3243 | 3 | {
"blob_id": "a02b25a8987603d70cc4ecab4ef63d1b323a3243",
"branch_name": "refs/heads/master",
"committer_date": 1506047115000,
"content_id": "ed1b7983219f91c89501ec88565604953d3d51d7",
"detected_licenses": [
"MIT"
],
"directory_id": "2b744f6637be1f47e7323ad6168c0bfb385c8a5f",
"extension": "py",
"fi... | 2.734375 | stackv2 | #!/usr/bin/env python
# coding=utf-8
"""
This call sends an email to one recipient, using a validated sender address
Do not forget to update the sender address used in the sample
"""
from mailjet_rest import Client
import configparser
from util import ConfigSectionMap
## print the success or failure of your calls.
de... | 72 | 29.65 | 105 | 11 | 568 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_deede7d7549c0f09_0e63363a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
52,
53
] | [
null,
null
] | [
11,
11
] | [
17,
20
] | |
2024-11-19T01:29:58.312584+00:00 | 1,634,383,876,000 | ef74d2096516b17ba5ca4426f46a1712befc67d2 | 3 | {
"blob_id": "ef74d2096516b17ba5ca4426f46a1712befc67d2",
"branch_name": "refs/heads/main",
"committer_date": 1634383876000,
"content_id": "329049b7180095200aefa04e4d4e4865b6c4aabd",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "c9566d9845648b283dfdc123eaaf87444bc15f05",
"extension": "py",
"... | 2.765625 | stackv2 | '''
Documentation, License etc.
list of contractions:- https://en.wikipedia.org/wiki/Wikipedia:List_of_English_contractions
@package process_twitter_data
'''
# $SPARK_HOME/bin/spark-submit --master spark://LAPTOP-7DUT93OF.localdomain:7077 --executor-memory 6700mb ./process_twitter_data_udf_split.py
# All python functio... | 236 | 42.83 | 157 | 16 | 2,420 | python | [{"finding_id": "codeql_py/overly-large-range_26b588a92f3a9daa_95d2a4e7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
64,
64
] | [
null,
null
] | [
22,
66
] | [
25,
69
] | |
2024-11-19T01:30:26.091055+00:00 | 1,542,184,897,000 | 77165a102b2665a7ec990e10a11b8d2633f8caa0 | 2 | {
"blob_id": "77165a102b2665a7ec990e10a11b8d2633f8caa0",
"branch_name": "refs/heads/master",
"committer_date": 1542184897000,
"content_id": "f2ba2638c531825b20e13c608c3bf946ddecb9d2",
"detected_licenses": [
"MIT"
],
"directory_id": "4adae2f4e7ab1d67d5275d077585115be773723c",
"extension": "py",
"fi... | 2.359375 | stackv2 | from pathlib import Path
from jinja2 import Environment, FileSystemLoader
import yaml
# Configuration
base_path = Path('.') / 'templates'
base_values = yaml.load((base_path / 'aws-values.yaml').read_text())
all_kinds = dict(
(p.stem[5:], yaml.load(p.read_text()))
for p in
base_path.glob('kind-*.yaml')
... | 46 | 23.02 | 72 | 13 | 259 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_869beae118289acb_5e1b21a4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
17
] | [
null
] | [
10
] | [
51
] | |
2024-11-19T01:30:37.397154+00:00 | 1,483,537,158,000 | a51382ce3a9a1e81464b186498dfd6707c70dddb | 3 | {
"blob_id": "a51382ce3a9a1e81464b186498dfd6707c70dddb",
"branch_name": "refs/heads/master",
"committer_date": 1483537158000,
"content_id": "367ac7939a1a8ecefe1d4a8d7f4a744eb7e2714b",
"detected_licenses": [
"MIT"
],
"directory_id": "5130addcf84d1b258ff1dc729f19acc4638140fc",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/env python
"""
File: structing.py
Author: Wen Li
Email: spacelis@gmail.com
Github: http://github.com/spacelis
Description:
This module provides tools for generating table structures for csv files.
"""
import re
from os.path import basename
from textwrap import dedent
import click
import messytables as m... | 298 | 25.38 | 94 | 18 | 1,789 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ec4849294bcfb5ae_6c83f846", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
36,
99,
128
] | [
61,
null,
136
] | [
16,
16,
16
] | [
7,
64,
7
] | |
2024-11-19T01:54:46.521898+00:00 | 1,599,751,171,000 | 17210b42fa19b98ee18aa494e1856a45c6f271b2 | 3 | {
"blob_id": "17210b42fa19b98ee18aa494e1856a45c6f271b2",
"branch_name": "refs/heads/master",
"committer_date": 1599751171000,
"content_id": "10b7dc7f7396349494edd1a2e98d439ef1da5e40",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ccf8e9a4cfc6435f664059192ddccd744b2945e4",
"extension": "py"... | 2.9375 | stackv2 | from django.shortcuts import render
from django.http import HttpResponse
from django.shortcuts import redirect
from django.core.urlresolvers import reverse
from common.models import Users
# Create your views here.
def index(request):
'''管理后台首页'''
return render(request,"myadmin/index.html")
def login(request):... | 105 | 30.13 | 73 | 16 | 1,013 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1d5b0321af6bb682_71b9e2a9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
33
] | [
null
] | [
22
] | [
69
] | |
2024-11-19T01:54:48.860851+00:00 | 1,583,175,231,000 | 2a93adb60d19e7c25017db42e61e4648db0e5f58 | 2 | {
"blob_id": "2a93adb60d19e7c25017db42e61e4648db0e5f58",
"branch_name": "refs/heads/master",
"committer_date": 1583175231000,
"content_id": "4b901158595314cd77e5ecbbe1d710caf746ae0a",
"detected_licenses": [
"MIT"
],
"directory_id": "80c2aded2db5e53b4240636ee74b00e2fef10ef6",
"extension": "py",
"fi... | 2.421875 | stackv2 | import os
import sys
import datetime
import git
from jinja2 import Template
def git_root():
root, = os.popen('git rev-parse --show-toplevel')
return root.strip()
def get_last_changed(fname):
repo = git.Repo(git_root())
blame = repo.blame('HEAD', os.path.abspath(fname))
line_dt = {line: commit.a... | 50 | 26.48 | 114 | 15 | 325 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8dd27e9fab1bb247_7ff16483", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
44
] | [
null
] | [
20
] | [
75
] | |
2024-11-19T01:54:57.220075+00:00 | 1,572,609,571,000 | 7eedd823c42fa2af0d9462d152aa7ff96ebe032e | 3 | {
"blob_id": "7eedd823c42fa2af0d9462d152aa7ff96ebe032e",
"branch_name": "refs/heads/master",
"committer_date": 1572609571000,
"content_id": "c9493abf3647e64ee017963764b624f935443126",
"detected_licenses": [
"MIT"
],
"directory_id": "380f652ad3bc69a2e751871a3e562c7a13d1487e",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/bin/python3
from flask import Flask, abort, jsonify, request
from flask_cors import CORS
import MeCab
import os
app = Flask(__name__)
cors = CORS(app, resources={r"/mecab/*": {"origins": "*"}})
messages = ['Success', 'Faild']
@app.route('/mecab/v1/parse-ipadic', methods=['POST'])
def parse_ipadic():
sdict ... | 78 | 29.67 | 124 | 18 | 780 | python | [{"finding_id": "codeql_py/flask-debug_2e479963cdaf720b_022adcad", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
78,
57
] | [
null,
null
] | [
5,
49
] | [
51,
59
] | |
2024-11-19T01:55:02.664079+00:00 | 1,565,330,498,000 | ae71baf31f7c58ee5c597e8e5f7422ce4c3d0e4a | 2 | {
"blob_id": "ae71baf31f7c58ee5c597e8e5f7422ce4c3d0e4a",
"branch_name": "refs/heads/master",
"committer_date": 1565330498000,
"content_id": "166df3adb7d4ad968a32e749d744ba29d5b91299",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3c95972abacdb1556a0df80eecebba2694492865",
"extension": "py"... | 2.359375 | stackv2 | import os
from app import app
from flask import request
from flask import jsonify
from app.main.conf import conf_data
from app.utils.myencrypt import create_key, verify_key
from app.main.file_upload_down import DownRemoteFile, UpDownFile
from flask import send_file, send_from_directory
from app import work_log
@app.r... | 77 | 31.4 | 94 | 15 | 625 | python | [{"finding_id": "codeql_py/stack-trace-exposure_f2f285ce4fa52871_85abd221", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-022",
"CWE-022"
] | [
"py/stack-trace-exposure",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
75,
65,
69
] | [
null,
null,
null
] | [
24,
19,
19
] | [
55,
28,
28
] | |
2024-11-19T02:06:45.110807+00:00 | 1,555,893,852,000 | ccf91ec29fce9d8bcf26eaf56f6445a4a54c28d3 | 3 | {
"blob_id": "ccf91ec29fce9d8bcf26eaf56f6445a4a54c28d3",
"branch_name": "refs/heads/master",
"committer_date": 1555893852000,
"content_id": "f91534f3293e093125e1f1ad67e939328fdb30e2",
"detected_licenses": [
"MIT"
],
"directory_id": "c1dd9d57da11ac57f0a2096204c3c781be34ef9d",
"extension": "py",
"fi... | 2.65625 | stackv2 | import msoffcrypto
import sys, getopt
import os
import urllib.request
def download_PasswordList():
#Grabbed from https://github.com/danielmiessler/SecLists
url = 'https://raw.githubusercontent.com/danielmiessler/SecLists/master/Passwords/Common-Credentials/10-million-password-list-top-10000.txt'
try:
... | 119 | 33.92 | 144 | 17 | 982 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7311d1cee365d9dc_66a5ed23", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive dat... | [
28,
82,
106
] | [
null,
null,
null
] | [
16,
24,
24
] | [
53,
56,
56
] | |
2024-11-19T02:06:56.644646+00:00 | 1,582,666,393,000 | 09763287d393d904a43d6ec7e157ff2d7d22123a | 3 | {
"blob_id": "09763287d393d904a43d6ec7e157ff2d7d22123a",
"branch_name": "refs/heads/master",
"committer_date": 1582666393000,
"content_id": "2be94735fe6648dc7b5af9b7b2372c7ca6afb9c7",
"detected_licenses": [
"MIT"
],
"directory_id": "6e2ce3cad84b51bc437934bec545d92ddb01d2ae",
"extension": "py",
"fi... | 2.84375 | stackv2 | import tornado.websocket as ws
import uuid
import logging
import threading
from tornado.httpclient import HTTPClient
import time
import asyncio
logging.basicConfig(level=logging.INFO)
class WebSocket(ws.WebSocketHandler):
clients = {}
def __init__(self, application, request, *args, **kwargs):
su... | 68 | 27.66 | 115 | 18 | 410 | python | [{"finding_id": "codeql_py/log-injection_6375a947db102e64_ee5532cc", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
31
] | [
null
] | [
22
] | [
65
] | |
2024-11-19T02:07:01.855787+00:00 | 1,626,009,531,000 | 8edb3c7fb8bd4ae79dd9fb609f1a191f6ee674b5 | 2 | {
"blob_id": "8edb3c7fb8bd4ae79dd9fb609f1a191f6ee674b5",
"branch_name": "refs/heads/master",
"committer_date": 1626009531000,
"content_id": "758a1eb568bf56e8e0ec385e1c51f552009a6a10",
"detected_licenses": [
"MIT"
],
"directory_id": "f9e7ade342c192d5a37c44ae5905e44a72168f41",
"extension": "py",
"fi... | 2.453125 | stackv2 | from flask import render_template, flash, redirect, url_for,session, request, redirect
from app import app, db
from app.forms import LoginForm, RegistrationForm, AddBook, SearchForm, BookIssue, SendForm, ForgotForm, VerificationForm
from app.models import Books, User
from functools import wraps
from datetime import tim... | 259 | 43.34 | 139 | 21 | 2,482 | python | [{"finding_id": "codeql_py/url-redirection_b4867efd63d22866_41737850", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
227
] | [
null
] | [
19
] | [
23
] | |
2024-11-19T02:31:23.477310+00:00 | 1,619,345,992,000 | 9a934f5ae0998d83113373fa6535304893d870e8 | 3 | {
"blob_id": "9a934f5ae0998d83113373fa6535304893d870e8",
"branch_name": "refs/heads/master",
"committer_date": 1619345992000,
"content_id": "f1e725e3deae621d7ec31cc228e4fc3cd41f5288",
"detected_licenses": [
"MIT"
],
"directory_id": "d1a86981b8e3fe1ba37a4db9c2439b6656de37d7",
"extension": "py",
"fi... | 2.546875 | stackv2 | import os
import sys
import re
import glob
import shutil
import datetime
from jinja2 import Environment, FileSystemLoader
from . import message
from . import info
def input_info(default_str: str, input_guide, validation):
try:
while True:
input_str: str = input(input_guide(default_str)) or de... | 132 | 25.77 | 100 | 15 | 836 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5cb5d475968e9513_64582179", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
70
] | [
null
] | [
11
] | [
42
] | |
2024-11-19T02:32:02.553779+00:00 | 1,674,488,305,000 | 1079a0cfc965972e5faa867cb22b136395d91c65 | 3 | {
"blob_id": "1079a0cfc965972e5faa867cb22b136395d91c65",
"branch_name": "refs/heads/master",
"committer_date": 1674488305000,
"content_id": "9b1ed06d53fbfa8970d1fcf73c0876985c4dc153",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "23902e7a79e6466c778db2ca6a2909a762825520",
"extension": "p... | 3.15625 | stackv2 | from random import sample
from urllib.parse import urljoin
import click
import requests
from .settings import API_KEY, SOURCES, TOP_HEAD
SOURCE_URL = urljoin(SOURCES, '?apiKey={}'.format(API_KEY))
# TODO: Try a deliberate failure to see how the remote API responds
# so that your code knows how to catch those except... | 65 | 27.6 | 76 | 16 | 415 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2206a0d0c19e9826_aac6b69a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
59
] | [
63
] | [
19
] | [
14
] | |
2024-11-19T02:32:03.929570+00:00 | 1,568,565,650,000 | 45b79cc8852390f16bf90a2038c82a4f6e423f9d | 3 | {
"blob_id": "45b79cc8852390f16bf90a2038c82a4f6e423f9d",
"branch_name": "refs/heads/master",
"committer_date": 1568565650000,
"content_id": "bd2738c5004cc6eee040b2425eb8d412b8040c70",
"detected_licenses": [
"MIT"
],
"directory_id": "d106c15bd0d0292d71f94f576fc40cb1c9544432",
"extension": "py",
"fi... | 3.421875 | stackv2 | """
holds the folder and entities which represent the kv_store in vault
"""
from typing import List, Dict
from jinja2 import Template
TEMPLATE: Template = Template(u"""#### {{header}}
{% for key, value in dict.items() %}
{{" - %s" | format(key)}}
{{" - %s" | format(value)}}{% endfor %}\n\n\n""")
class Object: ... | 116 | 28.78 | 94 | 17 | 813 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_830a1b8ee1b8e0a0_cf8658e1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
9
] | [
12
] | [
22
] | [
53
] | |
2024-11-19T02:32:47.037718+00:00 | 1,538,304,498,000 | 7e742b3e138abb2c3b1b449070188f0899374868 | 2 | {
"blob_id": "7e742b3e138abb2c3b1b449070188f0899374868",
"branch_name": "refs/heads/master",
"committer_date": 1538304498000,
"content_id": "89f8bedf8550306c78c178b4f8c2ad68485778b3",
"detected_licenses": [
"MIT"
],
"directory_id": "0a799bcc0433a333cc40e05206a8532d464ab0aa",
"extension": "py",
"fi... | 2.453125 | stackv2 | """
Purchases API views
"""
import jwt
from rest_framework import viewsets, generics, status
from rest_framework.response import Response
from ..models import ArtisanProduction, PurchaseOrderDelivery
from .serializers import (ArtisanProductionSerializer,
PurchaseOrderDeliverySerializer, Valida... | 53 | 37.85 | 78 | 18 | 383 | python | [{"finding_id": "codeql_py/stack-trace-exposure_e71aeb7d15e63b9a_8f701f8e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
51
] | [
null
] | [
33
] | [
54
] | |
2024-11-19T02:33:01.827232+00:00 | 1,571,736,932,000 | a53d48e5097a987d6abcf4200c6dfebb16852045 | 3 | {
"blob_id": "a53d48e5097a987d6abcf4200c6dfebb16852045",
"branch_name": "refs/heads/master",
"committer_date": 1571736932000,
"content_id": "826c4768059c671621d78fab01d25cd94d356ed4",
"detected_licenses": [
"MIT"
],
"directory_id": "df460463d921eb5c0d6d130f919e4c9285af139f",
"extension": "py",
"fi... | 2.515625 | stackv2 | from html.parser import HTMLParser
from pathlib import Path
from typing import Union, TypeVar
import jinja2
from onemsdk.config import get_static_dir
from onemsdk.exceptions import MalformedHTMLException, ONEmSDKException
from onemsdk.parser.node import Node
from onemsdk.parser.tag import get_tag_cls, Tag
__all__ = ... | 133 | 25.26 | 74 | 16 | 810 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e1a1680fc80986d4_8aebb3c4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
118,
127
] | [
120,
129
] | [
22,
12
] | [
10,
6
] | |
2024-11-19T02:33:04.144527+00:00 | 1,634,407,184,000 | be65792ba1aaebefbfc17b0209fb9a382b3ecd64 | 3 | {
"blob_id": "be65792ba1aaebefbfc17b0209fb9a382b3ecd64",
"branch_name": "refs/heads/master",
"committer_date": 1634407184000,
"content_id": "c408f0be2b7f8b13797950ea7d252af4599e8918",
"detected_licenses": [
"MIT"
],
"directory_id": "ed32d678431a90c03f78f57ebfd1474a7d2e749a",
"extension": "py",
"fi... | 3.359375 | stackv2 | import re
class Case:
_CHECK_CAMEL_REGEX = re.compile(r"^([a-zA-Z]).([0-9a-zA-Z])*$")
_CHECK_SNAKE_REGEX = re.compile(r"((^|_+)[a-z0-9]*)*$")
_CHECK_KEBAB_REGEX = re.compile(r"((^|-+)[a-z0-9]*)*$")
_CHECK_WORDS_REGEX = re.compile(r"[0-9a-zA-Z\u0020]", re.UNICODE)
_SUB_CAMEL_REGEX = re.compile(r"((... | 83 | 20.47 | 78 | 14 | 489 | python | [{"finding_id": "codeql_py/redos_1c2fc01badfe9367_a41ebf02", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "remediati... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.",
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '-'."
] | [
6,
7
] | [
null,
null
] | [
43,
43
] | [
45,
45
] | |
2024-11-19T02:33:07.252831+00:00 | 1,515,394,567,000 | c49edb11ddb03f1d514c914aae1539946d154890 | 3 | {
"blob_id": "c49edb11ddb03f1d514c914aae1539946d154890",
"branch_name": "refs/heads/master",
"committer_date": 1515394567000,
"content_id": "efc5274093b55a3165accf490a8b7bb565c54514",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "465c407dc2196cf37009639b3e5ad2ee046c1e45",
"extension": "p... | 2.609375 | stackv2 | # -*- coding: utf-8 -*-
import hashlib
import time
from app import load_app_config
def get_user_info_hash(user_name, password):
md5_secrethash = hashlib.md5()
md5_secrethash.update(password + user_name)
secrect_hash = md5_secrethash.hexdigest()
md5_userhash = hashlib.md5()
md5_userhash.update(loa... | 33 | 21.21 | 66 | 15 | 194 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_a45cbf3c73bbf946_91c56096", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) t... | [
9,
13
] | [
null,
null
] | [
27,
25
] | [
47,
66
] | |
2024-11-19T02:54:55.446684+00:00 | 1,566,209,249,000 | 8fe11e68ec63bfe452943cac8b325b7fc7b6e206 | 3 | {
"blob_id": "8fe11e68ec63bfe452943cac8b325b7fc7b6e206",
"branch_name": "refs/heads/master",
"committer_date": 1566209249000,
"content_id": "c87331d911815202b1864ea3f3dfc80c801ecc45",
"detected_licenses": [
"MIT"
],
"directory_id": "ff8ec937d9e5bef6d527f91ec4c8a2248063e9f8",
"extension": "py",
"fi... | 2.515625 | stackv2 | import time
import os
import requests
from itsdangerous import JSONWebSignatureSerializer as Serializer
from flask import current_app, json, request
from .bp import admin_bp, allowed_file, secure_filename, CH_REGEX
from flask_server.models import Admin
from flask_server.utils import success, fail
from flask_server.ext... | 404 | 22.21 | 106 | 14 | 2,270 | python | [{"finding_id": "codeql_py/path-injection_03d8c49a8c552474_574fab79", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
395
] | [
null
] | [
19
] | [
27
] | |
2024-11-19T02:55:13.415668+00:00 | 1,579,511,804,000 | d47e16eac61fdc3e02e8dc4b811f902b86c4d13a | 2 | {
"blob_id": "d47e16eac61fdc3e02e8dc4b811f902b86c4d13a",
"branch_name": "refs/heads/master",
"committer_date": 1579511804000,
"content_id": "e80915bd0f0590ccf152df320fb2fc0a19162537",
"detected_licenses": [
"MIT"
],
"directory_id": "498e99bae2b0a107a4f1c8563a74470e8516f465",
"extension": "py",
"fi... | 2.5 | stackv2 | import json
import functools
from random import choice
import base64
import requests
import jwt
import paramiko
from urllib.parse import urlencode
from tornado import httpclient
from tornado.httpclient import HTTPRequest
from apps.users.models import User
from common.parse_settings import settings
def generate_code()... | 154 | 27.07 | 82 | 20 | 1,039 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_fa94a7e911605e47_3bc4fba4", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
40
] | [
null
] | [
5
] | [
69
] | |
2024-11-19T02:55:17.239389+00:00 | 1,620,673,169,000 | 3266f6d33a10fa1542bcc58d736b9f0e6a923b84 | 3 | {
"blob_id": "3266f6d33a10fa1542bcc58d736b9f0e6a923b84",
"branch_name": "refs/heads/master",
"committer_date": 1620673169000,
"content_id": "94d308652d0de9bc6fc31e266ebc2b7c12c3c110",
"detected_licenses": [
"MIT"
],
"directory_id": "0c62d380bda6e398f7fade2bb6d6c78fe4404488",
"extension": "py",
"fi... | 2.53125 | stackv2 | import time
import os
from flask import Flask, render_template, request
from werkzeug.utils import secure_filename
from affluence_counter import AffluenceCounter
app = Flask(__name__)
@app.route('/')
def index():
return render_template('index.html', error=False)
@app.route('/process_video',methods=["POST"])
def ... | 35 | 26.03 | 66 | 14 | 214 | python | [{"finding_id": "codeql_py/flask-debug_7ff93772244720c6_43651abf", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
35,
26
] | [
null,
null
] | [
5,
19
] | [
40,
29
] | |
2024-11-19T02:55:28.163345+00:00 | 1,628,490,362,000 | 89fad629f82f021efb4f1d13110309731c9b55d4 | 2 | {
"blob_id": "89fad629f82f021efb4f1d13110309731c9b55d4",
"branch_name": "refs/heads/main",
"committer_date": 1628490362000,
"content_id": "6f4d347a23d23276481ca4234580386fc4d63261",
"detected_licenses": [
"MIT"
],
"directory_id": "18f74dfe4e1e071b4853091d6a545f87fef4151a",
"extension": "py",
"file... | 2.375 | stackv2 | #!/usr/bin/env python3
# **IMportant!** This is a development script to quickly get lists and then
# a matrix of packages. It is far from perfect, and I suspect buggy because
# the spack.yaml files come in so many different flavors. If you have an idea
# for how to clean this up, please submit a PR! It will be greatly... | 165 | 29.78 | 87 | 20 | 1,193 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_4873a9d5aa92d9ea_036ac652", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'gitlab.com', so it might match more... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'gitlab.com', so it might match more hosts than expected."
] | [
129
] | [
null
] | [
36
] | [
55
] | |
2024-11-19T02:55:39.326376+00:00 | 1,407,520,538,000 | b10abbaa673ba058c140bf84cab465e0a5d99439 | 2 | {
"blob_id": "b10abbaa673ba058c140bf84cab465e0a5d99439",
"branch_name": "refs/heads/master",
"committer_date": 1407520538000,
"content_id": "75ff9d7c4f9e8b2fbe41d494e3ca1d9e6b669b24",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "55c3b0ac37a49924a9bc08e79c1d27647dd51c7e",
"extension": "py"... | 2.46875 | stackv2 | # python base lib modules
import os
import pprint
import StringIO
from zipfile import ZipFile
from sword2.exceptions import HTTPResponseError
# downloaded modules
import sword2
import requests
# local modules
from file import DataverseFile
from utils import format_term, get_element, get_elements, DataverseException, ... | 278 | 34.38 | 108 | 19 | 2,022 | python | [{"finding_id": "codeql_py/request-without-cert-validation_4f5e56fe625fc973_ee882820", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
180,
224
] | [
null,
231
] | [
15,
9
] | [
55,
10
] | |
2024-11-19T02:55:55.853085+00:00 | 1,688,213,400,000 | d5eb62f116bf557a6f187435642fd43139cf64e7 | 3 | {
"blob_id": "d5eb62f116bf557a6f187435642fd43139cf64e7",
"branch_name": "refs/heads/master",
"committer_date": 1688213400000,
"content_id": "c326cdd97afd9cab41673f7715f0eea34ed92f97",
"detected_licenses": [
"MIT"
],
"directory_id": "779f4429929303e41bde33026cdfce0c2b5ce3ea",
"extension": "py",
"fi... | 2.8125 | stackv2 | import os
os.environ['TF_CPP_MIN_LOG_LEVEL'] = '3' # 0 for max verbosity
from tensorflow.keras.utils import to_categorical
from tensorflow.keras.models import load_model
import numpy
import preprocess as prep
WORD_LEN = prep.WORD_LENGTH
UNIQUE_CHARS = prep.UNIQUE_CHARS
DATA_FILE = './/data//dataset_3percent_num.csv'... | 42 | 29.57 | 82 | 12 | 315 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8da800a122dc2f68_550f0060", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
42
] | [
null
] | [
15
] | [
42
] | |
2024-11-19T02:56:02.793778+00:00 | 1,558,601,324,000 | 4eb377b32e117d9ae2e1f3e678cd4aadb4efc2fd | 3 | {
"blob_id": "4eb377b32e117d9ae2e1f3e678cd4aadb4efc2fd",
"branch_name": "refs/heads/master",
"committer_date": 1558601324000,
"content_id": "ebeb89843d6f905d0fd6fb021b6c44e61b0ed0e1",
"detected_licenses": [
"MIT"
],
"directory_id": "a54b568e871beb4fe5369415b69cfe70ea4dcc17",
"extension": "py",
"fi... | 2.515625 | stackv2 | import json
import os
import tarfile
from pathlib import Path
import numpy as np
import requests
from albumentations import Compose
from albumentations.augmentations import transforms
from chainer.dataset import DatasetMixin
from PIL import Image
from tqdm import tqdm
class Food101Dataset(DatasetMixin):
def __i... | 114 | 34.88 | 82 | 23 | 1,089 | python | [{"finding_id": "codeql_py/tarslip_a727a7cc580e1e97_00fbc490", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)."
] | [
41
] | [
null
] | [
21
] | [
23
] | |
2024-11-19T03:10:37.242849+00:00 | 1,600,157,264,000 | 5f86d3a7ebc116b0935d0307051ab5b23c623e2c | 4 | {
"blob_id": "5f86d3a7ebc116b0935d0307051ab5b23c623e2c",
"branch_name": "refs/heads/master",
"committer_date": 1600157264000,
"content_id": "327b2d5a9533a6628cfba4863b62ab81659589c6",
"detected_licenses": [
"MIT"
],
"directory_id": "2bfaa213e87b97ff8052d06716136046d1da6b99",
"extension": "py",
"fi... | 3.5 | stackv2 | import requests
import json
import math
from collections import Counter
API_KEY = 'd99cd0ca'
OMDB_URL = 'http://www.omdbapi.com/?apikey=' + API_KEY
def get_data(url):
data = json.loads(requests.get(url).text)
if data['Response'] == 'True':
return data
else:
return None
def search_ids_by... | 81 | 26.77 | 133 | 17 | 708 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5a284fc7d943a45a_df847e58", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
74
] | [
null
] | [
15
] | [
16
] | |
2024-11-19T03:10:55.700229+00:00 | 1,598,187,492,000 | 5f15d5d26c6cd738baccca2ddb820465e6ffbb31 | 3 | {
"blob_id": "5f15d5d26c6cd738baccca2ddb820465e6ffbb31",
"branch_name": "refs/heads/master",
"committer_date": 1598187492000,
"content_id": "0fc83cfaf2b1acc08a57f43509dee9f1771455ac",
"detected_licenses": [
"MIT"
],
"directory_id": "64795738ebe9d1bfa457f508ae44d96c3418d0a0",
"extension": "py",
"fi... | 2.671875 | stackv2 | import os
import requests
import tempfile
import base64
from flask import Flask
from flask import request
from flask import jsonify
from flask import render_template
# --- Objects
app = Flask(__name__)
# --- API routes
@app.route("/predict-house", methods=["POST"])
def predict_house():
body = { 'rm': request.for... | 46 | 26.33 | 97 | 16 | 313 | python | [{"finding_id": "codeql_py/flask-debug_34cbd1a47b133f0d_23ba5f07", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
46,
28,
30,
33
] | [
null,
null,
null,
null
] | [
5,
15,
41,
15
] | [
35,
24,
50,
24
] | |
2024-11-19T03:21:49.480393+00:00 | 1,421,930,520,000 | e52a6ae8b31c09d29c3c126c8b90bab217825196 | 2 | {
"blob_id": "e52a6ae8b31c09d29c3c126c8b90bab217825196",
"branch_name": "refs/heads/master",
"committer_date": 1421930520000,
"content_id": "a766a4423b431efbb95065d025a29cf0d9c71e03",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fc8a86e30c286910eef086821397b34093954fed",
"extension": "py"... | 2.453125 | stackv2 | #!/user/bin/env python
#coding:utf-8
import paramiko
import os
from multiprocessing import Process,Pool
from backend.models import *
class multissh:
def __init__(self):
self.a=hosts()
# self.__process = None
self.__ssh = paramiko.SSHClient()
self.__ssh.set_missing_host... | 40 | 25.98 | 80 | 13 | 283 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_9186613609fd1bc2_9b8f6aac", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
15
] | [
null
] | [
9
] | [
73
] | |
2024-11-19T03:21:51.040662+00:00 | 1,564,437,811,000 | e7582f3cee35c43dd72dda7d13e8b00867d36338 | 3 | {
"blob_id": "e7582f3cee35c43dd72dda7d13e8b00867d36338",
"branch_name": "refs/heads/master",
"committer_date": 1564437811000,
"content_id": "3bf4e20d913a243fef49a064ada3f7c6375d4bbc",
"detected_licenses": [
"MIT"
],
"directory_id": "1d66a800459289740b654dcb06cfe8359d7438ed",
"extension": "py",
"fi... | 2.59375 | stackv2 | #!/usr/bin/python
#Program: destroy_panw_nsx_svc.py
#Description: Destroys Palo Alto Networks NSX Service
# This python2.7 script makes API calls to NSX manager to remove orphaned
# Panorama objects that didn't get removed during service removal.
# Use only if you removed the NSX configuration from Panorama,... | 273 | 32.29 | 145 | 16 | 2,102 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c288a7355b5270dc_b993291c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 7 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
30,
77,
123,
168,
185,
190,
195
] | [
null,
null,
null,
null,
null,
null,
null
] | [
23,
20,
24,
18,
18,
18,
18
] | [
135,
129,
140,
145,
146,
141,
144
] | |
2024-11-19T03:22:08.613290+00:00 | 1,515,082,476,000 | 8b7ab4dbc0461c2ccf40bf9a62fcd3601c6c34cc | 2 | {
"blob_id": "8b7ab4dbc0461c2ccf40bf9a62fcd3601c6c34cc",
"branch_name": "refs/heads/master",
"committer_date": 1515082476000,
"content_id": "b7e50c7f85f123baf3cd3155b0b7f4f3602f3109",
"detected_licenses": [
"MIT"
],
"directory_id": "032e3e118b27b7aa6c60abe849f61cb92d892cb1",
"extension": "py",
"fi... | 2.484375 | stackv2 | from flask import Flask, request, abort
import os, random, requests, re, time
from bs4 import BeautifulSoup
from linebot import (
LineBotApi, WebhookHandler
)
from linebot.exceptions import (
InvalidSignatureError
)
from linebot.models import*
app = Flask(__name__)
line_bot_api = LineBotApi('Your Channel Acc... | 228 | 34.93 | 158 | 24 | 2,095 | python | [{"finding_id": "codeql_py/request-without-cert-validation_fbbf6497fa3a87b7_7a27dc01", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 5 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-117"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
41,
51,
90,
128,
25
] | [
null,
null,
null,
null,
null
] | [
11,
20,
11,
11,
21
] | [
76,
47,
72,
75,
44
] | |
2024-11-19T03:22:23.721022+00:00 | 1,567,784,686,000 | 281455c5a148d28f3da4fce725f845f391811592 | 3 | {
"blob_id": "281455c5a148d28f3da4fce725f845f391811592",
"branch_name": "refs/heads/master",
"committer_date": 1567784686000,
"content_id": "8d7697152f4d5cea81f5ba1e8769534a9e7fc39e",
"detected_licenses": [
"MIT"
],
"directory_id": "787f9ea84406d0780c34e72cf42d1dccc401f783",
"extension": "py",
"fi... | 2.75 | stackv2 | # Copyright (c) 2019, Anders Lervik.
# Distributed under the MIT License. See LICENSE for more info.
"""Add a Easy-Button to a folium map."""
from branca.element import CssLink, Figure, MacroElement, JavascriptLink
from jinja2 import Template
JSURL = (
'https://cdn.jsdelivr.net/npm/'
'leaflet-easybutton@2/src... | 53 | 27.32 | 78 | 11 | 356 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2ae949bb794ab1aa_db43371c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
23
] | [
29
] | [
17
] | [
13
] | |
2024-11-19T03:43:56.819578+00:00 | 1,460,331,502,000 | 82c9982df57fe7bd992a897d210e66444435b3c0 | 3 | {
"blob_id": "82c9982df57fe7bd992a897d210e66444435b3c0",
"branch_name": "refs/heads/master",
"committer_date": 1460331502000,
"content_id": "49fdb6b38446099cf0c9dd0e6d22b17fab9615c9",
"detected_licenses": [
"MIT"
],
"directory_id": "08fd74f06d87046730bd75c8517d1cda773ddb4f",
"extension": "py",
"fi... | 2.953125 | stackv2 | ###################################
## #
##ranbat2.py #
##Makes random battles for user #
## #
###################################
#########
#Imports#
#########
import time
import random
import form
import inv
items = inv.items
... | 500 | 22.31 | 87 | 12 | 3,068 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cfdd5551b2a1a4e0_1e73b8de", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
73,
194,
402
] | [
null,
null,
null
] | [
25,
31,
25
] | [
34,
40,
34
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.