added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T21:55:42.429428+00:00 | 1,611,331,673,000 | 5f41e7b3b96cf22c3661ce7bde2a7e4adf156840 | 2 | {
"blob_id": "5f41e7b3b96cf22c3661ce7bde2a7e4adf156840",
"branch_name": "refs/heads/main",
"committer_date": 1611331673000,
"content_id": "a3bab084789dcb082b146dc5e1d1e0225f9593a6",
"detected_licenses": [
"MIT"
],
"directory_id": "c8724e3b8f6a2db2f5e44247a1b9ac494dad5a3e",
"extension": "py",
"file... | 2.390625 | stackv2 | '''
Copyright (c)2020, by Qogir, JMJ, MA71
All rights reserved.
File Name: LocalProxy
System Name: SwiftProxy
Date: 2020-12-01
Version: 2.0
Description: 用户操作界面。此模块使用PyQt5库编写,并使用QProcess类启动外部程序localProxy,从而简化程序流程,提升程序健壮性与代码可读性。与用户在界面窗口中输入账户密码,并指定本地IP、端口及远程IP、端口,LocalGUI就会将数据呈递给LocalProxy。此界面中也会实时显示连接状态,每秒上传数据... | 212 | 34.99 | 177 | 16 | 1,914 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3b7c80280a8a58b2_a3d7752c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
167
] | [
null
] | [
19
] | [
35
] | |
2024-11-18T21:55:49.633847+00:00 | 1,439,206,106,000 | 9920d38ec62e8b053745fb7c49c490209080b94f | 3 | {
"blob_id": "9920d38ec62e8b053745fb7c49c490209080b94f",
"branch_name": "refs/heads/master",
"committer_date": 1439206106000,
"content_id": "b41a8326a035d3fc07ebac09405bb46304b4a5ea",
"detected_licenses": [
"Unlicense"
],
"directory_id": "e6b4d8afa5515bbcc87d3b0661af0037e01d0243",
"extension": "py",... | 3 | stackv2 | #!/usr/bin/python3
# -*- coding: utf-8 -*-
import os
import json
from datetime import datetime
import yaml
from yaml import SafeLoader, BaseLoader
from jinja2 import Template, Environment, FileSystemLoader
from tag_ontology import *
from util import *
import sys
import logging
class AbsolutePathException(Exception):
... | 475 | 33.04 | 114 | 27 | 3,527 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8ba1182e6e4f57ca_822b11c3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
292,
389
] | [
null,
null
] | [
15,
15
] | [
56,
56
] | |
2024-11-18T21:55:51.686569+00:00 | 1,597,381,047,000 | 83dd486425782ef104794c2d1602d905ba885e95 | 4 | {
"blob_id": "83dd486425782ef104794c2d1602d905ba885e95",
"branch_name": "refs/heads/master",
"committer_date": 1597381047000,
"content_id": "ba67c09a82548d8d76e764b0660d4aad0621ba52",
"detected_licenses": [
"MIT"
],
"directory_id": "c9760ede3c4b9827ca37118f8df39cf44beb685e",
"extension": "py",
"fi... | 3.625 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""
Created on Thu Jun 18 07:24:23 2020 author: krishan
"""
class Employee:
salary_raise = 1.04
def __init__(self, fname, lname, salary):
self.fname = fname
self.lname = lname
self.salary = salary
@property
... | 41 | 21.41 | 56 | 12 | 266 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_72678cd1a6a01abd_0a1ed794", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
39
] | [
null
] | [
7
] | [
12
] | |
2024-11-18T22:54:57.378567+00:00 | 1,549,515,900,000 | f19eb01e955783ec31c935272cab2917830e9cd5 | 3 | {
"blob_id": "f19eb01e955783ec31c935272cab2917830e9cd5",
"branch_name": "refs/heads/master",
"committer_date": 1549515900000,
"content_id": "17445116cbb09357c82514bf4db1e8317ecd42d7",
"detected_licenses": [
"MIT"
],
"directory_id": "aa73446a508e64ed88e4f686edf6d5ef9977e032",
"extension": "py",
"fi... | 2.859375 | stackv2 | from hashlib import sha256
from tkinter import *
from tkinter.ttk import *
known_sites = sorted([
"",
"github.com",
"bitbucket.org",
"steam",
"gmail.com",
"google.com",
"reddit.com",
"linode.com",
"discordapp.com",
"rekt.live",
"www.twitch.tv",
"blockchain.com"
])
def ... | 83 | 24.7 | 97 | 14 | 591 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_c79ca6d6cee01375_a88df471", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
22
] | [
null
] | [
19
] | [
65
] | |
2024-11-18T22:54:57.439276+00:00 | 1,351,936,836,000 | 3634420c414ef9422a883db4ea06c97c4aac72f9 | 3 | {
"blob_id": "3634420c414ef9422a883db4ea06c97c4aac72f9",
"branch_name": "refs/heads/master",
"committer_date": 1351936836000,
"content_id": "4ccba8fdd01c0961bbe3c8fa98aec850fd14d27a",
"detected_licenses": [
"MIT"
],
"directory_id": "a5ae02b27c05b90d8b3c122611dc2c7163a5b1e4",
"extension": "py",
"fi... | 2.6875 | stackv2 | #!/usr/bin/env python
import cherrypy
import os
import requests
from jinja2 import Environment, FileSystemLoader
app_dir = os.path.abspath(os.path.dirname(__file__))
tmpl_dir = os.path.join(app_dir, 'templates')
env = Environment(loader=FileSystemLoader(tmpl_dir))
twitter_url = 'http://search.twitter.com/search.json... | 31 | 27.35 | 74 | 16 | 200 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e92cb28a0c74d9b5_9a8c812b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
11
] | [
null
] | [
7
] | [
53
] | |
2024-11-18T22:54:59.530236+00:00 | 1,547,987,109,000 | fbad12781c420212aabe1f2f5e15c5ab893ce412 | 2 | {
"blob_id": "fbad12781c420212aabe1f2f5e15c5ab893ce412",
"branch_name": "refs/heads/master",
"committer_date": 1547987109000,
"content_id": "ca3beb36fb124a5c0683c42ce78bef20de9bccaa",
"detected_licenses": [
"MIT"
],
"directory_id": "f52e6db78492a82f1e19a43ca6d179c95da0947e",
"extension": "py",
"fi... | 2.359375 | stackv2 | """Module provider for Open Domain Registry"""
import hashlib
import json
import logging
import time
try:
from urllib.parse import urlencode
except ImportError:
from urllib import urlencode
import requests
from lexicon.providers.base import Provider as BaseProvider
LOGGER = logging.getLogger(__name__)
NAME... | 157 | 34.5 | 115 | 17 | 1,172 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_5c0dc571f09d52ed_a5a4bbf0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (password)](3) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally e... | [
149
] | [
null
] | [
29
] | [
50
] | |
2024-11-18T20:56:55.324730+00:00 | 1,647,833,979,000 | f93d243e97a2185fb8ba74f7f9d2f1de60a4e1e1 | 3 | {
"blob_id": "f93d243e97a2185fb8ba74f7f9d2f1de60a4e1e1",
"branch_name": "refs/heads/master",
"committer_date": 1647833979000,
"content_id": "88e29d714e7c4d09ba1da741bd94d4255e62a421",
"detected_licenses": [
"MIT"
],
"directory_id": "47ef6997d03f4d5c921c83cc09aef1dfc6828e2c",
"extension": "py",
"fi... | 2.90625 | stackv2 | # -*- coding:utf-8 -*-
# Copyright (C) 2020. Huawei Technologies Co., Ltd. All rights reserved.
# This program is free software; you can redistribute it and/or modify
# it under the terms of the MIT License.
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the ... | 239 | 33.49 | 101 | 27 | 1,777 | python | [{"finding_id": "codeql_py/tarslip_2d430bd12bff5406_da05a815", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
228
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T20:56:55.587551+00:00 | 1,691,950,360,000 | 4434fa80d86397661a0b94ed2ae1a364e5747362 | 3 | {
"blob_id": "4434fa80d86397661a0b94ed2ae1a364e5747362",
"branch_name": "refs/heads/master",
"committer_date": 1691950360000,
"content_id": "fd4d14ecec210ec57dd7d04d8fc9ecf9283a7ad3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1088e51396f7d97addfccca1be97f9a5637ac461",
"extension": "py"... | 2.671875 | stackv2 | #!/usr/bin/env python
"""
Script to fetch DBpedia-Wikidata links
"""
import sys, time
from wikidata.client import Client
import json
def main():
client = Client()
coord_prop = client.get('P625')
country_prop = client.get('P17')
litate_prop = client.get('P131') # located in the administrative territori... | 52 | 32.6 | 87 | 19 | 357 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_43e2a3a0a71b66c8_2e8454ec", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
39
] | [
46
] | [
19
] | [
45
] | |
2024-11-18T23:10:51.683395+00:00 | 1,516,583,283,000 | 1afe2c5dc3591031210e8353cd153d1260815561 | 3 | {
"blob_id": "1afe2c5dc3591031210e8353cd153d1260815561",
"branch_name": "refs/heads/master",
"committer_date": 1516583283000,
"content_id": "e256f01e5526ef03a7630219966b7770566d1b8f",
"detected_licenses": [
"MIT"
],
"directory_id": "313285c4fa12ac5f8431c0202b952170bceb73c0",
"extension": "py",
"fi... | 2.65625 | stackv2 | import random
import json
#import urllib2
import urllib3
import shelve
import temp_humidity
import led
import time
topics = None
COMMAND1 = "who are you"
COMMAND2 = "what can you do"
COMMAND3 = "temp"
COMMAND4 = "red led"
COMMAND5 = "green led"
COMMAND6 = "get-ip"
headers = { 'x-api-key': 'rbfYSjUHLS58VdblPBdAZ6sU... | 126 | 27.44 | 152 | 16 | 922 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_97d1d3a41c4ab118_a675137f", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [tccmd.wrayesian.com](1) may be at an arbitrary positio... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [tccmd.wrayesian.com](1) may be at an arbitrary position in the sanitized URL."
] | [
75
] | [
null
] | [
14
] | [
43
] | |
2024-11-18T23:10:13.430659+00:00 | 1,541,573,902,000 | 21419245cefad7e05fdeb048dc204fcc07fbbeb5 | 3 | {
"blob_id": "21419245cefad7e05fdeb048dc204fcc07fbbeb5",
"branch_name": "refs/heads/master",
"committer_date": 1541573902000,
"content_id": "5e94e6967ed507aee93c3b3ca37d399fe25b7e6b",
"detected_licenses": [
"MIT"
],
"directory_id": "b3e8aa381da1271a4342896d6df3cc52a2ffc543",
"extension": "py",
"fi... | 2.515625 | stackv2 | import requests
import random
import time
from lxml import etree
from settings import *
from captcha import checkCaptcha
def start_parse():
with open("companies.txt", 'r', encoding='utf-8') as f:
while True:
if not f.readline():
break
company = f.readline().replace(... | 50 | 40.84 | 99 | 30 | 539 | python | [{"finding_id": "codeql_py/request-without-cert-validation_75e5ffad2a69b02c_0502151d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
25
] | [
null
] | [
9
] | [
91
] | |
2024-11-18T23:10:14.352020+00:00 | 1,612,794,512,000 | b2e4fc7843852ef6c324978fb95a85445ae76370 | 2 | {
"blob_id": "b2e4fc7843852ef6c324978fb95a85445ae76370",
"branch_name": "refs/heads/master",
"committer_date": 1612794512000,
"content_id": "48006fab0f8fb39498b4a2254b60160d3b81fae4",
"detected_licenses": [
"MIT"
],
"directory_id": "39a8246286a023c70df91ecd594890043a13ed4f",
"extension": "py",
"fi... | 2.453125 | stackv2 | import hashlib
import json
import re
import time
import urllib
import warnings
import webbrowser
from datetime import date, datetime, timedelta
import numpy as np
import requests
warnings.filterwarnings("ignore")
class NuistDaily(object):
def __init__(self):
self.today = date.today() # 今日日期
sel... | 209 | 34.24 | 143 | 27 | 1,979 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_f3c591e57090b5d1_ba4618d6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
31
] | [
null
] | [
20
] | [
49
] | |
2024-11-18T23:10:20.055621+00:00 | 1,516,278,982,000 | 04cdf2b0512331ce2bf748a2f12efe4206a8d010 | 2 | {
"blob_id": "04cdf2b0512331ce2bf748a2f12efe4206a8d010",
"branch_name": "refs/heads/master",
"committer_date": 1516278982000,
"content_id": "f92491fd75a4ebeb84aee532eec6cf3a535c1fce",
"detected_licenses": [
"MIT"
],
"directory_id": "2a3f2594e8847ae9d58d5bbc5b06dd2042ce2070",
"extension": "py",
"fi... | 2.4375 | stackv2 | import getpass
import os
import socket
import subprocess
import paramiko
import asyncio
from io import BytesIO
from flowlight.core.setting import Setting
from flowlight.core.command import Command
from flowlight.core.response import Response
class Connection:
"""A SSH Channel connection to remote machines.
... | 185 | 33.94 | 111 | 24 | 1,263 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a6077d109344ff34_91555503", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
51
] | [
null
] | [
13
] | [
78
] | |
2024-11-18T23:10:20.782404+00:00 | 1,586,259,975,000 | eb7050f4ce586b7b9908fb166e13a63412d85c04 | 3 | {
"blob_id": "eb7050f4ce586b7b9908fb166e13a63412d85c04",
"branch_name": "refs/heads/master",
"committer_date": 1586259975000,
"content_id": "a1fd9251a1ed7a770eada54401ee05990a41a893",
"detected_licenses": [
"MIT"
],
"directory_id": "a719328e3c3ea9fca0b1130c386b22580441e4fb",
"extension": "py",
"fi... | 2.640625 | stackv2 | __author__ = 'tusharmakkar08'
try:
from urllib.parse import urlparse, urlencode
from urllib.request import urlopen, Request, urlretrieve, build_opener
from urllib.error import HTTPError
except ImportError:
from urlparse import urlparse
from urllib import urlencode
from urllib2 import urlopen, R... | 41 | 41.51 | 120 | 15 | 424 | python | [{"finding_id": "codeql_py/overly-large-range_2e9b4eee42af7abb_ce0d8fc3", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
17
] | [
null
] | [
43
] | [
46
] | |
2024-11-18T21:33:28.991940+00:00 | 1,619,868,220,000 | 4990b25c3b27f92897c3e47df100f826b0c6a91d | 3 | {
"blob_id": "4990b25c3b27f92897c3e47df100f826b0c6a91d",
"branch_name": "refs/heads/main",
"committer_date": 1619868220000,
"content_id": "687a54116dd8b1dd79592d51a40c4af71b8f1fd3",
"detected_licenses": [
"MIT"
],
"directory_id": "c508727941234926f4a602c012ab9019db4b1672",
"extension": "py",
"file... | 2.796875 | stackv2 | '''
@author: Antonio Fusco
https://github.com/fuscoantonio
'''
import sys
sys.path.insert(1, './utilities')
from requests import Session
from requests.exceptions import HTTPError, ConnectionError
from vvvvid import real_url
from pathlib import Path
from utils import ask_episodes_numbers, download, list_options
USER_A... | 226 | 32.09 | 134 | 15 | 1,814 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_7762b8235bbb9313_3a44ec05", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com](1) may be at an arbitrary position in the... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [youtube.com](1) may be at an arbitrary position in the sanitized URL."
] | [
208
] | [
null
] | [
8
] | [
28
] | |
2024-11-18T21:33:32.992349+00:00 | 1,436,680,227,000 | c97d3cbc01841ef8f75d90a1c38910e3e1916175 | 2 | {
"blob_id": "c97d3cbc01841ef8f75d90a1c38910e3e1916175",
"branch_name": "refs/heads/master",
"committer_date": 1436680227000,
"content_id": "914a2ffac92fd2d4cc0d08bcb1e6783d0d04c68a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "43d72df67de722d84b851b0dc57b34d91f103818",
"extension": "py"... | 2.3125 | stackv2 | #!/usr/bin/python
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# d... | 79 | 29.48 | 74 | 16 | 543 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4ce6f83c3449e2b9_e525a480", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
67
] | [
68
] | [
11
] | [
68
] | |
2024-11-18T23:15:54.417631+00:00 | 1,620,460,144,000 | 71806d4468b0e82dd9830e2873ace6d7b7868b5b | 3 | {
"blob_id": "71806d4468b0e82dd9830e2873ace6d7b7868b5b",
"branch_name": "refs/heads/master",
"committer_date": 1620460144000,
"content_id": "7b9124401badceb997160ef54c078efd79f17b1c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c6e3385a5389892683bb33da48f90f9daf503e39",
"extension": "py"... | 3.390625 | stackv2 | #!/usr/bin/env python3
#-*- coding: utf-8 -*-
# Date: 2020-07-31
# Author: Shieber
# 密码生成器
import sys
import base64
from os.path import basename
__version__ = 0.1
__all__ = ['HashMn', 'HashPassword']
"""密码生成脚本
利用关键字符串(种子)和梅森哈希数去产生不同长度的密码。
种子:用户输入的某账户的关键字符串,比如对应腾讯的QQ,种子可以是[qq,qQ,Qq,QQ,txqq,..]中任何一个。
种子建... | 104 | 28.29 | 113 | 16 | 1,320 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aaae4203bcbdc7fe_f9ca6ef9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw... | [
104
] | [
null
] | [
11
] | [
37
] | |
2024-11-18T22:30:18.733796+00:00 | 1,647,289,717,000 | 36e053bb11a18eff3c067b73de9a0d300211d3b8 | 3 | {
"blob_id": "36e053bb11a18eff3c067b73de9a0d300211d3b8",
"branch_name": "refs/heads/master",
"committer_date": 1647289717000,
"content_id": "b63365bf7a6480022d34c905bc2d9368de8f91f3",
"detected_licenses": [
"MIT"
],
"directory_id": "1ae330d2405954ec535292742af619a3aefe1466",
"extension": "py",
"fi... | 2.9375 | stackv2 | import re
from datetime import date
import uuid
''' Contains useful utility functions for our Flask app '''
def get_database_uri_from(env):
'''
Use values from the environment to determine a Database URI per the SQLAlchemy schema.
See https://docs.sqlalchemy.org/en/14/core/engines.html#database-urls for sp... | 77 | 32.52 | 112 | 13 | 609 | python | [{"finding_id": "codeql_py/redos_383dbe2478a94a46_af1cf256", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '0'.", "remediati... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '0'."
] | [
25
] | [
null
] | [
27
] | [
36
] | |
2024-11-18T22:30:26.249245+00:00 | 1,592,646,791,000 | 2cc8b54e12ab09b38a9eeb543da0359c89b7075f | 3 | {
"blob_id": "2cc8b54e12ab09b38a9eeb543da0359c89b7075f",
"branch_name": "refs/heads/master",
"committer_date": 1592646791000,
"content_id": "f626badadc8413f49c18fee4860df85aa2945eaa",
"detected_licenses": [
"BSD-3-Clause",
"Apache-2.0",
"MIT"
],
"directory_id": "09e3ec542b850ee602414de3c532e06... | 2.65625 | stackv2 | # -*- coding: utf-8 -*-
from pathlib import Path
from flask import Flask, render_template
import io
from flask_bootstrap import Bootstrap
from flaskext.markdown import Markdown
SONGS_PATH = Path('songs/')
app = Flask(__name__)
app.secret_key = 'dev'
# set default button sytle and size, will be overwritten by macro ... | 53 | 22.94 | 76 | 13 | 318 | python | [{"finding_id": "codeql_py/flask-debug_53bef53690f5cab3_5523f518", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
53,
43
] | [
null,
null
] | [
5,
18
] | [
24,
27
] | |
2024-11-18T22:30:26.303499+00:00 | 1,235,962,524,000 | 0ced031e0f4c29bedad349e4c12202b1e22b52dd | 2 | {
"blob_id": "0ced031e0f4c29bedad349e4c12202b1e22b52dd",
"branch_name": "refs/heads/master",
"committer_date": 1235962524000,
"content_id": "cea5549c60aa9337fab46db9abd7139f3f75a4d3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fb7ed0ddfe93f29a77902a94210a6f77f5bbe91e",
"extension": "py"... | 2.3125 | stackv2 | #!/usr/bin/python2.4
"""MobWrite - Real-time Synchronization and Collaboration Service
Copyright 2008 Neil Fraser
http://code.google.com/p/google-mobwrite/
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the Lic... | 417 | 33.74 | 104 | 27 | 3,635 | python | [{"finding_id": "codeql_py/log-injection_147d2f2b75ca383d_4b98485e", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 11 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depen... | [
107,
109,
143,
171,
173,
247,
255,
278,
285,
296,
323
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
324
] | [
19,
17,
19,
19,
21,
23,
23,
25,
22,
23,
22
] | [
74,
55,
66,
53,
61,
52,
50,
60,
62,
76,
65
] | |
2024-11-18T22:30:29.932799+00:00 | 1,689,867,779,000 | 2596db0cc917bfb361e96ecc4193f5b883ee1d1e | 3 | {
"blob_id": "2596db0cc917bfb361e96ecc4193f5b883ee1d1e",
"branch_name": "refs/heads/master",
"committer_date": 1689895117000,
"content_id": "2d699e7290e45899d9bc3c2ecb4e8412cdc311a3",
"detected_licenses": [
"MIT"
],
"directory_id": "a8cd314af4c1d5ec4f322a19275e3a706b6844ee",
"extension": "py",
"fi... | 2.5625 | stackv2 | import argparse
import logging
import os.path
import sys
import tempfile
import textwrap
from .parsers import AppImageCraftYMLParser
from . import _logging
from .commands import * # noqa
def parse_args():
parser = argparse.ArgumentParser(
description="Shell script generator for building AppImages from s... | 207 | 25.71 | 111 | 17 | 1,160 | python | [{"finding_id": "codeql_py/overly-permissive-file_16f557625d55e704_639b5ca4", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
185
] | [
null
] | [
5
] | [
31
] | |
2024-11-18T22:44:33.393517+00:00 | 1,434,727,101,000 | 73827d8395ebc9608d8b8c4d1f9a12664c9d9728 | 3 | {
"blob_id": "73827d8395ebc9608d8b8c4d1f9a12664c9d9728",
"branch_name": "refs/heads/master",
"committer_date": 1434727101000,
"content_id": "efb467edd8084f2b42408e917a85599622c40f67",
"detected_licenses": [
"MIT"
],
"directory_id": "e91922a597af3657da76b248280f5f804c108e1f",
"extension": "py",
"fi... | 3.1875 | stackv2 | # -*- coding: utf-8 -*-
# Author Frank Hu , nicetag
# iDoulist Function 0 - input
import re
import urllib2
import time
# get url from UI module for test
def main():
input_url = 'http://www.douban.com/doulist/36764655/'
doulist_content = doulist_url_to_list(input_url)
print doulist_content
# the list doul... | 82 | 29.68 | 151 | 17 | 744 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_20c1eaec63faf3e4_ffdbdad1", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'douban.com/subject/', so it might m... | 5 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'douban.com/subject/', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'douban.com/doulist/', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'douban.com/peo... | [
31,
54,
60,
60,
60
] | [
null,
null,
null,
null,
null
] | [
25,
20,
20,
57,
96
] | [
63,
57,
56,
95,
137
] | |
2024-11-18T21:14:09.749677+00:00 | 1,565,978,452,000 | 357ee4299a5ff86594c920c03c7ec0811682649d | 3 | {
"blob_id": "357ee4299a5ff86594c920c03c7ec0811682649d",
"branch_name": "refs/heads/master",
"committer_date": 1565978452000,
"content_id": "6f4464195d26cc8a07e3f62d79e75a5c5f9c2ceb",
"detected_licenses": [
"MIT"
],
"directory_id": "b86c9a0036f90517b541c1102ef4368ca0286c17",
"extension": "py",
"fi... | 2.890625 | stackv2 | import sqlite3
conn = sqlite3.connect("northwind_small.sqlite3")
curs = conn.cursor()
query = """
SELECT ProductName
FROM Product
ORDER BY UnitPrice DESC
LIMIT 10;"""
ten_most_expensive_items = curs.execute(query).fetchall()
query = """
SELECT AVG(HireDate - BirthDate)
FROM Employee;"""
aver... | 102 | 32.95 | 77 | 15 | 903 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d8fa921fd8551709_1d3086d1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
64
] | [
null
] | [
44
] | [
69
] | |
2024-11-18T21:14:12.433212+00:00 | 1,620,716,844,000 | 0ea67e593b1fa931a76e815d6baad417e225253d | 3 | {
"blob_id": "0ea67e593b1fa931a76e815d6baad417e225253d",
"branch_name": "refs/heads/master",
"committer_date": 1620716844000,
"content_id": "0ef2df6f7797e1ce069bf9b3349e42b3d251c85d",
"detected_licenses": [
"MIT"
],
"directory_id": "67bab39254fc81f7e7edb6b8298c89f7a13f04e2",
"extension": "py",
"fi... | 2.53125 | stackv2 | '''API to download dataset.
'''
from __future__ import absolute_import
from __future__ import division
from __future__ import print_function
import sys, os, six, time, collections
from six.moves.urllib.error import HTTPError, URLError
from six.moves.urllib.request import urlopen, urlretrieve
import tarfile
from pat... | 145 | 33.46 | 124 | 16 | 1,269 | python | [{"finding_id": "codeql_py/tarslip_3c65153ebe653ba0_c020f91a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)."
] | [
113
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T21:14:16.591954+00:00 | 1,629,082,979,000 | c01272440b7a3a3f0c491daf58ebe3169fd36ed0 | 3 | {
"blob_id": "c01272440b7a3a3f0c491daf58ebe3169fd36ed0",
"branch_name": "refs/heads/main",
"committer_date": 1629082979000,
"content_id": "0795c775de3320fab0da8bd69648a046e0ae8d60",
"detected_licenses": [
"MIT"
],
"directory_id": "430587fb77de44922446cf7ef1e5b6449e369178",
"extension": "py",
"file... | 2.578125 | stackv2 | from replit import db # importing the database
from encoder import to_json
from flask import Flask, render_template, redirect
app = Flask('app', template_folder = "templates")
def process(data):
d = data.split("_")
res = {}
for i in d:
res[i.split("=")[0]] = eval(i.split("=")[1])
return res
@app.route('/g... | 29 | 24 | 73 | 14 | 198 | python | [{"finding_id": "codeql_py/code-injection_f19bd8db06e66012_2e2a3916", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-094"
] | [
"py/code-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1)."
] | [
10
] | [
null
] | [
33
] | [
48
] | |
2024-11-18T21:15:49.147236+00:00 | 1,632,238,557,000 | 8b246163222e9d741a4a53b59fc04a917fbdee57 | 4 | {
"blob_id": "8b246163222e9d741a4a53b59fc04a917fbdee57",
"branch_name": "refs/heads/main",
"committer_date": 1632238557000,
"content_id": "197b4566940fe3cf6d35d4ae6f33ac4ab07aaef5",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "55f0bfaa64e1621967afad3d142da70ae9aab0cf",
"extension": "py",
"... | 3.578125 | stackv2 | import random
uppercase_letters = 'ABCDEFGHIJKLMNOPQRSTUVWXYZ'
lowercase_letters = uppercase_letters.lower()
digits = '1234567890'
symbols = '@#$%=.,:;'
upper,lower,nums,syms = True,True,True,True
all = ''
if upper:
all += uppercase_letters
if lower:
all += lowercase_letters
if nums:
all += digits
if sym... | 30 | 24.03 | 54 | 10 | 177 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_80e40b60d09311db_3458f1fd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
29
] | [
null
] | [
11
] | [
19
] | |
2024-11-18T21:58:19.910588+00:00 | 1,693,354,396,000 | a0a07eeafde253d08c0c43c59de9edd0ef487c4a | 3 | {
"blob_id": "a0a07eeafde253d08c0c43c59de9edd0ef487c4a",
"branch_name": "refs/heads/main",
"committer_date": 1693354396000,
"content_id": "55b9282e81b8660f9448acaf8b51e7d220a98d1e",
"detected_licenses": [
"MIT"
],
"directory_id": "6b2c339ad1da97d3901e445a5ae13a56a86fda23",
"extension": "py",
"file... | 2.890625 | stackv2 | import os
import tarfile
import requests
REPO_BASE_URL = os.environ.get("PIEDOMAINS_MODEL_URL") or "https://dataverse.harvard.edu/api/access/datafile/7081895"
def download_file(url: str, target: str, file_name: str) -> bool:
"""
Download file from the server
Args:
url (str): url of the resource... | 51 | 31.29 | 117 | 14 | 393 | python | [{"finding_id": "codeql_py/tarslip_84b6c185371590f1_c61550a6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
50
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T21:58:20.156317+00:00 | 1,634,383,889,000 | 38714c8f13118303e7f7a107f0034685d0ec628e | 3 | {
"blob_id": "38714c8f13118303e7f7a107f0034685d0ec628e",
"branch_name": "refs/heads/main",
"committer_date": 1634383889000,
"content_id": "64acdb4aae3e446048e7b2489472034e533113fa",
"detected_licenses": [
"MIT"
],
"directory_id": "90b1ad7d5155097ed363953cdb24b9093330bf5c",
"extension": "py",
"file... | 3.1875 | stackv2 | """Simple Server to receive files with a http PUT request."""
from flask import request, jsonify, Flask
from shutil import copyfileobj
# where to store the files
UPLOAD_FOLDER = '/tmp/'
app = Flask(__name__)
@app.route('/upload/<filename>', methods=['PUT'])
def upload(filename):
"""
Takes the filename from the ... | 28 | 23.11 | 61 | 13 | 165 | python | [{"finding_id": "codeql_py/path-injection_a5422eff177c3391_c7439355", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
19
] | [
null
] | [
13
] | [
42
] | |
2024-11-18T21:58:30.801301+00:00 | 1,418,114,829,000 | 2ddbeb9e8eb021b1a8506da2bab5bf5ec146774e | 4 | {
"blob_id": "2ddbeb9e8eb021b1a8506da2bab5bf5ec146774e",
"branch_name": "refs/heads/master",
"committer_date": 1418114829000,
"content_id": "7538a2525d714db82927693699de9d2465f21c7b",
"detected_licenses": [
"MIT"
],
"directory_id": "ec30d99bce9685721a3b4d322c2d060ef696a784",
"extension": "py",
"fi... | 3.609375 | stackv2 | import os
import bcrypt
import getpass
class UserOps:
def __init__(self):
'''
Prompts the user for a username and password.
'''
self.salt = bcrypt.gensalt(log_rounds = 15)
self.username = input("Please enter a username: ")
self.password = bcrypt.hashpw(getpass.g... | 77 | 31.53 | 146 | 16 | 526 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ed81c1accbfc9949_4757dab4", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
57
] | [
null
] | [
26
] | [
70
] | |
2024-11-18T23:10:51.853748+00:00 | 1,538,722,410,000 | 7641b1d76ebfd840011ca58edc2939881e40d462 | 3 | {
"blob_id": "7641b1d76ebfd840011ca58edc2939881e40d462",
"branch_name": "refs/heads/master",
"committer_date": 1538722410000,
"content_id": "0214abebfacb07764859b6c268f51500d8f53a5f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c845d719a804aea3477713cf8ae0dc5a104bb961",
"extension": "py"... | 2.578125 | stackv2 | from django.shortcuts import render, redirect
import math
import requests
# additional functionality for requests package to disable warnings
requests.packages.urllib3.disable_warnings()
from bs4 import BeautifulSoup
from datetime import timedelta, timezone, datetime
import os
import shutil
from .models import Headl... | 60 | 34.17 | 146 | 17 | 499 | python | [{"finding_id": "codeql_py/request-without-cert-validation_754eb859aef506d4_bd092ef6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
26,
44
] | [
null,
null
] | [
15,
17
] | [
45,
69
] | |
2024-11-18T23:10:59.000822+00:00 | 1,492,663,213,000 | 30c818723d64f3878e71e7a990af4316b1bb8b0e | 3 | {
"blob_id": "30c818723d64f3878e71e7a990af4316b1bb8b0e",
"branch_name": "refs/heads/master",
"committer_date": 1492663213000,
"content_id": "b49aaf2054d99cd55fa5630ec284ba3ca89bc906",
"detected_licenses": [
"MIT"
],
"directory_id": "7cfad21bb8b9cfda28d2e6f05480807ee14aa30d",
"extension": "py",
"fi... | 2.96875 | stackv2 | from flask import Flask, redirect, url_for, request
app = Flask(__name__)
@app.route('/')
def hola_mundo():
return 'Hola UIP'
@app.route('/relajo')
def relajo():
return 'Relajo'
@app.route('/hola/<nombre>')
def hola_nombre(nombre):
return 'Hola %s!' % nombre
@app.route('/edad/<int:edad>')
def validar_vo... | 57 | 22.18 | 68 | 14 | 357 | python | [{"finding_id": "codeql_py/reflective-xss_d0aaad816373dd67_652bdaf1", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
14,
33,
44
] | [
null,
null,
null
] | [
12,
12,
12
] | [
31,
56,
36
] | |
2024-11-18T22:49:05.584680+00:00 | 1,623,361,315,000 | 48e778fa3d47a5efaf6f68eba9e8a0d46e3f8218 | 2 | {
"blob_id": "48e778fa3d47a5efaf6f68eba9e8a0d46e3f8218",
"branch_name": "refs/heads/main",
"committer_date": 1623361315000,
"content_id": "91d45e228ebc15e8d33eac543fd079c4f9e9d044",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b521e8390f0f3e3d3433dd2b08ec217d7c9ecf57",
"extension": "py",
... | 2.5 | stackv2 | from http import HTTPStatus
from django.http import HttpResponse
from django.views import View
from morphodict.preference import Preference
class ChangePreferenceView(View):
"""
A generic view (class-based view) that sets the cookie for a preference.
Usage:
# views.py
class ChangeMyPre... | 72 | 31.43 | 110 | 15 | 498 | python | [{"finding_id": "codeql_py/cookie-injection_5498573793415bc9_6950303c", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-020"
] | [
"py/cookie-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cookie is constructed from a [user-supplied input](1)."
] | [
71
] | [
null
] | [
47
] | [
52
] | |
2024-11-18T23:25:55.284200+00:00 | 1,562,663,022,000 | 8e462fc4ff8159b545c02cae67771b1664fb3f8c | 2 | {
"blob_id": "8e462fc4ff8159b545c02cae67771b1664fb3f8c",
"branch_name": "refs/heads/master",
"committer_date": 1562663022000,
"content_id": "7d0869e6b72b0a685745f286e4855ac1f9d5ef7a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "64367e9d39643c9d5f9b481e607cb2424c98685d",
"extension": "py"... | 2.421875 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Tue Jul 9 15:02:06 2019
@author: Administrator
Spam Ham Email Classifier
"""
########################### Downlaod data from internet ############################
import os
import tarfile
from six.moves import urllib
import time
DOWNLOAD_ROOT = "http://spamassassin.apache.org/o... | 320 | 37.9 | 105 | 18 | 2,966 | python | [{"finding_id": "codeql_py/tarslip_48998c2ac110f0fb_9254a989", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
29
] | [
null
] | [
9
] | [
21
] | |
2024-11-18T23:25:59.822188+00:00 | 1,503,569,098,000 | 8f038e2cd12a8d5846f8847e97adfe45f2cf7a60 | 3 | {
"blob_id": "8f038e2cd12a8d5846f8847e97adfe45f2cf7a60",
"branch_name": "refs/heads/master",
"committer_date": 1503569098000,
"content_id": "20a6bf3e57703546da4b38040faa892b07474902",
"detected_licenses": [
"MIT"
],
"directory_id": "503cab299fe87264239bfce3a918ce8853a4afb9",
"extension": "py",
"fi... | 2.640625 | stackv2 | import pjsua as pj
import logging
import time
from soft_phone.callbacks import IncomingCallCallback, CallCallback
from soft_phone.exceptions import PhoneCallNotInProgress
from datetime import datetime
logger = logging.getLogger(__name__)
logging.addLevelName(5, "TRACE")
class SoftPhone:
"""
'Soft Phone' to a... | 286 | 50.9 | 119 | 22 | 3,125 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3c100f4e16459048_8cf90eb8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
50
] | [
51
] | [
22
] | [
90
] | |
2024-11-18T23:26:02.624887+00:00 | 1,631,348,338,000 | fc28ded0ddc9441d0d5583381ab4e072f047fc4b | 2 | {
"blob_id": "fc28ded0ddc9441d0d5583381ab4e072f047fc4b",
"branch_name": "refs/heads/master",
"committer_date": 1631348338000,
"content_id": "c0b5a78c423e520220524f43bfe5b42423b4d4bb",
"detected_licenses": [
"ISC"
],
"directory_id": "bdfff2c6f14c639508dae1ad1e0380cad7b7809c",
"extension": "py",
"fi... | 2.46875 | stackv2 | #! /user/bin/python
# division handles truncation 10/3. ==> 10/3, absolute_import changes where in path is checked for modules
from __future__ import ( # this handles truncation 10/3. ==> 10/3
absolute_import, division, print_function)
"""
transfer.py
Upload Tool using Paramiko
"""
__author__ = "Joseph Huehnerho... | 62 | 25.02 | 106 | 14 | 422 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_787dc80fa045ec87_3a5a795c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
33
] | [
34
] | [
9
] | [
38
] | |
2024-11-18T23:26:04.851645+00:00 | 1,630,165,856,000 | b98be6261de35fd1298c33119319095cd46c0cf1 | 4 | {
"blob_id": "b98be6261de35fd1298c33119319095cd46c0cf1",
"branch_name": "refs/heads/main",
"committer_date": 1630165856000,
"content_id": "89bf36c871b2fdf083cb813c41507ff4eaddeccf",
"detected_licenses": [
"MIT"
],
"directory_id": "13bf647f954f99929c0af5523b73775128848098",
"extension": "py",
"file... | 3.546875 | stackv2 | from empstore import teams
import employee as emp
from empstore import employees
def manage_all_team_menu():
print("\t1.Create team")
print("\t2.Display team")
print("\t3.Manage team(Particular)")
print("\t4.Delete team")
print("\t5.Exit")
def manage_all_teams():
while True:
manage_all_team_menu()
ch = int(i... | 93 | 22.67 | 86 | 14 | 602 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_08132d66b693e5b8_3870a363", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
49,
84
] | [
null,
null
] | [
9,
8
] | [
34,
24
] | |
2024-11-18T23:26:05.242030+00:00 | 1,559,610,430,000 | e383f111ab19ff54e770c20766a59f050b43f78f | 2 | {
"blob_id": "e383f111ab19ff54e770c20766a59f050b43f78f",
"branch_name": "refs/heads/master",
"committer_date": 1559610430000,
"content_id": "b3714968d0375e63e76607ea074a87ca6caacc04",
"detected_licenses": [
"MIT"
],
"directory_id": "b9f78e34fcdca97867aadfb2fa3b5d9504d5e9c2",
"extension": "py",
"fi... | 2.453125 | stackv2 | from __future__ import print_function
import os
import subprocess
from glob import glob
import argparse
import tarfile
import h5py
import numpy as np
import scipy.io as sio
parser = argparse.ArgumentParser(description='Download dataset for DCGAN.')
parser.add_argument('--datasets', metavar='N', type=str, nargs='+',... | 354 | 31.66 | 91 | 18 | 3,213 | python | [{"finding_id": "codeql_py/tarslip_b9a91130a793cc71_c0666ffe", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
182
] | [
null
] | [
5
] | [
38
] | |
2024-11-18T22:27:32.262449+00:00 | 1,538,147,953,000 | 50913cb35818109e1e7e0988eba95f26190fd8e9 | 3 | {
"blob_id": "50913cb35818109e1e7e0988eba95f26190fd8e9",
"branch_name": "refs/heads/master",
"committer_date": 1538147953000,
"content_id": "ae2795e6e9b7e847ab9149f5470ad8ca1769f385",
"detected_licenses": [
"MIT"
],
"directory_id": "191a31e33ef3dbe20600e26485c6f9b7f10c20b8",
"extension": "py",
"fi... | 2.65625 | stackv2 | # -*- coding: utf-8 -*-
import time
import random
import hmac
import hashlib
import binascii
import base64
class Auth(object):
def __init__(self, appid, sid, skey):
self._appid, self._secretid, self._secretkey = str(appid), str(sid), str(skey)
def setattr_appid(self, appid):
self._appid = ap... | 44 | 26.23 | 136 | 21 | 356 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_af7889445d6d6235_6364dfcf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
40
] | [
null
] | [
63
] | [
83
] | |
2024-11-18T22:27:43.581854+00:00 | 1,550,073,573,000 | 7307482cf47387b01db22ee6a33b906652648942 | 3 | {
"blob_id": "7307482cf47387b01db22ee6a33b906652648942",
"branch_name": "refs/heads/master",
"committer_date": 1550073573000,
"content_id": "93eabfb9381e1ccfcfce6d0e5d6174cae088219d",
"detected_licenses": [
"MIT"
],
"directory_id": "f6da76fa4aaceffc80517c41616a7e3427a60c6f",
"extension": "py",
"fi... | 3.171875 | stackv2 | '''
This script is what parses the environmental variables
It then outputs the nagios config file
'''
import os
import re
from jinja2 import Template
with open('./objects.cfg.j2') as f:
template = Template(f.read())
def parse_envs():
'''
Goes through all the environmental variables
Any matching a n... | 55 | 21.89 | 58 | 12 | 305 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9205cf84a49da32a_c8bf7ef9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
11
] | [
null
] | [
16
] | [
34
] | |
2024-11-18T22:39:27.927201+00:00 | 1,595,412,989,000 | 2780a16272ac3bf077754ebfa64b882a23eafa57 | 3 | {
"blob_id": "2780a16272ac3bf077754ebfa64b882a23eafa57",
"branch_name": "refs/heads/master",
"committer_date": 1683050932000,
"content_id": "600284d525f8f350ae4efa8aeb4e198da499bdf3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "88fe39a8bf06298dca399faa6f9cd8be30ef24d6",
"extension": "py"... | 2.609375 | stackv2 | #!/bin/python
import numpy as np
import ear.core.direct_speakers.panner
from jinja2 import Template
def rule_to_row(rule):
possible_gains = [
(1.0, "1.0"),
(0.0, "0.0"),
(np.sqrt(1 / 2), "std::sqrt(1.0 / 2.0)"),
(np.sqrt(1 / 3), "std::sqrt(1.0 / 3.0)"),
(np.sqrt(2 / 3), "st... | 72 | 26 | 97 | 14 | 582 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8aae03a9f80b2955_27fed066", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
42
] | [
64
] | [
12
] | [
2
] | |
2024-11-18T22:14:52.249378+00:00 | 1,630,397,386,000 | da5fa6d7fd8fb760613dafac2378249d30402df5 | 3 | {
"blob_id": "da5fa6d7fd8fb760613dafac2378249d30402df5",
"branch_name": "refs/heads/main",
"committer_date": 1630397386000,
"content_id": "78959593421e3aa68d62e2fe14a6e2d6d327dbe8",
"detected_licenses": [
"MIT"
],
"directory_id": "73fb81433dc64440c00b4e98972b2166f289eff1",
"extension": "py",
"file... | 2.546875 | stackv2 | import os, subprocess, re
from termcolor import colored
# Emitter object keeps track of the generated code and outputs it.
class Emitter:
def __init__(self, tempfile, verbose, keep_c_file, generate_header):
self.tempfile = tempfile
self.verbose = verbose
self.keep_c_file = keep_c_file
self.generate_header = g... | 179 | 31.25 | 121 | 26 | 1,621 | python | [{"finding_id": "codeql_py/overly-large-range_29b3789f74ab82d0_52ed89bc", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
148,
154
] | [
null,
null
] | [
23,
28
] | [
26,
31
] | |
2024-11-18T22:54:58.637957+00:00 | 1,577,686,043,000 | 98cc8a5c8e2a176554d134013968a5100f605696 | 2 | {
"blob_id": "98cc8a5c8e2a176554d134013968a5100f605696",
"branch_name": "refs/heads/master",
"committer_date": 1577703854000,
"content_id": "92d27005f3b835f610cddb6d3d0a4726e9595d0b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "966be21ecb8a959455b2eec58e0e93e04e7adcba",
"extension": "py"... | 2.484375 | stackv2 | #!/usr/bin/python3
import hashlib
import logging
_LOGGER = logging.getLogger(__name__)
from .wyzeapi_exceptions import *
from .wyzeapi_bulb import WyzeBulb
from .wyzeapi_switch import WyzeSwitch
from .wyzeapi_request_manager import RequestManager
class WyzeApi():
def __init__(self, user_name, password):
self._us... | 137 | 24.82 | 86 | 21 | 1,117 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_5bb124078652cee3_781710e3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
30
] | [
null
] | [
25
] | [
49
] | |
2024-11-18T22:55:30.018752+00:00 | 1,605,320,340,000 | 4aeec8f62aebff076c3d497edd238aa2abe5696c | 3 | {
"blob_id": "4aeec8f62aebff076c3d497edd238aa2abe5696c",
"branch_name": "refs/heads/master",
"committer_date": 1605320340000,
"content_id": "251cf13bd9ade1660c16b598a28eb98a741bc604",
"detected_licenses": [
"MIT"
],
"directory_id": "f77e5e938c418c3c796a2c41fbfe55488252d581",
"extension": "py",
"fi... | 2.9375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import json
from hashlib import md5
try:
from urllib import quote # Python 2.X
except ImportError:
from urllib.parse import quote # Python 3+
import sys
try:
import httplib
import sys
reload(sys)
sys.setdefaultencoding('utf8')
except ImportErr... | 114 | 27.62 | 105 | 25 | 889 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_367596467e73d1cc_4b370f9d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
52
] | [
null
] | [
23
] | [
43
] | |
2024-11-18T23:18:23.346669+00:00 | 1,677,059,212,000 | 40727a8f2ad69cefd76e5c59786ebef13f96ca3e | 3 | {
"blob_id": "40727a8f2ad69cefd76e5c59786ebef13f96ca3e",
"branch_name": "refs/heads/master",
"committer_date": 1677059212000,
"content_id": "79cb38867f615e9677dc28ed9f3a983120d05604",
"detected_licenses": [
"MIT"
],
"directory_id": "a779689a0ed2c94aea4881168f5db4d933466a3f",
"extension": "py",
"fi... | 2.796875 | stackv2 | from subprocess import call
from tempfile import NamedTemporaryFile
from jinja2 import Environment, BaseLoader, PackageLoader
from axju.generic.execution import ExecutionWorker
class TemplateWorker(ExecutionWorker):
"""This worker can work with steps like:
{
'info': '....',
'template': 'templa... | 82 | 31.5 | 79 | 20 | 539 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c94c3ecf936c5886_b66839e9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
26
] | [
null
] | [
28
] | [
62
] | |
2024-11-19T00:07:13.886987+00:00 | 1,604,961,936,000 | 278aeb91c86b466fe30fd18b4bbfa15dd8dceafb | 2 | {
"blob_id": "278aeb91c86b466fe30fd18b4bbfa15dd8dceafb",
"branch_name": "refs/heads/master",
"committer_date": 1604961936000,
"content_id": "d118c2ad00682ea81e7c3e2302306cf134450685",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "43c51921ea558c8bf3416cf53f208e6219788515",
"extension": "p... | 2.359375 | stackv2 | from flask import Flask, Blueprint, jsonify, request, abort, current_app, \
make_response
import random
import requests
from sqlalchemy.sql import func
from slackclient import SlackClient
from friendbot.models import Friend
import re
friendbot = Blueprint('fb', __name__)
def get_phrase(text, event):
if... | 263 | 24.03 | 121 | 19 | 1,965 | python | [{"finding_id": "codeql_py/polynomial-redos_0184480b92709066_61a6546a", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin... | 2 | true | [
"CWE-1333",
"CWE-918"
] | [
"py/polynomial-redos",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '>' and with many repetitions of '>'.",
"The full URL of this request depends on a [user-provided value](1)."
] | [
30,
69
] | [
null,
null
] | [
35,
13
] | [
39,
43
] | |
2024-11-19T00:07:26.624216+00:00 | 1,550,043,752,000 | ea34707ad8de45f3d82a0c25cdfcc97e3f609d25 | 3 | {
"blob_id": "ea34707ad8de45f3d82a0c25cdfcc97e3f609d25",
"branch_name": "refs/heads/master",
"committer_date": 1550043752000,
"content_id": "969143e5e86e1cec44a3186991fea900be2b7806",
"detected_licenses": [
"MIT"
],
"directory_id": "032a03ee5d9bac309299b4648c2d38224ae0e628",
"extension": "py",
"fi... | 3.265625 | stackv2 | #!/usr/bin/env python3.6
from password import User
import pyperclip
def create_account(user_name,email,password):
'''
Function to create a new account
'''
new_account = User(user_name,email,password)
return new_account
def save_accounts(account):
'''
Function to save accountt
'''
acc... | 132 | 33.52 | 162 | 19 | 781 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dfaff09cbd5538fc_fd95284f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
87,
107
] | [
null,
null
] | [
45,
39
] | [
107,
82
] | |
2024-11-19T00:45:03.878169+00:00 | 1,566,245,682,000 | cc6b53303999f2c841423dcb3db04556e7574012 | 2 | {
"blob_id": "cc6b53303999f2c841423dcb3db04556e7574012",
"branch_name": "refs/heads/master",
"committer_date": 1566245682000,
"content_id": "2b3d4daef486e50f58f654afd76c9b2c1371b1cd",
"detected_licenses": [
"MIT"
],
"directory_id": "64f873c381ca29ddec4ff84f103928c6ecddd079",
"extension": "py",
"fi... | 2.453125 | stackv2 | # coding: utf-8
"""
POSTMAN TO ROBOTFRAMEWORK
Usage:
postman2robot [--ifile <inputfile>] [--ofile <outputfile>] [options]
postman2robot -h
Options:
-i <inputfile>, --ifile <inputfile> Path to the postman collection. [default: collection.json]
-o <outputfile>, --ofile <outputfile> Path to the output ... | 84 | 31.62 | 115 | 15 | 644 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_964274e02d7545df_41d5ea12", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
74
] | [
76
] | [
11
] | [
6
] | |
2024-11-18T23:28:36.991266+00:00 | 1,596,999,869,000 | d12640bed9c2df6012e760a5bce3a8f3094aaa70 | 3 | {
"blob_id": "d12640bed9c2df6012e760a5bce3a8f3094aaa70",
"branch_name": "refs/heads/master",
"committer_date": 1596999869000,
"content_id": "47f601d2ab716a22c143500c5f0ea8338b550553",
"detected_licenses": [
"MIT"
],
"directory_id": "43a443e0cfb4bafff51a3932cbcf5f3cb31f7a7e",
"extension": "py",
"fi... | 2.984375 | stackv2 | #!/usr/bin/env python
"""
This Python script leverages RESTCONF to:
- retrieve a list of interfaces on a device
- ask the user for the interface to configure
- displays the interface IP information
- asks user for new IP information
- updates the IP address on the interface
- dis... | 186 | 32.18 | 90 | 25 | 1,252 | python | [{"finding_id": "codeql_py/request-without-cert-validation_13059c453968ff32_6667cdcc", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
58,
92,
106
] | [
62,
97,
110
] | [
16,
16,
16
] | [
30,
30,
30
] | |
2024-11-18T23:40:02.218045+00:00 | 1,500,481,802,000 | 0a63d90423227ec84559f1f985a00cb6536a8f0b | 2 | {
"blob_id": "0a63d90423227ec84559f1f985a00cb6536a8f0b",
"branch_name": "refs/heads/master",
"committer_date": 1500481802000,
"content_id": "b94f91256b0cb3e798c4dd67035d244c5e882946",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "57a2c45466fa73d0a0c2cedb76c92f2d72984c14",
"extension": "py"... | 2.328125 | stackv2 | import json
import os
from actions import allergy
from actions import forecast
from actions import openfood
from actions import place
from flask import Flask
from flask import make_response
from flask import request
# Flask app should start in global layout
app = Flask(__name__)
@app.route('/', methods=['GET'])
d... | 88 | 27.72 | 63 | 12 | 606 | python | [{"finding_id": "codeql_py/flask-debug_2cd3602c3b5238ec_ac9c9844", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
88,
56
] | [
null,
null
] | [
5,
16
] | [
51,
25
] | |
2024-11-19T00:18:41.025889+00:00 | 1,625,515,385,000 | ca9520d85f54abb8f16787fe9968b06b5e50a8f5 | 3 | {
"blob_id": "ca9520d85f54abb8f16787fe9968b06b5e50a8f5",
"branch_name": "refs/heads/main",
"committer_date": 1625515385000,
"content_id": "c128ec7bca269e7d50bf8c9b3d9c3a04cdc83a59",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "243f90e0889dab12777572834bafa1eee6c6d453",
"extension": "py",
... | 2.84375 | stackv2 | #!/usr/bin/env python3
import sys
try:
from http.server import HTTPServer, BaseHTTPRequestHandler
from urllib.parse import urlparse, parse_qs
except ImportError:
sys.exit('ERROR: It seems like you are not running Python 3. '
'This script only works with Python 3!')
import sqlite3
from html imp... | 79 | 26.47 | 144 | 16 | 530 | python | [{"finding_id": "codeql_py/sql-injection_1278ce15ae68a0d0_e90bee60", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
65
] | [
null
] | [
38
] | [
41
] | |
2024-11-19T00:18:41.140364+00:00 | 1,504,125,395,000 | 2669b40a8ae619b3d5a34e63ee2ba39d41cab170 | 2 | {
"blob_id": "2669b40a8ae619b3d5a34e63ee2ba39d41cab170",
"branch_name": "refs/heads/master",
"committer_date": 1504125395000,
"content_id": "c4ff4aaecf36b8e99165e146994e086264595e0f",
"detected_licenses": [
"MIT"
],
"directory_id": "03008e7193dc44f53bf23efc3c833d20b13c9516",
"extension": "py",
"fi... | 2.453125 | stackv2 | # encoding: utf-8
from __future__ import unicode_literals
from urlparse import urlparse
from workflow import Workflow, MATCH_ALL, MATCH_ALLCHARS
import argparse
import subprocess
import sys
####################################################################
# Alfred Applescript Commands
##########################... | 291 | 26.55 | 73 | 16 | 1,677 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_66bda1971c6c3167_52885100", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
190,
238
] | [
null,
null
] | [
11,
15
] | [
38,
23
] | |
2024-11-19T01:11:13.065397+00:00 | 1,631,352,688,000 | 0d25e5b5d734fca21c3d06ef34677924a78dc1ed | 3 | {
"blob_id": "0d25e5b5d734fca21c3d06ef34677924a78dc1ed",
"branch_name": "refs/heads/master",
"committer_date": 1631352688000,
"content_id": "7015afc38d200c7f9511ccf94cf7b76b0dfcf9df",
"detected_licenses": [
"MIT"
],
"directory_id": "e25720a94f131a2bd7622b5abe325d68ba724af6",
"extension": "py",
"fi... | 2.703125 | stackv2 | from flask import Flask, request, render_template, redirect
import app_functions as func
from flask_mysqldb import MySQL
import yaml
app = Flask(__name__)
mdb = yaml.load(open('db.yaml'))
app.config['MYSQL_HOST'] = mdb['mysql_host']
app.config['MYSQL_USER'] = mdb['mysql_user']
app.config['MYSQL_PASSWORD'] = mdb['mysq... | 36 | 28.78 | 92 | 12 | 251 | python | [{"finding_id": "codeql_py/flask-debug_0bbe63b6b8ec673f_93606585", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
35,
22
] | [
null,
null
] | [
5,
25
] | [
24,
57
] | |
2024-11-18T23:46:49.376265+00:00 | 1,691,570,507,000 | a34e1b453749d0f6b8cab15ca07f2da23e019d48 | 3 | {
"blob_id": "a34e1b453749d0f6b8cab15ca07f2da23e019d48",
"branch_name": "refs/heads/master",
"committer_date": 1691570507000,
"content_id": "fc8e53a8f822df5fa6fe6d657198208df36e26dd",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "69fda23fe612add785ed3b0ec2b116e995b6f5e6",
"extension": "p... | 3.140625 | stackv2 | """ Functions facilitating file operations """
import os
import sys
import errno
import time
from warnings import warn
from tarfile import open as topen
from hashlib import md5
__all__ = [
"checksum",
"size",
"filesize_to_str",
"untar",
"create_lock",
"remove_lock",
"wait_for_lock",
"... | 260 | 29.26 | 88 | 19 | 1,864 | python | [{"finding_id": "codeql_py/tarslip_941e1ef1a3135ef2_482e7733", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
110
] | [
null
] | [
9
] | [
11
] | |
2024-11-18T23:46:51.468886+00:00 | 1,602,101,863,000 | 6d42753233a83e9b7aa447b22e8e0e844b7b7b11 | 3 | {
"blob_id": "6d42753233a83e9b7aa447b22e8e0e844b7b7b11",
"branch_name": "refs/heads/master",
"committer_date": 1602101863000,
"content_id": "f2c3cae1bc75292918181e1efa4f12aece23f70f",
"detected_licenses": [
"MIT"
],
"directory_id": "104a9ff80f9c83855624e43061365e37da07b3c3",
"extension": "py",
"fi... | 2.53125 | stackv2 | from datetime import datetime
import os
import pytz
import requests
import math
import base64
API_TOKEN = os.getenv("API_KEY")
API_URL = ('http://api.openweathermap.org/data/2.5/weather?q={}&country()&mode=json&units={}&av_temp{}&av_wind{}&appid={}')
temp_threshold = ""
wind_threshold = ""
def query_api(city, countr... | 21 | 29.67 | 123 | 14 | 160 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_916fb4f0c120ff69_d19a9cea", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
16
] | [
null
] | [
15
] | [
94
] | |
2024-11-18T23:48:06.860900+00:00 | 1,619,870,888,000 | 6eae9d08818f5a449cb7e36c879d780d4b8a8ad2 | 3 | {
"blob_id": "6eae9d08818f5a449cb7e36c879d780d4b8a8ad2",
"branch_name": "refs/heads/main",
"committer_date": 1619870888000,
"content_id": "3083d60b5c2add62348fae41de58fba515e7d198",
"detected_licenses": [
"MIT"
],
"directory_id": "379407662d25f5cd8b59c9ea97a2c16b2ada0c22",
"extension": "py",
"file... | 2.515625 | stackv2 | import os
from flask import Flask, flash, g, request, redirect, url_for, send_from_directory, Blueprint, render_template, current_app
from werkzeug.utils import secure_filename
from flask import current_app
from flaskr.db import get_db
import cv2
import numpy as np
from PIL import Image, ImageFilter, ImageOps
from ... | 123 | 34.02 | 153 | 18 | 923 | python | [{"finding_id": "codeql_py/url-redirection_4a70c680ad1f5227_d24c1632", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 3 | true | [
"CWE-601",
"CWE-601",
"CWE-022"
] | [
"py/url-redirection",
"py/url-redirection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
37,
44,
93
] | [
null,
null,
null
] | [
29,
29,
19
] | [
40,
40,
32
] | |
2024-11-18T23:48:18.096261+00:00 | 1,619,812,219,000 | 29468ece6b684f314ff63d4696aa021f68ddd3ea | 3 | {
"blob_id": "29468ece6b684f314ff63d4696aa021f68ddd3ea",
"branch_name": "refs/heads/main",
"committer_date": 1619812219000,
"content_id": "00e6bde5cb88c79b69c86dad8a641039611c8a7c",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "e26682c2ce378a724a0dc133d695c51f4beea2b4",
"extension": "py"... | 2.53125 | stackv2 | #!/usr/bin/env python3
# data.py - script used to produce database results over HTTP for simple sqlite3 database
import cgi
import sqlite3
conn = sqlite3.connect('/etc/httpd/db/clients.db')
curs = conn.cursor()
print("Content-type:text/plain\n\n")
form = cgi.FieldStorage()
querystring = form.getvalue("querystring"... | 27 | 22.78 | 89 | 12 | 157 | python | [{"finding_id": "codeql_py/sql-injection_1c1f9b57c969c2b1_c625f887", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
21
] | [
null
] | [
25
] | [
31
] | |
2024-11-19T00:29:34.209575+00:00 | 1,665,502,661,000 | 8b7f67195a1db50326e670dcd2bdb1f978a9ad01 | 3 | {
"blob_id": "8b7f67195a1db50326e670dcd2bdb1f978a9ad01",
"branch_name": "refs/heads/master",
"committer_date": 1665502661000,
"content_id": "dbfe2f4eabed3bf1bf535b0c01bc9aed41a220f3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2457d44a9c817a125c89c60f1d25546a02b1376d",
"extension": "py"... | 2.671875 | stackv2 | """Auth StarLine API."""
import hashlib
import logging
from .base_api import BaseApi
_LOGGER = logging.getLogger(__name__)
class StarlineAuth(BaseApi):
"""Auth StarLine API class."""
def get_app_code(self, app_id: str, app_secret: str) -> str:
"""Get application code for getting application token.""... | 72 | 38.64 | 176 | 18 | 639 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_925e0bb00258c866_264adcbe", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computation... | [
18,
37,
57
] | [
null,
null,
null
] | [
35,
35,
34
] | [
68,
81,
70
] | |
2024-11-19T00:44:15.154673+00:00 | 1,355,814,666,000 | fd52b10bdbb7c8bec6f023b8feb88ee67d067a6b | 3 | {
"blob_id": "fd52b10bdbb7c8bec6f023b8feb88ee67d067a6b",
"branch_name": "refs/heads/master",
"committer_date": 1355814666000,
"content_id": "70b3b62e2da7c8d577e224332ce870f744f49e82",
"detected_licenses": [
"MIT"
],
"directory_id": "a6db679289430b7f5b6e38015746dd7286757f77",
"extension": "py",
"fi... | 2.6875 | stackv2 | #!/usr/bin/python2
# coding: utf8
import codecs
import collections
import os
import os.path
import sys
import shutil
import markdown
import jinja2
import pygments
try:
progname, src, dst = sys.argv[:3]
except:
print u"USAGE: python dirtgen.py <source_dir> <destination_dir>"
sys.exit(1)
resource_dir = os... | 150 | 27.3 | 87 | 15 | 1,014 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fda23db4b01621d5_229910ee", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25
] | [
null
] | [
14
] | [
78
] | |
2024-11-18T23:05:41.179871+00:00 | 1,625,873,740,000 | 5d3f94434ea5c9b5baba4bd15484ca1e58bcd506 | 2 | {
"blob_id": "5d3f94434ea5c9b5baba4bd15484ca1e58bcd506",
"branch_name": "refs/heads/main",
"committer_date": 1625873740000,
"content_id": "1c2face545dd062fe54a536105bb96199cb04a25",
"detected_licenses": [
"MIT"
],
"directory_id": "c60fb303c609e62d20683d6192df92cc1dd3ab26",
"extension": "py",
"file... | 2.453125 | stackv2 | import os
from os.path import dirname, join, exists, abspath
import pandas as pd
from jinja2 import Environment, FileSystemLoader
__all__ = ['template_loader']
class TemplateLoader:
def __init__(self):
template_dirs = {
join(dirname(__file__), 'templates'),
join(dirname(pd.__file... | 28 | 28.25 | 69 | 14 | 167 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_6c46fb1b8a198200_a71585df", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
17
] | [
null
] | [
20
] | [
64
] | |
2024-11-18T23:05:48.246313+00:00 | 1,612,472,128,000 | 2a6d33ae53bcd8dde441bd7e516e287f44dba6ab | 3 | {
"blob_id": "2a6d33ae53bcd8dde441bd7e516e287f44dba6ab",
"branch_name": "refs/heads/master",
"committer_date": 1612472128000,
"content_id": "ededa081d5c17d3fd8c4c4620b6b93cecfcd2f35",
"detected_licenses": [],
"directory_id": "e827c22a34c76a39d461f42f10495cf6edc0f1cc",
"extension": "py",
"filename": "pub... | 3.1875 | stackv2 | # CS 171 Final Project, Web Scraping
# The hope of this file is to get an adjacency matrix of Harvard faculty co-authors
# perhaps keep track of count of times that two authors are on same paper
# feel free to ask Tyler Piazza about this file
import numpy as np
import pandas as pd
import re
import requests
from time i... | 176 | 36.99 | 147 | 21 | 1,638 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9bd298c3a7824ded_c276f54b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
74,
147
] | [
null,
null
] | [
21,
15
] | [
67,
61
] | |
2024-11-18T23:11:13.869840+00:00 | 1,487,094,642,000 | 5191387d5cced93c19a8c8df394ea7377cf28020 | 3 | {
"blob_id": "5191387d5cced93c19a8c8df394ea7377cf28020",
"branch_name": "refs/heads/master",
"committer_date": 1487094642000,
"content_id": "a353e28f1334a9ca44438ff206acdfb5c63d6d21",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "616060f562bc07b246718dcf95c9b418bc79201b",
"extension": "py"... | 2.703125 | stackv2 | """
Gather relevance scores for given
"""
import json
baseQuery = {
"query": {
"bool": {
"filter": {
"ids": {
"values": [
# list of ids goes here
]
}
},
"should": {
# query goes here
}
}
... | 92 | 30.72 | 104 | 17 | 676 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a2a4bbdbcdc8642c_9a23c658", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
51
] | [
null
] | [
16
] | [
62
] | |
2024-11-18T23:11:14.951116+00:00 | 1,533,267,105,000 | 247c92ab12ac0e4fd230038b2a202e922069121d | 3 | {
"blob_id": "247c92ab12ac0e4fd230038b2a202e922069121d",
"branch_name": "refs/heads/master",
"committer_date": 1533267105000,
"content_id": "dce23c15acb3df5446b32abb074a2230c4f3dcd7",
"detected_licenses": [
"MIT"
],
"directory_id": "5564d74bf4849269864e7aeca7d5e49606c28164",
"extension": "py",
"fi... | 2.65625 | stackv2 | # coding:utf-8
import datetime
from flask import render_template, redirect, url_for, request,flash
from config.manager import app
# from models.models import db
from models.category import Category,db
from route.func import user_login_required
from route.forms import CatEditForm,CatForm
# 发布文章
@app.route('/cat/add/'... | 76 | 27.38 | 95 | 17 | 583 | python | [{"finding_id": "codeql_py/url-redirection_06ea75cd4e72cb01_a96b4b22", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
47,
61
] | [
null,
null
] | [
25,
21
] | [
80,
76
] | |
2024-11-19T01:21:44.494720+00:00 | 1,441,518,143,000 | dffefe691f9d073be6846e57bc76697274a8dc82 | 2 | {
"blob_id": "dffefe691f9d073be6846e57bc76697274a8dc82",
"branch_name": "refs/heads/master",
"committer_date": 1441518143000,
"content_id": "77a5e28748dc9c8f885480944e8e61ecb41b8b8d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3a21faa925e8a21ad5e0d6dedf3037cc52750cbd",
"extension": "py"... | 2.34375 | stackv2 | import os
import socket
import warnings
import paramiko
from paramiko.ssh_exception import BadHostKeyException, AuthenticationException, SSHException
from libcloud.compute.base import NodeImage
from datasciencebox.core.logger import getLogger
logger = getLogger()
from datasciencebox.core.exceptions import DSBExceptio... | 267 | 31.43 | 93 | 16 | 1,769 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_c44f1de6010442ec_ef01c827", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
143
] | [
null
] | [
9
] | [
66
] | |
2024-11-19T00:36:51.266045+00:00 | 1,493,785,596,000 | bd6e82a9ee0019e51bad419729840b4ac3d2c9e0 | 2 | {
"blob_id": "bd6e82a9ee0019e51bad419729840b4ac3d2c9e0",
"branch_name": "refs/heads/master",
"committer_date": 1493785596000,
"content_id": "f247e182c6182e23e98ba5f3c971ccecb45895e0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6a6b81f740463782529cd8b46792132f02967016",
"extension": "py"... | 2.359375 | stackv2 | import tornado.web
import tornado.gen
import tornado.httpclient
import requests
from config import config
class InfoController(tornado.web.RequestHandler):
def set_default_headers(self):
self.set_header("Access-Control-Allow-Origin", "*")
self.set_header("Access-Control-Allow-Headers", "x-requeste... | 26 | 30.69 | 86 | 14 | 179 | python | [{"finding_id": "codeql_py/reflective-xss_d4709e9d933b54e9_5c092870", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-918"
] | [
"py/reflective-xss",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
26,
25
] | [
null,
null
] | [
20,
20
] | [
36,
53
] | |
2024-11-19T00:36:52.821447+00:00 | 1,612,798,688,000 | b3ddf3408eab25ef966c862975f62298c3bc5529 | 3 | {
"blob_id": "b3ddf3408eab25ef966c862975f62298c3bc5529",
"branch_name": "refs/heads/main",
"committer_date": 1612798688000,
"content_id": "334da747430fa12c5bacee9dd8b298ba16a6ee7f",
"detected_licenses": [
"MIT"
],
"directory_id": "a7aac07691604d252cd0b1bf5dbe218f9a9d1317",
"extension": "py",
"file... | 2.6875 | stackv2 | from Crypto.PublicKey import RSA
from Crypto.Cipher import PKCS1_v1_5
from models.key_pair import KeyPair
from tp_link_cipher import TpLinkCipher
import base64, hashlib, helpers, logging
logger = logging.getLogger('root')
class Encryption:
def generate_key_pair(self) -> KeyPair:
logger.debug(f"Generating ... | 66 | 33.14 | 88 | 16 | 567 | python | [{"finding_id": "codeql_py/weak-crypto-key_84ffe15f35c0ab7b_ab4ff197", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
12
] | [
null
] | [
15
] | [
33
] | |
2024-11-19T00:36:58.966359+00:00 | 1,564,266,138,000 | ee71c933e01d01f71f9761d382bb878f544f0a20 | 2 | {
"blob_id": "ee71c933e01d01f71f9761d382bb878f544f0a20",
"branch_name": "refs/heads/master",
"committer_date": 1564266138000,
"content_id": "66f477b74dd28f42db15a2b87b51dd77d842b3b3",
"detected_licenses": [
"MIT"
],
"directory_id": "30b91b07a7f22dda9659cef865dc87ef312b6b78",
"extension": "py",
"fi... | 2.328125 | stackv2 | from datetime import datetime
from urllib.parse import unquote
import traceback
import sys
# Django
from django.db.models import Q
from django.contrib.gis.geos import GEOSGeometry
from django.contrib.gis.db.models.functions import Distance
# REST Framework
from rest_framework.response import Response
from rest_framewor... | 67 | 34.51 | 112 | 22 | 509 | python | [{"finding_id": "codeql_py/stack-trace-exposure_80d6876bdcfb9f43_66e7f2a6", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
30,
67
] | [
null,
null
] | [
29,
29
] | [
66,
66
] | |
2024-11-19T01:02:11.677015+00:00 | 1,611,080,235,000 | 137208aa5468b70b0b3a398db097facb8432b8ea | 4 | {
"blob_id": "137208aa5468b70b0b3a398db097facb8432b8ea",
"branch_name": "refs/heads/main",
"committer_date": 1611080235000,
"content_id": "6e2bcc88ad0a6f29762ee6e25b0ed1856f3b39a0",
"detected_licenses": [
"MIT"
],
"directory_id": "8e79c3ea650743890bb68c07b38d7bc58fb8e757",
"extension": "py",
"file... | 3.71875 | stackv2 | # Author: Joseph Finley
# Open Weather Map API
#
# Purpose: Take user supplied zip code and make
# an API call for a 5 day forcast.
#
#
import requests, calendar
from collections import Counter
# Forecast Object to organize data from request
class Forecast():
def __init__(self,date):
self.da... | 176 | 26.53 | 115 | 14 | 1,238 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3d534547f8254cc5_e9520af4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
120
] | [
null
] | [
7
] | [
58
] | |
2024-11-19T01:02:21.164408+00:00 | 1,485,985,932,000 | 733b644aeb817e8a23b3d368d258809382f74d9d | 3 | {
"blob_id": "733b644aeb817e8a23b3d368d258809382f74d9d",
"branch_name": "refs/heads/master",
"committer_date": 1485985932000,
"content_id": "621c6f7e88b42ed640a39994a94f3ea45ab85297",
"detected_licenses": [
"MIT"
],
"directory_id": "59d48ed667d1994068b60212939a2ef86dc1056e",
"extension": "py",
"fi... | 2.984375 | stackv2 | import configparser
import getopt
import logging.config
import sys
from wordscounterbot.twitch_words_counter_bot import TwitchWordsCounterBot
default_server = "irc.chat.twitch.tv"
default_port = 6667
def main(argv):
server, port, channel, nickname, password = read_command_line_args(argv)
logging.info("serve... | 103 | 28.4 | 119 | 13 | 683 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_120a3a990039df21_3273385e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
14
] | [
null
] | [
18
] | [
103
] | |
2024-11-19T00:13:41.618412+00:00 | 1,546,604,557,000 | c382f77cf455d426bb6011a25e73fa5f7fd0b1fd | 3 | {
"blob_id": "c382f77cf455d426bb6011a25e73fa5f7fd0b1fd",
"branch_name": "refs/heads/master",
"committer_date": 1546604557000,
"content_id": "cca16b4b0fac117b68767ca924db201430387bcd",
"detected_licenses": [
"MIT"
],
"directory_id": "acfcf0c6a4e5ee27581b21dfc9f8715d5fb5bb72",
"extension": "py",
"fi... | 2.734375 | stackv2 | import os
import pathlib
import glob
import shutil
from jinja2 import Environment, FileSystemLoader, meta, Template
def get_variables(filename):
env = Environment(loader=FileSystemLoader('.'))
template_source = env.loader.get_source(env, filename)[0]
parsed_content = env.parse(template_source)
return meta.find_u... | 67 | 24.39 | 77 | 21 | 427 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_67080e4992bd1526_7e1f98a3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
10,
59
] | [
null,
null
] | [
8,
8
] | [
49,
25
] | |
2024-11-19T00:13:42.542975+00:00 | 1,559,339,510,000 | ba08c2a37a633321213729f8d9818fa64c6784fe | 3 | {
"blob_id": "ba08c2a37a633321213729f8d9818fa64c6784fe",
"branch_name": "refs/heads/master",
"committer_date": 1559339510000,
"content_id": "ab9c1e9b730f0c015bc5690f30421534cc38daa7",
"detected_licenses": [
"MIT"
],
"directory_id": "98211715774fa38226c6e98594bd09c91ed439b2",
"extension": "py",
"fi... | 3.046875 | stackv2 | from cryptography.fernet import Fernet
import rsa
import hashlib
import binascii
import base64
import os
def newSalt(size=16):
'''Generate a new salt.'''
salt = os.urandom(size)
return salt
def hashText(text, algorithm="sha512", salt=b""):
'''Hash some text. It is highly recommended that a salt be use... | 60 | 28.5 | 71 | 10 | 427 | python | [{"finding_id": "codeql_py/weak-crypto-key_7de26998a3100156_327eb1b4", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable.", "remediation": "", ... | 2 | true | [
"CWE-326",
"CWE-327"
] | [
"py/weak-crypto-key",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
49,
26
] | [
null,
null
] | [
17,
26
] | [
37,
34
] | |
2024-11-19T00:13:42.726866+00:00 | 1,627,740,937,000 | 5c9297e67b37f8b3d2d5f8aa66e54752b13623ed | 2 | {
"blob_id": "5c9297e67b37f8b3d2d5f8aa66e54752b13623ed",
"branch_name": "refs/heads/main",
"committer_date": 1627740937000,
"content_id": "69e536ed52286ce704223b9d383f24a82c330d4f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a970da89b5d3185197d33b45ebed94df104c8d49",
"extension": "py",
... | 2.328125 | stackv2 | from tornado.web import RequestHandler
# 登录逻辑判断
async def check_user(name, passwd):
result = {
"is_success": False,
"token": ""
}
if name == "1" and passwd == "1":
result = {
"is_success": True,
"token": "good"
}
return result
# 登录,返回json
class... | 51 | 26.69 | 77 | 15 | 330 | python | [{"finding_id": "codeql_py/reflective-xss_801b5eb3478a41d2_0b2f683b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
36,
42
] | [
40,
46
] | [
24,
24
] | [
14,
14
] | |
2024-11-19T01:26:12.900650+00:00 | 1,633,986,868,000 | c21dd5f4781bf0fda006dc147df791fc3028f58b | 2 | {
"blob_id": "c21dd5f4781bf0fda006dc147df791fc3028f58b",
"branch_name": "refs/heads/main",
"committer_date": 1633986868000,
"content_id": "d44c13ed63da5a4d3265108368d3bd664e43a616",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "572ef64ef925f049cd821be90e1558250adf5e3a",
"extension": "py",
... | 2.421875 | stackv2 | import errno
import re
import socket
import traceback
from typing import List, Dict
import numpy as np
from flask import jsonify
from lexsubgen.metrics.candidate_ranking_metrics import compute_gap, WORD_PAT_RE
from lexsubgen.utils.wordnet_relation import get_wordnet_relation
def get_free_port():
with socket.soc... | 231 | 32.92 | 88 | 17 | 1,726 | python | [{"finding_id": "codeql_py/stack-trace-exposure_205eef079ad9c8c6_877276ec", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-209",
"CWE-200",
"CWE-200"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/bind-socket-all-network-interfaces",
"py/bind-socket-all-network-interfaces"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"'' binds a socket to all interfaces.",
"'' binds a socket to all interfaces."
] | [
54,
55,
16,
30
] | [
null,
null,
null,
null
] | [
25,
27,
9,
9
] | [
31,
41,
27,
30
] | |
2024-11-19T01:39:56.013696+00:00 | 1,627,323,707,000 | c4dcc5383c9b8d2ec846d924e4f40c78477a958a | 2 | {
"blob_id": "c4dcc5383c9b8d2ec846d924e4f40c78477a958a",
"branch_name": "refs/heads/master",
"committer_date": 1629392778000,
"content_id": "ab59e62b646064734410e26fcc3da7b97e04895f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1dbb6f31d36e25fae0a8df9005186e8dcc8db178",
"extension": "py"... | 2.5 | stackv2 | import http.client
import http.server
assert __name__ == '__main__', 'this module should only be executed, not imported'
REAL_HOST = 'snapshot.debian.org'
REAL_PATH = '/archive/debian-ports/20190706T203242Z'
URL_LIST = open('debian-urls.txt', 'w')
class Handler(http.server.BaseHTTPRequestHandler):
def do_GET(se... | 36 | 30.44 | 82 | 13 | 288 | python | [{"finding_id": "codeql_py/partial-ssrf_1cf4dd6c82480897_e23dddf0", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
17
] | [
null
] | [
9
] | [
51
] | |
2024-11-18T23:43:34.231077+00:00 | 1,493,232,202,000 | dc26a5757dc0b6fde4997dec5a24738257e4825b | 3 | {
"blob_id": "dc26a5757dc0b6fde4997dec5a24738257e4825b",
"branch_name": "refs/heads/master",
"committer_date": 1493232202000,
"content_id": "79c085982550e86b34ec09ec5fd25e52ca346e10",
"detected_licenses": [
"MIT"
],
"directory_id": "d5e12d59e5e701bc18de5a182e07ceacc8112e71",
"extension": "py",
"fi... | 2.5625 | stackv2 | from flask import *
from functools import wraps
import os
import sqlite3
app = Flask(__name__)
app.config.from_object(__name__) # load config from this file
# Load default config and override config from an environment variable
app.config.update(dict(
DATABASE=os.path.join(app.root_path, 'sims.db'),
SECRET... | 162 | 29.86 | 161 | 18 | 1,090 | python | [{"finding_id": "codeql_py/flask-debug_d00b40880ce46914_043d892c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-601",
"CWE-089"
] | [
"py/flask-debug",
"py/url-redirection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](2).\nUntrusted URL redirection depends on a [user-provided value](3... | [
162,
146,
51
] | [
null,
null,
null
] | [
5,
33,
28
] | [
24,
57,
33
] | |
2024-11-19T01:18:09.678531+00:00 | 1,531,485,092,000 | d932693153e83b3d99fc532391eb1230235b7491 | 2 | {
"blob_id": "d932693153e83b3d99fc532391eb1230235b7491",
"branch_name": "refs/heads/master",
"committer_date": 1531485092000,
"content_id": "87b44bd9c334442abfa40d2e2a81082cac496b5e",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "8a4d981a17a8a4b00f6ab7f4bebf9fbb7b7bad5d",
"extension": "p... | 2.3125 | stackv2 | # -*- coding: utf-8 -*-
#########################################################################
#
# Copyright 2018, GeoSolutions Sas.
# All rights reserved.
#
# This source code is licensed under the BSD-style license found in the
# LICENSE file in the root directory of this source tree.
#
###########################... | 313 | 33.01 | 122 | 19 | 2,313 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2997ca484ff4b328_7dd02a0f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
197
] | [
198
] | [
14
] | [
43
] | |
2024-11-19T01:54:17.903274+00:00 | 1,585,149,541,000 | 40e0dd6167356642598242982a2bf785cb699e45 | 3 | {
"blob_id": "40e0dd6167356642598242982a2bf785cb699e45",
"branch_name": "refs/heads/master",
"committer_date": 1585149541000,
"content_id": "f5a0d29a39b49c70a745632402f535d37db8d189",
"detected_licenses": [
"MIT"
],
"directory_id": "a074ef7c0a936946f56c8f5f8947b00365c4b8fd",
"extension": "py",
"fi... | 3.171875 | stackv2 | """
The Stand News client to extract news from the Stand News. It can get
the news index and the news content
"""
import requests
import lxml
from datetime import datetime, date
import json
from dateutil import parser
import re
from bs4 import BeautifulSoup
from .News import News
class theStandNewsClient:
m... | 190 | 30.35 | 86 | 22 | 1,146 | python | [{"finding_id": "codeql_py/bad-tag-filter_576649cf7122e0e6_0016c751", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match upper case <SCRIPT> tags."
] | [
172
] | [
null
] | [
25
] | [
52
] | |
2024-11-19T00:02:47.014610+00:00 | 1,657,908,305,000 | f99e674edd62e9e55c01c7543e08d9ba6ae7f407 | 3 | {
"blob_id": "f99e674edd62e9e55c01c7543e08d9ba6ae7f407",
"branch_name": "refs/heads/master",
"committer_date": 1657908305000,
"content_id": "467dfa98c88c15ffc388095a4a8339b13755b9a4",
"detected_licenses": [
"MIT"
],
"directory_id": "ed81f401dcd2ce0399cec3a99b6e5851e62e74ca",
"extension": "py",
"fi... | 2.859375 | stackv2 | #!/usr/bin/env python3
import httplib2
import re
import socket
import sys
def parse_links(filename):
"""Returns a list of URLs from text file"""
with open(filename) as fp:
data = fp.read()
raw_links = re.findall(
'http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]... | 48 | 28.4 | 89 | 16 | 363 | python | [{"finding_id": "codeql_py/overly-large-range_b21159ed1a28d2ed_5d714f69", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
14
] | [
null
] | [
40
] | [
43
] | |
2024-11-19T00:15:32.464200+00:00 | 1,635,181,558,000 | 62dd7983299b9ebac47ea4ceddb98e49757098fd | 2 | {
"blob_id": "62dd7983299b9ebac47ea4ceddb98e49757098fd",
"branch_name": "refs/heads/main",
"committer_date": 1635181558000,
"content_id": "58666e1226fd2d317f1fa8ea12567e95a02cb5ea",
"detected_licenses": [
"MIT"
],
"directory_id": "90d28e4d3aafc94277b60c4c970a3623969e271e",
"extension": "py",
"file... | 2.421875 | stackv2 | """
File: lambda_function.py
Project: ccda_step4_converter
File Created: Friday, 17th July 2020 7:04:34 pm
Author: Canivel, Danilo (dccanive@amazon.com)
Description: Execute the conversion to generate a FHIR Bundle typer Batch
-----
Last Modified: Tuesday, 12th January 2021 8:48:48 am
Modified By: Canivel, Danilo (dcca... | 195 | 34.84 | 134 | 16 | 1,651 | python | [{"finding_id": "codeql_py/request-without-cert-validation_04eae619a835f52a_3b9cbb99", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
112,
117
] | [
null,
null
] | [
19,
28
] | [
79,
95
] | |
2024-11-19T01:02:51.609159+00:00 | 1,605,610,337,000 | ae1120743f8620e6fdbf4fdd1b6d150173659caf | 3 | {
"blob_id": "ae1120743f8620e6fdbf4fdd1b6d150173659caf",
"branch_name": "refs/heads/master",
"committer_date": 1605610337000,
"content_id": "8aefaac44a682d7636a00544760054c8de431dd4",
"detected_licenses": [
"MIT"
],
"directory_id": "26bb974dc94e44e3b8b9cf4d4fcd56b3244a71c4",
"extension": "py",
"fi... | 2.984375 | stackv2 | #!/usr/bin/env python3
import sys,re
regex = re.compile('[^a-zA-Z]')
TownName = "Paris"
# input comes from STDIN (standard input)
for line in sys.stdin:
UserName = None
UserPhoneNumber = 0
CallFrom = 0
CallDuration = 0
# remove leading and trailing whitespace
line = line.strip()
# split the line into word... | 26 | 25.73 | 79 | 11 | 203 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_542c65357d1a66f0_653239fd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
25
] | [
null
] | [
9
] | [
79
] | |
2024-11-19T02:00:39.851478+00:00 | 1,608,027,130,000 | dcdc719a4f187d550b516b2b4b653f35e1c43935 | 3 | {
"blob_id": "dcdc719a4f187d550b516b2b4b653f35e1c43935",
"branch_name": "refs/heads/main",
"committer_date": 1608027130000,
"content_id": "081bf5ba982650fd3101d8ad21a780106b1940e9",
"detected_licenses": [
"MIT"
],
"directory_id": "a251391add0a459eeded2e7084d7e3a2c40ab9f8",
"extension": "py",
"file... | 2.609375 | stackv2 | import logging
from datetime import datetime, date, timedelta
from pathlib import Path
import requests
import os
from io import BytesIO
import zipfile
import csv
from pathlib import Path
requests.packages.urllib3.disable_warnings()
requests.packages.urllib3.util.ssl_.DEFAULT_CIPHERS += ':HIGH:!DH:!aNULL'
class Gesu... | 97 | 35.24 | 136 | 19 | 704 | python | [{"finding_id": "codeql_py/request-without-cert-validation_1bb756ed10820574_1fa331b5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
27
] | [
null
] | [
13
] | [
62
] | |
2024-11-19T00:16:10.470736+00:00 | 1,633,821,470,000 | 2721deb46b13b5d304dc2bfae7c4672060931850 | 3 | {
"blob_id": "2721deb46b13b5d304dc2bfae7c4672060931850",
"branch_name": "refs/heads/master",
"committer_date": 1633821470000,
"content_id": "8ee1ec4f22b9acf56aa4944cb66f323c04d4f769",
"detected_licenses": [
"MIT"
],
"directory_id": "6a349e04a3ae9f21417437b7b96aea72c6055f5c",
"extension": "py",
"fi... | 2.625 | stackv2 | import itertools
import struct
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
GET_ITEM = "a"
EVAL = "b"
ADD = "c"
TO_CHAR = "d"
ZERO = "e"
ONE = "f"
USER_PASSWORD = "g"
HASH_COMPARISON = "h"
PASSWORD = "Passw0rd!"
PASSWORD_HASH = ... | 271 | 27.77 | 85 | 15 | 2,215 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1d849344b1785cda_bf3095ea", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 7 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sen... | [
258,
60,
60,
60,
60,
252,
21
] | [
null,
null,
null,
null,
null,
null,
null
] | [
17,
32,
37,
41,
47,
11,
7
] | [
30,
35,
39,
45,
51,
15,
20
] | |
2024-11-19T00:28:32.210478+00:00 | 1,637,152,819,000 | d6e5bc7fba2aeb92ade22e2ad67595e5d3a04af4 | 2 | {
"blob_id": "d6e5bc7fba2aeb92ade22e2ad67595e5d3a04af4",
"branch_name": "refs/heads/main",
"committer_date": 1637152819000,
"content_id": "63aa8945b71fb14215a4d1fee81660def59da29c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fe8f5bc9681b8808fc7504975597a45d575f5e66",
"extension": "py",
... | 2.453125 | stackv2 | import os
from flask import Flask, flash, request, redirect, url_for, render_template, make_response
from app.identify import identify_animal_kind, identify_animal_kinds
from werkzeug.utils import secure_filename
from flask import send_from_directory
UPLOAD_FOLDER = './uploads'
ALLOWED_EXTENSIONS = {'png', 'jpg', 'jpe... | 63 | 42.68 | 117 | 18 | 573 | python | [{"finding_id": "codeql_py/url-redirection_537e3d750531683f_e8e1d894", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
26,
32
] | [
null,
null
] | [
33,
33
] | [
44,
44
] | |
2024-11-19T00:28:36.766198+00:00 | 1,534,262,888,000 | 58cc4e3cf30ffa7d52c8bef2e7e5b93ab6e331bb | 2 | {
"blob_id": "58cc4e3cf30ffa7d52c8bef2e7e5b93ab6e331bb",
"branch_name": "refs/heads/master",
"committer_date": 1534262888000,
"content_id": "17582a01e591bbc551ccc8771c63d416f429e85a",
"detected_licenses": [
"MIT"
],
"directory_id": "d333d5f11f51611df682ad2983d42b0d22e8b757",
"extension": "py",
"fi... | 2.5 | stackv2 | from flask import redirect, url_for, request, render_template, Blueprint, flash
from flask_login import login_user, logout_user
from sqlalchemy import or_
from OrderSystem import forms, db, sentry
from OrderSystem.sql.ORM import User
from OrderSystem.utilities.Helpers import verify_password, flash_errors
from OrderSys... | 58 | 31.88 | 103 | 17 | 388 | python | [{"finding_id": "codeql_py/url-redirection_b29a9eb185e0556f_7538634d", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
41
] | [
null
] | [
29
] | [
88
] | |
2024-11-19T00:51:29.118228+00:00 | 1,374,517,442,000 | cd3ecca0eeb72da63366e82cabd89e841c35e95b | 3 | {
"blob_id": "cd3ecca0eeb72da63366e82cabd89e841c35e95b",
"branch_name": "refs/heads/master",
"committer_date": 1374517572000,
"content_id": "0ced44fcc98cf9e0eac6eee23bde8ebded47dbc4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "15dd9731ded2c410f0251ee9dc6f5b0d04fe7401",
"extension": "py"... | 2.703125 | stackv2 | import logging
from google.appengine.ext import db
class Configuration(db.Model):
arduino_phone_number = db.StringProperty()
appengine_phone_number = db.StringProperty()
twilio_sid = db.StringProperty()
twilio_token = db.StringProperty()
def get_configuration():
existing = Configuration.all().fet... | 72 | 28.89 | 92 | 11 | 448 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c68526b93bafa349_4a20d794", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
25,
34
] | [
null,
null
] | [
18,
18
] | [
88,
92
] | |
2024-11-19T02:01:08.125313+00:00 | 1,543,863,394,000 | dd30249f9f1cace07f32709c372e0addcde03433 | 2 | {
"blob_id": "dd30249f9f1cace07f32709c372e0addcde03433",
"branch_name": "refs/heads/master",
"committer_date": 1543863394000,
"content_id": "5e397122e6ce320a7a2b04bae26c516881f7c305",
"detected_licenses": [
"MIT"
],
"directory_id": "d9ccd511ee732ab2d5c52c725f74d702b6e38237",
"extension": "py",
"fi... | 2.359375 | stackv2 | """App"""
import platform
import os
from flask import Flask, render_template, request, send_file
from pmix.borrow import borrow
# noinspection PyProtectedMember
from static_methods import upload_file
app = Flask(__name__)
basedir = os.path.abspath(os.path.dirname(__file__))
path_char = '\\' if platform.system() == '... | 79 | 33.85 | 79 | 16 | 529 | python | [{"finding_id": "codeql_py/flask-debug_aa535b10343c7f51_b9c2063b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
79,
75
] | [
null,
null
] | [
5,
22
] | [
24,
38
] | |
2024-11-19T02:01:11.022418+00:00 | 1,456,801,634,000 | 637bdd73527de01eee68afdc523d77e602bedb05 | 2 | {
"blob_id": "637bdd73527de01eee68afdc523d77e602bedb05",
"branch_name": "refs/heads/master",
"committer_date": 1456801634000,
"content_id": "ccd67ff8242a974362200d309a4d416e8699f3ce",
"detected_licenses": [
"MIT"
],
"directory_id": "31008db6fd6b7f16ba31fe0105ed32c4a104e076",
"extension": "py",
"fi... | 2.375 | stackv2 | from flask import Flask
from flask import current_app, request, abort
import hashlib
import json
class ApiSequrity(object):
def __init__(self, secret):
super(ApiSequrity, self).__init__()
self.secret = secret
def gen_key(self, uid: str):
combined = self.secret + uid[:8]
hash_s... | 37 | 33.95 | 97 | 23 | 300 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_939ee7652df5e636_d2b158ff", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](3) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](4) is used in a hashing algorithm (MD5) that i... | [
14
] | [
null
] | [
32
] | [
56
] | |
2024-11-19T00:04:16.550685+00:00 | 1,414,691,766,000 | c25cb90a031a117457dce6108a3a6e9002457502 | 3 | {
"blob_id": "c25cb90a031a117457dce6108a3a6e9002457502",
"branch_name": "refs/heads/master",
"committer_date": 1414691766000,
"content_id": "2b38dd4dc584b645a6c5f812ba22ef5958f30672",
"detected_licenses": [
"MIT"
],
"directory_id": "652333f188be79da54cd64c8ca7c8b068d53d065",
"extension": "py",
"fi... | 2.9375 | stackv2 | from flask import Flask
from flask import request
import os, sys
app = Flask(__name__)
@app.route("/")
def hello():
return "Hello World!"
@app.route('/upload', methods=['GET', 'POST'])
def upload_file():
if request.method == 'POST':
f = request.files['file']
f.save('./uploads/'+f.filename)
... | 50 | 18.8 | 46 | 13 | 319 | python | [{"finding_id": "codeql_py/flask-debug_4f8c13cf349508ea_522e8099", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
17,
14
] | [
null,
null
] | [
5,
16
] | [
40,
39
] | |
2024-11-19T00:04:43.034480+00:00 | 1,566,087,099,000 | 45b498f8c7b2e3206d5f7ba551571703f2a77f77 | 3 | {
"blob_id": "45b498f8c7b2e3206d5f7ba551571703f2a77f77",
"branch_name": "refs/heads/master",
"committer_date": 1566087099000,
"content_id": "7854376b282ed9fa58b06f531825211872418eda",
"detected_licenses": [
"MIT"
],
"directory_id": "06b33c8d3d252d0d34ad6242d8fc682f2f961384",
"extension": "py",
"fi... | 3.234375 | stackv2 | #!/bin/env python
import argparse
def convert(MACaddress):
if MACaddress.rfind(':') > 0:
lconvert = lambda mac: '.'.join(MACaddress.replace(':', '')[i:i+4] for i in range(0, 12, 4))
return lconvert(MACaddress)
elif MACaddress.rfind('-') > 0:
lconvert = lambda mac: '.'.join(MACaddress.re... | 28 | 32.79 | 100 | 16 | 261 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_43e8e1c7f6ed2c07_fb12d45a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
23
] | [
null
] | [
15
] | [
36
] | |
2024-11-19T00:40:24.134043+00:00 | 1,676,139,610,000 | 74b4331aeb30a02a7f4027549b91112a79360ce8 | 2 | {
"blob_id": "74b4331aeb30a02a7f4027549b91112a79360ce8",
"branch_name": "refs/heads/master",
"committer_date": 1676139610000,
"content_id": "4f7ad847b7db83204441f83b4c01bc19dae85fcd",
"detected_licenses": [
"MIT"
],
"directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!/usr/bin/python
import sys, time, datetime, os, pwd
# Get Arguments
numArgs = len(sys.argv)
# First argument Number to Call
try:
sys.argv[1]
asteriskParams = {'numbertocall':sys.argv[1],
'context': 'itp-redial',
'extension':'s',
'variables':'',
'touchtime':''}
except:
print 'USAGE: gencallfile.rb [phone-nu... | 59 | 30.64 | 117 | 14 | 595 | python | [{"finding_id": "codeql_py/overly-permissive-file_699fc7041a7a2728_0a1191fb", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
48
] | [
null
] | [
null
] | [
29
] | |
2024-11-19T01:06:07.567771+00:00 | 1,693,585,381,000 | b4116bb2ab07cd68bdf3402f1311bdfcade70f2e | 2 | {
"blob_id": "b4116bb2ab07cd68bdf3402f1311bdfcade70f2e",
"branch_name": "refs/heads/main",
"committer_date": 1693585381000,
"content_id": "03fc7c198bbf141b52c9211b723667d15f70bf88",
"detected_licenses": [
"Apache-2.0",
"MIT"
],
"directory_id": "d51f530078404a24f1844b53b037bbfed238a784",
"extensi... | 2.359375 | stackv2 | import jinja2
import yaml
import os
env = jinja2.Environment(
loader=jinja2.FileSystemLoader(os.path.dirname(__file__))
)
with open('../metadata/sdks.yaml', 'r') as file:
metadata = yaml.safe_load(file)
for language in metadata.keys():
metadata[language]
shortname = metadata[language]['pro... | 18 | 24.22 | 70 | 12 | 102 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4e56bc695513d68c_c78f22ef", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
5
] | [
7
] | [
7
] | [
2
] | |
2024-11-19T01:06:11.790979+00:00 | 1,538,398,537,000 | 502d9cc607e6a7cfbce3906d8b73d5d66c41ead7 | 2 | {
"blob_id": "502d9cc607e6a7cfbce3906d8b73d5d66c41ead7",
"branch_name": "refs/heads/master",
"committer_date": 1538398537000,
"content_id": "ca31669ac61750e9af9ca673e8f48c0aa59774c7",
"detected_licenses": [
"MIT"
],
"directory_id": "6680fe21b9e9534fa1df9d9651af7075fcb817e0",
"extension": "py",
"fi... | 2.4375 | stackv2 | from flask import Flask, request, jsonify
from wtforms import Form, StringField, PasswordField, validators
import requests
import json
app = Flask(__name__)
@app.route("/auth", methods=['POST'])
def auth_server():
form = ServerForm(request.form)
address = form.address.data
password = form.password.data
... | 34 | 32.88 | 114 | 16 | 257 | python | [{"finding_id": "codeql_py/full-ssrf_06146a12aee99bb2_2fa7af43", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/full-ssrf",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"The full URL of this request depends on a [user-provided value](1)."
] | [
26,
33
] | [
null,
null
] | [
11,
11
] | [
110,
115
] | |
2024-11-19T01:17:29.934350+00:00 | 1,460,304,720,000 | c6eec8c5c793f89f6caeb741e9627b4dbc04a8e4 | 2 | {
"blob_id": "c6eec8c5c793f89f6caeb741e9627b4dbc04a8e4",
"branch_name": "refs/heads/master",
"committer_date": 1460406878000,
"content_id": "602529458b8434c1279fe217ab7cf8c14c67facd",
"detected_licenses": [
"MIT",
"BSD-2-Clause"
],
"directory_id": "05db5efb0d3d83cde6ce0c93622a78ffc4796ae1",
"ext... | 2.34375 | stackv2 | import time
from hashlib import md5
import requests
from django.conf import settings
from rest_framework.permissions import IsAuthenticated
from rest_framework.response import Response
from rest_framework.status import HTTP_400_BAD_REQUEST
from rest_framework.views import APIView
from rest_framework_extensions.cache.d... | 279 | 35.23 | 104 | 20 | 2,068 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d1149a56d0354410_c7e9b503", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 2 | true | [
"CWE-327",
"CWE-918"
] | [
"py/weak-sensitive-data-hashing",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.",
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)."
] | [
30,
36
] | [
null,
null
] | [
25,
16
] | [
85,
83
] | |
2024-11-19T01:17:34.665405+00:00 | 1,568,673,687,000 | 89b50a04643113350e1cb40dee354d4effb6f179 | 4 | {
"blob_id": "89b50a04643113350e1cb40dee354d4effb6f179",
"branch_name": "refs/heads/master",
"committer_date": 1568673687000,
"content_id": "8a09d26bdbed53294a73720ac870eb626f057a14",
"detected_licenses": [
"MIT"
],
"directory_id": "3188184f4ef36a28003b104f7a15246e06501c69",
"extension": "py",
"fi... | 3.75 | stackv2 |
if __name__ == '__main__':
birthdays = {
'Courtney Young': 'June 26',
'Sarah Lamb': 'November 23',
'Ilsa Shaikh': 'March 18',
'Kevin Morton': 'June 17' }
print('This is my tiny library of my friends\' birthdays! The birthdays we have on record are:')
for name in birthdays:
print (name)
print('Who\'... | 19 | 27.21 | 97 | 13 | 158 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b93065326c341b22_be4c8e4f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
12,
17
] | [
null,
null
] | [
10,
9
] | [
14,
63
] | |
2024-11-19T01:18:10.897251+00:00 | 1,613,078,874,000 | 0ddbe3b5163a43217b0ac798a23385031ae136a2 | 2 | {
"blob_id": "0ddbe3b5163a43217b0ac798a23385031ae136a2",
"branch_name": "refs/heads/main",
"committer_date": 1613078874000,
"content_id": "d1e96d1876bfd98eb33fde1f66fff1168d27d744",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "745e0199f4b22e20dd45cc0de08d356baf00ea4c",
"extension": "py",
... | 2.359375 | stackv2 | import requests
import sys
import json
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
fhir_server_uri = sys.argv[1]
token = sys.argv[2]
json_file_path = sys.argv[3]
headers = {'Authorization' : "Bearer " + token, 'Accept' : 'application/json', 'Content-Type' : 'application/jso... | 19 | 26.05 | 115 | 9 | 127 | python | [{"finding_id": "codeql_py/request-without-cert-validation_1732ca3ae668e397_9f823440", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
18
] | [
null
] | [
5
] | [
94
] | |
2024-11-19T01:14:58.738380+00:00 | 1,542,686,116,000 | 05569d5e1d9775d86d6e8d2aba9e84b1b1a64691 | 3 | {
"blob_id": "05569d5e1d9775d86d6e8d2aba9e84b1b1a64691",
"branch_name": "refs/heads/master",
"committer_date": 1542686116000,
"content_id": "2c870a074be594d96e2e0e7c53960b0160bcd371",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "87a8de6f43fa9a8f7cab5e25f4d24f08c6112c56",
"extension": "py"... | 2.59375 | stackv2 | from flask import Blueprint, session, render_template
from jinja2 import Template
from myapp.models import db, Person
blue = Blueprint("day02",__name__)
@blue.route('/set')
def set_session():
session['name'] = 'tom'
return "OK"
@blue.route('/get')
def get_session():
res = session.get('name','游客')
ret... | 85 | 20.59 | 95 | 15 | 525 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e5471ed54ee215f4_355234bb", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25
] | [
null
] | [
16
] | [
34
] | |
2024-11-19T01:15:11.368981+00:00 | 1,601,287,586,000 | 1a2ab956160ee4a035647807070090568fc93e16 | 2 | {
"blob_id": "1a2ab956160ee4a035647807070090568fc93e16",
"branch_name": "refs/heads/master",
"committer_date": 1601287586000,
"content_id": "1f4cbc1f56a02b76bd2d83fafb0bb9bbce71683f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b1dc778b8d764b80ebcfdd1c3ce4d4143bd75933",
"extension": "py"... | 2.4375 | stackv2 | """
Script for serving.
"""
import json
import pickle
import numpy as np
import pandas as pd
from bedrock_client.bedrock.metrics.service import ModelMonitoringService
from flask import Flask, Response, current_app, request
model = pickle.load(open("/artefact/model.pkl", "rb"))
feature_cols = pickle.load(open("/artefa... | 84 | 23 | 85 | 13 | 448 | python | [{"finding_id": "codeql_py/code-injection_c1d0923b9dfbfb9e_1cf0f094", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-094"
] | [
"py/code-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1)."
] | [
22
] | [
null
] | [
23
] | [
49
] | |
2024-11-19T00:43:48.828501+00:00 | 1,512,156,771,000 | 438d108ca11b48ab7f1de3e6c151093945027d26 | 2 | {
"blob_id": "438d108ca11b48ab7f1de3e6c151093945027d26",
"branch_name": "refs/heads/master",
"committer_date": 1512156771000,
"content_id": "03086ce7946f9281ea8bd006d96bd74907ec5fab",
"detected_licenses": [
"MIT"
],
"directory_id": "08f3010b8300559771494d367f008233ca6ccaa8",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/local/bin/python3
# Written By Peter Yang
# Copyright 2017
import subprocess
import os
import sys
import time
import requests
import base64
import xml.dom.minidom
from subprocess import Popen
#below define the global variables for the program
total_software_count=100#total number of software
base_directory=... | 178 | 36.54 | 140 | 18 | 1,516 | python | [{"finding_id": "codeql_py/request-without-cert-validation_d24e5174670a8e04_1f186148", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
160
] | [
null
] | [
7
] | [
97
] | |
2024-11-19T00:43:51.386168+00:00 | 1,452,121,831,000 | 1c9c120d78ed487a24e982239653320150720ac5 | 3 | {
"blob_id": "1c9c120d78ed487a24e982239653320150720ac5",
"branch_name": "refs/heads/master",
"committer_date": 1452121831000,
"content_id": "a031c4d3a55d1ce5e32c6fbf15d5ecf5524f1519",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cc9ac37edbfc2651c3f1bd04a95845ced98abeec",
"extension": "py"... | 2.71875 | stackv2 | #!/usr/bin/env python
"""
Prune the crosswikis dictionary file to only include those above a certain
probability.
"""
import re
import sys
import os
import datetime
import codecs
import argparse
import requests
import urllib2
import pymongo
import BeautifulSoup
sys.path.insert(1, os.path.join(sys.path[0], '..'))
fr... | 146 | 31.84 | 103 | 22 | 920 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_741851fbfe467426_19dbb5e6", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'wikipedia.org', so it might match m... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'wikipedia.org', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'wikipedia.org', so it might match more hosts than expected."
] | [
29,
30
] | [
null,
null
] | [
35,
34
] | [
53,
52
] | |
2024-11-19T00:43:53.055093+00:00 | 1,411,330,956,000 | 2b3321551db10d730b12db74564e130215d4467d | 3 | {
"blob_id": "2b3321551db10d730b12db74564e130215d4467d",
"branch_name": "refs/heads/master",
"committer_date": 1411330956000,
"content_id": "abb068c4c6b44753c75ff8416bb51721a6d3ccfd",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "3bca0d7aa49bfddba274c85ad2b12245196a0a8d",
"extension": "p... | 2.890625 | stackv2 | import random
from datetime import datetime
from flask import Flask, jsonify
from flask.ext.cache import Cache
app = Flask(__name__)
app.config.from_pyfile('hello.cfg')
cache = Cache(app)
#: This is an example of a cached view
@app.route('/api/now')
@cache.cached(50)
def current_time():
return str(datetime.now... | 50 | 20.98 | 55 | 12 | 311 | python | [{"finding_id": "codeql_py/reflective-xss_7677d0d7a9fbc584_ab7d5441", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2)."
] | [
38
] | [
null
] | [
12
] | [
27
] | |
2024-11-19T01:43:40.876276+00:00 | 1,632,408,872,000 | 059f1742396ef35f71756fc368ae36d1dcfe90b5 | 3 | {
"blob_id": "059f1742396ef35f71756fc368ae36d1dcfe90b5",
"branch_name": "refs/heads/main",
"committer_date": 1632408872000,
"content_id": "e25d0a1bad0a48fbe76cf4863a9d92c590ba14d7",
"detected_licenses": [
"MIT"
],
"directory_id": "5d4806038cc7d4704a8fc384fd2b0987ef36559a",
"extension": "py",
"file... | 2.84375 | stackv2 | """
This is a Python example on how to create a custom data enrichment component using Python and Flask.
For more information, see the Metamaze documentation or contact us at support@metamaze.eu.
"""
import logging
import os
import pickle
from functools import wraps
from typing import Any, Callable, Dict, List
impor... | 133 | 29.37 | 115 | 16 | 980 | python | [{"finding_id": "codeql_py/flask-debug_53b417117a8c17bb_c8727b96", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/flask-debug",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
133,
77,
104,
115
] | [
null,
null,
null,
null
] | [
5,
27,
19,
19
] | [
49,
54,
90,
62
] | |
2024-11-19T01:43:45.526731+00:00 | 1,679,517,508,000 | 5c7013251ec265555d827fafe56e6992c10d177c | 2 | {
"blob_id": "5c7013251ec265555d827fafe56e6992c10d177c",
"branch_name": "refs/heads/main",
"committer_date": 1679517508000,
"content_id": "e15b414ada40a1b0856c8b2efde694e9891730cc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "43a1b3afeef61509488915328eb9aceea098c039",
"extension": "py",
... | 2.390625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
# Copyright(c) 2021 The MITRE Corporation. All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
#
# You may obtain a copy of the License at:
# http://www.apache.org/lice... | 164 | 30.7 | 78 | 14 | 1,135 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_551f017ef521caf4_812c98a4", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (certificate)](1) is used in a hashing algorithm (MD5) that is in... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/insecure-default-protocol"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (certificate)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (certificate)](2) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (certificate)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (certificate)](2) is use... | [
55,
56,
46
] | [
null,
null,
null
] | [
33,
35,
21
] | [
45,
47,
42
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.