added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T02:07:25.563372+00:00 | 1,630,917,944,000 | 98d0f99178b2752857897263a71cdcc2a866fbab | 3 | {
"blob_id": "98d0f99178b2752857897263a71cdcc2a866fbab",
"branch_name": "refs/heads/master",
"committer_date": 1630917944000,
"content_id": "6d125a95ad3dd8a1f2644b27a22216d32faa3aed",
"detected_licenses": [
"MIT"
],
"directory_id": "de551a7b0a9ba15fbb7741e1eda14337a59e213e",
"extension": "py",
"fi... | 3.484375 | stackv2 | #!/usr/bin/env python3.8
import random
# import string
from user import User
from credentials import Logins #importing credential class.
#create a user account
def create_acc(username,password):
'''
This function creates a new user account.
'''
new_acc = User(username,password)
return new_acc
... | 151 | 28.66 | 139 | 19 | 831 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c836ef6d13e6ce59_ed737423", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
75,
127
] | [
null,
null
] | [
19,
31
] | [
74,
63
] | |
2024-11-19T02:31:16.212024+00:00 | 1,632,656,060,000 | 2b797699abcd03d0a9da8be9ce5d0700f7418a88 | 2 | {
"blob_id": "2b797699abcd03d0a9da8be9ce5d0700f7418a88",
"branch_name": "refs/heads/master",
"committer_date": 1632656060000,
"content_id": "fc02c0f4428e8e60b53dca9c3fe7713431e40ba8",
"detected_licenses": [
"MIT"
],
"directory_id": "88ec732d185d1323833ba1a5113edde32a86e28f",
"extension": "py",
"fi... | 2.484375 | stackv2 | import matplotlib.pyplot as plt
import pylab
from flask import *
from config import *
latex_runner = Blueprint('latex_runner', __name__)
# Using the Blueprint made with a path
@latex_runner.route(LATEX_ROUTE, methods=['GET'])
def renderTeX():
try:
text_input = request.args.get('text')
transpar... | 54 | 37.19 | 114 | 17 | 446 | python | [{"finding_id": "codeql_py/stack-trace-exposure_afabb6b6d825c937_505a1d58", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
24,
51,
54
] | [
null,
null,
null
] | [
25,
20,
16
] | [
31,
21,
17
] | |
2024-11-19T02:31:16.355189+00:00 | 1,622,756,649,000 | e635b30ed927758fa0def3f3ceb3014c3a957961 | 3 | {
"blob_id": "e635b30ed927758fa0def3f3ceb3014c3a957961",
"branch_name": "refs/heads/main",
"committer_date": 1622756649000,
"content_id": "eaa0c601e1b04a32c437801bd859f87f0e0cfa52",
"detected_licenses": [
"MIT"
],
"directory_id": "a01672a9cec61976ef6084148b3e807e0c0da8ba",
"extension": "py",
"file... | 2.75 | stackv2 | import requests
import json
import time
token = json.load(open("settings.json", "r"))["TOKEN"]
url = 'https://api.telegram.org/bot{}/'.format(token)
def get_updates_json(request, update_id=None):
params = {'allowed_updates': 'message', 'offset': str(update_id)}
if update_id != None:
response = reque... | 148 | 28.89 | 87 | 18 | 1,161 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a9a25672410b4d39_a2fd0d84", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
84
] | [
null
] | [
11
] | [
39
] | |
2024-11-19T02:31:23.248688+00:00 | 1,593,467,822,000 | 9876b057d3a5843466c9405bc1e7a749004e1adb | 3 | {
"blob_id": "9876b057d3a5843466c9405bc1e7a749004e1adb",
"branch_name": "refs/heads/master",
"committer_date": 1593467822000,
"content_id": "507135c6bf78260620e5793b9133424e61109e39",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "36189d02fb5e5e8f6f0539c5e604935df08521f6",
"extension": "py"... | 2.609375 | stackv2 | # Copyright 2020 Martin Olejar
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing... | 73 | 27.27 | 74 | 16 | 521 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e2d0ef543ba11dd9_92e73164", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
69
] | [
null
] | [
19
] | [
37
] | |
2024-11-19T02:31:46.907466+00:00 | 1,546,092,068,000 | 9ba8dce8aa37bd3bf0c6d9790a95b78bd717a815 | 3 | {
"blob_id": "9ba8dce8aa37bd3bf0c6d9790a95b78bd717a815",
"branch_name": "refs/heads/master",
"committer_date": 1546092068000,
"content_id": "85d6e0a8435b326dce5310739248e3175b3c2eb4",
"detected_licenses": [
"MIT"
],
"directory_id": "00376df2d1e080a2159d217efdcc2a9900ac8ccb",
"extension": "py",
"fi... | 3.1875 | stackv2 | #!/usr/bin/env python3
import socket
import sys
import queue
import ssl
import select
"""
Module for sending and receiving IRC messages.
This module is suited for easy understandable (primitive) understand bots.
Currently it implements a single class:
IRC
WARNING: This module does NOT implement the full IRC specif... | 254 | 22.8 | 74 | 19 | 1,570 | python | [{"finding_id": "codeql_py/insecure-default-protocol_a574cfa6e2e2ad14_e0d0208c", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
92
] | [
null
] | [
12
] | [
33
] | |
2024-11-19T02:32:07.340950+00:00 | 1,631,625,061,000 | 204831ff34efa67f7a2d09b4b65e232672fb133c | 2 | {
"blob_id": "204831ff34efa67f7a2d09b4b65e232672fb133c",
"branch_name": "refs/heads/master",
"committer_date": 1631625061000,
"content_id": "bb3c2a6597d44a83a9730364bb6a2cdd788bb66e",
"detected_licenses": [
"MIT"
],
"directory_id": "d5de0a387936d9a08b8fe2c780bc6b29f3707704",
"extension": "py",
"fi... | 2.484375 | stackv2 | import os
import time
import uuid
from datetime import datetime
from glob import glob
from flask import Blueprint, jsonify
from flask import Response
from flask import request
from config import config
from database import Database
from escherconverter import EscherConverter
from models import ConvertRequest, OutputF... | 298 | 33.67 | 103 | 21 | 2,406 | python | [{"finding_id": "codeql_py/path-injection_45f6f972110153bc_0b2f034a", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "remed... | 6 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).\nThis pa... | [
144,
146,
150,
194,
240,
278
] | [
null,
null,
null,
195,
241,
null
] | [
23,
17,
17,
23,
28,
21
] | [
88,
58,
26,
36,
41,
75
] | |
2024-11-19T02:32:21.061059+00:00 | 1,527,779,333,000 | 095af637d516db86264b0ba70b3c87f9d194c3f1 | 3 | {
"blob_id": "095af637d516db86264b0ba70b3c87f9d194c3f1",
"branch_name": "refs/heads/master",
"committer_date": 1527779333000,
"content_id": "a35a5cb2e61b265503d9112d65bece429f15da6c",
"detected_licenses": [
"MIT"
],
"directory_id": "f9e97f9bd4385049f1a1d338cd821d94d195cbe3",
"extension": "py",
"fi... | 2.59375 | stackv2 | import os
import sys
import logging
import tarfile
import shutil
import requests
import re
DATA_DIR = os.path.join(os.path.dirname(os.path.abspath(__file__)), 'data')
LOGGER = logging.getLogger(__name__)
class Downloader(object):
def __init__(self, pkg, url=None, download_dir=DATA_DIR):
self._error = None
... | 61 | 35.03 | 90 | 21 | 476 | python | [{"finding_id": "codeql_py/tarslip_d3a115c774d7cc86_36cf483f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
57
] | [
null
] | [
33
] | [
40
] | |
2024-11-19T02:32:40.673440+00:00 | 1,542,117,842,000 | ac3327b3d44f892c6d96b8fe4dd8b2885c13856e | 2 | {
"blob_id": "ac3327b3d44f892c6d96b8fe4dd8b2885c13856e",
"branch_name": "refs/heads/master",
"committer_date": 1542117842000,
"content_id": "a9a7f5cb445a958cd9b63c60247caacf570947cf",
"detected_licenses": [
"MIT"
],
"directory_id": "37f48977d361343002e7d1f5d503926183992f6a",
"extension": "py",
"fi... | 2.46875 | stackv2 | """
Created on 02-10-2011
@author: Kuba Radliński
"""
import sys
import glob
from os.path import splitext, split
from psg.brainlab.analyze import read_analyze_file
from psg.brainlab.signal import read_signal_file
from psg.brainlab.utils import make_brainlab_filenames, decode_time
def surroud_text(txt, surrounder='"'... | 53 | 54.57 | 133 | 18 | 706 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_00f2df617af9683d_52b09ef1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
41,
41
] | [
null,
null
] | [
23,
57
] | [
55,
80
] | |
2024-11-19T02:32:53.967980+00:00 | 1,601,471,063,000 | 309834a6ced1d59eee9dd1bcc2d65b1eba779918 | 3 | {
"blob_id": "309834a6ced1d59eee9dd1bcc2d65b1eba779918",
"branch_name": "refs/heads/master",
"committer_date": 1601471063000,
"content_id": "bf9934773c0b50ad509f4b774d388ae2c23bbfb1",
"detected_licenses": [
"MIT"
],
"directory_id": "4c7aac2ff796cd50ef8b6b37adcc2cc44d31d579",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/python3
import argparse
import requests
import hashlib
import apikey
import re
def doitbydomain(connection_details,dominio):
''' function that give you the auth_info passing domain_name '''
xml = '''
<?xml version='1.0' encoding='UTF-8' standalone='no' ?>
<!DOCTYPE OPS_envelope SYSTEM 'ops.... | 115 | 31.72 | 136 | 16 | 909 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_915277cbcc2b7b2d_fde4830d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-327",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive dat... | [
55,
109,
115,
37,
41
] | [
null,
null,
null,
null,
null
] | [
15,
39,
27,
20,
20
] | [
21,
48,
36,
73,
79
] | |
2024-11-19T02:33:12.026942+00:00 | 1,597,555,641,000 | b2b45d684e4833b109e55ef0b93352f4acab7bdd | 3 | {
"blob_id": "b2b45d684e4833b109e55ef0b93352f4acab7bdd",
"branch_name": "refs/heads/master",
"committer_date": 1597555641000,
"content_id": "01614e787870ce74c76932003bcee96ac4803ebe",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4d0186ea9ab60378d091921df22b54dec446c0b0",
"extension": "py"... | 2.953125 | stackv2 | #encoding: utf-8
import pandas as pd
import pymongo
from pyecharts import options as opts
from pyecharts.charts import Geo,Page
from pyecharts.globals import ChartType
client = pymongo.MongoClient() # 链接pymongo数据库
collection = client['51Job']['Scrapy']
print("数据表名称:",collection.name)
data = collection.find()
df = pd.... | 100 | 28.59 | 113 | 19 | 848 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1167b0e16e2662e5_f8a85b93", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
62
] | [
null
] | [
7
] | [
22
] | |
2024-11-19T02:43:34.845808+00:00 | 1,545,120,511,000 | 68f3a2a4266e7cded7001f8dba6c9519f2749397 | 3 | {
"blob_id": "68f3a2a4266e7cded7001f8dba6c9519f2749397",
"branch_name": "refs/heads/master",
"committer_date": 1545120511000,
"content_id": "8f34feca7d097a5de0821bbbb0f479551902bc1a",
"detected_licenses": [
"MIT"
],
"directory_id": "9289d956330dc45217266f37e1ccee73e2d0ef44",
"extension": "py",
"fi... | 3.4375 | stackv2 | # solution to Advent of Code 2015, day 4 part one and two
# https://adventofcode.com/2015/day/4
#
# assumes puzzle input is in a file called input.txt
import hashlib
def main():
with open('input.txt') as inputfile:
secret_key = inputfile.readline().strip()
# solve part one
(number, md5hash) = min... | 31 | 24.39 | 68 | 16 | 235 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_9daca3f727ee1ae7_16aebbc3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
24
] | [
null
] | [
31
] | [
56
] | |
2024-11-19T02:43:34.992670+00:00 | 1,553,530,042,000 | 37dcc72100e263af00b1686ab6c07b5353c14f70 | 3 | {
"blob_id": "37dcc72100e263af00b1686ab6c07b5353c14f70",
"branch_name": "refs/heads/master",
"committer_date": 1553530042000,
"content_id": "903b9a6d0e4a9254bf6f70bf5f4c3a1b34f6475d",
"detected_licenses": [
"MIT"
],
"directory_id": "3a54d0bffcc1b0796f6ba863cea3537f60f3ace2",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/env python
"""Copies model output files from ILAMBv1 to ILAMBv2."""
import os
import shutil
src_dir = '/home/csdms/ILAMB/MODELS/original'
dst_dir = '/home/csdms/ilamb/MODELS'
for root, dirs, files in os.walk(src_dir):
if len(files) == 0:
model_name = os.path.basename(root)
new_model_... | 21 | 26.71 | 58 | 15 | 160 | python | [{"finding_id": "codeql_py/overly-permissive-file_dd3a1605e4118a78_0dae09ef", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
17
] | [
null
] | [
9
] | [
38
] | |
2024-11-19T02:43:41.588634+00:00 | 1,633,556,839,000 | 3bb9b2c28a8a6c93d19806b806e39132bcabdc09 | 3 | {
"blob_id": "3bb9b2c28a8a6c93d19806b806e39132bcabdc09",
"branch_name": "refs/heads/master",
"committer_date": 1633556839000,
"content_id": "61754cdfb75dc8b1783aa3ea32b2e6ecd8cc602d",
"detected_licenses": [
"MIT"
],
"directory_id": "839a08f946710e2192f91f1e406accdb12822cd6",
"extension": "py",
"fi... | 2.75 | stackv2 | """
ZeBet odds scraper
"""
from collections import defaultdict
import datetime
import re
import urllib
import urllib.error
import urllib.request
from bs4 import BeautifulSoup
import sportsbetting as sb
from sportsbetting.database_functions import is_player_in_db, add_player_to_db, is_player_added_in_db
def parse_ze... | 181 | 44.62 | 124 | 23 | 1,966 | python | [{"finding_id": "codeql_py/overly-large-range_d607fcbf51b5fe04_9c61fe68", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[... | [
107,
107,
107,
107
] | [
null,
null,
null,
null
] | [
22,
30,
40,
48
] | [
25,
33,
43,
51
] | |
2024-11-19T02:55:08.807954+00:00 | 1,532,352,746,000 | f282ea16060f50115e3bc017b32e1b1a501082c4 | 3 | {
"blob_id": "f282ea16060f50115e3bc017b32e1b1a501082c4",
"branch_name": "refs/heads/master",
"committer_date": 1532352746000,
"content_id": "0d78f70fdb6183fcfaf07840606e88540497e4e2",
"detected_licenses": [
"MIT"
],
"directory_id": "275f3a3dce44f35a5dc1a626e2052c006bdb71bf",
"extension": "py",
"fi... | 3.015625 | stackv2 | import sys
sys.setrecursionlimit(10000)
def passwordCracker(passwd, attempt):
# Complete this function
if attempt == '':
return True, []
new_attempt = attempt
for p in passwd:
if p in new_attempt:
p_index = new_attempt.index(p)
partition_1 = new_attempt[0:p_... | 33 | 31.18 | 78 | 17 | 250 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7032ca79d7c319d1_4cdd1db1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw... | [
31
] | [
null
] | [
19
] | [
40
] | |
2024-11-19T02:55:08.965746+00:00 | 1,475,701,655,000 | 8a4198915f5dcf2c44b3e2784285d4b6c7531cd0 | 3 | {
"blob_id": "8a4198915f5dcf2c44b3e2784285d4b6c7531cd0",
"branch_name": "refs/heads/master",
"committer_date": 1475701655000,
"content_id": "9765f64f3e007e07bf919f866d9b524d7ba33038",
"detected_licenses": [
"MIT"
],
"directory_id": "9b3db1ffd660040dd8fd3f8391cacf217c38e23d",
"extension": "py",
"fi... | 2.515625 | stackv2 | #!/usr/bin/env python
import os
from jinja2 import Environment, FileSystemLoader
# To customise the settings, copy the file "default_settings.py"
# and save it as "settings.py". See comments in default_settings.py
# for explanations.
if os.path.exists("settings.py"):
import settings
else:
import default_set... | 36 | 29.83 | 67 | 11 | 243 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_dfbf627165bc7556_c57a8dd3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
29
] | [
null
] | [
16
] | [
65
] | |
2024-11-19T02:55:21.489646+00:00 | 1,676,139,610,000 | 4cb5cdd843f2919a5863cb79c05bd1f32848866f | 3 | {
"blob_id": "4cb5cdd843f2919a5863cb79c05bd1f32848866f",
"branch_name": "refs/heads/master",
"committer_date": 1676139610000,
"content_id": "9f9340bccf42bc5969dd7b6a0865336632b08a6b",
"detected_licenses": [
"MIT"
],
"directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9",
"extension": "py",
"fi... | 2.5625 | stackv2 | #!/bin/python
import json, sys, requests, string, random
auth_endpoints = {
"US": "https://identity.api.rackspacecloud.com/v2.0",
"UK": "https://lon.identity.api.rackspacecloud.com/v2.0"
}
username = "XXXX"
apikey = "XXXX"
def auth(region, username, password='', apikey=''):
headers = {
"Content-... | 53 | 27.75 | 98 | 16 | 411 | python | [{"finding_id": "codeql_py/request-without-cert-validation_dbbcfd94d02cfcba_d87ecd40", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
30,
43
] | [
null,
null
] | [
9,
9
] | [
67,
57
] | |
2024-11-19T02:55:27.817091+00:00 | 1,523,631,560,000 | 703183494cd79f1dbb2aed66e3c21d9406e90483 | 3 | {
"blob_id": "703183494cd79f1dbb2aed66e3c21d9406e90483",
"branch_name": "refs/heads/master",
"committer_date": 1523631560000,
"content_id": "6b577baa09d114bed98496ce5f86a91e3ce3b407",
"detected_licenses": [
"MIT"
],
"directory_id": "0793d27e160ff37d8e4f135ac55694b2b7d0e5b8",
"extension": "py",
"fi... | 3.046875 | stackv2 | ## Import de las librerias necesarias para acceder a la api y funcionalidades
import requests
from random import randint
## Parámetros para configuración
api_key = '394c6244e849b9274ef6325cec54f959'
api_base = 'http://food2fork.com/api/'
seach_uri = '{}search?key={}&q={}'
## Funciones de ayuda
def get_recipe(recipe_... | 52 | 37.58 | 104 | 16 | 488 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_14f22c545c254590_a4ae517e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
45,
46,
49
] | [
null,
null,
null
] | [
19,
19,
23
] | [
75,
59,
50
] | |
2024-11-19T02:55:38.285676+00:00 | 1,583,598,088,000 | eaded038942382a5f7fda6a7232bd35da1dd8e29 | 2 | {
"blob_id": "eaded038942382a5f7fda6a7232bd35da1dd8e29",
"branch_name": "refs/heads/master",
"committer_date": 1583598088000,
"content_id": "974877f2a814e973b10598b37c332261194793f4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "dc5546eb41d36e10edc3d85319714aa5b3a9a70d",
"extension": "py"... | 2.328125 | stackv2 | import json
import traceback
from aiohttp import web
from aiohttp.web_routedef import RouteDef
import tibiapy
from tibiapy.utils import try_enum
routes = web.RouteTableDef()
@routes.get('/')
async def home(request):
content = "<h1>Routes</hº><ul>"
for route in routes: # type: RouteDef
if route.pat... | 156 | 32.5 | 103 | 16 | 1,182 | python | [{"finding_id": "codeql_py/stack-trace-exposure_936e221009de6eef_ee7d87fe", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.\n[Stack trace information](3) flows to this location and may be exposed to an external user."
] | [
119
] | [
123
] | [
14
] | [
27
] | |
2024-11-19T02:55:50.457832+00:00 | 1,511,169,244,000 | de661ca8d1f85d3297e2e4873973446fa1953441 | 2 | {
"blob_id": "de661ca8d1f85d3297e2e4873973446fa1953441",
"branch_name": "refs/heads/master",
"committer_date": 1511169244000,
"content_id": "a7ea96f196dec9e66487674f19bd102dee428280",
"detected_licenses": [
"MIT"
],
"directory_id": "bca37991d10aa042bfd1c21e2f4bb7855761808e",
"extension": "py",
"fi... | 2.375 | stackv2 | """Initializes and runs localhost:8051 server for searching materials"""
# coding=utf-8
# /cygdrive/c/python27/python.exe
__author__ = 'eager55'
import os
from gevent.pywsgi import WSGIServer
from gevent.queue import Queue
from flask import Flask, request, Response
from cgi import escape
from json import dump, dumps... | 336 | 34.02 | 119 | 28 | 2,532 | python | [{"finding_id": "codeql_py/path-injection_e9b631a191c3f1f1_d8c2bb72", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
113
] | [
null
] | [
15
] | [
22
] | |
2024-11-19T03:10:33.793114+00:00 | 1,612,801,535,000 | 329462819af737fe9c5b6d92818b7a261b3d9b37 | 3 | {
"blob_id": "329462819af737fe9c5b6d92818b7a261b3d9b37",
"branch_name": "refs/heads/main",
"committer_date": 1612801535000,
"content_id": "91026741404ae29d5ad35fdd0aa0cd40297e1f40",
"detected_licenses": [
"MIT"
],
"directory_id": "65fec42dba512fa3922f092c693caa80d42b5c95",
"extension": "py",
"file... | 2.546875 | stackv2 | from blogproject import app,db
from flask import Flask, render_template, request, redirect, url_for, flash, abort
from flask_login import login_user, login_required, logout_user
from blogproject.models import User, Blogpost
from blogproject.forms import LoginForm, RegistrationForm
from datetime import datetime
@app.ro... | 93 | 27.3 | 111 | 16 | 556 | python | [{"finding_id": "codeql_py/url-redirection_a863903ffb37bdc9_c868b0b1", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
41
] | [
null
] | [
29
] | [
33
] | |
2024-11-19T03:10:36.459906+00:00 | 1,516,238,430,000 | 241826ef555d719fbcfa58b32bfe624bdd283940 | 3 | {
"blob_id": "241826ef555d719fbcfa58b32bfe624bdd283940",
"branch_name": "refs/heads/master",
"committer_date": 1516238430000,
"content_id": "3b495f401470232075d4ef8a42e79e4ce0b6ee07",
"detected_licenses": [
"MIT"
],
"directory_id": "fd4d788d9976471e61ac12e9d7518cc901f0c6c0",
"extension": "py",
"fi... | 2.578125 | stackv2 | from functools import wraps
import os
from flask import Flask
from flask import request
import jwt
SERVICE_ID = 'calc'
ISSUER = 'issuer'
app = Flask(SERVICE_ID)
app.debug = True
KEY = None
def get_key_file():
global KEY
if KEY is None:
with open(os.getenv('KEY', '/key.pub'), 'rb') as f:
... | 96 | 22.39 | 70 | 15 | 569 | python | [{"finding_id": "codeql_py/log-injection_4ace8e9bbc638a9f_d6289ebf", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 5 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
77,
77,
90,
91,
91
] | [
null,
null,
null,
null,
null
] | [
60,
66,
21,
54,
60
] | [
64,
70,
33,
58,
64
] | |
2024-11-19T03:22:06.702823+00:00 | 1,674,135,460,000 | 0853c856ffe522431bff9e9817643da1379a8e71 | 3 | {
"blob_id": "0853c856ffe522431bff9e9817643da1379a8e71",
"branch_name": "refs/heads/master",
"committer_date": 1674135460000,
"content_id": "4ecf1070dabeb5c710cb67759ad6d6cc10a720f0",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "704bff0cb5c5c500dda60b3ebe2882f455f710ae",
"extension": "p... | 2.671875 | stackv2 | # Author: Harold Clark
# Copyright Harold Clark 2019
#
import sys
import os
import psycopg2
import hashlib
class database(object):
"""database class object for a postgres database"""
def __init__(self, user='postgres',
host='127.0.0.1',
port='5432',
database='... | 121 | 36.01 | 80 | 15 | 773 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_0a171c18be6aafed_af81168c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
102,
108
] | [
null,
null
] | [
32,
39
] | [
46,
53
] | |
2024-11-19T03:22:12.674196+00:00 | 1,502,042,434,000 | 770767226d197fec02c4f4700a32fa44bd013457 | 3 | {
"blob_id": "770767226d197fec02c4f4700a32fa44bd013457",
"branch_name": "refs/heads/master",
"committer_date": 1502042434000,
"content_id": "efd9d12d8d384a7021cb7d2a2aa3b3aee0ed5e94",
"detected_licenses": [
"MIT"
],
"directory_id": "864f0a886235f0f56765ded16506821fc5e0ecf3",
"extension": "py",
"fi... | 2.65625 | stackv2 | import os
from flask import Flask, request, redirect, url_for
from werkzeug.utils import secure_filename
import requests
# AI Imports
from keras.preprocessing import image
from tqdm import tqdm
from keras.models import load_model
import numpy as np
# Loading Tensors
def path_to_tensor(img_path):
img = image.load... | 83 | 28.18 | 104 | 16 | 580 | python | [{"finding_id": "codeql_py/partial-ssrf_9a17c52699932ace_18470b1f", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
81
] | [
null
] | [
14
] | [
105
] | |
2024-11-19T03:22:19.211593+00:00 | 1,591,840,943,000 | f73d08c117f1f27f4edacf556b3ba0b19414ee19 | 3 | {
"blob_id": "f73d08c117f1f27f4edacf556b3ba0b19414ee19",
"branch_name": "refs/heads/master",
"committer_date": 1591840943000,
"content_id": "2f3e544d1ab35b2b446bacad74f5e3870f730bdf",
"detected_licenses": [
"MIT-0"
],
"directory_id": "2a4a08a1770b157753bd0a1fb7ca90969d5710aa",
"extension": "py",
"... | 2.578125 | stackv2 | # Copyright 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
# SPDX-License-Identifier: MIT-0
import os
import sys
import json
from jinja2 import Template
Lambda_dict = {}
Environment = ""
def read_sm_def (
sm_def_file: str
) -> dict:
"""
Reads state machine definition from a file and return... | 167 | 31.93 | 103 | 24 | 1,009 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_dbbe035a5cfccb54_5c689648", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
51
] | [
null
] | [
10
] | [
35
] | |
2024-11-19T03:44:02.603401+00:00 | 1,649,080,391,000 | a1981a1a4d5d3166f61cbb9aa698d249405a5d95 | 3 | {
"blob_id": "a1981a1a4d5d3166f61cbb9aa698d249405a5d95",
"branch_name": "refs/heads/master",
"committer_date": 1649080391000,
"content_id": "0aed9b5880150ca049c2ead023dfdaf89c114c52",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "71200fe39fe9415c8498b1e99b05fb704c78c5af",
"extension": "p... | 2.765625 | stackv2 | # -*- coding: utf-8 -*-
# Originally written by Kevin Breen (@KevTheHermit):
# https://github.com/kevthehermit/RATDecoders/blob/master/ClientMesh.py
# Standard Imports Go Here
from base64 import b64decode
from zipfile import ZipFile
from io import StringIO
from Crypto.Cipher import AES, DES3
# Helper Functions Go He... | 187 | 30.45 | 93 | 18 | 1,521 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_86a4b4c9c6e63164_93648d13", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES3](1) is broken or weak, and should not be used.", "... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The cryptographic algorithm DES3](1) is broken or weak, and should not be used."
] | [
89
] | [
null
] | [
12
] | [
32
] | |
2024-11-19T03:44:07.162854+00:00 | 1,432,179,359,000 | f7002dd341aa268c1c68cde61223489b3c7202f4 | 3 | {
"blob_id": "f7002dd341aa268c1c68cde61223489b3c7202f4",
"branch_name": "refs/heads/master",
"committer_date": 1432179359000,
"content_id": "f945c12c199db090fe8d08848931a977d6af87d7",
"detected_licenses": [
"MIT"
],
"directory_id": "c787417c053e2dca65f5e3749eec907c44420f96",
"extension": "py",
"fi... | 2.609375 | stackv2 | import argparse
from functools import reduce
import gzip
import json
import requests
import logging
from flask import Flask, g, jsonify, request
import geoip2.database
import geoip2.errors
DB_FILE_LOCATION = 'data/GeoLite2-City.mmdb'
DB_FILE_URL = 'http://geolite.maxmind.com/download/geoip/database/GeoLite2-City.mmd... | 104 | 33.42 | 121 | 18 | 828 | python | [{"finding_id": "codeql_py/log-injection_cf893050c7005484_1c5f63fb", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)."
] | [
78
] | [
null
] | [
25
] | [
63
] | |
2024-11-19T03:44:18.295148+00:00 | 1,689,158,004,000 | e48f6ed86dda7df835ae90e28608d9b3a521957c | 3 | {
"blob_id": "e48f6ed86dda7df835ae90e28608d9b3a521957c",
"branch_name": "refs/heads/master",
"committer_date": 1689158004000,
"content_id": "06b5df150537a20823a0992ffb0d47d3e6822323",
"detected_licenses": [
"MIT"
],
"directory_id": "096c2a37900ec0b5237be1af1b784934356c8a5c",
"extension": "py",
"fi... | 2.640625 | stackv2 | # -*- coding: utf-8 -*-
from io import StringIO
from pdfminer import pslexer
from pdfminer.pdfparser import PDFParser, PDFDocument
from pdfminer.pdfinterp import PDFResourceManager, PDFTextExtractionNotAllowed, PDFPageInterpreter
from pdfminer.converter import TextConverter
from pdfminer.layout import LAParams, LTText... | 128 | 30.81 | 139 | 21 | 1,210 | python | [{"finding_id": "codeql_py/request-without-cert-validation_91cb8bb1c1588d28_b47b04de", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
125
] | [
null
] | [
16
] | [
64
] | |
2024-11-19T03:44:24.148930+00:00 | 1,580,543,562,000 | c5469763d26c6dadaad05a27f07ffdc65243f3e8 | 3 | {
"blob_id": "c5469763d26c6dadaad05a27f07ffdc65243f3e8",
"branch_name": "refs/heads/master",
"committer_date": 1580543562000,
"content_id": "1580fe1404253d6533886b28b6083f8b89f35d78",
"detected_licenses": [
"MIT"
],
"directory_id": "a375229c54ca7ed069d1c1dba2cc10a084cb1439",
"extension": "py",
"fi... | 2.984375 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
# Parsing prices from 15-58m11.ru website and writing them to CSV
# Written by Snownoise
# Snownoise@gmail.com
# 1.0
# 2017-06-25
from bs4 import BeautifulSoup
from bs4 import element
import requests
import csv
import re
import m11_bot_config
def parce_tables(tables)... | 92 | 28.2 | 97 | 18 | 702 | python | [{"finding_id": "codeql_py/request-without-cert-validation_0a6460ec2f0a8bb7_76180f5e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
72
] | [
null
] | [
8
] | [
65
] | |
2024-11-19T03:44:28.164143+00:00 | 1,690,506,920,000 | c542b9fc0d0ba5b4a8a327dcca4e151c5ee1324f | 3 | {
"blob_id": "c542b9fc0d0ba5b4a8a327dcca4e151c5ee1324f",
"branch_name": "refs/heads/main",
"committer_date": 1690506920000,
"content_id": "c5a6d98fa3f1c6390b5936485d2a0334afdd613e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8245320cd0ccd28d9e8670a80e848ef4a61c8f69",
"extension": "py",
... | 2.5625 | stackv2 | # Copyright 2022 Cerebras Systems.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in wri... | 184 | 32.59 | 102 | 24 | 1,269 | python | [{"finding_id": "codeql_py/tarslip_f46f7c5412e91374_7523b4bb", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
146
] | [
null
] | [
21
] | [
24
] | |
2024-11-19T01:44:05.393313+00:00 | 1,595,547,766,000 | 0262605b1d62e126ac68772b78f65c73186b9dd7 | 2 | {
"blob_id": "0262605b1d62e126ac68772b78f65c73186b9dd7",
"branch_name": "refs/heads/master",
"committer_date": 1595547766000,
"content_id": "f24688598e0ae11cf8ee43e6954360fbb3560637",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "401464c4eab87b77c04aee2dd9ed43f2a203d5b7",
"extension": "py"... | 2.453125 | stackv2 | from cyclone.web import *
from hashlib import md5
class DigestAuthMixin(object):
def apply_checksum(self, data):
return md5(data).hexdigest()
def apply_digest(self, secret, data):
return self.apply_checksum(secret + ":" + data)
def A1(self, algorithm, auth_pass):
"""
If '... | 157 | 40.13 | 178 | 20 | 1,309 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_75134bd68be34d15_2d232e36", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (password)](3) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensiv... | [
6
] | [
null
] | [
20
] | [
24
] | |
2024-11-19T01:44:10.658961+00:00 | 1,599,053,689,000 | 8cd96bbfb0a344ae8c4beb187aa585c487a5c63b | 3 | {
"blob_id": "8cd96bbfb0a344ae8c4beb187aa585c487a5c63b",
"branch_name": "refs/heads/master",
"committer_date": 1599053689000,
"content_id": "46629b63857537deedc85ec4a11cd8284816e2a0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5fe72bb13baf3649058ebe11aa86ad4fc56c69ed",
"extension": "py"... | 2.546875 | stackv2 | import os
import sys
import io
import tarfile
import urllib.request
ARCHIVE_URL = 'http://d.pr/f/YqS5+'
def main():
print('Downloading ensurepip module archive...')
response = urllib.request.urlopen(ARCHIVE_URL)
data = response.read()
tar_f = tarfile.open(fileobj=io.BytesIO(data))
package_root ... | 32 | 20.22 | 70 | 12 | 165 | python | [{"finding_id": "codeql_py/tarslip_248ede39cba58403_040fa564", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
23
] | [
null
] | [
9
] | [
14
] | |
2024-11-19T02:21:25.406263+00:00 | 1,465,534,213,000 | c8f903c544259e3356ec70e1b2245e468ef78c02 | 2 | {
"blob_id": "c8f903c544259e3356ec70e1b2245e468ef78c02",
"branch_name": "refs/heads/master",
"committer_date": 1465534213000,
"content_id": "340e6ce3965498643a8786ad218ea3ae6093e1be",
"detected_licenses": [
"MIT"
],
"directory_id": "c145839b030fbd87718b16bf6949b2b5bb160ff1",
"extension": "py",
"fi... | 2.390625 | stackv2 | import re
import sys
import time
import glob
import json
import os
import socket
import ssl
import style
import fnmatch
import traceback
from threading import Thread
from queue import Queue
class DissBot():
config_file = 'config.json'
debug = False
socket = None
connected = False
iqueue = Qu... | 478 | 23.65 | 101 | 25 | 2,366 | python | [{"finding_id": "codeql_py/insecure-default-protocol_ae2c7001b291f745_d3857988", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
181
] | [
null
] | [
23
] | [
41
] | |
2024-11-19T02:21:29.701608+00:00 | 1,668,691,826,000 | ee76ec59d81d8594bb120653ce95a42ff4f98e11 | 2 | {
"blob_id": "ee76ec59d81d8594bb120653ce95a42ff4f98e11",
"branch_name": "refs/heads/master",
"committer_date": 1668691826000,
"content_id": "0a018659ded8ce967fbdb15b023c90903d49eafd",
"detected_licenses": [
"MIT",
"BSD-3-Clause"
],
"directory_id": "04e38597b547424b0d0b0db163372f8a68cc6f92",
"ext... | 2.46875 | stackv2 | # -*- coding: utf-8 -*-
import requests, json, codecs
import logging
logger = logging.getLogger('feedler')
from .models import Entry
from feedler import feedparser
API_BASEURL = 'https://cloud.feedly.com/v3/'
API_STREAMS = API_BASEURL + 'streams/contents?streamId='
API_TOKENS = API_BASEURL + 'auth/token'
def refre... | 79 | 33.65 | 80 | 14 | 589 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4ef974fb4930666c_d139dd6f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
39
] | [
null
] | [
22
] | [
30
] | |
2024-11-19T02:21:32.954855+00:00 | 1,443,681,158,000 | 797f3c51be564ff171a3ac712436c0a9b82a2ed9 | 3 | {
"blob_id": "797f3c51be564ff171a3ac712436c0a9b82a2ed9",
"branch_name": "refs/heads/master",
"committer_date": 1443681158000,
"content_id": "133aef9557ab3c4d6c61c7828648e31538fd1512",
"detected_licenses": [
"MIT"
],
"directory_id": "d977c97b3441a6993d9f5d335ad95b997150180b",
"extension": "py",
"fi... | 3.125 | stackv2 | class Dog:
def name(self):
return "Fido"
def _tail(self):
# Prefixing a method with an underscore implies private scope
return "wagging"
def __password(self):
return 'password' # Genius!
def test_attributes_with_double_underscore_prefixes_are_su... | 17 | 28.29 | 83 | 9 | 104 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f72913bbde342353_0bc16c19", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
15
] | [
null
] | [
8
] | [
24
] | |
2024-11-19T02:57:58.813106+00:00 | 1,620,323,934,000 | c9020a5156949836592a9a3c855a720ee75f1f15 | 3 | {
"blob_id": "c9020a5156949836592a9a3c855a720ee75f1f15",
"branch_name": "refs/heads/main",
"committer_date": 1620323934000,
"content_id": "4a3c5ecf8c0776f97c6845e22c2b2f2ffe0fe50e",
"detected_licenses": [
"MIT"
],
"directory_id": "9480f0b3b0e684081b14679ade371a30751acb4e",
"extension": "py",
"file... | 3.015625 | stackv2 | import json
import requests
import telegram_send
import datetime
import time
# Get Data From COWIN Public API
def get_data_from_cowin(pincode):
url = "https://cdn-api.co-vin.in/api/v2/appointment/sessions/public/calendarByPin?pincode=" + \
str(pincode)+"&date="+datetime.date.today().strftime("%d-%m-%Y")
... | 84 | 34.36 | 119 | 16 | 689 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e3bfbbe965f30ff6_8d4242c1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
57
] | [
null
] | [
11
] | [
18
] | |
2024-11-19T02:58:14.191220+00:00 | 1,553,498,840,000 | 32d7a6facb77901110d83faa763d2899ef2f7124 | 2 | {
"blob_id": "32d7a6facb77901110d83faa763d2899ef2f7124",
"branch_name": "refs/heads/master",
"committer_date": 1553498840000,
"content_id": "9b796181676a3933aa568e79ec749b1a8900c02c",
"detected_licenses": [
"MIT"
],
"directory_id": "c74681dcb6ad58deaefab30a4c6461a710853d34",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/python3
""" Tests the view used by dietician looking at a course """
from jinja2 import Environment, FileSystemLoader
EDIT_CSS = """\
input.calc {
width:130px;
visibility:hidden;
}
button.ifedit {
visibility:hidden;
}
"""
input_ = dict(
SCRIPT_NAME="... | 48 | 16.9 | 60 | 8 | 230 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0c2c6fc3c1ec5e32_fdf1048f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
40
] | [
null
] | [
7
] | [
38
] | |
2024-11-19T03:10:03.914135+00:00 | 1,627,225,268,000 | ae0f08dea52cf2c4453843a2c0ebb18691345229 | 3 | {
"blob_id": "ae0f08dea52cf2c4453843a2c0ebb18691345229",
"branch_name": "refs/heads/main",
"committer_date": 1627225268000,
"content_id": "2f48be7dd678c3e12b9a4d5d5f5433e5473a5e80",
"detected_licenses": [
"MIT"
],
"directory_id": "52679c832c4a0436da11095fcea7b064b557df83",
"extension": "py",
"file... | 2.59375 | stackv2 | import requests
from bs4 import BeautifulSoup
import sys
import argparse
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
from timeit import default_timer as timer
def getCSRF(url, csrfname, session):
html = session.get(url, verify=False).text
soup = BeautifulSoup(html, features="lx... | 128 | 38.23 | 123 | 21 | 1,431 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fde63a441fb8e511_fa96e75b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-295",
"CWE-295"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.",
"This expression logs [sensitive data (p... | [
45,
63,
68,
10,
27
] | [
null,
null,
null,
null,
null
] | [
9,
9,
9,
9,
15
] | [
43,
34,
52,
39,
74
] | |
2024-11-19T03:22:41.984151+00:00 | 1,481,946,861,000 | 3d47e3ff5e6985dc79bae06ac4f3c3a8f4dc5169 | 3 | {
"blob_id": "3d47e3ff5e6985dc79bae06ac4f3c3a8f4dc5169",
"branch_name": "refs/heads/master",
"committer_date": 1481946861000,
"content_id": "b3f026488be3c4f9b2484d3a82cf698f1721878e",
"detected_licenses": [
"MIT"
],
"directory_id": "0701f3722c0b45789286d92f3ea3a0e5d97d7381",
"extension": "py",
"fi... | 2.5625 | stackv2 | import os
from mainsite.models import Dashboard, Query, Database
from rest_framework.views import APIView
from rest_framework.response import Response
from rest_framework import status
from sqlalchemy import create_engine
class RunQueryViewSet(APIView):
"""
Queries your database
"""
def post(self, re... | 179 | 41.77 | 117 | 18 | 1,429 | python | [{"finding_id": "codeql_py/sql-injection_02081136ef073d23_a418bf98", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
38
] | [
null
] | [
37
] | [
66
] | |
2024-11-19T03:22:44.511064+00:00 | 1,479,358,227,000 | af63eeeb322869681ad6e92cbb1d240af4339a59 | 3 | {
"blob_id": "af63eeeb322869681ad6e92cbb1d240af4339a59",
"branch_name": "refs/heads/master",
"committer_date": 1479358227000,
"content_id": "0f203e1beed2c203b5a774d3e3f4776bf4b17beb",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6a7a581805a1aa901fd7fb821503652361b088d5",
"extension": "py"... | 2.53125 | stackv2 | #!/usr/bin/env python
#
# Copyright 2009 Facebook
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or a... | 61 | 29.46 | 81 | 12 | 427 | python | [{"finding_id": "codeql_py/reflective-xss_a25ddfc9a65e7986_49d50835", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
35
] | [
null
] | [
20
] | [
43
] | |
2024-11-19T03:22:55.771619+00:00 | 1,572,343,157,000 | 815623e3b648cafba38cd17dfdf9aeb3b38599c2 | 3 | {
"blob_id": "815623e3b648cafba38cd17dfdf9aeb3b38599c2",
"branch_name": "refs/heads/master",
"committer_date": 1572343157000,
"content_id": "6eb723b5f884f9347638cd565f73b84fd3944c04",
"detected_licenses": [
"MIT"
],
"directory_id": "64479625ec00febc71746f30ce19c7220a04b00a",
"extension": "py",
"fi... | 2.515625 | stackv2 | import datetime
from .aes256 import aes256
import json
def encrypt():
dailyHashes = [
"0LC4K6oXKU",
"LoKlo1HcQj",
"mgrQdeZA15",
"zAy6DYwet7",
"8XJ6X2F0R8",
"tWieS9EoXL",
"kJZ2067Euo"
]
weekDay = datetime.datetime.today().weekday()
compatibleWeekDay = weekDay + 1
if weekDay == 6:
... | 28 | 19.68 | 106 | 14 | 217 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_817acafe9161b95b_7feeb04a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
22
] | [
null
] | [
25
] | [
35
] | |
2024-11-19T03:22:58.124051+00:00 | 1,548,911,342,000 | beffc43c11871a733f7efa00a6cd242b152fa10f | 2 | {
"blob_id": "beffc43c11871a733f7efa00a6cd242b152fa10f",
"branch_name": "refs/heads/master",
"committer_date": 1548911342000,
"content_id": "ad14c49a23bbac270e8ab65d400da62272139e1b",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "5316d4882af3822c3474a7d1b1bbef66b71a99b8",
"extension": "p... | 2.453125 | stackv2 | from flask import Flask, render_template, request, redirect, url_for, flash
from calcount import *
from form import *
import os
from werkzeug.utils import secure_filename
app = Flask(__name__)
DEBUG = True
app.config['SESSION_TYPE'] = 'filesystem'
app.secret_key = "secret"
UPLOAD_FOLDER = '/static/images/'
ALLOWED_EXT... | 63 | 31.73 | 122 | 17 | 465 | python | [{"finding_id": "codeql_py/url-redirection_aa3f8252f88a4530_89760851", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
49,
53
] | [
null,
null
] | [
29,
29
] | [
40,
40
] | |
2024-11-19T03:23:00.626415+00:00 | 1,570,731,765,000 | e8f25e2779fa858cc4d2ba7a78b11182fa10d680 | 2 | {
"blob_id": "e8f25e2779fa858cc4d2ba7a78b11182fa10d680",
"branch_name": "refs/heads/master",
"committer_date": 1570731765000,
"content_id": "3032dede09eec9e41549b5bcd996822b4c0b5424",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8b448b3253aebd19cfe9cd73c5c1289b4663d038",
"extension": "py"... | 2.484375 | stackv2 | import sys
import getopt
import os
import traceback
import apilityio
import apilityio.errors
def main(argv=None):
if argv is None:
argv = sys.argv
try:
try:
api_key = None
domain = None
options, remainder = getopt.getopt(
argv[1:], 'h:a:d', ... | 84 | 34.1 | 86 | 19 | 685 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e891d15213c9eb3e_8cf23dfc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
41
] | [
null
] | [
19
] | [
48
] | |
2024-11-19T03:23:09.896787+00:00 | 1,626,197,113,000 | b58617e0e6c5057a09b5fd8604af6fba4912f819 | 3 | {
"blob_id": "b58617e0e6c5057a09b5fd8604af6fba4912f819",
"branch_name": "refs/heads/main",
"committer_date": 1626197113000,
"content_id": "60ec22e6218db4b3c965d10ba25eec418df6c695",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "00073097c89bca2854baf45573be239e2bca0125",
"extension": "py",
... | 2.890625 | stackv2 | from bs4 import BeautifulSoup
from pathlib import Path
import requests
def get_imgur_gallery_images(url):
response = requests.get(url)
soup = BeautifulSoup(response.text, 'lxml')
img_ids = [
i['id'] for i in
soup.select('.post-image-container')
]
return [
f'https://i.imgur.... | 33 | 23.85 | 56 | 15 | 207 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b2b18b3d236945a4_f0f311a6", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [imgur.com](1) may be at an arbitrary position in the s... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [imgur.com](1) may be at an arbitrary position in the sanitized URL."
] | [
23
] | [
null
] | [
10
] | [
28
] | |
2024-11-19T01:34:49.419152+00:00 | 1,605,780,906,000 | a7497d26357a54d6b016df83b9f100098b846e04 | 3 | {
"blob_id": "a7497d26357a54d6b016df83b9f100098b846e04",
"branch_name": "refs/heads/master",
"committer_date": 1605780906000,
"content_id": "2d4b48720d2f3c6ca34ed05d7dd50e464957df77",
"detected_licenses": [
"MIT"
],
"directory_id": "1f5bee8fe49bcb9aab6afcaa83c0f2ee9c72b107",
"extension": "py",
"fi... | 3.015625 | stackv2 | import streamlit as st
import nltk
#import en_core_web_sm
nltk.download('punkt')
#NLP
import spacy
#nlp = spacy.load('en')
nlp = spacy.load('en_core_web_sm')
from spacy import displacy
HTML_WRAPPER = """<div style="overflow-x: auto; border:1px solid #e6e9ef; border-radius: 0.95rem; padding:1 rem">{}</div>"""
# Summary... | 101 | 33.88 | 124 | 17 | 863 | python | [{"finding_id": "codeql_py/full-ssrf_9ac529fc1fb3984a_4834be8b", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](1)."
] | [
40
] | [
null
] | [
12
] | [
28
] | |
2024-11-19T01:34:52.771814+00:00 | 1,580,040,942,000 | 6161117990a2678efba15ae55c47b202019e50f9 | 2 | {
"blob_id": "6161117990a2678efba15ae55c47b202019e50f9",
"branch_name": "refs/heads/master",
"committer_date": 1580040942000,
"content_id": "31735df7186d0c762d96cd2283fe90e7a2d45753",
"detected_licenses": [
"MIT"
],
"directory_id": "7711f40d40d72fb97ead5ebd2e59ee2725e98773",
"extension": "py",
"fi... | 2.40625 | stackv2 | import socket
from flask import Flask, request, send_from_directory, redirect, render_template, flash, url_for, jsonify, \
make_response, abort
from googletrans import Translator
# from .eng_to_kamayo_word_translator_predict import EngToKamayoTranslator
# from .kamayo_to_eng_word_translator_predict import KamayoTo... | 120 | 35.74 | 132 | 15 | 1,045 | python | [{"finding_id": "codeql_py/url-redirection_fa7194da37521d91_812582ee", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
45,
48
] | [
null,
null
] | [
22,
22
] | [
33,
33
] | |
2024-11-19T01:34:56.553883+00:00 | 1,568,986,264,000 | deee8a6c2ecf2dcb49405c7e8d82252bb1de1c13 | 3 | {
"blob_id": "deee8a6c2ecf2dcb49405c7e8d82252bb1de1c13",
"branch_name": "refs/heads/master",
"committer_date": 1568986264000,
"content_id": "a4229a71aba60e38787a35d8a9ebe1e2bdbca10b",
"detected_licenses": [
"MIT"
],
"directory_id": "b3c3bddf785298ad8fe74aebe78553ccb686b7a0",
"extension": "py",
"fi... | 2.53125 | stackv2 | import os
from flask import Flask, request, render_template, url_for, redirect
app = Flask(__name__)
@app.route("/")
def fileFrontPage():
return render_template('upload.html')
@app.route("/actionUpload", methods=['POST'])
def handleFileUpload():
if 'photo' in request.files:
photo = request.files['pho... | 19 | 27 | 68 | 15 | 116 | python | [{"finding_id": "codeql_py/path-injection_0fac2e5254b6b681_1f7e9974", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
15
] | [
null
] | [
24
] | [
68
] | |
2024-11-19T01:35:03.694195+00:00 | 1,676,139,610,000 | a6714bb11880fca5676a68c8b9e3698cf066d12c | 3 | {
"blob_id": "a6714bb11880fca5676a68c8b9e3698cf066d12c",
"branch_name": "refs/heads/master",
"committer_date": 1676139610000,
"content_id": "cf7d2f0526dc797ab59e57ebac3f9994818840cb",
"detected_licenses": [
"MIT"
],
"directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/env python
###
# Takes a username from environment variable PAM_USER, a password from STDIN
# and tries to verify the shadow's password using LDAP's SSHA algorithm:
#
# {SSHA}...base64encodedString...
#
# If used within PAM auth this provides a compatibility layer that allows
# to migrate LDAP user into ... | 77 | 37.43 | 124 | 19 | 666 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_5e98f131d8d51b0a_f2c8d5ab", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
43,
44
] | [
null,
null
] | [
23,
15
] | [
31,
19
] | |
2024-11-19T01:35:07.111882+00:00 | 1,469,188,783,000 | a08def0151d09a3d0ccef2bbf597569a5f1cc688 | 3 | {
"blob_id": "a08def0151d09a3d0ccef2bbf597569a5f1cc688",
"branch_name": "refs/heads/master",
"committer_date": 1469188783000,
"content_id": "bc80966f3ea191d9e701398f6beec60cbf5312ce",
"detected_licenses": [
"AFL-3.0"
],
"directory_id": "afd7e97e3e30df7eb7ae34e3accf44e225e7ad67",
"extension": "py",
... | 2.625 | stackv2 | #!/usr/bin/python
import string, sys
import numpy as np
import matplotlib.pyplot as plt
import pickle
import os
plt.ioff()
frequency=[]
spectrumrms=[]
spectrummean=[]
averagespectrum=[]
# If no arguments were given, print a helpful message
if len(sys.argv)!=6:
print 'Usage: fitband filein start_freq chbw polynomial... | 141 | 26.05 | 88 | 15 | 1,161 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_895be8fead1d1d57_b0478d76", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
130
] | [
null
] | [
15
] | [
42
] | |
2024-11-19T01:35:08.260258+00:00 | 1,580,851,423,000 | 627b8c3cd2e5b5d044ee740e51ec8e21999d42d3 | 3 | {
"blob_id": "627b8c3cd2e5b5d044ee740e51ec8e21999d42d3",
"branch_name": "refs/heads/master",
"committer_date": 1580851423000,
"content_id": "4ace2024c79a3cd9e7d039b9b52dc846a899c219",
"detected_licenses": [
"MIT"
],
"directory_id": "601f250e6b76ca366513ff64189778fa7d7bdc69",
"extension": "py",
"fi... | 2.984375 | stackv2 | """
ESP- Este codigo escanea todas las raspberry conectadas a la red y manda un archivo a cada una de ellas sobre SSH
ENG- Scan all IP connected in the local network and detect all the Raspberry Pi in order to create a SSH connection
"""
import paramiko
from scp import SCPClient
import os
import time
import subproces... | 45 | 40.38 | 134 | 12 | 526 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_b6a7262c9ed03c99_7c69d6fd", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
16
] | [
null
] | [
5
] | [
65
] | |
2024-11-19T01:55:44.370876+00:00 | 1,654,341,263,000 | 176281625889df19aaa018f89351becc0704bf87 | 2 | {
"blob_id": "176281625889df19aaa018f89351becc0704bf87",
"branch_name": "refs/heads/master",
"committer_date": 1654341263000,
"content_id": "51712827f78fb4561e00da511ac56555a47d32f7",
"detected_licenses": [
"MIT"
],
"directory_id": "9aac8221051d3f12d6b03a6f10ba77eb24b520d6",
"extension": "py",
"fi... | 2.4375 | stackv2 | import datetime
import time
import requests
import hashlib
from urllib.parse import urlencode
from .aes import AESTool
BASE_URL = "https://login.dangdang.com"
P_PERMANENT_ID = 'permanent_id'
P_T = 't'
P_CT = 'ct'
P_STATUS_CODE = 'statusCode'
P_REQUEST_ID = 'requestId'
P_RANKEY = 'rankey'
P_SIGN = 'sign'
UTF8 = 'UTF-8'... | 52 | 28.92 | 68 | 13 | 462 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_5b8e859e2902aa61_6b95be12", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (private)](1) is used in a hashing algorithm (MD5) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (private)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
44
] | [
null
] | [
16
] | [
34
] | |
2024-11-19T02:17:19.055356+00:00 | 1,530,106,240,000 | aa898c5646f039de12214d8cef1cea4753a014dc | 2 | {
"blob_id": "aa898c5646f039de12214d8cef1cea4753a014dc",
"branch_name": "refs/heads/master",
"committer_date": 1530106240000,
"content_id": "ecfff2ee6e5ce8ade569a9dc934a8dae86f7b55e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c5fc8f7f33534bd905f99e69632dca43741f59cd",
"extension": "py"... | 2.453125 | stackv2 | #
# based on https://stackoverflow.com/questions/11262518/how-to-pass-uploaded-image-to-template-html-in-flask
# - simple form to upload images
# - redirect to uploaded_file to show image
#
#
import os
from subprocess import call
from flask import Flask, render_template, request, send_from_directory, redirect, url_for... | 98 | 28.61 | 138 | 13 | 715 | python | [{"finding_id": "codeql_py/command-line-injection_ea62512a5d2f369b_14378ecf", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 4 | true | [
"CWE-078",
"CWE-078",
"CWE-215",
"CWE-022"
] | [
"py/command-line-injection",
"py/command-line-injection",
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This command line depends on a [user-provided value](1).",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
74,
80,
98,
60
] | [
null,
null,
null,
null
] | [
13,
13,
5,
15
] | [
138,
131,
42,
16
] | |
2024-11-19T02:17:41.750276+00:00 | 1,581,048,481,000 | ab9bc3fa0e600c8f6bd4424e32365a63f6173510 | 3 | {
"blob_id": "ab9bc3fa0e600c8f6bd4424e32365a63f6173510",
"branch_name": "refs/heads/master",
"committer_date": 1581048481000,
"content_id": "9aac55377bcb75e14c4e01900b4d7c87982686cc",
"detected_licenses": [
"MIT"
],
"directory_id": "a7a9dcd01329961aa829ec186159ceed0cff6626",
"extension": "py",
"fi... | 2.703125 | stackv2 | # -*- coding: utf-8 -*-
# 모델 구현을 위한 유틸리티 함수들
import tensorflow as tf
import numpy as np
import scipy.misc as misc
import os, sys
from six.moves import urllib
import tarfile
import zipfile
import scipy.io
# VGGNet 파라미터가 저장된 mat 파일을 다운로드 받고 불러옵니다.
def get_model_data(dir_path, model_url):
maybe_download_and_extract(di... | 109 | 30.78 | 107 | 18 | 1,060 | python | [{"finding_id": "codeql_py/tarslip_1e7a47365c0fd458_1cf3c7f3", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
40
] | [
null
] | [
7
] | [
37
] | |
2024-11-19T02:18:10.563145+00:00 | 1,563,875,900,000 | e80785c080fde513236f44f46ee836c99220be0a | 2 | {
"blob_id": "e80785c080fde513236f44f46ee836c99220be0a",
"branch_name": "refs/heads/master",
"committer_date": 1563875900000,
"content_id": "3010846a288744a2824a4e74338ca539ef79b204",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2c67282cb792d358d181b25196937daec6c1417c",
"extension": "py"... | 2.40625 | stackv2 | #! /usr/bin/env python
"""
Copyright [1999-2019] EMBL-European Bioinformatics Institute
Licensed under the Apache License, Version 2.0 (the "License")
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless requir... | 136 | 30.58 | 147 | 16 | 1,201 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d70f59825430fc29_98e04686", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
58
] | [
null
] | [
6
] | [
29
] | |
2024-11-19T02:18:30.960787+00:00 | 1,538,762,814,000 | 10629f95863ba7636aa3ee163f5aaf4b403755f5 | 3 | {
"blob_id": "10629f95863ba7636aa3ee163f5aaf4b403755f5",
"branch_name": "refs/heads/master",
"committer_date": 1538762814000,
"content_id": "a1b553f345bc1ab15a535cd832c463dcd0bb13c6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "69a873cbbb371978661628e3e8e4f567713bb57a",
"extension": "py"... | 2.5625 | stackv2 | from __future__ import print_function
import json
import os
import subprocess
import sys
from builtins import input
from collections import defaultdict
from ..plugins.core import initialize
from ..plugins.high_entropy_strings import HighEntropyStringsPlugin
from .baseline import merge_results
from .bidirectional_iter... | 346 | 28.82 | 89 | 20 | 2,231 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ddd2fd2524d71b70_ec9ea823", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
151
] | [
null
] | [
15
] | [
34
] | |
2024-11-19T02:29:52.402650+00:00 | 1,571,500,973,000 | 0c90cdc1771c292878c8da08452ac837c9b20b6b | 3 | {
"blob_id": "0c90cdc1771c292878c8da08452ac837c9b20b6b",
"branch_name": "refs/heads/master",
"committer_date": 1571500973000,
"content_id": "7136e945bd96a0322cf1a93cb1bd3ee146d63b10",
"detected_licenses": [
"MIT"
],
"directory_id": "629cd73cb20cbf5d34d6743a52d0d19f0fecc778",
"extension": "py",
"fi... | 2.65625 | stackv2 | # Date: 07/02/2018
# Author: Pure-L0G1C
# Description: DBMS
import bcrypt
import sqlite3
from . import const
from time import time
from os import urandom
from hashlib import sha256
from base64 import b64encode
from datetime import datetime
class Database(object):
def __init__(self):
self.db_path = const... | 234 | 33.16 | 109 | 16 | 1,671 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d5d5b6dc719ccf06_9dca137a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
203
] | [
null
] | [
30
] | [
48
] | |
2024-11-19T02:30:08.812819+00:00 | 1,658,555,314,000 | 5727442b2e908ab177296518b7f31a53b513193f | 3 | {
"blob_id": "5727442b2e908ab177296518b7f31a53b513193f",
"branch_name": "refs/heads/master",
"committer_date": 1658555314000,
"content_id": "701e818ad7846f64fc1acbc0011dc77c69402440",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "d9cb81209d452b7c3180cd2e2b3e1b00279b469c",
"extension": "py",
... | 2.59375 | stackv2 | #!/usr/bin/env python3
import re
import glob
# A quick-and-dirty script to check that for each URL, the script name matches
# the expected value, and that for each script, the corresponding database_url
# and CSV files are used.
SCRIPTS = glob.glob("proc_*.py")
def squeeze_hyphens(s):
return "_".join(filter(... | 66 | 24.65 | 78 | 16 | 429 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_042e4771159a32f6_f012e600", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.conference-board.org](1) may be at an arbitrary po... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [www.conference-board.org](1) may be at an arbitrary position in the sanitized URL."
] | [
40
] | [
null
] | [
22
] | [
56
] | |
2024-11-19T02:30:17.158483+00:00 | 1,693,557,656,000 | 29f6e3111f0961411d34e2307a307dc0a63f7083 | 3 | {
"blob_id": "29f6e3111f0961411d34e2307a307dc0a63f7083",
"branch_name": "refs/heads/master",
"committer_date": 1693557656000,
"content_id": "1b362d55efae070f6a38cea4e1e51df07f8f886b",
"detected_licenses": [
"MIT"
],
"directory_id": "4f63e427654cd2182970ecb0469cfc4a0e0dbb96",
"extension": "py",
"fi... | 2.84375 | stackv2 | """Templating abstraction around jinja2 for Planemo."""
try:
from jinja2 import Template
except ImportError:
Template = None # type: ignore
NO_JINJA2_MESSAGE = (
"This functionality requires Jinja2 but this library is " "unavailable. Install with `pip install jinja2`."
)
def render(template_str: str, **... | 18 | 29.17 | 111 | 9 | 130 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_27688c6772e19d7c_08e61d60", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
16
] | [
null
] | [
16
] | [
38
] | |
2024-11-19T02:30:26.603048+00:00 | 1,571,437,769,000 | 77377a7b7a752535cc85132b82db4d14cd569c55 | 3 | {
"blob_id": "77377a7b7a752535cc85132b82db4d14cd569c55",
"branch_name": "refs/heads/master",
"committer_date": 1571437769000,
"content_id": "8d6acd3fde5d05bf17c5a1f79dcb0fdf52934425",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "03561ce569a5ede138340bee411e053063c2e3a3",
"extension": "py"... | 2.609375 | stackv2 | import io
import select
from os.path import exists
from paramiko import client, RSAKey
from paramiko.channel import ChannelFile, ChannelStderrFile, Channel
# && -> is a cross-platform solution that will execute the next command, if the previous had no errors.
# you may change it...
# ; -> in linux will execute regard... | 135 | 37.33 | 150 | 20 | 1,128 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a089287292d3b5bc_5bfb2817", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
85
] | [
null
] | [
9
] | [
72
] | |
2024-11-19T02:30:37.785390+00:00 | 1,632,320,498,000 | 3b05e9bc6b596bc7961cbb86bdcf9842c3f3c6fb | 3 | {
"blob_id": "3b05e9bc6b596bc7961cbb86bdcf9842c3f3c6fb",
"branch_name": "refs/heads/main",
"committer_date": 1632320498000,
"content_id": "3ba96ed27566c8ca9edf53d7de0bf56c0f17bced",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6bae7ed2b753b91bb87920e336f847ff3f92060f",
"extension": "py",
... | 3.28125 | stackv2 | import Views
import Controllers
import Models
class TournamentView:
# ====== NEW TOURNAMENT ====== #
@classmethod
def new_tournament(cls, tournament, step):
"""
View corresponding to the addition of a new tournament in the database
"""
print("\nCREATION D'UN NOUVEAU TOURN... | 265 | 31.57 | 79 | 16 | 1,859 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b4f891785149f6c3_a7f001c0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
137,
138,
160,
161
] | [
null,
null,
null,
null
] | [
19,
19,
19,
19
] | [
60,
44,
60,
44
] | |
2024-11-19T02:41:42.706572+00:00 | 1,683,296,390,000 | b5582bb1f88a8424607146a859704ed9dbf4526f | 2 | {
"blob_id": "b5582bb1f88a8424607146a859704ed9dbf4526f",
"branch_name": "refs/heads/master",
"committer_date": 1683296390000,
"content_id": "6f4d987b5d63d7450d7fba0e9babb7e014507744",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c635fe2b4ba68ec73ccea3e06ed1a84e25153ae6",
"extension": "py"... | 2.34375 | stackv2 | from __future__ import absolute_import
import os
import bagit
import tarfile
import hdfs
import shutil
# import the Celery app context
from crawl.celery import app
from crawl.celery import cfg
# Set up drop/watched folder configuration
DLS_DROP=cfg.get('dls','drop_folder')
DLS_WATCH=cfg.get('dls','watch_folder')
# ... | 67 | 34.3 | 93 | 15 | 626 | python | [{"finding_id": "codeql_py/tarslip_b2f5e31c1fb8711c_b02b9eaf", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
50
] | [
null
] | [
9
] | [
12
] | |
2024-11-19T02:42:23.415433+00:00 | 1,390,353,062,000 | 8108d0914dda3fab0d0cb371dddf18eef4c7b557 | 3 | {
"blob_id": "8108d0914dda3fab0d0cb371dddf18eef4c7b557",
"branch_name": "refs/heads/master",
"committer_date": 1390353062000,
"content_id": "1148c1f1fd7a4bdcf2a63688636a77775a286d91",
"detected_licenses": [
"MIT"
],
"directory_id": "c5d838598ee22b8c6125bd46f3f6078f4e28376e",
"extension": "py",
"fi... | 2.6875 | stackv2 | import time
import hashlib
def authenticate_parameters(api_key, api_secret, parameters, expire=60):
params = {}
params.update(parameters)
params["expire"] = int(time.time()) + expire
params["api_key"] = api_key
sig_base_string = ""
for k in sorted(params.keys()):
sig_base_string += "%s=... | 17 | 28.53 | 72 | 11 | 129 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_de164e67863a6cb5_0119aef7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
15
] | [
null
] | [
16
] | [
47
] | |
2024-11-19T02:42:28.915383+00:00 | 1,534,921,701,000 | 352c667273edd9a1572568af8583fb46fbbaf46a | 3 | {
"blob_id": "352c667273edd9a1572568af8583fb46fbbaf46a",
"branch_name": "refs/heads/master",
"committer_date": 1534921701000,
"content_id": "3a85787138cc035f49ff98fbfe22ba8b8ef33648",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e042cdc2b30b3539a66aecede8ead2e63539ad2d",
"extension": "py"... | 3.015625 | stackv2 | from Crypto.Cipher import AES
KEY = b'fdsl;mewrjope456fds4fbvfnjwaugfo'
def encrypt(message):
message_length = len(message)
if message_length % 16 != 0:
message += '\0' * (16 - message_length % 16)
message = bytes(message, 'ascii')
aes = AES.new(KEY, AES.MODE_ECB)
ciphertext = aes.encrypt... | 19 | 25.68 | 56 | 12 | 143 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_63aab31fc1e6bb15_aaafeb09", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
12,
18
] | [
null,
null
] | [
18,
17
] | [
38,
37
] | |
2024-11-19T02:50:54.410070+00:00 | 1,582,523,631,000 | 1b2bc8e9672f1fdc6a4a3ac2396cbb45561ceadc | 3 | {
"blob_id": "1b2bc8e9672f1fdc6a4a3ac2396cbb45561ceadc",
"branch_name": "refs/heads/master",
"committer_date": 1582523631000,
"content_id": "7f5dd4fd7ac17925b4c0bfdedfc8c8dc2512cee6",
"detected_licenses": [
"MIT"
],
"directory_id": "24dbdfbb893ffec8bbab5f1f210a8a32c5fa821b",
"extension": "py",
"fi... | 2.703125 | stackv2 | """
@Author : dilless
@Time : 2018/6/25 22:46
@File : paper_download.py
"""
import os
import re
from datetime import datetime
import MySQLdb
from selenium import webdriver
from selenium.common.exceptions import NoSuchElementException
class MySQLAccess(object):
def __init__(self):
self.conn = MySQ... | 93 | 34.85 | 115 | 21 | 768 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_bc0d223438449000_cbb361c3", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'cnki.net', so it might match more h... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'cnki.net', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'cnki.com', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'cnki.com', so it might match more ho... | [
64,
67,
70,
73
] | [
null,
null,
null,
null
] | [
29,
29,
29,
29
] | [
48,
59,
52,
58
] | |
2024-11-18T18:05:48.115739+00:00 | 1,579,633,178,000 | 29adbe20a3905ff258a794448bf983d19873f0aa | 3 | {
"blob_id": "29adbe20a3905ff258a794448bf983d19873f0aa",
"branch_name": "refs/heads/master",
"committer_date": 1579633178000,
"content_id": "f60ea47d53f23c2f9ff0a0b2acce5080366fd573",
"detected_licenses": [
"MIT"
],
"directory_id": "de7a0a7c866a1841d33b95f28fa09704ffd394b6",
"extension": "py",
"fi... | 2.9375 | stackv2 | """Convert a HAR file to a JMeter test plan
Parse <filename>.har and write <filename>.jmx
"""
from argparse import ArgumentParser
import xmlformatter
from harpy.har import Har
from jinja2 import Environment, PackageLoader
from urlparse import urlparse
env = Environment(loader=PackageLoader('har2jmx', '.'))
def ma... | 88 | 26.06 | 68 | 11 | 522 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_40b6504b28873122_84e5fb94", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
null
] | [
7
] | [
56
] | |
2024-11-18T18:05:51.942073+00:00 | 1,692,054,708,000 | 1e5b5ed786c23f28d2013447d465357d5cf8389c | 3 | {
"blob_id": "1e5b5ed786c23f28d2013447d465357d5cf8389c",
"branch_name": "refs/heads/main",
"committer_date": 1692054708000,
"content_id": "8d53fe68d695227d3d46b8b75c652d2e962ea5b6",
"detected_licenses": [
"MIT"
],
"directory_id": "a3bb0a821c609ffa700e8da4fca3513cad33e670",
"extension": "py",
"file... | 2.53125 | stackv2 | import asyncio
import re
from datetime import datetime
from time import mktime
import aiohttp
import mwparserfromhell as mw
import pandas as pd
from lxml import html
from mwclient import Site
from requests.exceptions import ConnectionError
from .revision import Revision
def _get_users(metadata):
"""
Pull us... | 274 | 25.12 | 107 | 18 | 1,586 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_65878d0f985c8821_cc74a593", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'wikipedia.org', so it might match m... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'wikipedia.org', so it might match more hosts than expected."
] | [
271
] | [
null
] | [
24
] | [
47
] | |
2024-11-18T18:05:52.360518+00:00 | 1,675,086,392,000 | 3df9d577f1fa9ecd7c9b218a70e7853d72cd3a2d | 2 | {
"blob_id": "3df9d577f1fa9ecd7c9b218a70e7853d72cd3a2d",
"branch_name": "refs/heads/main",
"committer_date": 1675086392000,
"content_id": "c89e13e538a8da526d07969e858c1896370c87eb",
"detected_licenses": [
"MIT"
],
"directory_id": "19cbda3e5703d8fa8c2167002d67af1e5d0e8d09",
"extension": "py",
"file... | 2.4375 | stackv2 | import pathlib
import distutils.dir_util
import subprocess
import sys
import tempfile
import jinja2
import markdown
import nbconvert
import nbformat
import proselint
from invoke import task
import known
WEB_ROOT = "cfm"
TITLE = "Computing for mathematics"
DESCRIPTION = "An undergraduate course introducing programmin... | 175 | 27.85 | 99 | 17 | 1,133 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9a7fc273479d1eec_0a5fe73a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
56
] | [
null
] | [
20
] | [
61
] | |
2024-11-18T18:05:54.905818+00:00 | 1,550,519,837,000 | eae9b38d0866f9294ac74101908bf7b4301678a4 | 2 | {
"blob_id": "eae9b38d0866f9294ac74101908bf7b4301678a4",
"branch_name": "refs/heads/master",
"committer_date": 1550519837000,
"content_id": "da8ededae9fe22ccd44563b5b5eacdeac49af96f",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "9c7daf286de5ee4018c067d9fad33e741b2e2d32",
"extension": "p... | 2.5 | stackv2 | import os
import urllib.request
from glob import glob
from scipy.io import arff
import pandas as pd
import tarfile
DELGADO_DIR = 'Delgado_data/'
DELGADO_DATASET_DOWNLOAD_URL='https://persoal.citius.usc.es/manuel.fernandez.delgado/papers/jmlr/data.tar.gz'
class DownloadAndConvertDelgadoDatasets(object):
def... | 76 | 40.72 | 109 | 19 | 681 | python | [{"finding_id": "codeql_py/tarslip_5a81875cf47b8aca_62d5c9e0", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
29
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T18:06:04.571906+00:00 | 1,634,784,750,000 | c72cd297f9b55837d559b559677e40568f0ee2a6 | 2 | {
"blob_id": "c72cd297f9b55837d559b559677e40568f0ee2a6",
"branch_name": "refs/heads/master",
"committer_date": 1634784750000,
"content_id": "04dc6e77f53c6c143de5660d7f88dd898d57901b",
"detected_licenses": [
"MIT"
],
"directory_id": "a3843c8015dbb7438af6329f65f4a8ecbf3ac1fb",
"extension": "py",
"fi... | 2.375 | stackv2 | import json
import os
import subprocess
import urllib.request
import urllib.error
from queue import Queue
from bottle import route, run, Bottle, request, static_file
from threading import Thread
import mutagen
from mutagen.id3 import ID3, APIC
from mutagen.easyid3 import EasyID3
import yt_dlp
from yt_dlp.postprocessor.... | 162 | 28.73 | 118 | 21 | 1,219 | python | [{"finding_id": "codeql_py/reflective-xss_7bda9361d79b7d6a_127e1989", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
35
] | [
null
] | [
16
] | [
49
] | |
2024-11-18T18:16:05.296419+00:00 | 1,634,936,232,000 | bc96458075311588326843081e152c926f6f229f | 3 | {
"blob_id": "bc96458075311588326843081e152c926f6f229f",
"branch_name": "refs/heads/main",
"committer_date": 1634936232000,
"content_id": "806b6a2b44bc0228af08b3c242f6a2836e901b15",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e5b93f5c79be8eafc6740f22380be41ec163f9ac",
"extension": "py",
... | 3.140625 | stackv2 | '''
The following is a basic twitter scraper code using tweepy.
We preprocess the text - 1. Remove Emojis 2. Remove urls from the tweet.
We store the output tweets with tweet-id and tweet-text in each line tab seperated.
You will need to have an active Twitter account and provide your consumer key, secret and a callba... | 95 | 34.94 | 134 | 16 | 897 | python | [{"finding_id": "codeql_py/overly-large-range_46831e645a3bc865_01502c9b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class."
] | [
37,
37,
37
] | [
null,
null,
null
] | [
11,
14,
17
] | [
15,
18,
21
] | |
2024-11-18T18:16:05.664047+00:00 | 1,692,870,659,000 | d2fc11584b62a7d4e17d8b543377e03051f2764d | 2 | {
"blob_id": "d2fc11584b62a7d4e17d8b543377e03051f2764d",
"branch_name": "refs/heads/master",
"committer_date": 1692870659000,
"content_id": "fb24a93a9ec03a9738043eddf2a4c67a51ae84a0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fc5a4e7c181dc4371ee1ac3b5b077901ca91f889",
"extension": "py"... | 2.4375 | stackv2 | #!/usr/bin/env python
"""
_UserFileCache_
API for UserFileCache service
"""
from builtins import str, bytes
import os
import json
import shutil
import hashlib
import tarfile
import tempfile
from Utils.Utilities import encodeUnicodeToBytesConditional
from Utils.PythonVersion import PY3
from WMCore.Services.Service ... | 160 | 35.23 | 113 | 18 | 1,285 | python | [{"finding_id": "codeql_py/tarslip_6da76af7775d3f8d_48f6f197", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](2)."
] | [
68
] | [
null
] | [
53
] | [
64
] | |
2024-11-18T19:58:37.213229+00:00 | 1,619,206,474,000 | ffd2d246bc96ac33310bc893083db844d1232305 | 3 | {
"blob_id": "ffd2d246bc96ac33310bc893083db844d1232305",
"branch_name": "refs/heads/main",
"committer_date": 1619206474000,
"content_id": "974e4ba076d79e20038d09c3f23d05c091d0ab26",
"detected_licenses": [
"MIT"
],
"directory_id": "289c50a05aee0100b56eff4959f0b126b0a71983",
"extension": "py",
"file... | 2.78125 | stackv2 | #!/usr/local/bin/python3
from flask import Flask, render_template, request
import datetime
app=Flask(__name__)
@app.route('/')
def hello_world():
return render_template('home.html', body="Custom body")
@app.route("/owner")
def Owner():
return "Hello, World from Pragati!"
@app.route("/datetime")
def DateTim... | 35 | 21.23 | 59 | 12 | 202 | python | [{"finding_id": "codeql_py/flask-debug_0237edf092026aec_ef97b024", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
35,
26
] | [
null,
null
] | [
2,
10
] | [
48,
39
] | |
2024-11-18T18:39:34.715388+00:00 | 1,615,096,115,000 | ad7e4e788af95a6e2de6b4d6f9659b9d1faae4fc | 3 | {
"blob_id": "ad7e4e788af95a6e2de6b4d6f9659b9d1faae4fc",
"branch_name": "refs/heads/main",
"committer_date": 1615096115000,
"content_id": "e10df8160fc4779520612a3a16d95e0052766061",
"detected_licenses": [
"MIT"
],
"directory_id": "8b2ef586433fcb5cedea3491937a806bfe2a224f",
"extension": "py",
"file... | 2.734375 | stackv2 | import sqlite3
from os import path
from database_functions import (add_service, add_user, check_data_from_service, create_database,
delete_service, delete_user, get_master_hashed, get_key,
get_user_id, get_usernames_list, list_saved_services,
... | 263 | 38.89 | 127 | 28 | 1,787 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7b2157a7a2ed05e6_fdf91c28", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
172
] | [
null
] | [
35
] | [
106
] | |
2024-11-18T18:39:40.040662+00:00 | 1,618,012,042,000 | 276e976e791e2a408d9be5861c1fc1578ee1e58f | 2 | {
"blob_id": "276e976e791e2a408d9be5861c1fc1578ee1e58f",
"branch_name": "refs/heads/master",
"committer_date": 1618012042000,
"content_id": "535f187165cc571354c7c51129dd4b685b24e7d8",
"detected_licenses": [
"MIT"
],
"directory_id": "f749434cd97dc2fbad060958a0f3919e51b83d11",
"extension": "py",
"fi... | 2.46875 | stackv2 | import logging
import requests
import hashlib
import os
"""
Helper functions for communication with the invoice service.
"""
PAYMENT_ON_ACCOUNT = 'room-bill'
logger = logging.getLogger('RingRing')
def add_to_invoice(guest_name, service, payment_type=PAYMENT_ON_ACCOUNT, notes=None):
session = requests.session(... | 93 | 36.26 | 149 | 13 | 807 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_16a4d6ab2b07fb75_db588011", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
71
] | [
null
] | [
35
] | [
61
] | |
2024-11-18T18:39:53.296205+00:00 | 1,588,786,445,000 | 6212ca72b7734d00ca5ec6a1c94f67becc28ebc6 | 4 | {
"blob_id": "6212ca72b7734d00ca5ec6a1c94f67becc28ebc6",
"branch_name": "refs/heads/master",
"committer_date": 1588786445000,
"content_id": "5738eb11b2d5bd65e30789e4b30194d99cede307",
"detected_licenses": [
"MIT"
],
"directory_id": "27be8e46cd420250583fe525e4e41497907956ae",
"extension": "py",
"fi... | 3.765625 | stackv2 | import random
def passwordGenerator(personal_list):
outputList = []
personal_list = [x for x in personal_list if not isinstance(x, int)]
# Removes integers from list
listWithNoInts = []
for i in personal_list:
if isinstance(i, str):
listWithNoInts.append(i)
if isinstan... | 61 | 26.41 | 116 | 13 | 448 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1ec7b98e6cf0ad20_3a0a5950", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
61
] | [
null
] | [
11
] | [
36
] | |
2024-11-18T18:40:00.853331+00:00 | 1,636,117,271,000 | a556c591532409e5568bb4a13595589eb3044a2f | 3 | {
"blob_id": "a556c591532409e5568bb4a13595589eb3044a2f",
"branch_name": "refs/heads/main",
"committer_date": 1636117271000,
"content_id": "bb141a625f1c2bb3d64423407c71251ea63775c2",
"detected_licenses": [
"MIT"
],
"directory_id": "c2cbd63a3e6c69419ad1941c42dc419edcc5a4f0",
"extension": "py",
"file... | 2.546875 | stackv2 | import io
import json
from PIL import Image
from flask import Flask, jsonify, request
import hashlib
import yaml
import torch
from torchvision import models
import torchvision.transforms as transforms
from ai.utils.model import CustomModel
import os
from waitress import serve
app = Flask(__name__)
@app.route('/'... | 100 | 24.56 | 76 | 16 | 620 | python | [{"finding_id": "codeql_py/flask-debug_4feb87a288b3afd0_8b739c6e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-327"
] | [
"py/flask-debug",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (passwor... | [
95,
50
] | [
null,
null
] | [
5,
31
] | [
35,
54
] | |
2024-11-18T18:46:57.130360+00:00 | 1,596,502,432,000 | 045f4784fba1400717c674c27c1d91a9336404da | 2 | {
"blob_id": "045f4784fba1400717c674c27c1d91a9336404da",
"branch_name": "refs/heads/master",
"committer_date": 1596502432000,
"content_id": "029cf6a7888848d9e6dc54bd5993c2ce7c0d8a2e",
"detected_licenses": [
"MIT"
],
"directory_id": "c38e220d8a7ad8f7ec2141b3f737894ccef18c49",
"extension": "py",
"fi... | 2.328125 | stackv2 |
import logging
import os
import json
import requests
from flask import Flask, jsonify, request, Response
from flask_cors import CORS
from bson import json_util
from services import dbconn
from services import cryptool
logging.basicConfig(level=logging.DEBUG)
logger = logging.getLogger(__name__)
app = Flask(__name... | 231 | 32.51 | 95 | 14 | 1,732 | python | [{"finding_id": "codeql_py/stack-trace-exposure_905c90e256ce8589_8d4649fe", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 7 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
40,
62,
121,
183,
196,
223,
231
] | [
null,
null,
null,
null,
null,
null,
null
] | [
24,
24,
24,
24,
24,
24,
5
] | [
39,
39,
39,
39,
39,
39,
96
] | |
2024-11-18T18:47:04.167372+00:00 | 1,431,654,646,000 | 4006e1b6fb94fb2bb5f7fbbc6a2826263f7cf950 | 2 | {
"blob_id": "4006e1b6fb94fb2bb5f7fbbc6a2826263f7cf950",
"branch_name": "refs/heads/master",
"committer_date": 1431654646000,
"content_id": "c8d7c882ccb826178a3df5d7971f46488786e419",
"detected_licenses": [
"ISC"
],
"directory_id": "22af001f4146ef88aaf1b9b023dc37a44f560765",
"extension": "py",
"fi... | 2.453125 | stackv2 | """
Generic DockCI utils
"""
import hashlib
import hmac
import logging
import re
import socket
import struct
import subprocess
import json
import datetime
from contextlib import contextmanager
from ipaddress import ip_address
import docker.errors
from flask import flash, request
from yaml_model import ValidationErro... | 286 | 26.15 | 78 | 18 | 1,718 | python | [{"finding_id": "codeql_py/log-injection_2bf56b231ba41548_1f943c91", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
91
] | [
null
] | [
56
] | [
65
] | |
2024-11-18T18:47:04.398348+00:00 | 1,504,986,504,000 | 73b1ff01927ee7d86c4dbd87d9d1d511f009400b | 3 | {
"blob_id": "73b1ff01927ee7d86c4dbd87d9d1d511f009400b",
"branch_name": "refs/heads/master",
"committer_date": 1504986504000,
"content_id": "d8892c31c782101158688e95a0016a865feed350",
"detected_licenses": [
"MIT"
],
"directory_id": "6f14ec23c73f145ef6ad792ea44fa9cce6ce01c2",
"extension": "py",
"fi... | 2.625 | stackv2 | """
Standardized encryption routines.
"""
import base64
import ctypes
import ctypes.wintypes
import hashlib
import os
# For documentation on the cryptography library, or to download it, visit:
# https://cryptography.io/en/latest/
# To install with pip:
# pip install cryptography
import cryptography.fernet
from... | 316 | 30.25 | 100 | 13 | 2,326 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d3275e30f00e2587_93632b34", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
211
] | [
null
] | [
44
] | [
62
] | |
2024-11-18T18:47:06.481489+00:00 | 1,411,295,602,000 | c15878a55e48c941e83c02fedd3db845ba4b0403 | 3 | {
"blob_id": "c15878a55e48c941e83c02fedd3db845ba4b0403",
"branch_name": "refs/heads/master",
"committer_date": 1411295602000,
"content_id": "9e82f164fe23e25986b870df40da1aa4483767c9",
"detected_licenses": [
"MIT"
],
"directory_id": "991d3ffd88ef7fe6c400209162b240ba80060572",
"extension": "py",
"fi... | 2.671875 | stackv2 | '''
bricklink.api
-------------
A module providing access to the Bricklink API
'''
from .exceptions import *
from .methods import *
from base64 import b64encode
from hashlib import sha1
import hmac
import json
from random import getrandbits
from time import time
from urllib import quote, urlencode
impor... | 129 | 44.21 | 143 | 22 | 1,332 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_38c151922218f254_4e9ade6d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
37
] | [
null
] | [
19
] | [
65
] | |
2024-11-18T19:09:57.241835+00:00 | 1,608,631,335,000 | 1607d864a3b40994215a80bac9f4b8999ffd8069 | 2 | {
"blob_id": "1607d864a3b40994215a80bac9f4b8999ffd8069",
"branch_name": "refs/heads/master",
"committer_date": 1608631335000,
"content_id": "4e3b900f9294af29dffcf54e4192af9ef5455886",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a81f1c4ef4be57f8b5d173e9818dfac3fb59491a",
"extension": "py"... | 2.46875 | stackv2 | import os
import socket
import json
import uuid
from flask import Flask, request, jsonify
app = Flask(__name__)
@app.route('/')
def hello():
provider = str(os.environ.get('PROVIDER', 'world'))
return 'Hello from backend ' + provider + '!'
@app.route("/generate")
def return_uuid():
uuid_value = str(uuid... | 48 | 25.04 | 113 | 12 | 312 | python | [{"finding_id": "codeql_py/reflective-xss_9d60100eadbe7e5d_c302535b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
38
] | [
null
] | [
12
] | [
27
] | |
2024-11-18T19:49:10.042752+00:00 | 1,687,336,355,000 | 689aceb9c06f7f08c5892cc17cf1315f62d6ef98 | 3 | {
"blob_id": "689aceb9c06f7f08c5892cc17cf1315f62d6ef98",
"branch_name": "refs/heads/master",
"committer_date": 1687336371000,
"content_id": "0ca2d513f3813417be72a51bb3175a904d8d764e",
"detected_licenses": [
"MIT"
],
"directory_id": "748248358ac6523449fc52e8ee488dc6827a55d4",
"extension": "py",
"fi... | 2.6875 | stackv2 | #!/usr/bin/env python3
import argparse
import hashlib
import json
import socket
import time
def get_location_request(lon, lat, taxi_id, operator, apikey):
"""Payload to send to geotaxi to update taxi location."""
payload = {
'timestamp': int(time.time()),
'operator': operator,
'taxi':... | 53 | 32.02 | 111 | 13 | 471 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_4b521127b5a37ac1_479dfbed", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
26
] | [
null
] | [
36
] | [
53
] | |
2024-11-18T20:15:46.168972+00:00 | 1,583,493,587,000 | 14ec16e3a81e286cc9daea3499a491701d61ef69 | 3 | {
"blob_id": "14ec16e3a81e286cc9daea3499a491701d61ef69",
"branch_name": "refs/heads/master",
"committer_date": 1583493587000,
"content_id": "e8c22bcd409dfc422f86300a1ab80b1760f256a8",
"detected_licenses": [
"MIT"
],
"directory_id": "6ced399d63465d63d67bd98493b2e27ea7db88ac",
"extension": "py",
"fi... | 2.53125 | stackv2 | import torch
from transformers import BertTokenizer, BertModel
import nltk
import numpy as np
import pickle
import gc
import re
import pandas as pd
import argparse
def remove_url(text, replace_token):
regex = 'http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]))+'
return re.sub(regex... | 287 | 30.83 | 115 | 25 | 2,038 | python | [{"finding_id": "codeql_py/overly-large-range_86f62cf6bcf37f2d_859c762b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
14
] | [
null
] | [
44
] | [
47
] | |
2024-11-18T20:15:47.059371+00:00 | 1,586,303,350,000 | 7461d7840c1d8c4ef7fb72fe3c15fcad268079a9 | 3 | {
"blob_id": "7461d7840c1d8c4ef7fb72fe3c15fcad268079a9",
"branch_name": "refs/heads/master",
"committer_date": 1586303350000,
"content_id": "901a275504321fd04c5c58ac6b6e3cd3a95d493a",
"detected_licenses": [
"BSD-3-Clause",
"MIT"
],
"directory_id": "9aaff9df4e431abd4e7403c4ef6dd0095807414a",
"ext... | 2.8125 | stackv2 | """Script to convert pydeck examples into .rst pages with code"""
import os
import glob
import jinja2
from multiprocessing import Pool
import subprocess
from utils import to_presentation_name, to_snake_case_layer_name
DOC_TEMPLATE = jinja2.Template(
"""
{{ layer_name }}
================================
.. raw... | 82 | 25.59 | 94 | 12 | 560 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_039f34431e5414e8_4790dfda", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
36
] | [
16
] | [
2
] | |
2024-11-18T20:16:05.285254+00:00 | 1,568,520,237,000 | 09ee164d820a678288c054bc8bbc3bbb43450fc6 | 3 | {
"blob_id": "09ee164d820a678288c054bc8bbc3bbb43450fc6",
"branch_name": "refs/heads/master",
"committer_date": 1568520237000,
"content_id": "a329868ecedcf34b597dfa0114557d409b0793e0",
"detected_licenses": [
"MIT"
],
"directory_id": "2d2306c20105cc367737758d413a30a22800e306",
"extension": "py",
"fi... | 2.59375 | stackv2 |
import sys
import json
from jinja2 import Environment, FileSystemLoader
def create_out_list(blocks, block):
output = block.get('output')
if output is None:
return ()
return ((f'{blocks[out_block["block"]]["name"]}@#'
f'{out_block["output_number"]}:{out_block["input_number"]}')
... | 49 | 29.14 | 75 | 16 | 294 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_bd6ed2378e632d58_d55ebc14", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
20
] | [
null
] | [
17
] | [
58
] | |
2024-11-18T19:38:01.823452+00:00 | 1,655,875,208,000 | 2660ed9ad53c4d891577b6a29835d9fae5c15565 | 3 | {
"blob_id": "2660ed9ad53c4d891577b6a29835d9fae5c15565",
"branch_name": "refs/heads/master",
"committer_date": 1655875208000,
"content_id": "6c5717fe83321b71950c511992b9c529b31bef63",
"detected_licenses": [
"MIT"
],
"directory_id": "f90716a1b5c5cd0f374056204860d60afc7ad771",
"extension": "py",
"fi... | 2.671875 | stackv2 | """
Optimize confusion matrix.
For more information, see
* http://cs.stackexchange.com/q/70627/2914
* http://datascience.stackexchange.com/q/17079/8820
"""
# Core Library
import json
import logging
from typing import List, Optional, Tuple
# Third party
import numpy as np
import numpy.typing as npt
from jinja2 impor... | 369 | 26.79 | 88 | 17 | 2,627 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2103ce5f38d16e83_02c9b78d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
307
] | [
null
] | [
21
] | [
35
] | |
2024-11-18T19:38:16.974274+00:00 | 1,604,223,701,000 | ce60a0e497d8b634f1298ff7464b931319e1898d | 3 | {
"blob_id": "ce60a0e497d8b634f1298ff7464b931319e1898d",
"branch_name": "refs/heads/master",
"committer_date": 1605451814000,
"content_id": "339f48c4533eb5bce2e19946c7d00a7e1dc826b4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "99883e10159dedf4e65e9648e66a65ab68110586",
"extension": "py"... | 2.5625 | stackv2 | import tempfile
import tarfile
import cStringIO
import os
import random
from rackattack.ssh import ftp
class DirFTP:
def __init__(self, sshClient):
self._sshClient = sshClient
self._ftp = ftp.FTP(sshClient)
def put(self, path, originPath, compressed=True):
tarContents = cStringIO.Stri... | 41 | 37.59 | 102 | 13 | 406 | python | [{"finding_id": "codeql_py/insecure-temporary-file_c851bbc45cb0bb41_0ac0740a", "tool_name": "codeql", "rule_id": "py/insecure-temporary-file", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated function tempfile.mktemp may be insecure.", "remediation": "", "location": ... | 3 | true | [
"CWE-377",
"CWE-377",
"CWE-022"
] | [
"py/insecure-temporary-file",
"py/insecure-temporary-file",
"py/tarslip"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Call to deprecated function tempfile.mktemp may be insecure.",
"Call to deprecated function tempfile.mktemp may be insecure.",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
19,
27,
35
] | [
null,
null,
null
] | [
25,
25,
9
] | [
42,
42,
12
] | |
2024-11-18T19:38:17.159761+00:00 | 1,510,477,653,000 | 9b78adec4c672c6d1e38926b68a4917f66e404a8 | 3 | {
"blob_id": "9b78adec4c672c6d1e38926b68a4917f66e404a8",
"branch_name": "refs/heads/master",
"committer_date": 1510477653000,
"content_id": "29c9d1d0877f5c27889c931cd47dfafb57f788a9",
"detected_licenses": [
"MIT"
],
"directory_id": "f82237f41747ca501e7681f50ba3382854ce70e6",
"extension": "py",
"fi... | 2.59375 | stackv2 | import requests
import json
import base64
import os
import glob
import concurrent.futures
GOOGLE_CLOUD_VISION_API_URL = 'https://vision.googleapis.com/v1/images:annotate?key='
API_KEY = os.environ['GOOGLE']
def goog_cloud_vison(image_content):
api_url = GOOGLE_CLOUD_VISION_API_URL + API_KEY
req_body = json.du... | 47 | 27.79 | 100 | 19 | 344 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_fb5fe86b7a45565d_40b64613", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
40,
39
] | [
null,
null
] | [
34,
12
] | [
41,
19
] | |
2024-11-18T19:38:22.240363+00:00 | 1,632,245,796,000 | b7b67e6aa93ca78249c538a44e9c386d854cd427 | 2 | {
"blob_id": "b7b67e6aa93ca78249c538a44e9c386d854cd427",
"branch_name": "refs/heads/main",
"committer_date": 1632245796000,
"content_id": "edca5bdf85ba22543ac4650ba8a27446120a8f0d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "acb60b0cfad23c8cb1cf558998fc17e961fd3290",
"extension": "py",
... | 2.421875 | stackv2 | # -*- coding: utf-8 -*-
# -*- train.py -*-
import os
import time
import faiss
import pickle
import gensim
import string
import argparse
import unicodedata
import numpy as np
import pandas as pd
import multiprocessing as mp
from collections import Counter
from tqdm import tqdm
from nltk.corpus import stopwords
from... | 286 | 43.46 | 161 | 25 | 3,063 | python | [{"finding_id": "codeql_py/overly-permissive-file_6e9f0de8efa9499c_9cdf44ef", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
168
] | [
null
] | [
null
] | [
42
] | |
2024-11-18T19:38:38.308413+00:00 | 1,479,054,838,000 | 1a8c09d7cb98a13e0cf093879e8991bc024cbdf7 | 2 | {
"blob_id": "1a8c09d7cb98a13e0cf093879e8991bc024cbdf7",
"branch_name": "refs/heads/master",
"committer_date": 1479054838000,
"content_id": "ff0a129e7635fc62dde169579871af29399d4d1c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "36b408e466970fd36fefd627bd7664bd8f52ea70",
"extension": "py"... | 2.40625 | stackv2 | # Copyright 2015 IBM Corp. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed... | 212 | 27.71 | 118 | 14 | 1,433 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6478372479ceaa04_073f9f86", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
34
] | [
null
] | [
31
] | [
49
] | |
2024-11-18T20:10:35.498083+00:00 | 1,608,043,448,000 | ea39dfbf5f2422803a7a3e9155913a27612b010a | 2 | {
"blob_id": "ea39dfbf5f2422803a7a3e9155913a27612b010a",
"branch_name": "refs/heads/master",
"committer_date": 1608043448000,
"content_id": "2fc251d8dfe2397b7ea7d382a839869784636b59",
"detected_licenses": [
"MIT"
],
"directory_id": "4c273e5e598f932558724ca1e1478baf212b625e",
"extension": "py",
"fi... | 2.359375 | stackv2 | import requests
import json
from flask import request, Response
from tranql.backplane.api.standard_api import StandardAPIResource
import logging
from tranql.config import config
logger = logging.getLogger(__name__)
#######################################################
##
# Gamma - publish a graph to Gamma.
##
####... | 179 | 34.31 | 164 | 17 | 1,165 | python | [{"finding_id": "codeql_py/request-without-cert-validation_1558c3228acb4d85_b00e894c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-117"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This log entry depends on a [user-provided value](1)."
] | [
53,
121,
120
] | [
null,
null,
null
] | [
20,
20,
22
] | [
84,
82,
56
] | |
2024-11-18T20:11:08.888807+00:00 | 1,602,663,864,000 | 108af515758fcdf1480fdffa7671e21735d9dd5b | 2 | {
"blob_id": "108af515758fcdf1480fdffa7671e21735d9dd5b",
"branch_name": "refs/heads/master",
"committer_date": 1602663864000,
"content_id": "e0eaead5aec28eb0d24759543ddc772f7a8cbb03",
"detected_licenses": [
"MIT"
],
"directory_id": "32b9b6149dc0ac750f51ba14a3859eb1364715bf",
"extension": "py",
"fi... | 2.484375 | stackv2 | """
This script generates demo workspace.
"""
from dotenv import dotenv_values
from http import HTTPStatus
import logging
import os
import requests
import subprocess as sp
import time
logging.basicConfig(level=logging.DEBUG)
URI = 'http://0.0.0.0:8089'
ENVS = dotenv_values('../../../config/base/.env')
GOOGLE_APPLI... | 153 | 30.25 | 105 | 15 | 1,021 | python | [{"finding_id": "codeql_py/request-without-cert-validation_2a9a4f60d4afc2ca_610b7dd6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 6 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
26,
32,
33,
45,
119,
138
] | [
null,
null,
null,
null,
null,
null
] | [
19,
5,
32,
21,
13,
28
] | [
90,
71,
106,
61,
85,
76
] | |
2024-11-18T20:26:07.305035+00:00 | 1,455,800,454,000 | f32a9661cfc851c91bda849819cd2b54e589ebaf | 3 | {
"blob_id": "f32a9661cfc851c91bda849819cd2b54e589ebaf",
"branch_name": "refs/heads/master",
"committer_date": 1455800454000,
"content_id": "8236d367019bb26c0aef5b25016b1d1ad4d13aae",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "ff9c7363b72a46adea38cde6798e67c50965c7c5",
"extension": "p... | 2.578125 | stackv2 | import os
import jinja2
import ruamel.yaml
EXPECTED_SECTION_ORDER = ['package', 'source', 'build', 'requirements', 'test', 'app', 'about', 'extra']
class NullUndefined(jinja2.Undefined):
def __unicode__(self):
return unicode(self._undefined_name)
def lintify(meta):
lints = []
major_sections ... | 56 | 34 | 118 | 15 | 461 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_be8541d33eb886bd_13c2fd6f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
50
] | [
null
] | [
11
] | [
54
] | |
2024-11-18T20:26:28.071023+00:00 | 1,506,325,073,000 | 03b73ea4a3ad9e107177daae80aac45e5cd8ba7e | 4 | {
"blob_id": "03b73ea4a3ad9e107177daae80aac45e5cd8ba7e",
"branch_name": "refs/heads/master",
"committer_date": 1506325073000,
"content_id": "5287adae99040620feb990657556d1b3dd95a84f",
"detected_licenses": [
"MIT"
],
"directory_id": "574885005b94491162cbf6832dfd7b9ca681d8e3",
"extension": "py",
"fi... | 3.78125 | stackv2 | """
CONVENTIONS:
- A timesheet object is a Pandas DataFrame object with at least the columns
* ``'date'``: date worked was done; datetime object
* ``'project'``: project the work is part of
* ``'duration'``: time spent on work; hours
- A biller is a univariate function that maps duration to cost (in some... | 329 | 31.32 | 87 | 23 | 2,827 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4c4ff75ee9d9cf30_09ce211d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
326
] | [
null
] | [
11
] | [
40
] | |
2024-11-18T20:26:36.305752+00:00 | 1,602,566,246,000 | b49c3e033e709569b824e64f4196473c9f30fd32 | 2 | {
"blob_id": "b49c3e033e709569b824e64f4196473c9f30fd32",
"branch_name": "refs/heads/master",
"committer_date": 1602566246000,
"content_id": "c726d61987abcc5c92dd13110dafc9d8c815640d",
"detected_licenses": [
"MIT"
],
"directory_id": "b24a53c5596a3153786ac6804a068e1b539b9c00",
"extension": "py",
"fi... | 2.390625 | stackv2 | from flask import Flask , render_template, request, flash, url_for, redirect, send_from_directory, jsonify
from werkzeug.utils import secure_filename
import werkzeug.exceptions
import os
import subprocess
import sys
import time
import logging
import traceback
from app import split_pdf
logger = logging.getLogger(__n... | 164 | 31.68 | 107 | 22 | 1,186 | python | [{"finding_id": "codeql_py/command-line-injection_df7b3f7d60cb0a2c_dc3f7b8d", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).\nThis command line depends on a [u... | 4 | true | [
"CWE-078",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/command-line-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).\nThis command line depends on a [user-provided value](2).",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends... | [
59,
58,
79,
110
] | [
null,
null,
null,
null
] | [
29,
14,
15,
14
] | [
33,
18,
58,
59
] | |
2024-11-18T20:26:55.568910+00:00 | 1,622,001,617,000 | 3008b3cac57acc4f73e52bb1d42ca1cac7243e27 | 3 | {
"blob_id": "3008b3cac57acc4f73e52bb1d42ca1cac7243e27",
"branch_name": "refs/heads/main",
"committer_date": 1622001617000,
"content_id": "531e59c5593c9336fc7ab0b1719982b0a2acc769",
"detected_licenses": [
"MIT"
],
"directory_id": "9f04c2977434c5854e889b424e34593fa9f938d1",
"extension": "py",
"file... | 3.140625 | stackv2 | import requests
from bs4 import BeautifulSoup
class Zone(object):
def __init__(self, data, zoneName):
self.data = data
self.zoneName = zoneName
self.county = None
self.town = None
def findCounty(self):
isCounty = None
for zone in self.data:
if zone['... | 50 | 29.2 | 79 | 16 | 358 | python | [{"finding_id": "codeql_py/request-without-cert-validation_d8dfd73ed1f59d2c_be8abd2b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
33
] | [
null
] | [
15
] | [
47
] | |
2024-11-18T20:52:02.728724+00:00 | 1,634,395,480,000 | ac8da292701e81bcbd59da134db02730527d406c | 3 | {
"blob_id": "ac8da292701e81bcbd59da134db02730527d406c",
"branch_name": "refs/heads/main",
"committer_date": 1634395480000,
"content_id": "43750bc99b01f256f094dc53a9f75be40204f92f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "70ddf08a41c915beb735064c6b1081a6d094076c",
"extension": "py",
... | 2.96875 | stackv2 | import rsa
# 生成密钥
(pubkey, privkey) = rsa.newkeys(1024)
# 保存密钥
#with open('public.pem','w+') as f:
# f.write(pubkey.save_pkcs1().decode())
#with open('private.pem','w+') as f:
# f.write(privkey.save_pkcs1().decode())
# 导入密钥
with open('public.pem','r') as f:
pubkey = rsa.PublicKey.load_pkcs1(f.read().encode())
wit... | 27 | 22.7 | 64 | 12 | 210 | python | [{"finding_id": "codeql_py/weak-crypto-key_57d516b966606a93_d1ca788d", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
3
] | [
null
] | [
21
] | [
38
] | |
2024-11-18T20:52:25.131574+00:00 | 1,561,127,179,000 | 24b3b2420ac231cdf0f47a23e0a1ae54a5fb90a8 | 4 | {
"blob_id": "24b3b2420ac231cdf0f47a23e0a1ae54a5fb90a8",
"branch_name": "refs/heads/master",
"committer_date": 1561127179000,
"content_id": "31cd82a61788778eb5fecab7fb3968195fa69494",
"detected_licenses": [
"MIT"
],
"directory_id": "3a92d6188c26aea7bf1c0e40d65de1951a15c054",
"extension": "py",
"fi... | 3.515625 | stackv2 | import csv
import json
import datetime
import os
from dotenv import load_dotenv
import requests
load_dotenv()
def to_usd(my_price):
return "${0:,.2f}".format(my_price)
now = datetime.datetime.now()
#Information Input
api_key = os.environ.get("ALPHA_VANTAGE_API_KEY")
while True:
symbol = input("Please e... | 125 | 28.96 | 158 | 13 | 901 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b5eda201bc00a28d_422aff7c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
113
] | [
null
] | [
7
] | [
38
] | |
2024-11-18T20:52:36.313218+00:00 | 1,691,538,221,000 | 66354e706841a0e5f9f6fd4fab96dbb6d8d559cb | 3 | {
"blob_id": "66354e706841a0e5f9f6fd4fab96dbb6d8d559cb",
"branch_name": "refs/heads/master",
"committer_date": 1691538221000,
"content_id": "22a8a0ffacb4a56d7a1ea2899acf93a36a2193c5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f2df19adf2907f8ea23e5d1635e0964d40c4a7a1",
"extension": "py"... | 2.625 | stackv2 | """Module that implements version 1 of an API to access
the data held in BMON.
Response are in JSON and implement the JSend specification;
see: https://labs.omniti.com/labs/jsend .
"""
import logging
from datetime import datetime
from collections import Counter
import pytz
from django.http import JsonResponse
from da... | 365 | 36.19 | 110 | 18 | 2,888 | python | [{"finding_id": "codeql_py/stack-trace-exposure_fe0b505546fa9605_b714112a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
325,
365
] | [
null,
null
] | [
29,
29
] | [
35,
35
] | |
2024-11-18T20:52:39.734920+00:00 | 1,568,749,332,000 | 90a523c9f259e28ea6b457828fcecae4be838025 | 3 | {
"blob_id": "90a523c9f259e28ea6b457828fcecae4be838025",
"branch_name": "refs/heads/master",
"committer_date": 1568749332000,
"content_id": "7e5e03fa0cb62a33cfbfa5f386deccd7e2546c00",
"detected_licenses": [
"MIT"
],
"directory_id": "a0ead81ca4fa42fbf2460da77db7beef84caf40f",
"extension": "py",
"fi... | 2.546875 | stackv2 | import os
import sys
from bokeh.themes import Theme
from jinja2 import Environment, FileSystemLoader
class VisualHelper:
def __init__(self):
pass
@staticmethod
def force_axis_usage(node, axis):
all_values = list()
lowest = int()
highest = int()
for value in axis.v... | 175 | 39.18 | 119 | 24 | 1,297 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_78157661e6438152_c51560da", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
168
] | [
null
] | [
15
] | [
91
] | |
2024-11-18T19:02:31.922924+00:00 | 1,617,527,183,000 | 841cca67973b8f375b1716e921d13cd8620357a0 | 3 | {
"blob_id": "841cca67973b8f375b1716e921d13cd8620357a0",
"branch_name": "refs/heads/main",
"committer_date": 1617527183000,
"content_id": "04a319a540ef6940ed6cc005880dbfcf8085202a",
"detected_licenses": [
"MIT"
],
"directory_id": "22389b45317289e52249b875c288ec253057752b",
"extension": "py",
"file... | 2.609375 | stackv2 | #/usr/bin/env python
#coding=utf8
import json
import http.client #修改引用的模块
import hashlib #修改引用的模块
from urllib import parse
import random
# 百度开发者api自己去申请
appid = "" #你的appid
secretKey = "" #你的密钥
def bdtrans(word, fromLang, toLang):
httpClient = None
myurl = "/api/trans/vip/translate"
q = word
salt = r... | 41 | 27.34 | 119 | 19 | 352 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_26db6f33f9733996_ccdef468", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
21
] | [
null
] | [
15
] | [
35
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.