added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T22:11:33.776204+00:00 | 1,499,957,449,000 | ed3ed592d4fca2140f0f9154773f123c609b8150 | 3 | {
"blob_id": "ed3ed592d4fca2140f0f9154773f123c609b8150",
"branch_name": "refs/heads/master",
"committer_date": 1499957449000,
"content_id": "c46f759fa1d21c6cec1bb451dca7f8b92000966d",
"detected_licenses": [
"MIT"
],
"directory_id": "fc59fffe635d9d3acd585161f68474458f32f03c",
"extension": "py",
"fi... | 2.71875 | stackv2 | import helper
import numpy as np
import os
import pickle
import random
import sklearn
import tarfile
import time
import tensorflow as tf
import tqdm
import urllib
cifar10_dataset_folder_path = 'cifar-10-batches-py'
tar_gz_path = 'cifar-10-python.tar.gz'
class DLProgress(tqdm.tqdm):
last_block = 0
def hook(s... | 362 | 31.67 | 80 | 18 | 2,728 | python | [{"finding_id": "codeql_py/tarslip_6c6229f5a56f26c1_67278526", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
40
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T22:11:41.054046+00:00 | 1,611,819,302,000 | b75733d149d2e393d56179b6793e17cea735641e | 2 | {
"blob_id": "b75733d149d2e393d56179b6793e17cea735641e",
"branch_name": "refs/heads/master",
"committer_date": 1611819302000,
"content_id": "93331d60accbae01fa0d3539734a181a8d3c1f99",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1698fe3ff15a6737c70501741b32b24fe68052f4",
"extension": "py"... | 2.34375 | stackv2 | import hashlib
from django.db import models
from material.models import MaterialSocial, MaterialMaster
class NavigationLink(models.Model):
"""
自定义导航
"""
TARGET_TYPE = (
("_blank", "blank - 浏览器总在一个新打开、未命名的窗口中载入目标文档。"),
("_self",
"self - 这个目标的值对所有没有指定目标的 <a> 标签是默认目标,它使得目标文档载入并显示... | 182 | 48.38 | 132 | 14 | 2,316 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_e4c1624ec5d1851f_d551711c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
81
] | [
null
] | [
24
] | [
59
] | |
2024-11-18T22:24:07.648737+00:00 | 1,612,731,083,000 | b6a318c68da12bae54bfe0ba8ebe4e284b7b51d7 | 3 | {
"blob_id": "b6a318c68da12bae54bfe0ba8ebe4e284b7b51d7",
"branch_name": "refs/heads/master",
"committer_date": 1612731083000,
"content_id": "1d80f68b8c7dcc98a1ce840dd4ae393c107a60e2",
"detected_licenses": [
"MIT"
],
"directory_id": "79d89348395a2ab0980858789af935a2b25c9498",
"extension": "py",
"fi... | 2.703125 | stackv2 | """Routes that are used by runners."""
import logging
from flask import current_app as app
from flask import request, jsonify
from broker.core.utils import is_status_valid
logger = logging.getLogger(__name__)
@app.route("/runners/available-job", methods=["GET"])
def get_available_job():
"""Gets an available ... | 46 | 30.28 | 80 | 17 | 323 | python | [{"finding_id": "codeql_py/log-injection_0359cc1a59b1e901_bb777bce", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
32,
32
] | [
null,
null
] | [
9,
32
] | [
30,
49
] | |
2024-11-18T22:24:17.704713+00:00 | 1,593,715,268,000 | 6911e4d2cbb7373ece1799948a4b8d49ccbe96d1 | 3 | {
"blob_id": "6911e4d2cbb7373ece1799948a4b8d49ccbe96d1",
"branch_name": "refs/heads/master",
"committer_date": 1593715268000,
"content_id": "5c5ecb590b045b8fe4849addffcd32375870bab4",
"detected_licenses": [
"MIT"
],
"directory_id": "9ea87c10180665db0db6fa36997704acc001692d",
"extension": "py",
"fi... | 2.71875 | stackv2 | # tokenization testing script
# extracted from Jason Loh's JT lib
from pypbc import *
import os, sys, time
from Crypto.Cipher import AES
import hashlib
import numpy
def hexxor(a, b): # xor two hex strings of the same length
return "".join(["%x" % (int(x,16) ^ int(y,16)) for (x, y) in zip(a, b)])
if __name__ == "... | 90 | 22.1 | 73 | 16 | 673 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_2d35330052bacbd4_b0774c21", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
45,
48,
75
] | [
null,
null,
null
] | [
10,
10,
10
] | [
30,
32,
31
] | |
2024-11-18T22:36:24.205181+00:00 | 1,606,973,194,000 | 700a97be8c3509a4e1960bf198d3eb97d48fa130 | 2 | {
"blob_id": "700a97be8c3509a4e1960bf198d3eb97d48fa130",
"branch_name": "refs/heads/main",
"committer_date": 1606973194000,
"content_id": "61c2efdd65256b51ddb672c9f76730eb8c51f179",
"detected_licenses": [
"MIT"
],
"directory_id": "674d38b049415589f94c0e985f153da38894d506",
"extension": "py",
"file... | 2.34375 | stackv2 | import os
import secrets
import math
import urllib
import re
from PIL import Image
from flask import render_template,url_for,flash,redirect,request,abort,jsonify
from plagCheck.forms import RegistrationForm,LoginForm,AccountUpdateForm,RequestResetForm,ResetPasswordForm,SuggestionForm
from plagCheck import app,db,bcrypt... | 265 | 35.14 | 122 | 17 | 2,061 | python | [{"finding_id": "codeql_py/partial-ssrf_66431274cc66882f_b618f723", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
195
] | [
null
] | [
20
] | [
28
] | |
2024-11-18T22:36:24.386629+00:00 | 1,676,633,872,000 | cf9d5340e6a3b8be54d30c6588e3fe6f320724e9 | 3 | {
"blob_id": "cf9d5340e6a3b8be54d30c6588e3fe6f320724e9",
"branch_name": "refs/heads/master",
"committer_date": 1676633872000,
"content_id": "899bc357ea1796ac11b35de9bb9034808cb96f61",
"detected_licenses": [
"MIT"
],
"directory_id": "f6e13c4202218a71b8c9ec93884d60e70c4ffb92",
"extension": "py",
"fi... | 2.828125 | stackv2 | #!/usr/bin/env python3
import gnomekeyring as gkey
import argparse
parser = argparse.ArgumentParser(description='GNome Keyring Credentials Proxy')
parser.add_argument('-u',
dest='get_username',
action='store_const',
const=True,
default=Fa... | 84 | 31.37 | 84 | 13 | 580 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5ca89a603d5da3c7_124a2f91", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data ... | [
74,
79,
84,
84
] | [
null,
null,
null,
null
] | [
15,
15,
11,
27
] | [
41,
41,
25,
41
] | |
2024-11-18T22:36:38.081309+00:00 | 1,675,070,211,000 | 2d51f24f75bb3b6b21fb1210c3409e1c3063acde | 3 | {
"blob_id": "2d51f24f75bb3b6b21fb1210c3409e1c3063acde",
"branch_name": "refs/heads/master",
"committer_date": 1675070211000,
"content_id": "8645d7b32c1044ce087596ec1ac46444c4785168",
"detected_licenses": [
"MIT"
],
"directory_id": "f7778bf3b8173915c97193f51ff8a1ac2260a68a",
"extension": "py",
"fi... | 3.25 | stackv2 | import argparse
import json
import re
import requests
from typing import List
from urllib3.exceptions import InsecureRequestWarning
quiet = False
def print_message(message: str):
"""
Print message to STDOUT if the quiet option is set to False (this is the default).
:param message: message to print
:r... | 108 | 34.17 | 113 | 20 | 803 | python | [{"finding_id": "codeql_py/request-without-cert-validation_037e3bddcbe44ea8_68c72d30", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
47
] | [
null
] | [
22
] | [
71
] | |
2024-11-18T22:36:51.207886+00:00 | 1,632,211,936,000 | da79ad312fb37ea75831535463b3a0feb30fc70c | 3 | {
"blob_id": "da79ad312fb37ea75831535463b3a0feb30fc70c",
"branch_name": "refs/heads/main",
"committer_date": 1632211967000,
"content_id": "082a2f7150fe97e34e39317d46ac67dd644df60c",
"detected_licenses": [
"MIT"
],
"directory_id": "fb8a9b08691505d630692fef9b1c73cd24402900",
"extension": "py",
"file... | 2.625 | stackv2 | import os
from pathlib import Path
from shutil import move, rmtree
from sys import platform
from uuid import uuid1
FFMPEG_STATIC_LINUX = 'https://johnvansickle.com/ffmpeg/builds/ffmpeg-git-amd64-static.tar.xz'
FFMPEG_STATIC_WIN = 'https://www.gyan.dev/ffmpeg/builds/ffmpeg-release-essentials.zip'
FFMPEG_STATIC_MAC = 'h... | 83 | 32.47 | 94 | 16 | 646 | python | [{"finding_id": "codeql_py/tarslip_ae01ae003fe6495a_ffb90224", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
79
] | [
null
] | [
13
] | [
15
] | |
2024-11-18T20:23:13.910424+00:00 | 1,518,383,896,000 | 1a8d33cac84ac7d32071366f46a82d8d724fa17f | 2 | {
"blob_id": "1a8d33cac84ac7d32071366f46a82d8d724fa17f",
"branch_name": "refs/heads/master",
"committer_date": 1518383896000,
"content_id": "b277be79a46e4ac2fb58d570ff036f2c7d26e451",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c1bde1897249494bc8e77da5f118570fd92869ec",
"extension": "py"... | 2.421875 | stackv2 | import os
import subprocess
from flask import Flask, render_template
app = Flask(__name__)
BASE_DIR = os.path.abspath(os.path.dirname(__file__))
@app.route('/')
def hello_world():
commands = [
dict(url='/commands/play', name='Play MP3', icon='fa-file-audio-o'),
dict(url='/commands/testvumeter',... | 47 | 31.09 | 110 | 12 | 407 | python | [{"finding_id": "codeql_py/reflective-xss_dfd397250abed887_cada5cfb", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
36
] | [
null
] | [
13
] | [
48
] | |
2024-11-18T20:23:15.778211+00:00 | 1,630,100,893,000 | d83e66edcf46d556fcc400bdcee93f1734f691b8 | 4 | {
"blob_id": "d83e66edcf46d556fcc400bdcee93f1734f691b8",
"branch_name": "refs/heads/master",
"committer_date": 1630100893000,
"content_id": "c0610f6556da392ca4a7ace0dd2df68f6148d3cf",
"detected_licenses": [
"MIT"
],
"directory_id": "09d7efc39bf0408e68edf92eef6192d953422b73",
"extension": "py",
"fi... | 3.734375 | stackv2 | # ========================
# Information
# ========================
# Direct Link: https://www.hackerrank.com/challenges/matching-x-y-repetitions/problem
# Difficulty: Easy
# Max Score: 20
# Language: Python
# ========================
# Solution
# ========================
import re
regex_pattern = r'^... | 38 | 26.63 | 85 | 15 | 339 | python | [{"finding_id": "codeql_py/overly-large-range_014167c2c17281c3_0fea4612", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
16
] | [
null
] | [
31
] | [
34
] | |
2024-11-18T20:23:19.192048+00:00 | 1,518,722,140,000 | d92a949b602621e5934f4386d6d929966713c3fd | 2 | {
"blob_id": "d92a949b602621e5934f4386d6d929966713c3fd",
"branch_name": "refs/heads/master",
"committer_date": 1518722140000,
"content_id": "8bf4bc1868a9e55ef51f4a9a55a48a146edbe8f6",
"detected_licenses": [
"MIT"
],
"directory_id": "4edbc758a08ef425f77a2f6c3aee4f545a494842",
"extension": "py",
"fi... | 2.484375 | stackv2 | from flask import Flask, request, jsonify, redirect, url_for, send_file
from werkzeug.utils import secure_filename
from flask_sqlalchemy import SQLAlchemy
from flask_marshmallow import Marshmallow
from datetime import datetime
from flask_cors import CORS
import json
import os
app = Flask(__name__)
app.config['SQLALCHE... | 135 | 32.39 | 116 | 15 | 999 | python | [{"finding_id": "codeql_py/flask-debug_fe13120afadf5d2e_734eee27", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
135,
61,
65
] | [
null,
null,
null
] | [
5,
23,
22
] | [
24,
34,
30
] | |
2024-11-18T21:22:14.871514+00:00 | 1,635,612,313,000 | 76f3dfec8f3e34388152e0895e50a5cbdfc71248 | 2 | {
"blob_id": "76f3dfec8f3e34388152e0895e50a5cbdfc71248",
"branch_name": "refs/heads/master",
"committer_date": 1635612313000,
"content_id": "f74fc4587cec4e965530f9929b0309e1e8faa0be",
"detected_licenses": [
"MIT"
],
"directory_id": "c4ec4fb81da7fe906a5a7640a7c7b7d22ad9a93e",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/env python3
#
# author: dec 2020
# cassio batista - https://cassota.gitlab.io
#
# sponsored by MidiaClip (Salvador - BA)
import sys
import os
import shutil
import glob
import argparse
import logging
from collections import OrderedDict
import torch
import numpy as np
from pyannote.pipeline.blocks.clusteri... | 149 | 40.27 | 119 | 17 | 1,560 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a3d3c0993d9b194c_08ff4e67", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
70,
140,
145
] | [
71,
null,
null
] | [
27,
26,
37
] | [
54,
79,
75
] | |
2024-11-18T21:22:22.454901+00:00 | 1,636,167,597,000 | e30d0e9db5d44e6c3fde22c50da4f43ff31885ee | 3 | {
"blob_id": "e30d0e9db5d44e6c3fde22c50da4f43ff31885ee",
"branch_name": "refs/heads/main",
"committer_date": 1636167597000,
"content_id": "cafa45d22425f321b30c0a9caf1ab5b953f1df4f",
"detected_licenses": [
"MIT"
],
"directory_id": "3f7c7a2f38166ab98e4c42e5d35ab360170f8550",
"extension": "py",
"file... | 2.984375 | stackv2 | import hashlib
from typing import Tuple
import requests
class PasswordPwnedSearch:
def __init__(self, password_typed: str) -> None:
self.password_hashed = self.__hash_password(password_typed)
def __hash_password(self, password_typed: str) -> str:
return hashlib.sha1(password_typed.encode("ut... | 32 | 34.41 | 80 | 16 | 262 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6dea41ebbd176184_eba6c905", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
12
] | [
null
] | [
29
] | [
59
] | |
2024-11-18T21:22:25.446257+00:00 | 1,605,668,761,000 | 07ce0c2d70fa4889cf0d57e82516ea4f436423a6 | 2 | {
"blob_id": "07ce0c2d70fa4889cf0d57e82516ea4f436423a6",
"branch_name": "refs/heads/master",
"committer_date": 1605668761000,
"content_id": "ad2768da25ef4923a42331deb8b1cfeb976938d8",
"detected_licenses": [
"MIT"
],
"directory_id": "f1bbd010bedbd4069c000b8c1da769423352c998",
"extension": "py",
"fi... | 2.34375 | stackv2 | import io
import pandas as pd
import datetime
from flask import Flask
from flask import redirect
from flask import request
from flask import Response
from flask import send_file
from flask import abort
from flask_admin import Admin
from flask_admin import BaseView
from flask_admin import expose
from flask_admin.contri... | 310 | 30.45 | 81 | 17 | 2,158 | python | [{"finding_id": "codeql_py/reflective-xss_ad7ec6e13f53f0f5_74d3eb82", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
240
] | [
null
] | [
21
] | [
66
] | |
2024-11-18T21:22:38.384762+00:00 | 1,505,753,816,000 | 41a53efce0e36eba4cc437ebb7eb2d542a7aaad7 | 2 | {
"blob_id": "41a53efce0e36eba4cc437ebb7eb2d542a7aaad7",
"branch_name": "refs/heads/master",
"committer_date": 1505753816000,
"content_id": "3b902845cfed4e75656a703985451e9ae2cea94c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "02f670287379abd80830e24b443620860d2ed4ab",
"extension": "py"... | 2.484375 | stackv2 | #!/usr/bin/env python
import SocketServer
import re
import socket
import ssl
import threading
PUBLIC_ENDPOINT = ('', 4747)
INTERNAL_SSL_ENDPOINT = ('127.0.0.1', 65186)
INTERNAL_FORWARD_ENDPOINT = ('127.0.0.1', 65187)
RECV_BUFFER = 4096
KILL_THREADS_WHEN_MAIN_ENDS = True
SSL_VERSION = ssl.PROTOCOL_SSLv3
CIPHER_ALGOR... | 434 | 31.05 | 109 | 15 | 2,989 | python | [{"finding_id": "codeql_py/insecure-protocol_32d7fe850b3c0418_f2c5dd58", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/insecure-protocol",
"py/insecure-protocol"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.SSLContext](1).",
"Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.SSLContext](1)."
] | [
103,
205
] | [
null,
null
] | [
22,
22
] | [
49,
49
] | |
2024-11-18T21:22:39.748512+00:00 | 1,546,700,233,000 | d1434a01f83170160f64a9bc740bdaf8476b553e | 3 | {
"blob_id": "d1434a01f83170160f64a9bc740bdaf8476b553e",
"branch_name": "refs/heads/master",
"committer_date": 1546700233000,
"content_id": "27ae05785ce0a1d34cf54e567296d0892954fd4c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9674aa46d438ac7956d8a43759bf012bc91eb679",
"extension": "py"... | 2.546875 | stackv2 | # Python wrapper for 'aws configure'
from pathlib import Path
import os
import config
def createcredentialsfile(accesskey, secretkey):
"""Creates a credentials file"""
filename = str(Path.home()) + "/.aws/credentials"
if os.path.exists(filename):
f = open(filename, "r")
# Check to see if... | 47 | 24.26 | 58 | 11 | 282 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8bdfd4518ce2fb3f_c195a317", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
25
] | [
null
] | [
13
] | [
51
] | |
2024-11-18T21:22:48.018295+00:00 | 1,418,119,281,000 | 471b90ea3c53ba28e4c9cacc478f8409b5f64317 | 3 | {
"blob_id": "471b90ea3c53ba28e4c9cacc478f8409b5f64317",
"branch_name": "refs/heads/master",
"committer_date": 1418119281000,
"content_id": "d9400935acb9d1ba847951c3a00f7fa62a5358ef",
"detected_licenses": [
"MIT"
],
"directory_id": "ffee3fa9f03c8e2412699da154976e1c1878f7f0",
"extension": "py",
"fi... | 2.75 | stackv2 |
import os
import sys
import yaml
import shutil
import jinja2
import markdown
import helpers
# Template defaults
defaults = {
'labels': None,
}
def read_yaml(filename):
"""
Read Yaml file given by ``filename`` and return dictionary data.
"""
with open(filename, 'rt') as f:
return yaml.lo... | 120 | 23.49 | 79 | 15 | 676 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a837ac37c2e4905d_cd737c63", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
30
] | [
null
] | [
15
] | [
40
] | |
2024-11-18T21:23:08.027712+00:00 | 1,657,255,346,000 | f9eb1ff8cac37ee5650d79a10af64cb10639ad65 | 4 | {
"blob_id": "f9eb1ff8cac37ee5650d79a10af64cb10639ad65",
"branch_name": "refs/heads/master",
"committer_date": 1657255346000,
"content_id": "fc0b47dacdf6241962ec6b7637470567fe07dee3",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "c270d9ad39c5be7a4cfc2713204cd5cdc293fbc2",
"extension": "p... | 3.5 | stackv2 | # Human readable duration format
import re
def format_duration_unit(seconds):
print(seconds)
if seconds < 60:
if seconds == 0:
return "now"
elif seconds == 1:
return "1 second"
else:
return "{} seconds".format(seconds)
elif seconds >= 60 and seconds < 3600:
mins = seconds // 60
if mins == 1:
... | 59 | 28 | 84 | 19 | 575 | python | [{"finding_id": "codeql_py/overly-large-range_50bd7836070b833f_5f03baea", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
44
] | [
null
] | [
32
] | [
35
] | |
2024-11-18T21:23:17.939359+00:00 | 1,633,618,818,000 | 42f05c20cc9a50d2149e6d7e262c84d447502d4d | 2 | {
"blob_id": "42f05c20cc9a50d2149e6d7e262c84d447502d4d",
"branch_name": "refs/heads/main",
"committer_date": 1633618818000,
"content_id": "f4985c3fd788318641ec96ed70272c093092f8f3",
"detected_licenses": [
"MIT"
],
"directory_id": "7f43f1aa6cbc42141ad5099f5cfdf593c99685fd",
"extension": "py",
"file... | 2.453125 | stackv2 | import importlib
paramiko_found = importlib.find_loader("paramiko")
scp_found = importlib.find_loader("scp")
if paramiko_found != None and scp_found != None:
import os
import paramiko
from scp import SCPClient
from Components.status_bar import StatusBar
class ScpConnect:
def __init__(self):
pass
def __e... | 69 | 26.3 | 73 | 17 | 485 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_9c02ebc5b4868b43_533ad43d", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
38
] | [
null
] | [
7
] | [
67
] | |
2024-11-18T21:51:32.151796+00:00 | 1,490,910,242,000 | 5e774b857f09bde4c3c8b247b916d07fe4ad825b | 2 | {
"blob_id": "5e774b857f09bde4c3c8b247b916d07fe4ad825b",
"branch_name": "refs/heads/master",
"committer_date": 1490910242000,
"content_id": "bb014f43f6b6f6eb56d0ea95888073e3c4e0cbb2",
"detected_licenses": [
"MIT"
],
"directory_id": "c9ff9e2fb8f090241c4e6ecae02733f600209303",
"extension": "py",
"fi... | 2.3125 | stackv2 | from flask import Flask,session, request, flash, url_for, redirect, render_template, abort ,g
from flask.ext.login import login_user , logout_user , current_user , login_required
from flask.ext.sqlalchemy import SQLAlchemy
db = SQLAlchemy()
app = Flask(__name__)
app.config['SECRET_KEY'] = 'secret_key'
from flask.... | 93 | 27.08 | 93 | 13 | 578 | python | [{"finding_id": "codeql_py/url-redirection_104b1979d8b9e3f2_f2b9eeb3", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
78
] | [
null
] | [
21
] | [
65
] | |
2024-11-18T21:51:32.275082+00:00 | 1,615,842,249,000 | fac9327c274e45aef9958a4a946b7b88b1dabfaf | 3 | {
"blob_id": "fac9327c274e45aef9958a4a946b7b88b1dabfaf",
"branch_name": "refs/heads/main",
"committer_date": 1615842249000,
"content_id": "1a5dd090b9b390155727fa6455c00183f598afae",
"detected_licenses": [
"MIT"
],
"directory_id": "415016fa20b50ee2094d1957c70988831a5fc29c",
"extension": "py",
"file... | 2.6875 | stackv2 | import os
from flask import Flask, request, make_response, redirect, url_for, send_from_directory
from werkzeug.utils import secure_filename
from convert import convert_file
from cleanup import cleanup
with open('template.html', 'r') as inp:
template = inp.read()
app = Flask(__name__)
app.config['upload_folde... | 74 | 33.3 | 95 | 16 | 597 | python | [{"finding_id": "codeql_py/reflective-xss_b711d4e1eb51aa04_74d9094b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-022"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
42,
50,
58
] | [
null,
52,
null
] | [
13,
12,
27
] | [
73,
64,
55
] | |
2024-11-18T21:51:34.380204+00:00 | 1,529,056,139,000 | 63a882429299d1b71de1647dd01ac3d827fbd20c | 2 | {
"blob_id": "63a882429299d1b71de1647dd01ac3d827fbd20c",
"branch_name": "refs/heads/master",
"committer_date": 1529056139000,
"content_id": "9c2b4597ad00e12d42dd864623e0a7462ef8c2f1",
"detected_licenses": [
"MIT"
],
"directory_id": "dd780f4fe3b0a4bf92a3661fecd5e10234fc3e91",
"extension": "py",
"fi... | 2.46875 | stackv2 | #!/usr/bin/env python
import logging
from ansiblerunner import AnsibleRunner
from flask import Flask, request, jsonify
app = Flask(__name__)
LOCALLOGS = True
PRIVATE_KEY = '/etc/ssh/id_rsa_ansible'
REMOTE_USER = 'root'
MODULE_PATH = '/var/www/library'
@app.route("/", methods=['GET'])
def index():
host = reque... | 46 | 29.59 | 105 | 19 | 338 | python | [{"finding_id": "codeql_py/stack-trace-exposure_b53e21726aa62eed_9ae784e1", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
37
] | [
null
] | [
24
] | [
57
] | |
2024-11-18T21:51:37.552365+00:00 | 1,371,134,213,000 | 7d1da65d20b68ef2cba9da4ce0723bb49779e024 | 3 | {
"blob_id": "7d1da65d20b68ef2cba9da4ce0723bb49779e024",
"branch_name": "refs/heads/master",
"committer_date": 1371134213000,
"content_id": "3424489a0129da0255abaccb4bb3654f47f06bb1",
"detected_licenses": [
"MIT"
],
"directory_id": "62ca557e4a899986955ba0d19c155f6d86158491",
"extension": "py",
"fi... | 3.140625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import csv
sortie = open("output.csv", "a")
with open('donnees-nantes.csv', 'rb') as f:
csvfile = csv.reader(f, delimiter=';')
for row in csvfile:
line = ','.join(row)
latitudeDMS = line.split(',')[0].replace("N","")
longitudeDMS = line.split(',')[1].replace("O"... | 31 | 35.23 | 78 | 20 | 376 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_acf61b2a3d4c5c92_4f6835d6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
15
] | [
null
] | [
9
] | [
78
] | |
2024-11-18T21:51:40.830069+00:00 | 1,576,373,862,000 | 29702c0d58d5068c90d21b9f3d83bde3b3eba6b8 | 4 | {
"blob_id": "29702c0d58d5068c90d21b9f3d83bde3b3eba6b8",
"branch_name": "refs/heads/master",
"committer_date": 1576449357000,
"content_id": "f09546930ca14262bca2983c568f117cf98c04a2",
"detected_licenses": [
"MIT"
],
"directory_id": "b2ee2014a5768509f0506c6f74ee966a34efdcfc",
"extension": "py",
"fi... | 3.609375 | stackv2 | """
diceware main module
"""
import os
import sys
import argparse
import re
import random
import password
my_parser = argparse.ArgumentParser(prog='diceware', description='''
Create a passphrase based on the diceware standard.
Use the "-i" flag to modify the password in real time.
If you would rather... | 80 | 37.71 | 171 | 13 | 774 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d1a9280bcfabb6bf_7be4ff94", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
55,
78
] | [
null,
null
] | [
15,
11
] | [
72,
68
] | |
2024-11-18T21:52:04.063265+00:00 | 1,567,784,686,000 | 4833a3764fd72b2fb29c87c10279a4e22deaa1e2 | 3 | {
"blob_id": "4833a3764fd72b2fb29c87c10279a4e22deaa1e2",
"branch_name": "refs/heads/master",
"committer_date": 1567784686000,
"content_id": "5b73464624fac3806c7fdf2ac2c77c12b63b2131",
"detected_licenses": [
"MIT"
],
"directory_id": "787f9ea84406d0780c34e72cf42d1dccc401f783",
"extension": "py",
"fi... | 2.671875 | stackv2 | # Copyright (c) 2019, Anders Lervik.
# Distributed under the MIT License. See LICENSE for more info.
"""Create a website with the folium map and precipitation info."""
import datetime
import os
import jinja2
from normetapi import location_forecast
from frostapi import get_precipitation_observations
from read_xml import... | 173 | 30.28 | 75 | 14 | 1,254 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c020dd39a31aacb5_35437901", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
64
] | [
66
] | [
11
] | [
6
] | |
2024-11-18T22:02:40.782391+00:00 | 1,560,497,142,000 | 8cfc94c3fb3148d32950a8ff8d449766435eeb1c | 2 | {
"blob_id": "8cfc94c3fb3148d32950a8ff8d449766435eeb1c",
"branch_name": "refs/heads/master",
"committer_date": 1560497142000,
"content_id": "da0cdb3534eb7e19e1d0dd25e615d88a0f65dbb1",
"detected_licenses": [
"MIT"
],
"directory_id": "3eff0a8b4b6f2d3bf7e74df184dbd879e84abef3",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/python3
import re
from lxml import html
import HTMLInfo
class BBPrice(object):
def __init__(self, url):
self.url = url
r = HTMLInfo.get_html(url)
if r.encoding:
self.html = r.content.decode(r.encoding)
else:
self.html = r.content.decode('utf-8'... | 99 | 34.63 | 160 | 18 | 861 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_1e1debe9bae7eefc_95f4408e", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'beibei.com/detail', so it might mat... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'beibei.com/detail', so it might match more hosts than expected."
] | [
28
] | [
null
] | [
54
] | [
75
] | |
2024-11-18T22:02:45.071604+00:00 | 1,622,563,958,000 | 342679ed5186ed1c346011b5b9aa3ee60dd96b0a | 3 | {
"blob_id": "342679ed5186ed1c346011b5b9aa3ee60dd96b0a",
"branch_name": "refs/heads/main",
"committer_date": 1622563958000,
"content_id": "6d3c1cbb43b076618a274b2778fe0d062d33d684",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c87adbd599cbc703b450763b507ce2749a5e287a",
"extension": "py",
... | 3.09375 | stackv2 | import requests
#Utilizamos la funcion get para realizar llamadas a microservicios en modo GET
url = 'http://api.open-notify.org/iss-now.json'
response = requests.get(url)
print('Código de estado: ', response.status_code)
print('Estado:', response.reason)
if(response.status_code == 200):
print('Cabeceras:', res... | 24 | 34.25 | 78 | 12 | 190 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8f14d193eaa08709_8f8be1a0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
16,
17
] | [
null,
null
] | [
26,
27
] | [
58,
60
] | |
2024-11-18T22:02:50.399333+00:00 | 1,543,089,066,000 | f6c9a878ae87a478f0074864f5e9567d2de9c2bb | 3 | {
"blob_id": "f6c9a878ae87a478f0074864f5e9567d2de9c2bb",
"branch_name": "refs/heads/master",
"committer_date": 1543089066000,
"content_id": "a88550fad1a5920956950bbd1f1814f3e4e24993",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3a6577c166d80af66b76957e4037d36cfdd5bbff",
"extension": "py"... | 3.046875 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""
@author: djokester
Samriddhi Sinha,
IIT Kharagpur
"""
from keras.models import Sequential
from keras.layers import Dense, Dropout
from keras.layers import Embedding
from keras.layers import Conv1D, GlobalAveragePooling1D, MaxPooling1D
import numpy as np
import lingata... | 237 | 31.07 | 160 | 20 | 2,621 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f91351829b243a22_9e0b49bc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
235,
236
] | [
null,
null
] | [
11,
11
] | [
28,
36
] | |
2024-11-18T22:16:39.232565+00:00 | 1,653,773,830,000 | 697573fdfc95da8f266f80f1f0515cd595419e49 | 3 | {
"blob_id": "697573fdfc95da8f266f80f1f0515cd595419e49",
"branch_name": "refs/heads/master",
"committer_date": 1653773830000,
"content_id": "656fbd361943446b211963d3ec39c478de72f544",
"detected_licenses": [
"Unlicense"
],
"directory_id": "0b2686498cc93894141e96164a9c4955a6d33084",
"extension": "py",... | 2.96875 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
# author Serj Sintsov <ssivikt@gmail.com>, 2010, Public Domain.
"""This script adds key-value pair line to the file encrypted by GPG
"""
import os
import sys
import shutil
import uuid
import subprocess
import getpass
SOURCE_PWDS_FILE_PATH = sys.argv[0]
SOURCE_PWDS_FILE_COPY_... | 107 | 25.29 | 117 | 12 | 697 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_630f26dab4e9721b_5a62ec3b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text."
] | [
29
] | [
null
] | [
17
] | [
60
] | |
2024-11-18T22:16:40.100345+00:00 | 1,591,715,166,000 | d7dcbc9b4cb85adb6baa51e04ec922b16650de7a | 2 | {
"blob_id": "d7dcbc9b4cb85adb6baa51e04ec922b16650de7a",
"branch_name": "refs/heads/master",
"committer_date": 1591715166000,
"content_id": "704bc1a63d9edc86e93ace1800e3ad4211f29cad",
"detected_licenses": [
"MIT"
],
"directory_id": "d3f5fa016ea56fda1ab9ccf768b7680c01030895",
"extension": "py",
"fi... | 2.453125 | stackv2 | import datetime
import zlib
import hashlib
import os
from imgid.img2b64 import img2b64
from imgid.img_api import face
import sqliteDB
def db(respond, json, img_hash, bytes_img):
for i in range(0, respond['result']['face_num']):
faceContent = (
respond['result']['face_list'][i]['face_token'],
... | 80 | 35.35 | 75 | 15 | 693 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ef58d10b0d177f61_388971a9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
31
] | [
null
] | [
15
] | [
26
] | |
2024-11-18T22:27:48.458460+00:00 | 1,446,238,150,000 | 0b085074babbea6be6039d99c092720fe5f8266e | 2 | {
"blob_id": "0b085074babbea6be6039d99c092720fe5f8266e",
"branch_name": "refs/heads/master",
"committer_date": 1446238150000,
"content_id": "2446583fa8c8d87640aeeee29d0229463cd15e83",
"detected_licenses": [
"MIT"
],
"directory_id": "4732e8a2ac024971f5cda5631c2faaca0abf24f1",
"extension": "py",
"fi... | 2.484375 | stackv2 | from faker import Factory
from random import random, randint
from datetime import date, timedelta
import psycopg2
import getpass
from decimal import Decimal
import bcrypt
ff = Factory.create()
def generate_users(cursor):
min_users = 10
max_users = 100
num_users = randint(min_users, max_users)
ofile = open('... | 78 | 25.71 | 144 | 18 | 591 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b3c87eb20ffc2992_80211ead", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
39
] | [
null
] | [
17
] | [
69
] | |
2024-11-18T22:28:15.433968+00:00 | 1,373,327,886,000 | 7e74029238ca12ff6f94bea6ec429d1653a7f146 | 2 | {
"blob_id": "7e74029238ca12ff6f94bea6ec429d1653a7f146",
"branch_name": "refs/heads/master",
"committer_date": 1373327886000,
"content_id": "72246ccecbd667c71700f16c7fa4cd3cb364c2e2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e885cee8e119c0a486ca50bf822bb1003772a7f5",
"extension": "py"... | 2.34375 | stackv2 |
import functools
import logging
import string
import random
import urllib
import time
import re
from flask import current_app, request, session
import simplejson as json
import requests
import config
import storage
logger = logging.getLogger(__name__)
def response(data=None, code=200, headers=None, raw=False):
... | 173 | 32.92 | 79 | 16 | 1,318 | python | [{"finding_id": "codeql_py/polynomial-redos_688e14997a9661d7_6915a206", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma... | 5 | true | [
"CWE-1333",
"CWE-918",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/polynomial-redos",
"py/partial-ssrf",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'.",
"Part of the URL of this request depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value]... | [
108,
74,
107,
109,
118
] | [
null,
null,
null,
null,
120
] | [
35,
12,
18,
18,
26
] | [
39,
59,
49,
43,
69
] | |
2024-11-18T22:44:03.815665+00:00 | 1,587,631,368,000 | dc1d5ed995d0fe051aa07d9f846c5f5317dab15f | 3 | {
"blob_id": "dc1d5ed995d0fe051aa07d9f846c5f5317dab15f",
"branch_name": "refs/heads/master",
"committer_date": 1596607541000,
"content_id": "b4a636981a2b6c50462614ff06b0e8a3801574e6",
"detected_licenses": [
"MIT"
],
"directory_id": "e8d7ea855acd8f7ce147ff33c0dce10a43cc6228",
"extension": "py",
"fi... | 2.625 | stackv2 | import abc
import os
from hashlib import md5, sha1
import hkdf
from Crypto.Cipher import AES, ARC4, ChaCha20, ChaCha20_Poly1305, Salsa20
class BaseCipher:
def __init__(self, password: str):
self.master_key = self._get_key(password.encode("ascii", "ignore"))
def _get_key(self, password: bytes, salt: ... | 214 | 23.41 | 86 | 21 | 1,527 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_8724242b44b92fd5_48076c02", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.\n[T... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.\n[The cryptographic algorithm ARC4](2) is broken or weak, and should not be used.\n[The cryptographic algorithm ARC4](3) is broken or weak, and should not be used.\n[The cryptographic algorithm ARC4](4) is broken or weak, and should n... | [
146,
154,
17
] | [
null,
null,
null
] | [
20,
20,
21
] | [
45,
46,
70
] | |
2024-11-18T22:44:06.457591+00:00 | 1,559,357,086,000 | 4638b16dd4fa5720330ae0ef89d68d9160a0dcff | 3 | {
"blob_id": "4638b16dd4fa5720330ae0ef89d68d9160a0dcff",
"branch_name": "refs/heads/master",
"committer_date": 1559357086000,
"content_id": "db84f404524978626955480d9b77dfb1efb457c9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f5bb048e946f7ca8cc5d84eba2887696fae2b231",
"extension": "py"... | 2.875 | stackv2 | import re
import jieba
import pymysql
from docx import Document
from docx.shared import RGBColor
def cutword(word, baike):
word = re.sub(r"[0-9\s+\.\!\/_,$%^*()?;;:-【】+\"\']+|[——!,;:。?、~@#¥%……&*()]+", "", word)
baike = re.sub(r"[0-9\s+\.\!\/_,$%^*()?;;:-【】+\"\']+|[——!,;:。?、~@#¥%……&*()]+", "", baike)
seg_... | 61 | 28.31 | 100 | 15 | 579 | python | [{"finding_id": "codeql_py/overly-large-range_5851bd045d084350_76d57732", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-z{{|}}~\\u007f\\u0080\\... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-z{{|}}~\\u007f\\u0080\\u0081\\u008....",
"Suspicious character range that is equivalent to \\[:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-z{{|}}~\\u007f\\u0080\\u0081\\u008...."
] | [
10,
11
] | [
null,
null
] | [
45,
46
] | [
48,
49
] | |
2024-11-18T22:44:07.376650+00:00 | 1,664,993,530,000 | 87731ecb2b2fce0a42675b1b614fb9d9aeb7747c | 2 | {
"blob_id": "87731ecb2b2fce0a42675b1b614fb9d9aeb7747c",
"branch_name": "refs/heads/master",
"committer_date": 1664993530000,
"content_id": "57aa5cb15ceb31e80fd3e949c85a9345867618fa",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d386e3eab34a68973b3b6578e48d3fc96f74afa0",
"extension": "py"... | 2.4375 | stackv2 | import getpass
import os
import re
import urllib
import sys
try:
import json
except ImportError:
import simplejson
json = simplejson
try:
import urllib2
except ImportError:
import urllib.request
# This usage is generally correct for this script
urllib2 = urllib.request
have_argparse = Tru... | 180 | 35.28 | 127 | 14 | 1,477 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b8bffb4b90a89ba9_da50048a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive dat... | [
174,
93,
101,
79,
89
] | [
null,
null,
null,
null,
null
] | [
17,
19,
26,
23,
19
] | [
37,
53,
50,
32,
28
] | |
2024-11-18T22:44:07.623368+00:00 | 1,569,185,769,000 | 95b582cee1273f4b63a178bbe1182160305c9015 | 2 | {
"blob_id": "95b582cee1273f4b63a178bbe1182160305c9015",
"branch_name": "refs/heads/master",
"committer_date": 1569185769000,
"content_id": "10d3557f4f5449640334b9219061f707b9e7bf7d",
"detected_licenses": [
"MIT"
],
"directory_id": "b9a7b4add18213e3754b569bdd1fc0fb2f2e9ad5",
"extension": "py",
"fi... | 2.40625 | stackv2 | ## HOMESCAN TOOLS: device state
## (c) Copyright Si Dunford, Aug 2019
## Version 1.1.0
# Imports
import os,sys,traceback,platform,subprocess
import time
import socket
import paho.mqtt.client as pahomqtt
import json
from lib.settings import settings
from lib.shared import *
# Device list
devices = {}
# Columns to di... | 128 | 33.43 | 135 | 17 | 1,088 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ecc273c338f94307_aeff1b8c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
84
] | [
null
] | [
16
] | [
73
] | |
2024-11-18T22:44:10.363640+00:00 | 1,446,031,410,000 | e9116fad1d64bc1a873723a4014636db59fba441 | 2 | {
"blob_id": "e9116fad1d64bc1a873723a4014636db59fba441",
"branch_name": "refs/heads/master",
"committer_date": 1446031410000,
"content_id": "bc96a177cecdd59cf932e6766e5e8747c6204b6a",
"detected_licenses": [
"MIT"
],
"directory_id": "2989a71ec18a53043e57bb5bd94e31011fb2a368",
"extension": "py",
"fi... | 2.34375 | stackv2 | from django.shortcuts import render, get_object_or_404
from django.contrib.auth import authenticate, login, logout
from django.http import HttpResponseRedirect
from django.contrib.auth.decorators import login_required
from django.utils import timezone
from .models import Post
from markdown import markdown
import re
# C... | 74 | 33.39 | 90 | 15 | 568 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_99cce1c6ce10a892_9eb221fd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
64
] | [
null
] | [
25
] | [
33
] | |
2024-11-18T20:24:15.288382+00:00 | 1,610,114,466,000 | 06acc270e2b49c77a3b2db39e645e5861ad020c9 | 2 | {
"blob_id": "06acc270e2b49c77a3b2db39e645e5861ad020c9",
"branch_name": "refs/heads/main",
"committer_date": 1610114466000,
"content_id": "1ad0710f8745b97053aa74463d35ef980b2c821b",
"detected_licenses": [
"MIT"
],
"directory_id": "a7bdb38ef0b9b5982ea1e55cda1a3629efeb4875",
"extension": "py",
"file... | 2.421875 | stackv2 | import datetime
import hashlib
from django.conf import settings
from django.db.models import Q
from django.shortcuts import render, redirect
from account import forms
from account.models import User, ConfirmString
ip = '118.25.108.254:80'
def _makesure_password(pd1, pd2):
"""
确认两个密码一样且符合规格
Parameter:
... | 269 | 28.64 | 97 | 18 | 1,913 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_cfb12bdd0c772c34_c789fc90", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
47
] | [
null
] | [
14
] | [
24
] | |
2024-11-18T21:00:09.641345+00:00 | 1,688,139,733,000 | fb421e4836c5d359e734df79133b4ee11be24683 | 2 | {
"blob_id": "fb421e4836c5d359e734df79133b4ee11be24683",
"branch_name": "refs/heads/master",
"committer_date": 1690205730000,
"content_id": "d8aeacc11943fae3887dd3368433080355d7f26a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "54df06e1c0cdda4445838d203334d0615bd2cd40",
"extension": "py"... | 2.46875 | stackv2 | ##
## Copyright (c) 2019 Intel Corporation
##
## Licensed under the Apache License, Version 2.0 (the "License");
## you may not use this file except in compliance with the License.
## You may obtain a copy of the License at
##
## http://www.apache.org/licenses/LICENSE-2.0
##
## Unless required by applicable law or ... | 164 | 29.19 | 103 | 17 | 1,135 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_981f7c22da3339a0_da069e5e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
71
] | [
null
] | [
9
] | [
72
] | |
2024-11-18T21:00:28.995813+00:00 | 1,693,880,197,000 | 6a60e3515e8886a878fd5e342b63ba80192f49ff | 2 | {
"blob_id": "6a60e3515e8886a878fd5e342b63ba80192f49ff",
"branch_name": "refs/heads/master",
"committer_date": 1693880197000,
"content_id": "061a6d5aaca0ea836974fa1a9ce0dcf02ff8a91f",
"detected_licenses": [
"MIT"
],
"directory_id": "7b8f1903ca25b20f2d62c8a49222e9ae9c3cb35b",
"extension": "py",
"fi... | 2.5 | stackv2 | # A script to create stripped down rst files containing only exercises and AV for each module
import os
import re
print("WARNING: This file seems unused and obsolete.")
print("WARNING: If this is not so, then remove this warning from:", __file__)
input("Press enter to continue...")
rst_dir = os.path.realpath(os.path... | 108 | 39.09 | 107 | 27 | 1,012 | python | [{"finding_id": "codeql_py/redos_1146e4b1b0a4dd8b_ccde8748", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '.. avembed:: ' and containing man... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '.. avembed:: ' and containing many repetitions of '!/'."
] | [
12
] | [
null
] | [
50
] | [
56
] | |
2024-11-18T21:00:29.742318+00:00 | 1,676,139,610,000 | df98fdaf119b355e440e5d222316a5da0897d818 | 3 | {
"blob_id": "df98fdaf119b355e440e5d222316a5da0897d818",
"branch_name": "refs/heads/master",
"committer_date": 1676139610000,
"content_id": "7c6f7a079b2b6e43b60f5ebd19932f9c7a47a889",
"detected_licenses": [
"MIT"
],
"directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9",
"extension": "py",
"fi... | 2.6875 | stackv2 | from lxml import html
import csv
import os
import requests
from exceptions import ValueError
from time import sleep
from random import randint
def parse(url):
headers = {
'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.90 Safari/537.36'
}
... | 95 | 38.21 | 161 | 22 | 907 | python | [{"finding_id": "codeql_py/request-without-cert-validation_94ec77ff8cabd42a_73bfe11a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
20
] | [
null
] | [
24
] | [
72
] | |
2024-11-18T21:00:59.110100+00:00 | 1,509,281,904,000 | ec5fb2c06085752982a4523deaff6ee3a53d07b7 | 2 | {
"blob_id": "ec5fb2c06085752982a4523deaff6ee3a53d07b7",
"branch_name": "refs/heads/master",
"committer_date": 1509281904000,
"content_id": "bb7f04fc82a26be8f17b804957c3fb1be0d177aa",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "dc2d97fbe7b6ffb5170b32faa49748f44c827362",
"extension": "py"... | 2.46875 | stackv2 | from flask import Flask, render_template, url_for, redirect, request
from crudClass import Team
import sqlite3, os
app = Flask(__name__)
@app.route('/test')
def hello_world():
return "working Success"
@app.route("/editTeam/<string:teamName>/", methods=["GET", "POST"])
def editTeam(teamName):
conn = sqlite3... | 298 | 38.18 | 152 | 17 | 2,539 | python | [{"finding_id": "codeql_py/code-injection_287e6df0671a5cec_9e267e98", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 3 | true | [
"CWE-094",
"CWE-094",
"CWE-215"
] | [
"py/code-injection",
"py/code-injection",
"py/flask-debug"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1).",
"This code execution depends on a [user-provided value](1).",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
45,
69,
298
] | [
null,
null,
null
] | [
37,
37,
5
] | [
68,
68,
53
] | |
2024-11-18T21:01:14.524202+00:00 | 1,682,991,058,000 | 8d37e116fcca0fc27807326add6b7e690eea61e1 | 3 | {
"blob_id": "8d37e116fcca0fc27807326add6b7e690eea61e1",
"branch_name": "refs/heads/master",
"committer_date": 1682991058000,
"content_id": "cfd84ad81737aff5700cb2c6fcce9d1728be21ec",
"detected_licenses": [
"MIT"
],
"directory_id": "64d6ee3b481be3a5c0c29ed5944e9fa6e6f5312f",
"extension": "py",
"fi... | 2.734375 | stackv2 | import logging
from config.spring import create_config_client
from flask import Flask, render_template, flash, request
from wtforms import Form, TextField, TextAreaField, validators, StringField, SubmitField
import grpc
import tensorflow as tf
from tensorflow_serving.apis import predict_pb2
from tensorflow_serving.... | 71 | 34.83 | 88 | 16 | 530 | python | [{"finding_id": "codeql_py/log-injection_112295453001391f_1097f423", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
29
] | [
null
] | [
27
] | [
31
] | |
2024-11-18T21:01:20.445437+00:00 | 1,462,913,604,000 | 64ca40b2cbca935ab8fe61b7988216e9aa9dda94 | 3 | {
"blob_id": "64ca40b2cbca935ab8fe61b7988216e9aa9dda94",
"branch_name": "refs/heads/master",
"committer_date": 1462913604000,
"content_id": "241c8d21bb818d709817899146b7390af14d1693",
"detected_licenses": [
"MIT"
],
"directory_id": "9656deb94bdb7e098ad2425282b32edfcbad552f",
"extension": "py",
"fi... | 2.546875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
from __future__ import unicode_literals
import codecs
import json
import os
import re
import sys
from bs4 import BeautifulSoup
from jinja2 import Environment, FileSystemLoader
import requests
from weasyprint import HTML
def fetch_url(url):
url = url.group(0)
try:... | 102 | 30.31 | 77 | 14 | 779 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3f2f6dfe0594e557_ec6a71cd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
67
] | [
null
] | [
7
] | [
56
] | |
2024-11-18T21:01:23.068430+00:00 | 1,606,463,632,000 | fb1c2b6ec28033e76637955a445a68e82bd1010d | 3 | {
"blob_id": "fb1c2b6ec28033e76637955a445a68e82bd1010d",
"branch_name": "refs/heads/main",
"committer_date": 1606463632000,
"content_id": "99ed2bbc310506555f3ded45989cb7e4887c057c",
"detected_licenses": [
"MIT"
],
"directory_id": "b0e28d703c7096dd41ff6a709dce44f22d88ae8e",
"extension": "py",
"file... | 2.875 | stackv2 | """Helper class/methods to GET RESTCONF Config"""
import requests
import warnings
import json
def validate_json(response):
"""Validates JSON from response"""
try:
format_res = json.dumps(response.json(), sort_keys=True, indent=4)
return format_res
except json.JSONDecodeError:
retu... | 137 | 35.04 | 104 | 21 | 1,062 | python | [{"finding_id": "codeql_py/request-without-cert-validation_4026be8282d6a76b_f34ca3a7", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
30,
74,
100,
122
] | [
null,
null,
null,
null
] | [
20,
20,
20,
20
] | [
95,
95,
95,
95
] | |
2024-11-18T21:25:36.600193+00:00 | 1,504,403,945,000 | fe0e76de69247fe8d15271695f43e03f245e23e9 | 3 | {
"blob_id": "fe0e76de69247fe8d15271695f43e03f245e23e9",
"branch_name": "refs/heads/master",
"committer_date": 1504403945000,
"content_id": "f2e21d09e898c280a4cdfa4a8e43f5216fe70f87",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "c967eaffe4747f15a8dfc91bef0082db56dd64fe",
"extension": "p... | 2.609375 | stackv2 | import os
from jinja2 import Environment, FileSystemLoader
TMPL_DIR = os.path.join(os.path.abspath(os.path.dirname(__file__)),
'./templates')
env = Environment(loader=FileSystemLoader(searchpath=TMPL_DIR))
tmpl = env.get_template('gallery.html')
class Gallery:
def __init__ (self, path, ext = '.png... | 32 | 26.03 | 67 | 15 | 207 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a2fc260d005a0ae7_b509319a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
6
] | [
null
] | [
7
] | [
64
] | |
2024-11-18T21:25:39.655248+00:00 | 1,622,793,358,000 | acddf510d2237a63b4cb573018f72ebeaf73d172 | 3 | {
"blob_id": "acddf510d2237a63b4cb573018f72ebeaf73d172",
"branch_name": "refs/heads/main",
"committer_date": 1622793358000,
"content_id": "9f22a55683d569d6ff856c1d371e49c063f663ed",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3062888f048b02f2551ade779a915bd62dd0700e",
"extension": "py",
... | 2.546875 | stackv2 | """
Copyright 2021 Google LLC
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
https://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
d... | 119 | 31.58 | 102 | 15 | 903 | python | [{"finding_id": "codeql_py/request-without-cert-validation_cf9b4313445814bb_6ec57ea0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
46
] | [
47
] | [
12
] | [
89
] | |
2024-11-18T21:51:13.942995+00:00 | 1,501,140,634,000 | b87bcc193210ca063465d6c03af31591cf9c371d | 3 | {
"blob_id": "b87bcc193210ca063465d6c03af31591cf9c371d",
"branch_name": "refs/heads/master",
"committer_date": 1501140634000,
"content_id": "4ac241e3ae42e3d4b30b70e77be2ad855c8ecfd5",
"detected_licenses": [
"MIT"
],
"directory_id": "7134bed859eef1018ed53110dbc7ad42f70c98c9",
"extension": "py",
"fi... | 2.609375 | stackv2 | from flask import Flask, request, abort, send_from_directory
from flask_cors import CORS
import time
import json
import random
import threading
import http.client
from collections import defaultdict
app = Flask(__name__)
CORS(app)
# Storage
# Log contains tuples of (simulated event time, name, success)
log = []
#... | 234 | 20.34 | 86 | 15 | 1,354 | python | [{"finding_id": "codeql_py/reflective-xss_a9d959f28645f042_d4ea2893", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 4 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
41,
45,
141,
149
] | [
null,
null,
null,
null
] | [
9,
9,
9,
9
] | [
23,
24,
29,
26
] | |
2024-11-18T22:00:18.002670+00:00 | 1,633,216,552,000 | 4958d507a9ff2ce31a68a472826f9620ba560b17 | 3 | {
"blob_id": "4958d507a9ff2ce31a68a472826f9620ba560b17",
"branch_name": "refs/heads/main",
"committer_date": 1633216552000,
"content_id": "1ca05b1de081fe56bdb4bcb8f72f89de838b0929",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "555ed89762eca7d9d303cdc62cf82409b4a2acb3",
"extension": "py",
... | 3.015625 | stackv2 | """PyPI-related functionality"""
import ast
import subprocess
import urllib
from urllib.parse import urlparse
import requests
import requirements
def python_requirements_dot_text_analysis(filepath):
"""Execute overall analysis of Python's requirements.txt
Combines python-related functionality to perform e... | 191 | 27.76 | 83 | 16 | 1,232 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_f2a95d9c3d06935e_fd7aebd4", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The string [github.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [github.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [github.com](1) may be at an arbitrary position in the sanitized URL."
] | [
158,
164,
171
] | [
null,
null,
null
] | [
8,
16,
16
] | [
58,
35,
37
] | |
2024-11-18T22:00:46.202959+00:00 | 1,665,552,044,000 | c8bc78b7f8f820450bad1495fcda0f88be630d27 | 2 | {
"blob_id": "c8bc78b7f8f820450bad1495fcda0f88be630d27",
"branch_name": "refs/heads/main",
"committer_date": 1665552044000,
"content_id": "34f0924ab1158b5c065c805eb46208333bd050c2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "75862eb85172f09b1c48e25c82846e2981427613",
"extension": "py",
... | 2.40625 | stackv2 | # flake8: noqa
# pylint: skip-file
import argparse
import os
import sys
from datetime import datetime
from os.path import expanduser
import requests
import urllib3
import yaml
from colorama import Back, Fore, Style
from jinja2 import Template
urllib3.disable_warnings()
def create_http_session(general_config):
s... | 344 | 32.03 | 120 | 17 | 2,608 | python | [{"finding_id": "codeql_py/request-without-cert-validation_7f6d0b07e5b624e4_d3dbbdcb", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-079"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
63,
78,
102
] | [
null,
null,
null
] | [
9,
9,
20
] | [
61,
73,
41
] | |
2024-11-18T22:01:02.355060+00:00 | 1,470,856,242,000 | c81635f06a4c8cc5aa22c3e5303af8fd955f3789 | 3 | {
"blob_id": "c81635f06a4c8cc5aa22c3e5303af8fd955f3789",
"branch_name": "refs/heads/master",
"committer_date": 1470856242000,
"content_id": "85316e607d1733d261cc4d2a9ee076976489e68d",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "ceca9e9726946c3216cd29009874df2ef12b081b",
"extension": "p... | 2.78125 | stackv2 | #!/usr/bin/python
'''
BetterParse
Author: Sebastian 'Sebass' Ausitn
Email: pensec31337@gmail.com
'''
import re
import os
import sys, traceback
def main():
try:
if (sys.argv[1] == None):
filePath = raw_input("Enter the path to Bettercap output log: ")
else:
filePath = sys.argv[1]
if not (os.path.is... | 52 | 25.6 | 90 | 21 | 404 | python | [{"finding_id": "codeql_py/overly-large-range_375907d78634bd36_099aee10", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in the same character class, and is equivalent to \\[.\\/0-9:;<=>?@A-Z\\\\[\\]."
] | [
23
] | [
null
] | [
32
] | [
35
] | |
2024-11-18T22:15:00.968060+00:00 | 1,627,194,391,000 | 8bb3edf5338c17ffcc04bc3877721a3c2131905a | 2 | {
"blob_id": "8bb3edf5338c17ffcc04bc3877721a3c2131905a",
"branch_name": "refs/heads/master",
"committer_date": 1627194391000,
"content_id": "a0ee1832eb4dd85fbab26f9b14f44ace4c51bb60",
"detected_licenses": [
"MIT"
],
"directory_id": "03c38cbca59c3dc7e319b45bacdb6ab3d07adff1",
"extension": "py",
"fi... | 2.34375 | stackv2 | """:mod:`SDB` -- Represents a Neopets user account
.. module:: SDB
:synopsis: Represents a Neopets user account
.. moduleauthor:: Joshua Gilman <joshuagilman@gmail.com>
"""
from neolib.exceptions import logoutException
from neolib.exceptions import neopetsOfflineException
from neolib.exceptions import noCookiesFor... | 352 | 34.43 | 138 | 21 | 2,712 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_288f70b1d698ebb0_025f982c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is in... | [
237,
341
] | [
null,
null
] | [
33,
33
] | [
55,
55
] | |
2024-11-18T22:15:01.985891+00:00 | 1,677,754,157,000 | ead5ad5ef0f81666f4e7d29ea6579588c8c7a18f | 3 | {
"blob_id": "ead5ad5ef0f81666f4e7d29ea6579588c8c7a18f",
"branch_name": "refs/heads/master",
"committer_date": 1677754157000,
"content_id": "540e5eb33aeb54d7ada7a84d1a674951110186d4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ea218644f825b97ec378160cd5006eaa17341987",
"extension": "py"... | 2.71875 | stackv2 | # coding=utf-8
import requests
from bs4 import BeautifulSoup
import xlwt
import random
import traceback
import sys
reload(sys)
sys.setdefaultencoding('utf8')
def request_douban(url):
try:
ua_list = [
"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv2.0.1) Gecko/20100101 Firefox/4.0.1",
... | 90 | 33.34 | 155 | 17 | 977 | python | [{"finding_id": "codeql_py/request-without-cert-validation_502be1b85fec99ac_6b4dc5fa", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
27
] | [
null
] | [
20
] | [
72
] | |
2024-11-18T22:15:06.224351+00:00 | 1,632,492,475,000 | 74181191fbeb7a0048e664a976de65d28205339c | 2 | {
"blob_id": "74181191fbeb7a0048e664a976de65d28205339c",
"branch_name": "refs/heads/master",
"committer_date": 1632492475000,
"content_id": "91e7d3b2c3739804c2fc0f4a4a03f20000340809",
"detected_licenses": [
"MIT"
],
"directory_id": "92d98da8055f1a598b8349286d095be54b11ee0f",
"extension": "py",
"fi... | 2.375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""CLI for generating the JSON file expected by the pathway visualiser."""
__author__ = 'Thomas Duigou'
__license__ = 'MIT'
import os
import sys
import json
import logging
import tarfile
import argparse
import tempfile
from pathlib import Path
from rpviz.utils import... | 128 | 37.12 | 116 | 21 | 1,048 | python | [{"finding_id": "codeql_py/tarslip_4ea78f45d8f48683_ae567f71", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
72
] | [
null
] | [
21
] | [
24
] | |
2024-11-18T22:25:58.539122+00:00 | 1,561,116,654,000 | 6f30ba9d42ba4a85926f680913fd891915628b98 | 4 | {
"blob_id": "6f30ba9d42ba4a85926f680913fd891915628b98",
"branch_name": "refs/heads/master",
"committer_date": 1561116654000,
"content_id": "6a138774dc1c58200dbca3789fa2fe21c7ebd1ce",
"detected_licenses": [
"Unlicense"
],
"directory_id": "726ac14281b6c31a5e517b69fbc7eec639e937ea",
"extension": "py",... | 3.953125 | stackv2 | # 创建一个人事系统类
class hrSystem:
# 创建存储员工名字的变量 name
name = ''
# 创建存储员工工资的变量 salary
salary = 0
# 创建存储员工绩效的变量 kpi
kpi = 0
# 定义录入员工信息的类方法
@classmethod
def record(cls, name, salary, kpi):
cls.name = name
cls.salary = salary
cls.kpi = kpi
@classmethod
def check_na... | 63 | 20.51 | 67 | 16 | 443 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a5e47386e36d1fd4_cacc7320", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text."
] | [
32
] | [
null
] | [
19
] | [
44
] | |
2024-11-18T22:26:03.993498+00:00 | 1,544,520,291,000 | 6b8f84a141e7122a3fa200a5fedbd545755d6663 | 2 | {
"blob_id": "6b8f84a141e7122a3fa200a5fedbd545755d6663",
"branch_name": "refs/heads/master",
"committer_date": 1544520291000,
"content_id": "23d227a3c9141bd416228686d72d9c6f22ed1060",
"detected_licenses": [
"MIT"
],
"directory_id": "2d4243149d7a8c2385c24ee331a076c34eefcd38",
"extension": "py",
"fi... | 2.390625 | stackv2 | from datetime import datetime
from flask import Flask
import os
from pardal import get_logger
from peewee import DateTimeField, CharField
from playhouse.flask_utils import FlaskDB
app = Flask(__name__)
app.config.from_object(__name__)
app.config['SECRET_KEY'] = 'super secret key'
app.config['DATABASE'] = f'sqlite:///... | 48 | 25.69 | 65 | 13 | 303 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7cb13673b9a11506_65d1bd8c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text."
] | [
34
] | [
37
] | [
15
] | [
32
] | |
2024-11-18T20:40:03.568321+00:00 | 1,596,695,357,000 | 648dcc41faedf048df423ee1a7017e93691eb436 | 2 | {
"blob_id": "648dcc41faedf048df423ee1a7017e93691eb436",
"branch_name": "refs/heads/master",
"committer_date": 1596695357000,
"content_id": "28faa6a6b6762e7dfc47e040f390185f1a55a71f",
"detected_licenses": [
"MIT"
],
"directory_id": "236e165a501de94113c085b2d651df6e481f5500",
"extension": "py",
"fi... | 2.34375 | stackv2 | from flask import Flask, render_template, request, redirect, url_for, flash
import os
from werkzeug.utils import secure_filename
import getpreds
upload_folder = 'static'
allowed_extensions = ['jpeg' ,'jpg', 'png']
app = Flask(__name__)
app.config['upload_folder'] = upload_folder
app.config["ALLOWED_IMAGE_EXTENSIONS"]... | 51 | 30.14 | 140 | 17 | 393 | python | [{"finding_id": "codeql_py/flask-debug_fa60b1b7a118c59e_d5aa42f7", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-601",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
51,
32,
36
] | [
null,
null,
null
] | [
2,
20,
20
] | [
21,
31,
31
] | |
2024-11-18T21:08:10.175257+00:00 | 1,612,431,998,000 | 710594ed722bbd22558afef200944fa12577f4df | 3 | {
"blob_id": "710594ed722bbd22558afef200944fa12577f4df",
"branch_name": "refs/heads/main",
"committer_date": 1612431998000,
"content_id": "0abdb834eeeb75d0ae25de5887cf287d5164a9a5",
"detected_licenses": [
"MIT"
],
"directory_id": "98e8f725fcdd6c30918149c90c9288cd363676fb",
"extension": "py",
"file... | 2.90625 | stackv2 | import hashlib
from api_token.models import Token
def create_token(request):
"""トークンを作成
"""
username = request.user.username
email = request.user.email
hs = hashlib.md5((username + email).encode()).hexdigest()
return Token.objects.create(token=hs, user=request.user)
def has_token(request):... | 39 | 20.59 | 61 | 14 | 225 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_53a541b1ef6a6671_1698518b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
11
] | [
null
] | [
22
] | [
49
] | |
2024-11-18T21:08:11.157390+00:00 | 1,621,638,175,000 | 9333d318ba64be43e008c273c88a644b299edfe7 | 2 | {
"blob_id": "9333d318ba64be43e008c273c88a644b299edfe7",
"branch_name": "refs/heads/master",
"committer_date": 1621638175000,
"content_id": "534a5c507efe98ec9a3faf8e934fca65eae1c3a0",
"detected_licenses": [
"MIT"
],
"directory_id": "93cda74e95b4d3c37f616d8d4ce0daedea2bc6ad",
"extension": "py",
"fi... | 2.390625 | stackv2 | # standard python imports
import time # fix(clean): remove
import random
import string
import base64
import hashlib
import datetime
# external imports
import bcrypt
from flask import current_app
from sqlalchemy import not_
from sqlalchemy.orm.exc import NoResultFound
# internal imports
from main.app import db
from... | 208 | 35.08 | 149 | 18 | 1,723 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_afa86f5433e52679_c7fe117b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
98
] | [
null
] | [
53
] | [
86
] | |
2024-11-18T21:08:18.889886+00:00 | 1,591,158,463,000 | 6ba546c7c2406b07ee9e2ea115e58a9784c357f6 | 3 | {
"blob_id": "6ba546c7c2406b07ee9e2ea115e58a9784c357f6",
"branch_name": "refs/heads/master",
"committer_date": 1591158463000,
"content_id": "7f3a92147d869b351922a38d168a7826426fbb2d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0d0926a5bdb7890bfdcd8bd7a41353379556baa5",
"extension": "py"... | 2.53125 | stackv2 | #!/usr/bin/env python3
"""
Flask app that walks through a given directory to index
ROM ZIPs and renders web pages using templates.
"""
import json
import os
from datetime import datetime
import arrow
import requests
from flask import (
Flask,
jsonify,
render_template,
)
from utils import get_date_from_zi... | 216 | 26.87 | 88 | 18 | 1,447 | python | [{"finding_id": "codeql_py/full-ssrf_3aca20ab4588f649_d9556f1e", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 4 | true | [
"CWE-918",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/full-ssrf",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
206,
152,
208,
212
] | [
null,
null,
null,
null
] | [
16,
16,
16,
12
] | [
50,
76,
58,
43
] | |
2024-11-18T21:08:22.010759+00:00 | 1,466,043,856,000 | 37ad8ad29f738ac095936497eebaec9811753dcb | 3 | {
"blob_id": "37ad8ad29f738ac095936497eebaec9811753dcb",
"branch_name": "refs/heads/master",
"committer_date": 1466043856000,
"content_id": "d727eb427dd1187b351d58b66a72894213259d02",
"detected_licenses": [
"MIT"
],
"directory_id": "b99853cdb0527bd0a8672fb214f4addfa7ee72cd",
"extension": "py",
"fi... | 2.59375 | stackv2 | """
ssh client for stash. ssh looks for a valid key generated buy ssh-keygen in .ssh.
You can open an interactive shell by not passing a command. If a command is passed,
the single command is ran with output then ssh exits.
Once a valid ssh session has been created the special command pythonista [get|put|edit] file1 [... | 273 | 34.99 | 135 | 22 | 2,175 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_3431933ba1b375ee_3adfbdee", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
87
] | [
null
] | [
9
] | [
71
] | |
2024-11-18T21:08:24.766535+00:00 | 1,553,848,136,000 | bc3deed5ab03138ff589f830f1a9b75f14b4bb3a | 3 | {
"blob_id": "bc3deed5ab03138ff589f830f1a9b75f14b4bb3a",
"branch_name": "refs/heads/master",
"committer_date": 1553848136000,
"content_id": "b445627625919f8fc91fda684fc8d986cbe46531",
"detected_licenses": [
"MIT"
],
"directory_id": "1200d01d4bd1c7f03485ff3f1559535c616e4918",
"extension": "py",
"fi... | 2.625 | stackv2 | # -*- coding: utf-8 -*-
"""NIM REST API Python Client"""
from __future__ import absolute_import
import hashlib
import os
import time
from netease_im import util
__author__ = "Manson Li"
__email__ = "manson.li3307@gmail.com"
class BaseComponent(util.ApiClient):
"""A base component"""
def __init__(self, b... | 85 | 30.41 | 86 | 19 | 663 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_0ce9f9ad80c66274_0843dcd3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
77
] | [
null
] | [
28
] | [
82
] | |
2024-11-18T21:08:29.005657+00:00 | 1,617,033,622,000 | 430d178f7b1fb7c0080c2bc165788c4666e87384 | 3 | {
"blob_id": "430d178f7b1fb7c0080c2bc165788c4666e87384",
"branch_name": "refs/heads/main",
"committer_date": 1617033622000,
"content_id": "709a7fe431d7e41a3ff1ac83a73461b1f736cdff",
"detected_licenses": [
"MIT"
],
"directory_id": "6d5ac9d831244080ce950d7104d3f7e5bc0e3068",
"extension": "py",
"file... | 3.421875 | stackv2 | import time
class CtAquarium:
def __init__(self, emp_name, count_no, entries_val):
self.store_name = "CT AQUARIUM"
self.assoc_name = emp_name
self.phone_no = "8608758562"
self.curr_time = time.strftime("REG %m-%d-%Y %H:%M")
self.counter_no = count_no
self.entries_v... | 77 | 26.6 | 102 | 15 | 527 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1f5ebd8833b7b6d8_3fb3bbf2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
18
] | [
null
] | [
23
] | [
36
] | |
2024-11-18T21:31:32.390563+00:00 | 1,420,002,372,000 | bf006587e4b3e43d4fa4af155dee29177decb454 | 2 | {
"blob_id": "bf006587e4b3e43d4fa4af155dee29177decb454",
"branch_name": "refs/heads/master",
"committer_date": 1420002372000,
"content_id": "f7730e425061e7381b120b521f36f4b281ea877b",
"detected_licenses": [
"Apache-2.0",
"BSD-2-Clause"
],
"directory_id": "cf4b0eaca92048c6fff0de933b69b6322f17a073",... | 2.390625 | stackv2 | # Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the Li... | 277 | 38.86 | 102 | 18 | 2,409 | python | [{"finding_id": "codeql_py/request-without-cert-validation_d272d3414d4262da_6755c35c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
180,
189,
192
] | [
null,
null,
null
] | [
12,
17,
17
] | [
89,
101,
103
] | |
2024-11-18T21:31:53.803118+00:00 | 1,554,765,330,000 | ff0c6ded4a61bd9b476cec1ca62f243112ea38b6 | 2 | {
"blob_id": "ff0c6ded4a61bd9b476cec1ca62f243112ea38b6",
"branch_name": "refs/heads/master",
"committer_date": 1554765330000,
"content_id": "482a15e324aaeb9588323f3329698e0673b47f19",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "436a64d2199b9a246ce2c4a693767aa5ddba0013",
"extension": "py"... | 2.375 | stackv2 | """ This file is packed in the container and acts as a helper function to make
outbound ReST calls """
import json
import requests
from requests.auth import HTTPBasicAuth
from requests.packages.urllib3.exceptions import InsecureRequestWarning
__author__ = "Swanand Rao"
__copyright__ = ""
__credits__ = ["Swa... | 48 | 31.98 | 95 | 16 | 394 | python | [{"finding_id": "codeql_py/request-without-cert-validation_767f7e77c9f1bab8_f7954af3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
38
] | [
39
] | [
13
] | [
55
] | |
2024-11-18T21:32:10.740344+00:00 | 1,312,286,524,000 | 3f41cb1acbbb1a397ae1288bca1cbcd27c0d3f33 | 2 | {
"blob_id": "3f41cb1acbbb1a397ae1288bca1cbcd27c0d3f33",
"branch_name": "refs/heads/master",
"committer_date": 1312286524000,
"content_id": "95c287ef082d428fe43e0a6acfbcfd21d8d37774",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "68f1f7396152abe954036218697387b3989a8f7b",
"extension": "p... | 2.375 | stackv2 | # -*- coding: utf-8 -*-
import os
import subprocess
import virtualenv
from templateserver import __version__ as version
DEFAULT_TEMPLATE_DIR = 'templates'
DEFAULT_MEDIA_DIR = 'media'
DEFAULT_STATIC_DIR = 'static'
DEFAULT_ENV_DIR = '.env'
DEFAULT_RUNSERVER_PATH = 'runserver.py'
RUNSERVER_TEMPLATE = os.path.abspath(os... | 81 | 34.93 | 102 | 19 | 672 | python | [{"finding_id": "codeql_py/overly-permissive-file_c5bc6093e699bda9_80b55d2a", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
43
] | [
null
] | [
5
] | [
34
] | |
2024-11-18T21:32:23.792904+00:00 | 1,508,105,214,000 | f8616bf6105046a7d663cf6526acf3cb4ee34ce7 | 2 | {
"blob_id": "f8616bf6105046a7d663cf6526acf3cb4ee34ce7",
"branch_name": "refs/heads/master",
"committer_date": 1508105214000,
"content_id": "2f18188a00aaae5693898f01e1e39b7fe14c50aa",
"detected_licenses": [
"MIT"
],
"directory_id": "70bd38b6559c3c8060fa0efadf0bf9f7298dd7f1",
"extension": "py",
"fi... | 2.484375 | stackv2 | #------------------------------
# SSH session, to be tested
#------------------------------
class SSH(object):
def __init__(self, device_name, username,password, buffer=65535,delay="0.5", port="22"):
self.device_name = device_name
self.username = username
self.password = password
sel... | 141 | 32.99 | 92 | 17 | 975 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a9c6691ea79404b4_8dd25dae", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
20
] | [
null
] | [
13
] | [
83
] | |
2024-11-18T21:32:25.658799+00:00 | 1,549,822,526,000 | a60f7489596ce979ad96f7cff8b4edf1ea4174e2 | 3 | {
"blob_id": "a60f7489596ce979ad96f7cff8b4edf1ea4174e2",
"branch_name": "refs/heads/master",
"committer_date": 1549822557000,
"content_id": "583fd9ae8fe94fb96739f510ea10b88f585dd489",
"detected_licenses": [
"MIT"
],
"directory_id": "a801dd999c5b29fa587ec8c20beb914a9e91df6d",
"extension": "py",
"fi... | 2.5625 | stackv2 | from flask import Flask, request, jsonify
import logging
import sys
from deepcubes.models import Sentiment
if len(sys.argv) < 2:
print("Format: <path_to_model>")
sys.exit()
logger = logging.getLogger("SentimentService")
logger.setLevel(logging.INFO)
# create the logging file handler
handler = logging.FileHa... | 60 | 26.85 | 74 | 15 | 374 | python | [{"finding_id": "codeql_py/log-injection_93e46307a92e5109_0e1f4a6e", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
45
] | [
47
] | [
21
] | [
10
] | |
2024-11-18T21:32:58.161408+00:00 | 1,561,854,857,000 | 8e8c332285b4bd4bbe2f26cc96a7bcf9d0ca7db4 | 3 | {
"blob_id": "8e8c332285b4bd4bbe2f26cc96a7bcf9d0ca7db4",
"branch_name": "refs/heads/master",
"committer_date": 1561854857000,
"content_id": "ef3ab574c839c73c46b8f430bf6599461efa3626",
"detected_licenses": [
"MIT"
],
"directory_id": "5cb6082fcb3aeb01f8abd1f66c5a2c01cb9ff733",
"extension": "py",
"fi... | 2.703125 | stackv2 | #!/usr/bin/env python3
"""
__main__.py
main entry file for Ghostpass console interactions. This file
comprises of the main method that enables the user to initialize a
session and perform all operations needed to interact with that session.
Several helper methods are also provided, specifically for working tog... | 340 | 37.77 | 140 | 19 | 2,855 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_2ae96caf8468956d_f01cab52", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
199
] | [
null
] | [
27
] | [
42
] | |
2024-11-18T21:49:04.385191+00:00 | 1,574,655,805,000 | abc1bc00828ee581d4de7872b0cb8ce8085b8323 | 5 | {
"blob_id": "abc1bc00828ee581d4de7872b0cb8ce8085b8323",
"branch_name": "refs/heads/master",
"committer_date": 1574655805000,
"content_id": "beab6f956e7974860ceb594644bbd67101034ad4",
"detected_licenses": [
"MIT"
],
"directory_id": "9888b161ced0b5a1d33502dc9d26a4d861cf7b16",
"extension": "py",
"fi... | 4.78125 | stackv2 | # Create a class called as employee, employee count, call constructor, pass name and salary
# Inside the constructor, pass name and salary and increment the employee count
# Use an instance method that displayed the total number of employees present
class Employee:
employee_count = 0
def __init__(self, name, ... | 21 | 31 | 91 | 9 | 161 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d18d012bee08e928_416d8f73", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (priva... | [
20,
21
] | [
null,
null
] | [
7,
7
] | [
30,
40
] | |
2024-11-18T22:26:08.658399+00:00 | 1,609,773,809,000 | ae0f8ab6b94a18059574923bd49ef4c5560ae04c | 2 | {
"blob_id": "ae0f8ab6b94a18059574923bd49ef4c5560ae04c",
"branch_name": "refs/heads/main",
"committer_date": 1609773809000,
"content_id": "a7c00a4e0b85c71344ab0569a39748f4ed25176e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "751f293eeb51ab6f7b98ac7dc6acdd4aef3c79bc",
"extension": "py",
... | 2.4375 | stackv2 | """
This module provides the functionality of uploading files from s3 to an FTP
server.
"""
import base64
import json
import logging
import os
import boto3
import paramiko
from botocore.exceptions import ClientError
from exceptions import BinarySecretError, InvalidAuthTypeError
SECRET_KEY = os.getenv("SECRET_KEY")
V... | 229 | 31.34 | 88 | 16 | 1,626 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_bf3c02d2c3dd41df_adf9207a", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
78
] | [
null
] | [
9
] | [
78
] | |
2024-11-18T22:42:09.718348+00:00 | 1,552,182,185,000 | e70508398f63e5ef419f37d198c5e3a2ac8ac7ce | 3 | {
"blob_id": "e70508398f63e5ef419f37d198c5e3a2ac8ac7ce",
"branch_name": "refs/heads/master",
"committer_date": 1552182185000,
"content_id": "e0d8feba1a79e0b0490ae8d8e0ac2503651b15ad",
"detected_licenses": [
"MIT"
],
"directory_id": "d46eb5cdd2e6245f75083883b1de7cdc0ff99969",
"extension": "py",
"fi... | 2.546875 | stackv2 | import requests
import json
import logging
_LOGGER = logging.getLogger(__name__)
class ClearPass:
"""Login when class is initiated."""
def __init__(self, data):
self.access_token = None
self._logged_in = self.get_access_token(data)
self.server = data['server']
if self._logged_... | 150 | 37.21 | 110 | 15 | 1,196 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eaa3c82857911228_a03a7971", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (passwor... | [
112,
140,
127
] | [
null,
null,
null
] | [
27,
27,
27
] | [
56,
56,
56
] | |
2024-11-18T22:42:11.813077+00:00 | 1,611,616,058,000 | f25f716b4942ecb9830bc63eb11daf6eee0b2d1f | 3 | {
"blob_id": "f25f716b4942ecb9830bc63eb11daf6eee0b2d1f",
"branch_name": "refs/heads/master",
"committer_date": 1611616058000,
"content_id": "7ab98bcef15fad2b966bf152cff11ba68a12d05f",
"detected_licenses": [
"MIT"
],
"directory_id": "5983d20bf99d809bde3a813d5418d4bbffcc0280",
"extension": "py",
"fi... | 2.515625 | stackv2 | from discord.ext import commands
import discord
import locale
import praw
from random import randint, choice
from datetime import datetime
from cogs.utils import Defaults
locale.setlocale(locale.LC_ALL, '')
class Reddit(commands.Cog):
def __init__(self, bot):
self.bot = bot
@commands.bot_has_perm... | 185 | 40.99 | 110 | 21 | 1,573 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c08dbc2caffb96bc_ce96807e", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [i.imgur.com](1) may be at an arbitrary position in the... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [i.imgur.com](1) may be at an arbitrary position in the sanitized URL."
] | [
128
] | [
null
] | [
47
] | [
72
] | |
2024-11-18T20:31:25.273645+00:00 | 1,653,076,223,000 | 2224c3a344796ef7d276cb52b49c30f905481812 | 3 | {
"blob_id": "2224c3a344796ef7d276cb52b49c30f905481812",
"branch_name": "refs/heads/master",
"committer_date": 1653076223000,
"content_id": "690df7a6532f6f30016e5bcf00a2504fe5fd1590",
"detected_licenses": [
"MIT"
],
"directory_id": "7d70a8304d75747c64366777601b2a70f57a41c9",
"extension": "py",
"fi... | 2.671875 | stackv2 | from pathlib import Path
import jinja2
from ..expressions.exprgraph_utils import ExprBase
def visualize_graph_container(g,asdict=False):
nodes,edges = [],[]
for idx,node in g.iter_nodes():
classname = node.__class__.__name__
size = 20
font = {'size':20,'face':'arial'}
nodes.append(dict(id=idx,label=idx,size=... | 82 | 29.7 | 90 | 16 | 693 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0435c2c3e560648c_852ac722", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
67
] | [
null
] | [
8
] | [
61
] | |
2024-11-18T20:31:26.673188+00:00 | 1,551,565,134,000 | c2d32cf204b6ca5c641be3f169c5a931c713fb6d | 3 | {
"blob_id": "c2d32cf204b6ca5c641be3f169c5a931c713fb6d",
"branch_name": "refs/heads/master",
"committer_date": 1551565134000,
"content_id": "c4a2832d58f1a15488b5ff35eeb981bbf2345463",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0784469de7e6c9d9e28fa70bf2e319195b6b4d91",
"extension": "py"... | 3.46875 | stackv2 | #our first python script
#AhmedSwailm
#https://www.youtube.com/ahmedswailm
#http://facebook.com/ahmedswailm2
filepath = "combofile.txt" #the combo file path (text file we need test it)
combo = open(filepath,"r") #open our file + read it so we can do our work on it
line = list(filepath) #we make our coombo a... | 23 | 52.52 | 113 | 12 | 326 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_f0725737cb56bbd5_48b261f1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
17,
19
] | [
null,
null
] | [
25,
15
] | [
39,
23
] | |
2024-11-18T20:31:27.439851+00:00 | 1,561,757,953,000 | 59d0c7b756b91f73916712b66e222907f2872c8e | 2 | {
"blob_id": "59d0c7b756b91f73916712b66e222907f2872c8e",
"branch_name": "refs/heads/master",
"committer_date": 1561757953000,
"content_id": "1460ad85f1af6053f2933b390a956eae6f4e1fc9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "eadf337fec158b19ee5014d93f31a0dcf2748d84",
"extension": "py"... | 2.453125 | stackv2 | # Copyright (c) 2019 Altinity LTD
#
# This product is licensed to you under the
# Apache License, Version 2.0 (the "License").
# You may not use this product except in compliance with the License.
#
# This product may include a number of subcomponents with
# separate copyright notices and license terms. Your use of the... | 374 | 37.22 | 79 | 17 | 3,071 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d3482910b38b0432_04d67463", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw... | [
374
] | [
null
] | [
17
] | [
24
] | |
2024-11-18T20:53:44.003626+00:00 | 1,492,009,245,000 | 8aceae21cc0a6ba3623cdd5b6b01fda664a34f1b | 2 | {
"blob_id": "8aceae21cc0a6ba3623cdd5b6b01fda664a34f1b",
"branch_name": "refs/heads/master",
"committer_date": 1492009245000,
"content_id": "4233fb3790089ed1713938251c2485ca2a2381c2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d927f0a9f60d35829d4626800018876738ffaaee",
"extension": "py"... | 2.328125 | stackv2 | #!/usr/bin/env python
import urllib
import json
import os
from flask import Flask
from flask import request
from flask import make_response
# Flask app should start in global layout
app = Flask(__name__)
@app.route('/webhook', methods=['POST'])
def webhook():
req = request.get_json(silent=True, force=True)
... | 117 | 28.5 | 99 | 15 | 937 | python | [{"finding_id": "codeql_py/flask-debug_19d0e7c3b7632241_95525e6a", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
117,
26
] | [
null,
null
] | [
5,
23
] | [
51,
26
] | |
2024-11-18T21:10:02.704934+00:00 | 1,607,123,839,000 | 5fe1891cf38044a4007158eb13a9c82b3360079b | 4 | {
"blob_id": "5fe1891cf38044a4007158eb13a9c82b3360079b",
"branch_name": "refs/heads/main",
"committer_date": 1607123839000,
"content_id": "362d90c609555e3f23fc8dc1ebf2c214c78cc3ed",
"detected_licenses": [
"MIT"
],
"directory_id": "caa0eba26f09644440d24ec04b599b20818889bf",
"extension": "py",
"file... | 3.953125 | stackv2 | import random
import string
SPECIALS = '!$%^&*@#' # Well, could use string.punctuation, but only needs these really...
############################################
def generate_random_password(length = 8, useUpper = False, useNumbers = False, useSpecial = False):
'''
Generates a random password from a ... | 115 | 32.23 | 99 | 14 | 846 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b25fc12babc4de1a_535acedc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw... | [
105
] | [
null
] | [
11
] | [
20
] | |
2024-11-18T21:11:16.042194+00:00 | 1,465,465,410,000 | e65c72e6c463a6eb2d4c70e58a5bcb45fbb3272a | 3 | {
"blob_id": "e65c72e6c463a6eb2d4c70e58a5bcb45fbb3272a",
"branch_name": "refs/heads/master",
"committer_date": 1465465410000,
"content_id": "1279809be469810b50364573ba3c4ea0f3caa1c1",
"detected_licenses": [
"MIT"
],
"directory_id": "d202e5cd86661bc0d71fee27695b314f14e5842a",
"extension": "py",
"fi... | 2.734375 | stackv2 | # -*- coding: utf-8 -*-
import os
from copy import copy
from collections import OrderedDict
import yaml
from jinja2 import Environment, FileSystemLoader
j2 = Environment(
loader=FileSystemLoader(os.path.join(os.path.dirname(__file__), "templates")),
trim_blocks=True,
lstrip_blocks=True
)
from errors impor... | 260 | 33.58 | 141 | 27 | 1,901 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2a9f2547aedcc1ad_19fd995d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
8
] | [
12
] | [
6
] | [
2
] | |
2024-11-18T21:46:33.364090+00:00 | 1,562,260,066,000 | 37b6a2921f2f26851d53964d62dfe2c79b318884 | 2 | {
"blob_id": "37b6a2921f2f26851d53964d62dfe2c79b318884",
"branch_name": "refs/heads/master",
"committer_date": 1562260066000,
"content_id": "f20bfd3f663338182c27bf7ae6210962769982d2",
"detected_licenses": [
"MIT"
],
"directory_id": "b723b33f56fc7454e4ffd89162f32a29bad3fb42",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!/usr/bin/env python
from __future__ import print_function
import flask, flask_login
from flask import Flask, render_template, url_for, request, json
from forms import signupform, donationform, LoginForm, SmsForm
import stripe
import uuid, json, unirest, re, time, datetime, jsonify
import auth # I pass my access toke... | 443 | 37.89 | 122 | 28 | 3,410 | python | [{"finding_id": "codeql_py/stack-trace-exposure_976887a8ddf237a5_47889a20", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
183,
209,
443
] | [
null,
null,
null
] | [
16,
16,
5
] | [
17,
17,
40
] | |
2024-11-18T21:46:34.651719+00:00 | 1,585,727,703,000 | a2ec4f6f0c5ca489bdb2823b6f2ff14e59de6f70 | 3 | {
"blob_id": "a2ec4f6f0c5ca489bdb2823b6f2ff14e59de6f70",
"branch_name": "refs/heads/master",
"committer_date": 1585742410000,
"content_id": "f7e9752c4ec8d70687e007e352f7642d41284533",
"detected_licenses": [
"MIT"
],
"directory_id": "ac57d2e1be6e94d787b4525886d5a16013c018d2",
"extension": "py",
"fi... | 2.59375 | stackv2 | """
EPUB generation from Markdown source files plus YAML metadata
"""
import os
from datetime import datetime as dt
import shutil
from hashlib import md5
import logging
import re
import yaml
import jinja2 as j2
import markdown
from . import params
from . import utils
def gen_uuid(message):
uuid = md5(message.en... | 378 | 36.14 | 79 | 20 | 3,645 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b5ed63d3e7b19164_8d6e2c10", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
346
] | [
347
] | [
15
] | [
32
] | |
2024-11-18T21:47:34.493996+00:00 | 1,617,944,062,000 | 51fe349c9fe3f869551e178d4f370deea48312c5 | 2 | {
"blob_id": "51fe349c9fe3f869551e178d4f370deea48312c5",
"branch_name": "refs/heads/main",
"committer_date": 1617944062000,
"content_id": "4f50fe9030a68c82fbcc9b1cc6da3927f8eebe58",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "54163055e44be496cc040dfd4ae7203cf791ae3a",
"extension": "py",
... | 2.359375 | stackv2 | from flask import render_template, jsonify, Flask, redirect, url_for, request
import random
import os
import numpy as np
from keras.applications.mobilenet import MobileNet
from keras.preprocessing import image
from keras.applications.mobilenet import preprocess_input, decode_predictions
from keras.models import model_... | 67 | 31.09 | 120 | 14 | 571 | python | [{"finding_id": "codeql_py/flask-debug_9c8e4d20d361e825_ce6e9c42", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
67,
49
] | [
null,
null
] | [
5,
20
] | [
24,
24
] | |
2024-11-18T22:29:31.372857+00:00 | 1,548,368,188,000 | 1181d3af66a8de3ca5e3d3c6eda298b913e49aa4 | 4 | {
"blob_id": "1181d3af66a8de3ca5e3d3c6eda298b913e49aa4",
"branch_name": "refs/heads/master",
"committer_date": 1548368188000,
"content_id": "7e9a64ae5203e82b43c038621567506946a30f58",
"detected_licenses": [
"MIT"
],
"directory_id": "dcbd81bd0fde5245fd92f1a17a4305f6dffc0109",
"extension": "py",
"fi... | 4.28125 | stackv2 | """
Hangman.
Authors: Trey Kline and Zane Blair.
""" # DONE: 1. PUT YOUR NAME IN THE ABOVE LINE.
# DONE: 2. Implement Hangman using your Iterative Enhancement Plan.
####### Do NOT attempt this assignment before class! #######
import random
def main():
num = int(input('Enter the minimum length of the secret wor... | 91 | 27.47 | 90 | 13 | 619 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ad9928de49615940_22f0aef6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
82
] | [
null
] | [
28
] | [
32
] | |
2024-11-18T22:29:41.075159+00:00 | 1,635,445,821,000 | d190dd0b0f5b5ed4137c6de1e5168bdd6bb38567 | 3 | {
"blob_id": "d190dd0b0f5b5ed4137c6de1e5168bdd6bb38567",
"branch_name": "refs/heads/main",
"committer_date": 1635445821000,
"content_id": "974c21b25299f372f2b7ace97c1138eb3ec1d7ed",
"detected_licenses": [
"MIT"
],
"directory_id": "965a47f22314fbdc1c52e6f66d8f6dabcbbdbe51",
"extension": "py",
"file... | 2.640625 | stackv2 | import re
from json import loads
from random import choice, random
from secrets import (entry_nodeIp, gmaps_api_key, password, user_agents_list,
username)
from ssl import CERT_NONE, create_default_context
from sys import exit
from time import sleep
from urllib import error, parse, request
import c... | 307 | 43.23 | 179 | 22 | 3,311 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_37f23613c01f8b39_1efe31ab", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
42,
42
] | [
null,
null
] | [
20,
46
] | [
28,
55
] | |
2024-11-18T22:40:30.994846+00:00 | 1,570,621,196,000 | 50380cdef15686b8b12d293e4aa7afa9fa4c710f | 3 | {
"blob_id": "50380cdef15686b8b12d293e4aa7afa9fa4c710f",
"branch_name": "refs/heads/master",
"committer_date": 1570621196000,
"content_id": "e9439fb249739c09924b22e80b689b0d91facafa",
"detected_licenses": [
"MIT"
],
"directory_id": "8e73e4b35724d54cee7761c4167ff4be9b4a9dee",
"extension": "py",
"fi... | 2.8125 | stackv2 | import sys
import time
from random import randint
import twitter
positive_list = [':‑)', ':-]', ':-3', ':->', '8-)', ':-}', ':o)', ':c)', ':^)', '=]', '=)', ':)', ':]', ':3', ':>',
'8)', ':}', ':D', '8D', 'xD', 'XD', '=D', '=3', 'B^D', ':P', ':O', ':‑O', 'D:<']
negative_list = [':‑(', ':(', ':‑c', ':‑... | 102 | 36 | 115 | 22 | 971 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_23f42d682ef831cf_a22d2a39", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text."
] | [
63
] | [
null
] | [
29
] | [
41
] | |
2024-11-18T22:41:21.631690+00:00 | 1,616,858,546,000 | 8007f7b4be0015bf1ef4fcf1549e04a8c0901861 | 3 | {
"blob_id": "8007f7b4be0015bf1ef4fcf1549e04a8c0901861",
"branch_name": "refs/heads/main",
"committer_date": 1616858546000,
"content_id": "1ede3d4fe55d71a10db686f1613dd804c303fa63",
"detected_licenses": [
"MIT"
],
"directory_id": "5b8143dbea123d3abe9a38884f33282e90a869b5",
"extension": "py",
"file... | 3.1875 | stackv2 | import requests
import hashlib
# import sys
import os
## sending requests to api for data exchange
def request_data_api(querystring):
url = 'https://api.pwnedpasswords.com/range/' + querystring ## first five characters of SHA1 encryption for k-anonymity used by api
res = requests.get(url)
# if status_Code == 400 $... | 60 | 29.53 | 133 | 18 | 463 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0b107ca72ef7df24_797dc0e9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Se... | [
53,
55,
25
] | [
null,
null,
null
] | [
12,
12,
30
] | [
91,
55,
54
] | |
2024-11-18T22:54:12.547467+00:00 | 1,611,292,425,000 | 4b5cf3b9054d7f2014c245cffd70e5b347dc783c | 3 | {
"blob_id": "4b5cf3b9054d7f2014c245cffd70e5b347dc783c",
"branch_name": "refs/heads/master",
"committer_date": 1611292425000,
"content_id": "fbfa7ed81f72187d34989c3db1844eff651fb613",
"detected_licenses": [
"MIT"
],
"directory_id": "9fa1d2df5c01716a71c5780c64950598fc5154fd",
"extension": "py",
"fi... | 2.53125 | stackv2 | import requests
## This is the vRA ServiceNow Create Workflow Action
## It creates a CMDB record, a Change Record, and Closes the Change Record once done
## Tested on vRA 8.0 / vRA Cloud and SNOW's London release
## Assumptions:
## - A vRA deployment is the trackable unit, and is recorded in the CMDB, regardless of h... | 118 | 37.64 | 108 | 13 | 1,149 | python | [{"finding_id": "codeql_py/request-without-cert-validation_09126532161b5510_474887e8", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 5 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
45,
65,
85,
93,
115
] | [
null,
null,
null,
null,
null
] | [
16,
14,
19,
14,
18
] | [
77,
90,
91,
70,
102
] | |
2024-11-18T22:54:19.807482+00:00 | 1,631,168,456,000 | 76379029ad7bffc0927d68c60421d82e45c74c79 | 3 | {
"blob_id": "76379029ad7bffc0927d68c60421d82e45c74c79",
"branch_name": "refs/heads/master",
"committer_date": 1631168456000,
"content_id": "6fb09c1f21eafd1030365a69399a0e54cc849163",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "12b02baab253ecb824f26eff0bbc82026535e335",
"extension": "py"... | 2.671875 | stackv2 | import json
from datetime import datetime, date
from flask import Blueprint, request
from flask import current_app as app
from db.wikishield_connection import DBConnection as WS
from db.wikishield_db import WikishieldDB
from lang.langs import Lang, LangsManager
from db.connection_info import read_sql_user_name
from c... | 224 | 30.44 | 127 | 16 | 1,450 | python | [{"finding_id": "codeql_py/stack-trace-exposure_9a7cfe39e8ece68c_882f4fe1", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-079"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"Cross-site scripting vul... | [
156,
185,
211,
224
] | [
null,
null,
null,
null
] | [
16,
16,
16,
12
] | [
63,
63,
63,
59
] | |
2024-11-18T22:54:28.480386+00:00 | 1,619,259,867,000 | 7e95c543aa3c1e2458fd7f66a6af51c0f79c240c | 3 | {
"blob_id": "7e95c543aa3c1e2458fd7f66a6af51c0f79c240c",
"branch_name": "refs/heads/main",
"committer_date": 1619259867000,
"content_id": "08d92edc80a67c1f68c411b4252c46472c7a157a",
"detected_licenses": [
"MIT"
],
"directory_id": "48b0e9416688197e45100195e3307614167ab7ce",
"extension": "py",
"file... | 2.796875 | stackv2 | import requests
from bs4 import BeautifulSoup
from re import search
from flask import Flask ,jsonify
app = Flask(__name__)
app.url_map.strict_slashes = False
def filecrSearch(title):
for i in range(1,40):
url = f'https://filecr.com/?page={i}&s={title}'
header = {'User-Agent':'Mozilla/5.0 (X11; L... | 64 | 26.36 | 139 | 16 | 442 | python | [{"finding_id": "codeql_py/partial-ssrf_f553eaddbd2ae366_5ac87c6c", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
16
] | [
null
] | [
13
] | [
46
] | |
2024-11-18T20:54:54.393398+00:00 | 1,631,585,924,000 | 091306f8036f6a9c99985cfd0de78665073581e4 | 3 | {
"blob_id": "091306f8036f6a9c99985cfd0de78665073581e4",
"branch_name": "refs/heads/master",
"committer_date": 1631585924000,
"content_id": "0e7d7b1ad9abc9201d549530c588f5c0d7442cef",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e9b9626ffce09bf011803a33b4780d8dcc6657e8",
"extension": "py"... | 3.0625 | stackv2 | import os
from getpass import getpass
from netmiko import ConnectHandler
from netmiko import NetmikoTimeoutException, NetmikoAuthenticationException
import logging
logging.basicConfig(
filename="netmiko_class7.log",
level=logging.INFO,
format="%(asctime)s %(levelname)s %(name)s %(message)s",
)
logger = lo... | 101 | 26.7 | 94 | 14 | 704 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8b05817ed3946a46_e54431aa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
29,
41
] | [
null,
null
] | [
21,
18
] | [
24,
21
] | |
2024-11-18T20:55:03.667317+00:00 | 1,627,943,127,000 | f560ae1fd0447167cddef5e2ed9330bef7998233 | 3 | {
"blob_id": "f560ae1fd0447167cddef5e2ed9330bef7998233",
"branch_name": "refs/heads/main",
"committer_date": 1627943127000,
"content_id": "b03180a21c2889b92098ddb064c881bf9df9f5f9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0643fcb7e32b98b86d4f8e6e6467a07a3ff9206c",
"extension": "py",
... | 2.5625 | stackv2 | """
Handles configuration of data relay block to run dapr. Writes dapr component configurations
by applying required values read from environment variables or secret store contents
to dapr configuration template files.
See plugins/README.md for important background.
If DAPR_DEBUG environment variable is defined, enabl... | 171 | 31.82 | 133 | 17 | 1,199 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e26add39bac265c8_bfa07780", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
117,
133,
153
] | [
null,
null,
null
] | [
11,
15,
15
] | [
58,
57,
75
] | |
2024-11-18T20:55:10.316391+00:00 | 1,456,824,593,000 | ee889b831c4070b91a666a887096412ba1bc3a43 | 3 | {
"blob_id": "ee889b831c4070b91a666a887096412ba1bc3a43",
"branch_name": "refs/heads/master",
"committer_date": 1456824593000,
"content_id": "d9f58552aba5108461065c8149217c11cf497b2a",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "e9197785ce72412e51ad2bd8c6e0926546ef7d1f",
"extension": "py",
... | 2.65625 | stackv2 | # -*- coding: utf-8 -*-
from BeautifulSoup import BeautifulSoup
from collections import defaultdict
import re
import hashlib
import json
import nltk
import sys
from datetime import datetime
import urllib
import urllib2
from threading import Thread
import extract
import operator
import feedparser
import sched, time
fr... | 202 | 31.66 | 88 | 20 | 1,467 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b0669c50488294a3_e6ee785c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [rss.sciencedirect.com](1) may be at an arbitrary posit... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [rss.sciencedirect.com](1) may be at an arbitrary position in the sanitized URL."
] | [
71
] | [
null
] | [
12
] | [
42
] | |
2024-11-18T21:33:13.369016+00:00 | 1,636,555,788,000 | 6e8545d00ee58ddac07b28f36e7ae696d9bf2e7e | 3 | {
"blob_id": "6e8545d00ee58ddac07b28f36e7ae696d9bf2e7e",
"branch_name": "refs/heads/main",
"committer_date": 1636555788000,
"content_id": "977c87c76480bf5e69de1b6c490e13abcbbef60d",
"detected_licenses": [
"MIT"
],
"directory_id": "3085d632ef23641bed55a2422f38cd0033e35410",
"extension": "py",
"file... | 2.5625 | stackv2 | import tempfile
import threading
from functools import partial
from logging import getLogger
from pathlib import Path
from subprocess import Popen, PIPE, DEVNULL, STDOUT
from sys import platform as _platform
import requests
import re
from kivymd.toast import toast
from kivymd.uix.boxlayout import MDBoxLayout
from kivy... | 120 | 39.32 | 143 | 17 | 1,052 | python | [{"finding_id": "codeql_py/request-without-cert-validation_bb86b75866eba9a6_2f34c600", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
72
] | [
73
] | [
13
] | [
34
] | |
2024-11-18T21:33:20.787795+00:00 | 1,620,905,511,000 | 36fa5c8a00ecf608c0a4e4e64603a19467f47a1d | 3 | {
"blob_id": "36fa5c8a00ecf608c0a4e4e64603a19467f47a1d",
"branch_name": "refs/heads/master",
"committer_date": 1620905511000,
"content_id": "7c0506d491e245893e3a380479e2cb24447182b8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7cebfa2066e679e19993a5507e59d1979df3d4a8",
"extension": "py"... | 2.953125 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Thu May 31 23:16:36 2018
@author: SilverDoe
"""
from tkinter import *
from tkinter.ttk import *
from tkinter import scrolledtext
from tkinter import messagebox
class MyGui:
def __init__(self):
window = Tk()
window.title("Welcome to LikeGeeks app")
... | 120 | 29.71 | 102 | 14 | 939 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_98b46fd13d746247_5e0ee421", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
111,
114
] | [
null,
null
] | [
15,
15
] | [
21,
23
] | |
2024-11-18T21:33:33.435281+00:00 | 1,609,575,901,000 | 769fd3d401e8128aa3e868d108fabff6a68983e6 | 2 | {
"blob_id": "769fd3d401e8128aa3e868d108fabff6a68983e6",
"branch_name": "refs/heads/master",
"committer_date": 1609575901000,
"content_id": "1e4d29cc30b8cefe9aecfdde3fee4e6a9e214551",
"detected_licenses": [
"MIT"
],
"directory_id": "ddb090f75e911a6350aec56e2d287cfa1a8d66f6",
"extension": "py",
"fi... | 2.359375 | stackv2 | import os
import ntpath
import hashlib
import datetime
from flask import Blueprint, jsonify, request, current_app, send_file
from playhouse.flask_utils import PaginatedQuery
from src.auth import login_required, get_user_from_request
from src.model.models import Content
from src import errors
bp = Blueprint("content",... | 97 | 26.4 | 87 | 17 | 644 | python | [{"finding_id": "codeql_py/path-injection_86429c205e91f2a8_52d11c79", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
63
] | [
null
] | [
24
] | [
32
] | |
2024-11-18T21:55:38.197014+00:00 | 1,614,991,467,000 | f813d0cacccdb4e437c0b94716eeae1a9c97f042 | 3 | {
"blob_id": "f813d0cacccdb4e437c0b94716eeae1a9c97f042",
"branch_name": "refs/heads/master",
"committer_date": 1614991467000,
"content_id": "7f33e43f5075ffffa4b82a8e113927ceea222284",
"detected_licenses": [
"Unlicense"
],
"directory_id": "233e8549c7061938575145f45ff9cb5c390b34dd",
"extension": "py",... | 3.0625 | stackv2 | import argparse
import configparser
import datetime
import json
import time
import putiopy
def auto_delete(
oauth_token: str, max_age: "num", dryrun: bool, excluded_dirs: list = []
):
"""Deletes files older than `max_age` days from the putio account associated with
the `oauth_token`. The folders (NOT thei... | 166 | 28.5 | 85 | 18 | 1,102 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d5a9a77c04b99caa_c84e62ba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
159
] | [
null
] | [
15
] | [
57
] | |
2024-11-18T21:55:55.451328+00:00 | 1,587,041,047,000 | 1d164df412d285fa7aa8bf098c8098de3f53845d | 2 | {
"blob_id": "1d164df412d285fa7aa8bf098c8098de3f53845d",
"branch_name": "refs/heads/master",
"committer_date": 1587041047000,
"content_id": "6c2aacd223184f20a9f82d227b36bc8fd5b5f772",
"detected_licenses": [
"MIT"
],
"directory_id": "301d199dcc8c09b844cc164745705994bc2340ae",
"extension": "py",
"fi... | 2.375 | stackv2 | from cryptography.hazmat.primitives import hashes, hmac
from cryptography.hazmat.primitives.kdf.hkdf import HKDF
from cryptography.hazmat.backends.openssl import backend
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
from datetime import datetime
from fs import open_fs
import sqlite3
imp... | 240 | 29.87 | 79 | 19 | 1,524 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_0434c80d10b3879f_91f11bac", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
94
] | [
null
] | [
27
] | [
32
] | |
2024-11-18T21:56:07.341653+00:00 | 1,565,334,337,000 | f7afd1aba954f8fe4a59117f759fff7ef13246c1 | 2 | {
"blob_id": "f7afd1aba954f8fe4a59117f759fff7ef13246c1",
"branch_name": "refs/heads/master",
"committer_date": 1565334337000,
"content_id": "dce9a967fed7810f8ac8e98053a39758acead263",
"detected_licenses": [
"MIT"
],
"directory_id": "3dd1b0d55356763d23a6f8a30267053a9a510121",
"extension": "py",
"fi... | 2.375 | stackv2 | # coding=utf-8
from django.shortcuts import render, redirect
from django.http.response import JsonResponse
from models import *
from df_cart.models import *
from django.db import transaction
from df_user import user_decorator
from datetime import datetime
from decimal import Decimal
from df_user.models import *
# Creat... | 97 | 27.57 | 134 | 17 | 683 | python | [{"finding_id": "codeql_py/stack-trace-exposure_ab2f0750b71e3139_25d2ca66", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
97
] | [
null
] | [
25
] | [
29
] | |
2024-11-18T22:39:32.709537+00:00 | 1,552,645,802,000 | 4d72ca54749b199a5d32d819621a0f0117d1b94c | 4 | {
"blob_id": "4d72ca54749b199a5d32d819621a0f0117d1b94c",
"branch_name": "refs/heads/master",
"committer_date": 1552645802000,
"content_id": "777dd8bf196474b662d087b28f11dea01ef85e30",
"detected_licenses": [
"MIT"
],
"directory_id": "ccdc9fa73ce77c1edec406732e78143bc3b76ef2",
"extension": "py",
"fi... | 3.640625 | stackv2 | def check_type(text):
try:
if float(text) == int(float(text)):
return {'Age': int(float(text))}
elif float(text) != int(float(text)):
return {'Salary': float(text)}
except ValueError:
return {'Position': text}
employees_data = []
while True:
in_line = input... | 31 | 23.39 | 82 | 15 | 183 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bab6c18c376e874b_94893765", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
31
] | [
null
] | [
7
] | [
13
] | |
2024-11-18T22:54:59.365462+00:00 | 1,529,041,747,000 | a8c3eddc975a2c079b2755c058f19d25c29714e0 | 2 | {
"blob_id": "a8c3eddc975a2c079b2755c058f19d25c29714e0",
"branch_name": "refs/heads/master",
"committer_date": 1529041747000,
"content_id": "11b0bf312c7fb45990809d34cc2b9b87b39337a0",
"detected_licenses": [
"Apache-2.0",
"BSD-2-Clause"
],
"directory_id": "2d7c6579038772a8451d6cfe3e289f9e0a9c6e39",... | 2.328125 | stackv2 | #from rest_framework.renderers import UNICODE_JSON
from rest_framework import serializers
from django.http import HttpResponse
from django.views.decorators.csrf import csrf_exempt
import json
#from serializers import TestSerializer
@csrf_exempt
def regist(request):
if request.method == 'POST':
resist_dat... | 35 | 23.8 | 70 | 14 | 183 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_daff68a468c2a8c5_c253d8d9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
20
] | [
null
] | [
15
] | [
33
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.