added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T02:37:24.610987+00:00 | 1,588,574,960,000 | f8f4eac1ad62233b5bb77affbdc05a07b788774a | 3 | {
"blob_id": "f8f4eac1ad62233b5bb77affbdc05a07b788774a",
"branch_name": "refs/heads/master",
"committer_date": 1588574960000,
"content_id": "5882e4b0df63cc127e414db2c6d7ee18569f9933",
"detected_licenses": [
"MIT"
],
"directory_id": "5bf1fb2bec01bcf4ac868a62bd97cdfd36fe2c26",
"extension": "py",
"fi... | 2.71875 | stackv2 |
# il codice per gestire gli input dev'essere qui
from assistant.askassistant import ask, welcomeFrase
from flask import Flask, request, Response
import cv2 as cv
import object_detection_api as oda
from PIL import Image
import numpy as np
import webbrowser
choice = 0;
def switch(x):
return {
'identity': 0... | 95 | 22.48 | 107 | 14 | 574 | python | [{"finding_id": "codeql_py/stack-trace-exposure_4a89fa3be332a0d0_18e93de0", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
57
] | [
null
] | [
16
] | [
17
] | |
2024-11-19T02:37:37.039816+00:00 | 1,630,283,890,000 | 4587f5166735b325f7586c14cc804868031d6692 | 3 | {
"blob_id": "4587f5166735b325f7586c14cc804868031d6692",
"branch_name": "refs/heads/master",
"committer_date": 1630283890000,
"content_id": "59a285b1894e8ca3c1acf4771cb565d91bdafd50",
"detected_licenses": [
"MIT"
],
"directory_id": "9888a87c075ca338828bd557e0b56391a16619ab",
"extension": "py",
"fi... | 2.90625 | stackv2 | #!/usr/bin/env python
import requests
from pprint import pprint
def check_valid_youtube_link(videoID, api_key):
url = f'https://www.googleapis.com/youtube/v3/videos?id=%s&key=%s&part=status'%(videoID, api_key)
url_get = requests.get(url)
response = url_get.json()
if len(response['items']) == 0:
return False
e... | 29 | 22.45 | 98 | 15 | 197 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dedcbbb7c8494467_972dc44a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
28
] | [
null
] | [
8
] | [
48
] | |
2024-11-19T02:37:39.840397+00:00 | 1,520,718,892,000 | c62083528c27581aa179908f2472aee3d6a0d57d | 3 | {
"blob_id": "c62083528c27581aa179908f2472aee3d6a0d57d",
"branch_name": "refs/heads/master",
"committer_date": 1520718892000,
"content_id": "ab46a1ddd2b200ddb076a677593337e8a8ad9641",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "7ec49fc2f878cac3304b377c9ff402c9f769847c",
"extension": "py",
... | 2.53125 | stackv2 | import os
import shutil
import hashlib
import uuid
import random
import calendar
import time
from sqlalchemy import create_engine
from sqlalchemy.orm import sessionmaker
from database_setup import Car, Base, User
engine = create_engine('sqlite:///usedcars.db')
Base.metadata.bind = engine
DBSession = sessionmaker(bind... | 96 | 35.45 | 80 | 15 | 996 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_242562a42eef3672_d2bb60c8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
80
] | [
null
] | [
35
] | [
67
] | |
2024-11-19T02:49:10.060223+00:00 | 1,588,044,885,000 | 1c8e576561b3cf8b80e16990fb208672e8bc9a9d | 3 | {
"blob_id": "1c8e576561b3cf8b80e16990fb208672e8bc9a9d",
"branch_name": "refs/heads/master",
"committer_date": 1588044885000,
"content_id": "da6c7e409ec34e7d3cf747c7a65133096c8d7755",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bd3502e5f9fa209b62a769e444ff137b4d08db78",
"extension": "py"... | 2.75 | stackv2 | from flask import Blueprint, request, jsonify, abort
import psycopg2
import os
import uuid
from random import randint
employee_api = Blueprint('employee_api', __name__)
DATABASE_URL = os.environ['DATABASE_URL']
def parse_employee_info(record_list):
""" Parses the employee record information
Example input:
... | 250 | 28.32 | 126 | 16 | 1,809 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_41030d1904f3a573_ce2d1fd5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 6 | true | [
"CWE-312",
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089"
] | [
"py/clear-text-logging-sensitive-data",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
... | [
139,
93,
161,
172,
209,
246
] | [
null,
null,
null,
null,
null,
null
] | [
11,
24,
28,
28,
24,
24
] | [
48,
29,
40,
40,
36,
36
] | |
2024-11-19T02:49:25.527416+00:00 | 1,665,432,814,000 | 433b3c78bb87da1794a8a13501a7d68cef1308e6 | 3 | {
"blob_id": "433b3c78bb87da1794a8a13501a7d68cef1308e6",
"branch_name": "refs/heads/master",
"committer_date": 1665432814000,
"content_id": "1680f6a233eb950fbb6c10a9a5e463e7db44439e",
"detected_licenses": [
"MIT"
],
"directory_id": "9dbb2457f5608eafb4a7ae48c7e2662ac6d96925",
"extension": "py",
"fi... | 2.75 | stackv2 | import csv
import os
import re
import time
from typing import List
import pdb
from bs4 import BeautifulSoup
import pandas as pd
import requests
from selenium import webdriver
from selenium.webdriver.support.wait import WebDriverWait
from scrape_from_table import get_table_cells
timeout = 8
def scrape_birth_death_ye... | 96 | 40.58 | 178 | 18 | 942 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fcb8867d144606be_77b984e1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
46
] | [
null
] | [
19
] | [
29
] | |
2024-11-19T02:49:26.828587+00:00 | 1,630,171,269,000 | b237ea4f8ac0d5a1dc62fb7fb67157729b7e9231 | 2 | {
"blob_id": "b237ea4f8ac0d5a1dc62fb7fb67157729b7e9231",
"branch_name": "refs/heads/main",
"committer_date": 1630171269000,
"content_id": "df4f63631fa9ce209b220eb7ceab624ca743bebc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fdc87cfc5eb9f6703f2c51a6d0593f851e13a61b",
"extension": "py",
... | 2.40625 | stackv2 | import time
import json
from requests import post as POST
from requests import get as GET
with open('config.json') as json_file:
config = json.load(json_file)
API_KEY = config['key']
CHANNEL_ID = config['id']
CHANNEL_NAME = config['name']
WEBHOOK_URL = config['webhook']
VIDEO_ENDPOINT = f'https://www.googleapis.com/... | 83 | 30.71 | 141 | 20 | 695 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b93510ea33dbb192_b2f39838", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
28,
80
] | [
null,
null
] | [
24,
15
] | [
36,
76
] | |
2024-11-19T03:00:11.754448+00:00 | 1,455,147,936,000 | 1405a075658d6771490d142c05274b5042bbbeb3 | 2 | {
"blob_id": "1405a075658d6771490d142c05274b5042bbbeb3",
"branch_name": "refs/heads/master",
"committer_date": 1455147936000,
"content_id": "d94eb971703fe61f5cb6d7b08acdabacee2123d7",
"detected_licenses": [
"MIT"
],
"directory_id": "3537265c1b60f0c0eb06d165a0b5779438fc698c",
"extension": "py",
"fi... | 2.40625 | stackv2 |
from flask import Flask, jsonify, render_template, request
from flask.helpers import make_response
from flask import Flask
import redis
from redis import Redis
import serial
import time
app = Flask(__name__)
@app.route('/')
def index():
return 'Hello World!'
@app.route('/abc/')
#different function nam... | 72 | 19.33 | 66 | 12 | 397 | python | [{"finding_id": "codeql_py/reflective-xss_3f938c04d314d916_83f6f565", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 4 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
41,
55,
62,
67
] | [
null,
null,
null,
null
] | [
12,
12,
12,
12
] | [
56,
56,
32,
31
] | |
2024-11-19T03:00:13.821874+00:00 | 1,683,824,174,000 | 466c345fc7925a9fc854fa3b590ce913a3af255b | 2 | {
"blob_id": "466c345fc7925a9fc854fa3b590ce913a3af255b",
"branch_name": "refs/heads/master",
"committer_date": 1683824174000,
"content_id": "ff9f4d0a168b5db069a5acbcddbb5fe54ce63153",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "05973b7cf07eb03099e516f21f06a6e295086862",
"extension": "py"... | 2.453125 | stackv2 | import os
import shutil
from cgi import FieldStorage
from pyramid.view import view_config
from pyramid.response import FileResponse
from pyramid_storage.exceptions import FileNotAllowed
import logging
LOGGER = logging.getLogger("PHOENIX")
@view_config(route_name='download_storage')
def download(request):
file... | 115 | 33.07 | 119 | 15 | 847 | python | [{"finding_id": "codeql_py/reflective-xss_09fd243d6e8049c0_a301fc7b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 9 | true | [
"CWE-079",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/reflective-xss",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [... | [
47,
84,
95,
96,
97,
108,
109,
111,
114
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
12,
27,
27,
21,
15,
27,
21,
15,
23
] | [
18,
38,
48,
42,
19,
48,
42,
19,
27
] | |
2024-11-19T03:12:00.769321+00:00 | 1,571,588,586,000 | dd21825666265da5e60d7f76a4d30e565d14d690 | 2 | {
"blob_id": "dd21825666265da5e60d7f76a4d30e565d14d690",
"branch_name": "refs/heads/master",
"committer_date": 1571588586000,
"content_id": "808dbb71e5e3e00d98a17f2821ccf77056be0fac",
"detected_licenses": [
"MIT"
],
"directory_id": "da9314dae712f13d8f60e90ef408039ed10e51da",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python3
"""Server backend of WebScrapBook toolkit.
"""
import os
import time
import webbrowser
from threading import Thread
# dependency
import bottle
# this package
from . import *
from .app import init_app
class WSBServer(bottle.ServerAdapter):
"""Tweaked from bottle.WSGIRefServer
- Remove... | 169 | 33 | 114 | 16 | 1,273 | python | [{"finding_id": "codeql_py/insecure-protocol_1eea6a6ec5388ce3_1650b110", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)."
] | [
91
] | [
null
] | [
26
] | [
33
] | |
2024-11-19T03:12:19.971347+00:00 | 1,487,000,102,000 | 5543a2c2877420e3bd7789b1589d80bab1df7dd4 | 3 | {
"blob_id": "5543a2c2877420e3bd7789b1589d80bab1df7dd4",
"branch_name": "refs/heads/master",
"committer_date": 1487000102000,
"content_id": "803bf550bfc8fbb9d1a0fe1eb797cabfe277219c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "69f91a91f6be1558cb27fdb557005253841e1115",
"extension": "py"... | 2.84375 | stackv2 | import os.path
import logging
from Crypto.Hash import SHA256
from Crypto.PublicKey import RSA
from Crypto.Signature import PKCS1_v1_5
from base64 import b64encode
from config.config import clientname
logger = logging.getLogger(__name__)
logger.setLevel(logging.INFO)
filehandler = logging.FileHandler('logs/stock_excha... | 130 | 28.62 | 85 | 15 | 935 | python | [{"finding_id": "codeql_py/weak-crypto-key_121ecd55c6682ba1_db438884", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
56
] | [
null
] | [
24
] | [
51
] | |
2024-11-19T03:12:45.931174+00:00 | 1,592,214,839,000 | 94dfc1cf553a664dd25ca5b0d9a78e10b046aae3 | 2 | {
"blob_id": "94dfc1cf553a664dd25ca5b0d9a78e10b046aae3",
"branch_name": "refs/heads/master",
"committer_date": 1592214839000,
"content_id": "08304d54f676237a16b4d77903c4bcdb387d5595",
"detected_licenses": [
"MIT"
],
"directory_id": "81eb4b95aca27fa5ffd2b0881112925a9ded9c67",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/env python
""" Runs an diskless ORCA calculation. Requires the following env to be set:
ORCACMD: the full path to the orca binary
ORCAPROJECT: a unique projectprefix, no space
"""
import time
import subprocess
import shutil
import tarfile
import io
import os
import glob
import random
import sys
import stri... | 184 | 23.87 | 116 | 18 | 1,290 | python | [{"finding_id": "codeql_py/tarslip_17ecdd56bad4d394_7b17caaa", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/tarslip",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
116,
179
] | [
null,
null
] | [
3,
5
] | [
6,
8
] | |
2024-11-19T03:25:22.597570+00:00 | 1,550,047,163,000 | c14c1c69c4d20633775ba78f50ea4613e3ac3513 | 3 | {
"blob_id": "c14c1c69c4d20633775ba78f50ea4613e3ac3513",
"branch_name": "refs/heads/master",
"committer_date": 1550047253000,
"content_id": "6af76641815282bcde2e2e61029466d11c3a656d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "70c3b1ef11b971a57832599376cc526192835812",
"extension": "py"... | 2.71875 | stackv2 | from dataclasses import dataclass, field
from copy import copy
from jinja2 import Environment, FileSystemLoader
from mistletoe.html_renderer import HTMLRenderer
from mistletoe.block_token import Document
from pygments.lexers import LeanLexer
from pygments import highlight
from pygments.formatters import HtmlFormatte... | 58 | 32.83 | 94 | 20 | 421 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_70147a345b310884_91b41aae", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
55
] | [
null
] | [
21
] | [
63
] | |
2024-11-19T03:25:35.965240+00:00 | 1,690,144,450,000 | 7acf8db1c3beff69a374981c92b9c38689718456 | 2 | {
"blob_id": "7acf8db1c3beff69a374981c92b9c38689718456",
"branch_name": "refs/heads/master",
"committer_date": 1690144450000,
"content_id": "fcd40d0a4e699018eb750f0178275205fc68985e",
"detected_licenses": [
"MIT"
],
"directory_id": "04963e5a7a49e4d938a652e96953fadcd21a2ef7",
"extension": "py",
"fi... | 2.34375 | stackv2 | import os
import tarfile
from pathlib import Path
import itertools
from torch.optim import Adam
import numpy as np
import torch
from tmrl.config import config_constants as cfg
from tmrl.util import dump, load
import logging
def load_run_instance_images_dataset(checkpoint_path):
"""
function used to load tra... | 207 | 44.54 | 168 | 21 | 2,047 | python | [{"finding_id": "codeql_py/tarslip_b1291da88e9925cc_2ff1c515", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
30
] | [
null
] | [
9
] | [
10
] | |
2024-11-19T03:25:41.406070+00:00 | 1,614,705,622,000 | ed1bf3d93bbf45f74b8813bbfadfa83c9ea0a8f5 | 3 | {
"blob_id": "ed1bf3d93bbf45f74b8813bbfadfa83c9ea0a8f5",
"branch_name": "refs/heads/main",
"committer_date": 1614705622000,
"content_id": "36b7e3952ec0ceeb0b94806c5ebaee400c7c0b0e",
"detected_licenses": [
"MIT"
],
"directory_id": "792b271c39d7fe15a5508412246419dd4eb5c527",
"extension": "py",
"file... | 2.953125 | stackv2 | #!/usr/bin/python3
import string
import sys
from http.server import BaseHTTPRequestHandler, HTTPServer
class ProxyHTTPRequestHandler(BaseHTTPRequestHandler):
def do_GET(self, body=True):
try:
# Parse the URL and convert to HTTPS redirect
self.send_response(301)
dest = "... | 27 | 33 | 81 | 14 | 215 | python | [{"finding_id": "codeql_py/http-response-splitting_5281bec1031ddd2e_d9beb8b2", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).", "remediation": "", "lo... | 1 | true | [
"CWE-113"
] | [
"py/http-response-splitting"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This HTTP header is constructed from a [user-provided value](1)."
] | [
16
] | [
null
] | [
42
] | [
46
] | |
2024-11-19T03:35:44.648292+00:00 | 1,584,700,013,000 | 322053a34df9ba431d7469020d00f60d4771d143 | 3 | {
"blob_id": "322053a34df9ba431d7469020d00f60d4771d143",
"branch_name": "refs/heads/master",
"committer_date": 1584700013000,
"content_id": "2fa12c687f6487688f27844b924b9a98c0cef6bf",
"detected_licenses": [
"MIT"
],
"directory_id": "c044216392aef473e5e9afd846f0bfe8266ab668",
"extension": "py",
"fi... | 2.65625 | stackv2 | # -*- coding: utf-8 -*-
from flask import Flask, request, url_for, redirect, abort, make_response, jsonify, session, escape, g
import json
import os
from urllib.parse import urlparse, urljoin
from jinja2.utils import generate_lorem_ipsum
app = Flask(__name__)
# @app.route('/hello', methods=["GET","POST"])
# def hel... | 271 | 24.62 | 110 | 14 | 1,968 | python | [{"finding_id": "codeql_py/cookie-injection_d2eeef49c4d0ac3b_1e94e19f", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "... | 4 | true | [
"CWE-020",
"CWE-215",
"CWE-079",
"CWE-601"
] | [
"py/cookie-injection",
"py/flask-debug",
"py/reflective-xss",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cookie is constructed from a [user-supplied input](1).",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value... | [
117,
271,
27,
193
] | [
null,
null,
null,
null
] | [
33,
5,
12,
29
] | [
37,
51,
41,
35
] | |
2024-11-19T03:35:48.961489+00:00 | 1,514,471,822,000 | e2712697ca532b7b024ecce2a1e255bd94d3af22 | 2 | {
"blob_id": "e2712697ca532b7b024ecce2a1e255bd94d3af22",
"branch_name": "refs/heads/master",
"committer_date": 1514471822000,
"content_id": "13ee920756951c105f1fbec945281d8da332007d",
"detected_licenses": [
"MIT"
],
"directory_id": "7daa3808e09e162e1852d4980378d82da12ea556",
"extension": "py",
"fi... | 2.328125 | stackv2 | # -*- coding: utf-8 -*-
import os, git
from jinja2 import Environment,FileSystemLoader
# Main loop
if __name__ == '__main__':
# Get history
repo = git.Repo('.')
commits = repo.log(path='me.yaml')
# Load templates
env = Environment(loader=FileSystemLoader(os.sep.join((
'template... | 41 | 25.59 | 76 | 21 | 235 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c8c514ad8e369bf4_a9d6a8a8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
16
] | [
18
] | [
11
] | [
17
] | |
2024-11-19T01:28:45.132576+00:00 | 1,399,845,082,000 | e1cb1eb397194430f17b5719b0a34e0eb25203cb | 3 | {
"blob_id": "e1cb1eb397194430f17b5719b0a34e0eb25203cb",
"branch_name": "refs/heads/master",
"committer_date": 1399845082000,
"content_id": "aaf09139b211fa53d9a7288fc0c8dbb762e2f997",
"detected_licenses": [
"MIT"
],
"directory_id": "7d3bf107eb7c4a799a36ab833ac0dca424556b02",
"extension": "py",
"fi... | 3.140625 | stackv2 | #!/usr/bin/env python
import getpass
import os
import subprocess
try:
import pwd
import spwd
import crypt
except ImportError:
pass
def unix_has_current_user_root_privileges():
"""
Check if the current user has the root rights, just by verifying if the group uid is 0
"""
return os.gete... | 131 | 31.49 | 118 | 15 | 917 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_55c7b4606d58a7ed_2796b5c6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
35,
46,
111,
111
] | [
null,
null,
null,
null
] | [
15,
19,
11,
21
] | [
51,
55,
19,
29
] | |
2024-11-19T01:28:45.751569+00:00 | 1,586,263,845,000 | 605bcdffbb3bd54876ea684c6baf80be1cae80a2 | 2 | {
"blob_id": "605bcdffbb3bd54876ea684c6baf80be1cae80a2",
"branch_name": "refs/heads/master",
"committer_date": 1586263845000,
"content_id": "96da0798437d3b9fdb5049491bc0f2958d07f2c6",
"detected_licenses": [
"MIT"
],
"directory_id": "70d3877d9bc014e4eba00e2cdab4ddceaf4df1a1",
"extension": "py",
"fi... | 2.375 | stackv2 | from flask import Blueprint, render_template, flash, redirect, session, url_for, request, g
from flask.ext.login import login_user, logout_user, current_user, login_required
from app import app, db, login_manager
from forms import LoginForm, RegistrationForm
from app.users.models import User
mod = Blueprint('users', _... | 40 | 30.98 | 91 | 14 | 272 | python | [{"finding_id": "codeql_py/url-redirection_d0e31ae9fe2bb215_491332a4", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
21
] | [
null
] | [
25
] | [
69
] | |
2024-11-19T01:28:59.069014+00:00 | 1,585,764,319,000 | 6cf6ef28f50820b22c38dd9317caf9a33abb0e94 | 3 | {
"blob_id": "6cf6ef28f50820b22c38dd9317caf9a33abb0e94",
"branch_name": "refs/heads/master",
"committer_date": 1585764319000,
"content_id": "6589b166e93e80a13b5c7119741c4979368d4ef8",
"detected_licenses": [
"MIT"
],
"directory_id": "9eaa2c64a777bd24a3cccd0230da5f81231ef612",
"extension": "py",
"fi... | 2.8125 | stackv2 | from flask import Flask,request,render_template
import datetime
import os
app = Flask(__name__)
@app.route('/upload_file',methods=['GET','POST'])
def upload_file():
# 根据用户的请求意图去执行不同的功能
if request.method == "GET":
return render_template('01-upload.html')
else:
username = request.form['userna... | 33 | 28.64 | 69 | 15 | 248 | python | [{"finding_id": "codeql_py/flask-debug_96d1b07c7bc8c649_7c90e588", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
33,
28
] | [
null,
null
] | [
5,
16
] | [
24,
27
] | |
2024-11-19T01:30:06.409346+00:00 | 1,566,916,954,000 | d4c510278fbaba4fc5da1921c35c48a43b92b4ac | 5 | {
"blob_id": "d4c510278fbaba4fc5da1921c35c48a43b92b4ac",
"branch_name": "refs/heads/master",
"committer_date": 1566916954000,
"content_id": "73eac590c4250a4c12fdd203b97954c6e0fdc1e1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bcfb7d131343150ff79162005ca8454ea90cdd07",
"extension": "py"... | 4.53125 | stackv2 | #Problem 1
def numberPrint(): # function to print numbers -25-20
for x in range(-25,21,1): #for loop that defines that range of -25 to 20 w/increments of 1
print(x) #displays numbers
numberPrint()
#Problem 2
def checkPassword(): #function that prints the 2nd function password
print(password())
def pas... | 72 | 31.36 | 122 | 11 | 677 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eabb27430efbfb06_1d65784f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
10
] | [
null
] | [
11
] | [
21
] | |
2024-11-19T01:30:15.762609+00:00 | 1,439,843,259,000 | 3fa7455873e349f45ca9149128d1077f1fc19779 | 3 | {
"blob_id": "3fa7455873e349f45ca9149128d1077f1fc19779",
"branch_name": "refs/heads/master",
"committer_date": 1439843259000,
"content_id": "ab4835442ef69b878c19b64d54c9071df1ad0eee",
"detected_licenses": [
"MIT"
],
"directory_id": "55500c5868788ce079fd951cd97b31018f9c8733",
"extension": "py",
"fi... | 2.75 | stackv2 | ## -*- coding: utf-8 -*-
import os
import base64
from copy import deepcopy
from bs4 import BeautifulSoup
import requests
requests.packages.urllib3.disable_warnings()
import jinja2
import IPython.nbformat as nb
from IPython.config import Config
from IPython.nbconvert import HTMLExporter
from template import TEMPL... | 139 | 27.96 | 111 | 16 | 950 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e42f9bb0dffb36d0_e0f1bb9b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
57
] | [
null
] | [
19
] | [
55
] | |
2024-11-19T01:30:31.905515+00:00 | 1,616,432,060,000 | 8343354bb2acd2dec219fd1123038e84d7873c31 | 2 | {
"blob_id": "8343354bb2acd2dec219fd1123038e84d7873c31",
"branch_name": "refs/heads/master",
"committer_date": 1616432060000,
"content_id": "3870499d784c62e162c15cad7c27e76b3331563d",
"detected_licenses": [
"MIT-0"
],
"directory_id": "a211cbacc8cb65b3bffd73db56651237abfa3d50",
"extension": "py",
"... | 2.3125 | stackv2 | from flask import Flask, render_template, jsonify, \
request, Response, redirect, url_for, session
import random
import boto3
import os
# Flask configurations
app = Flask(__name__)
# Constants
BUCKET_NAME = os.getenv("BUCKET_NAME","ai-services-for-demo")
S3_CLIENT = boto3.client('s3')
OUTPUT_PREFIX = "polly_outpu... | 62 | 29.06 | 97 | 16 | 431 | python | [{"finding_id": "codeql_py/flask-debug_a6285e83ba371ab7_15856ada", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
62,
54
] | [
null,
null
] | [
null,
22
] | [
36,
31
] | |
2024-11-19T01:55:08.800946+00:00 | 1,616,954,687,000 | 96d1ea3236f11cd2a44b15b7077fb70a643e6b76 | 2 | {
"blob_id": "96d1ea3236f11cd2a44b15b7077fb70a643e6b76",
"branch_name": "refs/heads/main",
"committer_date": 1616954687000,
"content_id": "6d74b0724c4625d8f03c38040dc0cbc4e90aedcc",
"detected_licenses": [
"MIT"
],
"directory_id": "705a009572cde4f79dd16346806484e48314e98e",
"extension": "py",
"file... | 2.390625 | stackv2 | from flask import Flask, request, jsonify
from flask_cors import CORS
import json
import datetime
import ipfshttpclient
from PIL import Image
import urllib.request as urllib
import io
import pytesseract
import requests
app = Flask(__name__)
CORS(app)
client = ipfshttpclient.connect('/ip4/127.0.0.1/tcp/5001/http')
d... | 66 | 30 | 95 | 20 | 520 | python | [{"finding_id": "codeql_py/flask-debug_e6e7acbf6e8ae484_9c9d4300", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
65,
40
] | [
null,
null
] | [
5,
14
] | [
24,
65
] | |
2024-11-19T01:55:18.782336+00:00 | 1,559,725,959,000 | 3c7109f75b4fae8b1d413d12ae7d1c8ebec3de4f | 3 | {
"blob_id": "3c7109f75b4fae8b1d413d12ae7d1c8ebec3de4f",
"branch_name": "refs/heads/master",
"committer_date": 1559725959000,
"content_id": "0c1d58f6701445f0f811a20c8a8a19a3480c0e71",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e15e29acc1a7bd4bf43aeebc513cadebe512d035",
"extension": "py"... | 2.5625 | stackv2 | import openpyxl
import requests
def find_url(url):
headers = {'User-Agent': 'Dalvik/2.1.0 (Linux; U; Android 5.1; MI PAD 2 MIUI/V9.6.1.0.LACCNFD)',
'Host': 'www.yilaitong.net',
'Connection':'Keep-Alive',
'Accept-Encoding': 'gzip'
}
requests.packages.u... | 40 | 25.32 | 100 | 12 | 295 | python | [{"finding_id": "codeql_py/request-without-cert-validation_66e9b7d86a5cd4d1_d7deb6e1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
11
] | [
null
] | [
11
] | [
63
] | |
2024-11-19T02:06:52.912499+00:00 | 1,542,245,677,000 | 6f05178c253c5956ae614c6855d42e57b3426dca | 3 | {
"blob_id": "6f05178c253c5956ae614c6855d42e57b3426dca",
"branch_name": "refs/heads/master",
"committer_date": 1542245677000,
"content_id": "59713251d5fca14193a896e9145bdf690c53c059",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3c1639bccf3fc0abc9c82c00ab92ac3f25cf105e",
"extension": "py"... | 3.046875 | stackv2 | # coding:utf-8
from flask import Flask, current_app, redirect, url_for
from werkzeug.routing import BaseConverter
app = Flask(__name__)
# 1.转换器:<int:goods_id>
# <goods_id> 不加转换器类型,默认使用字符串规则。(除了/字符)
@app.route('/goods/<int:goods_id>')
def goods_detail(goods_id):
return 'goods detail page %s' % goods_id
@app.rout... | 51 | 23.22 | 62 | 11 | 440 | python | [{"finding_id": "codeql_py/flask-debug_00b45030a2c57c5d_c61d65ac", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a ... | [
48,
11,
15,
44
] | [
null,
null,
null,
null
] | [
5,
12,
12,
12
] | [
28,
45,
44,
63
] | |
2024-11-19T02:31:19.230385+00:00 | 1,617,134,528,000 | e777a84a036e1fd22946d3c641a0dfc769f37936 | 3 | {
"blob_id": "e777a84a036e1fd22946d3c641a0dfc769f37936",
"branch_name": "refs/heads/master",
"committer_date": 1617134528000,
"content_id": "e03906ec53db750289f90feb9fd60ed1d183220d",
"detected_licenses": [
"MIT"
],
"directory_id": "0421d60515e89c14e33a4b3dc1c2aec31d07cc53",
"extension": "py",
"fi... | 2.609375 | stackv2 | import os
from PIL import Image as PILImage
from flask import (
Blueprint,
Response,
abort,
current_app,
flash,
g,
send_from_directory,
redirect,
render_template,
url_for
)
from sqlalchemy.orm.exc import NoResultFound
from werkzeug.utils import secure_filename
from chgallery.au... | 140 | 27.71 | 101 | 17 | 869 | python | [{"finding_id": "codeql_py/path-injection_8f18c749f3135760_e8320f21", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).\nThis pa... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).\nThis path depends on a [user-provided value](3)."
] | [
122
] | [
null
] | [
15
] | [
43
] | |
2024-11-19T02:31:28.387271+00:00 | 1,533,904,419,000 | e5549bb56a5d77fd2fd347d8e4da00756d8406c0 | 3 | {
"blob_id": "e5549bb56a5d77fd2fd347d8e4da00756d8406c0",
"branch_name": "refs/heads/master",
"committer_date": 1533904419000,
"content_id": "462d54e9c7ac9ffef44d29c0748e766bf2dabd47",
"detected_licenses": [
"MIT"
],
"directory_id": "596de34ff00fdd63bde26372e040f7bdeb7f4639",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/env python
# Imports
from dotenv import load_dotenv, find_dotenv
import requests
import time
import Adafruit_SSD1306
import RPi.GPIO as GPIO
from gpiozero import Button,RGBLED,PingServer
from PIL import Image,ImageFont,ImageDraw
import os
import random
import json
load_dotenv(find_dotenv())
FONT_PATH = os... | 308 | 22.83 | 114 | 19 | 2,067 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_efc4e11cefb09a18_805fa523", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
187
] | [
null
] | [
11
] | [
16
] | |
2024-11-19T02:31:39.617891+00:00 | 1,572,983,210,000 | 6cb5d5b1e95e367c32a53a53fda0d77ae5d3b9f0 | 2 | {
"blob_id": "6cb5d5b1e95e367c32a53a53fda0d77ae5d3b9f0",
"branch_name": "refs/heads/master",
"committer_date": 1572983210000,
"content_id": "8000945cbd76b8f77411dbace4fcd5d1e4d26d7e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ee4651f0c1a48cb84b766ff062d952a51c0cc0f2",
"extension": "py"... | 2.484375 | stackv2 | # Copyright 2015 Jared Rodriguez (jared.rodriguez@rackspace.com)
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENS... | 122 | 35.17 | 95 | 14 | 975 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_847c7e195e349e55_781aa901", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
40
] | [
null
] | [
27
] | [
49
] | |
2024-11-19T02:31:46.052302+00:00 | 1,570,871,633,000 | 92d9f3c3d77bf75b7ba7be29fc93658bd67bd97b | 2 | {
"blob_id": "92d9f3c3d77bf75b7ba7be29fc93658bd67bd97b",
"branch_name": "refs/heads/master",
"committer_date": 1570871633000,
"content_id": "dbaf39cf44c24abe7beef1ee19b6db5f1e1d8a73",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d7e9f94a04b2691e358f818c9d6d7c0d933ed987",
"extension": "py"... | 2.328125 | stackv2 | # -*- coding: utf-8 -*-
import MySQLdb
meteoapi_user=''
meteoapi_password=''
meteoapi_db=''
def setup(user,password,db):
global meteoapi_user,meteoapi_password, meteoapi_db
meteoapi_user=user
meteoapi_password=password
meteoapi_db=db
# per previsio - últims 24*dies
def platja_id_to_descripcio(id):
... | 110 | 28.75 | 164 | 10 | 841 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3550e0c0bd4cee3e_34b385c3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
97
] | [
null
] | [
11
] | [
19
] | |
2024-11-19T02:32:15.762392+00:00 | 1,626,314,717,000 | 5b65dad8f6df6dc6f80cd2e6cbe3d08b3533cd81 | 4 | {
"blob_id": "5b65dad8f6df6dc6f80cd2e6cbe3d08b3533cd81",
"branch_name": "refs/heads/main",
"committer_date": 1626314717000,
"content_id": "273fc80b5de151fc2b0bb5aa838fb8d2812cdc34",
"detected_licenses": [
"MIT"
],
"directory_id": "99f345c8c77867abf99ed537ca7acc53ffd5d2be",
"extension": "py",
"file... | 3.640625 | stackv2 | # -*- coding: utf-8 -*-
"""
# Backtracking Algorithm
## SCC5900 - Algorithm Design
### Lecture 5
#### v1
$ python backtracking.py < 1.in > 1_ans.out
"""
import sys
from itertools import product
def get_passwords_from_rule(words, rule):
digits = [str(i) for i in range(10)]
par = []
for char in rule:
... | 82 | 16.2 | 60 | 12 | 356 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_40f8cde1955f3d5b_f4a178fe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
82
] | [
null
] | [
15
] | [
16
] | |
2024-11-19T02:32:18.835767+00:00 | 1,418,915,175,000 | a6c5135ba8271a5034a8271222bc075b4873cd8f | 3 | {
"blob_id": "a6c5135ba8271a5034a8271222bc075b4873cd8f",
"branch_name": "refs/heads/master",
"committer_date": 1418915175000,
"content_id": "c4f6eda3dc3727b76a67e7d4f0463c1890d79fd1",
"detected_licenses": [
"MIT"
],
"directory_id": "13ba19367fe7beb9cfb4364e9cc05db89f1e8dc5",
"extension": "py",
"fi... | 2.609375 | stackv2 | #!/usr/bin/python
# ---------------------------------------------------------
#
# AWS helper functions
#
# @author Peter Perger @ Ennosol Technology Co. Ltd.
# @package aws-tools
#
# ---------------------------------------------------------
import os
import json
import wlo
import colorization
# AWS files
HOME = wlo.g... | 102 | 38.21 | 144 | 19 | 983 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_09c61fb266c9f12b_e7787067", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
29
] | [
null
] | [
17
] | [
122
] | |
2024-11-19T02:32:20.441847+00:00 | 1,612,861,284,000 | 8962b26ba85e1ea5cd5cc62e122dd7cf75eca4d9 | 2 | {
"blob_id": "8962b26ba85e1ea5cd5cc62e122dd7cf75eca4d9",
"branch_name": "refs/heads/main",
"committer_date": 1612861284000,
"content_id": "6663d3d9b9f03b3bf53d7aa80800270386bed1a9",
"detected_licenses": [
"MIT"
],
"directory_id": "f6600a5128e71d7e1e91a452b7df2d2d8e6a022e",
"extension": "py",
"file... | 2.46875 | stackv2 | from django.shortcuts import render
from django.views import View
import json, base64, pickle
from django import http
from django_redis import get_redis_connection
from django.shortcuts import render
from goods.models import SKU
from tongyou.utils.response_code import RETCODE
# Create your views here.
class CartsView... | 356 | 32.3 | 96 | 18 | 2,856 | python | [{"finding_id": "codeql_py/unsafe-deserialization_ba1aa29cf2eac3ba_6488f07a", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio... | 6 | true | [
"CWE-502",
"CWE-502",
"CWE-502",
"CWE-502",
"CWE-502",
"CWE-502"
] | [
"py/unsafe-deserialization",
"py/unsafe-deserialization",
"py/unsafe-deserialization",
"py/unsafe-deserialization",
"py/unsafe-deserialization",
"py/unsafe-deserialization"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Unsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provi... | [
67,
114,
194,
240,
298,
341
] | [
null,
null,
null,
null,
null,
null
] | [
42,
42,
42,
42,
38,
42
] | [
50,
50,
50,
50,
46,
50
] | |
2024-11-19T02:32:22.667075+00:00 | 1,509,397,784,000 | 45c30f4f2b8ba53f12947c4326072ae7b40adebe | 3 | {
"blob_id": "45c30f4f2b8ba53f12947c4326072ae7b40adebe",
"branch_name": "refs/heads/master",
"committer_date": 1509397784000,
"content_id": "b6a979fb97de3acfbcd6c6de57e3d1faa4a90759",
"detected_licenses": [
"MIT"
],
"directory_id": "f3a0954f59b8fd2b43780a154a4d864efa453a20",
"extension": "py",
"fi... | 3 | stackv2 | from flask import Flask
from flask import render_template
from flask import request
from flask import redirect
import random
import requests
from bs4 import BeautifulSoup as bs
app = Flask(__name__)
videos = []
skipCurrentSong = False
# Takes a playlist URL as input, and then populates the 'videos'
# global variab... | 91 | 21.99 | 67 | 13 | 497 | python | [{"finding_id": "codeql_py/full-ssrf_672a48cf646e94b3_c97c683f", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
19
] | [
null
] | [
9
] | [
26
] | |
2024-11-19T02:32:33.175618+00:00 | 1,628,280,543,000 | 57c9d0cec70c4a70eda26baa67c9cbeb984275f0 | 2 | {
"blob_id": "57c9d0cec70c4a70eda26baa67c9cbeb984275f0",
"branch_name": "refs/heads/master",
"committer_date": 1628280543000,
"content_id": "c0ab344c77fd05111ea0bdb53060c22c7b0cca59",
"detected_licenses": [
"MIT"
],
"directory_id": "1845f0d71f3ed4063bbb5417ca6ae1555a16dd0a",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/usr/bin/env python3
# Extract Possible IoC of package
# -*- coding: utf-8 -*-
# %%%%%%%%%%% Libraries %%%%%%%%%%%#
import re
import os
import gzip
import json
import codecs
import shutil
import tarfile
from auxiliar_functions.globals import tmp
from auxiliar_functions.globals import extensions
# %%%%%%%%%%% Func... | 117 | 43.06 | 79 | 28 | 933 | python | [{"finding_id": "codeql_py/tarslip_e28309d968321ad0_150f3145", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
52
] | [
null
] | [
17
] | [
21
] | |
2024-11-19T02:32:43.794344+00:00 | 1,567,682,974,000 | d743bf00721967c3625f28aba016b1babf283df0 | 3 | {
"blob_id": "d743bf00721967c3625f28aba016b1babf283df0",
"branch_name": "refs/heads/master",
"committer_date": 1567682974000,
"content_id": "1e5108faa7650024619d1d74154c20e19fcf50d1",
"detected_licenses": [
"Unlicense"
],
"directory_id": "6ab15321a7dc816cc07008068fb6890097ce3676",
"extension": "py",... | 3 | stackv2 | # !/usr/bin/env python
# -*- coding:utf-8 -*-
# 作者:ChrisChan
# 用途:模拟curl给目标端口发get信息,如果无法连接或者返回值不是正常值就重启程序。
# 需要提前安装pycurl,pyyaml和paramiko
# 需要配置文件detect.conf,结构如下:
# ---
# Name: mrs-05
# IP: 10.0.1.14
# Port: 9030
# Code: 401 #返回状态码
# ---
# Name: mrs-04
# IP: 10.0.1.13
# Port: 9030
#... | 84 | 25.76 | 88 | 13 | 764 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_882b9e92276b0025_e3c9c099", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
57
] | [
null
] | [
5
] | [
62
] | |
2024-11-19T02:32:44.690943+00:00 | 1,615,818,798,000 | a04cded792302fe14efe6202ccd26bf6ee5ada5b | 2 | {
"blob_id": "a04cded792302fe14efe6202ccd26bf6ee5ada5b",
"branch_name": "refs/heads/master",
"committer_date": 1615818798000,
"content_id": "10a300b43e16f4d8e4f8ef09d4e359348c9a8fb3",
"detected_licenses": [
"MIT"
],
"directory_id": "b70374e1b8ebc07f3568afc8fe88219fe8d5550e",
"extension": "py",
"fi... | 2.46875 | stackv2 | from flask import Flask, render_template, url_for, request, send_file
from flask import *
import os
from cryptography.fernet import Fernet
import helper
from helper.steganography import *
app = Flask(
__name__, instance_path='C:\\Users\\ysaik\\Desktop\\Steganographer\\steganographer\\decryption_input')
app.confi... | 101 | 28.78 | 122 | 14 | 677 | python | [{"finding_id": "codeql_py/flask-debug_faa5f0a6f9c271d5_ed9556b7", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
101,
75
] | [
null,
null
] | [
5,
16
] | [
24,
23
] | |
2024-11-19T02:33:01.081775+00:00 | 1,526,132,335,000 | d237bd739f7dd39e1667eb281a4c268252f5ff55 | 2 | {
"blob_id": "d237bd739f7dd39e1667eb281a4c268252f5ff55",
"branch_name": "refs/heads/master",
"committer_date": 1526132335000,
"content_id": "5845d4b5415d5cb421f9bae9cb231082b935bbed",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3570c4b8dd1792d595c32de27547214b63f95169",
"extension": "py"... | 2.34375 | stackv2 | from flask import current_app, Blueprint, request
from models import is_token_valid, User, Token, Diary, db_object_to_dict, db_object_to_json
import datetime
import hashlib
import json
import uuid
from bson import ObjectId
views = Blueprint('views', __name__)
# Remember to update this list
ENDPOINT_LIST = ['/', '/met... | 407 | 30.95 | 118 | 20 | 2,909 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_8eb33ac5bbd688e8_75daa896", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
110,
144
] | [
null,
null
] | [
42,
42
] | [
68,
68
] | |
2024-11-19T02:33:11.051831+00:00 | 1,555,003,304,000 | 4323aa349488cb47ded13a2d74da1428043982e7 | 3 | {
"blob_id": "4323aa349488cb47ded13a2d74da1428043982e7",
"branch_name": "refs/heads/master",
"committer_date": 1555003304000,
"content_id": "07265935c543a100f14bc9d9f409d83057acb975",
"detected_licenses": [
"MIT"
],
"directory_id": "f613325922692799e9bcee9cc866df897b6cc0a3",
"extension": "py",
"fi... | 2.96875 | stackv2 | import requests
import re
def bruteforce_password(url, username, password):
characters = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789'
# Filters chars to narrow the search range
filtered = ''
print ('Filtering characters: ', end = '', flush = True)
for c in characters:
d... | 40 | 32.95 | 92 | 15 | 356 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d611e79bb750b761_b050820b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
40
] | [
null
] | [
7
] | [
51
] | |
2024-11-19T02:33:11.168169+00:00 | 1,478,319,380,000 | 60e03612fd86d386271ec03245f8f03dd956e931 | 3 | {
"blob_id": "60e03612fd86d386271ec03245f8f03dd956e931",
"branch_name": "refs/heads/master",
"committer_date": 1591241428000,
"content_id": "c112527033db47da1a8cdf0b2a5df0f3c4380316",
"detected_licenses": [
"MIT"
],
"directory_id": "0c1c82db17defc8b011a89c1554a0732571553ad",
"extension": "py",
"fi... | 2.625 | stackv2 | import os, re, time, json, pathlib, zipfile
# possible output types:
# plain
# json
output_type = 'plain'
path = pathlib.PurePath(os.getcwd())
if 'Add-Ons' in os.listdir():
addon_path = path / 'Add-Ons'
else:
addon_path = path
regex = re.compile(b'\s*function serverCmd([\w\d]+)\s*\(([%\w\d,\s]+)*\)', re.I)
... | 65 | 31.75 | 146 | 22 | 547 | python | [{"finding_id": "codeql_py/redos_b948d83fdb8c495f_5aedf634", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'function servercmd0(' and contain... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'function servercmd0(' and containing many repetitions of '\\t'."
] | [
15
] | [
null
] | [
58
] | [
69
] | |
2024-11-19T02:43:33.210353+00:00 | 1,575,109,390,000 | b057e044fda075a80170cc2da3432685c254dda1 | 3 | {
"blob_id": "b057e044fda075a80170cc2da3432685c254dda1",
"branch_name": "refs/heads/master",
"committer_date": 1575109390000,
"content_id": "6c2c446a3005ef984c22edec070936f285e8cc5b",
"detected_licenses": [
"MIT"
],
"directory_id": "5a9d8ee1cf359b4c96c01a27d492ec59204acbea",
"extension": "py",
"fi... | 2.515625 | stackv2 |
# import shutil
import os
# from datetime import datetime
from pathlib import Path
import urlgrabber
from urllib.request import urlsplit
import zipfile, tarfile
import re
from PySide2.QtCore import (
Signal,
# Slot,
# QObject,
QThread,
)
import gettext
gb = gettext.translation('repository', local... | 168 | 36.22 | 114 | 19 | 1,645 | python | [{"finding_id": "codeql_py/tarslip_60d7f894fbed5247_65f3c60c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
156
] | [
null
] | [
9
] | [
20
] | |
2024-11-19T02:54:59.313568+00:00 | 1,587,371,620,000 | be546e1b14b69046a6b932208ec6112bc436a24e | 4 | {
"blob_id": "be546e1b14b69046a6b932208ec6112bc436a24e",
"branch_name": "refs/heads/master",
"committer_date": 1587371620000,
"content_id": "3533a51914ca03b9a137b86234e4e186a4233550",
"detected_licenses": [
"MIT"
],
"directory_id": "37466c394358c62f379da98a6776ee227b7a60eb",
"extension": "py",
"fi... | 3.59375 | stackv2 | #!/usr/bin/env python3.6
from user import User
from credentials import Credential
import random
def create_user_account(user_name,passcode):
new_user = User(user_name,passcode)
return new_user
def save_user(user):
user.saveUser()
def check_user(user_name,passcode):
user_found = User.user_exists(user... | 174 | 32.16 | 129 | 26 | 975 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e2ecc41fffdabace_cdac18e1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
131
] | [
null
] | [
40
] | [
73
] | |
2024-11-19T02:55:07.652037+00:00 | 1,624,373,497,000 | 3e4d899d51b3b862a133f0bd999df169ec79c3e5 | 3 | {
"blob_id": "3e4d899d51b3b862a133f0bd999df169ec79c3e5",
"branch_name": "refs/heads/main",
"committer_date": 1624373497000,
"content_id": "d3d211669b0201f7e9f99e20e13a70c80d993603",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7cdc0513e4dfa35ab2ab9a97d8e8a5e92058ea1f",
"extension": "py",
... | 2.65625 | stackv2 | import bilib
import time
def show_comment(aid,page = 1,video = True):
info = bilib.video_comment(aid = aid,page=page,video=video)
for key,value in info.items():
total_page = value["total_page"]
print("第" + str(page) + "页/共" + str(total_page) + "页")
break
for key,value in info.items()... | 61 | 38.84 | 109 | 21 | 635 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5edb691bee8d6167_87ba32e3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
20,
46
] | [
null,
null
] | [
15,
23
] | [
80,
109
] | |
2024-11-19T02:55:07.990742+00:00 | 1,517,382,615,000 | 0ff6150fac4a582851da205120c3553087b793f1 | 3 | {
"blob_id": "0ff6150fac4a582851da205120c3553087b793f1",
"branch_name": "refs/heads/master",
"committer_date": 1517382615000,
"content_id": "252e949c3dfd8e3c3c818cba78f50f25741adc3f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fad2f8cce17fa8b04ec526fc0007148531f5d987",
"extension": "py"... | 2.765625 | stackv2 | #!/usr/bin/env python2
"""
NOTE: This file is included for test purposes only. You should not need it to
capture any flags.
"""
from Crypto.Cipher import AES
from secrets import *
if __name__=='__main__':
cipher = AES.new(FIXED_KEY, AES.MODE_ECB)
c1 = cipher.decrypt(SERIAL_FLAG).encode('hex')
c2 = cipher... | 17 | 31.18 | 88 | 12 | 150 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_d18d0f5a882d7413_beae3907", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 4 | true | [
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
13,
14,
17,
17
] | [
null,
null,
null,
null
] | [
10,
10,
22,
56
] | [
37,
36,
54,
88
] | |
2024-11-19T02:55:12.635866+00:00 | 1,557,513,093,000 | 697bc372c1df0bcb698a0b986af9c2c39f91c97a | 4 | {
"blob_id": "697bc372c1df0bcb698a0b986af9c2c39f91c97a",
"branch_name": "refs/heads/master",
"committer_date": 1557513093000,
"content_id": "734e07bb3abd2550813f77511bac7ead25da5f72",
"detected_licenses": [
"MIT"
],
"directory_id": "cca3ada55a1643836f539214fbec95780932fa3d",
"extension": "py",
"fi... | 3.8125 | stackv2 | """
Write a program to read file EmployeeData.csv and print the id of every employee suspected of arson
BONUS: Try doing it with and without the csv module
"""
# Without CSV
f = open("EmployeeData.csv")
header = f.readline()
employeeList = f.readlines()
suspectID = []
for employee in employeeList:
entry = employee... | 33 | 19.79 | 99 | 12 | 174 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d7f0c638ec28e004_c6efc10a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
19
] | [
null
] | [
11
] | [
12
] | |
2024-11-19T02:55:13.999064+00:00 | 1,583,209,243,000 | d7171f8c1e42cadc5e90a10fa58dab2b967492cd | 3 | {
"blob_id": "d7171f8c1e42cadc5e90a10fa58dab2b967492cd",
"branch_name": "refs/heads/master",
"committer_date": 1583209243000,
"content_id": "1ee7bf7a4f5955d578c8eacff502d4034b2da28f",
"detected_licenses": [
"MIT"
],
"directory_id": "70ba8427a8ee5e16d7a9f577409965ed75abf167",
"extension": "py",
"fi... | 2.546875 | stackv2 | from re import sub
class spliters:
def reformat(self, sql):
uncomment = sub(r'/\*([^*]|[\r\n]|(\*+([^*/]|[\r\n])))*\*+/',"" ,sql)
noline = sub(r'\n', '', uncomment)
nodoublespace = noline.replace(' ','')
return nodoublespace
def split_sql(self, sql):
nonwline = ... | 49 | 33.9 | 128 | 17 | 397 | python | [{"finding_id": "codeql_py/redos_11f4cbd606515c94_51f098e8", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '/**' and containing many repetiti... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '/**' and containing many repetitions of '\\n*'.",
"This part of the regular expression may cause exponential backtracking on strings starting with '/*' and containing many repetitions of '\\n'."
] | [
5,
5
] | [
null,
null
] | [
47,
30
] | [
61,
64
] | |
2024-11-19T02:55:15.287528+00:00 | 1,626,506,405,000 | db3e3d7979b5587d5c84e9ed1de5a9876aaa3f89 | 3 | {
"blob_id": "db3e3d7979b5587d5c84e9ed1de5a9876aaa3f89",
"branch_name": "refs/heads/main",
"committer_date": 1626506405000,
"content_id": "1daf9e6799de7881ed664a50817016f4cb52f443",
"detected_licenses": [
"MIT"
],
"directory_id": "4232998a406516c2bece50447db47dafb282babf",
"extension": "py",
"file... | 2.90625 | stackv2 | # Prepare libraries
from flask import Flask, render_template, request
import functions as func
import pickle
import warnings
# Stop not important warnings and define the main flask application
warnings.filterwarnings("ignore")
main_application = Flask(__name__)
# Application home page
@main_application.route("/")
def... | 59 | 49.51 | 163 | 19 | 615 | python | [{"finding_id": "codeql_py/path-injection_5df1c6e88116867e_bf206ba1", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 4 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
30,
33,
50,
53
] | [
null,
null,
null,
null
] | [
49,
49,
49,
49
] | [
94,
94,
94,
94
] | |
2024-11-19T02:55:16.237716+00:00 | 1,461,337,397,000 | 6b4af1e6d23b7ba13dd3b8d44d92741aa77a9eac | 2 | {
"blob_id": "6b4af1e6d23b7ba13dd3b8d44d92741aa77a9eac",
"branch_name": "refs/heads/master",
"committer_date": 1461337397000,
"content_id": "0dd153cf4456f4c1d864d87e074111500a724895",
"detected_licenses": [
"MIT"
],
"directory_id": "9919857118c75b7fa8b341277ecf1b8b8780ced1",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python
# Copyright (c) 2015 Chris Olstrom <chris@olstrom.com>
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# ... | 261 | 32.64 | 79 | 14 | 2,039 | python | [{"finding_id": "codeql_py/overly-permissive-file_5ab9634f0de032aa_d990d3be", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.\nOverly permissive mask in chmod ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable.\nOverly permissive mask in chmod sets file to group writable."
] | [
231
] | [
null
] | [
13
] | [
34
] | |
2024-11-19T02:55:18.823889+00:00 | 1,579,859,783,000 | ec36c691a020ff46d13ea9e1e8a643b1ce7c6c8d | 3 | {
"blob_id": "ec36c691a020ff46d13ea9e1e8a643b1ce7c6c8d",
"branch_name": "refs/heads/master",
"committer_date": 1579859783000,
"content_id": "af0b4d9b6e61c4908570c2b442469e71b53e740c",
"detected_licenses": [
"MIT"
],
"directory_id": "6387d03197391f2da3a38ff22bade3eab2a0b1db",
"extension": "py",
"fi... | 2.515625 | stackv2 | import requests
from requests.auth import HTTPBasicAuth
from requests.packages.urllib3.exceptions import InsecureRequestWarning
import bot_capabilities
import json
def create_room(room_name, token):
"""
Creates a Spark room with the name "room_name" using the token provided.
Returns a JSON-encoded respon... | 190 | 30.54 | 103 | 14 | 1,300 | python | [{"finding_id": "codeql_py/request-without-cert-validation_aedcc140905cc4de_32df0de6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 9 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"... | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
21,
37,
55,
81,
99,
118,
139,
159,
172
] | [
22,
38,
56,
82,
100,
119,
140,
160,
null
] | [
12,
12,
12,
12,
12,
12,
12,
16,
20
] | [
67,
55,
55,
55,
67,
67,
67,
62,
77
] | |
2024-11-19T02:55:21.501966+00:00 | 1,507,043,788,000 | 7d512b0ad1d740a72e072ba8689cfd8371175737 | 3 | {
"blob_id": "7d512b0ad1d740a72e072ba8689cfd8371175737",
"branch_name": "refs/heads/master",
"committer_date": 1507043788000,
"content_id": "0b92a829d2d50e18f84a7ba415a5eab5941bddaa",
"detected_licenses": [
"MIT"
],
"directory_id": "b7f3adbd357172f2fc4e475f4330f8207db0f3ea",
"extension": "py",
"fi... | 2.859375 | stackv2 | # MIT License
#
# Copyright (c) 2017 PXL University College
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modi... | 117 | 37.63 | 115 | 19 | 1,007 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_e3b0909623303731_3371e705", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [i.imgur.com](1) may be at an arbitrary position in the... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [i.imgur.com](1) may be at an arbitrary position in the sanitized URL."
] | [
108
] | [
null
] | [
16
] | [
36
] | |
2024-11-19T02:55:46.541090+00:00 | 1,529,950,762,000 | e152a3c80dc52a39bc9706d804964a1bf1af6363 | 3 | {
"blob_id": "e152a3c80dc52a39bc9706d804964a1bf1af6363",
"branch_name": "refs/heads/master",
"committer_date": 1529950762000,
"content_id": "4f5bcbd90fcdbd819961c16c584da1f8bd3bd8ff",
"detected_licenses": [
"Unlicense"
],
"directory_id": "cd48561b7c2f31c30e9accfa2cff750cd9f27c5f",
"extension": "py",... | 2.890625 | stackv2 | """
Main script for getting geodata from the provided addresses. Can easily be changed for different tables in the database
Use arguments to provide start, end and the provider
Info: Although OpenMapQuest was added, the API doesn't seem to work. Google is the fastest provider for the geomapping,
but the error rate i... | 76 | 39.58 | 124 | 17 | 654 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_84767319248ae3e9_9e9300f0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
56
] | [
null
] | [
25
] | [
116
] | |
2024-11-19T02:55:50.480102+00:00 | 1,463,391,107,000 | 09e2ea16be4eb851c093fd8b17565bf6c4baac1c | 2 | {
"blob_id": "09e2ea16be4eb851c093fd8b17565bf6c4baac1c",
"branch_name": "refs/heads/master",
"committer_date": 1463391107000,
"content_id": "557cab96af2ce31e4aaeb49ff611a0ac2bfe37aa",
"detected_licenses": [
"MIT"
],
"directory_id": "8e34e750c1e03253b789634e97eab3814439726a",
"extension": "py",
"fi... | 2.5 | stackv2 |
#pip install requests urllib2
#pip install beautifulsoup
#easy_install requests-toolbelt
#python aspx.py run
#the next script import the basis
import requests
import ssl
import urllib2
from requests_toolbelt import SSLAdapter
from bs4 import BeautifulSoup
import re
import time
#let's start the script. for function ... | 75 | 32.96 | 164 | 14 | 801 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c3dc72c9fa17cc68_8d92fe15", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
26
] | [
null
] | [
6
] | [
37
] | |
2024-11-19T02:56:08.950450+00:00 | 1,599,115,170,000 | 43d9d5eef53246cca1e4a386721cf353b8a15017 | 2 | {
"blob_id": "43d9d5eef53246cca1e4a386721cf353b8a15017",
"branch_name": "refs/heads/master",
"committer_date": 1599115170000,
"content_id": "339c8e1a23d838424bdb72c6d784c4bea9ca52fb",
"detected_licenses": [
"MIT"
],
"directory_id": "d894b58fc02bd3c9bceaf07a8d53783536229adf",
"extension": "py",
"fi... | 2.4375 | stackv2 | from __future__ import (absolute_import, division, print_function,
unicode_literals)
import sys
import argparse
from . import Draft, instructions
from .wif import WIFReader, WIFWriter
from .render import ImageRenderer, SVGRenderer
def load_draft(infile):
if infile.endswith('.wif'):
... | 135 | 30.47 | 70 | 14 | 991 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_805210499ac2e4ec_449ef6a9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
73
] | [
null
] | [
25
] | [
40
] | |
2024-11-19T03:10:29.772917+00:00 | 1,497,641,393,000 | eeb77da353f0f99b3259c809e8ab313b0e710642 | 2 | {
"blob_id": "eeb77da353f0f99b3259c809e8ab313b0e710642",
"branch_name": "refs/heads/master",
"committer_date": 1497641393000,
"content_id": "9103126c1cea8344b50bef0e02e874985774c16a",
"detected_licenses": [
"MIT"
],
"directory_id": "6d035dba7910457f60ff60c7ecc91dfdc344ca04",
"extension": "py",
"fi... | 2.3125 | stackv2 | """Default file for views in the app."""
import requests
from pyramid.view import view_config
from pyramid.httpexceptions import HTTPFound
from pyramid.httpexceptions import HTTPNotFound
from pyramid.security import remember, forget
from mood_bot.security import check_credentials, hash_password
from mood_bot.models.mym... | 123 | 42.81 | 113 | 19 | 1,060 | python | [{"finding_id": "codeql_py/reflective-xss_3b57e6aa74829922_1fbef8e6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
69
] | [
74
] | [
16
] | [
56
] | |
2024-11-19T03:10:52.533870+00:00 | 1,497,904,807,000 | 67097fa7548f589ef318a26f0c6579a037f2d26d | 3 | {
"blob_id": "67097fa7548f589ef318a26f0c6579a037f2d26d",
"branch_name": "refs/heads/master",
"committer_date": 1497904807000,
"content_id": "95d92c9f2945e1b9acca40bd96bfd8aeab692cf6",
"detected_licenses": [
"MIT"
],
"directory_id": "299d1c7071c0a5c27b2032e24a6bc4bd2560e3a6",
"extension": "py",
"fi... | 2.625 | stackv2 | from django.contrib.auth import login, authenticate, logout
from django.http import HttpResponse, HttpResponseRedirect, Http404
from django.shortcuts import render
from .forms import UserForm, ProfileForm, ItemForm
from django.template import RequestContext
from .models import User, Profile, Category, Item
from django.... | 220 | 32.58 | 93 | 19 | 1,458 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d19d1c9d3cda82e2_c312d26b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
55
] | [
null
] | [
19
] | [
77
] | |
2024-11-19T03:21:47.245969+00:00 | 1,307,412,346,000 | 9cb8184e8c522ff60d871554b408623d76b20b83 | 2 | {
"blob_id": "9cb8184e8c522ff60d871554b408623d76b20b83",
"branch_name": "refs/heads/master",
"committer_date": 1307412346000,
"content_id": "b8a23158800aaf0b364ba69431ad602c04fbb049",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "4ed3302ebf905693ba58a85072755077b7117b3f",
"extension": "p... | 2.484375 | stackv2 | import os
import imp
import sys
from datetime import datetime
from dateutil import parser
from jinja2 import Environment, FileSystemLoader
import yaml
import utils
from hooks import Hooker
post_meta_defaults = {
# meta name : (type, default value)
'published' : (datetime, lambda p, s: datetime.now()... | 136 | 31.9 | 125 | 23 | 975 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2100baa4b7b16f51_da2017b9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
118
] | [
null
] | [
20
] | [
72
] | |
2024-11-19T03:22:05.696314+00:00 | 1,631,211,576,000 | 8ef433e8f9d4dbc802ed7d51401c7e5c7df7ee73 | 2 | {
"blob_id": "8ef433e8f9d4dbc802ed7d51401c7e5c7df7ee73",
"branch_name": "refs/heads/master",
"committer_date": 1631211576000,
"content_id": "f0f930b22b385b7dd8f1e70569e5e8de79aa27f2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7e1fe6cf389bf43531cf9746e017640b1067b78d",
"extension": "py"... | 2.34375 | stackv2 | import io
import json
from aiohttp import web
from typing import Union
from tensorcraft import errors
from tensorcraft.backend import model
from tensorcraft.backend.httpapi import routing
_ConflictReason = Union[errors.DuplicateError, errors.LatestTagError]
def make_error_response(exc_class, model_exc=errors.Mode... | 133 | 31.61 | 79 | 16 | 908 | python | [{"finding_id": "codeql_py/stack-trace-exposure_4009cc2484e92011_c77b7677", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.\n[Stack trace information](3) flows to this location and may be exposed to an external user.\n[Stack trace information](4) flows t... | [
21
] | [
null
] | [
27
] | [
36
] | |
2024-11-19T03:22:06.306446+00:00 | 1,435,225,373,000 | 8eef59423861583592fb5dbfa57ab7bd4788524d | 3 | {
"blob_id": "8eef59423861583592fb5dbfa57ab7bd4788524d",
"branch_name": "refs/heads/master",
"committer_date": 1435225373000,
"content_id": "c7b3d8a4140c5892fb553b6b08ee0d96778bed6c",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "d9bcdf802aa600559feacdddc81f137b6e1ee1b2",
"extension": "p... | 3.015625 | stackv2 | # -*- coding: utf-8 -*-
"""
flask_apputils.decorators
~~~~~~~~~~~~~~~~~~~~~~~~~
Useful decorators to enhance route handlers
"""
from functools import wraps
from flask import request, redirect, Response, render_template, jsonify
from .helpers import json_value
__all__ = (
'after_this_request',
'as... | 153 | 25.45 | 94 | 20 | 875 | python | [{"finding_id": "codeql_py/url-redirection_1ee11e6c84fb647f_1a87af40", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
122
] | [
null
] | [
33
] | [
75
] | |
2024-11-19T03:22:21.043066+00:00 | 1,608,884,968,000 | e9b6ea1134e8ec88c0cfff45c7bc2dc2b4d9cdc0 | 3 | {
"blob_id": "e9b6ea1134e8ec88c0cfff45c7bc2dc2b4d9cdc0",
"branch_name": "refs/heads/main",
"committer_date": 1608885035000,
"content_id": "b02c473431af88498163a1fe65cdd6fb09ed7e94",
"detected_licenses": [
"MIT"
],
"directory_id": "7970a866bc70ac1b5ad6a8e7d0b8698708c70cc5",
"extension": "py",
"file... | 2.875 | stackv2 | import random
import time
from pathlib import Path
from typing import Sequence
from flask import Flask, render_template, request
from jinja2 import StrictUndefined
app = Flask(__name__, static_url_path='')
app.jinja_env.undefined = StrictUndefined
observations_dir = Path(__file__).resolve().parent / 'observations'
... | 54 | 30.83 | 83 | 15 | 388 | python | [{"finding_id": "codeql_py/path-injection_9671f107da2d5bf5_2a35d971", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
42,
45
] | [
null,
null
] | [
12,
14
] | [
29,
31
] | |
2024-11-19T03:43:50.278714+00:00 | 1,674,465,310,000 | 67832748cf620d24c578dc32e7e3f3d46b4eb6bd | 2 | {
"blob_id": "67832748cf620d24c578dc32e7e3f3d46b4eb6bd",
"branch_name": "refs/heads/master",
"committer_date": 1674465310000,
"content_id": "aa19a8c64e513c3bc57df215a195ab2e37eb2eed",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "50e093b9f1499f273788007b5d3bf209efa70ea1",
"extension": "py"... | 2.4375 | stackv2 | import re
import attr
from clldutils.misc import slug, nfilter
from pycldf.sources import Source
from pybtex.database import parse_string # dependency of pycldf, so should be installed.
from pylexibank import Dataset, Language
BASE_URL = "https://abvd.eva.mpg.de"
URL = BASE_URL + "/utils/save/?type=xml§ion=%s&la... | 241 | 32.92 | 98 | 24 | 1,918 | python | [{"finding_id": "codeql_py/overly-large-range_d8501b4cbd5840a3_54c3fd5b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
28
] | [
null
] | [
50
] | [
53
] | |
2024-11-19T03:43:51.780259+00:00 | 1,541,009,262,000 | 55ff11f9f0ba31ea49a41bb172dc47e8cec90891 | 2 | {
"blob_id": "55ff11f9f0ba31ea49a41bb172dc47e8cec90891",
"branch_name": "refs/heads/master",
"committer_date": 1541009262000,
"content_id": "6ecebeb829042ab052672cf02dc7cafe077d531b",
"detected_licenses": [
"MIT"
],
"directory_id": "7f2489ddb99d7a669fe12b4faf216c11aad8ab28",
"extension": "py",
"fi... | 2.5 | stackv2 | from cellphonedb.src.app.app_logger import app_logger
class LocalQueryLauncher:
def __getattribute__(self, name):
method = object.__getattribute__(self, name)
if hasattr(method, '__call__'):
app_logger.info('Launching Query {}'.format(name))
return method
def __init__(sel... | 75 | 46.09 | 118 | 16 | 913 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9735fa4042c5d380_3544319f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
38,
39,
40,
41
] | [
null,
null,
null,
42
] | [
15,
15,
15,
15
] | [
74,
111,
102,
70
] | |
2024-11-19T03:44:01.747973+00:00 | 1,613,546,758,000 | 2d2d9d2d39ea41da3d192aeedd504a4e8e9eb159 | 2 | {
"blob_id": "2d2d9d2d39ea41da3d192aeedd504a4e8e9eb159",
"branch_name": "refs/heads/master",
"committer_date": 1613546758000,
"content_id": "f1d3016f0b61f64cee4e62c38d168ff844f4e18d",
"detected_licenses": [
"MIT"
],
"directory_id": "f1068ab6e606d7b2a041df64ee2d659fde6e7664",
"extension": "py",
"fi... | 2.328125 | stackv2 | import os
import re
import functools
import xml.etree.ElementTree as etree
from datetime import date, datetime, timedelta, timezone
from typing import Any, Callable, Dict, List, Optional
import yaml
import pytz
import toml
import markdown.extensions
import markdown.treeprocessors
from markdown import Markdown
from mdx... | 354 | 31.74 | 86 | 17 | 2,914 | python | [{"finding_id": "codeql_py/reflective-xss_05c215abba2dbaca_ed2bd276", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
282,
291
] | [
null,
null
] | [
12,
12
] | [
77,
72
] | |
2024-11-19T03:44:28.643768+00:00 | 1,606,182,459,000 | 041e48f664ee0c8f470bdbed3c0c0f096a0ce399 | 3 | {
"blob_id": "041e48f664ee0c8f470bdbed3c0c0f096a0ce399",
"branch_name": "refs/heads/main",
"committer_date": 1606182459000,
"content_id": "8043c1d256e3e3f149e4236e5ca90047886e7079",
"detected_licenses": [
"MIT"
],
"directory_id": "4a5326eb35a6431be58c374ff83b21a7eee37c5b",
"extension": "py",
"file... | 2.671875 | stackv2 | from multiprocessing import Process
from flask import Flask, Response, request
#from flask_restful import Api, Resource, reqparse
from pathlib import Path
import __main__
import os
import json
from datetime import datetime
class EndpointAction(object):
def __init__(self, action):
self.action = action
... | 288 | 30.21 | 114 | 18 | 2,079 | python | [{"finding_id": "codeql_py/command-line-injection_cb9cc45670e70c36_3f7bbf6f", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 5 | true | [
"CWE-078",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/command-line-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided val... | [
257,
144,
188,
230,
282
] | [
null,
null,
null,
null,
null
] | [
19,
31,
19,
19,
19
] | [
40,
57,
28,
28,
28
] | |
2024-11-19T03:44:29.132027+00:00 | 1,466,523,246,000 | de3e5bd5e416f78ceaea2a601a1b82f8c8e7fcc6 | 3 | {
"blob_id": "de3e5bd5e416f78ceaea2a601a1b82f8c8e7fcc6",
"branch_name": "refs/heads/master",
"committer_date": 1466523246000,
"content_id": "de96149091877328bec583381723b640285026d9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ed133a033021aa4ce6701e118c12e80edda3fe2b",
"extension": "py"... | 2.515625 | stackv2 | #!/usr/bin/env python
from argparse import ArgumentParser
import requests
import json
import os.path, sys
#change path to allow import from parent directory
sys.path.append(os.path.join(os.path.dirname(os.path.realpath(__file__)), os.pardir))
from apic import get_auth_token, create_url, wait_on_task
# get the policy ... | 92 | 36.09 | 104 | 15 | 827 | python | [{"finding_id": "codeql_py/request-without-cert-validation_88db034794d17723_e5caadf7", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
20,
54
] | [
null,
null
] | [
20,
16
] | [
68,
90
] | |
2024-11-19T03:44:35.172426+00:00 | 1,608,755,351,000 | 1f8e1d36e2bd5235611055642207abf54cf7aa74 | 3 | {
"blob_id": "1f8e1d36e2bd5235611055642207abf54cf7aa74",
"branch_name": "refs/heads/master",
"committer_date": 1608755351000,
"content_id": "98a27de73c3f13d8e3b1d593f9381082e46196c9",
"detected_licenses": [
"MIT"
],
"directory_id": "70ccb9bbb4666609c505406d40352ee8eea6f2bd",
"extension": "py",
"fi... | 2.671875 | stackv2 | import atexit
import json
import os
import platform
import shutil
import subprocess
import tempfile
import time
import zipfile
from pathlib import Path
from threading import Timer
import requests
def _get_command():
system = platform.system()
if system == "Darwin":
command = "ngrok"
elif system =... | 108 | 30.07 | 94 | 13 | 909 | python | [{"finding_id": "codeql_py/overly-permissive-file_b0169152a9588d01_021f927b", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
34
] | [
null
] | [
5
] | [
32
] | |
2024-11-19T01:44:06.738326+00:00 | 1,407,230,062,000 | 25c8580eca28614a520b3c7b95f54c7fa32f6801 | 2 | {
"blob_id": "25c8580eca28614a520b3c7b95f54c7fa32f6801",
"branch_name": "refs/heads/master",
"committer_date": 1407230062000,
"content_id": "884ae4bb536ce43f1f85f1d6e75ba483399b94af",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "30cf17bdb1f34e6b0612044670372504d670c59f",
"extension": "py"... | 2.5 | stackv2 | # -*- encoding: utf-8 -*-
"""
lunaport.dao.token
~~~~~~~~~~~~~~~~~~
Storage interaction logic for authentication token.
"""
from hashlib import sha1
import string
import random
import pprint
pp = pprint.PrettyPrinter(indent=4).pprint
from sqlalchemy import text, exc
from exceptions import StorageError
... | 131 | 28.11 | 85 | 17 | 942 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_4542aff2477d63cd_095ef17b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally e... | [
26,
46
] | [
null,
null
] | [
21,
37
] | [
33,
49
] | |
2024-11-19T02:08:40.253946+00:00 | 1,604,069,298,000 | 2a07314cf58ddbab81e22a72a60ff76bc92dbfb7 | 4 | {
"blob_id": "2a07314cf58ddbab81e22a72a60ff76bc92dbfb7",
"branch_name": "refs/heads/master",
"committer_date": 1604069298000,
"content_id": "f1f73c5dda39848a5c09e30d4806e0cc00b3dd42",
"detected_licenses": [
"MIT"
],
"directory_id": "8882b84f27d09f9e1bdfd9d7abce71b7c1d30b87",
"extension": "py",
"fi... | 3.515625 | stackv2 | while True:
print('Pirmais lietotajs -\n Ievadiet tekstu:')
text = str(input())
if text.isnumeric() == False: # isnumeric() var lietot try except vietā
text = text.lower()
break
else:
print("Nav pareizi!")
secret_text = text
for letter in range(0,len(secret_text)):
print(... | 35 | 30.14 | 97 | 13 | 304 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0f08e462a7cd92a9_7beb7068", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (secre... | [
12,
20,
35
] | [
null,
null,
null
] | [
11,
7,
7
] | [
30,
52,
35
] | |
2024-11-19T02:21:21.847915+00:00 | 1,457,585,337,000 | a340fc40f26da1ea8e962f63f975b4e93f294d31 | 2 | {
"blob_id": "a340fc40f26da1ea8e962f63f975b4e93f294d31",
"branch_name": "refs/heads/master",
"committer_date": 1457585337000,
"content_id": "61e42fd457406352057c5a54f8e15d2f87484e47",
"detected_licenses": [
"MIT"
],
"directory_id": "98a59da8e89224b64eab857392af6f6d7ffba5af",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python
from __future__ import print_function
import paramiko
import getpass
import time
remote_conn_pre = paramiko.SSHClient()
remote_conn_pre.set_missing_host_key_policy(paramiko.AutoAddPolicy())
def get_version(remote_conn):
remote_conn.send("terminal length 0\n")
time.sleep(1)
remote_con... | 34 | 25.68 | 119 | 10 | 231 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_ed3687507f909b78_9190ec2f", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
8
] | [
null
] | [
null
] | [
70
] | |
2024-11-19T02:58:16.229161+00:00 | 1,593,590,453,000 | 0a8ba4a2fa46ad9f78036a7d4a4bc09520fc57a8 | 3 | {
"blob_id": "0a8ba4a2fa46ad9f78036a7d4a4bc09520fc57a8",
"branch_name": "refs/heads/master",
"committer_date": 1593590453000,
"content_id": "306e287091f8029c44fe9031a6ad0effa1068a46",
"detected_licenses": [
"MIT"
],
"directory_id": "5d4eb8d1ea124f918ca69edb9034dbadfb600df6",
"extension": "py",
"fi... | 2.59375 | stackv2 | from flask import Flask, render_template, request, send_file
from transfer import runTransfer
import os
from PIL import Image
import cv2
from io import BytesIO
app = Flask(__name__,template_folder="./templates/")
@app.route("/")
def index():
return render_template('index.html')
@app.route("/transfer", methods ... | 48 | 26.21 | 60 | 13 | 295 | python | [{"finding_id": "codeql_py/flask-debug_e0e36607abd43d19_a5715ee3", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
48,
22,
23
] | [
null,
null,
null
] | [
5,
21,
21
] | [
51,
32,
32
] | |
2024-11-19T03:10:09.310443+00:00 | 1,680,906,649,000 | bcdb3201be74aa48de8014e97468e46c07daf6a7 | 2 | {
"blob_id": "bcdb3201be74aa48de8014e97468e46c07daf6a7",
"branch_name": "refs/heads/main",
"committer_date": 1680906649000,
"content_id": "d5898b26f9f3d1c672a8625a9d427722bb222b30",
"detected_licenses": [
"MIT"
],
"directory_id": "23a2c2ecc24186faec2896ad3cb0cbba2000b2de",
"extension": "py",
"file... | 2.328125 | stackv2 |
from pathlib import Path
import asyncio
import random
import functools
import aiohttp
from denovonear.ensembl_cache import EnsemblCache
def ensembl_cache(folder=None):
''' store/retrive repeated ensembl requests from a persistent sqlite cache
'''
if folder is None:
folder = Path.home() / '.cache... | 72 | 35.51 | 80 | 24 | 559 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_14591d88be8ed9f9_9a1ab095", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [rest.ensembl.org](1) may be at an arbitrary position i... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [rest.ensembl.org](1) may be at an arbitrary position in the sanitized URL."
] | [
24
] | [
null
] | [
16
] | [
41
] | |
2024-11-19T03:10:09.363625+00:00 | 1,630,103,026,000 | a794b97adf7a8622a97e4a888d6532dde8bf2400 | 2 | {
"blob_id": "a794b97adf7a8622a97e4a888d6532dde8bf2400",
"branch_name": "refs/heads/main",
"committer_date": 1630103026000,
"content_id": "a425f1568508bbba404b102e18408f6cc89a31bc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d723c12e9afdb19ccd4c2366bb21e0f3a612f8a7",
"extension": "py",
... | 2.390625 | stackv2 | #!/usr/bin/env python3
# Copyright 2017 Google Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or... | 67 | 32.45 | 80 | 16 | 565 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_c50d540daa850629_d4882d4f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
29
] | [
null
] | [
26
] | [
30
] | |
2024-11-19T03:10:26.442200+00:00 | 1,399,399,778,000 | 509fe8810d924f1881798fe66a43eac11e7926c8 | 2 | {
"blob_id": "509fe8810d924f1881798fe66a43eac11e7926c8",
"branch_name": "refs/heads/master",
"committer_date": 1399399778000,
"content_id": "3ff477a71219f13485601fa4af7bdd21f8d54617",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "a414a181a9bb4511e4a0ae759687aebdabc38bc0",
"extension": "p... | 2.390625 | stackv2 | #!/usr/bin/python
import cgi, cgitb
import jinja2
import random
import os
import MySQLdb
from dbparams import myHost, myUser, myPasswd, myDb
from Crypto.Hash import SHA
from Crypto.PublicKey import RSA
from Crypto.Signature import PKCS1_v1_5
import base64
cgitb.enable()
jinja_environment = jinja2.Environment(loader... | 68 | 23.81 | 97 | 12 | 458 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3829a805552caf3b_b6128c6e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
16
] | [
null
] | [
21
] | [
98
] | |
2024-11-19T03:10:27.323660+00:00 | 1,675,891,548,000 | d61d653044da1be2a419e8d95b516a2b4b2d337a | 3 | {
"blob_id": "d61d653044da1be2a419e8d95b516a2b4b2d337a",
"branch_name": "refs/heads/master",
"committer_date": 1675891548000,
"content_id": "5331345ad897266395e26b60d20c2a6c434e5685",
"detected_licenses": [
"MIT"
],
"directory_id": "78071f4f3944838d72e72886962f93556fc45878",
"extension": "py",
"fi... | 2.796875 | stackv2 | """
Módulo relacionado ao servidor que executará os comandos PowerShell
"""
import os
import re
import socket
import tempfile
import paramiko
def escapar_echo_cmd(conteudo):
conteudo_escapado = re.sub(
r'(&|\\|<|>|\^|\|)', r'^\1', conteudo, flags=re.RegexFlag.MULTILINE)
conteudo_escapado = re.sub(r'\n... | 173 | 37.03 | 99 | 18 | 1,518 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_af38ec9b16774ddf_b62709ab", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
67
] | [
null
] | [
13
] | [
79
] | |
2024-11-19T03:10:33.983151+00:00 | 1,589,552,632,000 | a71d2f89bf00303758bd4f3d30f3147e92ab09d8 | 3 | {
"blob_id": "a71d2f89bf00303758bd4f3d30f3147e92ab09d8",
"branch_name": "refs/heads/master",
"committer_date": 1589552632000,
"content_id": "c77615f512566592c65b81507c7547100da1395d",
"detected_licenses": [
"MIT"
],
"directory_id": "70d94b85ea6a161a30169af4da518fbab578d887",
"extension": "py",
"fi... | 3.3125 | stackv2 | #!/usr/bin/env python3.6
from user import User,Credential
def create_account(first_name,last_name,user_name,password):
"""
function to create new account or to sign up
"""
new_account=User(first_name,last_name,user_name,password)
return new_account
def save_account(account):
"""
Function ... | 285 | 41.66 | 179 | 27 | 1,987 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f57402d9ac3cb8cf_5f9aa5b7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 7 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p... | [
107,
155,
162,
173,
240,
247,
258
] | [
null,
null,
null,
null,
null,
null,
null
] | [
15,
35,
43,
39,
27,
35,
31
] | [
122,
120,
140,
72,
112,
132,
64
] | |
2024-11-19T03:22:33.529847+00:00 | 1,617,049,694,000 | 8fd677996c0bfca49fec8f205462576eaae0e289 | 3 | {
"blob_id": "8fd677996c0bfca49fec8f205462576eaae0e289",
"branch_name": "refs/heads/master",
"committer_date": 1617049694000,
"content_id": "4b979a56882f70da2f12dd0ae2ec25818b48eeaf",
"detected_licenses": [
"BSD-2-Clause-Views",
"BSD-3-Clause"
],
"directory_id": "f0d6efe035d4c2ed1ea6bb6d1d5a613b86... | 2.625 | stackv2 | __author__ = "BEMOSS Team"
from Crypto.Cipher import AES
from Crypto import Random
import base64
from django_web_server import settings_tornado
MASTER_KEY = settings_tornado.SECRET_KEY
def encrypt_value(clear_text):
enc_secret = AES.new(MASTER_KEY[:32], AES.MODE_ECB)
tag_string = (str(clear_text) +
... | 26 | 29.15 | 69 | 16 | 200 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_2731714ed8b794e0_41162148", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
16,
22
] | [
null,
null
] | [
36,
21
] | [
66,
70
] | |
2024-11-19T03:22:33.944990+00:00 | 1,511,288,180,000 | b4514bc0be9efee0e9686dc8060297ad27857725 | 3 | {
"blob_id": "b4514bc0be9efee0e9686dc8060297ad27857725",
"branch_name": "refs/heads/master",
"committer_date": 1511288180000,
"content_id": "228389a8fb2c3ba98ca01719c3348b88b548f885",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7aa69748b162bc75a3624886ac614326c1b46955",
"extension": "py"... | 2.6875 | stackv2 | """
A module for checking SSH connection and run a command
"""
import paramiko
from enginecheck import EngineCheck
class SSHCheck(EngineCheck):
def __init__(self, params):
self.user = params['user']
self.password = params['password']
ip_addr = ','.join(params['ip_addr'])
EngineChec... | 26 | 32.54 | 86 | 15 | 188 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a63111f9ff8f8401_0e26a72e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
17
] | [
null
] | [
9
] | [
66
] | |
2024-11-19T03:22:39.930035+00:00 | 1,564,092,157,000 | 1b401e19ffea6247e0005acf0d2360d670d427cb | 3 | {
"blob_id": "1b401e19ffea6247e0005acf0d2360d670d427cb",
"branch_name": "refs/heads/master",
"committer_date": 1564092157000,
"content_id": "9a96d2130e25aa418569a9ea59fa0bf865b16930",
"detected_licenses": [
"MIT"
],
"directory_id": "fdf839fee3f97218d65ebc8e1d9a7bc23ca4bf81",
"extension": "py",
"fi... | 2.8125 | stackv2 | import pandas as pd
import geopandas as gpd
import numpy as np
from shapely.geometry import Point
import matplotlib.pyplot as plt
import networkx as nx
from sklearn.cluster import KMeans
import dtmzUtils as utils
import copy
import operator
import os
from haversine import haversine
def buildGraphFromCSV(nodes_file, ed... | 238 | 40.57 | 152 | 21 | 2,388 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_aa608a80b29037f4_f42b729e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
62
] | [
null
] | [
17
] | [
126
] | |
2024-11-19T03:22:54.851579+00:00 | 1,567,456,450,000 | 92b3a3cb461ecdbb4e166997cd2128be682bcec8 | 3 | {
"blob_id": "92b3a3cb461ecdbb4e166997cd2128be682bcec8",
"branch_name": "refs/heads/master",
"committer_date": 1567456450000,
"content_id": "d3818bb9e6f3ebfd0575ded9014b602d3b916dcb",
"detected_licenses": [
"MIT"
],
"directory_id": "28172c0a9160a717a23a9fc5388a640a575b616e",
"extension": "py",
"fi... | 2.921875 | stackv2 | #!/usr/bin/env python3.6
import pyperclip
class User:
def __init__(self, fname, lname):
self.firstname = fname
self.lastname = lname
self.username = uname
self.password = psword
def printname(self):
print(self.firstname, self.lastname, self.username, self.password)
cla... | 41 | 21.34 | 98 | 11 | 199 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_13bdd6ff8039ffd4_c5a949c9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
12,
20
] | [
null,
null
] | [
61,
85
] | [
74,
98
] | |
2024-11-19T03:44:12.112908+00:00 | 1,658,946,532,000 | a5652927f80a2c3ef8fb589b4baf4917f43998da | 3 | {
"blob_id": "a5652927f80a2c3ef8fb589b4baf4917f43998da",
"branch_name": "refs/heads/master",
"committer_date": 1658946532000,
"content_id": "cb0d869959df3a3cc18791508348f6207567f47e",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "4fb833c5eb89a8f7feaf5fd26ea3c988fde90a87",
"extension": "p... | 2.546875 | stackv2 | #!/usr/bin/env python
# encoding: utf-8
"""
Licensed under a 3-clause BSD license.
Revision History:
Initial Version: 2016-02-17 17:46:57
Last Modified On: 2016-02-17 17:46:57 by Brian
"""
from __future__ import print_function
from __future__ import division
from flask_classful import FlaskView
from flask im... | 128 | 30.38 | 98 | 20 | 902 | python | [{"finding_id": "codeql_py/stack-trace-exposure_56efaacf71014f10_9ceb2674", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
103
] | [
null
] | [
28
] | [
56
] | |
2024-11-19T01:35:03.084513+00:00 | 1,581,916,597,000 | b5f39ff8fce4ef115514fcfaa65597291774fce9 | 2 | {
"blob_id": "b5f39ff8fce4ef115514fcfaa65597291774fce9",
"branch_name": "refs/heads/master",
"committer_date": 1581916597000,
"content_id": "177bbd692634553b5d5fcd2d998ffdb53baf2fa2",
"detected_licenses": [
"MIT"
],
"directory_id": "e43b2c3f71dd05ae9ea8a2a69ea678f87f789e57",
"extension": "py",
"fi... | 2.4375 | stackv2 | """Habrproxy Main Module."""
from logging import getLogger
from aiohttp import web, ClientSession, ClientConnectionError
from habrproxy.parser import build_response_content
LOGGER_NAME = "habrproxy"
OMIT_RES_HEADERS = ["Content-Encoding", "Transfer-Encoding"]
OMIT_REQ_HEADERS = ["Accept-Encoding"]
def filter_header... | 78 | 37.94 | 88 | 17 | 582 | python | [{"finding_id": "codeql_py/log-injection_148d4b70f4e10bf4_01b5f4f8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
47,
48,
57
] | [
null,
null,
null
] | [
25,
25,
30
] | [
42,
39,
33
] | |
2024-11-19T01:35:07.476749+00:00 | 1,631,721,031,000 | 24cc2190a295d27f1a0c937db2a67a42e8623f08 | 3 | {
"blob_id": "24cc2190a295d27f1a0c937db2a67a42e8623f08",
"branch_name": "refs/heads/main",
"committer_date": 1631721031000,
"content_id": "9dfcfd832b1ddd1304d5d45dcd664311fbfb4cc6",
"detected_licenses": [
"MIT"
],
"directory_id": "85c13475b4fe953083c65651f95626c1222a7658",
"extension": "py",
"file... | 2.671875 | stackv2 | import requests
from webhook.base.resources.tools import enterprise_or_self, name_of_account
from webhook.manager.models import Account
from django import forms
class ContaNovaForm(forms.ModelForm):
"""
Este formulario va a tratar la entrada de tareas, solamente capturando su nombre.
"""
class Meta:
... | 62 | 38.16 | 128 | 19 | 510 | python | [{"finding_id": "codeql_py/full-ssrf_5a1b1af5bbbde49f_4b5a88ac", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
33
] | [
null
] | [
24
] | [
41
] | |
2024-11-19T02:07:52.346122+00:00 | 1,574,618,589,000 | 5dbc05f54c3d1b55d72b9fdc9f12a62995abff5e | 3 | {
"blob_id": "5dbc05f54c3d1b55d72b9fdc9f12a62995abff5e",
"branch_name": "refs/heads/master",
"committer_date": 1574618589000,
"content_id": "fffcddd69ef07180cd433926b93f192c3e83af0d",
"detected_licenses": [
"MIT"
],
"directory_id": "37a6576069ca4b3e16f3421bb1e9b286f360b354",
"extension": "py",
"fi... | 2.96875 | stackv2 | import argparse
import logging
import csv
import time
import coloredlogs
import googlemaps
logger = logging.getLogger(__name__)
def main(csv_input_file, input_column, api_key, csv_output_file):
logger.info('Starting Google Maps client with API Key %s', api_key)
gmaps = googlemaps.Client(key=api_key)
w... | 64 | 39.11 | 127 | 21 | 522 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6083c9fcc054628f_1410d3d9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
14
] | [
null
] | [
64
] | [
71
] | |
2024-11-19T02:17:19.944729+00:00 | 1,541,850,962,000 | cfbf9eb6bc113ee3089a173c157a48ce5cdda703 | 3 | {
"blob_id": "cfbf9eb6bc113ee3089a173c157a48ce5cdda703",
"branch_name": "refs/heads/master",
"committer_date": 1541850972000,
"content_id": "a0b4d2c170bdf3ecbfd655c60620281885d53c17",
"detected_licenses": [
"MIT"
],
"directory_id": "0b7c79f5dff986f4393c1c2fadd900503c907705",
"extension": "py",
"fi... | 2.796875 | stackv2 | import os
import tarfile
import shutil
import zipfile
import eos.cache
import eos.log
try:
import lzma
LZMA_AVAILABLE = True
except ImportError:
LZMA_AVAILABLE = False
def _get_cache_extract_dir(namelist, stem):
cache_dir = eos.cache.get_cache_dir()
# get common base directory in file paths, if... | 129 | 31.63 | 115 | 16 | 926 | python | [{"finding_id": "codeql_py/tarslip_abcbc93f43f628c7_36e04aaf", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)."
] | [
102
] | [
null
] | [
9
] | [
14
] | |
2024-11-19T02:17:25.593019+00:00 | 1,583,344,064,000 | 719575ae354a7435271d0893d4bdb59a8b6e9c5b | 3 | {
"blob_id": "719575ae354a7435271d0893d4bdb59a8b6e9c5b",
"branch_name": "refs/heads/master",
"committer_date": 1583344064000,
"content_id": "f954aeca0459662f560f63c5702d9aaba720436c",
"detected_licenses": [
"MIT"
],
"directory_id": "d6ff91855a9a63af694962f46398b3ef55bac88c",
"extension": "py",
"fi... | 2.578125 | stackv2 | #!/usr/bin/env python3
from argparse import ArgumentParser
from datetime import date
from logging import getLogger
from lxml import etree
from pathlib import Path
from pprint import pprint
import re
import requests
from time import sleep
from urllib.parse import urljoin
from sqlalchemy import create_engine, Table, Col... | 174 | 31.99 | 123 | 15 | 1,426 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ab585ce71a5f5b70_11e03ae9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
141
] | [
null
] | [
44
] | [
54
] | |
2024-11-19T02:17:29.986621+00:00 | 1,618,994,701,000 | a51b4e5d4f34ce4e219fd4bcd8283bf1ad993512 | 3 | {
"blob_id": "a51b4e5d4f34ce4e219fd4bcd8283bf1ad993512",
"branch_name": "refs/heads/main",
"committer_date": 1618994701000,
"content_id": "274db3215054b2eaecec7daa120f605eb274ee69",
"detected_licenses": [
"MIT"
],
"directory_id": "34c9b2e2c09b6f60eaca6f9067eff723516a3999",
"extension": "py",
"file... | 2.609375 | stackv2 | from typing import Dict, List, Any
from flask import Blueprint, request, g
from . import auth
from .webutil import ViewReturn
from .data.database import Administrator, Character
bp = Blueprint("acl", __name__)
@bp.route("/api/acl/add", methods=["POST"])
@auth.login_required
@auth.require_permission("access-manage")
... | 67 | 25.78 | 87 | 15 | 446 | python | [{"finding_id": "codeql_py/reflective-xss_6e8096903bfc9671_55607f47", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
19
] | [
null
] | [
16
] | [
46
] | |
2024-11-19T02:17:30.040272+00:00 | 1,511,461,852,000 | e597dc78f0493173d7917de9ce8e5e1b51a3538b | 2 | {
"blob_id": "e597dc78f0493173d7917de9ce8e5e1b51a3538b",
"branch_name": "refs/heads/master",
"committer_date": 1511461852000,
"content_id": "8908b3e3442146f7df5abb518cab7999515461ce",
"detected_licenses": [
"MIT"
],
"directory_id": "d7b694476fa1341ec9ab08e9ae57f235cdf915ef",
"extension": "py",
"fi... | 2.421875 | stackv2 | """Main module of amlight/mef_eline Kytos Network Application.
NApp to provision circuits from user request
"""
import json
import hashlib
import requests
from kytos.core import KytosNApp, log, rest
from kytos.core.helpers import listen_to
from flask import request, abort
from napps.amlight.mef_eline import settings
... | 281 | 37.72 | 92 | 25 | 2,345 | python | [{"finding_id": "codeql_py/partial-ssrf_4ffa4c154e2558c2_2b6f7bee", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
88
] | [
null
] | [
17
] | [
34
] | |
2024-11-19T02:17:48.852877+00:00 | 1,551,338,921,000 | 63225d85ee528c443d336633fb337b2dc0c48f7d | 2 | {
"blob_id": "63225d85ee528c443d336633fb337b2dc0c48f7d",
"branch_name": "refs/heads/master",
"committer_date": 1551338921000,
"content_id": "061969b3dfd8831138e444abfb0115f98d281df7",
"detected_licenses": [
"MIT"
],
"directory_id": "23b6ea544ce3306507d333212e8b5c30bbe4a75f",
"extension": "py",
"fi... | 2.3125 | stackv2 | from __future__ import absolute_import
from __future__ import unicode_literals
import argparse
import collections
import contextlib
import distutils.spawn
import functools
import gzip
import io
import os.path
import pipes
import platform
import shutil
import tarfile
import tempfile
import distro
import six
RVM = 'h... | 283 | 27.56 | 78 | 17 | 1,967 | python | [{"finding_id": "codeql_py/tarslip_4f0f9039a829d73e_750c0a37", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
179
] | [
null
] | [
9
] | [
17
] | |
2024-11-19T02:17:49.951760+00:00 | 1,500,483,465,000 | c65518b450df0bb3d3569e6e5ae0c667eaaf578f | 3 | {
"blob_id": "c65518b450df0bb3d3569e6e5ae0c667eaaf578f",
"branch_name": "refs/heads/master",
"committer_date": 1500483465000,
"content_id": "fb96acd0bc1a1c83a2adf01782b38a46a607a29d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6ffa4c119ff96d93f262a87e78aa6805fbcc31eb",
"extension": "py"... | 3.25 | stackv2 | #This code convert apostrophe problem to "of"
#for example
# Who was John F. Kennedy's vice president? -->Who was vice president of John F. Kennedy?
# Does Abraham Lincoln's death place have a website? --> Does death place of Abraham Lincoln have a website?
# What was Brazil's lowest rank in the FIFA World Ranking?
#... | 85 | 37.59 | 126 | 17 | 829 | python | [{"finding_id": "codeql_py/reflective-xss_da01d24b2b7c4c1f_a5aaa497", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
82
] | [
null
] | [
9
] | [
43
] | |
2024-11-19T02:18:02.324835+00:00 | 1,523,014,491,000 | f130d7d378d29008681a78e226a07e47fb16ee13 | 3 | {
"blob_id": "f130d7d378d29008681a78e226a07e47fb16ee13",
"branch_name": "refs/heads/master",
"committer_date": 1523014491000,
"content_id": "98d8734a7c925bb5472a621d978bdf8e9b9b70c1",
"detected_licenses": [
"Unlicense"
],
"directory_id": "32514a9b19ea595abd909c7760f2b1931abb85df",
"extension": "py",... | 2.6875 | stackv2 | from flask import Flask, request, Response
import pymongo
from pymongo import MongoClient
client = MongoClient('localhost', 27017)
db = client.mini_amazon
app = Flask('mini-amazon')
@app.route('/health', methods=['GET'])
def health():
return 'healthy\n'
@app.route('/', methods=['GET'])
def index():
return... | 50 | 24.46 | 60 | 14 | 306 | python | [{"finding_id": "codeql_py/flask-debug_308cb44941bacf4a_ecf31140", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
50,
23
] | [
null,
null
] | [
5,
12
] | [
51,
47
] | |
2024-11-19T02:18:03.634479+00:00 | 1,534,209,221,000 | 231cf511e1cfcf7f2d75e736daad41238cbb85ec | 3 | {
"blob_id": "231cf511e1cfcf7f2d75e736daad41238cbb85ec",
"branch_name": "refs/heads/master",
"committer_date": 1534209221000,
"content_id": "b808606b83d70866138a031de5633ff8ae44e204",
"detected_licenses": [
"MIT"
],
"directory_id": "f6df1c10ff3baed21529ede5fa6cb200a0f7b68e",
"extension": "py",
"fi... | 2.765625 | stackv2 | #!/usr/bin/python3
import jinja2
import mistune
import re
import sys
import glob
import os
import time
TEMPLATES = """
<!DOCTYPE html>
<html>
<head>
<title>{{title}}</title>
<link rel="stylesheet" type="text/css" href="../static/css/bootstrap.min.css">
<script type="text/javascript" src="../static/js/jquery.min.js... | 177 | 20.72 | 79 | 17 | 1,098 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b6af5a2d02f8bf33_f76ae16f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
120
] | [
null
] | [
22
] | [
48
] | |
2024-11-19T02:18:10.518272+00:00 | 1,622,350,392,000 | 954fe0bc38e9ae5a879195f5e4544a32e6b47c15 | 3 | {
"blob_id": "954fe0bc38e9ae5a879195f5e4544a32e6b47c15",
"branch_name": "refs/heads/main",
"committer_date": 1622350392000,
"content_id": "2623b6473bec79f32c5e65acb94d399c7c72865e",
"detected_licenses": [
"MIT"
],
"directory_id": "823b7c7dae1556008f02c29f6d7b90f8af67bfd9",
"extension": "py",
"file... | 2.609375 | stackv2 | from email.mime.multipart import MIMEMultipart
from email.mime.text import MIMEText
import smtplib
import os
import threading
from datetime import datetime, timedelta
MY_ADDRESS = os.environ['MY_ADDRESS']
PASSWORD = os.environ["PASSWORD"]
HOST = os.environ["HOST"]
def sendEmail(email, title, contents):
s = smtpli... | 38 | 34.76 | 139 | 20 | 350 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_745541e0ef059e9c_46b680d8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
37
] | [
null
] | [
40
] | [
46
] | |
2024-11-19T02:18:26.281710+00:00 | 1,601,722,813,000 | 78350081da144341d7697c457627b1df7fcd06e3 | 3 | {
"blob_id": "78350081da144341d7697c457627b1df7fcd06e3",
"branch_name": "refs/heads/master",
"committer_date": 1601722813000,
"content_id": "695d2cbac6c93871bf005d8242d2de42c6be7372",
"detected_licenses": [
"MIT"
],
"directory_id": "c64463ddcd55dbbd6de1208bec88939358de6b08",
"extension": "py",
"fi... | 3.390625 | stackv2 |
import requests
import json
# API key here
api_key = "xxx"
# base_url variable to store url
base_url = "http://api.openweathermap.org/data/2.5/weather?" + "APPID=" + api_key
def get_current_weather(city_name):
# Give city name
# complete_url variable to store
# complete url address
complete_url = ... | 63 | 22.9 | 81 | 16 | 388 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_284333f0282fc3bf_b2c94c75", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
55
] | [
null
] | [
15
] | [
55
] | |
2024-11-19T02:30:05.187825+00:00 | 1,484,326,727,000 | f9b4a99016ba17d66623192eaad47b2eeecc5007 | 2 | {
"blob_id": "f9b4a99016ba17d66623192eaad47b2eeecc5007",
"branch_name": "refs/heads/master",
"committer_date": 1484326727000,
"content_id": "ce15807ab51008d659d07565964d8b94b36e695f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f3a33a747b8fcfacaeb89afa3629c4bffea4c597",
"extension": "py"... | 2.328125 | stackv2 | import time
import paramiko
from StringIO import StringIO
import pdb
import database
from datetime import datetime
import os
from keystoneauth1.identity import v3
from keystoneauth1 import session
from novaclient import client as n_client
from cinderclient import client as c_client
import subprocess
def convert_strin... | 272 | 24.41 | 109 | 19 | 1,569 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a9174ba88305f8e2_073e8bf2", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
128
] | [
null
] | [
9
] | [
74
] | |
2024-11-19T02:30:28.622786+00:00 | 1,512,499,502,000 | 3ce43ba7ba3fac9da7038fae5a54a8458d366dda | 3 | {
"blob_id": "3ce43ba7ba3fac9da7038fae5a54a8458d366dda",
"branch_name": "refs/heads/master",
"committer_date": 1512499502000,
"content_id": "54c4cf5ae234d9255687349cebf283949a531dcb",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "2b33418f6f375792a0c95cb07706b4de55a35178",
"extension": "p... | 2.96875 | stackv2 | from hashlib import sha1
from apps.seguridad.models import Usuario
def encrypt_password(password):
"""
Encripta una password para el Usuario usuario.
@param Usuario usuario.
@param string password.
@return string password encriptada.
"""
return sha1(password).hexdigest()
def authenticat... | 32 | 29.47 | 86 | 11 | 200 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_996b293e8c2fe272_f408b0a6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
13
] | [
null
] | [
17
] | [
25
] | |
2024-11-19T02:30:35.166259+00:00 | 1,611,506,696,000 | 864b1b3ff179c589b0ce39571513f86437fab390 | 4 | {
"blob_id": "864b1b3ff179c589b0ce39571513f86437fab390",
"branch_name": "refs/heads/master",
"committer_date": 1611506696000,
"content_id": "5a5e6658b75039637dfef1faacb9a6894e362de3",
"detected_licenses": [
"MIT"
],
"directory_id": "91b7dbf19e1dd14849033474d65c59d9678800c0",
"extension": "py",
"fi... | 3.875 | stackv2 | class Person:
def __init__(self, first, last):
self.firstName = first
self.lastName = last
def get_fullname(self):
return self.firstName + ' ' + self.lastName
class Employee(Person):
def __init__(self, first, last, employeenumber):
Person.__init__(self, first, last)
... | 31 | 24.87 | 68 | 11 | 175 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7fc6cc237f009c63_14803a99", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
30,
31
] | [
null,
null
] | [
7,
7
] | [
35,
35
] | |
2024-11-19T02:30:39.282051+00:00 | 1,590,903,825,000 | d8a366ca82c1aa1ac49caf8ecb6faf252e841ef6 | 2 | {
"blob_id": "d8a366ca82c1aa1ac49caf8ecb6faf252e841ef6",
"branch_name": "refs/heads/master",
"committer_date": 1590903825000,
"content_id": "3920c1af5dcca927639fd04493f4efcd427ad1a9",
"detected_licenses": [
"MIT"
],
"directory_id": "7ba92f32f83b741b55667c9ce72481665b9b3ba6",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/python3
""" Python CVS """
import json
import requests
if __name__ == '__main__':
url_todos = "https://jsonplaceholder.typicode.com/users"
name_users = requests.get(url_todos, verify=False).json()
list_tasks = {}
for user in name_users:
api_todos = requests.get(url_todos + '/{}/todo... | 19 | 38.47 | 70 | 17 | 161 | python | [{"finding_id": "codeql_py/request-without-cert-validation_61bcfa8e0feb504f_133057c1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
9
] | [
null
] | [
18
] | [
55
] | |
2024-11-19T02:41:52.181659+00:00 | 1,583,930,645,000 | f61b0851a35d4662eb6b80b3f9ccb5af585d8096 | 2 | {
"blob_id": "f61b0851a35d4662eb6b80b3f9ccb5af585d8096",
"branch_name": "refs/heads/master",
"committer_date": 1583930645000,
"content_id": "cd5c518c31d83ae4a95d500c910425e55a634158",
"detected_licenses": [
"MIT"
],
"directory_id": "4daec03c9f5ab7d6a2fc9ff2c8fef1687743ffcf",
"extension": "py",
"fi... | 2.375 | stackv2 | import binascii
import config
# import transaction
import Crypto
import Crypto.Random
from Crypto.Hash import SHA
from Crypto.PublicKey import RSA
from Crypto.Signature import PKCS1_v1_5
import hashlib
import json
from time import time
from urllib.parse import urlparse
from uuid import uuid4
class Wallet:
def __i... | 49 | 24.37 | 83 | 16 | 325 | python | [{"finding_id": "codeql_py/weak-crypto-key_57a93e08b004737a_e63f87ee", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
21
] | [
null
] | [
23
] | [
67
] | |
2024-11-19T02:42:28.868701+00:00 | 1,566,727,932,000 | a9a0ec37b8d394de8711f082851b730a636c01ab | 2 | {
"blob_id": "a9a0ec37b8d394de8711f082851b730a636c01ab",
"branch_name": "refs/heads/master",
"committer_date": 1566727932000,
"content_id": "6bfe06b17049b4f48b93ee16be6bc5dfc40d8b0f",
"detected_licenses": [
"MIT"
],
"directory_id": "f8e5df76724db8b1b33c74de77eb7d2b317e2a50",
"extension": "py",
"fi... | 2.34375 | stackv2 | # -*- coding: utf-8 -*-
import requests
from urllib import parse
import xlwt, random, os
from lxml import html
etree = html.etree
class DouBanSpider(object):
def __init__(self):
self.login_url = 'https://accounts.douban.com/j/mobile/login/basic'
self.comment_url = 'https://movie.douban.com/subje... | 87 | 42.89 | 144 | 19 | 1,067 | python | [{"finding_id": "codeql_py/request-without-cert-validation_d98d56a6a0a88564_9fb2db03", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
41
] | [
null
] | [
20
] | [
119
] | |
2024-11-19T02:42:28.931553+00:00 | 1,547,190,815,000 | c3f1c8db2ce40ce99e2309275ffc413320fb36f6 | 2 | {
"blob_id": "c3f1c8db2ce40ce99e2309275ffc413320fb36f6",
"branch_name": "refs/heads/master",
"committer_date": 1547190815000,
"content_id": "7178bb5e8d80ae6f5bc692320ce84e7b7827fc1c",
"detected_licenses": [
"MIT"
],
"directory_id": "68e76737d46261332cb3af1cc4b34886aad72eda",
"extension": "py",
"fi... | 2.4375 | stackv2 | from django.contrib import auth
from django.contrib.auth.forms import AuthenticationForm
from django.http import HttpResponseRedirect
from django.shortcuts import render
def login_view(request):
if request.method == 'POST':
username = request.POST.get('username', '')
password = request.POST.get('p... | 39 | 33.1 | 71 | 12 | 253 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_47630c0b1c25d9e1_3d23e29f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
11
] | [
null
] | [
25
] | [
33
] | |
2024-11-18T18:16:11.505546+00:00 | 1,576,950,085,000 | f27b4286bcd47bb6ae3871e0e711cf27bc1d41e7 | 4 | {
"blob_id": "f27b4286bcd47bb6ae3871e0e711cf27bc1d41e7",
"branch_name": "refs/heads/master",
"committer_date": 1576950085000,
"content_id": "299c3aacee582931de3a6e4dedc0469978a03ef3",
"detected_licenses": [
"MIT"
],
"directory_id": "3331fe3bf3e1d8e62dcbb38874bbafd26cc0931b",
"extension": "py",
"fi... | 4 | stackv2 | '''
--- Day 4: Secure Container ---
You arrive at the Venus fuel depot only to discover it's protected by a password. The Elves had written the password on a sticky note, but someone threw it out.
However, they do remember a few key facts about the password:
It is a six-digit number.
The value is within the range giv... | 70 | 30.6 | 160 | 13 | 566 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f363eb25d34af7c7_7c4352a2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
66
] | [
null
] | [
11
] | [
91
] | |
2024-11-18T20:08:57.754921+00:00 | 1,542,919,570,000 | e8b346c187735f34195aa04a3ad168381f2cacc1 | 3 | {
"blob_id": "e8b346c187735f34195aa04a3ad168381f2cacc1",
"branch_name": "refs/heads/master",
"committer_date": 1542919570000,
"content_id": "5111a140391e00f3249e5ba9b41b1674753939bd",
"detected_licenses": [
"MIT"
],
"directory_id": "0f276f1a8308d6b2eb16b4104a1a0ee969a99fa7",
"extension": "py",
"fi... | 2.625 | stackv2 | import tornado.ioloop
import tornado.web
import smartcar
import webbrowser
client_id = 'client_id'
client_secret = 'client_secret'
redirect_uri = 'http://localhost:5000/callback'
client = smartcar.AuthClient(client_id, client_secret, redirect_uri, test_mode = True)
class MainHandler(tornado.web.RequestHandler):
... | 154 | 33.24 | 116 | 15 | 1,265 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dc16fd9831324343_e2b676de", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
136,
137
] | [
null,
null
] | [
35,
34
] | [
52,
50
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.