added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T19:11:47.655008+00:00 | 1,430,940,302,000 | c8d29a7bf9db05c1fb69b04bfd0b656271de0a7c | 2 | {
"blob_id": "c8d29a7bf9db05c1fb69b04bfd0b656271de0a7c",
"branch_name": "refs/heads/master",
"committer_date": 1430940302000,
"content_id": "20aedc17e993438aea046441a7971974a8d76a8c",
"detected_licenses": [
"MIT"
],
"directory_id": "31704e459ffd230785d6f75008543ecfe585dbc7",
"extension": "py",
"fi... | 2.46875 | stackv2 | import os
import traceback
import sys
import json
import urllib2
import datetime
import logging
from model.station import Station
from time import sleep
from sqlalchemy import create_engine
from geoalchemy2.elements import WKTElement
from sqlalchemy.orm import sessionmaker
engine = create_engine('postgresql://' + os.... | 66 | 29.35 | 72 | 14 | 469 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_27f86f30e9f51972_5b4c5f83", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
53
] | [
null
] | [
23
] | [
37
] | |
2024-11-18T19:23:49.078561+00:00 | 1,508,336,491,000 | 3bb250295082b3b8d06fee058376138e9efdc3d3 | 3 | {
"blob_id": "3bb250295082b3b8d06fee058376138e9efdc3d3",
"branch_name": "refs/heads/master",
"committer_date": 1508336491000,
"content_id": "01dda04bd85bdb546a6f57c28d8ad422041220d7",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "7844fbaee409cae12f620ccd2e445474a4b27eaa",
"extension": "p... | 2.796875 | stackv2 | import sqlite3
import hashlib
def md5(string):
m = hashlib.md5()
m.update(string.encode("utf-8"))
return m.hexdigest()
def getLastID(c):
c.execute("select id from user order by id DESC limit 1;")
return c.fetchone()[0]
def reg(c,username,password):
c.execute("select * from user whe... | 37 | 26.49 | 105 | 11 | 245 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_90d02e5112a382d9_c5ae23bd", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
6
] | [
null
] | [
14
] | [
36
] | |
2024-11-18T19:23:55.503625+00:00 | 1,671,566,848,000 | 1b43bffec45c70da6a98538ac887f65dc43f6778 | 3 | {
"blob_id": "1b43bffec45c70da6a98538ac887f65dc43f6778",
"branch_name": "refs/heads/master",
"committer_date": 1671566848000,
"content_id": "88b39c0766951dbb0f63e13138883915624355d4",
"detected_licenses": [
"Unlicense"
],
"directory_id": "34ddec647d6ad357c1527cf713eaeaee4eb575aa",
"extension": "py",... | 3.28125 | stackv2 | from sys import argv
import hashlib
if len(argv) >= 2:
puzzle_input = argv[1]
else:
raise Exception("No puzzle input given.")
password = ""
index = 0
for i in range(8):
searching = True
while searching:
test_str = "{}{}".format(puzzle_input, index)
m = hashlib.md5()
m.update(b... | 25 | 21.72 | 55 | 14 | 150 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d59210474e2f1000_58d67148", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
25
] | [
null
] | [
7
] | [
15
] | |
2024-11-18T19:23:58.313688+00:00 | 1,466,608,271,000 | af1f6d3c1d0933f35fcb053b55c049a9a4fd8661 | 2 | {
"blob_id": "af1f6d3c1d0933f35fcb053b55c049a9a4fd8661",
"branch_name": "refs/heads/master",
"committer_date": 1466608271000,
"content_id": "bad728264a39c25692490bee29d65d7855cec9a1",
"detected_licenses": [
"Apache-2.0",
"BSD-3-Clause"
],
"directory_id": "f4ad721b7158ff2605be6f7e4bde4af6e0e11364",... | 2.421875 | stackv2 | #!/usr/bin/env python
"""
Makes an attempt to contextualize to a VM.
In the beginning phase, only the user's public keys are loaded into the target VM.
@date: July 2, 2014
@author: CarolinaFernandez, omoya
"""
import os
import paramiko
#import subprocess
from Crypto import Random
from paramiko_scp.scp import SCPClie... | 73 | 41.49 | 157 | 15 | 782 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e0ac43743c6b9e31_4c4e682b", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
27
] | [
null
] | [
9
] | [
69
] | |
2024-11-18T18:39:52.920067+00:00 | 1,615,517,706,000 | 81ba83620abdbbb8ff1998824d9a228bfa24e473 | 3 | {
"blob_id": "81ba83620abdbbb8ff1998824d9a228bfa24e473",
"branch_name": "refs/heads/master",
"committer_date": 1615517706000,
"content_id": "ca0a5bb8141ae0e1731498eff2694a19ad08ca8a",
"detected_licenses": [
"MIT"
],
"directory_id": "f0a54fa8580357d129f6701a107fe02d063e0ea7",
"extension": "py",
"fi... | 2.546875 | stackv2 | # -*- coding:utf-8 -*-
import re
import json
import requests
from pyquery import PyQuery as pq
"""
目标APP:小红书
目标url:APP短视频分享链接
爬取思路:
1. 通过APP里的分享获取视频url:http://xhslink.com/xvxMJ
2. url重定向到真实跳转地址:简化后.,https://www.xiaohongshu.com/discovery/item/5f77dbcf000000000100491c...
3. As of 2020-11-04 小红书更新,不再提供无水印接口。且... | 72 | 42.06 | 120 | 21 | 1,079 | python | [{"finding_id": "codeql_py/overly-large-range_df2cf8956a16670f_0069dce6", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
41
] | [
null
] | [
66
] | [
69
] | |
2024-11-18T18:40:02.360755+00:00 | 1,597,248,506,000 | 8a7e549177b3091cfc42af3a1ae72dda3ffc643f | 2 | {
"blob_id": "8a7e549177b3091cfc42af3a1ae72dda3ffc643f",
"branch_name": "refs/heads/master",
"committer_date": 1597248506000,
"content_id": "d36ac2bb56456698da301e09e108139690cefce6",
"detected_licenses": [
"MIT"
],
"directory_id": "bce3c24466e03486d3fc50e28e79d4f2947eee6d",
"extension": "py",
"fi... | 2.40625 | stackv2 | from django.shortcuts import render, redirect
from dataParser.models import StudentInfo
from dataParser.parser import *
from accounts.forms import LoginForm, AgreeForm
from accounts.my_auth import UserBackend
from accounts.custom_auth import check_if_user
from django.contrib.auth import login as django_login, logout
... | 80 | 35.36 | 76 | 15 | 781 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7b7c5a84ee91c637_dfe1cd97", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
51
] | [
null
] | [
15
] | [
23
] | |
2024-11-18T18:46:58.619258+00:00 | 1,448,832,288,000 | 0463eef558e5f8a301b10ff282d36a4f334ae71c | 2 | {
"blob_id": "0463eef558e5f8a301b10ff282d36a4f334ae71c",
"branch_name": "refs/heads/master",
"committer_date": 1448832288000,
"content_id": "a840a8c702535e8087f5cf0747c387561c80003b",
"detected_licenses": [
"MIT"
],
"directory_id": "b86390dcf369e5517d82faa2d1142a38a4535af8",
"extension": "py",
"fi... | 2.484375 | stackv2 | import re
import sys
import json
import time
import string
import requests
import unicodedata
from bs4 import BeautifulSoup
START_TIME = time.time()
START = 2005
END = 2014
PAGES = 3
HEADERS = {'User-Agent': 'request', 'X-Requested-With': 'XMLHttpRequest'}
PLAYERS = {}
def rankings_url(year, page):
host = 'h... | 137 | 32.1 | 91 | 21 | 1,274 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_d41ab47f4465756f_768ae0fd", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'go.com/nba/player/_/id', so it migh... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'go.com/nba/player/_/id', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'yahoo.com/nba/players/', so it might match more hosts than expected."
] | [
93,
123
] | [
null,
null
] | [
19,
21
] | [
49,
53
] | |
2024-11-18T18:47:01.474268+00:00 | 1,685,504,843,000 | 167696a7b555e570ade269b5c94cc09534b445c0 | 2 | {
"blob_id": "167696a7b555e570ade269b5c94cc09534b445c0",
"branch_name": "refs/heads/master",
"committer_date": 1685504843000,
"content_id": "af46ec2893f6d8d9c86063e54f2aca7691f1bc83",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "9656c1ee3d30b670b9495fcf9ae6eb39b91b2981",
"extension": "p... | 2.3125 | stackv2 | """
Tele TV
每次播放前自动登录账号
"""
import hashlib
import json
import logging
import random
import re
import time
from pathlib import Path
from streamlink.plugin import Plugin, PluginArgument, PluginArguments
from streamlink.stream import HLSStream
logger = logging.getLogger(__name__)
class Tele(Plugin):
arguments = P... | 106 | 33.41 | 124 | 18 | 920 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ed9005164a841ca3_c3b49f88", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
51,
83
] | [
null,
84
] | [
22,
31
] | [
65,
25
] | |
2024-11-18T18:47:05.714375+00:00 | 1,619,967,007,000 | b1e6cfe8fda6fc2a32a422c1910c22e65e91fcd4 | 3 | {
"blob_id": "b1e6cfe8fda6fc2a32a422c1910c22e65e91fcd4",
"branch_name": "refs/heads/main",
"committer_date": 1619967007000,
"content_id": "726b4e06fb66f3d08f711c3628da3d9b07d54c03",
"detected_licenses": [
"MIT"
],
"directory_id": "ee38eb9c3a6f2ef538a9213105f70a332f04a396",
"extension": "py",
"file... | 2.578125 | stackv2 | #!/bin/python3
import requests
import cgi
form = cgi.FieldStorage()
c_key = form.getvalue('id')
url = '{{ search_api_endpoint }}?id='
url = url+c_key
res = requests.get(url)
print("Content-Type: text/html")
print()
content = res.content
content = content.decode('ascii').split(",")
if 'valid' not in content[0]:
... | 23 | 23.78 | 68 | 11 | 172 | python | [{"finding_id": "codeql_py/partial-ssrf_6915a8e0a9db6aa7_6b24c0a9", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
10
] | [
null
] | [
7
] | [
24
] | |
2024-11-18T20:58:14.636267+00:00 | 1,530,107,230,000 | 6b3a20089d74d4b728a669b629dad1192e320e74 | 2 | {
"blob_id": "6b3a20089d74d4b728a669b629dad1192e320e74",
"branch_name": "refs/heads/master",
"committer_date": 1530107230000,
"content_id": "e057b8145ad46eef849c2ca6a16d26241c416ab7",
"detected_licenses": [
"MIT"
],
"directory_id": "a720e4e4d89e464a1bd51d77166f7a42dfc0db57",
"extension": "py",
"fi... | 2.453125 | stackv2 | '''import packages'''
import os, logging, urllib, sys, datetime, json
import boto3
import geojson
from geojson import Feature, Point, FeatureCollection
from bson import json_util
from pymongo import MongoClient
from pymongo.errors import ConnectionFailure
'''in order to use Xray, add aws_xray_sdk to requirements.txt an... | 156 | 37.19 | 149 | 19 | 1,306 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eb48aab387495afc_8593a348", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
62
] | [
null
] | [
25
] | [
67
] | |
2024-11-18T20:58:16.358066+00:00 | 1,480,555,031,000 | 44cece4ee5d72c3ef97d6968445a4fb00925486f | 3 | {
"blob_id": "44cece4ee5d72c3ef97d6968445a4fb00925486f",
"branch_name": "refs/heads/master",
"committer_date": 1480555031000,
"content_id": "c59a26eb9f30eeaa3c47bda51b673df4df0f0648",
"detected_licenses": [
"MIT"
],
"directory_id": "c9167b82ae7947c4a4fa6383e9db040a27c839d1",
"extension": "py",
"fi... | 2.90625 | stackv2 | #!/usr/bin/env python
from jinja2 import Template
template = Template(open("story-long.jinja2").read())
story_vars = {
"c1": {
"title": "Princess",
"name": "Clara",
"p": "she",
"relation": "sister"
},
"c2": {
"title": "Prince",
"name": "Arthur",
"p": "he",
"relation": "brother"
},
"v1": {
"tit... | 86 | 17.69 | 110 | 12 | 646 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d98ecb472c333d74_a4ea6433", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
5
] | [
null
] | [
12
] | [
54
] | |
2024-11-18T19:10:00.204819+00:00 | 1,589,959,046,000 | 3b43d7b0f3c0b49901d89ae037adfe9c6eb79ac6 | 2 | {
"blob_id": "3b43d7b0f3c0b49901d89ae037adfe9c6eb79ac6",
"branch_name": "refs/heads/master",
"committer_date": 1589959046000,
"content_id": "413733a0cbca6fd7abab4e0b78bae68f4e13188c",
"detected_licenses": [
"MIT"
],
"directory_id": "a08e9baec17a94c23f72c4b5353fd63a990b1833",
"extension": "py",
"fi... | 2.421875 | stackv2 |
import os
import json
import logging
import aiohttp
import asyncio
# import async_timeout
# import aiofiles
import sys
from collections import namedtuple
# https://github.com/RomelTorres/alpha_vantage/blob/develop/alpha_vantage/alphavantage.py
__author__ = 'Sergio Chairez'
logging.basicConfig(
level=logging.IN... | 89 | 32.12 | 93 | 15 | 805 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d44dcda33952ccdd_985a1bec", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
84
] | [
null
] | [
11
] | [
32
] | |
2024-11-18T20:15:51.240224+00:00 | 1,611,212,935,000 | e6f55682cf60a589e0cad2953d919458d6fe24a2 | 3 | {
"blob_id": "e6f55682cf60a589e0cad2953d919458d6fe24a2",
"branch_name": "refs/heads/main",
"committer_date": 1611212935000,
"content_id": "df1e8bb2a7f754cfffcc7b3e3140fbe4eb3a3860",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a2a1762c5429958f1a1d2987f24deca7bed35cae",
"extension": "py",
... | 2.65625 | stackv2 | #!/usr/bin/env python
import netfilterqueue
import scapy.all as scapy
def process_packet(packet):
scapy_packet=scapy.IP(packet.get_payload())
if scapy_packet.haslayer(scapy.DNSRR):
#print(scapy_packet.show()) u can see what packet contain
qname=scapy_packet[scapy.DNSQR].qname
if "www.b... | 26 | 32.46 | 65 | 14 | 240 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_4581f3c6c174f184_1f4d4fb6", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.bing.com](1) may be at an arbitrary position in th... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [www.bing.com](1) may be at an arbitrary position in the sanitized URL."
] | [
11
] | [
null
] | [
12
] | [
35
] | |
2024-11-18T20:55:05.429686+00:00 | 1,623,390,136,000 | 5705ad2415cea10ae093c50b4d1aac6fb6be09d7 | 2 | {
"blob_id": "5705ad2415cea10ae093c50b4d1aac6fb6be09d7",
"branch_name": "refs/heads/master",
"committer_date": 1623390136000,
"content_id": "cf98fe8917ebaf47c5ec68898b768c50822e85fc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "77a8581bb042b1164a2aee2c581ebaeba1cd571e",
"extension": "py"... | 2.328125 | stackv2 | import hashlib
from django.shortcuts import render, reverse, redirect
from .models import UseInfo, HostInfo
from remoteCMD.remote import Remote
# Create your views here.
def hash_password(password):
"""
md5加密
:param password:
:return:
"""
md5 = hashlib.md5()
md5.update(password.encode('utf-... | 158 | 27.25 | 107 | 18 | 1,038 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_67520029d3a3ad52_33ade33b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sen... | [
48,
53,
14
] | [
null,
null,
null
] | [
15,
19,
16
] | [
23,
28,
40
] | |
2024-11-18T19:38:01.239318+00:00 | 1,560,281,901,000 | cb4db36dd43b58477f08bac1ab5766f9f7c0e9f4 | 2 | {
"blob_id": "cb4db36dd43b58477f08bac1ab5766f9f7c0e9f4",
"branch_name": "refs/heads/master",
"committer_date": 1560281901000,
"content_id": "8a2dc7b675506e872ffc226a933ec9137ddfe051",
"detected_licenses": [
"MIT"
],
"directory_id": "fed2f7b8c56f0f94d3f33c2259a01038b49399db",
"extension": "py",
"fi... | 2.484375 | stackv2 | from flask import Flask
from flask_sqlalchemy import SQLAlchemy
from flask_script import Manager
from flask_migrate import Migrate, MigrateCommand
from datetime import datetime
app = Flask(__name__)
app.config['SQLALCHEMY_DATABASE_URI'] = 'sqlite:///app.db'
# app.config['SQLALCHEMY_DATABASE_URI'] = 'postgresql://postg... | 68 | 26.85 | 84 | 18 | 421 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_ad849e6f8e3669c8_d5e92bb7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
46
] | [
null
] | [
29
] | [
61
] | |
2024-11-18T19:38:17.531028+00:00 | 1,550,525,570,000 | 9fa26518b2fd4c3f305053e4e6d68ecb2918bb1f | 3 | {
"blob_id": "9fa26518b2fd4c3f305053e4e6d68ecb2918bb1f",
"branch_name": "refs/heads/master",
"committer_date": 1550525570000,
"content_id": "6dbe2b2ffdc083622c839f468c6386350ad58ba7",
"detected_licenses": [
"MIT"
],
"directory_id": "052684268b0bafc21e4cf16d421bb8281fff495e",
"extension": "py",
"fi... | 2.6875 | stackv2 | #! /usr/bin/env python3
from yaml import load
from jinja2 import Environment, FileSystemLoader
def main():
data = [
{
'name': 'Paramiko',
'version': '2.0'
},
{
'name': 'Jinja2',
'version': '2.10.x'
}
]
loader = FileSystemLoade... | 25 | 20.48 | 52 | 10 | 131 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ebc6c9ed5d2f5524_720436bc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
18
] | [
null
] | [
19
] | [
45
] | |
2024-11-18T19:38:21.598284+00:00 | 1,652,039,016,000 | 699427e9c3af1e53873303862d517ed8eb8df9f9 | 2 | {
"blob_id": "699427e9c3af1e53873303862d517ed8eb8df9f9",
"branch_name": "refs/heads/master",
"committer_date": 1652039016000,
"content_id": "f95902ccdfa11c405b16ae72a51115f7a22ac3e3",
"detected_licenses": [
"MIT"
],
"directory_id": "48f74ea38b6d3d9b34410a49adba2cd638755615",
"extension": "py",
"fi... | 2.359375 | stackv2 | import requests
class Repustate:
def __init__(self, api_key=None, server='api.repustate.com', cache=None):
"""
:param str api_key:
:param disk.Cache.Cache cache:
"""
self._api_key = api_key or '$APIKEY'
self._server = server
self._cache = cache
if self._cache:
self.get_entities = self._cache.make... | 71 | 25.75 | 85 | 21 | 516 | python | [{"finding_id": "codeql_py/request-without-cert-validation_87764a31b0ff72b1_98efeb93", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 5 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
31,
38,
47,
53,
62
] | [
34,
41,
50,
56,
65
] | [
14,
14,
16,
16,
16
] | [
4,
4,
6,
6,
6
] | |
2024-11-18T20:11:04.516350+00:00 | 1,496,052,688,000 | ef5ea90ba3f944fa508eae679e741d7d4521fd33 | 3 | {
"blob_id": "ef5ea90ba3f944fa508eae679e741d7d4521fd33",
"branch_name": "refs/heads/master",
"committer_date": 1496052688000,
"content_id": "6356d11cf6d94b5b501a56b1516b5cfe764c8107",
"detected_licenses": [
"MIT"
],
"directory_id": "cf263b08ca465386b9e653dd6d5cff76faaed731",
"extension": "py",
"fi... | 2.78125 | stackv2 | # coding: utf-8
import logging
import csv
from itertools import count
import os
import subprocess
import shutil
import shlex
from MigrationInterface import IssueAttachmentMigrationInfo
def remap(fieldnames, duplicated_field_name):
price_count = count(1)
return [duplicated_field_name + '{}'.format(next(price_... | 199 | 31.86 | 150 | 20 | 1,387 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_db46a0a4059f92c7_b04a32ea", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
193
] | [
null
] | [
23
] | [
26
] | |
2024-11-18T20:26:33.290581+00:00 | 1,540,766,292,000 | 467ae28b233a861bfa06b4dc3c16c318cadba748 | 3 | {
"blob_id": "467ae28b233a861bfa06b4dc3c16c318cadba748",
"branch_name": "refs/heads/master",
"committer_date": 1540766292000,
"content_id": "058b1cbfc1c1043b1ebfa34fa8698db878ed677b",
"detected_licenses": [
"MIT"
],
"directory_id": "b0c80cce31b1f84f15194af99d38e80227a7ab3a",
"extension": "py",
"fi... | 3 | stackv2 | #!/usr/bin/env python3
"""
processReceipts.py: Clean and file input receipts from ./Inbox into ./Database.
Receipts must already be OCR'd and saved as <name>.pdf and <name>.txt, with the
TXT just being the items and prices, one per line, prices last.
It is recommended to use gImageReader for this.
The database will ... | 182 | 30.23 | 104 | 19 | 1,298 | python | [{"finding_id": "codeql_py/overly-large-range_e6c9d1a5c5923bb0_afc1cce8", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[,\\-.\\/0-9:\\].", "remediation": "", "location": {"... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[,\\-.\\/0-9:\\]."
] | [
71
] | [
null
] | [
43
] | [
46
] | |
2024-11-18T20:26:38.921114+00:00 | 1,593,317,184,000 | 1e97b928b5a625a533fbbabdd5e156f641a5dba8 | 3 | {
"blob_id": "1e97b928b5a625a533fbbabdd5e156f641a5dba8",
"branch_name": "refs/heads/master",
"committer_date": 1593317184000,
"content_id": "3cdae945c77f3fcabc2e1b0d0ae1795cdac7f942",
"detected_licenses": [
"MIT"
],
"directory_id": "d1df868743ba8f60f6a6f7b0108ff19dc70a0833",
"extension": "py",
"fi... | 2.546875 | stackv2 | from bs4 import BeautifulSoup
import requests
from urllib.parse import urlparse
import json
with open('config.json', 'r') as f:
config = json.load(f)
from flask import Flask, render_template, jsonify, request
app = Flask(__name__)
# Naver API Client_id, secret 불러오기
client_id0 = config['DEFAULT']['client_id0']
clie... | 158 | 39.14 | 138 | 15 | 1,798 | python | [{"finding_id": "codeql_py/flask-debug_68ad084dd703067e_fb32c953", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/flask-debug",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run w... | [
158,
47,
91,
134
] | [
null,
null,
null,
null
] | [
5,
20,
20,
20
] | [
46,
70,
70,
70
] | |
2024-11-18T20:26:44.430479+00:00 | 1,625,560,017,000 | bb88e6110e7fa6f92d71e39a55f6dca3998acd79 | 2 | {
"blob_id": "bb88e6110e7fa6f92d71e39a55f6dca3998acd79",
"branch_name": "refs/heads/master",
"committer_date": 1625560017000,
"content_id": "d46ea34be30f6f0e094d978f8d05392d2c05a108",
"detected_licenses": [
"MIT"
],
"directory_id": "69006c061d1d78b55b5a144b43f4e0d41e51763e",
"extension": "py",
"fi... | 2.453125 | stackv2 | # -*- coding: utf-8 -*-
# @ Time : 2020/1/13 15:50
# @ Author : Redtree
# @ File : sys_user_manager
# @ Desc : 系统用户管理
import random
import string
import hashlib
from __init__ import db
from config import USER_SALT_LENGTH, PAGE_LIMIT, DEFAULT_PAGE
from sqlalchemy import func, or_
from database.sys_user import Sys_... | 87 | 25.9 | 77 | 14 | 668 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_4c36f97c5efeee4b_d1338a21", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
35
] | [
null
] | [
15
] | [
40
] | |
2024-11-18T20:52:23.201494+00:00 | 1,682,691,076,000 | 1efa56fe4220da336480e959d5e42ba860fe5a69 | 3 | {
"blob_id": "1efa56fe4220da336480e959d5e42ba860fe5a69",
"branch_name": "refs/heads/main",
"committer_date": 1682691076000,
"content_id": "44da33e11ea089a5d0658736db4f9969ae391abe",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "6ca906fc2dc8c0f1a631b1eaa6fb430b8a6fbcb0",
"extension": "py"... | 2.875 | stackv2 | #!/usr/local/bin/python3
# vim: set expandtab:
# vim: tabstop=2:
# vim: ai:
# vim: shiftwidth=2:
import psycopg2, sys, os.path
from pathlib import Path
import configparser
from typing import Iterator, Optional
import io
def read_in_config(test = False):
## Defaults to conf/.marcaroni.ini
## Then falls back ... | 100 | 29.73 | 178 | 15 | 725 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cc12c27141a69542_8f526b08", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
53
] | [
null
] | [
15
] | [
66
] | |
2024-11-18T20:52:38.798918+00:00 | 1,518,288,499,000 | 7f05772202a0f442e68b9269dd96f6037313ca03 | 3 | {
"blob_id": "7f05772202a0f442e68b9269dd96f6037313ca03",
"branch_name": "refs/heads/master",
"committer_date": 1518288499000,
"content_id": "1ea10b8bf217dd394942cf20f641610f209e5353",
"detected_licenses": [
"MIT"
],
"directory_id": "e651ab50221bb5f7126ee4f2d08fd0cf86b19392",
"extension": "py",
"fi... | 3.296875 | stackv2 | from random import randrange, SystemRandom
wordlist = open(r"C:\python\english.txt")
words = []
for line in wordlist:
words.append(line)
passLength = int(input("number of words?"))
passphrase = "\n"
for x in range(passLength):
listLength = len(words)
randInt = SystemRandom().randint(0, listLength)
passphras... | 19 | 22 | 53 | 12 | 112 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2160ef08768afc86_a432766e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
17
] | [
null
] | [
7
] | [
17
] | |
2024-11-18T20:52:47.344446+00:00 | 1,552,035,541,000 | fee8e3353c5115150258f9c62056dea4cce218cd | 3 | {
"blob_id": "fee8e3353c5115150258f9c62056dea4cce218cd",
"branch_name": "refs/heads/master",
"committer_date": 1552035541000,
"content_id": "43366a7d8645da6b2b4fb1b15974088f8c6f5f17",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d0703c831f5bbb14b533f6e29215e11fc4d84168",
"extension": "py"... | 3.140625 | stackv2 | import uuid
def get_mac_address():
macId=uuid.UUID(int=uuid.getnode()).hex[-12:]
return ':'.join([macId[e:e+2] for e in range(0,11,2)] )
import socket
myName=socket.getfqdn(socket.gethostname())
myAddr=socket.gethostbyname(myName)
print(myName)#用户名
print(myAddr)#本机id
print(get_mac_address())#mac地址
import mat... | 41 | 17.17 | 60 | 13 | 260 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a7fbcfacea26bf7d_6f782281", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
11
] | [
null
] | [
7
] | [
24
] | |
2024-11-18T19:02:31.428297+00:00 | 1,626,987,142,000 | d2febbc6d627d10c785446b4a481ae8b05132025 | 3 | {
"blob_id": "d2febbc6d627d10c785446b4a481ae8b05132025",
"branch_name": "refs/heads/main",
"committer_date": 1626987142000,
"content_id": "53ee37a97ebf7feccf1350a411da54135977b554",
"detected_licenses": [
"MIT"
],
"directory_id": "8f66d8a1ad244d10f28292c81963917d89d81b86",
"extension": "py",
"file... | 3 | stackv2 | import sys
import requests
from github import Github, BadCredentialsException
from github.GithubException import UnknownObjectException
args = sys.argv[1:]
source = None
createCommand = "create"
deleteCommand = "delete"
updateCommand = "update"
tokenCommand = "--token"
namesCommand = "--names"
valuesCommand = "--val... | 178 | 38.6 | 120 | 21 | 1,492 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9571360e7049718a_abfa520d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (secret)](5) a... | [
141,
144,
173,
176
] | [
null,
null,
null,
null
] | [
15,
15,
31,
31
] | [
63,
72,
90,
91
] | |
2024-11-18T19:02:47.370176+00:00 | 1,513,388,400,000 | d608eab8de7346d61e7bf2ad7bc3a2a527fc0d94 | 3 | {
"blob_id": "d608eab8de7346d61e7bf2ad7bc3a2a527fc0d94",
"branch_name": "refs/heads/master",
"committer_date": 1513388400000,
"content_id": "86d0c161d9640a56885929ef21f2443f3d326ae0",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "63a60c8697b541ea85466c16a518d790798be3d6",
"extension": "p... | 2.703125 | stackv2 | # -*- coding: utf-8 -*-
"""
continuity.services.commons
~~~~~~~~~~~~~~~~~~~~~~~~~~~
Continuity service commons.
:copyright: 2015 by Jonathan Zempel.
:license: BSD, see LICENSE for more details.
"""
from json import dumps
from requests import codes, request
from requests.exceptions import SSLError... | 105 | 21.41 | 76 | 15 | 513 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e4f0f306dd3c67fe_8e771168", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
98
] | [
null
] | [
23
] | [
67
] | |
2024-11-18T19:14:44.913641+00:00 | 1,644,071,346,000 | 28bd9d588d7d8b9e45e31a8a9a752805055285b9 | 2 | {
"blob_id": "28bd9d588d7d8b9e45e31a8a9a752805055285b9",
"branch_name": "refs/heads/master",
"committer_date": 1644071346000,
"content_id": "7a9b586eac41b2d94d56c1101754626f51ed93cc",
"detected_licenses": [
"MIT"
],
"directory_id": "89d5dbdc6ad03fd0bb54fc83f39bb8b94f514e48",
"extension": "py",
"fi... | 2.453125 | stackv2 | import requests
from urllib.parse import urlencode, urlparse, parse_qsl
api_key = ''
data_type = 'json'
endpoint = f'https://maps.googleapis.com/maps/api/geocode/{data_type}'
params = {
'key': api_key,
'address': '1600 Amphitheatre Parkway, Mountain View, CA',
}
url_params = urlencode(params)
url = f'{endpoint}?{u... | 159 | 32.14 | 163 | 16 | 1,483 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aa31d7949f43b2ea_373f8391", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.",
"This expression logs [sensitive data (p... | [
157,
157
] | [
null,
null
] | [
7,
19
] | [
17,
29
] | |
2024-11-18T19:14:47.575726+00:00 | 1,621,984,804,000 | 1a0213590e3a6cf20abf0bd6c2c9edd1484952d2 | 3 | {
"blob_id": "1a0213590e3a6cf20abf0bd6c2c9edd1484952d2",
"branch_name": "refs/heads/master",
"committer_date": 1621984804000,
"content_id": "c3193026e8298a46f58a45faaf3856de5e295b48",
"detected_licenses": [
"MIT"
],
"directory_id": "cbfa43b62d6cb4fc5bd1c373cb73caad5d9310ac",
"extension": "py",
"fi... | 2.96875 | stackv2 | #!/usr/bin/python3
import smtplib, re
from email.mime.multipart import MIMEMultipart
from email.mime.text import MIMEText
import pandas as pd
#https://www.tutorialspoint.com/python3/python_sending_email.htm
#https://www.javacodemonk.com/send-rich-text-multimedia-email-in-python-d21c900f
sender = 'Incyt <incyt@url.ed... | 81 | 27.52 | 142 | 19 | 583 | python | [{"finding_id": "codeql_py/redos_161d838fefffdf41_d8319f46", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "remediati... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'a@' and containing many repetitions of '_'."
] | [
15,
15
] | [
null,
null
] | [
16,
33
] | [
30,
47
] | |
2024-11-18T19:27:29.414609+00:00 | 1,530,984,986,000 | 1b07ff2bdc43f085f800a37420c16411214b700f | 3 | {
"blob_id": "1b07ff2bdc43f085f800a37420c16411214b700f",
"branch_name": "refs/heads/master",
"committer_date": 1530989606000,
"content_id": "9bceb318d273da5a481cdcd4220091d49137d060",
"detected_licenses": [
"MIT"
],
"directory_id": "ae91dd7582cb71f5a175a235a6b2babc8fa50e89",
"extension": "py",
"fi... | 2.828125 | stackv2 | import io
import os
import shutil
import tarfile
from .content_type import decode_value
from .data_type import DataType
from .errors import RainException
from .fs import fresh_copy_dir
from .ids import ID
from .utils import format_size
from .attributes import ObjectInfo
class DataInstance:
"""
Instance of Da... | 207 | 29.36 | 95 | 20 | 1,376 | python | [{"finding_id": "codeql_py/tarslip_b1964fd9db0de2a3_d7389370", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
165
] | [
null
] | [
17
] | [
18
] | |
2024-11-18T19:27:37.606573+00:00 | 1,553,787,999,000 | 3bb61bb6294aae1def0216dc7ea20f304792a57a | 2 | {
"blob_id": "3bb61bb6294aae1def0216dc7ea20f304792a57a",
"branch_name": "refs/heads/master",
"committer_date": 1553787999000,
"content_id": "74862580e48184b6179b3db03996c3e429b120e0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e87e21a558f6d850b176d3670269475b300fb5b0",
"extension": "py"... | 2.328125 | stackv2 | # -*- coding: utf-8 -*-
# Copyright (c) 2017 SHIELD, UBIWHERE
# ALL RIGHTS RESERVED.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# U... | 334 | 31.63 | 114 | 14 | 2,585 | python | [{"finding_id": "codeql_py/request-without-cert-validation_09f9ab432345f1c2_19e21af9", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 5 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2).",
"This request may run without certificate validation because [it is disabled](1) by [this value](2).",
"This request may run without certificate validation because [it is disabled](1) by [this value](2).",
"... | [
146,
170,
195,
220,
244
] | [
null,
null,
null,
null,
null
] | [
9,
9,
9,
9,
9
] | [
70,
58,
69,
71,
61
] | |
2024-11-18T19:27:39.681147+00:00 | 1,618,019,828,000 | 67b59b4ba9317aadd0d72e9d9e8c397b3f325413 | 3 | {
"blob_id": "67b59b4ba9317aadd0d72e9d9e8c397b3f325413",
"branch_name": "refs/heads/main",
"committer_date": 1618019828000,
"content_id": "e39f4d69c390ea56211b11ccdaadbd166b410a30",
"detected_licenses": [
"Unlicense"
],
"directory_id": "021f66f575da7c3a6b65c4a3900519d2f510e4e5",
"extension": "py",
... | 2.796875 | stackv2 | #!
## Outputs three json files for any given USER_ID on ridewithgps.com
## user_info, trips, gears
## These three files are then used by the graphing code.
import json, requests, sys
import api_credentials as cd
# Ride with GPS Info
BASE_URL = 'https://ridewithgps.com'
print(f'Contacting {BASE_URL}...')
# First: Ge... | 64 | 24.75 | 130 | 11 | 455 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8d9d97fca76e0dfd_9a13d3a7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
38
] | [
null
] | [
15
] | [
22
] | |
2024-11-18T19:38:33.827450+00:00 | 1,548,336,561,000 | 9ef7d6a0eaac56788b20482f8fcb4cd41d7c65d9 | 2 | {
"blob_id": "9ef7d6a0eaac56788b20482f8fcb4cd41d7c65d9",
"branch_name": "refs/heads/master",
"committer_date": 1548336561000,
"content_id": "def7b5d736c27c62e3a2a372c1bf04a7dcb0dc09",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "81ce55f753183d879d91b9b4a852a62d5f9f7a6d",
"extension": "p... | 2.4375 | stackv2 | # -*- coding: utf-8 -*-
from decimal import Decimal
import copy
import time
import logging
import os
from distutils.util import strtobool
from ripple_api import call_api, tx
logger = logging.getLogger(__name__)
def sell_all(buy_expected, sell_needed,
account, secret, timeout=5, fee=10000,
... | 271 | 31.56 | 79 | 16 | 2,093 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8bebc2d987bd8cfc_a3940d91", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text."
] | [
270
] | [
null
] | [
17
] | [
46
] | |
2024-11-18T19:38:36.374230+00:00 | 1,584,670,394,000 | 2c11b6e65e7dfb626190c1801c4f8785551bbd7e | 2 | {
"blob_id": "2c11b6e65e7dfb626190c1801c4f8785551bbd7e",
"branch_name": "refs/heads/master",
"committer_date": 1584670394000,
"content_id": "68d0df6e46077db702346f66e209dd2bbcdbdd47",
"detected_licenses": [
"MIT"
],
"directory_id": "11a813672c7da8ab28f6a68974187de0361e7e65",
"extension": "py",
"fi... | 2.40625 | stackv2 | import flask
from flask_cors import CORS
from flask import request, jsonify
from detectron2.engine import DefaultPredictor
from detectron2.config import get_cfg
from detectron2.data import MetadataCatalog
import cv2
import requests
import numpy as np
def score_image(predictor: DefaultPredictor, image_url: str):
im... | 57 | 33.95 | 128 | 13 | 515 | python | [{"finding_id": "codeql_py/full-ssrf_a067f84b64a326d9_daada503", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
12
] | [
null
] | [
21
] | [
44
] | |
2024-11-18T19:38:51.710474+00:00 | 1,489,552,020,000 | b6d0102fa56e31f5c4cf51f8ad47ea5fd2b012b0 | 2 | {
"blob_id": "b6d0102fa56e31f5c4cf51f8ad47ea5fd2b012b0",
"branch_name": "refs/heads/master",
"committer_date": 1489552020000,
"content_id": "7dcc7b3599254bca53efc75172df13566112d1e3",
"detected_licenses": [
"MIT"
],
"directory_id": "fc600cad6d40528b4402d8bece848a90ddf6e7ab",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/env python
# -*- coding:utf-8 -*-
import os
import os.path
import shutil
import json
from functools import wraps
from flask import (
Flask,
render_template,
redirect,
url_for,
request,
session,
abort,
send_from_directory
)
from flask_triangle import Triangle
from werkzeug.ut... | 190 | 26.71 | 85 | 18 | 1,226 | python | [{"finding_id": "codeql_py/reflective-xss_7e81226b7100b26c_fa1db48d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 12 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depen... | [
93,
131,
145,
183,
43,
45,
100,
117,
118,
134,
150,
152
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
24,
20,
24,
20,
40,
19,
27,
27,
21,
23,
31,
21
] | [
77,
73,
77,
73,
44,
40,
39,
41,
35,
79,
78,
29
] | |
2024-11-18T19:38:55.911792+00:00 | 1,586,568,599,000 | eb80cf617293ffaf267f91aef3fe42f3e7be5aca | 3 | {
"blob_id": "eb80cf617293ffaf267f91aef3fe42f3e7be5aca",
"branch_name": "refs/heads/master",
"committer_date": 1586568599000,
"content_id": "b68036d874a699571b56bcdd4f649be373da3534",
"detected_licenses": [
"MIT"
],
"directory_id": "0db215b22be5e0eab20902ef3d520a1528db5962",
"extension": "py",
"fi... | 3.328125 | stackv2 | from typing import Set
from jinja2 import Environment, meta
PARSER_HANDLER: Environment = Environment()
def render_template(source: str, *args, **kwargs) -> str:
"""
Render a Jinaja templates string with variables
:param source: A Jinja Template presented as a string
:type source: str
:return: ... | 42 | 29.21 | 80 | 8 | 297 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_1c2c592a9f6c8d51_a9c202d5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
5
] | [
null
] | [
31
] | [
44
] | |
2024-11-18T20:18:16.683101+00:00 | 1,616,427,998,000 | d8e3ea80e7ceaf9f7ee798834a9dacb82e2917cb | 2 | {
"blob_id": "d8e3ea80e7ceaf9f7ee798834a9dacb82e2917cb",
"branch_name": "refs/heads/main",
"committer_date": 1616427998000,
"content_id": "469b1f8816ae2716963d536858ba57d463f007e4",
"detected_licenses": [
"MIT"
],
"directory_id": "a794a0ba3c390c21ea8d57bfd21ac8e800571d95",
"extension": "py",
"file... | 2.40625 | stackv2 | import os
import random
from urllib.parse import urljoin
import requests
import urllib3
from dotenv import load_dotenv
def get_response(url, params=None, headers=None):
response = requests.get(url, params=params, headers=headers, verify=False)
response.raise_for_status()
return response
def get_vk_resp... | 140 | 30.91 | 78 | 13 | 1,017 | python | [{"finding_id": "codeql_py/request-without-cert-validation_4e237c128c415a0d_431994ec", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
11,
17,
25
] | [
null,
null,
null
] | [
16,
16,
16
] | [
79,
79,
76
] | |
2024-11-18T20:31:22.961542+00:00 | 1,467,910,479,000 | 4db4c69e25275dc4ab2c4a13a26f804b511e3faf | 3 | {
"blob_id": "4db4c69e25275dc4ab2c4a13a26f804b511e3faf",
"branch_name": "refs/heads/master",
"committer_date": 1467910479000,
"content_id": "7f3b0057e8d7f649d7ba21051f5a88f807f536a6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1c18d94dc11c3e0f36a865364f21c011932a3318",
"extension": "py"... | 2.546875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
from sys import argv
from bottle import Bottle, template, request, response, debug
import bot
import json
import requests
import settings
debug(True)
app = Bottle()
# SLACK INTEGRATION
@app.post('/slack')
def slack_handler():
"""
Handler for slack
"""
co... | 89 | 21.15 | 61 | 12 | 469 | python | [{"finding_id": "codeql_py/reflective-xss_2d17a7c9e95cc743_09deb668", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
32
] | [
null
] | [
12
] | [
21
] | |
2024-11-18T20:31:43.393918+00:00 | 1,492,481,378,000 | 21a0406c89057d307fc574da2cf8b7a4af270338 | 2 | {
"blob_id": "21a0406c89057d307fc574da2cf8b7a4af270338",
"branch_name": "refs/heads/master",
"committer_date": 1492481378000,
"content_id": "37a70169dacba0171ebb2dcf976c23c78e6b7de7",
"detected_licenses": [
"MIT"
],
"directory_id": "3e299aa5831afdd5d540a45d56486ea7046f6c86",
"extension": "py",
"fi... | 2.421875 | stackv2 | import tornado.ioloop
import tornado.web
import json
from tornado.httpclient import AsyncHTTPClient
class MainHandler(tornado.web.RequestHandler):
def handle_response(self, response):
if response.error:
print('Error: %s' % response.error)
else:
stringOutput = response.body.decode('utf-8')
... | 35 | 27.4 | 169 | 15 | 266 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2f7a187bfec43efe_9b6561fc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
15
] | [
null
] | [
13
] | [
44
] | |
2024-11-18T20:43:22.486028+00:00 | 1,278,448,143,000 | ebd66f129e0d6bfc0e892cd58d7063802ab0a0e7 | 2 | {
"blob_id": "ebd66f129e0d6bfc0e892cd58d7063802ab0a0e7",
"branch_name": "refs/heads/master",
"committer_date": 1278448143000,
"content_id": "8d9212a09f4c77cb3c81eb93f36bf2e496cacfe9",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "396791c5f5d928e3f82a7a193e22bcb3a5f222dc",
"extension": "p... | 2.453125 | stackv2 | #! /usr/bin/env python
print "Importing..."
import os
from jinja2 import Environment, FileSystemLoader
from sympy import Symbol
from common import lobatto, horner_scheme, ccode_pow2
n_functions = 50
precision = 25
factor_const = True
x = Symbol("x")
env = Environment(loader=FileSystemLoader('.'))
functions = []
pr... | 36 | 24.08 | 68 | 11 | 242 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_386b50430a3b8073_8cb485c1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
15
] | [
null
] | [
7
] | [
48
] | |
2024-11-18T20:43:30.608105+00:00 | 1,690,990,230,000 | f4cd7e0d944c8a3a3fcc614f43efdcd4977713a8 | 3 | {
"blob_id": "f4cd7e0d944c8a3a3fcc614f43efdcd4977713a8",
"branch_name": "refs/heads/master",
"committer_date": 1690990230000,
"content_id": "4f9e1e08b91a98809b65bc308d5c31b8c99f98fe",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a0b0b728a1b10f3f66b76cd9c42c212aebc15a8f",
"extension": "py"... | 2.796875 | stackv2 | import sys
import os
import traceback
import logging
import json
import random
import base64
import re
from optparse import OptionParser
from com.vordel.common.crypto import PasswordCipher
from java.lang import String
class Secrets:
"""Configuration store for secrets.
The values of the properties are encrypte... | 197 | 33.67 | 145 | 19 | 1,536 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_7667af6f4a8dbb55_1269b131", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (sec... | [
147,
87,
139
] | [
null,
null,
null
] | [
32,
30,
26
] | [
40,
62,
64
] | |
2024-11-18T20:43:33.732972+00:00 | 1,633,681,613,000 | ec93610675af5bde909eee6abf2496fd675a5462 | 3 | {
"blob_id": "ec93610675af5bde909eee6abf2496fd675a5462",
"branch_name": "refs/heads/master",
"committer_date": 1633681613000,
"content_id": "0e17fd7f6343b97439ba12415a2dd4e918add001",
"detected_licenses": [
"MIT"
],
"directory_id": "7741417e8130efae41583ea6123ef0704222262a",
"extension": "py",
"fi... | 2.53125 | stackv2 | from flask import Flask, request
import json
from Src.process import process_input
from Heroku.database import Database
from decouple import config
import pickle
database = Database()
APP_MODEL_PATH_REG = config("APP_MODEL_PATH_REG")
regressor = pickle.load(open(APP_MODEL_PATH_REG, "rb"))
app = Flask(__name__)
@app.... | 61 | 27.39 | 115 | 16 | 382 | python | [{"finding_id": "codeql_py/stack-trace-exposure_01e5b8a14d46bf6b_376b0354", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
41
] | [
null
] | [
16
] | [
27
] | |
2024-11-18T20:44:01.315918+00:00 | 1,601,266,244,000 | 72f672fc90709d52abbf40b3d890d94d68ae059f | 3 | {
"blob_id": "72f672fc90709d52abbf40b3d890d94d68ae059f",
"branch_name": "refs/heads/master",
"committer_date": 1601266244000,
"content_id": "a0f8112e40e2ea195f24b22ca6743a7489cf764c",
"detected_licenses": [
"MIT"
],
"directory_id": "330bb6f30a0d4d8644d8d596691a9462dccad257",
"extension": "py",
"fi... | 2.71875 | stackv2 | from spotipy import Spotify
import spotipy.util
import json
import os
def set_dir():
abspath = os.path.abspath(__file__)
dname = os.path.dirname(abspath)
os.chdir(dname)
def view_credentials():
if not os.path.exists('credentials.txt'):
print('No saved credentials found, input set_credentials t... | 254 | 40.37 | 167 | 17 | 2,141 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5dad2054864f75da_a7990c43", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
19
] | [
null
] | [
19
] | [
75
] | |
2024-11-18T20:44:08.877436+00:00 | 1,612,990,366,000 | 53653591c1caefcd21c83dd7aaf274ea1abb372d | 3 | {
"blob_id": "53653591c1caefcd21c83dd7aaf274ea1abb372d",
"branch_name": "refs/heads/master",
"committer_date": 1612990366000,
"content_id": "9a2ced7b4867e4b1fe1dc81147d0f427ad2bce5f",
"detected_licenses": [
"MIT"
],
"directory_id": "d442f8a31b1f983730d96a423b23cbf3293c2738",
"extension": "py",
"fi... | 3.40625 | stackv2 | import re
class Movie:
# Class Attribute
# Initializer / Instance Attributes
def __init__(self, title, year, director, cast, rating):
self.title = title
self.year = year
self.director = director
self.cast = cast
self.rating = rating
def check_year(self):
... | 52 | 27.67 | 137 | 13 | 438 | python | [{"finding_id": "codeql_py/overly-large-range_29860d680ba355ce_300d5e0c", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
24,
33
] | [
null,
null
] | [
115,
119
] | [
118,
122
] | |
2024-11-18T20:44:15.841060+00:00 | 1,505,395,810,000 | e67e21b9e97626e4c9243f29a19297295705502a | 2 | {
"blob_id": "e67e21b9e97626e4c9243f29a19297295705502a",
"branch_name": "refs/heads/master",
"committer_date": 1505395810000,
"content_id": "d4a30f225a98ec14f6b40ee95c13942359ded010",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5d7d226ef08cc3c5c25847bcc3d62e04ab616200",
"extension": "py"... | 2.453125 | stackv2 | import time
import re
import sys
import smtplib
from email.mime.text import MIMEText
import socket
host_name = socket.gethostname()
if len(sys.argv) < 3:
sys.exit('run_id password')
pwd = sys.argv[2]
run_id = sys.argv[1]
path = '/home/salomons/project/wsd/smac-output/scenario/live-rundata-' + str(run_id) + '.... | 55 | 24.6 | 98 | 17 | 423 | python | [{"finding_id": "codeql_py/overly-large-range_ebcfbfa4725c726d_b54da624", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-d\\].", "re... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-d\\]."
] | [
44
] | [
null
] | [
44
] | [
47
] | |
2024-11-18T20:58:09.471589+00:00 | 1,691,474,224,000 | 7c9d0e31538d01f4fca7996d11f3ed40f557a1ce | 3 | {
"blob_id": "7c9d0e31538d01f4fca7996d11f3ed40f557a1ce",
"branch_name": "refs/heads/master",
"committer_date": 1691474224000,
"content_id": "40d942d950e220328078db240ab4f3747a73e628",
"detected_licenses": [
"BSD-2-Clause-Views"
],
"directory_id": "4b3ec377fab16eb9f34bb4a7a6add274c00f7f13",
"extensio... | 2.625 | stackv2 | """
Utilities for managing secret data that is kept under source control.
"""
import glob
import hashlib
import json
import logging
import os
import pyAesCrypt
from autumn.settings import PROJECTS_PATH, DATA_PATH
SALT = "ElvHoxZ83kAUgqy9x2KqM"
BUFFER_SIZE = 64 * 1024
HASH_FILE = os.path.join(DATA_PATH, "secret-hashe... | 109 | 29.22 | 96 | 14 | 813 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_bf845c6c34616b40_064ada80", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
109
] | [
null
] | [
27
] | [
34
] | |
2024-11-18T20:58:10.497019+00:00 | 1,584,729,763,000 | b0fc95fd0a7a93bccfcc6e9425d04420f20f98b7 | 3 | {
"blob_id": "b0fc95fd0a7a93bccfcc6e9425d04420f20f98b7",
"branch_name": "refs/heads/master",
"committer_date": 1584729763000,
"content_id": "73d07e63791d3e7dfccc5492f9007a1b7d8df1e3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5f84dd8f3c3b5d8c56c2c0ee51ead60628f64abd",
"extension": "py"... | 2.546875 | stackv2 | import os
import sys
import requests
from loguru import logger
import re
from typing import Tuple, List, Dict, Callable
import sys
from datetime import datetime
from requests.packages import urllib3
import udatetime
urllib3.disable_warnings()
def fetch_with_requests(page: str) -> [bytes, int]:
#print(f"fetch {p... | 95 | 24.22 | 92 | 14 | 616 | python | [{"finding_id": "codeql_py/request-without-cert-validation_cd5271c9d926db04_b6e7d35e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
18
] | [
null
] | [
16
] | [
60
] | |
2024-11-18T20:58:11.883307+00:00 | 1,527,395,529,000 | 0f031c1d42dd1e4cd8bb4175967b7aa423951c0d | 2 | {
"blob_id": "0f031c1d42dd1e4cd8bb4175967b7aa423951c0d",
"branch_name": "refs/heads/master",
"committer_date": 1527395529000,
"content_id": "486756d0fe2712234eda4e77f4d96b17a249d32f",
"detected_licenses": [
"MIT"
],
"directory_id": "e36641f9198cb6e665f5e699471707a7635aa272",
"extension": "py",
"fi... | 2.5 | stackv2 | from flask import *
import sys
import sqlite3
from functools import wraps
app = Flask(__name__)
DATABASE_FILE = "tables/database.db"
conn = sqlite3.connect(DATABASE_FILE)
university_columns = ["Name", "Region_ID", "City", "Student_Population", "Safety_Score", "Size"]
employment_columns = ["Name", "Percent_Employed", ... | 215 | 39.6 | 122 | 19 | 2,227 | python | [{"finding_id": "codeql_py/sql-injection_38b8b507dab79aed_1af0a2f3", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2).\... | 2 | true | [
"CWE-089",
"CWE-089"
] | [
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2).\nThis SQL query depends on a [user-provided value](3).\nThis SQL query depends on a [user-provided value](4).\nThis SQL query depends on a [user-provided value](5).",
"This SQL query depends on a [user-pr... | [
50,
55
] | [
null,
null
] | [
29,
29
] | [
34,
34
] | |
2024-11-18T20:58:19.918958+00:00 | 1,487,521,838,000 | 8c06427041a420f2626ca49e35f587d900476d63 | 3 | {
"blob_id": "8c06427041a420f2626ca49e35f587d900476d63",
"branch_name": "refs/heads/master",
"committer_date": 1487521838000,
"content_id": "72ee1c0844a142138051bdf1b8bbe30b80b6196b",
"detected_licenses": [
"MIT"
],
"directory_id": "087546cbb4dceecb3d1199ed07b95ee980b4af83",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
import logging
from requests.exceptions import ConnectionError, Timeout
from scholarly_citation_finder.apps.core.models import PublicationUrl
from scholarly_citation_finder.tools.crawler.HtmlParser import HtmlParser, HtmlParserUnkownHeaderType
from scholarly_citation_finder.to... | 128 | 40.99 | 145 | 24 | 1,072 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_6b17c60f8b8e14a3_6a232676", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [dx.doi.org](1) may be at an arbitrary position in the ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [dx.doi.org](1) may be at an arbitrary position in the sanitized URL."
] | [
99
] | [
null
] | [
20
] | [
43
] | |
2024-11-18T20:58:19.977048+00:00 | 1,506,666,648,000 | 03ad74940fa6ea349c5c0d3b878a0d96aecdf94a | 3 | {
"blob_id": "03ad74940fa6ea349c5c0d3b878a0d96aecdf94a",
"branch_name": "refs/heads/master",
"committer_date": 1506666648000,
"content_id": "d3b1f22174cf9ec007f18af4f1b2a8d9afb5fc88",
"detected_licenses": [
"MIT"
],
"directory_id": "b45e4ef38e0793a7ec176d3f9e4248e3fb71ae7c",
"extension": "py",
"fi... | 3 | stackv2 | from tkinter import *
from tkinter import messagebox
import os
#Allows users to save out_text to a desired file. appName is the title of the tk window.
def saveData(out_text, appName):
outPg=Toplevel()
outPg.title(appName)
outFrame=Frame(outPg)
outFrame.pack(fill=X)
output=Text(outFrame,wrap=WOR... | 72 | 29.38 | 121 | 15 | 612 | python | [{"finding_id": "codeql_py/overly-permissive-file_06698647c217c690_6079a047", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
54
] | [
null
] | [
13
] | [
33
] | |
2024-11-18T20:58:40.504787+00:00 | 1,609,909,975,000 | 233dd2a097a7d2bb91eef018de5d9fb8b2d5fe4b | 2 | {
"blob_id": "233dd2a097a7d2bb91eef018de5d9fb8b2d5fe4b",
"branch_name": "refs/heads/main",
"committer_date": 1609909975000,
"content_id": "98d15e1b46551503aba1107d23e3ea1d9b11f58d",
"detected_licenses": [
"MIT"
],
"directory_id": "fd501a16e1cfff8e86ee86ede4bcee2fe4721da8",
"extension": "py",
"file... | 2.328125 | stackv2 | import requests
import csv
from fake_useragent import UserAgent
from lxml import etree
import os
import re
import time
import datetime
from hashlib import md5
import pickle
from concurrent.futures import ThreadPoolExecutor
ua = UserAgent()
headers = {'User-Agent' : ua.random}
#md5_set = set()
def parse_homepage(... | 200 | 32.03 | 141 | 21 | 1,565 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_29e39563c2337e41_c87b31ba", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
99
] | [
null
] | [
45
] | [
67
] | |
2024-11-18T21:10:28.457177+00:00 | 1,436,683,729,000 | a3924b5f2d1fbe718916eb3ba741fbdb55fc98bb | 3 | {
"blob_id": "a3924b5f2d1fbe718916eb3ba741fbdb55fc98bb",
"branch_name": "refs/heads/master",
"committer_date": 1436683729000,
"content_id": "04dabf3566100f8f27dd251bebb9a73c1a881796",
"detected_licenses": [
"MIT"
],
"directory_id": "23622ed6ad255a54e287f9beb4ab0d363e429dec",
"extension": "py",
"fi... | 2.84375 | stackv2 | # The simplest tool ever to grab images from a reddit subreddit.
#
# I've seen alternatives to this, and I've also seen tools get the job done more nicely
# but this is created for simplicity and minimalism, I wanted to create the simplest image download I can.
#
# Baha - meddbeibia@gmail.com - @meddbeibia
# JULY 12, 2... | 38 | 37.95 | 153 | 15 | 380 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b6123b184ab9f31a_b53acaad", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://imgur.com/](1) may be at an arbitrary position ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [http://imgur.com/](1) may be at an arbitrary position in the sanitized URL."
] | [
28
] | [
null
] | [
7
] | [
44
] | |
2024-11-18T21:10:44.289729+00:00 | 1,469,837,456,000 | 48cdd260600475c60a0dcfe6d40834abb6f5f139 | 3 | {
"blob_id": "48cdd260600475c60a0dcfe6d40834abb6f5f139",
"branch_name": "refs/heads/master",
"committer_date": 1469837456000,
"content_id": "556e6371eac5cf77f1bbcafe67477cc1610b44b8",
"detected_licenses": [
"MIT"
],
"directory_id": "26c26bbcc14008781ac225c0787ed02a87d5604c",
"extension": "py",
"fi... | 2.640625 | stackv2 | import os
import shutil
import tarfile
import json
import logging
import time
from contextlib import contextmanager
from .filesystem import TempDir
class KeyLocked(Exception):
'''Raised when an action would read or modify a key that is locked'''
pass
class SourceNotFound(Exception):
'''Raised when a s... | 174 | 31.39 | 108 | 17 | 1,233 | python | [{"finding_id": "codeql_py/tarslip_373c9fc6c5bc7521_057a8d04", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
67
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T21:10:48.414885+00:00 | 1,593,870,615,000 | 1693e0b40b559680be088ec9d16944f347b9c3ef | 3 | {
"blob_id": "1693e0b40b559680be088ec9d16944f347b9c3ef",
"branch_name": "refs/heads/master",
"committer_date": 1593870615000,
"content_id": "321778e340d9a762817f893b30c473c059246851",
"detected_licenses": [
"MIT"
],
"directory_id": "2ed0837e0900e556477edcbf36154268ab0e7c27",
"extension": "py",
"fi... | 2.734375 | stackv2 | import os
import glob
import cv2
import numpy as np
import tqdm
import urllib.request
from shutil import copyfile
import tarfile
from chainer_bcnn.data import load_image, save_image
def my_hook(t): # https://github.com/tqdm/tqdm/blob/master/examples/tqdm_wget.py
"""Wraps tqdm instance.
Don't forget to close(... | 87 | 26.44 | 80 | 14 | 686 | python | [{"finding_id": "codeql_py/tarslip_2b6f885e163681a4_eef94d8b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
84
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T21:10:58.685296+00:00 | 1,537,561,178,000 | 34120d51c02f07446abbf4347f195c8426e967e0 | 3 | {
"blob_id": "34120d51c02f07446abbf4347f195c8426e967e0",
"branch_name": "refs/heads/master",
"committer_date": 1537561178000,
"content_id": "1cacb93e40db29866c0c26c4e0a404cbece52505",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "66fda461fcdaa257af519f67c165964ee6c1e680",
"extension": "py"... | 2.625 | stackv2 | import csv
import getopt
import sys
import os
import pyodbc
def usage():
print('''\
LoadCsvFiles 2.0: Handles performing updates instead of inserts where data is already present, identity inserts, \
and UTF-8-BOM encoded files
Usage: LoadCsvFiles [OPTIONS]
-h --help Display t... | 331 | 33.68 | 119 | 22 | 2,588 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dc15741dbe4b3dcc_2a9c7c95", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive dat... | [
272,
278,
297
] | [
null,
null,
null
] | [
11,
15,
11
] | [
37,
19,
28
] | |
2024-11-18T21:11:01.776476+00:00 | 1,528,441,026,000 | 089efba69e6a1754e8dd509544fd0f7a19cd62ea | 2 | {
"blob_id": "089efba69e6a1754e8dd509544fd0f7a19cd62ea",
"branch_name": "refs/heads/master",
"committer_date": 1528441026000,
"content_id": "b668174ca6094bc6c27cf9a49fa903f837fb9ad5",
"detected_licenses": [
"MIT"
],
"directory_id": "1f4d43d93ebe19f05d8e70ac3159d790fa9eea38",
"extension": "py",
"fi... | 2.328125 | stackv2 |
import os
import webapp2
import jinja2
from google.appengine.ext import ndb
from google.appengine.api import users
import logging
import datetime
from Employee import *
template_env = jinja2.Environment(loader=jinja2.FileSystemLoader(os.getcwd()))
class Chats(ndb.Expando):
strOwnerReference = ndb.StringProper... | 235 | 31.79 | 135 | 17 | 1,588 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b5ea37b1ddbb4977_51b491d5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
11
] | [
null
] | [
16
] | [
79
] | |
2024-11-18T21:11:05.107579+00:00 | 1,583,076,660,000 | 3ea5fefbf7c503bdefce855f516db502ffa6d29d | 2 | {
"blob_id": "3ea5fefbf7c503bdefce855f516db502ffa6d29d",
"branch_name": "refs/heads/master",
"committer_date": 1583076660000,
"content_id": "2d1c8dc7c5a53e329ae19bad3ff6bdc9c8b5f09a",
"detected_licenses": [
"MIT"
],
"directory_id": "e59310fbd72ea3c062e9da79be9a2628cf08a8c6",
"extension": "py",
"fi... | 2.359375 | stackv2 | """
broker service
* is used by an external webapp
* user data is stored in the external webapp
* external process will register call back to get user_data
* broker stores all exchange relevant data: balances, orders, ...
"""
import datetime
import time
import logging
import os
import redis
from pathlib import Path
f... | 266 | 34.6 | 145 | 18 | 2,213 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fe5c3c4bf22cd400_efedb50b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
105,
114,
114
] | [
null,
null,
null
] | [
24,
33,
46
] | [
25,
39,
54
] | |
2024-11-18T21:11:13.413656+00:00 | 1,693,072,804,000 | fb6a7be9f4a3972334ad5ed3c3a1773c7e88cb41 | 2 | {
"blob_id": "fb6a7be9f4a3972334ad5ed3c3a1773c7e88cb41",
"branch_name": "refs/heads/master",
"committer_date": 1693072804000,
"content_id": "d4895c23ebc7afb1368489b4c3705641b68b7d19",
"detected_licenses": [
"Apache-2.0",
"MIT"
],
"directory_id": "3ae01569e10db9e4b3036a6e877ef24a3f056179",
"exten... | 2.5 | stackv2 | import sys
import requests
def read_log(file_path):
with open(file_path, "r", encoding="utf-8") as f:
url = f.readlines()
return url
def sync_missing_to_gitlab(l: list, u_name, u_pass, gitlab_tk):
headers = {"Private-Token": gitlab_tk}
create_url = "https://{}:{}@source.openeuler.sh/api/v4... | 51 | 31.37 | 91 | 15 | 445 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3f09dbfbbaf564d4_860c5e07", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
37
] | [
null
] | [
15
] | [
25
] | |
2024-11-18T21:11:19.321965+00:00 | 1,623,967,876,000 | b8a2fed0bb2caa410151628a2311c092a397bc73 | 2 | {
"blob_id": "b8a2fed0bb2caa410151628a2311c092a397bc73",
"branch_name": "refs/heads/main",
"committer_date": 1623967876000,
"content_id": "a6b9df76ff4770940f9fabb0ecd3bedc019f96bd",
"detected_licenses": [
"MIT"
],
"directory_id": "916c81b31000ee1e22baf52ad0cf839ad0294849",
"extension": "py",
"file... | 2.3125 | stackv2 | from flask import Flask, render_template, url_for, json
import os
app = Flask(__name__)
# code by kOssi (https://stackoverflow.com/questions/21133976/flask-load-local-json)
SITE_ROOT = os.path.realpath(os.path.dirname(__file__))
SITE_FOLDER = "static/data"
@app.route('/')
def index():
return render_template('lan... | 18 | 29.33 | 84 | 11 | 134 | python | [{"finding_id": "codeql_py/path-injection_9351d595acc0bcb2_72ed29ff", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
17
] | [
null
] | [
27
] | [
35
] | |
2024-11-18T19:03:34.285923+00:00 | 1,598,461,133,000 | 3faec14886b7030d5c9ce9286be6c84576db3c58 | 2 | {
"blob_id": "3faec14886b7030d5c9ce9286be6c84576db3c58",
"branch_name": "refs/heads/master",
"committer_date": 1598461133000,
"content_id": "0161ed7747c1c0aa7234c5ce04a8e7c1b2b591d8",
"detected_licenses": [
"MIT"
],
"directory_id": "8985d044e0d6b69301767e67449b505684146cbf",
"extension": "py",
"fi... | 2.46875 | stackv2 | # Check MongoDB Server access
import pymongo
client = pymongo.MongoClient('vrdata.viarezo.fr',username='2019hammoudf',password='eyJ0eXAiOiJKV1Qi',authSource='db1')
if 'vrdata' in client.list_database_names():
print('VRdata is available.')
vrdata = client["vrdata"]
selected = vrdata['users'].find_one({'u... | 16 | 26.38 | 118 | 11 | 124 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_623712277ce57bd0_1387d2da", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
12
] | [
null
] | [
11
] | [
31
] | |
2024-11-18T19:03:42.029986+00:00 | 1,646,915,688,000 | 9daa2da430279910dbe74e22b37845958746a911 | 3 | {
"blob_id": "9daa2da430279910dbe74e22b37845958746a911",
"branch_name": "refs/heads/master",
"committer_date": 1646915688000,
"content_id": "ff73514f1ec6a1f391bfd9cc156a0d0c8159f8c2",
"detected_licenses": [
"MIT"
],
"directory_id": "19cbba86b15dd6f9617b2661218abaee99b9e59a",
"extension": "py",
"fi... | 2.828125 | stackv2 | import logging
import urllib.parse as urlparse
from http.server import BaseHTTPRequestHandler
from anybadge import Badge
from anybadge.server import config
logger = logging.getLogger(__name__)
class AnyBadgeHTTPRequestHandler(BaseHTTPRequestHandler):
"""Request handler for anybadge HTTP server."""
def do_H... | 74 | 32.11 | 103 | 18 | 514 | python | [{"finding_id": "codeql_py/log-injection_685d36361da966de_d6df3fea", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1)... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
44,
44
] | [
null,
null
] | [
53,
46
] | [
58,
51
] | |
2024-11-18T19:28:40.038230+00:00 | 1,651,851,303,000 | 9ac499f7d259086c05151201df7cce76b61ec611 | 2 | {
"blob_id": "9ac499f7d259086c05151201df7cce76b61ec611",
"branch_name": "refs/heads/master",
"committer_date": 1651851303000,
"content_id": "6d12260883993035cac130052cba0027d7599e89",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6506409d76a3e0fdf039d11d61a02bd7b542999a",
"extension": "py"... | 2.46875 | stackv2 | from flask import Flask
from flask import request
import json
from sagas.nlu.wordnet_procs import WordNetProcs, predicate_chain, get_chains
from cachetools import cached, TTLCache
import logging
logger = logging.getLogger(__name__)
# cache = TTLCache(maxsize=100, ttl=300)
app = Flask(__name__)
@app.route("/")
def hom... | 168 | 28.14 | 77 | 16 | 1,297 | python | [{"finding_id": "codeql_py/log-injection_7f4c4f1af39c1063_4d9716f3", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
73,
104,
146
] | [
74,
105,
147
] | [
13,
13,
13
] | [
44,
44,
44
] | |
2024-11-18T19:28:41.642566+00:00 | 1,610,362,500,000 | fbc40a988a7f8de8d00742f866122519bc466be8 | 3 | {
"blob_id": "fbc40a988a7f8de8d00742f866122519bc466be8",
"branch_name": "refs/heads/main",
"committer_date": 1610362500000,
"content_id": "7310ee9730070fa9ae82e172ba7f3a2343ba1292",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "68cd81ccd338735b8a61b0986617ae0a83a6edb2",
"extension": "py",
... | 2.984375 | stackv2 | # importing modules
from tkinter import *
import requests
import json
import tkinter.messagebox as thh
root = Tk()
root.geometry("855x644")
root.minsize(855,644)
root.maxsize(855,644)
root.title("Weather-Feather---By Aryan Tiwari")
root.config(bg="#0f4c81", cursor="target")
root.iconbitmap("resource/sun.ico")
def ... | 82 | 27.45 | 116 | 13 | 690 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_397b44d6679ac36a_05f8c3c3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
24
] | [
null
] | [
12
] | [
13
] | |
2024-11-18T19:28:50.380604+00:00 | 1,467,977,331,000 | 05da78e95b6142a71bbb456e70aa9688af2c8ef6 | 3 | {
"blob_id": "05da78e95b6142a71bbb456e70aa9688af2c8ef6",
"branch_name": "refs/heads/master",
"committer_date": 1467977331000,
"content_id": "f84c9b6c708c2b95db5523ea633be329dc754ceb",
"detected_licenses": [
"MIT"
],
"directory_id": "6296ee56125e53af7d1d7c9ae6df2e5d262db6bf",
"extension": "py",
"fi... | 2.640625 | stackv2 | # -*- coding: utf-8 -*-
import requests
import re
from bs4 import BeautifulSoup
import csv
import time
import jinja2
from math import radians, sin, cos, asin, sqrt
from geopy import geocoders
g = geocoders.GoogleV3()
re_num = re.compile(r"([\d]+)")
re_url = re.compile(r"rent\-detail\-([\d]+)")
re_links = re.compile(r... | 162 | 27.69 | 163 | 18 | 1,289 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f09560b796fcbca8_b8f2b6f0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
132
] | [
null
] | [
20
] | [
60
] | |
2024-11-18T19:39:52.174719+00:00 | 1,486,386,773,000 | 044e00acde9287c77aa4640efa516f89da0d1bd3 | 3 | {
"blob_id": "044e00acde9287c77aa4640efa516f89da0d1bd3",
"branch_name": "refs/heads/master",
"committer_date": 1486386773000,
"content_id": "2ae22c3a230cebfb36c578e1b4762ed8109dc1eb",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "f1fc180a400aeca933549d0893cc99c1ff28a1ac",
"extension": "p... | 3.015625 | stackv2 | """
ykval.utils
~~~~~~~~~~~
Helper utilities for Yubikey Validator (YK-VAL)
"""
import base64
from binascii import hexlify, unhexlify
from cgi import parse_qs
from Crypto.Cipher import AES
from datetime import datetime
import hashlib
import hmac
import logging
from random import getrandbits
import re
import sys
logg... | 254 | 31.43 | 109 | 16 | 2,667 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_9ff19ed0f7b3de21_d4572150", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
84,
102
] | [
null,
null
] | [
13,
14
] | [
38,
38
] | |
2024-11-18T20:18:24.803050+00:00 | 1,610,108,679,000 | 612a8521af9f35a9699942299b8da7718f070dd1 | 4 | {
"blob_id": "612a8521af9f35a9699942299b8da7718f070dd1",
"branch_name": "refs/heads/main",
"committer_date": 1610108679000,
"content_id": "454a93016f0236c0a6158c3dde949861a8e25852",
"detected_licenses": [
"MIT"
],
"directory_id": "787a11e4db9f5f9cd6f0571edc609c68db550299",
"extension": "py",
"file... | 3.71875 | stackv2 | # Author : Emin Kartci
# Class : 3rd Year - EE393.A
# Department : Electrical & Electronics Engineering
# This module is to represent customers
# get random library to execute a stochastic simulation
# do not get all library I only need randint method
from random import randint
# define a class
cla... | 55 | 36.42 | 124 | 12 | 410 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_07b5d9a50fc0bda7_497209b2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
53
] | [
null
] | [
19
] | [
33
] | |
2024-11-18T20:18:53.027525+00:00 | 1,576,508,603,000 | 2b60acdadc745a575f19fdca6733fae9f2671cb6 | 3 | {
"blob_id": "2b60acdadc745a575f19fdca6733fae9f2671cb6",
"branch_name": "refs/heads/master",
"committer_date": 1581860643000,
"content_id": "9d94dd7e443c1a4fc629426be90cd51e8248af82",
"detected_licenses": [
"MIT"
],
"directory_id": "ad020363d4280e4977b3124acbe1ece5f8f21ccb",
"extension": "py",
"fi... | 3.09375 | stackv2 | #!/usr/bin/env python3
import sys
DEBUG = True
val = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"
frequency = "etaoinshrdlcumwfgypbvkjxqz"
assert len(frequency) == len(val) // 2
def check_password(ciphertext, password, excludes):
# Plaintext + Password = Ciphertext
plaintext = ""
for i, t i... | 98 | 24.33 | 81 | 18 | 606 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5830b2e38b41f25c_8f0f0e48", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
89
] | [
null
] | [
29
] | [
46
] | |
2024-11-18T20:18:56.211127+00:00 | 1,521,908,650,000 | e68be9e12e5b72018892c79e0b0e06862851a8f9 | 2 | {
"blob_id": "e68be9e12e5b72018892c79e0b0e06862851a8f9",
"branch_name": "refs/heads/master",
"committer_date": 1521908650000,
"content_id": "90c583505dd584b9866238a6420f5258b1da2c2b",
"detected_licenses": [
"MIT"
],
"directory_id": "2e937a5c021d895e3779d7934bdd4ff922298e45",
"extension": "py",
"fi... | 2.34375 | stackv2 | import json
import logging
from datetime import datetime
import bcrypt
import jwt
from flask import current_app, g, request
from flask_restful import Resource, abort
from marshmallow import ValidationError
from marshmallow_jsonapi.exceptions import IncorrectTypeError
import timeswitch.auth as auth
from timeswitch.aut... | 159 | 35.13 | 92 | 18 | 1,239 | python | [{"finding_id": "codeql_py/log-injection_f5e12a6f90e3c89a_67cacd61", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 8 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depen... | [
48,
56,
84,
88,
117,
121,
143,
147
] | [
null,
null,
85,
89,
118,
122,
144,
148
] | [
25,
21,
25,
25,
25,
25,
25,
25
] | [
78,
68,
63,
60,
63,
60,
63,
60
] | |
2024-11-18T20:29:33.729500+00:00 | 1,693,928,169,000 | 2fca53a29810c12baba3186d1c3f6320a73997f4 | 3 | {
"blob_id": "2fca53a29810c12baba3186d1c3f6320a73997f4",
"branch_name": "refs/heads/main",
"committer_date": 1693928169000,
"content_id": "39d1c03e9dfafad40ceba2c0b07904555942b04c",
"detected_licenses": [
"MIT"
],
"directory_id": "091a6200be74bf6577c86f623665bcc24e16b02b",
"extension": "py",
"file... | 2.84375 | stackv2 | # SPDX-FileCopyrightText: 2021 Eva Herrada for Adafruit Industries
#
# SPDX-License-Identifier: MIT
import time
import math
import board
import neopixel
import usb_hid
from adafruit_hid.keyboard import Keyboard
from adafruit_hid.keyboard_layout_us import KeyboardLayoutUS
from adafruit_hid.keycode import Keycode # pyl... | 121 | 33.32 | 87 | 16 | 1,236 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_44574abfeebebb2c_f01555a3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
79,
84
] | [
null,
null
] | [
15,
15
] | [
19,
19
] | |
2024-11-18T20:29:51.557772+00:00 | 1,512,688,163,000 | cfa928572b37f268f8939899b57a6211d9151f09 | 3 | {
"blob_id": "cfa928572b37f268f8939899b57a6211d9151f09",
"branch_name": "refs/heads/master",
"committer_date": 1512688163000,
"content_id": "78cb6f82461e669c1a762be77ad3812defa176cc",
"detected_licenses": [
"MIT"
],
"directory_id": "2429599d601cc0c843f7a0242c0349f002c27b06",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/env python
"""
SDM tar archive creation utility.
example usage:
create_archive.py 8311_17_1_dicoms -f dicoms newarchive
"""
from __future__ import print_function
import os
import glob
import json
import tarfile
import calendar
import datetime
def datetime_encoder(o):
if isinstance(o, datetime.da... | 190 | 34.62 | 125 | 17 | 1,608 | python | [{"finding_id": "codeql_py/tarslip_921d4757fec046e2_78837abc", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)."
] | [
65
] | [
null
] | [
13
] | [
20
] | |
2024-11-18T20:29:51.850655+00:00 | 1,424,844,491,000 | f6ffff76ff6ccb73dff1e6f3509752b5d624490b | 3 | {
"blob_id": "f6ffff76ff6ccb73dff1e6f3509752b5d624490b",
"branch_name": "refs/heads/master",
"committer_date": 1424844491000,
"content_id": "42e63aa4a798cd31b941008fcd39921017bbcc59",
"detected_licenses": [
"MIT"
],
"directory_id": "96f564ddc83e5ee5eca9d277f1769f5d999e0937",
"extension": "py",
"fi... | 2.625 | stackv2 | from flask import Flask, request
import traceback
app = Flask(__name__)
@app.route('/')
def hello_world():
return 'Hello World!'
try:
from .app1 import app1 as _app1
app1_ok = True
except:
app1_err = traceback.format_exc()
app1_ok = False
@app.route("/api/app1", methods=["POST"])
def app1():... | 35 | 17.54 | 47 | 14 | 176 | python | [{"finding_id": "codeql_py/stack-trace-exposure_91020d81d6d18c5f_837ae0ca", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
24,
31
] | [
null,
null
] | [
16,
16
] | [
29,
48
] | |
2024-11-18T20:51:19.073602+00:00 | 1,596,459,100,000 | 1a6976a60f7a8ee8711715abf26882489e9c63e3 | 3 | {
"blob_id": "1a6976a60f7a8ee8711715abf26882489e9c63e3",
"branch_name": "refs/heads/master",
"committer_date": 1596459100000,
"content_id": "8b04aecbe653fb858dea50927a83987c28616cae",
"detected_licenses": [
"MIT"
],
"directory_id": "9f08b15018986d4b735d860f1fa4830fbc56c379",
"extension": "py",
"fi... | 2.671875 | stackv2 | from alpha_vantage.timeseries import TimeSeries
from alpha_vantage.techindicators import TechIndicators
import matplotlib.pyplot as plt
import os
api_key_path = os.path.abspath('src/api_key.txt')
api_key = open(api_key_path, "r").readline()
print(api_key)
ts = TimeSeries(key=api_key, output_format='pandas')
data, met... | 20 | 34.5 | 83 | 9 | 194 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d3b3128428051f12_461ae9e9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
8
] | [
null
] | [
7
] | [
14
] | |
2024-11-18T20:51:20.128724+00:00 | 1,662,362,316,000 | 284a200e373b01916b523cf94944d44b49ad85a3 | 2 | {
"blob_id": "284a200e373b01916b523cf94944d44b49ad85a3",
"branch_name": "refs/heads/master",
"committer_date": 1662362316000,
"content_id": "532f31e312eddc5cb6a044d61111603a3f7f74ea",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e96889bdfc11b1fefe00b23ca3ef0944f6cce3e6",
"extension": "py"... | 2.4375 | stackv2 | """
Authentication Route for User.
"""
from flask import Blueprint, request, jsonify
from flask.helpers import make_response
from api.models.admin import Admin
from api.models.extractor import Extractor
from api.models.management import Management
from api.models.token_blacklist import BlacklistedToken
from api.extans... | 369 | 28.08 | 88 | 17 | 2,290 | python | [{"finding_id": "codeql_py/stack-trace-exposure_9535e3634cbe932e_aff8c6d7", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
48
] | [
null
] | [
38
] | [
46
] | |
2024-11-18T20:51:28.803815+00:00 | 1,366,750,616,000 | 875b7ab353aaef6712e5d40cb580a5dec39bd78a | 3 | {
"blob_id": "875b7ab353aaef6712e5d40cb580a5dec39bd78a",
"branch_name": "refs/heads/master",
"committer_date": 1366750616000,
"content_id": "e6fb8bcf23a76a601c5f46d0d2b95574a6e00c31",
"detected_licenses": [
"MIT"
],
"directory_id": "829100888306565cf88ff2c3642da71a9d865a8c",
"extension": "py",
"fi... | 2.765625 | stackv2 | # -*- coding: utf-8 -*-
import requestWrapper as req
import re
import time
import random
class Google(object):
searchUrl = 'https://www.google.sk/search?q=site%3Atitulky.com+{0}'
searchExpression = re.compile(r'www.titulky.com/(?:(?!\.).)+\.htm')
def getFirstLevelLinks(self, videos):
lastVid = len... | 24 | 34.12 | 71 | 15 | 208 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_4996a953cee6761f_6d4fe3a6", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'titulky.com/', so it might match mo... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'titulky.com/', so it might match more hosts than expected."
] | [
9
] | [
null
] | [
37
] | [
70
] | |
2024-11-18T19:07:01.689508+00:00 | 1,597,989,512,000 | 5afdf80be16686a844343aecfdb8d76c2fa825a2 | 3 | {
"blob_id": "5afdf80be16686a844343aecfdb8d76c2fa825a2",
"branch_name": "refs/heads/master",
"committer_date": 1598246476000,
"content_id": "3896e9cae38f1e58d393c1f6c9c320c9f1032f14",
"detected_licenses": [
"MIT"
],
"directory_id": "4b28ffb3f7326427f9e864ab3a5ce5b95f21c310",
"extension": "py",
"fi... | 2.59375 | stackv2 | import logging
from typing import Optional
from flask import (
flash,
redirect,
request,
send_from_directory,
url_for,
)
from flask_security import current_user
from flask_admin import BaseView, expose
from helpers.file_handling import (
allowed_file,
store_temp_file,
generate_temp_rec... | 209 | 34.23 | 89 | 16 | 1,520 | python | [{"finding_id": "codeql_py/url-redirection_04bcbe0085536658_d69ab79c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 5 | true | [
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends o... | [
105,
109,
114,
129,
141
] | [
null,
null,
null,
null,
null
] | [
29,
29,
29,
29,
29
] | [
40,
40,
40,
40,
40
] | |
2024-11-18T19:07:08.566855+00:00 | 1,474,506,091,000 | 841a6b71feddf4105f645825481eb02a79ca71ac | 2 | {
"blob_id": "841a6b71feddf4105f645825481eb02a79ca71ac",
"branch_name": "refs/heads/master",
"committer_date": 1474506091000,
"content_id": "e840db5b5ab38330e80eef6154a1f93ccad5efb9",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "07b5d0954e2bfb69fc53e2d03b8b1d49fd4490a8",
"extension": "p... | 2.484375 | stackv2 | #!/usr/bin/env python3
import tornado.ioloop
import tornado.web
import tornado.websocket
from tornado.options import define, options, parse_command_line
import os
import uuid
import base64
import random
import koh_api
define("port", default=8888, help="run on the given port", type=int)
__INDEX_FILE__ = "client/index... | 204 | 33.42 | 116 | 15 | 1,640 | python | [{"finding_id": "codeql_py/path-injection_c0b76d4385b7c09c_795adfd5", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
150,
166
] | [
null,
null
] | [
19,
19
] | [
34,
34
] | |
2024-11-18T19:07:34.807626+00:00 | 1,623,880,769,000 | 90266b5207acf78c58ab42b45f3561cddca69062 | 2 | {
"blob_id": "90266b5207acf78c58ab42b45f3561cddca69062",
"branch_name": "refs/heads/master",
"committer_date": 1623880769000,
"content_id": "d57405a47c7b5c78f6352ae9cb261e23ffc2ffac",
"detected_licenses": [
"MIT"
],
"directory_id": "50eebaa67bd8d3600e418fa26fab479f7e1ec0c1",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/python3
import socket
import ssl
SERVER_IP = '0.0.0.0'
SERVER_PORT = 5354
#Generate the certificate and the key:
## openssl req -newkey rsa:2048 -nodes -keyout /root/test/server-key.pem -x509 -days 365 -out /root/test/cert.pem
context = ssl.SSLContext(ssl.PROTOCOL_TLS_SERVER)
context.load_cert_chain('/root... | 35 | 24.6 | 113 | 12 | 242 | python | [{"finding_id": "codeql_py/insecure-protocol_b464cd046cd3b03b_e764fcd6", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol... | 2 | true | [
"CWE-327",
"CWE-200"
] | [
"py/insecure-protocol",
"py/bind-socket-all-network-interfaces"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1).",
"'0.0.0.0' binds a socket to all interfaces."
] | [
19,
15
] | [
null,
null
] | [
7,
null
] | [
14,
36
] | |
2024-11-18T19:07:41.819688+00:00 | 1,619,353,376,000 | 781e7e6d8e1e2cbb9a7cbcdf569f4babf8828fb6 | 4 | {
"blob_id": "781e7e6d8e1e2cbb9a7cbcdf569f4babf8828fb6",
"branch_name": "refs/heads/main",
"committer_date": 1619353376000,
"content_id": "5fd76aca96bec5dc67b01233e8b019002837bdb2",
"detected_licenses": [
"MIT"
],
"directory_id": "594d4d7061fdee0476fd1b399c8aaf614cd68c25",
"extension": "py",
"file... | 3.9375 | stackv2 | class Person:
county = "India"
def takeBreak(self):
print("Take break")
class Employee(Person):
company = "Honda"
def getSalary(self):
print(f"salary is {self.salary}")
def takeBreak(self):
print("I am an Employee")
class Programmer(Employee):
company = "Fiverr"
... | 33 | 15.85 | 41 | 12 | 131 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c1f2945df4a46014_1e889e1e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
11
] | [
null
] | [
15
] | [
41
] | |
2024-11-18T19:18:18.926706+00:00 | 1,619,799,222,000 | 74ca62d278173f0bf0c57c72ea6824392ec9e03f | 2 | {
"blob_id": "74ca62d278173f0bf0c57c72ea6824392ec9e03f",
"branch_name": "refs/heads/main",
"committer_date": 1619799222000,
"content_id": "78bf3dda616e6b80bd3099b6dd6f01b721af3ebc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5c0a9ad82b5dc92d220a61709832a8247b54dcd1",
"extension": "py",
... | 2.390625 | stackv2 | import logging
import os
import subprocess
from typing import Union, List, Tuple, Dict, Any, Optional, Iterable
import pmakeup as pm
class LinuxOSSystem(pm.IOSSystem):
def __init__(self, model: "pm.PMakeupModel"):
self._model = model
# def get_git_commit(self, p: pm.path) -> str:
# result, ... | 223 | 43.63 | 162 | 22 | 1,968 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_631e4240f9b8b36a_97de067d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
94
] | [
null
] | [
33
] | [
54
] | |
2024-11-18T19:18:21.335986+00:00 | 1,637,594,921,000 | fa0981a3f17aec6fb1937e0b80660b9e3a00c506 | 3 | {
"blob_id": "fa0981a3f17aec6fb1937e0b80660b9e3a00c506",
"branch_name": "refs/heads/master",
"committer_date": 1637594921000,
"content_id": "66feb08d01b5c88985655018ef4c70342cdcdc39",
"detected_licenses": [
"MIT"
],
"directory_id": "d1d64ea15d7472b5ad649a251c7edd1013c89d29",
"extension": "py",
"fi... | 2.59375 | stackv2 | """
Creates MSI installers for PyXLL projects using Wix.
Requires the Wix Toolset to be installed
http://wixtoolset.org/
Copy and edit the example config file for your own project.
Customizations can be made by copying and editing the templates.
Usage:
python make_installer -c config/example.yaml
"""
import subproce... | 238 | 33.99 | 105 | 19 | 1,944 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_de9389b47e501c38_27f68e44", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
179
] | [
null
] | [
24
] | [
50
] | |
2024-11-18T19:18:33.503927+00:00 | 1,555,952,365,000 | 5ac93da4c6df56045d5efbc8c2674e5248592275 | 3 | {
"blob_id": "5ac93da4c6df56045d5efbc8c2674e5248592275",
"branch_name": "refs/heads/master",
"committer_date": 1555952365000,
"content_id": "837686af4961018b5ceb848025d0dd65e4c56fdb",
"detected_licenses": [
"MIT"
],
"directory_id": "370928ca4c91a7fdd73f6a2289d69ec06e849196",
"extension": "py",
"fi... | 3.046875 | stackv2 | import md5
import random
import subprocess
import sys
import os
hashchars = [ c for c in '0123456789abcdef' ]
def randHash():
global hashchars
return random.choice(hashchars)
def writeHashishFile(filename, size):
with open(filename, 'w') as f:
for i in xrange(0,size):
f.write(ran... | 84 | 26.31 | 100 | 15 | 581 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_23560a9d67144b22_827fde19", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
45
] | [
null
] | [
25
] | [
30
] | |
2024-11-18T19:18:40.224445+00:00 | 1,651,932,502,000 | ab36a663bc7c76cfb3e96ffcd80c77bac4b825f0 | 2 | {
"blob_id": "ab36a663bc7c76cfb3e96ffcd80c77bac4b825f0",
"branch_name": "refs/heads/master",
"committer_date": 1651932509000,
"content_id": "fe19d0527b49cd240658d5d7b5b845d47de39a8d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f9d11a3afd792a373ce2ac37574d6a6f97375d14",
"extension": "py"... | 2.328125 | stackv2 | #!/usr/bin/python
#
# Copyright 2018-2022 Polyaxon, Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable ... | 313 | 26.96 | 88 | 16 | 2,063 | python | [{"finding_id": "codeql_py/tarslip_0ab3dc3de836052b_6aff8de7", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
207
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T19:18:45.401420+00:00 | 1,587,311,020,000 | 6f5e91bf5d2e8f137ed1ca7d095319399812e00f | 3 | {
"blob_id": "6f5e91bf5d2e8f137ed1ca7d095319399812e00f",
"branch_name": "refs/heads/master",
"committer_date": 1587311020000,
"content_id": "6b40fe328cc1df9e33c3e330327234f8ad06ef91",
"detected_licenses": [
"MIT"
],
"directory_id": "2035ff7879d66feb64b5926c4639adbf7ebcbcea",
"extension": "py",
"fi... | 3.40625 | stackv2 | #!/usr/bin/env python3.6
import pyperclip
from user import User, Credential
def create_user(fullname, username, password):
"""
Function to create a new user account
"""
new_user = User(fullname, username, password)
return new_user
def save_users(user):
"""
Function to save a new user account
"""
... | 224 | 37.33 | 151 | 27 | 1,537 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c897d93dca68e511_7ab34b96", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw... | [
117,
171,
180
] | [
null,
null,
null
] | [
17,
29,
37
] | [
108,
117,
140
] | |
2024-11-18T19:18:49.213539+00:00 | 1,560,346,022,000 | 9892db17d806ea73d82344c1db0c2e7830697bd6 | 3 | {
"blob_id": "9892db17d806ea73d82344c1db0c2e7830697bd6",
"branch_name": "refs/heads/master",
"committer_date": 1560346022000,
"content_id": "a2a8d7c2afdeaec5e48df19921b76982c87d1997",
"detected_licenses": [
"MIT"
],
"directory_id": "c118851fc4925e71fd3183ce86fca9ec80f03c5e",
"extension": "py",
"fi... | 2.515625 | stackv2 | import hashlib
class SqLiteDbConfig:
def __init__(self, config):
keys = config.keys()
self.type = 'SqLite'
self.filename = config['filename'] if 'filename' in keys else 'fids_db.db'
def __repr__(self):
return ("SqLiteDbConfig("
f"filename={self.filename},)")
... | 31 | 33.06 | 89 | 18 | 259 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_fd633be54d6c80bb_b632f2c6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
31
] | [
null
] | [
44
] | [
73
] | |
2024-11-18T19:18:53.854469+00:00 | 1,664,827,529,000 | cca31eb34fb2e99df6da29ec88c9304b8b6dec65 | 3 | {
"blob_id": "cca31eb34fb2e99df6da29ec88c9304b8b6dec65",
"branch_name": "refs/heads/master",
"committer_date": 1664827529000,
"content_id": "b09d2e21e5365284041f0552e00a5812b3329b75",
"detected_licenses": [
"MIT"
],
"directory_id": "817ced83deb41c10e3faba69992314a08f487cdb",
"extension": "py",
"fi... | 2.890625 | stackv2 | #!/usr/bin/env python3
"""
Usage: obtain_secrets <path>
"""
import os
from subprocess import check_output
from docopt import docopt
from os.path import join, isdir
def get_secret(name):
path = "secret/vimc/{}".format(name)
return check_output(["vault", "read", "-field=value", path]).decode('utf-8')
def sa... | 44 | 23.41 | 80 | 11 | 291 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_85c09f19018d0030_875e96d0", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text."
] | [
23
] | [
null
] | [
17
] | [
21
] | |
2024-11-18T19:18:53.916448+00:00 | 1,608,557,697,000 | 3aa189bb8732b21ca4b1d2e6bdaabbdd7350f57f | 3 | {
"blob_id": "3aa189bb8732b21ca4b1d2e6bdaabbdd7350f57f",
"branch_name": "refs/heads/master",
"committer_date": 1608557697000,
"content_id": "86a23c1eacfb3ac4ca4934e30cac464cbef4ae54",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "c033a814d418b10d1c8a3f739c410a1cf8f8d212",
"extension": "p... | 3.25 | stackv2 | #!/usr/bin/evn python
# -*- coding: utf-8 -*-
# python version 2.7.10
from Crypto.Cipher import AES
from Crypto import Random
import sys
import os
import struct
def encrypt():
filename = raw_input("Please enter the filename to be encrypted with its path: ")
outfilename = filename + ".enc"
ivgen = Random.n... | 105 | 30.33 | 110 | 19 | 888 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_798821f0e278fbd8_5049d960", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode CFB](2) is broken or weak, and should not be used.\n[The block mode CTR](3) is broken or weak, and should not be used.\n[The block mode ECB](4) is broken or weak, and should not be used.\n[The block mode OFB](5) is broken or weak, ... | [
52,
89
] | [
null,
null
] | [
37,
37
] | [
61,
61
] | |
2024-11-18T19:19:02.685724+00:00 | 1,545,490,215,000 | 600b8c5664dfeca0fe442fed7b3eadd8da73ab1e | 3 | {
"blob_id": "600b8c5664dfeca0fe442fed7b3eadd8da73ab1e",
"branch_name": "refs/heads/master",
"committer_date": 1545490215000,
"content_id": "88b8226ee5d8cf9f426a3f8dfebbe6165ac06940",
"detected_licenses": [
"MIT"
],
"directory_id": "e35a4a5167eb241f38eacebaefa63fe35e8e572c",
"extension": "py",
"fi... | 2.890625 | stackv2 | ################################################
# 1. Import Dependencies
################################################
# Python SQL toolkit and Object Relational Mapper
import sqlalchemy
from sqlalchemy.ext.automap import automap_base
from sqlalchemy.orm import Session
from sqlalchemy import create_engine
#PyMySQL... | 324 | 34.11 | 149 | 15 | 3,194 | python | [{"finding_id": "codeql_py/sql-injection_801e954d5df70575_b6bea20f", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 4 | true | [
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089"
] | [
"py/sql-injection",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
178,
227,
255,
301
] | [
null,
null,
null,
null
] | [
25,
26,
27,
26
] | [
34,
30,
36,
30
] | |
2024-11-18T19:19:07.732351+00:00 | 1,637,477,487,000 | 6c41bde0e84c754b1acfdf3029e0b4c0981847a2 | 3 | {
"blob_id": "6c41bde0e84c754b1acfdf3029e0b4c0981847a2",
"branch_name": "refs/heads/main",
"committer_date": 1637477487000,
"content_id": "3acd6c4296c039bead91535756db47846aa30ca8",
"detected_licenses": [
"MIT"
],
"directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b",
"extension": "py",
"file... | 2.640625 | stackv2 | """
This is a public file
"""
from qunetsim.components import Host # version: 0.1.2.post0
import random
import hashlib
from Crypto.Cipher import AES
from secret_player import SecretPlayer
ZARDUS_ID = "zardus"
HACKER_ID = "Hacker"
ADAMD_ID = "adamd"
class Player(object):
def __init__(self):
pass
de... | 136 | 30.73 | 85 | 18 | 1,089 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_635db715b498511e_6721f13d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
31
] | [
null
] | [
28
] | [
45
] | |
2024-11-18T19:29:35.665709+00:00 | 1,690,588,669,000 | a98669bfd542885a0312aed1b984a5f156b296a1 | 3 | {
"blob_id": "a98669bfd542885a0312aed1b984a5f156b296a1",
"branch_name": "refs/heads/master",
"committer_date": 1690588669000,
"content_id": "056e0e5da9e884041d31404ebc1f30123ef449c0",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "cd1f0498eb1e183c3f69dd68f4e8b08cdee75fd4",
"extension": "p... | 2.6875 | stackv2 | import fastjsonschema
import json
from jsonschema import validate
import jsonschema
import requests
def check_data_object(d):
"""Validate the metadata urls.
Args:
d ([type]): [description]
Returns:
[type]: [description]
"""
rv = requests.head(
d["url"],
allow_redi... | 113 | 31.07 | 114 | 17 | 798 | python | [{"finding_id": "codeql_py/request-without-cert-validation_4cc5c842ed0b2467_255d9908", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
17
] | [
23
] | [
10
] | [
6
] | |
2024-11-18T19:29:42.914931+00:00 | 1,615,106,432,000 | db92ab50b15cd074830f5a7547d53e1fad7c3f54 | 2 | {
"blob_id": "db92ab50b15cd074830f5a7547d53e1fad7c3f54",
"branch_name": "refs/heads/main",
"committer_date": 1615106432000,
"content_id": "8e3ba4c75fcb1768838a9d3895a106ccaba0fba1",
"detected_licenses": [
"MIT"
],
"directory_id": "b2a689d29cb0a93f08f7e9c8f02675b05bf01d46",
"extension": "py",
"file... | 2.3125 | stackv2 | import pandas as pd
import numpy as np
import os
from fastapi import APIRouter
from datetime import datetime
from typing import List
from pydantic import BaseModel
from app.config import STOCK_DAILY_PATH, BASIC_PATH
from app.utils.exc import (FileNotFoundException,
NotInConsiderationExcepti... | 42 | 26.29 | 62 | 15 | 296 | python | [{"finding_id": "codeql_py/path-injection_7174736c81a5bccc_24228410", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
35
] | [
null
] | [
27
] | [
29
] | |
2024-11-18T19:29:49.925888+00:00 | 1,601,413,290,000 | 7fd45319c5e1e8ab5447066d69305960d63685eb | 3 | {
"blob_id": "7fd45319c5e1e8ab5447066d69305960d63685eb",
"branch_name": "refs/heads/master",
"committer_date": 1601413290000,
"content_id": "21f9e55d5925610da99a4e3b42b4a26fca771518",
"detected_licenses": [
"MIT"
],
"directory_id": "848f341a2d80a96b40c68ed686c1a394cf176269",
"extension": "py",
"fi... | 3.40625 | stackv2 | """
Shallow Idris Parse to determine declarations from commands or expressions
"""
import enum
import re
class CodeType(enum.IntEnum):
Declaration = 0
Expression = 1
REPL_Cmd = 2
Undeclare = 3
decl_regex = re.compile(r"^(\n|\s)*([a-zA-Z][a-zA-Z0-9_']*)\s((:)|(.*=))")
comment_line = re.compile(r"^(\s)*--")
... | 90 | 23.1 | 102 | 19 | 608 | python | [{"finding_id": "codeql_py/redos_c1c3e8ffe0d5a58f_10bec0cd", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\n'.", "remedia... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\n'."
] | [
14
] | [
null
] | [
28
] | [
36
] | |
2024-11-18T19:29:50.831562+00:00 | 1,540,913,907,000 | 475f6892f810cf2a976476c646595086ca7bbc13 | 3 | {
"blob_id": "475f6892f810cf2a976476c646595086ca7bbc13",
"branch_name": "refs/heads/master",
"committer_date": 1540913907000,
"content_id": "e70fe313d396a87d8e51b96b8dd4426fb22f4c5f",
"detected_licenses": [
"MIT"
],
"directory_id": "da9c4ff99e377daae73d2ee5caf6f8348b980fd4",
"extension": "py",
"fi... | 2.84375 | stackv2 | import requests
def call_musixmatch_api(service, params):
base_url = "https://api.musixmatch.com/ws/1.1/"
api_key = "&apikey=41da9710650383c323dc1f32dabd847d"
format_url = "?format=json&callback=callback"
api_call = base_url + service + format_url + params + api_key
print("API Call: ", api_call)... | 52 | 24.35 | 65 | 11 | 360 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9a7d1e5b875880ee_6cb65b2c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
11,
48
] | [
null,
null
] | [
25,
26
] | [
33,
32
] | |
2024-11-18T19:29:52.445358+00:00 | 1,511,370,748,000 | f137cf99fc0cad21993c73a181e5f9eb993754e2 | 2 | {
"blob_id": "f137cf99fc0cad21993c73a181e5f9eb993754e2",
"branch_name": "refs/heads/master",
"committer_date": 1511370748000,
"content_id": "8e29bb589620fee8904ea9a4d6a93102d074aa0e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6a102ca30064ec45c8774e1a36cbb18c77da3808",
"extension": "py"... | 2.390625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import requests, json
from requests.packages.urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
def show_bindings(auth):
url = "https://" + auth.aos8ip + ":4343/v1/configuration/showcommand?json=1&UIDA... | 54 | 38.98 | 140 | 18 | 510 | python | [{"finding_id": "codeql_py/request-without-cert-validation_811dba4015fd7224_5dc959f0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
15
] | [
null
] | [
13
] | [
63
] | |
2024-11-18T19:44:12.915173+00:00 | 1,692,996,691,000 | 07cfca3260ed0d1abd26b9fc0335bd5455caef8f | 2 | {
"blob_id": "07cfca3260ed0d1abd26b9fc0335bd5455caef8f",
"branch_name": "refs/heads/master",
"committer_date": 1692996691000,
"content_id": "4b619ec02c13dcfb169f8c14b405e8ceb91bb16f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "71bf3bcb78555eb46282602a77f0db3a4132eed5",
"extension": "py"... | 2.46875 | stackv2 | #!/usr/bin/env python3
import argparse
import os
import subprocess
from subprocess import CompletedProcess
import sys
import time
import json
from typing import Callable
from datetime import datetime, timedelta
import logging
from getpass import getpass
from ruamel.yaml import YAML
class CustomResource:
def __i... | 344 | 39.09 | 147 | 16 | 2,866 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_53baff65ba1b7594_db43d6fd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
274,
323
] | [
null,
null
] | [
20,
23
] | [
27,
39
] | |
2024-11-18T19:44:37.420025+00:00 | 1,649,959,319,000 | cc86d0961925cf96d508f9185a35e39394b5399f | 3 | {
"blob_id": "cc86d0961925cf96d508f9185a35e39394b5399f",
"branch_name": "refs/heads/master",
"committer_date": 1649959319000,
"content_id": "bd168cd03c366fb9c6abee33d04ddd3e5738dea7",
"detected_licenses": [
"MIT"
],
"directory_id": "f2670d90fa5d217b29dcc94b57c7491c1403f8ba",
"extension": "py",
"fi... | 2.625 | stackv2 | from .base_model import BaseModel
from .metadata_item import MetadataItem
from peewee import *
import dateutil.parser
import datetime
import re
import hashlib
class LogItem(BaseModel):
"""These are the log items in the sqlite database based on peewee ORM"""
event_time = DateTimeField(null=False, index=True)
... | 88 | 50.43 | 143 | 21 | 1,032 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_9fd049c1ffd22f8a_5cf7523e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
51,
66
] | [
null,
null
] | [
52,
48
] | [
80,
109
] | |
2024-11-18T19:58:04.946980+00:00 | 1,668,673,764,000 | 24188fac19be5158d8c5f6aa29ea8473e7313d6e | 3 | {
"blob_id": "24188fac19be5158d8c5f6aa29ea8473e7313d6e",
"branch_name": "refs/heads/main",
"committer_date": 1668673764000,
"content_id": "86af3cabf08a7e65b20e51600aee1ecf9b30fa7e",
"detected_licenses": [
"MIT"
],
"directory_id": "ec53370a1d40d0a378f295f8342802d59e2ace67",
"extension": "py",
"file... | 2.71875 | stackv2 | from datetime import datetime, timedelta
import hashlib
import os
import requests
import tarfile
from termcolor import colored
import config
def blue(msg, bold = False, attrs = []):
if bold:
attrs.append("bold")
return colored(msg, "blue", attrs = attrs)
def red(msg, bold = False, attrs = []):
... | 88 | 22.31 | 102 | 17 | 510 | python | [{"finding_id": "codeql_py/tarslip_d65e809a20513cef_6d5de4f0", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
53
] | [
null
] | [
9
] | [
16
] | |
2024-11-18T19:58:20.636825+00:00 | 1,599,072,605,000 | d1adae6b5e0e4b7615caaf9a1ce4b58ece22ae63 | 2 | {
"blob_id": "d1adae6b5e0e4b7615caaf9a1ce4b58ece22ae63",
"branch_name": "refs/heads/master",
"committer_date": 1599072605000,
"content_id": "71b729f1d2109d88fb4c4fe32568a5d79c07710d",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "7792076aef6f85eea0332c80663ec537d388c028",
"extension": "p... | 2.4375 | stackv2 | import inspect
import os
import jinja2
import requests
import wsgiadapter
from parse import parse
from webob import Request
from whitenoise import WhiteNoise
from kahless.middleware import Middleware
from kahless.response import Response
class Api:
def __init__(self, templates_dir="templates", static_dir="stati... | 111 | 33.38 | 79 | 19 | 714 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e16f58efc429f959_c0bba235", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
18
] | [
20
] | [
30
] | [
10
] | |
2024-11-18T20:10:14.041082+00:00 | 1,607,893,546,000 | def2f7f74aa3aaaece36b3a3e67191b11f485fbd | 3 | {
"blob_id": "def2f7f74aa3aaaece36b3a3e67191b11f485fbd",
"branch_name": "refs/heads/main",
"committer_date": 1607893546000,
"content_id": "32ecd5e3ec7d31baf388be9316b773fded71a10b",
"detected_licenses": [
"MIT"
],
"directory_id": "58de327b204c036b5859aeb5eaf6460272ab948e",
"extension": "py",
"file... | 3.234375 | stackv2 | """
saig0_lib.py
Client lib for users (game players).
A class that implements the requests library to play the game.
The important part is deciding which number to play next, so the user
will have to define that function, but there is a basic random selection
function included near the botto... | 209 | 29.53 | 110 | 16 | 1,456 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_29a6d080463489c3_1c70656a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text."
] | [
65
] | [
null
] | [
22
] | [
71
] | |
2024-11-18T20:23:11.313513+00:00 | 1,545,399,309,000 | 18c3908cc6015f96fcc16bc0b8a4a4afea9901ef | 2 | {
"blob_id": "18c3908cc6015f96fcc16bc0b8a4a4afea9901ef",
"branch_name": "refs/heads/master",
"committer_date": 1545399309000,
"content_id": "2115956364c67e4893acaf59fd70792be0c0fb35",
"detected_licenses": [
"MIT"
],
"directory_id": "fd987ebcbc5e2b7ab8a1a1ffa84d274b9dc2af4e",
"extension": "py",
"fi... | 2.375 | stackv2 | import datetime as dt
import json
import os
from pathlib import Path
import shutil
from flask import Flask, request, render_template, url_for
import numpy as np
from chessid import detection
from chessid import annotator
from chessid import classifier
STATIC_URL_PATH = Path('/tmp/chess-id')
STATIC_URL_PATH.joinpath(... | 111 | 32.87 | 119 | 15 | 874 | python | [{"finding_id": "codeql_py/path-injection_b9133e210ce8199e_b83e0a79", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
95,
100
] | [
null,
null
] | [
5,
21
] | [
68,
32
] | |
2024-11-18T20:23:18.513187+00:00 | 1,530,539,703,000 | 78de303691087be1f18407033358759e93e9aebc | 3 | {
"blob_id": "78de303691087be1f18407033358759e93e9aebc",
"branch_name": "refs/heads/master",
"committer_date": 1530539703000,
"content_id": "ccbec11fee85757ea3b7d57e983ed157587f3477",
"detected_licenses": [
"MIT"
],
"directory_id": "3fbf13f6f4c48cfbe91b1a5566484b7b220935e7",
"extension": "py",
"fi... | 3.296875 | stackv2 | from dataclass import Account
from dataclass import Passwords
def createaccount(firstname,lastname,email):
new_account = Account(firstname,lastname,email)
return new_account
def saveaccount(account):
account.saveaccount()
def createcredential(credentialname,password,email):
new_account2 = Passwo... | 132 | 36.62 | 132 | 16 | 781 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dfc84236754f472f_c2927c2b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (passw... | [
105,
93
] | [
null,
null
] | [
43,
35
] | [
125,
88
] | |
2024-11-18T20:23:29.256499+00:00 | 1,608,115,350,000 | c19aa4960c9a6b4701815a475957dbb5ce29bb52 | 3 | {
"blob_id": "c19aa4960c9a6b4701815a475957dbb5ce29bb52",
"branch_name": "refs/heads/master",
"committer_date": 1608115350000,
"content_id": "54fc22fc637e2ced7739435c88e0fa645f39b5a7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "69d1767d7b2f7be7bc46f46fb72f81e1f293642c",
"extension": "py"... | 2.625 | stackv2 | # coding:utf-8
# 【谷雨课堂】干货实战 No.036 网站开发之-上传图片并生成图片缩略图
# 作者:谷雨
from flask import Flask,url_for,redirect,render_template,request,Response
import time
import os
import io
import mimetypes
import xhtml2pdf.pisa as pisa
from werkzeug.datastructures import Headers
from urllib.parse import quote
import xlrd,xlwt
from PIL im... | 103 | 22.58 | 96 | 15 | 728 | python | [{"finding_id": "codeql_py/reflective-xss_40aec2d4aa8eed1d_ba909b73", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-022"
] | [
"py/reflective-xss",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
91,
60
] | [
null,
null
] | [
12,
12
] | [
13,
47
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.