added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T01:18:06.703177+00:00 | 1,494,856,473,000 | 381e81fb37f025c3f4d642eb1f92e8e91bfe39ce | 2 | {
"blob_id": "381e81fb37f025c3f4d642eb1f92e8e91bfe39ce",
"branch_name": "refs/heads/master",
"committer_date": 1494856473000,
"content_id": "367eb3ee84044bab0d8793f084f3ed6a7faf4334",
"detected_licenses": [
"MIT"
],
"directory_id": "07d5af38ecbafd8226866d109b58a6a4f7d03f4d",
"extension": "py",
"fi... | 2.4375 | stackv2 | import logging
import json
import six
from jinja2 import Template, TemplateError
from bs4 import BeautifulSoup
from lxml import etree
from .utils import bake_parametrized
from .html import deep_recursion, extract_text
logger = logging.getLogger(__name__)
def jinja_transform(code, content, conf):
html = LazyHT... | 109 | 22.47 | 64 | 16 | 555 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f2273305d656b4ee_6833b96a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
27
] | [
null
] | [
16
] | [
30
] | |
2024-11-19T01:18:11.024085+00:00 | 1,630,000,174,000 | 3dce4990fcd1633aef9578648ee43d8feb0d12da | 2 | {
"blob_id": "3dce4990fcd1633aef9578648ee43d8feb0d12da",
"branch_name": "refs/heads/main",
"committer_date": 1630000174000,
"content_id": "2a695ea5e70207fdd612b2d2ed2588db27258ac7",
"detected_licenses": [
"MIT"
],
"directory_id": "7d236509de58d05d15a3b821e8acd1c438d7deb9",
"extension": "py",
"file... | 2.40625 | stackv2 | import re
import ssl
import sys
from pysphere import VIServer
def vcenter_conn(host, username, password):
# if your vcenter (or vsphere) have a valid ssl cert, or doesn't have cert, comment next two lines.
default_context = ssl._create_default_https_context
ssl._create_default_https_context = ssl._create... | 42 | 27.12 | 103 | 12 | 301 | python | [{"finding_id": "codeql_py/overly-large-range_5daf0afeba04edb8_207c84aa", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
22
] | [
null
] | [
34
] | [
37
] | |
2024-11-19T00:02:46.088424+00:00 | 1,691,037,619,000 | 2e5506a7dd13f9597598289f3118c04f2bea9e49 | 3 | {
"blob_id": "2e5506a7dd13f9597598289f3118c04f2bea9e49",
"branch_name": "refs/heads/master",
"committer_date": 1691037619000,
"content_id": "c1a38d940df3346be2285656a8f253996f5f54c1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7dfc958846a98c9dc90829ace237adb0f4e79057",
"extension": "py"... | 2.921875 | stackv2 | """
TaskGroup allows group tasks together. It enables syntactic sugar when adding
dependencies explicitly (e.g., (t1 + t2) >> t3). It also allows creating
multiple tasks at once using a parameters array.
There are two potential cases that we haven't implemented:
1. Automatically generate an array of tasks to apply... | 358 | 33.48 | 88 | 21 | 2,473 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_60bd6cf8a82fc7bd_a8c14385", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 4 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially... | [
184,
201,
332,
350
] | [
188,
null,
336,
354
] | [
33,
44,
22,
24
] | [
22,
71,
10,
6
] | |
2024-11-19T00:25:36.224149+00:00 | 1,603,521,295,000 | 3300cb805300afc75e40b94183a9e2cfb8014ee6 | 2 | {
"blob_id": "3300cb805300afc75e40b94183a9e2cfb8014ee6",
"branch_name": "refs/heads/main",
"committer_date": 1603521295000,
"content_id": "27a8d4c16a39f10828a54321df45d029cfb386a7",
"detected_licenses": [
"MIT"
],
"directory_id": "e12cb56bc2ff5ff6dd973235d125cdaf187db319",
"extension": "py",
"file... | 2.4375 | stackv2 | import socket
from cryptography.fernet import Fernet
import base64
from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC
from cryptography.fernet import InvalidToken
from cryptography.hazmat.primitives.asymmetric import padding
from cryptography.hazmat.primitives import hashes
from math import ceil
from cryp... | 177 | 34.93 | 115 | 19 | 1,375 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b3bf13e3ab52031e_02286f14", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
87
] | [
null
] | [
20
] | [
24
] | |
2024-11-19T01:02:46.876882+00:00 | 1,406,739,033,000 | 92b8f5d0bb98ec310e175f28df1279ace524990c | 2 | {
"blob_id": "92b8f5d0bb98ec310e175f28df1279ace524990c",
"branch_name": "refs/heads/master",
"committer_date": 1406739033000,
"content_id": "bd3a7caa00acf29b653f7a2bcdcbdfa680723969",
"detected_licenses": [
"MIT"
],
"directory_id": "96e49318e685019cbea95b9a7a9428a557e0a145",
"extension": "py",
"fi... | 2.3125 | stackv2 | from re import match
from random import random, choice
from flask import jsonify, request, url_for
from flask.ext.mail import Message
from sqlalchemy.orm.exc import NoResultFound
from streamScript.webAPI import app, mail, db
from streamScript.webAPI.auth.models import APIKey
from streamScript.webAPI.places import place... | 68 | 30.16 | 74 | 15 | 492 | python | [{"finding_id": "codeql_py/polynomial-redos_b17309f8f204a22b_3772fd23", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin... | 1 | true | [
"CWE-1333"
] | [
"py/polynomial-redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '!@' and with many repetitions of '!@'."
] | [
41
] | [
null
] | [
40
] | [
45
] | |
2024-11-19T00:50:15.873411+00:00 | 1,569,506,665,000 | 3986dd2daa831225df0d8c22214396993adb969f | 3 | {
"blob_id": "3986dd2daa831225df0d8c22214396993adb969f",
"branch_name": "refs/heads/master",
"committer_date": 1569506665000,
"content_id": "70a7fc9950eb5b0eff169723dd80adfe0ed35221",
"detected_licenses": [
"MIT"
],
"directory_id": "4ada7aa922154f5aefd2c5ae83ea5e4e3a392c6d",
"extension": "py",
"fi... | 2.59375 | stackv2 | from django.shortcuts import render
# Create your views here.
# CRUDL - 이미지를 띄우는 방법
# 제네릭 뷰
# 쿼리셋 변경하기, context_data 추가하기, 권한 채크
# 함수형 뷰 <-> 클래스형 뷰
from django.views.generic.list import ListView
from django.views.generic.detail import DetailView
from django.views.generic.edit import CreateView, UpdateView,DeleteView
... | 223 | 29.57 | 89 | 18 | 1,786 | python | [{"finding_id": "codeql_py/url-redirection_b943cf0b0e6056a9_88e23193", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
161,
194
] | [
null,
null
] | [
41,
41
] | [
45,
45
] | |
2024-11-19T01:30:55.046531+00:00 | 1,628,780,732,000 | 26c1bfa825a98c7d79fe7fc8f193a8d4e29250f6 | 2 | {
"blob_id": "26c1bfa825a98c7d79fe7fc8f193a8d4e29250f6",
"branch_name": "refs/heads/main",
"committer_date": 1628780732000,
"content_id": "b67cf7a8f7538ddfa9b5eea4834109ccfa4a1ca4",
"detected_licenses": [
"MIT"
],
"directory_id": "fb81385bd300ba11e72f58ffffcebbb9d2a8e82c",
"extension": "py",
"file... | 2.453125 | stackv2 |
import os, io, math, random, secrets, cloudinary.uploader, cloudinary.api, cloudinary, datetime
from flask.templating import render_template_string
from flask import Blueprint, render_template, request, redirect, flash, jsonify, make_response
from flask_login import login_required, login_user, logout_user, current_use... | 229 | 30.04 | 108 | 17 | 1,664 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a227623f2560f431_3753d07d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
38
] | [
null
] | [
11
] | [
30
] | |
2024-11-19T02:00:56.475859+00:00 | 1,567,719,877,000 | 49e3736c467592a6ce76ea8d34b6111173277fd6 | 3 | {
"blob_id": "49e3736c467592a6ce76ea8d34b6111173277fd6",
"branch_name": "refs/heads/master",
"committer_date": 1567719877000,
"content_id": "4a73603d48d9b4c6fba32ed439d7f768c0247df9",
"detected_licenses": [
"MIT"
],
"directory_id": "f27f72c14f926ae3808d70fe06c12d5517bb2a45",
"extension": "py",
"fi... | 3.21875 | stackv2 | import paramiko
import re
from collections import namedtuple
APC_SHELL_PROMPT = 'apc>'
SUCCESS = 'Success'
Connection = namedtuple('Connection', 'host user psw')
Response = namedtuple('Response', 'output result')
class SSH(object):
""" SSH Connection Object
Defines a ssh client to be used by other appli... | 131 | 31 | 104 | 16 | 938 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_5d6bb0a35004e07e_221ef35c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
24
] | [
null
] | [
9
] | [
79
] | |
2024-11-19T02:00:57.721620+00:00 | 1,492,190,004,000 | c2f94315c5ba59eeadc6ec81f2252169862510cd | 3 | {
"blob_id": "c2f94315c5ba59eeadc6ec81f2252169862510cd",
"branch_name": "refs/heads/master",
"committer_date": 1492190004000,
"content_id": "2a2691d4a47db9381087d950f2a948bae2282c8b",
"detected_licenses": [
"MIT"
],
"directory_id": "15d03333c943f56a9ff7bbd5762257a797519968",
"extension": "py",
"fi... | 2.53125 | stackv2 | import mechanize
import signal
def facebook_brute():
br=mechanize.Browser()
print("[*]Browser Initialized[*]")
br.set_handle_equiv(True)
br.set_handle_redirect(True)
br.set_handle_referer(True)
br.set_handle_robots(False)
br.open('https://www.facebook.com/')
email_username=raw_inp... | 44 | 24.8 | 103 | 18 | 294 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6de603dd286aca9e_b1e22e5d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
28,
37
] | [
null,
null
] | [
11,
39
] | [
76,
103
] | |
2024-11-19T00:04:33.972956+00:00 | 1,445,266,235,000 | 03669dd5c61d127605005cc8eac1f382694bf4ba | 2 | {
"blob_id": "03669dd5c61d127605005cc8eac1f382694bf4ba",
"branch_name": "refs/heads/master",
"committer_date": 1445266235000,
"content_id": "1fd27a6636d29611a427ff513d33d7962c33e1fc",
"detected_licenses": [
"MIT"
],
"directory_id": "7bae2e5a99fb4c4513bf9e4061cfc88c988f8189",
"extension": "py",
"fi... | 2.5 | stackv2 | # -*- coding: utf-8 -*-
from jinja2 import Template
import os
from apiary.helpers.javascript_helper import escape_javascript
class Preview(object):
PREVIEW_TEMPLATE_PATH = os.path.dirname(os.path.abspath(__file__)) + '/../file_templates/preview.py'
def __init__(self, **kwargs):
self.options = kwargs... | 54 | 25.91 | 112 | 16 | 307 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9fc69d18cb8488bb_bc7ddcbd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
47
] | [
null
] | [
25
] | [
50
] | |
2024-11-19T00:40:24.523038+00:00 | 1,522,853,047,000 | 3f951c14b9d853dd8818a33f57e0227a6af6e21e | 3 | {
"blob_id": "3f951c14b9d853dd8818a33f57e0227a6af6e21e",
"branch_name": "refs/heads/master",
"committer_date": 1522853047000,
"content_id": "92b94aa1e239e971fbed4e9641dec52708937404",
"detected_licenses": [
"MIT"
],
"directory_id": "00223e04d6e65dfac680ea501b5a2a4bdeefbaac",
"extension": "py",
"fi... | 3.265625 | stackv2 | from time import sleep
import paramiko
class SSHException(Exception):
def __init__(self, message):
Exception.__init__(self, message)
class SSHConnectionException(SSHException):
pass
class SSHCommandException(SSHException):
pass
class SSHSession(object):
"""
Generic SSHSession which c... | 74 | 32.18 | 118 | 14 | 494 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2ead47383f4bbb45_d2706bc5", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
30
] | [
null
] | [
9
] | [
71
] | |
2024-11-19T01:17:13.628671+00:00 | 1,553,138,577,000 | ea54a6a9d8802f23c69eec44e0855a6552f451d0 | 3 | {
"blob_id": "ea54a6a9d8802f23c69eec44e0855a6552f451d0",
"branch_name": "refs/heads/master",
"committer_date": 1553138577000,
"content_id": "599c87860ca7e42454a90dcecf4981bfa535e74f",
"detected_licenses": [
"MIT"
],
"directory_id": "dc01f08dd5edc4f4bd9f8df2c936f53bf127d61e",
"extension": "py",
"fi... | 3.3125 | stackv2 | #!/usr/bin/env python
from threading import Thread
import subprocess
from queue import Queue
import re
num_ping_threads = 3
num_arp_threads = 3
in_queue = Queue()
out_queue = Queue()
ips = ["10.0.1.1", "10.0.1.3", "10.0.1.11", "10.0.1.51"]
def pinger(i, iq, oq):
"""Pings subnet"""
while True:
ip = iq.... | 79 | 25.25 | 71 | 14 | 570 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_141d7a6df511773f_19eafcc7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
47
] | [
null
] | [
15
] | [
66
] | |
2024-11-19T01:17:15.938126+00:00 | 1,688,155,818,000 | e2f6c50ccc8ca85a6f985f6883987121327c3d88 | 2 | {
"blob_id": "e2f6c50ccc8ca85a6f985f6883987121327c3d88",
"branch_name": "refs/heads/main",
"committer_date": 1688155818000,
"content_id": "e0c72599a18bc0a389c2c83fa5f11e6d306c1922",
"detected_licenses": [],
"directory_id": "92de9e2a7ececfe2a92fd22b79b51e8efbcc7fe8",
"extension": "py",
"filename": "__mai... | 2.4375 | stackv2 | #!/usr/bin/env python3
import argparse
import random
import sys
import io
import html
import traceback
from typing import Optional
from textwrap import indent
import requests
import tweepy
PETFINDER_TOKEN_URL = "https://api.petfinder.com/v2/oauth2/token"
PETFINDER_API_URL = "https://api.petfinder.com/v2/animals"
MAX_... | 325 | 29 | 138 | 16 | 2,236 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ebc13d205d6469cb_e947e7a3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (secret)](... | [
321
] | [
null
] | [
15
] | [
26
] | |
2024-11-19T01:17:21.204887+00:00 | 1,561,934,285,000 | 762db44b9f684aed80e669e60263c3d982503cf0 | 3 | {
"blob_id": "762db44b9f684aed80e669e60263c3d982503cf0",
"branch_name": "refs/heads/master",
"committer_date": 1561934285000,
"content_id": "9b6d923c7f3bbd1507210d002c4c6dee7c45652d",
"detected_licenses": [
"MIT"
],
"directory_id": "6794ea58852c37e36d22b72070a5513fba9a0c48",
"extension": "py",
"fi... | 2.578125 | stackv2 | # Import expected headers we'll need
from flask import Flask, render_template, request, json
from flask_bootstrap import Bootstrap
from flask import send_file
import random
from glob import glob
import yaml
from backend.search_engine import *
from backend.language_processor import *
from resources import *
app = Fla... | 116 | 35.61 | 110 | 20 | 906 | python | [{"finding_id": "codeql_py/path-injection_4050ddf5d849f8d4_a9f17e6f", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 3 | true | [
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
63,
64,
85
] | [
null,
null,
null
] | [
19,
30,
19
] | [
28,
39,
28
] | |
2024-11-19T01:17:31.775733+00:00 | 1,691,067,819,000 | a87af924e92b25310b58ca2da9996c7b098cc437 | 3 | {
"blob_id": "a87af924e92b25310b58ca2da9996c7b098cc437",
"branch_name": "refs/heads/master",
"committer_date": 1691067819000,
"content_id": "0d7aaafa6475ca81188507eaacf3412c79bb9246",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "93fb177fc34a980cce0b83463507eeca2a39eebb",
"extension": "py",
... | 2.640625 | stackv2 | # Freely available under a CC0 license. Steve Baskauf 2019-05-25
# See https://www.wikidata.org/w/api.php for MediaWiki API help
# For general information about MediaWiki tokens, see https://www.mediawiki.org/wiki/API:Tokens
# Tor testing new API functions, use the Wikidata test instance sandbox:
# https://test.wikidat... | 136 | 38.69 | 132 | 12 | 1,379 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b3ce18c083577ce6_df62a84f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensi... | [
111,
118,
122,
126,
133
] | [
null,
null,
null,
null,
null
] | [
24,
23,
26,
23,
31
] | [
35,
33,
30,
32,
35
] | |
2024-11-19T01:17:43.793117+00:00 | 1,632,069,324,000 | 001bd532de81c4d3ba04ef20ae26ffd06d073166 | 2 | {
"blob_id": "001bd532de81c4d3ba04ef20ae26ffd06d073166",
"branch_name": "refs/heads/main",
"committer_date": 1632069324000,
"content_id": "508048ad6dccaebc3c9f4e4343cc2cb0fff4e54d",
"detected_licenses": [
"MIT"
],
"directory_id": "b6cdde2b805cd7dbda774c2d83225175c2d33560",
"extension": "py",
"file... | 2.46875 | stackv2 | from flask import *
import os
import json
app = Flask(__name__)
@app.route("/")
def home():
return render_template("home.html", stores=os.listdir("static/stores"))
@app.route("/api/get_stores")
def get_stores():
return os.listdir("static/stores")
@app.route("/api/get_store_images/<store>")
def get_store_... | 32 | 24.03 | 117 | 12 | 189 | python | [{"finding_id": "codeql_py/flask-debug_3fee65fe97f75647_e8bd8d64", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-022"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
32,
20,
26
] | [
null,
null,
null
] | [
5,
12,
15
] | [
40,
55,
19
] | |
2024-11-19T01:15:10.233335+00:00 | 1,606,237,286,000 | 2d95772f0f90d43a9c5a3c312a7fc160ea34b4b3 | 3 | {
"blob_id": "2d95772f0f90d43a9c5a3c312a7fc160ea34b4b3",
"branch_name": "refs/heads/main",
"committer_date": 1606237286000,
"content_id": "dd83314704d80a3deb11b9cc58ed3168df442946",
"detected_licenses": [
"MIT"
],
"directory_id": "bcaa8a838be45d30ea95c3c43004fcbbcc614073",
"extension": "py",
"file... | 2.8125 | stackv2 | # settings.py
from dotenv import load_dotenv
import os
import socket
def get_env():
""""
Gets environment variables form .env file
"""
try:
load_dotenv(verbose=True)
KEY = os.getenv("ADAFRUIT_IO_KEY")
USERNAME = os.getenv("ADAFRUIT_IO_USERNAME")
LATITUDE = os.getenv("L... | 49 | 26.73 | 79 | 12 | 349 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6741486b13d47f6a_458180e7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (p... | [
41,
42,
43,
44,
45
] | [
null,
null,
null,
null,
null
] | [
11,
11,
11,
11,
11
] | [
34,
44,
44,
46,
46
] | |
2024-11-19T01:15:21.381679+00:00 | 1,568,461,728,000 | f097fd27729cc9c77afbf9114659bb88546e50af | 2 | {
"blob_id": "f097fd27729cc9c77afbf9114659bb88546e50af",
"branch_name": "refs/heads/master",
"committer_date": 1568461728000,
"content_id": "1cd3c0ecb98f024c32fd509f11c682b38a3fd900",
"detected_licenses": [
"MIT"
],
"directory_id": "611b8ce35ed4b5eee93ad38ae1029ea3e32868f4",
"extension": "py",
"fi... | 2.390625 | stackv2 | import re
from django import http
from django.contrib.auth import login
from django.db import DatabaseError
from django.shortcuts import render, redirect
from django.urls import reverse
from django.views import View
from QQLoginTool.QQtool import OAuthQQ
from django_redis import get_redis_connection
from apps.oauth.m... | 153 | 32.12 | 94 | 17 | 1,286 | python | [{"finding_id": "codeql_py/url-redirection_2743e044212fcc91_53dee90c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
77,
146
] | [
null,
null
] | [
33,
29
] | [
37,
33
] | |
2024-11-19T01:15:22.355304+00:00 | 1,511,189,754,000 | 01471cd640e53a9710dc5ab6c361a5e5e0c4d4d1 | 3 | {
"blob_id": "01471cd640e53a9710dc5ab6c361a5e5e0c4d4d1",
"branch_name": "refs/heads/master",
"committer_date": 1511189754000,
"content_id": "230d08ccdfe9eca85f7ecc52c643885a2aa28fa6",
"detected_licenses": [
"MIT"
],
"directory_id": "9f7e2fe9d110e9d4b94fba76c792aaedf1b21237",
"extension": "py",
"fi... | 2.90625 | stackv2 | """
Copyright (c) 2017 IS-Instruments Ltd
Author: Josh Veitch-Michaelis
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, m... | 385 | 27.91 | 97 | 16 | 2,507 | python | [{"finding_id": "codeql_py/insecure-default-protocol_ba5aedcfcd295bea_db8434b2", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 2 | true | [
"CWE-327",
"CWE-200"
] | [
"py/insecure-default-protocol",
"py/bind-socket-all-network-interfaces"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.",
"'' binds a socket to all interfaces."
] | [
110,
49
] | [
null,
null
] | [
29,
5
] | [
50,
36
] | |
2024-11-19T00:43:38.122572+00:00 | 1,624,950,844,000 | f78f8ab9b5ad936eae9c3246ee3f774fa9c03b2b | 2 | {
"blob_id": "f78f8ab9b5ad936eae9c3246ee3f774fa9c03b2b",
"branch_name": "refs/heads/main",
"committer_date": 1624950844000,
"content_id": "02f1fb3616fa211fdc641a535797962c2ed6ca30",
"detected_licenses": [
"MIT"
],
"directory_id": "5e8633c64d53c233dec190182980e0ae0c82c50c",
"extension": "py",
"file... | 2.453125 | stackv2 | from django.shortcuts import render
from rest_framework.views import APIView
from rest_framework.response import Response
from rest_framework import authentication, permissions
from .serializers import ContestsSerializer
from bs4 import BeautifulSoup
from .decorators import user_exists
from .utilities import check_user... | 264 | 27.71 | 97 | 17 | 1,664 | python | [{"finding_id": "codeql_py/partial-ssrf_e3848eab418e2bde_035e6c0d", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 3 | true | [
"CWE-918",
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
65,
126,
171
] | [
null,
null,
null
] | [
24,
24,
24
] | [
41,
41,
41
] | |
2024-11-19T00:43:52.831592+00:00 | 1,382,780,953,000 | b534c1c60059a45dc05b386f956388ecf8c6a837 | 2 | {
"blob_id": "b534c1c60059a45dc05b386f956388ecf8c6a837",
"branch_name": "refs/heads/master",
"committer_date": 1382780953000,
"content_id": "abd67c5142169d3e119f3f914fa47969682bf040",
"detected_licenses": [
"BSD-2-Clause",
"BSD-3-Clause"
],
"directory_id": "85045953314a1cf340a6e954bd0763864f6ec78b... | 2.46875 | stackv2 | #!/usr/bin/python
import csv
import os.path
from collections import namedtuple
import sn
import os
import sys,string
import numpy as np
import math
import vcf
valid_alleles = ['AA', 'AT', 'AG', 'AC',
'CA', 'CT', 'CG', 'CC',
'TA', 'TT', 'TG', 'TC',
'GA', 'GT', 'GG',... | 166 | 20.75 | 143 | 17 | 1,065 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_3190e77a8f835fed_98f4ecb8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive d... | [
101,
158
] | [
null,
null
] | [
18,
18
] | [
58,
58
] | |
2024-11-19T01:31:58.935347+00:00 | 1,392,498,067,000 | 803ba670a1ccb3791147255fed03543fa58b0169 | 3 | {
"blob_id": "803ba670a1ccb3791147255fed03543fa58b0169",
"branch_name": "refs/heads/master",
"committer_date": 1392498067000,
"content_id": "e870836863c694eec948e52c683dc610dca137b5",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "c75e11159e92c1d88d8db3e51ef55b85d909ce3a",
"extension": "p... | 2.859375 | stackv2 | # encoding: utf-8
import os
import sys
from random import choice
from string import lowercase
import waliki
TERM_ENCODING = getattr(sys.stdin, 'encoding', None)
PROMPT_PREFIX = '> '
def create_dirs():
dirs = [waliki.CONTENT_DIR, waliki.CACHE_DIR]
for d in dirs:
if not os.path.exists(d):
... | 169 | 30.54 | 80 | 21 | 1,234 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d11910f51b21afe1_b2d625a1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
140
] | [
null
] | [
17
] | [
24
] | |
2024-11-19T01:44:04.413763+00:00 | 1,589,105,613,000 | ba74d5c43dd2f5a1079dd20d47d4471992e0f00d | 3 | {
"blob_id": "ba74d5c43dd2f5a1079dd20d47d4471992e0f00d",
"branch_name": "refs/heads/master",
"committer_date": 1589105613000,
"content_id": "603684b397a90d49c3f330b3d7ce03270d4834c3",
"detected_licenses": [
"MIT"
],
"directory_id": "7b872aeb25003499bdc14947f85729084f92667b",
"extension": "py",
"fi... | 2.78125 | stackv2 | """
Author: Noah Thurston
Date: 5/10/2020
Code written for the ECE523 final project.
https://github.com/noahthurston/VAE-Password-Prediction
Code reference: https://blog.keras.io/building-autoencoders-in-keras.html
This was originally ran as a google colab notebook, so it will take some re-working
to run natively ... | 406 | 26.18 | 147 | 13 | 2,821 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fc692828136ab9d9_94e4b9f1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive... | [
296,
316,
338,
378,
402
] | [
null,
null,
null,
null,
null
] | [
9,
9,
9,
7,
9
] | [
97,
97,
97,
31,
51
] | |
2024-11-19T02:20:05.950544+00:00 | 1,540,291,980,000 | 3d98a3bcfb244a61b82dc3374ecd98ae7e7e6f7d | 3 | {
"blob_id": "3d98a3bcfb244a61b82dc3374ecd98ae7e7e6f7d",
"branch_name": "refs/heads/master",
"committer_date": 1540291980000,
"content_id": "4b5aec08da69fd0af518459d10d7d4d9149e594a",
"detected_licenses": [
"MIT"
],
"directory_id": "622079460ebb4ba9b80f55624622e45fcbf064d1",
"extension": "py",
"fi... | 2.828125 | stackv2 | #parser : 주어진 문서에서 원하는 내용만 추출
#parser 종류 :dome, 제이슨(가벼워서 웹에서 사용),
#beautifulsope : 파워풀해서 많이 사용
import re
emails = ['python@mail.example.com', 'python+kr@example.com', # 올바른 형식
'python-dojang@example.co.kr', 'python_10@example.info', # 올바른 형식
'python.dojang@e-xample.com', ... | 24 | 22.71 | 106 | 8 | 209 | python | [{"finding_id": "codeql_py/overly-large-range_54363d619348cf8b_eb344bcc", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
14
] | [
null
] | [
26
] | [
29
] | |
2024-11-19T00:59:30.814565+00:00 | 1,573,035,980,000 | 53795657e2b235b1dd0702b7605d5af2c9cce43d | 3 | {
"blob_id": "53795657e2b235b1dd0702b7605d5af2c9cce43d",
"branch_name": "refs/heads/master",
"committer_date": 1573035980000,
"content_id": "6dc9b4cf75252175bc1acbce10866af1d3a91d8d",
"detected_licenses": [
"MIT"
],
"directory_id": "cac90e5c948fb9c022e3cb561be2517bfb481dc4",
"extension": "py",
"fi... | 2.53125 | stackv2 |
from flask import Flask
from flask import request
from glutemulo.kafka.producer import JsonKafka
app = Flask(__name__)
log = app.logger
VENUES = ['v1', 'v2']
def process_data(source, data):
log.info(source, data)
productor = JsonKafka(bootstrap_servers="localhost:9092")
productor.produce(source, dat... | 32 | 21.41 | 64 | 12 | 189 | python | [{"finding_id": "codeql_py/stack-trace-exposure_10600c4136853db6_e119e46d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/stack-trace-exposure",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
32,
16,
16,
26
] | [
null,
null,
null,
null
] | [
16,
14,
22,
18
] | [
29,
20,
26,
64
] | |
2024-11-19T00:59:34.656803+00:00 | 1,554,801,052,000 | 36c65f227f79f4b0ea8aea8971d1f85532d02aa8 | 3 | {
"blob_id": "36c65f227f79f4b0ea8aea8971d1f85532d02aa8",
"branch_name": "refs/heads/master",
"committer_date": 1554801052000,
"content_id": "69f3d59c455c2a13b796f430bbfeaacbe13a539b",
"detected_licenses": [
"MIT"
],
"directory_id": "df6cbc15edd7086926a21d42deb95956b6045f45",
"extension": "py",
"fi... | 2.796875 | stackv2 | # -*- coding: utf-8 -*-
# pylint: disable=line-too-long
"""
Created on Tue Mar 5 11:38:08 2019
Python script file with the functions to scrap Indeed
Can be used alone with the code in the 'Main' cell
Otherwise, get_data should be called from the main script file
@authors: Radia, David, Martial, Maxence, Philippe B
... | 470 | 30.92 | 179 | 25 | 3,600 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9245cf9cd6e4f04c_3d017d78", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text."
] | [
366
] | [
null
] | [
111
] | [
119
] | |
2024-11-19T01:00:01.236620+00:00 | 1,692,130,575,000 | ec00fc669201e2f9090a7d3e72b54c0ceb7ad46c | 3 | {
"blob_id": "ec00fc669201e2f9090a7d3e72b54c0ceb7ad46c",
"branch_name": "refs/heads/master",
"committer_date": 1692130575000,
"content_id": "e87eee55938dd6b942ab48e3cb276f362e5238c5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0225a1fb4e8bfd022a992a751c9ae60722f9ca0d",
"extension": "py"... | 2.734375 | stackv2 | #!/usr/bin/env python3
"""Parses GTFS feeds urls:
https://transit.land/ - Transitland
https://storage.googleapis.com/storage/v1/b/mdb-csv/o/sources.csv?alt=media
- Mobility Database (https://mobilitydata.org/)
Crawls all the urls, loads feed zips and extracts to the specified dire... | 288 | 30.79 | 150 | 16 | 2,108 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a83ac3c745012ca8_f3d92cc3", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive... | [
151,
97,
102,
163
] | [
null,
null,
null,
null
] | [
19,
26,
17,
21
] | [
35,
77,
103,
42
] | |
2024-11-19T01:00:03.168772+00:00 | 1,576,308,711,000 | d2e9024014855f57bf8dc2dcdfae0c9fd3489fa4 | 4 | {
"blob_id": "d2e9024014855f57bf8dc2dcdfae0c9fd3489fa4",
"branch_name": "refs/heads/master",
"committer_date": 1576308711000,
"content_id": "7363de4719f4d77dfc8c6db240bbf2a9369a55b9",
"detected_licenses": [
"MIT"
],
"directory_id": "e794dbb410f894b071327f5706bc3c3506f7a04b",
"extension": "py",
"fi... | 3.5625 | stackv2 | '''
PREDICTION ALGORITHM
The algorithm follows the 'stupid back-off method', and make 5 suggestions as the next word.
Suppose that we first start with quadgrams.
1. The function gets a string and tokenizes and preprocesses it.
2. It extracts the last 3 words of the string.
3. The function uses the quad-gram probabilit... | 237 | 29.45 | 117 | 15 | 1,897 | python | [{"finding_id": "codeql_py/overly-large-range_3cdc56491c8760b0_4376699e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
63,
66,
66
] | [
null,
null,
null
] | [
62,
34,
53
] | [
65,
37,
56
] | |
2024-11-19T01:00:06.922073+00:00 | 1,573,271,670,000 | 8d3c4f4e7402819571522e48e2a31d6d27a080e4 | 2 | {
"blob_id": "8d3c4f4e7402819571522e48e2a31d6d27a080e4",
"branch_name": "refs/heads/master",
"committer_date": 1573271670000,
"content_id": "5a98ba476323e8c5d136afee8eb6423092b100bc",
"detected_licenses": [
"MIT"
],
"directory_id": "e64b762c4afd9c30944c91bc3ecd3c125adfa7e1",
"extension": "py",
"fi... | 2.484375 | stackv2 | """
检测raw_proxyhttp
"""
import asyncio
import logging
import sys
import time
from queue import Queue
from threading import Thread
import aiohttp
from apscheduler.schedulers.background import BackgroundScheduler
sys.path.append('../')
sys.path.append('./')
from Manager.ProxyManager import ProxyManager
from Util.LogHan... | 117 | 29.79 | 110 | 21 | 790 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b620f6e943abd81e_d1a4b218", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
53
] | [
56
] | [
32
] | [
45
] | |
2024-11-19T01:11:44.574808+00:00 | 1,552,608,690,000 | 37510a3137030da28e2e7d779ff0927cd441426f | 3 | {
"blob_id": "37510a3137030da28e2e7d779ff0927cd441426f",
"branch_name": "refs/heads/master",
"committer_date": 1552608690000,
"content_id": "85f113831ecdcee7be67272b37b2d60b2d62b657",
"detected_licenses": [
"MIT"
],
"directory_id": "0f45c137d3304e94ccd3027ebdb2eb5a5b50de89",
"extension": "py",
"fi... | 2.75 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import requests, re, os, urllib2, argparse
parser = argparse.ArgumentParser(description='Scraper script for Managers Tools. (https://www.manager-tools.com/)')
group = parser.add_mutually_exclusive_group()
parser.add_argument("-v", "--verbose", help="increase output verbos... | 123 | 33.65 | 115 | 16 | 1,006 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_65ef4f50d510e914_939c524b", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'manager-tools.com/system/files/podc... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'manager-tools.com/system/files/podcast/mp3', so it might match more hosts than expected."
] | [
111
] | [
null
] | [
33
] | [
97
] | |
2024-11-19T01:11:52.702866+00:00 | 1,477,851,040,000 | 55b37a223ba3ecb3215edc455275ed85d07f79fd | 2 | {
"blob_id": "55b37a223ba3ecb3215edc455275ed85d07f79fd",
"branch_name": "refs/heads/master",
"committer_date": 1477851083000,
"content_id": "d893e287b3dd742b39cfd6d68825fe3cbb5cf3b6",
"detected_licenses": [
"MIT"
],
"directory_id": "678e1a59d4d489bccb3e1a2ca0bbfcccbbba0db2",
"extension": "py",
"fi... | 2.34375 | stackv2 | # all the imports
from flask import Flask, \
abort, \
flash, \
g, \
redirect, \
render_template, \
request, \
send_from_directory, \
session, \
url_for
from f... | 155 | 29.48 | 84 | 17 | 1,029 | python | [{"finding_id": "codeql_py/url-redirection_e681d0f079a7d4e8_1bd2f590", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 4 | true | [
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
115,
118,
121,
125
] | [
null,
null,
null,
null
] | [
29,
29,
29,
29
] | [
40,
40,
40,
40
] | |
2024-11-19T02:10:27.256751+00:00 | 1,477,610,683,000 | 93416480c6871e272e8c7a2b0a0741f51f84e103 | 3 | {
"blob_id": "93416480c6871e272e8c7a2b0a0741f51f84e103",
"branch_name": "refs/heads/master",
"committer_date": 1477610683000,
"content_id": "e03ae7755ba0b5b69f6e4c528450ee33418835ce",
"detected_licenses": [
"MIT"
],
"directory_id": "7698b70f6216a35631d0dfa92385814ea7e31d8d",
"extension": "py",
"fi... | 2.65625 | stackv2 | import os
import sys
import hashlib
import json
import requests
import socket
# import redis
# from app import cache_client
#
# MAX_PAYLOAD_SIZE_BYTES = 1000*1000 # 1mb
# MAX_CACHE_SIZE_BYTES = 300*1000*1000 #300mb
# MAX_CACHE_DURATION = 60*60*24*7 # one week
def http_get(url, headers={}, timeout=20, stream=False, ... | 154 | 30.77 | 99 | 12 | 1,195 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f03d762687665a6c_775d693b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
34
] | [
39
] | [
13
] | [
39
] | |
2024-11-19T02:10:28.312790+00:00 | 1,554,662,917,000 | d7f9165254224c3d078949d79b37af2dd9eec18a | 2 | {
"blob_id": "d7f9165254224c3d078949d79b37af2dd9eec18a",
"branch_name": "refs/heads/master",
"committer_date": 1554662917000,
"content_id": "db2edf62a677ce49ef27081499d9cdf58087b621",
"detected_licenses": [
"MIT"
],
"directory_id": "f4e722d3b6a0b4bc1fec7749338714954a05a014",
"extension": "py",
"fi... | 2.46875 | stackv2 | import os
import sys
import argparse
import time
import datetime
import re
import string
import json
import csv
import pickle
from tweepy import API
from tweepy import OAuthHandler
from tweepy import Cursor
from xvfbwrapper import Xvfb
from selenium import webdriver
from selenium.webdriver.common.keys import Keys
fro... | 363 | 34.21 | 104 | 22 | 2,529 | python | [{"finding_id": "codeql_py/overly-large-range_da84eff3c56870ce_55ae586f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[0-9:;<=>?@A-U\\].", "remediation": "", "location": {... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[0-9:;<=>?@A-U\\].",
"Suspicious character range that is equivalent to \\[0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-u\\].",
"Suspicious character range that is equivalent to \\[0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-u\\]."
] | [
339,
343,
343
] | [
null,
null,
null
] | [
39,
35,
48
] | [
42,
38,
51
] | |
2024-11-19T02:45:17.763373+00:00 | 1,538,296,424,000 | 8421a1c9f1e1917303effa532e897b27b4880a6b | 2 | {
"blob_id": "8421a1c9f1e1917303effa532e897b27b4880a6b",
"branch_name": "refs/heads/master",
"committer_date": 1538296424000,
"content_id": "54dc5a3b96063ca031b0175244fb3ec0b9ebe2ed",
"detected_licenses": [
"MIT"
],
"directory_id": "c2b56373ee37f971dcd8e2d260593066588605dc",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
This module handles the processes on CRAFT corpus
"""
from __future__ import (absolute_import, division,
print_function, unicode_literals)
from builtins import *
import urllib.request
import tarfile
import os
import re
from lxml import etree
f... | 117 | 36.4 | 111 | 21 | 1,008 | python | [{"finding_id": "codeql_py/tarslip_0ffd53ea953231c8_09c83813", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
68
] | [
null
] | [
36
] | [
55
] | |
2024-11-19T02:45:29.231905+00:00 | 1,580,719,069,000 | 0e9f876b4e43126b3b7e7630336d1802022abecd | 3 | {
"blob_id": "0e9f876b4e43126b3b7e7630336d1802022abecd",
"branch_name": "refs/heads/master",
"committer_date": 1580719069000,
"content_id": "9ab5a722a589ead281b307498ccba237875c42e0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8223f6d4442106e74fb12bc1006277598e5399e6",
"extension": "py"... | 2.5625 | stackv2 | # ㄹㅇ 생각없이 만든 히요비 api ㅋㅋㅋㅋㅋㅋㅋㅋㅋㅋㅋㅋ
# 진짜 왜 만든거지 ㅋㅋㅋ
from flask import Flask, jsonify, request
from requests.adapters import HTTPAdapter
from requests import Session, exceptions
from urllib.parse import urlparse
from queue import Queue
from threading import Thread
from bs4 import BeautifulSoup
class _Enable_SNI_Adapte... | 166 | 23.37 | 118 | 15 | 1,086 | python | [{"finding_id": "codeql_py/partial-ssrf_07551f716e1ef670_85ef4e2f", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
84
] | [
null
] | [
23
] | [
55
] | |
2024-11-19T02:45:35.130393+00:00 | 1,472,747,010,000 | 946919fc36f1ce96c20746c0e56ace4f997980c6 | 2 | {
"blob_id": "946919fc36f1ce96c20746c0e56ace4f997980c6",
"branch_name": "refs/heads/master",
"committer_date": 1472747010000,
"content_id": "8fe469551cfff740cbb116aea473022c221c4021",
"detected_licenses": [
"MIT"
],
"directory_id": "7e6a06489d752f84c0355bcc1f20205b70765804",
"extension": "py",
"fi... | 2.40625 | stackv2 | #import SimpleHTTPServer
#import SocketServer
#!/usr/bin/env python
from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer
import ssl
import argparse
import cgi
import os
import time
import json
import argparse
from urlparse import urlparse, parse_qs
from Judge import rank
debug=True
class RapJudgeServer(Base... | 119 | 28.45 | 112 | 19 | 943 | python | [{"finding_id": "codeql_py/insecure-default-protocol_6993c75461867699_fd8130e8", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
91
] | [
null
] | [
16
] | [
112
] | |
2024-11-19T02:45:44.025209+00:00 | 1,581,386,304,000 | ac03577af264d060f0eae9a715e528f6fd1b9fc6 | 2 | {
"blob_id": "ac03577af264d060f0eae9a715e528f6fd1b9fc6",
"branch_name": "refs/heads/master",
"committer_date": 1581386304000,
"content_id": "9afded965c6208a900450da898c2ecc582275cc3",
"detected_licenses": [
"MIT"
],
"directory_id": "2bdb6c8f10962c778814ee2a9dd7b0cab4eeb1c5",
"extension": "py",
"fi... | 2.390625 | stackv2 | from flask import Response, request, jsonify
from src import app, db, debug
from src.api.models.task import Task
from datetime import datetime
import json, os
class TaskView:
@app.route('/api/tasks', methods=['GET'])
def index():
response = {'data': []}
tasks = Task.query.all()
for task in... | 143 | 25.27 | 92 | 18 | 974 | python | [{"finding_id": "codeql_py/stack-trace-exposure_8703b4babcaea8c6_23b5062b", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
63,
91,
116,
141
] | [
null,
null,
null,
null
] | [
20,
20,
20,
20
] | [
40,
40,
40,
40
] | |
2024-11-19T02:45:45.067073+00:00 | 1,599,281,736,000 | 8996cad1ac8f59d85da42fa97ddc07edc83864c8 | 2 | {
"blob_id": "8996cad1ac8f59d85da42fa97ddc07edc83864c8",
"branch_name": "refs/heads/master",
"committer_date": 1599281736000,
"content_id": "a6c08a1a09d16e9a874a03ba4a4fd888e2178257",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b4d0369246d024a2e2a364b019a2e2f818451c74",
"extension": "py"... | 2.40625 | stackv2 | # -*- coding: utf-8 -*-
# flask + vue + web for animation
from flask import Flask, jsonify, render_template
from flask_cors import CORS
from flask import session
from flask import redirect
from flask import url_for
from flask import abort
from flask import request
# auth decorator support
from functools import wraps
i... | 273 | 24.18 | 121 | 17 | 1,904 | python | [{"finding_id": "codeql_py/stack-trace-exposure_fceedad6c9dacfed_08c9fe45", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/stack-trace-exposure",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
264,
59,
74,
240
] | [
null,
null,
null,
null
] | [
20,
18,
26,
18
] | [
21,
46,
43,
48
] | |
2024-11-19T02:45:49.353517+00:00 | 1,475,611,382,000 | 02367a824a5d1b77bbcd8225408c207ada24a65e | 3 | {
"blob_id": "02367a824a5d1b77bbcd8225408c207ada24a65e",
"branch_name": "refs/heads/master",
"committer_date": 1475611382000,
"content_id": "790d3dcf0c2c3850b605f2b50d45d01b72f40000",
"detected_licenses": [
"MIT"
],
"directory_id": "5dc7a3116af526e40722d1b8eac04b1896fc7f68",
"extension": "py",
"fi... | 2.515625 | stackv2 | from http.server import HTTPServer, BaseHTTPRequestHandler
from socketserver import ThreadingMixIn
from .redirect import RedirectHandler
import threading
import ssl
__all__ = ['ThreadedServer', 'SecureServer']
class ThreadedServer(ThreadingMixIn, HTTPServer):
protocol_version = 'HTTP/1.1'
def __init__(self,... | 65 | 33.77 | 78 | 14 | 439 | python | [{"finding_id": "codeql_py/insecure-default-protocol_a106acc01eb30317_1a306862", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
48
] | [
52
] | [
23
] | [
69
] | |
2024-11-19T02:57:10.796564+00:00 | 1,573,173,767,000 | 46631303c88f24f42685f46dafdfe61161bf2e4a | 3 | {
"blob_id": "46631303c88f24f42685f46dafdfe61161bf2e4a",
"branch_name": "refs/heads/master",
"committer_date": 1573173767000,
"content_id": "67f699a0b08ea0a907ae69ff03f80dadf5c7eab7",
"detected_licenses": [
"MIT"
],
"directory_id": "9adc6d67ef98dd86fa458957b4fc48f78fa09553",
"extension": "py",
"fi... | 3.015625 | stackv2 | """Build command for Ginpar projects.
This module implements the building command for the ginpar static content
generator.
``build`` will read the configuration file in search for ``build_path`` and
``source_path``. If not defined, `build` will use ``"public"`` and
``"sketches"``, respectively.
Examples
--------
To... | 381 | 26.18 | 96 | 18 | 2,419 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0ccd53af9488d33f_7d50089d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
341
] | [
null
] | [
18
] | [
89
] | |
2024-11-19T02:57:23.293962+00:00 | 1,588,871,531,000 | 25e6f0f0ce8c884f36c1c92c7308a3b14cf814af | 2 | {
"blob_id": "25e6f0f0ce8c884f36c1c92c7308a3b14cf814af",
"branch_name": "refs/heads/master",
"committer_date": 1588871531000,
"content_id": "b1c6e892fc69aa60d774f38930a454a6aa0b6bfd",
"detected_licenses": [
"MIT"
],
"directory_id": "04e7c08a60bbd36261da37ae13d27fbe9c71de8a",
"extension": "py",
"fi... | 2.5 | stackv2 | from config import *
import flask
from flask import send_file
from flask import Flask, url_for, jsonify, request, redirect
import json
import os
import os.path
import base64
import re
from csv import DictWriter
import time
from os.path import abspath, dirname, exists, isfile, join, splitext
import config
current_time... | 68 | 26.4 | 75 | 12 | 469 | python | [{"finding_id": "codeql_py/flask-debug_73fbaf4eca4e8cb8_e48a886a", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
66,
35
] | [
null,
null
] | [
9,
21
] | [
28,
24
] | |
2024-11-19T03:12:12.438630+00:00 | 1,603,731,118,000 | 1c258ceb73c88e83ed78cae0241e27dd021f2407 | 2 | {
"blob_id": "1c258ceb73c88e83ed78cae0241e27dd021f2407",
"branch_name": "refs/heads/master",
"committer_date": 1603731118000,
"content_id": "43798b59d5ee2cb7e16ef3ef098a2c8dd7350c01",
"detected_licenses": [
"MIT"
],
"directory_id": "1cbf232261ba470deffa542d26dccb129be74492",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python3
# script to forward MQTT data to and InfluxDB database
import paho.mqtt.client as mqtt
from influxdb import InfluxDBClient
import time, datetime
import json
import os
# define constants
MQTT_SERVER = ('mqtt', 1883) # ip, port
MQTT_USERNAME = os.getenv('MQTT_USERNAME', 'mqtt')
MQTT_PASSWORD = os... | 173 | 32.14 | 126 | 18 | 1,323 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_adce112714164800_e8b9d41e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
144
] | [
null
] | [
30
] | [
43
] | |
2024-11-19T03:12:23.009373+00:00 | 1,679,573,658,000 | ae32bbea538e944441562f52843575d426451d96 | 3 | {
"blob_id": "ae32bbea538e944441562f52843575d426451d96",
"branch_name": "refs/heads/master",
"committer_date": 1679573658000,
"content_id": "6660577b301a158dcfd5c0c25462528810468d60",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1e6871bc3bc87b67b1a18a0c69f17d901e1a1a7f",
"extension": "py"... | 2.875 | stackv2 | """Schedule analyses for golang packages.."""
from bs4 import BeautifulSoup
import requests
from .base import AnalysesBaseHandler
class GolangPopularAnalyses(AnalysesBaseHandler):
"""Schedule analyses for golang packages."""
# API documentation: http://go-search.org/infoapi
_URL = 'http://go-search.org/... | 105 | 40.15 | 100 | 21 | 833 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_494a176b54a2f2d1_62f100de", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [github.com](1) may be at an arbitrary position in the sanitized URL."
] | [
15
] | [
null
] | [
12
] | [
44
] | |
2024-11-19T01:33:39.349420+00:00 | 1,624,638,597,000 | 5cd8e6fbaf65e3349d4d94736830786510db4b80 | 2 | {
"blob_id": "5cd8e6fbaf65e3349d4d94736830786510db4b80",
"branch_name": "refs/heads/main",
"committer_date": 1624638597000,
"content_id": "025afd1156151d1a66ba820e9c8684070dfda482",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "199ec10e08c21509a848f4565b32d51a2c9c593f",
"extension": "py",
... | 2.359375 | stackv2 | import time
import requests
import m3u8
from Crypto.Cipher import AES
import os
from datetime import datetime
import threading
import shutil
import urllib3
thread_num = 600 # 线程数量
# todo 注意是否已关闭了verify验证
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
class temp_file:
def __init__(self, ... | 221 | 33.29 | 120 | 23 | 2,367 | python | [{"finding_id": "codeql_py/request-without-cert-validation_df1eac6e804da520_5a9ea593", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
94
] | [
95
] | [
18
] | [
60
] | |
2024-11-19T01:33:46.148502+00:00 | 1,592,131,136,000 | b0cfcde56b0b44dd91df962c257932405c2e561d | 2 | {
"blob_id": "b0cfcde56b0b44dd91df962c257932405c2e561d",
"branch_name": "refs/heads/master",
"committer_date": 1592131136000,
"content_id": "0e5a4e91be284adb74b179e689c2963ad5c50e52",
"detected_licenses": [
"MIT"
],
"directory_id": "055b2e4dce5e6ac4986c7071dafb0d0badc33bc2",
"extension": "py",
"fi... | 2.421875 | stackv2 | from flask import Blueprint, Response, request, jsonify
from components.drivers.sensors.GPSSensor import GPSSensor
gps = None
gps_api = Blueprint('gps_api', __name__)
@gps_api.route("/gps", methods=['GET'])
def gps_value_request():
gps_data = gps.get_data()
if gps_data and gps_data.latitude:
gps_jso... | 29 | 29.55 | 73 | 13 | 200 | python | [{"finding_id": "codeql_py/reflective-xss_e9d4e5bfa644a8d5_f9e498a6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
29
] | [
null
] | [
21
] | [
33
] | |
2024-11-19T02:11:01.176400+00:00 | 1,407,565,843,000 | ea1dfcd28f2b906cc3d3b60de73e378155f7a356 | 2 | {
"blob_id": "ea1dfcd28f2b906cc3d3b60de73e378155f7a356",
"branch_name": "refs/heads/master",
"committer_date": 1407565843000,
"content_id": "374e21e56a67118a4059269dcdf1eb00a900475b",
"detected_licenses": [
"MIT"
],
"directory_id": "4bcd38cf1d93839c83a64062b6b484f3b97fa061",
"extension": "py",
"fi... | 2.484375 | stackv2 | import ConfigParser
import boto
import time
import tarfile
import os
import sys
from boto.s3.connection import S3Connection
class S3ArchiveHandler:
def __init__(self, config_path):
config = ConfigParser.ConfigParser()
config.read(config_path + "/s3-access.conf")
s3_access = config.get("mai... | 164 | 32.45 | 98 | 19 | 1,279 | python | [{"finding_id": "codeql_py/tarslip_2fce5f3f250b1f43_ea827a89", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
109
] | [
null
] | [
13
] | [
16
] | |
2024-11-19T02:11:36.116875+00:00 | 1,548,919,975,000 | 57bcf02d846e3dab63131e8c461fd041124b8f07 | 2 | {
"blob_id": "57bcf02d846e3dab63131e8c461fd041124b8f07",
"branch_name": "refs/heads/master",
"committer_date": 1548919975000,
"content_id": "17d7e90841de2019512844bcd8fe51b6df162f35",
"detected_licenses": [
"Unlicense"
],
"directory_id": "3fe3499688ad9f709f163cb0144fb7a65f69a7a2",
"extension": "py",... | 2.5 | stackv2 | import os
import logging
from datetime import datetime, timedelta
from flask import Flask, request, abort, jsonify , render_template
import requests
def temp_token():
import binascii
temp_token = binascii.hexlify(os.urandom(24))
return temp_token.decode('utf-8')
logFormatter = logging.Formatter("%(asctime... | 78 | 33.85 | 129 | 19 | 653 | python | [{"finding_id": "codeql_py/log-injection_21698e923f5d5923_c30a981b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
52
] | [
null
] | [
21
] | [
74
] | |
2024-11-19T02:32:51.179767+00:00 | 1,547,475,371,000 | 47888e5f0a59b0339d82880838268bbf43ae3742 | 3 | {
"blob_id": "47888e5f0a59b0339d82880838268bbf43ae3742",
"branch_name": "refs/heads/master",
"committer_date": 1547475371000,
"content_id": "9ca8d50773ef4b9cfab4863500ec147ec05c3d41",
"detected_licenses": [
"MIT"
],
"directory_id": "e390c112f76ddf2f6ac42363a4288140eb339911",
"extension": "py",
"fi... | 2.515625 | stackv2 | import time, os.path, subprocess, re, multiprocessing, threading, json, shutil
from selenium import webdriver
from selenium.common.exceptions import TimeoutException
from selenium.webdriver.support import expected_conditions as EC
from selenium.webdriver.support.ui import WebDriverWait
from . import manifest
class R... | 442 | 28.55 | 111 | 18 | 3,609 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_041faf01852aca65_4447e9d2", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [kink.com](1) may be at an arbitrary position in the sa... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [kink.com](1) may be at an arbitrary position in the sanitized URL."
] | [
269
] | [
null
] | [
6
] | [
23
] | |
2024-11-19T02:32:59.337103+00:00 | 1,558,881,619,000 | 477c119aa02afeddd8266744f1bac2dcd9dfa43c | 2 | {
"blob_id": "477c119aa02afeddd8266744f1bac2dcd9dfa43c",
"branch_name": "refs/heads/master",
"committer_date": 1558881619000,
"content_id": "27ac29f7af8264b2bafb1420294900fd69d33a68",
"detected_licenses": [
"MIT"
],
"directory_id": "331cdb3304e92aeafe498b15f7c4bfb91a6c546e",
"extension": "py",
"fi... | 2.421875 | stackv2 | import re
from QQLoginTool.QQtool import OAuthQQ
from django import http
from django.conf import settings
from django.contrib.auth import login
from django.db import DatabaseError
from django.shortcuts import render, redirect
from django.urls import reverse
from carts.utils import merge_cart_cookie_to_redis
from oauth... | 172 | 36.16 | 97 | 19 | 1,687 | python | [{"finding_id": "codeql_py/url-redirection_3e72f0942b307ab5_53361cde", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
72,
144
] | [
null,
null
] | [
37,
37
] | [
41,
41
] | |
2024-11-19T02:33:27.852790+00:00 | 1,565,090,854,000 | 43af6e9a7c3ea51ae1773b23b30662248483ff39 | 2 | {
"blob_id": "43af6e9a7c3ea51ae1773b23b30662248483ff39",
"branch_name": "refs/heads/master",
"committer_date": 1565090854000,
"content_id": "792e6fd4eb9cd4a69629a974acc6ac2f6bfebb65",
"detected_licenses": [
"MIT"
],
"directory_id": "15e2c7b30aa72891d6971b911059c3ca62f5a64c",
"extension": "py",
"fi... | 2.390625 | stackv2 | #coding:utf-8
import socket,sys
import pymssql
def mssqlburp(ip,port):
addr = (ip,int(port))
with open('mssql\user.txt') as user:
users = user.readlines()
user.close()
with open('mssql\pass.txt') as passs:
passwords = passs.readlines()
passs.close()
sock_1433 = socket.socke... | 34 | 25.24 | 103 | 18 | 227 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_557cf58c81775cc9_de95eff3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
30
] | [
null
] | [
38
] | [
103
] | |
2024-11-19T02:59:06.967894+00:00 | 1,630,495,057,000 | 01c1c06c44b3cd570c5bab0d4d11d6d17e8c020a | 3 | {
"blob_id": "01c1c06c44b3cd570c5bab0d4d11d6d17e8c020a",
"branch_name": "refs/heads/main",
"committer_date": 1630495057000,
"content_id": "eccd6b6f8e256e33481451288f8139f4ea11871c",
"detected_licenses": [
"MIT"
],
"directory_id": "c74e42ab4f52850aa56dd3728729fb47a844bb7e",
"extension": "py",
"file... | 3.015625 | stackv2 | from jinja2 import Template, StrictUndefined
import os
def write_template(file_name, **variables):
with open(file_name, "r", encoding="utf-8") as file:
template = Template(file.read(), undefined=StrictUndefined)
out = template.render(**variables)
with open(f"out_int/{file_name}", "w+", encoding="... | 79 | 30.25 | 92 | 22 | 576 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4136596c92fcef46_82be41e6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
7
] | [
null
] | [
20
] | [
68
] | |
2024-11-19T02:59:57.801240+00:00 | 1,659,153,197,000 | 73f3b4e7d43d4784099c9d06331c5db67d60aee1 | 3 | {
"blob_id": "73f3b4e7d43d4784099c9d06331c5db67d60aee1",
"branch_name": "refs/heads/master",
"committer_date": 1659153197000,
"content_id": "2a1fb6002af1c0ea706008b31b39a076d2095769",
"detected_licenses": [
"MIT"
],
"directory_id": "636787168e151db48093e939a34ddd211c94c263",
"extension": "py",
"fi... | 3.359375 | stackv2 | import csv
import sys
import time
from pathlib import Path
try:
import win32com.client as comctl
except ImportError:
print("please: pip install pywin32")
sys.exit(1)
csv_content = """account,name,salary
0000123, Tom, 10000
0000456, Marry, 15000
0000789, Jack, 20000
"""
def create_dummy_salary():
csv... | 57 | 23.75 | 68 | 12 | 386 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_57b77e86ce55f9c9_8906c1bc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
55
] | [
null
] | [
21
] | [
30
] | |
2024-11-19T03:12:15.011210+00:00 | 1,528,407,209,000 | 68007b3074d39989ccc0684317ce300ec7a65c02 | 3 | {
"blob_id": "68007b3074d39989ccc0684317ce300ec7a65c02",
"branch_name": "refs/heads/master",
"committer_date": 1528407209000,
"content_id": "3ab939ec2aeffc30bdadb4d015ff7f6a55c00f12",
"detected_licenses": [
"MIT"
],
"directory_id": "85aacb540e049b3cd6c1364ea3b7e30011ad1888",
"extension": "py",
"fi... | 2.65625 | stackv2 | from flask import Flask, render_template, request
import sqlite3 as sql
app = Flask(__name__)
import sqlite3
conn = sqlite3.connect('database.db')
# print("Opened database successfully")
#conn.execute('CREATE TABLE xy (name TEXT, grade TEXT, room TEXT, tel TEXT, picture TEXT, keyword TEXT)')
#print("Table created su... | 99 | 22.76 | 136 | 14 | 529 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_08b092a02a0ffb48_af3bf460", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-215"
] | [
"py/clear-text-logging-sensitive-data",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
50,
89
] | [
null,
null
] | [
14,
4
] | [
24,
25
] | |
2024-11-19T03:24:43.271470+00:00 | 1,546,689,469,000 | 69a067fbf42a8cac2762aef673178005e9f6a48b | 3 | {
"blob_id": "69a067fbf42a8cac2762aef673178005e9f6a48b",
"branch_name": "refs/heads/master",
"committer_date": 1546689469000,
"content_id": "f646dc2afe199fe6974130f26066974afe7c3c0e",
"detected_licenses": [
"Unlicense"
],
"directory_id": "90532f95137f050976de59426898310492de7d08",
"extension": "py",... | 3.265625 | stackv2 | ''' Task A. '''
# task to do the following:
# parse the sample_bba_data_2017 excel sheet or csv document
# to obtain data in the following format as JSON
#
# primary structure (master model)
# [use the structure cited beneath as a reference]
'''
Student {
name: String,
gender: Enum(String) ['male' | 'female... | 85 | 24.08 | 92 | 12 | 562 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_89b3716931413b97_72ebfeae", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.\nThis expression logs [sensitive data (private)]... | [
83
] | [
null
] | [
7
] | [
26
] | |
2024-11-19T03:35:17.837929+00:00 | 1,559,196,599,000 | b60fd6134a5df813cf8b7ac165f208a7ca0d0af6 | 3 | {
"blob_id": "b60fd6134a5df813cf8b7ac165f208a7ca0d0af6",
"branch_name": "refs/heads/master",
"committer_date": 1559196599000,
"content_id": "3f1e5d6ad4dcda716a4b2f77533cf27e0b6e2921",
"detected_licenses": [
"MIT"
],
"directory_id": "d1aebc841bf4a0b197bf2af70cce1530182b279f",
"extension": "py",
"fi... | 2.6875 | stackv2 | from flask import Flask,request,jsonify,json
# import pymysql
import base64
import string
import random
import datetime
import pandas as pd
from collections import Counter
app=Flask(__name__)
request_count=0
@app.route('/api/v1/_count',methods=['GET','DELETE'])
def get_count():
global request_count
if(request.me... | 210 | 20.75 | 89 | 18 | 1,219 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b7e5f09f7d2a9349_5ce5113b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-215"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/flask-debug"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"A Flask app appears to be r... | [
70,
118,
133,
133,
210
] | [
null,
null,
null,
null,
null
] | [
17,
17,
9,
39,
null
] | [
25,
25,
38,
47,
45
] | |
2024-11-19T03:35:18.437763+00:00 | 1,610,642,762,000 | fe178407b5c3acff231235bcb4e35263829ce6aa | 3 | {
"blob_id": "fe178407b5c3acff231235bcb4e35263829ce6aa",
"branch_name": "refs/heads/master",
"committer_date": 1610642762000,
"content_id": "8a42db0e19c30277b14127600fd1317da65238b7",
"detected_licenses": [
"MIT"
],
"directory_id": "d0e9590dea3536fc4e5c20899caa6363c7b37a0e",
"extension": "py",
"fi... | 3.09375 | stackv2 | import random
from time import sleep
import csv
import threading
ex = 1
#print("These are how many charecters the generater can chose from." + " " + str(26 + 26 +10 + 24 + 24 + 25))
password_alphabet = [ "a" , "b" , "c" , "d" , "e" , "f" , "g" , "h" , "j" , "k" , "l" , "m" , "n" , "o" ,
"p" ... | 159 | 38.98 | 146 | 18 | 1,713 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_fe2621b4e485fccd_1a0e8104", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensiti... | [
80,
52,
65
] | [
null,
null,
null
] | [
24,
19,
11
] | [
42,
129,
29
] | |
2024-11-19T01:27:04.991270+00:00 | 1,505,002,971,000 | 9cb5eb74bf71a5c3a5d1ba493ec09878d9a834b7 | 3 | {
"blob_id": "9cb5eb74bf71a5c3a5d1ba493ec09878d9a834b7",
"branch_name": "refs/heads/master",
"committer_date": 1505002971000,
"content_id": "ab86b5f9e3a5027dc6273537a88c57c95bd2700e",
"detected_licenses": [
"MIT"
],
"directory_id": "254942f912ae11a79a967e14b3ed8eef0c59abcc",
"extension": "py",
"fi... | 2.53125 | stackv2 | from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler
from SocketServer import ThreadingMixIn
import threading
import cgi
import json
from distutils.util import strtobool
from main import *
class Handler(BaseHTTPRequestHandler):
def do_GET(self):
rootdir = '/Users/Alex/Desktop/HackCMU217' #fi... | 95 | 32.91 | 124 | 16 | 744 | python | [{"finding_id": "codeql_py/path-injection_ee053f7c0e240ada_532de1af", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
20
] | [
null
] | [
26
] | [
45
] | |
2024-11-19T01:27:05.455437+00:00 | 1,529,231,164,000 | 89583bd8601072e1a7b2b1f889e79c59bc5c0392 | 2 | {
"blob_id": "89583bd8601072e1a7b2b1f889e79c59bc5c0392",
"branch_name": "refs/heads/master",
"committer_date": 1529231178000,
"content_id": "2c46cc7e382075486ae58e70991b3d78be1d89c5",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "62bea969deae2bd1c434d7e4de695832e65e8079",
"extension": "p... | 2.4375 | stackv2 | # -*- coding: utf-8 -*-
import requests
import hashlib
from cryptotik.common import headers
from cryptotik.exceptions import APIError
class OKcoin:
url = 'https://www.okcoin.$/api/v1/' # OKcoin cny and usd markets do no use the same domain
delimiter = "_"
headers = headers
taker_fee, maker_fee = 0, 0... | 273 | 35.37 | 117 | 22 | 2,240 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_47793509a95fbe1d_9458dd31", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
98
] | [
null
] | [
28
] | [
47
] | |
2024-11-19T01:38:10.125177+00:00 | 1,675,913,800,000 | 1ee869e507a4494ec06bf1c4e9ea3f53c80fac5e | 2 | {
"blob_id": "1ee869e507a4494ec06bf1c4e9ea3f53c80fac5e",
"branch_name": "refs/heads/main",
"committer_date": 1675913800000,
"content_id": "6525a0003a322bf600bc21e5f4b8112e01e2c9a2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e411731a8c602ebb77c3d1f1e34f6d144d122cac",
"extension": "py",
... | 2.5 | stackv2 | #!/usr/bin/env python
import argparse
import filecmp
import json
import os
import re
import subprocess
import sys
import requests
here = os.path.abspath(os.path.dirname(__file__))
def run_cellml_model(executable, model_file):
return_code = subprocess.call(f"{executable} {model_file}", shell=True)
return re... | 153 | 29.56 | 108 | 20 | 1,094 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_87913b54ae539f8b_4ed6bb4a", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'physiomeproject.org/e/', so it migh... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'physiomeproject.org/e/', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'physiomeproject.org/exposure/', so it might match more hosts than expected."
] | [
22,
23
] | [
null,
null
] | [
24,
24
] | [
67,
74
] | |
2024-11-19T01:38:11.739559+00:00 | 1,633,130,097,000 | 645f0d67712f07900d722e52f0d92237016dfd3d | 3 | {
"blob_id": "645f0d67712f07900d722e52f0d92237016dfd3d",
"branch_name": "refs/heads/master",
"committer_date": 1633130097000,
"content_id": "ae75b1cc4149fbd398f2b09f24be8419842dbf54",
"detected_licenses": [
"MIT"
],
"directory_id": "f956dcba2e6781957d64d88a0b558c65983771f0",
"extension": "py",
"fi... | 2.65625 | stackv2 | from flask import Flask, Response, request
from werkzeug.utils import secure_filename
import json
import subprocess
import os
app = Flask(__name__)
@app.route('/listen/<book_name>')
def sendmp3(book_name):
with open('library.json') as library_fp:
library = json.loads(library_fp.read())
if book_na... | 59 | 30.47 | 102 | 13 | 444 | python | [{"finding_id": "codeql_py/reflective-xss_c5739c7667a7cd23_d89057a3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
15
] | [
null
] | [
16
] | [
73
] | |
2024-11-19T01:38:32.877694+00:00 | 1,602,499,533,000 | 2e41364ebd09d2ad58a3ae72d1f8b8f502be16f3 | 3 | {
"blob_id": "2e41364ebd09d2ad58a3ae72d1f8b8f502be16f3",
"branch_name": "refs/heads/master",
"committer_date": 1602499533000,
"content_id": "b5503d3131bd93e7d1b02e7a138a7cf51947be29",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f946d146d9b487ab1edeaad10bf6b3a17cd549f0",
"extension": "py"... | 2.515625 | stackv2 | """
SYNOPSIS:
Script to discover devices managed by OM Enterprise
DESCRIPTION:
This script exercises the OME REST API to discover devices.
For authentication X-Auth is used over Basic Authentication.
Note that the credentials entered are not stored to disk.
EXAMPLE:
python discover_device.py --ip <ip ad... | 317 | 42.97 | 138 | 18 | 3,080 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b60690f8706d78c7_5db595f6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 6 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
34,
138,
146,
187,
203,
217
] | [
36,
139,
null,
null,
null,
219
] | [
20,
21,
16,
20,
33,
25
] | [
50,
83,
64,
72,
90,
51
] | |
2024-11-19T01:38:47.590219+00:00 | 1,588,727,985,000 | a27c4b3ac091088a5eee9ccee8baa358dfffd1f8 | 3 | {
"blob_id": "a27c4b3ac091088a5eee9ccee8baa358dfffd1f8",
"branch_name": "refs/heads/master",
"committer_date": 1588727985000,
"content_id": "92daede42cb7566d560a2000b293eed00aa12123",
"detected_licenses": [
"MIT"
],
"directory_id": "4bc6486ecba91e72615ee7159d208ec84c219556",
"extension": "py",
"fi... | 2.84375 | stackv2 | #!/usr/bin/env python3
import sys
import os
import requests
import re
import csv
USER_AGENT = 'wgetcomment 1.0'
def analyze_comment(comment):
symbol_count = 0;
for c in comment:
if (ord(c) > 0x20 and ord(c) < 0x30) or (ord(c) > 0x39 and ord(c) < 0x41) or (ord(c) > 0x5A and ord(c) < 0x61) or (ord(c) > 0x7A and... | 90 | 29.69 | 152 | 18 | 794 | python | [{"finding_id": "codeql_py/bad-tag-filter_84d82396ae3a9a06_62657be5", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match upper case <SCRIPT> tags."
] | [
75
] | [
null
] | [
27
] | [
54
] | |
2024-11-19T01:52:03.291146+00:00 | 1,585,792,047,000 | d63b953643514eefc4f559bc946c614a7a47916a | 3 | {
"blob_id": "d63b953643514eefc4f559bc946c614a7a47916a",
"branch_name": "refs/heads/master",
"committer_date": 1585792047000,
"content_id": "4ebac0c1ff92051892333b1129437fb55a50abdb",
"detected_licenses": [
"MIT"
],
"directory_id": "eff5edbaeb0e7808ea58d080491e558ca62ab842",
"extension": "py",
"fi... | 2.640625 | stackv2 | import os
import sys
import hashlib
from flask import Flask, render_template, redirect
from lib.codenames import KeyCard, NameCards
sys.path.insert(0, os.path.dirname(__file__))
app = Flask(__name__)
data = {}
@app.route('/')
def index():
return render_template('home.html')
@app.route('/keycard')
def keyc... | 78 | 24.83 | 69 | 15 | 553 | python | [{"finding_id": "codeql_py/flask-debug_d43f760c76438997_e492a866", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
78,
54
] | [
null,
null
] | [
5,
21
] | [
24,
69
] | |
2024-11-19T01:52:26.521575+00:00 | 1,617,265,826,000 | 18df1d62ac2745ae2221d9db3e24672de8df32a7 | 3 | {
"blob_id": "18df1d62ac2745ae2221d9db3e24672de8df32a7",
"branch_name": "refs/heads/main",
"committer_date": 1617265826000,
"content_id": "db39e1a47256aae38e40c9bdebae8921309f859a",
"detected_licenses": [
"MIT"
],
"directory_id": "d18abd71a7867eb40c5227e96295059ef14a78b2",
"extension": "py",
"file... | 2.671875 | stackv2 | # coding: utf-8
import os
import time
import signal
import random
import logging
import argparse
import requests
import threading
from flask import Flask, request, jsonify
from werkzeug.routing import BaseConverter
logging.basicConfig(filename='log/mlapp.log',level=logging.INFO, filemode='a', format='%(created)f::ML... | 380 | 30.68 | 146 | 20 | 2,722 | python | [{"finding_id": "codeql_py/log-injection_fc20d3adb6500862_14880a3b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 11 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depen... | [
263,
265,
267,
275,
280,
298,
300,
334,
337,
345,
349
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
52,
63,
57,
39,
64,
67,
57,
54,
55,
39,
64
] | [
55,
66,
64,
42,
67,
70,
64,
71,
62,
42,
67
] | |
2024-11-19T02:28:04.776127+00:00 | 1,435,580,900,000 | a1c72e58692e45fed95aae00851be5eb79e56937 | 2 | {
"blob_id": "a1c72e58692e45fed95aae00851be5eb79e56937",
"branch_name": "refs/heads/master",
"committer_date": 1435580900000,
"content_id": "530d753181ab1723a0b8de24628743fd53e44152",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "48894ae68f0234e263d325470178d67ab313c73e",
"extension": "p... | 2.46875 | stackv2 | # -*- coding: utf-8 -*-
##----------------------------------------------------------------------
## TCPSocket implementation
##----------------------------------------------------------------------
## Copyright (C) 2007-2011 The NOC Project
## See LICENSE for details
##--------------------------------------------------... | 46 | 38.59 | 86 | 20 | 363 | python | [{"finding_id": "codeql_py/insecure-protocol_f48125b087498a49_56f4a8bf", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.wrap_socket](1).", "remediation": "", "l... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.wrap_socket](1)."
] | [
22
] | [
25
] | [
18
] | [
65
] | |
2024-11-19T02:28:15.653518+00:00 | 1,540,706,385,000 | 07bfda873d97371e63bb3f9b2997c4934a6011b7 | 2 | {
"blob_id": "07bfda873d97371e63bb3f9b2997c4934a6011b7",
"branch_name": "refs/heads/master",
"committer_date": 1540706385000,
"content_id": "dd86335ddf2f0b82fbff58066ebfb16f60d05e85",
"detected_licenses": [
"MIT"
],
"directory_id": "81e98e6064b16f047983d1f7c1645b95a423949c",
"extension": "py",
"fi... | 2.453125 | stackv2 | import json, requests, sys
import os
import youtube_dl
from flask import Flask, render_template, json, request, send_file,request
import urllib
from bs4 import BeautifulSoup
import datetime
import re
year = datetime.date.today().year
# Flask app should start in global layout
app = Flask(__name__)
def make_savepath(t... | 73 | 31.22 | 93 | 19 | 637 | python | [{"finding_id": "codeql_py/stack-trace-exposure_57f1fdb29225cb04_889368ac", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-918"
] | [
"py/stack-trace-exposure",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
67,
28
] | [
null,
null
] | [
11,
10
] | [
17,
72
] | |
2024-11-19T02:28:30.339334+00:00 | 1,388,053,999,000 | de6cfa46a8049f6f9506889bd148d43d8a70fac8 | 2 | {
"blob_id": "de6cfa46a8049f6f9506889bd148d43d8a70fac8",
"branch_name": "refs/heads/master",
"committer_date": 1388053999000,
"content_id": "aa58ef8b583bbcf00a351602ed0c2431c0a22ee0",
"detected_licenses": [
"MIT"
],
"directory_id": "d7a0624bc9c594b1a9b9501b11d90b33634b615d",
"extension": "py",
"fi... | 2.375 | stackv2 | import http.cookiejar
import gzip
import logging
import http.client
import urllib.parse
import json
from platform import platform
import signal
import argparse
from sys import stdout
import os
import html
import getpass
from urllib.error import URLError
from configparser import ConfigParser
logger = logging.getLogger(... | 274 | 38.02 | 80 | 20 | 2,212 | python | [{"finding_id": "codeql_py/insecure-protocol_7a9c6818c2bbdc8a_15da01f5", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1)."
] | [
121
] | [
null
] | [
43
] | [
77
] | |
2024-11-19T02:28:50.295146+00:00 | 1,388,675,478,000 | 63d43b001fd30985d2ec167c7e781a9d8a64e985 | 3 | {
"blob_id": "63d43b001fd30985d2ec167c7e781a9d8a64e985",
"branch_name": "refs/heads/master",
"committer_date": 1388675478000,
"content_id": "6da460a88f56303bd13219bb350fea01088585b2",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "200b7469a041afc5fd342a29f222402879633d44",
"extension": "p... | 2.890625 | stackv2 | # This scans the entire country for various
# types of places and retrieves the nearest
# one to a grid of points.
from random import randrange
import time
import requests
from math import sqrt, ceil
from threading import Lock, Thread
from googleapikey import GOOGLE_API_KEY
from distancesphere import distance_on_unit_... | 165 | 30.45 | 77 | 20 | 1,437 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3289f891246b1f4f_633d5853", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priv... | [
125,
136
] | [
127,
null
] | [
19,
19
] | [
43,
52
] | |
2024-11-19T02:28:53.252480+00:00 | 1,581,895,056,000 | b7829457ac20ec351d02adb2da65f0ade917850e | 2 | {
"blob_id": "b7829457ac20ec351d02adb2da65f0ade917850e",
"branch_name": "refs/heads/master",
"committer_date": 1581895056000,
"content_id": "7d6423450dc9438e615ca4d52e1ffbd3ddf287d2",
"detected_licenses": [
"MIT"
],
"directory_id": "052dce0191618d79849bad52e9cdb295d2329887",
"extension": "py",
"fi... | 2.421875 | stackv2 | from flask import Flask, g, render_template, url_for, flash, redirect, request, session
from flaskapp import app, github
from flask_github import GitHubError
@app.route('/')
@app.route('/home')
def home():
return render_template('new_home.html', title='Home Page')
@app.route('/about')
def about():
return ren... | 73 | 33.55 | 104 | 15 | 555 | python | [{"finding_id": "codeql_py/url-redirection_e7b36f8d674b9183_40519525", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
31,
44
] | [
null,
null
] | [
25,
21
] | [
33,
29
] | |
2024-11-19T02:36:47.810824+00:00 | 1,583,860,743,000 | 1dc6055523c13dea08ad1f3d54bb4f4c238ab8e7 | 3 | {
"blob_id": "1dc6055523c13dea08ad1f3d54bb4f4c238ab8e7",
"branch_name": "refs/heads/master",
"committer_date": 1583860743000,
"content_id": "b480f559d0473a6006cabe3591bc3bfd015fcc1f",
"detected_licenses": [
"MIT"
],
"directory_id": "d13ac70da420c855db5f0139ad5f0b5e5847b39d",
"extension": "py",
"fi... | 2.578125 | stackv2 | import os
import os.path
import time
from bson import ObjectId
from flask import request, Blueprint, make_response, jsonify
from werkzeug.utils import secure_filename
from instances import app
from db_ops.transporter import write_to_db
files = Blueprint('files', __name__)
@files.route('/files/upload', methods=['POST'... | 77 | 38.65 | 92 | 17 | 753 | python | [{"finding_id": "codeql_py/command-line-injection_1186c07df32682ea_24727b16", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 3 | true | [
"CWE-078",
"CWE-078",
"CWE-022"
] | [
"py/command-line-injection",
"py/command-line-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This command line depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
48,
52,
57
] | [
null,
null,
null
] | [
19,
19,
31
] | [
29,
26,
44
] | |
2024-11-19T02:36:49.351202+00:00 | 1,609,777,270,000 | cf8d69cb3d638f50f07e1e03e2781a6ec7625236 | 3 | {
"blob_id": "cf8d69cb3d638f50f07e1e03e2781a6ec7625236",
"branch_name": "refs/heads/master",
"committer_date": 1609777270000,
"content_id": "a01ab643409d62f1391c62be97a2ae32466635fd",
"detected_licenses": [
"MIT"
],
"directory_id": "1b6901a7aa276f05612f4bcfc44e5a14c31468aa",
"extension": "py",
"fi... | 3.03125 | stackv2 | class GetLatLng:
def __init__(self,address,api_key=None):
self.address = address
self.api_key = api_key
def get_geocoder(sefl,address):
from geopy.geocoders import Nominatim
geolocator = Nominatim()
loc = geolocator.geocode(address)
print("latitude is :-" ,loc.latitude,"\nlongtitude is:-" ,loc.longitude... | 45 | 27.62 | 81 | 14 | 372 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_89ba160d06ed63db_548dbfa4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data ... | [
10,
10,
23
] | [
null,
null,
null
] | [
27,
61,
9
] | [
39,
74,
16
] | |
2024-11-19T02:36:51.682198+00:00 | 1,693,928,169,000 | 1a8c6c7b1c5c7862ec22fa5a5f102f7e4fe41a67 | 3 | {
"blob_id": "1a8c6c7b1c5c7862ec22fa5a5f102f7e4fe41a67",
"branch_name": "refs/heads/main",
"committer_date": 1693928169000,
"content_id": "b59970bc9a0d9ad42c79692822751256ca377fa5",
"detected_licenses": [
"MIT"
],
"directory_id": "091a6200be74bf6577c86f623665bcc24e16b02b",
"extension": "py",
"file... | 2.75 | stackv2 | # SPDX-FileCopyrightText: 2021 ladyada for Adafruit Industries
# SPDX-License-Identifier: MIT
"""
CircuitPython GitHub Stars viewer
"""
import time
import ssl
import wifi
import socketpool
import displayio
import board
from adafruit_display_text import bitmap_label
from adafruit_bitmap_font import bitmap_font
import ad... | 57 | 28.54 | 72 | 9 | 418 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_147250989c59ac63_95ce0d7d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
41,
43
] | [
null,
null
] | [
7,
7
] | [
41,
41
] | |
2024-11-19T02:37:25.044996+00:00 | 1,599,401,538,000 | 85c3a26d71f00d80479461bc3333e33ea79acae9 | 3 | {
"blob_id": "85c3a26d71f00d80479461bc3333e33ea79acae9",
"branch_name": "refs/heads/master",
"committer_date": 1599401538000,
"content_id": "9ea43cd8dcc0a3e152b13bd339567ff0f0012529",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "98c8ab4f12903fbb10adac15c7044ad3d05c097b",
"extension": "py"... | 3.015625 | stackv2 | """
Generate PDF reports from data included in several Pandas DataFrames
From pbpython.com
based on https://pbpython.com/pdf-reports.html
"""
#from __future__ import print_function
import pandas as pd
import numpy as np
import argparse
from jinja2 import Environment, FileSystemLoader
from weasyprint import HTML
def c... | 65 | 40.34 | 95 | 15 | 612 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_34b51aa496b605ea_2d0e623a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
54
] | [
null
] | [
11
] | [
52
] | |
2024-11-19T02:49:47.244448+00:00 | 1,692,002,585,000 | 615d30b71be35e06c91822871b2bc2e51d8d91ed | 3 | {
"blob_id": "615d30b71be35e06c91822871b2bc2e51d8d91ed",
"branch_name": "refs/heads/master",
"committer_date": 1692002585000,
"content_id": "118a05ffc8e6306f113cc922c7bb6c00be2fed3e",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "fa89ef4a8eb06dc2015d7116637f230b6891eb8d",
"extension": "p... | 3.078125 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
import re
from refinery.units import Arg, Unit
class url(Unit):
"""
Decodes and encodes URL-Encoding, which preserves only alphanumeric characters and the symbols `_`, `.`, `-`, `~`, `\\`, and `/`.
Every other character is escaped by hex-encoding it and pref... | 43 | 30.16 | 133 | 17 | 360 | python | [{"finding_id": "codeql_py/overly-large-range_3beb86e81cefac3e_2b94f875", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in the same character class, and overlaps with a-z in the same character class."
] | [
35
] | [
null
] | [
41
] | [
44
] | |
2024-11-19T03:00:11.702724+00:00 | 1,591,101,492,000 | 291addd79f59ae540c698d2d33b080aae2a5d1ef | 3 | {
"blob_id": "291addd79f59ae540c698d2d33b080aae2a5d1ef",
"branch_name": "refs/heads/master",
"committer_date": 1591101492000,
"content_id": "5ca0bc9135340cd909bc986878798014765bbb6c",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "515d381afd5fc6f47833c018f14cfdf9e6d927f6",
"extension": "py",
... | 2.859375 | stackv2 | #
# Copyright (c) 2020 by Alexis LEBEL, BOUDRY Hugo and PEDROSA Théo. All Rights Reserved.
#
import csv
import hashlib
class CsvActions:
#Constructor
def __init__(self, path:str):
self.PATH = path
return None
def setPath(self, topath:str):
self.PATH = topath;
return None
... | 127 | 32.08 | 171 | 17 | 1,015 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_fefb4953aef7fa85_b470a464", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
74
] | [
null
] | [
33
] | [
50
] | |
2024-11-19T03:00:12.359793+00:00 | 1,607,634,193,000 | 21b8dea338dee12f8a556f05644d0cda0e51e047 | 3 | {
"blob_id": "21b8dea338dee12f8a556f05644d0cda0e51e047",
"branch_name": "refs/heads/master",
"committer_date": 1607634193000,
"content_id": "bd89f4aff617ca4cbf16865db75cf51675f4d66a",
"detected_licenses": [
"MIT"
],
"directory_id": "a6c3bef4df9bd267fa2476448f8e3558ee06a797",
"extension": "py",
"fi... | 3.109375 | stackv2 |
# Import necessary modules
from flask import Flask, request, jsonify
import pickle
import pandas as pd
import traceback
# Create an instance of Flask class
app = Flask(__name__)
# Use pickle to load in the pre-trained model.
with open('model_rf.pkl', 'rb') as m:
model_rf = pickle.load(m)
# Use pickle to load i... | 57 | 31.04 | 80 | 17 | 387 | python | [{"finding_id": "codeql_py/stack-trace-exposure_6fdfe29c903098dd_9007962f", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
50,
56
] | [
null,
null
] | [
28,
5
] | [
61,
24
] | |
2024-11-19T03:00:14.294540+00:00 | 1,404,837,727,000 | 14a9bdafcf44f02c4d403e4dffa94854bf76b6ab | 3 | {
"blob_id": "14a9bdafcf44f02c4d403e4dffa94854bf76b6ab",
"branch_name": "refs/heads/master",
"committer_date": 1404837727000,
"content_id": "12d8c4397968d51875b211170960efb5df267922",
"detected_licenses": [
"MIT"
],
"directory_id": "66e3dfdca3db768975dc62c46c5a52ffda51feda",
"extension": "py",
"fi... | 2.6875 | stackv2 | #-*- encoding: utf-8 -*-
"""
:Author: Arne Simon [arne.simon@slice-dice.de]
"""
import requests
from .config import Config
class AuthException(Exception):
pass
class Auth(object):
"""
This class wraps the Api user authorization interface.
:param credentials: The app credentials.
:param conf... | 103 | 31.85 | 97 | 17 | 713 | python | [{"finding_id": "codeql_py/request-without-cert-validation_3fb6f8bf40195184_2bac6ad4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
57
] | [
59
] | [
20
] | [
46
] | |
2024-11-19T03:00:22.734803+00:00 | 1,624,729,934,000 | 95145f4cdec775e839d15d392660b82dc60ccda6 | 3 | {
"blob_id": "95145f4cdec775e839d15d392660b82dc60ccda6",
"branch_name": "refs/heads/master",
"committer_date": 1624729934000,
"content_id": "a369af26729671f7acdc2fe8c4da420ad639381f",
"detected_licenses": [
"MIT"
],
"directory_id": "527595f5dea7cb3746c4b204798d02078a1dfeb1",
"extension": "py",
"fi... | 3.140625 | stackv2 | from Crypto.Cipher import AES
from Crypto.Util import Padding
def padding_func(data, size_b):
data_padded = Padding.pad(data, size_b)
return data_padded
def unpadding_func(data, size_b):
data_unpadded = Padding.unpad(data, size_b)
return data_unpadded
def aes_ecb_encrypt(data, key):
cipher = AES.... | 45 | 31.62 | 68 | 14 | 390 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_4ce17156da715dae_64ddfb00", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
14,
18
] | [
null,
null
] | [
12,
12
] | [
32,
32
] | |
2024-11-19T03:00:30.337492+00:00 | 1,549,856,614,000 | d293fd6bf7af6130b69c54d2294bfe191e712d55 | 2 | {
"blob_id": "d293fd6bf7af6130b69c54d2294bfe191e712d55",
"branch_name": "refs/heads/master",
"committer_date": 1549856614000,
"content_id": "428db11228756e2095555457d09041e5020b48b8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f6f95ff6e57e0f34fe4bde19425fad3640113373",
"extension": "py"... | 2.390625 | stackv2 | from flask_restful import request
import logging
from .utils import requires_auth, log_request
from .base import BaseResource
from ..services.utils import APIResponse
from runner_service import configuration
from ..utils import create_token
import datetime
logger = logging.getLogger(__name__)
class Login(BaseResourc... | 77 | 43.51 | 132 | 25 | 717 | python | [{"finding_id": "codeql_py/log-injection_40b95e2118543359_62eb4f4f", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
63,
68
] | [
null,
null
] | [
41,
29
] | [
110,
94
] | |
2024-11-19T03:00:30.858717+00:00 | 1,541,523,908,000 | 57320a5ecc08081e11ba2fbf016c7cfe15785f07 | 3 | {
"blob_id": "57320a5ecc08081e11ba2fbf016c7cfe15785f07",
"branch_name": "refs/heads/master",
"committer_date": 1541523908000,
"content_id": "7234e6c499bd8187c489ed37f15ccde9244ca164",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "73297a722d6bfc1d495786f28e8e5f1593c3f68b",
"extension": "py"... | 3.09375 | stackv2 | #_*_coding=UTF-8_*_
import zipfile
import argparse
import os
from os.path import *
def tryZipPwd(zipFile, password, savePath):
try:
zipFile.extractall(path=savePath, pwd=password.encode('utf-8'))
print('[+] Zip File decompression success,password: %s' % (password))
return True
except:
... | 51 | 30.57 | 89 | 18 | 393 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5de0c217b19d7358_47b29e6d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
10,
13
] | [
null,
null
] | [
15,
15
] | [
77,
76
] | |
2024-11-19T03:11:21.947582+00:00 | 1,543,420,427,000 | 752a26ea954c94e50d44a7908feac2dbec2fc7cf | 3 | {
"blob_id": "752a26ea954c94e50d44a7908feac2dbec2fc7cf",
"branch_name": "refs/heads/master",
"committer_date": 1543420427000,
"content_id": "0a07e8ecfa95d30559683b8fed954d7de72bd225",
"detected_licenses": [
"MIT"
],
"directory_id": "787ae2998a000091bddbd55d1e24ba56e4a117e0",
"extension": "py",
"fi... | 2.546875 | stackv2 | # -*- coding: utf-8 -*-
'''
multiprocessing crawler for jandan.net/ooxx
"pip install -r requirements.txt" and run it.
The line with notes is position you can control this script.
Have fun.
@author: B1u3Buf4
'''
import os
import re
import time
from multiprocessing import Process, Queue, Pool
import requests
from sel... | 94 | 27.64 | 103 | 15 | 694 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_692a02e907de94fb_40c5310d", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [jandan.net](1) may be at an arbitrary position in the ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [jandan.net](1) may be at an arbitrary position in the sanitized URL."
] | [
57
] | [
null
] | [
16
] | [
35
] | |
2024-11-19T03:12:36.346212+00:00 | 1,597,165,542,000 | 346d1c528c5b83eaabf9b95464f5e82ef629c951 | 2 | {
"blob_id": "346d1c528c5b83eaabf9b95464f5e82ef629c951",
"branch_name": "refs/heads/master",
"committer_date": 1597165542000,
"content_id": "c2dddcac30f4b198e6ba99e9197a317fa8de8046",
"detected_licenses": [
"MIT"
],
"directory_id": "8cf5404151bfdf5132d5feef56c216a58af29d3f",
"extension": "py",
"fi... | 2.421875 | stackv2 | import Preprocessor
import Trainer
import Predictor
import os
from flask import Flask, render_template, request, json, send_file
from werkzeug import secure_filename
import base64
app = Flask(__name__)
predictions = {"count": 0}
new_faces = 0
@app.route("/")
def home():
return "Server working fine"
@app.route(... | 85 | 32.22 | 82 | 17 | 655 | python | [{"finding_id": "codeql_py/path-injection_7cb84e7e09909d7d_7f6ed32e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
78
] | [
null
] | [
22
] | [
30
] | |
2024-11-19T03:12:37.868948+00:00 | 1,611,445,336,000 | efe87333e498197a707d19be85356b716021c41e | 4 | {
"blob_id": "efe87333e498197a707d19be85356b716021c41e",
"branch_name": "refs/heads/master",
"committer_date": 1611445336000,
"content_id": "15830007c598a7985515e41a08608980a2794ed4",
"detected_licenses": [
"MIT"
],
"directory_id": "220d1675123669aae6250b1f51e430731af0ddee",
"extension": "py",
"fi... | 4.21875 | stackv2 | # Crie um programa que simule o funcionamento de um caixa eletrônico
# No início, pergunte ao usuário qual será o valor a ser sacado (número inteiro) e o programa vai informar quantas cédulas de cada valor serão entregues
# OBS: Considere que o caixa possui cédulas de R$ 50, R$ 20, R$ 10 e R$ 1
from datetime import da... | 49 | 30.65 | 152 | 14 | 468 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c534b281c9a95995_49d20dfe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.\nThis expression logs [sensitive data (private)]... | [
24,
26
] | [
null,
null
] | [
19,
19
] | [
72,
73
] | |
2024-11-19T03:12:47.772347+00:00 | 1,532,142,375,000 | 21156a9c54e4aa265bd9adafa8af07b72b5b502c | 3 | {
"blob_id": "21156a9c54e4aa265bd9adafa8af07b72b5b502c",
"branch_name": "refs/heads/master",
"committer_date": 1532142375000,
"content_id": "736d5c81c05f575a6f1bdb47ed30b7df4b03ba31",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "afe04cd22c2a839668dd0f29c314cc4b35bc7345",
"extension": "py"... | 2.640625 | stackv2 | # coding: utf-8
import hashlib
import time
import urllib2
# 请替换appkey和secret
appkey = "235817354"
secret = "9dab67c52899767b69d31b0c8ef06ebd"
paramMap = {
"app_key": appkey,
"timestamp": time.strftime("%Y-%m-%d %H:%M:%S") # 如果你的程序在国外,请进行时区处理
}
# 排序
keys = paramMap.keys()
keys.sort()
codes = "%s%s%s" % (secre... | 42 | 23.83 | 94 | 11 | 376 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7c3c915a02b87389_dcc3aef2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
20
] | [
null
] | [
20
] | [
25
] | |
2024-11-19T03:25:36.465525+00:00 | 1,575,299,297,000 | 6afc138198c64184503ebdaaec66cc15bf58d864 | 3 | {
"blob_id": "6afc138198c64184503ebdaaec66cc15bf58d864",
"branch_name": "refs/heads/master",
"committer_date": 1575299297000,
"content_id": "580db76a7d4bc7b0d1ee014268e235791b4c48d2",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "5538f373989f3f0c66ced9d88351a4c5d60c53ec",
"extension": "p... | 2.546875 | stackv2 | import logging
import boto3
import types
from pymacaron_core.swagger.apipool import ApiPool
from pymacaron.config import get_config
from pymacaron.exceptions import PyMacaronException
from pymacaron.monitor import monitor
log = logging.getLogger(__name__)
db = None
def get_dynamodb():
global db
if not db:... | 248 | 29.39 | 159 | 18 | 1,744 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e44431c4ae0f6c57_ee615c45", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
21
] | [
null
] | [
18
] | [
159
] | |
2024-11-19T03:35:46.022607+00:00 | 1,423,883,470,000 | f2ff576d6af4c8cd22c4a1f498f6c0ea979094de | 2 | {
"blob_id": "f2ff576d6af4c8cd22c4a1f498f6c0ea979094de",
"branch_name": "refs/heads/master",
"committer_date": 1423883470000,
"content_id": "8c72fd837c7dfeb3aa336e8af5989d8bd464e414",
"detected_licenses": [
"MIT"
],
"directory_id": "b9bdcca4bbfccc385769089e65467b0d0d4ca392",
"extension": "py",
"fi... | 2.484375 | stackv2 | import time
from .base import BaseField, ObjectIdField
from .operations import String, Number, Common, List, Reference
from .exceptions import ValidationError
from .documents import Document
import re
import datetime
import copy
import functools
__all__ = ['ObjectIdField', 'GenericField', 'StringField', 'EmailField', ... | 423 | 32.49 | 133 | 25 | 2,992 | python | [{"finding_id": "codeql_py/redos_96c97ee969fe7915_b5d3d097", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\013'."
] | [
50
] | [
null
] | [
14
] | [
88
] | |
2024-11-19T01:28:41.773850+00:00 | 1,500,422,773,000 | 5c9bf1ca526995a6cc7c251c9b05e4005926d409 | 3 | {
"blob_id": "5c9bf1ca526995a6cc7c251c9b05e4005926d409",
"branch_name": "refs/heads/master",
"committer_date": 1500422773000,
"content_id": "eb6df24de1ebfc73472eb5e92e6a7151f65ea7fd",
"detected_licenses": [
"MIT"
],
"directory_id": "3a7af779e3b6a5a1a35cd4f1cc93d095bf7dbd23",
"extension": "py",
"fi... | 2.59375 | stackv2 | # -*- coding: utf-8 -*-
import paramiko
import logging
class SSHConn:
logger = logging.getLogger('scripts')
def __init__(self, hostname, port, username, password):
self.client = paramiko.SSHClient()
self.client.set_missing_host_key_policy(paramiko.AutoAddPolicy())
self.client.connect(hostname=hostname, port=... | 49 | 26.65 | 89 | 15 | 342 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_b63da216a25bbeb5_bd0952e2", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
11
] | [
null
] | [
3
] | [
68
] | |
2024-11-19T01:29:08.075925+00:00 | 1,397,727,216,000 | 69ac5abad6d03d4f64e4a03f81d4b4535d0b7cc7 | 2 | {
"blob_id": "69ac5abad6d03d4f64e4a03f81d4b4535d0b7cc7",
"branch_name": "refs/heads/master",
"committer_date": 1397727363000,
"content_id": "5a9d1662be54e0c374e8ec0ae6d07016e74adfcf",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "32327fcd0ebb5348aae388ae4cf42898da710189",
"extension": "py"... | 2.3125 | stackv2 | # -*- coding: utf-8 -*-
import string
import random
import json
import requests
from django.shortcuts import render_to_response, redirect
from django.template import RequestContext
from django.conf import settings
from django.contrib import messages
from swiftbrowser_swauth.forms import CreateUserForm, PasswordForm,... | 174 | 36.24 | 102 | 20 | 1,309 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b2a448da2bd7a6a0_c9e4b430", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 5 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
42,
83,
114,
141,
151
] | [
null,
null,
null,
null,
null
] | [
16,
20,
16,
16,
24
] | [
64,
68,
67,
72,
77
] | |
2024-11-19T01:29:28.902521+00:00 | 1,621,048,630,000 | b9ae57e4f893e72dd79770e591e171225feb933f | 3 | {
"blob_id": "b9ae57e4f893e72dd79770e591e171225feb933f",
"branch_name": "refs/heads/main",
"committer_date": 1621048630000,
"content_id": "563cb9af76ab6a2ac5bd7ff78f290926dd1f78fe",
"detected_licenses": [
"MIT"
],
"directory_id": "fbc5eb311ad446be9f5865d20504a591d95158fc",
"extension": "py",
"file... | 2.609375 | stackv2 | from flask import request, render_template
from flask.json import jsonify
from neural_network import neural_network
import requests
from app import app
neural_network = neural_network();
types = ['T-Shirt', 'Pants', 'Pullover', 'Dress', 'Coat', 'Sandel'
'Shirt', 'Sneaker', "Bag", 'Ankle boot']
@app.route('/api/... | 27 | 27.44 | 66 | 14 | 194 | python | [{"finding_id": "codeql_py/full-ssrf_ec8457b650175412_630dc5ef", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
15
] | [
null
] | [
7
] | [
40
] | |
2024-11-19T01:29:29.964318+00:00 | 1,622,832,276,000 | 9a37f0b43db9054f1b51386bd13a500f47f6966b | 3 | {
"blob_id": "9a37f0b43db9054f1b51386bd13a500f47f6966b",
"branch_name": "refs/heads/main",
"committer_date": 1622832276000,
"content_id": "c8aa42ea712fc6f70ef14e2d653d7c259ea9c7de",
"detected_licenses": [
"MIT"
],
"directory_id": "ea63d3620a093f06df02ccb567d1358f45e8d38a",
"extension": "py",
"file... | 2.578125 | stackv2 | """
Unity3D Lidar Simulation - Kafka connector.
"""
import json
from kafka import KafkaProducer
from fastapi import FastAPI, Request
app = FastAPI()
producer = KafkaProducer(value_serializer=lambda m: json.dumps(m).encode('ascii'), bootstrap_servers=["localhost:9092"])
processed_points = set()
@app.post("/")
async d... | 25 | 30.68 | 120 | 16 | 170 | python | [{"finding_id": "codeql_py/code-injection_6dc0cb34e3a60d1e_3ee77bf3", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-094"
] | [
"py/code-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1)."
] | [
22
] | [
null
] | [
24
] | [
39
] | |
2024-11-19T01:29:32.814864+00:00 | 1,493,911,846,000 | 3bcf7cac00fce89783602cc93548a0b67b618247 | 3 | {
"blob_id": "3bcf7cac00fce89783602cc93548a0b67b618247",
"branch_name": "refs/heads/master",
"committer_date": 1493911846000,
"content_id": "c614def474618e4cfd44656662d9ea7ab137c150",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "1fa54da06863525b65cf31aad999116edb493533",
"extension": "p... | 2.5625 | stackv2 | #!/usr/bin/env python3
import requests, re, os, time, signal, sys, argparse
tl = os.path.expanduser("~") + '/.threadlist'
parser = argparse.ArgumentParser(description='4chan thread image downloader.')
parser.add_argument('-a', '--add', help='Adds url to thread list.', nargs=1, action='store', dest='add', metavar='URL')... | 112 | 37.6 | 163 | 30 | 1,148 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_af15a39ebd981884_b6de9a36", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before '(?:i.4cdn|is\\[0-9\\]?.4chan).org/'... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before '(?:i.4cdn|is\\[0-9\\]?.4chan).org/', so it might match more hosts than expected."
] | [
104
] | [
null
] | [
49
] | [
136
] | |
2024-11-19T01:30:15.097241+00:00 | 1,552,414,634,000 | c8be62873f1fe3106ddcf5196679a16f5a7e9aed | 4 | {
"blob_id": "c8be62873f1fe3106ddcf5196679a16f5a7e9aed",
"branch_name": "refs/heads/master",
"committer_date": 1552414634000,
"content_id": "4a20e55b58c0666dfd5791291a482f767bdc0a5f",
"detected_licenses": [
"MIT"
],
"directory_id": "1bdf5ef22f0a4dd3a6d9294d02b05be88ce0f536",
"extension": "py",
"fi... | 4.25 | stackv2 | def budget():
salary = float(input("Please input your salary: "))
monthly_income = round(salary/12, 2)
print("Your monthly income is:", monthly_income)
print()
housing = round(monthly_income * .25, 2)
transport = round(monthly_income * .15, 2)
food = round(monthly_income * .12, 2)
savin... | 32 | 31.78 | 103 | 14 | 284 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_12a089f933844b3d_fcd75b23", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
24,
30
] | [
null,
null
] | [
22,
27
] | [
29,
32
] | |
2024-11-19T01:30:24.920031+00:00 | 1,526,301,686,000 | 6c1792e54115ecb978e70afcb83948bdafcae03e | 3 | {
"blob_id": "6c1792e54115ecb978e70afcb83948bdafcae03e",
"branch_name": "refs/heads/master",
"committer_date": 1526301686000,
"content_id": "74273312831d6f79fd7d2539bb5270ed9fddb372",
"detected_licenses": [
"MIT"
],
"directory_id": "cc9185d8736e48d9413d9d3c0eb6a9e1330db0a2",
"extension": "py",
"fi... | 2.59375 | stackv2 | """
pymake
-------------------------------
- Eugenio Marinetto
- nenetto@gmail.com
-------------------------------
Created 08-05-2018
"""
import json
import re
import copy
import pkg_resources
import os
from inspect import getmembers, isfunction
from pymake.utils.common.prettymessaging import PrettyMessaging
def j... | 135 | 27.63 | 88 | 19 | 908 | python | [{"finding_id": "codeql_py/redos_00a94cca960399ba_aff8d5b8", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '{{a' and containing many repetiti... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '{{a' and containing many repetitions of '-'."
] | [
86
] | [
null
] | [
41
] | [
47
] | |
2024-11-19T01:54:59.693760+00:00 | 1,619,283,584,000 | ffdb4a967da48432b9dea20488572034f97857f2 | 2 | {
"blob_id": "ffdb4a967da48432b9dea20488572034f97857f2",
"branch_name": "refs/heads/main",
"committer_date": 1619283584000,
"content_id": "909b2e3bedab5ab6ca2342a9f924dbf56ebc3b3e",
"detected_licenses": [
"MIT"
],
"directory_id": "eae730ffe453d54561dd5694257b470f476ae596",
"extension": "py",
"file... | 2.328125 | stackv2 | from PyQt5.QtWidgets import (QLabel)
from PyQt5.QtCore import (Qt, QRect, QThread)
from PyQt5.QtGui import (QPen, QColor, QFont, QBrush, QPainter, QFontMetricsF)
from .PicWindow import PicWindow
from PIL import Image, ImageQt
from io import BytesIO
import requests
import re
import time
class TMessageLabel(QLabel):
... | 204 | 40.4 | 167 | 25 | 2,152 | python | [{"finding_id": "codeql_py/overly-large-range_697f856a267ccca7_9f478770", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
43
] | [
null
] | [
45
] | [
48
] | |
2024-11-19T01:55:12.205634+00:00 | 1,387,673,139,000 | 445a14a0346a870af65f02f89d44c996f2589602 | 3 | {
"blob_id": "445a14a0346a870af65f02f89d44c996f2589602",
"branch_name": "refs/heads/master",
"committer_date": 1387673139000,
"content_id": "08daf94f094bc30fa27e9d0d2df77e8cdd0df30a",
"detected_licenses": [
"MIT"
],
"directory_id": "93ce332f72e8bb5362f8434f0e98087e3ac46194",
"extension": "py",
"fi... | 2.5625 | stackv2 | """server_web.py, web interface for the logs.
"""
__author__ = "Jean-Martin Archer"
__copyright__ = "Copyright 2013, MIT License."
from os import listdir, path
from functools import wraps
import re
from flask import Flask, request, Response, render_template, Markup, url_for
import configuration
app = Flask('HTTP')
... | 88 | 29.05 | 102 | 16 | 611 | python | [{"finding_id": "codeql_py/path-injection_353e3d4ca01c0593_48dc0d3c", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
54
] | [
null
] | [
15
] | [
20
] | |
2024-11-19T01:55:21.518201+00:00 | 1,494,574,128,000 | f2a697da5b273609fb8cd9a547d5f6d6607ae48b | 2 | {
"blob_id": "f2a697da5b273609fb8cd9a547d5f6d6607ae48b",
"branch_name": "refs/heads/master",
"committer_date": 1494574128000,
"content_id": "ef53ab7787ebc860e521ac50cd39a063c589fc2a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6a0ec23dc7fbd9637dec95d6c756e1287da9ee90",
"extension": "py"... | 2.46875 | stackv2 | ''' @Summary: API endpoint for accessing facial recognition services through MSFT Engine '''
from flask_restful import Resource, reqparse
from api import login_required
from api.sql.models import * #import all of the models from models.py
from flask import send_file, request
import os, uuid, imghdr, time
from .MSFTFa... | 85 | 42.38 | 141 | 17 | 1,021 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1072396c4d8840c6_3499ec5f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-022",
"CWE-022"
] | [
"py/clear-text-logging-sensitive-data",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).\nThis path depends on a [user-provided value](3).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided v... | [
13,
19,
83
] | [
null,
null,
null
] | [
41,
30,
30
] | [
74,
141,
123
] | |
2024-11-19T01:55:24.983962+00:00 | 1,550,422,458,000 | 21f2e46891b6a19f2a478367b74bd323c1938266 | 3 | {
"blob_id": "21f2e46891b6a19f2a478367b74bd323c1938266",
"branch_name": "refs/heads/master",
"committer_date": 1550422458000,
"content_id": "684d79066833e18eb64dd0a8bb0d5e7fc96bcf49",
"detected_licenses": [
"MIT"
],
"directory_id": "01d58dde8c2e0066cafde29cf3a2d06290a03c73",
"extension": "py",
"fi... | 2.90625 | stackv2 | import requests
import json
import sys
# All things that will remain constant
apiKey = '5d40f2852229ce9f706e44f3ed93dad1'
# METHODS ----------------------------------------------------------------------------
#=======================================This method returns a first and last name from just a first name==... | 200 | 26.59 | 126 | 14 | 1,505 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0c4011559a9f8488_6bb3473b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensi... | [
188,
190,
192,
194,
196
] | [
null,
null,
null,
null,
null
] | [
8,
8,
8,
8,
8
] | [
34,
34,
64,
63,
59
] | |
2024-11-19T02:06:44.730372+00:00 | 1,633,877,980,000 | 456687c81bd5fd1b11a6aca6733964feed11865c | 3 | {
"blob_id": "456687c81bd5fd1b11a6aca6733964feed11865c",
"branch_name": "refs/heads/main",
"committer_date": 1633877980000,
"content_id": "90ce578c035b2163fcca9ffe7778b7c0051fef22",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "fc38ee2d842fdde4b9c8c5a164fe0a144c442688",
"extension": "py"... | 2.640625 | stackv2 | # -*- coding: utf-8 -*-
#!/usr/bin/python
import os
from datetime import datetime,timedelta
import pandas as pd
import smtplib
from tabulate import tabulate
import tabulate
tabulate.PRESERVE_WHITESPACE = True
from dotenv import load_dotenv
load_dotenv()# look for a file named .env in the current directory and will a... | 101 | 24.69 | 147 | 14 | 730 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_536a0e9ec3f5d917_917f1b8a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
18
] | [
null
] | [
15
] | [
25
] | |
2024-11-19T02:06:55.402943+00:00 | 1,571,791,428,000 | 038fbad3be60b433fbd8da9f696a741b946dc322 | 2 | {
"blob_id": "038fbad3be60b433fbd8da9f696a741b946dc322",
"branch_name": "refs/heads/master",
"committer_date": 1572475766000,
"content_id": "6c06ea60a23be4d0479504cdcc591ab90dd80a96",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cbc0bfb03e5b5ea32d2883a4e2b0bcf885b628dc",
"extension": "py"... | 2.4375 | stackv2 | import html
import logging
import os
import subprocess
from html.entities import html5, name2codepoint
import regex as re
from subword_nmt.apply_bpe import BPE
class Preprocessor(object):
def __init__(self, bpe_code_file):
super(Preprocessor, self).__init__()
symbols = ''
symbol_set = se... | 135 | 35.62 | 118 | 16 | 1,334 | python | [{"finding_id": "codeql_py/overly-permissive-file_3bd8248df3a31663_6375e367", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable.",
"Overly permissive mask in chmod sets file to world readable."
] | [
83,
129
] | [
null,
null
] | [
13,
9
] | [
31,
37
] | |
2024-11-19T02:07:23.603301+00:00 | 1,682,626,122,000 | 209281e721705997078240892df19adf8485c95a | 3 | {
"blob_id": "209281e721705997078240892df19adf8485c95a",
"branch_name": "refs/heads/master",
"committer_date": 1682628672000,
"content_id": "854ba017e08e11dc5f7549536c71e1a4899f9100",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "b3e35e48003af5b53a2f884386af9bfb75ececf5",
"extension": "p... | 2.65625 | stackv2 | import yaml
from jinja2 import Environment, FileSystemLoader
import pathlib
import contextlib
import io
from functools import wraps
import logging
import os
def render_yaml_template(template_name, servers_path, vars={}):
"""
Function in charge of generating file content based on:
- a template file name, th... | 106 | 37.19 | 112 | 16 | 900 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_df836130592a9dd7_8334ac5e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
28,
52
] | [
null,
null
] | [
11,
11
] | [
60,
60
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.