added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T02:07:38.136168+00:00 | 1,575,584,390,000 | 6382ee8b5499bca11d3452d15b233c56b8282543 | 3 | {
"blob_id": "6382ee8b5499bca11d3452d15b233c56b8282543",
"branch_name": "refs/heads/master",
"committer_date": 1575584390000,
"content_id": "1372929c260cf1a0f09b6dd2c8de0b16edd19361",
"detected_licenses": [
"MIT"
],
"directory_id": "3fbad9e3e1256008af05e90bb2a587ca74dced0c",
"extension": "py",
"fi... | 2.71875 | stackv2 | """A bunch of api calls functions that we used to talk to MTurk.
"""
from boto3 import Session
from datetime import datetime
from jinja2 import Environment
from jinja2 import FileSystemLoader
import json
import os
import xml
class EasyTurk(object):
"""Class that contains all the api calls to interface with MTur... | 370 | 36.79 | 90 | 18 | 2,652 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d24abdc264fbe926_d6fa0273", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
57
] | [
null
] | [
16
] | [
63
] | |
2024-11-19T02:32:44.349943+00:00 | 1,593,522,068,000 | 6f08744f8b93cd157f4ea6e6b2fc0b9c58c0ae10 | 3 | {
"blob_id": "6f08744f8b93cd157f4ea6e6b2fc0b9c58c0ae10",
"branch_name": "refs/heads/master",
"committer_date": 1593522068000,
"content_id": "8e2cb0fb8726b6438c0a29483f6345fcbe8b1b2a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d11e4440b1e3dd659344e78cc2b9839f77bd31a1",
"extension": "py"... | 2.71875 | stackv2 | from flask import Flask, jsonify, request
app = Flask(__name__)
@app.route('/')
def hello():
return jsonify(message='Hello from Server')
@app.route('/user')
def user():
name = request.args.get('name')
return '<h1>Hello ' + name + '</h1>'
@app.route('/not_found')
def no_resource():
return jsonify(... | 32 | 18.66 | 73 | 14 | 165 | python | [{"finding_id": "codeql_py/flask-debug_b14189d44569b96f_293b016c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
32,
14
] | [
null,
null
] | [
5,
12
] | [
35,
41
] | |
2024-11-19T02:32:47.252374+00:00 | 1,572,273,821,000 | d11aaeb9d363230e0e09c8329afc7ad7b2235f20 | 2 | {
"blob_id": "d11aaeb9d363230e0e09c8329afc7ad7b2235f20",
"branch_name": "refs/heads/master",
"committer_date": 1572273821000,
"content_id": "b2d19ad13261682d3b30dc5c884caac9bfd4e31a",
"detected_licenses": [
"MIT"
],
"directory_id": "0f6468e644b9d6b825fc895f2b883b746a1af7d3",
"extension": "py",
"fi... | 2.375 | stackv2 | import hashlib
import requests
import logging
from requests.auth import HTTPBasicAuth, HTTPDigestAuth
#from ddf_manager.ddf_logger import *
from .exceptions import NotLoggedIn, MissingVersion, HTTPException, RETSException, MaxrowException
from .parsers.get_object import MultipleObjectParser
from .parsers.get_object i... | 442 | 39.89 | 120 | 22 | 3,747 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_c29c3ee76d8a020c_3e67e23b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) t... | [
438,
441
] | [
null,
null
] | [
26,
30
] | [
34,
40
] | |
2024-11-19T02:32:49.911987+00:00 | 1,366,531,599,000 | dc2cdd3d60bc30b11747470fc97b61e78351e330 | 2 | {
"blob_id": "dc2cdd3d60bc30b11747470fc97b61e78351e330",
"branch_name": "refs/heads/master",
"committer_date": 1366531599000,
"content_id": "abf7ac8f997b2fbd8c237b473046f57d262b561c",
"detected_licenses": [
"MIT"
],
"directory_id": "6cfdff1798f725f4781eb0c3978f7f38331230cc",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/env python
"""\
Hello Redis Tasks
A quick example of how to use Redis as a task queue.
"""
import logging.config
import os
from functools import update_wrapper, wraps
from redis import Redis, ConnectionError
from flask import Flask, render_template, abort, request, session, abort, redirect, url_for, flash, ... | 238 | 29.69 | 128 | 16 | 1,853 | python | [{"finding_id": "codeql_py/request-without-cert-validation_7cf7abb1b0896dbe_31d173f2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
112,
129,
139
] | [
null,
null,
null
] | [
12,
9,
13
] | [
73,
55,
59
] | |
2024-11-19T02:32:58.109270+00:00 | 1,693,315,090,000 | 7a71399b3136204b9fad079d2beee06353bef713 | 4 | {
"blob_id": "7a71399b3136204b9fad079d2beee06353bef713",
"branch_name": "refs/heads/master",
"committer_date": 1693315090000,
"content_id": "4ff90be009c1bb3961f2a11dbe95a70746a47f22",
"detected_licenses": [
"MIT"
],
"directory_id": "9ed4d46aedd4d4acadb48d610e940594b5b7b3fd",
"extension": "py",
"fi... | 3.71875 | stackv2 | from __future__ import annotations
def find_primitive(n: int) -> int | None:
for r in range(1, n):
li = []
for x in range(n - 1):
val = pow(r, x, n)
if val in li:
break
li.append(val)
else:
return r
return None
if __name... | 32 | 27.75 | 64 | 14 | 240 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d7848c0197d7d0ec_12c34b3e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
31,
32
] | [
null,
null
] | [
52,
52
] | [
60,
60
] | |
2024-11-19T02:43:30.831962+00:00 | 1,679,278,623,000 | f556cc6e275b0cf1006f00b4dc5e5d700bcb2b23 | 3 | {
"blob_id": "f556cc6e275b0cf1006f00b4dc5e5d700bcb2b23",
"branch_name": "refs/heads/master",
"committer_date": 1679278623000,
"content_id": "7966fa1ca2339b326e3e14711217a2d9e5b3eb5b",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "679b701d8f80807ecd13300d8d5cf17cdb4c2e2a",
"extension": "p... | 2.515625 | stackv2 | """
Form fields for composite types
Takes inspiration from django.forms.MultiValueField/MultiWidget.
"""
import copy
import logging
from django import forms
from django.contrib.postgres.utils import prefix_validation_error
from django.utils.translation import gettext as _
from . import CompositeType
LOGGER = loggi... | 208 | 29.64 | 88 | 23 | 1,294 | python | [{"finding_id": "codeql_py/log-injection_2cf802a0a69653bb_868da270", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
97
] | [
null
] | [
37
] | [
42
] | |
2024-11-19T02:54:53.543047+00:00 | 1,584,501,916,000 | 5f03cc7486646600557a8cb178e5330eaad31ab5 | 2 | {
"blob_id": "5f03cc7486646600557a8cb178e5330eaad31ab5",
"branch_name": "refs/heads/master",
"committer_date": 1584501916000,
"content_id": "d7ba55745c86aec45873caa183a8a764967d7761",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "40ca66a25f5d9278ace89357e98bc44be4190dec",
"extension": "py"... | 2.46875 | stackv2 | import logging
import os
import shutil
import cssmin
import htmlmin
import jinja2
import jsmin
def copy_icons(args):
logging.info('Copying icons')
icons_dir = os.path.join(args.output_dir, 'images', 'icons')
os.makedirs(icons_dir)
for icon in [
'github',
'edit',
'external-link... | 88 | 30.08 | 90 | 18 | 569 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d955a0de9cfb3108_e1a41784", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
28
] | [
31
] | [
11
] | [
6
] | |
2024-11-19T02:55:09.902283+00:00 | 1,603,062,029,000 | 3da9a16566b8d5b596ed0ffb50572b8d8856642a | 3 | {
"blob_id": "3da9a16566b8d5b596ed0ffb50572b8d8856642a",
"branch_name": "refs/heads/master",
"committer_date": 1603062029000,
"content_id": "335d37a4fa37769ca2fadba0c01c6a366510c181",
"detected_licenses": [
"MIT"
],
"directory_id": "fab5d65a6b49a30c8bcdd6c87c3d8532095ec6c3",
"extension": "py",
"fi... | 2.59375 | stackv2 | from . import auth_blueprint
from flask.views import MethodView
from flask import make_response, request, jsonify
from app.models import User
import secrets
class RegistrationView(MethodView):
""" This class registers a new user"""
def post(self):
user = User.query.filter_by(account=request.data['... | 231 | 32.99 | 90 | 20 | 1,421 | python | [{"finding_id": "codeql_py/stack-trace-exposure_3054d29eb61c9fcb_985ab333", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
44,
115,
163,
204
] | [
null,
null,
null,
null
] | [
46,
42,
42,
42
] | [
54,
50,
50,
50
] | |
2024-11-19T02:55:53.075841+00:00 | 1,650,571,729,000 | bf08f604cc3968eecafa8dc0e4e017bbaa18f54d | 3 | {
"blob_id": "bf08f604cc3968eecafa8dc0e4e017bbaa18f54d",
"branch_name": "refs/heads/master",
"committer_date": 1650571729000,
"content_id": "4c4f1c88c2efb15ac7969f7c847a9a3727506bd1",
"detected_licenses": [
"MIT"
],
"directory_id": "57471e22e4478728bf3d602547f4a52398db3ec4",
"extension": "py",
"fi... | 3.046875 | stackv2 | from flask import Flask
app = Flask(__name__)
@app.route('/')
def hello():
greet = '<h1>Hello, Gators!</h1>'
link = '<p><a href="user/Albert">Click me!</a></p>'
return greet + link
@app.route('/user/<name>')
def user(name):
personal = f'<h1>Hello, {name}!</h1>'
instruc = '<p>Change the name in the... | 17 | 25.94 | 95 | 9 | 133 | python | [{"finding_id": "codeql_py/flask-debug_a72bce26a6034f60_ad7fbf8d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
17,
14
] | [
null,
null
] | [
5,
12
] | [
24,
30
] | |
2024-11-19T03:10:22.435109+00:00 | 1,622,050,384,000 | 7af2f4e67f113b4b18bfc7acc797fa1fd65341a2 | 2 | {
"blob_id": "7af2f4e67f113b4b18bfc7acc797fa1fd65341a2",
"branch_name": "refs/heads/master",
"committer_date": 1622050384000,
"content_id": "80ff24b6c13b2f5f9c6c1f4dd5278b16d6de2703",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ec927712164a99136b35e6ac6a88a2e3dd005c45",
"extension": "py"... | 2.453125 | stackv2 | import logging, time, json, urllib, socket
from datetime import datetime
logger = logging.getLogger(__name__)
logger.setLevel(logging.DEBUG)
class Prey():
terminate = False
online = True
apikey = None
deviceId = None
deviceName = None
baseURL = 'https://api.preyproject.com/v1'
interval = 5
lastLook... | 126 | 29.62 | 102 | 21 | 852 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d54bd40a90b0e1e0_9c5168e9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
121
] | [
null
] | [
20
] | [
28
] | |
2024-11-19T03:10:27.499276+00:00 | 1,518,972,783,000 | 1557a06dd05bccb5598a8be00f42b42ebd6f97a6 | 3 | {
"blob_id": "1557a06dd05bccb5598a8be00f42b42ebd6f97a6",
"branch_name": "refs/heads/master",
"committer_date": 1518972783000,
"content_id": "7eb7e592d8d17427d384231f41f6925ac47513e4",
"detected_licenses": [
"MIT"
],
"directory_id": "0e9c98a6a4ccea5e5c6eb8dbfcacb106637f6414",
"extension": "py",
"fi... | 2.578125 | stackv2 | import time
import os
from mediaviewer.log import log
from mysite.settings import (API_KEY,
OMDBAPI_KEY,
IMAGE_PATH,
REQUEST_TIMEOUT,
)
import requests
def getJSONData(url):
try:
url = url.re... | 223 | 34.42 | 143 | 17 | 2,040 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d09563234b61a6fb_9b7e73b4", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
110
] | [
null
] | [
33
] | [
38
] | |
2024-11-19T03:10:53.476720+00:00 | 1,600,983,829,000 | b84b68538681c06bc8a416bb82ef99f986e564f5 | 2 | {
"blob_id": "b84b68538681c06bc8a416bb82ef99f986e564f5",
"branch_name": "refs/heads/master",
"committer_date": 1600983829000,
"content_id": "164b32b42ece35ac3b95237f68166aed7ca016e1",
"detected_licenses": [
"MIT"
],
"directory_id": "38a44085558dc8e7ba1d2a724bc2fc4bca67eecb",
"extension": "py",
"fi... | 2.390625 | stackv2 | """Jinja2 environment getters
"""
from jinja2 import Environment, FileSystemLoader
from .filters import gen_id
def __make_env(include_paths):
env = Environment(
loader=FileSystemLoader(include_paths)
)
env.filters['genid'] = gen_id
return env
def get_env(include_paths=None):
"""Get Jinja... | 20 | 23.05 | 58 | 11 | 115 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8cf3c7e6d34105c0_bc441046", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
9
] | [
11
] | [
11
] | [
6
] | |
2024-11-19T03:10:56.629960+00:00 | 1,591,471,698,000 | 5c37db8abe210af8c06c9c769bdd7a1744764ddc | 2 | {
"blob_id": "5c37db8abe210af8c06c9c769bdd7a1744764ddc",
"branch_name": "refs/heads/master",
"committer_date": 1591471698000,
"content_id": "135e5354b7ee0dc39e428944d843f840fe0602ed",
"detected_licenses": [
"MIT",
"Apache-2.0"
],
"directory_id": "6bbbb8237c93f9b1f302010a65d6ecb6f286f23b",
"exten... | 2.375 | stackv2 | """User friend CSRF error page."""
# Standard Library
import logging
# Pyramid
from pyramid.exceptions import BadCSRFToken
from pyramid.renderers import render
from pyramid.response import Response
from pyramid.view import view_config
# Websauna
from websauna.system.http import Request
logger = logging.getLogger(__... | 37 | 29.08 | 158 | 10 | 258 | python | [{"finding_id": "codeql_py/log-injection_a637de3f264a724a_383e4599", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
25,
25
] | [
null,
null
] | [
112,
140
] | [
131,
158
] | |
2024-11-19T03:22:06.937252+00:00 | 1,632,898,290,000 | 291268fc99b156d80fb24ce2a9b67a962ca32097 | 2 | {
"blob_id": "291268fc99b156d80fb24ce2a9b67a962ca32097",
"branch_name": "refs/heads/master",
"committer_date": 1632898290000,
"content_id": "6229240e53b3486dfa2a8ff556fa918cc2e5c0ba",
"detected_licenses": [
"MIT"
],
"directory_id": "933ffbc470030abc0a443e879dee66ca1305544e",
"extension": "py",
"fi... | 2.3125 | stackv2 | from traceback import format_exc
from django.http import Http404
from django.core.exceptions import PermissionDenied
from rest_framework.exceptions import MethodNotAllowed, NotAcceptable
from .apis.base import BaseApiExp
from rest_framework.response import Response
from rest_framework.status import HTTP_500_INTERNAL_SE... | 42 | 35.95 | 73 | 13 | 338 | python | [{"finding_id": "codeql_py/stack-trace-exposure_aecd7ce7eadea074_c818300d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
42
] | [
null
] | [
30
] | [
34
] | |
2024-11-19T03:43:56.015575+00:00 | 1,549,822,526,000 | 240ad2109e030121424f5fa9478eabec33624b1f | 2 | {
"blob_id": "240ad2109e030121424f5fa9478eabec33624b1f",
"branch_name": "refs/heads/master",
"committer_date": 1549822557000,
"content_id": "0ce548b2c08734797a5f11f84e65025bbb0b001c",
"detected_licenses": [
"MIT"
],
"directory_id": "a801dd999c5b29fa587ec8c20beb914a9e91df6d",
"extension": "py",
"fi... | 2.375 | stackv2 | from flask import Flask, request, jsonify
import configparser
import logging
import sys
import os
from deepcubes.embedders import LocalEmbedder
logger = logging.getLogger("EmbedderService")
logger.setLevel(logging.INFO)
# create the logging file handler
handler = logging.FileHandler("scripts/logs/embedder_service.lo... | 76 | 29.3 | 75 | 17 | 495 | python | [{"finding_id": "codeql_py/log-injection_8c17b5e6e6f56716_46a50783", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
47,
52,
62
] | [
null,
null,
null
] | [
26,
21,
25
] | [
75,
62,
61
] | |
2024-11-19T03:44:01.822366+00:00 | 1,685,870,376,000 | 02f19061d40ce236cc519dbe4f9be131d12bc32c | 2 | {
"blob_id": "02f19061d40ce236cc519dbe4f9be131d12bc32c",
"branch_name": "refs/heads/master",
"committer_date": 1685870376000,
"content_id": "0ae177b574b626056097c59ad06a328ce109e4d9",
"detected_licenses": [
"MIT"
],
"directory_id": "873b3289e7e2c5945687454d01214db3290a4240",
"extension": "py",
"fi... | 2.4375 | stackv2 | import requests
from bs4 import BeautifulSoup
import sys
username = "" # Fill it
passwd = "" # Fill it
session = requests.Session()
url = 'https://atcoder.jp/login'
r = session.get(url, verify = False)
soup = BeautifulSoup(r.text, features="lxml")
_csrf = soup.find("input", attrs={"name": "csrf_token"})["value"]
... | 49 | 20.88 | 65 | 11 | 324 | python | [{"finding_id": "codeql_py/request-without-cert-validation_8c8efe58fed7528f_f7b96658", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
12,
23,
30,
46
] | [
null,
null,
null,
null
] | [
5,
5,
5,
5
] | [
37,
48,
37,
48
] | |
2024-11-19T03:44:12.412359+00:00 | 1,615,650,148,000 | 3e4c7a4da638909407b0412c0a1be54108cfdb25 | 3 | {
"blob_id": "3e4c7a4da638909407b0412c0a1be54108cfdb25",
"branch_name": "refs/heads/master",
"committer_date": 1615650168000,
"content_id": "c3c80929027e3f1f899969d905d507a8856479d5",
"detected_licenses": [
"Unlicense"
],
"directory_id": "e79af1d5d0d7c3140963e5ae1a9725d668b30ef5",
"extension": "py",... | 3 | stackv2 | import requests
api_url = 'https://srb2circuit.eu/highscores/api/'
num_plays = requests.get(api_url + 'num_plays', verify=False).json()
maps = requests.get(api_url + 'maps?in_rotation', verify=False).json()
maps = sorted(maps, key=lambda map:int(map['votes']), reverse=True)
map_dict = {}
for i, m in enumerate(maps)... | 42 | 31.38 | 94 | 13 | 406 | python | [{"finding_id": "codeql_py/request-without-cert-validation_69945bf46c4f04ab_e9a15059", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
5,
7
] | [
null,
null
] | [
13,
8
] | [
62,
64
] | |
2024-11-19T03:44:18.177032+00:00 | 1,604,921,655,000 | fa377dc6f03fc2def398d84a04f2e5f00a8fd193 | 3 | {
"blob_id": "fa377dc6f03fc2def398d84a04f2e5f00a8fd193",
"branch_name": "refs/heads/master",
"committer_date": 1604921655000,
"content_id": "4299b892fd31d79851a477119145679a877f36f3",
"detected_licenses": [
"MIT"
],
"directory_id": "b4df4985a3937b84ba5da7c6066fcd513fe1d679",
"extension": "py",
"fi... | 3.15625 | stackv2 | #! /usr/bin/python3
from Crypto.Cipher import AES
import base64
# https://www.cryptopals.com/sets/1/challenges/7
# AES in ECB mode
# wget https://www.cryptopals.com/static/challenge-data/7.txt --no-check-certificate
def main():
obj = AES.new('YELLOW SUBMARINE', AES.MODE_ECB)
with open("7.txt") as f:
... | 23 | 20.04 | 84 | 14 | 135 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_6ec0493e9152ccdf_f113abf8", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
20
] | [
null
] | [
17
] | [
40
] | |
2024-11-19T01:44:08.698496+00:00 | 1,624,552,129,000 | 85e92534ec4c3ee10889e92a2ef92fa4eec2de93 | 4 | {
"blob_id": "85e92534ec4c3ee10889e92a2ef92fa4eec2de93",
"branch_name": "refs/heads/main",
"committer_date": 1624552129000,
"content_id": "d8169778767e28a0b35ff13b9a5242f600fc4186",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7f75fb1376e50475357e1bcdf91ae340639de334",
"extension": "py",
... | 3.921875 | stackv2 | from datetime import datetime
class Employee:
company = 'Google'
def getSalary(self, signature):
print (f'Salary for {self.name} working in {self.company} is {self.salary}\n{signature}' )
@staticmethod
def greet():
print ('Good Morning, Sir!')
@staticmethod
def time():
... | 24 | 21.38 | 98 | 12 | 138 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aeefa711cf6ce704_ab46cc44", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
7
] | [
null
] | [
16
] | [
97
] | |
2024-11-19T02:08:19.621610+00:00 | 1,602,163,362,000 | 26e94dbe072b86379124c19d5de1c66a3952b404 | 2 | {
"blob_id": "26e94dbe072b86379124c19d5de1c66a3952b404",
"branch_name": "refs/heads/master",
"committer_date": 1602163362000,
"content_id": "2603838d7675a8b0d17522a7322498f35929785f",
"detected_licenses": [
"Unlicense"
],
"directory_id": "dafb0296082fb91c993dd949704df02c71007f78",
"extension": "py",... | 2.5 | stackv2 | from datetime import datetime, timedelta
import time as mod_time
import json
from jinja2 import Environment, PackageLoader
import smtplib
from email.mime.text import MIMEText
import argparse
jinja_env = Environment(loader=PackageLoader('price_monitor', 'templates'))
def main(args):
filename = "data/" + datetime.n... | 58 | 31.45 | 80 | 14 | 439 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_51144e97fbafe070_6e309b2e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
9
] | [
null
] | [
13
] | [
76
] | |
2024-11-19T02:08:39.354569+00:00 | 1,547,786,130,000 | 287cccc36417bc7486ea497143387f34f4d7a911 | 3 | {
"blob_id": "287cccc36417bc7486ea497143387f34f4d7a911",
"branch_name": "refs/heads/master",
"committer_date": 1547786130000,
"content_id": "47f3bbf7e464c22023edeffbb3ae542e34a0d54a",
"detected_licenses": [
"MIT"
],
"directory_id": "66ec7bf5e2b8f3c61ad627e0d3f5586587b46444",
"extension": "py",
"fi... | 2.5625 | stackv2 | # Team Phil Swift's Amazing Doors
# SoftDev pd7
import urllib, json, os, random # Standard Library
from flask import Flask, request, render_template, session, redirect, \
flash, url_for # Flask
import util.accounts
import util.sessions
import base64
app = Flask(__name__)
app.secret_key = util.accounts.get_s... | 152 | 30.39 | 119 | 16 | 1,029 | python | [{"finding_id": "codeql_py/partial-ssrf_d91c863d30351f61_df9aa029", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
45
] | [
null
] | [
9
] | [
38
] | |
2024-11-19T02:21:22.281290+00:00 | 1,608,324,111,000 | b956fa528b0ca72cfcf03b00e1d48d7544c7fbe6 | 3 | {
"blob_id": "b956fa528b0ca72cfcf03b00e1d48d7544c7fbe6",
"branch_name": "refs/heads/main",
"committer_date": 1608324111000,
"content_id": "02a9dc52c1e23dd11cdd8d7fc791469834848652",
"detected_licenses": [
"MIT"
],
"directory_id": "d42b51e8c38d237ef206628fe8adda03302afef1",
"extension": "py",
"file... | 3.421875 | stackv2 | import re
def part1(lines):
nrOfValidPasswords = 0
for line in lines:
match = re.match(r"(\d+)-(\d+)\s([a-z]):\s([a-z]+)", line)
min_bound = int(match.group(1))
max_bound = int(match.group(2))
character = match.group(3)
password = match.group(4)
nrOfOccurrences ... | 34 | 31.03 | 104 | 15 | 298 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2256f08573840bd9_081eae18", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
15,
28
] | [
null,
null
] | [
11,
11
] | [
29,
29
] | |
2024-11-19T02:21:31.950144+00:00 | 1,693,452,038,000 | 70f3b60252a6746c89b1529a69d91dedd4b19069 | 3 | {
"blob_id": "70f3b60252a6746c89b1529a69d91dedd4b19069",
"branch_name": "refs/heads/master",
"committer_date": 1693452038000,
"content_id": "4b15c98012227d09420c6430e5c8357ff2e1790b",
"detected_licenses": [
"MIT",
"BSD-3-Clause",
"Apache-2.0"
],
"directory_id": "0760fb4901a75766921a205b55686d6... | 2.546875 | stackv2 | """Fake multinode docker monitoring script.
This script is the "docker compose server" for the fake_multinode
provider using Docker compose. It should be started before running
`RAY_FAKE_CLUSTER=1 ray up <cluster_config>`.
This script reads the volume directory from a supplied fake multinode
docker cluster config fil... | 243 | 29.91 | 88 | 16 | 1,696 | python | [{"finding_id": "codeql_py/overly-permissive-file_6098862839fe0df6_0257ee29", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
159
] | [
null
] | [
5
] | [
41
] | |
2024-11-19T02:46:45.309873+00:00 | 1,393,970,451,000 | 802f4d1da2f28f98c193117470cf8910e26c912f | 3 | {
"blob_id": "802f4d1da2f28f98c193117470cf8910e26c912f",
"branch_name": "refs/heads/master",
"committer_date": 1393970451000,
"content_id": "3b1630cd81724986a7522f15d6a2bbb8d0fa4412",
"detected_licenses": [
"MIT"
],
"directory_id": "d3cbd754e0a0df2355b61eeeb9007440e7eb996b",
"extension": "py",
"fi... | 2.90625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import os
from jinja2 import Environment, FileSystemLoader
class SimpleTemplateTofile(object):
"""
A simple template to file that contains the logic
about jinja template rendering.
"""
loader = FileSystemLoader('./templates')
env = Enviro... | 35 | 26.74 | 93 | 15 | 211 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a0ed201c8a1403c8_72dec813", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
15
] | [
null
] | [
11
] | [
39
] | |
2024-11-19T02:58:15.274238+00:00 | 1,631,677,077,000 | 250676bf0777090158fd0c890cd867f6b1c1615f | 3 | {
"blob_id": "250676bf0777090158fd0c890cd867f6b1c1615f",
"branch_name": "refs/heads/master",
"committer_date": 1631677685000,
"content_id": "45291dcd26e5e13a754988808db672c8c35699d2",
"detected_licenses": [
"MIT"
],
"directory_id": "c275d06a2b184ae402b0ae7a687b642037b6132b",
"extension": "py",
"fi... | 2.53125 | stackv2 | import json
import logging
import os
import pathlib
from hive.settings import hive_setting
from hive.util.common import create_full_path_dir
class RcloneTool:
@staticmethod
def get_config_data(content, did):
access_token = content.get('token')
refresh_token = content.get('refresh_token')
... | 76 | 27.92 | 95 | 15 | 464 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_576622bce7ccea49_e3f2b14f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
69,
68
] | [
null,
null
] | [
31,
19
] | [
36,
24
] | |
2024-11-19T03:10:09.101101+00:00 | 1,586,371,578,000 | a9a124f3a43e391f498f8a0f58ac614e9c38a3b0 | 4 | {
"blob_id": "a9a124f3a43e391f498f8a0f58ac614e9c38a3b0",
"branch_name": "refs/heads/master",
"committer_date": 1586371578000,
"content_id": "d469f7f5c17e5e7bf10695bcd5502fda8ac09b62",
"detected_licenses": [
"MIT"
],
"directory_id": "8b8cda6c585b1c5f1470cc6b12e13c1b7d7a8a2f",
"extension": "py",
"fi... | 3.65625 | stackv2 | from random import randint
import re
class Dice(object):
def __init__(self, sides=4):
self.sides = sides
def set_sides(self, sides):
if sides is not None and sides > 4:
self.sides = sides
def roll(self):
return randint(1, self.sides)
class DiceRoller(object):
... | 49 | 25.51 | 59 | 14 | 318 | python | [{"finding_id": "codeql_py/redos_6ce08db873f7cb5c_705cbe44", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '9'.", "remediati... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '9'."
] | [
27
] | [
null
] | [
31
] | [
34
] | |
2024-11-19T03:10:28.865959+00:00 | 1,689,912,169,000 | 19706c6862856e2fe67f902baf89e650576d1265 | 3 | {
"blob_id": "19706c6862856e2fe67f902baf89e650576d1265",
"branch_name": "refs/heads/main",
"committer_date": 1689912169000,
"content_id": "e97f1aa8a99fe7e2b520a26fbe1010c8a8962c1a",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "0ed62eec4eea9931f08f383cf657f3ca1a3ef4f9",
"extension": "py"... | 2.75 | stackv2 | #!/usr/bin/python
# July-20-2016
# cedarupload.py: Utility to create requests and execute them on CEDAR resources
#
# - Takes parameters needed for a CEDAR REST API POST request
# - Iterates through a directory to post all files to specified host name
# - Creates log file log.txt with request status, reason, headers, ... | 95 | 37.91 | 114 | 23 | 863 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8e2d3052b6803fbb_26f87d78", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
68,
69
] | [
null,
null
] | [
23,
19
] | [
32,
65
] | |
2024-11-19T03:22:32.364345+00:00 | 1,589,989,884,000 | 98a520c2e67cb640fec1978bea1c4bf62313237b | 2 | {
"blob_id": "98a520c2e67cb640fec1978bea1c4bf62313237b",
"branch_name": "refs/heads/master",
"committer_date": 1589989884000,
"content_id": "f32ba67d21de36b5778a9e015e876d7531701122",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e1e276e76866c7fc0706b81bb0875c1496e7ce82",
"extension": "py"... | 2.5 | stackv2 | import os
import numpy as np
import pickle
import shutil
from keras.utils import to_categorical
import pandas as pd
### data preparation
# extract labels from filename
def labels_from_filename(files, label_type):
labels = []
for f in files:
if label_type == 'point':
if f.split('_')[-1].spli... | 136 | 32.9 | 124 | 17 | 1,201 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_582182fbc5905751_dbc79d20", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
116
] | [
null
] | [
11
] | [
28
] | |
2024-11-19T03:22:34.999199+00:00 | 1,577,696,758,000 | bf12fd136c0cf56d539eec33629b891a36e5e065 | 3 | {
"blob_id": "bf12fd136c0cf56d539eec33629b891a36e5e065",
"branch_name": "refs/heads/master",
"committer_date": 1577696758000,
"content_id": "e808663fdca7ed8575776d56e334e178c487fc64",
"detected_licenses": [
"MIT"
],
"directory_id": "d99615571985c518fe76bf79e9b322390244fd93",
"extension": "py",
"fi... | 3.34375 | stackv2 | sample_input = [3, 2, 1, 3]
def birthdayCakeCandles(ar):
"Function to determine the number of candles to be blown."
max_height = max(ar)
n_of_max_height_candles = 0
for i in ar:
if i == max_height:
n_of_max_height_candles += 1
else:
continue
return n_of_max_... | 16 | 22.62 | 62 | 10 | 101 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2030c336fad9c65e_6e1ee216", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
16
] | [
null
] | [
7
] | [
40
] | |
2024-11-19T03:22:36.209616+00:00 | 1,636,565,450,000 | 577749063f8c473473461316bd1d9dcb69fe16d3 | 3 | {
"blob_id": "577749063f8c473473461316bd1d9dcb69fe16d3",
"branch_name": "refs/heads/main",
"committer_date": 1636565450000,
"content_id": "ec69c51d994bcefec5dc3d6a0f1998391c1da6c3",
"detected_licenses": [
"MIT"
],
"directory_id": "727c5d72c074ab8f9d573f65a01e94f110d58c99",
"extension": "py",
"file... | 3.375 | stackv2 | import numpy as np
import matplotlib.pyplot as plt
from sklearn import svm
import re
from nltk import PorterStemmer
def plotData(X, y):
# PLOTDATA(x,y) plots the data points with + for the positive examples
# and o for the negative examples. X is assumed to be a Mx2 matrix.
# Note: This was slightly ... | 307 | 30.61 | 96 | 16 | 2,674 | python | [{"finding_id": "codeql_py/overly-large-range_e71d10c1bfc79eac_cd1b8518", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[.\\/0-9:\\].", "remediation": "", "location": {"file... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[.\\/0-9:\\]."
] | [
258
] | [
null
] | [
38
] | [
41
] | |
2024-11-19T03:22:40.040094+00:00 | 1,477,087,278,000 | 2aa0746e10c25e2a9ce400e49fbd8c3427c8ae3f | 3 | {
"blob_id": "2aa0746e10c25e2a9ce400e49fbd8c3427c8ae3f",
"branch_name": "refs/heads/master",
"committer_date": 1477087278000,
"content_id": "900533e781167f8887ba2fd46c6c7c7863be8091",
"detected_licenses": [
"MIT"
],
"directory_id": "0161fc984cbc1140e8ca2f68ee059445d14bdc55",
"extension": "py",
"fi... | 2.640625 | stackv2 | import antlr4
import importlib
import itertools
import json
import os
import re
import subprocess as sp
"""
Setup some module level information
"""
config = json.load(open("parser_config"))
antlr_jar = ''
max_version = '0'
for fl in os.listdir('.'):
match = re.match('antlr(-)?((\d+\.?)+)?(-\w+)?.jar', fl)
if... | 98 | 35.88 | 93 | 19 | 828 | python | [{"finding_id": "codeql_py/redos_682f62f3db0753e9_bd770d06", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'antlr' and containing many repeti... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'antlr' and containing many repetitions of '9'."
] | [
18
] | [
null
] | [
34
] | [
37
] | |
2024-11-19T03:22:41.950025+00:00 | 1,585,764,319,000 | 2ecb039728b43a4f3fe428ff6531770e0269489d | 3 | {
"blob_id": "2ecb039728b43a4f3fe428ff6531770e0269489d",
"branch_name": "refs/heads/master",
"committer_date": 1585764319000,
"content_id": "e117f250efd75f13d559ccbe67766b3dbd82883d",
"detected_licenses": [
"MIT"
],
"directory_id": "9eaa2c64a777bd24a3cccd0230da5f81231ef612",
"extension": "py",
"fi... | 2.53125 | stackv2 | from flask import Flask,render_template,request,make_response,redirect
app = Flask(__name__,template_folder='t',static_url_path='/s',static_folder='s')
@app.route('/')
def index():
return render_template('01-index.html')
@app.route('/request')
def request_views():
# 将request中的成员打印在终端上
# print(dir(request))
... | 84 | 29.13 | 84 | 14 | 694 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9255187a72733ab3_238290de", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-215",
"CWE-022"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
... | [
45,
56,
84,
80
] | [
null,
null,
null,
null
] | [
15,
15,
5,
16
] | [
56,
84,
24,
29
] | |
2024-11-19T01:34:56.806453+00:00 | 1,609,442,525,000 | 8625c09b9f475a953fe0b12005c65dc2e6340f19 | 3 | {
"blob_id": "8625c09b9f475a953fe0b12005c65dc2e6340f19",
"branch_name": "refs/heads/master",
"committer_date": 1609443188000,
"content_id": "136985914e80d174aa333e64afdd30498dc526a1",
"detected_licenses": [
"MIT"
],
"directory_id": "72a36ff85a550582400977bb795e271a9ecf1c59",
"extension": "py",
"fi... | 2.84375 | stackv2 | # -*- coding: utf-8 -*-
"""NetworksProject.ipynb
Automatically generated by Colaboratory.
Original file is located at
https://colab.research.google.com/drive/1WxvaO5ytY_APrLsNLAnskPUbY2wteJlM
"""
# To find similarity between given keywords of a webpage and filter word of our context
# Done using pre-trained bert... | 112 | 32.08 | 146 | 18 | 913 | python | [{"finding_id": "codeql_py/request-without-cert-validation_bc9cd49fd5e855d9_27b42e62", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
55
] | [
null
] | [
9
] | [
57
] | |
2024-11-19T01:34:59.927910+00:00 | 1,511,370,748,000 | c7c4e2ef6f21f1219d42a3c52716f2e62ca12562 | 2 | {
"blob_id": "c7c4e2ef6f21f1219d42a3c52716f2e62ca12562",
"branch_name": "refs/heads/master",
"committer_date": 1511370748000,
"content_id": "f3745f64f5fb6334cfcfbf64d0c850f485b86ddc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6a102ca30064ec45c8774e1a36cbb18c77da3808",
"extension": "py"... | 2.484375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import requests
import json
import pprint
class AOS8Auth():
"""
This class requests and stores an authentication cookie for AOS8.
"""
def __init__(self, aosip, username, password):
url_login = "https://" + aosip + ":4343/v1/api/login"
versi... | 36 | 37.14 | 99 | 12 | 343 | python | [{"finding_id": "codeql_py/request-without-cert-validation_df47fc8b1a53b511_90881e61", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
20
] | [
null
] | [
24
] | [
99
] | |
2024-11-19T01:35:02.172958+00:00 | 1,611,229,977,000 | fa755cce3ff9ae16b4cae510f2dceae3f841b0a8 | 2 | {
"blob_id": "fa755cce3ff9ae16b4cae510f2dceae3f841b0a8",
"branch_name": "refs/heads/master",
"committer_date": 1611229977000,
"content_id": "9f35603989947fae23634d63690d7b1c720b7da5",
"detected_licenses": [
"MIT"
],
"directory_id": "14c0f80aa8c3fdf230878b2385902ad66c59e83f",
"extension": "py",
"fi... | 2.328125 | stackv2 |
from flask import jsonify, request, Blueprint
from flask_oauthlib.provider import OAuth2Provider
from src.models import RModel
from src.models.NCFModel import NCFModel
from src.models.NeuMFModel import NeuMFModel
from src.restful.oauth2.Oauth2 import require_oauth
class RecommendationEndpoint:
def __init__(self)... | 82 | 30.93 | 104 | 18 | 596 | python | [{"finding_id": "codeql_py/reflective-xss_fb90f83c371d855a_886b551d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2)."
] | [
50,
59
] | [
null,
null
] | [
16,
14
] | [
55,
105
] | |
2024-11-19T01:55:37.243069+00:00 | 1,587,028,743,000 | 0c9bd6298974764e88f5aa225f472fdc4a7278a0 | 3 | {
"blob_id": "0c9bd6298974764e88f5aa225f472fdc4a7278a0",
"branch_name": "refs/heads/master",
"committer_date": 1587028743000,
"content_id": "aa9dbb49b73b90a2bd72c418ed66c054cf17c3e3",
"detected_licenses": [
"MIT"
],
"directory_id": "5776553535644a56147b2d200bfd8cac36f0daee",
"extension": "py",
"fi... | 2.625 | stackv2 | from abc import ABC, abstractmethod
from flask import request
import logging
import mlog
logger = logging.getLogger('endpoint')
class Endpoint(ABC):
def __init__(self, dbClient, mqClient, logger, env):
self.dbClient = dbClient
self.mqClient = mqClient
self.logger = logger
self.env ... | 49 | 32.31 | 106 | 13 | 388 | python | [{"finding_id": "codeql_py/log-injection_b11de39bc8d1fc88_2d005f7f", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
41
] | [
null
] | [
22
] | [
48
] | |
2024-11-19T01:55:39.914855+00:00 | 1,654,066,172,000 | cd9f2d0e893e487659f3ae0f253664f2c10df711 | 2 | {
"blob_id": "cd9f2d0e893e487659f3ae0f253664f2c10df711",
"branch_name": "refs/heads/master",
"committer_date": 1654066172000,
"content_id": "619c7a35c077805ac855c805905081a1c8696960",
"detected_licenses": [
"MIT"
],
"directory_id": "4b8013544bd89210d60a140b82828fabc6399959",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!/usr/bin/python3
# -*- coding: utf-8 -*-
#
# The MIT License (MIT)
#
# Copyright (c) 2015 Tintri, Inc.
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including witho... | 248 | 33.45 | 96 | 15 | 1,912 | python | [{"finding_id": "codeql_py/request-without-cert-validation_521cf8c8a0801b2a_b8f68352", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 6 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
90,
121,
143,
166,
194,
225
] | [
null,
null,
144,
167,
195,
null
] | [
13,
13,
13,
13,
13,
13
] | [
75,
64,
56,
57,
57,
68
] | |
2024-11-19T01:55:45.823446+00:00 | 1,609,946,366,000 | b88a6c02bf68600c7dfc92cab1c6daf0c993e71a | 3 | {
"blob_id": "b88a6c02bf68600c7dfc92cab1c6daf0c993e71a",
"branch_name": "refs/heads/master",
"committer_date": 1609946366000,
"content_id": "3285c77b83fca4cc5508c1296454aae5b3682b72",
"detected_licenses": [
"MIT"
],
"directory_id": "f70bc8b63f43045110f33717d66309ef8d77a6d9",
"extension": "py",
"fi... | 3.0625 | stackv2 | from spotdl.search.provider import search_and_get_best_match
from spotdl.search.spotifyClient import get_spotify_client
from os.path import join
from json import dumps as convert_dict_to_json, loads as convert_json_to_dict
from typing import List
class SongObj():
#! This can be accessed as songObj.searchProvide... | 226 | 30.64 | 89 | 14 | 1,616 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_7ea553ca292686a1_82eb333e", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [open.spotify.com](1) may be at an arbitrary position i... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [open.spotify.com](1) may be at an arbitrary position in the sanitized URL."
] | [
33
] | [
null
] | [
17
] | [
49
] | |
2024-11-19T02:07:54.072407+00:00 | 1,622,865,565,000 | 5f8c2b717d5f46dfddbe3659c57f0096d2d70ec3 | 2 | {
"blob_id": "5f8c2b717d5f46dfddbe3659c57f0096d2d70ec3",
"branch_name": "refs/heads/main",
"committer_date": 1622865565000,
"content_id": "0ec6f97939e4aa316857541382705ba73dc5e0e8",
"detected_licenses": [
"MIT"
],
"directory_id": "2cf37242babcfaaa6a9448ce3a2cecb33a4779e3",
"extension": "py",
"file... | 2.359375 | stackv2 | from flask import Flask, render_template, after_this_request, redirect, flash, request
from werkzeug.utils import secure_filename
from model import *
import os
import random
import re
USER_RESULTS_FOLDER = os.path.join("static", "user-results")
USER_UPLOADS_FOLDER = "user-files"
ALLOWED_EXTENSIONS = ("jpg", "png", "jp... | 87 | 33.23 | 88 | 19 | 644 | python | [{"finding_id": "codeql_py/url-redirection_c8b8cb4cb01fb22a_a6f64a2e", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 3 | true | [
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
37,
41,
44
] | [
null,
null,
null
] | [
29,
29,
29
] | [
40,
40,
40
] | |
2024-11-19T02:07:56.143159+00:00 | 1,693,525,865,000 | 5576f209788d47fccbe53aac5c74ed7679f8db67 | 2 | {
"blob_id": "5576f209788d47fccbe53aac5c74ed7679f8db67",
"branch_name": "refs/heads/master",
"committer_date": 1693525911000,
"content_id": "fe90f0dd6c4b66b400aa8d2bf319e2d717eace5c",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "0db06afad7ff1378479d3b4c24e9416ce741f008",
"extension": "p... | 2.484375 | stackv2 | """Site theme."""
# Copyright (c) 2012-2023 Wibowo Arindrarto <contact@arindrarto.dev>
# SPDX-License-Identifier: BSD-3-Clause
import tomlkit
from copy import deepcopy
from pathlib import Path
from functools import cached_property
from types import ModuleType
from typing import cast, Any, Callable, Literal, Optional, ... | 259 | 29.6 | 88 | 18 | 1,741 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e17a646dbbf9cc5b_3c75bfb6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
155
] | [
159
] | [
15
] | [
10
] | |
2024-11-19T02:07:57.487285+00:00 | 1,550,317,989,000 | fb38714c465aa2207308e0dc17d1b9641c088120 | 2 | {
"blob_id": "fb38714c465aa2207308e0dc17d1b9641c088120",
"branch_name": "refs/heads/master",
"committer_date": 1550317989000,
"content_id": "efb5d8d95fa411961d0f22f9b67afd670346df9f",
"detected_licenses": [
"MIT"
],
"directory_id": "7f96fdfd0d691761d142fd00b4cf132960c85723",
"extension": "py",
"fi... | 2.46875 | stackv2 | from flask import g, Markup
from flask import (Blueprint, render_template, make_response, redirect, url_for, abort, request, Response)
from tw33t import app
from functools import wraps
from flask import jsonify
from twitter import *
import json, requests, datetime, sys, os, uuid, re, time
from flask.globals import curr... | 65 | 30.89 | 106 | 13 | 439 | python | [{"finding_id": "codeql_py/stack-trace-exposure_3a7901df9c606dd6_10e7ca61", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
40
] | [
41
] | [
20
] | [
33
] | |
2024-11-19T02:17:11.460079+00:00 | 1,440,730,678,000 | e8819f635f2fed9965059fda56de73f9164c6eb6 | 3 | {
"blob_id": "e8819f635f2fed9965059fda56de73f9164c6eb6",
"branch_name": "refs/heads/master",
"committer_date": 1440730678000,
"content_id": "85aead4648ecb9bb801789867a4d85f2fcd6774d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "609632165f599a4363923ec04b55de5324215363",
"extension": "py"... | 2.859375 | stackv2 | #encoding:utf-8
__authors__ = ['"Liu Fei" <fei.liu@cs2c.com.cn>']
__version__ = "V0.1"
'''
# ChangeLog:
#---------------------------------------------------------------------------------
# Version Date Desc Author
#------------------------------------------------------... | 64 | 39.62 | 122 | 18 | 652 | python | [{"finding_id": "codeql_py/request-without-cert-validation_af8bba6a9040ddbc_e7312bb3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 5 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2).",
"This request may run without certificate validation because [it is disabled](1) by [this value](2).",
"This request may run without certificate validation because [it is disabled](1) by [this value](2).",
"... | [
45,
47,
49,
52,
54
] | [
null,
null,
null,
null,
null
] | [
20,
20,
20,
24,
24
] | [
76,
110,
109,
83,
116
] | |
2024-11-19T02:17:14.123930+00:00 | 1,526,144,744,000 | da6c36d67f26895fe373b8b32da308c6ad392d4e | 4 | {
"blob_id": "da6c36d67f26895fe373b8b32da308c6ad392d4e",
"branch_name": "refs/heads/master",
"committer_date": 1526144744000,
"content_id": "fb72135f44657e2bb15ae54e54c456314475fd8c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cd7f1883360466642d347846a6f264fb98291a0f",
"extension": "py"... | 3.84375 | stackv2 | #!/usr/bin/env python3
class SchoolMember:
"""
Parent class
"""
def __init__(self, name, age):
self.name = name
self.age = age
class Teacher(SchoolMember):
"""
Child class with salary
"""
def __init__(self, *args, **kwargs):
if args:
salary = args[... | 42 | 21.1 | 75 | 13 | 238 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c730a493c69950bf_19a7af06", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
26
] | [
null
] | [
15
] | [
75
] | |
2024-11-19T02:17:22.479219+00:00 | 1,510,575,364,000 | 8e6fa4f410ac70980be54145504bc97d2a203fee | 2 | {
"blob_id": "8e6fa4f410ac70980be54145504bc97d2a203fee",
"branch_name": "refs/heads/master",
"committer_date": 1510575364000,
"content_id": "d0d8563cb539b8a997083ae29501688bf774cd9d",
"detected_licenses": [
"MIT"
],
"directory_id": "465ed510632e648c28c2baf8534d88a1e7765e5e",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
import urllib
import urllib2
import hashlib
import simplejson
import sys
from market import *
sys.path.append('../..')
from secret import *
class OKCoin(Market):
def __init__(self, partner, secret):
Market.__init__(self, 'OKCoin')
self.api = 'www.okcoin.cn/api/v1/'
... | 97 | 25.76 | 76 | 16 | 718 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7606df4f7da42038_89ec9dac", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure."
] | [
71
] | [
null
] | [
14
] | [
25
] | |
2024-11-19T02:17:37.659048+00:00 | 1,527,732,509,000 | 5ef424913687f18a5dd018a8fe8a05dd568f29c3 | 3 | {
"blob_id": "5ef424913687f18a5dd018a8fe8a05dd568f29c3",
"branch_name": "refs/heads/master",
"committer_date": 1527732509000,
"content_id": "829e42a5eb6ca9a9979f37764d97ef5db358add9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "29a8218d0653a40aa40d628302056cd4754ed677",
"extension": "py"... | 2.546875 | stackv2 | import os
#import theano
#os.environ["KERAS_BACKEND"] = "theano"
import flask
from keras import models
import tensorflow as tf
# initialize our Flask application and the Keras model
from safetoswim.core import PhotoProcessor
application = flask.Flask(__name__)
model = None
graph = tf.get_default_graph()
ALLOWED_EXTEN... | 116 | 33.67 | 101 | 19 | 870 | python | [{"finding_id": "codeql_py/stack-trace-exposure_70eb6cb01cf62e19_2a662200", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
93,
115
] | [
null,
null
] | [
42,
5
] | [
101,
59
] | |
2024-11-19T02:18:02.431368+00:00 | 1,549,833,075,000 | 7fca0dcaacca82b0349e15bda2a65be79cc706bc | 2 | {
"blob_id": "7fca0dcaacca82b0349e15bda2a65be79cc706bc",
"branch_name": "refs/heads/master",
"committer_date": 1549833075000,
"content_id": "01c43e30e16da02752517981db959fd620cade4c",
"detected_licenses": [
"MIT"
],
"directory_id": "6abec5acf7e5ed450018a83ecad74126808124cf",
"extension": "py",
"fi... | 2.34375 | stackv2 | import logging
import tornado.ioloop
import tornado.web
import tornado.websocket
from jsonrpc import JSONRPCResponseManager, dispatcher
logger = logging.getLogger(__name__)
def start():
app = tornado.web.Application([
(r"/", WebSocketHandler),
], debug = True)
app.listen(8888)
logger.debug('W... | 57 | 25.61 | 74 | 16 | 307 | python | [{"finding_id": "codeql_py/log-injection_4034470af347de0d_63bdda0b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 4 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
27,
35,
52,
52
] | [
null,
null,
null,
null
] | [
13,
13,
13,
37
] | [
35,
35,
35,
44
] | |
2024-11-19T02:18:07.805762+00:00 | 1,585,751,491,000 | e2e67e316763ca0e4f514802696741c9941f94ed | 3 | {
"blob_id": "e2e67e316763ca0e4f514802696741c9941f94ed",
"branch_name": "refs/heads/master",
"committer_date": 1585751491000,
"content_id": "5cb568b727de56ec19191c84c59e64feb58a4084",
"detected_licenses": [
"MIT"
],
"directory_id": "ede44ac83dc8b626a3e326200793c5ec7850d3cc",
"extension": "py",
"fi... | 2.546875 | stackv2 | # Inbuild Modules
import os
import json
# Third Party Modules
import requests
from flask import Flask, render_template, request, jsonify
# from decouple import config #<-- not sure what this does yet
# Custom Modules
from google_books_hf import process_list
# Retreive Google API key from environment
def create_app... | 113 | 35.96 | 113 | 20 | 863 | python | [{"finding_id": "codeql_py/partial-ssrf_d9ceaeab17c3e8e6_ea4c5b92", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
61,
72
] | [
64,
75
] | [
28,
28
] | [
54,
34
] | |
2024-11-19T02:19:03.245077+00:00 | 1,633,051,263,000 | a769cdab32038ea9766ba6d5e5f3c8d4fd7a381b | 3 | {
"blob_id": "a769cdab32038ea9766ba6d5e5f3c8d4fd7a381b",
"branch_name": "refs/heads/main",
"committer_date": 1633051263000,
"content_id": "54b5a3144dd878c7dc3830c3f6d5ba3628aeada3",
"detected_licenses": [
"MIT"
],
"directory_id": "8e4b365662e24d6da3dd68b74c645a54aa5b6366",
"extension": "py",
"file... | 2.6875 | stackv2 | from requests import get
from sys import argv
from os import system
def consulta(placa):
req=get('https://apicarros.com/v2/consultas/%s/f63e1e63dd231083d38ce929984aac7d'%placa, verify=False).json()
system('cls||clear')
msg='|| Consulta de Placa ||\n'
for item in req:
msg+=str('%s : %s\n'%(item.upper(),req[item])... | 24 | 26.88 | 109 | 19 | 203 | python | [{"finding_id": "codeql_py/request-without-cert-validation_95f166b699109ba4_60763d1b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
6
] | [
null
] | [
6
] | [
103
] | |
2024-11-19T02:30:02.231249+00:00 | 1,594,955,989,000 | da93e4d8c1b27cf4cafb94600a48fba70999f131 | 2 | {
"blob_id": "da93e4d8c1b27cf4cafb94600a48fba70999f131",
"branch_name": "refs/heads/master",
"committer_date": 1594955989000,
"content_id": "bccab4ea6c7f0b1c0b4cb899b24edd1126c0bdda",
"detected_licenses": [
"MIT"
],
"directory_id": "ae9dfa37ba85d14e34c37bcbdd50dd3a304537ba",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/usr/bin/python3
# data.py
import os
import sqlite3
import hashlib
import secrets
import youtube_dl
from subprocess import Popen, PIPE
from config import DB_LOCATION, SHA256_SALT, VIDEOS_LOCATION
def authenticate(username, password):
conn = sqlite3.connect(DB_LOCATION)
cursor = conn.cursor()
cursor.exe... | 111 | 29.86 | 124 | 16 | 839 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1d85457b5863ad60_0bbaaecc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
20
] | [
null
] | [
40
] | [
73
] | |
2024-11-19T02:30:19.691534+00:00 | 1,577,632,893,000 | a25e78d3a8eb5dc5f3550309d4ed3aeb1bfcbd90 | 2 | {
"blob_id": "a25e78d3a8eb5dc5f3550309d4ed3aeb1bfcbd90",
"branch_name": "refs/heads/master",
"committer_date": 1577632893000,
"content_id": "b9f6a86866e6cad7eb5dd7ea9af877b3975a4c2d",
"detected_licenses": [
"MIT"
],
"directory_id": "f7abff397a0ec2026a81f8cf3b42cd441ec8c62f",
"extension": "py",
"fi... | 2.375 | stackv2 | import os
from typing import Dict, Optional, List
from pathlib import Path
import aiodocker
from aiodocker.exceptions import DockerError
from jinja2 import Template, Environment, FileSystemLoader
from .config import Config
from .context import create_tar
class DockerArtifact:
config: Config
parameters: dict... | 124 | 29.44 | 92 | 19 | 757 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5f491d1e2f6c29b4_ea2f1ce0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 6 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially... | [
28,
32,
37,
40,
94,
102
] | [
null,
null,
null,
null,
null,
null
] | [
13,
13,
13,
21,
19,
46
] | [
38,
36,
37,
42,
80,
64
] | |
2024-11-19T02:30:23.866770+00:00 | 1,593,966,877,000 | 6ce5b9ca0fdccb12e539424cd42704a894f52f1d | 3 | {
"blob_id": "6ce5b9ca0fdccb12e539424cd42704a894f52f1d",
"branch_name": "refs/heads/master",
"committer_date": 1593966877000,
"content_id": "9488ee2026fa42524434bda4567d50c40e8794f3",
"detected_licenses": [
"MIT"
],
"directory_id": "a71024f0ca1b311a68c286ceb213b8224186c0d9",
"extension": "py",
"fi... | 3.25 | stackv2 | from bs4 import BeautifulSoup as bs
import requests, os
class Mangakakalot:
def __init__(self, url):
self.title=''
self.chapter = 0
self.page = 0
self.url = url
self.heading()
self.download()
def heading(self):
source = requests.get(self.url).text
soup = bs(source, 'lxml')
self.title = soup.find(... | 117 | 24.32 | 94 | 15 | 925 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_4f19b8d6cea0c8f6_b8ebd1e2", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [mangakakalot.com](1) may be at an arbitrary position i... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [mangakakalot.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [manganelo.com](1) may be at an arbitrary position in the sanitized URL."
] | [
98,
101
] | [
null,
null
] | [
4,
6
] | [
29,
28
] | |
2024-11-19T02:30:27.737710+00:00 | 1,449,844,753,000 | 79353a77cb522054ef4268803ab54a385c5f7680 | 3 | {
"blob_id": "79353a77cb522054ef4268803ab54a385c5f7680",
"branch_name": "refs/heads/master",
"committer_date": 1449844753000,
"content_id": "0e3b347cffe11444d64b8cb03e0a7de5be4d0f8e",
"detected_licenses": [
"MIT"
],
"directory_id": "c07551cd05122cdb8d9f09cff74e3678bc8ee31d",
"extension": "py",
"fi... | 2.59375 | stackv2 | """
HTTP authentication support for web.py
"""
import base64
import functools
import hashlib
import math
import os
import re
import time
import web
__all__ = (
'make_hash', 'join_fields', 'parse_fields',
'Auth', 'DigestAuth',
'DUMMY', 'FORWARDED_USER', 'BASIC', 'DIGEST',
'AuthMediator',
)
class St... | 322 | 26.63 | 78 | 16 | 1,986 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_30dbb4988829a64d_f407c654", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](3) is used in a hashing algorithm (MD5) that ... | [
37
] | [
null
] | [
24
] | [
46
] | |
2024-11-19T02:30:35.404965+00:00 | 1,689,200,951,000 | 9d195931a4d11b0418b220c59a1025fe66206a8b | 3 | {
"blob_id": "9d195931a4d11b0418b220c59a1025fe66206a8b",
"branch_name": "refs/heads/main",
"committer_date": 1689200951000,
"content_id": "5ce5c98d80bfa8a34a93656a969cece5f7279095",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5e24a177efa11fc9f9e77da1413085e4d16a77df",
"extension": "py",
... | 2.75 | stackv2 | #
# Copyright 2021, by the California Institute of Technology. ALL RIGHTS
# RESERVED. United States Government Sponsorship acknowledged. Any commercial
# use must be negotiated with the Office of Technology Transfer at the
# California Institute of Technology.
#
"""
==============
osti_record.py
==============
Co... | 130 | 40.82 | 114 | 19 | 1,184 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_accb865a3d9c71b6_1175e32e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
53,
56
] | [
null,
null
] | [
28,
29
] | [
96,
97
] | |
2024-11-19T02:41:42.495799+00:00 | 1,572,863,429,000 | f62e4ed7452822a785a8d244aa24989b6cb1e8f9 | 3 | {
"blob_id": "f62e4ed7452822a785a8d244aa24989b6cb1e8f9",
"branch_name": "refs/heads/master",
"committer_date": 1572863429000,
"content_id": "331f35054bfdbd7735a9005715a49a0223b939aa",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "39e0a6cfac6c980b2f8a76871a04e96d1993cce6",
"extension": "py"... | 2.6875 | stackv2 | from flask import render_template, url_for, redirect, flash, request
from flask_login import current_user, login_user, logout_user, login_required
from __init__ import app, bcrypt, db
from forms import RegistrationForm, LoginForm, UpdateAccountForm
from models import User
from utils import save_picture
@app.route('/'... | 103 | 35.82 | 98 | 16 | 770 | python | [{"finding_id": "codeql_py/url-redirection_3ac76483e4ee259e_f8230cd7", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
59
] | [
null
] | [
29
] | [
38
] | |
2024-11-19T02:41:53.796058+00:00 | 1,535,383,779,000 | 80967f08e13137ec5c6a76efc56ef35b2ea8a548 | 3 | {
"blob_id": "80967f08e13137ec5c6a76efc56ef35b2ea8a548",
"branch_name": "refs/heads/master",
"committer_date": 1535383779000,
"content_id": "27e1571b03e6457230679fb22b5a591e26c7312f",
"detected_licenses": [
"MIT"
],
"directory_id": "bcacb96aecbe300eee79d6d9647122a8bfcd8673",
"extension": "py",
"fi... | 3.390625 | stackv2 | import pyperclip
from user import User
from user import Credentials
def create_user(username,password):
'''
function that creates a new user to the app
'''
new_user = User(username,password)
return new_user
def save_user(user):
'''
function to save a user
'''
user.save_user()
def ... | 151 | 38.49 | 157 | 27 | 1,050 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_54712b27c0c9e001_92f0438c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
76,
129
] | [
null,
null
] | [
19,
43
] | [
71,
157
] | |
2024-11-18T18:05:52.504753+00:00 | 1,498,989,434,000 | a456b54761f55969b31d8976eb7f56200a9576f5 | 3 | {
"blob_id": "a456b54761f55969b31d8976eb7f56200a9576f5",
"branch_name": "refs/heads/master",
"committer_date": 1498989434000,
"content_id": "2a003537082f9cf02d5a7b0be1c2b36ef0881240",
"detected_licenses": [
"MIT"
],
"directory_id": "59ff1c38e7ee0666d32a4dae67d5aeb5ab989e76",
"extension": "py",
"fi... | 3.453125 | stackv2 | #!/usr/bin/env python3
# coding: utf-8
import twitter
twitterSecretsLoc = "twitter.secret"
def setup():
print("-----------------")
print(" TWITTER SETUP ")
print("-----------------\n")
print("To connect to Twitter I need some keys. You can get them by creating an app on https://apps.twitter.com.")
print("Onc... | 92 | 25.49 | 114 | 20 | 610 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_44c29c321d52236a_6a1beb78", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.",
"This expression stores [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive... | [
49,
51,
55,
63,
73,
87
] | [
null,
null,
null,
null,
null,
null
] | [
23,
23,
8,
9,
10,
11
] | [
51,
42,
92,
100,
103,
101
] | |
2024-11-18T18:05:55.701004+00:00 | 1,611,872,724,000 | e55fa6b8342e263b0d9a782ae3cbd36e5485ff1c | 3 | {
"blob_id": "e55fa6b8342e263b0d9a782ae3cbd36e5485ff1c",
"branch_name": "refs/heads/master",
"committer_date": 1611872724000,
"content_id": "7ad166e51273e8d81b0320531951f4ead8639e41",
"detected_licenses": [
"MIT"
],
"directory_id": "6a84fa67fd8f39336b8b98b6dd377eedcc7f6f3e",
"extension": "py",
"fi... | 3.109375 | stackv2 | from pydriller import RepositoryMining
import csv
import logging
import pandas as pd
import matplotlib.pyplot as plt
logging.basicConfig(level=logging.INFO)
logger = logging.getLogger(__name__)
def read_from_github(url, dict):
"""
url: github link of a repository
dict: list commit id, date and message w... | 171 | 35.73 | 175 | 16 | 1,556 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_830dd40beb04beee_62901202", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://gitlab.com/](1) may be at an arbitrary positio... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [https://gitlab.com/](1) may be at an arbitrary position in the sanitized URL."
] | [
126
] | [
null
] | [
12
] | [
39
] | |
2024-11-18T18:05:56.912475+00:00 | 1,570,025,414,000 | 7fe641e4cdad79651a7f3c6ee7288d649300a696 | 2 | {
"blob_id": "7fe641e4cdad79651a7f3c6ee7288d649300a696",
"branch_name": "refs/heads/master",
"committer_date": 1570025414000,
"content_id": "fa0a819f13e9e532c958276f3dcd813281248729",
"detected_licenses": [
"MIT"
],
"directory_id": "df1ed8a730b7be81dc71f1dfd72a1f60e4152102",
"extension": "py",
"fi... | 2.3125 | stackv2 | from yoti_python_sdk.sandbox.endpoint import SandboxEndpoint
from cryptography.fernet import base64
from os.path import expanduser, isfile
from past.builtins import basestring
import json
import requests
import yoti_python_sdk
from yoti_python_sdk.config import (
X_YOTI_AUTH_KEY,
X_YOTI_AUTH_DIGEST,
X_YOTI... | 182 | 32.66 | 94 | 17 | 1,330 | python | [{"finding_id": "codeql_py/request-without-cert-validation_db3ad9127ace1767_42a6da80", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
81
] | [
null
] | [
16
] | [
88
] | |
2024-11-18T18:05:57.981737+00:00 | 1,576,195,525,000 | ab7e9482626b258fb20fa6c70d0a15d4c02d8a46 | 2 | {
"blob_id": "ab7e9482626b258fb20fa6c70d0a15d4c02d8a46",
"branch_name": "refs/heads/master",
"committer_date": 1576195525000,
"content_id": "19a61d8a5bd3ebc3982d8d9e16e91ad0d3e166f2",
"detected_licenses": [
"MIT"
],
"directory_id": "eb88c553bae0a7e44384f90a79b56db6f4e3ac33",
"extension": "py",
"fi... | 2.5 | stackv2 | # Samuel Dunn
# CS 320, Fall 2019
import os
import cherrypy
from jinja2 import Environment, FileSystemLoader
try:
from ..tutorial.tutorial_factory import TutorialFactory
from .tutorial_manager import TutorialManager
from ..auth.authenticator import Authenticator
except ImportError:
from pofis.tutorial... | 74 | 38.34 | 154 | 19 | 620 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2c5e23ef095f3033_e9a83cd1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
21
] | [
null
] | [
20
] | [
70
] | |
2024-11-18T18:15:56.090445+00:00 | 1,616,915,498,000 | b6bc109781047cea556774679071c49d8963f667 | 2 | {
"blob_id": "b6bc109781047cea556774679071c49d8963f667",
"branch_name": "refs/heads/main",
"committer_date": 1616915498000,
"content_id": "c26876151d2cd1ffd8d296dcfe1df5e19d61d0da",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ddb36efae1125efc2f51cc3c6347edfaeb5f5292",
"extension": "py",
... | 2.3125 | stackv2 | import pandas as pd
import config
import numpy as np
import os
import datetime
import json
import flask
import werkzeug
from flask import request
#from werkzeug.contrib.fixers import ProxyFix
app = flask.Flask(__name__)
@app.route('/postjson', methods = ['POST'])
def postJsonHandler():
content = request.get... | 35 | 22.83 | 59 | 12 | 220 | python | [{"finding_id": "codeql_py/flask-debug_b525a0b59cebef21_3f613f0d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
34,
29
] | [
null,
null
] | [
null,
12
] | [
49,
23
] | |
2024-11-18T18:16:14.866375+00:00 | 1,521,609,831,000 | f52de3244bdca6b8b7d0ef2b27abcf1ed73b85cf | 2 | {
"blob_id": "f52de3244bdca6b8b7d0ef2b27abcf1ed73b85cf",
"branch_name": "refs/heads/master",
"committer_date": 1521609831000,
"content_id": "cc91a38489f3159b8ae7e807dd5c01cb77205f2e",
"detected_licenses": [
"MIT"
],
"directory_id": "e0cb098d0d14f1ededd2224a92bb0554a79cd52c",
"extension": "py",
"fi... | 2.34375 | stackv2 | from bs4 import BeautifulSoup #as Soup
import os
##import soupselect_bs4; soupselect_bs4.monkeypatch()
import urllib.request
###soup = BeautifulSoup(urllib.request.urlopen('http://slashdot.org/')) #Soup()
##select(soup, 'div#firehoselist > article > h2.story > span.story-title a')
##soup.findSelect('h2.story span a')... | 159 | 42.08 | 89 | 23 | 1,517 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cd8f7ef799069607_a7d68678", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
91
] | [
null
] | [
23
] | [
47
] | |
2024-11-18T18:16:14.975326+00:00 | 1,629,133,973,000 | 3a2b704367840270f1d138015d734d3f2bcaa218 | 3 | {
"blob_id": "3a2b704367840270f1d138015d734d3f2bcaa218",
"branch_name": "refs/heads/main",
"committer_date": 1629133973000,
"content_id": "052d942f1b788084280d393e0897850e36ccd259",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "971d7f21d123e92d93a59fdd7ed216e919c6b599",
"extension": "py",
... | 2.703125 | stackv2 | #! /usr/bin/env python
import os
import sys
import requests
SLACK_API_TOKEN = os.environ['SLACK_API_TOKEN']
users_list = requests.get('https://slack.com/api/users.list?token=%s' % SLACK_API_TOKEN).json()
if users_list['ok'] is not True:
print('Slack API call failed')
sys.exit(1)
for user in users_list['me... | 20 | 21.7 | 95 | 11 | 125 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_28a5d9b9c9d82b78_c9630899", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
20
] | [
null
] | [
11
] | [
53
] | |
2024-11-18T19:31:11.352690+00:00 | 1,505,465,056,000 | 671b3a9bf9da96b46f0a8d4db2322a0a33e315f5 | 3 | {
"blob_id": "671b3a9bf9da96b46f0a8d4db2322a0a33e315f5",
"branch_name": "refs/heads/master",
"committer_date": 1505465056000,
"content_id": "d7f25c5cace2f8519c9c52eace7918d42b6f93b1",
"detected_licenses": [
"ISC"
],
"directory_id": "f9d8bceaf47504fb6d15d789b0f40fc4cb7e776f",
"extension": "py",
"fi... | 2.5625 | stackv2 | # coding: utf-8
"""Crypto related utilities."""
from __future__ import unicode_literals
import base64
import random
import string
from django.utils.encoding import force_bytes, force_text
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
from cryptography.hazmat.backends import default_ba... | 58 | 28.88 | 76 | 14 | 422 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_1ec6d5c05cea39a4_a8751898", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
42,
53
] | [
null,
null
] | [
10,
13
] | [
33,
33
] | |
2024-11-18T18:59:39.238597+00:00 | 1,579,729,616,000 | 42559f54816c813d0c94e68406147a8cc4a58ffb | 3 | {
"blob_id": "42559f54816c813d0c94e68406147a8cc4a58ffb",
"branch_name": "refs/heads/master",
"committer_date": 1579729616000,
"content_id": "0f39c05ce7c52ed7b8a5d52141bb30cbecbf73df",
"detected_licenses": [
"MIT"
],
"directory_id": "268bb3ebccb9bba43c7878c701bc5398f8dd781f",
"extension": "py",
"fi... | 2.65625 | stackv2 |
from jinja2 import Environment, FileSystemLoader, select_autoescape
from jinja2 import Template
import report_generator.view.templates as templates
#env = Environment(
# loader = PackageLoader('report_generator','view/templates'),
# autoescape=select_autoescape(['html','xml'])
#)
"""
template = Template(filen... | 62 | 27.5 | 100 | 13 | 360 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_722d21f56d0ae808_9900c98e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
19
] | [
null
] | [
7
] | [
38
] | |
2024-11-18T19:23:57.319916+00:00 | 1,690,505,680,000 | 7c256a7b691f9ad7c4f72d29df0601e1f325a78b | 3 | {
"blob_id": "7c256a7b691f9ad7c4f72d29df0601e1f325a78b",
"branch_name": "refs/heads/master",
"committer_date": 1690505680000,
"content_id": "b5f64b194228ddad9236520b7c3ca04a803ef4fc",
"detected_licenses": [
"MIT"
],
"directory_id": "45b852a00cb59718b263b823e0f954e9c21e838c",
"extension": "py",
"fi... | 2.734375 | stackv2 | from astral import AstralError
from cachetools import cached
from cachetools import TTLCache
from json.decoder import JSONDecodeError
from logging import info
from requests import get
from requests import RequestException
from firestore import DataError
from firestore import Firestore
# The endpoint of the OpenWeathe... | 92 | 31.59 | 77 | 16 | 730 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c0012b3eff0d583d_1c10e3f2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
61
] | [
null
] | [
14
] | [
34
] | |
2024-11-18T18:39:33.359137+00:00 | 1,604,722,518,000 | 27e1e1faed78cf74bdaaf10779d29bd4d26bb3b6 | 2 | {
"blob_id": "27e1e1faed78cf74bdaaf10779d29bd4d26bb3b6",
"branch_name": "refs/heads/master",
"committer_date": 1604722518000,
"content_id": "bc56b3e74521d697e1c12e6a21962a08d6680372",
"detected_licenses": [
"MIT"
],
"directory_id": "297846b2213e3653b26c31cc396cea71c9172191",
"extension": "py",
"fi... | 2.359375 | stackv2 | '''
Function:
小米商城模拟登录
Author:
Charles
微信公众号:
Charles的皮卡丘
更新日期:
2020-10-29
'''
import re
import time
import json
import hashlib
import warnings
import requests
warnings.filterwarnings('ignore')
'''PC端登录小米商城'''
class mieshopPC():
is_callable = True
def __init__(self, **kwargs):
for key,... | 132 | 35.58 | 164 | 20 | 1,214 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_8a762b4bedf9445f_70708a37", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
46
] | [
null
] | [
41
] | [
74
] | |
2024-11-18T18:39:40.866223+00:00 | 1,647,361,550,000 | c1799340d6001841ba5a6195e25ed297101229de | 3 | {
"blob_id": "c1799340d6001841ba5a6195e25ed297101229de",
"branch_name": "refs/heads/master",
"committer_date": 1647361550000,
"content_id": "722cb849d67a21876d8988845f0ef35bd92bbeea",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "dfbdfab87f412f52bbd4b274e4ea5bbb61dd2f14",
"extension": "p... | 2.921875 | stackv2 | #!/usr/bin/env python
# landScraper.py -v 1.7
# currently designed for python 3.10.2
# Author- David Sullivan
#
# Credit to Michael Shilov from scraping.pro/simple-email-crawler-python for the base for this code
#
# As a reminder, web scraping for the purpose of SPAM or hacking is illegal. This tool has been provided f... | 230 | 33.39 | 119 | 21 | 1,809 | python | [{"finding_id": "codeql_py/request-without-cert-validation_bb6846694be66a2c_3928abb5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
95
] | [
null
] | [
28
] | [
110
] | |
2024-11-18T18:39:56.189424+00:00 | 1,600,156,337,000 | f3871f51c878fba286499c7688659976f2c16901 | 3 | {
"blob_id": "f3871f51c878fba286499c7688659976f2c16901",
"branch_name": "refs/heads/main",
"committer_date": 1600156337000,
"content_id": "61204377acad860cb216648bbf9448dd43d7c3d6",
"detected_licenses": [
"MIT"
],
"directory_id": "6779059f7c273fd554cbc8dc99bfad06c2cb2a9d",
"extension": "py",
"file... | 2.640625 | stackv2 | import datetime
import urllib.parse
import pytz
import requests
from flask import Blueprint, jsonify, request
from ew_common.input_validation import extract_postal_code
mod = Blueprint("mobilize_america", __name__)
EVENTS_URL_BASE = "https://events.mobilizeamerica.io/api/v1/organizations/3510/events?per_page=3&excl... | 106 | 34.36 | 115 | 14 | 899 | python | [{"finding_id": "codeql_py/partial-ssrf_97cfba4491adde68_882402ea", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
67
] | [
null
] | [
14
] | [
31
] | |
2024-11-18T19:10:00.898766+00:00 | 1,578,952,555,000 | cfb7ad6602387aebf6f4c944299ce032445bac6a | 3 | {
"blob_id": "cfb7ad6602387aebf6f4c944299ce032445bac6a",
"branch_name": "refs/heads/master",
"committer_date": 1578952555000,
"content_id": "e128bb1b2d3d24d497ca67edccdb55e7576baf6b",
"detected_licenses": [
"MIT"
],
"directory_id": "d0253288a55c9ab71f69e61f166a1e717ddbf923",
"extension": "py",
"fi... | 2.9375 | stackv2 | # Forked from https://github.com/TelloSDK/Multi-Tello-Formation
# This fork hosted at https://github.com/scubyd/Multi-Tello-Formation to support Python 3
# Updated and tested with Python 3.7
import socket
def set_ap(ssid, password):
"""
A Function to set tello in AP mode
:param ssid: the ssid of the netw... | 36 | 37.86 | 112 | 9 | 415 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_02efd1f5fd7232e6_e63d4b4c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-200"
] | [
"py/clear-text-logging-sensitive-data",
"py/bind-socket-all-network-interfaces"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"'' binds a socket to all interfaces."
] | [
25,
17
] | [
null,
null
] | [
11,
5
] | [
41,
31
] | |
2024-11-18T19:49:09.455976+00:00 | 1,613,990,125,000 | f787ecc8e1c449708ce1bda61ca3211d05304ba4 | 3 | {
"blob_id": "f787ecc8e1c449708ce1bda61ca3211d05304ba4",
"branch_name": "refs/heads/master",
"committer_date": 1613990125000,
"content_id": "52c7eddae88a2cb8f670afc914d8e7fb39d27e07",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "5577735428df8e493c59160debcde81e256266ee",
"extension": "py",
... | 3.171875 | stackv2 | from datetime import datetime, timedelta
import hashlib
class Cache:
def __init__(self, key_expiration_in_seconds):
self.expirationInSeconds = key_expiration_in_seconds
self.cache = {}
@staticmethod
def __key(username, ldap_config_key):
return username + '#' + ldap_config_key
... | 38 | 30.37 | 87 | 18 | 254 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_af4f9b33677fb51f_0d0a543a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
16
] | [
null
] | [
31
] | [
48
] | |
2024-11-18T20:15:56.239690+00:00 | 1,650,918,693,000 | 5a3607123df8b93ad6dd2cdc1cde8e88622a2b98 | 4 | {
"blob_id": "5a3607123df8b93ad6dd2cdc1cde8e88622a2b98",
"branch_name": "refs/heads/main",
"committer_date": 1650918693000,
"content_id": "7afbe374a4df88c277c1536c0549a7466e7cd7fd",
"detected_licenses": [
"MIT"
],
"directory_id": "5f65e12a62b59aea9263f35240c960b7e6009aa5",
"extension": "py",
"file... | 3.859375 | stackv2 | #!/usr/bin/python
"""Get the numbers for the superbowl box pools."""
from random import shuffle
if __name__ == "__main__":
team1 = input("Who is the home team? ")
team2 = input("Who is the away team? ")
teams = {'home': team1, 'away': team2}
away = range(0, 10)
home = range(0, 10)
shuff... | 26 | 21.65 | 78 | 12 | 180 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_09f00ed6260fe44e_98ef6c46", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
25
] | [
null
] | [
11
] | [
78
] | |
2024-11-18T20:15:57.815698+00:00 | 1,613,664,564,000 | ea038483d9cb79b5c01f975a3428e5af1602c558 | 2 | {
"blob_id": "ea038483d9cb79b5c01f975a3428e5af1602c558",
"branch_name": "refs/heads/master",
"committer_date": 1613664564000,
"content_id": "f9259f301ed82179530bfe77880ffbe1174af509",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9360d6354d91bff42f5949cf737512d72b4e1fb3",
"extension": "py"... | 2.46875 | stackv2 | from flask import Flask, request
import os
import datetime
from pymongo import MongoClient
from flask_httpauth import HTTPTokenAuth
app = Flask(__name__)
auth = HTTPTokenAuth(scheme='Bearer')
db = None
secret = None
@auth.verify_token
def verify_token(token):
if token == secret:
print("authenicated")
... | 63 | 27.49 | 106 | 12 | 435 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7677304babfcd56f_db6a97e2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
47
] | [
null
] | [
11
] | [
14
] | |
2024-11-18T20:16:02.144390+00:00 | 1,611,309,661,000 | ee259ed0030448d8260adf5fa8ebeb3445de3996 | 3 | {
"blob_id": "ee259ed0030448d8260adf5fa8ebeb3445de3996",
"branch_name": "refs/heads/master",
"committer_date": 1611309661000,
"content_id": "8ef0c28927da1e610e5f61b9e3eb1a3dbaacc171",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "cb17ecde1952866bd485ff4f0a2cba48ee9935e0",
"extension": "p... | 2.96875 | stackv2 | import hashlib
import json
import os
from os import path
class Cache:
def __init__(self, config):
self.name = config["name"]
self.path = config["path"]
self.ext = config["ext"]
def _load_cache(self):
if self.get_cache_dir() is not None and path.exists(self.get_cache_dir()):
... | 61 | 30.69 | 95 | 18 | 433 | python | [{"finding_id": "codeql_py/overly-permissive-file_dfaf1b88b2a29526_c7369cac", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
32
] | [
null
] | [
13
] | [
39
] | |
2024-11-18T19:38:26.002167+00:00 | 1,554,236,684,000 | 8f8e3e74e5208a2db9c77679665ce8b69786164c | 3 | {
"blob_id": "8f8e3e74e5208a2db9c77679665ce8b69786164c",
"branch_name": "refs/heads/master",
"committer_date": 1554236684000,
"content_id": "1c4630086ef30c6136a9edabe95d3911ecb465d4",
"detected_licenses": [
"MIT"
],
"directory_id": "281aeb647332c4be456ab437fc1fa4f678886d2a",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/local/bin/python3
import boto3
import logging
import os
import ast
import json
import rubrik_cdm
from copy import deepcopy
import urllib3
urllib3.disable_warnings()
logger = logging.getLogger()
logger.setLevel(logging.INFO)
def lambda_handler(event, context):
"""Secrets Manager Rotation Template
This... | 247 | 52.42 | 167 | 17 | 2,897 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_63afaf5a36a619e2_43b6cf83", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 12 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive dat... | [
41,
45,
48,
51,
114,
119,
133,
162,
178,
236,
243,
247
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
22,
22,
21,
22,
21,
26,
25,
21,
22,
29,
17,
17
] | [
67,
96,
96,
105,
80,
116,
106,
155,
159,
108,
112,
87
] | |
2024-11-18T19:38:26.374133+00:00 | 1,579,393,214,000 | d0a5018d26d5ecb852d8ee00acf6ab9a4de606e8 | 3 | {
"blob_id": "d0a5018d26d5ecb852d8ee00acf6ab9a4de606e8",
"branch_name": "refs/heads/master",
"committer_date": 1579393214000,
"content_id": "06d8e08c63e2ec4e1144ecf9ddcfbf20592a26d4",
"detected_licenses": [
"MIT"
],
"directory_id": "3999908022d4c56494150facf127021ac8a155a2",
"extension": "py",
"fi... | 2.53125 | stackv2 | from flask import Blueprint, request, jsonify
from app.models.interval_model import Interval
from app.models.video_model import Video
from app.utils.update import average_interval_update
interval_api = Blueprint("interval_api", __name__)
@interval_api.route("/api/interval", methods=["POST"])
def create_interval():
... | 56 | 29.57 | 90 | 17 | 390 | python | [{"finding_id": "codeql_py/stack-trace-exposure_a0a07db4e4603de5_3d379409", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
56
] | [
null
] | [
16
] | [
22
] | |
2024-11-18T20:10:55.205485+00:00 | 1,609,314,125,000 | df950b7b60294932a0692b94bd0b91aeafa90a46 | 4 | {
"blob_id": "df950b7b60294932a0692b94bd0b91aeafa90a46",
"branch_name": "refs/heads/master",
"committer_date": 1609314125000,
"content_id": "100f5a8cbdbbd40eb65c60a1ff4df44c67f3a278",
"detected_licenses": [
"MIT"
],
"directory_id": "d22b83584ea49d230cb8e2c703689e7ddf05ac12",
"extension": "py",
"fi... | 3.515625 | stackv2 | # -*- coding: utf-8 -*-
#Coded By Ashkan Rafiee https://github.com/AshkanRafiee/SimpleBrute/
import requests
def readfile(file):
with open(file) as f:
content = f.readlines()
# remove whitespace characters like `\n` at the end of each line
content = [x.strip() for x in content]
return content
... | 47 | 33.17 | 85 | 19 | 338 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c9e0b39843f090f0_3c4cb581", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p... | [
24,
25,
30
] | [
null,
null,
null
] | [
45,
45,
27
] | [
56,
56,
54
] | |
2024-11-18T20:26:06.830490+00:00 | 1,611,041,327,000 | c821bb8641d82e2f83c3ba33744baa358ab8cf8e | 4 | {
"blob_id": "c821bb8641d82e2f83c3ba33744baa358ab8cf8e",
"branch_name": "refs/heads/master",
"committer_date": 1611041327000,
"content_id": "a4db21cc480642ff59ddbf4d0c0c07bc6dc60fcc",
"detected_licenses": [
"MIT"
],
"directory_id": "9486f57d4c0ffb1ae39d5ad78eae5461f177ff35",
"extension": "py",
"fi... | 4 | stackv2 |
# Create the class
class Employee:
def __init__(self):
None
def DetermineWeeklySalary(self, weeklyHours, wage):
print("ready to calculate" )
class Permanent(Employee):
def __init__(self):
Employee.__init__(self)
def DetermineWeeklySalary(self, weeklyHours, wage):
... | 42 | 29.81 | 91 | 19 | 324 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e18b610115b4c956_1f2fa64a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
16,
24
] | [
18,
26
] | [
15,
15
] | [
55,
55
] | |
2024-11-18T20:26:20.358174+00:00 | 1,622,618,121,000 | e0c004f76a6d48e0c0a2b337dc37f842e56404a1 | 3 | {
"blob_id": "e0c004f76a6d48e0c0a2b337dc37f842e56404a1",
"branch_name": "refs/heads/master",
"committer_date": 1622618121000,
"content_id": "98e9dc6c67840001ba8a1e84b0ed04d304ce656e",
"detected_licenses": [
"MIT"
],
"directory_id": "0b5058743fe5d7f50bd24020ccab4e14772d6651",
"extension": "py",
"fi... | 2.59375 | stackv2 | from flask import Flask, render_template, request
from datastore.store_loader import load_store as store
app = Flask(__name__)
bus_data = store()
@app.route("/api/bus/<bus_number>", methods = ["GET"])
def get(bus_number):
if request.method == "GET":
try:
bus_info = bus_data[bus_number]
... | 40 | 25.57 | 94 | 15 | 222 | python | [{"finding_id": "codeql_py/flask-debug_bf655bf4bb4bcebb_9f1878ec", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
40,
29
] | [
null,
null
] | [
5,
20
] | [
26,
23
] | |
2024-11-18T20:26:21.515004+00:00 | 1,552,071,651,000 | c9e6b9b58c84c5dcf0c62bf8bedf940d9c313b03 | 2 | {
"blob_id": "c9e6b9b58c84c5dcf0c62bf8bedf940d9c313b03",
"branch_name": "refs/heads/master",
"committer_date": 1552071651000,
"content_id": "1989754455bb05b5bc7e202ef8a3d8a7c46e292a",
"detected_licenses": [
"MIT"
],
"directory_id": "71dbb40bf28bddff0b96985fbd71c0837f37a572",
"extension": "py",
"fi... | 2.328125 | stackv2 | import logging
import os
from ..common.access_exceptions import AuthenticationException
from globus_sdk import ConfidentialAppAuthClient, ClientCredentialsAuthorizer
from globus_sdk import TransferClient
class GlobusAccessWithConfidentialAuth:
def __init__(self):
self.log = logging.getLogger(self.__clas... | 55 | 39.33 | 93 | 15 | 442 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b679e4834c49e29e_79b6262b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
28
] | [
null
] | [
23
] | [
87
] | |
2024-11-18T20:26:50.058389+00:00 | 1,475,567,154,000 | 7399d6657318faee87eefe58aa06efb5d1025e2f | 2 | {
"blob_id": "7399d6657318faee87eefe58aa06efb5d1025e2f",
"branch_name": "refs/heads/master",
"committer_date": 1475567154000,
"content_id": "67677c05ce8d617981d5a5ac9a2f06d9a2436491",
"detected_licenses": [
"MIT"
],
"directory_id": "5a0413bacde1176d58577bdfcc7577465dfde2bf",
"extension": "py",
"fi... | 2.5 | stackv2 | import os
import lexEngine.lexengine as LE
import subprocess
import random
import urllib2
import reddit
import twitterDicts
import crawler
import re
import threading
import bs4
class client:
industry = ""
url = ""
clientName = ""
industryWords = []
domain = ""
workingDirectory = ""
htmlText = ""
pdfsDownloaded ... | 191 | 32.3 | 140 | 16 | 1,673 | python | [{"finding_id": "codeql_py/bad-tag-filter_d01c632dc09b93e3_3cae7ddc", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match comments containing newlines.", "remediation": "", "location": {"file_pat... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match comments containing newlines."
] | [
39
] | [
null
] | [
22
] | [
31
] | |
2024-11-18T20:26:57.767531+00:00 | 1,586,516,734,000 | 4c33a12b45d4e50ce33b5bb3ac8ff5ace77d9345 | 3 | {
"blob_id": "4c33a12b45d4e50ce33b5bb3ac8ff5ace77d9345",
"branch_name": "refs/heads/master",
"committer_date": 1586516734000,
"content_id": "e00d7b7408bf1d5e3fc5f07272bea48d74f73033",
"detected_licenses": [
"MIT"
],
"directory_id": "a0abf7efea510269409f5d81fd71c576c7a5f99c",
"extension": "py",
"fi... | 2.78125 | stackv2 | import http.client
import hashlib
import urllib
import random
import json
from tqdm import tqdm
appid = '20200403000411315' # 填写你的appid
secretKey = '7HjoylhCni3lBsLmeWIr' # 填写你的密钥
httpClient = None
myurl = '/api/trans/vip/translate'
def _translate(sent, from_lan, to_lan):
salt = random.randint(32768, 65536)
... | 48 | 26.96 | 105 | 19 | 378 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_2d446e68ee1cc3db_428fdc75", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
18
] | [
null
] | [
24
] | [
37
] | |
2024-11-18T20:27:02.465394+00:00 | 1,623,244,875,000 | 0499ec3d97f2645065fce66073ca96894c1fce80 | 3 | {
"blob_id": "0499ec3d97f2645065fce66073ca96894c1fce80",
"branch_name": "refs/heads/main",
"committer_date": 1623244875000,
"content_id": "f9786605c9a5a026be752ffd57920577f7f6ec47",
"detected_licenses": [
"MIT"
],
"directory_id": "12508025d13b51f3180e363982e4f5cdec540eee",
"extension": "py",
"file... | 2.640625 | stackv2 | # default inputs
# uri = https://{vra}/iaas/login
# vra-refreshtoken = secret with token value (currently manually refreshed every 90 days)
#
# dependency
# requests
#
import requests
import json
def handler(context, inputs):
# define headers
headers = {"Content-Type": "application/x-www-form-urlencoded"}... | 34 | 27.32 | 96 | 13 | 230 | python | [{"finding_id": "codeql_py/request-without-cert-validation_ce07cabd5f34a620_64673c09", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
19
] | [
null
] | [
14
] | [
93
] | |
2024-11-18T20:51:55.753376+00:00 | 1,455,900,945,000 | 838d002f26c12c0f8b22fc949e4505cb9fde5977 | 3 | {
"blob_id": "838d002f26c12c0f8b22fc949e4505cb9fde5977",
"branch_name": "refs/heads/master",
"committer_date": 1455900945000,
"content_id": "99c0a84d104d4aba330b0e6baf4b7d742492f0a2",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "df310641409d3af2209c628da2473a597fbaccd1",
"extension": "p... | 2.515625 | stackv2 | # Simple lockfile.
# Copyright (c) 2015, Andre Lucas
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are met:
# * Redistributions of source code must retain the above copyright
# notice, this li... | 134 | 35.61 | 78 | 15 | 1,076 | python | [{"finding_id": "codeql_py/overly-permissive-file_3b3a31579a4f2e83_5180593a", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in open sets file to world readable."
] | [
57
] | [
58
] | [
20
] | [
75
] | |
2024-11-18T20:52:16.382480+00:00 | 1,572,154,558,000 | ab31737ca45d296c1cf1114ca680188f519522ba | 3 | {
"blob_id": "ab31737ca45d296c1cf1114ca680188f519522ba",
"branch_name": "refs/heads/master",
"committer_date": 1572154558000,
"content_id": "01a40df2f78a2ea6b5e028d38f3bbdab40e1f9cc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "426f216e3d38d2030d337c8be6463cc4cd7af6c3",
"extension": "py"... | 2.65625 | stackv2 | #!/usr/bin/env python
# -*- coding:utf-8 -*-
#通过堡垒机跳转时间命令传输
import paramiko
import os
import sys
import time
blip = "121.42.191.190" #定义的堡垒机信息
bluser = "zhangyage"
blpasswd = "MCya9B7ewPoTeNT8"
hostname = "116.196.69.47" #定义的业务主机信息
username = "root"
password = "Zhangyage"
port = 22
passinfo = '\'s password: ' #... | 72 | 24.29 | 81 | 12 | 585 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_f025647db98b759f_7208cf33", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
24
] | [
null
] | [
null
] | [
58
] | |
2024-11-18T20:52:17.906828+00:00 | 1,692,088,724,000 | 0572b9a04580626f942f3034f3352aeb5bb476b3 | 3 | {
"blob_id": "0572b9a04580626f942f3034f3352aeb5bb476b3",
"branch_name": "refs/heads/main",
"committer_date": 1692088724000,
"content_id": "6e85b1b1b0e282ae01b6371f56091d5d4874a667",
"detected_licenses": [
"MIT"
],
"directory_id": "c80d0926964a49d9b136f4d591cd220c54a5ef6b",
"extension": "py",
"file... | 3.046875 | stackv2 | from jinja2 import Template
from folium.elements import JSCSSMixin
from folium.map import Marker
from folium.utilities import parse_options
from folium.vector_layers import path_options
class SemiCircle(JSCSSMixin, Marker):
"""Add a marker in the shape of a semicircle, similar to the Circle class.
Use (dire... | 94 | 30.22 | 99 | 15 | 636 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_984c4dc0921276a5_f8b27111", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
39
] | [
52
] | [
17
] | [
6
] | |
2024-11-18T20:52:28.949887+00:00 | 1,592,022,948,000 | 492a00655c05804278bb2fbbeefd486ed3e78dae | 2 | {
"blob_id": "492a00655c05804278bb2fbbeefd486ed3e78dae",
"branch_name": "refs/heads/master",
"committer_date": 1592022948000,
"content_id": "6ae50488232b2745c197d52296db726675ae257c",
"detected_licenses": [
"MIT"
],
"directory_id": "6cd29e63abf68ce35134a6a2550766fa11317b35",
"extension": "py",
"fi... | 2.453125 | stackv2 | import hashlib
import json
from random import randrange
from time import time
import requests
from django.core.cache import cache
from common import error
from tantan.config import WY_SMS_APPSECRET, WY_SMS_APPKEY
from worker import call_by_worker
def gen_verify_code(length):
'''生成验证码'''
min_value=10**(lengt... | 71 | 24.34 | 74 | 15 | 542 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_3316c9448743cffd_58d5617f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
36
] | [
null
] | [
29
] | [
45
] | |
2024-11-18T20:52:49.998916+00:00 | 1,608,439,614,000 | bbc56bd8d9a492b76b5e16e3c958e8d68449fa89 | 3 | {
"blob_id": "bbc56bd8d9a492b76b5e16e3c958e8d68449fa89",
"branch_name": "refs/heads/master",
"committer_date": 1608439614000,
"content_id": "50bff7f1e6601137f47fd0f4aa507167d9635023",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2b7bc7979926987233f07a29c29269273bd123a8",
"extension": "py"... | 2.515625 | stackv2 | from flask import Flask, redirect, url_for, request, jsonify, render_template
import os
import json
import io
import glob
from PIL import Image
from torchvision import models
import torchvision.transforms as transforms
import string
app = Flask(__name__)
model = models.densenet121(pretrained=True)
model.eval()
de... | 82 | 30.35 | 77 | 15 | 538 | python | [{"finding_id": "codeql_py/url-redirection_a98fed433c0d440f_1d6cac5f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 3 | true | [
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
54,
59,
76
] | [
null,
null,
null
] | [
29,
29,
25
] | [
40,
40,
36
] | |
2024-11-18T19:02:31.644464+00:00 | 1,582,901,153,000 | 03117ba90c2d4be9e04fa0ae18b2fdac0640ce37 | 3 | {
"blob_id": "03117ba90c2d4be9e04fa0ae18b2fdac0640ce37",
"branch_name": "refs/heads/master",
"committer_date": 1582923422000,
"content_id": "5746bf2ef00855ce98290aa3bc008396f0cf46ac",
"detected_licenses": [
"MIT"
],
"directory_id": "721a87a5ac341930884c81a7ce5c54402e825a27",
"extension": "py",
"fi... | 2.515625 | stackv2 | import pdb
import os
from tqdm import tqdm
from random import randint
from randomuser import RandomUser
import firebase_admin
from firebase_admin import credentials
from firebase_admin import firestore
# School subjects offered at Gunn I could think of in less than a min
SUBJECTS = [
"AP Comp Sci A",
"Bio H",... | 248 | 27.29 | 134 | 17 | 1,731 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7198abee1fadd5e7_74b16cd4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
126
] | [
null
] | [
15
] | [
50
] | |
2024-11-18T19:02:47.624207+00:00 | 1,557,949,982,000 | 28e6b991d714540eb13a6d7a3da2a93a58cdd1af | 3 | {
"blob_id": "28e6b991d714540eb13a6d7a3da2a93a58cdd1af",
"branch_name": "refs/heads/master",
"committer_date": 1557949982000,
"content_id": "abf9056fa52dc02913fc9a4bcda40e4f289c5fbf",
"detected_licenses": [
"MIT"
],
"directory_id": "5102e36063144ae45e1cc5f37676f6c582c97b57",
"extension": "py",
"fi... | 3.390625 | stackv2 | import time
import resource
import platform
# check if prefix is a valid prefix for phoneNumber
def isPrefix(phoneNumber, prefix):
if len(prefix) > len(phoneNumber):
return False
for i in range(len(prefix)):
if (phoneNumber[i] != prefix[i]):
return False
return True
#... | 91 | 29.42 | 88 | 13 | 723 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_df762010ca7ac06c_0dd346bc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text."
] | [
59
] | [
null
] | [
11
] | [
88
] | |
2024-11-18T19:03:03.853517+00:00 | 1,594,329,341,000 | 7261d048c931813ea8ab0ff4cc3b2a573c8bced8 | 2 | {
"blob_id": "7261d048c931813ea8ab0ff4cc3b2a573c8bced8",
"branch_name": "refs/heads/master",
"committer_date": 1594329341000,
"content_id": "3bb403d0c12a46ce81a2d25334cd5b6f7f8f7a0e",
"detected_licenses": [
"MIT"
],
"directory_id": "4707406e9e031cd0fad0c45fd99d472f47fadf61",
"extension": "py",
"fi... | 2.4375 | stackv2 | import base64
import hashlib
import hmac
import json
import time
import requests
#generate keys from https://www.koinde.com/user-account/api-key/
API_KEY = "<YOUR_API_KEY>"
API_SECRET = "<YOUR_API_SECRET>=="
def authenticate():
private_key = base64.b64decode(API_SECRET)
stamp = str(int(time.time())*1000)
... | 38 | 26.32 | 146 | 13 | 323 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_82b2fe1ac41cf7ea_85b438a7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
17
] | [
null
] | [
57
] | [
61
] | |
2024-11-18T19:14:31.334951+00:00 | 1,613,673,048,000 | eb7a63aa46c66c2ec2c63a6ae252ac4c6366a1d6 | 3 | {
"blob_id": "eb7a63aa46c66c2ec2c63a6ae252ac4c6366a1d6",
"branch_name": "refs/heads/master",
"committer_date": 1613673048000,
"content_id": "d46c1d61312c3fcea5efee7b081097045c29c641",
"detected_licenses": [
"MIT"
],
"directory_id": "c8e4e5c74a7d48daec0743e45eb5d4e15af53e60",
"extension": "py",
"fi... | 2.65625 | stackv2 | import os
import sys
import pathlib
import stat
from getpass import getpass
class Configurer:
DEFAULT_REGION = "us-east-1"
DEFAULT_CLIENT_ID = "2amp6q8t55a0usvo63cqu5vj11"
def __init__(self):
self.config = {}
def interactive_config(self):
config_path = os.path.join(pathlib.Path.home()... | 60 | 31.15 | 108 | 16 | 431 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_37128ad0047dc416_7f0478a8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
28
] | [
null
] | [
35
] | [
39
] | |
2024-11-18T19:14:39.375321+00:00 | 1,610,094,463,000 | b7d87c287ec013d85374dde3a0a6d365cc6374b8 | 2 | {
"blob_id": "b7d87c287ec013d85374dde3a0a6d365cc6374b8",
"branch_name": "refs/heads/master",
"committer_date": 1610094463000,
"content_id": "5e7b954c74f8f7df321b6462cf3d169692db9795",
"detected_licenses": [
"MIT"
],
"directory_id": "633ddec16a6e5f3b70ab646dcc48814c56287164",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import jinja2
import ftplib
import inspect
import logging
import datetime
import configparser
import dataclasses
from pathlib import Path
from collections import namedtuple
from types import SimpleNamespace
__author__ = 'Damian Pala'
__version__ = '0.1.0'
CLOUD_CREDENT... | 437 | 36.75 | 115 | 26 | 3,377 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9f1c4239146cb8d2_a3c2982a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
154
] | [
null
] | [
21
] | [
65
] | |
2024-11-18T19:14:45.084474+00:00 | 1,627,513,186,000 | fc837ea618e8014634429ec60e63e1d6e4934930 | 3 | {
"blob_id": "fc837ea618e8014634429ec60e63e1d6e4934930",
"branch_name": "refs/heads/main",
"committer_date": 1627513186000,
"content_id": "dd427b9746487822a70751083b0568a10e39d804",
"detected_licenses": [
"MIT"
],
"directory_id": "b15bc367149721edc18a55f878a13d3b81af2201",
"extension": "py",
"file... | 2.546875 | stackv2 | from django.db import models
from django.contrib.auth.models import AbstractBaseUser, BaseUserManager, PermissionsMixin
from django.core.exceptions import ValidationError
# Create your models here.
class AccountManager(BaseUserManager):
def domain_validation(self, email):
if "gmail.com" in email.split('@'... | 59 | 32.03 | 109 | 13 | 411 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fe34c2119020ca4d_628eb613", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [gmail.com](1) may be at an arbitrary position in the s... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The string [gmail.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [outlook.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [icloud.com](1) may be at an arbitrary position in the sanitized URL."
] | [
9,
12,
15
] | [
null,
null,
null
] | [
12,
14,
14
] | [
43,
47,
46
] | |
2024-11-18T19:27:26.460795+00:00 | 1,516,957,278,000 | 1edb7cca69ea3108c5f6ccee637a18c98d5b5c10 | 4 | {
"blob_id": "1edb7cca69ea3108c5f6ccee637a18c98d5b5c10",
"branch_name": "refs/heads/master",
"committer_date": 1516957278000,
"content_id": "4c1985a8ec338bc31c9bfea2760d7d0b3955816b",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "4c1b3de0def9ae8275f9dd88c23987c374054f7d",
"extension": "p... | 4.09375 | stackv2 | # 이름 짓기
# 파스칼 표기법(클래스) : 첫단어를 대문자로 시작하며 이름을 지음
# Employees, Department
# RegisterEmployees, JoinMember
# 카멜 표기법 : 첫단어를 소문자로 시작하며 이름을 지음
# registerEmployees, joinMember
# 스네이크 표기법(함수, 변수) : 소문자와 _ 기호를 이용해서 이름을 지음
# register_employees, join_member
# 헝가리언 표기법 : 자료형을 의... | 152 | 20 | 68 | 13 | 1,286 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1250b412457d5ebc_53b3eedb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
112
] | [
null
] | [
12
] | [
42
] | |
2024-11-18T19:27:43.951253+00:00 | 1,554,103,379,000 | be35371e03fb466758a6db5bc1c1be359ea9f55e | 2 | {
"blob_id": "be35371e03fb466758a6db5bc1c1be359ea9f55e",
"branch_name": "refs/heads/master",
"committer_date": 1554103379000,
"content_id": "218e22212b1516d1102a9348615d09ccedcaabe6",
"detected_licenses": [
"BSD-3-Clause",
"Apache-2.0"
],
"directory_id": "26f65f41cff242f91c9d26001c06c90cef1e4fd8",... | 2.3125 | stackv2 | import flask
import json
import argparse
import base64
import sqlite3
import sys
TEST_DB = 'example_app_test_db.db'
TEST_DB_SCHEMA = '''\
create table if not exists events (
_id integer primary key autoincrement,
date_created datetime default current_timestamp,
token varchar,
data blob
);'''
INSERT_EVENT_QUER... | 143 | 29.13 | 79 | 15 | 1,008 | python | [{"finding_id": "codeql_py/sql-injection_d47ef07cbdec1c0d_836a4632", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 3 | true | [
"CWE-089",
"CWE-089",
"CWE-089"
] | [
"py/sql-injection",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
82,
105,
106
] | [
null,
null,
null
] | [
33,
37,
20
] | [
38,
48,
32
] | |
2024-11-18T19:27:46.686034+00:00 | 1,631,542,580,000 | 3e94c71ca484e261ccf3508010ef495892ab35e6 | 3 | {
"blob_id": "3e94c71ca484e261ccf3508010ef495892ab35e6",
"branch_name": "refs/heads/main",
"committer_date": 1631542580000,
"content_id": "4543c8b214c0d8dc361c10847713d7224951efc7",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "12c5d78ee199ffc4a95113752218377ab15561ad",
"extension": "py"... | 2.671875 | stackv2 | import json
from flask import Blueprint
from flask import flash
from flask import redirect
from flask import render_template
from flask import request, jsonify
from flask import url_for
from werkzeug.utils import secure_filename
from datetime import datetime
from werkzeug.exceptions import abort
from tour.db import g... | 71 | 35.48 | 142 | 15 | 596 | python | [{"finding_id": "codeql_py/reflective-xss_495b7875373e07d4_de73fe2d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
70
] | [
null
] | [
16
] | [
20
] | |
2024-11-18T19:27:50.779422+00:00 | 1,425,906,026,000 | ac1c2bfb1850c7f4e3c6714b5b819d98661a2308 | 2 | {
"blob_id": "ac1c2bfb1850c7f4e3c6714b5b819d98661a2308",
"branch_name": "refs/heads/master",
"committer_date": 1425906026000,
"content_id": "4d168fe5abc3c5c6e723496d8eeadd61a919cce8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8f37a9d8e40afa22fbfad6228802af0c2791d893",
"extension": "py"... | 2.34375 | stackv2 | """
This script contains various views of Atlassian Parse Application
views
```````
1. /create_message
2. /register
run the views as http://127.0.0.1:5000/register
"""
# Import Statements
import datetime
import json
# from numpy import cast
import os
import sys
import messageDecode
import ti... | 551 | 31.22 | 91 | 21 | 3,474 | python | [{"finding_id": "codeql_py/reflective-xss_d76cc764f02d9b74_bbabdb23", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
90
] | [
91
] | [
12
] | [
76
] | |
2024-11-18T19:38:21.837106+00:00 | 1,522,853,047,000 | e757fc98764c3c07e7d26cc2c1bab9737b4a0aec | 3 | {
"blob_id": "e757fc98764c3c07e7d26cc2c1bab9737b4a0aec",
"branch_name": "refs/heads/master",
"committer_date": 1522853047000,
"content_id": "440faa3a5423dc888308724a0db1da37b0c3315a",
"detected_licenses": [
"MIT"
],
"directory_id": "00223e04d6e65dfac680ea501b5a2a4bdeefbaac",
"extension": "py",
"fi... | 2.75 | stackv2 | import re
from ssh import SSHSession
WWN_REGEX = re.compile('[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}'
, re.I)
class BrocadeSwitch(SSHSession):
"""
Establish SSH Connection to Brocade FC Switch which can be used
to run commands ... | 220 | 29.05 | 120 | 20 | 1,476 | python | [{"finding_id": "codeql_py/overly-large-range_50b8f349aee3bf8a_270e5bb9", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
113
] | [
null
] | [
36
] | [
39
] | |
2024-11-18T20:06:16.697205+00:00 | 1,511,987,035,000 | 74df9c90f4aed6da31959a2d58785bf4d609a86a | 3 | {
"blob_id": "74df9c90f4aed6da31959a2d58785bf4d609a86a",
"branch_name": "refs/heads/master",
"committer_date": 1511987035000,
"content_id": "8f23612ffdb663e5ac60db421151a666b110e9d8",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "cd809c5c8daf799cbfb94a902e53d8a9d5b6021f",
"extension": "p... | 2.5625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
``gvjinja module``
~~~~~~~~~~~~~~~~~~
A jinja module to create Graphviz directed graphs as
UML diagrams for jinja templates environments.
:Copyright: 2017 by Victor Hui.
:Licence: BSD, see LICENSE for more details.
``dir``
-------
- `class` :class:`.gvjinja`
- `cla... | 390 | 26.72 | 87 | 19 | 2,772 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_6bd00fe3db031d20_7b5358cd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
317
] | [
null
] | [
11
] | [
52
] | |
2024-11-18T20:18:11.424920+00:00 | 1,688,618,879,000 | 32ba28e21cd389e2d646c0b0706a5a40d1e6c671 | 2 | {
"blob_id": "32ba28e21cd389e2d646c0b0706a5a40d1e6c671",
"branch_name": "refs/heads/main",
"committer_date": 1688618879000,
"content_id": "06ea5e6720999f5f00a31156888496b3e1c5cd2f",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "c71b7a8a9dd7bf7c9496b1df2acc1e52a2a913d0",
"extension": "py"... | 2.3125 | stackv2 | # coding: utf-8
from django.conf import settings
from django.utils.translation import gettext as t
from django.http import HttpResponse
from django_digest import HttpDigestAuthenticator
from rest_framework.authentication import (
BaseAuthentication,
BasicAuthentication,
get_authorization_header,
TokenAu... | 115 | 33.4 | 86 | 15 | 735 | python | [{"finding_id": "codeql_py/stack-trace-exposure_37ff2502645bb98b_2ff47327", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
23
] | [
null
] | [
13
] | [
19
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.