added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T02:59:15.930709+00:00 | 1,382,780,953,000 | 907135a728faed31b2165efbb0f9d8d1778fcda1 | 2 | {
"blob_id": "907135a728faed31b2165efbb0f9d8d1778fcda1",
"branch_name": "refs/heads/master",
"committer_date": 1382780953000,
"content_id": "17f393b193e173717b81a199f467650254b65ccc",
"detected_licenses": [
"BSD-2-Clause",
"BSD-3-Clause"
],
"directory_id": "85045953314a1cf340a6e954bd0763864f6ec78b... | 2.375 | stackv2 | #!/usr/bin/python
import csv
import os.path
from collections import namedtuple
import sn
import os
import sys,string
import numpy as np
import math
import vcf
try:
file_map = sys.argv[1];dir_files_phenotype1 = sys.argv[2];dir_files_phenotype2 = sys.argv[3];outfilename = sys.argv[4]
except:
print "Usage:",s... | 146 | 19.2 | 123 | 15 | 874 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6ca7a18fe8ca1a25_747671f1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive d... | [
88,
138
] | [
null,
null
] | [
18,
18
] | [
58,
58
] | |
2024-11-19T02:59:20.915896+00:00 | 1,457,841,851,000 | f8f9c2cd049ff482f689eb4b713c42e7109e8c44 | 2 | {
"blob_id": "f8f9c2cd049ff482f689eb4b713c42e7109e8c44",
"branch_name": "refs/heads/master",
"committer_date": 1457841851000,
"content_id": "a0777393bb687bf762070d5537d0a7b1a2efe37e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e9b9bbd57dd9f596a564b651155309844b770842",
"extension": "py"... | 2.4375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
from __future__ import absolute_import
from __future__ import print_function
from __future__ import division
from __future__ import unicode_literals
import os
import re
import sys
import glob
import locale
import sublime
try:
from . import __version__, __title__
excep... | 577 | 24.76 | 79 | 15 | 3,494 | python | [{"finding_id": "codeql_py/tarslip_937c9ed03855ac11_3e88113c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
259
] | [
null
] | [
21
] | [
25
] | |
2024-11-19T02:59:33.976846+00:00 | 1,508,018,460,000 | 83628fb0020490056090c6e9e7f14f38a752ca33 | 3 | {
"blob_id": "83628fb0020490056090c6e9e7f14f38a752ca33",
"branch_name": "refs/heads/master",
"committer_date": 1508018460000,
"content_id": "42bc458c5aea06ba4cbff6ca2630d6b45470a2b8",
"detected_licenses": [
"MIT"
],
"directory_id": "7d3025cef760f337505a7a15bcf719bf8e170d87",
"extension": "py",
"fi... | 3.25 | stackv2 | # This is a _very simple_ example of a web service that recognizes faces in uploaded images.
# Upload an image file and it will check if the image contains a picture of Barack Obama.
# The result is returned as json. For example:
#
# $ curl -F "file=@obama2.jpg" http://127.0.0.1:5001
#
# Returns:
#
# {
# "face_found_i... | 116 | 26.83 | 112 | 17 | 801 | python | [{"finding_id": "codeql_py/full-ssrf_7b47fd173e9cf54e_7a7a43bc", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 4 | true | [
"CWE-918",
"CWE-918",
"CWE-601",
"CWE-601"
] | [
"py/full-ssrf",
"py/full-ssrf",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"The full URL of this request depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
48,
61,
86,
91
] | [
null,
null,
null,
null
] | [
15,
17,
29,
29
] | [
42,
41,
40,
40
] | |
2024-11-19T02:59:35.805474+00:00 | 1,527,054,158,000 | 2a5a793ac49a3ae706a910e1e2e91981b63c019e | 2 | {
"blob_id": "2a5a793ac49a3ae706a910e1e2e91981b63c019e",
"branch_name": "refs/heads/master",
"committer_date": 1527054158000,
"content_id": "838594915eb59094fcf11adf5189354fbdced959",
"detected_licenses": [
"MIT"
],
"directory_id": "f5de0f665abdce583fb5449008896d82c5bd22a8",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/env python3
from flask import Flask, render_template, request, jsonify
from flask_uploads import UploadSet, configure_uploads, IMAGES
import numpy as np
from PIL import Image, ImageSequence
from shapely.geometry import Point, Polygon
from werkzeug.datastructures import FileStorage
import urllib
from io impor... | 149 | 31.9 | 145 | 17 | 1,281 | python | [{"finding_id": "codeql_py/flask-debug_ce7cecf6c1fd7908_f19d4899", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
149,
90,
122
] | [
null,
null,
null
] | [
5,
15,
15
] | [
24,
19,
25
] | |
2024-11-19T02:59:42.268845+00:00 | 1,634,125,735,000 | c18838c726dedfeb507d5369e0efd9bb4d4f774f | 3 | {
"blob_id": "c18838c726dedfeb507d5369e0efd9bb4d4f774f",
"branch_name": "refs/heads/main",
"committer_date": 1634125735000,
"content_id": "232c951c8328e507b59ef3c69119a571bcacf835",
"detected_licenses": [
"MIT"
],
"directory_id": "2a1dd0fb906d8a5a947c783ce376ed49365f555a",
"extension": "py",
"file... | 2.640625 | stackv2 | import os
from flask import (Blueprint, request)
import json
import requests
# stored Companies House API_Key locally - accessed from backend.
# This can be passed to frontend through API call rather then storing on .env for use on client side
# Note: for production or real use cases, this should also be encrypted fo... | 63 | 35.56 | 100 | 16 | 482 | python | [{"finding_id": "codeql_py/reflective-xss_6966c70d91376a07_bef07c62", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-918",
"CWE-918"
] | [
"py/reflective-xss",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
63,
35,
40
] | [
null,
38,
43
] | [
12,
24,
25
] | [
26,
6,
6
] | |
2024-11-19T03:12:05.014212+00:00 | 1,634,751,540,000 | df7165b5d252033e33e39e90dbea77fb247ba673 | 3 | {
"blob_id": "df7165b5d252033e33e39e90dbea77fb247ba673",
"branch_name": "refs/heads/main",
"committer_date": 1634751540000,
"content_id": "4dd5905d9f7b51e27de4d0c862d337a9918b5ecd",
"detected_licenses": [
"MIT"
],
"directory_id": "e55cc6431790570c2534ebe094ec2be0d36c2385",
"extension": "py",
"file... | 2.890625 | stackv2 | import re
import requests
import json
from ..models.models import Usuario
from ..models.exceptions import UserNotValid
def __email_is_valid(email: str) -> bool:
if not isinstance(email, str):
return False
regex = r'^(\w|\.|\_|\-)+[@](\w|\_|\-|\.)+[.]\w{2,3}$'
return bool(re.search(regex, email))
... | 88 | 25.15 | 71 | 11 | 604 | python | [{"finding_id": "codeql_py/redos_f872e33589a57c93_ab5687e3", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "remediati... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'a@' and containing many repetitions of '_'."
] | [
12,
12
] | [
null,
null
] | [
16,
33
] | [
30,
47
] | |
2024-11-19T03:12:15.390613+00:00 | 1,607,567,381,000 | 9547e855b5bc7b2518afe665cd003b9b48822124 | 3 | {
"blob_id": "9547e855b5bc7b2518afe665cd003b9b48822124",
"branch_name": "refs/heads/main",
"committer_date": 1607567381000,
"content_id": "6998942c3e9c80c6d3dd9662addbe9d0cfa72761",
"detected_licenses": [
"MIT"
],
"directory_id": "dc847ce8da736d58a9fad52c75a02dcc3fd8e507",
"extension": "py",
"file... | 2.5625 | stackv2 | from random import randint, choice
from fake_useragent import UserAgent
import shutil
import os
import datetime
import time
import requests
from bs4 import BeautifulSoup
global baseurl
baseurl = "https://prnt.sc/"
times = (str(datetime.datetime.now().minute)+"-"+str(datetime.datetime.now().second))
global fileo
fileo =... | 41 | 39.17 | 135 | 26 | 471 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_d2d7fafee48d0231_87d2e591", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [//st.prntscr.com/](1) may be at an arbitrary position ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [//st.prntscr.com/](1) may be at an arbitrary position in the sanitized URL."
] | [
30
] | [
null
] | [
16
] | [
42
] | |
2024-11-19T03:24:36.179275+00:00 | 1,611,633,741,000 | e16731be36a52960732c8953bf532d30399672a7 | 2 | {
"blob_id": "e16731be36a52960732c8953bf532d30399672a7",
"branch_name": "refs/heads/main",
"committer_date": 1611633741000,
"content_id": "89357f56fa5e500287dbafc6736e6ef57fd3db6a",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "8996997462385e2ea8d5ce31a0114fd399caa074",
"extension": "py"... | 2.453125 | stackv2 | from fastapi import (
FastAPI,
Response,
status,
Depends,
Request,
Cookie
)
from fastapi.responses import HTMLResponse
import jwt
import json
from typing import Optional
from models import (
SatellitesList,
TxResponse,
SatelliteBase
)
from markdown import markdown
from utils imp... | 128 | 25.44 | 129 | 18 | 771 | python | [{"finding_id": "codeql_py/cookie-injection_cd2e94a34cdabd97_1d71a9ac", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-020"
] | [
"py/cookie-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cookie is constructed from a [user-supplied input](1)."
] | [
92
] | [
null
] | [
37
] | [
41
] | |
2024-11-19T03:24:41.056577+00:00 | 1,614,967,259,000 | 12b4473868b0da816f993f3840668d352162e3ca | 3 | {
"blob_id": "12b4473868b0da816f993f3840668d352162e3ca",
"branch_name": "refs/heads/main",
"committer_date": 1614967259000,
"content_id": "df8aa62c3918771aaf18ee9ac97e6555bb31ed9d",
"detected_licenses": [
"MIT"
],
"directory_id": "1caec96f60692080f1a1e3fd52353b3c2982f3de",
"extension": "py",
"file... | 2.890625 | stackv2 | #
# Forvo API
# A class to automate the download of a pronunciation using the Forvo API. The top rated pronunciation is
# retrieved. Duplicates are avoided. A filename / path is returned.
#
# Secrets are retrieved from AWS SSM Parameter Store abstracted in secrets.py
#
# Distributed under MIT license (see licens... | 65 | 27.06 | 117 | 13 | 459 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c84ac1dae52e37ce_c708cbfc", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
49
] | [
null
] | [
22
] | [
33
] | |
2024-11-19T03:24:45.248391+00:00 | 1,670,454,730,000 | a24a27935201e89606e9f821535c85d73b711e04 | 2 | {
"blob_id": "a24a27935201e89606e9f821535c85d73b711e04",
"branch_name": "refs/heads/main",
"committer_date": 1670454730000,
"content_id": "83e84c5bed8da38c54f41320b04d3965e5053eb3",
"detected_licenses": [],
"directory_id": "ee45c9c8abb6315f2b5b04b7bc0f1e78aca40be4",
"extension": "py",
"filename": "model... | 2.359375 | stackv2 | import hashlib
import logging
import os
from django.db import models
from django.db.models import signals
logger = logging.getLogger(__name__)
class Application(models.Model):
client_id = models.CharField(max_length=20, unique=True, blank=False)
client_secret = models.CharField(max_length=40, blank=True)
... | 46 | 28.87 | 85 | 12 | 282 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d610ca266fd51952_1f80c326", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
41
] | [
42
] | [
13
] | [
57
] | |
2024-11-19T03:24:46.027536+00:00 | 1,544,828,210,000 | 73535206d4ee008c72c854cb48d9d8aaf089df05 | 2 | {
"blob_id": "73535206d4ee008c72c854cb48d9d8aaf089df05",
"branch_name": "refs/heads/master",
"committer_date": 1544828210000,
"content_id": "d09e093f980af756a5c60202b1d7904d73494743",
"detected_licenses": [
"MIT"
],
"directory_id": "6aa352fba6c2b44bfdd9b674e6e4e764e2e5e272",
"extension": "py",
"fi... | 2.40625 | stackv2 | from flask import Flask, request, jsonify, abort
import pymysql
import config as config
from flask_cors import CORS
import json
import datetime
from python_http_client import exceptions
from DASHR import findSNs, compCrawl
app = Flask(__name__)
CORS(app)
connection = pymysql.connect(host=config.mysql['host'],
... | 69 | 26.51 | 73 | 13 | 439 | python | [{"finding_id": "codeql_py/stack-trace-exposure_41ad80b702192476_5b0c53de", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
29
] | [
null
] | [
16
] | [
27
] | |
2024-11-19T01:37:53.791891+00:00 | 1,573,674,631,000 | 6cd65453baf8d4f2f81c6ff9b134b8f9e1c06cb6 | 3 | {
"blob_id": "6cd65453baf8d4f2f81c6ff9b134b8f9e1c06cb6",
"branch_name": "refs/heads/master",
"committer_date": 1573674631000,
"content_id": "06cba3cf88cef9792205280cbfcd335c273c0fda",
"detected_licenses": [
"MIT"
],
"directory_id": "dbb5f45fa1c0b80991c74b9ec213b169daa1f903",
"extension": "py",
"fi... | 2.5625 | stackv2 | """sefsef"""
from flask import jsonify, request, g
from ..utils.auth import requires_auth
from ..utils.db_handler import get_user_with_email, insert_user_to_db
from ..utils.db_handler import update_user, get_user_with_id, get_posts_from_user
from ..utils.db_handler import update_user_profile_picture, update_following_... | 99 | 31.56 | 87 | 17 | 770 | python | [{"finding_id": "codeql_py/stack-trace-exposure_bd71f4c7eb2523ad_a54a59e4", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
81
] | [
null
] | [
30
] | [
82
] | |
2024-11-19T01:37:58.470421+00:00 | 1,628,759,471,000 | 6ff938782c9c5b4a91e6384b3a8e32b7bfad5e5a | 2 | {
"blob_id": "6ff938782c9c5b4a91e6384b3a8e32b7bfad5e5a",
"branch_name": "refs/heads/master",
"committer_date": 1628759471000,
"content_id": "a4239f29f0fa8663071b76e0e1259309bbc3bee5",
"detected_licenses": [
"MIT"
],
"directory_id": "e9643aa4c370c70a49c929a87adbd8dfd923c013",
"extension": "py",
"fi... | 2.4375 | stackv2 | # -*- coding: utf-8 -*
import hmac
import base64
import time
import hashlib
import os
import sys
import pika
class AliyunCredentialsProvider:
"""
Python2.7适用,根据阿里云的 accessKey,accessSecret,UID算出amqp连接使用的username和password
UID是资源ownerID,一般是接入点第一段
"""
ACCESS_FROM_USER = 0
def __init__(self, access... | 31 | 27.42 | 86 | 17 | 265 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_0484d92fc874a444_a4a3e567", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
28
] | [
null
] | [
39
] | [
72
] | |
2024-11-19T01:38:26.794876+00:00 | 1,620,770,057,000 | 0e895e84cbbf62619e911540513ce7001f08fcd0 | 3 | {
"blob_id": "0e895e84cbbf62619e911540513ce7001f08fcd0",
"branch_name": "refs/heads/master",
"committer_date": 1620770057000,
"content_id": "e35461e2d0f9474d72de074480f7b4698ef792ac",
"detected_licenses": [
"MIT"
],
"directory_id": "d1c26002aa079500c72cce41f4568c0efa5a83ec",
"extension": "py",
"fi... | 2.609375 | stackv2 | import aiohttp
import asyncio
import argparse
import json
import yaml
from .api import APOD
from ..errors import ArgumentError
from ..utils import date_strptime
__doc__ = """
CLI TOOL FOR APOD API WRAPPER
"""
VALID_FILE_TYPES = ['csv', 'json', 'yaml']
parser = argparse.ArgumentParser(description="CLI tool for... | 182 | 32.35 | 166 | 16 | 1,390 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_3114d1d3b1b9ccfe_908ee162", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://apod.nasa.gov](1) may be at an arbitrary positi... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [http://apod.nasa.gov](1) may be at an arbitrary position in the sanitized URL.",
"The string [https://apod.nasa.gov](1) may be at an arbitrary position in the sanitized URL."
] | [
129,
129
] | [
null,
null
] | [
8,
50
] | [
46,
89
] | |
2024-11-19T01:51:55.615124+00:00 | 1,513,070,645,000 | 9113b707c7694ec5880b49e04f13f511c5194808 | 2 | {
"blob_id": "9113b707c7694ec5880b49e04f13f511c5194808",
"branch_name": "refs/heads/master",
"committer_date": 1513070645000,
"content_id": "f8790ca2cb0ec6ba39e4e8c0e944aa4a5d4ae1e8",
"detected_licenses": [
"MIT"
],
"directory_id": "92aafa467ce94ab20bfedf8c429b890951177946",
"extension": "py",
"fi... | 2.328125 | stackv2 | """
Routes and views for the flask application.
"""
import jsonpickle
import simplejson as json
from flask import jsonify
from flask import request
from datetime import datetime
from Interface import app, logmgr, constants
from langintent import intentanalyzer
import shutil
@app.route('/api/int/define/<objtype>', met... | 110 | 28.48 | 88 | 16 | 758 | python | [{"finding_id": "codeql_py/stack-trace-exposure_299b81488a6400a2_dbdbadaf", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 6 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-022"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
40,
61,
80,
92,
110,
53
] | [
null,
null,
null,
null,
null,
null
] | [
20,
20,
20,
20,
20,
27
] | [
60,
60,
78,
60,
78,
70
] | |
2024-11-19T02:04:29.635476+00:00 | 1,612,090,319,000 | 4d042b9a8842840bbc259342f182506cad411d4a | 3 | {
"blob_id": "4d042b9a8842840bbc259342f182506cad411d4a",
"branch_name": "refs/heads/master",
"committer_date": 1612090319000,
"content_id": "19763185d7b18de3b34c63f484247cad579a2010",
"detected_licenses": [
"MIT"
],
"directory_id": "53086fd7d0690f1602d62436275cf9ddb7617499",
"extension": "py",
"fi... | 2.859375 | stackv2 | import os
import re
import string
import hazm
import matplotlib.pyplot as plt
import pandas as pd
import plotly.express as px
import plotly.graph_objects as go
import streamlit as st
from PIL import Image
from streamlit import caching
from wordcloud import STOPWORDS
from wordcloud_fa import WordCloudFa
from preproces... | 264 | 37.22 | 176 | 20 | 2,445 | python | [{"finding_id": "codeql_py/overly-large-range_9762f04adf40137d_6a28a986", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].",
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
93,
205
] | [
null,
null
] | [
55,
55
] | [
58,
58
] | |
2024-11-19T02:04:40.992414+00:00 | 1,618,933,436,000 | 248f2594647be25c690d975e9b58349a4cf90b2d | 2 | {
"blob_id": "248f2594647be25c690d975e9b58349a4cf90b2d",
"branch_name": "refs/heads/main",
"committer_date": 1618933446000,
"content_id": "c9aee733894a62bec53cb6b5cf2648b450a7d982",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2277573df4a9e16678c00d8a62cbf1538e8d4bb6",
"extension": "py",
... | 2.40625 | stackv2 | import jinja2
import logging
import os
import socket
import time
import uuid
import zmq
import zmq.auth
from zmq.auth.thread import ThreadAuthenticator
import director
class Interface(director.Processor):
"""The Interface class.
This class defines everything required to connect to or from a given
serve... | 401 | 31.7 | 79 | 22 | 2,601 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d7a22984c260bf92_fb19c05f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
72
] | [
null
] | [
25
] | [
71
] | |
2024-11-19T02:04:41.214178+00:00 | 1,576,198,712,000 | ed697432da24e34553dba071506f0ede2261d13b | 2 | {
"blob_id": "ed697432da24e34553dba071506f0ede2261d13b",
"branch_name": "refs/heads/master",
"committer_date": 1576198712000,
"content_id": "92e61035f855e0102545c936dddd8824278500cd",
"detected_licenses": [
"MIT"
],
"directory_id": "df359938dbab2882a3f5857aad898173f573a404",
"extension": "py",
"fi... | 2.5 | stackv2 | """
This is basically a simple HTTP server that can handle a few
upload requests from PhysViz apps. Particularly, saving bookmarks.
"""
import SimpleHTTPServer
import SocketServer
import urlparse
import shutil
import json
import sys, time
sys.path.append("scripts")
import ImageTweets
ImageTweets.IMAGE_DIR = "images/tw... | 136 | 30.24 | 73 | 15 | 1,018 | python | [{"finding_id": "codeql_py/path-injection_97fb84b44684ef73_ca556ad6", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "remed... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2)."
] | [
81,
81
] | [
null,
null
] | [
29,
35
] | [
33,
46
] | |
2024-11-19T02:04:59.139522+00:00 | 1,669,023,884,000 | 82b49dce3ff262b27f3acdc9e7872ddc6fce2c0a | 2 | {
"blob_id": "82b49dce3ff262b27f3acdc9e7872ddc6fce2c0a",
"branch_name": "refs/heads/master",
"committer_date": 1669023884000,
"content_id": "1f6f9543b04561fc64ca785d6997dccf816e1444",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7e3fc8f3f4746f5669d852e61b8e95dcf09d0c2f",
"extension": "py"... | 2.46875 | stackv2 | """
File containing some utility functions that wrap around various repeatedly used logic
"""
# stdlib
import atexit
import logging
import os
import subprocess
from collections import deque
from json import JSONEncoder
from typing import Any, Deque, Dict, Iterable, Optional, Tuple
# lib
import jinja2
import netaddr
fro... | 263 | 34.08 | 119 | 17 | 2,090 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0fab4a587ccb71b0_2ec0d110", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
38
] | [
41
] | [
13
] | [
2
] | |
2024-11-19T02:28:14.297723+00:00 | 1,556,951,844,000 | 98bdcbc6257d14c745d934f94d787e432054a888 | 2 | {
"blob_id": "98bdcbc6257d14c745d934f94d787e432054a888",
"branch_name": "refs/heads/master",
"committer_date": 1556951844000,
"content_id": "c003b32f3f75190887a892dd8f1e2973045d651d",
"detected_licenses": [
"MIT"
],
"directory_id": "a351f3aaad20b2e4706621e9c8ae5857680e4ff4",
"extension": "py",
"fi... | 2.453125 | stackv2 | # -*- coding: utf-8 -*-
import os
import time
import urllib.parse
import urllib.request
import hashlib
import base64
import uuid
import wave
import requests
import urllib
import json
app_id = 'xxx',
app_key='xxx'
url = 'https://api.ai.qq.com/fcgi-bin/aai/aai_wxasrlong'
#我们自己的阿里云服务器的地址开了8322端口,来跑我的tornado服务
callbac... | 140 | 20.61 | 76 | 13 | 861 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_172456d96037bad4_3bc07f26", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
28
] | [
null
] | [
15
] | [
37
] | |
2024-11-19T02:28:51.929487+00:00 | 1,567,207,134,000 | 7b8d8ae46665c8eaab5e696eb7127491ecef1cef | 3 | {
"blob_id": "7b8d8ae46665c8eaab5e696eb7127491ecef1cef",
"branch_name": "refs/heads/master",
"committer_date": 1567207134000,
"content_id": "65e7e98bd620e42d94e2716f2a823a11958ac935",
"detected_licenses": [
"MIT"
],
"directory_id": "1b981f2f96188b681a7dd2d06744727a11db66c6",
"extension": "py",
"fi... | 2.609375 | stackv2 | import argparse
from datetime import datetime
import logging
import os
from shutil import copyfile
import re
import dateutil.parser
import jinja2
import markdown
from slugify import slugify
import yaml
####################
# Global Constants
####################
VERSION = "0.1.1"
CONTENT_SEPARATOR = '=========='
GE... | 374 | 25.97 | 107 | 14 | 2,376 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_12e4839e49b0c8ef_f3e6ed08", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
32
] | [
null
] | [
7
] | [
45
] | |
2024-11-19T02:37:16.700651+00:00 | 1,519,309,181,000 | b9bf69220de72204ed449f7abb175983d7c87941 | 2 | {
"blob_id": "b9bf69220de72204ed449f7abb175983d7c87941",
"branch_name": "refs/heads/master",
"committer_date": 1519309181000,
"content_id": "b46f8b42cd41237fafd088469fd80e4d78d3cc96",
"detected_licenses": [
"MIT"
],
"directory_id": "9313be867e0c5873c92c999d0e3fdd8d2f29dfcb",
"extension": "py",
"fi... | 2.484375 | stackv2 | from rest_framework.views import APIView
from rest_framework.response import Response
from rest_framework import status
from endpoints.utils.decorators import room_required, pk_required
from player.serializers import RoomSerializer
class RoomView(APIView):
"""
Room resource.
"""
@room_required
d... | 85 | 29.01 | 105 | 17 | 513 | python | [{"finding_id": "codeql_py/stack-trace-exposure_255acab790a715a4_1df373bb", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
49
] | [
null
] | [
33
] | [
41
] | |
2024-11-19T02:37:40.131791+00:00 | 1,673,096,881,000 | dde2b59451846a5a9a05b9004d9c2fb76f332476 | 4 | {
"blob_id": "dde2b59451846a5a9a05b9004d9c2fb76f332476",
"branch_name": "refs/heads/master",
"committer_date": 1673096881000,
"content_id": "62298514aaa5d3bf63c3e27f41a704141d298d28",
"detected_licenses": [
"MIT"
],
"directory_id": "86e14249e8fc83789001413d146f72cb706e7e96",
"extension": "py",
"fi... | 3.625 | stackv2 | #!/usr/bin/env python3
"""Advent of Code 2015, Day 4: The Ideal Stocking Stuffer"""
import hashlib
import aoc
import pytest
def suffix_for_md5_prefix(secret_key, char="0", length=5, starting_integer=1):
"""Return the first integer suffix to secret_key that produces wanted hash
The wanted hash is expected t... | 55 | 27.95 | 78 | 14 | 403 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_3fc63bf65eec3807_07cdb94d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure."
] | [
26
] | [
null
] | [
32
] | [
51
] | |
2024-11-19T02:37:47.108644+00:00 | 1,551,427,138,000 | 5cabead0ae2e39fdcf6f7acba98da53c6abbb7db | 3 | {
"blob_id": "5cabead0ae2e39fdcf6f7acba98da53c6abbb7db",
"branch_name": "refs/heads/master",
"committer_date": 1551427138000,
"content_id": "9f7dc202fa2731344e24e9fb97f52310c67f6b99",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "982b08e9cecde996cff416fbb9bf87eb59cf6e89",
"extension": "p... | 2.515625 | stackv2 | #!/usr/bin/python
from paramiko import RSAKey
from paramiko import SSHClient
from paramiko import AutoAddPolicy
import sys
"""
get buffered stream of input from the client channel while the worker.sh script executes
"""
def line_buffered(f):
line_buf = ""
while not f.channel.exit_status_ready():
line_... | 38 | 22.16 | 88 | 12 | 214 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a7d5d4f46d7b1130_0124ccc9", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
29
] | [
null
] | [
null
] | [
52
] | |
2024-11-19T02:49:09.478506+00:00 | 1,554,375,552,000 | a17fb062079479beec7b4ffa35385d890893540e | 3 | {
"blob_id": "a17fb062079479beec7b4ffa35385d890893540e",
"branch_name": "refs/heads/master",
"committer_date": 1554375552000,
"content_id": "10c7d4ed16c7e8ac99d0cfe77b29f96ae54d0213",
"detected_licenses": [
"MIT"
],
"directory_id": "ee0b5487e07276d78aeaa463445beac1eeb9705d",
"extension": "py",
"fi... | 3.25 | stackv2 | #!/usr/bin/python
# written by Heiko 11.02.2019
import base64, subprocess
strPassword='8yaThaDCTGHxG8fu'
##########################################################
print ('Password: ' + strPassword)
print ('')
##########################################################
## Using base64
## Function to encrypt password... | 50 | 36.22 | 160 | 12 | 486 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_791bdc446af0b8c7_7c1b6c16", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive dat... | [
9,
23,
26,
46,
47
] | [
null,
null,
null,
null,
null
] | [
8,
8,
8,
7,
7
] | [
34,
52,
52,
53,
67
] | |
2024-11-19T02:49:18.961011+00:00 | 1,569,523,009,000 | 520d8bd68dad923d0c28605a4c32df037f20a3ed | 2 | {
"blob_id": "520d8bd68dad923d0c28605a4c32df037f20a3ed",
"branch_name": "refs/heads/master",
"committer_date": 1569523009000,
"content_id": "cd291e0b55bbddc0dfe6b9e3bf50ae10ec573158",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e8fd56058da5d4be57711058f6092adda171c51d",
"extension": "py"... | 2.359375 | stackv2 | import requests
from flask import request, Response
excluded_headers = [
'content-encoding',
'content-length',
'transfer-encoding',
'connection']
def request_headers():
return {key: value for (key, value) in request.headers if key != 'Host'}
def proxy_request(url):
return requests.request(... | 42 | 21.93 | 76 | 11 | 200 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f082ab87b1cbfd5c_475926d9", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
17
] | [
24
] | [
12
] | [
22
] | |
2024-11-19T02:49:26.551511+00:00 | 1,390,338,056,000 | 5063ad4e185913e1bbd68788dabb65c281c370a3 | 3 | {
"blob_id": "5063ad4e185913e1bbd68788dabb65c281c370a3",
"branch_name": "refs/heads/master",
"committer_date": 1390338056000,
"content_id": "ce373fc75979a00fafb5bd463e6cc75226c98235",
"detected_licenses": [
"Apache-2.0",
"BSD-3-Clause"
],
"directory_id": "acbcaf051f0bf60618ea310afaaf6de2a751920b",... | 2.546875 | stackv2 | #!/usr/bin/python
# Programmer: Chris Bunch (chris@appscale.com)
# pylint: disable-msg=E1101
# a script that receives xmpp messages for an app engine app
# and forwards them to the app, which must have a route
# exposed at /_ah/xmpp/message/chat/ to receive them
# usage is ./xmpp_receiver.py appname login_ip app-pass... | 181 | 34.23 | 80 | 19 | 1,517 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5dbb938dc2aeaa13_e9a10288", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
149
] | [
150
] | [
20
] | [
50
] | |
2024-11-19T03:00:12.693588+00:00 | 1,254,678,499,000 | f667fc5d422e58bbfe30350c4b5d817dceb24ef7 | 2 | {
"blob_id": "f667fc5d422e58bbfe30350c4b5d817dceb24ef7",
"branch_name": "refs/heads/master",
"committer_date": 1254678499000,
"content_id": "ad0f6004381121912f910af7a55e3d128d308f68",
"detected_licenses": [
"MIT"
],
"directory_id": "cc533c1a9aaea87e2a936566ee23d9e5f21217c0",
"extension": "py",
"fi... | 2.484375 | stackv2 | # encoding: utf-8
"""
Implements a storage driver that saves recordings via SFTP.
"""
from __future__ import with_statement
from permanence.config import ConfigurationError
from permanence.event import EventSource
from permanence.storage.util import ActionQueue, compile_path_pattern
import paramiko
import os.path
i... | 101 | 31.33 | 78 | 17 | 683 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_11ce4aa8d1333bde_a1eeb678", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
61
] | [
null
] | [
9
] | [
69
] | |
2024-11-19T03:00:30.508424+00:00 | 1,564,559,554,000 | 1f1c81a45490456cad7d627e16471c96069be27f | 3 | {
"blob_id": "1f1c81a45490456cad7d627e16471c96069be27f",
"branch_name": "refs/heads/master",
"committer_date": 1564559554000,
"content_id": "c27917efec80551b6a9fd5535a6d03df8bc3426b",
"detected_licenses": [
"MIT"
],
"directory_id": "7035e9bfbeb6a312af43cbf2dac7ca292ac9d882",
"extension": "py",
"fi... | 2.875 | stackv2 | """
Main application and routing logic for Twitoff
"""
from flask import Flask, request, jsonify
from flask_restplus import Api, Resource, fields
# Define the Application as a Flask App
app = Flask(__name__)
# Use Api to intialize the application.
# app = Api(
# app=flask_app,
# version='0.1',
# title='... | 52 | 22.46 | 77 | 15 | 278 | python | [{"finding_id": "codeql_py/stack-trace-exposure_3043481b518ee8e3_9f874449", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
46
] | [
48
] | [
13
] | [
33
] | |
2024-11-19T03:11:23.750560+00:00 | 1,594,123,255,000 | 7d3eb21cbf7af016916e582a98acfc98f150e2a7 | 3 | {
"blob_id": "7d3eb21cbf7af016916e582a98acfc98f150e2a7",
"branch_name": "refs/heads/master",
"committer_date": 1594123255000,
"content_id": "035e90798da5445120c53d062e076539ce5ca03e",
"detected_licenses": [
"MIT"
],
"directory_id": "f2cf24086635373a31717c68cd43bd5c83b18a08",
"extension": "py",
"fi... | 2.640625 | stackv2 | import os
import errno
import tarfile
from PIL import Image
from torch.utils.data import Dataset
from .utils import DEFAULT_PATH
class ImageNet32Dataset(Dataset):
urls = [
'http://image-net.org/small/train_32x32.tar',
'http://image-net.org/small/valid_32x32.tar'
]
raw_folder = 'imagenet32... | 111 | 29.57 | 126 | 16 | 732 | python | [{"finding_id": "codeql_py/tarslip_032641124214dc28_36c9e59d", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/tarslip",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
105,
110
] | [
null,
null
] | [
9,
9
] | [
12,
12
] | |
2024-11-19T03:11:27.267402+00:00 | 1,620,404,944,000 | 9e831d6b13f9fd407ea89832473fd4f802433300 | 2 | {
"blob_id": "9e831d6b13f9fd407ea89832473fd4f802433300",
"branch_name": "refs/heads/master",
"committer_date": 1620404944000,
"content_id": "17f0180027c77e5e48ba83c16b06dc2727e9cc5f",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "129c10d5374c9fb8574ca75d062f6684c54fee89",
"extension": "py",
... | 2.46875 | stackv2 | import logging
from flask import request, make_response
from os import getenv
from sys import stderr, stdout
from requests import get, post
from json import dumps
TASK_HOST = getenv('TASK_HOST')
class WorkflowHandler:
def __init__(self):
pass
def get(self, job_id, task_name):
'''
... | 119 | 43.92 | 150 | 18 | 1,143 | python | [{"finding_id": "codeql_py/partial-ssrf_4575933c6f3edb8b_26fb0be0", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 4 | true | [
"CWE-918",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/partial-ssrf",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
87,
79,
86,
99
] | [
null,
null,
null,
null
] | [
29,
26,
28,
67
] | [
151,
102,
57,
92
] | |
2024-11-19T03:11:30.119973+00:00 | 1,543,605,640,000 | 15216b98c71750801be534e040198907f14e03dd | 3 | {
"blob_id": "15216b98c71750801be534e040198907f14e03dd",
"branch_name": "refs/heads/master",
"committer_date": 1543605640000,
"content_id": "4fae6b6c02e19bb9f253bf7942bf2dcff87266df",
"detected_licenses": [
"MIT"
],
"directory_id": "b268646cbbc22f97186bf4fdc6d615d0b4e42be7",
"extension": "py",
"fi... | 3.171875 | stackv2 | #! user/bin/pycharmPoject
import numpy as np
# segment text
def text_segment(large_string):
"""
Desc: Receive a large string and segment it to a string list
:param large_string:
:return: String list and turn all string into lower case
"""
import re
clean_string = re.compile(r'[^a-zA-z]|... | 114 | 29.21 | 112 | 17 | 904 | python | [{"finding_id": "codeql_py/overly-large-range_344e8779f99bf886_3176a596", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
16
] | [
null
] | [
38
] | [
41
] | |
2024-11-19T03:12:15.001298+00:00 | 1,617,998,997,000 | c61280fdf851c990e803ca2abbb590f9b1d6e28a | 3 | {
"blob_id": "c61280fdf851c990e803ca2abbb590f9b1d6e28a",
"branch_name": "refs/heads/main",
"committer_date": 1617998997000,
"content_id": "58ca0cb64c99e5a19ae74cbff3239146f9efb609",
"detected_licenses": [
"MIT"
],
"directory_id": "5aec9b30005a8a5cc39da3c46ce65aa3e6710cfe",
"extension": "py",
"file... | 2.734375 | stackv2 | """
security.py
Contains code which manages access to API routes
"""
import logging
from functools import wraps
from flask import request, g
from errors import BadRequestException, AccessDeniedException
from groups import group_role_map
logger = logging.getLogger(__name__)
def admin_only(f):
"""
Decorator which... | 69 | 31.12 | 95 | 19 | 483 | python | [{"finding_id": "codeql_py/log-injection_43036417c33150a2_88fc4ce8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
47,
52
] | [
null,
null
] | [
67,
21
] | [
95,
52
] | |
2024-11-19T03:12:17.897426+00:00 | 1,637,470,777,000 | 5dccd40f5e5e56c490ae2df64b384a304401325f | 3 | {
"blob_id": "5dccd40f5e5e56c490ae2df64b384a304401325f",
"branch_name": "refs/heads/master",
"committer_date": 1637470777000,
"content_id": "1426047a07617b6223c1643c48eb7bb1d3dca034",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "c2f34328a1d9dd3de7b263a2f69dcef105403c84",
"extension": "p... | 2.84375 | stackv2 | # External Dependencies
import gatt
import queue
import time
import threading
# Internal Dependencies
from pyroot import RootPhy
class RootGATT(RootPhy):
root_identifier_uuid = '48c5d828-ac2a-442d-97a3-0c9822b04979'
def __init__(self, name = None, dev = 'hci0', wait_for_connect = True):
"""Sets up Bl... | 141 | 34.62 | 89 | 14 | 1,146 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6b335beab10d8ce8_b46d9b01", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive... | [
85,
110,
114,
119,
123
] | [
null,
null,
null,
null,
null
] | [
15,
15,
15,
15,
15
] | [
75,
52,
76,
55,
60
] | |
2024-11-19T03:12:21.035773+00:00 | 1,595,950,136,000 | b93b9a009c3749f7a930d7ff3f036d48dfad6d91 | 3 | {
"blob_id": "b93b9a009c3749f7a930d7ff3f036d48dfad6d91",
"branch_name": "refs/heads/master",
"committer_date": 1595950136000,
"content_id": "2270bc20889200d49d2bde986d7e0b4bfa322e06",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5206601591debaaccbca77ca0a4825de4899d546",
"extension": "py"... | 3.171875 | stackv2 | import sys
import os
import random
import base64
from Crypto.Cipher import AES
from Crypto import Random
# importing the password based key distribution function, give more security
from Crypto.Protocol.KDF import PBKDF2
#imporing hash function for key generation
import hashlib
class AESCipher():
BLOCK_SIZE = 1... | 75 | 30.41 | 87 | 17 | 551 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b24f4a800be500d9_abe6274d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
28
] | [
null
] | [
28
] | [
50
] | |
2024-11-19T03:12:22.130639+00:00 | 1,538,368,687,000 | 034e47bca784c2cdc59aa082aa22fca77d0ebacf | 3 | {
"blob_id": "034e47bca784c2cdc59aa082aa22fca77d0ebacf",
"branch_name": "refs/heads/master",
"committer_date": 1538368687000,
"content_id": "334cd7f957c3b36ab15171c9c7b606d413c03733",
"detected_licenses": [
"MIT"
],
"directory_id": "26bdee774436202fe697e0bf036bb9ce26a20313",
"extension": "py",
"fi... | 2.765625 | stackv2 | """
Utility functions for extracting data for slicing analysis from MORF.
Eventually these functions should be incoprorated into MORF API or another public utilities package.
"""
import os
import subprocess
import tarfile
import shutil
import gzip
import re
DATABASE_NAME = "course"
def extract_id_lookup_table(o... | 143 | 34.27 | 125 | 16 | 1,211 | python | [{"finding_id": "codeql_py/tarslip_13eb34cab94fad48_27f1f66b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
44
] | [
null
] | [
9
] | [
12
] | |
2024-11-19T03:12:38.738897+00:00 | 1,525,725,512,000 | 7304dd51c16f244110c2576179756f1b5e5e0b69 | 3 | {
"blob_id": "7304dd51c16f244110c2576179756f1b5e5e0b69",
"branch_name": "refs/heads/master",
"committer_date": 1525725512000,
"content_id": "b94e035814e540595cf65991330da9b059cbcc88",
"detected_licenses": [
"MIT"
],
"directory_id": "a6a49ab6abff0559b2254968a0086e3532e9d5d9",
"extension": "py",
"fi... | 2.6875 | stackv2 | # Running from bash with flask:
#
# FLASK_APP=patrec.py FLASK_DEBUG=1 flask run
from flask import Flask, request, render_template
import configparser
import logging
import requests
app = Flask(__name__)
config = configparser.ConfigParser()
config.read('wsgi_apps.conf')
API_URL_BARCODE = config['patrec']['api_url_ba... | 53 | 28.94 | 75 | 14 | 406 | python | [{"finding_id": "codeql_py/partial-ssrf_e4bb43289bcdd99b_33858a1f", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 2 | true | [
"CWE-918",
"CWE-117"
] | [
"py/partial-ssrf",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
48,
40
] | [
null,
41
] | [
9,
22
] | [
57,
52
] | |
2024-11-19T03:25:19.819867+00:00 | 1,567,350,963,000 | 62bafa0fe4a8e69cff3f997d05763c7d751a30db | 3 | {
"blob_id": "62bafa0fe4a8e69cff3f997d05763c7d751a30db",
"branch_name": "refs/heads/master",
"committer_date": 1567350963000,
"content_id": "7b1ed4980f43898512950d10dbe0314bf21ed6b8",
"detected_licenses": [
"MIT"
],
"directory_id": "43225843505acbf4c1b6f088f35498b3928cc647",
"extension": "py",
"fi... | 2.75 | stackv2 | """"
Main file & entrypoint for project
In charge of loading configuration, parsing command line arguments,
and then performing the required actions:
- run configuration utility
- do a test run
- start webhook listener
"""
import os, yaml, argparse, logging, sys, json
from flask import Flask, jsonify, request
from queu... | 185 | 35 | 98 | 19 | 1,430 | python | [{"finding_id": "codeql_py/log-injection_57fce1648a97e0a1_0ebc8c7e", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
112
] | [
null
] | [
75
] | [
79
] | |
2024-11-19T03:25:23.422707+00:00 | 1,616,855,018,000 | 47fe98ea7c017601fd77bf4be9e0cd1aedebdf25 | 3 | {
"blob_id": "47fe98ea7c017601fd77bf4be9e0cd1aedebdf25",
"branch_name": "refs/heads/master",
"committer_date": 1616855018000,
"content_id": "8845c0a5e35bc68923ff833fa93979fc96cb8d1a",
"detected_licenses": [
"MIT"
],
"directory_id": "f1f67e7cfc47eea274dfd5b8c9f14b65016590a5",
"extension": "py",
"fi... | 3.078125 | stackv2 | # --------------
file = open(file_path, 'r')
sentence = print(file.readline())
file.close()
file = open(file_path_1,'r')
message_1 = print(file.readline())
file = open (file_path_2,'r')
message_2 = print (file.readline())
def fuse_msg(message_a, message_b):
quotient = (int(message_b)//int(message_a))
return ... | 66 | 25.76 | 79 | 11 | 502 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_2e2422f4f3e21ff2_c67910d5", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive d... | [
62,
14,
28,
44,
56,
64
] | [
null,
null,
null,
null,
null,
null
] | [
12,
7,
7,
7,
7,
7
] | [
22,
19,
19,
19,
19,
17
] | |
2024-11-19T03:25:35.860227+00:00 | 1,647,244,940,000 | 94e9425defe7f5ca656b7292567021e75a9ada9b | 2 | {
"blob_id": "94e9425defe7f5ca656b7292567021e75a9ada9b",
"branch_name": "refs/heads/master",
"committer_date": 1647244940000,
"content_id": "bc325c4b1cad75b9480cb95f145e4a4f33d35472",
"detected_licenses": [
"MIT"
],
"directory_id": "f75f841a1e0e6e7915a68bebbed7233aa5d22625",
"extension": "py",
"fi... | 2.421875 | stackv2 | #!/usr/bin/env python
import sys, paramiko
if len(sys.argv) < 5:
print "args missing"
sys.exit(1)
hostname = sys.argv[1]
username = sys.argv[2]
password = sys.argv[3]
command = sys.argv[4]
port = 22
try:
client = paramiko.SSHClient()
client.load_system_host_keys()
client.set_missing_host_key_po... | 27 | 19.04 | 77 | 9 | 135 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_ba353034585e3fdb_ea812fe6", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to WarningPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to WarningPolicy may be unsafe."
] | [
19
] | [
null
] | [
5
] | [
65
] | |
2024-11-19T03:25:36.914458+00:00 | 1,619,873,884,000 | c53765fd5e00c6f7d41e8da8eb367f760a5c9847 | 3 | {
"blob_id": "c53765fd5e00c6f7d41e8da8eb367f760a5c9847",
"branch_name": "refs/heads/main",
"committer_date": 1619873884000,
"content_id": "fb50653f6961ed1cc13870328f59feee67449226",
"detected_licenses": [
"MIT"
],
"directory_id": "e05b2e46e6c7008fada8db11ad2974cd434eec0f",
"extension": "py",
"file... | 2.546875 | stackv2 | import os
import time
import environ
from jinja2 import Environment, FileSystemLoader
from utils import (
check_availability, send_mail, format_json_data, get_date
)
# reading .env file
env = environ.Env()
environ.Env.read_env()
BASE_DIR = os.path.join(os.path.dirname(__file__), '.')
TEMPLATES_DIR = os.path.joi... | 60 | 26.83 | 78 | 15 | 391 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b12eebfd489ef2c7_68a34bce", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
41
] | [
null
] | [
28
] | [
79
] | |
2024-11-19T03:25:37.449737+00:00 | 1,502,384,436,000 | c0b7d87b9b2c799738dfd676fdda691b4bc848d5 | 3 | {
"blob_id": "c0b7d87b9b2c799738dfd676fdda691b4bc848d5",
"branch_name": "refs/heads/master",
"committer_date": 1502384436000,
"content_id": "d33e4472fb5cbcf7c3a6e9ae96d925c784c753bf",
"detected_licenses": [
"MIT"
],
"directory_id": "106db0372588b6193fc42c38b82c2dda723d9abf",
"extension": "py",
"fi... | 2.921875 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""
Show the content of a simtel event.
"""
import argparse
import numpy as np
import sys
import ctapipe
from ctapipe.io.hessio import hessio_event_source
def recursive_print(var, level=0):
pre = 3 * level * " "
try:
for k, v in var.items():
... | 90 | 30.14 | 106 | 19 | 617 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2c598ffdcec6872d_d7a3dce1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
53
] | [
null
] | [
15
] | [
90
] | |
2024-11-19T03:35:43.146107+00:00 | 1,584,498,071,000 | c857ffaf63ec2bc08755bf3666c05fc5956a24dc | 2 | {
"blob_id": "c857ffaf63ec2bc08755bf3666c05fc5956a24dc",
"branch_name": "refs/heads/master",
"committer_date": 1584498071000,
"content_id": "242c4e61fce308ec1336840cf620e81ed6427513",
"detected_licenses": [
"MIT"
],
"directory_id": "5b8bcae34a16438b315030f1fa3c7841918f2135",
"extension": "py",
"fi... | 2.484375 | stackv2 | # CreateApiGenerator.py - Creates an object representing a create API
import os
from jinja2 import Environment, Template, FileSystemLoader
import yaml
from smoacks.sconfig import sconfig
from smoacks.Schema import scr_schemas
class OpenapiGenerator:
def __init__(self, app_object):
self._app_object = app_ob... | 54 | 43.69 | 132 | 17 | 543 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_1351978de32172e0_86858440", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
47
] | [
49
] | [
15
] | [
10
] | |
2024-11-19T03:35:57.538653+00:00 | 1,613,845,418,000 | d17a3e1636541678a0c10dfbbb94e5ff9ff284f4 | 3 | {
"blob_id": "d17a3e1636541678a0c10dfbbb94e5ff9ff284f4",
"branch_name": "refs/heads/main",
"committer_date": 1613845418000,
"content_id": "aaa96ee0c19bbbc4743a5eab28c355ba4326df0b",
"detected_licenses": [
"MIT"
],
"directory_id": "cce3a4eec24400763f82d956968572a737053401",
"extension": "py",
"file... | 2.953125 | stackv2 | import requests
import json
import matplotlib.pyplot as plt
import pandas as pd
import os
import errno
from datetime import date
import pprint
#script to chart different metrics of OC data from
def main():
apiKey = "0d0c18e9f6894a898708e30eb617ac66"
#fips for Orange County, CA
fips = "06059"
#current data f... | 88 | 27.68 | 116 | 18 | 742 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_62398e68d749dea6_25e8d5df", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
43
] | [
null
] | [
15
] | [
33
] | |
2024-11-19T03:36:02.863225+00:00 | 1,437,513,366,000 | 9f38bb1f1d55a0e52a81f752b645d3a0704ec88d | 3 | {
"blob_id": "9f38bb1f1d55a0e52a81f752b645d3a0704ec88d",
"branch_name": "refs/heads/master",
"committer_date": 1437513366000,
"content_id": "94e601a525f34d42481e3e29e38acb1ce6990afc",
"detected_licenses": [
"MIT"
],
"directory_id": "e095634d542cb3038d85432a4fcb043b66a3f294",
"extension": "py",
"fi... | 2.703125 | stackv2 | import tarfile
from buildall import Task, Path
class Decompress(Task):
def __init__(self, decompressed):
self._decompressed = decompressed
def target(self):
return Path(self._decompressed)
def build(self, compressed):
self.debug('Decompressing %s to %s' % (compressed,
... | 19 | 29.53 | 67 | 17 | 124 | python | [{"finding_id": "codeql_py/tarslip_1327278a7b752cba_cf4b7e6c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
17
] | [
null
] | [
13
] | [
14
] | |
2024-11-19T01:28:37.292900+00:00 | 1,639,583,586,000 | 69d6e9da7bf8e4e5085ed8211f148556bc766e34 | 3 | {
"blob_id": "69d6e9da7bf8e4e5085ed8211f148556bc766e34",
"branch_name": "refs/heads/master",
"committer_date": 1639583586000,
"content_id": "2b562fa5bc35d593606bf9a301c04f10a8fb0160",
"detected_licenses": [
"MIT",
"BSD-3-Clause"
],
"directory_id": "626fca5633d45584afbd7e9e10bd33d57d90e041",
"ext... | 2.8125 | stackv2 | from flask import Blueprint, render_template
from smartlight import animation_thread
from smartlight.utils import error_to_json
import json
main = Blueprint('main', __name__)
@main.route('/')
def index():
"""
Control for the index/main page
:return: html response with main page
"""
return rend... | 139 | 26.15 | 99 | 12 | 900 | python | [{"finding_id": "codeql_py/reflective-xss_244ef1883246f37c_a0b342f6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).\nCross-site scripting vu... | [
32,
46,
63
] | [
null,
null,
null
] | [
12,
12,
12
] | [
80,
80,
65
] | |
2024-11-19T01:28:45.284195+00:00 | 1,597,869,968,000 | e441129f420e51c7a559bdb039e851b99da79053 | 3 | {
"blob_id": "e441129f420e51c7a559bdb039e851b99da79053",
"branch_name": "refs/heads/master",
"committer_date": 1597869968000,
"content_id": "e499f62a7265b5385c069b22b495fdf2d23704b3",
"detected_licenses": [
"MIT"
],
"directory_id": "dda4e5f66c23c055ea0e500aa4577b397d3eb104",
"extension": "py",
"fi... | 3 | stackv2 | # Author: Stan Fortoński
# Date: 02.05.2020
# Login To Google
from time import sleep
from selenium.webdriver.common.keys import Keys
from tinder.config import Config
class GoogleLogin:
def __init__(self, driver):
self.driver = driver
self.login = Config['google']['login']
self.password = C... | 30 | 33.2 | 131 | 12 | 236 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_3af8fbd542327ae5_fa5ebd26", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [myaccount.google.com](1) may be at an arbitrary positi... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [myaccount.google.com](1) may be at an arbitrary position in the sanitized URL."
] | [
27
] | [
null
] | [
27
] | [
71
] | |
2024-11-19T01:28:50.695367+00:00 | 1,580,310,761,000 | bbbbd1683f4fa8ddc8933e6a8eee26c6b060d30b | 2 | {
"blob_id": "bbbbd1683f4fa8ddc8933e6a8eee26c6b060d30b",
"branch_name": "refs/heads/master",
"committer_date": 1580310761000,
"content_id": "cdbea4a0f4fd3baeba43f3208d027fbed4b24c67",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "15a9937437fff9ef921547f067647a1c638ad2ed",
"extension": "p... | 2.40625 | stackv2 | from __future__ import print_function
import os
import json
from docserver.utils import logger, log_exception
from flask import abort
from flask import Flask
from flask import redirect
from flask import render_template
from flask import request
from tempfile import TemporaryDirectory
from shutil import copyfileobj
#... | 85 | 30.91 | 115 | 18 | 594 | python | [{"finding_id": "codeql_py/reflective-xss_d65ffad284518a1c_434c9196", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-601",
"CWE-022"
] | [
"py/reflective-xss",
"py/url-redirection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
78,
57,
69
] | [
null,
null,
null
] | [
20,
25,
27
] | [
28,
36,
41
] | |
2024-11-19T01:29:00.494365+00:00 | 1,598,604,206,000 | b149b43debeaa5c0017c3b0c7861fd8071579424 | 2 | {
"blob_id": "b149b43debeaa5c0017c3b0c7861fd8071579424",
"branch_name": "refs/heads/master",
"committer_date": 1598604206000,
"content_id": "7050893e00a9b4c9c9c7580463b84b1570989615",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8123a62a440070fa3bae564d4b4e847da86830b4",
"extension": "py"... | 2.421875 | stackv2 | import os
from flask import Blueprint,render_template,redirect,url_for,flash,request,current_app
from apps.models import User
from apps.forms import RegisterForm,LoginForm,UploadForm
from apps.exts import db
from apps.email import send_mail
from flask_login import login_user,logout_user,login_required,current_user
from... | 113 | 30.88 | 97 | 17 | 913 | python | [{"finding_id": "codeql_py/url-redirection_68ff5cede627716c_9f985cef", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
30
] | [
null
] | [
29
] | [
78
] | |
2024-11-19T01:29:01.004983+00:00 | 1,604,610,460,000 | 2f2030672fa8c3300ea6f9907cc7daabf443afed | 3 | {
"blob_id": "2f2030672fa8c3300ea6f9907cc7daabf443afed",
"branch_name": "refs/heads/main",
"committer_date": 1604610460000,
"content_id": "fc62cfff5f7551f3b013a682a2236854a510a2a8",
"detected_licenses": [
"MIT"
],
"directory_id": "5a5d5a76a14b0427148435a35adde137f5cb6ac6",
"extension": "py",
"file... | 3.078125 | stackv2 | import os
import sys
import hashlib
######
input = "abbhdwsy"
password = ""
password2 = ["*"] * 8
free_index = [str(i) for i in range(8)]
######
if __name__ == "__main__":
i = 0
while True:
hash_md5 = hashlib.md5((input + str(i)).encode()).hexdigest()
if hash_md5[:5] == "00000":
pa... | 26 | 25.5 | 69 | 18 | 196 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_29d89aa5c783e2da_1667aea8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
24,
25
] | [
null,
null
] | [
11,
11
] | [
47,
54
] | |
2024-11-19T01:29:06.897545+00:00 | 1,587,458,979,000 | 1bac52d55f74e7d21fd00924f30c87a42dc37586 | 2 | {
"blob_id": "1bac52d55f74e7d21fd00924f30c87a42dc37586",
"branch_name": "refs/heads/master",
"committer_date": 1587458979000,
"content_id": "b86419a8da24e5f39083a6effb8dedbcdae957d5",
"detected_licenses": [
"MIT"
],
"directory_id": "c545158ffada192208a8ca8bb15ab9349f143c1b",
"extension": "py",
"fi... | 2.3125 | stackv2 | # encoding:utf-8
import sqlite3
import os
from flask import Flask, flash, request, redirect, url_for, render_template
from werkzeug.utils import secure_filename
UPLOAD_FOLDER = "./static/equipmentFiles/"
ALLOWED_EXTENSIONS = {"txt", "pdf", "png", "jpg", "jpeg", "gif"}
keyWords = {
"All": 0,
"关键词": 1,
"购买自... | 384 | 26.55 | 133 | 18 | 2,517 | python | [{"finding_id": "codeql_py/flask-debug_1d21a08664512d7c_809c98d5", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 20 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-601",
"CWE-601",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/url-redirection",
"py/url-redirection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection",
... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Untrusted URL redirection depends on a [user... | [
384,
49,
54,
177,
195,
190,
191,
199,
207,
304,
123,
146,
148,
153,
314,
320,
328,
331,
333,
335
] | [
null,
null,
null,
null,
null,
null,
null,
201,
209,
null,
null,
null,
null,
null,
316,
322,
null,
null,
null,
null
] | [
5,
12,
12,
29,
29,
31,
25,
17,
17,
27,
15,
19,
19,
19,
17,
17,
21,
27,
27,
27
] | [
40,
33,
55,
40,
40,
83,
77,
18,
18,
35,
69,
68,
75,
75,
18,
18,
84,
88,
88,
86
] | |
2024-11-19T01:29:11.285130+00:00 | 1,599,757,080,000 | 31fc917f6a75e0930ebf5884367f3b40bf2e3aa4 | 3 | {
"blob_id": "31fc917f6a75e0930ebf5884367f3b40bf2e3aa4",
"branch_name": "refs/heads/master",
"committer_date": 1599757080000,
"content_id": "af2464d7b563c0af49e61948315403a44500424a",
"detected_licenses": [
"MIT"
],
"directory_id": "d94b4bff5ee0cd0c7d3a14825913e749e6d74603",
"extension": "py",
"fi... | 3.40625 | stackv2 | #!/usr/bin/env python3.8
from user import User
from credentials import Credentials
def create_login(email,name,username,password):
"""
function to create a new account for password locker
"""
new_user=User(email,name,username,password)
return new_user
def save_login(user):
"""
Function to ... | 224 | 37.08 | 160 | 25 | 1,406 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e4d30fc8b5a0b6c2_263e6121", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
158,
180
] | [
164,
186
] | [
37,
33
] | [
36,
36
] | |
2024-11-19T01:29:33.845535+00:00 | 1,421,389,290,000 | ff759bc6ed8d91578397904a77482af3ae959828 | 3 | {
"blob_id": "ff759bc6ed8d91578397904a77482af3ae959828",
"branch_name": "refs/heads/master",
"committer_date": 1421389290000,
"content_id": "56428838e32a27692c02c1c672d77b882f2de09c",
"detected_licenses": [
"Unlicense"
],
"directory_id": "41492de22a7b44f1f5c704bcd2c720812d8cad50",
"extension": "py",... | 2.9375 | stackv2 | __author__ = 'christianbuia'
import random
from Crypto.Cipher import AES
import base64
import sys
def pkcs7_padding(message_bytes, block_size):
pad_length = block_size - (len(message_bytes) % block_size)
if pad_length != block_size:
for i in range(0, pad_length):
message_bytes += bytes([p... | 292 | 41.84 | 120 | 21 | 2,650 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_718d4611b1638f3d_4771045e", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
30
] | [
null
] | [
12
] | [
54
] | |
2024-11-19T01:29:47.528315+00:00 | 1,404,546,106,000 | ee46d1341533ca7b2454a6f3c7eb867fa22607ac | 3 | {
"blob_id": "ee46d1341533ca7b2454a6f3c7eb867fa22607ac",
"branch_name": "refs/heads/master",
"committer_date": 1404546106000,
"content_id": "7d22def85670a7d2422f1d652e31d00a349096a6",
"detected_licenses": [
"MIT"
],
"directory_id": "a486f43127b948161c6fe5eb3c1f8e1b3c5c9365",
"extension": "py",
"fi... | 3 | stackv2 | # geopy works much better than pygeocoder (~50% failure rate)
from geopy.geocoders import GoogleV3
import time
# Read in data (hand-coded from Dimitri Veras' map) - http://dimitriveras.com/mapUSChrome/
with open('../data/us/us_astro_cities.csv','r') as f:
cities = [l.strip() for l in f.readlines()]
# Geocode add... | 30 | 37.4 | 90 | 20 | 285 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b6e5f1311dac21ff_0435261a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
25
] | [
null
] | [
33
] | [
80
] | |
2024-11-19T01:30:02.837307+00:00 | 1,522,357,315,000 | 752188648c752d85bc71a2b4c069cd0abf957e1d | 3 | {
"blob_id": "752188648c752d85bc71a2b4c069cd0abf957e1d",
"branch_name": "refs/heads/master",
"committer_date": 1522357315000,
"content_id": "204c1184537aec0869c00235f9c834c83cfade8f",
"detected_licenses": [
"MIT"
],
"directory_id": "6552d440062cdc72d01ad3ef50b6421839afea5b",
"extension": "py",
"fi... | 3.109375 | stackv2 | import sys
import re
import socket
import ssl
from multiprocessing.pool import ThreadPool as Pool
import json
__author__ = "David Debreceni Jr"
class Extractor():
def __init__(self):
self.pattern = r'(?:[a-zA-Z0-9](?:[a-zA-Z0-9\-]{,61}[a-zA-Z0-9])?\.)+[a-zA-Z]{2,6}'
def domain_reader(self, file):
... | 70 | 33.43 | 110 | 15 | 525 | python | [{"finding_id": "codeql_py/insecure-default-protocol_5fafef440f187609_b444a86f", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
37
] | [
null
] | [
24
] | [
45
] | |
2024-11-19T01:30:12.392087+00:00 | 1,592,259,150,000 | b945d72445625ce28f708bce09f56065cf4c7c13 | 2 | {
"blob_id": "b945d72445625ce28f708bce09f56065cf4c7c13",
"branch_name": "refs/heads/master",
"committer_date": 1592259150000,
"content_id": "f3e7d4721ee858043a52e1937f24452010f987e6",
"detected_licenses": [
"MIT"
],
"directory_id": "aaec009eefb373bef6b7725848a34cb87c8b8f24",
"extension": "py",
"fi... | 2.359375 | stackv2 | from flask import Flask, request, session, render_template, flash, redirect, url_for, send_file
from werkzeug.security import generate_password_hash, check_password_hash
from flask_sqlalchemy import SQLAlchemy
from cryptosteganography import CryptoSteganography
from double_auth import send_verfication
from random impor... | 107 | 30.93 | 95 | 17 | 708 | python | [{"finding_id": "codeql_py/path-injection_ea9b31c6212e9db1_169e81e5", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
38
] | [
null
] | [
20
] | [
27
] | |
2024-11-19T01:30:15.883293+00:00 | 1,690,851,575,000 | 04fe018cdb44add714b3f4139a25afa14876cf62 | 2 | {
"blob_id": "04fe018cdb44add714b3f4139a25afa14876cf62",
"branch_name": "refs/heads/master",
"committer_date": 1690863000000,
"content_id": "88fe53ad777d3ff7a48ce9f96401a00d1c783d61",
"detected_licenses": [
"BSD-2-Clause",
"BSD-3-Clause"
],
"directory_id": "6ff084d17f22cf3abc4f2cc3d881f4b8218e1c51... | 2.46875 | stackv2 | """
VK.com OpenAPI, OAuth2 and Iframe application OAuth2 backends, docs at:
https://python-social-auth.readthedocs.io/en/latest/backends/vk.html
"""
import json
from hashlib import md5
from time import time
from ..exceptions import AuthException, AuthTokenRevoked
from ..utils import parse_qs
from .base import Base... | 206 | 33.16 | 86 | 22 | 1,583 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b905a8a54a220ca3_ff9bb3cc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algori... | [
63,
150,
199
] | [
null,
null,
null
] | [
20,
17,
27
] | [
56,
84,
73
] | |
2024-11-19T01:30:26.325441+00:00 | 1,635,965,430,000 | 52c6e9c737b9401def87b426c048f13292c70d4f | 3 | {
"blob_id": "52c6e9c737b9401def87b426c048f13292c70d4f",
"branch_name": "refs/heads/master",
"committer_date": 1635965430000,
"content_id": "3fb45fa7296437e95e1e7f51a63896ee1f807d80",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "79e1d04867c4298b23c907f92c7119e4bea8ef02",
"extension": "py"... | 2.6875 | stackv2 | #! /usr/bin/env python
"""
Helper script for modifying config.json files that are locked inside
model.tar.gz archives. This is useful if you need to rename things or
add or remove values, usually because of changes to the library.
This script will untar the archive to a temp directory, launch an editor
to modify the c... | 62 | 30.73 | 94 | 12 | 428 | python | [{"finding_id": "codeql_py/tarslip_354fac5957860a6a_1b9ee28f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
51
] | [
null
] | [
9
] | [
16
] | |
2024-11-19T01:30:30.395869+00:00 | 1,636,898,449,000 | 4d9932bf6c592079e86cdedcc13401d2f641747d | 3 | {
"blob_id": "4d9932bf6c592079e86cdedcc13401d2f641747d",
"branch_name": "refs/heads/main",
"committer_date": 1636898449000,
"content_id": "f9e6292e4cc91b5c1a75b23bacc350bceec076cf",
"detected_licenses": [
"MIT"
],
"directory_id": "72a3ee7f4ff24f8b8ef253942f69163dca428de4",
"extension": "py",
"file... | 2.765625 | stackv2 | from datetime import datetime
import os
import docx2txt
import pyttsx3
from flask import Flask, redirect, render_template, request
from flask_sqlalchemy import SQLAlchemy
from werkzeug.utils import secure_filename
engine = pyttsx3.init()
rate = engine.getProperty('rate')
engine.setProperty('rate', 190)
voices = e... | 81 | 30.52 | 78 | 14 | 611 | python | [{"finding_id": "codeql_py/flask-debug_72a5da2e0b28981f_524e0b10", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
81,
69
] | [
null,
null
] | [
null,
19
] | [
20,
75
] | |
2024-11-19T01:30:39.192080+00:00 | 1,632,939,313,000 | d5c5196611d5ca3e2cf7c05aff7b862515e58d48 | 3 | {
"blob_id": "d5c5196611d5ca3e2cf7c05aff7b862515e58d48",
"branch_name": "refs/heads/main",
"committer_date": 1632939313000,
"content_id": "39ea0ab948894f5bee9d31d3f8e9b96d0b6ddb27",
"detected_licenses": [
"MIT"
],
"directory_id": "127103b29a0c05988dbe7ce7a4b71da946dcf5a1",
"extension": "py",
"file... | 3.296875 | stackv2 | import pandas as pd
from bs4 import BeautifulSoup
import re
import nltk
from nltk.tokenize.toktok import ToktokTokenizer
import config
tokenizer = ToktokTokenizer()
stopword_list = nltk.corpus.stopwords.words("english")
def remove_special_characters(text):
"""Remove unwanted characters [!@#$%^&*()]
Args:
... | 47 | 31.28 | 90 | 10 | 355 | python | [{"finding_id": "codeql_py/overly-large-range_852b11bc6ebe5697_fc7c42a8", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
21
] | [
null
] | [
21
] | [
24
] | |
2024-11-19T01:54:54.434961+00:00 | 1,482,258,745,000 | f3ffe49f22c16fc973ebc9c322a120e8f69363be | 3 | {
"blob_id": "f3ffe49f22c16fc973ebc9c322a120e8f69363be",
"branch_name": "refs/heads/master",
"committer_date": 1482258745000,
"content_id": "7404b1a96f1504d7511def05256284c0a9869055",
"detected_licenses": [
"MIT"
],
"directory_id": "bd535bdaa6fc6800d30600e917907ff8e9fccadd",
"extension": "py",
"fi... | 3.28125 | stackv2 | #!/usr/bin/python3
import sys
import re
# (.*[\[].*[\]])* == Any number of optional blocks, both inside and outside of square brackets
# ([a-z])([a-z])\\2 == 'aba' pattern outside of square brackets
# .* == any amount of characters later
# \[[^\]]* == An opening square bracket followed by any number of characters wit... | 35 | 40.77 | 115 | 13 | 421 | python | [{"finding_id": "codeql_py/redos_d0a11daedf9c47d6_56a28659", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\[\\]'.", "reme... | 4 | true | [
"CWE-1333",
"CWE-1333",
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos",
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\[\\]'.",
"This part of the regular expression may cause exponential backtracking on strings starting with '\\[' and containing many repetitions of '\\]\\['.",
"This part of the regular expression... | [
12,
12,
22,
22
] | [
null,
null,
null,
null
] | [
20,
26,
50,
56
] | [
22,
28,
52,
58
] | |
2024-11-19T01:55:03.378591+00:00 | 1,552,071,651,000 | b36687fa1d781c2199077802709207ed34d3696f | 3 | {
"blob_id": "b36687fa1d781c2199077802709207ed34d3696f",
"branch_name": "refs/heads/master",
"committer_date": 1552071651000,
"content_id": "0315b57802823978d6172c146159adfcaac15c25",
"detected_licenses": [
"MIT"
],
"directory_id": "71dbb40bf28bddff0b96985fbd71c0837f37a572",
"extension": "py",
"fi... | 2.546875 | stackv2 | import sys
import logging
import argparse
from materials_commons.api import get_all_projects
from ..utils.LoggingHelper import LoggingHelper
from ..internal_etl.BuildProjectExperimentWithETL import BuildProjectExperiment
def main(project, user_id, apikey, excel_file_path, data_dir_path):
main_log = logging.getL... | 95 | 39.25 | 116 | 16 | 806 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2f67f14e837f1f0a_5d4a5b5f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
18
] | [
null
] | [
19
] | [
47
] | |
2024-11-19T01:55:06.967866+00:00 | 1,551,005,779,000 | 88cd68d81f8daecf037803f1bfe3796b73e3e18f | 3 | {
"blob_id": "88cd68d81f8daecf037803f1bfe3796b73e3e18f",
"branch_name": "refs/heads/master",
"committer_date": 1551005779000,
"content_id": "d80fc5bcef5ab1109fcb142d0c0c79000ae98b71",
"detected_licenses": [
"MIT"
],
"directory_id": "fd6ef19893df27aab0ac853039281bd1dfc517a7",
"extension": "py",
"fi... | 2.796875 | stackv2 | import requests
from bs4 import BeautifulSoup
from argparse import ArgumentParser
import os
#
# 実行例
# $ python crawler.py http://j-lyric.net/artist/a0018f8/l00c342.html .
#
#
#
#
#
if __name__ == "__main__":
# 引数設定
usage = "$ python url"# usage = "$ python url path"
argparser = ArgumentParser(us... | 70 | 21.46 | 110 | 12 | 461 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c06e9fac857750d8_9ee163c2", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [j-lyric.net](1) may be at an arbitrary position in the... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [j-lyric.net](1) may be at an arbitrary position in the sanitized URL."
] | [
33
] | [
null
] | [
8
] | [
28
] | |
2024-11-19T01:55:14.417219+00:00 | 1,522,354,819,000 | d7e979150362fa590f0b84fe7905aaf5d1b6fc6f | 3 | {
"blob_id": "d7e979150362fa590f0b84fe7905aaf5d1b6fc6f",
"branch_name": "refs/heads/master",
"committer_date": 1522354819000,
"content_id": "1057f2106cef5d0c6feccb26d41aad150bef927b",
"detected_licenses": [
"MIT"
],
"directory_id": "5a12697c3ca10ffd0c75200c5435c7b3f6bd2db5",
"extension": "py",
"fi... | 3 | stackv2 | from google.cloud import texttospeech
def list_voices():
"""Lists the available voices."""
client = texttospeech.TextToSpeechClient()
# Performs the list voices request
voices = client.list_voices()
for voice in voices.voices:
# Display the voice's name. Example: tpc-vocoded
print... | 55 | 38.69 | 96 | 14 | 496 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c46f5edc62c67cd7_0e4e8fc0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
23
] | [
24
] | [
15
] | [
70
] | |
2024-11-19T02:06:47.000856+00:00 | 1,530,706,342,000 | 91cbf15401bd9eeed0221840e11fa9182b47e2ae | 3 | {
"blob_id": "91cbf15401bd9eeed0221840e11fa9182b47e2ae",
"branch_name": "refs/heads/master",
"committer_date": 1530706342000,
"content_id": "b4d4f6d90384499502093f62c3b61f49325ba2b9",
"detected_licenses": [
"MIT"
],
"directory_id": "1f2fcfe0945b93805344e10ef54d4ef6eed41a85",
"extension": "py",
"fi... | 2.578125 | stackv2 | from Crypto.PublicKey import RSA
from Crypto.Cipher import PKCS1_v1_5
import base64
def generate_key(request):
rsa = RSA.generate(1024)
private_pem = rsa.exportKey()
request.session['key'] = str(private_pem, encoding="utf8")
public_pem = rsa.publickey().exportKey()
return str(public_pem, encoding=... | 23 | 31.26 | 107 | 16 | 197 | python | [{"finding_id": "codeql_py/weak-crypto-key_7047fa952427d1e1_42f7312d", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
7
] | [
null
] | [
11
] | [
29
] | |
2024-11-19T02:07:12.727144+00:00 | 1,432,896,722,000 | aae17cd1abe806b26e6e703593b6235030c407ef | 3 | {
"blob_id": "aae17cd1abe806b26e6e703593b6235030c407ef",
"branch_name": "refs/heads/master",
"committer_date": 1432896722000,
"content_id": "2db11ff6cb7eece24afa7c6e13ca80babe1a59a2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c771b51f29da4d66d325042c6f1493c02aad3037",
"extension": "py"... | 2.890625 | stackv2 | # -*- coding: utf-8 -*-
import scrapy.contrib.exporter
from jinja2 import Environment, PackageLoader
class JinjaRDFExporter(scrapy.contrib.exporter.BaseItemExporter):
'''
Args:
file(File) - a file
'''
def __init__(self, file, **kwargs):
self.file = file
self.en... | 69 | 33.48 | 92 | 20 | 523 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a6c46db85e58d8ce_32fb598b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
17
] | [
null
] | [
20
] | [
89
] | |
2024-11-19T02:07:15.572005+00:00 | 1,529,957,901,000 | 1f2de3566ad1c465921e8fc34c8ecc6d28a7a035 | 2 | {
"blob_id": "1f2de3566ad1c465921e8fc34c8ecc6d28a7a035",
"branch_name": "refs/heads/master",
"committer_date": 1529957901000,
"content_id": "8847691d34be646072f8a7ff1f852489fc4a056b",
"detected_licenses": [
"MIT"
],
"directory_id": "35e999bf61bea6c6b0699cf5a35400b45632a1fd",
"extension": "py",
"fi... | 2.40625 | stackv2 | from datetime import date
from jinja2 import Environment, PackageLoader
import pprint
env = Environment(loader=PackageLoader('generator', 'templates'))
def generate_class(obj):
template = env.get_template('class.py')
context = {"obj": obj}
return template.render(context)
def generate_group(group_name, ... | 40 | 29.05 | 108 | 16 | 254 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b12a3e6a48a3a96f_d39683f1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
4
] | [
null
] | [
7
] | [
66
] | |
2024-11-19T02:31:28.148334+00:00 | 1,534,843,829,000 | e1053cf771b624d57f1c3d876b404e0a914f3cbf | 2 | {
"blob_id": "e1053cf771b624d57f1c3d876b404e0a914f3cbf",
"branch_name": "refs/heads/master",
"committer_date": 1534843829000,
"content_id": "4845f3ceddc1b0503a28a2fe4b900bb43b889a09",
"detected_licenses": [
"MIT"
],
"directory_id": "a300412602307da4b3ce30d101d6cb7ce2b9c050",
"extension": "py",
"fi... | 2.328125 | stackv2 | from flask import Blueprint, render_template, request, redirect, url_for, flash
from flask_login import login_required, login_user, logout_user
from utils import flash_errors
blueprint = Blueprint('accounts', __name__,
url_prefix='/accounts'
)
from .forms import LoginForm
@blueprint.route('/login', methods=['GE... | 31 | 28.06 | 79 | 15 | 194 | python | [{"finding_id": "codeql_py/url-redirection_0ed776a7ab3c8ee0_bead73cc", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
19
] | [
null
] | [
29
] | [
41
] | |
2024-11-19T02:31:40.038020+00:00 | 1,598,767,792,000 | 3fb690e2831b87b3b5e77c7d801a4e45272c3912 | 3 | {
"blob_id": "3fb690e2831b87b3b5e77c7d801a4e45272c3912",
"branch_name": "refs/heads/master",
"committer_date": 1598767792000,
"content_id": "ca01b344957ef366388ee5c7e393951cf403b284",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b314891c44228cae856852dac5dafe4a0613af75",
"extension": "py"... | 2.625 | stackv2 | #!/usr/bin/env python
from six.moves.BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer
#from six.moves.socketserver import ThreadingMixIn
#import threading
import argparse
import os
import random
import sys
import socket
import requests
try:
TimeoutError
except NameError:
TimeoutError = socket.timeout... | 153 | 32.01 | 145 | 17 | 1,088 | python | [{"finding_id": "codeql_py/request-without-cert-validation_217b26863a3af8c6_0648364d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
49,
71
] | [
null,
null
] | [
20,
20
] | [
102,
119
] | |
2024-11-19T02:31:42.477838+00:00 | 1,544,152,233,000 | 32c4c5bd038bae0b44a24aaa2849efd7a8d541b4 | 3 | {
"blob_id": "32c4c5bd038bae0b44a24aaa2849efd7a8d541b4",
"branch_name": "refs/heads/master",
"committer_date": 1544152233000,
"content_id": "e3a7601e7e0a805e82fd67fa1c7bda5309b423a2",
"detected_licenses": [
"MIT"
],
"directory_id": "a502db4cc1c8bb5c36b8982418c7a9f230f253a6",
"extension": "py",
"fi... | 2.75 | stackv2 | import os.path
import logging
logger = logging.getLogger('pyledserver.User')
logger.setLevel(logging.INFO)
class CredentialsContainer(object):
def __init__(self):
if CredentialsContainer._is_first_setup():
with open('user_info.txt', 'w') as f:
self.mqtt_url = input('MQTT u... | 75 | 43.47 | 105 | 26 | 562 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c1222a8261a2b75a_ebb96e2c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
16
] | [
19
] | [
30
] | [
69
] | |
2024-11-19T02:31:56.214702+00:00 | 1,553,103,927,000 | 3b35ffe81cc9e862c4baf9f9b558e73b695dccc1 | 2 | {
"blob_id": "3b35ffe81cc9e862c4baf9f9b558e73b695dccc1",
"branch_name": "refs/heads/master",
"committer_date": 1553103927000,
"content_id": "d55d8737903e5f0a7567ee3ac4d1ad12b74a2ada",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "72dd6cec09943a0ec21310eaad9e45094b1d772d",
"extension": "p... | 2.34375 | stackv2 | """Contains serializers for models."""
from django.conf import settings
from django.core.exceptions import ValidationError
from django.utils import timezone
from rest_framework import serializers
from .models import Game, Player, User
class UserReadOnlySerializer(serializers.ModelSerializer):
"""A serializer for... | 77 | 26.79 | 70 | 14 | 418 | python | [{"finding_id": "codeql_py/stack-trace-exposure_2361d5db1c333ee0_729a55c3", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
75
] | [
null
] | [
47
] | [
53
] | |
2024-11-19T02:32:10.113765+00:00 | 1,539,679,964,000 | bf11628f5cd716754ff35315bdf4a0e192e71774 | 4 | {
"blob_id": "bf11628f5cd716754ff35315bdf4a0e192e71774",
"branch_name": "refs/heads/master",
"committer_date": 1539679964000,
"content_id": "6e186777e7cd9a1bfd312b15776605557bc059ef",
"detected_licenses": [
"MIT"
],
"directory_id": "06673ad0db1c1ba04243a6c4a9baf29faacbcaf3",
"extension": "py",
"fi... | 4.4375 | stackv2 | import random
print('----------------------------------------------')
print(' SPACEMAN WORD GAME')
print('----------------------------------------------')
def load_words():
f = open('spaceman_words.txt', mode = 'r')
word_list = f.readlines()
f.close()
word_list = word_list[0].split(' ')
... | 100 | 38.2 | 141 | 15 | 929 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5ec8e4c70fbabed0_015ac15c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](... | [
50,
94,
98
] | [
null,
null,
null
] | [
15,
19,
15
] | [
65,
88,
57
] | |
2024-11-19T02:32:52.146787+00:00 | 1,613,587,228,000 | e804990feb738d6197c5dad5ce167e40def0ca8c | 3 | {
"blob_id": "e804990feb738d6197c5dad5ce167e40def0ca8c",
"branch_name": "refs/heads/main",
"committer_date": 1613587228000,
"content_id": "31aeb0a1a812aa979b8d896d97f6579ca0eb8ee5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ef3a0cd889e44a9b41036e4ee8df6c6896586593",
"extension": "py",
... | 3.0625 | stackv2 | import sys, requests
class RevokeToken():
def __init__(self, token):
self.token = token.removeprefix("oauth:")
# Get client id based on user OAuth token
oauthValidateUrl = 'https://id.twitch.tv/oauth2/validate'
oauthValidateHeaders = {'Authorization': 'OAuth ' + self.token}
... | 44 | 33.16 | 102 | 15 | 339 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_babfc5b8d2d981cb_34ae620c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
13,
29
] | [
null,
null
] | [
19,
23
] | [
50,
41
] | |
2024-11-19T02:33:00.662769+00:00 | 1,537,846,668,000 | 472830082ae1a2ff15306db784d8594a75b0df5f | 2 | {
"blob_id": "472830082ae1a2ff15306db784d8594a75b0df5f",
"branch_name": "refs/heads/master",
"committer_date": 1537846668000,
"content_id": "bcaf7fac800128eacd09ec02dcf80fa2bfc9caac",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "aa361fc25ad361f653aa773aa771625c82ea9625",
"extension": "py"... | 2.40625 | stackv2 | # -*- coding: utf-8 -*-
import scrapy
import re
from BaiduZhidao.items import BaiduzhidaoItem
class BaiduSpider(scrapy.Spider):
name = "baidu"
# allowed_domains = ["zhidao.baidu.com"]
urls = []
with open('/home/python/Desktop/实体4.csv') as f:
content = f.read().strip()
keys = content.s... | 65 | 33.91 | 116 | 16 | 622 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_f985160f157d4061_31848ba5", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'baidu.com/question/', so it might m... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'baidu.com/question/', so it might match more hosts than expected."
] | [
26
] | [
null
] | [
38
] | [
104
] | |
2024-11-19T02:33:01.677366+00:00 | 1,686,599,963,000 | 917c71c3c25c5355b60d3264bdf8c87b61ba39e8 | 2 | {
"blob_id": "917c71c3c25c5355b60d3264bdf8c87b61ba39e8",
"branch_name": "refs/heads/master",
"committer_date": 1686599963000,
"content_id": "6c3d29136edc80382a78540257d82381c83644ac",
"detected_licenses": [
"MIT"
],
"directory_id": "77ff40ab8d90d15013f9cc884c2eb3ed24cd5cf7",
"extension": "py",
"fi... | 2.40625 | stackv2 | """Utilities for constructing a help card from a node."""
# =============================================================================
# IMPORTS
# =============================================================================
# Standard Library
import collections.abc
import io
import re
from importlib import resour... | 379 | 26.45 | 97 | 17 | 2,296 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e8af03d47d2e14e2_1712196e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
244
] | [
null
] | [
16
] | [
41
] | |
2024-11-19T02:43:40.233715+00:00 | 1,540,781,958,000 | 35e98f19516221321bbacd9fa0ba1b97dfafc611 | 3 | {
"blob_id": "35e98f19516221321bbacd9fa0ba1b97dfafc611",
"branch_name": "refs/heads/master",
"committer_date": 1540781958000,
"content_id": "8310ddb3840ed1b177827c4b756253d38d13e9ed",
"detected_licenses": [
"MIT"
],
"directory_id": "815532da86fb0e59acdda1599344f2f8d1fbc705",
"extension": "py",
"fi... | 3.109375 | stackv2 | # coding=utf-8
import os
import sys
MIN_PASSWORD_LENGTH = 8
MAX_PASSWORD_LENGTH = 64
ERROR_INVALID_INPUT = ('Please check that your input is in the correct format. \n' +
'python password_validator.py input_password.txt commonly_used_password_file.txt')
ERROR_FILE_NOT_FOUND = 'File {} is not found.'
ERROR_PASSWORD_IS... | 127 | 29.69 | 117 | 17 | 888 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8ac2022feb932a44_d92689b8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw... | [
68,
75,
76,
77
] | [
null,
null,
null,
null
] | [
12,
8,
8,
8
] | [
65,
60,
75,
55
] | |
2024-11-19T02:43:40.401670+00:00 | 1,515,965,133,000 | b9ab712c26e9cc730b8779127fbc0f2cdb245f21 | 2 | {
"blob_id": "b9ab712c26e9cc730b8779127fbc0f2cdb245f21",
"branch_name": "refs/heads/master",
"committer_date": 1515965133000,
"content_id": "41c583d984b0c90797f09e0a8eafd9663841765c",
"detected_licenses": [
"MIT"
],
"directory_id": "a73731d4d69ac519f62d837dde5e48804b176e3f",
"extension": "py",
"fi... | 2.46875 | stackv2 | #!/usr/bin/python3
from smbus2 import SMBus
import requests
import requests.adapters
import pytz
import time
import os
import json
import datetime
import logging as _logging
import traceback
LOG_FORMAT = '%(asctime)s [%(levelname)s] %(name)s:%(filename)s:%(lineno)d %(msg)s'
logger = _logging.getLogger(__name__)
cla... | 342 | 32.69 | 116 | 21 | 3,566 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c12a3788efb544b9_db618ed9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
276
] | [
null
] | [
22
] | [
62
] | |
2024-11-19T02:54:56.615758+00:00 | 1,413,891,914,000 | bbf1b2791bd074e85c4e36531271e9040193feea | 3 | {
"blob_id": "bbf1b2791bd074e85c4e36531271e9040193feea",
"branch_name": "refs/heads/master",
"committer_date": 1413891914000,
"content_id": "dee8c7e56e2141470125821680253b74e96a5e72",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "07f319874c86bc782c461a3cf1674ea4017fcee0",
"extension": "py",
... | 2.609375 | stackv2 | import base64, os, os.path
from flask import make_response
import utils
from mailconfig import get_mail_user_privileges
DEFAULT_KEY_PATH = '/var/lib/mailinabox/api.key'
DEFAULT_AUTH_REALM = 'Mail-in-a-Box Management Server'
class KeyAuthService:
"""Generate an API key for authenticating clients
Clients must re... | 109 | 29.41 | 97 | 17 | 849 | python | [{"finding_id": "codeql_py/overly-permissive-file_e9ca00ee68fa7607_6baa73e9", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to group readable.", "remediation": "", "location": {... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in open sets file to group readable."
] | [
34
] | [
null
] | [
22
] | [
67
] | |
2024-11-19T02:55:04.111916+00:00 | 1,613,278,901,000 | 1902fcbe8330363290bd88a6b812553d4f2f879e | 3 | {
"blob_id": "1902fcbe8330363290bd88a6b812553d4f2f879e",
"branch_name": "refs/heads/main",
"committer_date": 1613278901000,
"content_id": "6d142137cbadcbaaf802d5cb5c72bbbb5d4729f5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "58e48af4a2d236dd3a0d96e6a2476748d0ebc927",
"extension": "py",
... | 2.78125 | stackv2 | from flask import Flask
from flask import request
app = Flask(__name__)
@app.route("/terminal",methods=['POST','GET'])
def hello():
try:
from oled_terminal import oled_term
from time import sleep
myTerm=oled_term()
myTerm.print_line("Hello %s"%(request.form["user"]))
sleep(... | 20 | 22.1 | 60 | 14 | 114 | python | [{"finding_id": "codeql_py/stack-trace-exposure_823860c41eafc1ce_b2b1a3ae", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
15,
19
] | [
null,
null
] | [
16,
5
] | [
22,
24
] | |
2024-11-19T02:55:04.241640+00:00 | 1,374,530,643,000 | 80a499dc7eec2bd16351a24ec58b08d3ebe04b92 | 3 | {
"blob_id": "80a499dc7eec2bd16351a24ec58b08d3ebe04b92",
"branch_name": "refs/heads/master",
"committer_date": 1374530643000,
"content_id": "2fefd79d754674c05fc8d5b1d135d7e281db7005",
"detected_licenses": [
"MIT"
],
"directory_id": "034109cec06a91f05561169c8389708296ce7b9c",
"extension": "py",
"fi... | 2.53125 | stackv2 | '''
Created on 10 Jul 2013
@author: jamie@botsofbitcoins.com
'''
#!/usr/bin/env python
# -*- encoding: utf-8 -*-
from suds.client import Client
from suds import WebFault
import datetime
from hashlib import sha256
import logging
logging.basicConfig(level=logging.DEBUG)
class OkPayAPI():
def __init__(self, api_pa... | 233 | 45.97 | 120 | 19 | 2,221 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1baf298668468978_d62b67da", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
32
] | [
null
] | [
38
] | [
50
] | |
2024-11-19T02:55:19.371273+00:00 | 1,626,975,580,000 | 058848ea45735fd791c08cae78957f073815c587 | 3 | {
"blob_id": "058848ea45735fd791c08cae78957f073815c587",
"branch_name": "refs/heads/main",
"committer_date": 1626975580000,
"content_id": "7b65f2310affbd8bf21ccfb28d51f268457743db",
"detected_licenses": [
"MIT"
],
"directory_id": "5318ab73366b0135322286dab00d7e2f219f6a5b",
"extension": "py",
"file... | 2.59375 | stackv2 | from flask import Flask, request, redirect, render_template
from flask_sqlalchemy import SQLAlchemy
from datetime import datetime
from werkzeug.utils import redirect
app = Flask(__name__)
app.config['SQLALCHEMY_DATABASE_URI'] = 'sqlite:///blog.db'
db = SQLAlchemy(app)
class BlogPost(db.Model):
id = db.Column(db... | 56 | 26.55 | 81 | 13 | 351 | python | [{"finding_id": "codeql_py/flask-debug_2df51b74c04694bb_9f078b1b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
56,
47
] | [
null,
null
] | [
5,
12
] | [
24,
27
] | |
2024-11-19T02:55:22.782503+00:00 | 1,589,085,044,000 | ce4f9b1e832a783099727c885fd8bc140138be06 | 3 | {
"blob_id": "ce4f9b1e832a783099727c885fd8bc140138be06",
"branch_name": "refs/heads/master",
"committer_date": 1589085044000,
"content_id": "55c24ce01f09a30b5e904db22ef6b40a48476f5a",
"detected_licenses": [
"MIT"
],
"directory_id": "c2b3abe111dea4e67a0a08901d222a5c3601d409",
"extension": "py",
"fi... | 2.765625 | stackv2 | #!/usr/local/bin/python3
# coding: utf-8
from bottle import route, run, get, post, request, template, redirect
import redis
import random, string
from hashlib import blake2b
import re
from time import sleep
##############################
# 設定値
##############################
# Redis接続先
r = redis.Redis(host='localhost'... | 148 | 25.39 | 148 | 14 | 1,334 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_4e848aaa935f1d1d_b9c3b9e0", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor... | 2 | true | [
"CWE-020",
"CWE-327"
] | [
"py/incomplete-hostname-regexp",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This string, which is used as a regular expression [here](1), has an unescaped '.' before 'microsoft.com/', so it might match more hosts than expected.",
"[Sensitive data (password)](1) is used in a hashing algorithm (BLAKE2B) that is insecure for password hashing, since it is not a computationally expensive has... | [
42,
137
] | [
null,
null
] | [
22,
16
] | [
72,
34
] | |
2024-11-19T02:55:23.770444+00:00 | 1,609,331,271,000 | 176b6c625785f01af8441e963c44d62a19931217 | 3 | {
"blob_id": "176b6c625785f01af8441e963c44d62a19931217",
"branch_name": "refs/heads/main",
"committer_date": 1609331271000,
"content_id": "1d46c0a63991fd10e896dcbc02a72016fe9e70fa",
"detected_licenses": [
"MIT"
],
"directory_id": "787d9b3ca96ab583c69eb76fa5a4bdb3688b8944",
"extension": "py",
"file... | 2.578125 | stackv2 | # -*- coding: utf-8 -*-
"""
bracket
~~~~~
Bracket is an Elegant static site generator.
:copyright: (c) 2020 by Ceorleorn(https://github.com/ceorleorn).
:license: MIT License, see LICENSE for more details.
"""
from jinja2 import Template
simpleTemplate = """<!DOCTYPE html>
<html lang="{{ objdict[... | 33 | 24.15 | 89 | 11 | 229 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9a9011fca1700c0d_f9c787f9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
32
] | [
null
] | [
16
] | [
40
] | |
2024-11-19T02:55:49.419976+00:00 | 1,601,888,805,000 | 9224a02417dd3142c9b30ef25952aaeafa946c16 | 2 | {
"blob_id": "9224a02417dd3142c9b30ef25952aaeafa946c16",
"branch_name": "refs/heads/master",
"committer_date": 1601888805000,
"content_id": "f2bf3949ad8db1c286e128ce4698ed09f404be18",
"detected_licenses": [
"MIT"
],
"directory_id": "4999eea2624652cf5e02deb3aca52fc75a324c82",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python3
from typing import Dict, NoReturn, List
import json
import telegram
from datetime import datetime
from flask import Flask, request, jsonify
from config import config
# эта часть нужна для подключения прокси
#from telegram.utils.request import Request
#ProxyRequest = Request(proxy_url=config.RE... | 94 | 29.84 | 137 | 11 | 763 | python | [{"finding_id": "codeql_py/log-injection_af2c965928f46f57_8a1386eb", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
80,
88
] | [
null,
null
] | [
17,
17
] | [
52,
52
] | |
2024-11-19T02:56:00.003369+00:00 | 1,560,948,920,000 | e75449a22b66389abed489b9becff4f9f0377660 | 3 | {
"blob_id": "e75449a22b66389abed489b9becff4f9f0377660",
"branch_name": "refs/heads/master",
"committer_date": 1560948920000,
"content_id": "ec86df991bf606d3b92a29adc039139b218ea6f3",
"detected_licenses": [
"MIT"
],
"directory_id": "e55a61292bbd4ab42865279712a5a0c02ded0406",
"extension": "py",
"fi... | 3.078125 | stackv2 | '''Emarsys API Authenticator
This script allows the user to easily create a X_WSSE header
for Authentication with the Emarsys RESTful API.
'''
# import needed modules
import uuid
import hashlib
import datetime
import base64
def create_xwsse_header(username, secret):
# Returns x_wsse authentication headers for e... | 73 | 31.68 | 142 | 15 | 595 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_0bcdfb8bdc8cac91_50452430", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (SHA1) that is insecure."
] | [
58
] | [
null
] | [
24
] | [
51
] | |
2024-11-19T03:10:19.262138+00:00 | 1,489,539,420,000 | ca1f3afcbe0fe3dc34e5672e812ee53a563404c7 | 3 | {
"blob_id": "ca1f3afcbe0fe3dc34e5672e812ee53a563404c7",
"branch_name": "refs/heads/master",
"committer_date": 1489539420000,
"content_id": "137db078bf7a3ba79390a8125a8d5fb92e1582a7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "34a336427df056ce3c21c5a2cf2f9c8e416c75eb",
"extension": "py"... | 2.96875 | stackv2 | """
A python flask application to scroll through a kanji database
"""
import os
# pylint: disable=import-error
from flask import Flask, request, render_template
import psycopg2
APP = Flask(__name__)
@APP.route('/')
def index():
""" Main page, displays all kanji groups. """
return render_template('main.htm... | 117 | 30.39 | 97 | 19 | 885 | python | [{"finding_id": "codeql_py/flask-debug_638cebe8aea5080e_007f0e65", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-089",
"CWE-089"
] | [
"py/flask-debug",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2).\nThis SQL query depends on a [user-provided value](3).",
"This SQL query depends on... | [
117,
33,
95
] | [
null,
null,
null
] | [
5,
6,
17
] | [
51,
93,
22
] | |
2024-11-19T03:10:50.622161+00:00 | 1,490,078,106,000 | 19556c95e23a198eae66854ca78c3aa0becc3434 | 3 | {
"blob_id": "19556c95e23a198eae66854ca78c3aa0becc3434",
"branch_name": "refs/heads/master",
"committer_date": 1490078106000,
"content_id": "5227a7336b9040237d182ca966e80d482abedcf3",
"detected_licenses": [
"MIT"
],
"directory_id": "8699854f12aa396ed3c21cd577b93176566bd7ab",
"extension": "py",
"fi... | 2.8125 | stackv2 | ''' The business logic & routing controller of this module
The is the controller aspect of the module.
References:
- The Parent Application
- The Parent Application database
- The Parent Application utilities
- This module's: database models, jinja templates, and WTForms
Yields:
- Method: Load Us... | 131 | 32.94 | 89 | 16 | 774 | python | [{"finding_id": "codeql_py/url-redirection_62220864534ef847_0f09e69d", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
86
] | [
null
] | [
29
] | [
58
] | |
2024-11-19T03:21:44.896672+00:00 | 1,450,402,050,000 | d052f5cd0a420902da567460f94fd24b6e1742c2 | 4 | {
"blob_id": "d052f5cd0a420902da567460f94fd24b6e1742c2",
"branch_name": "refs/heads/master",
"committer_date": 1450402050000,
"content_id": "006a54cd165f95c71e645a9f6c5eca12b3c609c6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ff1f44bd9726b535bf3c1fb7f93c406dfd9d8ab9",
"extension": "py"... | 3.75 | stackv2 |
class Student(object):
count = 0
books = []
def __init__(self, name, age):
self.name = name
self.age = age
@classmethod
def printClassInfo(cls):
print(cls.__name__)
print(dir(cls))
@staticmethod
def printClassAttr():
print(Student.count)
p... | 50 | 18.34 | 50 | 12 | 246 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dcc774d1fa95c74d_8f399c07", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
38
] | [
null
] | [
37
] | [
50
] | |
2024-11-19T03:22:20.548614+00:00 | 1,579,694,394,000 | 9ff928c8ba4de609100a33c1acee27e5c6a52947 | 2 | {
"blob_id": "9ff928c8ba4de609100a33c1acee27e5c6a52947",
"branch_name": "refs/heads/master",
"committer_date": 1579694394000,
"content_id": "64b8131e20a4ee74907ddc9b3e00df02bea02346",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "8b0e1edebd5b1808e7781d3298829c85ce8f5f01",
"extension": "p... | 2.40625 | stackv2 | #coding: utf-8
import os
import time
import sqlite3
from flask import Flask, request
import ambient
from .bme280 import BME280
app = Flask(__name__)
@app.route('/view', methods=["GET"])
def view():
return "ok"
@app.route('/bme280', methods=["POST"])
def bme280():
post_data = request.get_data().splitlines()... | 106 | 24.7 | 94 | 14 | 856 | python | [{"finding_id": "codeql_py/log-injection_244218289c2b9da1_56c26349", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
28
] | [
null
] | [
21
] | [
94
] | |
2024-11-19T03:22:21.953570+00:00 | 1,690,207,793,000 | c87cb2da0e03ca50e63f75f7f7f51cb42d265341 | 3 | {
"blob_id": "c87cb2da0e03ca50e63f75f7f7f51cb42d265341",
"branch_name": "refs/heads/master",
"committer_date": 1690207793000,
"content_id": "324c5a723e50caae3de799f2bab6c3fc3245c233",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8d9e2a5319e96043b04203e2af8afecce20bc8e3",
"extension": "py"... | 2.890625 | stackv2 | #!/usr/bin/python3
#
# Read 0.1° occurrence density counts from a CSV, which is assumed to be ordered by snapshot.
#
# For each new snapshot, create a matrix of 3600×1800 pixels.
#
# Colour the pixels in the matrix according to density.
#
# Write the coloured pixels over the appropriate basemap and output as a PNG.
#
... | 98 | 33.98 | 136 | 19 | 1,158 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5374aa066af44fda_c9923dd5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
95,
95
] | [
null,
null
] | [
57,
75
] | [
73,
90
] | |
2024-11-19T03:44:01.750155+00:00 | 1,479,784,252,000 | f60017de3ddac8190f299539a9f52bbd62bca651 | 2 | {
"blob_id": "f60017de3ddac8190f299539a9f52bbd62bca651",
"branch_name": "refs/heads/master",
"committer_date": 1479784252000,
"content_id": "05cdd86ba27c6b6fd8624ed2f91518af43ed01db",
"detected_licenses": [
"MIT"
],
"directory_id": "c84033ea44849e85af96e6d02d7edbbb4602f3e1",
"extension": "py",
"fi... | 2.453125 | stackv2 | import io
import json
import requests
from os import curdir, sep
from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler
from cgi import parse_header, parse_multipart, FieldStorage
from PIL import Image
STACK_URL = 'http://127.0.0.1:8000'
class RequestHandler(BaseHTTPRequestHandler):
def crop(self, x, ... | 122 | 26.49 | 124 | 16 | 759 | python | [{"finding_id": "codeql_py/path-injection_4e068ce148c8c490_fd4a99b2", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-918"
] | [
"py/path-injection",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
84,
54
] | [
null,
null
] | [
26,
21
] | [
50,
38
] | |
2024-11-19T03:44:26.307978+00:00 | 1,609,312,243,000 | a6fe36d54d9d0b338cd50fe8c348cac5081c333d | 2 | {
"blob_id": "a6fe36d54d9d0b338cd50fe8c348cac5081c333d",
"branch_name": "refs/heads/main",
"committer_date": 1609312243000,
"content_id": "4ba1a787a25a4908e20297331a06f371edad6243",
"detected_licenses": [
"MIT"
],
"directory_id": "abbc3e56996d8e9396397eb78f02745785e2ad03",
"extension": "py",
"file... | 2.359375 | stackv2 | from flask import Flask,render_template,request
import requests
import json
web = Flask(__name__)
@web.route('/')
def explore():
node = "https://mainnet.cn.utools.club"
res = requests.get(str(node) + '/blocks')
text = res.text
txt = json.loads(text)
return render_template("page.html",txt = txt,nod... | 23 | 24.87 | 59 | 12 | 158 | python | [{"finding_id": "codeql_py/full-ssrf_589ac6ec7e268b04_dbd22778", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
18
] | [
null
] | [
11
] | [
46
] | |
2024-11-19T01:44:09.461692+00:00 | 1,457,525,295,000 | f0766cda9bd415efe147fe7c650c2a0fa8539f8f | 2 | {
"blob_id": "f0766cda9bd415efe147fe7c650c2a0fa8539f8f",
"branch_name": "refs/heads/master",
"committer_date": 1457525295000,
"content_id": "4a2bef876764f10e403724a226ab48cca0b002af",
"detected_licenses": [
"MIT"
],
"directory_id": "5f66eae1a5247e9f495728c0f6dcd875313f1024",
"extension": "py",
"fi... | 2.390625 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Tue Jun 9 17:14:46 2015
@author: noore
"""
from SOAPpy import SOAPProxy
import hashlib
class BrendaSoap(object):
def __init__(self, username, password):
self.client = self._GetClient()
self.My_Username = username
password = hashlib.sha256(passwo... | 90 | 33.92 | 82 | 19 | 719 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_35dea0ecda16bfb2_e8cc067e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
15
] | [
null
] | [
35
] | [
43
] | |
2024-11-19T02:08:15.016831+00:00 | 1,655,988,043,000 | f8765f78a8078ed467d2e82bc1b2b3a289bd4b27 | 3 | {
"blob_id": "f8765f78a8078ed467d2e82bc1b2b3a289bd4b27",
"branch_name": "refs/heads/master",
"committer_date": 1655988043000,
"content_id": "da4a31c8575567b959abe62658175b43bea6938e",
"detected_licenses": [
"MIT",
"BSD-3-Clause"
],
"directory_id": "2f722aa3f8686bdd28e61a0e774d4db01c1671a9",
"ext... | 2.53125 | stackv2 | import csv
import json
import requests
class Office365:
"""Password spray Microsoft Office 365"""
def __init__(self, host, port, timeout, fireprox):
self.timeout = timeout
self.url = "https://login.microsoft.com/common/oauth2/token"
if fireprox:
self.url = f"https://{fi... | 161 | 29.65 | 104 | 16 | 1,136 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_fc4679bdf48784c5_82e34b50", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
159,
145
] | [
null,
153
] | [
13,
13
] | [
100,
14
] | |
2024-11-19T02:08:38.874294+00:00 | 1,590,154,487,000 | f7efb4f03706aba34f8576501f11a3c5feed32ea | 3 | {
"blob_id": "f7efb4f03706aba34f8576501f11a3c5feed32ea",
"branch_name": "refs/heads/master",
"committer_date": 1590154487000,
"content_id": "326cd2022122870ea2e1571569351effac1b98ff",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "531227359f98c9ed252e309928cf428e6afa37fc",
"extension": "p... | 2.609375 | stackv2 | import requests
import xml.etree.ElementTree as ET
import json
user="duncannkhata"
api_key = "c01bb036e0074f26ab3a6bb56f4b31ea"
client_ip = "165.56.181.198"
base_url = "https://api.sandbox.namecheap.com/xml.response?ApiUser=" + user + "&ApiKey=" + api_key + "&UserName=" + user + "&ClientIp="+ client_ip
def get_hosts... | 70 | 35.17 | 146 | 13 | 733 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_030a4e7a4f6e2f16_afae5aea", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
70
] | [
null
] | [
7
] | [
35
] | |
2024-11-19T02:21:35.968215+00:00 | 1,398,965,950,000 | 03ab9873b7f25cab2927ce2bf43d2b5a1f6049a0 | 3 | {
"blob_id": "03ab9873b7f25cab2927ce2bf43d2b5a1f6049a0",
"branch_name": "refs/heads/master",
"committer_date": 1398965950000,
"content_id": "4860753ac52b82407ab4a11ac3dcaf49cc2d6967",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "b9a11b1cda6aa511421b6f55f5449c505d1876cc",
"extension": "p... | 2.59375 | stackv2 | #!/usr/bin/env python
#
# This tool is distributed under a BSD licence. A copy of this
# should have been included with this file.
#
# Copyright (c) 2007, Martyn Ruks
#
# This tool is designed for the purpose of performing security
# testing only and is not intended to be used for unlawful
# activities
#
# This tool... | 244 | 27.32 | 170 | 18 | 1,661 | python | [{"finding_id": "codeql_py/insecure-protocol_5b5cf908a9097274_18c84564", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv3 specified by [call to SSL.Context](1).", "remediation": "", "locat... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/insecure-protocol",
"py/insecure-protocol"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version SSLv3 specified by [call to SSL.Context](1).",
"Insecure SSL/TLS protocol version TLSv1 specified by [call to SSL.Context](1)."
] | [
195,
198
] | [
null,
null
] | [
19,
19
] | [
48,
48
] | |
2024-11-19T03:10:05.399724+00:00 | 1,493,485,977,000 | d51602f19de9a32ab8e0acd6eece53c7ee2c0dc2 | 3 | {
"blob_id": "d51602f19de9a32ab8e0acd6eece53c7ee2c0dc2",
"branch_name": "refs/heads/master",
"committer_date": 1493485977000,
"content_id": "cfe54aac2e0c9521859a14a0d24b15f088f9ef99",
"detected_licenses": [
"MIT"
],
"directory_id": "30f8b21d7dde062698702149f5f5e84019916563",
"extension": "py",
"fi... | 2.6875 | stackv2 | """This file contains the CRUD for users"""
from flask import Blueprint, render_template, g, flash, redirect, url_for, request
from app.validation import validate
from app.models import User
blueprint = Blueprint('users', __name__)
@blueprint.before_request
def adminCheck():
if not g.User.isAdmin:
flash(... | 71 | 34.46 | 104 | 15 | 561 | python | [{"finding_id": "codeql_py/url-redirection_d82a8ec76f9b74bf_e9774ed1", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
58,
70
] | [
null,
null
] | [
25,
25
] | [
41,
41
] | |
2024-11-19T03:10:11.776436+00:00 | 1,482,245,956,000 | c22c7f82900a9ade27b5c7b880ba8414cfc9e946 | 3 | {
"blob_id": "c22c7f82900a9ade27b5c7b880ba8414cfc9e946",
"branch_name": "refs/heads/master",
"committer_date": 1482245956000,
"content_id": "4571411b7dfe463eab94f83b326c3d424a01a01b",
"detected_licenses": [
"MIT"
],
"directory_id": "f6352738bb8bef7713788b93b55f85aa36ced446",
"extension": "py",
"fi... | 3.234375 | stackv2 | """Basic web handler
Provides a basic web handler framework for Google App Engine.
Framework includes the ability to register, login, and logout users.
"""
import hashlib
import hmac
import random
import re
from string import letters
import webapp2
from google.appengine.ext import db
import settings as s
def make... | 231 | 29.55 | 74 | 14 | 1,577 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_5b5c09e3e2be26bf_7d354b7e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
110
] | [
null
] | [
24
] | [
40
] | |
2024-11-19T03:10:13.627513+00:00 | 1,631,008,346,000 | b209a9f67ecf592cd8e7249f098f45f399adc7b7 | 2 | {
"blob_id": "b209a9f67ecf592cd8e7249f098f45f399adc7b7",
"branch_name": "refs/heads/master",
"committer_date": 1631008346000,
"content_id": "48ca3085c0852d2cc6c63609680418fb2d437c3a",
"detected_licenses": [
"MIT"
],
"directory_id": "74f1b75ef38c38b5820debf017781997d296863d",
"extension": "py",
"fi... | 2.421875 | stackv2 | import os
import datetime
patient_title = "Mã bệnh nhân:%"
location_title = "Địa điểm:%"
subject_title = "Độ nguy hiểm:%"
storage_file = open("db_add_info.txt", "a")
identity = 0
if os.path.exists('./last_identity.txt'):
with open('last_identity.txt', 'r') as f:
identity = int(f.read()[0])
with open('e... | 43 | 29.42 | 160 | 27 | 315 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8218429ca495cfdb_2cbf06a4", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
35
] | [
null
] | [
32
] | [
41
] | |
2024-11-19T03:22:37.810362+00:00 | 1,534,607,743,000 | d28884c021478e2021a234550476cfae6c6421a9 | 3 | {
"blob_id": "d28884c021478e2021a234550476cfae6c6421a9",
"branch_name": "refs/heads/master",
"committer_date": 1534607743000,
"content_id": "f6873479a850895c23bc74cd0a7013fb78d8f81e",
"detected_licenses": [
"MIT"
],
"directory_id": "ae542ca54d07b671def857ca3d669d2766ba1bb6",
"extension": "py",
"fi... | 2.65625 | stackv2 | # coding: utf-8
import sys
from argparse import ArgumentParser
from .entrystore import EntryStore, PwwError
from .inputs import CLIInput
class Command:
def __init__(self, title, homedir, _input):
self.title = title
self.home = homedir
self._input = _input
def execute(self, cmd):
... | 81 | 29.74 | 76 | 15 | 537 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d306b86f1f64857c_6c2da00f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
39
] | [
null
] | [
33
] | [
51
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.