added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T00:24:54.781440+00:00 | 1,637,373,938,000 | 8206ba589decaeee9a9aa412b8a3158beb7ac045 | 2 | {
"blob_id": "8206ba589decaeee9a9aa412b8a3158beb7ac045",
"branch_name": "refs/heads/master",
"committer_date": 1637373938000,
"content_id": "29ff6798590587f2d6bc6f1a3bbc3fdce3cd2506",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6ee06ad2bbc15cc0f829f99198947ffe8cffe395",
"extension": "py"... | 2.5 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import requests
import requests.packages.urllib3
from .Base import Base
class Target(Base):
def __init__(self, api_base_url, api_key):
super().__init__(api_base_url, api_key)
self.logger = self.get_logger
def get_all(self):
try:
... | 75 | 33.69 | 136 | 17 | 590 | python | [{"finding_id": "codeql_py/request-without-cert-validation_1f905aa2db8a763f_46e91729", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
19,
40,
56,
68
] | [
null,
null,
null,
null
] | [
24,
24,
24,
24
] | [
95,
97,
107,
100
] | |
2024-11-19T00:36:53.171394+00:00 | 1,543,559,900,000 | 148faff54c84c9f5f893993feecd928918f53477 | 4 | {
"blob_id": "148faff54c84c9f5f893993feecd928918f53477",
"branch_name": "refs/heads/master",
"committer_date": 1543559900000,
"content_id": "008a4902794aa3c606b6241465dcb7764137f39f",
"detected_licenses": [
"MIT"
],
"directory_id": "57f3b7c0c4b95d503a960ff1b8368e714f59053f",
"extension": "py",
"fi... | 3.5625 | stackv2 | import time
import random
"""One implementation of MeisterGeist. Summer 2017 Python class, CRAHS CDC. See
https://github.com/cyberdefense-club/cdc2017-summer/blob/master/02-homework.txt"""
# define quasi-constants:
ALPHA = "ALPHA"
BRAVO = "BRAVO"
ZULU = "ZULU"
SPACE = " "
BACKSPACE = "\b"
MINDIGITS = 1
MAXDIGITS = 8
... | 202 | 28.41 | 82 | 17 | 1,575 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5cb6782ac2ee3c91_bbc30d86", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](... | [
118,
157,
191
] | [
119,
158,
null
] | [
23,
11,
11
] | [
42,
33,
55
] | |
2024-11-19T00:36:58.586197+00:00 | 1,618,121,071,000 | 0a47508901c275a67c313f9100806c7457245aad | 2 | {
"blob_id": "0a47508901c275a67c313f9100806c7457245aad",
"branch_name": "refs/heads/main",
"committer_date": 1618121071000,
"content_id": "e90175c486873649c834b1a9ead085ebd322c5f9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7ae0ff0f6815961b0ac6506b598d195f04e43eff",
"extension": "py",
... | 2.5 | stackv2 | from flask import Flask
from flask import json
from flask import Response
from flask import request
from concurrent.futures import ThreadPoolExecutor as Pool
from queue import Queue
import time
import datetime
import threading
import subprocess
import logging
import sys
import os
import configparser
import streamlink
... | 101 | 26.39 | 128 | 17 | 614 | python | [{"finding_id": "codeql_py/reflective-xss_cad8ca878fc73569_9775698b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
36,
50,
52
] | [
null,
null,
null
] | [
16,
20,
20
] | [
37,
44,
44
] | |
2024-11-19T00:37:03.483017+00:00 | 1,557,184,763,000 | ea88bbe71a0439d0c23986ea3a2d7f86680a5581 | 3 | {
"blob_id": "ea88bbe71a0439d0c23986ea3a2d7f86680a5581",
"branch_name": "refs/heads/master",
"committer_date": 1557184763000,
"content_id": "0961905a754f09f4843a2d9d0ef6a65dc6516cb3",
"detected_licenses": [
"MIT"
],
"directory_id": "a53f33bf75d7eebfb2a6a07a31f60309beeb3a22",
"extension": "py",
"fi... | 2.609375 | stackv2 | from flask import Flask, flash, render_template, request, redirect, url_for, send_from_directory, jsonify
from werkzeug.utils import secure_filename
import os
from skimage import color # change colour of image
from scipy.misc import imread, imresize, imsave # For images
import numpy as np # martix math
import re # ... | 137 | 37.99 | 137 | 16 | 1,220 | python | [{"finding_id": "codeql_py/flask-debug_d851c942b81f9e6b_5e5b0166", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-601",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
136,
53,
59
] | [
137,
null,
null
] | [
5,
29,
29
] | [
24,
40,
40
] | |
2024-11-19T00:51:21.933725+00:00 | 1,557,740,151,000 | e9df2830f0b214e80556a466758af079eb186dfa | 3 | {
"blob_id": "e9df2830f0b214e80556a466758af079eb186dfa",
"branch_name": "refs/heads/master",
"committer_date": 1557740151000,
"content_id": "c77a6fd2f649bf0bf4b6b52f7f64c93c3886f0ad",
"detected_licenses": [
"MIT"
],
"directory_id": "dd32a9eb411a088f20ab8d06c2654272ccb6e0a1",
"extension": "py",
"fi... | 3.203125 | stackv2 | #!/usr/bin/python3
#-*-coding:utf8-*-
from Crypto.PublicKey import RSA # Şifre çözme
import socket # LAN üzerinden iletişim
import threading # Aynı anda hem mesaj okuyup hem yazabilmek
import os # Ekran temizlemek
class Kullanıcı:
def __init__(self, isim):
#Sabitler
self.isim = isim
self._PORT = 1423
... | 86 | 28.73 | 106 | 16 | 782 | python | [{"finding_id": "codeql_py/weak-crypto-key_8fb4aa532b6f83ec_760cddb9", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
31
] | [
null
] | [
19
] | [
37
] | |
2024-11-19T01:02:22.549818+00:00 | 1,587,572,192,000 | ce0bb91b1cd89ccd6efd3f16fc9dbe96baa9fbcc | 4 | {
"blob_id": "ce0bb91b1cd89ccd6efd3f16fc9dbe96baa9fbcc",
"branch_name": "refs/heads/master",
"committer_date": 1587572192000,
"content_id": "204cd611e5b0737567c8731d7a3dc350009f63b9",
"detected_licenses": [
"MIT"
],
"directory_id": "06c434579364651ae876170d5a9f25123533ec2e",
"extension": "py",
"fi... | 4.03125 | stackv2 | """
bikeshare.py
Use Python to explore data related to bike share systems for three major
cities in the United States: Chicago, New York City, and Washington.
Import the data and compute descriptive statistics.
Also write a script to take in raw input for an interactive experience
using the terminal to present these... | 394 | 33.52 | 94 | 19 | 3,295 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d5adaf43c18d8ab5_2275e3b6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
295,
296
] | [
null,
null
] | [
15,
15
] | [
67,
67
] | |
2024-11-18T23:50:00.148346+00:00 | 1,489,063,557,000 | 9906297349e639ed219c017569465e65aa02f549 | 3 | {
"blob_id": "9906297349e639ed219c017569465e65aa02f549",
"branch_name": "refs/heads/master",
"committer_date": 1489063557000,
"content_id": "df3721ab4e0b1f0d190304564bbea7b39e3b24d5",
"detected_licenses": [
"Unlicense"
],
"directory_id": "c7355f2d2dfd48f23f9c2fab8d40139cdfc17cef",
"extension": "py",... | 2.609375 | stackv2 | """Usage: create-slideshow.py GITHUB_REPO
[--title=title] [--output-dir=<path>]
[--re-download-images]
Create a Reveal.js slide show from the README images of the forks of a repository.
For each fork of GITHUB_REPO, if the fork contains a file README.md and that R... | 127 | 29.75 | 119 | 17 | 936 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4719493df6282e90_ad5c5530", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
119
] | [
null
] | [
7
] | [
20
] | |
2024-11-19T00:13:39.468043+00:00 | 1,540,038,019,000 | bc000aa1b2926abf2ee34945fcb03eab819240d1 | 3 | {
"blob_id": "bc000aa1b2926abf2ee34945fcb03eab819240d1",
"branch_name": "refs/heads/master",
"committer_date": 1540038019000,
"content_id": "c2fac002707bd029d3fb8101203c9f6bb9323c79",
"detected_licenses": [
"MIT"
],
"directory_id": "55211af19ff2f02e04968c2423acdff73d469dd0",
"extension": "py",
"fi... | 2.90625 | stackv2 | import json
from flask import (
Flask,
request,
Response,
)
from store import (
get_all_products,
get_product_by_id,
update_product_by_id,
delete_product_by_id,
create_default_database_table,
add_product_by_name_and_price,
)
from flask_restplus import Api
from flask_restplus impor... | 95 | 25.76 | 99 | 16 | 564 | python | [{"finding_id": "codeql_py/stack-trace-exposure_f7082a5619c036e2_41e4b349", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 5 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
55,
68,
80,
90,
95
] | [
null,
null,
null,
null,
null
] | [
29,
29,
29,
29,
5
] | [
63,
63,
63,
63,
40
] | |
2024-11-19T00:13:42.106800+00:00 | 1,586,737,286,000 | 61ed7accb966d82b5c09c5b39f28d199f81c3a12 | 3 | {
"blob_id": "61ed7accb966d82b5c09c5b39f28d199f81c3a12",
"branch_name": "refs/heads/master",
"committer_date": 1586737286000,
"content_id": "3474428369b0fb8be675ee0a4780d1c95fbb895c",
"detected_licenses": [
"MIT"
],
"directory_id": "5d0c54f6067a03a03a7af246c8537e667352b86d",
"extension": "py",
"fi... | 2.640625 | stackv2 | import re
import requests
from requests.exceptions import RequestException
import os
import sys
import tarfile
import gzip
import shutil
urls = ['https://ai2-semanticscholar-cord-19.s3-us-west-2.amazonaws.com/2020-04-10/biorxiv_medrxiv.tar.gz',
'https://ai2-semanticscholar-cord-19.s3-us-west-2.amazonaws.com/... | 86 | 31.55 | 110 | 18 | 691 | python | [{"finding_id": "codeql_py/tarslip_225e6036d6732b80_bdc14854", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
40
] | [
null
] | [
17
] | [
35
] | |
2024-11-19T01:51:50.999333+00:00 | 1,592,534,460,000 | 4cd1b999a8d96774e62e81b78954c467329e8d0f | 3 | {
"blob_id": "4cd1b999a8d96774e62e81b78954c467329e8d0f",
"branch_name": "refs/heads/master",
"committer_date": 1592534460000,
"content_id": "57f3ddd09c3a6d43d24dba8d3b4a30909cefd8b9",
"detected_licenses": [
"MIT"
],
"directory_id": "5ea15d871984872110c789867c229339106f5ffc",
"extension": "py",
"fi... | 2.546875 | stackv2 | # -*- coding:utf-8 -*-
import requests, os
from configparser import RawConfigParser
from base64 import b64encode
from traceback import format_exc
from json import loads
from os.path import exists
# 检查“演员头像”文件夹是否就绪
if not exists('演员头像'):
print('\n“演员头像”文件夹丢失!请把它放进exe的文件夹中!\n')
os.system('pause')
# 读取配置文件,这个ini文... | 116 | 34.16 | 125 | 15 | 1,392 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ce825dd3e2f7e998_a6cf5970", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [s... | [
81,
87,
56,
79,
99
] | [
null,
null,
null,
null,
null
] | [
25,
21,
15,
30,
26
] | [
42,
38,
28,
40,
36
] | |
2024-11-18T23:43:36.437029+00:00 | 1,521,224,756,000 | 769ec7ff9191d3b71d92bd037c398e390975a5c7 | 2 | {
"blob_id": "769ec7ff9191d3b71d92bd037c398e390975a5c7",
"branch_name": "refs/heads/master",
"committer_date": 1521224756000,
"content_id": "9cde8381af2b5661a8464e06212095039e5585bb",
"detected_licenses": [
"MIT"
],
"directory_id": "6313bd09fb8d58b8376fcfc27286bc7d9d0ddac5",
"extension": "py",
"fi... | 2.375 | stackv2 | '''
SSH utils
'''
import asyncio
import io
import os
import select
import socketserver as SocketServer
import sys
from concurrent.futures import ThreadPoolExecutor
import paramiko
from . import helpers
def connect(hostname,
port=22,
username=None,
password=None,
p... | 98 | 36.38 | 132 | 14 | 673 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e7e84351c3155d8f_af92bd76", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
25
] | [
null
] | [
5
] | [
65
] | |
2024-11-19T00:33:05.148007+00:00 | 1,610,290,543,000 | 9b546c1c589765fa6f0c5ef5c410ac53e88db141 | 3 | {
"blob_id": "9b546c1c589765fa6f0c5ef5c410ac53e88db141",
"branch_name": "refs/heads/main",
"committer_date": 1610290543000,
"content_id": "676cfc12b42695a2f54054909f120e91bb90ca62",
"detected_licenses": [
"MIT"
],
"directory_id": "407b606b6df35b408eb89b3d8f21900d48cd6cea",
"extension": "py",
"file... | 3.390625 | stackv2 | def validate_password(inp: str):
rule, phrase = inp.split(": ")
phrase = list(phrase)
ids, target = rule.split(" ")
id_1, id_2 = ids.split("-")
id_1, id_2 = int(id_1), int(id_2)
return (phrase[id_1 - 1] == target) != (phrase[id_2 - 1] == target)
def count_valid_passwords(s: str) -> int:
d ... | 34 | 22.82 | 71 | 14 | 253 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b016b3bd2baf0047_6d8712b1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
34
] | [
null
] | [
11
] | [
16
] | |
2024-11-19T00:02:43.965580+00:00 | 1,612,912,293,000 | 805599273a8760252b679b592758da29decc8e1d | 3 | {
"blob_id": "805599273a8760252b679b592758da29decc8e1d",
"branch_name": "refs/heads/main",
"committer_date": 1612912293000,
"content_id": "ca8426c7e07f8b004aa66e1067fa2ffec2a7e592",
"detected_licenses": [
"MIT"
],
"directory_id": "abfdff1504fb93938555918c82d90af58e136fa5",
"extension": "py",
"file... | 2.59375 | stackv2 | """Main module of kytos/pathfinder Kytos Network Application."""
from flask import jsonify, request
from kytos.core import KytosNApp, log, rest
from kytos.core.helpers import listen_to
import traceback
# pylint: disable=import-error
# from napps.kytos.pathfinder.graph import KytosGraph
from graph import KytosGraph
# p... | 156 | 32.8 | 80 | 19 | 1,045 | python | [{"finding_id": "codeql_py/stack-trace-exposure_f1a246b959b76fc5_08ccc667", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
110,
135,
137
] | [
null,
null,
null
] | [
28,
28,
28
] | [
70,
47,
47
] | |
2024-11-19T00:03:07.389731+00:00 | 1,521,477,289,000 | afd114d182e7a774347aa0d2f163af362a3852c6 | 2 | {
"blob_id": "afd114d182e7a774347aa0d2f163af362a3852c6",
"branch_name": "refs/heads/master",
"committer_date": 1521477289000,
"content_id": "94baae048fc2624d5ef4983e50bf3d444827722f",
"detected_licenses": [
"MIT"
],
"directory_id": "6f5de225152119014001a61c44f590017b26972b",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/python3
import sys
import os
import json
import yaml
import requests
from lxml import html
from twilio.rest import Client
PAGE_URL = 'http://www.adm.uwaterloo.ca/cgi-bin/cgiwrap/infocour/salook.pl'
API_URL = 'https://api.uwaterloo.ca/v2/terms/'
API_URL_2 = 'https://api.uwaterloo.ca/v2/courses/'
def check... | 112 | 27.28 | 116 | 15 | 818 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0eaea484f1df59d3_d1e65ab9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
23
] | [
null
] | [
15
] | [
91
] | |
2024-11-19T00:15:29.288030+00:00 | 1,559,058,086,000 | dc44eeaaa18a1d9feeeb451373a194ffd6aeeca7 | 2 | {
"blob_id": "dc44eeaaa18a1d9feeeb451373a194ffd6aeeca7",
"branch_name": "refs/heads/master",
"committer_date": 1559058086000,
"content_id": "45e46a7a9ebaa8e37f6bdb7f98b29420c69121e9",
"detected_licenses": [
"MIT"
],
"directory_id": "22d481ff60d722fb0bbd6b0cb66a8727e48391c1",
"extension": "py",
"fi... | 2.359375 | stackv2 | # -*- coding:utf-8 -*-
from circulation.web import db
from circulation.models import Book, Log, Permission
from flask import render_template, url_for, flash, redirect, request, abort
from flask_login import login_required, current_user
from circulation.main.log import log
from circulation.main.decorators import permiss... | 55 | 34.11 | 117 | 15 | 458 | python | [{"finding_id": "codeql_py/url-redirection_e146dc03a55f20c8_851194ff", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
22,
42
] | [
null,
null
] | [
21,
21
] | [
88,
87
] | |
2024-11-19T00:25:39.383052+00:00 | 1,622,059,031,000 | 3bd883f01d7e3041fdc7f935910d894783e6d9cb | 3 | {
"blob_id": "3bd883f01d7e3041fdc7f935910d894783e6d9cb",
"branch_name": "refs/heads/master",
"committer_date": 1622059031000,
"content_id": "223e525b274340517c4395892ade554d6daafc64",
"detected_licenses": [
"MIT",
"Apache-2.0"
],
"directory_id": "88acf50d83511ae5675122eddd8856ff39e2f717",
"exten... | 2.546875 | stackv2 | #!/usr/bin/env python3
# Copyright (c) 2020 SiFive Inc.
# SPDX-License-Identifier: Apache-2.0
"""Generate OpenOCD configuration files from devicetree source files"""
import argparse
import sys
import jinja2
import pydevicetree
TEMPLATES_PATH = "templates"
SUPPORTED_BOARDS = ["arty", "vc707", "vcu118", "hifive"]
SU... | 162 | 30.79 | 100 | 16 | 1,218 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f17e7a943e2ba23c_d66c3f89", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
59
] | [
62
] | [
11
] | [
6
] | |
2024-11-19T01:02:51.085785+00:00 | 1,591,172,379,000 | ad053e4e907614aed021a31681916a295880bfdb | 2 | {
"blob_id": "ad053e4e907614aed021a31681916a295880bfdb",
"branch_name": "refs/heads/master",
"committer_date": 1591172379000,
"content_id": "18ad0e7f57e99f96445c9db2adfbc3d76e8749bd",
"detected_licenses": [
"MIT"
],
"directory_id": "12c77e6ca00317200965eca0014fffe1325b3763",
"extension": "py",
"fi... | 2.390625 | stackv2 | # coding: utf8
"""
This module includes the `Show` class and the main functionalities of `auditorium`.
"""
import asyncio
import base64
import io
import json
import runpy
import warnings
import webbrowser
from collections import OrderedDict
from typing import Union
import websockets
from fastapi import FastAPI
from ... | 455 | 28.51 | 134 | 20 | 2,994 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_38b19d9729be669c_f37f7260", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
59,
62,
65
] | [
null,
null,
null
] | [
38,
37,
38
] | [
57,
56,
57
] | |
2024-11-19T00:16:11.803934+00:00 | 1,558,361,817,000 | accd776c68892d13a533186b57f58f69c59d9a6e | 3 | {
"blob_id": "accd776c68892d13a533186b57f58f69c59d9a6e",
"branch_name": "refs/heads/master",
"committer_date": 1558361817000,
"content_id": "57c530ecaa2b8ed09ecfc0a828524505461587fd",
"detected_licenses": [
"MIT"
],
"directory_id": "3821caa8e0373acdcfa65c653b05d19af7366d51",
"extension": "py",
"fi... | 3.21875 | stackv2 | """
Drew Emond
--
MIT License
Copyright (c) [year] [fullname]
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, mer... | 203 | 42.15 | 154 | 20 | 1,890 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_703ae4852b2078aa_4f240733", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
53
] | [
null
] | [
15
] | [
154
] | |
2024-11-19T00:16:13.967277+00:00 | 1,586,203,754,000 | 250a5d7e4b0431bbcc3fcb8e082156001cbe3e68 | 3 | {
"blob_id": "250a5d7e4b0431bbcc3fcb8e082156001cbe3e68",
"branch_name": "refs/heads/master",
"committer_date": 1586203754000,
"content_id": "d338a5015b86e7c3c1a3055339820a7fb7a35c68",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "126ba5108e0b29d04b5adf4cda8e6be63b624a30",
"extension": "py"... | 2.75 | stackv2 | import sys, os
filename = os.path.join(os.path.dirname(__file__), '..')
sys.path.insert(1, filename)
from zoomapi import OAuthZoomClient
import json
from configparser import ConfigParser
from pyngrok import ngrok
parser = ConfigParser()
parser.read("bot.ini")
client_id = parser.get("OAuth", "client_id")
client_secre... | 98 | 43.27 | 106 | 15 | 1,268 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_74535fae1f769e3d_518f2b86", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text."
] | [
17
] | [
null
] | [
7
] | [
73
] | |
2024-11-19T00:28:41.775673+00:00 | 1,544,588,889,000 | 887e3247207e5a957ab98c25d7e8d64afd66fcbe | 2 | {
"blob_id": "887e3247207e5a957ab98c25d7e8d64afd66fcbe",
"branch_name": "refs/heads/master",
"committer_date": 1544588889000,
"content_id": "d2b293ebb86c590a975548d8afa2fda4bff43443",
"detected_licenses": [
"MIT"
],
"directory_id": "d4feadf9eafdf2e42a1fbb212a9247a6cc695ed4",
"extension": "py",
"fi... | 2.3125 | stackv2 | # -*- coding: utf-8 -*-
'''
:maintainer: Chris Reed (chris@dlvr.com)
:maturity: new
:requires: none
:platform: all
'''
from __future__ import absolute_import
from jinja2 import Environment, FileSystemLoader
import yaml
import salt
import logging
import cmd
import os
LOG = logging.getLogger(__name__)
def expand(ranche... | 88 | 36.76 | 144 | 14 | 932 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8d490e7a8164fa7a_c47728af", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
19
] | [
null
] | [
11
] | [
101
] | |
2024-11-19T00:51:35.683363+00:00 | 1,539,212,766,000 | 76ffce64c3fde8e52d4297c84f68cc100a182b2e | 3 | {
"blob_id": "76ffce64c3fde8e52d4297c84f68cc100a182b2e",
"branch_name": "refs/heads/master",
"committer_date": 1539212766000,
"content_id": "d34b89b8b299b6826a4478b92355b3b1b8b53bb9",
"detected_licenses": [
"MIT"
],
"directory_id": "50d8d5d28392d5b705eb4cf00fa70118bdca3ed0",
"extension": "py",
"fi... | 2.796875 | stackv2 | #!/usr/bin/env python
import argparse
import paramiko
import socket
DEFAULT_USER = 'admin'
DEFAULT_PASSWORD = 'password'
DEFAULT_PORT = 22
DEFAULT_TIMEOUT = 30
DEFAULT_COMMANDS = [
'ping -w 5 -q 127.0.0.1'
]
def ssh_client(host, username, password, port, timeout, commands):
results = []
client = param... | 88 | 34.08 | 79 | 15 | 691 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_01a0b2c49ba677ba_663661b2", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
21
] | [
null
] | [
5
] | [
65
] | |
2024-11-19T01:30:48.040082+00:00 | 1,689,933,773,000 | 276453610d164f55c9c4f11c7c0ca9dfaa3cd391 | 2 | {
"blob_id": "276453610d164f55c9c4f11c7c0ca9dfaa3cd391",
"branch_name": "refs/heads/master",
"committer_date": 1689933773000,
"content_id": "457de878ad1fed7f7e9edf0c09ec058e17e50b57",
"detected_licenses": [
"MIT"
],
"directory_id": "c30c6906da9900327a3dd68c26df5f1694b86683",
"extension": "py",
"fi... | 2.5 | stackv2 | import argparse
import os
import sys
import time
import sqlite3
from getpass import getpass
from requests import RequestException
from nautapy.exceptions import NautaException
from nautapy.nauta_api import NautaClient, NautaProtocol
from nautapy import utils
from nautapy.__about__ import __cli__ as prog_name, __versi... | 344 | 31.05 | 132 | 24 | 2,417 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6990ee0bf0fa385a_2aeacc98", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text."
] | [
228
] | [
null
] | [
11
] | [
43
] | |
2024-11-19T01:30:55.095224+00:00 | 1,489,679,880,000 | ed1d0f5003416dae56fccf14b7c8355d46187784 | 2 | {
"blob_id": "ed1d0f5003416dae56fccf14b7c8355d46187784",
"branch_name": "refs/heads/master",
"committer_date": 1489679880000,
"content_id": "854232cfa1dc0421e98dae59c0726bfe8159cc78",
"detected_licenses": [
"MIT"
],
"directory_id": "c3634ff4ef74056a7cbc210ceae451b734e9e3b4",
"extension": "py",
"fi... | 2.46875 | stackv2 | from classes.config.put import Put as ConfigPut
import os, stat
from functions import Message
class Initialize:
config = ''
db = {}
teams = []
services = []
settings = []
def __init__(self, db, type):
self.db = db
self.config = ConfigPut(type)
self.delete_old_data()
... | 83 | 29.72 | 92 | 17 | 543 | python | [{"finding_id": "codeql_py/overly-permissive-file_e097981d12a37cc4_6d697534", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
68
] | [
null
] | [
9
] | [
35
] | |
2024-11-19T01:30:55.987263+00:00 | 1,625,847,662,000 | d4617af0e70677120bf9101eebda3b0df6fd45ec | 2 | {
"blob_id": "d4617af0e70677120bf9101eebda3b0df6fd45ec",
"branch_name": "refs/heads/master",
"committer_date": 1625847662000,
"content_id": "15fa2ea486bf3eb82db1830b0d799553ede86798",
"detected_licenses": [
"MIT"
],
"directory_id": "ec94406327179a021e0d651a39fab2ed684273db",
"extension": "py",
"fi... | 2.5 | stackv2 |
import subprocess
import json
import xarray as xr
def download_sst():
''' This is a module for downloading the SST data from the CMEMS
Here the address is a cmems data access portal:
#https://resources.marine.copernicus.eu/?option=com_csw&task=results
You have to register at the CMEMS (link abov... | 71 | 29.56 | 123 | 11 | 740 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a1268fe51eb474b9_e0ea74eb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
59
] | [
null
] | [
12
] | [
15
] | |
2024-11-19T02:00:57.295108+00:00 | 1,517,436,794,000 | 1fc66a1b35bd9b54bf2807ab01c9cf403777aa4a | 3 | {
"blob_id": "1fc66a1b35bd9b54bf2807ab01c9cf403777aa4a",
"branch_name": "refs/heads/master",
"committer_date": 1517436794000,
"content_id": "74dd65fbad7734c07c92694b875dc8cb9b43215d",
"detected_licenses": [
"MIT"
],
"directory_id": "77ccf3316fda0e521db4773397051d145df3ff61",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""
Created on Mon Jul 17 16:17:25 2017
@author: jorgemauricio
"""
# librerías
import matplotlib.pyplot as plt
from mpl_toolkits.basemap import Basemap
from numpy import meshgrid
from scipy.interpolate import griddata as gd
import os
from netCDF4 import Dataset
import nu... | 132 | 26.43 | 131 | 14 | 1,196 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b1967f38633a677a_a7be0ed8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive data (private)](4) as clear text."
] | [
61
] | [
null
] | [
17
] | [
25
] | |
2024-11-19T00:40:17.091317+00:00 | 1,691,791,264,000 | fa8c8dea3e32ca7f2e7c42c5fdfa39b28d70c30b | 2 | {
"blob_id": "fa8c8dea3e32ca7f2e7c42c5fdfa39b28d70c30b",
"branch_name": "refs/heads/master",
"committer_date": 1691791264000,
"content_id": "ae6f2e8d62320d23f30ffd45e327c51bf6b75a72",
"detected_licenses": [
"MIT"
],
"directory_id": "108c22e6df535ea75599ff69ad95777de3a85f28",
"extension": "py",
"fi... | 2.46875 | stackv2 | # -*- coding: utf-8 -*-
import hashlib
import secrets
def rfc2440_hash_password(password, salt=None):
# Match tor --hash-password
# secret_to_key_rfc2440
EXPBIAS = 6
c = 96
count = (16 + (c & 15)) << ((c >> 4) + EXPBIAS)
if salt is None:
salt = secrets.token_bytes(8)
assert len(... | 31 | 21.77 | 51 | 11 | 211 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_46272c89c2fb0e4a_e2cecd54", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally e... | [
25,
28
] | [
null,
null
] | [
22,
18
] | [
31,
35
] | |
2024-11-19T00:40:28.395126+00:00 | 1,456,521,025,000 | 50afa0b11468d1f13d3951014666be3e8337a09d | 3 | {
"blob_id": "50afa0b11468d1f13d3951014666be3e8337a09d",
"branch_name": "refs/heads/master",
"committer_date": 1456521025000,
"content_id": "b3020ac7f5cd7e84a9b3286abc56ab7bf7948a4b",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "bf4c6c7984febfe5723145c81661d6a7abda59fe",
"extension": "p... | 2.671875 | stackv2 | #!/usr/bin/env python3
from sys import argv
import random
import string
from battle.models import Session, Team
from battle.api import Role
def random_string():
return ''.join(random.choice(string.ascii_lowercase) for _ in range(6))
def add_team(sess, contest_id, team_name):
username = random_string()
p... | 40 | 19.48 | 75 | 10 | 197 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ba23a76756af3476_acecc60a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
29
] | [
null
] | [
11
] | [
36
] | |
2024-11-19T01:05:59.330721+00:00 | 1,599,606,294,000 | f3e4ca2125cab8bfdc4c51303d21a88976028a58 | 3 | {
"blob_id": "f3e4ca2125cab8bfdc4c51303d21a88976028a58",
"branch_name": "refs/heads/master",
"committer_date": 1599606294000,
"content_id": "84ca364e7cb2794aefbc21efb083f8d0f915b4de",
"detected_licenses": [
"MIT"
],
"directory_id": "bc9e3f8604ed42ba274fb57b3546e1363bde882b",
"extension": "py",
"fi... | 2.875 | stackv2 | import csv
import sys
import re
import string
csv_f = csv.reader(sys.stdin)
pattern = re.compile("^([0-9.\+\-]+)+$")
def print_table(rows, widths, dirs):
underline = 1
for row in rows:
colsep = ""
line = ""
for j in range(len(row)):
cell = row[j]
line = line + colsep
line = line + "{0: {dir}{width}}... | 62 | 17.31 | 51 | 16 | 360 | python | [{"finding_id": "codeql_py/redos_83ea6ce521c06643_2aa9ca06", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '+'.", "remediati... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '+'."
] | [
8
] | [
null
] | [
25
] | [
36
] | |
2024-11-19T01:06:09.231949+00:00 | 1,526,493,862,000 | a3838efd7611ef6f37ef6490f0539d9a8edd9d43 | 3 | {
"blob_id": "a3838efd7611ef6f37ef6490f0539d9a8edd9d43",
"branch_name": "refs/heads/master",
"committer_date": 1526493862000,
"content_id": "edb7082c85ca5256005f37c94046d4584bcb414c",
"detected_licenses": [
"MIT"
],
"directory_id": "5c0bbb143c5bfbfe783ae748bac6d756055dce9c",
"extension": "py",
"fi... | 2.6875 | stackv2 | import thingspeak
import collections
import logging, sys
import requests
import time
import json
class TSClient:
w_api_key = "INSERT_THINGSPEAK_WRITE_API_KEY"
r_api_key = "INSERT_THINGSPEAK_READ_API_KEY"
channel = 452770 # INSERT YOUR CHANNEL ID HERE
def __init__(self, *sens):
self.sensors = s... | 41 | 38.22 | 133 | 17 | 385 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c5ad0c1152902db6_43869cd8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
39
] | [
null
] | [
23
] | [
41
] | |
2024-11-19T01:17:12.180353+00:00 | 1,622,532,025,000 | 13319df17fd4d24d637b23768f7f8bee05bd5c2f | 2 | {
"blob_id": "13319df17fd4d24d637b23768f7f8bee05bd5c2f",
"branch_name": "refs/heads/master",
"committer_date": 1622532025000,
"content_id": "177565ba52c76f0fa70d83fe08ec2908aa02af72",
"detected_licenses": [
"MIT"
],
"directory_id": "5a78b84af173643aba504c03e29d115afe7eab02",
"extension": "py",
"fi... | 2.5 | stackv2 | # Flask app that handles application logic
import base64
import json
import re
from flask import Flask, jsonify
from flask import render_template
from flask import request
import requests
from gui import get_root_path
from bs4 import BeautifulSoup
app = Flask(__name__, static_folder=get_root_path('static'), templat... | 253 | 29.21 | 108 | 21 | 2,246 | python | [{"finding_id": "codeql_py/flask-debug_beab9f597a035120_df28664e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-918",
"CWE-918",
"CWE-918"
] | [
"py/flask-debug",
"py/full-ssrf",
"py/full-ssrf",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"The full URL of this request depends on a [user-provided value](1).",
"The full URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [us... | [
253,
68,
207,
43
] | [
null,
null,
null,
null
] | [
5,
9,
9,
14
] | [
72,
27,
27,
65
] | |
2024-11-19T01:17:17.466575+00:00 | 1,635,105,954,000 | 186694caf24d5be139db42a548d92aab5f5da84f | 3 | {
"blob_id": "186694caf24d5be139db42a548d92aab5f5da84f",
"branch_name": "refs/heads/main",
"committer_date": 1635105954000,
"content_id": "f7f75617f7246e8d3ad11994cbe5145c2cd3ddbb",
"detected_licenses": [
"MIT"
],
"directory_id": "54ce6741366568437a13e7940a2a7b701b0d16d5",
"extension": "py",
"file... | 2.5625 | stackv2 | import time
import fastapi
import uvicorn
import logging
import os
from process_doc import process_image
from models.document_model import DocumentModel
from pdf2jpg import pdf2jpg
from datetime import datetime
logs_folder_path = os.path.join(os.getcwd(), 'logs')
os.makedirs(logs_folder_path, exist_ok=True)
log_path ... | 79 | 26.47 | 86 | 15 | 487 | python | [{"finding_id": "codeql_py/path-injection_698cc5d1ef107703_5668a752", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
61
] | [
null
] | [
31
] | [
39
] | |
2024-11-19T01:17:31.256413+00:00 | 1,508,293,951,000 | 2a742eb76390e9b04ac4dbb297173641fc227cf2 | 3 | {
"blob_id": "2a742eb76390e9b04ac4dbb297173641fc227cf2",
"branch_name": "refs/heads/master",
"committer_date": 1508293951000,
"content_id": "180de752bfdfeb51ab5510838e16f981d4c9faea",
"detected_licenses": [
"MIT"
],
"directory_id": "48892a9d8e10521637d303f895216d5da4679daa",
"extension": "py",
"fi... | 2.5625 | stackv2 | import requests
import json
import configparser
import sqlite3
import time
def write_to_config(config_path):
with open(config_path, 'w') as configfile:
v = int(progress) + counter
config.set('users', 'progress', str(v))
config.write(configfile)
# Set the file paths
config_path = './code/0... | 79 | 23.23 | 103 | 13 | 500 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_901129a9678f9f72_8b0cc034", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
65
] | [
null
] | [
16
] | [
30
] | |
2024-11-19T01:17:41.919910+00:00 | 1,555,939,711,000 | 16bc4376a4429489146aad21d4cd04fdd6924297 | 2 | {
"blob_id": "16bc4376a4429489146aad21d4cd04fdd6924297",
"branch_name": "refs/heads/master",
"committer_date": 1555939711000,
"content_id": "f41cb32dfc2b7a082762a4db45e189d8265ca455",
"detected_licenses": [
"MIT"
],
"directory_id": "d7103533918bb7cf419d13ff0ab9ff72b4ce256c",
"extension": "py",
"fi... | 2.453125 | stackv2 | import MySQLdb
import os
import paramiko
import socket
cnx = MySQLdb.connect(host="localhost", user="root", passwd="raspberry", db="home")
cursor = cnx.cursor()
query = 'SELECT sensor_ip FROM sensors'
cursor.execute(query)
r = cursor.fetchall()
for sensor_ip in r:
host = str(sensor_ip)[2:-3]
ssh = paramiko.SSHClie... | 29 | 29.72 | 83 | 16 | 246 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e99233519e70a2f2_e18e328c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
14
] | [
15
] | [
3
] | [
30
] | |
2024-11-19T01:15:03.313333+00:00 | 1,413,425,725,000 | 1b5faf5aa17fe18f9cb340374a91e085ebc574c7 | 2 | {
"blob_id": "1b5faf5aa17fe18f9cb340374a91e085ebc574c7",
"branch_name": "refs/heads/master",
"committer_date": 1413425725000,
"content_id": "799feac60fc522454251326f42ac8eeb45415c45",
"detected_licenses": [
"MIT",
"Linux-OpenIB"
],
"directory_id": "799f68c21328737080197993be8afc1666ef5c52",
"ext... | 2.328125 | stackv2 |
import logging
import json
from rest_framework.response import Response
from rest_framework import status
from cloudengine.classes.manager import ClassesManager
from cloudengine.core.cloudapi_view import CloudAPIView
from cloudengine.core.utils import paginate
from cloudengine.classes.manager import SchemaHandler
from... | 125 | 35.34 | 86 | 16 | 875 | python | [{"finding_id": "codeql_py/stack-trace-exposure_17067629b6aa8058_b8913124", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
56,
72
] | [
null,
null
] | [
29,
29
] | [
46,
46
] | |
2024-11-19T00:43:50.340817+00:00 | 1,552,522,239,000 | 8f7debc418193e761a303c8818645a476ceda654 | 3 | {
"blob_id": "8f7debc418193e761a303c8818645a476ceda654",
"branch_name": "refs/heads/master",
"committer_date": 1552522239000,
"content_id": "59eb34b547ad0392f5eee3329ee231da5d40abec",
"detected_licenses": [
"MIT"
],
"directory_id": "5d3909be0acb528618a5a7b9f50dd91ce4550df0",
"extension": "py",
"fi... | 2.859375 | stackv2 | import hashlib
import time
from consts.notification_type import NotificationType
from tbans.models.notifications.notification import Notification
class VerificationNotification(Notification):
""" Verification notification - used for webhooks to ensure the proper people are in control
Attributes:
url... | 53 | 33.94 | 96 | 16 | 363 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_2cd311bc1e96bc45_3e30a396", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (SHA1) that is insecure."
] | [
40
] | [
null
] | [
19
] | [
30
] | |
2024-11-19T00:43:57.821122+00:00 | 1,692,631,110,000 | bbf5730d2e3812c70fec8da506bf2fbc35e88368 | 3 | {
"blob_id": "bbf5730d2e3812c70fec8da506bf2fbc35e88368",
"branch_name": "refs/heads/main",
"committer_date": 1692631110000,
"content_id": "dc88956b74425fece47218388a4f89ed4e5faae2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "84ae9ce61bd47b36af848701ee428c8a199e6364",
"extension": "py",
... | 2.515625 | stackv2 | """ install.py:
Installs the FPP tool suite based on the version of this installer package. It will use FPP_DOWNLOAD_CACHE environment
variable to pull up previously downloaded items for users that wish to install offline.
"""
import atexit
import os
import platform
import shutil
import subprocess
import sys
import ta... | 323 | 35.23 | 118 | 17 | 2,569 | python | [{"finding_id": "codeql_py/tarslip_83979cfd93a6a35e_0061141f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
246
] | [
null
] | [
13
] | [
16
] | |
2024-11-19T01:32:04.956200+00:00 | 1,550,751,051,000 | f963f7a766914bb6bad6abe76d36b4560a599aa1 | 3 | {
"blob_id": "f963f7a766914bb6bad6abe76d36b4560a599aa1",
"branch_name": "refs/heads/master",
"committer_date": 1550751051000,
"content_id": "23d798e2b917f8bdf1ccc9e4f85167f8e117d7ea",
"detected_licenses": [
"MIT"
],
"directory_id": "5476a80b8c4a917603d9ab45efe465ae31f1a99b",
"extension": "py",
"fi... | 2.59375 | stackv2 | #!/usr/bin/python3
import requests
from flask import Flask, render_template, request, jsonify, url_for, redirect, json
from pymongo import MongoClient
app = Flask(__name__)
# Official limit - the GitHub Search API provides up to 1,000 results for each search.
# https://developer.github.com/v3/search/#about-the-searc... | 125 | 31.81 | 128 | 16 | 1,045 | python | [{"finding_id": "codeql_py/stack-trace-exposure_c653ced2de074b3d_91068802", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-209",
"CWE-918",
"CWE-918"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a ... | [
58,
26,
82,
83
] | [
null,
null,
null,
null
] | [
23,
19,
21,
22
] | [
44,
40,
73,
85
] | |
2024-11-19T01:43:54.827618+00:00 | 1,489,596,974,000 | 6d005fb2d8bbf003076ce46e045298c11e9652b9 | 2 | {
"blob_id": "6d005fb2d8bbf003076ce46e045298c11e9652b9",
"branch_name": "refs/heads/master",
"committer_date": 1489596974000,
"content_id": "b3fe819c8b726f3c74576db72a48a476785150be",
"detected_licenses": [
"MIT"
],
"directory_id": "a30872440e9276d41784abb64c9fb64bf73f7b31",
"extension": "py",
"fi... | 2.4375 | stackv2 | import dateutil.parser
import json
import logging
import os
from flask import Flask, request, jsonify
from tokens import Token
from auth import basic_auth_required
app = Flask(__name__)
logger = logging.getLogger()
logger.setLevel(logging.DEBUG)
def get_allowed_actions(user, actions):
# determine what actions a... | 100 | 34.3 | 142 | 16 | 826 | python | [{"finding_id": "codeql_py/flask-debug_fd95cd4ee2c9d791_1c4970ff", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 6 | true | [
"CWE-215",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/flask-debug",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry de... | [
98,
17,
24,
56,
77,
88
] | [
null,
null,
null,
null,
null,
null
] | [
9,
19,
19,
19,
23,
22
] | [
91,
58,
64,
111,
28,
142
] | |
2024-11-19T01:44:00.314961+00:00 | 1,549,748,277,000 | 07e35c9b90241987267b8d5ae8bcc1dc4fbcd5c2 | 3 | {
"blob_id": "07e35c9b90241987267b8d5ae8bcc1dc4fbcd5c2",
"branch_name": "refs/heads/master",
"committer_date": 1549748277000,
"content_id": "bbc426db6b0a572fa783323a40410d0fd2ada3c6",
"detected_licenses": [
"MIT"
],
"directory_id": "7874c34d9bcbdfb9c37e3acebbd849cae3817901",
"extension": "py",
"fi... | 2.65625 | stackv2 | from dotenv import load_dotenv
load_dotenv(verbose=True)
import requests as r
import re, time, os
# defining channels to iterate over
channels = ['canary', 'ptb', 'stable']
def fetcher(channel):
try:
if channel == 'stable': # deferring since stable.discordapp.com does not exist
# getting th... | 75 | 35.11 | 92 | 16 | 681 | python | [{"finding_id": "codeql_py/overly-large-range_16e4e858f9c65b54_3fb1a173", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
30
] | [
null
] | [
30
] | [
33
] | |
2024-11-19T02:20:03.696048+00:00 | 1,575,320,207,000 | ef2207dd0872792f10f22eaf968e1dafc595bb0f | 2 | {
"blob_id": "ef2207dd0872792f10f22eaf968e1dafc595bb0f",
"branch_name": "refs/heads/master",
"committer_date": 1575320207000,
"content_id": "98eac8adb34d3a637d24fe7edb6a247a478f1794",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "958f1094ff92241a09cb7597f61940d4f0248284",
"extension": "py"... | 2.359375 | stackv2 | import logging
import paho.mqtt.client as mqtt
import time
# from utils_intern.messageLogger import MessageLogger
logging.basicConfig(format='%(asctime)s %(levelname)s %(name)s: %(message)s', level=logging.DEBUG)
logger = logging.getLogger(__file__)
class MQTTClient:
def __init__(self, host, mqttPort, client_id... | 159 | 37.56 | 116 | 22 | 1,283 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_971c452e5421b08a_58593904", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
27
] | [
null
] | [
26
] | [
60
] | |
2024-11-19T02:20:06.754060+00:00 | 1,532,207,605,000 | ceddfa020e6de1869baa4abf8bcdc9ee774a4ebc | 3 | {
"blob_id": "ceddfa020e6de1869baa4abf8bcdc9ee774a4ebc",
"branch_name": "refs/heads/master",
"committer_date": 1532332301000,
"content_id": "a0421f03e9059138558421fd5cfd90c191310a9e",
"detected_licenses": [
"MIT"
],
"directory_id": "cb4fc38a47a673a4338aa8f8f26f875ee2166607",
"extension": "py",
"fi... | 2.796875 | stackv2 | # This file will authenticate the user upon login.
import re
import os
from flask import request, jsonify, make_response
from app.models import Users
from flask.views import MethodView
import jwt
import datetime
from app.models import BlacklistToken
from classes.auth.auth import token_required
from passlib.apps import ... | 117 | 35.73 | 105 | 22 | 880 | python | [{"finding_id": "codeql_py/polynomial-redos_fbdfe7ee30c61316_eaa29af3", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma... | 1 | true | [
"CWE-1333"
] | [
"py/polynomial-redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '+'."
] | [
57
] | [
null
] | [
41
] | [
51
] | |
2024-11-19T01:11:52.703012+00:00 | 1,569,626,194,000 | 763e5a147bea452423262f9c00c788e9edcc0525 | 2 | {
"blob_id": "763e5a147bea452423262f9c00c788e9edcc0525",
"branch_name": "refs/heads/master",
"committer_date": 1569626194000,
"content_id": "41e4b5dea9dc40e04797055bba232641a73cf45b",
"detected_licenses": [
"MIT"
],
"directory_id": "795989880b067c677572378031ebc2b50b169ae9",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
import json
import os.path
import random
import tempfile
import time
from collections import Counter
from glob import glob
import dateutil.parser
import emoji
import exifread
import geocoder
import instabot
import numpy as np
import parse
import PIL.Image
import pycountr... | 390 | 29.75 | 104 | 17 | 3,004 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_bc997f71ab499d2a_4f73805c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
53
] | [
null
] | [
25
] | [
40
] | |
2024-11-19T01:21:35.845351+00:00 | 1,542,166,953,000 | c6f1c7254e361c079c89bff052b3ee52376ed949 | 3 | {
"blob_id": "c6f1c7254e361c079c89bff052b3ee52376ed949",
"branch_name": "refs/heads/master",
"committer_date": 1542166953000,
"content_id": "55502b2f573bc633ffe0b6480f1b074dd1b19580",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "afd532cc96b7ef51788fa7847afaadae314a725e",
"extension": "p... | 2.796875 | stackv2 | import cv2
import numpy as np
import sys
import os
from keras.models import load_model
dir = os.path.dirname(__file__)
root_dir = os.path.dirname(dir)
file_path = []
def get_path(path):
if(os.path.exists(path)):
pass
else:
exit ("The data doesn't exist, check your input please.")
if(os.p... | 80 | 22.1 | 71 | 16 | 477 | python | [{"finding_id": "codeql_py/overly-permissive-file_09b6f362d804bc8b_04906bce", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
52
] | [
null
] | [
5
] | [
29
] | |
2024-11-19T01:56:45.308459+00:00 | 1,560,422,142,000 | d2eb7636da02f7af379f452ce73fe5710fdc4396 | 3 | {
"blob_id": "d2eb7636da02f7af379f452ce73fe5710fdc4396",
"branch_name": "refs/heads/master",
"committer_date": 1560422142000,
"content_id": "833f5b4d2c9eb33d3775073a4d31805fa52e335a",
"detected_licenses": [
"MIT"
],
"directory_id": "a06fef890a728c8954833c5f3efd7b430b6f6487",
"extension": "py",
"fi... | 2.734375 | stackv2 | import sys
import Ice
import Bank
def getFromEnum(currency):
if currency == 'PLN':
return Bank.Currency.PLN
elif currency == 'USD':
return Bank.Currency.USD
elif currency == 'EURO':
return Bank.Currency.EURO
else:
raise Bank.AccountException('Provide a correct currenc... | 94 | 32.62 | 117 | 19 | 671 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_91a4bd1438342759_33283e7f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
58,
68
] | [
null,
69
] | [
23,
23
] | [
68,
112
] | |
2024-11-19T01:56:49.223291+00:00 | 1,559,309,671,000 | d85b0201788be768c3b8ea7f2780c64e893038ce | 3 | {
"blob_id": "d85b0201788be768c3b8ea7f2780c64e893038ce",
"branch_name": "refs/heads/master",
"committer_date": 1559309671000,
"content_id": "c0b7d74d64681f5aa49fc96087335de29c102514",
"detected_licenses": [
"MIT"
],
"directory_id": "9c2b518b51a12677be82626f690bf748c78e7d01",
"extension": "py",
"fi... | 2.734375 | stackv2 | #!/usr/bin/python3
## Required
## pip3 install feedparser
## pip3 install requests
import feedparser
import requests
import json
from datetime import datetime, timedelta
from time import mktime
from requests.auth import HTTPBasicAuth
#######################
# Config #
#######################
# Debug logg... | 91 | 31.9 | 117 | 16 | 703 | python | [{"finding_id": "codeql_py/request-without-cert-validation_5a7915b93c8d8f7b_4262eed1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
47,
57
] | [
null,
null
] | [
22,
23
] | [
81,
118
] | |
2024-11-19T02:10:36.178890+00:00 | 1,682,161,973,000 | 3900641318f3c2d7fcb8d292eb330300df8bbe60 | 3 | {
"blob_id": "3900641318f3c2d7fcb8d292eb330300df8bbe60",
"branch_name": "refs/heads/master",
"committer_date": 1682161973000,
"content_id": "b9b80dd6de9d44181829121e9c5eff82449b923d",
"detected_licenses": [
"MIT"
],
"directory_id": "84429a65215f58b11649f4d722fce407a9a0f28e",
"extension": "py",
"fi... | 2.671875 | stackv2 | __author__ = 'raz0r'
import os
import click
import string
import requests
import sys
from requests.packages.urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
def run(url):
with open(os.path.dirname(__file__) + '/../data/aem-paths.txt', 'r') as f:
... | 35 | 35.97 | 91 | 20 | 283 | python | [{"finding_id": "codeql_py/request-without-cert-validation_bd2915c11ed9a5d0_0dfb8de4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
19
] | [
null
] | [
32
] | [
83
] | |
2024-11-19T02:45:16.629258+00:00 | 1,568,056,090,000 | e020474aef805100f818af8ced4d3978a9a1755d | 2 | {
"blob_id": "e020474aef805100f818af8ced4d3978a9a1755d",
"branch_name": "refs/heads/master",
"committer_date": 1568056090000,
"content_id": "fadc76598110d53cb6e39c74c1553236f1abae9a",
"detected_licenses": [
"MIT"
],
"directory_id": "a15bcd6a4784c506d15fbbc2f97e40001365e62d",
"extension": "py",
"fi... | 2.375 | stackv2 | import sys
from config_handler import ConfigHandler
U_CONST = 'CREATE CONSTRAINT ON (n:%s) ASSERT n.%s IS UNIQUE'
P_CONST = 'CREATE INDEX ON :%s(point)'
I_CONST = 'CREATE INDEX ON :%s(%s)'
TOPIC_PREFIX = "neo4j.topic.cypher"
SINK_CONFIG = """
{
"name": "Neo4jSinkConnector",
"config": {
"topics": "%s",
"con... | 159 | 36.26 | 99 | 21 | 1,476 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1bc477284f171823_862b8cac", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
112
] | [
116
] | [
25
] | [
10
] | |
2024-11-19T02:45:19.788978+00:00 | 1,692,947,820,000 | 639e43b20e3f3b9daad6e4d5db232231d0ec6a58 | 3 | {
"blob_id": "639e43b20e3f3b9daad6e4d5db232231d0ec6a58",
"branch_name": "refs/heads/master",
"committer_date": 1692947820000,
"content_id": "087f6d53f056588ce5cbf0b775abcf90408d07d8",
"detected_licenses": [
"MIT"
],
"directory_id": "bdfae5f79dc6ac9cde19d18c6541d6cb41b46fa0",
"extension": "py",
"fi... | 2.59375 | stackv2 | #!/bin/python3
"""
Renders jinja2 templates in the context of variables loaded from yaml files.
It follows these steps:
01. Load variable files <directory>/vars/*.yml
02. Load variable files <directory>/vars/**/*.yml
03. Render templated variable files <directory>/vars/*.yml.j2
04. Render templated variable files <dir... | 189 | 30.29 | 94 | 20 | 1,387 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_7d1320aba4591fb6_d19330cc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
95
] | [
102
] | [
9
] | [
4
] | |
2024-11-19T02:45:22.627738+00:00 | 1,559,586,868,000 | 0a43869aaa8a07a22c386d4bea6b6566e909b156 | 3 | {
"blob_id": "0a43869aaa8a07a22c386d4bea6b6566e909b156",
"branch_name": "refs/heads/master",
"committer_date": 1559586868000,
"content_id": "a7ed8b29de81097d0a7fd0ddc98fac8b103b36ee",
"detected_licenses": [
"MIT"
],
"directory_id": "ec2acdc4f9291fc34aa14b807d7902341b65fcde",
"extension": "py",
"fi... | 2.6875 | stackv2 | # ***************************************************
# * By Group 5 @ HSLU I.BSCI.HS18.IOT *
# ****************************************************
########################
# Informations #
########################
# Raspberry Pi: Read BME280 values
# Raspberry Pi: Read BME280 values
# Raspberr... | 231 | 33.1 | 178 | 27 | 1,972 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_44728f047c9ea34f_b9fc2ab0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
207,
208
] | [
null,
null
] | [
38,
38
] | [
46,
47
] | |
2024-11-19T02:45:23.706213+00:00 | 1,447,891,639,000 | 8250d5071443af85c4bdf7c776f0fe9b21d50c0d | 2 | {
"blob_id": "8250d5071443af85c4bdf7c776f0fe9b21d50c0d",
"branch_name": "refs/heads/master",
"committer_date": 1447891765000,
"content_id": "24467e63c6a71d57ae47ea92bdf9a54f5c18d2a5",
"detected_licenses": [
"ISC"
],
"directory_id": "3fca44728971360e368cb1498c29366bdb234dd3",
"extension": "py",
"fi... | 2.34375 | stackv2 | import subprocess
import shutil
import tarfile
import pkgutil
from pathlib import Path
from urllib.request import urlopen
PYRUN_VERSION = '2.1.1'
PYTHON_FULL_VERSION = '3.4.3'
SETUPTOOLS_VERSION = '18.4'
PIP_VERSION = '7.1.2'
PYRUN_SRC_URL = 'https://downloads.egenix.com/python/egenix-pyrun-{}.tar.gz'.format(PYRUN_VE... | 119 | 38.65 | 119 | 14 | 1,206 | python | [{"finding_id": "codeql_py/tarslip_d21185957a74b9e4_185e0036", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
35
] | [
null
] | [
13
] | [
16
] | |
2024-11-19T02:45:30.244070+00:00 | 1,469,306,063,000 | 61c85c64f0a2cf1e1301a4a3ddeb133b5a89d4b4 | 3 | {
"blob_id": "61c85c64f0a2cf1e1301a4a3ddeb133b5a89d4b4",
"branch_name": "refs/heads/master",
"committer_date": 1469306281000,
"content_id": "15e4eef724961e48a765f396cdc2b31c30a1af02",
"detected_licenses": [
"MIT"
],
"directory_id": "1a569d92b084d15eefe458a98232b648576594da",
"extension": "py",
"fi... | 2.859375 | stackv2 | """
This code downloads and executes the autospotting golang binary, but only if
it is missing from the current directory, in case of a new deployment or if
Lambda moved our code to a new instance.
"""
import json
import os.path
import sys
from urlparse import urljoin
from urllib2 import URLError, urlopen
from subpro... | 92 | 26.92 | 98 | 14 | 563 | python | [{"finding_id": "codeql_py/overly-permissive-file_e7666847ec6eced3_2bdc7aab", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
88
] | [
null
] | [
5
] | [
32
] | |
2024-11-19T02:45:57.941356+00:00 | 1,597,752,750,000 | 322cba2406cdfea9d1570fae7ace4d0a4fecba2e | 2 | {
"blob_id": "322cba2406cdfea9d1570fae7ace4d0a4fecba2e",
"branch_name": "refs/heads/master",
"committer_date": 1597752750000,
"content_id": "23a957341fa7907702cb0fbeb4b949f450889756",
"detected_licenses": [
"MIT"
],
"directory_id": "e4178881478cf71c7023a1361d3d4945a3a64053",
"extension": "py",
"fi... | 2.390625 | stackv2 | from os import path
import re
from pathlib import Path
from jinja2 import Environment, FileSystemLoader
env = Environment(loader=FileSystemLoader(Path(Path(__file__).parent, '..', '..', 'templates').resolve()))
def generate(data, parser, output_path):
rule_set = get_tagged_rule_ids(data['profiles'])
if isinstance... | 92 | 47.16 | 136 | 23 | 1,189 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d9a52996d3a55c5d_56bd5ca2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
6
] | [
null
] | [
7
] | [
107
] | |
2024-11-19T02:45:58.051001+00:00 | 1,596,719,811,000 | 22aa243884ba39d1ac72ec3981d52bd7491d0355 | 2 | {
"blob_id": "22aa243884ba39d1ac72ec3981d52bd7491d0355",
"branch_name": "refs/heads/master",
"committer_date": 1596719811000,
"content_id": "83751b2eae1bcbf7e16b9102259808ad09e31813",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4671c4195048cce3cd82c6159fdcbb53beae5daf",
"extension": "py"... | 2.484375 | stackv2 | # Copyright 2020 Juneau
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, softw... | 148 | 31.56 | 97 | 17 | 995 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a64f30b0b192f651_4a7f88d5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
54
] | [
null
] | [
22
] | [
65
] | |
2024-11-19T02:57:22.810055+00:00 | 1,632,232,044,000 | 85b0dfe2634bc016a2daafa0f9c42efd47a9d27d | 2 | {
"blob_id": "85b0dfe2634bc016a2daafa0f9c42efd47a9d27d",
"branch_name": "refs/heads/main",
"committer_date": 1632232044000,
"content_id": "ca8f40bd997ac85c95124474b9afdf924deb13ad",
"detected_licenses": [
"MIT"
],
"directory_id": "745ed9601103263df5360423d43c5cb1e0824e7d",
"extension": "py",
"file... | 2.46875 | stackv2 | from werkzeug.exceptions import RequestURITooLarge
from server import find_all_products_data, find_product_data
from db_manager import save_to_db
from flask import Flask, url_for, request, redirect, render_template
import os
from talk import add_comment_to_db, get_all_posts
app = Flask(__name__)
key = os.environ.get('... | 69 | 27.33 | 115 | 14 | 447 | python | [{"finding_id": "codeql_py/flask-debug_82d8bc77e0222494_fe17c532", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
69,
41
] | [
null,
null
] | [
5,
29
] | [
24,
49
] | |
2024-11-19T03:12:06.886382+00:00 | 1,621,221,083,000 | 89b418d7eddde2a7d161b19c6adbdfa116d32335 | 3 | {
"blob_id": "89b418d7eddde2a7d161b19c6adbdfa116d32335",
"branch_name": "refs/heads/main",
"committer_date": 1621221083000,
"content_id": "84693e627f491e2a5d6b7dd9e1ba3921483bb81f",
"detected_licenses": [
"MIT"
],
"directory_id": "42bec32547d1c0f4f4ed9efee05e47ac428912f9",
"extension": "py",
"file... | 3.109375 | stackv2 | # este es un avance
import hashlib
# primera password es: 0173490
# segunda password es: Grulla222
dbu =["Secretario1","Secretario2"]
dbp =["97c4fd3c0aada3c1c4ed77854ea0dfa7b9b71ef54bd5cab2d620aab19abce1ea", "db65fb13b0f2ecafcdb3f02f18c698f440b8373502c641b32f45d9b72c2c5fc5"]
# pedimos usuario y contraseña
usuario = i... | 28 | 26.5 | 141 | 11 | 280 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1adad2a59a220d8e_75e586ae", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA3256) that is i... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA3256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
13
] | [
null
] | [
28
] | [
45
] | |
2024-11-19T03:12:07.130655+00:00 | 1,618,760,524,000 | 8f04eec01afdc942197383a2a0f1518cfd7afa75 | 3 | {
"blob_id": "8f04eec01afdc942197383a2a0f1518cfd7afa75",
"branch_name": "refs/heads/main",
"committer_date": 1618760524000,
"content_id": "2d93d0dc4a88e89d400b3e2f58317410ffa56c20",
"detected_licenses": [
"MIT"
],
"directory_id": "ab80a1a58369de39278535dc15bfd78ec3efbb3e",
"extension": "py",
"file... | 2.6875 | stackv2 | # -*- coding: utf-8 -*-
def get_path_list():
"""
優先順位
1. 環境変数
$ASCE_DATA/templates/
$ASCE_DATA/parameters/
2. カレントワーキングディレクトリ
./data/templates/
./data/parameters/
3. ユーザホームディレクトリ
~/.asce/templates/
~/.asce/parameters/
4. システムデフォルト
/etc/asce/templates/
/etc/as... | 86 | 20.21 | 76 | 15 | 481 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_bd5d5bff1b5af048_5fccb209", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
63
] | [
65
] | [
11
] | [
6
] | |
2024-11-19T03:12:11.257718+00:00 | 1,608,917,813,000 | 5d2b90574c653db7a1c17769aa0740cfff6c9e61 | 3 | {
"blob_id": "5d2b90574c653db7a1c17769aa0740cfff6c9e61",
"branch_name": "refs/heads/main",
"committer_date": 1608917813000,
"content_id": "dbd8cbd9bb0a4cf9b2426d4a26301ebf9499e15b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6e5b9ab68a4d1b95f63e119cfa1f2cdee16dcb3c",
"extension": "py",
... | 3.1875 | stackv2 | DOOR_KEY = 9093927
CARD_KEY = 11001876
def establish_secret_key(door_key: int, card_key: int) -> int:
exponent = 0
value = 1
while value != card_key:
exponent += 1
value = 7 * value % 20201227
return pow(door_key, exponent, 20201227)
if __name__ == "__main__":
print(establish_se... | 16 | 20.88 | 62 | 10 | 128 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_574f2bf514868fdc_74b129a9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
16
] | [
null
] | [
11
] | [
51
] | |
2024-11-19T03:12:16.462168+00:00 | 1,592,084,682,000 | 1320d74917b9158e687c91bea3adf6cd6282b69e | 3 | {
"blob_id": "1320d74917b9158e687c91bea3adf6cd6282b69e",
"branch_name": "refs/heads/master",
"committer_date": 1592084682000,
"content_id": "c7f06aa0d19cb68d55bdcebc76cb281a16805be8",
"detected_licenses": [
"MIT"
],
"directory_id": "024e45ab9a17d0178183dc87f4c3669d4ea7e857",
"extension": "py",
"fi... | 3.359375 | stackv2 | #! python
#This is my first repository to practice using github
import sys
if len(sys.argv) == 0:
print("Enter the password next to the file name.")
else:
password = "".join(sys.argv[1:])
print(password)
tests_failed = {}
symbols = "!@#$%^&*~><?|.,'\""
for i in symbols:
if i in password... | 42 | 28.48 | 70 | 15 | 294 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_49e1ef48aa3760c6_782d5cb0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
9
] | [
null
] | [
11
] | [
19
] | |
2024-11-19T01:33:39.403914+00:00 | 1,619,639,769,000 | c1adcd98af1924e4b690f9fd0cd8431cdb6408f4 | 3 | {
"blob_id": "c1adcd98af1924e4b690f9fd0cd8431cdb6408f4",
"branch_name": "refs/heads/main",
"committer_date": 1619639769000,
"content_id": "72cd7f0ee3d158d401360c9b39c1411c6054df76",
"detected_licenses": [
"MIT"
],
"directory_id": "a3e1249729edf825d00be50c87d141d325fe3d47",
"extension": "py",
"file... | 2.890625 | stackv2 | from pprint import pprint
from googleapiclient.discovery import build
import sys
from query_expansion import query_expansion
NUM_Q = 10
API_KEY = sys.argv[1]
SEARCH_ENGINE = sys.argv[2]
QUERY = sys.argv[4]
PRECISION = sys.argv[3]
#lists and variables to calcualte precision and pass for query expansion
relevant_indices... | 101 | 31.48 | 110 | 15 | 889 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6edb19e91470ede4_ddfe7b8c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
21
] | [
null
] | [
24
] | [
31
] | |
2024-11-19T01:33:39.490942+00:00 | 1,516,465,677,000 | 1f0a0d420943f7e573b0cf46bab35eca83d9b0c1 | 3 | {
"blob_id": "1f0a0d420943f7e573b0cf46bab35eca83d9b0c1",
"branch_name": "refs/heads/master",
"committer_date": 1516465677000,
"content_id": "be3280bc295ddbfdaa200628fd24330de86e1461",
"detected_licenses": [
"MIT"
],
"directory_id": "cbc43ca2a174be90570092e1f862ad4294e516fb",
"extension": "py",
"fi... | 2.59375 | stackv2 | # -*- coding: utf-8 -*-
import os
import click
import logging
import urllib.request
import sys
import tarfile
from dotenv import find_dotenv, load_dotenv
# https://stackoverflow.com/questions/13881092/download-progressbar-for-python-3
def reporthook(blocknum, blocksize, totalsize):
readsofar = blocknum * blocksiz... | 59 | 31.61 | 80 | 14 | 518 | python | [{"finding_id": "codeql_py/tarslip_3685e2c4b67bf238_552a8c92", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
42
] | [
null
] | [
5
] | [
8
] | |
2024-11-19T01:33:44.338742+00:00 | 1,494,945,257,000 | 186739811b4b15df4165abc0dc860a871c1d9827 | 3 | {
"blob_id": "186739811b4b15df4165abc0dc860a871c1d9827",
"branch_name": "refs/heads/master",
"committer_date": 1494945257000,
"content_id": "d14867ff469ee7054bd708dc840f1b702ebcdf74",
"detected_licenses": [
"MIT"
],
"directory_id": "2171e1669df02fdd303b3249da36d3f448b0f677",
"extension": "py",
"fi... | 2.53125 | stackv2 | from flask import Flask, request
from flask_sqlalchemy import SQLAlchemy
from keras.models import load_model
from keras.preprocessing import sequence
from database import db
from models import Name
import json
import numpy as np
import re
import string
import yaml
config = yaml.load(open('config.yaml'))
app = Flask(_... | 72 | 27.51 | 101 | 20 | 500 | python | [{"finding_id": "codeql_py/flask-debug_158d44a2dfdf9b2b_215d1d33", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
72,
35
] | [
null,
null
] | [
5,
20
] | [
39,
26
] | |
2024-11-19T01:33:55.202897+00:00 | 1,631,188,780,000 | 2624ec9bb0d3f5ae263b456647faf53ff584bda8 | 2 | {
"blob_id": "2624ec9bb0d3f5ae263b456647faf53ff584bda8",
"branch_name": "refs/heads/master",
"committer_date": 1631188780000,
"content_id": "c6fbf33cb9390d6696246a49416ca8cafc446e46",
"detected_licenses": [
"Apache-2.0",
"MIT"
],
"directory_id": "4422ee79b1bbf1cda7f2b993136cf9a52e7e71d7",
"exten... | 2.375 | stackv2 | import numpy as np
np.random.seed(0)
import torch
torch.manual_seed(0)
import torch.nn as nn
import time
import pandas as pd
import argparse
import torch
import json
import torch.optim as optim
from torch.optim.lr_scheduler import StepLR
from early_stopping import EarlyStopping
from losses import DiceCrossEntropyLoss, ... | 123 | 34.69 | 98 | 14 | 1,101 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_204e90dd1d7f6d5a_aa984a1d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
77
] | [
null
] | [
11
] | [
53
] | |
2024-11-19T01:57:20.376208+00:00 | 1,601,120,533,000 | a681efbae5ea6912d3c7d16f665877fe6dd90764 | 3 | {
"blob_id": "a681efbae5ea6912d3c7d16f665877fe6dd90764",
"branch_name": "refs/heads/master",
"committer_date": 1601120533000,
"content_id": "db42ee49dd8377176a9708a4ae6c91d52bcbdf7f",
"detected_licenses": [
"MIT"
],
"directory_id": "05d460acd3e15c42c4b1ddd2eead83dc48f5312f",
"extension": "py",
"fi... | 2.953125 | stackv2 | from robobrowser import RoboBrowser
import re,time
website = input('[>]Input the URL of the login page or webpage:')
#Another user-agent of you choice can be specified
user_agent = 'Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36'
simple_slqi = ["1 'or' 1'='1",'1 "... | 75 | 40.71 | 115 | 19 | 809 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8dc9c016383b1481_5498b897", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
13,
45
] | [
null,
null
] | [
8,
10
] | [
20,
24
] | |
2024-11-19T02:11:12.820697+00:00 | 1,410,399,048,000 | c46a708a6ea9ad723d7db78c27df45d87dd87c54 | 2 | {
"blob_id": "c46a708a6ea9ad723d7db78c27df45d87dd87c54",
"branch_name": "refs/heads/master",
"committer_date": 1410399048000,
"content_id": "cc868c3fc53eea3b6b8be63bae21eb5ca35893fe",
"detected_licenses": [
"MIT"
],
"directory_id": "81a09ab04d2a446ed56ef876438ceb2932d0538e",
"extension": "py",
"fi... | 2.484375 | stackv2 | #-*- coding: utf-8 -*-
from __future__ import unicode_literals
from __future__ import print_function
import os
import sys
from jinja2 import Template
import json
def to_utf8(obj):
try:
return obj.decode('utf-8')
except:
return obj.decode('cp949')
def build_report(input_file, fixture):
wi... | 66 | 26.27 | 79 | 15 | 446 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e504c39cd8dbd01a_014f6b98", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
23
] | [
27
] | [
16
] | [
6
] | |
2024-11-19T02:11:38.369456+00:00 | 1,625,392,102,000 | 61e0c6622f092718832ee5b75ba851fd7461b53c | 2 | {
"blob_id": "61e0c6622f092718832ee5b75ba851fd7461b53c",
"branch_name": "refs/heads/master",
"committer_date": 1625392102000,
"content_id": "3fc2d60ac85b7ce8cf34ff1f3d2d5fbb9a2421b1",
"detected_licenses": [
"MIT"
],
"directory_id": "0978b2809d2bd84c58e132c055d10de2fd2df469",
"extension": "py",
"fi... | 2.328125 | stackv2 | from rest_framework.viewsets import ModelViewSet
from rest_framework.decorators import action
from rest_framework.response import Response
from rest_framework import status
from django.utils.module_loading import import_string
from django.core.exceptions import PermissionDenied
class ModelViewsetWithEditSuggestion(Mo... | 159 | 43.77 | 123 | 19 | 1,460 | python | [{"finding_id": "codeql_py/stack-trace-exposure_93e1c2c63befc274_ee4207d1", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 5 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
44,
123,
128,
147,
152
] | [
47,
126,
131,
150,
155
] | [
46,
46,
46,
46,
46
] | [
14,
14,
14,
14,
14
] | |
2024-11-19T02:32:59.221018+00:00 | 1,666,929,698,000 | 5294322fb6b74e3ae0faf64b11233f7a1b6ad245 | 2 | {
"blob_id": "5294322fb6b74e3ae0faf64b11233f7a1b6ad245",
"branch_name": "refs/heads/master",
"committer_date": 1666929698000,
"content_id": "f6e08399655f589dfb40f36ff959fa19e63379be",
"detected_licenses": [
"MIT"
],
"directory_id": "bd9a09a3f1a8b2b5166c540ada93cc5b30591605",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
'''
name: weblogic XMLdecoder反序列化漏洞(CVE-2017-10271)
referer: https://www.anquanke.com/post/id/92003
author: Lucifer
description: weblogic /wls-wsat/CoordinatorPortType接口存在命令执行。
'''
import sys
import requests
class weblogic_xmldecoder_exec_BaseVerify:
def __init__(self,... | 59 | 35.27 | 148 | 14 | 568 | python | [{"finding_id": "codeql_py/request-without-cert-validation_688cd9bae59b2de8_78e6cdd2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
49
] | [
null
] | [
19
] | [
100
] | |
2024-11-19T02:46:19.279368+00:00 | 1,491,184,279,000 | 3a0fd1de47f49cb9a4cc6ffe6aa4f554914301d9 | 2 | {
"blob_id": "3a0fd1de47f49cb9a4cc6ffe6aa4f554914301d9",
"branch_name": "refs/heads/master",
"committer_date": 1491184279000,
"content_id": "73c0da89e713cea0b3b0ad2f396d076598b437c9",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "d83b1877d3471709f461db25e9e5308fb398fb8b",
"extension": "p... | 2.359375 | stackv2 | #!/usr/bin/env python
# Teddy Reed <teddy.reed@gmail.com>
# Copyright (c) 2016-present
# All rights reserved.
#
# This source code is licensed under the BSD-style license found in the
# LICENSE file in the root directory of this source tree.
import argparse
import jinja2
import os
import sys
import tempfile
fro... | 175 | 32.71 | 80 | 17 | 1,478 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_24dd5b8c5c860ade_523ab359", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
81,
110
] | [
null,
null
] | [
14,
22
] | [
33,
56
] | |
2024-11-19T02:59:53.165176+00:00 | 1,634,204,709,000 | 4295b479732b2d5004bfa3a139a88113eb1a8b9a | 2 | {
"blob_id": "4295b479732b2d5004bfa3a139a88113eb1a8b9a",
"branch_name": "refs/heads/master",
"committer_date": 1634204709000,
"content_id": "0cfe1c3f6f94da5ac27055185eb3cc334c0ea009",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "517ca489f5829e08e5705fa789e1e233092bc6f7",
"extension": "py"... | 2.421875 | stackv2 | import re
from abc import ABCMeta, abstractmethod
from pesto_orm.core.error import DBError
class Dialect(object):
__metaclass__ = ABCMeta
@abstractmethod
def get_db_type(self):
raise NotImplementedError
@abstractmethod
def select(self, columns, table, alias, where):
raise NotImp... | 158 | 31.41 | 136 | 19 | 1,215 | python | [{"finding_id": "codeql_py/redos_77e596013ba6eed8_338b1be7", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'select count(' and containing man... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'select count(' and containing many repetitions of ')count('."
] | [
54
] | [
null
] | [
65
] | [
72
] | |
2024-11-19T03:24:38.923133+00:00 | 1,629,605,218,000 | 1623cd0619bc10039ec564a6abec16996b916c1c | 4 | {
"blob_id": "1623cd0619bc10039ec564a6abec16996b916c1c",
"branch_name": "refs/heads/main",
"committer_date": 1629605218000,
"content_id": "ea742d34997d8da2b8f368931e86a01a7bdc9ba4",
"detected_licenses": [
"MIT"
],
"directory_id": "036f5a11b154ac5f2d7fd301fc171b29908cee5b",
"extension": "py",
"file... | 3.5 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Fri Nov 20 10:28:42 2020
@author: pc
"""
def taxRate(base):
if base < 0:
tax = 0
elif base <= 1500:
tax = base * 0.03
elif base > 1500 and base <= 4500:
tax = base * 0.1 - 105
elif base > 4500 and base <= 9000:
tax = base * 0.2 - 55... | 70 | 30.57 | 110 | 14 | 754 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0fff0ec519236f4b_eacdfe23", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priva... | [
59,
60,
62,
63
] | [
null,
null,
null,
null
] | [
11,
11,
11,
11
] | [
47,
54,
54,
73
] | |
2024-11-19T03:35:16.703895+00:00 | 1,563,970,878,000 | d4c762afc8ace9c9c247285e084152a6be7e3c81 | 4 | {
"blob_id": "d4c762afc8ace9c9c247285e084152a6be7e3c81",
"branch_name": "refs/heads/master",
"committer_date": 1563970878000,
"content_id": "7bfbb7374c59b580a26d3cad605c3bc9dee5f5ee",
"detected_licenses": [
"MIT"
],
"directory_id": "c6cbe9d15e9b1e43f7cb7adcf72591533c0fccf4",
"extension": "py",
"fi... | 3.796875 | stackv2 | # --------------
##File path for the file
file_path
#Code starts here
def read_file(path):
file = open(path,"r")
sentence = file.readline()
file.close()
return sentence
sample_message = read_file(file_path)
print(sample_message)
# --------------
#Code starts here
def read_file(file_path_1,file_... | 183 | 19.72 | 70 | 12 | 995 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d14f8b8f89ba846c_38eb6f48", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec... | [
176,
40,
71,
120,
161,
181
] | [
null,
null,
null,
null,
null,
null
] | [
16,
7,
7,
7,
7,
7
] | [
26,
19,
19,
19,
19,
17
] | |
2024-11-19T03:35:25.772740+00:00 | 1,692,906,553,000 | 94bb261fa9f8af6d3f0f6cd0d31439ebce209c70 | 3 | {
"blob_id": "94bb261fa9f8af6d3f0f6cd0d31439ebce209c70",
"branch_name": "refs/heads/master",
"committer_date": 1692906553000,
"content_id": "bc6ac8a63b3a68927fccb9c01b36653461cfb45c",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "bb021c074c95c4fb684cd543b288bc0b976df188",
"extension": "p... | 2.515625 | stackv2 | # -----------------------------------------------------------------------------
# Copyright (c) 2012 - 2018, Anaconda, Inc. and Intake contributors
# All rights reserved.
#
# The full license is in the LICENSE file, distributed with this software.
# ----------------------------------------------------------------------... | 348 | 31.34 | 97 | 17 | 2,611 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a678e82e6cb09e31_2b3243d7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
84,
342
] | [
null,
null
] | [
17,
11
] | [
30,
24
] | |
2024-11-19T03:35:28.097592+00:00 | 1,675,589,721,000 | 4219da2bdba9e131e66f1ab7a88297f0f7c2c289 | 3 | {
"blob_id": "4219da2bdba9e131e66f1ab7a88297f0f7c2c289",
"branch_name": "refs/heads/master",
"committer_date": 1675589721000,
"content_id": "f66344f748f108580589408e22b87b7e84c43111",
"detected_licenses": [
"MIT"
],
"directory_id": "f185203cbccdb1f065cde33d1bf3068af974f3a8",
"extension": "py",
"fi... | 2.671875 | stackv2 | #!/usr/bin/env python2.7
#
# PiCam SSTV Transmitterf
#
# Copyright (C) 2018 Mark Jessop <vk5qi@rfhead.net>
# Released under GNU GPL v3 or later
#
# PiCamera API: https://picamera.readthedocs.io/en/release-1.12/api_camera.html
#
# This script is hacked together from the WenetPiCam class out of the Wenet proje... | 477 | 36.15 | 138 | 21 | 3,759 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_14bdd409143de487_e908a8a0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
422
] | [
null
] | [
15
] | [
52
] | |
2024-11-19T01:37:33.630269+00:00 | 1,586,421,157,000 | 5ae86c566a90f9920e150c3ffd8dcb057146ea21 | 3 | {
"blob_id": "5ae86c566a90f9920e150c3ffd8dcb057146ea21",
"branch_name": "refs/heads/master",
"committer_date": 1586421157000,
"content_id": "e6e7d5c17d65de419e7f0445d978f32307d4bf16",
"detected_licenses": [
"MIT"
],
"directory_id": "23329178576c7cae0f5c8527905cff5126be13bb",
"extension": "py",
"fi... | 2.5625 | stackv2 | import paramiko
import datetime
from PiScanner import PiScanner
import nmap
class PiControl:
def __init__(self):
self.now = datetime.datetime.now().strftime("%d/%m/%Y %H:%M:%S")
self.ssh = paramiko.SSHClient()
self.ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
self.std... | 87 | 35.59 | 95 | 20 | 718 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_19ff4bca2659ce46_9846bb6e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
12
] | [
null
] | [
9
] | [
71
] | |
2024-11-19T01:38:00.753593+00:00 | 1,608,897,775,000 | e855a607840d14706c90fe1f9d99e36a2e25499c | 3 | {
"blob_id": "e855a607840d14706c90fe1f9d99e36a2e25499c",
"branch_name": "refs/heads/master",
"committer_date": 1608897775000,
"content_id": "df6fb3f4e0dec726073ceaecf5eb7dfc75205641",
"detected_licenses": [
"MIT"
],
"directory_id": "07e429888e0e564b2d6a8b55180fd117038bc268",
"extension": "py",
"fi... | 3.40625 | stackv2 | # --------------
#Header files
import pandas as pd
import numpy as np
import matplotlib.pyplot as plt
#path of the data file- path
data = pd.read_csv(path)
data['Gender'].replace('-','Agender',inplace=True)
gender_count = data['Gender'].value_counts()
print(gender_count)
height = [413,157,24]
plt.bar(gender_count,hei... | 76 | 21 | 54 | 9 | 461 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a8e06c9d798a1123_7d69d425", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
12
] | [
null
] | [
7
] | [
19
] | |
2024-11-19T01:38:47.334464+00:00 | 1,523,963,883,000 | ec6dad6b27e7c81c6424afae1f9c9a5534854f39 | 3 | {
"blob_id": "ec6dad6b27e7c81c6424afae1f9c9a5534854f39",
"branch_name": "refs/heads/master",
"committer_date": 1523963883000,
"content_id": "87be576d3d056a4803146eea5b68b3b6caebedb9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3771121eef58d9bc7af7c6efb79c69d7c8d6456d",
"extension": "py"... | 2.765625 | stackv2 | try:
from StringIO import StringIO
except ImportError:
from io import BytesIO as StringIO
import itertools
import os
import requests
import shutil
import tarfile
import tempfile
import yaml
def repo_index(repo_url):
"""Downloads the Chart's repo index"""
index_url = os.path.join(repo_url, 'index.yaml'... | 57 | 31.46 | 105 | 18 | 407 | python | [{"finding_id": "codeql_py/tarslip_491948024265d5de_29edd1da", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
42
] | [
null
] | [
17
] | [
20
] | |
2024-11-19T01:52:13.436914+00:00 | 1,543,284,763,000 | 185aad8726e66e782dde8ad5424bfecf2874c113 | 3 | {
"blob_id": "185aad8726e66e782dde8ad5424bfecf2874c113",
"branch_name": "refs/heads/master",
"committer_date": 1543284763000,
"content_id": "c3454887579722f02e768e2b3dd38fceb3ae90b8",
"detected_licenses": [
"MIT"
],
"directory_id": "4e0085c92fe16ff3b7dca50069db43bc4776e352",
"extension": "py",
"fi... | 2.75 | stackv2 | #!/usr/bin/python
# coding:utf-8
import os
import paramiko
import loadConfig
class MyParamiko(object):
def __init__(self):
'''
封装paramiko的操作服务器类
'''
config = loadConfig.load_json()
setting = self.setting = config[config['start']]
self.host = setting['host']
... | 206 | 28.14 | 78 | 27 | 1,390 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2162a653081b3ac4_68423348", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
74
] | [
null
] | [
9
] | [
66
] | |
2024-11-19T01:52:24.388178+00:00 | 1,587,136,324,000 | 54193d73e178acefa3b9d99c7465e5a8008bfbfc | 3 | {
"blob_id": "54193d73e178acefa3b9d99c7465e5a8008bfbfc",
"branch_name": "refs/heads/master",
"committer_date": 1587136324000,
"content_id": "9271805d0e73732980ae2f64a90fced962b58ae6",
"detected_licenses": [
"MIT"
],
"directory_id": "8fe513a3eea6c2897fbfe2f4bd6c36bb11cd7587",
"extension": "py",
"fi... | 3.078125 | stackv2 | # --------------
##File path for the file
file_path
#function to read file
def read_file(path):
file = open(path, 'r')
sentence = file.readline()
return sentence
#calling of function
sample_message = read_file(file_path)
#Code starts here
# --------------
#Code starts here
message_1 = read_file(file_p... | 107 | 19.07 | 70 | 12 | 576 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_43153153ce462890_04bf0d67", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec... | [
99,
103
] | [
null,
null
] | [
17,
7
] | [
27,
17
] | |
2024-11-19T01:52:27.350492+00:00 | 1,603,723,315,000 | 1afdad940dedd9f895bdabad25eef8233261f8ea | 3 | {
"blob_id": "1afdad940dedd9f895bdabad25eef8233261f8ea",
"branch_name": "refs/heads/master",
"committer_date": 1603723315000,
"content_id": "2f70aa76f33126d9e0c8697f2e90053abb0aabaa",
"detected_licenses": [
"MIT"
],
"directory_id": "a1f8d73ec1642bb345ab088a3a76eba8f9508d18",
"extension": "py",
"fi... | 2.8125 | stackv2 | from datetime import datetime
from tqdm import tqdm
import requests
import re, sys, time, os
#Banner
os.system("clear")
logo = '''
____ __ _____
/ _/___ _____/ /_____ _/ ___/____ __ _____ _____
/ // __ \/ ___/ __/ __ `/\__ \/ __ `/ | / / _ \/ ___/
_/ // / / (__ ) /_/ /_/ /... | 187 | 39.34 | 129 | 21 | 1,802 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_d6ea213caf162f40_57267dcd", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'instagram.com', so it might match m... | 14 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-1333",
"CWE-1333",
"CWE-1333",
"CWE-1333",
"CWE-1333",
"CWE-1333",
"CWE-1333"
] | [
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp",
"py/redos",
"py/redos",
"py/redos",
"py/redos",
"py/redos",
"... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'instagram.com', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'instagram.com', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'instagram.com', so it migh... | [
52,
114,
117,
118,
118,
119,
120,
52,
114,
117,
118,
118,
119,
120
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
20,
20,
33,
33,
78,
33,
33,
40,
40,
53,
53,
98,
53,
53
] | [
63,
63,
97,
77,
123,
96,
99,
45,
45,
58,
58,
103,
58,
58
] | |
2024-11-19T02:04:27.019797+00:00 | 1,693,486,587,000 | 4bcda1c12b211b067f774218325d88e1718f3ada | 2 | {
"blob_id": "4bcda1c12b211b067f774218325d88e1718f3ada",
"branch_name": "refs/heads/main",
"committer_date": 1693486587000,
"content_id": "46ef0810ad437b494b95cf30c0c422e51044d534",
"detected_licenses": [
"MIT"
],
"directory_id": "5c8c8b33967315e449b730c3f1d0cc4375cd0fe8",
"extension": "py",
"file... | 2.375 | stackv2 | """Our default IEM template environ."""
import datetime
import json
import os
from jinja2 import Environment, PackageLoader
# Can not support auto_escape at this time as parts of the template are
# being provided verbatim.
TEMPLATE_ENV = Environment(loader=PackageLoader("pyiem", "templates/iem"))
NAVBAR_JSON_FN = "/o... | 30 | 28.2 | 74 | 14 | 209 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_62f7e327260d90bd_47694ad7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
10
] | [
null
] | [
16
] | [
75
] | |
2024-11-19T02:04:43.721148+00:00 | 1,589,122,836,000 | 26bc79c866042690dd9dbb687d20ccdf60a266cc | 4 | {
"blob_id": "26bc79c866042690dd9dbb687d20ccdf60a266cc",
"branch_name": "refs/heads/master",
"committer_date": 1589122836000,
"content_id": "74e4a07da14ca415889d4321ab8839bb97879360",
"detected_licenses": [
"MIT"
],
"directory_id": "326409943db38db59f1cae2ac9fd1190f625969d",
"extension": "py",
"fi... | 4.375 | stackv2 | """
Petit jeu de devinette (version 2)
Auteur: Thierry Massart
Date : 10 octobre 2018
Petit jeu de devinette d'un nombre entier tiré aléatoirement par le programme dans un intervalle donné
Entrée : le nombre proposé par l'utilisateur
Résultat : affiche si le nombre proposé est celui tiré aléatoirement
"""
# importatio... | 60 | 28.53 | 102 | 14 | 493 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b2f3266210239b4f_527a2044", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
53
] | [
null
] | [
42
] | [
48
] | |
2024-11-19T02:04:45.452348+00:00 | 1,585,538,045,000 | 94af4608a6bbbf59a08613a3d92529d5c76baf91 | 3 | {
"blob_id": "94af4608a6bbbf59a08613a3d92529d5c76baf91",
"branch_name": "refs/heads/master",
"committer_date": 1585538045000,
"content_id": "7c6d53fb3beacc4697eceddea19ce3e4bf2de9fb",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2356532cbc830ad22f57ba5387a30e2fbfbb3628",
"extension": "py"... | 2.734375 | stackv2 | from flask import Flask
from getRedisClient import getRC
app = Flask(__name__)
# chouJiangEDredis:redis计数器名称
@app.route('/choujiang/<username>')
def chouJiang(username):
amountL = 400 # 奖金总额度
getrc = getRC.getRedisClient()
if getrc.exists("chouJiangEDredis"):
pass
else:
getrc.setnx("ch... | 28 | 30.04 | 82 | 15 | 319 | python | [{"finding_id": "codeql_py/reflective-xss_0e14c4ac907814c2_8e20d06d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
17,
20
] | [
null,
null
] | [
16,
16
] | [
51,
42
] | |
2024-11-19T02:04:47.406691+00:00 | 1,523,706,186,000 | bab69cfec94732327ee74cb39f0b38f94b620cca | 2 | {
"blob_id": "bab69cfec94732327ee74cb39f0b38f94b620cca",
"branch_name": "refs/heads/master",
"committer_date": 1523706186000,
"content_id": "3e251a393d47fff3c7d437f80fd50b9f142f3599",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "123b1508c690d7cf7cb78e237ed847ae0f17fb95",
"extension": "py"... | 2.453125 | stackv2 | from core.color import blue # Blue for Warnings
from core.color import red #Red For Errors
from core.color import green #Green for output
import requests
import re
def run(target):
try:
req = requests.get(target+'/joomla.xml', verify = False)
if req.status_code == 404:
req = requests.ge... | 19 | 33.68 | 83 | 14 | 147 | python | [{"finding_id": "codeql_py/request-without-cert-validation_7c73a18efb480e7d_7ed054a3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
9,
11
] | [
null,
12
] | [
15,
19
] | [
65,
84
] | |
2024-11-19T02:04:47.611678+00:00 | 1,529,369,080,000 | e75e263f5879e833df03f6b16f14e24704f655ad | 4 | {
"blob_id": "e75e263f5879e833df03f6b16f14e24704f655ad",
"branch_name": "refs/heads/master",
"committer_date": 1529369080000,
"content_id": "b1ec7b15ab620b0f7e6ec817900e9782f1697b54",
"detected_licenses": [
"MIT"
],
"directory_id": "2a5c1fb7d2cce18a68e0e51d3293d4d77c83e730",
"extension": "py",
"fi... | 3.875 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
import random
secret = random.randint(1, 99)
guess = 0
tries = 0
print(type(secret))
print(type(guess))
print("AHOY! I'm the Dread Pireate Roberts, and I have a secret!")
print("It is a number from 1 to 99, I'll give you 6 tries.")
while guess != secret and tries < 6:
... | 27 | 26.19 | 77 | 11 | 215 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f5564430ca8cc62f_b6f6d477", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
27
] | [
null
] | [
36
] | [
42
] | |
2024-11-19T02:28:21.645435+00:00 | 1,657,058,840,000 | f6d4631b5f29c121f56a33ce7cfa0975ee4c4e4d | 3 | {
"blob_id": "f6d4631b5f29c121f56a33ce7cfa0975ee4c4e4d",
"branch_name": "refs/heads/master",
"committer_date": 1657058840000,
"content_id": "d2cbcfa05450a517b21e5509a7349d478885e7c1",
"detected_licenses": [
"MIT"
],
"directory_id": "eb167912bfc0f07544aaa3fc0466bfc7b53d2760",
"extension": "py",
"fi... | 2.9375 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Sun Jan 21 16:39:28 2018
@author: Tim
"""
__version__ = '1.21'
#python program to run on older PI Canada donor reports prior to October 2021.
import re
import dateutil.parser as p
import pandas as pd
ba_len = 8
def get_datestring(donor_line):
first_of_month = donor_line.... | 181 | 33.52 | 174 | 20 | 1,555 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ec6d6c41aca07d0d_a80c5163", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
157
] | [
null
] | [
25
] | [
31
] | |
2024-11-19T02:28:23.823933+00:00 | 1,599,141,739,000 | 22afaf04c4fd8bcaa89fb4a64dcab6bbd62c7ef1 | 3 | {
"blob_id": "22afaf04c4fd8bcaa89fb4a64dcab6bbd62c7ef1",
"branch_name": "refs/heads/master",
"committer_date": 1599141739000,
"content_id": "58f8817eeb937fcd2fc4de52f558d4d1dedfeb54",
"detected_licenses": [
"MIT"
],
"directory_id": "b2c348bbae1aff24532f94b69afad8580d7cf920",
"extension": "py",
"fi... | 3.328125 | stackv2 | #!/usr/bin/python2
import scrypt
import binascii
import getpass
from hashlib import sha512
def SlowKDF(password, salt, i):
digest = password
for counter in range(i):
print "Iteration %s from %s..." % (counter+1, i)
digest = scrypt.hash(digest, salt, N = 1048576, r = 8, p = 1, buflen = 128)
ret... | 50 | 26.14 | 87 | 11 | 428 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_e1475419c397ebe9_658b38f2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
38
] | [
null
] | [
22
] | [
44
] | |
2024-11-19T02:28:26.810638+00:00 | 1,484,843,806,000 | 7f01e09d29259269dc98681a331b4be9d814034f | 2 | {
"blob_id": "7f01e09d29259269dc98681a331b4be9d814034f",
"branch_name": "refs/heads/master",
"committer_date": 1484843806000,
"content_id": "9c42bd6233e324e87868293dcea14f1c78f6ba1c",
"detected_licenses": [
"MIT"
],
"directory_id": "78ab5021b46ae9920789d3b106f87d4f399036c2",
"extension": "py",
"fi... | 2.421875 | stackv2 | import configparser
import subprocess
import re
import os
from time import sleep
import datetime
from pysolar.solar import *
import requests
import json
import logging
dir_path = os.path.dirname(os.path.realpath(__file__))
config = configparser.ConfigParser()
config.read('{}/config/rhythuem.ini'.format(dir_path))
de... | 216 | 29.74 | 109 | 15 | 1,636 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b1c75eb6c0a11b7a_0b4cbbc2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
29,
96,
102
] | [
null,
null,
null
] | [
19,
23,
26
] | [
86,
85,
109
] | |
2024-11-19T02:28:28.749776+00:00 | 1,521,889,453,000 | 2d27f2fe03ac6182f0925b705ef929de120231a5 | 2 | {
"blob_id": "2d27f2fe03ac6182f0925b705ef929de120231a5",
"branch_name": "refs/heads/master",
"committer_date": 1521889453000,
"content_id": "670044945368df785e689cba7d8b2140ce966b52",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4d3f1825f483e6a03c437cdd11142c7bac5f8c27",
"extension": "py"... | 2.390625 | stackv2 | from github import Github
from argparse import ArgumentParser
import jinja2
import base64
import yaml
import re
import os
def normalize(string):
lines = string.strip().split('\n')
if 'skills' in lines[0]:
return '\n'.join([
re.sub('^(#)? ', '\g<1>', line)
for line in lines[1:]... | 151 | 27.26 | 77 | 16 | 1,026 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0c33aeaa99cba73a_ab23369c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
22
] | [
24
] | [
12
] | [
6
] | |
2024-11-19T02:28:45.283102+00:00 | 1,615,261,839,000 | 10aa5b2a88f57da70debcff52b5bbe2bfe670d20 | 3 | {
"blob_id": "10aa5b2a88f57da70debcff52b5bbe2bfe670d20",
"branch_name": "refs/heads/main",
"committer_date": 1615261839000,
"content_id": "ad147bf1b327b11bd26e63d2c6133a336772ad87",
"detected_licenses": [
"MIT"
],
"directory_id": "395bc3078d69e4adebd5b0577d7f36eca1df20e2",
"extension": "py",
"file... | 3.21875 | stackv2 | # app/robo_advisor.py file
import requests
import os
import datetime
import json
import csv
from pandas import read_csv
import seaborn as sns
import matplotlib.pyplot as plt
import pandas as pd
# this function is used to convert from normal number to a currency (as to say)
def to_usd(my_price):
"""
Conv... | 183 | 37.37 | 152 | 18 | 1,682 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e1aa7d4c6fe798b2_3a391c6d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
114,
116,
117
] | [
null,
null,
null
] | [
22,
23,
22
] | [
45,
55,
53
] | |
2024-11-19T02:36:47.493184+00:00 | 1,661,276,162,000 | e4aa807b1ad45968555563fcb09cddfe052e9210 | 3 | {
"blob_id": "e4aa807b1ad45968555563fcb09cddfe052e9210",
"branch_name": "refs/heads/master",
"committer_date": 1661276162000,
"content_id": "ce1d5b97d282124f83f9c814261602b04ec3742f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1045cf0f12a8f5059983506ce3d71ad73c02a3fe",
"extension": "py"... | 2.515625 | stackv2 | from base_scraper import BaseScraper
import requests
import Geohash
import re
IGNORE_DUPE_IDS = {
456, # Hialeah Middle School
442, # Amelia Earhart Elementary
}
GEOHASH_PRECISION = 7
class IrmaShelters(BaseScraper):
filepath = 'irma-shelters.json'
url = 'https://irma-api.herokuapp.com/api/v1/shelte... | 334 | 37.64 | 109 | 19 | 2,936 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_e4162f4b86c7a521_9a71debe", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'google.com/maps', so it might match... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'google.com/maps', so it might match more hosts than expected."
] | [
222
] | [
null
] | [
7
] | [
70
] | |
2024-11-19T02:36:50.713873+00:00 | 1,583,139,863,000 | fc6d2140dbd4e3903097cbc164143ee333126876 | 3 | {
"blob_id": "fc6d2140dbd4e3903097cbc164143ee333126876",
"branch_name": "refs/heads/master",
"committer_date": 1583139863000,
"content_id": "03390c145f4509d7b32fed45490ece7dd4345af2",
"detected_licenses": [
"MIT"
],
"directory_id": "6425ce8ef2386fb2ed974adf8b39b1f428834077",
"extension": "py",
"fi... | 2.921875 | stackv2 | '''
Function:
虾米音乐下载: https://www.xiami.com/
Author:
Charles
微信公众号:
Charles的皮卡丘
声明:
代码仅供学习交流, 不得用于商业/非法使用.
'''
import os
import json
import click
import requests
from contextlib import closing
try:
from urllib.parse import unquote
except ImportError:
from urllib import unquote
'''
Function:
破解虾米URL加密
'''
class... | 162 | 29.86 | 137 | 31 | 1,455 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f8cb848c7ef53268_f65fa968", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
116
] | [
null
] | [
17
] | [
92
] | |
2024-11-19T02:37:12.853886+00:00 | 1,672,334,718,000 | 129825424fa2b30bc2978e00d9b27a3830a8e6d5 | 3 | {
"blob_id": "129825424fa2b30bc2978e00d9b27a3830a8e6d5",
"branch_name": "refs/heads/master",
"committer_date": 1672334718000,
"content_id": "a777b08ece04644da98e5a2f78d503e4557dcf82",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3086506a2fc668d7a580e4511105f04e8dbfc5d6",
"extension": "py"... | 3.09375 | stackv2 | #!/usr/bin/env python
# encoding: utf-8
import string
import random
def get_passwd():
passwd = []
for i in range(4):
passwd.append(random.choice(string.lowercase))
passwd.append(random.choice(string.uppercase))
passwd.append(random.choice(string.digits))
passwd.append(random.c... | 26 | 26.5 | 86 | 18 | 169 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_fdef1d763f2ed95d_17828c43", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
26
] | [
null
] | [
42
] | [
86
] | |
2024-11-19T02:37:16.131792+00:00 | 1,490,185,135,000 | 5e7171187db22fb6b1efeecc168939a5690c3131 | 3 | {
"blob_id": "5e7171187db22fb6b1efeecc168939a5690c3131",
"branch_name": "refs/heads/master",
"committer_date": 1490185135000,
"content_id": "e9098f595929e9605239b26a0c4ad6d998da95a7",
"detected_licenses": [
"MIT"
],
"directory_id": "eda97d9a87a96d989b5eacafe40fe4741a0719f4",
"extension": "py",
"fi... | 2.90625 | stackv2 | import re
import jinja2
import os
import shutil
def get_template(template_file):
"""Get a jinja template with latex tags.
modified from http://eosrei.net/articles/2015/11/latex-templates-python-and-jinja2-generate-pdfs
"""
latex_jinja_env = jinja2.Environment(
block_start_string = '\BLOCK{',
... | 45 | 36.93 | 114 | 15 | 401 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f727021393f0de69_73eee7df", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
11
] | [
23
] | [
23
] | [
6
] | |
2024-11-19T02:37:17.727222+00:00 | 1,672,163,493,000 | 9d58adeac84034bb3a3b499656a3b099d0a273a5 | 2 | {
"blob_id": "9d58adeac84034bb3a3b499656a3b099d0a273a5",
"branch_name": "refs/heads/master",
"committer_date": 1672163493000,
"content_id": "aa28f55370c6c27b6ef846cb22081eefbb715c56",
"detected_licenses": [
"Zlib"
],
"directory_id": "ced0a5875b6003d2590d1c362e41016b61d8b80c",
"extension": "py",
"f... | 2.328125 | stackv2 | import sys
from random import randint
from flamejam import app, db, mail
from flamejam.models.user import User
from flamejam.utils import hash_password, verify_password
from flamejam.forms import (
UserLogin,
UserRegistration,
ResetPassword,
NewPassword,
SettingsForm,
ContactUserForm,
)
from fl... | 315 | 36.99 | 98 | 18 | 2,451 | python | [{"finding_id": "codeql_py/url-redirection_69ee3bef3d1646ac_37078271", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
57
] | [
null
] | [
29
] | [
73
] | |
2024-11-19T02:37:39.897296+00:00 | 1,613,413,180,000 | 22caffd93a7a3b5b56c1c344237d96cda5df5328 | 4 | {
"blob_id": "22caffd93a7a3b5b56c1c344237d96cda5df5328",
"branch_name": "refs/heads/master",
"committer_date": 1613413180000,
"content_id": "8af26ff21a33b36428121f5fe3880e23106d9500",
"detected_licenses": [
"MIT"
],
"directory_id": "0bf0d6543b05cb1eb3e650e328ccd9abe541bf22",
"extension": "py",
"fi... | 3.734375 | stackv2 | #! /usr/bin/en python3.6
from user import User
from credentials import Credentials
from random import choice
def create_account(first_name, last_name, user_name, password):
"""
Fuction that creates a new user account when a user opts to sign-up
"""
new_user = User(first_name, last_name, user_name, pas... | 176 | 37.1 | 168 | 25 | 1,180 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d3951ba0b61c52df_65a12425", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive dat... | [
92,
139,
147
] | [
null,
null,
null
] | [
17,
29,
37
] | [
93,
134,
109
] | |
2024-11-19T02:37:44.385526+00:00 | 1,559,740,857,000 | 01520741539373e95ed0971d0f9e9350c4c9f6b0 | 3 | {
"blob_id": "01520741539373e95ed0971d0f9e9350c4c9f6b0",
"branch_name": "refs/heads/master",
"committer_date": 1559740857000,
"content_id": "52bd17c3fe38d8e4cb06600c42b21865deae7375",
"detected_licenses": [
"MIT"
],
"directory_id": "9fb4df222a42c1f37553651861807fe2e1822413",
"extension": "py",
"fi... | 2.625 | stackv2 | import pandas as pd
import boto3
from sqlalchemy import create_engine
import pytz
my_timezone = pytz.timezone('Europe/Dublin')
# creeate s3 connection
client = boto3.client('s3', 'eu-west-1')
# create database connetion
POSTGRES_USERNAME = 'sahil'
POSTGRES_PASSWORD = 'zxcvbnm1234'
POSTGRES_DBNAME = 'data'
POSTGRES_H... | 49 | 27.33 | 118 | 13 | 392 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3df82779da2973e0_e628fad9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
18
] | [
null
] | [
7
] | [
10
] | |
2024-11-19T03:00:27.057296+00:00 | 1,375,682,880,000 | ab1ca906a782915b1b884fc30a4fe5b487070e30 | 2 | {
"blob_id": "ab1ca906a782915b1b884fc30a4fe5b487070e30",
"branch_name": "refs/heads/master",
"committer_date": 1375682880000,
"content_id": "e7f50e268468e3aeb6caf0156d25768943d7453c",
"detected_licenses": [
"MIT"
],
"directory_id": "6cf46f85debb1b0505c0edcbc7296f50a44a615d",
"extension": "py",
"fi... | 2.5 | stackv2 | from datetime import datetime
from dexy.reporters.output import OutputReporter
from dexy.utils import dict_from_string
from dexy.utils import file_exists
from dexy.utils import iter_paths
from dexy.utils import reverse_iter_paths
from jinja2 import Environment
from jinja2 import FileSystemLoader
import dexy.exceptions
... | 268 | 34.38 | 143 | 21 | 1,887 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b01bdbd6a9021502_2dfd8ac8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
169
] | [
null
] | [
15
] | [
60
] | |
2024-11-19T03:11:26.475640+00:00 | 1,578,687,668,000 | 7537a4a17f91fc841955d597c3cf9c69e17b5845 | 2 | {
"blob_id": "7537a4a17f91fc841955d597c3cf9c69e17b5845",
"branch_name": "refs/heads/master",
"committer_date": 1578687668000,
"content_id": "b1fd0190502044ba4e597dcfb393119dd0d469cf",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "2c24efab5a3d2ac311003b6ee37b338c505b8e31",
"extension": "p... | 2.359375 | stackv2 | '''
This file exposes RESTful HTTP APIS to interact with service manager and task manager.
'''
import sys,os
from functools import wraps
import json
import threading
import time
from datetime import datetime
from flask import Blueprint, request, jsonify, abort
from .manager import Manager
bp = Blueprint('tasks', ... | 220 | 31.57 | 117 | 20 | 1,741 | python | [{"finding_id": "codeql_py/reflective-xss_01d4454378cb7347_417b8b5c", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
98
] | [
null
] | [
12
] | [
55
] | |
2024-11-19T03:11:39.696030+00:00 | 1,570,627,592,000 | 7b30efc753ad9b35bfc4f4d417faabb986c16a70 | 2 | {
"blob_id": "7b30efc753ad9b35bfc4f4d417faabb986c16a70",
"branch_name": "refs/heads/master",
"committer_date": 1570627592000,
"content_id": "829c175c0b5ae1e6dc98a762cb08d6f7be85d2eb",
"detected_licenses": [
"MIT"
],
"directory_id": "db7bb2154f041db8b7d26bae56b9432b1650ddab",
"extension": "py",
"fi... | 2.484375 | stackv2 | """SODAR Taskflow API for Django apps"""
import logging
import requests
from uuid import UUID
from django.conf import settings
from django.core.exceptions import ImproperlyConfigured
# Projectroles dependency
from projectroles.models import SODAR_CONSTANTS
logger = logging.getLogger(__name__)
# SODAR constants
PR... | 168 | 29.58 | 80 | 15 | 1,141 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c05082d76f4da125_c86dd9dd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
110
] | [
null
] | [
22
] | [
52
] | |
2024-11-19T03:12:11.106639+00:00 | 1,628,280,543,000 | 5ae251dda99378b10d219676d614d5b792156b66 | 2 | {
"blob_id": "5ae251dda99378b10d219676d614d5b792156b66",
"branch_name": "refs/heads/master",
"committer_date": 1628280543000,
"content_id": "20350eb9ae70ec64695e93de324c15d4127fed6e",
"detected_licenses": [
"MIT"
],
"directory_id": "1845f0d71f3ed4063bbb5417ca6ae1555a16dd0a",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/env python3
# Extract hash files of package
# -*- coding: utf-8 -*-
# %%%%%%%%%%% Libraries %%%%%%%%%%%#
import re
import os
import json
import gzip
import shutil
import hashlib
import tarfile
from auxiliar_functions.globals import tmp
# %%%%%%%%%%% Functions %%%%%%%%%%%#
def get_hash_pkg(path_pack)... | 91 | 33.12 | 77 | 23 | 701 | python | [{"finding_id": "codeql_py/tarslip_6410b864444bbda9_a1c2e27d", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
51
] | [
null
] | [
13
] | [
17
] | |
2024-11-19T03:12:12.443625+00:00 | 1,419,737,143,000 | 7eaccb0387ff3c4e08cdb47d5fb494f752b33808 | 3 | {
"blob_id": "7eaccb0387ff3c4e08cdb47d5fb494f752b33808",
"branch_name": "refs/heads/master",
"committer_date": 1419737143000,
"content_id": "55a46be9c2c0b9479db547cff7699793d4b72927",
"detected_licenses": [
"MIT"
],
"directory_id": "02348531f65e154606f289fe982abe4446379829",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/python
def main():
print "Digital Ocean API v1"
print "You can find these tokens here: https://cloud.digitalocean.com/api_access"
print
do_v1_client_id = raw_input("Client ID: ")
do_v1_api_key = raw_input("API key: ")
print
print
print "Digital Ocean API v2"
print "You... | 73 | 19.85 | 121 | 11 | 402 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4742766b27d21151_e33d61f4", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
69
] | [
null
] | [
32
] | [
51
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.