added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T21:47:38.963266+00:00 | 1,619,648,587,000 | 7ea239b0acac858da834ae9bf934947669e26e09 | 3 | {
"blob_id": "7ea239b0acac858da834ae9bf934947669e26e09",
"branch_name": "refs/heads/main",
"committer_date": 1619648763000,
"content_id": "7f621f719abbc9727c7f7ca5f009bc33f1a32480",
"detected_licenses": [
"MIT"
],
"directory_id": "129783d5c860eaea03c581d52f5efd41be0d8f59",
"extension": "py",
"file... | 2.71875 | stackv2 | """Processo information contained into the JSON survey result."""
# pylint: disable=C0103
import json
csv_stories = "story;engagement;coherence;rating;read_again\n"
csv_units = "unit,valence,arousal\n"
csv_demo = "gender,age\n"
with open('results/survey/results.json', 'r', encoding='utf8') as f:
results = json.lo... | 43 | 29.81 | 76 | 15 | 341 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_76a93e4ce269e945_55ed29cc", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
43
] | [
null
] | [
13
] | [
21
] | |
2024-11-18T22:29:01.603288+00:00 | 1,624,595,423,000 | d78a54685e6c302cfee0fe36ddca53972482d384 | 3 | {
"blob_id": "d78a54685e6c302cfee0fe36ddca53972482d384",
"branch_name": "refs/heads/main",
"committer_date": 1624595423000,
"content_id": "5ee79666a0bce071fb7f482521c15bf79301f8b2",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "c2318eb56ada865a459c4def64b75eb441e0cb48",
"extension": "py",
"... | 2.75 | stackv2 | import argparse
import datetime
import inspect
import logging
import sys
from collections import defaultdict
from pathlib import Path
from typing import List, Dict
import fnmatch
from jinja2 import Environment, FileSystemLoader, Template
from phlooph.models import Source, Post
from phlooph import config
logger = lo... | 342 | 33.18 | 117 | 17 | 2,640 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f572e385e8d0ed47_0f5cffd1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
74
] | [
null
] | [
19
] | [
57
] | |
2024-11-18T22:29:35.763546+00:00 | 1,541,441,143,000 | 5b34b79c038ab8c4ed1e892fda30fc28c4932d8f | 3 | {
"blob_id": "5b34b79c038ab8c4ed1e892fda30fc28c4932d8f",
"branch_name": "refs/heads/master",
"committer_date": 1541441143000,
"content_id": "11bf9e2d5eda0a7e52eb73f7a9e51afef79e7d95",
"detected_licenses": [
"MIT"
],
"directory_id": "a48d507f594f2213f98d90fc0b6024f5f601ff7b",
"extension": "py",
"fi... | 2.65625 | stackv2 | from django.db import models
import datetime
import pytz
from django.core.exceptions import ObjectDoesNotExist
class PasswordResetManager(models.Manager):
"""
Manager class for Password Reset
"""
def is_record_expired(self, token):
created_date = super().get_queryset().get(token=token).cr... | 85 | 28.14 | 75 | 18 | 484 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ec7c214d9c9f27dd_6096dcf0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
76
] | [
null
] | [
20
] | [
32
] | |
2024-11-18T22:29:38.525592+00:00 | 1,578,982,899,000 | da0bcfc25e64ead7756c478321fe1ef8775e5486 | 3 | {
"blob_id": "da0bcfc25e64ead7756c478321fe1ef8775e5486",
"branch_name": "refs/heads/master",
"committer_date": 1578982899000,
"content_id": "9e908d7bfb67d00fb828824c27f50440d6e228af",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "9084751a90f977fc722f90892e62c6596d0a26c6",
"extension": "p... | 2.75 | stackv2 | from abc import ABC, abstractmethod
import jinja2
class Template(ABC):
@abstractmethod
def render(self, session):
pass
@classmethod
def get_template(cls):
origin_cls = cls
while cls is not Template:
if cls.__doc__:
return cls.__doc__
el... | 40 | 21.15 | 69 | 15 | 201 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e4d07eb889584ac2_d00fbdf2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
36
] | [
null
] | [
20
] | [
56
] | |
2024-11-18T22:41:13.810293+00:00 | 1,509,802,522,000 | 7e5c338ddd894db465ab955b1a21c759758148f8 | 2 | {
"blob_id": "7e5c338ddd894db465ab955b1a21c759758148f8",
"branch_name": "refs/heads/master",
"committer_date": 1509802522000,
"content_id": "58ceaafc2d2819124d87eef37b783e73dcf0c336",
"detected_licenses": [
"MIT"
],
"directory_id": "af94acd04ac9b05bff3cec8c972e38ddeb58bcd7",
"extension": "py",
"fi... | 2.453125 | stackv2 | # -*- coding: utf-8 -*-
import time
import xlrd
import Register_aidaiwangApp
import LogOut_aidiawangApp
def start_to_login(filename):
print(u'login')
driver = Register_aidaiwangApp.driver
driver.launch_app()
time.sleep(3)
try:
driver.find_element_by_id('cn.phaidai.loan:id/rb_mine')
... | 69 | 33.17 | 98 | 16 | 575 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ecce819ec68b6945_83b270b6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
56
] | [
null
] | [
40
] | [
53
] | |
2024-11-18T22:41:23.184868+00:00 | 1,631,459,759,000 | 26582efa0911e8593813696581b2385d12849835 | 2 | {
"blob_id": "26582efa0911e8593813696581b2385d12849835",
"branch_name": "refs/heads/master",
"committer_date": 1631459759000,
"content_id": "db7f86869c688542ee5aea0211a284cf5b8d03d0",
"detected_licenses": [
"MIT"
],
"directory_id": "412f1d48b38e85ea443be07a2c7fa168e0c4202b",
"extension": "py",
"fi... | 2.3125 | stackv2 | """Sample API Client."""
import logging
import asyncio
import socket
from typing import Any, Coroutine, Optional
import aiohttp
import async_timeout
TIMEOUT = 10
_LOGGER: logging.Logger = logging.getLogger(__package__)
HEADERS = {
"Content-type": "application/json; charset=UTF-8",
}
ENTRY_POINT = "https://api4... | 115 | 29.55 | 91 | 22 | 714 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0576ea282ea396eb_94e1fa1b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
100,
106,
111
] | [
null,
null,
null
] | [
17,
17,
17
] | [
91,
82,
83
] | |
2024-11-18T22:54:12.118633+00:00 | 1,603,095,059,000 | c35f2da77c825154fd02760ffaf321608f52ac92 | 2 | {
"blob_id": "c35f2da77c825154fd02760ffaf321608f52ac92",
"branch_name": "refs/heads/master",
"committer_date": 1603095059000,
"content_id": "c90dd168eb3f3766a74a4eb71ee5576a897f7964",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "135f7ff73cd34f8701e42f5136cc3b465f53a1d2",
"extension": "py"... | 2.3125 | stackv2 | #!/usr/bin/env python
# -*- coding:utf-8 -*-
# __author__ = Lyon
import jwt
import datetime
import inspect
import itertools
import traceback
import tornado.web
from typing import Any
from lib.dt import dt
from api.status import Code, Message
def before_request(f):
"""
Add global middleware of before request.... | 335 | 34.59 | 112 | 18 | 2,591 | python | [{"finding_id": "codeql_py/reflective-xss_4a53296bbb4714c9_b1943563", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
107
] | [
null
] | [
27
] | [
88
] | |
2024-11-18T22:54:14.947172+00:00 | 1,595,126,478,000 | cb1e3013a511d73d35715d989a97b25bc96dae7e | 4 | {
"blob_id": "cb1e3013a511d73d35715d989a97b25bc96dae7e",
"branch_name": "refs/heads/master",
"committer_date": 1595126478000,
"content_id": "e925e41c53a9fcef89e67de85213b984fb25f84d",
"detected_licenses": [
"MIT"
],
"directory_id": "c86036712ad07c545768d6ee81c5f339aecf2e35",
"extension": "py",
"fi... | 3.828125 | stackv2 | import numpy as np
import random
import string
def get_input():
""" Get password settings from user """
# Define password length
minimum = int(input('Enter minimum password length: '))
maximum = int(input('Enter maximum password length: '))
assert (maximum >= minimum), 'Maximum must be larger tha... | 92 | 31.12 | 105 | 13 | 707 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_17221b816c516ceb_0ddb1b63", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
92
] | [
null
] | [
11
] | [
14
] | |
2024-11-18T22:54:21.936504+00:00 | 1,547,280,280,000 | 36b62d06e54ff701fcb53c23e2af071040fb468c | 3 | {
"blob_id": "36b62d06e54ff701fcb53c23e2af071040fb468c",
"branch_name": "refs/heads/master",
"committer_date": 1547280280000,
"content_id": "9ad40b5b6463d9e38580439551009c650b666feb",
"detected_licenses": [
"MIT"
],
"directory_id": "a1ecdea1dd433be50e81d8bbd22d21c85462b370",
"extension": "py",
"fi... | 2.5625 | stackv2 | """
This module contain help routines for the different resources
"""
import os
import subprocess
import tempfile
from jinja2 import Template
import requests
from . import celery
log_template = Template(
"<html>\n"
"<body>\n"
"<code>\n"
"{% for line in lines %}"
"{{ line }}<br>\n"
"{% endfor ... | 55 | 22.85 | 73 | 17 | 332 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c65330569ceaa901_7fbcf7c5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
23
] | [
16
] | [
2
] | |
2024-11-18T22:54:28.314391+00:00 | 1,479,773,565,000 | c7e044239e12b3d03524749ce0fb25ee75a62d61 | 3 | {
"blob_id": "c7e044239e12b3d03524749ce0fb25ee75a62d61",
"branch_name": "refs/heads/master",
"committer_date": 1479773565000,
"content_id": "8150c932f7d4b9c8a3f1dbc7868928347277bab0",
"detected_licenses": [
"MIT"
],
"directory_id": "cdd6c8ec109d23137c8cd2d42395c3bf0646676d",
"extension": "py",
"fi... | 2.703125 | stackv2 | import re
from django.core.validators import RegexValidator, validate_integer
from django.utils.deconstruct import deconstructible
@deconstructible
class TimecodeValidator(RegexValidator):
regex = re.compile(r"\d{2}:\d{2}:\d{2}")
message = "Invalid timecode. Format: 00:00:00"
@deconstructible
class IMDBUrl... | 31 | 26.06 | 93 | 10 | 224 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_011cc000e6f274fc_f90c2cdb", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'imdb.com/title/', so it might match... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'imdb.com/title/', so it might match more hosts than expected."
] | [
15
] | [
null
] | [
26
] | [
54
] | |
2024-11-18T22:54:31.530263+00:00 | 1,604,653,091,000 | 757bbf391f2ea71fe7b999eb6dacceb6cf5a8c4f | 3 | {
"blob_id": "757bbf391f2ea71fe7b999eb6dacceb6cf5a8c4f",
"branch_name": "refs/heads/master",
"committer_date": 1604653091000,
"content_id": "f08af8c0d72bff608707ae10c2f886252efec84b",
"detected_licenses": [
"MIT"
],
"directory_id": "34ba661c593167e2aaa4da6cda5a638524ea8823",
"extension": "py",
"fi... | 2.921875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
Sample script to back up all iRMC settings via iRMC Redfish API
in Fujitsu PRIMERGY
[Usage]
- Show iRMC settings on console
$ python backup_irmc_config.py -i 192.168.10.10 -u admin -p admin
- Save iRMC settings to a file
$ python backup_irmc_config.py -... | 84 | 24.75 | 100 | 15 | 580 | python | [{"finding_id": "codeql_py/request-without-cert-validation_564c066f5ee46299_d2ebdafd", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
35
] | [
40
] | [
16
] | [
6
] | |
2024-11-18T22:54:31.776424+00:00 | 1,599,058,859,000 | 5ae379cfad076157c4be1085848233bc87866b22 | 3 | {
"blob_id": "5ae379cfad076157c4be1085848233bc87866b22",
"branch_name": "refs/heads/master",
"committer_date": 1599058859000,
"content_id": "a3c9d792dc0b3a2f68bf149a0cad1e4d5529322a",
"detected_licenses": [
"MIT"
],
"directory_id": "7da22c9ab95df4f2ae93c6f30f57158afbd6ef55",
"extension": "py",
"fi... | 2.703125 | stackv2 | # Copyright 2013-2014 James P Goodwin bkp@jlgoodwin.com
""" module to implement shared config functions for the bkp tool """
import os
import sys
def save_config( bkp_config, config_file, for_restart = False ):
""" save the configuration to the file object passed as a parameter """
print("bucket =", bkp_config... | 63 | 50.25 | 143 | 17 | 791 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ac7d703aa0a927ae_da8dc680", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
16
] | [
null
] | [
29
] | [
55
] | |
2024-11-18T20:55:07.292088+00:00 | 1,681,840,460,000 | 86230f98338b254abd0b75088192a346d19a3155 | 4 | {
"blob_id": "86230f98338b254abd0b75088192a346d19a3155",
"branch_name": "refs/heads/master",
"committer_date": 1681840460000,
"content_id": "adad1b8c2e68f69a6151c3bedd1f116a5286df9b",
"detected_licenses": [
"MIT"
],
"directory_id": "b1829737cb9a90c11b9f1af5aec412e2ebf74de8",
"extension": "py",
"fi... | 3.9375 | stackv2 |
class employee:
def __init__(self, first, last, salary):
self.first = first
self.last = last
self.email = first + "." + last + "@email.com"
self.salary = salary
def fullname(self):
return '{} {}'.format(self.first, self.last)
# for debuging or logging (mostly for ... | 39 | 22.44 | 84 | 12 | 242 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e842b4bd8a1ca175_1700f5fe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
35,
38
] | [
null,
null
] | [
7,
7
] | [
9,
12
] | |
2024-11-18T20:55:09.940658+00:00 | 1,655,799,592,000 | eddf1195f26fb94c73575ae6ae3b99e1b84d795d | 2 | {
"blob_id": "eddf1195f26fb94c73575ae6ae3b99e1b84d795d",
"branch_name": "refs/heads/master",
"committer_date": 1655799592000,
"content_id": "36e8b0e54fdb28880e72da583c90c67ccfcd78da",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cd274282f9e547e5bb9b6519cf050196f8d51b45",
"extension": "py"... | 2.390625 | stackv2 | from flask import Flask, request, Response
import cherrypy
import json
import os
import logging
import paste.translogger
app = Flask(__name__)
logger = logging.getLogger("datasink-service")
@app.route('/', methods=['GET'])
def root():
return Response(status=200, response="I am Groot!")
@app.route('/receiver'... | 72 | 29.29 | 87 | 14 | 499 | python | [{"finding_id": "codeql_py/path-injection_32d39f9fbd1799f5_cf7db4cb", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-117"
] | [
"py/path-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
34,
33
] | [
null,
null
] | [
19,
21
] | [
27,
81
] | |
2024-11-18T21:07:41.160889+00:00 | 1,557,167,669,000 | d4d96d0e58d1a1160875959c39f73fa72cc5ea7d | 2 | {
"blob_id": "d4d96d0e58d1a1160875959c39f73fa72cc5ea7d",
"branch_name": "refs/heads/master",
"committer_date": 1557167669000,
"content_id": "bb56848389d58602e56179496884ebe3f3298c8c",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "303fa0ec9c09811154b311d7ad6d2defcf40d027",
"extension": "p... | 2.3125 | stackv2 | import requests
import json
from flask import request, Response, stream_with_context, current_app as app, jsonify
from flask_restplus import Resource, Namespace
from flask_jwt_extended import jwt_required, get_jwt_claims
api = Namespace('services', description='services')
batch_server = 'http://batch:5010/api'
datas... | 72 | 31 | 130 | 15 | 496 | python | [{"finding_id": "codeql_py/reflective-xss_cb81f96583878b26_49457051", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d... | 2 | true | [
"CWE-079",
"CWE-918"
] | [
"py/reflective-xss",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).\nCross-site scripting vulnerability due to a [user-provided value](3).\nCross-site scripting vulnerability due to a [user-provided value](4).",
"Part of the URL of this req... | [
34,
16
] | [
null,
23
] | [
29,
16
] | [
41,
27
] | |
2024-11-18T21:07:43.485237+00:00 | 1,563,364,412,000 | 11d96e999da2a6bf9c0f6f7994e244a95f111d5b | 2 | {
"blob_id": "11d96e999da2a6bf9c0f6f7994e244a95f111d5b",
"branch_name": "refs/heads/master",
"committer_date": 1563364412000,
"content_id": "738b2dcf3818b05ce1605b2dcfc81a9898a6005c",
"detected_licenses": [
"MIT"
],
"directory_id": "be11bd2ebd5cac7c765516c866faf65b82e0086d",
"extension": "py",
"fi... | 2.390625 | stackv2 | """
application.py
- creates a Flask app instance and registers the database object
"""
from flask import Flask, Blueprint, jsonify, request, current_app, render_template, Response
from flask_mail import Mail, Message
from flask_cors import CORS
from flask_admin import Admin
from flask_login import LoginManager, curre... | 79 | 29.9 | 92 | 15 | 544 | python | [{"finding_id": "codeql_py/reflective-xss_42ec0cb4e0c16d23_25ca81a8", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-918"
] | [
"py/reflective-xss",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
77,
77
] | [
null,
null
] | [
16,
16
] | [
74,
69
] | |
2024-11-18T21:33:03.677131+00:00 | 1,550,867,062,000 | 77fda715492d6716cc6acd35fcfdeb1b26aadecc | 2 | {
"blob_id": "77fda715492d6716cc6acd35fcfdeb1b26aadecc",
"branch_name": "refs/heads/main",
"committer_date": 1550867062000,
"content_id": "7ec9635270ccddf5a02880c93479179adfe683f4",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "7f15ff62329262b9de8cb27b31ebf5d8bbed2fd9",
"extension": "py"... | 2.40625 | stackv2 | #! /usr/bin/env python
from nda_aws_token_generator import *
import getpass
web_service_url = 'https://ndar.nih.gov/DataManager/dataManager'
#username = raw_input('Enter your NIMH Data Archives username:')
#password = getpass.getpass('Enter your NIMH Data Archives password:')
username = "FILL_IN_YOUR_NDA_USERNAME"
... | 39 | 28.64 | 72 | 11 | 284 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_14eb07b2636fa40c_d9b83e20", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
16
] | [
23
] | [
7
] | [
26
] | |
2024-11-18T21:33:24.639955+00:00 | 1,571,337,782,000 | 63d135d27c0d30bf2fed00b1a01d75eca41e914a | 4 | {
"blob_id": "63d135d27c0d30bf2fed00b1a01d75eca41e914a",
"branch_name": "refs/heads/master",
"committer_date": 1571337782000,
"content_id": "71fa523d40c6e5e959d108433c8ff7dad34c5397",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7fada1dd14df5d4c467a77e88467407a7c507f1d",
"extension": "py"... | 3.640625 | stackv2 | #!/usr/bin/env python
"""
This program generates passwords based on three arguments passed:
* seed - which can be any string, eg. website domain
* salt - salt, which together with seed provides X and Y position for
char matrix
* length - which is simply the length of generated password
Sample usage:
./password_generat... | 62 | 23.39 | 69 | 12 | 398 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aad1e02117d9db3d_b825724d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
62
] | [
null
] | [
11
] | [
29
] | |
2024-11-18T21:55:40.156372+00:00 | 1,536,544,411,000 | dad6fe1062560d53f1d462d4bf65246fcde639b7 | 3 | {
"blob_id": "dad6fe1062560d53f1d462d4bf65246fcde639b7",
"branch_name": "refs/heads/master",
"committer_date": 1536544411000,
"content_id": "57f14db525fde851d152671ae25f0a2910731f60",
"detected_licenses": [
"MIT"
],
"directory_id": "6d3b6f1b1214ab2c111659ce89f8f14765e5f8dc",
"extension": "py",
"fi... | 3.28125 | stackv2 | # !/usr/bin/python
VERSION = 1.3
SECRET_KEY = 'secret'
"""
Password generator using a concept from this interesting article:
http://charlesleifer.com/blog/creating-a-personal-password-manager/
basically the article states that a good way to generate passwords is to use the account type
as a salt for a hash and fr... | 119 | 29.61 | 103 | 14 | 796 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_220cae989a1dd822_c8b7ce97", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
89
] | [
null
] | [
31
] | [
65
] | |
2024-11-18T22:39:38.044477+00:00 | 1,617,374,312,000 | 6d15a316f7f034a88f25b3caea74cd7c0692b231 | 3 | {
"blob_id": "6d15a316f7f034a88f25b3caea74cd7c0692b231",
"branch_name": "refs/heads/master",
"committer_date": 1617374312000,
"content_id": "c176540496192bd0f59629b414b3ed4847c0a8f8",
"detected_licenses": [
"MIT"
],
"directory_id": "ae76394077a12fbd715545501e5a21457019fd2b",
"extension": "py",
"fi... | 3.078125 | stackv2 | # Getting Reddit Client ID and Client Secret
import config
reddit_credentials = config.reddit_credentials
REDDIT_CLIENT = reddit_credentials['client_id']
REDDIT_SECRET = reddit_credentials['client_secret']
REDDIT_USER_PW = reddit_credentials['user_pw']
REDDIT_USER_NAME= reddit_credentials['username']
# Testing if the... | 95 | 35.55 | 139 | 14 | 886 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c8e0929dff0e6fd9_5e55b9c3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
12
] | [
null
] | [
7
] | [
96
] | |
2024-11-18T22:54:56.970058+00:00 | 1,673,106,838,000 | 4d2eb3d45d2041fb88dae2e5cdd827ab151650bf | 3 | {
"blob_id": "4d2eb3d45d2041fb88dae2e5cdd827ab151650bf",
"branch_name": "refs/heads/master",
"committer_date": 1673106838000,
"content_id": "2b98eb915903b71ca11754b8e012599842469408",
"detected_licenses": [
"Apache-2.0",
"BSD-3-Clause"
],
"directory_id": "ee2513aae5bed60e3ede160cb9623c611fe0bc65",... | 2.984375 | stackv2 | # Copyright (C) 2015 Grigorios G. Chrysos
# available under the terms of the Apache License, Version 2.0
import os
from os import system, listdir, walk
from os.path import isdir, isfile, sep, join, getmtime
import shutil
import errno
from glob import glob
from subprocess import check_output
from pathlib import Path
... | 306 | 38.08 | 108 | 19 | 2,911 | python | [{"finding_id": "codeql_py/tarslip_6d41d998551e8bd0_c1b89e6c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
217
] | [
null
] | [
9
] | [
18
] | |
2024-11-18T20:56:49.827487+00:00 | 1,518,315,165,000 | 7a27ead6f2889b3dab80733c8aae2c308bf56022 | 2 | {
"blob_id": "7a27ead6f2889b3dab80733c8aae2c308bf56022",
"branch_name": "refs/heads/master",
"committer_date": 1518315165000,
"content_id": "f916f6a8f67bd1d26554e4450e1a211a66d63cde",
"detected_licenses": [
"MIT"
],
"directory_id": "4487f5c9b2d8f8fe51fe0ca6b9c32e86b039e194",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!/usr/bin/env python2.7
import threading, wx, time, urllib2, sys, os, tarfile, shutil, hashlib, importlib
os.chdir(os.path.dirname(os.path.realpath(__file__)))
class MainFrame(wx.Frame):
def __init__(self, parent, ID, title, missing_modules):
wx.Frame.__init__(self, parent, ID, title, size=(300,150))
... | 171 | 31.05 | 101 | 18 | 1,272 | python | [{"finding_id": "codeql_py/tarslip_b6d23184d33d7777_4c0e8079", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)."
] | [
67
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T20:56:53.367462+00:00 | 1,671,582,471,000 | 81f8f692689416c6de561e5becd89052fa3b1eb9 | 2 | {
"blob_id": "81f8f692689416c6de561e5becd89052fa3b1eb9",
"branch_name": "refs/heads/main",
"committer_date": 1671582471000,
"content_id": "d42ab4e9f4ec7db81c3c869b052cc80837c32421",
"detected_licenses": [
"MIT"
],
"directory_id": "8ddf316c56ac4d286da71beed5ac5fe69aecc068",
"extension": "py",
"file... | 2.453125 | stackv2 | import requests
from requests.auth import HTTPBasicAuth
import json
from .directories import Directory
from .devices import Device
from .exceptions import IMIAuthError, IMIConnectionError
import sys
requests.packages.urllib3.disable_warnings()
class IMI:
def __init__(
self,
server = None, ... | 105 | 42.55 | 126 | 15 | 1,054 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c626bed8d0594dd2_b5bfb2cf", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
43
] | [
null
] | [
20
] | [
116
] | |
2024-11-18T20:56:57.155256+00:00 | 1,675,284,861,000 | 983dcfa5999ba72a2ebb929412a96851254f722e | 3 | {
"blob_id": "983dcfa5999ba72a2ebb929412a96851254f722e",
"branch_name": "refs/heads/master",
"committer_date": 1675284861000,
"content_id": "de66a941a971f878c173b9cbb58e2ae480746c41",
"detected_licenses": [
"MIT"
],
"directory_id": "c6c8dc7224e554fdb3fb0e1b34c69ef09ebc98ab",
"extension": "py",
"fi... | 2.8125 | stackv2 | # -*- coding: utf-8 -*-
"""pybooru.moebooru
This module contains Moebooru class for access to API calls,
authentication, build url and return JSON response.
Classes:
Moebooru -- Moebooru classs.
"""
# __furute__ imports
from __future__ import absolute_import
# External imports
import hashlib
# Pybooru imports
... | 158 | 37.41 | 80 | 19 | 1,358 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_ad0bddf9860a83ff_106b0865", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
125
] | [
null
] | [
21
] | [
48
] | |
2024-11-18T22:43:34.129845+00:00 | 1,482,335,571,000 | 4f6828fe66be53524e3e0a78f02e6896cc5be343 | 3 | {
"blob_id": "4f6828fe66be53524e3e0a78f02e6896cc5be343",
"branch_name": "refs/heads/master",
"committer_date": 1482335571000,
"content_id": "1fc8550b7e9da8fc416eeb57e64940eff95bbc13",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "7a8039246c08b546408d2b9ec2802fa0543a696b",
"extension": "p... | 2.625 | stackv2 | import os
import pandas as pd
import re
import matplotlib.pyplot as plt
from CCA import ExpressionCCA
class CrossValCCA(object):
def __init__(self, raw_data_path, uv_dir,
input_filepath,
path_to_R_script='../../code/sparse_CCA.R',
):
self.raw_data_path =... | 135 | 34.52 | 124 | 15 | 1,091 | python | [{"finding_id": "codeql_py/overly-large-range_cca19ba791fb5b7f_01acd819", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
63,
63
] | [
null,
null
] | [
26,
46
] | [
29,
49
] | |
2024-11-18T23:10:42.641677+00:00 | 1,510,942,894,000 | 8f0196f60b25a8574c6ecd703e26de68b94d1759 | 3 | {
"blob_id": "8f0196f60b25a8574c6ecd703e26de68b94d1759",
"branch_name": "refs/heads/master",
"committer_date": 1510942894000,
"content_id": "788e822da19fea958d5064d06fe262303e007bfa",
"detected_licenses": [
"MIT"
],
"directory_id": "6ad437a72334ace247da599d22a71eca4d3ff020",
"extension": "py",
"fi... | 2.78125 | stackv2 | from .database import Database, dec_to_float_converter
import re
def main():
db = Database({'conv': dec_to_float_converter()})
# Populate Array with all mobile values from Phoenix DB
result = db.query(
"SELECT * FROM dosomething.field_data_field_mobile WHERE field_mobile_value is NOT NULL")
... | 59 | 47.37 | 150 | 20 | 568 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_88db6f2ac05d4057_6ae0b9dc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (p... | [
31,
48,
53
] | [
null,
null,
null
] | [
27,
27,
19
] | [
39,
39,
70
] | |
2024-11-18T23:10:46.843399+00:00 | 1,676,139,610,000 | 1f4d4d229f4e80d13d46a5b1fe2244ae43a38fc3 | 3 | {
"blob_id": "1f4d4d229f4e80d13d46a5b1fe2244ae43a38fc3",
"branch_name": "refs/heads/master",
"committer_date": 1676139610000,
"content_id": "8e3ef4af3e0dfdbecf84616e468460faefb6ad1c",
"detected_licenses": [
"MIT"
],
"directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9",
"extension": "py",
"fi... | 2.765625 | stackv2 | import base64, hashlib
from ctypes import CDLL, POINTER, Structure, create_string_buffer, byref
from ctypes.util import find_library
Security = CDLL(find_library('Security'))
# Importing this via C because haven't figured out how to mix in pyObjc version yet
c_CoreFoundation = CDLL(find_library('CoreFoundation'))
cla... | 51 | 41.31 | 120 | 18 | 538 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_4241d32af872e094_13231cbc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (certificate)](1) is used in a hashing algorithm (SHA1) that is i... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (certificate)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (certificate)](2) is used in a hashing algorithm (SHA1) that is insecure."
] | [
39
] | [
null
] | [
25
] | [
34
] | |
2024-11-18T23:25:01.933028+00:00 | 1,610,462,324,000 | 9d8a6abe77405aec7ccc19c2b24000b62c0be5de | 2 | {
"blob_id": "9d8a6abe77405aec7ccc19c2b24000b62c0be5de",
"branch_name": "refs/heads/main",
"committer_date": 1610462324000,
"content_id": "9c2bf133fa0020fff06362ff2e3c2cc64bc78662",
"detected_licenses": [
"MIT"
],
"directory_id": "cc915f1af58f78bb7769e99b54605d573a8c5426",
"extension": "py",
"file... | 2.359375 | stackv2 | import sys
from os import walk
import imghdr
import csv
import argparse
import logging
from sqlalchemy import exc
from flask import Flask, redirect, url_for, request
from flask import render_template
from flask import send_file
from flask_sqlalchemy import SQLAlchemy
app = Flask(__name__)
app.config['SEND_FILE_MAX_A... | 132 | 31.99 | 166 | 28 | 1,176 | python | [{"finding_id": "codeql_py/path-injection_3e553e65570625e4_6f8c0b7a", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
103
] | [
null
] | [
22
] | [
32
] | |
2024-11-18T21:33:30.502829+00:00 | 1,389,728,018,000 | 2e10bb264c5d2a7a4f0d77c211ac7f9b8331a919 | 3 | {
"blob_id": "2e10bb264c5d2a7a4f0d77c211ac7f9b8331a919",
"branch_name": "refs/heads/master",
"committer_date": 1389728018000,
"content_id": "e8e9b78599113ced9dc09985326b366d741c7264",
"detected_licenses": [
"Unlicense"
],
"directory_id": "b19d99f082a013b92f131443433e5fe683d7e136",
"extension": "py",... | 2.6875 | stackv2 | #!/usr/bin/env python
import re
import sys
from youtube_dl.extractor import YoutubeIE
from youtube_dl.utils import (
compat_urllib_request
)
class Downloader(object):
def __init__(self):
self.params = {}
def report_warning(self, msg):
sys.stderr.write(msg + u'\n')
def to_screen(sel... | 36 | 22.81 | 76 | 13 | 216 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_e50f2751f75de11c_356f8782", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'ytimg.com/', so it might match more... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'ytimg.com/', so it might match more hosts than expected."
] | [
32
] | [
null
] | [
23
] | [
48
] | |
2024-11-18T21:33:36.931028+00:00 | 1,593,918,590,000 | 2d8ec468f4a13de00ec0b96dd605b0e399539ff2 | 2 | {
"blob_id": "2d8ec468f4a13de00ec0b96dd605b0e399539ff2",
"branch_name": "refs/heads/master",
"committer_date": 1593918590000,
"content_id": "662f63570897543e3ad111215cbcdf0a751e6eb4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2d08dba1ce740b657b6ecbba57fcbde7d18f0ecb",
"extension": "py"... | 2.5 | stackv2 | import gevent
from gevent import monkey, pool
from lxml import etree
monkey.patch_all()
import requests
from proxy.save_proxy import SaveProxies
from tools.logger import Logger
logger = Logger(__name__).logger
class CheckProxies(object):
def __init__(self):
self.http_url = 'http://www.net.cn/static/cu... | 72 | 29.4 | 132 | 18 | 569 | python | [{"finding_id": "codeql_py/request-without-cert-validation_9f7794fc243f6c8c_affa1223", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
43
] | [
null
] | [
19
] | [
101
] | |
2024-11-18T21:33:42.354024+00:00 | 1,580,305,807,000 | 792a6ff972c875dd61df615e86a3c025d8df262d | 3 | {
"blob_id": "792a6ff972c875dd61df615e86a3c025d8df262d",
"branch_name": "refs/heads/master",
"committer_date": 1580305807000,
"content_id": "d23c2c4c249263537dcdd552d384879aaf3084bf",
"detected_licenses": [
"MIT"
],
"directory_id": "9c51e396480d8139a2dc25ff338dae0a23100a8a",
"extension": "py",
"fi... | 2.75 | stackv2 | import requests
from bs4 import BeautifulSoup as bs
from flask import Flask, request
# Starts flask app
app = Flask(__name__)
def parse(html):
'''Parse the html to retrieve ingredients and instructions
Arguments:
html {String} -- a giant string of the page source
Return:
results {triplet} -- a tiplet consis... | 68 | 21.85 | 94 | 16 | 384 | python | [{"finding_id": "codeql_py/full-ssrf_228773e077da853f_b3e303d7", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
48
] | [
null
] | [
9
] | [
29
] | |
2024-11-18T23:15:51.449625+00:00 | 1,496,913,682,000 | d6f4538e6a9489fdb0dc5a5aa0aae127b40aef17 | 3 | {
"blob_id": "d6f4538e6a9489fdb0dc5a5aa0aae127b40aef17",
"branch_name": "refs/heads/master",
"committer_date": 1496913682000,
"content_id": "fa4cf21314080463d0c6aef4e6bdbbd571e1baa1",
"detected_licenses": [
"MIT"
],
"directory_id": "e2cefc848c417334f7ba12d2a3875dfb55b151be",
"extension": "py",
"fi... | 2.765625 | stackv2 | import random
import string
import hashlib
import s
def make_salt():
return "".join(random.choice(string.letters) for i in range(5))
def hash_pw(user, pw, salt=""):
salt = make_salt() if salt == "" else salt
h = hashlib.sha256(s.secret + user + pw + salt).hexdigest()
return "%s|%s" % (h, salt)
def... | 33 | 21.33 | 67 | 14 | 211 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_509faa68ad3eab77_28162873", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
25
] | [
null
] | [
21
] | [
45
] | |
2024-11-18T23:15:54.306540+00:00 | 1,565,279,621,000 | d65209ea3fd2a200bd6ab884ba95ea77c4383a55 | 2 | {
"blob_id": "d65209ea3fd2a200bd6ab884ba95ea77c4383a55",
"branch_name": "refs/heads/master",
"committer_date": 1565279621000,
"content_id": "10eaad9fac91fea63e4ad6fa74c444b63b70674e",
"detected_licenses": [
"MIT"
],
"directory_id": "ed49aff8d5b2fbda13c36a32100ed2157467b559",
"extension": "py",
"fi... | 2.46875 | stackv2 | import os
import sys
import logging
import multiprocessing
import time
from flask import Flask, request, jsonify
from flask_cors import CORS
import io
from io import BytesIO
from PIL import Image
import cv2
import numpy as np
from worker import get_model_api
# define the app
app = Flask(__name__)
CORS(app) # neede... | 132 | 23.57 | 90 | 13 | 809 | python | [{"finding_id": "codeql_py/flask-debug_4f4f9bd40b74b11c_0e8a909b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-022",
"CWE-117",
"CWE-117"
] | [
"py/flask-debug",
"py/path-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-p... | [
132,
55,
66,
56
] | [
null,
null,
null,
null
] | [
5,
15,
26,
22
] | [
59,
23,
63,
46
] | |
2024-11-18T23:36:59.591980+00:00 | 1,430,453,001,000 | 50112d6d638f758ffe6cdc65ee2f0397437ca3d0 | 3 | {
"blob_id": "50112d6d638f758ffe6cdc65ee2f0397437ca3d0",
"branch_name": "refs/heads/master",
"committer_date": 1430453001000,
"content_id": "147c9944d16476cd1a85cda3d88c5f2fec871c8c",
"detected_licenses": [
"MIT"
],
"directory_id": "5cb934a22e2eea6c723a409198b5607caf895b51",
"extension": "py",
"fi... | 2.6875 | stackv2 | import os
import tornado.ioloop
import tornado.web
import tornado.autoreload
from tornado.options import define, options, parse_command_line
from metar.Metar import Metar
import requests
from aloft import winds_aloft
BASE_PATH = os.path.dirname(os.path.realpath(__file__))
BASE_ADDR = 'http://weather.noaa.gov/pub/dat... | 76 | 24.68 | 81 | 15 | 501 | python | [{"finding_id": "codeql_py/partial-ssrf_15fa2677771e86a8_4006fe28", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
20,
22
] | [
null,
null
] | [
8,
9
] | [
60,
67
] | |
2024-11-18T21:14:12.672578+00:00 | 1,654,964,971,000 | bd12fb9c5b5f188c8f30047487445aab791c32dc | 2 | {
"blob_id": "bd12fb9c5b5f188c8f30047487445aab791c32dc",
"branch_name": "refs/heads/master",
"committer_date": 1654964971000,
"content_id": "4a0fa16511aa82eb13fbd6b411c41d22ab986bc1",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "3d673506e870b028bd3d3c977965d262dab823a7",
"extension": "p... | 2.46875 | stackv2 | #!/usr/bin/env python3
# -*- coding: UTF-8 -*-
import datetime
import hashlib
import logging
import time
import json
import os
from gettext import gettext as _
from social_sqlalchemy.storage import JSONType, SQLAlchemyMixin
from sqlalchemy import Boolean, Column, DateTime, ForeignKey, Integer, String
from sqlalchemy.... | 316 | 29.73 | 101 | 19 | 2,401 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_bc88a67d526a29ff_47dd105d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorith... | [
144,
149
] | [
null,
null
] | [
25,
29
] | [
42,
57
] | |
2024-11-18T21:57:30.288570+00:00 | 1,684,855,168,000 | 62f026a32e0a5810c091f5d96999eb4eebd1568c | 3 | {
"blob_id": "62f026a32e0a5810c091f5d96999eb4eebd1568c",
"branch_name": "refs/heads/master",
"committer_date": 1684855168000,
"content_id": "8966543d57bb111718b12255eabcd235fe6d8388",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9ba8cae790007f12664c6e4432dab007600a7e61",
"extension": "py"... | 2.6875 | stackv2 | ## Author: John Pierce
## Contributor: Rod Soto
from paramiko import SSHClient, AutoAddPolicy, RSAKey
import argparse
import os
parser = argparse.ArgumentParser()
parser.add_argument("-f", "--file", help="Text file containing one filename per line.")
parser.add_argument("-n", "--name", help="The name of a single fil... | 62 | 33 | 119 | 11 | 508 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_77c312c893966d9c_23eddf86", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
39
] | [
null
] | [
null
] | [
49
] | |
2024-11-18T21:57:58.314982+00:00 | 1,659,274,852,000 | cfaab04ee1d77e9d90fb86bd807a302c29809a3e | 3 | {
"blob_id": "cfaab04ee1d77e9d90fb86bd807a302c29809a3e",
"branch_name": "refs/heads/master",
"committer_date": 1659274852000,
"content_id": "9e90671ca2083a7b44930194f535b30334d47b73",
"detected_licenses": [
"MIT"
],
"directory_id": "e15c230fe218cf0dbf3d93131736e1f2386bff9a",
"extension": "py",
"fi... | 2.578125 | stackv2 | from .base import Patient
import numpy as np
from scipy.integrate import ode
import pandas as pd
from collections import namedtuple
import logging
import pkg_resources
logger = logging.getLogger(__name__)
Action = namedtuple("patient_action", ['CHO', 'insulin'])
Observation = namedtuple("observation", ['Gsub'])
PATI... | 316 | 31.07 | 92 | 23 | 2,964 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9bf0be3a9b12cf8f_4a1cabb2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
199
] | [
200
] | [
26
] | [
35
] | |
2024-11-18T21:58:04.128562+00:00 | 1,565,310,300,000 | c4010a495c24ddd18e0767ffd4617997204f5155 | 3 | {
"blob_id": "c4010a495c24ddd18e0767ffd4617997204f5155",
"branch_name": "refs/heads/master",
"committer_date": 1565310300000,
"content_id": "98620f3c74b2ef91ae9b614e9020d7a77aea81eb",
"detected_licenses": [
"MIT"
],
"directory_id": "fd6fb448af7777b2d54713a24457e6f187aaf09b",
"extension": "py",
"fi... | 3.078125 | stackv2 | '''
Created on Aug 11, 2014
@author: Sai Chaitanya
'''
# Run the program by passing an argument <abc.py> arg_url
# parse the url and search for a string/url and get the list of urls
# append the urls to domain name to get the final result
import sys
from bs4 import BeautifulSoup
import re
from urllib2 import urlopen
... | 64 | 58.28 | 168 | 20 | 826 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_0b76f03e6f4b0903_c3ba2e3d", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'stanford.edu/', so it might match m... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'stanford.edu/', so it might match more hosts than expected."
] | [
59
] | [
null
] | [
77
] | [
104
] | |
2024-11-18T21:58:37.062500+00:00 | 1,481,346,338,000 | 3b4a18a10464bf003eba2151f103fbd753022fcb | 2 | {
"blob_id": "3b4a18a10464bf003eba2151f103fbd753022fcb",
"branch_name": "refs/heads/master",
"committer_date": 1481346338000,
"content_id": "9474c83816abe06a3ff7f4c1895688301f400de6",
"detected_licenses": [
"MIT"
],
"directory_id": "abbf0387c2631171c90fd90a4582ba8de3457864",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python3
# -*- coding:utf-8 -*-
# date: 2016/12/10
from os import mkdir, path, chdir, getcwd
from re import search,sub
import requests
from bs4 import BeautifulSoup
domain = 'http://cloud.oracleoaec.com'
login_url = "{domain}{uri}".format(domain=domain, uri='/user/login')
# 替换账号密码为你自己的
# username = '1... | 120 | 31.94 | 80 | 27 | 974 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c2601c8151c399b4_dac01bd6", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
97
] | [
null
] | [
45
] | [
69
] | |
2024-11-18T23:10:58.573818+00:00 | 1,573,411,223,000 | 4712f13276c3335a1d741070a90e69d08896b823 | 2 | {
"blob_id": "4712f13276c3335a1d741070a90e69d08896b823",
"branch_name": "refs/heads/master",
"committer_date": 1573411223000,
"content_id": "2df522ceb9c3b2c5aea4b93768e9f04389bf20b2",
"detected_licenses": [
"MIT"
],
"directory_id": "3ebedf6b10e33df77c3390e781bfe326b892e4bb",
"extension": "py",
"fi... | 2.34375 | stackv2 | """Main server script for ColorDJ."""
import io
import requests
from flask import Flask, request
from twilio.twiml.messaging_response import MessagingResponse
from colortovision import get_image_attributes, get_playlist_ids
from playlist import make_playlist
app = Flask(__name__)
@app.route("/sms", methods=['GET'... | 42 | 26.45 | 76 | 13 | 245 | python | [{"finding_id": "codeql_py/flask-debug_ec521d128e530d17_02efa44a", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"The full URL of this request depends on a [user-provided value](1)."
] | [
42,
23
] | [
null,
null
] | [
5,
17
] | [
24,
40
] | |
2024-11-18T23:11:00.061837+00:00 | 1,655,761,753,000 | 469b17d79100a3005ea742e9dfe085050e3d7593 | 2 | {
"blob_id": "469b17d79100a3005ea742e9dfe085050e3d7593",
"branch_name": "refs/heads/master",
"committer_date": 1655761753000,
"content_id": "065721780191682b341fa835958e12bfa68e7d8b",
"detected_licenses": [
"MIT"
],
"directory_id": "c60b9f10747be3644a46baa6cfc47b3575e773ec",
"extension": "py",
"fi... | 2.375 | stackv2 | import os
import re
import numpy as np
class AnyWriter:
def __init__(self, template_directory='config/anybody_templates/', output_directory='../output/Anybody/'):
self._template_directory = template_directory
self._output_directory = output_directory
self.mapping = {
'Finger1'... | 267 | 43.94 | 118 | 22 | 2,831 | python | [{"finding_id": "codeql_py/redos_9a37b4c6e51fbf5a_0e51a055", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '{{9.' and containing many repetit... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '{{9.' and containing many repetitions of '999.'."
] | [
46
] | [
null
] | [
54
] | [
57
] | |
2024-11-18T22:05:57.668609+00:00 | 1,419,946,894,000 | 64294a5c1a62319f089f6808612ab26fd608f960 | 3 | {
"blob_id": "64294a5c1a62319f089f6808612ab26fd608f960",
"branch_name": "refs/heads/master",
"committer_date": 1419946894000,
"content_id": "99927bf53e54a51f51e6681da1e738e142d6b7ae",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "3f36e29b020abb1c9108bdd760c9ae7419927b5d",
"extension": "p... | 2.921875 | stackv2 | from django.db import models
import hashlib, datetime
class Zip(models.Model):
filename = models.CharField(max_length=20, primary_key=True)
password = models.CharField(max_length=40)
date_created = models.DateTimeField(auto_now_add=True)
def encrypt(self, text):
h = hashlib.sha1()
h.u... | 21 | 29.29 | 64 | 11 | 138 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_bb096fde87c7b34f_df7e81b9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
13
] | [
null
] | [
18
] | [
22
] | |
2024-11-18T22:05:59.600656+00:00 | 1,406,107,239,000 | 0acd352db8265fbee6b568ec2552cd14d02160a1 | 3 | {
"blob_id": "0acd352db8265fbee6b568ec2552cd14d02160a1",
"branch_name": "refs/heads/master",
"committer_date": 1406107239000,
"content_id": "d907904c152eeecb3b4f19d9e034489baf2cc952",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5c9134d03d75a93f39f05ca6f281ab5073ff82c7",
"extension": "py"... | 2.65625 | stackv2 | '''
Applications can request permissions on the following items:
Photos/video/docs: permissions for photos/videos/docs posted.
Articles: permissions for articles.
Contact: permissions on the contacts.
Profile: permissions on the user's profile.
The requested permission can be:
read : grant... | 358 | 33.24 | 107 | 18 | 2,715 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_35e8b9cad26d746c_d36e57a9", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text."
] | [
87
] | [
null
] | [
18
] | [
34
] | |
2024-11-18T22:36:01.529998+00:00 | 1,523,139,046,000 | f0d28ccab458b87068c2748f8850c1084ed37f12 | 3 | {
"blob_id": "f0d28ccab458b87068c2748f8850c1084ed37f12",
"branch_name": "refs/heads/master",
"committer_date": 1523139046000,
"content_id": "a631176fdc8bae2f06d18c0670ec13446e73afea",
"detected_licenses": [
"MIT"
],
"directory_id": "30b90919bf243dae64da31ae4af79065fe3f0cd1",
"extension": "py",
"fi... | 2.5625 | stackv2 | #!/usr/bin/env python
'''
File name: database.py
Author: Joke Durnez
Date created: 02/08/2018
Date last modified: 02/08/2018
Python Version: 2.7
Description: Functions to deal with DICOMs for psychosis project
Project: Psychosis
'''
import pandas as pd
import numpy as np
import argparse
im... | 192 | 39.16 | 112 | 23 | 1,877 | python | [{"finding_id": "codeql_py/tarslip_261a060201b1b9ef_6de199c5", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
44
] | [
null
] | [
9
] | [
16
] | |
2024-11-18T22:48:22.900441+00:00 | 1,549,116,045,000 | 29d7b4df30fbff6e155873a824e65e99cf7489ab | 3 | {
"blob_id": "29d7b4df30fbff6e155873a824e65e99cf7489ab",
"branch_name": "refs/heads/master",
"committer_date": 1549116045000,
"content_id": "a90e0bba7b73543ed2485c1dd919d0c4e3367190",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "72504bf6deaadf09635b6dcff2ed8613ee6e2e2d",
"extension": "py"... | 3.3125 | stackv2 | class Student(object):
gender = "男"
def __init__(self, age, name):
self.age = age
self.name = name
stu = Student(20, "antares")
print(stu.name)
print(stu.age)
print(stu.gender)
print(Student.gender)
# stu.gender = "女"
Student.gender = "女"
print(stu.gender)
print(Student.gender)
print(id(stu),id... | 17 | 20.88 | 40 | 9 | 103 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cf2058f7772d491f_48708585", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive dat... | [
10,
11,
14,
15
] | [
null,
null,
null,
null
] | [
7,
7,
7,
7
] | [
17,
21,
17,
21
] | |
2024-11-18T22:49:08.668150+00:00 | 1,533,612,652,000 | 0cbdf366433e262e7fb0bfabab65df3e3e0225b2 | 3 | {
"blob_id": "0cbdf366433e262e7fb0bfabab65df3e3e0225b2",
"branch_name": "refs/heads/master",
"committer_date": 1533612652000,
"content_id": "7dd16988384e3e224a92f7aa3479b04f0a7834ac",
"detected_licenses": [
"MIT"
],
"directory_id": "48b749c0ddd1d212d99cca760d806f46e7ac4dfa",
"extension": "py",
"fi... | 2.75 | stackv2 | # 作者: Charles
# 公众号: Charles的皮卡丘
# youtube视频下载:
# -https://www.youtube.com/
import os
import re
import click
import urllib
import requests
from contextlib import closing
'''
Input:
-url: 视频地址
-savepath: 视频下载后保存的路径
-app: 在cmd窗口运行还是在Demo中调用该类
Output:
-返回下载响应码
'''
class youtube():
def __init__(self):
self.header... | 74 | 28.14 | 136 | 24 | 690 | python | [{"finding_id": "codeql_py/request-without-cert-validation_2c37a79486b632ca_89c5d758", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
46,
59
] | [
null,
null
] | [
17,
16
] | [
92,
91
] | |
2024-11-18T23:26:04.160741+00:00 | 1,594,850,037,000 | 6fba82fb5f8520edad88b82be9bd45d5e0c09d9a | 4 | {
"blob_id": "6fba82fb5f8520edad88b82be9bd45d5e0c09d9a",
"branch_name": "refs/heads/master",
"committer_date": 1594850037000,
"content_id": "87c880af986f7c56dc79bb52c007de88df6687e0",
"detected_licenses": [
"MIT"
],
"directory_id": "0e61110cb32e384bcb1919602f198cc719f38d5d",
"extension": "py",
"fi... | 3.53125 | stackv2 | ###################################
# Dis Python #
# Much Use #
# Very Doge #
###################################
# By C Shi <icydoge@gmail.com> #
###################################
KEYBOARD = [[1, 2, 3], [4, 5, 6], [7, 8, 9]]
KEYBOARD2 = [[None, None... | 54 | 30.09 | 169 | 15 | 482 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3107a8c1d4824ced_fb43b834", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
53
] | [
null
] | [
11
] | [
60
] | |
2024-11-18T23:26:07.450882+00:00 | 1,559,683,846,000 | e554ce5d89b05a42bd9be82fc1b1f3f3760e939b | 3 | {
"blob_id": "e554ce5d89b05a42bd9be82fc1b1f3f3760e939b",
"branch_name": "refs/heads/master",
"committer_date": 1559683846000,
"content_id": "cb8c12b6f39669b6d5d1a576a6f598d29ff87bab",
"detected_licenses": [
"MIT"
],
"directory_id": "f1e0f8662f92ce38626b912dc6026b45d6dbe50e",
"extension": "py",
"fi... | 2.671875 | stackv2 | import os
import hashlib
import binascii
import hmac
import base64
import sqlite3
from sqlite3 import Error, IntegrityError, OperationalError
from manager import db_path
from db.injection import escape_sql_injection
def valid_login(username, password, saved_hmac):
conn = sqlite3.connect(db_path)
crsr = con... | 126 | 32.7 | 118 | 14 | 984 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_5a8aa5105f67807b_4d08c6b1", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
28
] | [
null
] | [
34
] | [
49
] | |
2024-11-18T23:26:17.485139+00:00 | 1,581,256,328,000 | 9aaaeb39859bd03287e1ecfb62a178ededfaf7ae | 2 | {
"blob_id": "9aaaeb39859bd03287e1ecfb62a178ededfaf7ae",
"branch_name": "refs/heads/master",
"committer_date": 1581256328000,
"content_id": "0849b2cd70452faa3f84834b7be9a05bc2e4bff9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "137ed7a1f413d11fac6e559039267fd0b1bad6b1",
"extension": "py"... | 2.390625 | stackv2 | from flask import Flask, jsonify, request
from flask_restful import Api, Resource
from pymongo import MongoClient
import bcrypt
import numpy
import subprocess
import json
import requests
import pdb
app = Flask(__name__)
api = Api(app)
client = MongoClient('mongodb://localhost:27017')
# client = MongoClient('mongodb:/... | 142 | 27.2 | 101 | 15 | 840 | python | [{"finding_id": "codeql_py/full-ssrf_c93c6da3d0f7c83c_bdeeb7d1", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
82
] | [
null
] | [
27
] | [
50
] | |
2024-11-18T22:27:25.404812+00:00 | 1,693,205,634,000 | 0a6f6baeb15bdd97890636ae1c09a4eb44255bc1 | 2 | {
"blob_id": "0a6f6baeb15bdd97890636ae1c09a4eb44255bc1",
"branch_name": "refs/heads/main",
"committer_date": 1693205634000,
"content_id": "e47ae096f2e5557d5ac1e98ab3da6d034edd4dc8",
"detected_licenses": [
"MIT"
],
"directory_id": "7eb7aa60a927cadf83cef5dee105c5ba6a159f3d",
"extension": "py",
"file... | 2.40625 | stackv2 | #create LDIF file from config.ini
import configparser
import random
config = configparser.ConfigParser(strict=False)
config.read('config.ini')
#read global settings
configuration=config['globalsettings']
useRandomOrganizations=configuration['useRandomOrganizationAndUsers']
if useRandomOrganizations == "yes":
#g... | 236 | 28.1 | 112 | 14 | 1,684 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6b16ea4d726abf49_f7f3996c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
143,
81,
91
] | [
null,
null,
101
] | [
11,
7,
7
] | [
15,
20,
4
] | |
2024-11-18T22:27:41.553033+00:00 | 1,523,775,755,000 | 4f08ed6443cf3c2091e5857aa66c95f1ba1236fa | 3 | {
"blob_id": "4f08ed6443cf3c2091e5857aa66c95f1ba1236fa",
"branch_name": "refs/heads/master",
"committer_date": 1523775755000,
"content_id": "24c68dcc1858624c6b6be36c61b2a510afbe081b",
"detected_licenses": [
"MIT"
],
"directory_id": "cfab087990e40fcad225feea8e7b7f49b55fe214",
"extension": "py",
"fi... | 2.609375 | stackv2 | import sys
import paramiko
# Define global variables
ssh_ip = '192.168.1.115'
ssh_user = 'root'
ssh_pwd = 'toor'
def ssh_command(ip, user, passwd, command):
client = paramiko.SSHClient()
#client.load_host_keys('...')
client.set_missing_host_key_policy(paramiko.AutoAddPolicy)
try:
client.c... | 34 | 24.06 | 64 | 14 | 216 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_ec2ec3715b695bad_33cbd5d1", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
13
] | [
null
] | [
5
] | [
63
] | |
2024-11-18T22:14:43.393699+00:00 | 1,572,370,315,000 | cbdf8523b0e3b7fc25b4b5f5d055214e60d34e95 | 3 | {
"blob_id": "cbdf8523b0e3b7fc25b4b5f5d055214e60d34e95",
"branch_name": "refs/heads/master",
"committer_date": 1572370315000,
"content_id": "7292938216b10251ce0e8c37ecf8ad13bbf8f53b",
"detected_licenses": [
"MIT"
],
"directory_id": "9e8259d1cb8f0d8657bdd281d618f13c0c7eb66c",
"extension": "py",
"fi... | 3.046875 | stackv2 | #!/usr/bin/python3
# Autor : Marc Sànchez Pifarré
# Programa de codificació
# IN :
# - bookName -> Nom de fitxer a codificar
# - encodedFile -> Nom de fitxer a on desar el text codificat
# - password -> Paraula de pas o clau per a la codificació
# OUT :
# - A encodedFile hi ha el text de bookName xifrat amb la clau ... | 50 | 22.92 | 91 | 10 | 349 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d5fbc516ae0e9254_97339ea4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
50
] | [
null
] | [
7
] | [
91
] | |
2024-11-18T22:14:50.613138+00:00 | 1,570,216,986,000 | 08165bf45e063f5f2b1d3511e95e3e8c492d6bb0 | 3 | {
"blob_id": "08165bf45e063f5f2b1d3511e95e3e8c492d6bb0",
"branch_name": "refs/heads/master",
"committer_date": 1570216986000,
"content_id": "5f8b440b4976be25a6a625d205f210bfe51bec25",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "e5602c50b3331ec517b3d81f8a4de2b1ebd0e1b6",
"extension": "p... | 2.625 | stackv2 | """ Starting point for DEM retrieval utilities.
"""
from sys import stderr
from math import floor, log
from os import unlink, close, write, chmod, makedirs
from os.path import basename, exists, isdir, join
from httplib import HTTPConnection, HTTPSConnection
from urlparse import urlparse
from tempfile import mkstemp
fro... | 160 | 26.11 | 96 | 14 | 1,275 | python | [{"finding_id": "codeql_py/overly-permissive-file_09ea48a609e60c89_40263e92", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable."
] | [
108,
145
] | [
null,
null
] | [
9,
9
] | [
29,
30
] | |
2024-11-18T22:15:00.909234+00:00 | 1,529,463,535,000 | 1f7b8a4c81e5f02593a19c396cb072a59ef55615 | 3 | {
"blob_id": "1f7b8a4c81e5f02593a19c396cb072a59ef55615",
"branch_name": "refs/heads/master",
"committer_date": 1529463535000,
"content_id": "d3f31a0d3162e8a323027f5b7aa79f67b04cbf18",
"detected_licenses": [
"BSD-3-Clause",
"MIT"
],
"directory_id": "29ebcdc46570470fcaefab87b274f137b4643e92",
"ext... | 2.671875 | stackv2 | import codecs
import warnings
import string
try:
maketrans = string.maketrans
except AttributeError:
# On Python3 we get it from bytes.
maketrans = bytes.maketrans
import six
from ldaptor import md4, config
lower = b'abcdefghijklmnopqrstuvwxyz'
upper = lower.upper()
toupper= maketrans(lower, upper)
de... | 107 | 24.37 | 84 | 18 | 732 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_538a3dc8456d1192_59c1eb5e", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptograph... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used."
] | [
106
] | [
null
] | [
11
] | [
35
] | |
2024-11-18T22:15:06.221872+00:00 | 1,592,583,554,000 | 8f85fd0387a018b06dc5ed1310e53619a162c576 | 4 | {
"blob_id": "8f85fd0387a018b06dc5ed1310e53619a162c576",
"branch_name": "refs/heads/master",
"committer_date": 1592583554000,
"content_id": "5e7a14d73e76207118306531e54eeb91730997a6",
"detected_licenses": [
"MIT"
],
"directory_id": "3e5438ff2957def8d7f3933e4ca163d1616cdbfc",
"extension": "py",
"fi... | 3.515625 | stackv2 | from operator import itemgetter
def read_profiles(filename):
profiles_list = list()
profiles_dict = dict()
with open(filename,'r') as profiles_file:
for profile_line in profiles_file:
profile = dict()
profile_info = profile_line.strip().split(',')
profile['... | 72 | 37.29 | 125 | 14 | 503 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0579013372011c0a_29aaf6d9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
33,
47
] | [
34,
null
] | [
15,
42
] | [
94,
61
] | |
2024-11-18T23:55:40.697939+00:00 | 1,488,482,296,000 | ee52313a2726a343572ce4ee8c9910e22f9f7a1b | 3 | {
"blob_id": "ee52313a2726a343572ce4ee8c9910e22f9f7a1b",
"branch_name": "refs/heads/master",
"committer_date": 1488482296000,
"content_id": "b5ab6eb0fcafbcf36575dfaa4718317fed049dda",
"detected_licenses": [
"MIT"
],
"directory_id": "1d757538df8e68cc80572665aac8b1af3c7d972c",
"extension": "py",
"fi... | 2.5625 | stackv2 | import urllib
import json
import hashlib
import re
import ssl
sslCtx = ssl.create_default_context()
sslCtx.check_hostname = False
sslCtx.verify_mode = ssl.CERT_NONE
# if urllib fails
class NetworkError(Exception):
pass
# we got redirected to login page
class NotLoggedIn(Exception):
pass
# credentials ... | 150 | 30.03 | 90 | 17 | 1,076 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_f458d802dd7251f3_2b57f8f6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
88
] | [
null
] | [
50
] | [
68
] | |
2024-11-18T23:55:49.347199+00:00 | 1,467,017,511,000 | 61761f97ef214ece77bf949e189e1ac617963bbc | 2 | {
"blob_id": "61761f97ef214ece77bf949e189e1ac617963bbc",
"branch_name": "refs/heads/master",
"committer_date": 1467017511000,
"content_id": "491ec51e17a22e223b3088e320568a2ca4764429",
"detected_licenses": [
"MIT"
],
"directory_id": "230da7b9a8d9a2bef4159fb954dcbb880472499b",
"extension": "py",
"fi... | 2.453125 | stackv2 | # coding:utf-8
from __future__ import print_function
import boto3
import datetime
import json
import logging
from urllib2 import Request, urlopen, URLError, HTTPError
# set your own environment
HOOK_URL = 'https://hooks.slack.com/services/xxxxxxxxxxxxxxxx'
SLACK_CHANNEL = '#xxxxxxxxxx'
logger = logging.getLogger()
lo... | 64 | 30.77 | 118 | 13 | 463 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_25d4652407cd69e1_46b1b934", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text."
] | [
52
] | [
null
] | [
45
] | [
63
] | |
2024-11-19T00:07:04.288603+00:00 | 1,570,913,371,000 | d503611df49a95460bfc6033ede7fd0f17ecc143 | 3 | {
"blob_id": "d503611df49a95460bfc6033ede7fd0f17ecc143",
"branch_name": "refs/heads/master",
"committer_date": 1570913371000,
"content_id": "3f4b9351f71888b8c917e863af86f4325d582e5b",
"detected_licenses": [
"MIT"
],
"directory_id": "057a607ddb52af665130efa819e9e4c00d57bf75",
"extension": "py",
"fi... | 3.375 | stackv2 |
# A very simple Flask Hello World app for you to get started with...
from flask import Flask, request, Response
import json
from os import path
app = Flask(__name__)
sorted_data = []
@app.route('/data', methods=["GET","POST","PATCH"])
def hello_world():
try:
if request.method == "POST":
d... | 52 | 33.15 | 104 | 19 | 379 | python | [{"finding_id": "codeql_py/stack-trace-exposure_86f8bd8f0c68903a_ff6780bf", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
50
] | [
null
] | [
25
] | [
31
] | |
2024-11-19T00:07:11.602868+00:00 | 1,636,508,262,000 | cab84f05962ef8c1f89bfa762a7f6f68a7819879 | 3 | {
"blob_id": "cab84f05962ef8c1f89bfa762a7f6f68a7819879",
"branch_name": "refs/heads/main",
"committer_date": 1636508262000,
"content_id": "74ff1202fec78e6c67576c55bdc240c0776f5760",
"detected_licenses": [
"MIT"
],
"directory_id": "d16ef1bb7c237a901601163af939c735349cbc8a",
"extension": "py",
"file... | 3.046875 | stackv2 | import os
from Crypto.Cipher import AES
from Crypto.Util.Padding import pad
from Crypto.Util.strxor import strxor
from secret import flag
class AESNOC:
def __init__(self, key: bytes, iv: bytes):
self.iv = iv
self.key = key
self.block_size = AES.block_size
def encrypt(self, plaintext... | 63 | 23.41 | 62 | 15 | 381 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_eeea901939a80f78_7a4d75f7", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
27
] | [
null
] | [
17
] | [
34
] | |
2024-11-19T00:45:06.573070+00:00 | 1,570,708,183,000 | 0af2a80674619f5e563dd2e1cb581529b996119f | 2 | {
"blob_id": "0af2a80674619f5e563dd2e1cb581529b996119f",
"branch_name": "refs/heads/master",
"committer_date": 1570708183000,
"content_id": "db9725c667605a3e0e6ce0e7e9e63aaba26a0e66",
"detected_licenses": [
"MIT"
],
"directory_id": "abe2f2f5a78813b3e98d79c75a9c15888df91243",
"extension": "py",
"fi... | 2.390625 | stackv2 | """A module that defines Airflow DAGS for dataset pipelines."""
import json
import logging
import time
from datetime import timedelta
from airflow import DAG
from airflow.hooks.postgres_hook import PostgresHook
from airflow.models import Variable
from airflow.operators.python_operator import PythonOperator
from jinj... | 439 | 34.01 | 114 | 23 | 3,128 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3f332c6a255e9ea3_14dc825d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
165,
330
] | [
null,
null
] | [
37,
28
] | [
63,
53
] | |
2024-11-18T23:28:31.354338+00:00 | 1,448,119,639,000 | 3d89ecac3371eb2ca1ec16108bb142fda3427b76 | 2 | {
"blob_id": "3d89ecac3371eb2ca1ec16108bb142fda3427b76",
"branch_name": "refs/heads/master",
"committer_date": 1448119639000,
"content_id": "1e0da85117a1e6e2d4330f8148cd52bbd0f93f7d",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "59fbda0d069078fc00a7e150cbf10beb28ce1d87",
"extension": "p... | 2.453125 | stackv2 | # -*- coding: UTF-8 -*-
#
# Copyright (c) 2014, Yung-Yu Chen <yyc@solvcon.net>
#
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are met:
#
# - Redistributions of source code must retain the above copyrigh... | 379 | 34.45 | 80 | 15 | 3,360 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_bad429d6050594d8_a24b55e8", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
137
] | [
null
] | [
9
] | [
73
] | |
2024-11-18T23:39:43.782141+00:00 | 1,589,228,165,000 | d2d34975d38c9467769a5532b0827ed465239409 | 2 | {
"blob_id": "d2d34975d38c9467769a5532b0827ed465239409",
"branch_name": "refs/heads/master",
"committer_date": 1589228165000,
"content_id": "4b7db621a708df50157a666caa37e26b46d47bc2",
"detected_licenses": [
"MIT"
],
"directory_id": "6152f6fd09410f2315e3cf970bf2d71359480521",
"extension": "py",
"fi... | 2.421875 | stackv2 | import ast
import os
class ParametersLoader:
def __init__(self, config):
self.config = config
self.general_params = self.return_parameters("general")
self.load_save_params = self.return_parameters("load_and_save")
self.model_params = self.return_parameters("model")
'''add ... | 71 | 43.32 | 104 | 15 | 522 | python | [{"finding_id": "codeql_py/overly-permissive-file_e7f3e6e49b84781f_5dbf2453", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
56
] | [
null
] | [
21
] | [
47
] | |
2024-11-19T00:19:23.493820+00:00 | 1,485,180,890,000 | 001fda6fb11fb86837ad37d17c6be6d006280e48 | 2 | {
"blob_id": "001fda6fb11fb86837ad37d17c6be6d006280e48",
"branch_name": "refs/heads/master",
"committer_date": 1485180890000,
"content_id": "e89b59f6218d449183199d83482f094f30842f03",
"detected_licenses": [
"MIT"
],
"directory_id": "2551500c9a520221bd07f32f1c6fbd7001c6182c",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!/usr/bin/env python3
# coding: utf-8
from bottle import error, route, response, request, run, default_app
from enum import Enum
from json import dumps
import datetime
import hashlib
import os
import subprocess
__basedir__ = os.path.abspath(os.path.dirname(__file__))
class Auth(Enum):
success = 0
invalid = ... | 206 | 24.28 | 174 | 17 | 1,314 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_76a6ccde62322bb9_4189f48c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
53
] | [
null
] | [
32
] | [
53
] | |
2024-11-19T01:11:18.417391+00:00 | 1,653,254,333,000 | f49b45fb497a8d46d74a40f3b9dfb4356f4d82f8 | 2 | {
"blob_id": "f49b45fb497a8d46d74a40f3b9dfb4356f4d82f8",
"branch_name": "refs/heads/master",
"committer_date": 1653254333000,
"content_id": "0708f81e59a1cec473a0af4515a519f749069868",
"detected_licenses": [
"MIT"
],
"directory_id": "86110b35c99bbce34cd50f55a5ca8cf51bc3ccbb",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/env python3
import json
import os
import sys
from jinja2 import Environment, FileSystemLoader
from weasyprint import HTML
dir_path = os.path.dirname(os.path.realpath(__file__))
env = Environment(
loader=FileSystemLoader(os.path.abspath(os.path.join(dir_path, os.pardir)))
)
with open('cv.json', 'r', ... | 34 | 24.35 | 79 | 14 | 213 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3651de618d82e444_32ddb6b8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
11
] | [
13
] | [
7
] | [
2
] | |
2024-11-19T01:11:34.034379+00:00 | 1,629,547,739,000 | 925da46e4de94fd516f5a41399b81d8b66b57d0f | 3 | {
"blob_id": "925da46e4de94fd516f5a41399b81d8b66b57d0f",
"branch_name": "refs/heads/master",
"committer_date": 1629547739000,
"content_id": "b87006a59962a1f518044e76d807f2cd97a12e2f",
"detected_licenses": [
"MIT"
],
"directory_id": "662723f6a5237d8c3b2ee0dfc525f868100932ee",
"extension": "py",
"fi... | 2.703125 | stackv2 | import requests
from flask import render_template, request, abort
def index():
return render_template('index.html')
def user():
try:
username = request.form["username"]
if username is None or username == '':
return abort(404, '[ERROR] username not find')
res = requests.ge... | 24 | 24.83 | 70 | 12 | 131 | python | [{"finding_id": "codeql_py/partial-ssrf_29e01f3665d7fce7_4e7b0eb0", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
14
] | [
null
] | [
15
] | [
71
] | |
2024-11-19T01:11:36.805946+00:00 | 1,586,621,809,000 | 7a10906753f0c97765f15b1b1d0be5c02ab9094a | 3 | {
"blob_id": "7a10906753f0c97765f15b1b1d0be5c02ab9094a",
"branch_name": "refs/heads/master",
"committer_date": 1586621809000,
"content_id": "df3e5931cf494ea6fc01ba5131f2461eb4ad6353",
"detected_licenses": [
"MIT"
],
"directory_id": "d0a47f6ca3643d629fb0233bb4aaa324c9709002",
"extension": "py",
"fi... | 2.640625 | stackv2 | import pandas as pd
import configparser
import json
import glob
import os
from loguru import logger
from vectorizer import Vectorizer
import pickle
import urllib
import re
class DataIO(object):
def __init__(self, config_path="config.cfg", autoload=True):
self.config_path = config_path
self.autoloa... | 132 | 37.03 | 157 | 17 | 1,113 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_b35006581039fdab_caa5eaf8", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'amazonaws.com/', so it might match ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'amazonaws.com/', so it might match more hosts than expected."
] | [
37
] | [
null
] | [
42
] | [
110
] | |
2024-11-18T23:46:50.057041+00:00 | 1,418,046,597,000 | 41eb17025f6faa07503100d84ab042374a6b307f | 3 | {
"blob_id": "41eb17025f6faa07503100d84ab042374a6b307f",
"branch_name": "refs/heads/master",
"committer_date": 1418046597000,
"content_id": "c13251caf0ff9887ff5fcefd7b274f66bd7f914e",
"detected_licenses": [
"MIT"
],
"directory_id": "f7da9677dbea61d7d9fa7a430cf8aa5e79e4f2de",
"extension": "py",
"fi... | 2.765625 | stackv2 | import requests
from pyslaquery import exception as pyslaquery_exceptions
class SlackAPIConnection(object):
"""
Logic abstraction around requests module and connectivity to Slack API.
"""
def __init__(self, base, token):
self.base = base
self.token = token
def create_post_request... | 53 | 28.87 | 77 | 14 | 341 | python | [{"finding_id": "codeql_py/request-without-cert-validation_22604423f3793339_f9b5792e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
25,
48
] | [
null,
null
] | [
18,
18
] | [
63,
63
] | |
2024-11-18T23:46:50.299991+00:00 | 1,560,433,816,000 | e8cd05a61e01a9d2643ee0fcf7f172f458e155a2 | 3 | {
"blob_id": "e8cd05a61e01a9d2643ee0fcf7f172f458e155a2",
"branch_name": "refs/heads/master",
"committer_date": 1560433816000,
"content_id": "4949d70b6f66344535c724aad9433c9c150f170f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "473923c3e0ebbaea5c013b2ab3ce3680c2735ac8",
"extension": "py"... | 2.5625 | stackv2 | """Uploader utility functions."""
import pickle
import hashlib
import hmac
import json
import logging
import os
import shutil
from resolwe.utils import BraceMessage as __
def get_upload_id(session_id, file_uid, secret_key):
"""Return the session identifier used by the request."""
# NOTE: This code path is us... | 147 | 33.56 | 87 | 20 | 1,177 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_340e8cd2b9a5afc9_43d80e62", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](3) is used in a hashing algorithm (SHA1) that is insecure.",
"[Sensitive data (id)](1) is used in a hashing algorit... | [
32,
34
] | [
null,
null
] | [
24,
30
] | [
45,
51
] | |
2024-11-18T23:48:09.706981+00:00 | 1,607,689,533,000 | c3020f1fe89e32551b4ca3bd21aa140ede23ed5c | 3 | {
"blob_id": "c3020f1fe89e32551b4ca3bd21aa140ede23ed5c",
"branch_name": "refs/heads/main",
"committer_date": 1607689533000,
"content_id": "47832feb0451bc9ee22599d10a207a0f0a31babe",
"detected_licenses": [
"MIT"
],
"directory_id": "bc3c4f7fe038a2d1305813ee026ba699a673cd67",
"extension": "py",
"file... | 2.890625 | stackv2 | from random import SystemRandom
from Cryptodome.Cipher import PKCS1_OAEP
from Cryptodome.Util import number
from Cryptodome.PublicKey import RSA
from Cryptodome.Cipher import AES
from Cryptodome.Util.Padding import pad
import time
import os
##################### AUXILIARY FUNCTIONS ###########################
# use ... | 293 | 29.51 | 97 | 16 | 2,447 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_912a638f30177cb9_9ce8bf36", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
201,
212,
263
] | [
null,
null,
null
] | [
26,
13,
13
] | [
57,
44,
35
] | |
2024-11-19T00:29:35.180687+00:00 | 1,637,845,390,000 | cd640e14e3c2ee695a3f7aff2d4b6aac22412d59 | 2 | {
"blob_id": "cd640e14e3c2ee695a3f7aff2d4b6aac22412d59",
"branch_name": "refs/heads/master",
"committer_date": 1637845390000,
"content_id": "e8525ea3141cfaebb7c6b61dfc80891a7d04b872",
"detected_licenses": [
"MIT"
],
"directory_id": "1fd3ed9bc67d3eea37b587e94741a94e9d745c7e",
"extension": "py",
"fi... | 2.34375 | stackv2 | from lxml import html
from requests import Session, Request
class Attributes(object):
""" Page objects """
session = Session()
def request(self, url):
""" Return page object """
if (url.startswith('http://') or url.startswith('https://')
and "gearbest.com" in url):
... | 176 | 42.5 | 95 | 30 | 1,476 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_cb746bff9bca3f7e_48894b7a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [gearbest.com](1) may be at an arbitrary position in th... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [gearbest.com](1) may be at an arbitrary position in the sanitized URL."
] | [
12
] | [
null
] | [
17
] | [
38
] | |
2024-11-18T23:23:32.729332+00:00 | 1,477,961,756,000 | a3e5539d046c8e2a936de3c646ab4f62ae4e3279 | 2 | {
"blob_id": "a3e5539d046c8e2a936de3c646ab4f62ae4e3279",
"branch_name": "refs/heads/master",
"committer_date": 1477961756000,
"content_id": "12d4e1fee71c0b76f724608d685dfe29a701979c",
"detected_licenses": [
"MIT"
],
"directory_id": "e3f0974988c13bca2b8b56caba98ec04a16fbbbd",
"extension": "py",
"fi... | 2.46875 | stackv2 | #coding=utf-8
import hashlib
import urllib
#请替换appkey和secret
appkey = "XXXXXXXX"
secret = "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"
apiUrl = "http://api.dianping.com/v1/business/find_businesses"
#示例参数
paramSet = []
paramSet.append(("format", "json"))
paramSet.append(("city", "上海"))
paramSet.append(("latitude", "31.21524"))... | 51 | 21.55 | 62 | 11 | 352 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_927edbd66458f3e3_684b66de", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
39
] | [
null
] | [
22
] | [
27
] | |
2024-11-18T23:05:26.410775+00:00 | 1,472,850,296,000 | 593d0997c115909c158e585b5c52d60a0fd53756 | 2 | {
"blob_id": "593d0997c115909c158e585b5c52d60a0fd53756",
"branch_name": "refs/heads/master",
"committer_date": 1472850296000,
"content_id": "8195789f774b372cc57e6ded1373afa3e2dd0c40",
"detected_licenses": [
"MIT"
],
"directory_id": "fe328aa4eaf907be3808d2e5a5815fb336f38d09",
"extension": "py",
"fi... | 2.484375 | stackv2 | from lxml import etree
from src.Player import Player, Video
import praw
import re
import pickle
r = praw.Reddit("filling the database")
def contains_video_link(text):
return "oddshot" in text or "youtu.be" in text or "twitch.tv" in text or "youtube" in text
def get_url(submission):
text = submission.selfte... | 132 | 34.23 | 118 | 23 | 952 | python | [{"finding_id": "codeql_py/overly-large-range_8431dd3e3469f287_26f38839", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
17
] | [
null
] | [
54
] | [
57
] | |
2024-11-18T23:05:30.922070+00:00 | 1,593,371,329,000 | 22fbc8fab09dea0e24577b6af07f06fede4275e0 | 3 | {
"blob_id": "22fbc8fab09dea0e24577b6af07f06fede4275e0",
"branch_name": "refs/heads/master",
"committer_date": 1593371329000,
"content_id": "30e95dde0640f3bd46753cce85dfec265d1332d4",
"detected_licenses": [
"MIT"
],
"directory_id": "af5638be901ff0036edde49d4793054ef80ea073",
"extension": "py",
"fi... | 3.46875 | stackv2 | from random import randint
version = 0.1
name = "P455w0Rd G3neRaT0r"
# Choices
letters = "abcdefghjiklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ"
umlauts = "åäöÅÄÖ"
numbers = "1234567890"*5
symbols = "!@#%&=?"*7
# Welcome message
print(f"Welcome to the {name} version: {version}")
# Main loop
while True:
# reset m... | 43 | 26.37 | 67 | 16 | 352 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2c789e3a0029fc92_0d95ba1e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
33
] | [
null
] | [
15
] | [
47
] | |
2024-11-19T00:11:48.127442+00:00 | 1,490,558,418,000 | 8304a66e678f3a7b13390aef1e751bc4cb7699ee | 2 | {
"blob_id": "8304a66e678f3a7b13390aef1e751bc4cb7699ee",
"branch_name": "refs/heads/master",
"committer_date": 1490558418000,
"content_id": "f0f6891fa02e44494c71106728d3722df76b1897",
"detected_licenses": [
"MIT"
],
"directory_id": "a4f106feac3b81dfb71cd634efcac0625e57d903",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!/usr/bin/env python
import os
import jinja2
import webapp2
from models import WineData
from google.appengine.ext import blobstore
from google.appengine.api import images
from google.appengine.api import users
from google.appengine.ext.webapp import blobstore_handlers
winepy_dir = os.path.join(os.path.dirname(__file_... | 219 | 37.86 | 101 | 15 | 1,888 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_60ae68f6c982eb9f_4ad128ce", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
12
] | [
null
] | [
13
] | [
93
] | |
2024-11-19T00:11:50.641568+00:00 | 1,546,826,522,000 | feb87001b10e30519aa7618f5d27a65df9c1dc22 | 3 | {
"blob_id": "feb87001b10e30519aa7618f5d27a65df9c1dc22",
"branch_name": "refs/heads/master",
"committer_date": 1546826522000,
"content_id": "6631ad2e31540f945fa6499a15353161115b94d1",
"detected_licenses": [
"MIT"
],
"directory_id": "ff385a281f2ff95e0b32858293c086a5c8e0df93",
"extension": "py",
"fi... | 2.609375 | stackv2 | from flask import Flask, jsonify, make_response
import json
import os
import requests
import settings
app = Flask(__name__)
DB_PATH = os.path.dirname(os.path.dirname(os.path.realpath(__file__)))
with open('{}/db/users.json'.format(DB_PATH), "r") as jsf:
USER_LIST = json.load(jsf)
@app.route("/", meth... | 65 | 22.86 | 73 | 15 | 347 | python | [{"finding_id": "codeql_py/reflective-xss_15215853056ce78b_0586a712", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-918"
] | [
"py/reflective-xss",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
55,
43
] | [
null,
46
] | [
16,
15
] | [
20,
11
] | |
2024-11-19T00:36:56.479639+00:00 | 1,551,348,818,000 | 03aa31ee41b79fecf030c1192c2bc399d7ff0899 | 2 | {
"blob_id": "03aa31ee41b79fecf030c1192c2bc399d7ff0899",
"branch_name": "refs/heads/master",
"committer_date": 1551348818000,
"content_id": "7675748d44ae1989e9a247604e550246434181e4",
"detected_licenses": [
"MIT"
],
"directory_id": "9a9a42b213563caf966fbff61c8625196d77f7e2",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/env python2
# -*- coding: utf-8 -*-
#
# Author: Eric Vandecasteele 2018
# http://blog.onlinux.fr
#
#
# Import required Python libraries
import os
import logging
import logging.config
from thermostat import Thermostat
from thermostat import Constants
from hermes_python.hermes import Hermes
from snipshelpers... | 246 | 37.59 | 129 | 25 | 2,151 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7157e4c0ca6f332f_4f54306d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
86
] | [
null
] | [
18
] | [
52
] | |
2024-11-19T00:36:57.835772+00:00 | 1,562,581,730,000 | 151b77aeb440c157bf3e1efde0d5cc9e854160c6 | 2 | {
"blob_id": "151b77aeb440c157bf3e1efde0d5cc9e854160c6",
"branch_name": "refs/heads/master",
"committer_date": 1562581730000,
"content_id": "361901bbb77a6d4edf6638aecfb1961072195cdd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3b5d4a92c8eabf36400e9541eeb38b8e0bae87c2",
"extension": "py"... | 2.390625 | stackv2 | #!/usr/bin/env python3
import argparse, sys, logging, re, json, urllib.parse
from subprocess import check_output, STDOUT
logger = logging.getLogger('sample')
verbose = 0
host = ''
def call_api(api, cmd):
if verbose > 0:
logger.info(api + ': cmd=' + cmd)
try:
resp_str = check_output(cmd, shell... | 108 | 36.54 | 115 | 19 | 1,044 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_97635b3eaad9a21a_eacb5e8f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
12
] | [
null
] | [
21
] | [
41
] | |
2024-11-19T00:37:02.871082+00:00 | 1,624,131,104,000 | b9befb4eae525122c40aace3e1cca0ed64c6213f | 2 | {
"blob_id": "b9befb4eae525122c40aace3e1cca0ed64c6213f",
"branch_name": "refs/heads/master",
"committer_date": 1624131104000,
"content_id": "76b68bc76d0f71cb0ceaa6c3e9fe2dc93251dd3a",
"detected_licenses": [
"MIT"
],
"directory_id": "e8c286341691ee07142b9d8f2510d344cab3747e",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/env python
import json
import traceback
import time
import sys
import threading
import imp
from cStringIO import StringIO
from SocketServer import ThreadingMixIn
from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler
PORT = 8004
def log(text):
print "[Python] %s" % text
class HTTPHandler(BaseH... | 81 | 33.94 | 122 | 23 | 626 | python | [{"finding_id": "codeql_py/code-injection_9ec6dbf727f6758e_e005359f", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 2 | true | [
"CWE-094",
"CWE-094"
] | [
"py/code-injection",
"py/code-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1).",
"This code execution depends on a [user-provided value](1)."
] | [
59,
60
] | [
null,
null
] | [
30,
30
] | [
80,
49
] | |
2024-11-18T23:49:53.821894+00:00 | 1,622,045,839,000 | 1e41f74bcb9a0236813a1b521285d3a3bcd7c94e | 3 | {
"blob_id": "1e41f74bcb9a0236813a1b521285d3a3bcd7c94e",
"branch_name": "refs/heads/main",
"committer_date": 1622045839000,
"content_id": "fab0b4d921ffc2f728fd358e4751cda2845af4d2",
"detected_licenses": [
"MIT"
],
"directory_id": "a6ccb05d0b8a7c3df0547599e07af39e6978a248",
"extension": "py",
"file... | 2.65625 | stackv2 | from requests import Session
class Luca():
def __init__(self) -> None:
self.logged_in = False
self.mute = False
self.s = Session()
self.s.headers.update({"User-Agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:88.0) Gecko/20100101 Firefox/88.0",
'Accept': '*/*',
'Accept-Language': 'en-... | 147 | 24.03 | 124 | 16 | 1,069 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7aa0a4500caf6446_709f6955", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
37
] | [
null
] | [
9
] | [
13
] | |
2024-11-18T23:50:01.202205+00:00 | 1,591,204,399,000 | 39fa3dee435fce45720ad8e211528f21a3b97e60 | 3 | {
"blob_id": "39fa3dee435fce45720ad8e211528f21a3b97e60",
"branch_name": "refs/heads/master",
"committer_date": 1591204399000,
"content_id": "c7c4031e42998c63338eff74bfe042627eae5e91",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5a982702e5fff41127db966f7dd4f4f1368671f6",
"extension": "py"... | 2.875 | stackv2 | import requests
import datetime
import time
from time import strptime
from datetime import timedelta, datetime
import os
from flask import Flask, render_template, request
app = Flask(__name__)
@app.route('/', methods=['GET', 'POST'])
def city_weather():
if request.method == 'POST':
city_name = request.fo... | 49 | 26.29 | 95 | 15 | 315 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fa383304e6da370f_0b278c48", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-918"
] | [
"py/clear-text-logging-sensitive-data",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
29,
22
] | [
null,
null
] | [
11,
16
] | [
19,
51
] | |
2024-11-19T00:13:39.560704+00:00 | 1,622,735,508,000 | 31e303b4015b8c4e9bc8807903f1fac7548d7f0c | 3 | {
"blob_id": "31e303b4015b8c4e9bc8807903f1fac7548d7f0c",
"branch_name": "refs/heads/main",
"committer_date": 1622735508000,
"content_id": "e2248fa4aa3e5ef04ffae6506c11a6ca2d5ede6d",
"detected_licenses": [
"MIT"
],
"directory_id": "3de935f78bbbf8d26cec8b3ee422aa050fde0e6d",
"extension": "py",
"file... | 2.96875 | stackv2 | """ Implementation of :py:class:`Dataset` object. A folder containing a set of subjects with CT and RS in dicom format
is converted into nii format. A new folder is created keeping the same organization.
"""
import os
import numpy as np
from dcmrtstruct2nii import dcmrtstruct2nii, list_rt_structs
class Dataset:
... | 111 | 35.79 | 118 | 23 | 915 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8e7b69bcddd01d41_539c05b1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
93,
109
] | [
null,
null
] | [
19,
23
] | [
82,
75
] | |
2024-11-19T01:26:12.344047+00:00 | 1,691,610,427,000 | 397c8cf35a78e362236f945c0af2a1e3560350ce | 3 | {
"blob_id": "397c8cf35a78e362236f945c0af2a1e3560350ce",
"branch_name": "refs/heads/master",
"committer_date": 1691610427000,
"content_id": "96e7244cce06543f184d1786cd23ad2a92f6c1e4",
"detected_licenses": [
"MIT"
],
"directory_id": "ecf289b81f0e2486ab65c541fc8b6fd7f93a3109",
"extension": "py",
"fi... | 2.75 | stackv2 | """
Accepts Jamf Pro Computer IDs from an AWS SQS queue and unmanages them.
The list of computers should include machines that have not checked in
within a designated timeframe.
"""
import os
import json
import requests
import logging
import boto3
from botocore.exceptions import ClientError
from http.client import H... | 187 | 31.12 | 172 | 13 | 1,420 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e0643b2e3711d30a_4c982df7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
47,
64,
147
] | [
null,
null,
null
] | [
22,
18,
18
] | [
36,
41,
41
] | |
2024-11-19T01:39:57.409764+00:00 | 1,379,194,421,000 | d6c1a5f7dbffe1ea5a0e9506217a2952aca80808 | 3 | {
"blob_id": "d6c1a5f7dbffe1ea5a0e9506217a2952aca80808",
"branch_name": "refs/heads/master",
"committer_date": 1379194421000,
"content_id": "bedfc1ee7ac9b8729f886de2056a69fe1d3257f8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "09b6f1280920c5174a0aea0d44306f2321aafe42",
"extension": "py"... | 2.515625 | stackv2 | import traceback
import hashlib
import urlparse
import urllib
import cPickle
import cgi
import logging
from w3lib.url import safe_url_string
from requests import api, sessions, get, post, models
try: # Python 2.7+
from logging import NullHandler
except ImportError:
class NullHandler(logging.Handler):
... | 211 | 35.93 | 140 | 15 | 1,804 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_e732eea89299338c_8ecb7f92", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [yahoo.com](1) may be at an arbitrary position in the s... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [yahoo.com](1) may be at an arbitrary position in the sanitized URL."
] | [
204
] | [
null
] | [
28
] | [
51
] | |
2024-11-18T23:43:09.272523+00:00 | 1,684,833,259,000 | ce8ed3d00efe5b8ce10a667e5d4787b0cc4f4a2d | 3 | {
"blob_id": "ce8ed3d00efe5b8ce10a667e5d4787b0cc4f4a2d",
"branch_name": "refs/heads/master",
"committer_date": 1684833259000,
"content_id": "58f4d02da11e3836320db8a0adb67c5fbcee603b",
"detected_licenses": [
"MIT"
],
"directory_id": "61a5fa3e2ff47b4a163f32d18e7a02f09ccb061e",
"extension": "py",
"fi... | 2.703125 | stackv2 | """
This module adds a :class:`UsernameDigestToken` for use with SOAP services.
.. versionadded:: 0.2.0
"""
import hashlib
from base64 import b64encode
from datetime import datetime
from suds.sax.element import Element
from suds.wsse import UsernameToken
from suds.wsse import wssens
from suds.wsse import wsuns
cl... | 95 | 27.62 | 75 | 17 | 665 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_e4ab312ae4009fb9_8ccb4ffb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (password)](1) is used in a hashing algorithm (... | [
45,
72
] | [
null,
null
] | [
22,
18
] | [
34,
47
] | |
2024-11-18T23:43:31.027911+00:00 | 1,632,236,428,000 | b739a0235bce3afd701a79a234697f94069f6b60 | 3 | {
"blob_id": "b739a0235bce3afd701a79a234697f94069f6b60",
"branch_name": "refs/heads/main",
"committer_date": 1632236428000,
"content_id": "dddbe23eaac0e3102cce2ef3b8b6a64738f28f95",
"detected_licenses": [
"MIT"
],
"directory_id": "e93c6e93f612bca7f192adf539b4f489ad114ab5",
"extension": "py",
"file... | 2.953125 | stackv2 | import re
from random import choice
re_mac_address = r"^([0-9A-Fa-f]{2}[:-]?){5}([0-9A-Fa-f]{2})$"
re_ip_address = (
r"^(([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])\.){3}"
+ r"([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])$"
)
re_hostname = (
r"^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\-]*[a-zA-Z0-9])\.)... | 47 | 32.55 | 108 | 15 | 546 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0b26004fb44e1a5a_5e8b7cff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
35,
44
] | [
null,
null
] | [
11,
19
] | [
73,
93
] | |
2024-11-19T00:32:58.812568+00:00 | 1,631,854,394,000 | eec924f80aabf975f7d2306204c5ed6ee355a45f | 3 | {
"blob_id": "eec924f80aabf975f7d2306204c5ed6ee355a45f",
"branch_name": "refs/heads/master",
"committer_date": 1631854394000,
"content_id": "7a81ffa9f2e1487d3e116224eda7c1bad4f4e517",
"detected_licenses": [
"MIT"
],
"directory_id": "b2ff37406e50976b8db1c75bde4297f5039f7391",
"extension": "py",
"fi... | 2.6875 | stackv2 | from flask import Flask, render_template, request, redirect
app = Flask(__name__)
@app.route('/', methods=['GET', 'POST'])
def home():
if request.method == 'POST':
name = request.form.get('username')
age = request.form.get('age')
return redirect(f'/result/{name}/{age}')
# return r... | 21 | 24.71 | 61 | 12 | 122 | python | [{"finding_id": "codeql_py/flask-debug_f0ee2c020c8b224b_70e7f6a5", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
21,
11
] | [
null,
null
] | [
null,
25
] | [
20,
48
] | |
2024-11-19T00:33:02.308458+00:00 | 1,636,648,861,000 | 507d497e58134a2d84445cc9f3bfaf9045273ec5 | 2 | {
"blob_id": "507d497e58134a2d84445cc9f3bfaf9045273ec5",
"branch_name": "refs/heads/main",
"committer_date": 1636648861000,
"content_id": "5e64413bb4e61eb54b74edbf976a04a86a5fe557",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "f6db6c04704061b25fb86e3489dde95a97c28af8",
"extension": "py"... | 2.5 | stackv2 | from datetime import date
from getpass import getpass
from netmiko import ConnectHandler
username = input("Username: ").strip()
password = getpass("Password: ")
# You can press enter to leave enable password empty
enable_pass = getpass("Enable password: ")
with open("iplist.txt", "r") as f:
iplist = f.read().spl... | 41 | 29.95 | 82 | 17 | 290 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_05634c444230e9b7_24f177e9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive dat... | [
31,
37,
41
] | [
null,
null,
null
] | [
19,
15,
15
] | [
49,
64,
78
] | |
2024-11-19T00:33:06.746643+00:00 | 1,601,566,466,000 | dd60a0763b5f6dd795e05c5d0daf0f82b4908aaa | 3 | {
"blob_id": "dd60a0763b5f6dd795e05c5d0daf0f82b4908aaa",
"branch_name": "refs/heads/master",
"committer_date": 1601566466000,
"content_id": "575b909c9385382f3a2ece49fc019179bddaad1a",
"detected_licenses": [
"MIT"
],
"directory_id": "d173cc816e8f0bb3cb65e32b5f2eb2c2fdb9b1c5",
"extension": "py",
"fi... | 2.6875 | stackv2 | import os
import json
import requests
import tempfile
import traceback
from pydub import AudioSegment
from excp.exception import ConnectionLostException
from excp.exception import NotUnderstoodException
class Google_STT:
"""
This class uses Google's Speech to Text engine to convert passed flac(audio) to text... | 61 | 32.89 | 103 | 15 | 485 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2f16e5f47b43152b_2d3dba50", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
40,
56
] | [
null,
null
] | [
15,
19
] | [
47,
60
] | |
2024-11-19T01:18:03.976702+00:00 | 1,690,889,920,000 | 27800a214e6ddae8658a9d265e6c5a2663c53462 | 3 | {
"blob_id": "27800a214e6ddae8658a9d265e6c5a2663c53462",
"branch_name": "refs/heads/main",
"committer_date": 1690889920000,
"content_id": "4c6d702b271d0e1c480a6e4468b069252dfc8597",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "02be78d245f7c54ef5abc85829ad6df6b0e52cd3",
"extension": "py"... | 2.546875 | stackv2 | import argparse
import hashlib
import os
import platform
import sys
import tarfile
import textwrap
import warnings
import zipfile
from urllib.request import HTTPError, urlopen, urlretrieve
machine_map = {
"x86_64": "amd64",
}
def checksum_file(path):
"""Compute the sha256 checksum of a path"""
hasher = h... | 188 | 28.44 | 110 | 15 | 1,329 | python | [{"finding_id": "codeql_py/overly-permissive-file_4eef6bf3a3e39f4f_27248425", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
96
] | [
null
] | [
5
] | [
33
] | |
2024-11-19T00:02:46.017580+00:00 | 1,674,839,035,000 | 0df4ea928241447316ee70900f90ce82158b7fb2 | 2 | {
"blob_id": "0df4ea928241447316ee70900f90ce82158b7fb2",
"branch_name": "refs/heads/master",
"committer_date": 1674839035000,
"content_id": "3e55998dad8f397461d276494a3c3e4dc8836b30",
"detected_licenses": [
"MIT"
],
"directory_id": "ca27b4fa0ae958094827d3c6ef76f314008974d3",
"extension": "py",
"fi... | 2.390625 | stackv2 | import binascii
import logging
import os
from django.core.management.base import BaseCommand
from django.db import IntegrityError
from oidc_provider.models import Client
from oidc_provider.models import ResponseType
logger = logging.getLogger(__name__)
"""
Usage example:
kolibri manage oidccreateclient --name="hooo... | 91 | 32.85 | 116 | 16 | 596 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c144eda81017374b_31e8baa9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
76
] | [
78
] | [
17
] | [
18
] | |
2024-11-19T00:15:30.912296+00:00 | 1,489,921,508,000 | 2cca57a032a400b0146d91390505ef1447a4535d | 3 | {
"blob_id": "2cca57a032a400b0146d91390505ef1447a4535d",
"branch_name": "refs/heads/master",
"committer_date": 1489921508000,
"content_id": "0d20fa0d6540e259f3769c578995b228dac7d1fe",
"detected_licenses": [
"MIT"
],
"directory_id": "d9258ece16e39d83d2e7e38805456aa4510e29d7",
"extension": "py",
"fi... | 2.609375 | stackv2 | import discord
import asyncio
import os
import cv2
import numpy as np
import re
import math
from PIL import Image
import requests
from io import BytesIO
client = discord.Client()
face_cascade = cv2.CascadeClassifier('haarcascade_frontalface_alt.xml')
eye_cascade = cv2.CascadeClassifier('haarcascade_eye.xml')
img_face... | 162 | 28.51 | 124 | 17 | 1,191 | python | [{"finding_id": "codeql_py/overly-large-range_aa6931c43e360f82_0035f2e9", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
28
] | [
null
] | [
58
] | [
61
] | |
2024-11-19T00:15:31.296899+00:00 | 1,633,516,918,000 | 9e828ce6adfe94f57c3ad2d626e2fcd84d528838 | 4 | {
"blob_id": "9e828ce6adfe94f57c3ad2d626e2fcd84d528838",
"branch_name": "refs/heads/main",
"committer_date": 1633516918000,
"content_id": "8453e309d28d7e5498d05238196626cebf4cf144",
"detected_licenses": [
"MIT"
],
"directory_id": "be88287edb378ec24f00d85096977aa6e8cbdf32",
"extension": "py",
"file... | 3.984375 | stackv2 | import random
numbers = "0123456789"
upper = "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
lower = "abcdefghijklmnopqrstuvwxyz"
symbols = "[]{}()*;/,._-"
# Add the number, character and symbols
sum = lower + upper + numbers + symbols
# Ask the user to enter length of the password
length = int(input("Enter the password length: "))
#... | 20 | 21.75 | 50 | 9 | 110 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2166d7a17016f4b3_3662e4de", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
20
] | [
null
] | [
7
] | [
15
] | |
2024-11-19T00:25:32.139699+00:00 | 1,613,269,615,000 | 2977737f9b0cdee4207b7d68ae23572427ce0fdc | 2 | {
"blob_id": "2977737f9b0cdee4207b7d68ae23572427ce0fdc",
"branch_name": "refs/heads/main",
"committer_date": 1613269615000,
"content_id": "4a6f1740c8b033343ec237cdc029fa47e4b0f0f1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "42d4872c3d7e078c1418131df53569f1e16ff6e2",
"extension": "py",
... | 2.3125 | stackv2 | from flask import Flask, render_template, request, Markup, session, jsonify
from flask_wtf.csrf import CSRFProtect
from nornir_control import nornir_inv, nornir_run
import yaml
import traceback
import ydata
from os import urandom
from uuid import uuid4
app = Flask(__name__, template_folder='templates', static_folder=... | 102 | 27.31 | 84 | 15 | 704 | python | [{"finding_id": "codeql_py/stack-trace-exposure_1e9dab44c4b98b10_b228073f", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
101
] | [
null
] | [
20
] | [
36
] | |
2024-11-19T00:25:38.045230+00:00 | 1,566,318,516,000 | 7c83311f65068b3c1ea3c0305f28992077018538 | 3 | {
"blob_id": "7c83311f65068b3c1ea3c0305f28992077018538",
"branch_name": "refs/heads/master",
"committer_date": 1566318516000,
"content_id": "d2e1f2d273c9367051a2a39b1f0be920a1ea5202",
"detected_licenses": [
"Unlicense"
],
"directory_id": "1c4c3daf165c4e71de36748ac948704295be63b3",
"extension": "py",... | 3.15625 | stackv2 | from os import system
import psycopg2
from operation.connector import conn
from operation.validation.userValidation import (
employeeNameValidation as employee_name_validation)
from statement.sqlmainstatement import get_delete_data_statement
def delete_data(employee_name):
try:
connect = conn()
... | 40 | 30.75 | 69 | 13 | 255 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7416643446e62499_f05e2701", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
15,
24
] | [
null,
null
] | [
47,
41
] | [
60,
54
] | |
2024-11-19T00:15:59.912460+00:00 | 1,631,866,531,000 | b2e40c7f20d10d632864e521ef38a2d2a414237b | 3 | {
"blob_id": "b2e40c7f20d10d632864e521ef38a2d2a414237b",
"branch_name": "refs/heads/main",
"committer_date": 1631866531000,
"content_id": "76a74e30bd53e38c3422427114339512e7b46eab",
"detected_licenses": [
"MIT"
],
"directory_id": "a740129d5df4aba27660a556a818ef69182b4400",
"extension": "py",
"file... | 2.609375 | stackv2 | from seviceLayer.Managers.AuthorizationManager import AuthorizationManager
from repository.VerificationRepository import VerificationRepository
from Domain.models.RegisterUserDomainModel import RegisterUserDomainModel
import re
import datetime
import hashlib
class RegisterService:
repository: VerificationReposito... | 54 | 30.69 | 95 | 22 | 307 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b95aadf895eab250_cf797a9a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
27
] | [
null
] | [
51
] | [
83
] | |
2024-11-19T00:28:34.181733+00:00 | 1,628,083,880,000 | 99bfaf58252a24d8c9690832d9308086db2050a8 | 3 | {
"blob_id": "99bfaf58252a24d8c9690832d9308086db2050a8",
"branch_name": "refs/heads/main",
"committer_date": 1628083880000,
"content_id": "6a9c4f3b26950c956f32eb44359502fdb9fbf284",
"detected_licenses": [
"MIT"
],
"directory_id": "b8f31f5480418f1d06a49691cca6fd67d2ee6ff3",
"extension": "py",
"file... | 2.65625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
from flask import Flask, request, redirect, url_for, send_from_directory, render_template, make_response
from werkzeug.utils import secure_filename
import re
import os
import xml.sax
import base64
import pickle
UPLOAD_FOLDER = '.'
ALLOWED_EXTENSIONS = set(['xml'])
app = Fl... | 160 | 27.02 | 104 | 18 | 1,123 | python | [{"finding_id": "codeql_py/unsafe-deserialization_ce95fd78ae143585_7400966d", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio... | 14 | true | [
"CWE-502",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-022"
] | [
"py/unsafe-deserialization",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/pa... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Unsafe deserialization depends on a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vu... | [
150,
75,
84,
98,
104,
117,
121,
125,
129,
133,
63,
69,
138,
91
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
35,
10,
12,
10,
10,
10,
10,
10,
10,
10,
25,
25,
19,
13
] | [
67,
33,
34,
31,
38,
15,
31,
31,
31,
38,
36,
36,
43,
18
] | |
2024-11-19T02:00:48.205693+00:00 | 1,536,480,295,000 | c92c310f5b7cf334660e7d7dcf2a3e6cdf1ee6c4 | 3 | {
"blob_id": "c92c310f5b7cf334660e7d7dcf2a3e6cdf1ee6c4",
"branch_name": "refs/heads/master",
"committer_date": 1536480295000,
"content_id": "5dbf3aa93a996a751205dbe529cbd80b4e09a03a",
"detected_licenses": [
"MIT"
],
"directory_id": "de50888f6ecefa208e0103979eb84eae7c9014c3",
"extension": "py",
"fi... | 3.28125 | stackv2 | #! /usr/bin/env python3.6
from user import User
from profile import Profile
import string
import random
def create_user(username, password): #create user
''' Method that creates a user '''
new_user = User(username, password)
return new_user
def create_profile(account, password): #create profile
''' M... | 123 | 32.05 | 157 | 21 | 778 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_59cfaf711e059546_0bb2e104", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
72,
87,
95
] | [
null,
null,
null
] | [
19,
23,
31
] | [
110,
67,
130
] | |
2024-11-19T02:00:57.385009+00:00 | 1,524,542,118,000 | 23bdbeb143832a649022f647c5dc5f61c5759b91 | 3 | {
"blob_id": "23bdbeb143832a649022f647c5dc5f61c5759b91",
"branch_name": "refs/heads/master",
"committer_date": 1524542118000,
"content_id": "4ffbff85fa1a4f47cd8aa60f46d67a3444695a20",
"detected_licenses": [
"MIT"
],
"directory_id": "d78c550a715ff75045b71783afd8da7f3f208581",
"extension": "py",
"fi... | 2.734375 | stackv2 | from flask import Flask, render_template, request, make_response
app = Flask(__name__)
@app.route('/')
def index():
return render_template('index.html')
@app.route('/guardarcookie', methods=['POST'])
def guardarcookie():
if request.method == 'POST':
id = request.form['id']
respuesta = make_res... | 22 | 26.09 | 69 | 14 | 139 | python | [{"finding_id": "codeql_py/cookie-injection_5b550534c38af92e_1bac7f25", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "... | 2 | true | [
"CWE-020",
"CWE-079"
] | [
"py/cookie-injection",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cookie is constructed from a [user-supplied input](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
13,
19
] | [
null,
null
] | [
36,
12
] | [
38,
44
] | |
2024-11-19T02:00:58.392295+00:00 | 1,600,273,166,000 | 9fc43ed439650430f8041e92d90aab5b15996962 | 3 | {
"blob_id": "9fc43ed439650430f8041e92d90aab5b15996962",
"branch_name": "refs/heads/master",
"committer_date": 1600273166000,
"content_id": "47909418ff74a48e2eb90a9043e6e194f6092638",
"detected_licenses": [
"MIT"
],
"directory_id": "a297827b4cf213dfa65bd4d6627155cc10bd1bcf",
"extension": "py",
"fi... | 2.71875 | stackv2 | #run command "pip install -r requirements.txt" to install all the python dependencies required for these scripts
import pandas as pd
import json
import base64
import logging
import requests
import csv
import os
from requests.packages.urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_war... | 96 | 45.28 | 156 | 20 | 1,040 | python | [{"finding_id": "codeql_py/request-without-cert-validation_6383e5ab361cfa06_b882749b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
35,
39,
86
] | [
36,
40,
87
] | [
25,
21,
19
] | [
71,
75,
74
] | |
2024-11-19T00:27:19.840001+00:00 | 1,657,533,392,000 | 73cf09523a918c2408c69e70455c8e6d861a4b63 | 2 | {
"blob_id": "73cf09523a918c2408c69e70455c8e6d861a4b63",
"branch_name": "refs/heads/master",
"committer_date": 1657533392000,
"content_id": "ee01aa186ede9668722d235c87babd66ab888bdd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4ec5af4def6bb64d268795779ad2d5ebd2f02c27",
"extension": "py"... | 2.40625 | stackv2 | import binascii
import hashlib
import logging
import os
import string
from base64 import b64decode
from random import choice
import boto3
from botocore.exceptions import ClientError
from cfn_resource_provider import ResourceProvider
from past.builtins import basestring
import ssm_parameter_name
log = logging.getLog... | 276 | 33.38 | 102 | 19 | 1,967 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7ed415dec24724d1_541a3b3d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
219
] | [
null
] | [
37
] | [
67
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.