added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T21:25:48.065305+00:00 | 1,627,693,727,000 | 4dcef0b6efb2efaaf12aafe58687a17efabdc5ce | 2 | {
"blob_id": "4dcef0b6efb2efaaf12aafe58687a17efabdc5ce",
"branch_name": "refs/heads/master",
"committer_date": 1627693727000,
"content_id": "06a14c0f2c1f934a1d83878a7e250392ede0e0f6",
"detected_licenses": [
"MIT"
],
"directory_id": "6b8eb4e81eddfde60a747fe18cecd06833040ebc",
"extension": "py",
"fi... | 2.5 | stackv2 | __author__ = 'xiaozong zhou'
import base64
from flask import request
from flask import Flask
import mysql.connector as mysql
import os
import time
app=Flask(__name__, static_folder="./det_results_imgs") #建立一个flask app
fire_db = mysql.connect(
host = "localhost",
user = "",
password = "",
database = "",... | 105 | 23.89 | 73 | 15 | 707 | python | [{"finding_id": "codeql_py/sql-injection_dec92b69b3cd25d4_9b8fe518", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 4 | true | [
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089"
] | [
"py/sql-injection",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
54,
66,
85,
97
] | [
null,
null,
null,
null
] | [
26,
26,
26,
26
] | [
29,
29,
29,
29
] | |
2024-11-18T21:26:04.612030+00:00 | 1,526,412,969,000 | 98a0d7e22af939e4460944d0b2fd14c6d9095806 | 2 | {
"blob_id": "98a0d7e22af939e4460944d0b2fd14c6d9095806",
"branch_name": "refs/heads/master",
"committer_date": 1526412969000,
"content_id": "7b6a7b9ef5233bd6bb72fd76dd904782230aa244",
"detected_licenses": [
"MIT"
],
"directory_id": "a5ff734fa46bafc72e2e4e6f9599179c043ec03c",
"extension": "py",
"fi... | 2.5 | stackv2 | #coding: utf-8
from sqlite3 import dbapi2 as sqlite3
from flask import Flask, render_template, request, g, redirect
import requests
import json
import os
# Flask app
app = Flask(__name__)
app.config.from_object(__name__)
app.config.update(dict(
DATABASE=os.path.join(app.root_path, '../mcg_radio.db'),
BACKEN... | 196 | 26.04 | 97 | 19 | 1,225 | python | [{"finding_id": "codeql_py/full-ssrf_df677a2f3db8c7fc_b3f6f4f9", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
93
] | [
null
] | [
9
] | [
31
] | |
2024-11-18T21:51:46.863548+00:00 | 1,614,024,562,000 | e79a5f381894a89dcbc7f337e8a011f028ab9ccd | 2 | {
"blob_id": "e79a5f381894a89dcbc7f337e8a011f028ab9ccd",
"branch_name": "refs/heads/master",
"committer_date": 1614024562000,
"content_id": "565651eb1cb7ad17b47f61fb2cea5b59e2280a1d",
"detected_licenses": [
"MIT"
],
"directory_id": "c01d93505eabbc2f8d235fa395cf91f9f7b8e977",
"extension": "py",
"fi... | 2.375 | stackv2 | import jinja2, json, logging, os, yaml
class TenxApp(object):
config = None # class variable, used as a singleton for the app config
def __init__(self, config_fn=None):
'''
Tenx App with YAML Config
'''
if TenxApp.config is not None: raise Exception("Trying to re-initialize the ... | 108 | 40.14 | 144 | 15 | 1,090 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_31bb224f804cfdbb_2d9317c7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
26,
80,
100
] | [
null,
null,
null
] | [
31,
20,
18
] | [
56,
47,
43
] | |
2024-11-18T20:31:27.383154+00:00 | 1,671,170,306,000 | 6764232e287481c4c986ef45d567688b245bc4d6 | 3 | {
"blob_id": "6764232e287481c4c986ef45d567688b245bc4d6",
"branch_name": "refs/heads/master",
"committer_date": 1671170306000,
"content_id": "cc9bc9fa84a0c57b7fb814d5eeea92549b7fd21f",
"detected_licenses": [
"MIT"
],
"directory_id": "df93b012b717f2ef4e7b6f0979edd1f29bddcc5b",
"extension": "py",
"fi... | 3.4375 | stackv2 | from hashlib import md5
from typing import Optional, Tuple
TEST = 'abc'
PUZZLE = 'ffykfhsq'
def passwordCharacter(string: str) -> Optional[str]:
digest = md5(bytes(string, 'utf-8')).hexdigest()
if digest[:5] == '00000':
return digest[5]
def findPassword(string: str) -> str:
result = ''
i = ... | 55 | 23.91 | 64 | 13 | 420 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2d596c41785e0625_c5a855ee", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive... | [
40,
40,
53,
55
] | [
null,
null,
null,
null
] | [
19,
29,
7,
7
] | [
27,
37,
25,
25
] | |
2024-11-18T20:59:47.311681+00:00 | 1,386,217,492,000 | bcec0867b6f22d3d4cb6268f71a1bf7411668ff2 | 3 | {
"blob_id": "bcec0867b6f22d3d4cb6268f71a1bf7411668ff2",
"branch_name": "refs/heads/master",
"committer_date": 1386217492000,
"content_id": "4710d1e4f879afc6e30c38e4c6738ff93da5e12b",
"detected_licenses": [
"MIT"
],
"directory_id": "89097f0cce8a864f6f31ed30173489dda34dc68d",
"extension": "py",
"fi... | 2.84375 | stackv2 | import requests
from db_access import *
class UserData:
def __init__(self, uname, pword):
self.username = str(uname)
#Because eventually we shouldn't be storing passwords anywhere
self.password_hash = str(pword)
class LoginError(BaseException):
def __init__(self, reason):
se... | 36 | 26.08 | 70 | 13 | 225 | python | [{"finding_id": "codeql_py/request-without-cert-validation_4e5f3221cc86d301_54aa08e1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
25
] | [
null
] | [
19
] | [
67
] | |
2024-11-18T21:00:04.775455+00:00 | 1,575,363,146,000 | 4b4008346c46fc4f32882b30b8a66a588e640d6b | 2 | {
"blob_id": "4b4008346c46fc4f32882b30b8a66a588e640d6b",
"branch_name": "refs/heads/master",
"committer_date": 1575363146000,
"content_id": "b1da93f3161b010afacf831a12d97195745db48e",
"detected_licenses": [
"MIT"
],
"directory_id": "cf8bc9eef83ecbc29e7ccd15b072c405652b12bf",
"extension": "py",
"fi... | 2.359375 | stackv2 | # coding: utf-8
import csv
import io
from collections import defaultdict
from itertools import groupby
from dateutil.parser import parse
from django.db import transaction
from django.db.models import Count, Sum
from qsstats import QuerySetStats
from rest_framework import status
from rest_framework.exceptions import V... | 224 | 30.17 | 93 | 21 | 1,522 | python | [{"finding_id": "codeql_py/stack-trace-exposure_814231ac00183e61_b3a4038f", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
116
] | [
null
] | [
29
] | [
46
] | |
2024-11-18T21:10:26.072749+00:00 | 1,439,477,123,000 | 909d40006b2bd1c176e4b373b7160dc3d8f91e4a | 2 | {
"blob_id": "909d40006b2bd1c176e4b373b7160dc3d8f91e4a",
"branch_name": "refs/heads/master",
"committer_date": 1439477123000,
"content_id": "b7c7996dc1aa94c7c1956d0666332f1e76a75d09",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "52e62ab9322585c1125e99981377dda62c711022",
"extension": "py"... | 2.3125 | stackv2 | from flask import Flask
from SPARQLWrapper import SPARQLWrapper, JSON, Wrapper
from flask import request, jsonify
from flask.ext.cors import CORS
import base64
import logging
from logging import StreamHandler
app = Flask(__name__)
CORS(app)
file_handler = StreamHandler()
app.logger.setLevel(logging.DEBUG)
app.logge... | 73 | 27.55 | 76 | 18 | 477 | python | [{"finding_id": "codeql_py/stack-trace-exposure_3fa8aa34f23aa39d_3e9dfe71", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-117"
] | [
"py/stack-trace-exposure",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This log entry depends on a [user-provided value](1)."
] | [
54,
31
] | [
null,
null
] | [
32,
22
] | [
69,
27
] | |
2024-11-18T21:10:28.108206+00:00 | 1,527,299,245,000 | 2f657c4986c7dc3ae82ffdd9a9dd30d84e017c6c | 3 | {
"blob_id": "2f657c4986c7dc3ae82ffdd9a9dd30d84e017c6c",
"branch_name": "refs/heads/master",
"committer_date": 1527299245000,
"content_id": "c01d26f03f83e69c700ef0f8da9c60c27261812f",
"detected_licenses": [
"MIT"
],
"directory_id": "981f87e66d44c782f6814b852ba1c850507cf4bd",
"extension": "py",
"fi... | 2.875 | stackv2 | import hashlib
from Crypto.PublicKey import RSA
from Crypto.Util.randpool import RandomPool
class Encrypt:
def __init__(self):
self.private_key = None
self.public_key = None
self.outside_public_key = None
def generate_key(self):
pool = RandomPool(384)
pool.stir()
... | 45 | 29.29 | 92 | 12 | 302 | python | [{"finding_id": "codeql_py/weak-crypto-key_79b5014db6da63b8_9e84f65f", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
18
] | [
null
] | [
28
] | [
60
] | |
2024-11-18T21:10:48.894435+00:00 | 1,400,718,148,000 | 2c82bdad24dbea6485032d230d885cb012ea5759 | 2 | {
"blob_id": "2c82bdad24dbea6485032d230d885cb012ea5759",
"branch_name": "refs/heads/master",
"committer_date": 1400718148000,
"content_id": "2bf69c49811855aa9e59265d322dcd640eff54e7",
"detected_licenses": [
"MIT"
],
"directory_id": "43f05bd446af958b5dce292eff526e0687a1c22a",
"extension": "py",
"fi... | 2.484375 | stackv2 | # -*- coding: utf-8 -*-
from quick_server import serve_and_open
import urls
from os.path import dirname, abspath, join, isfile, isdir
from warnings import warn
from urllib2 import urlopen, HTTPError, URLError
import json
import os
import shutil
import appdirs
import re
from jinja2 import Environment, PackageLoader, T... | 332 | 38.57 | 93 | 20 | 2,759 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_1d1c30f3974f42b6_e0b377a8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
20
] | [
null
] | [
7
] | [
63
] | |
2024-11-18T21:23:45.374853+00:00 | 1,648,474,940,000 | a53fd7f9f7561d690a693106d252e40e7b086fd1 | 3 | {
"blob_id": "a53fd7f9f7561d690a693106d252e40e7b086fd1",
"branch_name": "refs/heads/master",
"committer_date": 1648474940000,
"content_id": "c4211859c644d0b4c9453f280cf1efed5d96c575",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d0475f5d01beff019a561e4c4f9c8cc82d6e1b36",
"extension": "py"... | 2.640625 | stackv2 | import datetime
from datetime import date
import requests
import cache
import config
import time
def get_all(daysFromNow, startDate):
results = []
for ii in range(0, daysFromNow):
targetDate = startDate + datetime.timedelta(days=ii)
queryFormattedDate = str(targetDate)
entries = lookup... | 94 | 27.44 | 115 | 15 | 623 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_af6ed4e0dc8315c2_130df82a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
42,
81
] | [
null,
null
] | [
54,
54
] | [
59,
59
] | |
2024-11-18T21:24:03.699550+00:00 | 1,524,395,481,000 | ad5dbd0eeb600c2756c442eb66785a6ecbea9f8c | 2 | {
"blob_id": "ad5dbd0eeb600c2756c442eb66785a6ecbea9f8c",
"branch_name": "refs/heads/master",
"committer_date": 1524395481000,
"content_id": "c1273140867f2aa115c4945e973db34422b6725d",
"detected_licenses": [
"MIT"
],
"directory_id": "c957313801c534b77d172646581c15c6fa5d8f3c",
"extension": "py",
"fi... | 2.46875 | stackv2 | import binascii
import glob
import hashlib
import json
import logging
import os
from flask import Flask, render_template, request, redirect, flash
from werkzeug.utils import secure_filename
import settings
logger = logging.getLogger(__name__)
app = Flask(__name__)
# global dictionary of music file hashes and names
... | 228 | 26.15 | 90 | 19 | 1,401 | python | [{"finding_id": "codeql_py/url-redirection_92ed5d373f6cc2d7_fd2af2c6", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
206
] | [
null
] | [
25
] | [
36
] | |
2024-11-18T21:37:41.198204+00:00 | 1,500,231,175,000 | adf135412dff3442946b6ba5b6b40976b3d14edd | 3 | {
"blob_id": "adf135412dff3442946b6ba5b6b40976b3d14edd",
"branch_name": "refs/heads/master",
"committer_date": 1500231175000,
"content_id": "451e8edc7485d4fa5356fd76a3ac7c89d7105cac",
"detected_licenses": [
"MIT"
],
"directory_id": "1f1f24089a4ba785f4113afb7413a25363f0eff7",
"extension": "py",
"fi... | 3.15625 | stackv2 | # -*- coding: utf-8 -*-
import hashlib
from base64 import b64encode
from datetime import datetime, timedelta
from urllib.parse import urlparse
def secure_link(baselink, secret, period=30):
"""
:param baselink: base url for signing
:param secret: secret string shared only with web server
:param perio... | 46 | 26.41 | 97 | 15 | 319 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_bea8cfbe2baeafb7_342f712f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure."
] | [
26
] | [
null
] | [
14
] | [
49
] | |
2024-11-18T21:59:02.327847+00:00 | 1,609,727,926,000 | 2ac5d7654856dd1b25b5f5f1589a0abe41211ecc | 2 | {
"blob_id": "2ac5d7654856dd1b25b5f5f1589a0abe41211ecc",
"branch_name": "refs/heads/main",
"committer_date": 1609727926000,
"content_id": "0d6ac3a560cf65ff9803c419c50806ffca2b4ea9",
"detected_licenses": [
"MIT"
],
"directory_id": "30bb636e46af62b2b7e8288e1261c2704fee62fc",
"extension": "py",
"file... | 2.375 | stackv2 | # -*- coding: utf-8 -*-
import os
import logging
import random
import re
from datetime import datetime, timedelta
from utils.classes import Cog
import discord
import pandas as pd
from discord.ext import commands
from sklearn.feature_extraction.text import TfidfVectorizer
from sklearn.linear_model import LogisticRegres... | 161 | 40.7 | 119 | 20 | 1,593 | python | [{"finding_id": "codeql_py/overly-large-range_58e8c5ab7c52399b_d997fb9f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[#$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].",... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[#$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
21
] | [
null
] | [
53
] | [
56
] | |
2024-11-18T21:59:02.668608+00:00 | 1,617,042,898,000 | 025b01a97be64a86cb23232b9f6799a472d06c07 | 2 | {
"blob_id": "025b01a97be64a86cb23232b9f6799a472d06c07",
"branch_name": "refs/heads/main",
"committer_date": 1617042898000,
"content_id": "d81e89165803e232a2485c65ae4e12b9ad3284cd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "180da96989f678f6a3600324fb1869bc94ee5352",
"extension": "py",
... | 2.46875 | stackv2 | #!/usr/bin/python3
# -*- coding: utf-8 -*-
"""
Raw parsing of a dash mpd to display human readable timing info
The script does not go into xml and loading data, it is sequential
$ python3 mpdtimeline.py [-f filename.mpd] [-o (inline/log)] [-url RepresentationID]
pip install python-dateutil
pip install isodate
Essent... | 281 | 43.74 | 161 | 23 | 2,962 | python | [{"finding_id": "codeql_py/request-without-cert-validation_deb7793881d6bea1_98484d96", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
70
] | [
71
] | [
9
] | [
22
] | |
2024-11-18T22:24:02.074320+00:00 | 1,685,091,293,000 | 996bacaea74da5dee489464d8076d34967c0922e | 3 | {
"blob_id": "996bacaea74da5dee489464d8076d34967c0922e",
"branch_name": "refs/heads/master",
"committer_date": 1685091293000,
"content_id": "5de57690d93b73d509f8ba566a0cfae1076cf587",
"detected_licenses": [
"MIT"
],
"directory_id": "34b5b947947ac9ce6e76799c40aad328252e7d8f",
"extension": "py",
"fi... | 2.6875 | stackv2 | """
Simply execute this file with python. Best use pipenv for the requirements,
i.e., pipenv run python3 compile.py
"""
import jinja2 as jinja2
from folder_compiler import FolderCompiler
from folder_compiler.processors import FileCopyProcessor, DevNullProcessor
from folder_compiler_static_website import HtmlProces... | 38 | 35.08 | 88 | 10 | 321 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_1414f934cbfa9522_c289b13f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
16
] | [
18
] | [
9
] | [
2
] | |
2024-11-18T22:24:07.869408+00:00 | 1,554,040,308,000 | f930d677916bd43f796eb934575c7dff826f3d7b | 3 | {
"blob_id": "f930d677916bd43f796eb934575c7dff826f3d7b",
"branch_name": "refs/heads/master",
"committer_date": 1554040308000,
"content_id": "3f95bc1f60d796a2ad24a871bfde25efa446e3a9",
"detected_licenses": [
"MIT"
],
"directory_id": "195c5edccf21d318f9be79454739b8c0f956faaf",
"extension": "py",
"fi... | 3.4375 | stackv2 | """Python script to generate fake data with the same format as the example data.
Fields relative to out algorithm (Working with children's check, driver, experience and gender)
are randomised with 50% chance.
Each 'mentor' will preference 4 out of the NUMCLASSES classes (1,2,3,4).
Each 'mentor' also has a ... | 73 | 41.67 | 156 | 24 | 1,002 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_7d7463c1f62f3510_aeecafe2", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
67
] | [
null
] | [
23
] | [
30
] | |
2024-11-18T22:24:09.178864+00:00 | 1,549,341,176,000 | d8c454eafde3d294c8d275591786b31b3d003509 | 3 | {
"blob_id": "d8c454eafde3d294c8d275591786b31b3d003509",
"branch_name": "refs/heads/master",
"committer_date": 1549341176000,
"content_id": "8e1998220a4734b0eae718117548b299d173bf04",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2fdbeec362aaab4c9dcc5153e9adef4ca3d515ee",
"extension": "py"... | 2.984375 | stackv2 | from turtle import *
import math
topdown = Turtle()
bgcolor('black')
topdown.shape('circle')
topdown.resizemode('auto')
gc = 266 + ((51+(6.2/60))/60)
star_tilt = 7.25
neptune_coors = (344 + (2 + (29.2/60))/60, -(58+(1.4/60))/60, 29.938)
pluto_coors = (336 + (2 + (29.2/60))/60, -(13 + (58+(1.4/60))/60), 41)
xrange = 72... | 339 | 24.17 | 112 | 13 | 2,962 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_00e300bc1d48b789_ee7c1c12", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priva... | [
170,
187
] | [
null,
null
] | [
11,
11
] | [
20,
20
] | |
2024-11-18T22:35:57.819631+00:00 | 1,589,924,543,000 | 89c51e3eba1feefa66fd51e6207fb49aa78aafce | 3 | {
"blob_id": "89c51e3eba1feefa66fd51e6207fb49aa78aafce",
"branch_name": "refs/heads/master",
"committer_date": 1589924763000,
"content_id": "e10e1eb4ee22dd2f382550f3b70518246a0eb7fe",
"detected_licenses": [
"MIT"
],
"directory_id": "66d74253e9e889e0376b83e129bfeae167c828a3",
"extension": "py",
"fi... | 2.6875 | stackv2 | import time
import random
from selenium import webdriver
from bs4 import BeautifulSoup as bs
import re
import csv
import getpass
# Ask user to type username and password
# Your login credentials
email = input("username[email id]: ") #your email id
password = getpass.getpass(prompt='Password: ', stream=None) # Your pa... | 80 | 34.62 | 106 | 15 | 661 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_38cc0d8c8c0a08f1_e72b654c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
66
] | [
null
] | [
22
] | [
28
] | |
2024-11-18T22:36:21.171474+00:00 | 1,596,551,647,000 | b1ec13875e4441e6f787d3c7ce527303a76d9595 | 3 | {
"blob_id": "b1ec13875e4441e6f787d3c7ce527303a76d9595",
"branch_name": "refs/heads/master",
"committer_date": 1596554391000,
"content_id": "704421937542f5722a31bf4c97b36b9eb7f4b55c",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "11717af92835c21bc02e417cdd5aa7566c4ef7cf",
"extension": "p... | 2.515625 | stackv2 | import ast
import asyncio
import re
from copy import deepcopy
import pyjq
from jinja2 import Environment, StrictUndefined, Template, meta
from pydantic import Field
from toucan_data_sdk.utils.helpers import slugify
# Query interpolation
RE_PARAM = r'%\(([^(%\()]*)\)s'
RE_JINJA = r'{{([^({{)}]*)}}'
RE_PARAM_ALONE = ... | 206 | 32.69 | 100 | 24 | 1,546 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9cd2f0e00a361fe2_4f70eba1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 4 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially... | [
38,
79,
107,
169
] | [
null,
null,
null,
null
] | [
13,
19,
29,
12
] | [
26,
34,
80,
27
] | |
2024-11-18T22:36:29.407588+00:00 | 1,520,311,118,000 | c69107b17a7cdc2331dd26d64737e64307f8c3c6 | 3 | {
"blob_id": "c69107b17a7cdc2331dd26d64737e64307f8c3c6",
"branch_name": "refs/heads/master",
"committer_date": 1520311118000,
"content_id": "7bc56df753d476b3de3b57076739c5f9773696df",
"detected_licenses": [
"MIT"
],
"directory_id": "8225f0e97c71ed14448de53cef789fe56cbbd94c",
"extension": "py",
"fi... | 2.515625 | stackv2 | from globibot.lib.plugin import Plugin
from collections import defaultdict
from time import time
import re
URL_PATTERN = re.compile('http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]))+')
class Repost(Plugin):
def load(self):
self.shames = defaultdict(lambda: defaultdict(list)... | 49 | 34.88 | 106 | 21 | 381 | python | [{"finding_id": "codeql_py/overly-large-range_1638835a01826759_9c028b00", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
8
] | [
null
] | [
57
] | [
60
] | |
2024-11-18T22:36:43.149904+00:00 | 1,595,752,336,000 | 761592b68c843aa7a2a563f192432c2b1a34e119 | 2 | {
"blob_id": "761592b68c843aa7a2a563f192432c2b1a34e119",
"branch_name": "refs/heads/master",
"committer_date": 1595752336000,
"content_id": "4169810f33095d636dfe33f9c8b2eae89b5b2efe",
"detected_licenses": [
"MIT"
],
"directory_id": "d33be2b13ef522bbd43b9adfedc9c67c3c4aa45d",
"extension": "py",
"fi... | 2.375 | stackv2 | #!/usr/bin/env python
# encoding=utf8
############################## check_hs3 ########################
# Date: Feb 02 2020
# Author: Geir Rune Grøtan
# Help: https://github.com/grotan1/check_hs3
# Licence: MIT License - https://tldrlegal.com/license/mit-license
#########################################################... | 204 | 22.27 | 98 | 20 | 1,345 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d7f431182511dd64_68cae796", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
196,
198
] | [
null,
null
] | [
10,
10
] | [
68,
52
] | |
2024-11-18T20:23:20.751086+00:00 | 1,397,421,125,000 | cbb208cbda4a369f0f073578807201c748a8a96a | 3 | {
"blob_id": "cbb208cbda4a369f0f073578807201c748a8a96a",
"branch_name": "refs/heads/master",
"committer_date": 1397421125000,
"content_id": "62f34684dd542029bca1dfad41eaa404e1d249b3",
"detected_licenses": [
"ISC"
],
"directory_id": "5c768cfdd22678047236e02d7c38c108a07225fd",
"extension": "py",
"fi... | 2.59375 | stackv2 | # -*- coding: utf-8 -*-
#
# whereami.py
# whereami
#
"""
Use the Core Location framework.
"""
import os
import sys
import time
import optparse
from optparse import OptionValueError
from collections import namedtuple
from collections import OrderedDict
import webbrowser
import requests
from geoip2.database import R... | 326 | 27.84 | 105 | 17 | 2,015 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_795eee382fb997da_6a9b2f41", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
73
] | [
null
] | [
27
] | [
65
] | |
2024-11-18T20:23:25.752443+00:00 | 1,561,878,844,000 | ce33c980fdec06cbe909e155dda320cd64f4afc3 | 3 | {
"blob_id": "ce33c980fdec06cbe909e155dda320cd64f4afc3",
"branch_name": "refs/heads/master",
"committer_date": 1561878844000,
"content_id": "592060029b065c94a061e4003c964878934651ea",
"detected_licenses": [
"MIT"
],
"directory_id": "de4cf465f6f80269993ab36a1b00d3f368b95f9b",
"extension": "py",
"fi... | 3 | stackv2 | #!/usr/bin/env python3
import geocoder
import math
from telescope_planner.constants import DEFAULT_LOCATION
try:
import sys
if sys.platform == 'ios':
import console
import location
IS_IOS = True
else:
IS_IOS = False
except:
IS_IOS = False
from types import SimpleName... | 132 | 27.58 | 128 | 18 | 943 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d305ff4f8f2e2f6a_d27a15f3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
127
] | [
null
] | [
9
] | [
129
] | |
2024-11-18T21:22:27.045401+00:00 | 1,502,116,084,000 | a55cec804550757a453a883c7c5abb476f94af2e | 2 | {
"blob_id": "a55cec804550757a453a883c7c5abb476f94af2e",
"branch_name": "refs/heads/master",
"committer_date": 1502116084000,
"content_id": "899515811c27c7afd834b3ab56e79e002823f083",
"detected_licenses": [
"MIT"
],
"directory_id": "fdbb121e66dffc4dffbf3528a1cbac5f1f0d7060",
"extension": "py",
"fi... | 2.3125 | stackv2 | import os
import psycopg2
import logging
import requests
import time
import json
import urlparse
from bs4 import BeautifulSoup
from datetime import datetime
from flask import Flask, render_template
from flask import request
from logging.handlers import RotatingFileHandler
from urllib import urlretrieve
from youtube_dl... | 326 | 34.56 | 175 | 27 | 2,543 | python | [{"finding_id": "codeql_py/partial-ssrf_ea5b2eb2136e36c9_6342d002", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 3 | true | [
"CWE-918",
"CWE-117",
"CWE-117"
] | [
"py/partial-ssrf",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
127,
87,
220
] | [
null,
null,
null
] | [
17,
29,
29
] | [
69,
33,
33
] | |
2024-11-18T21:22:44.197360+00:00 | 1,587,911,379,000 | 40e96517a5031694e3350e4dc5c8c58c48ea7ec5 | 3 | {
"blob_id": "40e96517a5031694e3350e4dc5c8c58c48ea7ec5",
"branch_name": "refs/heads/master",
"committer_date": 1587911379000,
"content_id": "de441f96faaeb88512082f3e0dca4ca765dfb4d5",
"detected_licenses": [
"MIT"
],
"directory_id": "3f326610c1674ca52a4e70c22af84826f501b164",
"extension": "py",
"fi... | 3.015625 | stackv2 | import numpy as np
from PIL import Image
import h5py
import json
import os
import io
import pickle
from torchmeta.utils.data import Dataset, ClassDataset, CombinationMetaDataset
from torchvision.datasets.utils import download_file_from_google_drive
class TieredImagenet(CombinationMetaDataset):
"""
The Tiered... | 250 | 40.6 | 93 | 19 | 2,296 | python | [{"finding_id": "codeql_py/tarslip_aee94fb65c86f036_154342f6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
185
] | [
null
] | [
13
] | [
14
] | |
2024-11-18T21:22:52.309683+00:00 | 1,542,767,523,000 | 2e9dbe30cbc437f4d0b42feafec92f513ce1ed1d | 2 | {
"blob_id": "2e9dbe30cbc437f4d0b42feafec92f513ce1ed1d",
"branch_name": "refs/heads/master",
"committer_date": 1542767523000,
"content_id": "cbc6208c4c05b2330849dc5eaab8a7610245100e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b955745d34abb500b4fe2e5c92d0d1e9b694a71a",
"extension": "py"... | 2.484375 | stackv2 | import mkdocs
import subprocess
import pathlib
import os
import logging
logger = logging.getLogger(__name__)
class HelmRepositoryPlugin(mkdocs.plugins.BasePlugin):
config_scheme = (
('chart', mkdocs.config.config_options.Type(
mkdocs.utils.string_types, required=True)),
('chart_dir', ... | 87 | 41.38 | 114 | 16 | 820 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_97a9337df9ffe5b2_c5b8f7fd", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com/](1) may be at an arbitrary position in the... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [github.com/](1) may be at an arbitrary position in the sanitized URL."
] | [
80
] | [
null
] | [
12
] | [
32
] | |
2024-11-18T21:23:07.128626+00:00 | 1,620,819,455,000 | 1ef46cb235d2e4d679abdfdc79f724191fed47e5 | 3 | {
"blob_id": "1ef46cb235d2e4d679abdfdc79f724191fed47e5",
"branch_name": "refs/heads/main",
"committer_date": 1620819455000,
"content_id": "2576e9cd14727631b8c67f982fa009100034a6bb",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "55a311eb02403f8fa7e4d1e148e9bb5e80619984",
"extension": "py",
... | 2.9375 | stackv2 | import logging
import re
class SelectSqlValidation:
def validate_parse_select(self, query):
logging.debug("Validating Select query.....")
select_query = []
query = self.remove_semicolon(self, query)
if query.find("*") > 0:
queryMatch = re.search("^select\s[*]\sfrom\s[... | 67 | 33.37 | 113 | 15 | 498 | python | [{"finding_id": "codeql_py/redos_e243e08b86bf3a25_ec59f863", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'select' and containing many repet... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'select' and containing many repetitions of '0'."
] | [
19
] | [
null
] | [
48
] | [
60
] | |
2024-11-18T21:23:17.516193+00:00 | 1,547,094,520,000 | 7cfcda71d428ad19ab17a8bb5bf2cd78093a8ffa | 3 | {
"blob_id": "7cfcda71d428ad19ab17a8bb5bf2cd78093a8ffa",
"branch_name": "refs/heads/master",
"committer_date": 1547094520000,
"content_id": "95b0d8e88b89faad2c31f34aac6e255190724e5e",
"detected_licenses": [
"MIT-0"
],
"directory_id": "195cc290a279c765d9e477c54645c14cdd8c86aa",
"extension": "py",
"... | 2.625 | stackv2 | import logging
import requests
from requests.exceptions import RequestException
from .error import NetworkException
class Wrapper(object):
def __init__(self, node_host, api_key=''):
self.node_host = node_host
self.api_key = api_key
def request(self, api, post_data=''):
headers = {}
... | 30 | 36.67 | 95 | 17 | 252 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6d1f9456df41e660_be9d9d24", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
23,
26
] | [
null,
null
] | [
30,
30
] | [
83,
69
] | |
2024-11-18T21:23:19.154782+00:00 | 1,582,908,214,000 | f4db013b47f60f31b2a39c8c08a945382f381dd8 | 2 | {
"blob_id": "f4db013b47f60f31b2a39c8c08a945382f381dd8",
"branch_name": "refs/heads/master",
"committer_date": 1582908214000,
"content_id": "f9aac4f299555f63dbdd6d1fe498509c59421e30",
"detected_licenses": [
"MIT"
],
"directory_id": "fbd8bb98d39370d865f349e5a92c47345dc9a8a3",
"extension": "py",
"fi... | 2.3125 | stackv2 | import os
from setuptools.command.install import install
import urllib.request
def download(url: str, file: str):
print(url, file)
response = urllib.request.urlopen(url)
data = response.read()
print(f' >> downloading {file}')
with open(file, 'wb') as f:
f.write(data)
class InstallWrapper(install):
... | 29 | 28.76 | 102 | 14 | 218 | python | [{"finding_id": "codeql_py/overly-permissive-file_1a03a5fcdab096c2_e887eabe", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable."
] | [
22,
27
] | [
null,
null
] | [
13,
13
] | [
39,
46
] | |
2024-11-18T21:51:16.225051+00:00 | 1,413,303,945,000 | d12e25a60c938a8792abf4734ea400a5dfbc043d | 3 | {
"blob_id": "d12e25a60c938a8792abf4734ea400a5dfbc043d",
"branch_name": "refs/heads/master",
"committer_date": 1413303945000,
"content_id": "6162e08747df7188d88c440eb48cbca32a156e2f",
"detected_licenses": [
"MIT"
],
"directory_id": "2d884b4fcda1750ba7400bd42fef42801823e1dc",
"extension": "py",
"fi... | 2.6875 | stackv2 | import base64 as __b64__
try:
import simplejson as __json__
except ImportError:
print "Unable to import the simplejson library. Degrading to the built in json module."
import json as __json__
import cStringIO
import cPickle
import gzip as __gzip__
import zlib as __zlib__
import uuid
import hashlib
from fuze... | 213 | 26.74 | 96 | 18 | 1,478 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6e46e78c1b513fc6_10463f0b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
35,
42
] | [
null,
null
] | [
23,
42
] | [
40,
59
] | |
2024-11-18T21:51:18.346527+00:00 | 1,445,496,449,000 | 2fc6710834a40ae3fe508ac0bd95304943db998a | 3 | {
"blob_id": "2fc6710834a40ae3fe508ac0bd95304943db998a",
"branch_name": "refs/heads/master",
"committer_date": 1445496449000,
"content_id": "b7c4419591077762b95f7304ed27e1fb221883f1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fc7607893be95a480c29ed21b4499221a9e1ab09",
"extension": "py"... | 3.296875 | stackv2 | #!/usr/bin/env python
# TODO: Add optional master password argument
# TODO: Better help.
import string
import hashlib
import argparse
import getpass
DEFAULT_ALLOWED_CHARS = string.ascii_letters + string.digits
DEFAULT_PASSWORD_LENGTH = 12
def derive_password(master, website, allowed_chars, length):
hash_bytes = ... | 35 | 34.09 | 75 | 13 | 262 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eca9fe9374a90e34_dde3dbc6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
34
] | [
35
] | [
7
] | [
35
] | |
2024-11-18T21:51:27.472589+00:00 | 1,692,388,421,000 | e940b8b61621c29d0ffe9ac66627770f6f38e7cf | 3 | {
"blob_id": "e940b8b61621c29d0ffe9ac66627770f6f38e7cf",
"branch_name": "refs/heads/master",
"committer_date": 1692388421000,
"content_id": "9f16ae74402ac948154f40cb2c01a59a7d4e5c3f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bbedb22fd60c719b05e619307a4ee0710478fdf0",
"extension": "py"... | 2.546875 | stackv2 | import imagemounter_mitre.exceptions
import os
from flask import current_app, request
from flask_restful import Resource, marshal_with, abort, fields
from .exceptions import (
UnexpectedDiskError,
NoMountableVolumesError,
ImageNotInDatabaseError,
DuplicateMountAttemptError
)
from .utils import get_mou... | 181 | 34.17 | 130 | 17 | 1,332 | python | [{"finding_id": "codeql_py/path-injection_246dca7c80579b89_550335a0", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
168
] | [
null
] | [
30
] | [
45
] | |
2024-11-18T21:51:36.293826+00:00 | 1,580,563,010,000 | 839ecc929b1528e89fcd550e1a186fcbec79a8a7 | 3 | {
"blob_id": "839ecc929b1528e89fcd550e1a186fcbec79a8a7",
"branch_name": "refs/heads/master",
"committer_date": 1580563010000,
"content_id": "05181ea2ee374f0ed1d5e6c3a116a9d4cc87515f",
"detected_licenses": [
"MIT"
],
"directory_id": "28a4f2a1a143127fd0daa2f2ae3361b3b03362ba",
"extension": "py",
"fi... | 3.125 | stackv2 | class Users:
user_database = []
"""method to initialize users"""
def __init__(self, user_name, user_password):
self.user_name = user_name
self.user_password = user_password
"""method to save user information"""
def save_user_information(self):
file = open("userinfo.txt... | 30 | 19.33 | 61 | 12 | 128 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a1c1318f7f4aa562_2e24c935", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
17
] | [
null
] | [
20
] | [
61
] | |
2024-11-18T22:27:45.402539+00:00 | 1,585,590,098,000 | 745744604d7c591824ffb91d1427879b446d625d | 3 | {
"blob_id": "745744604d7c591824ffb91d1427879b446d625d",
"branch_name": "refs/heads/master",
"committer_date": 1585590098000,
"content_id": "8202e6afaacf2548b2eb2c0b520090a36fe9f5d3",
"detected_licenses": [
"MIT"
],
"directory_id": "a43fd6882ff54d1ecf521372b30943edf33d3d85",
"extension": "py",
"fi... | 2.75 | stackv2 | #!/usr/bin/env python
import sys
import re
# TODO: Handle multi-line __init__() functions.
# Groups are required arguments followed by keyword arguments
INIT_REGEX = "(\\s*)def __init__\\(self(, [^=]+)*(, .+)*, \\*\\*kwargs\\)"
if len(sys.argv) < 2:
print("Specify files to update")
prog = re.compile(INIT_REGEX)
... | 49 | 39.96 | 84 | 21 | 474 | python | [{"finding_id": "codeql_py/redos_a84f0ff4611a40f5_d99bccc1", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'def __init__(self, ' and containi... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'def __init__(self, ' and containing many repetitions of '<, '.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'def __init__(self, ' and containing many repetitions ... | [
7,
7
] | [
null,
null
] | [
41,
51
] | [
46,
53
] | |
2024-11-18T22:44:04.843073+00:00 | 1,538,350,120,000 | 79eb914e6f3ad72bc0e7d832cb8e81f091627cf7 | 2 | {
"blob_id": "79eb914e6f3ad72bc0e7d832cb8e81f091627cf7",
"branch_name": "refs/heads/master",
"committer_date": 1538350120000,
"content_id": "bdc7613db647ebae6ae4dbd5e01710ce0fda0cb9",
"detected_licenses": [
"MIT"
],
"directory_id": "e5a8e52658387a1aff8a44014a3e040b160d9db7",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/env python
import os
import pickle
import logging
from flask import Flask, redirect, session, url_for, render_template, request, g, flash, send_from_directory, send_file, Blueprint
# from dfx
from .data_blueprint import data_bp, df_pickle_path
from .annotate import annotate_bp
# ##########################... | 168 | 28.98 | 130 | 19 | 1,085 | python | [{"finding_id": "codeql_py/path-injection_24f6bd5ac3c1212e_28ba9e3d", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 5 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-117"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
102,
106,
122,
126,
150
] | [
null,
null,
null,
null,
null
] | [
29,
26,
27,
22,
17
] | [
38,
35,
35,
30,
69
] | |
2024-11-18T22:44:06.716538+00:00 | 1,441,760,030,000 | 2524611592740d0a276776d9fd180cbe7b6881f6 | 3 | {
"blob_id": "2524611592740d0a276776d9fd180cbe7b6881f6",
"branch_name": "refs/heads/master",
"committer_date": 1441760030000,
"content_id": "5c6f7045f8c16509fa27065bec68752c6555896c",
"detected_licenses": [
"MIT"
],
"directory_id": "a43ef6049c5aee41214c5f7b5f02f96dd2945bde",
"extension": "py",
"fi... | 2.515625 | stackv2 | from flask import Flask, redirect, make_response, request, render_template
import redis
import re
import random
app = Flask(__name__)
# redis config
r = redis.StrictRedis(host='europa.stsosz.io', port=6380, db=0)
ps = re.compile("^https?\:\/\/.*\..*\/.*$")
# key generation
# character set
kc = 'abcdefghijklmnopqrstuvw... | 80 | 29.35 | 102 | 19 | 668 | python | [{"finding_id": "codeql_py/polynomial-redos_9ff0aaa51cfa4ab9_76ab6988", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin... | 2 | true | [
"CWE-1333",
"CWE-079"
] | [
"py/polynomial-redos",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with 'http://.' and with many repetitions of '.'.\nThis [regular expression](3) that depends on a [user-provided value](2) may run slow on strings starting with 'http://./' and with many repetitions of '/'.",
... | [
59,
21
] | [
null,
null
] | [
17,
26
] | [
20,
27
] | |
2024-11-18T22:44:09.880503+00:00 | 1,627,849,451,000 | a365d3774b6c73b64c4a94c8c9921fabbc277970 | 4 | {
"blob_id": "a365d3774b6c73b64c4a94c8c9921fabbc277970",
"branch_name": "refs/heads/master",
"committer_date": 1627849451000,
"content_id": "5e875a3722613a4be4f414ea1a4443d35e8d310b",
"detected_licenses": [
"MIT"
],
"directory_id": "d76df0684a064cd41619dd89b1a9d9e75869b953",
"extension": "py",
"fi... | 3.515625 | stackv2 | #!/usr/bin/env python3.9
from credentials import Credentials
from user import User
#credentials behaviour functions
def create_credentials(platform,email,password):
'''
Function to create a new credential
'''
new_credentials = Credentials(platform,email,password)
return new_credentials
def save... | 211 | 26.34 | 163 | 21 | 937 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3f6e3696ce86d378_6ad28291", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensi... | [
121,
125,
169,
179,
194,
199
] | [
null,
null,
null,
null,
null,
null
] | [
15,
15,
35,
51,
43,
43
] | [
24,
69,
95,
124,
136,
91
] | |
2024-11-18T22:44:40.876097+00:00 | 1,544,483,878,000 | bf614de6d4278850f7f03909138947dec1fc4868 | 2 | {
"blob_id": "bf614de6d4278850f7f03909138947dec1fc4868",
"branch_name": "refs/heads/master",
"committer_date": 1544483878000,
"content_id": "48d7f3b10c7a5bfa18f2f1d5d2ff826387711081",
"detected_licenses": [
"MIT"
],
"directory_id": "8c240a531380eb9a7184f52a20f87122fe0aa0ae",
"extension": "py",
"fi... | 2.4375 | stackv2 | #dealing with files and paths:
import os, tarfile
import glob
from pathlib import Path
import shutil
#dealing with data
import sqlite3
import pandas as pd
import numpy as np
import random
#translating text to IPA
#extracting MFCC data from wavefiles
from subprocess import check_output
import librosa
#own module for... | 220 | 41.99 | 169 | 23 | 2,167 | python | [{"finding_id": "codeql_py/tarslip_2a3db59d473b9bfb_71fd4cd8", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
197
] | [
null
] | [
25
] | [
29
] | |
2024-11-18T22:44:44.331556+00:00 | 1,570,929,035,000 | e8e6425e09bdbf76aadcf2cfa65db821396c9d85 | 3 | {
"blob_id": "e8e6425e09bdbf76aadcf2cfa65db821396c9d85",
"branch_name": "refs/heads/master",
"committer_date": 1571066388000,
"content_id": "aa75dd87a05f7f7116d5a7a68ee99e4fed078d8b",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "d4becc77445e49621b8f8c56ce0ebbebde3d92ca",
"extension": "p... | 2.5625 | stackv2 | #! /usr/bin/env python3
#
# SPDX-License-Identifier: BSD-2-Clause
import argparse
import binascii
import os
import sys
import hashlib
import yubico
import hmac
import json
import logging
import time
from Crypto.Cipher import AES
PHRASE = "Test"
CHALLENGE_LENGTH = 20
def do_challenge(yk, state):
""" Send a chall... | 237 | 34.52 | 134 | 19 | 2,116 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dbe592424fa52fb1_fd7ee073", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
50,
51,
76
] | [
null,
null,
null
] | [
19,
19,
19
] | [
68,
61,
49
] | |
2024-11-18T20:24:17.484236+00:00 | 1,572,799,747,000 | a4fa82e46b17d59764667afd40f426b350d08c9b | 3 | {
"blob_id": "a4fa82e46b17d59764667afd40f426b350d08c9b",
"branch_name": "refs/heads/master",
"committer_date": 1572799747000,
"content_id": "25a30293aa7e59445a9dcfb3c4176e7239896c68",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "3944035837a1937bf13b0ffb02f40696bb6537a7",
"extension": "p... | 2.765625 | stackv2 | import csv
import errno
import gzip
import hashlib
import logging
import os
import sys
import tarfile
import zipfile
import six
import torch
import torchaudio
from torch.utils.data import Dataset
from torch.utils.model_zoo import tqdm
def unicode_csv_reader(unicode_csv_data, **kwargs):
r"""Since the standard csv... | 223 | 30.55 | 99 | 20 | 1,580 | python | [{"finding_id": "codeql_py/tarslip_6070876ff19aecd6_bdd5c4cc", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
147
] | [
null
] | [
29
] | [
34
] | |
2024-11-18T20:24:20.756875+00:00 | 1,641,464,900,000 | 8092497779c72de81554cac75ae13dc43e29d821 | 3 | {
"blob_id": "8092497779c72de81554cac75ae13dc43e29d821",
"branch_name": "refs/heads/master",
"committer_date": 1641464900000,
"content_id": "ca12d8b2d9d35a72526f37ce7f0cefff0c502140",
"detected_licenses": [
"MIT"
],
"directory_id": "8028e644df25d2ff62095193d26ddeaabf8ff961",
"extension": "py",
"fi... | 2.671875 | stackv2 | # -*- coding: utf-8 -*-
import csv
from os import path
from promrep.models import (Person, Praenomen, PrimarySourceReference,
RelationshipAssertion,
RelationshipAssertionReference, RelationshipType,
SecondarySource, Sex)
ICSV_COLUMNS... | 293 | 30.6 | 88 | 26 | 2,047 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_62f91e9af5423f2f_bd84925f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)]... | [
129,
131,
133,
149
] | [
null,
null,
null,
null
] | [
20,
20,
20,
24
] | [
74,
76,
73,
75
] | |
2024-11-18T20:24:22.816926+00:00 | 1,628,116,265,000 | 5c13b9b69d501707704497d42cde865a5ac3fa79 | 2 | {
"blob_id": "5c13b9b69d501707704497d42cde865a5ac3fa79",
"branch_name": "refs/heads/main",
"committer_date": 1628116265000,
"content_id": "60e91b2bed6c81931c60f286e7e68b5f5f903915",
"detected_licenses": [
"MIT"
],
"directory_id": "c8443b52a4ec1050ea229174e0f3f6faabebc1d9",
"extension": "py",
"file... | 2.40625 | stackv2 | import paramiko
import time
import config
print("Which device do you want to send data to? ")
ip_addr = input("[r1] or [r2] ")
if ip_addr == "r1":
ip_addr = config.r1
network_bgp = config.r1_bgp
network_ospf = config.r1_ospf
elif ip_addr == "r2":
ip_addr = config.r2
network_bgp = config.r2_bgp
... | 116 | 36.15 | 94 | 13 | 1,400 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_dafba05c8195c3e2_1a30323c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
29
] | [
null
] | [
null
] | [
57
] | |
2024-11-18T20:59:40.125521+00:00 | 1,623,769,618,000 | 3035991fc8f349d5cc3cfedcc7d3265ed42ab2b6 | 2 | {
"blob_id": "3035991fc8f349d5cc3cfedcc7d3265ed42ab2b6",
"branch_name": "refs/heads/master",
"committer_date": 1623769618000,
"content_id": "4d839aba55359ee6e134f394db940f2e37ad9fce",
"detected_licenses": [
"MIT"
],
"directory_id": "b3d6e70c7cd62274b18b0a6efc6c983cab773a58",
"extension": "py",
"fi... | 2.484375 | stackv2 | import os
import pathlib
from typing import List, Dict
from jinja2 import Template
from build_tools.config import DOCSRC_SOURCE_PATH
from courses.config import COURSES
OUT_FOLDER = DOCSRC_SOURCE_PATH / "lectures"
INDEX_TEMPLATE_PATH = DOCSRC_SOURCE_PATH / "index.j2.rst"
INDEX_PATH = DOCSRC_SOURCE_PATH / "index.rst"
... | 40 | 29.57 | 64 | 14 | 285 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e0d14df4350f87e9_170b2110", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
34
] | [
null
] | [
16
] | [
57
] | |
2024-11-18T21:00:36.464099+00:00 | 1,623,695,571,000 | 7115c592798cd65e93fdfb15100bf8c0eed61416 | 4 | {
"blob_id": "7115c592798cd65e93fdfb15100bf8c0eed61416",
"branch_name": "refs/heads/main",
"committer_date": 1623695571000,
"content_id": "42e24a34b124c2fdf84756433727853fec11a5c3",
"detected_licenses": [
"MIT"
],
"directory_id": "1a0f851993edb6f8cfad05c8af85125cea6669a9",
"extension": "py",
"file... | 4.40625 | stackv2 | # Friends birthdays
# Python practice exercises
# Course: Automate the Boring Stuff with Python
# Developer: Valeriy B.
def friends_birthdays():
# Creating a birtday dictionary
birthday = {"John": "Dec 12", "Alice": "Sep 3", "Steve": "Jan 22", "Harry": "Aug 2", "Bob": "Oct 15"}
while True:
na... | 33 | 33.82 | 106 | 19 | 279 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2b8887a1e3202fea_0d449d84", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
20
] | [
null
] | [
19
] | [
60
] | |
2024-11-18T21:00:39.346614+00:00 | 1,603,758,285,000 | 3c9711a4882a6012d03ade3903d53df4982ef5e7 | 2 | {
"blob_id": "3c9711a4882a6012d03ade3903d53df4982ef5e7",
"branch_name": "refs/heads/master",
"committer_date": 1603758285000,
"content_id": "e55b057e34ffe565e6c79951b8e9ee632ab65ff7",
"detected_licenses": [
"MIT"
],
"directory_id": "267ad74e39a0be3708d9e5acac632055488093cc",
"extension": "py",
"fi... | 2.390625 | stackv2 | """ Implements the logic to read the file store, generate the server config, and start the servers """
import contextlib
import os
import subprocess
import sys
import tempfile
import gzip
from typing import Optional, Dict
from urllib.parse import urlparse
from io import BytesIO
import time
import json
from bs4 import... | 215 | 44.14 | 179 | 24 | 2,050 | python | [{"finding_id": "codeql_py/overly-permissive-file_48a1dc294bbc656b_8b36a978", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {... | 3 | true | [
"CWE-732",
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in open sets file to world readable.",
"Overly permissive mask in open sets file to world readable.",
"Overly permissive mask in open sets file to world readable."
] | [
151,
155,
165
] | [
null,
null,
null
] | [
31,
31,
31
] | [
82,
82,
82
] | |
2024-11-18T21:00:48.480829+00:00 | 1,638,028,155,000 | 4b9b18607c9a19f8d92b1738d817859c39e44c8f | 3 | {
"blob_id": "4b9b18607c9a19f8d92b1738d817859c39e44c8f",
"branch_name": "refs/heads/master",
"committer_date": 1638028155000,
"content_id": "8565ea1609b282bbb48ec1ba4a102da14b7c8d83",
"detected_licenses": [
"MIT"
],
"directory_id": "6eca0e7fe3978f666744c9bd6ea4d85cf234e0f4",
"extension": "py",
"fi... | 2.6875 | stackv2 | #!/usr/bin/env python3
import time
import paramiko
from urllib.parse import urlparse
class Ssh_Weakpwd_BaseVerify:
def __init__(self, url):
self.info = {
'name': 'SSH 弱口令漏洞',
'description': 'SSH 弱口令漏洞',
'date': '',
'exptype': 'check',
'type': 'We... | 60 | 30.87 | 159 | 21 | 447 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_8d4ed8ee339c601b_d8422e55", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
40
] | [
null
] | [
17
] | [
74
] | |
2024-11-18T21:01:13.756607+00:00 | 1,688,684,594,000 | e5e8c2b80377e1b76e4d46a5fdcf73aa81ca8218 | 2 | {
"blob_id": "e5e8c2b80377e1b76e4d46a5fdcf73aa81ca8218",
"branch_name": "refs/heads/master",
"committer_date": 1688684594000,
"content_id": "154313dd12b48c5f94b722dd9dce26638ba2999d",
"detected_licenses": [
"NIST-Software",
"BSD-3-Clause",
"MIT"
],
"directory_id": "88a433b6010d625a953a7569a7fa... | 2.421875 | stackv2 | """ rest api views
"""
import logging
from django.http import Http404
from django.utils.decorators import method_decorator
from rest_framework import status
from rest_framework.exceptions import ValidationError
from rest_framework.response import Response
from rest_framework.views import APIView
from core_main_app.co... | 198 | 26.5 | 79 | 16 | 993 | python | [{"finding_id": "codeql_py/stack-trace-exposure_c64451739a57b08a_92f74e9b", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
57,
109,
171
] | [
null,
null,
null
] | [
17,
17,
17
] | [
24,
24,
24
] | |
2024-11-18T21:01:28.286289+00:00 | 1,377,936,615,000 | 24487184f9d8bb8bf12d5fa96003e31c75a0034e | 2 | {
"blob_id": "24487184f9d8bb8bf12d5fa96003e31c75a0034e",
"branch_name": "refs/heads/master",
"committer_date": 1377936615000,
"content_id": "5d381cc65475103d427711f7ed3bf5a3b40a7588",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "6d28d17c3d8cc98405df456206005ebd857658b5",
"extension": "p... | 2.4375 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
#
# Output controller gains to .cc and .h files.
#
# To run: ./generate_cgains.py
#
import os
import sys
import jinja2
import yaw_rate_controller as yrc
def generate(ccinfile, hinfile):
c_data = yrc.design_controller()
c_data_sorted = sorted(c_data, key=lambda c:... | 71 | 30.48 | 69 | 12 | 571 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_856d07747c63a1db_b6f58ffc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
52
] | [
54
] | [
11
] | [
47
] | |
2024-11-18T21:25:26.984364+00:00 | 1,369,416,683,000 | de505520782400d3a11a3f61806eb71c016d3bc2 | 3 | {
"blob_id": "de505520782400d3a11a3f61806eb71c016d3bc2",
"branch_name": "refs/heads/master",
"committer_date": 1369416683000,
"content_id": "7ea2e23d413f1773d29c8505daf1ba29656c238f",
"detected_licenses": [
"BSL-1.0"
],
"directory_id": "4569d707a4942d3451f3bbcfebaa8011cc5a128d",
"extension": "py",
... | 2.703125 | stackv2 | # -*- coding: utf-8 -*-
#
# Date: Mon Jun 22 12:39:48 MDT 2009
# Copyright: 2009 CodeRage
# Author: Jonathan Turkanis
#
# Distributed under the Boost Software License, Version 1.0. (See accompanying
# file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt)
import re
from trac.core impo... | 107 | 30.21 | 95 | 19 | 786 | python | [{"finding_id": "codeql_py/redos_3dce0e0ebace3120_b62a3380", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'deny((,' and containing many repe... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'deny((,' and containing many repetitions of ' (,'."
] | [
44
] | [
null
] | [
69
] | [
72
] | |
2024-11-18T21:51:13.431395+00:00 | 1,560,770,112,000 | 2239cafc5728011cbe410a3e74ee065acc4e2b6f | 2 | {
"blob_id": "2239cafc5728011cbe410a3e74ee065acc4e2b6f",
"branch_name": "refs/heads/master",
"committer_date": 1560770112000,
"content_id": "f5cdbca2c4833b3025dfa5631b2f39e89e5d99f9",
"detected_licenses": [
"MIT"
],
"directory_id": "8682519c3d7ae98ceef3372e41447dff4d407d01",
"extension": "py",
"fi... | 2.3125 | stackv2 | from .import auth
from flask import render_template,redirect,url_for, flash,request
from ..models import User
from flask_login import login_user,logout_user,login_required
from .forms import LoginForm,RegistrationForm,RequestResetForm,ResetPasswordForm
from ..import db
from ..email import mail_message
@auth.route('/lo... | 112 | 34.66 | 139 | 19 | 803 | python | [{"finding_id": "codeql_py/url-redirection_8fc02ce82dada2d5_7f1b18e8", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
41
] | [
null
] | [
33
] | [
82
] | |
2024-11-18T21:51:19.730902+00:00 | 1,609,236,030,000 | 2c6b9722829df63c19ee1fef2c4f2a4229911172 | 3 | {
"blob_id": "2c6b9722829df63c19ee1fef2c4f2a4229911172",
"branch_name": "refs/heads/master",
"committer_date": 1609236030000,
"content_id": "ef6705709f30070124edba2a3034dc4f8bc2f32e",
"detected_licenses": [
"MIT"
],
"directory_id": "4be0b49c9c34b2ba4f392b1a8215bb02f28177a4",
"extension": "py",
"fi... | 2.75 | stackv2 | #!/usr/bin/env python
# coding=utf-8
from tree_struct_config import (
IntLeaf,
StringLeaf,
BooleanLeaf,
ListLeaf,
Branch,
Root,
SerializationFormat,
SerializationDecodeError,
)
class Config(Root):
version = StringLeaf('0.1.0')
class Auth(Branch):
username = StringL... | 111 | 19.41 | 67 | 15 | 543 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c77dd8ed4695143e_79c2e943", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
89,
91,
99
] | [
null,
null,
null
] | [
7,
7,
7
] | [
34,
34,
34
] | |
2024-11-18T21:51:24.993478+00:00 | 1,684,791,297,000 | 16b34c7a22fb5ec36b560e7b1682a35303638b66 | 3 | {
"blob_id": "16b34c7a22fb5ec36b560e7b1682a35303638b66",
"branch_name": "refs/heads/master",
"committer_date": 1687253496000,
"content_id": "e077dbfe904e985ee8c0e07d848bcc4529e2c955",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "79d1d778b25d7aef8bfb762635bb52fb976f52af",
"extension": "py"... | 2.796875 | stackv2 | import requests
from icalendar import Calendar, Event
import pytz
import datetime
import hashlib
import os
import re
def sha1(data):
return hashlib.sha1(data.encode('utf-8')).hexdigest()
def get_jmu_sid(username, password):
password = sha1(password)
request_data = {'flag': 1, 'unitid': 55, 'encrypt': 1,... | 141 | 39.1 | 115 | 15 | 1,443 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_e44fd76e648409ee_a28d511d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
11
] | [
null
] | [
25
] | [
45
] | |
2024-11-18T22:00:14.324916+00:00 | 1,623,105,376,000 | 4d0b0fb41cec97547832446ea62c5da7ad8d1d49 | 3 | {
"blob_id": "4d0b0fb41cec97547832446ea62c5da7ad8d1d49",
"branch_name": "refs/heads/main",
"committer_date": 1623105376000,
"content_id": "0e9ecabb2098e458a5819af163ded8be913bfcc2",
"detected_licenses": [
"MIT"
],
"directory_id": "05533cf378c9562208577daab42c31bc709e4380",
"extension": "py",
"file... | 2.640625 | stackv2 | from uuid import uuid4
from flask import Flask, jsonify, request
from static.chain import BlockChain
from static.constants import STANDARD_TRANS_KEYS
# rev the Node
app = Flask(__name__)
node_id = str(uuid4()).replace('-', '')
# starting the chain
blockchain = BlockChain()
@app.route('/mine', methods=['GET'])
d... | 78 | 24.47 | 115 | 13 | 465 | python | [{"finding_id": "codeql_py/flask-debug_4123602a352f9df6_a04ff44c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
78,
53
] | [
null,
null
] | [
5,
16
] | [
35,
108
] | |
2024-11-18T22:00:26.811572+00:00 | 1,546,455,829,000 | 1bc8b1a66868e6f0ca35452c20eefb5467940376 | 3 | {
"blob_id": "1bc8b1a66868e6f0ca35452c20eefb5467940376",
"branch_name": "refs/heads/master",
"committer_date": 1546455829000,
"content_id": "8a5713f29babcd912232333e86228bb0b5981d51",
"detected_licenses": [
"MIT"
],
"directory_id": "f1ae2b4f78e09580488fc039328cb0204a77c1a3",
"extension": "py",
"fi... | 3.0625 | stackv2 | import os
import sys
import json
import h5py
import tarfile
import numpy as np
import pandas as pd
import seaborn as sns
from tqdm import tqdm
import matplotlib.pyplot as plt
from PIL import Image, ImageDraw
from unpacker import DigitStructWrapper
from scipy.ndimage import imread
from scipy.misc import imresize
#TODO ... | 337 | 32.07 | 90 | 16 | 2,899 | python | [{"finding_id": "codeql_py/tarslip_2aa96532ccfd76ec_a5746fa4", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
31
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T22:00:48.335513+00:00 | 1,513,863,577,000 | 50fb76bf89e46c67bb2531d49fcefa9dfa4c9e7f | 3 | {
"blob_id": "50fb76bf89e46c67bb2531d49fcefa9dfa4c9e7f",
"branch_name": "refs/heads/master",
"committer_date": 1513863577000,
"content_id": "d3eb5e98eaabe1da21cc3aff0a44184801fdcd71",
"detected_licenses": [
"MIT"
],
"directory_id": "0bf0911bdb62acc117e9902dd3a5bddd2d7228eb",
"extension": "py",
"fi... | 2.59375 | stackv2 | #! /usr/bin/env python
# -*- coding: utf-8 -*-
import json
import requests
PROTOCOL = 'http' # or https
RVISION = '127.0.0.1' # ip or hostname
USERNAME = 'admin' # any user login
PASSWORD = 'admin'
requests.packages.urllib3.disable_warnings()
s = requests.Session()
# Авторизируемся
login = s.post(
PROTOCOL ... | 65 | 19.91 | 97 | 10 | 440 | python | [{"finding_id": "codeql_py/request-without-cert-validation_3ba5e34bd225eec3_8b36ca7c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
17,
57
] | [
24,
61
] | [
9,
13
] | [
2,
2
] | |
2024-11-18T22:00:55.666088+00:00 | 1,419,664,526,000 | 78d9b3ed3357f3bfb9204847be6dff00a7883b27 | 3 | {
"blob_id": "78d9b3ed3357f3bfb9204847be6dff00a7883b27",
"branch_name": "refs/heads/master",
"committer_date": 1419664526000,
"content_id": "c2d6d6c1d1ae5cd266fd81b5252b13634e2bec75",
"detected_licenses": [
"MIT"
],
"directory_id": "e91dd5c6e36dbe378734bd3af403785896fb9a88",
"extension": "py",
"fi... | 3.234375 | stackv2 | import random
class Person:
def __init__(self,Name='None',Age=0,Gender='None',Address='None',PhNo='None',TrID='None'):
self.Name=Name
self.Age=Age
self.Gender=Gender
self.Address=Address
self.PhNo=PhNo
self.TrID=TrID
self.PNR=self.GenPNR()
def GenP... | 33 | 21.15 | 94 | 12 | 200 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_028d7881b90e7ee4_a4c3b47a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
18
] | [
null
] | [
27
] | [
38
] | |
2024-11-18T22:01:02.740779+00:00 | 1,617,992,304,000 | ad6c197c798fe433efc81a41d8a6144ee0a4b4fb | 3 | {
"blob_id": "ad6c197c798fe433efc81a41d8a6144ee0a4b4fb",
"branch_name": "refs/heads/master",
"committer_date": 1617992304000,
"content_id": "cbb2a08eccccbe1ecd4434d934841492ebfa6eff",
"detected_licenses": [
"MIT"
],
"directory_id": "95ad6275fb347fcf9320891b84597ab499c8edc9",
"extension": "py",
"fi... | 2.6875 | stackv2 | import sys
import bcrypt
import logging
import uuid
from database.AuthSchema import Auth
LOG_FORMAT = "%(levelname)s %(asctime)s %(message)s"
logging.basicConfig(
filename="./logs/api-authentication-credentials.log",
level=logging.INFO,
format=LOG_FORMAT,
)
logger = logging.getLogger()
def create_api_cr... | 57 | 25.6 | 97 | 11 | 345 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1f4d6d9099c72251_ebe485e4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
24,
37,
42
] | [
33,
null,
null
] | [
9,
17,
17
] | [
12,
82,
45
] | |
2024-11-18T22:15:09.655950+00:00 | 1,604,158,377,000 | a23b35f02937eade42261b0e4b7516482fd38258 | 3 | {
"blob_id": "a23b35f02937eade42261b0e4b7516482fd38258",
"branch_name": "refs/heads/main",
"committer_date": 1604158377000,
"content_id": "d9eae52b05b46e1a74a72aec0884bd67b9269151",
"detected_licenses": [
"MIT"
],
"directory_id": "46be9bbb665fba4abc1af47a7b885c267d8ff66f",
"extension": "py",
"file... | 2.640625 | stackv2 |
#https://github.com/bigevilbeard/dnac-device-info
import json
import requests
import urllib3
from requests.auth import HTTPBasicAuth
from prettytable import PrettyTable
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
dnac = {
"host": "sandboxdnac2.cisco.com",
"port": 443,
"username":... | 53 | 25.81 | 127 | 12 | 349 | python | [{"finding_id": "codeql_py/request-without-cert-validation_7964ebe316a9dd7f_d9922a66", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
31,
39
] | [
32,
null
] | [
16,
16
] | [
63,
64
] | |
2024-11-18T22:26:02.539353+00:00 | 1,589,878,847,000 | 2c814ed4e3bd733e41914af52e9dd1a7c659d715 | 2 | {
"blob_id": "2c814ed4e3bd733e41914af52e9dd1a7c659d715",
"branch_name": "refs/heads/master",
"committer_date": 1589878847000,
"content_id": "a622e609150e4b0fc5db717a6c68e150cca783ad",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "87914d8bb02a7c1db05c0838faa8348422b97179",
"extension": "p... | 2.40625 | stackv2 | #!/usr/bin/env python2.7
import Tkinter as tk
import tkMessageBox
import tkFileDialog
import os
import re
import xml.etree.ElementTree
import requests
import time
import paramiko
import subprocess
import signal
class ScriptFile:
def __init__(self, url):
self.url = url
self.status_ok = False
self.message = "... | 293 | 31.85 | 166 | 22 | 2,625 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_0e4ef34f70160c8a_0e9395f3", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
192
] | [
null
] | [
3
] | [
70
] | |
2024-11-18T22:26:03.288228+00:00 | 1,627,873,926,000 | 6be9d1f8ecbdc27f4fb975cdf547392f2be9003d | 3 | {
"blob_id": "6be9d1f8ecbdc27f4fb975cdf547392f2be9003d",
"branch_name": "refs/heads/master",
"committer_date": 1627873926000,
"content_id": "2ceedd0364c07bf7f19b141269772aac83c5e358",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "44cadf7498ba40a290a950b7b1adde3f0b5eb3e4",
"extension": "py"... | 2.90625 | stackv2 | import json
import requests
import time
import streamlit as st
from PIL import Image
from utils.serve import encode_image, decode_image
def detect(image, url, token):
encoded_img = encode_image(image)
data = json.dumps({"encoded_img": encoded_img})
headers = {"Content-Type": "application/json"}
if ... | 51 | 26.57 | 67 | 13 | 340 | python | [{"finding_id": "codeql_py/full-ssrf_483ad2697b9c8445_213a784a", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
19
] | [
null
] | [
16
] | [
62
] | |
2024-11-18T22:26:10.823068+00:00 | 1,539,845,482,000 | 75d83c21737c3237667446bd160702d52ce49caf | 2 | {
"blob_id": "75d83c21737c3237667446bd160702d52ce49caf",
"branch_name": "refs/heads/master",
"committer_date": 1539845482000,
"content_id": "e79caf7ea49e874f16814be75e5edbcb03acbd92",
"detected_licenses": [
"ISC"
],
"directory_id": "c273662b77e5c023a7c867c882a06d34dc7addd1",
"extension": "py",
"fi... | 2.375 | stackv2 | # -*- coding: utf-8 -*-
import sys
from urllib.request import urlopen
from urllib.request import Request
from urllib.request import urlretrieve
import datetime
import json
import math
import argparse
import os
def get_results(url,headers):
try:
req = Request(url,headers=headers)
response = urlope... | 59 | 28.71 | 127 | 12 | 402 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_08e99ebb60225d1a_5c90b2aa", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text."
] | [
55
] | [
null
] | [
17
] | [
30
] | |
2024-11-18T22:26:26.194097+00:00 | 1,693,528,081,000 | 5c02df65219f84a8f478ee0ba73a5e8c551b5e69 | 3 | {
"blob_id": "5c02df65219f84a8f478ee0ba73a5e8c551b5e69",
"branch_name": "refs/heads/main",
"committer_date": 1693528081000,
"content_id": "2528e2163339430015cf940853a203b5ac8a2eca",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6a8bc7da3104726f894ae360fce6a43a54b30812",
"extension": "py",
... | 2.6875 | stackv2 | import gradio as gr
from pydub import AudioSegment
from time import sleep
with gr.Blocks() as demo:
input_audio = gr.Audio(label="Input Audio", type="filepath", format="mp3")
with gr.Row():
with gr.Column():
stream_as_file_btn = gr.Button("Stream as File")
format = gr.Radio(["wa... | 55 | 36.2 | 88 | 19 | 411 | python | [{"finding_id": "codeql_py/path-injection_c9a59e70fab71333_0ae2a4ad", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
44
] | [
null
] | [
27
] | [
37
] | |
2024-11-18T20:39:53.577678+00:00 | 1,602,604,902,000 | 797cd7f1ffbc578c4b2ec41c2f077b275ef83e82 | 2 | {
"blob_id": "797cd7f1ffbc578c4b2ec41c2f077b275ef83e82",
"branch_name": "refs/heads/master",
"committer_date": 1602604902000,
"content_id": "7a5b0548430e5940ba0e98aaa3349a9375a33fc2",
"detected_licenses": [
"MIT"
],
"directory_id": "26c7b6f0fe8f46f14107a86ccf3b6d473c94c9fd",
"extension": "py",
"fi... | 2.328125 | stackv2 | import os
from flask import Flask, flash, Response, request, send_file, redirect, url_for, render_template, send_from_directory
from werkzeug.utils import secure_filename
from PIL import Image
import time
import json
from pubmex.pubmexinference import PubMexInference
UPLOAD_FOLDER = '/home/appuser/detectron2_repo/app... | 100 | 35.81 | 117 | 23 | 755 | python | [{"finding_id": "codeql_py/path-injection_dfd0c0bbde8f89d0_1537f3c6", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
89,
90
] | [
null,
null
] | [
19,
19
] | [
57,
71
] | |
2024-11-18T21:08:20.092663+00:00 | 1,604,648,150,000 | faca6366b8d449c895221fb624990a11c78b7237 | 3 | {
"blob_id": "faca6366b8d449c895221fb624990a11c78b7237",
"branch_name": "refs/heads/master",
"committer_date": 1604648150000,
"content_id": "64c545fd8e4b41d439f9518f03c9e3c332e16580",
"detected_licenses": [
"MIT"
],
"directory_id": "33d84328a6472c97c60f0b6b70485dee248f842d",
"extension": "py",
"fi... | 2.703125 | stackv2 | import re
from bs4 import BeautifulSoup
import requests
from urllib.parse import urlparse, urljoin
from simhash import Simhash
# The simhash module is from https://github.com/1e0ng/simhash
unique_urls = set() # set of unique urls
project_subdomains = ("ics.uci.edu", "cs.uci.edu", "informatics.uci.edu", "stat.uci.edu"... | 144 | 34.74 | 109 | 27 | 1,641 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c26ab1dfcd0b8071_72dc6ae4", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [today.uci.edu](1) may be at an arbitrary position in t... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [today.uci.edu](1) may be at an arbitrary position in the sanitized URL."
] | [
96
] | [
null
] | [
6
] | [
38
] | |
2024-11-18T21:08:28.437223+00:00 | 1,607,983,240,000 | 94cd74d0b758f49502dea31db4fa6decc61adf2b | 3 | {
"blob_id": "94cd74d0b758f49502dea31db4fa6decc61adf2b",
"branch_name": "refs/heads/main",
"committer_date": 1607983240000,
"content_id": "05c2a374cd33aaee551766ee91f4b2509bc8b57a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6f7931d58c45a6a003c537ee42bef6c7291a74ab",
"extension": "py",
... | 3.015625 | stackv2 | import hashlib
import streamlit as st
from SessionState import session_get
def authentication(usr_name, password):
'''Valid the uer_name and password'''
m=hashlib.sha256()
m.update(str(usr_name).encode())
m.update(str(password).encode())
if m.hexdigest() == '7bdc616cc8db6935847e5fb6add88de1f470f96c... | 38 | 40.05 | 99 | 19 | 331 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_27978c7d44f9d33d_f82f118e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
9
] | [
null
] | [
14
] | [
36
] | |
2024-11-18T21:08:33.263655+00:00 | 1,675,947,267,000 | f79438821f843c3dde7aca89e1493f235bbc7c2b | 3 | {
"blob_id": "f79438821f843c3dde7aca89e1493f235bbc7c2b",
"branch_name": "refs/heads/master",
"committer_date": 1675947267000,
"content_id": "79c8c1b8de7c69ae9617dc62f8bc42e85ce81ebe",
"detected_licenses": [
"Apache-2.0",
"Python-2.0"
],
"directory_id": "570ecd3aceba4f099f724f25f668e78d89891137",
... | 2.546875 | stackv2 | # -*- coding: utf-8 -*-
#
# Copyright 2020. Huawei Technologies Co., Ltd. All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.... | 55 | 32.87 | 101 | 14 | 430 | python | [{"finding_id": "codeql_py/request-without-cert-validation_0a4a94835e15e736_3778d5bb", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
33
] | [
null
] | [
20
] | [
102
] | |
2024-11-18T21:32:10.344829+00:00 | 1,536,771,673,000 | 44a9bb4d74d2e694f252d8726647bca13baa4df5 | 2 | {
"blob_id": "44a9bb4d74d2e694f252d8726647bca13baa4df5",
"branch_name": "refs/heads/master",
"committer_date": 1536771673000,
"content_id": "883bd9e509a33ecfb8bf08657c922e081ece66bb",
"detected_licenses": [
"MIT"
],
"directory_id": "d0106f6d39e383cd361e356f9ffd9647f9c6f049",
"extension": "py",
"fi... | 2.375 | stackv2 | import tornado.ioloop
import tornado.web
import json
import utils
class BaseHandler(tornado.web.RequestHandler):
def set_default_headers(self):
self.set_header("Access-Control-Allow-Origin", "*")
self.set_header("Access-Control-Allow-Headers", "x-requested-with")
class CondaHandler(BaseHandler):
... | 51 | 28.06 | 75 | 17 | 305 | python | [{"finding_id": "codeql_py/path-injection_6e0bef4630954321_221f9385", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
13
] | [
null
] | [
19
] | [
47
] | |
2024-11-18T21:32:26.247642+00:00 | 1,519,247,414,000 | e5154f5f283d24261da94f56334a44aa2cb5d26d | 3 | {
"blob_id": "e5154f5f283d24261da94f56334a44aa2cb5d26d",
"branch_name": "refs/heads/master",
"committer_date": 1519247414000,
"content_id": "bea4a39b57e329d625d5cc9fa5272ae3655801eb",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "18f7a1a68267630d12b78a202251234b62575c3c",
"extension": "py"... | 2.703125 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""
Project: RandomPass
Copyright 2018, Korvin F. Ezüst
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0... | 149 | 33.41 | 79 | 14 | 1,092 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1f38f75efdcfa6e7_d8554a28", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
122,
124,
149
] | [
null,
null,
null
] | [
19,
19,
15
] | [
65,
22,
35
] | |
2024-11-18T21:32:29.462403+00:00 | 1,628,867,019,000 | 0e5e7ae0032e65ee203eb1634bd6fdf0bf3e2504 | 3 | {
"blob_id": "0e5e7ae0032e65ee203eb1634bd6fdf0bf3e2504",
"branch_name": "refs/heads/main",
"committer_date": 1628867019000,
"content_id": "0dd96c01b6573518dec5743535505bc172e2d099",
"detected_licenses": [
"MIT"
],
"directory_id": "f31ceb46ad470fff4033df796a22900b04782715",
"extension": "py",
"file... | 2.96875 | stackv2 |
import flask
from flask import request, jsonify
import random
from flask_limiter import Limiter, HEADERS
from flask_limiter.util import get_remote_address
app = flask.Flask(__name__)
limiter = Limiter(app, key_func=get_remote_address) # Set the ratelimiting strategy (Uses IP adress)
@app.route('/api/message', method... | 44 | 57.86 | 153 | 18 | 568 | python | [{"finding_id": "codeql_py/flask-debug_ef7c0190e17935ea_73b89ac4", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
44,
22
] | [
null,
null
] | [
null,
18
] | [
20,
57
] | |
2024-11-18T21:32:59.809789+00:00 | 1,488,901,145,000 | 5c146ce190d33255dcf420c38bf9f0f6da151f6f | 3 | {
"blob_id": "5c146ce190d33255dcf420c38bf9f0f6da151f6f",
"branch_name": "refs/heads/master",
"committer_date": 1488901145000,
"content_id": "e3ab9fd7b6a7d11fe76e0b4217c6714f23419538",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ced6b819d7c494f3181f9c9b5dcd00ad3ba5b43d",
"extension": "py"... | 3.109375 | stackv2 | import bagit
import os
import shutil
from slugify import slugify
class Baggee(object):
'''Base class for an item to be bagged.
Extending classes will most likely want to override :meth:`object_id`,
:meth:`object_title`, and :meth:`data_files`.
'''
#: rough title length, for truncating long titl... | 280 | 36.9 | 78 | 14 | 2,296 | python | [{"finding_id": "codeql_py/overly-permissive-file_d6df6d660ca959a2_665830f6", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
137
] | [
null
] | [
13
] | [
64
] | |
2024-11-18T21:49:04.645971+00:00 | 1,545,400,486,000 | 6ba5cb85f57c2fd0d295fb20cb9798729c4d806b | 3 | {
"blob_id": "6ba5cb85f57c2fd0d295fb20cb9798729c4d806b",
"branch_name": "refs/heads/master",
"committer_date": 1545400486000,
"content_id": "537e426f1d389d4251ff63452076d169847bbec4",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "32dc2fd79c9f84df666a845dd62b344e6c246fa8",
"extension": "p... | 2.75 | stackv2 | import argparse
import json
import os.path
# pprint used to make the output easier to read
import pprint
from flask import Flask, request
import requests
# Iniatilise global variables so they can be used in the handled messages
DOWNLOAD_DIR = 'objects'
CHUNK_SIZE = 10 * 1024 * 1024
app = Flask(__name__)
ARGS = None
... | 97 | 35.16 | 84 | 15 | 787 | python | [{"finding_id": "codeql_py/full-ssrf_5676f06faf6b6a74_8817069d", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 3 | true | [
"CWE-918",
"CWE-022",
"CWE-918"
] | [
"py/full-ssrf",
"py/path-injection",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
68,
25,
24
] | [
null,
null,
null
] | [
9,
15,
9
] | [
41,
26,
56
] | |
2024-11-18T22:42:11.779263+00:00 | 1,626,225,676,000 | 607a5e406996097b4aa9d55d980036d96e58e060 | 2 | {
"blob_id": "607a5e406996097b4aa9d55d980036d96e58e060",
"branch_name": "refs/heads/main",
"committer_date": 1626225676000,
"content_id": "c62f2aa19b3252dc1bf232f8141f295d7bf1ae94",
"detected_licenses": [
"MIT",
"BSD-2-Clause"
],
"directory_id": "2fc8c90331480a2fe76437a524db928c518bcd0b",
"exten... | 2.328125 | stackv2 | #Copyright 2021 Purdue University, University of Virginia.
#All rights reserved.
import sys
import jinja2
from dbUtil import *
cursor = None
def gen_sig_implications(cursor,table_name,threshold):
queryDual = f"SELECT first_parent, first_child, second_parent, second_child FROM {table_name} WHERE zScore>={thresh... | 138 | 30.41 | 125 | 16 | 1,025 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5316ece85d138075_15b14841", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
94
] | [
null
] | [
12
] | [
71
] | |
2024-11-18T22:42:15.860466+00:00 | 1,671,566,848,000 | 9516ef2c9c4c5001cd15fc9e8379c871945b6bf3 | 3 | {
"blob_id": "9516ef2c9c4c5001cd15fc9e8379c871945b6bf3",
"branch_name": "refs/heads/master",
"committer_date": 1671566848000,
"content_id": "cab929dbca2b767925f018e09056e3c90514ce50",
"detected_licenses": [
"Unlicense"
],
"directory_id": "34ddec647d6ad357c1527cf713eaeaee4eb575aa",
"extension": "py",... | 3.421875 | stackv2 | from sys import argv
filename = argv[1]
with open(filename) as f:
instructions = [line[:-1] for line in f]
def swap_pos(arr, x, y):
temp = arr[x]
arr[x] = arr[y]
arr[y] = temp
return arr
def swap_letter(arr, a, b):
index1 = arr.index(a)
index2 = arr.index(b)
return swap_pos(arr, inde... | 71 | 24.99 | 69 | 14 | 549 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e61debe1240519f7_be8d737f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw... | [
71
] | [
null
] | [
7
] | [
64
] | |
2024-11-18T22:42:16.017090+00:00 | 1,613,114,141,000 | e4d6fab2c1ff9c0f85d428ab6f26854837506b81 | 3 | {
"blob_id": "e4d6fab2c1ff9c0f85d428ab6f26854837506b81",
"branch_name": "refs/heads/master",
"committer_date": 1613114141000,
"content_id": "bee947928d57fc15753da2752d11fda49c9d1ac7",
"detected_licenses": [
"MIT"
],
"directory_id": "caf423dc5abcebff487e4152fffcd4eeb8073c30",
"extension": "py",
"fi... | 2.921875 | stackv2 | """contains extra funcs for app"""
from dataclasses import dataclass
from configparser import ConfigParser
from hashlib import sha256
from typing import Dict
import json
from flask import abort
FileIndexData = Dict[str, Dict[str, str]]
config = ConfigParser()
config.read("./fs_config.cfg")
@dataclass(frozen=Tr... | 75 | 22.21 | 86 | 16 | 413 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_eac96df3b0634e19_c87f024c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
27,
40
] | [
null,
null
] | [
9,
24
] | [
60,
56
] | |
2024-11-18T22:42:17.233319+00:00 | 1,570,472,058,000 | ef8776d786a3212336a3216a5b35681c7ecb1dd5 | 3 | {
"blob_id": "ef8776d786a3212336a3216a5b35681c7ecb1dd5",
"branch_name": "refs/heads/main",
"committer_date": 1570472058000,
"content_id": "0d3d47d013b36000a4a88258fa7b9c15700c2482",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "002b6317b653a79736dd70a917c022cb5510d487",
"extension": "py",
... | 2.734375 | stackv2 | #!/usr/bin/env python3
import os
import json
import sys
import requests
import configparser
cfg = configparser.ConfigParser()
cfg.read(os.path.join(os.path.expanduser('~'), 'google.cfg'))
api_key = cfg['maps']['api_key']
def get_coordinates(address):
url = 'https://maps.googleapis.com/maps/api/geocode/json?addre... | 38 | 25.32 | 100 | 11 | 251 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bfa4f1e440bce8d9_c0809765", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
15,
18,
33
] | [
null,
null,
null
] | [
11,
11,
11
] | [
14,
20,
16
] | |
2024-11-18T20:53:31.391963+00:00 | 1,614,181,199,000 | 52da1e3298c25fbaa9941810c2c468a4f6744137 | 3 | {
"blob_id": "52da1e3298c25fbaa9941810c2c468a4f6744137",
"branch_name": "refs/heads/master",
"committer_date": 1614181199000,
"content_id": "c7b848b6ac9ade5874e62327b0b9124d1952fc6a",
"detected_licenses": [
"MIT"
],
"directory_id": "50008b3b7fb7e14f793e92f5b27bf302112a3cb4",
"extension": "py",
"fi... | 2.6875 | stackv2 | #!/usr/local/bin/python26
"""
Python Session Handling
Note: A user must have cookies enabled!
TODO:
* Support Named Sessions
Copyright 2010 - Sunjay Varma
Latest Version: http://www.sunjay.ca/download/session.py
"""
import cgi
import os
import time
import errno
import hashlib
import datetime
from Cookie import Si... | 328 | 24 | 76 | 17 | 2,164 | python | [{"finding_id": "codeql_py/path-injection_d88483c7a393cde8_878089ff", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 4 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
114,
115,
120,
137
] | [
null,
null,
null,
null
] | [
21,
14,
14,
13
] | [
30,
23,
23,
22
] | |
2024-11-18T20:53:40.773949+00:00 | 1,633,421,169,000 | 04bb39f7e607c5e3b3d3fd76a7a7c5bf94fb4dd0 | 3 | {
"blob_id": "04bb39f7e607c5e3b3d3fd76a7a7c5bf94fb4dd0",
"branch_name": "refs/heads/main",
"committer_date": 1633421169000,
"content_id": "1b423f3ab9e84e3a1ef7c3b562554aed7a9b5ad8",
"detected_licenses": [
"MIT"
],
"directory_id": "8c05155506e2baab38d431975f5add29d14a67e5",
"extension": "py",
"file... | 3.25 | stackv2 | from string import ascii_letters, digits
from secrets import choice
alphabet = ascii_letters + digits + "!#$%&()*+,-.:;<=>?@[]_{|}"
def generate_password(length):
return "".join(choice(alphabet) for i in range(length))
if __name__ == "__main__":
import sys
try:
length = int(sys.argv[1] if len(... | 18 | 25.5 | 87 | 15 | 123 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_52e4bb133f7d7c96_71cb48a9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
16
] | [
null
] | [
15
] | [
87
] | |
2024-11-18T20:53:44.141365+00:00 | 1,410,422,562,000 | 6cb48d2945352500a2963c85797b721cb1859f2f | 2 | {
"blob_id": "6cb48d2945352500a2963c85797b721cb1859f2f",
"branch_name": "refs/heads/master",
"committer_date": 1410422562000,
"content_id": "0cd3204594b014e6c7f307560096be56c3de7d13",
"detected_licenses": [
"MIT"
],
"directory_id": "c76925f91ce94cc3ff900591adce6b4d4f063a60",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/env python
import hashlib
import logging
import urllib
from tornado import gen
from tornado import httpclient
from tornado.escape import json_decode
from tornado.httputil import url_concat
class RenrenGraphMixin(object):
_OAUTH_AUTHORIZE_URL = "https://graph.renren.com/oauth/authorize"
_OAUTH_ACC... | 221 | 34.19 | 86 | 19 | 1,557 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_aa23b7850735ca33_7c6a407e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](3) is used in a hashing algorithm (MD... | [
212
] | [
null
] | [
27
] | [
28
] | |
2024-11-18T21:10:19.676945+00:00 | 1,483,820,257,000 | 30b1d501e1c0b8b179903344a2abc9cec389fe47 | 3 | {
"blob_id": "30b1d501e1c0b8b179903344a2abc9cec389fe47",
"branch_name": "refs/heads/master",
"committer_date": 1483820257000,
"content_id": "5037d03b0cdbe80b2606fedba1ca869385747fad",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "3a5a36a89f14fbd62fe3b05add3cdb4849540888",
"extension": "py",
... | 2.96875 | stackv2 | """
Generates a set of standalone markdown files from DayOne entries.
Assumes that this script is run on a Mac that has iCloud Drive Enabled
and DayOne has been setup to Sync with iCloud and that the Folder is
the default, "Journal_dayone".
Requires python 2.7 and the external pytz module.
"""
import argparse
import ... | 165 | 30.93 | 84 | 14 | 1,193 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_414bd6a1af84b5d6_e5fb0740", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
140
] | [
null
] | [
17
] | [
44
] | |
2024-11-18T21:10:21.521604+00:00 | 1,606,499,014,000 | f0fddca15bbba19718d3c78958ad72aeb50a5b9a | 3 | {
"blob_id": "f0fddca15bbba19718d3c78958ad72aeb50a5b9a",
"branch_name": "refs/heads/master",
"committer_date": 1606499014000,
"content_id": "85fe42b21df5fd160b10871d9b6da9e28e2865ca",
"detected_licenses": [
"Unlicense"
],
"directory_id": "58921ba123e3739c8ce0abe16b7a1756d4f6a696",
"extension": "py",... | 2.78125 | stackv2 | # ================================================================== #
from random import randint
from colorama import Fore, Back, Style
import hashlib
import colorama
import sys
# ================================================================== #
# | CONFIG
# Prompt Colors
normal_background = Fore.LIGHTGREEN_EX +... | 121 | 30.26 | 106 | 16 | 913 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_bacc42ce6dba2529_f684c7dd", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-327"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive d... | [
116,
102,
90
] | [
null,
null,
null
] | [
24,
15,
35
] | [
35,
70,
62
] | |
2024-11-18T21:10:24.224138+00:00 | 1,534,782,014,000 | 09c246abf84948036873b850ebd7cb4d2242a280 | 2 | {
"blob_id": "09c246abf84948036873b850ebd7cb4d2242a280",
"branch_name": "refs/heads/master",
"committer_date": 1534782014000,
"content_id": "734d8b1f922026b0ac7fe77c0ef3024590682658",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4514b39e7be94c6512331cf3e43b143e9bf32048",
"extension": "py"... | 2.484375 | stackv2 | #!/usr/bin/python3
from flask import Flask, request, jsonify
from flask_restful import Resource, Api
from json import dumps
import requests
import os
import operator
from scripts.label_image import main
app = Flask(__name__)
api = Api(app)
CLAVES = {
"0": "Acquiarium",
"1": "AmusementPark",
"2": "ArtGalle... | 68 | 26.34 | 76 | 21 | 449 | python | [{"finding_id": "codeql_py/full-ssrf_ab0d4f2157858648_a5858ab3", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
42
] | [
null
] | [
28
] | [
45
] | |
2024-11-18T21:10:29.786309+00:00 | 1,581,597,487,000 | 9bee3caf1c46baeb4f465323bbf5e32b56195e42 | 3 | {
"blob_id": "9bee3caf1c46baeb4f465323bbf5e32b56195e42",
"branch_name": "refs/heads/master",
"committer_date": 1581597487000,
"content_id": "a79d8af0c5ef4b4455e55515046ab1dbc1643b27",
"detected_licenses": [
"MIT"
],
"directory_id": "7fb33759546979db262710bba97ccb2cf4197314",
"extension": "py",
"fi... | 3.046875 | stackv2 | from github import Github
from github.GithubException import GithubException
from getpass import getpass
if __name__ == "__main__":
gitHubUsername = input("Please enter your Github username: ").strip()
gitHubPassword = getpass("Please enter your Github password: ").strip()
gitUser = Github(gitHubUsern... | 35 | 43.51 | 154 | 14 | 373 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ca0cfcb86be81ed4_e7cc8ac0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
23
] | [
null
] | [
15
] | [
144
] | |
2024-11-18T21:10:31.716133+00:00 | 1,677,170,377,000 | d24e5e88605f8e24e3e3e9d00ca1a3570be96f35 | 3 | {
"blob_id": "d24e5e88605f8e24e3e3e9d00ca1a3570be96f35",
"branch_name": "refs/heads/master",
"committer_date": 1677170377000,
"content_id": "e1d589bf53b52bf4ef477b853fa4b262e284a1a3",
"detected_licenses": [
"MIT"
],
"directory_id": "3315a6a8a44633dba4a81a75562f9bf821b66a29",
"extension": "py",
"fi... | 2.578125 | stackv2 | from abc import ABC, abstractmethod
from datetime import datetime, time
from distutils.dir_util import copy_tree
from http.server import SimpleHTTPRequestHandler
from multiprocessing import Pool
from pathlib import Path
from dateutil import tz
from jinja2 import Environment, FileSystemLoader
from kart.ext.markdown im... | 227 | 37.33 | 93 | 21 | 2,009 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9b9a527f41568d9d_6386a76f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
108
] | [
null
] | [
20
] | [
78
] | |
2024-11-18T21:10:50.194128+00:00 | 1,543,742,863,000 | 3ec99fba2485c78e492e67486af396c5e82e0433 | 4 | {
"blob_id": "3ec99fba2485c78e492e67486af396c5e82e0433",
"branch_name": "refs/heads/master",
"committer_date": 1543742863000,
"content_id": "6ea68e70134ce90bccf4277786626d8b3197c2fa",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e008adba23ca69badad0776bcb914925e69b9be1",
"extension": "py"... | 4.125 | stackv2 | class Person:
name = '' #外部定义的都是作为类变量,相当于其他语言中的static
age = 0
def __init__(self, name, age): #self,每一个成员方法第一个参数必须是self,只需要在定义的时候写,函数调用的时候不用写
#init相当于构造函数
self.name = name #在实例中定义了同名的self.name覆盖了类对象的name
self.age = 20
self.height = 1.9 #这个是在实例对象中定义... | 60 | 19.6 | 82 | 12 | 443 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_691b966314c92f8a_717e2dba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
27
] | [
null
] | [
15
] | [
33
] | |
2024-11-18T21:11:11.252026+00:00 | 1,598,117,469,000 | da72e99f67ad50ba1df3c20d3b69063ac9d042e4 | 2 | {
"blob_id": "da72e99f67ad50ba1df3c20d3b69063ac9d042e4",
"branch_name": "refs/heads/master",
"committer_date": 1598117469000,
"content_id": "2c7878f6679da9fb60e38ea9225b09c8ffd506f7",
"detected_licenses": [
"MIT"
],
"directory_id": "9e62fb4fab9271771219b58425068aeb8f2b03ac",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/env python2
import os
from sendgrid import SendGridAPIClient
from sendgrid.helpers.mail import Mail
from sendgrid.helpers.mail import To
from flask import Flask
from flask import request
app = Flask(__name__)
@app.route('/', methods=['GET'])
def email_server():
print('sending email...')
print(reque... | 42 | 26.02 | 103 | 13 | 322 | python | [{"finding_id": "codeql_py/flask-debug_a0ed1baa06cfe742_983b5364", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
42,
38
] | [
null,
null
] | [
5,
16
] | [
53,
50
] | |
2024-11-18T21:11:12.507593+00:00 | 1,544,227,205,000 | e9c39e3d74a232aca2ee208be3870d625888a407 | 4 | {
"blob_id": "e9c39e3d74a232aca2ee208be3870d625888a407",
"branch_name": "refs/heads/master",
"committer_date": 1544227205000,
"content_id": "bd6a290eb7d4b2962f81ac5dd5726906ef06df90",
"detected_licenses": [
"MIT"
],
"directory_id": "f73afaa4e76f560da49a7d8c21f5e455a8d2ecdd",
"extension": "py",
"fi... | 4 | stackv2 | class Node (object):
password = ""
count = -1
next = None
# Constructor for a Node
def __init__(self, password, count, next):
self.password = password
self.count = count
self.next = next
# Linked List class.
class LinkedList:
#Constructor for a Linked List
def __i... | 234 | 26.94 | 88 | 16 | 1,441 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8210bcbbd5b6a40b_de80cc95", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
45,
221
] | [
null,
null
] | [
19,
11
] | [
56,
54
] | |
2024-11-18T21:47:37.060482+00:00 | 1,392,615,030,000 | 326a63c919f32633bb1206356dad2a90cb801417 | 4 | {
"blob_id": "326a63c919f32633bb1206356dad2a90cb801417",
"branch_name": "refs/heads/master",
"committer_date": 1392615030000,
"content_id": "425daf9be87f0646cde4d6ac418e7ae7dc323493",
"detected_licenses": [
"MIT"
],
"directory_id": "e9fe8447ba00852ddf13e88766f768938bf77d15",
"extension": "py",
"fi... | 3.859375 | stackv2 | #!/usr/bin/python
#def birthday(amount=365):
# n = 1
# for i in range(1, amount):
# n *= (1 - (float(i) / amount))
# print("%i: %.2f" % (i, 100-(n*100)))
def fact(n):
n = int(n)
factorial = 1
for number in range(1, n + 1):
factorial *= number
return factorial
def ... | 23 | 20.52 | 62 | 12 | 166 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5d4dd9ed776a532e_d51faf26", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
23
] | [
null
] | [
11
] | [
21
] | |
2024-11-18T21:47:38.795880+00:00 | 1,692,121,841,000 | f7ccdc334244018ca0cc6375616020d19deb0dae | 3 | {
"blob_id": "f7ccdc334244018ca0cc6375616020d19deb0dae",
"branch_name": "refs/heads/master",
"committer_date": 1692121841000,
"content_id": "f13ae3343815b9a233b3bbf5a363289366d6631b",
"detected_licenses": [
"MIT"
],
"directory_id": "0f3125015ab1f484d22ff77705e464f1ff844370",
"extension": "py",
"fi... | 2.90625 | stackv2 | import pandas as pd
import requests
import matplotlib.pyplot as plt
G_API = '#ADD GOOGLE API KEY'
# reading csv file
def filter_dataframe(df, column_name, value):
return df.loc[df[column_name] == value]
def get_address(lat, long):
URL = 'https://maps.googleapis.com/maps/api/geocode/json?latlng=' + str(lat)... | 92 | 43.86 | 116 | 13 | 857 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2ace3bc46d94ff31_8f312506", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
27,
27
] | [
null,
null
] | [
15,
32
] | [
30,
48
] | |
2024-11-18T21:47:39.828082+00:00 | 1,635,199,755,000 | e9ff72ecffaf4dc9690103d8fc13ffa2634fe664 | 3 | {
"blob_id": "e9ff72ecffaf4dc9690103d8fc13ffa2634fe664",
"branch_name": "refs/heads/main",
"committer_date": 1635199755000,
"content_id": "c5b84fd4a3d0d9cdabbfe6894669c45d2db5475d",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "32ef6ea8f2dff9f50047c3158dea488c1f71a61c",
"extension": "py"... | 3.078125 | stackv2 | #!/usr/bin/env python3
import os
import hashlib
from base64 import b64encode
from argparse import ArgumentParser
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
from cryptography.hazmat.primitives import padding
from cryptography.hazmat.backends import default_backend
class AES:
def _... | 56 | 29.3 | 106 | 15 | 441 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b5fcbd3e7b680ccf_69d1ce0c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
16
] | [
null
] | [
29
] | [
46
] | |
2024-11-18T21:47:40.362735+00:00 | 1,420,577,187,000 | aaf14c668efc4e2c178fff7e80fac9fc7bd56142 | 3 | {
"blob_id": "aaf14c668efc4e2c178fff7e80fac9fc7bd56142",
"branch_name": "refs/heads/master",
"committer_date": 1420577187000,
"content_id": "709655b15d4fafaa9dde9f3e71f098e604459f3f",
"detected_licenses": [
"MIT"
],
"directory_id": "338389b2d475803df372fa7a2aa8d1e7a0f89aca",
"extension": "py",
"fi... | 2.640625 | stackv2 | # This Python file is the basic file to create the web services with Tornado
# Author: Gustavo Martin Vela
import tornado.ioloop
import tornado.web
import datetime
import MySQLdb as mdb
import json
import time
#from collections import OrderedDict
import RGB
# Global variables
VERSION = "0.1"
SW_NAME = "M2More"
AUTHO... | 122 | 37.63 | 160 | 16 | 1,170 | python | [{"finding_id": "codeql_py/sql-injection_91181640202247fd_c98aca00", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2)."... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2)."
] | [
58
] | [
null
] | [
25
] | [
30
] | |
2024-11-18T22:29:03.439989+00:00 | 1,419,237,844,000 | f297de2efb5b0662f6d96c57ec8111c4100fa75d | 3 | {
"blob_id": "f297de2efb5b0662f6d96c57ec8111c4100fa75d",
"branch_name": "refs/heads/master",
"committer_date": 1419237844000,
"content_id": "4da0254b1e48ad2d35f7e9d4bdcc2f634b657c07",
"detected_licenses": [
"MIT"
],
"directory_id": "2020fff14c4a79cfd77dc791166ae5ca2d3cd505",
"extension": "py",
"fi... | 2.671875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""SpoofMAC
Usage:
spoof-mac list [--wifi]
spoof-mac randomize [--local] <devices>...
spoof-mac set <mac> <devices>...
spoof-mac reset <devices>...
spoof-mac normalize <mac>
spoof-mac -h | --help
spoof-mac --version
Options:
-h --help ... | 136 | 28.74 | 101 | 20 | 888 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0f04f206417568cb_4abcd6be", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
118
] | [
null
] | [
15
] | [
51
] | |
2024-11-18T22:29:27.828289+00:00 | 1,532,352,746,000 | aa1856a0ea53e4f6e65676d7893c560b6997cdd4 | 3 | {
"blob_id": "aa1856a0ea53e4f6e65676d7893c560b6997cdd4",
"branch_name": "refs/heads/master",
"committer_date": 1532352746000,
"content_id": "943236775108a7103d6083da14e0e8bab2db3482",
"detected_licenses": [
"MIT"
],
"directory_id": "275f3a3dce44f35a5dc1a626e2052c006bdb71bf",
"extension": "py",
"fi... | 3 | stackv2 | import sys
from collections import defaultdict
sys.setrecursionlimit(10000)
memory = defaultdict(list)
def passwordCracker(passwd, attempt):
# Complete this function
if attempt == '':
return True, []
new_attempt = attempt
for p in passwd:
if new_attempt.startswith(p):
... | 36 | 29.31 | 74 | 16 | 233 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7d85fce18365c2a3_d8663a37", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
34
] | [
null
] | [
19
] | [
40
] | |
2024-11-18T22:40:35.304030+00:00 | 1,412,181,326,000 | 21d2925009d96ee9e83bb6d171a14ae4280d72bc | 3 | {
"blob_id": "21d2925009d96ee9e83bb6d171a14ae4280d72bc",
"branch_name": "refs/heads/master",
"committer_date": 1412181326000,
"content_id": "fd0aced37931990f2b2a999c000e477b61350e95",
"detected_licenses": [
"MIT"
],
"directory_id": "09165f56de7fee937f7dddd9bb25ba87071b9e27",
"extension": "py",
"fi... | 2.953125 | stackv2 | """
DESCRIPTION:
Extracts SciTech links and OSTI identifiers from XML files.
INSTRUCTIONS:
First download XML files into a folder with download_xml_services.py.
To obtain a text file with all links out of the downloaded files, use the
--identifier_links option, as this one is more reliable than the direct
extractio... | 131 | 34.82 | 105 | 14 | 1,147 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_7898f8492cba13c0_888fa252", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'osti.gov/scitech/servlets/purl/', s... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'osti.gov/scitech/servlets/purl/', so it might match more hosts than expected."
] | [
91
] | [
null
] | [
35
] | [
80
] | |
2024-11-18T22:40:37.136102+00:00 | 1,688,757,739,000 | 2abfb5eecd5368f747c5ae2ec0448f7a744982e2 | 3 | {
"blob_id": "2abfb5eecd5368f747c5ae2ec0448f7a744982e2",
"branch_name": "refs/heads/master",
"committer_date": 1688757739000,
"content_id": "37f8a5c8ff5e291b17c49ad009939f92879f9872",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4f70a7b1180e87d121c01e15843df4f968caf966",
"extension": "py"... | 2.625 | stackv2 | """
Flask HTTP gateway module.
"""
import functools
from io import BytesIO
import json
import logging
import hashlib
import numpy
import flask
from flask import Flask, make_response
from utils import tagged_logger
# pylint: disable=import-error
# Not designed to be installed in vision, yet
from requests_toolbelt im... | 253 | 37.06 | 102 | 17 | 1,951 | python | [{"finding_id": "codeql_py/reflective-xss_95302d381fbf48b5_75c18ae6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-117"
] | [
"py/reflective-xss",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
135,
134
] | [
null,
null
] | [
34,
26
] | [
37,
29
] | |
2024-11-18T22:41:19.137850+00:00 | 1,519,175,922,000 | e6a992610979fa26139be06f5e0335623634dda9 | 3 | {
"blob_id": "e6a992610979fa26139be06f5e0335623634dda9",
"branch_name": "refs/heads/master",
"committer_date": 1519175922000,
"content_id": "13da9db5388be1948f2b683a527f407411664216",
"detected_licenses": [
"MIT"
],
"directory_id": "284796e63dba49ee83babcf2c3ce953c5c836ac4",
"extension": "py",
"fi... | 2.859375 | stackv2 | #!/bin/python
import codecs
import sys
def test(argv):
with open(argv[1], "rb") as f:
hexdump = []
for chunk in iter(lambda: f.read(1), b''):
hexdump.append(codecs.encode(chunk, 'hex'))
i = 68608
char = hexdump[i]
password = ""
while char != b'00':
... | 67 | 24.03 | 117 | 17 | 473 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bcc13039f6780ece_6ce98b2f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
22,
61
] | [
null,
null
] | [
15,
19
] | [
23,
44
] | |
2024-11-18T22:41:19.669347+00:00 | 1,651,156,404,000 | 334dcc068aadf2c793e2e0b1c6c088acc0339225 | 3 | {
"blob_id": "334dcc068aadf2c793e2e0b1c6c088acc0339225",
"branch_name": "refs/heads/master",
"committer_date": 1651156404000,
"content_id": "81c1940d2ca4ec8b3099fbe9589e8e3402496c02",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "684ab490f3e0d778a1e204e6b190b9ea587261a3",
"extension": "p... | 2.546875 | stackv2 | #!/usr/bin/env python
import sys, os
sys.path.append(os.path.join(os.path.dirname(__file__), '..'))
import messagebird
# ACCESS_KEY = ''
# PHONE_NUMBER = ''
try:
ACCESS_KEY
except NameError:
print('You need to set an ACCESS_KEY constant in this file')
sys.exit(1)
try:
PHONE_NUMBER
except NameError:
print... | 56 | 34.3 | 73 | 13 | 523 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9ec0232933bbccae_3b593b8e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
33
] | [
null
] | [
9
] | [
60
] | |
2024-11-18T22:54:12.342450+00:00 | 1,521,116,233,000 | b1b90a5dffabc642f021e294d19b27d35a97b42f | 3 | {
"blob_id": "b1b90a5dffabc642f021e294d19b27d35a97b42f",
"branch_name": "refs/heads/master",
"committer_date": 1521116233000,
"content_id": "4e68692179b9b752b00d9ff0ab5f8772cde007da",
"detected_licenses": [
"MIT"
],
"directory_id": "6e4802194f5cfc058a73a8437b47401c9ddd0558",
"extension": "py",
"fi... | 3.109375 | stackv2 | import pandas as pd
train=pd.read_csv('/home/ankita/Desktop/Python files/Titanic/train.csv')
test=pd.read_csv('/home/ankita/Desktop/Python files/Titanic/test.csv')
#Comparing Columns with #survived #male or #female
P_male_yes=0
P_fem_yes=0
P_male_no=0
P_fem_no=0
for i,rowi in train.iloc[:].iterrows():
if rowi['Su... | 168 | 29.05 | 72 | 13 | 1,653 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e00e0708821ab13a_cf25a00e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
21
] | [
null
] | [
15
] | [
26
] | |
2024-11-18T22:54:16.413269+00:00 | 1,360,545,331,000 | c282fc4dba40c8bfa493c33687ca02d760256f2a | 2 | {
"blob_id": "c282fc4dba40c8bfa493c33687ca02d760256f2a",
"branch_name": "refs/heads/master",
"committer_date": 1360545331000,
"content_id": "bbf5029273f0b9be196089f0aeea2a89a606573a",
"detected_licenses": [
"MIT"
],
"directory_id": "549ded5d0502580ab419a900e61981acbb19cd81",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python
'''
Copyright (C) Kalan MacRow, 2013
This code is distributed with jquery.instagram.js
under the MIT license.
https://github.com/kmacrow/jquery.instagram.js
'''
import os
import cgi
import sys
import cgitb
import urllib2
# Base URL for Instagram API endpoints
INSTAGRAM_BASE = 'https://... | 51 | 21.27 | 62 | 11 | 295 | python | [{"finding_id": "codeql_py/partial-ssrf_40c435c88ae2c406_5decdb03", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
48
] | [
49
] | [
10
] | [
50
] | |
2024-11-18T21:33:03.841578+00:00 | 1,518,287,017,000 | f2bbc8698cce051a55c60d601c56a00b68c2d506 | 3 | {
"blob_id": "f2bbc8698cce051a55c60d601c56a00b68c2d506",
"branch_name": "refs/heads/master",
"committer_date": 1518287017000,
"content_id": "12ef5c30b8a96bc45bfb892dddd4f788ad831246",
"detected_licenses": [
"MIT"
],
"directory_id": "e1fcb71eaffdd76336db0b5134f6a4579393663a",
"extension": "py",
"fi... | 3.375 | stackv2 | """
UK income tax calculator
Functions:
get_net_adjusted_income -- return gross income after salary sacrifice
get_personal_allowance -- return the income tax personal allowance applicable
get_total_taxable_income -- return the portion of income subject to tax
get_tax_breakdown -- return the amount paid in each band fo... | 335 | 30.86 | 99 | 20 | 2,605 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_65501294f02a2c62_f0e336a6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
267,
272
] | [
null,
null
] | [
15,
15
] | [
97,
83
] | |
2024-11-18T21:33:28.825403+00:00 | 1,563,896,235,000 | be97af4bd74dc534f5bee67ab69af09a8abe1e40 | 3 | {
"blob_id": "be97af4bd74dc534f5bee67ab69af09a8abe1e40",
"branch_name": "refs/heads/master",
"committer_date": 1563896235000,
"content_id": "a4e482cbdec24ef6958d8f6e5f5b77b9e4ec0727",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "adcc59bda80f5c534bc07ec952c8e843c32cb7cf",
"extension": "py"... | 3.390625 | stackv2 | '''
功能:采集河北金融学院的新闻,地址为:https://www.hbfu.edu.cn/news/queryListForPage
分析,通过抓包:
得到新闻列表的接口为:https://www.hbfu.edu.cn/news/queryListForPage post模式,form数据为:start: 20 limit: 20 type: 1。
其中type、limit 不变;start从0开始,20为步长进行增长。
新闻详情页的接口为:https://www.hbfu.edu.cn/news/findById post方式,form表单数据为id,ID就是新闻的ID号,通过进一步分析,
... | 45 | 36.2 | 130 | 18 | 582 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b2566eac57e873a2_42b62586", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
22,
28
] | [
null,
null
] | [
15,
21
] | [
124,
124
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.