added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T00:59:49.525701+00:00 | 1,626,707,317,000 | 05e1ee9502dd2bc20373e4a5df05a906cc22815a | 2 | {
"blob_id": "05e1ee9502dd2bc20373e4a5df05a906cc22815a",
"branch_name": "refs/heads/master",
"committer_date": 1626707317000,
"content_id": "bd2a6dbb39911c8c4b7998436fa8cd810d7cdd8c",
"detected_licenses": [
"MIT"
],
"directory_id": "929e431c2ba2960ef8681f37e81cce22b6295fee",
"extension": "py",
"fi... | 2.3125 | stackv2 | # -*- coding: utf-8 -*-
import errno
import json
import logging
import logging.handlers
import os
import time
from configparser import ConfigParser, ExtendedInterpolation
import requests
import websocket
symbol1LastCallTime = 0.0
symbol2LastCallTime = 0.0
symbol3LastCallTime = 0.0
symbol4LastCallTime = 0.0
d... | 262 | 30 | 101 | 18 | 2,127 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c036218eca65b98d_4b1ff43f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
230
] | [
235
] | [
16
] | [
35
] | |
2024-11-19T01:00:06.873085+00:00 | 1,584,556,322,000 | 209a0eff62ce0b9402a9bc9d304b34b9eb11f5a7 | 3 | {
"blob_id": "209a0eff62ce0b9402a9bc9d304b34b9eb11f5a7",
"branch_name": "refs/heads/master",
"committer_date": 1584556322000,
"content_id": "b41d5332ce74825409f34376b6419ce5fcf6114b",
"detected_licenses": [
"MIT"
],
"directory_id": "9fc2b498b4134d587944d64eab2298e644ae02e6",
"extension": "py",
"fi... | 3.328125 | stackv2 | import mysql.connector
from mysql.connector import Error
from use_key import encrypt, decrypt
def connect_database():
try:
global connection
global cursor
connection = mysql.connector.connect(host='localhost',
database='passwords',
... | 116 | 33.1 | 131 | 17 | 892 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_de0992825cdc187e_9040ac04", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
47,
90
] | [
null,
null
] | [
9,
11
] | [
74,
99
] | |
2024-11-19T01:22:13.021794+00:00 | 1,581,056,015,000 | f596c97e304713e61fad427185d451c21f7ce67c | 3 | {
"blob_id": "f596c97e304713e61fad427185d451c21f7ce67c",
"branch_name": "refs/heads/master",
"committer_date": 1581056015000,
"content_id": "16e31d26fdb1b283b91da62afeb5e68ce243dc79",
"detected_licenses": [
"MIT"
],
"directory_id": "73841069a6b739a10e4b8ac134cfe982593c7b56",
"extension": "py",
"fi... | 3.140625 | stackv2 | import urllib.request
import json
from .models import News, Sources
# Get the API key
api_key = None
# Get the News base url
base_url = None
# Function that takes in the application instance
def configure_request(app):
global api_key, base_url
api_key = app.config['NEWS_API_KEY']
base_url = app.config[... | 103 | 25.8 | 103 | 14 | 593 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_10928ca15aba7d0e_302dee4e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
26
] | [
null
] | [
11
] | [
24
] | |
2024-11-19T01:56:48.732760+00:00 | 1,408,084,697,000 | c0a02c901c818f10398cbc2c205a62f099c71d78 | 3 | {
"blob_id": "c0a02c901c818f10398cbc2c205a62f099c71d78",
"branch_name": "refs/heads/master",
"committer_date": 1408084697000,
"content_id": "d494cb9d82697eeb58569efaff092e339601f782",
"detected_licenses": [
"MIT"
],
"directory_id": "df3975a6d594f2111b490de60b0a12da990d78e9",
"extension": "py",
"fi... | 2.78125 | stackv2 | import util
from totalimpactwebapp.util import cached_property
from totalimpactwebapp import db
class AliasRow(db.Model):
__tablename__ = 'alias'
tiid = db.Column(db.Text, db.ForeignKey('item.tiid'), primary_key=True)
namespace = db.Column(db.Text, primary_key=True)
nid = db.Column(db.Text, primary_... | 110 | 28.66 | 80 | 18 | 706 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_a27ec652a54775f7_ad431b16", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [slideshare.net](1) may be at an arbitrary position in ... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The string [slideshare.net](1) may be at an arbitrary position in the sanitized URL.",
"The string [github.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [youtube.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [vimeo.com](1) may be at an arbitrary pos... | [
90,
93,
96,
99
] | [
null,
null,
null,
null
] | [
16,
18,
18,
18
] | [
53,
51,
52,
50
] | |
2024-11-19T02:10:24.762388+00:00 | 1,542,805,577,000 | 8a562e59aff388b168214629051bfcc3c64c59ff | 3 | {
"blob_id": "8a562e59aff388b168214629051bfcc3c64c59ff",
"branch_name": "refs/heads/master",
"committer_date": 1542805577000,
"content_id": "207008a93efa2dcbdab89eff6415d7307f991648",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "3f19365f3e9ce48acb8b6638e4a1161fa025aebd",
"extension": "p... | 2.9375 | stackv2 | from flask import current_app
from jinja2 import Environment, PackageLoader, meta
class LayoutParameter:
"""
Class for layout parameters in jinja2 templates
types can be:
- bool
- str
"""
def __init__(self, name):
"""
Init parameter
:param name: name as string pa... | 94 | 27.81 | 103 | 16 | 576 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4beaabda6dead955_f53f2f92", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
70
] | [
null
] | [
15
] | [
104
] | |
2024-11-19T02:10:36.886763+00:00 | 1,486,472,178,000 | 9cd7e35ebea1097d047528904f29b387085fde8d | 3 | {
"blob_id": "9cd7e35ebea1097d047528904f29b387085fde8d",
"branch_name": "refs/heads/master",
"committer_date": 1486472178000,
"content_id": "416575988cf58cd3cabf2279dc6e6543fdc40b56",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "966d6267cf3c03d927bda0e093b00b28471ea5b1",
"extension": "p... | 2.609375 | stackv2 | # -*- coding: utf-8 -*-
from __future__ import absolute_import
from __future__ import division
from __future__ import print_function
from __future__ import unicode_literals
import os
import sys
import shutil
import hashlib
import platform
import numpy as np
import pandas as pd
from .base import PipelineFinder
def... | 182 | 34.74 | 110 | 19 | 1,622 | python | [{"finding_id": "codeql_py/tarslip_ace1b91964096d66_429d9e62", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)."
] | [
137
] | [
null
] | [
13
] | [
16
] | |
2024-11-19T02:10:47.590132+00:00 | 1,517,367,223,000 | 8ff5e81f87a79c7220bb18bf41a928a1732bd0b4 | 2 | {
"blob_id": "8ff5e81f87a79c7220bb18bf41a928a1732bd0b4",
"branch_name": "refs/heads/master",
"committer_date": 1517367223000,
"content_id": "102e07840fab6ecce3b9f6eafee9b34d01926130",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "608d416ba9b9fa0a81cb34566970d447c031052f",
"extension": "py"... | 2.40625 | stackv2 | import os
import sys
import json
import requests
from config import BOT_ID,BOT_ACCESS_TOKEN,PAGE_ACCESS_TOKEN,VERIFY_TOKEN
from flask import Flask, request
app = Flask(__name__)
class Button(dict):
pass
@app.route('/', methods=['GET'])
def verify():
# when the endpoint is registered as a webhook, it must e... | 202 | 27.73 | 132 | 20 | 1,212 | python | [{"finding_id": "codeql_py/flask-debug_352c7428c2ee018e_e001fd4a", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
202,
22
] | [
null,
null
] | [
5,
16
] | [
24,
50
] | |
2024-11-19T02:45:21.088200+00:00 | 1,621,482,216,000 | 2727565475f1873df6b3c1c98cd90e9b98ac9980 | 3 | {
"blob_id": "2727565475f1873df6b3c1c98cd90e9b98ac9980",
"branch_name": "refs/heads/main",
"committer_date": 1621482216000,
"content_id": "4721052c791ac72879fb4d85f40b81084fc8324d",
"detected_licenses": [
"MIT"
],
"directory_id": "0ccf257bbe1d9a0e808e76a77b2f5aa3c0a16340",
"extension": "py",
"file... | 2.578125 | stackv2 | import os
import requests
from fastapi import APIRouter, HTTPException
from pydantic import BaseModel
router = APIRouter()
class Calc(BaseModel):
op: str
number1: int
number2: int
@router.post("/calc")
def calc(body: Calc):
if body.op == "add":
r = requests.get(url=f"{os.getenv('base_url')}/... | 36 | 41.08 | 121 | 18 | 397 | python | [{"finding_id": "codeql_py/partial-ssrf_181a174ba3afdda3_eb85e709", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 6 | true | [
"CWE-918",
"CWE-918",
"CWE-918",
"CWE-918",
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the... | [
17,
20,
23,
26,
29,
32
] | [
null,
null,
null,
null,
null,
null
] | [
13,
13,
13,
13,
13,
13
] | [
116,
121,
121,
119,
117,
122
] | |
2024-11-19T02:45:31.216834+00:00 | 1,565,782,189,000 | b2ced18d490b4c6f1fca549e012a7026132024c7 | 2 | {
"blob_id": "b2ced18d490b4c6f1fca549e012a7026132024c7",
"branch_name": "refs/heads/master",
"committer_date": 1565782189000,
"content_id": "6d020f6eef7e05730e1cd70a045344b96a0bc4e7",
"detected_licenses": [
"MIT"
],
"directory_id": "838c1f1401c76c0f1b5e3a33e6c87754cc0e2443",
"extension": "py",
"fi... | 2.3125 | stackv2 | # -*- coding: utf-8 -*-
import sys
import os
import json
import requests
import roybot
import util as u # some local utility functions
import logging
from flask import Flask, request
app = Flask(__name__)
@app.route('/', methods=['GET'])
def verify():
# when the endpoint is registered as a webhook, it must echo b... | 137 | 35.52 | 170 | 25 | 1,084 | python | [{"finding_id": "codeql_py/flask-debug_547c317aeeefb068_2a54b6e1", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 5 | true | [
"CWE-215",
"CWE-079",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"T... | [
137,
20,
32,
104,
106
] | [
null,
null,
null,
null,
null
] | [
5,
16,
18,
21,
21
] | [
24,
50,
22,
154,
170
] | |
2024-11-19T02:45:32.296397+00:00 | 1,470,056,814,000 | 8ec064dd5ec0b76197e5a292e9ce2b2d20c2356e | 2 | {
"blob_id": "8ec064dd5ec0b76197e5a292e9ce2b2d20c2356e",
"branch_name": "refs/heads/master",
"committer_date": 1470056814000,
"content_id": "449b12447c8e4e0aa50fa251e7bf75b48b60f410",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b6c066fd60699183b926e5b5af824180d9869ebc",
"extension": "py"... | 2.375 | stackv2 | from flask import Flask, render_template, redirect, url_for, request, session, flash
from flask_sqlalchemy import SQLAlchemy
from sqlalchemy import Column, Date, Float, ForeignKey, Integer, String
from sqlalchemy.ext.declarative import declarative_base
from sqlalchemy.orm import relationship, sessionmaker
from sqlalche... | 151 | 25.23 | 107 | 15 | 936 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_67da31bb694bd81d_6a785712", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 4 | true | [
"CWE-312",
"CWE-215",
"CWE-327",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/flask-debug",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the d... | [
43,
151,
39,
56
] | [
null,
null,
null,
null
] | [
22,
3,
21,
24
] | [
30,
39,
38,
41
] | |
2024-11-19T02:45:33.987239+00:00 | 1,493,998,780,000 | 6bf0bdbf1837d42cc95e41e0bb762a70d7592f2c | 2 | {
"blob_id": "6bf0bdbf1837d42cc95e41e0bb762a70d7592f2c",
"branch_name": "refs/heads/master",
"committer_date": 1494093972000,
"content_id": "85fabd255ebbbe0a3539d7212a00dc311b3eff39",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b9f12a7a427117d6d9e82b71c48f61b1575533dd",
"extension": "py"... | 2.5 | stackv2 | from __future__ import unicode_literals
from __future__ import print_function
from __future__ import division
from __future__ import absolute_import
from builtins import object
import os
import shutil
import tarfile
import io
import json
from enum import Enum
import boto3
import botocore
from typing import Text
from r... | 196 | 37.54 | 116 | 19 | 1,672 | python | [{"finding_id": "codeql_py/tarslip_d97e9d7752c5c857_7c6f5235", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/tarslip",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
92,
136
] | [
null,
null
] | [
13,
13
] | [
16,
16
] | |
2024-11-19T02:45:47.149716+00:00 | 1,567,133,617,000 | 659599fce5528b586e2265df126a374235a0c0e7 | 2 | {
"blob_id": "659599fce5528b586e2265df126a374235a0c0e7",
"branch_name": "refs/heads/master",
"committer_date": 1567133617000,
"content_id": "aa5ce9b03767a3f273dae9498db21e65af7b9de2",
"detected_licenses": [
"MIT"
],
"directory_id": "e39be3b7f035ef032a7e3c2fdfdc00829fe7f89a",
"extension": "py",
"fi... | 2.375 | stackv2 | from flask import Flask, jsonify, request, render_template
from flask import url_for, make_response, redirect
from werkzeug import secure_filename
app1 = Flask(__name__)
app1.secret_key = r'\x1a\x15I\xdd\x7f\xe3x \xb4\t\xb5tK\xcd\x11\x861,\x910\xa1wu\xdb'
@app1.route('/')
def hello_world():
username = request.coo... | 48 | 26.98 | 85 | 12 | 370 | python | [{"finding_id": "codeql_py/flask-debug_b9d49ba409a91fca_aa16c206", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
48,
11
] | [
null,
null
] | [
5,
26
] | [
25,
60
] | |
2024-11-19T03:12:19.284002+00:00 | 1,511,566,915,000 | 632f1ad0d3d9dc94c4d9616a49cfa8699371d8a8 | 2 | {
"blob_id": "632f1ad0d3d9dc94c4d9616a49cfa8699371d8a8",
"branch_name": "refs/heads/master",
"committer_date": 1511566915000,
"content_id": "2a622c30d74e5c59b113fa07a327668aa0c3ad77",
"detected_licenses": [
"MIT",
"Apache-2.0"
],
"directory_id": "846bf4209f0acada57cf8621bab5d5dd277f8819",
"exten... | 2.453125 | stackv2 | # vim: set filetype=python tabstop=4 shiftwidth=4 expandtab:
import Cryptodome.Cipher.AES
import Cryptodome.Hash.SHA256
import Cryptodome.Random
import Cryptodome.Util.Counter
import ctypes
import getpass
import json
import multiprocessing
import os
import config
_required_credentials = [
"email",
"pw",
... | 106 | 25.54 | 101 | 16 | 702 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_c04953a679523f8e_2ba03c4e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
46,
84
] | [
null,
null
] | [
23,
19
] | [
74,
70
] | |
2024-11-19T03:12:21.448991+00:00 | 1,625,041,230,000 | 4190f756cd660281183108a863d14df6de5a12be | 2 | {
"blob_id": "4190f756cd660281183108a863d14df6de5a12be",
"branch_name": "refs/heads/master",
"committer_date": 1625041230000,
"content_id": "90bd3c96ec82ec4e0099ab379919d448ad38effd",
"detected_licenses": [
"MIT"
],
"directory_id": "e32c04c850a395739d287dd3b88da44725d4912d",
"extension": "py",
"fi... | 2.359375 | stackv2 | from django.shortcuts import render,redirect
from django.shortcuts import HttpResponse
from loginInfo.models import Customer
from django.contrib.auth.hashers import make_password,check_password
# Create your views here.
def index(request):
# print("You are "+request.session.get('email'))
return render(req... | 93 | 31.44 | 142 | 15 | 579 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4ff258dec0d4f380_dabba380", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
76
] | [
null
] | [
21
] | [
29
] | |
2024-11-19T01:33:41.799940+00:00 | 1,621,084,794,000 | 6545d0eb92db591037421cf4c14cce965d2c9521 | 2 | {
"blob_id": "6545d0eb92db591037421cf4c14cce965d2c9521",
"branch_name": "refs/heads/main",
"committer_date": 1621084794000,
"content_id": "ea30a833ca348aa69e4569ceb20dc4813433b037",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3e94940d40de68ebd2b0c20617b1060f4d6755fb",
"extension": "py",
... | 2.4375 | stackv2 | import os
import json
from flask import Flask
from flask import request
from slack_sdk.signature import SignatureVerifier
import boto3
app = Flask(__name__)
@app.route("/", methods=['GET', 'POST'])
def hello():
if request.method == 'POST':
# App CredentialsのSigning Secretから取得する
signing_secret = o... | 43 | 30.44 | 69 | 18 | 369 | python | [{"finding_id": "codeql_py/flask-debug_59f282ebdc299616_d89aebee", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
43,
35
] | [
null,
null
] | [
5,
20
] | [
53,
37
] | |
2024-11-19T01:57:14.090674+00:00 | 1,462,379,161,000 | 1659b262ff49daef230a128b1bb881f9d2b74c79 | 3 | {
"blob_id": "1659b262ff49daef230a128b1bb881f9d2b74c79",
"branch_name": "refs/heads/master",
"committer_date": 1462379161000,
"content_id": "43c6c7f31a785eda2ce88865eab5e12a17850561",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8be71f936c2e2177f7d1b31212ccb9faba00f5df",
"extension": "py"... | 2.71875 | stackv2 | import codecs
import os
from hashlib import sha512
import config
# Generate random bytes for the salt
thebytes = os.urandom(100)
hexstr = str(codecs.encode(thebytes, 'hex'))
salt = hexstr[3:14]
# Hash the password with the salt
tohash = config.password + salt
tohash = tohash.encode("utf8")
hashed = sha512(tohash).h... | 26 | 21.35 | 66 | 9 | 160 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_3ec1d987ab8837e5_e325491a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
16
] | [
null
] | [
17
] | [
23
] | |
2024-11-19T01:57:25.420601+00:00 | 1,693,440,402,000 | 212fafc21fcbc6346f040e3349f7904ccf869458 | 2 | {
"blob_id": "212fafc21fcbc6346f040e3349f7904ccf869458",
"branch_name": "refs/heads/master",
"committer_date": 1693442540000,
"content_id": "10d29f6b57e10057f029adf16dd82d0e251feef0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "aee26a4c731a84481a499679c3d4cef9ec954aed",
"extension": "py"... | 2.5 | stackv2 | # Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under t... | 107 | 35.75 | 79 | 14 | 857 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_0db070666dbb5daa_38b1383e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to WarningPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to WarningPolicy may be unsafe."
] | [
64
] | [
null
] | [
13
] | [
77
] | |
2024-11-19T02:11:06.979262+00:00 | 1,465,767,544,000 | ada1cfe254d4aa1c26428b55a15f68c695ab64c0 | 3 | {
"blob_id": "ada1cfe254d4aa1c26428b55a15f68c695ab64c0",
"branch_name": "refs/heads/master",
"committer_date": 1465767544000,
"content_id": "4904908a0b05de03a48e3b0f74d9ad0cc6923172",
"detected_licenses": [
"MIT"
],
"directory_id": "8f798e3bc32eb6c736096a4c7759dff6a83be3d1",
"extension": "py",
"fi... | 2.625 | stackv2 | import requests
import sys
import hashlib
import time
import locale
import getpass
def main():
locale.setlocale(locale.LC_ALL, '')
username = 'admin'
hashed = False
timeDiff = 5
rateScale = 1024
rateScaleStr = 'KiB'
totalScale = 1048576
totalScaleStr = 'MiB'
if (len(sys.argv) >... | 251 | 30.16 | 121 | 18 | 2,033 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_9212b219c7bbe787_91f46be0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](3) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) ... | [
97,
103
] | [
null,
null
] | [
14,
18
] | [
22,
26
] | |
2024-11-19T02:11:31.301914+00:00 | 1,667,164,334,000 | 9c0a93943d1ed37558197538d7cdd1aebdf547e6 | 3 | {
"blob_id": "9c0a93943d1ed37558197538d7cdd1aebdf547e6",
"branch_name": "refs/heads/master",
"committer_date": 1667164334000,
"content_id": "9d687ed1de058a04eab85eb08f3eef53a60ea800",
"detected_licenses": [
"MIT"
],
"directory_id": "332aec3743049681d00cc8bea42abe7759b13c49",
"extension": "py",
"fi... | 3.1875 | stackv2 | """
Go Service
Routes incoming alias by locating matching pattern and target in the database
if the pattern is a capture group it uses standard regex substitution to
construct the modified target from the incoming alias.
"""
import re
import sre_constants
import sre_parse
from os import getenv
import pymongo.errors
f... | 106 | 30.87 | 84 | 18 | 766 | python | [{"finding_id": "codeql_py/nosql-injection_e7fd07dcc0f77635_c9fcf4a6", "tool_name": "codeql", "rule_id": "py/nosql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This NoSQL query contains an unsanitized [user-provided value](1).", "remediation": "", "location": {"fil... | 3 | true | [
"CWE-943",
"CWE-601",
"CWE-601"
] | [
"py/nosql-injection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This NoSQL query contains an unsanitized [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
98,
105,
106
] | [
null,
null,
null
] | [
47,
25,
21
] | [
52,
53,
27
] | |
2024-11-19T02:11:45.805547+00:00 | 1,578,167,805,000 | d1961baa946c8b727486e69bfb57b26db71b89f4 | 3 | {
"blob_id": "d1961baa946c8b727486e69bfb57b26db71b89f4",
"branch_name": "refs/heads/master",
"committer_date": 1578167805000,
"content_id": "11ff81084321cc600cfa4d1576cdcb26492ea3d2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0cab43a4b29f306df4426d517f30e7664269b9ac",
"extension": "py"... | 2.796875 | stackv2 |
## --------------------------------------------
#importts for the web api
from flask import Flask,jsonify,request
from flask_restful import Api,Resource
from pymongo import MongoClient
import bcrypt
import requests
import subprocess
import json
from pprint import pprint
#--------------------------------------------... | 235 | 27.6 | 110 | 15 | 1,426 | python | [{"finding_id": "codeql_py/flask-debug_03c7cebde446adba_7ef3f5fe", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"The full URL of this request depends on a [user-provided value](1)."
] | [
235,
161
] | [
null,
null
] | [
5,
13
] | [
24,
30
] | |
2024-11-19T02:32:48.634525+00:00 | 1,620,077,882,000 | 9366e41008d78b20bf7a27333a0d8ae5519641ff | 2 | {
"blob_id": "9366e41008d78b20bf7a27333a0d8ae5519641ff",
"branch_name": "refs/heads/master",
"committer_date": 1620077882000,
"content_id": "279231be936599008ad6511038c76a8eba28a0d3",
"detected_licenses": [
"MIT"
],
"directory_id": "8cd1fd261b9c65f45260db7d4d5c0e484fc73c1e",
"extension": "py",
"fi... | 2.4375 | stackv2 | from flask import render_template,redirect,url_for,flash,request
from . import auth
from ..models import User
from .forms import RegistrationForm, LoginForm
from flask_login import login_user,logout_user,login_required
from .. import db
from ..email import mail_message
@auth.route('/login', methods=['GET','POST'])
def... | 43 | 33.95 | 107 | 16 | 324 | python | [{"finding_id": "codeql_py/url-redirection_04a1697246ea1ffd_87440232", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
16
] | [
null
] | [
29
] | [
78
] | |
2024-11-19T02:32:57.115512+00:00 | 1,560,571,675,000 | 2e15e45eb5194223de88026a4ff48b739654ca01 | 3 | {
"blob_id": "2e15e45eb5194223de88026a4ff48b739654ca01",
"branch_name": "refs/heads/master",
"committer_date": 1560571675000,
"content_id": "b5512ac59a75c7c80281d949754947acf6931643",
"detected_licenses": [
"MIT"
],
"directory_id": "c0a753914f3a4d9cca4046a0d114beba93a63cbd",
"extension": "py",
"fi... | 2.890625 | stackv2 | import socket
import os
import threading
import hashlib
from Crypto import Random
import Crypto.Cipher.AES as AES
from Crypto.PublicKey import RSA
import signal
def RemovePadding(s):
return s.replace('`','')
def Padding(s):
return s + ((16 - len(s) % 16) * '`')
def ReceiveMessage():
while True:
... | 137 | 30.57 | 115 | 16 | 1,061 | python | [{"finding_id": "codeql_py/weak-crypto-key_07eb518da2aca7da_238bb15b", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
51
] | [
null
] | [
14
] | [
40
] | |
2024-11-19T02:33:08.275505+00:00 | 1,602,047,875,000 | bfa449a9ca786ee6c7c6ba0de7bc51bfc91d4b30 | 4 | {
"blob_id": "bfa449a9ca786ee6c7c6ba0de7bc51bfc91d4b30",
"branch_name": "refs/heads/master",
"committer_date": 1602047875000,
"content_id": "57a626646550f66e913d0d27a1a7856523d717db",
"detected_licenses": [
"MIT"
],
"directory_id": "0d464df42f5cc3c9a3b992ae9ff6160e5da5701d",
"extension": "py",
"fi... | 3.734375 | stackv2 | # Caesar_Cipher class
class CaesarCipher:
def __init__(self,shift):
encoder=["k"]*26
decoder=["k"]*26
for k in range(26):
encoder[k] = chr((k + shift) % 26 + ord( "A" ))
decoder[k] = chr((k - shift) % 26 + ord( "A" ))
self.forward = "".join(... | 39 | 26.23 | 59 | 16 | 271 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_27a9fcf2baf1af4e_bb02b199", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
39
] | [
null
] | [
25
] | [
31
] | |
2024-11-19T02:33:36.846948+00:00 | 1,611,084,938,000 | f76405e6977b160b785859f6fcaa9a67ab13fccb | 3 | {
"blob_id": "f76405e6977b160b785859f6fcaa9a67ab13fccb",
"branch_name": "refs/heads/main",
"committer_date": 1611084938000,
"content_id": "c5cdcf33968d395e44bd76724022e2ab5817d960",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7d3c201c77f9cff23501387f5b6a4bf1af33796a",
"extension": "py",
... | 2.71875 | stackv2 | # Copyright (C) 2018 Cancer Care Associates
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to ... | 291 | 27.92 | 88 | 16 | 1,827 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dcb8301029817ad8_be5fd85d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive dat... | [
121,
207,
215
] | [
null,
209,
217
] | [
13,
17,
13
] | [
88,
18,
14
] | |
2024-11-19T02:33:41.518223+00:00 | 1,621,216,334,000 | 28f172b16f91d000d4df59da962454d7dcc2bdca | 2 | {
"blob_id": "28f172b16f91d000d4df59da962454d7dcc2bdca",
"branch_name": "refs/heads/main",
"committer_date": 1621216334000,
"content_id": "a37b8049a9f7fa302ba786c0421812f1dbeeb59e",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "816e68283febdf114f990f97bd47a99c722091e4",
"extension": "py"... | 2.3125 | stackv2 | import IP2Proxy
import re
import requests
from plugins.webosint.who.whois import *
#Developer by Bafomet
def ip2Proxy(IP):
if re.match(r"^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$",IP):
db = IP2Proxy.IP2Proxy()
db.open("./plugins/IP2PROXY-LITE-PX8.BIN")
record = db.get_all(IP)
db.close()... | 44 | 39.59 | 87 | 16 | 443 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7ea11862ad7226e7_185d3beb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
39
] | [
null
] | [
23
] | [
48
] | |
2024-11-19T02:46:11.038348+00:00 | 1,447,314,729,000 | 470872ee60f4ef2cf10f7e12684378cb70bd581a | 3 | {
"blob_id": "470872ee60f4ef2cf10f7e12684378cb70bd581a",
"branch_name": "refs/heads/master",
"committer_date": 1447314729000,
"content_id": "cacb7d16f7ba5a7eeaf6c19d172098ad50ea23f5",
"detected_licenses": [
"MIT"
],
"directory_id": "2f11b0b1650816e60606f29c1a6fec6eac7dcbf5",
"extension": "py",
"fi... | 2.859375 | stackv2 | # -*- coding: utf-8 -*-
from flask import Flask, request, make_response, abort
from random import randint
app = Flask(__name__)
@app.route('/cart/<item>')
def cart(item):
items = ['hat', 'book', 'computer']
if not item in items:
abort(404)
return make_response('<h1>You bought a {}!</h1>'.format(... | 33 | 23.48 | 77 | 16 | 217 | python | [{"finding_id": "codeql_py/flask-debug_be8c63b7c5c795a8_ee1338fd", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [use... | [
33,
14,
20
] | [
null,
null,
22
] | [
5,
26,
9
] | [
24,
66,
65
] | |
2024-11-19T02:46:11.137261+00:00 | 1,675,068,553,000 | 780cf860c62085c5016b3838415ddd6cc599e867 | 3 | {
"blob_id": "780cf860c62085c5016b3838415ddd6cc599e867",
"branch_name": "refs/heads/master",
"committer_date": 1675068553000,
"content_id": "701249223b16429a1037da1bc6ccb30f3021605a",
"detected_licenses": [
"MIT"
],
"directory_id": "b1ab5d777efa78b4be4152f92d2c818bb90562a0",
"extension": "py",
"fi... | 3.15625 | stackv2 | #!/usr/bin/env python
# reporting
# Create reports with Jinja2
#
# Author: Benjamin Bengfort <benjamin@bengfort.com>
# Created: Fri Dec 13 10:20:22 2013 -0500
#
# ID: reporting.py [] benjamin@bengfort.com $
"""
Create reports with Jinja2
"""
#########################################################################... | 85 | 31.41 | 92 | 19 | 582 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_65613f5830cfa773_e16339bd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
61
] | [
null
] | [
16
] | [
67
] | |
2024-11-19T02:59:07.140200+00:00 | 1,522,242,349,000 | d9d2eef1a2b14bd50cd2d5d25cd40884de0c2596 | 3 | {
"blob_id": "d9d2eef1a2b14bd50cd2d5d25cd40884de0c2596",
"branch_name": "refs/heads/master",
"committer_date": 1522242349000,
"content_id": "8b83a519b9e53a59af1ab1a205b78e10a11dbe63",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ace719080fd43203d7f849d505f8c337baefedeb",
"extension": "py"... | 2.53125 | stackv2 | import yaml
import jinja2
import re
from .validate import BaseValidator
class Config:
_extra_vars_pattern = re.compile(r'(\S+)=(".*?"|\S+)')
def __init__(self, args):
self.args = args
def _load_yaml(self, f):
return yaml.load(f)
def _parse_vars(self):
return self._load_yaml... | 42 | 27.1 | 87 | 16 | 269 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_bef20cac4f5cc8e1_a1ee5288", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
28
] | [
null
] | [
13
] | [
74
] | |
2024-11-19T02:59:46.433601+00:00 | 1,574,044,484,000 | d7e7bf2da8868a4bd6bc4e2ca9cff495c2d290b9 | 3 | {
"blob_id": "d7e7bf2da8868a4bd6bc4e2ca9cff495c2d290b9",
"branch_name": "refs/heads/master",
"committer_date": 1574044484000,
"content_id": "7e042f54f82a44bacea812e1e0fbf5774469b87c",
"detected_licenses": [
"MIT"
],
"directory_id": "6cf88ad75c3f1e4c081d6edb96564a6a7ef0a3bb",
"extension": "py",
"fi... | 2.53125 | stackv2 | import cgi
import sqlite3
connection = sqlite3.connect("test.db")
cursor = connection.cursor()
head = """ <head>
<title>Test - My Account</title>
<meta name="viewport" conent="width=device-width, initial-scale=1.0">
<link rel="stylesheet" type="text/css" href="style.css">
... | 51 | 26.82 | 81 | 11 | 371 | python | [{"finding_id": "codeql_py/sql-injection_9e2cb3c7c6c66207_828ad43b", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
26
] | [
null
] | [
16
] | [
67
] | |
2024-11-19T03:12:13.463269+00:00 | 1,612,213,142,000 | 1ffcd9bf6b852020ea7786823763bfd1b17b025e | 2 | {
"blob_id": "1ffcd9bf6b852020ea7786823763bfd1b17b025e",
"branch_name": "refs/heads/master",
"committer_date": 1612213142000,
"content_id": "b652765d03b7a1db9c1d96ad2426c5ce5b4eebd0",
"detected_licenses": [
"MIT"
],
"directory_id": "2c80642754e96fd76b34eed736e4adab1b606772",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/env python3
import click
import os
import json
from easydict import EasyDict
import yaml
import jinja2
ENVS = ['production', 'staging']
root = os.path.dirname(os.path.abspath(__file__))
@click.group()
def cli():
pass
@cli.command(name='taskdefs')
@click.argument('envs', nargs=-1)
def build_task_d... | 144 | 23.73 | 96 | 16 | 857 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d340dd4938a09bc7_842e60d7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
127
] | [
133
] | [
17
] | [
6
] | |
2024-11-19T03:12:17.493248+00:00 | 1,669,243,301,000 | 8ecc2614f2dd2f38e335297856f608d88a302959 | 4 | {
"blob_id": "8ecc2614f2dd2f38e335297856f608d88a302959",
"branch_name": "refs/heads/master",
"committer_date": 1669243301000,
"content_id": "5e048dd2bd977211b105c7b8d43a6ceba1832864",
"detected_licenses": [
"MIT"
],
"directory_id": "45731e8e24ea9101f41ee3ade5298d7eb05b08bc",
"extension": "py",
"fi... | 3.640625 | stackv2 | import sys
from random import randint
#generate strong char passwords
#limits (valid values are 0 or 1)
SpecialSet1_Upper=0
SpecialSet2_Lower=0
SpecialSet3_Number=0
SpecialSet4_SpecChar=0
#specialSetCounter must be >= 3 for password to be valid
specialSetCounter=0;
#for each char generated, increment its core set
... | 65 | 29.55 | 106 | 15 | 468 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_70969718488c6b79_5d22a5b0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
61
] | [
null
] | [
15
] | [
23
] | |
2024-11-19T03:24:54.960465+00:00 | 1,616,514,758,000 | cb3636faa9af82cb7a42d83fdda07328862eaf41 | 4 | {
"blob_id": "cb3636faa9af82cb7a42d83fdda07328862eaf41",
"branch_name": "refs/heads/main",
"committer_date": 1616514758000,
"content_id": "431fcc5f30bf89c9891f712c433d0ad8df1282f0",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "d038bfd86198959b781785b5634da1942f9020a3",
"extension": "py",
"... | 3.796875 | stackv2 | import time
import pandas as pd
import numpy as np
CITY_DATA = { 'chicago': 'chicago.csv',
'new york city': 'new_york_city.csv',
'washington': 'washington.csv' }
def get_filters():
"""
Asks user to specify a city, month, and day to analyze.
Returns:
(str) city - name o... | 247 | 41.3 | 179 | 18 | 2,574 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9e5dde59c4a760e5_e47ac3c6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
191,
191
] | [
null,
null
] | [
24,
53
] | [
40,
69
] | |
2024-11-19T03:35:20.179225+00:00 | 1,531,310,874,000 | 510555506c55c5a5cbabed88b90106ce17ec12f9 | 3 | {
"blob_id": "510555506c55c5a5cbabed88b90106ce17ec12f9",
"branch_name": "refs/heads/master",
"committer_date": 1531310874000,
"content_id": "c53e88f60dc890b63828b9641839f9da09be5401",
"detected_licenses": [
"MIT"
],
"directory_id": "987a030cfee7a502ca93d8293f2f348cfdf60249",
"extension": "py",
"fi... | 2.5625 | stackv2 | from past.builtins import basestring
import itertools
import datetime
import dateutil.parser
import dateutil.tz
import re
from jira import JIRA, JIRAError
def to_datetime(date):
"""Turn a date into a datetime at midnight.
"""
return datetime.datetime.combine(date, datetime.datetime.min.time())
def strip_... | 300 | 34.6 | 148 | 25 | 2,238 | python | [{"finding_id": "codeql_py/overly-large-range_9a903a392036ef92_45464fda", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:\\].", "remediation": "", "location": {... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:\\]."
] | [
129
] | [
null
] | [
92
] | [
95
] | |
2024-11-19T01:26:52.963025+00:00 | 1,564,456,729,000 | 3bfa0da53f9349db93d452c484235792f6b57a10 | 3 | {
"blob_id": "3bfa0da53f9349db93d452c484235792f6b57a10",
"branch_name": "refs/heads/master",
"committer_date": 1564456729000,
"content_id": "2af8bcf578a9c2ce5621147389ab6048f9887fad",
"detected_licenses": [
"MIT"
],
"directory_id": "4bc3843c421234d2025869dde14e804d0b5c3f61",
"extension": "py",
"fi... | 3.21875 | stackv2 | import requests, math
from colorama import Fore, init
myApiKey = 'Add your openweathermap.org apy key here';
api_address = 'http://api.openweathermap.org/data/2.5/weather?APPID=' + myApiKey + '&q=';
def Hi():
print(Fore.CYAN + ',,,'.center(40))
print('(o o)'.center(40))
print('----oOO--( )--OOo----'.cente... | 40 | 35.58 | 113 | 16 | 419 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f6e18f048efa8c81_2fa1e1e5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
29,
30,
32
] | [
null,
null,
null
] | [
15,
15,
15
] | [
113,
72,
81
] | |
2024-11-19T01:37:37.974884+00:00 | 1,510,055,591,000 | 119c762341590352a1ef4f66dabd9856bb14dcc6 | 2 | {
"blob_id": "119c762341590352a1ef4f66dabd9856bb14dcc6",
"branch_name": "refs/heads/master",
"committer_date": 1510055591000,
"content_id": "c13c865afa1b231efd417a4525240b54084028b5",
"detected_licenses": [
"MIT"
],
"directory_id": "96188cce2798117fd4ed0a68f0059fc273065739",
"extension": "py",
"fi... | 2.40625 | stackv2 | # The MIT License (MIT)
# Copyright (c) 2016 IBM Corporation
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, mod... | 143 | 37.1 | 79 | 16 | 1,218 | python | [{"finding_id": "codeql_py/request-without-cert-validation_50cd86add18aeb9d_79c8fda9", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
82
] | [
83
] | [
24
] | [
73
] | |
2024-11-19T01:37:40.939268+00:00 | 1,357,337,058,000 | c81b6eeff2df505f4f18ed8c399abb21517f6356 | 3 | {
"blob_id": "c81b6eeff2df505f4f18ed8c399abb21517f6356",
"branch_name": "refs/heads/master",
"committer_date": 1357337058000,
"content_id": "f9b9ac02b0e0d053ecaab934e10df46fd30466c4",
"detected_licenses": [
"MIT"
],
"directory_id": "5fd40a422e9e6f72dc6dd2169fa0d35fa637f5c4",
"extension": "py",
"fi... | 2.734375 | stackv2 | # -*- coding: utf-8 -*-
"""
Dabo: A Framework for developing data-driven business applications
Dabo is for developing multi-platform database business applications -
you know, applications that need to connect to a database server (MySQL,
Oracle, MS-SQL, whatever), get recordsets of data based on criteria
set by the ... | 373 | 31.97 | 84 | 14 | 3,029 | python | [{"finding_id": "codeql_py/overly-permissive-file_74ec1abdeed0e0a2_a0c89d7e", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
370
] | [
null
] | [
2
] | [
27
] | |
2024-11-19T01:38:00.645764+00:00 | 1,464,162,546,000 | 73103582e548b643c2f3034dfe56d9b6aff8a831 | 2 | {
"blob_id": "73103582e548b643c2f3034dfe56d9b6aff8a831",
"branch_name": "refs/heads/master",
"committer_date": 1464162546000,
"content_id": "ba17b57510019607b8428742918ade8ba86f8b13",
"detected_licenses": [
"MIT"
],
"directory_id": "5f6a40b7c2591d180ae0739f8ea358d409c28db6",
"extension": "py",
"fi... | 2.5 | stackv2 | """
Support keycaptcha (www.keycaptcha.com) in Django
(C) 2014 by Vitaly Bogomolov mail@vitaly-bogomolov.ru
Based at code: https://www.keycaptcha.ru/python-captcha-api/
Usage:
>>> from django import forms
>>> import keycaptcha
>>>
>>> class MyForm(forms.Form):
>>> keycaptcha = keycaptcha.Field()
>>>
>>> ...
>>>
>... | 119 | 24.69 | 75 | 14 | 839 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_25570dc20385b54f_bb61a31b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
65,
66
] | [
null,
null
] | [
14,
14
] | [
60,
48
] | |
2024-11-19T01:38:13.018533+00:00 | 1,621,951,787,000 | 762c1ca7bd9d4a537d7984e5da137be97b2685c8 | 2 | {
"blob_id": "762c1ca7bd9d4a537d7984e5da137be97b2685c8",
"branch_name": "refs/heads/main",
"committer_date": 1621951787000,
"content_id": "6f78dd80b94b207b5cd7d49577a50ea7e1bc8716",
"detected_licenses": [
"MIT"
],
"directory_id": "8255dcf7689c20283b5e75a452139e553b34ddf3",
"extension": "py",
"file... | 2.484375 | stackv2 | import base64
import hashlib
from datetime import datetime
from flask_login import UserMixin
from app import db, login
@login.user_loader
def load_user(user_id: int):
return db.session.query(Users).get(user_id)
class Users(UserMixin, db.Model):
__tablename__ = 'core_accounts'
id = db.Column(db.Intege... | 61 | 31.08 | 97 | 19 | 458 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7b829fc3d1bb9283_0017bf93", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
61
] | [
null
] | [
48
] | [
70
] | |
2024-11-19T01:38:13.658205+00:00 | 1,375,709,412,000 | e7d723fe867184c20f9362ce394760a1552971ef | 3 | {
"blob_id": "e7d723fe867184c20f9362ce394760a1552971ef",
"branch_name": "refs/heads/master",
"committer_date": 1375709412000,
"content_id": "3be6a2ac306179091016638eccd20b6ea925404e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0313ab6db0d6bdcbe1334221a87c6b522cec1bce",
"extension": "py"... | 2.796875 | stackv2 | import json
import requests
from collections import defaultdict
from flask import Blueprint
from numpy import mean
artists = Blueprint('artists', __name__)
@artists.route('/<artist_id>/albums')
def get_album_uris(artist_id):
try:
artist_url = 'http://ws.spotify.com/lookup/1/.json' + \
'?uri=s... | 83 | 31.54 | 78 | 22 | 658 | python | [{"finding_id": "codeql_py/reflective-xss_418f3d85dea4b5bf_8917981d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 5 | true | [
"CWE-079",
"CWE-079",
"CWE-918",
"CWE-918",
"CWE-918"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the U... | [
28,
78,
16,
38,
51
] | [
null,
81,
null,
null,
null
] | [
12,
12,
19,
21,
24
] | [
30,
7,
43,
45,
47
] | |
2024-11-19T01:38:48.634677+00:00 | 1,631,906,744,000 | 440e6a17ea39a2f0612aaa517bce106ac4f354ae | 3 | {
"blob_id": "440e6a17ea39a2f0612aaa517bce106ac4f354ae",
"branch_name": "refs/heads/master",
"committer_date": 1631906744000,
"content_id": "9cff6d080695328450d121fe5067c974cb682768",
"detected_licenses": [
"MIT"
],
"directory_id": "6133dd87757f3cd7e3958af1b38316b3c9cdc97c",
"extension": "py",
"fi... | 2.9375 | stackv2 | from flask import Flask, request, render_template
app = Flask(__name__)
@app.route('/')
@app.route('/home')
def home():
# return 'Hello, World!'
#return render_template('home.html')
# return render_template('home.html')
return render_template('form.html')
@app.route('/submit', methods=['POST'])
def ... | 37 | 25.65 | 65 | 9 | 231 | python | [{"finding_id": "codeql_py/flask-debug_5467a7daa8e7b3b4_283ff2ba", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
37,
19
] | [
null,
null
] | [
5,
12
] | [
24,
33
] | |
2024-11-19T01:39:02.928347+00:00 | 1,520,016,108,000 | f9d60273776f6b8e7484a72faec3c0583d026014 | 3 | {
"blob_id": "f9d60273776f6b8e7484a72faec3c0583d026014",
"branch_name": "refs/heads/master",
"committer_date": 1520016108000,
"content_id": "59ed673b202d2b7300601c699ab4a3a499aaae5e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "93e9e41ced2996c905397ffed76b909494abfbdb",
"extension": "py"... | 2.75 | stackv2 | import http.server
import socketserver
import http.client
import socket
class Proxy():
def __init__(self, host, port):
self.httpd = socketserver.TCPServer((host, port), ProxyHandler)
self.httpd.socket.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
def start_server(self):
try:
... | 82 | 23.96 | 79 | 14 | 498 | python | [{"finding_id": "codeql_py/full-ssrf_6f1f4dd2b234a716_1dd8c6ce", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](1)."
] | [
73
] | [
null
] | [
9
] | [
41
] | |
2024-11-19T01:52:01.306807+00:00 | 1,595,247,578,000 | 9552664fa181d5da385974520da3ad945f3eda2c | 4 | {
"blob_id": "9552664fa181d5da385974520da3ad945f3eda2c",
"branch_name": "refs/heads/master",
"committer_date": 1595247578000,
"content_id": "f25b283333533f404bcaf6c965551e6dd1eb2106",
"detected_licenses": [
"MIT"
],
"directory_id": "1ce49900e12ff4fac43a2ad9442ce06e896e37e3",
"extension": "py",
"fi... | 3.65625 | stackv2 | from images import IMAGES
import random,string
def play_again():
play_again = input("Do you wnat to play again(y/n): ").lower()
if play_again == "y":
return hangman(words)
else:
return "Thanks for playing"
def hangman(list_of_words):
random_word = random.choice(list_of_words)
secret_word = random_word
avail... | 76 | 26.11 | 118 | 22 | 505 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_52b4d264c10fb0db_70f79d6e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
58
] | [
null
] | [
13
] | [
48
] | |
2024-11-19T01:52:25.319812+00:00 | 1,437,615,198,000 | 31ea0a1303e521b5cb7cdf5d1999540042fa121a | 3 | {
"blob_id": "31ea0a1303e521b5cb7cdf5d1999540042fa121a",
"branch_name": "refs/heads/master",
"committer_date": 1437615198000,
"content_id": "3266f6cecaebbe64bbc4142b007fa2ff1e2bd0fb",
"detected_licenses": [
"MIT"
],
"directory_id": "4cd98985b36c7c5e0b1174c871228f9d77edc06f",
"extension": "py",
"fi... | 3.453125 | stackv2 | from Crypto.Cipher import AES
from cryptopals.util.pkcs_7 import pkcs7_pad, pkcs7_strip
# This challenge requires the use of the PyCrypto module
# https://github.com/dlitz/pycrypto
def fixed_xor(str1, str2):
"""Return the result of str1 ^ str2."""
return ''.join([chr(ord(a) ^ ord(b)) for a, b in zip(str1, str... | 72 | 26.99 | 77 | 15 | 493 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_ca799769364bd43b_439347c8", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
34,
57
] | [
null,
null
] | [
24,
32
] | [
78,
60
] | |
2024-11-19T01:52:25.655845+00:00 | 1,549,034,435,000 | adeace0985f0c2690110ad6d5b3ce950ca6d8706 | 3 | {
"blob_id": "adeace0985f0c2690110ad6d5b3ce950ca6d8706",
"branch_name": "refs/heads/master",
"committer_date": 1549034435000,
"content_id": "3ba92063f7f97bad4ca7900019a750e49843e7d2",
"detected_licenses": [
"MIT"
],
"directory_id": "e62e7ba552486e66685b2a84f983eadc7aa0d37c",
"extension": "py",
"fi... | 2.546875 | stackv2 | from jinja2 import Template
from glob import glob
from distutils.dir_util import copy_tree
import janus
import os
import re
def parse():
p = janus.ArgParser()
p.new_str('n name')
p.new_str('v version', fallback='0.0.1')
p.new_str('a author', fallback='Surf')
p.new_str('l licence', fallback='MIT')... | 138 | 34.11 | 79 | 14 | 1,145 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0c2be07edf83fb36_0ce079ce", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
90
] | [
null
] | [
20
] | [
38
] | |
2024-11-19T02:04:24.282562+00:00 | 1,585,205,739,000 | da62af6ef5c0955649eddcf77ef1e78f60ba1359 | 2 | {
"blob_id": "da62af6ef5c0955649eddcf77ef1e78f60ba1359",
"branch_name": "refs/heads/master",
"committer_date": 1585205739000,
"content_id": "90d07224f2e82f5eb83774962ca4956b3331f2dc",
"detected_licenses": [
"MIT"
],
"directory_id": "5cbc768a61227d75e3e52470abb505e84b192194",
"extension": "py",
"fi... | 2.453125 | stackv2 | '''
Simple Websocket Broker
Copyright (c) 2014-2016 Michal Kvasnica, michal.kvasnica@gmail.com
'''
import tornado.httpserver
import tornado.websocket
import tornado.ioloop
import logging
import argparse
from datetime import datetime
import urllib
# parse command-line inputs
parser = argparse.ArgumentParser(descripti... | 251 | 33.82 | 123 | 14 | 1,997 | python | [{"finding_id": "codeql_py/log-injection_238177f84e552030_f41e83d8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 6 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depen... | [
62,
73,
73,
94,
129,
129
] | [
null,
null,
null,
null,
null,
null
] | [
38,
57,
66,
58,
60,
69
] | [
45,
64,
82,
60,
67,
82
] | |
2024-11-19T02:04:41.947105+00:00 | 1,675,068,283,000 | a067c6ff6e24d7bfd9384c6427df065a1967638f | 4 | {
"blob_id": "a067c6ff6e24d7bfd9384c6427df065a1967638f",
"branch_name": "refs/heads/master",
"committer_date": 1675068283000,
"content_id": "badf7bd2ed6ca638c687148ac4829d5cd1e9f67a",
"detected_licenses": [
"MIT"
],
"directory_id": "d81a88d73cc3524f944883e7242e164f787be387",
"extension": "py",
"fi... | 4.03125 | stackv2 | class emp:
count=0
def get_name_age_salary(self,name,age,salary):
self.name=name
self.age=age
self.salary=salary
self.increase_count_for_emp()
#self.display_details()
return None
def increase_count_for_emp(self):
emp.count=emp.count+1
return None
def display_details(self):
print(f'The name is: {s... | 28 | 20.18 | 90 | 12 | 182 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b75f3803428c1a92_d7e52dad", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
14
] | [
null
] | [
9
] | [
90
] | |
2024-11-19T02:04:44.886110+00:00 | 1,632,649,907,000 | 896596c2ae2f4d18122f9353d07fbb76bfb9cc9b | 2 | {
"blob_id": "896596c2ae2f4d18122f9353d07fbb76bfb9cc9b",
"branch_name": "refs/heads/main",
"committer_date": 1632649907000,
"content_id": "56f656b7a9021b680272f29a6b6e7e5d39af9cec",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d92b08a98b18219add26799977ab6a1ee6890e2c",
"extension": "py",
... | 2.328125 | stackv2 | from flask import Flask, redirect, url_for, request, render_template
app = Flask(__name__)
# http://localhost:5000/platform/0.1/vyshnav/69/
@app.route(rule="/<float:platform_version>/<user_name>/<int:user_id>/")
def user_login(platform_version, user_name, user_id):
return f"Welcome to platform({platform_version}... | 50 | 36.58 | 126 | 15 | 432 | python | [{"finding_id": "codeql_py/flask-debug_b32d0be52b8ce3d4_4ac45349", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).\nCross-site scripting vulnerability due to a [user-pr... | [
50,
9,
15
] | [
null,
null,
null
] | [
5,
12,
12
] | [
53,
78,
61
] | |
2024-11-19T02:04:45.179661+00:00 | 1,605,674,594,000 | 3101649165c36fd8f1d95d2e43f9539e979b35e7 | 3 | {
"blob_id": "3101649165c36fd8f1d95d2e43f9539e979b35e7",
"branch_name": "refs/heads/master",
"committer_date": 1605674594000,
"content_id": "f8430fce17967308fc7ece25a9c413ca7d64ee77",
"detected_licenses": [
"MIT"
],
"directory_id": "71f2d0d97146650975f066191b1851a13a3de43c",
"extension": "py",
"fi... | 2.96875 | stackv2 | def dictionary5():
# using dict() method and updating , adding
phone_no = dict({
'sam': 1234567890,
'ram': 9876543212,
})
print(phone_no)
# adding key value pairs
phone_no['rahim'] = 4455664423
print(phone_no)
# updating rahim's number
phone_no['rahim'] = 1234497976
... | 16 | 21.19 | 47 | 11 | 128 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bbc165ebab41d35d_01d0c471", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
7,
10,
13
] | [
null,
null,
null
] | [
11,
11,
11
] | [
19,
19,
19
] | |
2024-11-19T02:04:59.253964+00:00 | 1,625,506,005,000 | 69626f5870677f8c23247d5c60f9f59d80c0572e | 5 | {
"blob_id": "69626f5870677f8c23247d5c60f9f59d80c0572e",
"branch_name": "refs/heads/master",
"committer_date": 1625506005000,
"content_id": "1f1684b02203c7a12d15c48e60e2ae45d8203c92",
"detected_licenses": [
"MIT"
],
"directory_id": "85fccd0dca2a4ad5e542f140dc4f496e4628e78f",
"extension": "py",
"fi... | 4.6875 | stackv2 | '''
Exercise 33: Birthday Dictionaries
This exercise is Part 1 of 4 of the birthday data exercise series.
The other exercises are: Part 2, Part 3, and Part 4.
For this exercise, we will keep track of when our friend’s birthdays
are, and be able to find that information based on their name.
Create a dictionary (in you... | 94 | 23.48 | 68 | 13 | 596 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7575be8125dac3a6_2d6fbe66", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
40,
70
] | [
null,
null
] | [
15,
15
] | [
18,
68
] | |
2024-11-19T02:05:01.118263+00:00 | 1,528,294,115,000 | c5e5545a30929ea61fedcaf8bb769980fdd71b4b | 3 | {
"blob_id": "c5e5545a30929ea61fedcaf8bb769980fdd71b4b",
"branch_name": "refs/heads/master",
"committer_date": 1528294115000,
"content_id": "d9c6c2eb9c2c3554db9dc6abdb5b47147924b815",
"detected_licenses": [
"MIT"
],
"directory_id": "c40e28a96454178ff7904f6f0a3d68d5e79ff6ef",
"extension": "py",
"fi... | 2.859375 | stackv2 | from jinja2 import Environment, FileSystemLoader
#custom filters
def int_comma(value):
"""
Converts an integer to a string containing commas every three digits
"""
val_str = str(value)
split = val_str.split(".")
val_int = split[0]
try:
val_point = "." + split[1]
except IndexError:
val_point = ""
val_... | 50 | 21.08 | 109 | 15 | 277 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fd0a158d275803a3_39eeca81", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
47
] | [
null
] | [
11
] | [
110
] | |
2024-11-19T02:28:14.242036+00:00 | 1,621,693,511,000 | 0be7492d19c18661ff19071171e23d3222105c82 | 4 | {
"blob_id": "0be7492d19c18661ff19071171e23d3222105c82",
"branch_name": "refs/heads/main",
"committer_date": 1621693511000,
"content_id": "86d40ca56fb420b36b71a6b17795db3dcf198c4c",
"detected_licenses": [
"MIT"
],
"directory_id": "db7a308bfecf1659c0a156bb44461aa426b82cca",
"extension": "py",
"file... | 3.796875 | stackv2 | # A password generator - OOP approach
# MolarFox 2021
import sys
import random
# Defines ascii character ranges as nested tuples
CHAR_RANGES = (
(65, 90), # uppercase alphas
(97, 122), # lowercase alphas
(48, 57), # numbers
(58, 64) # symbols only some, for simplicity
)
class PassGen:
"""... | 144 | 31.96 | 105 | 18 | 961 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e6f14c1dca10b15b_65d2b1d4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
143
] | [
null
] | [
12
] | [
13
] | |
2024-11-19T02:28:18.249227+00:00 | 1,583,770,998,000 | 9bf813e1476fe25ba61c4f03cd8fca31a5d4247c | 2 | {
"blob_id": "9bf813e1476fe25ba61c4f03cd8fca31a5d4247c",
"branch_name": "refs/heads/master",
"committer_date": 1583770998000,
"content_id": "0c4203d7e81cfa63a9bb01ab712763ed42cf02da",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "fc76ed2b735bb84a9e7dee68f12fa92df1a05fe2",
"extension": "p... | 2.390625 | stackv2 |
import logging
import threading
from pkg_resources import get_distribution
from prometheus_client import CollectorRegistry, generate_latest, MetricsHandler, CONTENT_TYPE_LATEST
from prometheus_client.exposition import _ThreadingSimpleServer
from prometheus_client.metrics_core import Metric
from prometheus_client.util... | 158 | 36.57 | 101 | 25 | 1,288 | python | [{"finding_id": "codeql_py/log-injection_506ba7adb3aa3ddc_42457029", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
89
] | [
null
] | [
19
] | [
40
] | |
2024-11-19T02:28:22.896770+00:00 | 1,432,592,196,000 | 251b06ed990823e4c39887bb746e669c473e4fba | 3 | {
"blob_id": "251b06ed990823e4c39887bb746e669c473e4fba",
"branch_name": "refs/heads/master",
"committer_date": 1432592196000,
"content_id": "d015f6b74bf2152ed27a394096f5a9d1037a3034",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "217678bcedcf3096025849feb115d768e38c10dd",
"extension": "py"... | 2.578125 | stackv2 | #!/usr/bin/env python
"""
Static Macro File Generator (cmd line generator using jinja2)
Ever want to just apply a model to a bunch of files? Now you can!
### Usage:
```sh
# command line usage
jinjer2
```
```python
# python usage
>>> import jinger2
>>> jinjer2.generate()
```
"""
__version__='0.1.4'
__auth... | 168 | 30.76 | 76 | 17 | 1,306 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c93dc4b7fabb5719_48d7f209", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
64
] | [
67
] | [
23
] | [
33
] | |
2024-11-19T02:28:26.073281+00:00 | 1,416,499,108,000 | 030b97cce47d74e65f80d3431f9b1e4a07acad34 | 2 | {
"blob_id": "030b97cce47d74e65f80d3431f9b1e4a07acad34",
"branch_name": "refs/heads/master",
"committer_date": 1416499108000,
"content_id": "8cead97a08eb09f657c2d0109ac06290e03d8b75",
"detected_licenses": [
"MIT"
],
"directory_id": "8561af3e9ae4578a312fe8de25bd79dca77688c8",
"extension": "py",
"fi... | 2.3125 | stackv2 | # -*- coding: UTF-8 -*-
import hashlib
import socket
import logging
import time
import suds
logger = logging.getLogger(__name__)
logger.setLevel(logging.ERROR)
hdl = logging.StreamHandler()
hdl.setFormatter(logging.Formatter('%(asctime)s - %(name)s - %(levelname)s - %(message)s', '%Y-%m-%d %H:%M'))
logger.addHandle... | 90 | 33.19 | 123 | 18 | 681 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_416f35397e1b75dc_842ca147", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
45
] | [
null
] | [
43
] | [
51
] | |
2024-11-19T02:28:43.845050+00:00 | 1,466,688,557,000 | eb3bbe047b9615f68e68ec2ee6b51d2e9024a8b0 | 2 | {
"blob_id": "eb3bbe047b9615f68e68ec2ee6b51d2e9024a8b0",
"branch_name": "refs/heads/master",
"committer_date": 1466688557000,
"content_id": "4b796367cb19e35746bf7b8664fe62d9edf74ace",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "36ebbaeb91d9c7d83eb6b1e7e16667c947c27eee",
"extension": "py"... | 2.359375 | stackv2 | import paramiko
forti_username = 'admin'
forti_password = ''
fortinet_host_ip = '185.98.148.48'
port_id = 2
port_alias = 'portInB'
def exec_command(command, fortinet_host_ip):
ssh = paramiko.SSHClient()
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
ssh.connect(fortinet_host_ip, username=fort... | 59 | 24.25 | 82 | 11 | 407 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_fa436ba3ae80e135_75414323", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
13
] | [
null
] | [
5
] | [
62
] | |
2024-11-19T02:28:47.303558+00:00 | 1,620,066,086,000 | 7063661d16dd41b5a20164a5b44a5aec51acd6f3 | 2 | {
"blob_id": "7063661d16dd41b5a20164a5b44a5aec51acd6f3",
"branch_name": "refs/heads/master",
"committer_date": 1620066086000,
"content_id": "1d674bd926513cacf0a5d418a0e0074502102c1f",
"detected_licenses": [
"MIT"
],
"directory_id": "2d4127f5fa1bca8ba41b9da48d9180c64680b327",
"extension": "py",
"fi... | 2.34375 | stackv2 | try:
import secrets
except ImportError:
import openid_connect_op.utils.secrets_backport as secrets
import jwcrypto.jwk as jwk
from django.core.management import BaseCommand
from openid_connect_op.models import OpenIDClient
class Command(BaseCommand):
def add_arguments(self, parser):
parser.add_a... | 67 | 40.97 | 105 | 16 | 507 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0d4e4e46ae1cb184_31454727", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
55
] | [
59
] | [
15
] | [
33
] | |
2024-11-19T02:28:51.400728+00:00 | 1,385,040,957,000 | 9efc22c53e436f0f141213a108e160c8c0a5d5dc | 2 | {
"blob_id": "9efc22c53e436f0f141213a108e160c8c0a5d5dc",
"branch_name": "refs/heads/master",
"committer_date": 1385040957000,
"content_id": "a25c9b5f9e6fbfbb40dbf00b7bd9962c8182de4f",
"detected_licenses": [
"MIT"
],
"directory_id": "6fbbdf40399d842d95e29264144f2cd5e042fb2e",
"extension": "py",
"fi... | 2.484375 | stackv2 | "Smarkets TCP-based session management"
# Copyright (C) 2011 Smarkets Limited <support@smarkets.com>
#
# This module is released under the MIT License:
# http://www.opensource.org/licenses/mit-license.php
import logging
import Queue
import socket
import types
import ssl
from google.protobuf import text_format
from sm... | 392 | 37.55 | 85 | 21 | 3,163 | python | [{"finding_id": "codeql_py/insecure-default-protocol_46d8cca647d91dda_3486fc14", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
242
] | [
null
] | [
24
] | [
73
] | |
2024-11-19T02:28:52.279416+00:00 | 1,616,571,096,000 | 9ddc92d529d722c8aa4db31e3dcd2389e7062bdf | 2 | {
"blob_id": "9ddc92d529d722c8aa4db31e3dcd2389e7062bdf",
"branch_name": "refs/heads/main",
"committer_date": 1616571096000,
"content_id": "63541fc3e308efbab5b372f14d933cf02581aced",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "aaa00363107f8aee176d75eb0754d952452172c1",
"extension": "py",
... | 2.40625 | stackv2 |
import time
import ffmpeg
import subprocess
import os
import pathlib
import sys
# rtsp://admin:abcd1234@192.168.31.167:554/h264/ch2/sub/av_stream
class Properties:
rtspURL="rtsp://"
username=""
password=""
ipAddress=""
port="554"
channel="/h264/ch1/sub/av_stream"
filePath=""
def __in... | 66 | 26.12 | 116 | 17 | 535 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_77455429d8f5bf65_5f891751", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
45
] | [
null
] | [
11
] | [
18
] | |
2024-11-19T02:36:44.625736+00:00 | 1,608,126,278,000 | 7882ef6030d4f5047fdc13cd8ccc64b863345506 | 4 | {
"blob_id": "7882ef6030d4f5047fdc13cd8ccc64b863345506",
"branch_name": "refs/heads/main",
"committer_date": 1608126278000,
"content_id": "798bcebbe64bb959f54d65242ed92bb66fedeb25",
"detected_licenses": [
"MIT"
],
"directory_id": "4383cf1ac6fc8bfecf1eab9a4bd38ac4c7c5747f",
"extension": "py",
"file... | 3.59375 | stackv2 | #!/usr/bin/env python3
""" AOC day 2 """
import re
tot = 0
m = re.compile(r'(?P<low>\d+)\-(?P<high>\d+)\s(?P<char>[a-z]):\s(?P<password>[a-z]+).*')
raw = []
with open('input.txt') as fd:
for line in fd:
res = m.match(line[:-1])
if res:
low = int(res.group('low'))
high = int(... | 25 | 31.12 | 88 | 16 | 218 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_69ed8651031ee490_a5280e48", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
18,
21
] | [
null,
null
] | [
23,
23
] | [
74,
73
] | |
2024-11-19T02:37:16.802218+00:00 | 1,613,825,636,000 | c182babc7977b932674ae061a52a9d6e8f376f39 | 3 | {
"blob_id": "c182babc7977b932674ae061a52a9d6e8f376f39",
"branch_name": "refs/heads/main",
"committer_date": 1613825636000,
"content_id": "253f95fb1a745f5325c1bdc438c0b5098d9eb4f2",
"detected_licenses": [
"MIT"
],
"directory_id": "58c96e78d69407c346f8ce03f753df78d9652f7c",
"extension": "py",
"file... | 2.734375 | stackv2 | import string
import requests
from bs4 import BeautifulSoup
usersAmount = 4
passwdLengths = {k: 0 for k in range(1, usersAmount + 1)}
passwds = {k: "" for k in range(1, usersAmount + 1)}
def isTrue(responseBody):
soup = BeautifulSoup(responseBody, "html.parser")
return soup.select_one(".w3-row-padding.w3-gray... | 36 | 31.81 | 131 | 16 | 342 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2c6f629e725de904_39557a5e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
36
] | [
null
] | [
7
] | [
14
] | |
2024-11-19T02:37:23.823344+00:00 | 1,511,809,013,000 | 1308924a6e6570ea386dd92df87d61228bec02bc | 2 | {
"blob_id": "1308924a6e6570ea386dd92df87d61228bec02bc",
"branch_name": "refs/heads/master",
"committer_date": 1511809013000,
"content_id": "d59bb005d3db135f757b0492b9c55de6852f5418",
"detected_licenses": [
"MIT"
],
"directory_id": "d22221edad712d95202db4825de365d80ce81538",
"extension": "py",
"fi... | 2.375 | stackv2 | from flask import Blueprint, request, json, jsonify
from flask_cors import CORS
from docs import conf, sparql_templates as sparqlt
from app.mod_auth.models import User
from SPARQLWrapper import SPARQLWrapper, JSON
import urllib2
import urllib
import time
import math
from hashlib import sha1
from bs4 import BeautifulSou... | 61 | 41.23 | 88 | 15 | 561 | python | [{"finding_id": "codeql_py/partial-ssrf_86f33b9ac0bd566f_128ad7e8", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
32
] | [
null
] | [
11
] | [
71
] | |
2024-11-19T02:37:43.272276+00:00 | 1,506,495,788,000 | 0f57d71d7a6bcdec6b451faad38a9015de824430 | 3 | {
"blob_id": "0f57d71d7a6bcdec6b451faad38a9015de824430",
"branch_name": "refs/heads/master",
"committer_date": 1506495788000,
"content_id": "2513913e8fbc4037495cc4d79793cd5f9f230a67",
"detected_licenses": [
"MIT"
],
"directory_id": "1fb9a1e0ebb25ed85129180bffccaa3ad077b828",
"extension": "py",
"fi... | 2.515625 | stackv2 | # -*- coding: utf-8 -*-
"""
PyConES 2016 Almería
"""
import os
import re
import shlex
import logging
from subprocess import Popen, PIPE
import settings
from custom_exceptions import ParamError
IDLOG = 'rspace'
def avaliable_space(fs, host=None):
"""free space checker"""
if host is None:
size = os.... | 58 | 22.62 | 78 | 16 | 362 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_0de44dff649ee0dd_cd2dd42e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
32
] | [
null
] | [
9
] | [
66
] | |
2024-11-19T02:37:43.991623+00:00 | 1,504,170,380,000 | d19cc26347419a6f4b0538d77d48d1095a861086 | 5 | {
"blob_id": "d19cc26347419a6f4b0538d77d48d1095a861086",
"branch_name": "refs/heads/master",
"committer_date": 1504170380000,
"content_id": "dfd5b75cbff49bf7d73de100e70cba6da71cf388",
"detected_licenses": [
"MIT"
],
"directory_id": "46c7e639e59f06e2ea85c242b58dcb5dd9151851",
"extension": "py",
"fi... | 4.65625 | stackv2 | '''
面向对象技术简介
类(Class):用来描述具有相同的属性和方法的对象的集合。它定义了该集合中每个对象所共有的属性和方法。对象是类的实例。
类变量:类变量在整个实例化的对象中是公用的。类变量定义在类中且在函数体之外。类变量通常不作为实例变量使用。
数据成员:类变量或者实例变量用于处理类及其实例对象的相关的数据。
方法重写:如果从父类继承的方法不能满足子类的需求,可以对其进行改写,这个过程叫方法的覆盖(override),也称为方法的重写。
实例变量:定义在方法中的变量,只作用于当前实例的类。
继承:即一个派生类(derived class)继承基类(base class)的字段和方法。继承也允许把一个派生类的对象作为一个基类... | 226 | 20.81 | 139 | 12 | 2,005 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_72af1295847a5535_064f906f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
169
] | [
null
] | [
16
] | [
34
] | |
2024-11-19T02:37:52.359134+00:00 | 1,606,015,778,000 | da661fc6760e6f9dd423daf9ad0727a3f4e4fbf2 | 3 | {
"blob_id": "da661fc6760e6f9dd423daf9ad0727a3f4e4fbf2",
"branch_name": "refs/heads/master",
"committer_date": 1606015778000,
"content_id": "68ed4b39d2aba42f1810f382cb4cd93dc590b455",
"detected_licenses": [
"MIT"
],
"directory_id": "cfe7d4e5ed7e96b7bad1ae41907c9531bad22584",
"extension": "py",
"fi... | 2.640625 | stackv2 | """
GitHub Repo> https://github.com/ezeeyahoo/ChromiumSyncEnabler
Summary: Secured way to enable sync for official/non-official and
stable/non-stable version of Chromium on Mac while keeping APIs safe,
wihtout globally exposing keys.
How to run:-
------------
Check repo for clear instructions.
"""
from __future__ im... | 206 | 25.12 | 79 | 15 | 1,303 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_111b58d87f816fff_e042f2f7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
167
] | [
null
] | [
32
] | [
36
] | |
2024-11-19T02:49:12.062568+00:00 | 1,435,018,846,000 | 6cd68a7ff108e331ab6c2444fa2eaf468bd95a24 | 2 | {
"blob_id": "6cd68a7ff108e331ab6c2444fa2eaf468bd95a24",
"branch_name": "refs/heads/master",
"committer_date": 1435018846000,
"content_id": "9dfa186d7940da94ab2259471b857ec4967ed9f6",
"detected_licenses": [
"BSD-2-Clause",
"Apache-2.0"
],
"directory_id": "bcf2e87da43ed0c82bd601d8fd42894ee6d62baa",... | 2.4375 | stackv2 | # =============================================================================
# Copyright (c) 2015, Cisco Systems, Inc
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are met:
#
# Redistributions of sour... | 232 | 30.74 | 121 | 15 | 1,711 | python | [{"finding_id": "codeql_py/tarslip_5835af7e2afab994_fd20368d", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
112
] | [
null
] | [
5
] | [
8
] | |
2024-11-19T02:49:13.033473+00:00 | 1,578,058,942,000 | d84eaf17b45349d5a1ea238b53895c855f72efef | 3 | {
"blob_id": "d84eaf17b45349d5a1ea238b53895c855f72efef",
"branch_name": "refs/heads/master",
"committer_date": 1578058942000,
"content_id": "a81b80ed267c657b3e52c50b90529a539620987b",
"detected_licenses": [
"MIT"
],
"directory_id": "95a8941dde0ea09beaeed2440918218a3fd44f02",
"extension": "py",
"fi... | 2.8125 | stackv2 | from app import app, sms, db
from flask import render_template, request, flash, redirect, url_for
from app.models import Outgoing
@app.route("/", methods=["GET", "POST"])
def main():
senderID = '23233222'
if request.method == "POST":
sms_message = request.form['smsMessage']
phone_number = requ... | 59 | 33.14 | 159 | 16 | 436 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_379acac1c7ea9efb_ae9c52d0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
17
] | [
null
] | [
15
] | [
18
] | |
2024-11-19T02:49:24.024451+00:00 | 1,581,361,890,000 | 2c2b3806bf0de231f253f5c9b15d0fdc9e792e50 | 2 | {
"blob_id": "2c2b3806bf0de231f253f5c9b15d0fdc9e792e50",
"branch_name": "refs/heads/master",
"committer_date": 1581361890000,
"content_id": "fa4086fac3493cc9fb76511582b9d2bd65f693b9",
"detected_licenses": [
"MIT"
],
"directory_id": "97edd38198aff0d6aee0fb2471dce814f8709118",
"extension": "py",
"fi... | 2.4375 | stackv2 | """Blueprint for FHIR endpoints."""
from collections import defaultdict
from functools import wraps
import logging
from flask import Blueprint, jsonify, request
from clarkproc.engine import ingest
import clarkproc.state as s
from clarkproc.fhir.models import CodeValue
bp_fhir = Blueprint('fhir', __name__)
TEST_DATA... | 491 | 25.75 | 97 | 19 | 2,708 | python | [{"finding_id": "codeql_py/reflective-xss_04e6465edbb7c786_becf097b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 6 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scriptin... | [
224,
299,
327,
337,
396,
405
] | [
226,
301,
330,
339,
398,
407
] | [
13,
13,
13,
13,
13,
13
] | [
43,
43,
43,
43,
43,
43
] | |
2024-11-19T03:00:25.780164+00:00 | 1,576,843,463,000 | 283a74ab60c2844395d47ad77d42606808d9a346 | 2 | {
"blob_id": "283a74ab60c2844395d47ad77d42606808d9a346",
"branch_name": "refs/heads/master",
"committer_date": 1576843463000,
"content_id": "2b50aad66b5db86bf7ac0330b8e4aacb3bdcada0",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "8e8c5719c80636c390f5bb26b3e5a33ea97ca4e5",
"extension": "p... | 2.453125 | stackv2 | #!/usr/bin/env python3
# (c) Copyright IBM Corporation 2016
# LICENSE: BSD-3, https://opensource.org/licenses/BSD-3-Clause
# Use the dashDB analytics REST API to check that the dashDB Spark support
# is configured and accessible
import warnings
import sys, os
import json, requests
from requests.auth import HTTPBasicA... | 60 | 43.27 | 106 | 14 | 641 | python | [{"finding_id": "codeql_py/request-without-cert-validation_d7fa02a47afcba24_00411b31", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
17
] | [
18
] | [
12
] | [
52
] | |
2024-11-19T03:11:48.875389+00:00 | 1,599,366,696,000 | 9553e4e2a2472fb9bfdd04b763f8105569422899 | 3 | {
"blob_id": "9553e4e2a2472fb9bfdd04b763f8105569422899",
"branch_name": "refs/heads/master",
"committer_date": 1599366696000,
"content_id": "e3d05b4f4fad55986e0aceb805dc7df066504e44",
"detected_licenses": [
"MIT"
],
"directory_id": "83f9d223f6a1fb9bd494395d4ac33a22cae2c8af",
"extension": "py",
"fi... | 2.546875 | stackv2 | import abc
import requests
import execjs
import os
class BasicMangaDownload:
__metaclass__ = abc.ABCMeta
def __init__(self):
self.headers = {
'Accept': '*/*',
'Accept-Language': 'en-US,en;q=0.8',
'Cache-Control': 'max-age=0',
'User-Agent':
'... | 120 | 25.69 | 130 | 17 | 789 | python | [{"finding_id": "codeql_py/request-without-cert-validation_9ab62d06a51db9db_3f015e81", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
111
] | [
115
] | [
17
] | [
44
] | |
2024-11-19T03:12:01.653002+00:00 | 1,599,567,636,000 | a2b4b03e23d157142caaa6a572f4505f567f9971 | 4 | {
"blob_id": "a2b4b03e23d157142caaa6a572f4505f567f9971",
"branch_name": "refs/heads/master",
"committer_date": 1599567636000,
"content_id": "92bd4604c4f3f87aa0dae7c0ac19b853497358c4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7012ab96d5bfeaa36560fa6b48f246b3f2897beb",
"extension": "py"... | 3.953125 | stackv2 | class Panda:
def __init__(self,name,gender,age):
self.name=name
self.gender=gender
self.age=age
def sleep(self,hours=None):
self.hours=hours
if self.hours==None:
return f"{self.name}'s duration is unknown thus should have only bamboo leaves"
elif self.... | 32 | 37.12 | 98 | 13 | 326 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3aec3f76745a4545_7aed8ea7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (p... | [
22,
24,
26
] | [
null,
null,
null
] | [
7,
7,
7
] | [
97,
97,
97
] | |
2024-11-19T03:12:08.600328+00:00 | 1,504,214,383,000 | e591b4916bb55110e3963bc7941d05f142d79252 | 2 | {
"blob_id": "e591b4916bb55110e3963bc7941d05f142d79252",
"branch_name": "refs/heads/master",
"committer_date": 1504214383000,
"content_id": "e07a2ba83e103fa8b2be3e50c6a399462ee76257",
"detected_licenses": [
"MIT"
],
"directory_id": "a3a7468755d98160d6ff43090623499a14125134",
"extension": "py",
"fi... | 2.453125 | stackv2 | # -*- coding: utf-8 -*-
import codecs
import jinja2
import os
import yaml
def get_default_config_dir():
return os.path.join(get_home_dir(), ".dotfiles", "configs")
def get_default_template_dir():
return os.path.join(get_home_dir(), ".dotfiles", "templates")
def get_home_dir():
return os.path.expanduse... | 73 | 22.29 | 65 | 12 | 370 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_86f131ebde278755_824033fa", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
52
] | [
60
] | [
11
] | [
26
] | |
2024-11-19T03:12:21.912140+00:00 | 1,402,986,334,000 | a04d6ec1ba3a17d56dace8eec3b3be107432074a | 3 | {
"blob_id": "a04d6ec1ba3a17d56dace8eec3b3be107432074a",
"branch_name": "refs/heads/master",
"committer_date": 1402986334000,
"content_id": "e3aab7da4f1e5566c07f2b295dc29682a012ada7",
"detected_licenses": [
"MIT"
],
"directory_id": "b99b6c80938a70cf70a5457c1751438c7292f41d",
"extension": "py",
"fi... | 2.75 | stackv2 | #!/usr/bin/env python
from pwn import b64, read, unhex
import json, sys
class Encryption:
def __init__(self, password):
from Crypto.Hash import HMAC, SHA256
from Crypto.Protocol.KDF import PBKDF2
raw_key = PBKDF2(password, 'DANGERZONE', count=1000000) # ONLY HMAC-SHA1
key_parts = H... | 93 | 31.89 | 84 | 15 | 770 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3d8b83a57de780e8_7cb79156", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
93
] | [
null
] | [
11
] | [
36
] | |
2024-11-19T03:12:38.051132+00:00 | 1,622,610,979,000 | 99678e8715ed20850a9bb102c37c3eb4e37c0c2b | 3 | {
"blob_id": "99678e8715ed20850a9bb102c37c3eb4e37c0c2b",
"branch_name": "refs/heads/main",
"committer_date": 1622610979000,
"content_id": "424e70c89dd47326760889c1f24e53dd67f8330c",
"detected_licenses": [
"MIT"
],
"directory_id": "276e1cf6c59a6dc93434f4bfafecdd181b2b51f6",
"extension": "py",
"file... | 2.90625 | stackv2 | from flask import Flask, request, render_template
import requests
from bs4 import BeautifulSoup
app = Flask(__name__)
substring="https://en.wikipedia"
@app.route('/')
def input():
return render_template("form.html")
def start(url):
wordlist=[]
source_code = requests.get(url).text
soup = Beau... | 59 | 27.12 | 90 | 14 | 397 | python | [{"finding_id": "codeql_py/full-ssrf_9c0b6ef769411b39_5b8baf7f", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
14
] | [
null
] | [
19
] | [
36
] | |
2024-11-19T03:12:47.973912+00:00 | 1,674,849,766,000 | 4864ddec017569cb86a5a95cb3b0f2f9bedff742 | 2 | {
"blob_id": "4864ddec017569cb86a5a95cb3b0f2f9bedff742",
"branch_name": "refs/heads/master",
"committer_date": 1674849766000,
"content_id": "f21f12e32e46240ecc491eecb578e9fd4469519b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c1175743befb0ecef55b863d04f46924b9380efa",
"extension": "py"... | 2.359375 | stackv2 | #-------------------------------------------------------------------------------
# Name: AGOL Admin
# Purpose: Admin AGOL
#
# Author: Kelly
#
# Created: 09/11/2014
# Copyright: (c) Kelly 2014
# Licence: <your licence>
#---------------------------------------------------------------------------... | 270 | 40.71 | 167 | 25 | 2,518 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b33c1271f524f5e9_478debed", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 16 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"... | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
83,
89,
104,
118,
154,
163,
189,
203,
218,
180,
237,
243,
255,
257,
262,
266
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
16,
20,
24,
24,
20,
20,
28,
44,
24,
36,
20,
28,
20,
20,
20,
20
] | [
59,
51,
61,
61,
67,
57,
74,
97,
74,
88,
57,
75,
66,
66,
67,
67
] | |
2024-11-19T03:12:53.494412+00:00 | 1,469,695,670,000 | 20880c604f02fb13fbd7c352b609ad8512b685a9 | 2 | {
"blob_id": "20880c604f02fb13fbd7c352b609ad8512b685a9",
"branch_name": "refs/heads/master",
"committer_date": 1469695670000,
"content_id": "3972a1fe0f18fac9136aaf12cab2803cb3be016d",
"detected_licenses": [
"MIT"
],
"directory_id": "49c77f0c74275be51888f2430e5edd5f3a1c5b45",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python
#-*- coding:utf8 -*-
# @Author: lisnb
# @Date: 2016-04-29T17:06:11+08:00
# @Email: lisnb.h@hotmail.com
# @Last modified by: lisnb
# @Last modified time: 2016-07-28T06:44:47+08:00
import time
import MySQLdb
import sys
import logging
import pymongo
import urllib
from MySQLdb.cursors import D... | 221 | 30.34 | 111 | 19 | 1,647 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a723c4f1fdd84fbe_b15e6ad4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
56
] | [
null
] | [
35
] | [
111
] | |
2024-11-19T03:25:31.258594+00:00 | 1,566,398,058,000 | 86d0c1b45daf6ebc84f1ae2b44ceddde803700e2 | 4 | {
"blob_id": "86d0c1b45daf6ebc84f1ae2b44ceddde803700e2",
"branch_name": "refs/heads/master",
"committer_date": 1566398058000,
"content_id": "70f8c2ae81dafa26a52c362279d4fbffd128427a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e801d460b9b818656d2fd817a8e1634d40df2a6a",
"extension": "py"... | 3.84375 | stackv2 | # encoding:utf-8
import pprint
"""
字典和结构体的学习代码,ticTacToe是五子棋游戏,不过,写着好麻烦
算了,还是不写了
"""
def ticTacToe():
theBoard={'top-L':'','top-M':'','top-R':'',
'mid-L':'','mid-M':'','mid-R':'',
'low-L':'','low-M':'','low-R':''}
def CommonTest():
myCat={"Name":"Tom","Size":"Fat","Color":"Orange"... | 47 | 26.04 | 89 | 17 | 342 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e7d3e784088356c2_b4f40831", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
37
] | [
null
] | [
19
] | [
48
] | |
2024-11-19T03:25:37.338385+00:00 | 1,586,715,487,000 | beec7c52ab336142d68fe8534eb8a91838fd1d4d | 3 | {
"blob_id": "beec7c52ab336142d68fe8534eb8a91838fd1d4d",
"branch_name": "refs/heads/master",
"committer_date": 1586715487000,
"content_id": "0223d3fa0131329d5556046b7ff7888c5751429f",
"detected_licenses": [
"MIT"
],
"directory_id": "d31b3d9c0464426d2812cfeca0dd3a5b02229d4a",
"extension": "py",
"fi... | 3.28125 | stackv2 | #Importing necessary modules
from Crypto.Cipher import PKCS1_OAEP
from Crypto.PublicKey import RSA
from binascii import hexlify
#The message to be encrypted
message = b'Public and Private keys encryption'
#Generating private key (RsaKey object) of key length of 1024 bits
private_key = RSA.generate(1024)
#Generating the... | 20 | 40.2 | 66 | 9 | 226 | python | [{"finding_id": "codeql_py/weak-crypto-key_ca5a929d0985488f_dc529de4", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
8
] | [
null
] | [
15
] | [
33
] | |
2024-11-19T03:25:38.002824+00:00 | 1,361,389,258,000 | 8a086027468e22fde8d3c127e72549d14310235d | 2 | {
"blob_id": "8a086027468e22fde8d3c127e72549d14310235d",
"branch_name": "refs/heads/master",
"committer_date": 1361389258000,
"content_id": "786dc14c9e83162ae61efe45ebab29003865753e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "312aa0f62b07646e324db90ab73d76a3e34a0c64",
"extension": "py"... | 2.40625 | stackv2 | from django.conf.urls.defaults import patterns
from django.contrib import messages
from django.http import Http404, HttpResponse, HttpResponseRedirect
from django.views.generic import View
from django.views.generic.detail import SingleObjectMixin
class DjangoObjectActions(object):
"""
mixin to add object-tool... | 87 | 34.97 | 98 | 17 | 667 | python | [{"finding_id": "codeql_py/url-redirection_59c0ff1fafd245f0_7189475c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
79
] | [
null
] | [
37
] | [
41
] | |
2024-11-19T01:30:08.878546+00:00 | 1,556,739,044,000 | 413f7b1dbc2966796bb0609157f41b353d0f2fe0 | 2 | {
"blob_id": "413f7b1dbc2966796bb0609157f41b353d0f2fe0",
"branch_name": "refs/heads/master",
"committer_date": 1556739044000,
"content_id": "38f450c38647f4bfafc87b7d9769cc3d78588152",
"detected_licenses": [
"MIT"
],
"directory_id": "4d5aabdce2f09d1ee072769fd32e775b3314d26d",
"extension": "py",
"fi... | 2.4375 | stackv2 | from os.path import expanduser
home = expanduser("~")
alerThor_home = home + "/alerThor/"
def main():
print("Setting up config file...")
with open(alerThor_home + "config.ini", "w") as file:
sg_api_key = input("Enter your SG API key: ")
sender = input("Enter your default sender email (custom): ... | 18 | 34.44 | 68 | 12 | 161 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_96686efe4b947dbe_5dadcd7d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
12
] | [
null
] | [
25
] | [
55
] | |
2024-11-19T01:30:12.206716+00:00 | 1,475,532,061,000 | d6d864a0840ce1a1e0772adff3d0a461f345ed52 | 2 | {
"blob_id": "d6d864a0840ce1a1e0772adff3d0a461f345ed52",
"branch_name": "refs/heads/master",
"committer_date": 1475532061000,
"content_id": "8ae5000c92f9622eacd98ce748de93b95f58fc59",
"detected_licenses": [
"MIT"
],
"directory_id": "7c1199d5028b26a346019f51cbe7c746d222e381",
"extension": "py",
"fi... | 2.4375 | stackv2 | import json
import shutil
from time import sleep, time
import requests
import sys
from PIL import Image, ImageDraw
from azure.storage.blob import BlockBlobService
from azure.storage.queue import QueueService
from secrets import ACCOUNT_KEY, ACCOUNT_NAME, COG_ACCOUNT_KEY
class ImageQueue(object):
queue_name = ... | 163 | 35.63 | 175 | 16 | 1,335 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9764d14c6fce7a89_4c1a25df", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
121
] | [
null
] | [
40
] | [
74
] | |
2024-11-19T01:30:14.496732+00:00 | 1,575,513,457,000 | d9b9f85af3f3c471f3833bbf83ac1db8e0c0979f | 4 | {
"blob_id": "d9b9f85af3f3c471f3833bbf83ac1db8e0c0979f",
"branch_name": "refs/heads/master",
"committer_date": 1575513457000,
"content_id": "b1cb83dbeee122d4f27ddcc0da7838e675200a7f",
"detected_licenses": [
"Unlicense"
],
"directory_id": "3b820296a35a591c64519b08a74f6a93eea0928a",
"extension": "py",... | 3.609375 | stackv2 | def get_gender(gender = 'Unknown'):
if gender is 'm':
gender="male"
elif gender is 'f':
gender='female'
print("Gender is ", gender)
get_gender('m')
get_gender('f')
get_gender()
def sentence(name = 'Aousnik', gender = 'male', category = 'general'):
print(name, gender, category)
sentenc... | 18 | 21.78 | 70 | 10 | 106 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_76e6176fb3d9f7a5_2d57bc16", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.",
"This expression logs [sensitive data (priva... | [
6,
13
] | [
null,
null
] | [
25,
17
] | [
31,
23
] | |
2024-11-19T01:30:23.102248+00:00 | 1,692,913,685,000 | da6d79fd3db99d744afe76c747077ea2d54dbb0e | 2 | {
"blob_id": "da6d79fd3db99d744afe76c747077ea2d54dbb0e",
"branch_name": "refs/heads/master",
"committer_date": 1692917918000,
"content_id": "99875eae7d6b001933f0eacb1b6bff7fc2691de3",
"detected_licenses": [
"MIT",
"Apache-2.0"
],
"directory_id": "c36671ad69265c0c0ead3f59f41f73d5fe1162bb",
"exten... | 2.4375 | stackv2 | #!/usr/bin/env python
"""A simple example of connecting to Earth Engine using App Engine."""
# Works in the local development environment and when deployed.
# If successful, shows a single web page with the SRTM DEM
# displayed in a Google Map. See accompanying README file for
# instructions on how to set up authent... | 38 | 32.42 | 75 | 13 | 300 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_88bc26619388c12a_4c57953f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
17
] | [
18
] | [
21
] | [
63
] | |
2024-11-19T01:30:37.647928+00:00 | 1,553,787,617,000 | 1d54af745216c036e438fe50f7bdb511d92c5b10 | 3 | {
"blob_id": "1d54af745216c036e438fe50f7bdb511d92c5b10",
"branch_name": "refs/heads/master",
"committer_date": 1553787617000,
"content_id": "7ae49e3a7374c8adc033b923340ff79c958bee2c",
"detected_licenses": [
"MIT"
],
"directory_id": "05db79f80c33f7107d805c2820d8cadc5e10220d",
"extension": "py",
"fi... | 2.875 | stackv2 | # How to handle bibliography? BBL, BIB, in-line?
import sys
import os
import re
import glob
import itertools
import argparse
import json
from jinja2 import Template
from termcolor import colored
from functools import reduce
from TexSoup import TexSoup
from collections import OrderedDict, Counter, defaultdict
from nltk.... | 185 | 31.54 | 117 | 18 | 1,462 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f1c11b9250331c0b_71a9dd40", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
173
] | [
null
] | [
16
] | [
34
] | |
2024-11-19T01:54:46.851493+00:00 | 1,581,522,743,000 | 1d8eba990d3c138596074ed67c8d2b6503ca5f18 | 2 | {
"blob_id": "1d8eba990d3c138596074ed67c8d2b6503ca5f18",
"branch_name": "refs/heads/master",
"committer_date": 1581522743000,
"content_id": "f3a895f89ebffe2b6ce1032caf634b4eaeb1c34f",
"detected_licenses": [
"MIT"
],
"directory_id": "5390aaeb9d4f8926cf07d811e69c3641e5729e7c",
"extension": "py",
"fi... | 2.421875 | stackv2 | import re
import orodja
zacetek, konec = 1959, 2020
vzorec_leto = re.compile(
r'<tr.*?><td><a href="(?P<link1>.*?)amp;(?P<link2>year=\d\d\d\d)">(?P<država>.*?)</a></td>',
flags=re.DOTALL
)
vzorec_leaders = re.compile(
r'Leader: <b>(?P<leader>.*?)</b><br />(.|\n)*?'
r'(Deputy leader: <b>(?P<deputy_lea... | 245 | 33.28 | 108 | 18 | 3,019 | python | [{"finding_id": "codeql_py/redos_40fba87bb2dde34b_bd1f418e", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'Leader: <b></b><br />' and contai... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'Leader: <b></b><br />' and containing many repetitions of '\\n'."
] | [
12
] | [
null
] | [
43
] | [
52
] | |
2024-11-19T01:54:56.255227+00:00 | 1,553,362,965,000 | 0f363e5c92e18e3981238b9ccf80e4e714028bbb | 3 | {
"blob_id": "0f363e5c92e18e3981238b9ccf80e4e714028bbb",
"branch_name": "refs/heads/master",
"committer_date": 1553362965000,
"content_id": "7ea6c5db3b16a4e012e8355b32c06492f2a53aec",
"detected_licenses": [
"MIT"
],
"directory_id": "ebb93bc1fcbbc948472df4c89f44827a3f680353",
"extension": "py",
"fi... | 2.625 | stackv2 | from flask import Flask,request, jsonify
import requests
app = Flask(__name__)
"""@app.route('/',methods=['GET','POST'])
def index():
d = request.json
#print(d)
return 'Bot replies' + d["text"] """
@app.route('/webhook',methods=['POST','GET'])
def webhook():
d=request.json
intent =d['queryResult... | 40 | 25.25 | 63 | 17 | 240 | python | [{"finding_id": "codeql_py/flask-debug_d5eb9fe44d43aa0d_de819af5", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
40,
22
] | [
null,
null
] | [
5,
13
] | [
24,
30
] | |
2024-11-19T01:55:17.572260+00:00 | 1,476,475,625,000 | a4214cf0f980333e32f6fe771f9d9471a7fc975e | 2 | {
"blob_id": "a4214cf0f980333e32f6fe771f9d9471a7fc975e",
"branch_name": "refs/heads/master",
"committer_date": 1476475625000,
"content_id": "448b5fdfd2636a1def5bb2a2e8726d1aff97e3f0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7502781d4fd36c5d3c339dbccd806b951a4fd6a9",
"extension": "py"... | 2.3125 | stackv2 | import os
import tarfile
import tempfile
from nexentaedge.settings import Settings
from utils import download
if os.path.exists(Settings.NEDEPLOY_FOLDER_PATH):
print('NEDEPLOY is already present')
else:
print('Downloading NEDEPLOY')
path = os.path.join(tempfile.gettempdir(), Settings.NEDEPLOY_FILE_NAME)
... | 18 | 32.22 | 75 | 11 | 141 | python | [{"finding_id": "codeql_py/tarslip_e705abe91b15a38e_f7d34954", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
16
] | [
null
] | [
5
] | [
8
] | |
2024-11-19T01:55:26.362947+00:00 | 1,477,574,064,000 | 0a248698abb06c05e0a42363ee92f1a345904ef6 | 3 | {
"blob_id": "0a248698abb06c05e0a42363ee92f1a345904ef6",
"branch_name": "refs/heads/master",
"committer_date": 1477574064000,
"content_id": "1e857e692353c4ee0ee5bf71e0a2609c3478f815",
"detected_licenses": [
"MIT"
],
"directory_id": "f1997ddc6321d68c8b220427e554896f57c26a07",
"extension": "py",
"fi... | 2.59375 | stackv2 | import requests
class Nanny(object):
def __init__(self, host, token):
self._host = host
self._token = token
def list_instances(self, srv):
return [
(instance['hostname'].encode('ascii'), int(instance['port']))
for instance in self._request('%s/current_state/... | 29 | 25.14 | 82 | 14 | 164 | python | [{"finding_id": "codeql_py/request-without-cert-validation_7bfdee70527209bb_b46bbde4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
20
] | [
26
] | [
13
] | [
10
] | |
2024-11-19T01:55:32.395915+00:00 | 1,606,052,673,000 | 3c8d780f1fb5455aa97650074576ee2f9ff884a2 | 3 | {
"blob_id": "3c8d780f1fb5455aa97650074576ee2f9ff884a2",
"branch_name": "refs/heads/master",
"committer_date": 1606052673000,
"content_id": "26d03e341fd4c5a3a7daf8fcfd05cf7295c6cd41",
"detected_licenses": [
"MIT"
],
"directory_id": "903d9758567e0fd3c1cd9042a1becc2932590a1c",
"extension": "py",
"fi... | 2.875 | stackv2 | # Instrucoes:
#
# 1. Configurar aplicacao Flask:
# export FLASK_APP=models_realtime_batch.py
# export FLASK_ENV=development
#
# 2. Mostrar rotas do app:
# python -m flask routes
#
# 3. Rodar app Flask:
# python -m flask run
# # default host=localhost=127.0.0.1; port=5000
# # ou escolhe outros valor... | 269 | 27.54 | 85 | 14 | 1,910 | python | [{"finding_id": "codeql_py/reflective-xss_1ad7618b150bc156_499b15aa", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 9 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This log entry ... | [
144,
176,
212,
258,
66,
139,
171,
207,
253
] | [
null,
null,
null,
null,
null,
142,
174,
210,
256
] | [
12,
12,
12,
12,
21,
21,
21,
21,
21
] | [
18,
18,
18,
18,
33,
6,
6,
6,
6
] | |
2024-11-19T01:55:33.743168+00:00 | 1,501,122,299,000 | 47095a5e518af66cdec5017d84b5951cf60b19f1 | 3 | {
"blob_id": "47095a5e518af66cdec5017d84b5951cf60b19f1",
"branch_name": "refs/heads/master",
"committer_date": 1501122299000,
"content_id": "e4d97462634e9eeacc173ccbd79976f70983428c",
"detected_licenses": [
"MIT"
],
"directory_id": "11394ecc46e82dec107603638e73517c2a7c7731",
"extension": "py",
"fi... | 2.734375 | stackv2 | __author__ = 'duduscript'
from sys import argv
from selenium import webdriver
from selenium.webdriver.common.keys import Keys
import os
import time
from PIL import Image
def fullpage_screenshot(driver, file):
print("Starting chrome full page screenshot workaround ...")
total_width = driver.execute_script("re... | 149 | 34.26 | 127 | 17 | 1,216 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_364d54cce29c3ad8_044cdb6e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
110,
145
] | [
null,
null
] | [
29,
20
] | [
42,
28
] | |
2024-11-19T02:07:16.465102+00:00 | 1,691,694,579,000 | 73e53d446418f0a70753f633f6de0a1233dedf23 | 2 | {
"blob_id": "73e53d446418f0a70753f633f6de0a1233dedf23",
"branch_name": "refs/heads/master",
"committer_date": 1691694579000,
"content_id": "1bedfe1e6ac36677767898351ee9bbdef6946def",
"detected_licenses": [],
"directory_id": "5728e44ebc5b0b8656f456598de44e72ce0261af",
"extension": "py",
"filename": "run... | 2.4375 | stackv2 | #!/usr/bin/env python3
import argparse
import getpass
import logging
from pathlib import Path
import os
import sys
from pydantic_settings import BaseSettings
from pykeepass import PyKeePass
from pykeepass.exceptions import CredentialsError
from scrapy.crawler import CrawlerRunner
from scrapy.utils.project import get_... | 126 | 27.65 | 113 | 15 | 782 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_970bfd38bc69fa5e_ff6f075c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
107
] | [
null
] | [
21
] | [
101
] | |
2024-11-19T02:07:24.546502+00:00 | 1,583,861,706,000 | c63242eeb39fc2ba101c24b5b940f40b258fc0aa | 3 | {
"blob_id": "c63242eeb39fc2ba101c24b5b940f40b258fc0aa",
"branch_name": "refs/heads/master",
"committer_date": 1583861706000,
"content_id": "844abdba012d53aace27e23ad4a827f8eb05a809",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "af8e3492096e0cb783c85adf08bdf288953d362a",
"extension": "py"... | 2.625 | stackv2 | from os import getenv
from statistics import mean
import json
from typing import List, Dict
from pydantic import BaseModel
from starlette.middleware.cors import CORSMiddleware
from fastapi import FastAPI, Form, status, HTTPException
import os
class Season(BaseModel):
start_month: int
start_day: int
end_mon... | 113 | 26.17 | 119 | 16 | 762 | python | [{"finding_id": "codeql_py/path-injection_c1c4545524b4af15_acc5fb64", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
93
] | [
null
] | [
27
] | [
80
] | |
2024-11-19T02:31:48.226438+00:00 | 1,571,663,321,000 | cbf63a292f3423c1c55af0fa7ff69a012a4df1cb | 3 | {
"blob_id": "cbf63a292f3423c1c55af0fa7ff69a012a4df1cb",
"branch_name": "refs/heads/master",
"committer_date": 1571663321000,
"content_id": "beefb75b37ed538f0a3ec65c05140dc0fa5fb5f3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ff0e8114b10f784e92c2bee5f250b51b09804d13",
"extension": "py"... | 2.53125 | stackv2 | import os
import subprocess
import tempfile
import logging
import urllib
from flask import Flask, request, redirect, url_for, abort, send_file
from werkzeug import secure_filename
UPLOAD_FOLDER = '/uploads'
ALLOWED_EXTENSIONS = set(['pdf'])
app = Flask(__name__)
app.config.from_pyfile('config.py')
logging.getLogger(... | 90 | 32.57 | 157 | 16 | 748 | python | [{"finding_id": "codeql_py/command-line-injection_0941d6c7e9afba0e_1b1ef47d", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 3 | true | [
"CWE-078",
"CWE-117",
"CWE-117"
] | [
"py/command-line-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
36,
35,
54
] | [
null,
null,
null
] | [
26,
19,
19
] | [
29,
38,
37
] | |
2024-11-19T02:31:52.608450+00:00 | 1,633,074,307,000 | 584fc54d90c0a3265d4841b7b10ede0dd52e4d7e | 3 | {
"blob_id": "584fc54d90c0a3265d4841b7b10ede0dd52e4d7e",
"branch_name": "refs/heads/main",
"committer_date": 1633074307000,
"content_id": "b0c3341785d31bfa9fb211240bba493764bf728a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "27527c5155df46eabdfc7ae909ce7ad7efab8ece",
"extension": "py",
... | 2.984375 | stackv2 | """
@author: lxy
@email: linxy59@mail2.sysu.edu.cn
@date: 2021/9/27
@description: null
"""
import re
def filter_tags(x):
"""
# Python通过正则表达式去除(过滤)HTML标签
:param x:
:return:
"""
# 先过滤CDATA
re_cdata = re.compile('//<!\
CDATA\[[ >]∗ //\
CDATA\[[ >]∗ //\
\] > ', re.I) # 匹配CDATA
... | 95 | 24.13 | 118 | 23 | 805 | python | [{"finding_id": "codeql_py/bad-tag-filter_d6f6896ff48bf52d_3fa2a8c3", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match script end tags like </script\\t\\n bar>.", "remediation": "", "location"... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match script end tags like </script\\t\\n bar>."
] | [
21
] | [
null
] | [
29
] | [
68
] | |
2024-11-19T02:31:54.057829+00:00 | 1,636,129,142,000 | 1280ed338b62c620ba48ae107498ae1cf4f1b7f4 | 2 | {
"blob_id": "1280ed338b62c620ba48ae107498ae1cf4f1b7f4",
"branch_name": "refs/heads/master",
"committer_date": 1636129142000,
"content_id": "617d195f297c478a00322a799b84396b21af98ea",
"detected_licenses": [
"MIT"
],
"directory_id": "0a68792d65d788f0c9de978974e57ae5123803b7",
"extension": "py",
"fi... | 2.359375 | stackv2 | import logging
from django.shortcuts import get_object_or_404
from rest_framework import status
from rest_framework.exceptions import ValidationError
from rest_framework.response import Response
from rest_framework.views import APIView
from ....utils import convert_to_utc_time
from .....models import WorkflowCollect... | 320 | 37.19 | 143 | 20 | 2,284 | python | [{"finding_id": "codeql_py/log-injection_1cb2af67e5f161cf_98850a74", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
150,
311
] | [
null,
null
] | [
17,
17
] | [
29,
29
] | |
2024-11-19T02:32:10.489020+00:00 | 1,620,681,684,000 | d8ff68372bd7e7ec72d7ba35e78daa51c3010922 | 2 | {
"blob_id": "d8ff68372bd7e7ec72d7ba35e78daa51c3010922",
"branch_name": "refs/heads/main",
"committer_date": 1620681684000,
"content_id": "d1f1b15cdad88c9ff24cd11b5622880e227256c7",
"detected_licenses": [
"MIT"
],
"directory_id": "a736c785444e7271b0b35bcab8c0b08ed0d10cf2",
"extension": "py",
"file... | 2.390625 | stackv2 | import mysql.connector
from flask import Flask, render_template, request
import json
from datetime import datetime
from scipy.misc import imread, imresize, imsave
import numpy as np
import re
import sys
import base64
import os
#Path to saved model
app = Flask(__name__)
@app.route("/")
def index():
return render... | 175 | 23.53 | 144 | 15 | 976 | python | [{"finding_id": "codeql_py/sql-injection_991631f75d766c86_fee5ad2b", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 4 | true | [
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089"
] | [
"py/sql-injection",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
75,
78,
137,
140
] | [
null,
null,
null,
null
] | [
24,
24,
24,
24
] | [
27,
27,
27,
27
] | |
2024-11-19T02:32:35.045915+00:00 | 1,629,003,740,000 | 8ad37e316294c160960c89c8b11df51abc81e2d8 | 2 | {
"blob_id": "8ad37e316294c160960c89c8b11df51abc81e2d8",
"branch_name": "refs/heads/master",
"committer_date": 1629003740000,
"content_id": "e15081017d74b9c130074df43f054ce073c13a6d",
"detected_licenses": [
"MIT"
],
"directory_id": "d6e857310d6d900fde8e06873de839e0fee1fae7",
"extension": "py",
"fi... | 2.40625 | stackv2 | from URLHandler.models import shorturl
from django.http import JsonResponse
from home_shorty.models import short_url
from home_shorty.views import randomGenerator
import json
import string
from random import choice
from .models import APIKey
from django.template.loader import render_to_string
from django.utils.html imp... | 133 | 42.8 | 148 | 26 | 1,087 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9690b11dc1a085b2_38aa74c9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
29
] | [
null
] | [
11
] | [
18
] | |
2024-11-19T02:32:43.330548+00:00 | 1,394,616,962,000 | ff2b99a55a66b1ed8db25ee4b49e787429941ace | 3 | {
"blob_id": "ff2b99a55a66b1ed8db25ee4b49e787429941ace",
"branch_name": "refs/heads/master",
"committer_date": 1394616962000,
"content_id": "9116e55cd644bf152413ddb8cef5f74956f58fcc",
"detected_licenses": [
"MIT"
],
"directory_id": "5f00e8a4c2d676b80459eb9b6316f6f3220211c2",
"extension": "py",
"fi... | 2.609375 | stackv2 | #!/usr/bin/env python3
import os
import errno
import sys
def passwd_change(keys_file='keys.txt', passwd_orig='passwd',
passwd_new='passwd_new', passwd_log='passwd.log',
missing_log='missing.log'):
try:
with open(keys_file, 'r') as k:
keys = k.readlines()
... | 150 | 29.45 | 79 | 19 | 1,055 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_451c2e29b3470b03_9c89395d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensi... | [
28,
32,
37,
38
] | [
null,
null,
null,
null
] | [
30,
38,
15,
15
] | [
34,
42,
74,
72
] | |
2024-11-19T02:32:56.350945+00:00 | 1,492,633,167,000 | 04209a2c75a80dfb941ab75470ff2912343a457b | 3 | {
"blob_id": "04209a2c75a80dfb941ab75470ff2912343a457b",
"branch_name": "refs/heads/master",
"committer_date": 1492633167000,
"content_id": "27d787f57373758a120841307a4f290b843a7bb0",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "0c62fccea6b7a4af4e6ed26609605eb643cebef0",
"extension": "p... | 3.046875 | stackv2 | """Common methods we reuse."""
import collections
import os
import shutil
import stat
import tempfile as tmp
from contextlib import contextmanager
from subprocess import check_output
def sort_tag(tag):
"""Sort the list by tag."""
list_length = len(tag)
# Length 8 is list -l, 7 is df, 5 is list
if lis... | 194 | 24.8 | 79 | 19 | 1,210 | python | [{"finding_id": "codeql_py/overly-permissive-file_cc3fa6e0cb72aff3_071493a5", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
170
] | [
null
] | [
9
] | [
34
] | |
2024-11-19T02:32:56.537243+00:00 | 1,484,508,500,000 | 67a69b9489bb303a218a53d2ee691449ec8d832f | 3 | {
"blob_id": "67a69b9489bb303a218a53d2ee691449ec8d832f",
"branch_name": "refs/heads/master",
"committer_date": 1484508500000,
"content_id": "81f499cc5ce18509fd516b5c453d135fb84036ac",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "515ca6f8ef6058c33da4dee658d6c85bca5ecac7",
"extension": "p... | 2.625 | stackv2 | import string
from httplib2 import Http
from random import choice
from apiclient.errors import HttpError
from apiclient.discovery import build
from oauth2client.service_account import ServiceAccountCredentials
PASSWORD_CHARS = string.ascii_letters + string.digits
def generate_password(length=10):
return ''.join... | 101 | 26.64 | 152 | 17 | 660 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fa683918035929a5_21959372", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
62
] | [
null
] | [
11
] | [
68
] | |
2024-11-19T02:33:11.991444+00:00 | 1,616,256,192,000 | 838720a981f279fd96a38b57af17f50b75290694 | 3 | {
"blob_id": "838720a981f279fd96a38b57af17f50b75290694",
"branch_name": "refs/heads/master",
"committer_date": 1616256192000,
"content_id": "ef765b3cbdfaa9caf5f6d43cc98f20e01418af62",
"detected_licenses": [
"MIT"
],
"directory_id": "b8fcc414c2a888a15c44b4bc64fca1b61f6e3677",
"extension": "py",
"fi... | 2.578125 | stackv2 | # Copyright (c) 2013-2016 Molly White
#
# Permission is hereby granted, free of charge, to any person obtaining a copy of this software
# and associated documentation files (the "Software"), to deal in the Software without
# restriction, including without limitation the rights to use, copy, modify, merge, publish,
# di... | 204 | 42.56 | 99 | 19 | 1,802 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_648107d23859e98f_b245a773", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
173
] | [
177
] | [
13
] | [
64
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.