added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T21:01:25.872232+00:00 | 1,619,299,722,000 | 69f9c67c19f426a22aa9167606f975c2c857c018 | 3 | {
"blob_id": "69f9c67c19f426a22aa9167606f975c2c857c018",
"branch_name": "refs/heads/main",
"committer_date": 1619299722000,
"content_id": "73fa08ac9be333017710321fe321eb33feb4ec2f",
"detected_licenses": [
"MIT"
],
"directory_id": "c69e6718c2a5cf5f743f82925e2efb4923d5dc74",
"extension": "py",
"file... | 2.5625 | stackv2 | #dependencies
from flask import Response
from flask import Flask,jsonify,request
from flask import Flask, render_template, redirect
import requests
import json
import pandas as pd
from sqlalchemy import create_engine
from db_config import password
from flask_cors import CORS
app = Flask(__name__)
CORS(app)
#engine an... | 143 | 39.75 | 175 | 16 | 1,357 | python | [{"finding_id": "codeql_py/flask-debug_3fbd51bbab15231d_d83f40ca", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-089",
"CWE-089"
] | [
"py/flask-debug",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2).\nThis SQL query depends on... | [
143,
96,
121
] | [
null,
null,
null
] | [
5,
31,
24
] | [
24,
110,
148
] | |
2024-11-18T21:25:28.237785+00:00 | 1,631,841,023,000 | 696dd090697e550b61f13e58a03d69ab51c93763 | 2 | {
"blob_id": "696dd090697e550b61f13e58a03d69ab51c93763",
"branch_name": "refs/heads/main",
"committer_date": 1631841023000,
"content_id": "8658df84abb64b366589c9d26afe477da14b37e8",
"detected_licenses": [
"MIT"
],
"directory_id": "a8edbb6628e60dfea44fc6f5375040912d5c015c",
"extension": "py",
"file... | 2.34375 | stackv2 | import os
from django.shortcuts import render
from django.views import View
from django.urls import reverse
from django.http import Http404, HttpResponse, HttpResponseNotFound
from django.conf import settings
from rest_framework.views import APIView
from rest_framework.response import Response
from rest_framework impo... | 178 | 28.22 | 112 | 17 | 975 | python | [{"finding_id": "codeql_py/stack-trace-exposure_42705967659866c6_04fc9bb6", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
140
] | [
143
] | [
17
] | [
18
] | |
2024-11-18T21:51:24.711141+00:00 | 1,693,397,543,000 | 7c5f1fa1fefd94854df24b083293776efc8c2af1 | 3 | {
"blob_id": "7c5f1fa1fefd94854df24b083293776efc8c2af1",
"branch_name": "refs/heads/master",
"committer_date": 1693397543000,
"content_id": "180dc801583fa49a72507c46b7904e7069a8fc8d",
"detected_licenses": [
"MIT"
],
"directory_id": "2c5dffdcdb3d9a1df7d318da69339a1dd223c89f",
"extension": "py",
"fi... | 2.546875 | stackv2 | import datetime
from flask import Flask
from flask import g
from flask import redirect
from flask import request
from flask import session
from flask import url_for, abort, render_template, flash
from functools import wraps
from hashlib import md5
from peewee import *
# config - aside from our database, the rest is f... | 314 | 35.43 | 89 | 25 | 2,497 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_98ab054ecdc656e6_a3b8b133", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp... | [
201,
218
] | [
null,
null
] | [
34,
27
] | [
76,
67
] | |
2024-11-18T21:51:40.028868+00:00 | 1,534,772,749,000 | 64cd569a88755f1e1a5dd5942cfb3f34e7f0dda8 | 3 | {
"blob_id": "64cd569a88755f1e1a5dd5942cfb3f34e7f0dda8",
"branch_name": "refs/heads/master",
"committer_date": 1534772749000,
"content_id": "acd823c6b20a5c8e6028d1cea89a391f7032247e",
"detected_licenses": [
"MIT"
],
"directory_id": "997ebaec8cb0f80cf6332eea5ec99a2c63bbee26",
"extension": "py",
"fi... | 2.75 | stackv2 | from flask import Flask, jsonify, request
from chatbot import ChatBot
from bot_model import BotModel
import json
import os
import errno
app = Flask(__name__)
@app.route('/index', methods=['GET'])
def index():
response = {
"intro" : "welcome to the chatbot as a service. this end point should guide you thro... | 75 | 32.6 | 127 | 15 | 621 | python | [{"finding_id": "codeql_py/path-injection_030464d345b25e96_e4d6d202", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 4 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
33,
58,
60,
65
] | [
null,
null,
null,
null
] | [
27,
27,
25,
15
] | [
52,
52,
50,
40
] | |
2024-11-18T22:00:18.612747+00:00 | 1,532,214,334,000 | bff2c1d962f5bd1c68c9326f59b6bb3a42677e22 | 2 | {
"blob_id": "bff2c1d962f5bd1c68c9326f59b6bb3a42677e22",
"branch_name": "refs/heads/master",
"committer_date": 1532214334000,
"content_id": "96bdc8f69e3c70f35672852eb73a7be8a8c3463c",
"detected_licenses": [
"MIT"
],
"directory_id": "cc47f95cfdfd7e10cf2515d6cd41ac0aaab53b12",
"extension": "py",
"fi... | 2.4375 | stackv2 | # -*- coding: utf-8 -*-
__author__ = 'CubexX'
import hashlib
import time
from sqlalchemy import Boolean, Column, Integer, Text
from config import CONFIG
from confstat import cache
from main import make_db_session
from . import Base
class User(Base):
__tablename__ = 'users'
id = Column('id', Integer, prim... | 94 | 26.06 | 85 | 20 | 557 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1383abf4a85222cb_fd5b5b36", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure."
] | [
92
] | [
null
] | [
25
] | [
50
] | |
2024-11-18T22:00:23.510590+00:00 | 1,677,491,511,000 | aa0cb250fee295969b143be18be267968c0ff2c3 | 2 | {
"blob_id": "aa0cb250fee295969b143be18be267968c0ff2c3",
"branch_name": "refs/heads/master",
"committer_date": 1677491511000,
"content_id": "3654cabd6b7e9205c3e898aade6481599be4b6ba",
"detected_licenses": [
"MIT"
],
"directory_id": "07580ac5f713245ff5ff1f6120afc31cf1d0c017",
"extension": "py",
"fi... | 2.46875 | stackv2 | #!/usr/bin/env python3
import os
import argparse
import shutil
import json
import array
import base64
import zipfile
import logging
from xml.etree import ElementTree as ET
from html.parser import HTMLParser
import requests
from Crypto.Cipher import AES
def bytess(arr):
assert type(arr) in [list]
return array.... | 260 | 36 | 127 | 21 | 2,268 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b49c415d069af7e0_0776de0a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
128
] | [
null
] | [
37
] | [
43
] | |
2024-11-18T22:00:48.463118+00:00 | 1,624,763,799,000 | b7df3e2f03268ecf5d55fd658e7f0e4db3649712 | 3 | {
"blob_id": "b7df3e2f03268ecf5d55fd658e7f0e4db3649712",
"branch_name": "refs/heads/main",
"committer_date": 1624763799000,
"content_id": "f25ad8592bf3af161e8132e0c36ee107ec160cb9",
"detected_licenses": [
"MIT"
],
"directory_id": "7df23c65be385b1fb67a18b374ebce1c3351cdc5",
"extension": "py",
"file... | 2.6875 | stackv2 | import atexit
import ipaddress
import json
import threading
import time
import flask
import requests
from apscheduler.schedulers.background import BackgroundScheduler
from flask import request, Flask, jsonify
class Client:
CLIENT_PORT = 4000
ip: str
last_seen: time
alive: bool
base_url: str
i... | 161 | 27.51 | 113 | 20 | 1,042 | python | [{"finding_id": "codeql_py/flask-debug_91fc7016b53026b9_cf533732", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-295"
] | [
"py/flask-debug",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This request may run without certificate validation because [it is disabled](1)."
] | [
161,
48
] | [
null,
50
] | [
5,
28
] | [
66,
81
] | |
2024-11-18T22:00:50.160699+00:00 | 1,546,827,166,000 | ee9029ed3d7aad4cfb6bdc46f2612725aaf07a10 | 3 | {
"blob_id": "ee9029ed3d7aad4cfb6bdc46f2612725aaf07a10",
"branch_name": "refs/heads/master",
"committer_date": 1546827166000,
"content_id": "e5fa01c6fefe20987c42f3d9e2252fcfe0e8f704",
"detected_licenses": [
"MIT"
],
"directory_id": "f41e21fc9bcd61ff85686780a4e873695c060f96",
"extension": "py",
"fi... | 2.578125 | stackv2 | import time
import csv
import sys
import os
from datetime import datetime as dt
from selenium import webdriver
from selenium.webdriver.common.by import By
from selenium.webdriver.support.ui import WebDriverWait
from selenium.webdriver.support import expected_conditions as EC
from selenium.common.exceptions import NoSuc... | 255 | 37.54 | 163 | 22 | 1,998 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a16118b2a5da5dc7_364df42e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
205
] | [
null
] | [
27
] | [
64
] | |
2024-11-18T22:01:05.913285+00:00 | 1,613,547,900,000 | e679795c90805c9291b9d70642acd43b1a93f84c | 3 | {
"blob_id": "e679795c90805c9291b9d70642acd43b1a93f84c",
"branch_name": "refs/heads/main",
"committer_date": 1613547900000,
"content_id": "b6b38c1f0c2ca0a0dbafade8aecfa60a92aa5181",
"detected_licenses": [
"MIT"
],
"directory_id": "8cf35c82d51fced7205e9673806fb27dba98388e",
"extension": "py",
"file... | 2.640625 | stackv2 | import requests
import json
from rest_framework.views import APIView
from rest_framework.response import Response
from django.conf import settings
from apps.api.utils import Parser
from rest_framework import status
from apps.api.errors import TranslateError
from apps.api.serializer import WeatherSerializer
class Temp... | 38 | 43.11 | 139 | 17 | 344 | python | [{"finding_id": "codeql_py/partial-ssrf_9228b6ea4e1deb64_91c64dd8", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)."
] | [
23
] | [
null
] | [
24
] | [
41
] | |
2024-11-18T22:15:01.932799+00:00 | 1,587,706,713,000 | 82367f2c382117bc8aa73d38de7c234edafa987a | 3 | {
"blob_id": "82367f2c382117bc8aa73d38de7c234edafa987a",
"branch_name": "refs/heads/master",
"committer_date": 1587706713000,
"content_id": "c33a01eb8de2dd7d47e5f35348b08ef2ab53edbb",
"detected_licenses": [
"MIT"
],
"directory_id": "ee940b3042b18ebc69624cd1ba7c712056957f24",
"extension": "py",
"fi... | 3.3125 | stackv2 | import os
from credentials import Credentials
import pyperclip
import time
def generate_password():
'''
generate password
'''
return os.urandom(8)
print("Hello! Welcome to Password app where passwords are found")
print("****** Use Yes or No as shortcodes to navigate******")
print("Kindly enter yo... | 78 | 28.47 | 93 | 13 | 496 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c3bc7cf2c4ed0c18_54141b3d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
60
] | [
null
] | [
15
] | [
50
] | |
2024-11-18T22:15:02.331071+00:00 | 1,625,846,868,000 | 4c4f3e818036e81c4a8631e05e27a9153e69cffa | 3 | {
"blob_id": "4c4f3e818036e81c4a8631e05e27a9153e69cffa",
"branch_name": "refs/heads/master",
"committer_date": 1625846868000,
"content_id": "c0b3204848d30149c24df11fed2ffda5b6a4ac10",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5e8600eafc97ec079e615de11c958089f72c55e9",
"extension": "py"... | 2.703125 | stackv2 | import base64
import getpass
import json
import sys
import requests
requests.packages.urllib3.disable_warnings()
# https://rowlog.com/docs
# https://rowlog.com/docs/authentication
BASE_URL = 'https://rokort.dk/api'
CLUB_ID = 58
def get_auth_string():
# Get from args if possible, otherwise prompt user
if l... | 73 | 21.52 | 66 | 12 | 411 | python | [{"finding_id": "codeql_py/request-without-cert-validation_1443f2efcfc180a2_c2ca5361", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
42
] | [
46
] | [
13
] | [
10
] | |
2024-11-18T22:15:03.377401+00:00 | 1,618,398,068,000 | e572621401879fa01c056f6ebe22b6fb6634ceb7 | 3 | {
"blob_id": "e572621401879fa01c056f6ebe22b6fb6634ceb7",
"branch_name": "refs/heads/main",
"committer_date": 1618398068000,
"content_id": "7b22a61474f9051851c61ed173815c4d77ebbb96",
"detected_licenses": [
"MIT"
],
"directory_id": "1ca81a5536a92b87ba7f05093647a685bb6fff43",
"extension": "py",
"file... | 2.65625 | stackv2 | from recognize_image import recognize_image
import os
from flask import Flask, render_template, request, url_for
app = Flask(__name__)
@app.route('/')
def home():
return render_template('index.html')
@app.route('/recognize', methods=['GET', 'POST'])
def recognize():
# Get image
if request.method == 'POST'... | 25 | 29.64 | 145 | 16 | 164 | python | [{"finding_id": "codeql_py/path-injection_c2cd3cbb50260226_6c7ca4a0", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
21
] | [
null
] | [
20
] | [
30
] | |
2024-11-18T22:26:08.442509+00:00 | 1,601,120,533,000 | e96928d8407a6f9e8fdc81fb46ad306231f33a8f | 3 | {
"blob_id": "e96928d8407a6f9e8fdc81fb46ad306231f33a8f",
"branch_name": "refs/heads/master",
"committer_date": 1601120533000,
"content_id": "e48e0ec40684fdd2ab5caae4e3929757b71b10a9",
"detected_licenses": [
"MIT"
],
"directory_id": "05d460acd3e15c42c4b1ddd2eead83dc48f5312f",
"extension": "py",
"fi... | 3.015625 | stackv2 | import hashlib,uuid,sys
def new_password_username(user,password):
salt = uuid.uuid4().hex
user = hashlib.sha512(user.encode())
print('this is the salt:',salt)
file_userd = open('fileu1.txt','a')
file_userd.write(user.hexdigest()+':'+salt)
file_userd.close()
password = salt + password
password = hashlib.sha512(... | 59 | 30.03 | 85 | 13 | 461 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_2109151e9c124023_c7ec8fd9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
11,
31
] | [
null,
null
] | [
28,
28
] | [
45,
45
] | |
2024-11-18T22:26:26.060564+00:00 | 1,519,973,438,000 | 213a354192c0170f5b7f91eb75bfcc1f26a5e88f | 3 | {
"blob_id": "213a354192c0170f5b7f91eb75bfcc1f26a5e88f",
"branch_name": "refs/heads/master",
"committer_date": 1519973438000,
"content_id": "c990f590585ef176b2215667895966bf4b5693f3",
"detected_licenses": [
"MIT"
],
"directory_id": "1a16670a9f53966171c9a667cb54836f1daa12ec",
"extension": "py",
"fi... | 2.671875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
pwstore
~~~~~~~
A commandline-based secure password storage system.
:copyright: 2018 by Kharidiron
:license: MIT
"""
__version__ = '1.0'
import argparse
import base64
import cmd
import datetime
import getpass
import hashlib
import logging
import she... | 527 | 26.43 | 79 | 19 | 3,335 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_65e0efc29ee6b75e_04ab5746", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
259
] | [
260
] | [
18
] | [
41
] | |
2024-11-18T20:40:06.442690+00:00 | 1,588,696,601,000 | c8c19ff513d5f6d8128a05b35baa1793ffde58c5 | 2 | {
"blob_id": "c8c19ff513d5f6d8128a05b35baa1793ffde58c5",
"branch_name": "refs/heads/master",
"committer_date": 1588696601000,
"content_id": "b70a416e70a569f38d6e2c415e743c182d3934ad",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fe71c636114ad503c693d81926a35dee1c9d72b4",
"extension": "py"... | 2.421875 | stackv2 | from flask import jsonify, request
from flask_classful import FlaskView
from flask_jwt_extended import (
create_access_token,
jwt_required,
set_access_cookies,
unset_jwt_cookies
)
from ui.blueprints.user.models import User
from ui.blueprints.user.schemas import auth_schema
class AuthView(FlaskView):
... | 79 | 25.08 | 74 | 17 | 410 | python | [{"finding_id": "codeql_py/stack-trace-exposure_57ced92026a85990_77fb997e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
38
] | [
null
] | [
28
] | [
36
] | |
2024-11-18T20:52:18.109200+00:00 | 1,538,783,182,000 | 4eb2ddd75db6c99cca756461a5acff1b445b7f25 | 2 | {
"blob_id": "4eb2ddd75db6c99cca756461a5acff1b445b7f25",
"branch_name": "refs/heads/master",
"committer_date": 1538783182000,
"content_id": "8cb217a3b5ed309940f9a3a45deaddc47b730bdd",
"detected_licenses": [
"MIT"
],
"directory_id": "b3c75745c41a0c8d77bdaa17421e169873a95262",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/env python3
from os import listdir, remove, symlink
import errno
from os.path import isfile, join, splitext
from optparse import OptionParser, OptionGroup
from time import sleep, time
import datetime
import subprocess
import math
import sys
import tempfile
from shutil import copyfile
try:
from PIL import... | 470 | 27.3 | 126 | 19 | 3,490 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_fd9ccd561addc984_62c4a390", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
152
] | [
null
] | [
3
] | [
60
] | |
2024-11-18T21:08:12.262364+00:00 | 1,617,078,126,000 | 10088fef45eb926c9be1fc6dca1ec2e18c4249d4 | 3 | {
"blob_id": "10088fef45eb926c9be1fc6dca1ec2e18c4249d4",
"branch_name": "refs/heads/master",
"committer_date": 1617078126000,
"content_id": "55bd86a213f7a8a37829d2ee8c7d9230fdcd166b",
"detected_licenses": [
"MIT"
],
"directory_id": "631d5efc7fbb972ec13a4d8d1b002726d9a69f5b",
"extension": "py",
"fi... | 2.796875 | stackv2 | from email.mime.multipart import MIMEMultipart
from email.mime.text import MIMEText
from html2text import HTML2Text
from jinja2 import Template
html_parser = HTML2Text()
def build_from_template(source: str, jinja_env: dict = None) -> MIMEMultipart:
"""
Build an email from a Jinja template and create a MIMEMu... | 36 | 26.17 | 119 | 11 | 234 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_549a7be46b0ef9f2_c52984dd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25
] | [
null
] | [
16
] | [
30
] | |
2024-11-18T21:08:12.702558+00:00 | 1,606,490,830,000 | 633dec5ed1a8d9389d6045b67f5ea630405dba22 | 2 | {
"blob_id": "633dec5ed1a8d9389d6045b67f5ea630405dba22",
"branch_name": "refs/heads/master",
"committer_date": 1606490830000,
"content_id": "0022ff8b8708ff4cfdf33174250a5263efab7251",
"detected_licenses": [
"MIT"
],
"directory_id": "68022d573b4eb207e821d751a3fcecfcac7b4d69",
"extension": "py",
"fi... | 2.375 | stackv2 | from flask import Flask, send_file
from flask import request
import os
import numpy as np
import cv2
import urllib.request as urllib
from io import BytesIO
from PIL import Image
from services.faces import FaceFinder
from services.landmarks import LandmarkFinder
from services.focus import FocusFinder
from services.emot... | 150 | 31.35 | 143 | 16 | 1,364 | python | [{"finding_id": "codeql_py/flask-debug_56f9eb866b7d71d5_02d8a67b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"The full URL of this request depends on a [user-provided value](1)."
] | [
150,
28
] | [
null,
null
] | [
null,
9
] | [
46,
28
] | |
2024-11-18T21:08:17.609148+00:00 | 1,484,510,103,000 | c60b322e05463488812261512042fe9913d6e740 | 3 | {
"blob_id": "c60b322e05463488812261512042fe9913d6e740",
"branch_name": "refs/heads/master",
"committer_date": 1484510103000,
"content_id": "dca9d5b23813dd06ce54ee8b099f9b7f0173a2db",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "8566885316ee1ec3bef911f2b39145946775ecc4",
"extension": "p... | 2.828125 | stackv2 |
import hashlib
from base64 import urlsafe_b64encode
from django.core.management.base import BaseCommand
def make_hash(input):
data1 = bytes(input, 'ascii')
hasher1, hasher2 = hashlib.md5(), hashlib.md5()
hasher1.update(data1)
data2 = hasher1.digest()
hasher2.update(data2)
data3 = hasher2.digest()
return urlsa... | 26 | 22.5 | 53 | 11 | 153 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_77097b843154685e_1015f603", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
10
] | [
null
] | [
17
] | [
22
] | |
2024-11-18T21:08:33.947143+00:00 | 1,513,244,652,000 | e54383bf2851dcf753b90f32405bf705b163b024 | 3 | {
"blob_id": "e54383bf2851dcf753b90f32405bf705b163b024",
"branch_name": "refs/heads/master",
"committer_date": 1513244652000,
"content_id": "5131b8a0f9585a6b3a07e55145ffc809ac1fe8ec",
"detected_licenses": [
"MIT"
],
"directory_id": "5ab0ebf7b767be37f93c5200cd51992840dd4e24",
"extension": "py",
"fi... | 2.6875 | stackv2 | ##### Much of this is adopted (copy-and-pasted) from #####
##### https://github.com/edx/edx-ora/blob/master/controller/urls.py #####
import urllib
import requests
import logging
import json
import settings
import urls
log = logging.getLogger(__name__)
def xqueue_login():
session = requests.session(... | 217 | 31.22 | 112 | 13 | 1,504 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_93d8aa9d19dab0f5_d7710506", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
31
] | [
null
] | [
15
] | [
97
] | |
2024-11-18T21:31:27.992662+00:00 | 1,633,856,609,000 | 55100674b80ec1431cd89ba10e214d5abd9c030e | 4 | {
"blob_id": "55100674b80ec1431cd89ba10e214d5abd9c030e",
"branch_name": "refs/heads/master",
"committer_date": 1633856609000,
"content_id": "64543f03f12f57f01a0ce28221007eff630d7385",
"detected_licenses": [
"MIT"
],
"directory_id": "292ebda0d69d4aade0f4367859e3d7e186617635",
"extension": "py",
"fi... | 3.640625 | stackv2 | # Python program to accept string ending
# with only alphanumeric character.
# re module provides support
# for regular expressions
import re
# Make a regular expression to accept string
# ending with alphanumeric character
regex = '[a-zA-z0-9]$'
# Define a function for accepting string
# endi... | 45 | 18.51 | 45 | 11 | 207 | python | [{"finding_id": "codeql_py/overly-large-range_08a0d270c411811d_62d308cf", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
11
] | [
null
] | [
14
] | [
17
] | |
2024-11-18T21:31:29.404811+00:00 | 1,538,458,961,000 | 370143490dad13b17badfa916eecefc4096c78d6 | 4 | {
"blob_id": "370143490dad13b17badfa916eecefc4096c78d6",
"branch_name": "refs/heads/master",
"committer_date": 1538458961000,
"content_id": "5e72985eadaf873581ef298fe1f0a59fb3352c98",
"detected_licenses": [
"MIT"
],
"directory_id": "e14c328e5b9c42d36b4e4f5c1901bb976b1949f4",
"extension": "py",
"fi... | 3.859375 | stackv2 | #!/usr/bin/python
import random
def getOptions(option):
while True:
choice = ""
print("{} (y/N): ".format(option), end="")
choice = input()
if len(choice) == 0:
pass
elif choice[0].lower() == 'y':
return True
elif choice[0].lower() == 'n':
return False
def getLength():
passLength = 0
... | 80 | 17.98 | 54 | 14 | 456 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0e3b564dfe5b016c_c681fafa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
76
] | [
null
] | [
8
] | [
30
] | |
2024-11-18T21:31:32.765673+00:00 | 1,606,261,871,000 | 2ac7ea912cbf53f01b1bf1ce89dceda436148206 | 2 | {
"blob_id": "2ac7ea912cbf53f01b1bf1ce89dceda436148206",
"branch_name": "refs/heads/master",
"committer_date": 1606261871000,
"content_id": "b51785d9486495523a16ba3afc15fac22132ca94",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "4057b38e8a6d7a40c10789db609ad2d2096e37bb",
"extension": "p... | 2.421875 | stackv2 | from urllib.request import urlopen
import cv2
import io
import aiohttp
import re
from dotenv import load_dotenv
load_dotenv()
import os_helper
async def find_recent_image(channel_id, message_id):
urlRegexImage = "^(?:http(s)?:\/\/)?[\w.-]+(?:\.[\w\.-]+)+[\w\-\._~:\/?#[\]@!\$&'\(\)\*\+,;=.]+(?:png|jpg|jpeg|... | 39 | 30.36 | 130 | 16 | 306 | python | [{"finding_id": "codeql_py/redos_6937403c01ca98f5_1d2006d7", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '-.' and containing many repetitio... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '-.' and containing many repetitions of '-.'."
] | [
15
] | [
null
] | [
53
] | [
61
] | |
2024-11-18T21:32:01.005716+00:00 | 1,605,980,829,000 | 4d51ebd32a5f24cb02ce148d12e33d346926fac2 | 3 | {
"blob_id": "4d51ebd32a5f24cb02ce148d12e33d346926fac2",
"branch_name": "refs/heads/master",
"committer_date": 1605980829000,
"content_id": "4901aef9ee57ba9f7462ef7ae864d40892479db0",
"detected_licenses": [
"MIT"
],
"directory_id": "40756d056501712241ee3f3f45683b3883ef8b5d",
"extension": "py",
"fi... | 2.671875 | stackv2 | import boto3
import base64
import json
import os
rekognition_client = boto3.client('rekognition')
file = open('man2.jpg','rb').read()
response = rekognition_client.detect_faces(
Image = {
'Bytes': file
},
Attributes = ['ALL']
)
for face in response['FaceDetails']:
print('The detected candidate is '+ str(face['G... | 41 | 29.37 | 122 | 16 | 308 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e3b93f7003e1dfca_283f84a5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
16
] | [
null
] | [
8
] | [
66
] | |
2024-11-18T21:32:28.975904+00:00 | 1,379,859,705,000 | bd18f21e87804e360eb966eec19e9df2f0b808b3 | 2 | {
"blob_id": "bd18f21e87804e360eb966eec19e9df2f0b808b3",
"branch_name": "refs/heads/master",
"committer_date": 1379859705000,
"content_id": "77545ab49f590044217905b51f0229dbf90d9f3d",
"detected_licenses": [
"MIT"
],
"directory_id": "a5375c6610dc4e5b18845fd0d82109fbf88f568a",
"extension": "py",
"fi... | 2.421875 | stackv2 | from sqlalchemy import Column, Integer, String, DateTime, Text, ForeignKey
import datetime
from sqlalchemy.sql import select
from database import Base
import hashlib
import string
import random
class Major(Base):
__tablename__ = 'majors'
code = Column(String(20), unique=True, primary_key=True)
name = Column(String(... | 102 | 22.58 | 111 | 16 | 674 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_bbacdff8bfc2adfe_31a857dc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
40,
94
] | [
null,
null
] | [
34,
37
] | [
42,
52
] | |
2024-11-18T21:33:11.284007+00:00 | 1,638,099,079,000 | 8445f2e6d167796af2c76ef35d3ce855ef555ce3 | 3 | {
"blob_id": "8445f2e6d167796af2c76ef35d3ce855ef555ce3",
"branch_name": "refs/heads/master",
"committer_date": 1638099079000,
"content_id": "7e1119d7b86b65ec875e09604ef71894855202a8",
"detected_licenses": [
"MIT"
],
"directory_id": "65525c3b93f273bd3cb7b5562108509b145f7c0d",
"extension": "py",
"fi... | 2.53125 | stackv2 | from http.server import HTTPServer, BaseHTTPRequestHandler
import sys
import os
count = 0
class SimpleHTTPRequestHandler(BaseHTTPRequestHandler):
def do_GET(self):
self.send_response(200)
self.end_headers()
global count
global port
global folder
cwd = os.... | 40 | 25.38 | 92 | 16 | 255 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_181262f44edcdddb_6bcdb0d6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
27
] | [
null
] | [
15
] | [
21
] | |
2024-11-18T21:49:04.071878+00:00 | 1,678,744,463,000 | fced46d8dbb3e5f8930168e324a392fdf45b4e68 | 3 | {
"blob_id": "fced46d8dbb3e5f8930168e324a392fdf45b4e68",
"branch_name": "refs/heads/master",
"committer_date": 1678744463000,
"content_id": "a362e7ae21cafc093b00f5b684fcbb30eeecba01",
"detected_licenses": [
"MIT"
],
"directory_id": "7dfc28944db71d80bd04c6597363591aa08c6687",
"extension": "py",
"fi... | 2.515625 | stackv2 | import os
import pickle
import warnings
import numpy as np
from FeaturesExtractor import FeaturesExtractor
from hmmlearn import hmm
import pydub
import subprocess
import speech_recognition as sr
from pydub import AudioSegment
from subprocess import Popen, PIPE
from pydub.silence import split_on_silence, detect_nonsil... | 146 | 39.74 | 150 | 19 | 1,386 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_209f191f0e4dda2f_3a6b8b3d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
84
] | [
null
] | [
23
] | [
29
] | |
2024-11-18T21:49:15.918173+00:00 | 1,628,847,844,000 | dff4ed357c2d486371017828ad626f0543cc3f08 | 3 | {
"blob_id": "dff4ed357c2d486371017828ad626f0543cc3f08",
"branch_name": "refs/heads/main",
"committer_date": 1628847844000,
"content_id": "361847529322c2d4ffae6025c479c3c855567fdc",
"detected_licenses": [
"MIT"
],
"directory_id": "1f617025454f9ac75f2af7fb7d9fae8ff16d676f",
"extension": "py",
"file... | 2.921875 | stackv2 | from PIL import Image
import os
import os.path
import numpy as np
import tarfile
from torchvision.datasets.vision import VisionDataset
from torchvision.datasets.utils import extract_archive
class CODaN(VisionDataset):
"""`CODaN <https://github.com/Attila94/CODaN>`_ Dataset.
Args:
data (string, option... | 89 | 37.58 | 105 | 21 | 764 | python | [{"finding_id": "codeql_py/tarslip_1153ee99695707fc_7fb95d0b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
52
] | [
null
] | [
17
] | [
20
] | |
2024-11-18T22:42:09.581157+00:00 | 1,525,757,950,000 | 759c7ee30b9a262d59ce9c6513e7d9d5b13b4a20 | 3 | {
"blob_id": "759c7ee30b9a262d59ce9c6513e7d9d5b13b4a20",
"branch_name": "refs/heads/master",
"committer_date": 1525757950000,
"content_id": "b84792d41f2c9792312acd91f84e291b53ac4fb2",
"detected_licenses": [
"MIT"
],
"directory_id": "54f9249c0e94787ed5cddbf142e13fe01542344c",
"extension": "py",
"fi... | 2.96875 | stackv2 | #!/usr/bin/env python3
"""
This module creates a HTML report with plots by parsing data from the given
log file.
"""
import os
from sys import argv
from datetime import timedelta
from jinja2 import Environment, FileSystemLoader
from classify import Classifier
from parse import Parser
from plot import create_plots
PA... | 119 | 28.66 | 76 | 14 | 776 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e65ea7c3af567ffa_73bac107", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
17
] | [
20
] | [
24
] | [
23
] | |
2024-11-18T20:31:40.571662+00:00 | 1,454,906,747,000 | 8d08b802eda8e8a37df1e5d2c379469c9eb0efb5 | 3 | {
"blob_id": "8d08b802eda8e8a37df1e5d2c379469c9eb0efb5",
"branch_name": "refs/heads/master",
"committer_date": 1454906747000,
"content_id": "92aa0f8a9f2682d2f6ce52e7f26e46c5fc2b76e8",
"detected_licenses": [
"MIT"
],
"directory_id": "179b05d486c1b8efd06134e084b7f1651e146a8b",
"extension": "py",
"fi... | 2.703125 | stackv2 | #!/usr/bin/env python
import argparse
import gpxpy
import numpy as np
import io
from pathlib import Path
from PIL import Image
import urllib.request
import urllib.parse
import matplotlib
matplotlib.use('Agg')
import matplotlib.pyplot as plt
# Command line option handling
parser = argparse.ArgumentParser(description ... | 330 | 34.5 | 79 | 21 | 2,890 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b328e45ab2211536_45343aa4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
78
] | [
null
] | [
41
] | [
48
] | |
2024-11-18T20:31:40.923624+00:00 | 1,554,808,772,000 | 68da96baf0d4ea89a3c5acd6c1e8c60f9ac275f6 | 4 | {
"blob_id": "68da96baf0d4ea89a3c5acd6c1e8c60f9ac275f6",
"branch_name": "refs/heads/master",
"committer_date": 1554808772000,
"content_id": "b80856c2bfffe6718756e145b0bba08a6b26839f",
"detected_licenses": [
"MIT"
],
"directory_id": "593c54233366121603bacc9b7a7a3507edf76a50",
"extension": "py",
"fi... | 3.875 | stackv2 | import random
import csv
alphabet = []
def createPassword(length):
password = []
for i in range(length):
password.append(random.choice(alphabet))
return "".join(password)
def getAsciiCharacters():
print("Gaining all characters")
for i in range(97,123):
alphabet.append(chr(i))
... | 80 | 28.24 | 96 | 16 | 547 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c951579ff8b8d954_420507af", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
41,
63
] | [
null,
null
] | [
19,
11
] | [
82,
19
] | |
2024-11-18T20:53:37.108359+00:00 | 1,524,140,235,000 | a090debd2fbcd3d9f80d4984dd28cbce12767896 | 2 | {
"blob_id": "a090debd2fbcd3d9f80d4984dd28cbce12767896",
"branch_name": "refs/heads/master",
"committer_date": 1524140235000,
"content_id": "218f0ff6738a4fe7791d9696cc06ef4711e13135",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3f4d418d9c182c21ebcb41b133381ffeee6db2b2",
"extension": "py"... | 2.40625 | stackv2 | import os
import functools
import logging
import textwrap
import requests
from flask import request
from flask import session as flask_session
from flask_oauthlib.client import OAuth, OAuthRemoteApp
from connexion.exceptions import OAuthProblem, OAuthResponseProblem, OAuthScopeProblem
from app.config import CREDENTI... | 147 | 33.71 | 120 | 19 | 1,015 | python | [{"finding_id": "codeql_py/log-injection_8c71e35e0b7e4b6a_6834c22a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
83
] | [
null
] | [
50
] | [
61
] | |
2024-11-18T21:10:49.141164+00:00 | 1,511,963,562,000 | 044e0371d565fc9ba901a918a81a4460de7f8aad | 2 | {
"blob_id": "044e0371d565fc9ba901a918a81a4460de7f8aad",
"branch_name": "refs/heads/master",
"committer_date": 1511963562000,
"content_id": "5f9b34347470a4c741b5cee9ccb391b88bdbb8ff",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "31bbd75b53ce575d38d865c8a843b2e14800688f",
"extension": "py"... | 2.421875 | stackv2 | # Copyright (c) 2013 Yogesh Panchal, yspanchal@gmail.com
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law ... | 93 | 30.4 | 80 | 18 | 646 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c4b3ad8f38f0e7e8_c4e51786", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
66
] | [
null
] | [
25
] | [
60
] | |
2024-11-18T21:11:14.955022+00:00 | 1,646,861,833,000 | 0f963e5b09a636f0cd2157e6858a19b6e23c66bd | 3 | {
"blob_id": "0f963e5b09a636f0cd2157e6858a19b6e23c66bd",
"branch_name": "refs/heads/master",
"committer_date": 1646862164000,
"content_id": "ea81523c7ad75417e22e250dbf4cb6df4332b60a",
"detected_licenses": [
"MIT"
],
"directory_id": "3777ee738c3a00c33159c8d7c6f515e8c1a6a1db",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/python3
#
# See README.md for configuration information
import gdata.contacts.client
import gdata.contacts.service
import gdata.gauth
import glob
import math
import os
import re
import unidecode
import xml.dom.minidom
import asteriskhelp
OAUTH_CONFIG_FILE = "/etc/asterisk-scripts/client_secrets.json"
USER... | 194 | 30.03 | 88 | 20 | 1,319 | python | [{"finding_id": "codeql_py/overly-permissive-file_bf500e64f96eae6d_32d676be", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
169
] | [
null
] | [
5
] | [
31
] | |
2024-11-18T21:11:16.175759+00:00 | 1,688,579,818,000 | 7babe3b157c0d0895ece8eacb2deda5c19dd3eef | 3 | {
"blob_id": "7babe3b157c0d0895ece8eacb2deda5c19dd3eef",
"branch_name": "refs/heads/main",
"committer_date": 1688579818000,
"content_id": "a4f0e0cb6a990ea47369b28c2defef952dfbd9b5",
"detected_licenses": [
"MIT"
],
"directory_id": "37bac66cd5344166070b5be0f84368b3944671d1",
"extension": "py",
"file... | 2.953125 | stackv2 | #!/usr/bin/env python3
"""A script to import part information from KiCad."""
from pathlib import Path
import json
import re
# We don't want a bunch of `fixme` warnings for this script.
# pylint: disable=fixme
def parse_part(part):
"""Converts KiCad's string representation of a part to a dict."""
if not '\... | 246 | 27.72 | 78 | 20 | 1,841 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_ee77fe9f662cf148_c95b14c3", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.allegromicro.com/](1) may be at an arbitrary posit... | 5 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The string [www.allegromicro.com/](1) may be at an arbitrary position in the sanitized URL.",
"The string [www.fairchildsemi.com/](1) may be at an arbitrary position in the sanitized URL.",
"The string [www.st.com/](1) may be at an arbitrary position in the sanitized URL.",
"The string [www.ti.com/](1) may b... | [
164,
165,
166,
167,
168
] | [
null,
null,
null,
null,
null
] | [
8,
9,
9,
9,
9
] | [
48,
50,
39,
39,
42
] | |
2024-11-18T21:46:31.313689+00:00 | 1,544,048,477,000 | 1f0accb54b2767c167a726b9d93269a1de5ee9a4 | 3 | {
"blob_id": "1f0accb54b2767c167a726b9d93269a1de5ee9a4",
"branch_name": "refs/heads/master",
"committer_date": 1544048477000,
"content_id": "18bce0cda3d923c480d5ddbd1b6095de49f45cbe",
"detected_licenses": [
"MIT"
],
"directory_id": "b645b0d5af437a9b33d5f6531ed2bae572f0f348",
"extension": "py",
"fi... | 2.828125 | stackv2 | import json
import socket
import ssl
import getpass
import datetime
import os
import hashlib
from Helpers import Debug
'''
Markerede linje: (225)
Tag datoer og tid fra input og konvertér til timestamp
'''
# Nuværende socket
sock = None
# Handshake id
client_id = None
# Er klienten logget ind?
logged_in = False
# F... | 288 | 17.16 | 76 | 16 | 1,649 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_28e8029cb5309e6d_14f6ea0c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
60,
100
] | [
null,
null
] | [
31,
31
] | [
48,
48
] | |
2024-11-18T21:47:33.336686+00:00 | 1,688,758,855,000 | 9270730243eca2a2fee52f46f2a760be7240e8e2 | 3 | {
"blob_id": "9270730243eca2a2fee52f46f2a760be7240e8e2",
"branch_name": "refs/heads/master",
"committer_date": 1688758855000,
"content_id": "a73aa7cf7876be4e042df53db8423ea56957219b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a48bbf8c43121d97be0b8e9b7fbaa667127ed040",
"extension": "py"... | 2.734375 | stackv2 | import os
from smartystreets_python_sdk import StaticCredentials, ClientBuilder, SharedCredentials
from smartystreets_python_sdk.international_street import Lookup as InternationalLookup
def run():
# key = "Your SmartyStreets Key here"
# hostname = "Your Hostname here"
# We recommend storing your secret... | 59 | 40.2 | 102 | 12 | 551 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_51159ef0329fc0ae_f13b6db1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
54,
55
] | [
null,
null
] | [
11,
11
] | [
67,
69
] | |
2024-11-18T21:47:34.451712+00:00 | 1,559,481,653,000 | ed4e4b6b5f93c40580ac95e2fe174ecf7e50a9f1 | 3 | {
"blob_id": "ed4e4b6b5f93c40580ac95e2fe174ecf7e50a9f1",
"branch_name": "refs/heads/master",
"committer_date": 1559481653000,
"content_id": "d3bb914c7e47d48aa55bac692eb4386b37bda1df",
"detected_licenses": [
"MIT"
],
"directory_id": "b24dd9e7588f919047d1563a80cba02c080491c0",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
import sys
import requests
from contextlib import contextmanager
from collections import namedtuple
from typing import Optional, Dict, Iterator, cast
from aruba.errors import RequestError, FormatError
from aruba.common import _ask_input, _ask_pass, _fill, Config, Settin... | 115 | 35.58 | 115 | 13 | 1,011 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_de8773146b8a11f7_bde02b38", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-295"
] | [
"py/clear-text-logging-sensitive-data",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
113,
39
] | [
null,
null
] | [
15,
20
] | [
44,
83
] | |
2024-11-18T22:29:30.634982+00:00 | 1,573,461,029,000 | b5f69993d07fdf7196e1dedeed3ac710f2b9b5a3 | 3 | {
"blob_id": "b5f69993d07fdf7196e1dedeed3ac710f2b9b5a3",
"branch_name": "refs/heads/master",
"committer_date": 1573461029000,
"content_id": "a146503ee2c449e7a779595ff290cf2ee9be3bde",
"detected_licenses": [
"MIT"
],
"directory_id": "1201db030924970bb72d4c0e9843369059aa7ba9",
"extension": "py",
"fi... | 3.21875 | stackv2 | # -*- coding: utf-8 -*-
import argparse
import hashlib
import string
import re
from rgpg.__version__ import __version__, __description__
def random_generator(str_seed: str):
"""Simple pseudo-random number generator."""
seed = int(hashlib.md5(str_seed.encode(encoding='utf-8')).hexdigest()[:8], 16)
multip... | 108 | 28.44 | 82 | 17 | 826 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_548013346f176ef9_3cd490b2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
100
] | [
null
] | [
11
] | [
52
] | |
2024-11-18T22:29:36.235969+00:00 | 1,540,555,472,000 | 9c9ba70bf5dbd5c1021564d6b8064fff9dedfab9 | 3 | {
"blob_id": "9c9ba70bf5dbd5c1021564d6b8064fff9dedfab9",
"branch_name": "refs/heads/master",
"committer_date": 1540555472000,
"content_id": "cfee34f7f6d743b732497dc0723dd884cf61d36b",
"detected_licenses": [
"MIT"
],
"directory_id": "a5d5326a65daf6f5528aa0248d96ee24858f8252",
"extension": "py",
"fi... | 2.546875 | stackv2 | # *** Create a new Outgoing Caller ID ***
# Code based on https://www.twilio.com/docs/voice/api/outgoing-caller-ids
# Download Python 3 from https://www.python.org/downloads/
# Download the Twilio helper library from https://www.twilio.com/docs/python/install
import os
from twilio.rest import Client
#from datetime impo... | 49 | 53.73 | 120 | 10 | 586 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4f10fc127bdac155_33b599ec", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
47,
36
] | [
null,
null
] | [
9,
7
] | [
72,
38
] | |
2024-11-18T22:40:27.914108+00:00 | 1,358,199,589,000 | 60533fecc30a05cc0db1b7f5ffe6a8bbb52e3132 | 2 | {
"blob_id": "60533fecc30a05cc0db1b7f5ffe6a8bbb52e3132",
"branch_name": "refs/heads/master",
"committer_date": 1358199589000,
"content_id": "646a338152099cf3c6d80e18d1fb897b71337eae",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "41913d2bb96aed5af283184d9abe4f8a70d40257",
"extension": "p... | 2.4375 | stackv2 | """
Author: Christian Laustsen
License: BSD (See accompanying LICENSE file)
Description: Create a menulet in the system tray, and automate the process of connecting to
the K-Net and logging in to the server with ssh.
"""
import urllib2
import webbrowser
import paramiko
import threading
import time
import objc, re, ... | 199 | 32.2 | 105 | 16 | 1,450 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a9ca40f4763ac7c1_cb57d6d5", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
57
] | [
null
] | [
5
] | [
62
] | |
2024-11-18T22:41:22.977484+00:00 | 1,469,735,124,000 | 6c37cf0604169b71316b6ecf2587a61b113d3d9b | 2 | {
"blob_id": "6c37cf0604169b71316b6ecf2587a61b113d3d9b",
"branch_name": "refs/heads/master",
"committer_date": 1469735124000,
"content_id": "f75f0bf28f9992d3a3bda5c1409a5c3bc8328f79",
"detected_licenses": [
"MIT"
],
"directory_id": "dd6f63ad5f5d9bfc8f908d1d371d6d8b891d140a",
"extension": "py",
"fi... | 2.390625 | stackv2 | import hashlib
import random
import string
import os
from werkzeug import secure_filename
import jinja2
import json
from flask import Flask, render_template, request, url_for, redirect, make_response
from flask.ext.login import LoginManager, current_user, login_user, logout_user, login_required
import mammoth
from s... | 157 | 29.06 | 110 | 18 | 1,014 | python | [{"finding_id": "codeql_py/flask-debug_ff24f14770afb95a_944e3e0c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-327"
] | [
"py/flask-debug",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
157,
43
] | [
null,
null
] | [
5,
14
] | [
24,
27
] | |
2024-11-18T22:54:28.632181+00:00 | 1,507,771,301,000 | 00642d3bb9790158c2984982b091b959742e5be8 | 2 | {
"blob_id": "00642d3bb9790158c2984982b091b959742e5be8",
"branch_name": "refs/heads/master",
"committer_date": 1507771301000,
"content_id": "ef1cbb7f51d4d28bc288550828d63de1f997ccfc",
"detected_licenses": [
"MIT"
],
"directory_id": "50eefef1dee13b2cc478afcbdfe3dca712e25472",
"extension": "py",
"fi... | 2.453125 | stackv2 | import os.path, cgi
from types import *
from datetime import datetime
from google.appengine.api import users
import webapp2
from jinja2 import Environment, FileSystemLoader, TemplateNotFound
from models import CardSets
def verifySet(content):
cards = []
for (i, pair) in enumerate(content.split("\n")):
... | 199 | 28.82 | 82 | 19 | 1,092 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b8ed8778c26b8843_2b2a7110", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
37
] | [
null
] | [
15
] | [
68
] | |
2024-11-18T20:55:10.455084+00:00 | 1,400,988,379,000 | 58a4928dbaa39c625de17ab969a5f2c2ec2a85c4 | 3 | {
"blob_id": "58a4928dbaa39c625de17ab969a5f2c2ec2a85c4",
"branch_name": "refs/heads/master",
"committer_date": 1400988379000,
"content_id": "8314f633f0ab7f881cedb66ec05a4746c10d0020",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "ee824830b453394c53c16332fedb9d088968caff",
"extension": "p... | 2.859375 | stackv2 | """
Copyright (c) 2014, Zane Salvatore.
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this
list of conditions and the follo... | 268 | 31.97 | 80 | 15 | 1,835 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2a3c0e65a4390ec2_4116f4da", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 5 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially... | [
97,
98,
190,
217,
226
] | [
null,
100,
211,
224,
243
] | [
33,
30,
16,
16,
21
] | [
56,
30,
6,
6,
6
] | |
2024-11-18T20:55:12.681098+00:00 | 1,625,847,365,000 | f49cb6b048a712e4cfdb296190a004d422620286 | 2 | {
"blob_id": "f49cb6b048a712e4cfdb296190a004d422620286",
"branch_name": "refs/heads/master",
"committer_date": 1625847365000,
"content_id": "8244fe530fae23dbb391724e8c86c0c0068c2699",
"detected_licenses": [
"MIT"
],
"directory_id": "7d41a4c02e69887f5d31f8ec41db9c91a455eff3",
"extension": "py",
"fi... | 2.5 | stackv2 | from django.db import models
import re
from datetime import date
# Create your models here.
class UserManager(models.Manager):
def user_validator(self, postData):
errors = {}
if len(postData['Username'])<2:
errors['Username'] = "Username must be greater than 2 characters long"
e... | 30 | 40.7 | 82 | 14 | 280 | python | [{"finding_id": "codeql_py/overly-large-range_03d125e85bea2f2b_f6606d31", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
11
] | [
null
] | [
58
] | [
61
] | |
2024-11-18T21:33:05.030545+00:00 | 1,637,635,890,000 | 9814cfb5b14653600c9290b74c09d87b43d62e50 | 3 | {
"blob_id": "9814cfb5b14653600c9290b74c09d87b43d62e50",
"branch_name": "refs/heads/master",
"committer_date": 1637635890000,
"content_id": "c6a8415fcfee31311cc7114bdebcea0fb611cf3f",
"detected_licenses": [
"MIT"
],
"directory_id": "fb10f5c99d90a41a29cb4c1f866d9d4ca19002fd",
"extension": "py",
"fi... | 2.546875 | stackv2 | import os
import scipy.io as io
import shutil
import tarfile
dataset_path = '~/dataset/stanford_car'
dataset_path = os.path.expanduser(dataset_path)
if not os.path.exists(dataset_path):
os.makedirs(dataset_path, exist_ok=True)
def download_file(url, dest=None):
if not dest:
dest = os.path.join(data... | 90 | 34.17 | 96 | 15 | 810 | python | [{"finding_id": "codeql_py/tarslip_cf0bc2a3a58b1dee_18b64016", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 3 | true | [
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/tarslip",
"py/tarslip",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
30,
31,
32
] | [
null,
null,
null
] | [
5,
5,
5
] | [
63,
62,
63
] | |
2024-11-18T21:33:16.141882+00:00 | 1,576,060,776,000 | 17f840d531d4cb103d19cb6e9430def3046cc79c | 2 | {
"blob_id": "17f840d531d4cb103d19cb6e9430def3046cc79c",
"branch_name": "refs/heads/master",
"committer_date": 1576060776000,
"content_id": "24f8195835ce8c909027755bf4493cb3a4858201",
"detected_licenses": [
"MIT"
],
"directory_id": "e63831c555efff1741ed21c9fd299d73c3e65ffb",
"extension": "py",
"fi... | 2.421875 | stackv2 | import os.path
import os
from dotenv import load_dotenv
import sys
import platform
import requests
from zipfile import ZipFile
from config import DOWNLOAD_PATH, VERSION_FILE
from .list import list_remote
""" Download Required Terraform / Terragrunt Versions """
def download_program(args, program, version):
opera... | 104 | 33.38 | 146 | 16 | 831 | python | [{"finding_id": "codeql_py/overly-permissive-file_32d7fc1771d415e8_d371d5ab", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
59
] | [
null
] | [
9
] | [
35
] | |
2024-11-18T21:33:16.332600+00:00 | 1,541,204,305,000 | a3ae94b73b78c219235c34e36dbac3b24ae62851 | 3 | {
"blob_id": "a3ae94b73b78c219235c34e36dbac3b24ae62851",
"branch_name": "refs/heads/master",
"committer_date": 1541204305000,
"content_id": "5bdfe24809b0f2fc91fc606439558bdc98850313",
"detected_licenses": [
"MIT"
],
"directory_id": "a0489f93b4715941c1f3ea41997b328f76de4c9f",
"extension": "py",
"fi... | 2.515625 | stackv2 | import decimal
import random
from getpass import getpass
import requests
import settings
import datetime
import hashlib
import time
def checksum(activity_id, ts, token):
md5 = hashlib.md5()
md5.update(('content_resource/{}/activity'.format(activity_id).encode('utf-8')))
md5.update(ts.encode('utf-8'))
... | 161 | 36.09 | 110 | 24 | 1,322 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_2bd60a8801931478_851a920b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
14
] | [
null
] | [
17
] | [
83
] | |
2024-11-18T21:55:52.434512+00:00 | 1,508,753,358,000 | 71c767c304e8f5ac7377aa5085d2e14ee6c28fd3 | 3 | {
"blob_id": "71c767c304e8f5ac7377aa5085d2e14ee6c28fd3",
"branch_name": "refs/heads/master",
"committer_date": 1508753358000,
"content_id": "90afee5b59cf631a2dd8edc4394c7b2f8c60f973",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ee7b6ba87d21d463d17a1e8b7a52c80a870eedf9",
"extension": "py"... | 2.75 | stackv2 | from __future__ import absolute_import
import re
import sqlite3
import nltk
import codecs
import json
conn = sqlite3.connect(u'rechtspraak.db')
c = conn.cursor()
def tokenizing(text):
tokenized = nltk.word_tokenize(text)
return [w.lower() for w in tokenized if not re.match( u'[^a-zA-uZ\d\s]',w)]
rows = ... | 34 | 23.65 | 87 | 12 | 241 | python | [{"finding_id": "codeql_py/overly-large-range_fdb90bcc5212b314_21a9594c", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-u\\]."
] | [
17
] | [
null
] | [
66
] | [
69
] | |
2024-11-18T21:56:07.943039+00:00 | 1,598,697,615,000 | 55ed84e0506bd110cd214f1d9c2c24153dda86ac | 3 | {
"blob_id": "55ed84e0506bd110cd214f1d9c2c24153dda86ac",
"branch_name": "refs/heads/master",
"committer_date": 1598697615000,
"content_id": "98fabe50e1101abe01e31ee4d4547585bec4b4d9",
"detected_licenses": [
"MIT"
],
"directory_id": "eb1e890531c9b71000cfa0f3b00673520d447b08",
"extension": "py",
"fi... | 2.828125 | stackv2 | from flask import jsonify
from PIL import Image
import os
from model import predict_date
def resize_img(img, size=224):
width, height = img.size
scale_f = max(width, height) / size
width_new = int(width / scale_f)
height_new = int(height / scale_f)
img = img.resize((width_new, height_new))
ret... | 52 | 22.69 | 45 | 12 | 305 | python | [{"finding_id": "codeql_py/command-line-injection_9ed67f74caaaab86_e1fa61c3", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 2 | true | [
"CWE-078",
"CWE-022"
] | [
"py/command-line-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
32,
29
] | [
null,
null
] | [
19,
19
] | [
35,
27
] | |
2024-11-18T21:56:08.066335+00:00 | 1,595,309,962,000 | cd6a3ee7b063a7688cb26f1c29ef72a4e6c7d2a0 | 3 | {
"blob_id": "cd6a3ee7b063a7688cb26f1c29ef72a4e6c7d2a0",
"branch_name": "refs/heads/master",
"committer_date": 1595309962000,
"content_id": "5c2168ec670cdb7c808d66b40fc7e3bd4ed25b08",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f97c7539f564428c98986c4a9ff61acdb13cd7fc",
"extension": "py"... | 3.375 | stackv2 | # -*- coding:utf-8
import datetime,argparse,csv
# 获取身份证号码最后一位
# 根据前17位进行计算
# Parameter:
# id:前17位的字符串列表
def get_lastnumber(id):
weight=[7,9,10,5,8,4,2,1,6,3,7,9,10,5,8,4,2]
if len(weight) != len(id):
print("计算最后一位时出错!")
print(id)
return 0
sum = 0
for i in range(len(weight)):
... | 148 | 28.04 | 114 | 20 | 1,284 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_53de41a18d07fac2_6c0b7702", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive data (private)](4) as clear text.\nThis expression stores [sensitive data ... | [
126,
13,
129
] | [
null,
null,
null
] | [
34,
15,
31
] | [
36,
17,
33
] | |
2024-11-18T22:55:03.218099+00:00 | 1,589,580,174,000 | c3d182a04ec55f0141e3d597cb39d428d1bfbec7 | 4 | {
"blob_id": "c3d182a04ec55f0141e3d597cb39d428d1bfbec7",
"branch_name": "refs/heads/master",
"committer_date": 1589580174000,
"content_id": "6ce7f4e87d571ce54537c953ef4242006b10d77e",
"detected_licenses": [
"MIT"
],
"directory_id": "4b896d31de2aa5c8097a03952430750205206708",
"extension": "py",
"fi... | 3.546875 | stackv2 | import random
def jogar():
apresentação()
randomizar = carrega_txt(txt='palavras.txt')
palavra_secreta = randomizar.lower()
letras_acertadas = ['_' for letra in palavra_secreta]
letras_erradas = []
letras_certas = []
enforcou = False
acertou = False
erros = 0
while not enfo... | 191 | 29.79 | 86 | 18 | 1,528 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_db6a749a1cc62ccb_27362091", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
108,
128
] | [
null,
null
] | [
11,
11
] | [
48,
48
] | |
2024-11-18T23:06:22.296884+00:00 | 1,610,108,679,000 | 78f9b8a9315eb62498f82d5c82815f751e152b00 | 3 | {
"blob_id": "78f9b8a9315eb62498f82d5c82815f751e152b00",
"branch_name": "refs/heads/main",
"committer_date": 1610108679000,
"content_id": "542b1e92a209a6350409702bdb6e01217e57d0c4",
"detected_licenses": [
"MIT"
],
"directory_id": "787a11e4db9f5f9cd6f0571edc609c68db550299",
"extension": "py",
"file... | 2.84375 | stackv2 | from pandas.io.json import json_normalize
import folium
from geopy.geocoders import Nominatim
import requests
import pandas as pd
import folium
from folium import plugins
import math
geolocator = Nominatim(user_agent="foursquare_agent")
ny_location = geolocator.geocode("New York, USA")
ny_latitude = ny_location.latit... | 55 | 29.07 | 169 | 16 | 473 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_05f95f9206a5bdc1_e14871fa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
16,
16
] | [
null,
null
] | [
30,
69
] | [
41,
81
] | |
2024-11-18T23:06:23.078124+00:00 | 1,551,810,179,000 | 243c25436f659af9003f608d64b0d63171c362db | 3 | {
"blob_id": "243c25436f659af9003f608d64b0d63171c362db",
"branch_name": "refs/heads/master",
"committer_date": 1551810179000,
"content_id": "ed1314c30ec6725ed65c27d31aefcdc66f9487e7",
"detected_licenses": [
"MIT"
],
"directory_id": "0291837e28e472fc842661e3c0f6af3604a25849",
"extension": "py",
"fi... | 3.140625 | stackv2 | import re
import base64
import json
import hashlib
users = {}
def load_users(path):
with open(path) as f:
users.update(json.load(f))
def authorized(token):
if not token:
print(f'Token is empty')
return False
m = re.match(r'^Basic (.*)', token)
if not m:
print(f'Toke... | 43 | 19.65 | 78 | 14 | 210 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7be231b15d01465e_2e7e64a5", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
41
] | [
null
] | [
26
] | [
43
] | |
2024-11-18T20:56:50.120914+00:00 | 1,628,350,847,000 | cf75754d7a9fe73ae600d9033fc9c7f77138002e | 4 | {
"blob_id": "cf75754d7a9fe73ae600d9033fc9c7f77138002e",
"branch_name": "refs/heads/master",
"committer_date": 1628350847000,
"content_id": "13e05a9af92e961c1ffcb3849e99fea172414f5c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d53eb96e95ade4deb5d8cfba229a16f7fa0538d6",
"extension": "py"... | 4.46875 | stackv2 | # 对象的初始化方法--定义对象的属性
class Chinese():
def __init__(self): # 构造方法、魔法方法、初始化方法 init方法后边不需要调用,会在创建对象的时候直接初始化
print('init')
self.nationality = 'China' # 为对象本身创建初始化属性
self.complexion = 'yellow'
def eat(self):
print('吃东西')
def sleep(self):
print('睡觉')
xiaoming = Ch... | 36 | 22.83 | 104 | 10 | 287 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2f42ce0de517e8a6_eb3dfa1e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text."
] | [
21,
35
] | [
null,
null
] | [
7,
7
] | [
27,
26
] | |
2024-11-18T22:43:29.202657+00:00 | 1,543,263,859,000 | 96d2e0fa30242216dbf863bef454ecfbee673cae | 2 | {
"blob_id": "96d2e0fa30242216dbf863bef454ecfbee673cae",
"branch_name": "refs/heads/main",
"committer_date": 1543263859000,
"content_id": "d8e346babb5abc00cc58227dd7e2ca549f9d5264",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6dd9696a49e2367942d7168c990afb9cab4c84d2",
"extension": "py",
... | 2.328125 | stackv2 | #!/usr/bin/env python
from google.appengine.ext import ndb
from jinja2 import Environment, FileSystemLoader
from json import dumps
from os import path
from re import compile
from sets import Set
from webapp2 import RequestHandler, WSGIApplication
JINJA_ENVIRONMENT = Environment(
loader=FileSystemLoader(path.dirn... | 115 | 32.12 | 113 | 18 | 763 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0356344af443d2a3_d2a0d89c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
12
] | [
13
] | [
21
] | [
53
] | |
2024-11-18T22:43:33.404920+00:00 | 1,627,943,127,000 | 8b434bc67429884aa2c94550666e3d60d33f137b | 3 | {
"blob_id": "8b434bc67429884aa2c94550666e3d60d33f137b",
"branch_name": "refs/heads/main",
"committer_date": 1627943127000,
"content_id": "2f3536f2c79bd9dd9db8746164d9a26a5d5efa3e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0643fcb7e32b98b86d4f8e6e6467a07a3ff9206c",
"extension": "py",
... | 2.96875 | stackv2 | """
Provides access to a secret store via dapr. Starts and manages a dapr process,
which provides HTTP access to the store.
Assumes daprd executable in same directory as currently running process.
Usage:
* open()
* read_value() -- as needed
* close() -- Must terminate the daprd process!
Copyright 2021 ba... | 87 | 29.4 | 95 | 17 | 610 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6b4e3d66d2827923_cdcfa041", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
69,
81
] | [
null,
null
] | [
15,
23
] | [
51,
55
] | |
2024-11-18T22:29:37.301923+00:00 | 1,590,479,640,000 | d0967bdaef7397ef986376f3d26519cd176e213e | 4 | {
"blob_id": "d0967bdaef7397ef986376f3d26519cd176e213e",
"branch_name": "refs/heads/master",
"committer_date": 1590479640000,
"content_id": "d7f72d88dc117b72e7e7b8d0d72413d5ebe01ca9",
"detected_licenses": [
"MIT"
],
"directory_id": "1d173c06b5cc9f926608913eef6ef5fa006efb4c",
"extension": "py",
"fi... | 3.59375 | stackv2 | from user import User
from credentials import Credentials
import random
def create_user(username, password):
'''
Function to create a new user
'''
new_user = User(username, password)
return new_user
def create_account(account_name, account_password):
'''
Function to create a new account
... | 194 | 24.61 | 154 | 21 | 963 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d0857b7643379ff9_23170b61", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
136,
177,
181
] | [
null,
null,
null
] | [
17,
21,
21
] | [
154,
69,
65
] | |
2024-11-18T22:29:56.023899+00:00 | 1,547,445,268,000 | b3fde6b38d6339191cb37c02a4a53eef87615d38 | 2 | {
"blob_id": "b3fde6b38d6339191cb37c02a4a53eef87615d38",
"branch_name": "refs/heads/master",
"committer_date": 1547445268000,
"content_id": "0843a130aadbb2992c0515112efcff1d518bdd0b",
"detected_licenses": [
"MIT"
],
"directory_id": "6e10cab54775efef85e21707f7f43aa0fb110121",
"extension": "py",
"fi... | 2.484375 | stackv2 | from flask import Flask, Blueprint, jsonify, json, request
from datetime import datetime
from functools import wraps
from app.models import User,USERS,FLAGS,Redflag
from uuid import uuid4
from werkzeug.security import generate_password_hash, check_password_hash
from .users import loggedinuser
flags = Blueprint('flag',... | 85 | 30.58 | 91 | 17 | 617 | python | [{"finding_id": "codeql_py/stack-trace-exposure_a1c0c1794b0a87c1_0787c00a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
63
] | [
null
] | [
24
] | [
58
] | |
2024-11-18T23:21:51.022217+00:00 | 1,599,487,973,000 | 46a596ed9ce4e62a99e19db9c3c959695a762517 | 3 | {
"blob_id": "46a596ed9ce4e62a99e19db9c3c959695a762517",
"branch_name": "refs/heads/master",
"committer_date": 1599487973000,
"content_id": "3693e72b012b2970513049f6b1e6ec6e0dd1a089",
"detected_licenses": [
"MIT"
],
"directory_id": "f8db353042d7474c3e4b3e9446f989fdd552c9f3",
"extension": "py",
"fi... | 2.796875 | stackv2 | """Manage LDAP objects
"""
import logging
import ldap
import ldap.modlist
from .utils import list_get, configuration_manager as cm
logger = logging.getLogger(__name__)
class LdapObject():
"""Define a simple LDAP object.
"""
def __init__(self, base: str):
"""Create the object.
Arg:
... | 407 | 33.98 | 109 | 21 | 3,434 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_77aa35858ef37a46_d50194ec", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
228
] | [
null
] | [
26
] | [
108
] | |
2024-11-18T21:33:31.760793+00:00 | 1,616,829,530,000 | af323a655b0e62ff6e368a91b104ac37c98e4522 | 3 | {
"blob_id": "af323a655b0e62ff6e368a91b104ac37c98e4522",
"branch_name": "refs/heads/main",
"committer_date": 1616829530000,
"content_id": "2055b936d8388521661c45cb12da81dca7827dbd",
"detected_licenses": [
"MIT"
],
"directory_id": "6b314edc1bcf669878eb6726d072d6148aabc449",
"extension": "py",
"file... | 2.96875 | stackv2 | import requests
import argparse
import time
import pandas as pd
import numpy as np
from mac import mac
from tabulate import tabulate
url = 'http://standards-oui.ieee.org/oui/oui.csv'
print("[*] Welcome")
# # Function to get the interface name
# def get_arguments():
# # This will give user a neat CLI... | 105 | 27.9 | 76 | 15 | 719 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ddef4407a3afe05d_344a144b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
99
] | [
null
] | [
23
] | [
73
] | |
2024-11-18T21:33:36.474157+00:00 | 1,629,876,808,000 | ca3afb97d66f3bf72f404654c4a67551cd544c0b | 3 | {
"blob_id": "ca3afb97d66f3bf72f404654c4a67551cd544c0b",
"branch_name": "refs/heads/master",
"committer_date": 1629876808000,
"content_id": "45f3f80ed90c0e61b3d1f1228565cf0efb5c2492",
"detected_licenses": [
"MIT"
],
"directory_id": "869d921242191b4142c15733d5c3ede1d59fbdb2",
"extension": "py",
"fi... | 3.140625 | stackv2 | #!/usr/bin/env/ python
# encoding: utf-8
"""Handle operations supporting blocks here."""
import math
import matasano.util
import matasano.prng
from typing import Tuple
from Crypto.Cipher import AES
__author__ = 'aldur'
class BadPaddingException(Exception):
"""
Throw this exception while detecting that a ... | 329 | 24.19 | 80 | 14 | 2,290 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_4b7503f6cecc2b84_c509f9a2", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
245,
245,
324
] | [
null,
null,
null
] | [
12,
47,
13
] | [
26,
61,
37
] | |
2024-11-18T21:33:44.186877+00:00 | 1,596,375,266,000 | 1139bbd7e95ca598590295c21542bd7b8d70b60e | 3 | {
"blob_id": "1139bbd7e95ca598590295c21542bd7b8d70b60e",
"branch_name": "refs/heads/master",
"committer_date": 1596375266000,
"content_id": "298d0673805581c8811460c272e1154df6c5f19a",
"detected_licenses": [
"MIT"
],
"directory_id": "b0658195f8c37f1c9392bc60c6bf026b2d5d6c84",
"extension": "py",
"fi... | 2.625 | stackv2 | from pathlib import Path
from click import secho
# Usually we'd use requests, but here we're making everything async
# the main async HTTP client is aiohttp, but httpx is new and shiny
# https://github.com/encode/httpx
import httpx
from .auth import telegram_bot_token, telegram_user_chat_id
# https://core.telegram.o... | 105 | 30.05 | 95 | 16 | 807 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c5390758a60be8bb_e8c14dda", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
19,
38,
57,
88
] | [
26,
46,
65,
null
] | [
19,
19,
19,
23
] | [
10,
10,
10,
58
] | |
2024-11-18T23:15:51.300845+00:00 | 1,575,478,531,000 | 8b6eed5f14453f8c2ed739c8638df8d2143da156 | 2 | {
"blob_id": "8b6eed5f14453f8c2ed739c8638df8d2143da156",
"branch_name": "refs/heads/master",
"committer_date": 1575478531000,
"content_id": "f1c716bcaa775a85cb0a2649a992de24f4f39134",
"detected_licenses": [
"MIT"
],
"directory_id": "5b0326dc1c6f8195193386bb4434b4965a518bb0",
"extension": "py",
"fi... | 2.375 | stackv2 | from os.path import join, exists
from os import mkdir
import logging
import config
from flask import Flask, request, redirect, send_file, jsonify
from plotting import plot_audio, plt_spectrogram
from noise_filter import noise_filter
from save_audio import wavwrite, process_request
app = Flask(__name__)
@app.route(... | 79 | 28.77 | 80 | 14 | 571 | python | [{"finding_id": "codeql_py/path-injection_63c2179aae7dc464_029928b6", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-117"
] | [
"py/path-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
37,
36
] | [
null,
null
] | [
22,
21
] | [
58,
48
] | |
2024-11-18T22:30:13.166574+00:00 | 1,481,935,914,000 | 28054f538c3ed6a32c60618d3ce86d07ed2b40ae | 2 | {
"blob_id": "28054f538c3ed6a32c60618d3ce86d07ed2b40ae",
"branch_name": "refs/heads/master",
"committer_date": 1481935914000,
"content_id": "da13d8f4bbb4cb5b761fc2a3048a58cd0d22b34a",
"detected_licenses": [
"MIT"
],
"directory_id": "bc65f55716200d8e2ae7889aad985e7590403f86",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/usr/bin/env python
#coding:utf-8
import sys
import urllib2
import json
def getFreeSsInfos():
url = "http://api.jiasu.im/api/apiv2.php?op=tourist"
try:
# url = "https://api.mianvpn.com/ajax.php?verify=true&mod=getfreess"
response = urllib2.urlopen(url, timeout=10)
result = json.load... | 38 | 25.03 | 76 | 13 | 256 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8e509473329add8c_2198bf1f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
38
] | [
null
] | [
11
] | [
27
] | |
2024-11-18T22:30:16.937827+00:00 | 1,564,936,391,000 | e28e6e463c98b3677853b6a1f30e961603b095a1 | 2 | {
"blob_id": "e28e6e463c98b3677853b6a1f30e961603b095a1",
"branch_name": "refs/heads/master",
"committer_date": 1564936391000,
"content_id": "74a421318fb474211fdb4f593ab6379fa42bb5cd",
"detected_licenses": [
"MIT"
],
"directory_id": "69fc4f12e4359232e17db150975997368ace174f",
"extension": "py",
"fi... | 2.4375 | stackv2 | # -*- coding: utf-8 -*-
import time
import os
import boto3
import paramiko
def lambda_handler(event, context):
statusMessage = "Wrong Password Given"
if event["serverPassword"] == os.getenv("MinePass"):
ec2 = boto3.client('ec2', region_name=os.getenv("Region"))
statusMessage = manageServer(ec2... | 143 | 37.83 | 172 | 20 | 1,253 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_c7e47c399553e051_0738b83d", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
121
] | [
null
] | [
5
] | [
68
] | |
2024-11-18T22:44:49.147143+00:00 | 1,457,308,554,000 | cf29e4b196c7e26003ef0e747f232ef5d7adb234 | 2 | {
"blob_id": "cf29e4b196c7e26003ef0e747f232ef5d7adb234",
"branch_name": "refs/heads/master",
"committer_date": 1457308554000,
"content_id": "566ff77de42832c52b0eff28652b3fcd1765a59a",
"detected_licenses": [
"MIT"
],
"directory_id": "2af31f3c3d3c8b0b62e1d213d80beb66f7c0816f",
"extension": "py",
"fi... | 2.34375 | stackv2 | """
Local "web app" for the PA unit database. See http://localhost:8080/list
"""
# Step 0: Make sure we have Bottle. If not, download it.
try:
import bottle
except ImportError:
def get_bottle():
import urllib.request
import os.path
savename = os.path.join(os.path.split(os.path.abspath(_... | 328 | 35.41 | 111 | 17 | 2,915 | python | [{"finding_id": "codeql_py/log-injection_3e51fdc4b2806aaa_8510251f", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
195,
202
] | [
196,
203
] | [
13,
17
] | [
69,
69
] | |
2024-11-18T23:36:48.031286+00:00 | 1,587,761,053,000 | 3973aea9ea0cf19c9667d8c02c7dac0ec0c348d4 | 2 | {
"blob_id": "3973aea9ea0cf19c9667d8c02c7dac0ec0c348d4",
"branch_name": "refs/heads/master",
"committer_date": 1587761053000,
"content_id": "5455ba94b1ba7ddcf4ef1faa43a91dbabaa3f3be",
"detected_licenses": [
"MIT"
],
"directory_id": "7dcc6d0eb866b3315bf729ec00dfd71db6847ce2",
"extension": "py",
"fi... | 2.421875 | stackv2 | from wiserSmartAPI.wiserSmart import wiserSmart
import logging
import json
import time
import datetime
_LOGGER = logging.getLogger(__name__)
_LOGGER.setLevel(logging.DEBUG)
# Get Wiser Parameters from keyfile
with open("wisersmart.params", "r") as f:
data = f.read().split("\n")
wiserkey = ""
wiserip = ""
# Get w... | 92 | 36.3 | 133 | 16 | 808 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6ef13294973c5641_25908f9d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
28
] | [
null
] | [
7
] | [
133
] | |
2024-11-18T23:36:53.713053+00:00 | 1,620,720,359,000 | 314fd18e1681ed3a9116e7d588cae0f390a14fcc | 3 | {
"blob_id": "314fd18e1681ed3a9116e7d588cae0f390a14fcc",
"branch_name": "refs/heads/master",
"committer_date": 1620720359000,
"content_id": "63096aa30e340bf6e4fa55ca8ea20e0117a30be0",
"detected_licenses": [
"MIT"
],
"directory_id": "17b82e7a84400ae823801c937cb5b18541e4418c",
"extension": "py",
"fi... | 2.5625 | stackv2 | from django.core.management.base import BaseCommand, CommandError
from main.models import EventAction, PositionUncertainty, PositionSource
from django.conf import settings
from main import utils
# This file is part of https://github.com/cpina/science-cruise-data-management
#
# This project was programmed in a hurry w... | 100 | 45.94 | 169 | 19 | 949 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b78c073e359d9367_dd8353fd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.",
"This expression logs [sensitive data (priva... | [
81,
86
] | [
82,
null
] | [
19,
19
] | [
134,
125
] | |
2024-11-18T23:36:56.418195+00:00 | 1,510,339,776,000 | fbbc5d94b5a25b01b4050a7624da18a26ec02b83 | 3 | {
"blob_id": "fbbc5d94b5a25b01b4050a7624da18a26ec02b83",
"branch_name": "refs/heads/master",
"committer_date": 1510339776000,
"content_id": "2fb2d8d11886ae814aeb158e8a6cff52581541e1",
"detected_licenses": [
"MIT"
],
"directory_id": "edf06b3a23260e0e115dd3a72aed218dc83048d6",
"extension": "py",
"fi... | 3 | stackv2 | import hashlib
import sys
import requests
from .base import NanoBase
if sys.version_info < (3, 0, 0):
# We're on Py2, get Py3-style super()
from builtins import super
class User(NanoBase):
"""
A NanoBase object for representing NaNoWriMo participants.
"""
# Endpoint URLs for user objects... | 126 | 23.27 | 78 | 16 | 720 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6797178bc2e5a5ee_f56dc0a3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
80
] | [
null
] | [
22
] | [
34
] | |
2024-11-18T23:36:56.709607+00:00 | 1,527,090,012,000 | 4d16a4c03b9f42f3bc6e87ccf45ba7ce137afc5f | 2 | {
"blob_id": "4d16a4c03b9f42f3bc6e87ccf45ba7ce137afc5f",
"branch_name": "refs/heads/master",
"committer_date": 1527090012000,
"content_id": "26f75445b004f56390b58a4c743e72d74fce49ae",
"detected_licenses": [
"MIT"
],
"directory_id": "10ce54aae328a14df82805faf2931cade2df558d",
"extension": "py",
"fi... | 2.484375 | stackv2 | from rest_framework import serializers
from django.contrib.auth import get_user_model
from django.contrib.auth.password_validation import validate_password
from rest_framework.exceptions import ValidationError
UserModel = get_user_model()
class UserSerializer(serializers.ModelSerializer):
def validate_password... | 35 | 29.86 | 77 | 14 | 194 | python | [{"finding_id": "codeql_py/stack-trace-exposure_41b1f184e447581e_4da7583a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
16
] | [
null
] | [
47
] | [
55
] | |
2024-11-18T21:14:04.545612+00:00 | 1,624,244,228,000 | 4f937c559887d55483d8508d9225a363ed49a8ff | 3 | {
"blob_id": "4f937c559887d55483d8508d9225a363ed49a8ff",
"branch_name": "refs/heads/master",
"committer_date": 1624244228000,
"content_id": "fa679eb5fb15c7b5948ca00bef3b01237e3346cb",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "91d42246402e3bf7057df314dc7e329f0037d7a9",
"extension": "p... | 2.765625 | stackv2 | # -*- coding: utf-8 -*-
from urllib.parse import quote, unquote, urlencode
from collections import namedtuple
from Crypto.Cipher import AES
import base64, hashlib, os
import axolotl_curve25519 as Curve25519
KeyPairCurve = namedtuple('KeyPair', ['private_key', 'public_key', 'nonce'])
AESKeyAndIV = namedtuple('AESKey', ... | 82 | 37.07 | 80 | 14 | 808 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_e092df8c340b8ffc_fa8978a0", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
33,
37
] | [
null,
null
] | [
16,
16
] | [
39,
43
] | |
2024-11-18T21:14:13.871618+00:00 | 1,410,571,700,000 | f553057ebda2bc6931ca0ff318d00cd21716903a | 3 | {
"blob_id": "f553057ebda2bc6931ca0ff318d00cd21716903a",
"branch_name": "refs/heads/master",
"committer_date": 1410571700000,
"content_id": "cfafcd4a9833a91f9e3a8990d0fa6b5f63bea8c3",
"detected_licenses": [
"MIT"
],
"directory_id": "a869093fd9d379865b890b07f70de16c4c57550f",
"extension": "py",
"fi... | 2.90625 | stackv2 | import string
import base64
from Crypto.Cipher import AES
def b64ToByteString(b64):
return base64.b64decode(b64)
def hexStringToByteArray(hexString):
return stringToByteArray(hexString, 2, lambda x: int(x, 16))
def stringToByteArray(s, byteSize=1, convert=lambda x: ord(x)):
for i in xrange(0, len(s), byteSize):... | 91 | 24.69 | 83 | 13 | 728 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_430f8259ade1828d_3f2b6ba1", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
26,
33
] | [
null,
null
] | [
14,
16
] | [
45,
42
] | |
2024-11-18T21:57:29.624618+00:00 | 1,555,243,050,000 | a5ed143b1099ccb05199bdcbb2d6112c9c0359cf | 3 | {
"blob_id": "a5ed143b1099ccb05199bdcbb2d6112c9c0359cf",
"branch_name": "refs/heads/master",
"committer_date": 1555243127000,
"content_id": "a0444b955042397bdf8bb469d59b5053a6a77cfe",
"detected_licenses": [
"MIT"
],
"directory_id": "df6e5b1cff3ad134b5a1f1dbb0e295186818bc2f",
"extension": "py",
"fi... | 2.53125 | stackv2 | import logging
from flask import request
from flask_restful import Resource, marshal_with
from core.interface import recordingDeviceFields
from ..common.accelerometer import RecordingDeviceStatus
logger = logging.getLogger('recorder.recordingDevices')
class RecordingDevices(Resource):
def __init__(self, **kwar... | 122 | 34.25 | 100 | 18 | 873 | python | [{"finding_id": "codeql_py/log-injection_474d5c25804d9bee_2068138b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1)... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-pr... | [
89,
104
] | [
null,
null
] | [
38,
38
] | [
79,
88
] | |
2024-11-18T21:57:33.169137+00:00 | 1,608,586,509,000 | c044c3089b46932ae712ef5e3303c723d2186db7 | 3 | {
"blob_id": "c044c3089b46932ae712ef5e3303c723d2186db7",
"branch_name": "refs/heads/master",
"committer_date": 1608586509000,
"content_id": "dc76ab320bf744bd2e7e68e0fabf7c29de438960",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c98f0c21bbc19784a513a1efededba0172bd8baa",
"extension": "py"... | 2.5625 | stackv2 | from flask import Flask,render_template
import socket
import string
import uuid
from datetime import datetime
TIMERS = {}
STASH = {}
app = Flask(__name__)
@app.route('/startNamedTimer/<name>')
def start_timer_by_name(name):
now = datetime.now()
thisTime = now.strftime("%d/%m/%Y %H:%M:%S")
TIMERS[name] = t... | 73 | 23.34 | 76 | 12 | 483 | python | [{"finding_id": "codeql_py/reflective-xss_d24e2aaee8cfa72b_07d94d3b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
16,
55
] | [
null,
null
] | [
12,
12
] | [
29,
35
] | |
2024-11-18T21:57:34.054896+00:00 | 1,599,615,648,000 | 2ff5447bf29b965ef3cb4154e7e5aadd3bcd7a07 | 4 | {
"blob_id": "2ff5447bf29b965ef3cb4154e7e5aadd3bcd7a07",
"branch_name": "refs/heads/master",
"committer_date": 1599615648000,
"content_id": "3706e62bcb632da3399dd7e2fcedc0d5c4c8654c",
"detected_licenses": [
"MIT"
],
"directory_id": "e053e251d44a6d25297b807fbc64d0a0bfdc3eff",
"extension": "py",
"fi... | 4.03125 | stackv2 |
import requests
from bs4 import BeautifulSoup
from verify import verify_university, verify_year
def write_file(information, university, year):
"""""""""""""""""""""""""""""""""""""""""""""""""""""""""
Writes information to a text file. Title contains the
university's name and the year (both are ... | 118 | 39.08 | 104 | 12 | 1,144 | python | [{"finding_id": "codeql_py/request-without-cert-validation_3002e2dd01237407_607a1d81", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
39,
72
] | [
null,
null
] | [
12,
12
] | [
87,
105
] | |
2024-11-18T21:57:57.005799+00:00 | 1,623,418,213,000 | 545b9c954012424f0dae69a2cca1cb93d86756af | 3 | {
"blob_id": "545b9c954012424f0dae69a2cca1cb93d86756af",
"branch_name": "refs/heads/master",
"committer_date": 1623418213000,
"content_id": "174ca53933ed1b15e5fc3b76eead4cd5f8c39b22",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "dbd3f562768ded628d5d8d7ee3e05a3e88970a8d",
"extension": "py"... | 3.046875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import sys
import imp
imp.reload(sys)
sys.setdefaultencoding('utf8')
import base64
# print None
# i=None
# print i is None
# from addict import Dict
# body = Dict()
# body.query.filtered.query.match.description = 'addictive'
# body.query.filtered.filter.term.created_by ... | 126 | 18.62 | 64 | 12 | 969 | python | [{"finding_id": "codeql_py/weak-crypto-key_c1a0950ed70ba8fe_e9717862", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
34
] | [
null
] | [
21
] | [
38
] | |
2024-11-18T21:58:01.513428+00:00 | 1,609,929,087,000 | a4814f90461a3aa20c7cebd6514ce2d0a8bb9cfc | 3 | {
"blob_id": "a4814f90461a3aa20c7cebd6514ce2d0a8bb9cfc",
"branch_name": "refs/heads/master",
"committer_date": 1609929087000,
"content_id": "fad2c809c3450050fbacdf6dcb37b5058bcf1726",
"detected_licenses": [
"MIT"
],
"directory_id": "f3646538e70fa52e55ebfcb85d9bf5e131cb158d",
"extension": "py",
"fi... | 3.03125 | stackv2 | import base64
from Crypto.Cipher import AES
def get_keystream(key, nonce):
#https: // en.wikipedia.org / wiki / Block_cipher_mode_of_operation # Counter_(CTR)
# we can use a block cipher to make a keystream
# we will use library ECB (note that we xor our keystream with the message
# so we don't have t... | 23 | 45.61 | 114 | 16 | 342 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_7caa66aac696f231_73f75dfb", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
11
] | [
null
] | [
20
] | [
106
] | |
2024-11-18T21:58:35.449559+00:00 | 1,632,073,234,000 | 7e5e3a10f681080dc82afd3c3306e8cace253acb | 2 | {
"blob_id": "7e5e3a10f681080dc82afd3c3306e8cace253acb",
"branch_name": "refs/heads/main",
"committer_date": 1632073234000,
"content_id": "b57c14210d3025b0a92ea658b1a302e7383877b6",
"detected_licenses": [
"MIT"
],
"directory_id": "b44c5bd2393e9ec049878a50284bf1da97f66f58",
"extension": "py",
"file... | 2.328125 | stackv2 | this_file = "venv/bin/activate_this.py"
exec(open(this_file).read(), {"__file__": this_file})
from flask import Flask, render_template, send_file
application = Flask(__name__)
# Config options - Make sure you created a 'config.py' file.
# application.config.from_object('config')
# To get one variable, tape app... | 50 | 15.44 | 60 | 10 | 197 | python | [{"finding_id": "codeql_py/path-injection_08857d3b5d72dcbd_ddf5ff81", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).\nThis pa... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).\nThis path depends on a [user-provided value](3)."
] | [
26
] | [
null
] | [
22
] | [
30
] | |
2024-11-18T21:58:46.859953+00:00 | 1,581,307,551,000 | 000d3273efae934946ccde0742760527200ca99e | 3 | {
"blob_id": "000d3273efae934946ccde0742760527200ca99e",
"branch_name": "refs/heads/master",
"committer_date": 1581307551000,
"content_id": "c472b3e77af102f77f196409f05334478cd3114f",
"detected_licenses": [
"MIT"
],
"directory_id": "c54b3219943772e045f3073a8277323b4bd4b102",
"extension": "py",
"fi... | 2.59375 | stackv2 | ### Conda environment
### pip install pymongo
### pip install dnspython
# import pymongo
# connnection_uri = pymongo.MongoClient("mongodb+srv://user456:<password>@cluster0-k9md8.mongodb.net/test?retryWrites=true&w=majority")
# print("URI:", connection_url)
# client = pymongo.MongoClient(connection_uri)
# print("CLI... | 56 | 24.36 | 135 | 10 | 350 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f08e80903e7f4931_37e1446c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
30
] | [
null
] | [
15
] | [
29
] | |
2024-11-18T23:11:02.049180+00:00 | 1,551,715,447,000 | 5ec62c5a01528d495262a31f2d3ef36daeca88ef | 3 | {
"blob_id": "5ec62c5a01528d495262a31f2d3ef36daeca88ef",
"branch_name": "refs/heads/master",
"committer_date": 1551715447000,
"content_id": "1605117500756d40bf8be9ecb7e7a0b50a383d25",
"detected_licenses": [
"MIT"
],
"directory_id": "a638bcf3c21ad47120e9eb5d772873063c801612",
"extension": "py",
"fi... | 2.78125 | stackv2 | '''
Made By Sai Harsha Kottapalli
Tested on python3
About : SSH Reverse Command for Windows
Use with: server.py
Note : roles of client and server are reversed (i.e.)server send command to client , for ssh server (Windows)
'''
import sys
import paramiko
import subprocess
import argparse
from threading import ... | 55 | 28.53 | 112 | 16 | 414 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_cec173ebbfa37eeb_a63a2dcd", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
21
] | [
null
] | [
2
] | [
62
] | |
2024-11-18T22:05:55.186236+00:00 | 1,529,949,475,000 | e23babedc3e8e10a3cfc88c1374935973594df8b | 3 | {
"blob_id": "e23babedc3e8e10a3cfc88c1374935973594df8b",
"branch_name": "refs/heads/master",
"committer_date": 1529949475000,
"content_id": "59b76752c48e921a66da62099c21e1819154f8cc",
"detected_licenses": [
"MIT"
],
"directory_id": "da658aa89257459e712119d704615eb3b59dddac",
"extension": "py",
"fi... | 2.546875 | stackv2 | import discord
from discord.ext import commands
from .utils.dataIO import dataIO, fileIO
import os
import asyncio
import re
import urllib.parse as urlparse
import requests
import json
creditIcon = "https://i.imgur.com/TP8GXZb.png"
credits = "Bot by GR8 | Titan"
class friendlink:
"""friendlink!"""
def __init_... | 84 | 33.9 | 143 | 19 | 721 | python | [{"finding_id": "codeql_py/overly-large-range_bd5db916ec327552_47950ab3", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
27
] | [
null
] | [
57
] | [
60
] | |
2024-11-18T22:05:57.310977+00:00 | 1,440,772,866,000 | f5a1bead35d7052c0b7f05ad75ad36f32eb495da | 3 | {
"blob_id": "f5a1bead35d7052c0b7f05ad75ad36f32eb495da",
"branch_name": "refs/heads/master",
"committer_date": 1440772866000,
"content_id": "e5e017aae34e7f980e09724cf9fe07b0e5a82e0a",
"detected_licenses": [
"MIT"
],
"directory_id": "e555c8f71c3e587269a00166a9bb98c114446cce",
"extension": "py",
"fi... | 2.578125 | stackv2 | """Jinja2-Git Template Loader"""
from subprocess import check_output, CalledProcessError
import os
import json
from mimetypes import guess_type
import jinja2
from flask import request, current_app, g
def git_show(base,revid):
"""Git show the base/revid."""
if revid.startswith('@'):
revid = revid[1:... | 52 | 32.88 | 80 | 19 | 421 | python | [{"finding_id": "codeql_py/command-line-injection_4621ef5219447287_ead22cfc", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 1 | true | [
"CWE-078"
] | [
"py/command-line-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1)."
] | [
18
] | [
null
] | [
30
] | [
63
] | |
2024-11-18T22:35:54.146849+00:00 | 1,604,021,412,000 | 5e27a98646a5437724bac97d30d24205d997e479 | 4 | {
"blob_id": "5e27a98646a5437724bac97d30d24205d997e479",
"branch_name": "refs/heads/master",
"committer_date": 1604021412000,
"content_id": "04343f20d58bef5c22024525f92d1254050e33b0",
"detected_licenses": [
"MIT"
],
"directory_id": "47ce3e81bd3825cc02bdb7a94355509465a5d4a6",
"extension": "py",
"fi... | 4.15625 | stackv2 | from random import randint
"""
Proceso:
- Se fija un numero primo p largo (600 digitos o 2000 bits)
- Se fija un entero g que esta entre {1, ...., p}
- Alice elige aleatoriamente un numero a entre {1, ...., p-1}
- Alice calcula A = g^a (mod p) y se lo envia a Bob
- Bob calcula B = g^b (mod p) y se lo envia a Alice
- *... | 50 | 28.56 | 148 | 9 | 513 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_80be6479cc863abc_8f0ec691", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
48,
50
] | [
null,
null
] | [
7,
7
] | [
49,
45
] | |
2024-11-18T23:25:54.337962+00:00 | 1,623,746,839,000 | ce429a5e940924a97d22174757ac2359e1e0a2eb | 2 | {
"blob_id": "ce429a5e940924a97d22174757ac2359e1e0a2eb",
"branch_name": "refs/heads/main",
"committer_date": 1623746839000,
"content_id": "5cfd2cca9839bd5c44d32086e6e822c09b915aa2",
"detected_licenses": [
"MIT"
],
"directory_id": "92586a963688bd07d52be28ce530ba62dfc8268f",
"extension": "py",
"file... | 2.40625 | stackv2 | import logging
import time
from flask import Flask, request
from flask.logging import create_logger
from prometheus_flask_exporter import PrometheusMetrics
from . import __version__
app = Flask(__name__)
# Logger Setup
LOGGER = create_logger(app)
LOGGER.setLevel(logging.INFO)
# Metrics set-up
metrics = PrometheusMe... | 66 | 30.24 | 100 | 10 | 502 | python | [{"finding_id": "codeql_py/reflective-xss_0cfedaed7f9ebae1_23ac7aad", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
31
] | [
null
] | [
12
] | [
54
] | |
2024-11-18T22:27:36.631586+00:00 | 1,602,411,033,000 | af5b826a03478bdc6b9adef8f9bc3d47581a0168 | 3 | {
"blob_id": "af5b826a03478bdc6b9adef8f9bc3d47581a0168",
"branch_name": "refs/heads/main",
"committer_date": 1602411033000,
"content_id": "4aba4e7c4a73b568ddae28009bb7c3a73417b8ba",
"detected_licenses": [
"MIT"
],
"directory_id": "6d6e8f4ccc15573dc5e908bc38c022e98f0d517f",
"extension": "py",
"file... | 2.578125 | stackv2 | import datetime
import re
import os
import requests
from config.headers import *
from config.cookies_config import cookie_list
import json
import threading
from queue import Queue
from threading import Lock
page_infos = Queue(maxsize=65535)
image_infos = Queue(maxsize=65535)
THREAD_NUM = 32
save_picture_path = "D:\Scr... | 119 | 30.95 | 148 | 16 | 961 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_71bd71e22e0ede91_167b5cd5", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'pximg.net/img-master/img/', so it m... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'pximg.net/img-master/img/', so it might match more hosts than expected."
] | [
61
] | [
null
] | [
44
] | [
123
] | |
2024-11-18T22:39:32.457008+00:00 | 1,574,731,459,000 | 8912e3737aaca29d496a70f17a9ca347f36e9a3e | 3 | {
"blob_id": "8912e3737aaca29d496a70f17a9ca347f36e9a3e",
"branch_name": "refs/heads/master",
"committer_date": 1574731459000,
"content_id": "bb4d6ccfc1b723ca9994f577ffc66e95ac58fb24",
"detected_licenses": [
"MIT"
],
"directory_id": "35e18508aa26a58a0940ab185dd366ebd7ae30d8",
"extension": "py",
"fi... | 2.796875 | stackv2 | #!/usr/bin/python
"""format_symphony_user.py
Text manipulation tool to take a properly formatted CSV containing user data
and convert to SirsiDynix Symphony supported ASCII LDUSER format. To be used to
create and update users with a load users report.
Option to upload resulting text file to SFTP server with '--sftp/-... | 269 | 33.01 | 113 | 18 | 2,153 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b0f61962887867b6_f79c386b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive d... | [
68,
73
] | [
null,
null
] | [
20,
24
] | [
37,
56
] | |
2024-11-18T22:15:02.946349+00:00 | 1,612,905,303,000 | 7ff0c5f9b63449fab1cc48258cfff9e03b76c94f | 3 | {
"blob_id": "7ff0c5f9b63449fab1cc48258cfff9e03b76c94f",
"branch_name": "refs/heads/master",
"committer_date": 1612905303000,
"content_id": "3c66c6332f82b5832bb10f8d60efbebd702e186f",
"detected_licenses": [
"MIT"
],
"directory_id": "c74b746b86394754a69a9f4fe1c0d2a25120cd5f",
"extension": "py",
"fi... | 3.484375 | stackv2 | import csv
def parseCSV(file_name):
myList = []
with open(file_name, 'r') as file_o_data:
#csv_data = csv.reader(file_o_data)#gives an iterable
for row in csv.reader(file_o_data):
myList.append(row)
print(myList)
return myList
processed_data = {'M':[],
... | 153 | 34.46 | 161 | 21 | 1,267 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8594a9a01520f3cf_bd552696", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
129
] | [
null
] | [
11
] | [
93
] | |
2024-11-18T23:32:13.744707+00:00 | 1,545,045,071,000 | 547c772a18c95f6dfba2ab3c2c734494aa678450 | 2 | {
"blob_id": "547c772a18c95f6dfba2ab3c2c734494aa678450",
"branch_name": "refs/heads/master",
"committer_date": 1545045071000,
"content_id": "88941c41132afafba7785e30edce52ab764406ad",
"detected_licenses": [
"MIT"
],
"directory_id": "8b35ad0fecd554dd00ca8c45ed081732547f8869",
"extension": "py",
"fi... | 2.46875 | stackv2 | ##### Huawei 4G Model reboot script using web API
##### Tested on model B310s-927
##### See resource.txt for links and API details
##### Use your own username, password and IP (baseurl variable) !!!
#!/usr/bin/env python
from __future__ import unicode_literals
import requests
import re
import hashlib
import base64... | 66 | 36.42 | 176 | 15 | 686 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_9a0a2aa29db9d3a7_49fa52c7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
47
] | [
null
] | [
18
] | [
38
] | |
2024-11-18T22:43:31.915670+00:00 | 1,484,193,463,000 | fa603eaca320567c5e027aa093565627f561f10f | 3 | {
"blob_id": "fa603eaca320567c5e027aa093565627f561f10f",
"branch_name": "refs/heads/master",
"committer_date": 1484193463000,
"content_id": "bd039e8583dfe537759815ed3e3e9df1ac7b19e7",
"detected_licenses": [
"MIT"
],
"directory_id": "72c1b263db070ce507221b07ec2670536d3202df",
"extension": "py",
"fi... | 2.515625 | stackv2 | #! /usr/bin/env python
# ! coding=utf-8
# ! author kbdancer @92ez.com
import threading
import requests
import sqlite3
import Queue
import json
import sys
import re
reload(sys)
sys.setdefaultencoding('utf8')
W = '\033[0m' # white (normal)
R = '\033[31m' # red
G = '\033[32m' # green
def bThread(urllist):
thr... | 170 | 27.42 | 144 | 20 | 1,348 | python | [{"finding_id": "codeql_py/request-without-cert-validation_2ffaa0b4724fb90d_1ac059d2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
57,
88
] | [
null,
null
] | [
15,
18
] | [
79,
82
] | |
2024-11-18T23:18:13.792009+00:00 | 1,613,468,442,000 | a717f12ac8517d0ce3b80cfec3f0cbc319f2a77d | 3 | {
"blob_id": "a717f12ac8517d0ce3b80cfec3f0cbc319f2a77d",
"branch_name": "refs/heads/main",
"committer_date": 1613468442000,
"content_id": "09199bd8817637a92d14baa5a2c25025cc019343",
"detected_licenses": [
"MIT"
],
"directory_id": "81218ada21ab18f4757e14fd6492fa80ba2d2deb",
"extension": "py",
"file... | 3.078125 | stackv2 | import re
# res = ["i love hackerrank","hackerrank is an awesome place for programmers","hackerrank","i think hackerrank is a great place to hangout"]
size = int(input())
for _ in range(size):
st = input()
# st = res[_]
# st = "hackerrank"
if re.search(r'^(hackerrank)(.*hackerrank)?$', st) :
... | 21 | 22.71 | 140 | 11 | 154 | python | [{"finding_id": "codeql_py/redos_400fa792fa1be7c9_e364127f", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of ' '.", "remediati... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of ' '."
] | [
15
] | [
null
] | [
22
] | [
29
] | |
2024-11-18T23:18:14.107387+00:00 | 1,571,142,221,000 | db302bb9dc5313f47e4bfe67e159e713b3bddd96 | 3 | {
"blob_id": "db302bb9dc5313f47e4bfe67e159e713b3bddd96",
"branch_name": "refs/heads/master",
"committer_date": 1571142221000,
"content_id": "e5d4306971d4bb8acdc7686a9996dda9e68c1b0b",
"detected_licenses": [
"MIT"
],
"directory_id": "93dd2dea86b0efb05ae60d2c8fae9a221f4d1de8",
"extension": "py",
"fi... | 3.109375 | stackv2 | import random
import re
import uuid
# a regular expression for validating an Email
regex = '^\w+([\.-]?\w+)*@\w+([\.-]?\w+)*(\.\w{2,3})+$'
class UtilityFunctions:
@staticmethod
def is_email_valid(email):
if re.search(regex, email):
return True
else:
return False
... | 28 | 20.25 | 55 | 12 | 145 | python | [{"finding_id": "codeql_py/redos_3749eb3d1c443cd0_ac452259", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetition... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetitions of 'a'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'a@a' and containing many repetitions of 'a'."
] | [
6,
6
] | [
null,
null
] | [
21,
37
] | [
24,
40
] | |
2024-11-18T23:18:23.532665+00:00 | 1,591,296,913,000 | 126e9d0c87065a5aec896032ae616f381e01745a | 3 | {
"blob_id": "126e9d0c87065a5aec896032ae616f381e01745a",
"branch_name": "refs/heads/master",
"committer_date": 1591296913000,
"content_id": "29758937dc2e05461496a68376cd1463989b19b9",
"detected_licenses": [
"MIT"
],
"directory_id": "e03a152da29009949e9babecb10c6f214702f672",
"extension": "py",
"fi... | 2.609375 | stackv2 | import rest_methods
import json
## NOTES TO AARON & NEIL ##
### 11/1/17 - Setup script to handle pagination from AMP
### 11/1/17 - Modify scripts to use the stream API for events in AMP
# ******* SETUP SECTION ***********
##Import variables to get configuration
config = json.loads(open("parameters.json").read()... | 211 | 41.26 | 152 | 16 | 2,305 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e870e29f565aa438_eaa6d53f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text."
] | [
67,
155,
42,
89
] | [
null,
null,
null,
null
] | [
12,
12,
12,
12
] | [
60,
60,
60,
60
] | |
2024-11-19T00:07:08.215078+00:00 | 1,623,672,152,000 | f14d0948aef146b96556620b227665f1ae17903d | 3 | {
"blob_id": "f14d0948aef146b96556620b227665f1ae17903d",
"branch_name": "refs/heads/main",
"committer_date": 1623672152000,
"content_id": "e553df7c1555b0038789146d903813c6db08682d",
"detected_licenses": [
"MIT"
],
"directory_id": "f5ef41bfbeecbd5b7a4e1c26de6e8c0bc3e66403",
"extension": "py",
"file... | 2.828125 | stackv2 | import os
import pandas as pd
import geopandas as gpd
import itertools
from shapely.geometry import Point, Polygon, MultiPolygon, box
import numpy as np
from sklearn.neighbors import BallTree
import requests
import boto3
import botocore
from datetime import datetime
class SpatialIndex:
def __init__(self, fname=N... | 236 | 38.86 | 81 | 19 | 2,193 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b4328fcafb4f3b68_d445b777", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
176
] | [
null
] | [
16
] | [
67
] | |
2024-11-19T00:07:31.365697+00:00 | 1,519,995,073,000 | 0c5f07760c9433ab342b9c1c9b8ba93c7cd7422d | 2 | {
"blob_id": "0c5f07760c9433ab342b9c1c9b8ba93c7cd7422d",
"branch_name": "refs/heads/master",
"committer_date": 1519995073000,
"content_id": "677f2a311aa245e2f16f4d76d328f198be6eeaeb",
"detected_licenses": [
"MIT"
],
"directory_id": "441bad916a7f2059feaf38b36d8d78a868dc2fb3",
"extension": "py",
"fi... | 2.359375 | stackv2 | import base64
from Crypto.Cipher import DES3
import hashlib
from pyrave.base import BaseRaveAPI
class RaveEncryption(BaseRaveAPI):
"""
Base Encryption Class
Encrypts User Details and returns pubkey, client and algo
"""
def __init__(self):
super(RaveEncryption, self).__init__()
def enc... | 72 | 37.93 | 141 | 15 | 646 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_145c5268c2399306_530ced8e", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptograph... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES3](2) is broken or weak, and should not be used."
] | [
66
] | [
null
] | [
33
] | [
59
] | |
2024-11-19T00:34:33.730185+00:00 | 1,403,561,095,000 | a8d1d1fecb71d4804051f780171a9a699851bb2c | 3 | {
"blob_id": "a8d1d1fecb71d4804051f780171a9a699851bb2c",
"branch_name": "refs/heads/master",
"committer_date": 1403561095000,
"content_id": "f9d261fa7820e970f7e231b3dead0eab0ee482a7",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "96833e806ad9df91c5b4c9dbabd9ca659ff76da2",
"extension": "p... | 2.609375 | stackv2 | #!/usr/bin/python
import cgi, os
import cgitb; cgitb.enable()
#import msvcrt
#msvcrt.setmode (0, os.O_BINARY) #stdin = 0
#msvcrt.setmode (1, os.O_BINARY) #stdout = 1
form = cgi.FieldStorage()
def fbuffer(f, chunk_size=10000):
while True:
chunk = f.read(chunk_size)
if not chunk: brea... | 53 | 22.96 | 91 | 12 | 353 | python | [{"finding_id": "codeql_py/path-injection_cd08fa92950cad6d_a30ca8f1", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
30
] | [
null
] | [
13
] | [
20
] | |
2024-11-19T00:45:04.681523+00:00 | 1,578,089,073,000 | 4dd34ef09032f4dcaa1006cfa5a13b5aeafa2827 | 2 | {
"blob_id": "4dd34ef09032f4dcaa1006cfa5a13b5aeafa2827",
"branch_name": "refs/heads/master",
"committer_date": 1578089073000,
"content_id": "47c03758f79a0436a275ace517552c1399f977e4",
"detected_licenses": [
"MIT"
],
"directory_id": "d44fc964585cea065bd29186df0e3bf4743c9180",
"extension": "py",
"fi... | 2.3125 | stackv2 | from rest_framework import status, permissions
from rest_framework.response import Response
from rest_framework.views import APIView
from authentication.serializers import UserChangePasswordSerializer
import utils
import logging
logger = logging.getLogger('authentication')
class ChangePassword(APIView):
http_me... | 46 | 34.78 | 129 | 17 | 315 | python | [{"finding_id": "codeql_py/log-injection_c475d482b445aaf0_577bc7d8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
33,
41
] | [
null,
null
] | [
29,
25
] | [
129,
120
] | |
2024-11-18T23:28:37.090769+00:00 | 1,578,993,876,000 | 98b549da077361477e1af0e82e5c45ac7b60f086 | 3 | {
"blob_id": "98b549da077361477e1af0e82e5c45ac7b60f086",
"branch_name": "refs/heads/master",
"committer_date": 1578993876000,
"content_id": "d6b00c55ffe4f538c41a531170f038a5ceb73f5a",
"detected_licenses": [
"MIT"
],
"directory_id": "5957f746da591dbb4e9adb3d29a7d957b5078faa",
"extension": "py",
"fi... | 2.90625 | stackv2 | import matplotlib
import matplotlib.pyplot as plt
import json
import jinja2
import os
def _get_node_names(df):
'''
:param df: pandas DataFrame, each column represents a state
:return:
dictionary of (column name, column unique value list)
which means (state name, unique values in t... | 227 | 35.48 | 102 | 21 | 1,857 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b315e317aee504d9_697e6ee7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
207
] | [
null
] | [
16
] | [
37
] | |
2024-11-19T00:31:56.352380+00:00 | 1,615,502,103,000 | 252686f384e7835c9d998e21e72c3d1d5b74c8b3 | 4 | {
"blob_id": "252686f384e7835c9d998e21e72c3d1d5b74c8b3",
"branch_name": "refs/heads/main",
"committer_date": 1615502103000,
"content_id": "b98bf3a7979967b5c46233d958b1eef878a84306",
"detected_licenses": [
"Unlicense"
],
"directory_id": "45dbeb0ac279b80606530f6a74eab0f7ab982c79",
"extension": "py",
... | 3.78125 | stackv2 | import time
import pandas as pd
import numpy as np
CITY_DATA = { 'chicago': 'chicago.csv',
'new york city': 'new_york_city.csv',
'washington': 'washington.csv' }
def get_filters():
"""
Asks user to specify a city, month, and day to analyze.
Returns:
(str) city - name o... | 315 | 27.07 | 120 | 18 | 2,311 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8dcf6c559d6c4977_964ac932", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
245
] | [
null
] | [
12
] | [
25
] | |
2024-11-19T01:11:19.637726+00:00 | 1,603,456,715,000 | d46d902e449453b1fd0e0077c0925ed856471f4d | 2 | {
"blob_id": "d46d902e449453b1fd0e0077c0925ed856471f4d",
"branch_name": "refs/heads/master",
"committer_date": 1603456715000,
"content_id": "01504f5b8692fb35d310b75de4402065ec637cab",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ab1dfc351cfb3928674f8ed9d938f1b131f74838",
"extension": "py"... | 2.5 | stackv2 | '''
@Author: hua
@Date: 2019-02-10 09:55:10
@description: 工具类,封装一些通用方法
@LastEditors : hua
@LastEditTime : 2020-01-21 15:37:52
'''
from app import CONST
from Cryptodome.PublicKey import RSA
from Cryptodome.Cipher import PKCS1_v1_5
from app.env import ALLOWED_EXTENSIONS
from app.Lang.zh_CN.validation import validation... | 240 | 28.36 | 127 | 18 | 1,777 | python | [{"finding_id": "codeql_py/weak-crypto-key_9031c9d938d1cf46_ebecfd95", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
188
] | [
null
] | [
15
] | [
33
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.