added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T23:48:05.565077+00:00 | 1,693,248,254,000 | 21e4b9d3e3e18e25dcd5897b529ff3c1de209ee5 | 3 | {
"blob_id": "21e4b9d3e3e18e25dcd5897b529ff3c1de209ee5",
"branch_name": "refs/heads/master",
"committer_date": 1693248254000,
"content_id": "697b1e7f598a52389950d5d276757942bbd537c5",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "f3771fad41d24b8ec23d3f294f7e9603b1072a19",
"extension": "py",
... | 2.734375 | stackv2 | import time
import xml.etree.ElementTree as ET
import urllib.request
import urllib.error
import requests
from bs4 import BeautifulSoup
from config import GOODREADS_PUBLIC_API_KEY, GOOGLE_SEARCH_RAPIDAPI_HOST, GOOGLE_SEARCH_RAPIDAPI_KEY, GOOGLE_BOOK_API_KEY
from googlesearch import search
def get_details(book_object... | 107 | 35.01 | 143 | 20 | 831 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_94695bbc145b7855_7f2e6f5c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
18
] | [
null
] | [
11
] | [
14
] | |
2024-11-18T23:48:10.498016+00:00 | 1,626,098,056,000 | faaf0a081618cb2a86e260506c17bab82f3853ac | 3 | {
"blob_id": "faaf0a081618cb2a86e260506c17bab82f3853ac",
"branch_name": "refs/heads/main",
"committer_date": 1626098056000,
"content_id": "b92213c694b27641f401eba020cc2976b704d36c",
"detected_licenses": [
"MIT"
],
"directory_id": "364359b295af2831c0c80e66adc01b78166a2a1e",
"extension": "py",
"file... | 2.6875 | stackv2 | from transformers import AutoModelWithLMHead, AutoTokenizer, top_k_top_p_filtering
import torch
from flask import Flask, request, Response, jsonify
from torch.nn import functional as F
from queue import Queue, Empty
import time
import threading
# Server & Handling Setting
app = Flask(__name__)
requests_queue = Queue(... | 141 | 28.99 | 121 | 20 | 966 | python | [{"finding_id": "codeql_py/reflective-xss_3b53d1fd199cf03d_7164e516", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](1)."
] | [
130
] | [
null
] | [
12
] | [
25
] | |
2024-11-18T23:48:13.040895+00:00 | 1,608,738,265,000 | 14b100846a940d03bc9ba8092a27f852e9b4a540 | 4 | {
"blob_id": "14b100846a940d03bc9ba8092a27f852e9b4a540",
"branch_name": "refs/heads/master",
"committer_date": 1608738265000,
"content_id": "75d6b47bf142594ae82e0c5bfbb42ee974359a31",
"detected_licenses": [
"MIT"
],
"directory_id": "f923ca6d49a7f4a8816e5988879f672b06d06154",
"extension": "py",
"fi... | 4.09375 | stackv2 | # Python Object Oriented Programming
class Employee:
def __init__(self, FirstName, LastName, salary):
self.FirstName = FirstName
self.LastName = LastName
self.salary = salary
self.email = FirstName + "." + LastName + "@company.com"
def FullName(self):
return "{} {}".fo... | 24 | 25.25 | 64 | 12 | 150 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ef5cd8ba32b781e3_6bdd2178", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
20
] | [
null
] | [
7
] | [
35
] | |
2024-11-18T23:48:20.633853+00:00 | 1,655,866,467,000 | 6a619e52d84144b915531ced4dc4ceb2020e23b5 | 2 | {
"blob_id": "6a619e52d84144b915531ced4dc4ceb2020e23b5",
"branch_name": "refs/heads/master",
"committer_date": 1655866467000,
"content_id": "2df154e97e77446fb37aba8b165a7df3771dbc8e",
"detected_licenses": [
"MIT"
],
"directory_id": "9047326c551085d9a229e8fa506f111075f3add6",
"extension": "py",
"fi... | 2.484375 | stackv2 | from flask import Flask, render_template, request, url_for, redirect
from flask_uploads import UploadSet, configure_uploads, IMAGES, DATA, ALL
from werkzeug import secure_filename
import pandas as pd
import pygal
import io
import os
app = Flask(__name__)
# Configuraรงรตes para o Upload de Arquivos
files = UploadSet('... | 91 | 31.31 | 76 | 17 | 755 | python | [{"finding_id": "codeql_py/flask-debug_33c31eb750650e2e_6da2b82c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-601",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
91,
38,
41
] | [
null,
null,
null
] | [
5,
29,
29
] | [
24,
40,
40
] | |
2024-11-19T00:44:08.817591+00:00 | 1,560,247,046,000 | 5ac17a1f21ec40fdbf31054f8095336357d738de | 3 | {
"blob_id": "5ac17a1f21ec40fdbf31054f8095336357d738de",
"branch_name": "refs/heads/master",
"committer_date": 1560247046000,
"content_id": "8bdbcf2348d1a9b94712310589e0684cf9ac6502",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "453f0336b46646ba1c5dd01ee8554727bdd2994b",
"extension": "p... | 3.1875 | stackv2 | """Jinja Simple CLI Main Module
In this module we find all the functions needed
to operate this package.
It is important to remark that this package, doesn't
improves on jinja's functionality, it just allows you to
call for template "filling" using jinja as it's backbone
from the command line.
"""
import argparse
i... | 91 | 30 | 92 | 16 | 635 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_cb6f1e7901d71223_7b170818", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
36
] | [
40
] | [
11
] | [
6
] | |
2024-11-19T00:44:12.797187+00:00 | 1,580,258,495,000 | 733742a679ec1c2a58a44c5e60a17c8f959cccac | 3 | {
"blob_id": "733742a679ec1c2a58a44c5e60a17c8f959cccac",
"branch_name": "refs/heads/master",
"committer_date": 1580258495000,
"content_id": "d2895517b0fb5221a10977bc619faab197984301",
"detected_licenses": [
"MIT"
],
"directory_id": "d0e586cb379ea0c070a66d0173b8156037b9a53f",
"extension": "py",
"fi... | 2.765625 | stackv2 | #!/usr/bin/env python3
from json import loads, dumps
from sys import exit, argv
import requests
if len(argv) < 3:
print('Arguments: <rpc_username> <rpc_password> [<rpc_port>]')
exit(1)
### START FROM ELECTRUM
def bits_to_target(bits):
bitsN = (bits >> 24) & 0xff
if not (0x03 <= bitsN <= 0x1e):
... | 143 | 30.57 | 134 | 15 | 1,280 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_bfbb6381c6128eac_9b3763f0", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
143
] | [
null
] | [
13
] | [
64
] | |
2024-11-19T00:44:13.160057+00:00 | 1,624,371,415,000 | 54faade79fdcca3c4ceccb41f6fca27d95c953b5 | 3 | {
"blob_id": "54faade79fdcca3c4ceccb41f6fca27d95c953b5",
"branch_name": "refs/heads/master",
"committer_date": 1624371415000,
"content_id": "2de7870b8ddd1417f8dfbf9bf54c5ade7e4b74aa",
"detected_licenses": [
"MIT"
],
"directory_id": "9ddc60141027d5106952c00bb6e0c494c9abac2d",
"extension": "py",
"fi... | 2.609375 | stackv2 | from app import app
from flask import render_template, flash, redirect, url_for, request
from flask_login import current_user, login_user, logout_user
from app.models.acl import User
from app.view_models.acl import LoginForm
from werkzeug.urls import url_parse
import click
import getpass
import os
@app.route('/login'... | 41 | 38.41 | 100 | 15 | 349 | python | [{"finding_id": "codeql_py/url-redirection_44718734c64e842f_dfa7a87f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
18,
28
] | [
null,
null
] | [
25,
25
] | [
37,
37
] | |
2024-11-19T00:44:19.661583+00:00 | 1,631,780,342,000 | 2a7dc1e596b3decd4cf8a0e0367f1aba0ea5c55d | 3 | {
"blob_id": "2a7dc1e596b3decd4cf8a0e0367f1aba0ea5c55d",
"branch_name": "refs/heads/master",
"committer_date": 1631780342000,
"content_id": "8c452336d223fcdfa60bfbde29cf460344822c12",
"detected_licenses": [
"MIT"
],
"directory_id": "35f60a0120d262538be00600344b97642e200acb",
"extension": "py",
"fi... | 3.328125 | stackv2 | from user import User
from credentials import Credentials
import random
import string
user_data =None
credentials_data = None
def signup(user_name, password, email, p_number):
user_data = User(user_name, password, email, p_number)
return user_data
def main():
print("Hello, Welcome to your password locker.... | 107 | 29.85 | 149 | 21 | 629 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7a5dbda8058543e9_ea93ca0c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
49
] | [
null
] | [
19
] | [
118
] | |
2024-11-18T23:05:31.823616+00:00 | 1,595,341,793,000 | 9d1f24812a3a737dcb2743a6c3dbc2beb8c1f8c7 | 2 | {
"blob_id": "9d1f24812a3a737dcb2743a6c3dbc2beb8c1f8c7",
"branch_name": "refs/heads/master",
"committer_date": 1595341793000,
"content_id": "16cecc24193df859cd034a859e12f55e1c2a486c",
"detected_licenses": [
"MIT"
],
"directory_id": "54a39539735f1109709d750476d1fdca2818bafa",
"extension": "py",
"fi... | 2.421875 | stackv2 | from config import DNAC_FQDN, \
DNAC_PORT, \
DNAC_USER, \
DNAC_PASSWORD, \
SCOPE
import requests
import sys
import json
from requests.auth import HTTPBasicAuth
def get_token():
requests.packages.urllib3.disable_warnings()
logi... | 115 | 29.23 | 101 | 14 | 926 | python | [{"finding_id": "codeql_py/request-without-cert-validation_d3db07cb098738fa_3388b169", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
14,
31,
88
] | [
null,
null,
null
] | [
14,
20,
20
] | [
102,
68,
91
] | |
2024-11-18T23:05:46.473545+00:00 | 1,558,429,347,000 | 7b060bf8cc3735c3172ea2602ce629e4072e0acc | 2 | {
"blob_id": "7b060bf8cc3735c3172ea2602ce629e4072e0acc",
"branch_name": "refs/heads/master",
"committer_date": 1558429347000,
"content_id": "ecd37552d9f05b2a8126cefb8c4fd26063c202fe",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0bb54e33bdc14b0656632718f3f06172734d47f2",
"extension": "py"... | 2.34375 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on 2018/5/25
@author: xing yan
"""
from flask import render_template, redirect, flash, request, url_for
from flask_login import login_user, logout_user, login_required, current_user
from . import auth
from ..models import User
from .forms import LoginForm, RegistrationForm, ChangePa... | 158 | 33.42 | 120 | 16 | 1,197 | python | [{"finding_id": "codeql_py/url-redirection_97625897097ffe2c_ab5a5374", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
32
] | [
null
] | [
29
] | [
78
] | |
2024-11-19T01:21:44.151653+00:00 | 1,598,946,658,000 | 3fba4346d359ae55a73951560ae1a635f472a356 | 4 | {
"blob_id": "3fba4346d359ae55a73951560ae1a635f472a356",
"branch_name": "refs/heads/master",
"committer_date": 1598946658000,
"content_id": "45754cc8939f2ca8f5551df60c1a102df61680b5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a0b18e6eac4d4cf165ffbd0a4cee188e3c797d25",
"extension": "py"... | 4.09375 | stackv2 |
iphone_price = 5800
mac_price = 9000
coffee_price = 32
python_price = 80
bicyle_price = 1500
list = []
salary = int(input("Please input your salary:"))
print("**********ๆฌข่ฟๆฅๅฐ่ดญ็ฉ่ฝฆ็ณป็ป**********")
while True:
print("1. iPhone 11 โโโโ%dๅ
" % iphone_price)
print("2. Mac book โโโโ%d" % mac_price)
print("3. cof... | 71 | 27.87 | 60 | 15 | 608 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d3cd41f4ae0a4e18_063dd9cf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 11 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (priva... | [
27,
29,
34,
36,
41,
43,
48,
50,
55,
57,
70
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
19,
19,
19,
19,
19,
19,
19,
19,
19,
19,
7
] | [
58,
40,
57,
40,
55,
40,
60,
40,
57,
40,
26
] | |
2024-11-19T00:11:35.555655+00:00 | 1,421,741,263,000 | 3eab341d696fa92c196a9f1cba9ce47e2ce5bac1 | 3 | {
"blob_id": "3eab341d696fa92c196a9f1cba9ce47e2ce5bac1",
"branch_name": "refs/heads/master",
"committer_date": 1421741263000,
"content_id": "7ab76cf959c76cc8300adfccb7fe25ea795b9a65",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "dbd474d80459fdf4063c10ef6fc40a461db703bf",
"extension": "py"... | 2.625 | stackv2 | import re
def main():
json = [
{
"name":"pok",
"articles":[]
},
{
"name":"abila",
"articles":[]
},
{
"name":"gastech",
"articles":[]
},
{
"name":"elodis",
"articles":[]
},
{
"name":"kronos",
"articles":[]
},
{
"name":"tethys",
"articles":[]
},
{
"name":"... | 113 | 16.73 | 144 | 28 | 722 | python | [{"finding_id": "codeql_py/overly-large-range_322421c13aff2423_d6998131", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:;<=>?@\\].", "remediation": "", "locati... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:;<=>?@\\]."
] | [
82
] | [
null
] | [
36
] | [
39
] | |
2024-11-19T00:11:37.357112+00:00 | 1,558,011,392,000 | a7fe66d4a35e522d576195838a7360a1e068cb66 | 2 | {
"blob_id": "a7fe66d4a35e522d576195838a7360a1e068cb66",
"branch_name": "refs/heads/master",
"committer_date": 1558011392000,
"content_id": "31359ef0571da0fede363dbb8aa229922e4d75b8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c97d7c9a20fc8bfd5c7183ab748b197409e9453f",
"extension": "py"... | 2.375 | stackv2 | # -*- coding:utf-8 -*-
from splinter.driver.webdriver.chrome import Options, Chrome
from splinter.browser import Browser
from contextlib import closing
import requests, json, time, re, os, sys, time
from bs4 import BeautifulSoup
class DouYin(object):
def __init__(self, width = 500, height = 300):
"""
ๆ้ณApp่ง้ขไธ่ฝฝ
... | 160 | 30.81 | 112 | 23 | 1,596 | python | [{"finding_id": "codeql_py/request-without-cert-validation_1d27ad63d64da919_9075697d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
45,
53,
76,
99
] | [
null,
null,
null,
null
] | [
10,
9,
9,
16
] | [
56,
53,
54,
68
] | |
2024-11-19T00:12:32.760850+00:00 | 1,601,081,178,000 | 42bf6738eaf2f8270112e2191d636f0abbc11272 | 2 | {
"blob_id": "42bf6738eaf2f8270112e2191d636f0abbc11272",
"branch_name": "refs/heads/master",
"committer_date": 1601081178000,
"content_id": "358090dfcd5ac896e3ebc0d70ccb23573f76d6fb",
"detected_licenses": [
"MIT"
],
"directory_id": "778b940ea8e3a4c1b0519422f4a20e364f44e29d",
"extension": "py",
"fi... | 2.34375 | stackv2 | ๏ปฟfrom flask import Flask, render_template, request, redirect, url_for, flash, jsonify
from werkzeug.utils import secure_filename
from engine import parseJMX
from engine import validateJMX, createJSON
from engine import cleanup
import json
import os
UPLOAD_FOLDER='uploads'
ALLOWED_EXTENSIONS = {'jmx'}
app = Flask(__n... | 62 | 27.29 | 93 | 19 | 395 | python | [{"finding_id": "codeql_py/flask-debug_a9a7435a118dc733_d14f41b1", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-601",
"CWE-022"
] | [
"py/flask-debug",
"py/url-redirection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
62,
47,
41
] | [
null,
null,
null
] | [
5,
33,
27
] | [
24,
44,
83
] | |
2024-11-19T00:51:25.631352+00:00 | 1,629,951,468,000 | b33f0bdc75356c22722612a778dfec55af28c292 | 3 | {
"blob_id": "b33f0bdc75356c22722612a778dfec55af28c292",
"branch_name": "refs/heads/master",
"committer_date": 1629951468000,
"content_id": "a5a21ab689811f6d17240f9f52909675dc3d6941",
"detected_licenses": [
"MIT"
],
"directory_id": "efa7489ff9da2f345ccf3ed79ca44059d9c68438",
"extension": "py",
"fi... | 2.5625 | stackv2 | # -*- coding: utf-8 -*-
"""
-------------------------------------------------
File Name๏ผ _validators
Description : ๅฎไนproxy้ช่ฏๆนๆณ
Author : JHao
date๏ผ 2021/5/25
-------------------------------------------------
Change Activity:
2021/5/25:
-----------------------------... | 86 | 27.51 | 108 | 13 | 633 | python | [{"finding_id": "codeql_py/request-without-cert-validation_44fe312f12bf97f3_173adb89", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
77
] | [
null
] | [
13
] | [
107
] | |
2024-11-19T01:02:23.344448+00:00 | 1,451,299,462,000 | 693463e6f5ea7766654a5c1cfc310e9e2867a685 | 3 | {
"blob_id": "693463e6f5ea7766654a5c1cfc310e9e2867a685",
"branch_name": "refs/heads/master",
"committer_date": 1451299462000,
"content_id": "fa7648ead55f44f4ae39d1dc40dbf8f8861b6856",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "47474705d06f060218b3ab35e4a0ac4240920798",
"extension": "p... | 2.671875 | stackv2 | # -*- coding: utf-8 -*-
from __future__ import absolute_import
import errno
import os
import json
import re
from jinja2 import Environment, DictLoader
from behave.reporter.base import Reporter
from behave.reporter.livingdoc_templates import *
def slugify_string(string_to_slug):
char_to_remove = '-&()~`!@ยฃ$%^&*()... | 377 | 38.88 | 102 | 20 | 2,939 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3589b519d0801d0b_1f54f27c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
243
] | [
null
] | [
20
] | [
33
] | |
2024-11-18T23:48:38.966715+00:00 | 1,540,581,241,000 | bde563212aa546ea65025bd12d18939fa852a195 | 2 | {
"blob_id": "bde563212aa546ea65025bd12d18939fa852a195",
"branch_name": "refs/heads/master",
"committer_date": 1540581241000,
"content_id": "8ecf37473f15aea2b62ba0a21f933ad15f70f911",
"detected_licenses": [
"MIT"
],
"directory_id": "5fc8b307836b4f1ddeddf2cf6244d1f659b3c51e",
"extension": "py",
"fi... | 2.40625 | stackv2 | from flask import Flask, render_template
import broadlink
import binascii
import pprint
from time import sleep
from commands import commands
from scenes import scenes
device = broadlink.discover(timeout=5)[0]
device.auth()
devtype = device.get_type()
devnet = device.host[0]
devmac = binascii.hexlify(device.mac).decod... | 80 | 28.7 | 88 | 19 | 604 | python | [{"finding_id": "codeql_py/reflective-xss_1addc2e996a159ea_78bd674f", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 6 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).",
"Cross-site scriptin... | [
45,
47,
58,
60,
78,
80
] | [
null,
null,
null,
null,
null,
null
] | [
16,
16,
16,
16,
16,
16
] | [
44,
81,
58,
81,
55,
81
] | |
2024-11-19T01:52:01.014692+00:00 | 1,531,853,567,000 | b102d49077e99b6551b70652e4b1d6da521b92c4 | 3 | {
"blob_id": "b102d49077e99b6551b70652e4b1d6da521b92c4",
"branch_name": "refs/heads/master",
"committer_date": 1531853567000,
"content_id": "4ee44deb55dba88f6d819112dead5dc1c3e6c6cb",
"detected_licenses": [
"MIT"
],
"directory_id": "74611b98cfec37792fe8c0d988a617dad6479c0d",
"extension": "py",
"fi... | 2.796875 | stackv2 | #!/usr/bin/env python
import argparse
import json
import os
import re
import networkx
from jinja2 import Environment, FileSystemLoader
SCRIPT_DIR = os.path.dirname(os.path.abspath(__file__))
class JsonSchema2Popo:
"""Converts a JSON Schema to a Plain Old Python Object class"""
CLASS_TEMPLATE_FNAME = '_cla... | 187 | 35.56 | 114 | 26 | 1,566 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0f336fb060819250_b19c5239", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
30
] | [
null
] | [
22
] | [
99
] | |
2024-11-19T00:17:33.666985+00:00 | 1,596,652,366,000 | db74d4b3953c85ded6074157b26563583dab4a1e | 3 | {
"blob_id": "db74d4b3953c85ded6074157b26563583dab4a1e",
"branch_name": "refs/heads/master",
"committer_date": 1596652366000,
"content_id": "8e4806625f8d1ba609a5c57368768fbc5b45936a",
"detected_licenses": [
"MIT"
],
"directory_id": "ffacfb2645ce1ba62b07814afb4bdd8194f0baed",
"extension": "py",
"fi... | 2.875 | stackv2 | #!/usr/bin/env python3
###################################
# Sample Custom Action: Upload Frame.io video to Youtube
###################################
from fastapi import FastAPI, APIRouter, HTTPException
from fastapi.responses import JSONResponse
from fastapi.testclient import TestClient
from typing import Dict
im... | 136 | 31.17 | 115 | 19 | 943 | python | [{"finding_id": "codeql_py/partial-ssrf_605a7169f77cd3fd_047beac3", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
36
] | [
null
] | [
9
] | [
60
] | |
2024-11-19T00:32:58.521259+00:00 | 1,624,681,828,000 | 0627f649ae8b081e65f5338a22659db7745fa7f5 | 3 | {
"blob_id": "0627f649ae8b081e65f5338a22659db7745fa7f5",
"branch_name": "refs/heads/main",
"committer_date": 1624681828000,
"content_id": "a5108667fec2d3958fed1ee91625af8be74916e7",
"detected_licenses": [
"MIT"
],
"directory_id": "3dae5007510ef1d1bf005655a039fe38a5311e49",
"extension": "py",
"file... | 2.890625 | stackv2 | #!/usr/bin/python3
import requests, urllib.parse, urllib.error, base64, json, re
import picamera
import os
import sys
from gpiozero import Button, LED
from time import sleep
from subprocess import check_call
import time
# camera button setup (it's the BCM number, not pin number)
camera_start_button = Button(27) # b... | 96 | 32.49 | 104 | 15 | 803 | python | [{"finding_id": "codeql_py/overly-large-range_3bc48e0bc710253c_bdb5eb25", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
70
] | [
null
] | [
27
] | [
30
] | |
2024-11-19T00:33:02.536735+00:00 | 1,567,000,208,000 | 0bee9e12e610ce7bf89c4720c9d154a8dd17ab4f | 2 | {
"blob_id": "0bee9e12e610ce7bf89c4720c9d154a8dd17ab4f",
"branch_name": "refs/heads/master",
"committer_date": 1567000208000,
"content_id": "e726f32d4ca576585a552a71151a3744f8ae19ff",
"detected_licenses": [
"MIT"
],
"directory_id": "97f68c7e547d36c70fd5492d0a999a9dea1a6792",
"extension": "py",
"fi... | 2.359375 | stackv2 | # -*- coding:utf-8 -*-
import json
import bs4
from six.moves.urllib_request import urlopen
from flask import Blueprint
from flask_login import login_user, logout_user
from flask import current_app, session, request, url_for, redirect
from .cas_urls import create_cas_login_url
from .cas_urls import create_cas_logout... | 164 | 34.43 | 86 | 17 | 1,240 | python | [{"finding_id": "codeql_py/url-redirection_b0aeb74822e31fa5_4408f432", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
68
] | [
null
] | [
21
] | [
33
] | |
2024-11-19T01:18:05.480439+00:00 | 1,652,714,594,000 | 57d064b7af640d693233b156f90d5b3815e8ecf3 | 2 | {
"blob_id": "57d064b7af640d693233b156f90d5b3815e8ecf3",
"branch_name": "refs/heads/master",
"committer_date": 1652714594000,
"content_id": "018f663e707c55ff6322a1176b2aca92e5266a81",
"detected_licenses": [
"MIT"
],
"directory_id": "e1cd3482db05af69c8aceaa2fec0bde6e043e5cf",
"extension": "py",
"fi... | 2.453125 | stackv2 | # -*- coding: utf-8 -*-
# Created by restran on 2018/6/5
from __future__ import unicode_literals, absolute_import
import logging
import time
from ..encoding import force_text
try:
import paramiko
except ImportError:
raise Exception('paramiko is not installed')
logger = logging.getLogger(__name__)
class SSH... | 270 | 30.14 | 92 | 19 | 1,904 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_12c3fd9b75873f60_9a2a2761", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
41
] | [
null
] | [
9
] | [
79
] | |
2024-11-19T00:15:30.109196+00:00 | 1,693,137,958,000 | b30476c42b9f7842b710fe80f79fb28dbe1e6b3f | 3 | {
"blob_id": "b30476c42b9f7842b710fe80f79fb28dbe1e6b3f",
"branch_name": "refs/heads/master",
"committer_date": 1693137958000,
"content_id": "6484d331d31824f5aef6ed2b2cc1fd7ed5aa8cbc",
"detected_licenses": [
"MIT"
],
"directory_id": "74c46c184d957a3b6e8bdbed0d8b4ff64b13ca7a",
"extension": "py",
"fi... | 2.890625 | stackv2 | # -*- encoding: utf-8 -*-
import re
try:
from urllib.parse import unquote
except ImportError:
from urllib.parse import unquote
# helper
def get_value(template, param):
if template.has(param, ignore_empty=True):
return str(template.get(param).value).strip()
##############
# Edit logic #
#########... | 167 | 31.96 | 179 | 18 | 1,303 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_43af5fdca025ea70_892d718a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [babel.hathitrust.org](1) may be at an arbitrary positi... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [babel.hathitrust.org](1) may be at an arbitrary position in the sanitized URL."
] | [
79
] | [
null
] | [
12
] | [
41
] | |
2024-11-19T00:15:32.062712+00:00 | 1,592,056,702,000 | 9df888c5689239faf6d716ffc50d09ab81b7b929 | 3 | {
"blob_id": "9df888c5689239faf6d716ffc50d09ab81b7b929",
"branch_name": "refs/heads/master",
"committer_date": 1592056702000,
"content_id": "526250e3fc44abb69685d0889057b5db451e74fa",
"detected_licenses": [
"MIT"
],
"directory_id": "a9f55e02f0b7d996ac1819f2217c66b4a46bb56c",
"extension": "py",
"fi... | 2.53125 | stackv2 | import os
import tarfile
from pandas import read_csv
from six.moves import urllib
HOUSING_ROOT = "https://raw.githubusercontent.com/ageron/handson-ml/master/"
HOUSING_PATH = "datasets/housing"
HOUSING_URL = HOUSING_ROOT + HOUSING_PATH + "/housing.tgz"
def fetch_housing_data(housing_url=HOUSING_URL, housing_path=HOUS... | 24 | 32.38 | 76 | 9 | 213 | python | [{"finding_id": "codeql_py/tarslip_182618ed35b414d0_0ea3edc9", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
18
] | [
null
] | [
5
] | [
16
] | |
2024-11-19T01:02:40.133003+00:00 | 1,524,214,112,000 | 99ed4b5141e5d05413a4e66a0d4282342d5d0909 | 2 | {
"blob_id": "99ed4b5141e5d05413a4e66a0d4282342d5d0909",
"branch_name": "refs/heads/master",
"committer_date": 1524214112000,
"content_id": "51bf8bc24a0ed819cae151e3738b87b43fded898",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "93f2d07878a6d81ab16ebdaedfc9889c1cb1de07",
"extension": "py"... | 2.3125 | stackv2 | # -*- coding: utf-8 -*-
"""Command line execution listener module of ping-me"""
from __future__ import print_function
from __future__ import unicode_literals
from dateutil import parser
import argparse
import datetime
import getpass
import hashlib
import os
import parsedatetime
import sys
import time
import ping_me.au... | 175 | 38.88 | 78 | 34 | 1,878 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1912c34652c48b41_a8275f25", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
166
] | [
167
] | [
32
] | [
60
] | |
2024-11-19T01:02:45.466571+00:00 | 1,532,085,303,000 | 9f787aa1912cd1cb5711af95fc9faa5261254878 | 3 | {
"blob_id": "9f787aa1912cd1cb5711af95fc9faa5261254878",
"branch_name": "refs/heads/master",
"committer_date": 1532085303000,
"content_id": "75ce790149b21925dc52154829e9fab39f037301",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5aed5dd09c7875866a09f0b5dc21a74f013a1239",
"extension": "py"... | 2.640625 | stackv2 | #!/usr/bin/python3
# -*-coding:utf-8-*-
# ์์๋ก ์ฌ์ฉ. ์ฝ๋ ์์ ํ์
import csv
import getpass
import os
import sys
from sqlalchemy import create_engine
from sqlalchemy.orm import sessionmaker
from dictionary.lexicon import Lexicon
script_path = os.path.dirname(os.path.realpath(__file__))
sys.path.append(script_path + '/..'... | 111 | 26.4 | 124 | 14 | 716 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_616e4fd310b34c05_996107cc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
32
] | [
null
] | [
15
] | [
34
] | |
2024-11-19T00:51:35.683503+00:00 | 1,619,541,529,000 | 44dbadcb22aedd82348d327faaf6c3ff09fb6a03 | 2 | {
"blob_id": "44dbadcb22aedd82348d327faaf6c3ff09fb6a03",
"branch_name": "refs/heads/main",
"committer_date": 1619541529000,
"content_id": "13d7d240a07c7055bf85286f101ea9dc5f96be22",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a1afa1226bb25476643d3737a10653020890cd9e",
"extension": "py",
... | 2.359375 | stackv2 | import json
import yaml
import pprint
import re
import os
import touch
from jinja2 import Template
import jinja2
try:
from yaml import CLoader as Loader, CDumper as Dumper
except ImportError:
from yaml import Loader, Dumper
# declaring only, not change here
DEBUG=None
TEMPLATEDIR='templates'
def load(filenam... | 330 | 28.56 | 164 | 22 | 2,281 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_cb17056e1211b3fc_74522d10", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
211,
224
] | [
null,
null
] | [
19,
19
] | [
60,
60
] | |
2024-11-19T01:30:48.213333+00:00 | 1,638,458,077,000 | 2e4b9252e119d79d6c03bf345c273245225c5da2 | 3 | {
"blob_id": "2e4b9252e119d79d6c03bf345c273245225c5da2",
"branch_name": "refs/heads/master",
"committer_date": 1638458077000,
"content_id": "ed47a4fdc6f0cc14cfd96e3d00ef7ab77ff1dee8",
"detected_licenses": [
"MIT"
],
"directory_id": "b66c4912c8d21a967bf39c3d3720c98e273607da",
"extension": "py",
"fi... | 3.125 | stackv2 | import itertools
import re
def add(s):
char = s[-1]
if char == 'z':
char = 'a'
s = add(s[:-1]) + char
return s
char = chr(ord(char) + 1)
s = s[:-1] + char
return s
def threes(s):
a, b, c = itertools.tee(s, 3)
next(c, None)
next(c, None)
next(b, None)
r... | 46 | 19.2 | 75 | 14 | 314 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8d1a31ad14404b67_b39b00b8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
45
] | [
null
] | [
15
] | [
21
] | |
2024-11-19T01:30:51.482028+00:00 | 1,615,550,481,000 | 8ad4211dc7283f8ce5dafcfdf972e94ec373c0ce | 2 | {
"blob_id": "8ad4211dc7283f8ce5dafcfdf972e94ec373c0ce",
"branch_name": "refs/heads/master",
"committer_date": 1615550481000,
"content_id": "9988cba9d084171f14d84ef811a0d2dcc8fede03",
"detected_licenses": [
"MIT"
],
"directory_id": "f1289de087d44a7f301845d3aa5bcbd071fff001",
"extension": "py",
"fi... | 2.375 | stackv2 | # -*- coding: utf-8 -*-
from __future__ import absolute_import, print_function
from flask import Flask, render_template, request, redirect, url_for, Response
from jinja2 import Environment, meta, exceptions
from random import choice
import inspect
from cgi import escape
import logging
import logging.handlers
import js... | 341 | 33.4 | 127 | 18 | 2,556 | python | [{"finding_id": "codeql_py/stack-trace-exposure_455fdb7325c21338_3d987aa7", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 7 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-074",
"CWE-079",
"CWE-079"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/template-injection",
"py/reflective-xss",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
295,
304,
310,
318,
293,
312,
284
] | [
null,
null,
null,
null,
null,
null,
null
] | [
16,
24,
24,
16,
45,
20,
18
] | [
64,
99,
97,
65,
69,
82,
31
] | |
2024-11-19T01:30:55.693400+00:00 | 1,617,764,297,000 | 5768f75907d47479e20ad02ed918b98882ad5cbc | 3 | {
"blob_id": "5768f75907d47479e20ad02ed918b98882ad5cbc",
"branch_name": "refs/heads/master",
"committer_date": 1617764297000,
"content_id": "bc6dd3fa2542c967c0836cc5c8c6c6be7a1a7aaf",
"detected_licenses": [
"MIT"
],
"directory_id": "e17e0ce66b840f7c91dc6c4e558a132d1df274b2",
"extension": "py",
"fi... | 2.859375 | stackv2 | #!/usr/bin/env ./venv/bin/python
#coding: utf-8
__version__ = '1.0'
import requests
import re
import os
from urllib.parse import quote
import argparse
try:
from colorama import init, Fore, Back, Style
init()
except Exception as e:
class Fore():
GREEN = '** '
RESET = ' **'
YELLOW = ... | 71 | 34.54 | 129 | 17 | 651 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1fa22c0863d6416c_9fb71ec8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
30,
55,
58,
60
] | [
null,
null,
null,
null
] | [
30,
15,
19,
23
] | [
37,
63,
62,
32
] | |
2024-11-19T00:53:41.011382+00:00 | 1,620,657,534,000 | fd0eb5862c76ea62623642c1d2322958a8bc9f3c | 3 | {
"blob_id": "fd0eb5862c76ea62623642c1d2322958a8bc9f3c",
"branch_name": "refs/heads/master",
"committer_date": 1620657534000,
"content_id": "451998c224f0e8da94434dfd42d154f71cd1071c",
"detected_licenses": [
"MIT"
],
"directory_id": "9781189b8384c2f72c55d24ea81158330eb5f62c",
"extension": "py",
"fi... | 2.546875 | stackv2 | from definitions import *
import os
import pathlib
import sklearn.model_selection
import tarfile
import torch
import torchaudio
import urllib.request
from get_data.helpers import mkdir_if_not_exists
here = pathlib.Path(__file__).resolve().parent
def split_data(tensor, stratify):
# 0.7/0.15/0.15 train/val/test sp... | 159 | 39.51 | 123 | 17 | 1,518 | python | [{"finding_id": "codeql_py/tarslip_4dca7ec5dee25856_39f08e2c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
59
] | [
null
] | [
9
] | [
10
] | |
2024-11-19T02:00:57.080946+00:00 | 1,399,218,215,000 | ea22f97d5573bb186a75cd1bae24db6ac092f2fb | 3 | {
"blob_id": "ea22f97d5573bb186a75cd1bae24db6ac092f2fb",
"branch_name": "refs/heads/master",
"committer_date": 1399218425000,
"content_id": "908c30b65cf893e3a5453119773674a96b1dd12d",
"detected_licenses": [
"MIT"
],
"directory_id": "26903b08fe5380848b80b77749184f4cd3873466",
"extension": "py",
"fi... | 2.59375 | stackv2 | """
marvin.utils
~~~~~~~~~~~~
A collection of utilities that might be handy in several places in the marvin code.
"""
from flask import make_response, request
from flask.ext.restful import Api
from logging import getLogger
from werkzeug.exceptions import HTTPException
import textwrap
import ujson
_logg... | 103 | 32.59 | 109 | 13 | 735 | python | [{"finding_id": "codeql_py/log-injection_07e3f9225f58a0a3_392cf032", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
85
] | [
null
] | [
23
] | [
30
] | |
2024-11-19T02:00:59.752445+00:00 | 1,485,433,456,000 | fc22349a405f3c39b14b9e495483ef27f0ec145d | 3 | {
"blob_id": "fc22349a405f3c39b14b9e495483ef27f0ec145d",
"branch_name": "refs/heads/master",
"committer_date": 1485433456000,
"content_id": "d3a9f660dba8f09c2bcdc5dfa9d64f7333e4d57b",
"detected_licenses": [
"MIT"
],
"directory_id": "00349876ea87737c35a760d9f59055933db3e932",
"extension": "py",
"fi... | 2.796875 | stackv2 | import argparse
import sys
import json
import pickle
import os
import time
status_colors_hex = {
'200': '#6FB665',
'204': '#4FA29F',
'400': '#D8C726',
'404': '#F06A2A',
'406': '#78CAEF',
'414': '#86F6D2',
'500': '#043E8A',
'502': '#A81E03',
}
def fetch_input(stats_file):
file_reso... | 176 | 35.59 | 139 | 15 | 1,866 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_64301fe5be10d8e1_4dba2763", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
169
] | [
null
] | [
22
] | [
65
] | |
2024-11-19T00:04:34.222085+00:00 | 1,488,113,529,000 | ba7bd6ace06ce3c876c92b8913352df6e78dce50 | 2 | {
"blob_id": "ba7bd6ace06ce3c876c92b8913352df6e78dce50",
"branch_name": "refs/heads/master",
"committer_date": 1488113529000,
"content_id": "ce1b7f79975f1102ff2e76825442c66962d8965d",
"detected_licenses": [
"MIT"
],
"directory_id": "9fb7ac807256f4cb6fac8deb28bfeb458844d267",
"extension": "py",
"fi... | 2.484375 | stackv2 | from utils import get_location_labels, get_location_label
locations = get_location_labels()
def construct_labeled_user_attributes():
fout = open('./zhihu_user_attributes.data', 'w')
for line in open('./user_info.data'):
line = line.strip().split('\t')
if len(line) < 20:
continue
... | 25 | 24.4 | 86 | 14 | 151 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8e632249e597faf8_ce6b38bb", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
16
] | [
null
] | [
20
] | [
86
] | |
2024-11-19T00:40:29.802155+00:00 | 1,618,212,200,000 | 2d92bdd9790060a9ebc90fec0b2a301875dadd81 | 4 | {
"blob_id": "2d92bdd9790060a9ebc90fec0b2a301875dadd81",
"branch_name": "refs/heads/master",
"committer_date": 1618212200000,
"content_id": "9c78a77380964a53a5df4979f173d1ddcf2f70cd",
"detected_licenses": [
"MIT"
],
"directory_id": "42f49e52dc19777dc7dee02d71f9630f417c4e9c",
"extension": "py",
"fi... | 3.765625 | stackv2 | #!/usr/bin/env python3.6
from user import User
from credentials import Credentials
# Users
def create_user(flname,password):
'''
Function to create a new user
'''
new_user= User(flname,password)
return new_user
def save_user(user):
'''
Function to save user
'''
user.save_user()
def ... | 317 | 34.46 | 159 | 27 | 1,990 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e863d40b3879f75b_3dd642be", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
147,
224,
242,
255
] | [
null,
null,
null,
null
] | [
27,
39,
39,
35
] | [
86,
98,
150,
119
] | |
2024-11-19T01:06:12.350327+00:00 | 1,593,112,939,000 | 4f4207107d3a11a7a481816d84fe8b77a3489443 | 3 | {
"blob_id": "4f4207107d3a11a7a481816d84fe8b77a3489443",
"branch_name": "refs/heads/master",
"committer_date": 1593112939000,
"content_id": "784f80c523f565e79d0b32c482d4ac3d6001be1b",
"detected_licenses": [
"MIT"
],
"directory_id": "90cbdc85e657f6f09e5cf664d18069267b3c5e71",
"extension": "py",
"fi... | 2.96875 | stackv2 | from bs4 import BeautifulSoup
import requests
import csv
import time
import os
pages = [10, 20, 30, 40, 50]
with open('C:/Users/Jenjhayden/Desktop/scrapper_data/python_list.csv', 'a', encoding='utf-8', newline='') as f_output:
csv_print = csv.writer(f_output)
file_is_empty = os.stat('C:/Users/Jenjhayden/Des... | 58 | 30.02 | 118 | 19 | 396 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_27ea7e180c0c861a_db9c8b20", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
52
] | [
null
] | [
30
] | [
36
] | |
2024-11-19T01:06:18.222602+00:00 | 1,589,131,935,000 | 53453943712f9fbc3cf998cb1f64362448dac8b9 | 3 | {
"blob_id": "53453943712f9fbc3cf998cb1f64362448dac8b9",
"branch_name": "refs/heads/master",
"committer_date": 1589131935000,
"content_id": "b5c01e101f1741bbb176574dfec12e5f759ae1f9",
"detected_licenses": [
"MIT"
],
"directory_id": "88c7ab4d40448c0f2eca1918aab9d61503bc02bf",
"extension": "py",
"fi... | 3.203125 | stackv2 | # import libraries
import nltk
import numpy as np
import sqlite3
nltk.download(['punkt', 'wordnet'])
from nltk.tokenize import word_tokenize, RegexpTokenizer
from nltk.stem import WordNetLemmatizer
import pandas as pd
from sqlalchemy import create_engine
import re
from sklearn.pipeline import Pipeline
from sklearn.ense... | 160 | 28.34 | 96 | 15 | 1,086 | python | [{"finding_id": "codeql_py/overly-large-range_6e725b506fdb2545_0d59dd58", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
59
] | [
null
] | [
48
] | [
51
] | |
2024-11-19T01:17:53.904550+00:00 | 1,602,221,603,000 | c2d7eca52eca151274b880fa480697a921503c59 | 2 | {
"blob_id": "c2d7eca52eca151274b880fa480697a921503c59",
"branch_name": "refs/heads/master",
"committer_date": 1602221603000,
"content_id": "e6cbad3df5fe7cac6e18d2668ff8ae13e7512bc1",
"detected_licenses": [
"MIT"
],
"directory_id": "81407be1385564308db7193634a2bb050b4f822e",
"extension": "py",
"fi... | 2.5 | stackv2 | import string
import requests
import re
import json
import os
from PIL import Image
req = requests.Session()
req.headers.update({
'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36'})
def save_pic(title, index, content): # ๅญๅพ็
my_fi... | 128 | 33.22 | 132 | 18 | 1,451 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_3a9bdcf222a1c532_3ebccb1c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [jz.docin.com](1) may be at an arbitrary position in th... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The string [jz.docin.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [www.docin.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [wenku.baidu.com](1) may be at an arbitrary position in the sanitized URL."
] | [
120,
120,
122
] | [
null,
null,
null
] | [
4,
34,
6
] | [
30,
61,
35
] | |
2024-11-19T01:18:10.267483+00:00 | 1,534,265,886,000 | cfbb99855d37108d3dd51f0ad4ef63018b514b8b | 3 | {
"blob_id": "cfbb99855d37108d3dd51f0ad4ef63018b514b8b",
"branch_name": "refs/heads/master",
"committer_date": 1534265886000,
"content_id": "7e369ad341f18321bc48a23a64c8f12b9d67a4bd",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "68280d4d94486adf6bf8c639f7c8582434bdeadb",
"extension": "p... | 2.75 | stackv2 | import networkx as nx
import urllib
import tarfile
import os, sys
from timeit import default_timer as timer
links = [
('https://users.dcc.uchile.cl/~jfuentess/datasets/files/g/planar1M.tar.gz', 'planar_embedding1000000.pg'),
('https://users.dcc.uchile.cl/~jfuentess/datasets/files/g/planar5M.tar.gz', 'planar_em... | 55 | 38.13 | 126 | 9 | 582 | python | [{"finding_id": "codeql_py/tarslip_5d438ed8e97f3fd8_83639bf3", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
30
] | [
null
] | [
5
] | [
8
] | |
2024-11-19T01:18:10.851267+00:00 | 1,550,678,537,000 | dbcd29d7b9949d228b9f6abdbf34348872677463 | 2 | {
"blob_id": "dbcd29d7b9949d228b9f6abdbf34348872677463",
"branch_name": "refs/heads/master",
"committer_date": 1550678537000,
"content_id": "62b8b53754c085eb5013efff3110e94870d53aaf",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bccbfea7a881798ed7be032f50cad0f12f594e8a",
"extension": "py"... | 2.34375 | stackv2 | import os
from flask import Flask, flash, render_template, request, redirect, \
url_for, send_from_directory
from werkzeug import secure_filename
import cloudinary
from cloudinary.uploader import upload
from cloudinary.utils import cloudinary_url
import requests
from label import label_leaf
ALLOWED_... | 90 | 35.74 | 79 | 14 | 777 | python | [{"finding_id": "codeql_py/full-ssrf_fc1a58f01eeead1c_cae8b718", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 4 | true | [
"CWE-918",
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/full-ssrf",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
77,
32,
38,
43
] | [
null,
null,
null,
null
] | [
17,
29,
29,
29
] | [
72,
40,
40,
40
] | |
2024-11-19T01:15:15.180309+00:00 | 1,692,023,739,000 | a8df0275f5fddca723f8f37e6e585957143ab5e8 | 2 | {
"blob_id": "a8df0275f5fddca723f8f37e6e585957143ab5e8",
"branch_name": "refs/heads/master",
"committer_date": 1692023739000,
"content_id": "96e233378fb8ec9d53a1b169455b5996e88bf0b3",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "54435a26cb878df64ad29d9718e20733a79b463d",
"extension": "p... | 2.34375 | stackv2 | #!/usr/bin/env python3
# ==========================================================
# Copyright 2020 519Seven
# ==========================================================
''' Designed for cron - scp files to web server '''
# Upload files that match criteria to remote web server
# If the file has an extension that falls... | 100 | 37.91 | 104 | 18 | 976 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_6c6bf0f407f627fd_534c4d0f", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
53
] | [
null
] | [
5
] | [
53
] | |
2024-11-19T01:15:24.228735+00:00 | 1,659,365,313,000 | 448886f922da2c746e3ac62363852c003d5ffd61 | 2 | {
"blob_id": "448886f922da2c746e3ac62363852c003d5ffd61",
"branch_name": "refs/heads/master",
"committer_date": 1659365313000,
"content_id": "baae8c2502e2b58c28b53d48bca0ae0d4dd1dd20",
"detected_licenses": [
"MIT"
],
"directory_id": "61673ab9a42f7151de7337608c442fa6247f13bb",
"extension": "py",
"fi... | 2.359375 | stackv2 | from __future__ import print_function
from gnuradio import analog
from gnuradio import audio
from gnuradio import blocks
from gnuradio import eng_notation
from gnuradio import gr
from gnuradio.eng_option import eng_option
from gnuradio.filter import firdes
from optparse import OptionParser
class TopBlock22(gr.top_blo... | 310 | 28.94 | 111 | 12 | 2,423 | python | [{"finding_id": "codeql_py/flask-debug_352e550ba3ffb24a_453cb85f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 5 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a ... | [
310,
250,
257,
264,
285
] | [
null,
null,
null,
null,
null
] | [
5,
12,
12,
12,
12
] | [
40,
22,
22,
22,
103
] | |
2024-11-19T00:43:46.016346+00:00 | 1,367,165,705,000 | 5e37a7e98b57ffe84f929529dbb3febce95d4f3b | 3 | {
"blob_id": "5e37a7e98b57ffe84f929529dbb3febce95d4f3b",
"branch_name": "refs/heads/master",
"committer_date": 1367165705000,
"content_id": "59d4685715d4887003e80af6e842752ff9a140c2",
"detected_licenses": [
"MIT"
],
"directory_id": "cd91fd16ecd5cb0709e52e48d6bcb339a927e74c",
"extension": "py",
"fi... | 2.6875 | stackv2 | #!/usr/bin/env python
#
# server.py
#
# Original copy from tornado web server (facebook 2009)
#
# Last updated by Jackie Lee on 08/12/11.
#
#
import logging
import tornado.httpserver
import tornado.ioloop
import tornado.websocket
import tornado.options
import tornado.web
import uuid
from tornado.options import def... | 120 | 30.42 | 139 | 16 | 858 | python | [{"finding_id": "codeql_py/log-injection_954ebb68ce0066a0_fc98dd23", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
56
] | [
null
] | [
40
] | [
47
] | |
2024-11-19T00:43:49.414324+00:00 | 1,501,598,635,000 | d2776e987141af19674a721731f9d868e6f75d80 | 3 | {
"blob_id": "d2776e987141af19674a721731f9d868e6f75d80",
"branch_name": "refs/heads/master",
"committer_date": 1501598635000,
"content_id": "ad226ebf6accc8aff4bd13fed176278552baf970",
"detected_licenses": [
"MIT"
],
"directory_id": "a303eaeb9bb5def6625bf203e9e4283ded587433",
"extension": "py",
"fi... | 2.75 | stackv2 | from __future__ import print_function, division
from math import radians, sin
import WalabotAPI
import paramiko
try:
input = raw_input
except NameError:
pass
class Walabot:
""" Designed to control the Walabot device.
"""
def __init__(self):
""" Set useful arena constants and load the Wala... | 187 | 35.25 | 79 | 17 | 1,695 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_5fcadc9d69147f8f_686c8ed4", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
93
] | [
null
] | [
9
] | [
71
] | |
2024-11-19T00:43:50.454321+00:00 | 1,557,250,309,000 | 066080cfea5d9877691c2a236fa2c7703ff5691d | 3 | {
"blob_id": "066080cfea5d9877691c2a236fa2c7703ff5691d",
"branch_name": "refs/heads/master",
"committer_date": 1557250309000,
"content_id": "89bbc81542526f853c976415f525c8b7b73f6e69",
"detected_licenses": [
"MIT"
],
"directory_id": "c1dbdf405c3301c4d77068d2b14fb4c962fc1c75",
"extension": "py",
"fi... | 2.765625 | stackv2 | import socket
from tkinter import *
ServerIP='127.0.0.1'
port = 4500
class FTPClient():
def __init__(self):
self.conSoc=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
self.loggedIn=False
self.open=True
self.dataSoc=None
self.passiveIP=None
self.passivePort=None
... | 266 | 31.02 | 90 | 19 | 2,047 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_90958c7c066bc1d5_c78d6636", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-200"
] | [
"py/clear-text-logging-sensitive-data",
"py/bind-socket-all-network-interfaces"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"'' binds a socket to all interfaces."
] | [
50,
112
] | [
null,
null
] | [
23,
9
] | [
44,
46
] | |
2024-11-19T00:43:51.297286+00:00 | 1,554,907,207,000 | 650f06c4a2528a4e7f5d2c1c641330400a731234 | 3 | {
"blob_id": "650f06c4a2528a4e7f5d2c1c641330400a731234",
"branch_name": "refs/heads/master",
"committer_date": 1554907207000,
"content_id": "24636fc16735cf115c7b4642d178c201f34efa64",
"detected_licenses": [
"MIT"
],
"directory_id": "3fe63c5130f838a3138ea586bf6d49039567e839",
"extension": "py",
"fi... | 2.671875 | stackv2 | import pandas as pd
import numpy as np
import geojson
tec_pandas = pd.read_csv('TEC-raw/AMAP_26_2_2019_0h', sep=';', header=None)
tec_pandas = tec_pandas.dropna(axis='columns')
tec_pandas_list = np.concatenate(np.array(tec_pandas))
#tec_pandas_list = tec_pandas_list[::-1]
latitude = np.arange(-60, 20, 0.5)
#latitude ... | 53 | 30.4 | 99 | 10 | 533 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_be69abc743638778_6cdaffd0", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
26
] | [
null
] | [
18
] | [
70
] | |
2024-11-19T00:43:55.211787+00:00 | 1,618,571,790,000 | e633b3ae4514f9d601b5c3115b8edbde6a4a65fb | 2 | {
"blob_id": "e633b3ae4514f9d601b5c3115b8edbde6a4a65fb",
"branch_name": "refs/heads/master",
"committer_date": 1618571868000,
"content_id": "2a985b8af3e9a073ecd9354dd8368783b01f8fa0",
"detected_licenses": [
"ISC"
],
"directory_id": "7f6358aaa6e52a478a7619da326cca1bad2063a4",
"extension": "py",
"fi... | 2.4375 | stackv2 | from __future__ import generator_stop
import logging
import os
import subprocess # nosec
from pathlib import Path
from typing import TYPE_CHECKING
from ..os import CurrentWorkingDirectory
from ..string import surrounding_join
if TYPE_CHECKING:
from typing import Any, Callable, Dict, Iterable, List, Optional, Tuple... | 211 | 28.88 | 135 | 18 | 1,739 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4fd97a041032a6a9_fef1854f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
130
] | [
null
] | [
16
] | [
29
] | |
2024-11-19T00:43:57.304499+00:00 | 1,567,950,323,000 | 5d8dfe6f4f2a65f4caca80c3f678cce3f2619073 | 2 | {
"blob_id": "5d8dfe6f4f2a65f4caca80c3f678cce3f2619073",
"branch_name": "refs/heads/master",
"committer_date": 1567950323000,
"content_id": "4f59ce2f8286c0c0724ab8440a275b752638a1a0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8c5a9cdf12876084d80d270e87b4f74fc254d196",
"extension": "py"... | 2.40625 | stackv2 | from django.contrib.auth.models import User
from django.core.paginator import Paginator
from django.shortcuts import render, HttpResponse
from django.db.models import Q
from blog.models.post import Post
from django.contrib.auth.decorators import login_required
NUM_OF_POSTS = 5
def home(request, username=None):
f... | 57 | 33.05 | 87 | 16 | 415 | python | [{"finding_id": "codeql_py/stack-trace-exposure_1726c18931bf1435_6e8551db", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
57
] | [
null
] | [
33
] | [
34
] | |
2024-11-19T01:32:15.934772+00:00 | 1,616,727,265,000 | f5c7d54da9fb8cb4f378b6010c80e02fa435b2f4 | 3 | {
"blob_id": "f5c7d54da9fb8cb4f378b6010c80e02fa435b2f4",
"branch_name": "refs/heads/main",
"committer_date": 1616727265000,
"content_id": "48f6929637703a0389de1ea8d8d9cc1003a73884",
"detected_licenses": [
"MIT"
],
"directory_id": "29ba5034b3e6aeb9f5f928639e004b3196dbf730",
"extension": "py",
"file... | 2.75 | stackv2 | # developed by mario diaz 01 30 2021
# reinicia la VPN l2tp unifi USG
# cuando algun usuario se queda logueado en el sistema
# This script restarts the VPN services,
# this is very useful when a user is already logged in the vpn,
# although itยดs not, showing errors in windows or the OS
# this script avoids you to use... | 93 | 30.99 | 102 | 12 | 787 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2a922253891d0347_050baf70", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
44
] | [
null
] | [
null
] | [
58
] | |
2024-11-19T01:43:46.173995+00:00 | 1,595,842,712,000 | 691ec743eb574d00fd3cf6132e546538e0838d74 | 4 | {
"blob_id": "691ec743eb574d00fd3cf6132e546538e0838d74",
"branch_name": "refs/heads/master",
"committer_date": 1595842712000,
"content_id": "3f57d8484b7076b425dcab5a52d17ce26f6a2ee5",
"detected_licenses": [
"MIT"
],
"directory_id": "fb3fdd1a07cf2ddf12b9ecdb776e1ae162b3b18b",
"extension": "py",
"fi... | 3.609375 | stackv2 | #!/usr/bin/env python3.6
from user import User
from credential import Card
import random
import string
def create_user(fname, lname, password):
'''
Function to create a new user
'''
new_user = User(fname, lname, password)
return new_user
def save_user(user):
'''
Function to save user
... | 202 | 23.53 | 100 | 19 | 986 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ef623b259f68350f_577f75f5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (p... | [
90,
103
] | [
null,
null
] | [
23,
19
] | [
31,
68
] | |
2024-11-19T01:44:04.071893+00:00 | 1,612,804,537,000 | 860e1002e69956522375b4e742ac4e550bb67eb0 | 3 | {
"blob_id": "860e1002e69956522375b4e742ac4e550bb67eb0",
"branch_name": "refs/heads/main",
"committer_date": 1612804537000,
"content_id": "6f3a4360d3270a9e98bc9987d911da5bbe95f4d0",
"detected_licenses": [
"MIT"
],
"directory_id": "81a75b46018362636e4c4824077159b0acc04147",
"extension": "py",
"file... | 2.53125 | stackv2 | # This Python file uses the following encoding: utf-8
from flask import Flask
from flask import request, jsonify, redirect,make_response
import logging
import sqlite3
import json
from flask_cors import CORS, cross_origin
app = Flask(__name__)
CORS(app)
app.config['CORS_HEADERS'] = 'Content-Type'
logging.basicConfig... | 239 | 26.74 | 179 | 13 | 1,574 | python | [{"finding_id": "codeql_py/log-injection_f80303174ad350ac_4d5188d3", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 8 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depen... | [
22,
27,
152,
157,
174,
191,
207,
224
] | [
null,
null,
null,
null,
null,
null,
null,
null
] | [
18,
18,
18,
18,
18,
18,
18,
18
] | [
25,
24,
25,
24,
25,
25,
25,
25
] | |
2024-11-19T01:44:04.239520+00:00 | 1,412,355,221,000 | 6b4c450904bc17e9009739705a61b67eb2695d57 | 3 | {
"blob_id": "6b4c450904bc17e9009739705a61b67eb2695d57",
"branch_name": "refs/heads/master",
"committer_date": 1412355221000,
"content_id": "9f04f3528a4add265c901da57344c3c009d1b94f",
"detected_licenses": [
"MIT"
],
"directory_id": "650d6c3614977c9b4c5408c352c6ad201459d58e",
"extension": "py",
"fi... | 2.640625 | stackv2 | # coding: utf-8
# date: 2014-09-28
from jinja2 import Template
import time
import sys
reload(sys)
sys.setdefaultencoding('utf-8')
class Feed():
def __init__(self, template='templates/simplerss.xml'):
self.template = template
builddate = time.strftime(u"%a, %d %b %Y %H:%M:%S +0000", time.gmtime()... | 54 | 22.59 | 80 | 15 | 325 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_24a900cb7082a5e2_8ae52208", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
37
] | [
null
] | [
20
] | [
61
] | |
2024-11-19T01:44:04.417613+00:00 | 1,618,866,631,000 | d8a137b20ceba88954857de53b9277d8538298ad | 2 | {
"blob_id": "d8a137b20ceba88954857de53b9277d8538298ad",
"branch_name": "refs/heads/main",
"committer_date": 1618866631000,
"content_id": "b07886261165d02de679ed5962d30e13102f0077",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2e9a8973728c2b4566596b0d8c78a8c32355e65a",
"extension": "py",
... | 2.484375 | stackv2 | """Resource module for foto view."""
import logging
from aiohttp import web
import aiohttp_jinja2
from sprint_webserver.services import FotoService, InnstillingerService, KlasserService
klubber = [
"Bรฆkkelaget",
"Heming",
"Kjelsรฅs",
"Koll",
"Lillomarka",
"Lyn",
"Njรฅrd",
"Rustad",
... | 87 | 28.82 | 87 | 17 | 639 | python | [{"finding_id": "codeql_py/log-injection_5726e37b02891e79_c2222030", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
80
] | [
null
] | [
23
] | [
70
] | |
2024-11-19T02:20:09.131461+00:00 | 1,488,785,690,000 | 5fa5bbdd4a25b01dfd122547b7358e26f9034c9a | 2 | {
"blob_id": "5fa5bbdd4a25b01dfd122547b7358e26f9034c9a",
"branch_name": "refs/heads/master",
"committer_date": 1488785690000,
"content_id": "052a4480ea5d3bcbef65d740b161ef5f51972575",
"detected_licenses": [
"MIT"
],
"directory_id": "d331d36eb3d87a6dc7180d6c0552c3eb289aa2c4",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/env python
from jinja2 import Environment, PackageLoader, select_autoescape
import sys
import re
def uc(string):
s1 = re.sub('(.)([A-Z][a-z]+)', r'\1_\2', string)
return re.sub('([a-z0-9])([A-Z])', r'\1_\2', s1).upper()
def main() :
'''
'''
if len(sys.argv) <2 :
print u"no cla... | 32 | 20.59 | 65 | 12 | 198 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_42805797006d8f79_1761a24c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
23
] | [
25
] | [
11
] | [
6
] | |
2024-11-19T00:59:36.416434+00:00 | 1,686,555,646,000 | 9e78932d93934ad80a480eddb17ce6f51dea6b1b | 3 | {
"blob_id": "9e78932d93934ad80a480eddb17ce6f51dea6b1b",
"branch_name": "refs/heads/master",
"committer_date": 1686555646000,
"content_id": "21fd99f3ad4c5844f0683c798aac54faa2b0da4d",
"detected_licenses": [
"MIT"
],
"directory_id": "4a4cb262cdfa83131a5b8d8992debb45599b027a",
"extension": "py",
"fi... | 3 | stackv2 | """
This file contains code to
(a) Load the pre-trained classifier and
associated files.
(b) Transform new input data into the
correct format for the classifier.
(c) Run the classifier on the transformed
data and return results.
"""
import pickle
import numpy as np
import pandas as pd
from s... | 271 | 32.16 | 106 | 16 | 2,254 | python | [{"finding_id": "codeql_py/overly-large-range_5b910edd302c13e0_1eb8567e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].",
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
52,
102
] | [
null,
null
] | [
55,
55
] | [
59,
59
] | |
2024-11-19T00:59:53.427297+00:00 | 1,617,474,200,000 | f58068525c4426bf57670eaab6afd24af3cb4557 | 4 | {
"blob_id": "f58068525c4426bf57670eaab6afd24af3cb4557",
"branch_name": "refs/heads/main",
"committer_date": 1617474200000,
"content_id": "2909f692411fe9e369f880a9809126951a573c5c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "250d8daacf606e8cdac26ad78fdb08d0dcde3596",
"extension": "py",
... | 3.515625 | stackv2 | BIRTH_SEARCH = 1
ADD_BIRTH = 2
BIRTH_CHANGE = 3
DELETE_BIRTH = 4
CLOSE_PROGRAM = 5
def main():
birthdays = {} #ฮฎ birthdays.dict()
choise(birthdays)
def choise(birthdays):
print('ฮฆฮฏฮปฮฟฮน ฮบฮฑฮน ฯฮฑ ฮณฮตฮฝฮญฮธฮปฮนฮฌ ฯฮฟฯ
ฯ.')
print("----------------------------")
print('ฮฯฯฮต ฮผฮนฮฑ ฮฑฯฯ ฯฮนฯ ฯฮฑฯฮฑฮบฮฌฯฯ ฮตฮฝฯฮฟฮปฮญฯ:\n1. ฮฮฝฮฑฮถฮฎ... | 83 | 31.6 | 108 | 15 | 1,324 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_238f7194fbc9b42e_fa913c55", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text."
] | [
50
] | [
null
] | [
11
] | [
45
] | |
2024-11-19T01:11:42.163830+00:00 | 1,617,617,444,000 | 895b0f35e823cdb2ae42da73e97726cf7959f5ed | 2 | {
"blob_id": "895b0f35e823cdb2ae42da73e97726cf7959f5ed",
"branch_name": "refs/heads/master",
"committer_date": 1617617444000,
"content_id": "2c5fc45d60f48ecd3dafacdb47012498bdb0c37a",
"detected_licenses": [
"MIT"
],
"directory_id": "c18f90603275452a9c6e453fc157c10f8fce4f53",
"extension": "py",
"fi... | 2.390625 | stackv2 | """
Copyright (c) 2018 Keitaro AB
Use of this source code is governed by an MIT license
that can be found in the LICENSE file or at
https://opensource.org/licenses/MIT.
"""
# encoding: utf-8
import os.path
import json
import totoboto
from flask import Flask, request, make_response, render_template
from BeautifulSoup ... | 73 | 30.33 | 79 | 14 | 537 | python | [{"finding_id": "codeql_py/flask-debug_ac8f8f9770c43654_5e56d752", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a ... | [
72,
33,
42,
49
] | [
null,
null,
null,
null
] | [
5,
26,
30,
23
] | [
24,
33,
54,
30
] | |
2024-11-19T01:11:43.561683+00:00 | 1,622,120,154,000 | f515d9c87bd52d7d0df1b2a1bfafe142832f9aa3 | 2 | {
"blob_id": "f515d9c87bd52d7d0df1b2a1bfafe142832f9aa3",
"branch_name": "refs/heads/master",
"committer_date": 1622120154000,
"content_id": "c1c9d92b7bbad0feaa2f636725fdfa40ce842579",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "bfbb91e889fc9ef27cd0d39f234a5d3991c7cef7",
"extension": "p... | 2.421875 | stackv2 | import datetime
import json
import os
import sys
import time
from datetime import datetime
from selenium.common.exceptions import TimeoutException
from selenium.webdriver.common.action_chains import ActionChains
from selenium.webdriver.common.by import By
from selenium.webdriver.common.keys import Keys
from selenium.w... | 183 | 36.08 | 120 | 22 | 1,440 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_139045f33b506356_21d75d04", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
121
] | [
null
] | [
23
] | [
36
] | |
2024-11-19T01:11:44.575081+00:00 | 1,581,240,833,000 | 4ed0f58074c3aa62282d3286f55d1b140569b3b8 | 3 | {
"blob_id": "4ed0f58074c3aa62282d3286f55d1b140569b3b8",
"branch_name": "refs/heads/master",
"committer_date": 1581240842000,
"content_id": "f99c9fff653295187c413732465fff248620cbd7",
"detected_licenses": [
"MIT"
],
"directory_id": "ade3709a01b3c8ba80cdad5de1c13908d5572973",
"extension": "py",
"fi... | 2.65625 | stackv2 | from flask import Flask, request
from flask_cors import CORS
from backend.services.database_service import DatabaseService
from backend.services.news_website_service import NewsWebsiteService
from backend.services.gaming_website_service import GamingWebsiteService
APP = Flask(__name__)
CORSAPP = CORS(APP)
DATABASE_SE... | 66 | 31 | 93 | 10 | 446 | python | [{"finding_id": "codeql_py/reflective-xss_4cfb62237d12af8d_89ae5e29", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
42,
64
] | [
44,
66
] | [
12,
12
] | [
6,
6
] | |
2024-11-19T01:11:50.263873+00:00 | 1,670,765,805,000 | ca4ff2329a1795f491bd456ae6a134fef2dda05c | 2 | {
"blob_id": "ca4ff2329a1795f491bd456ae6a134fef2dda05c",
"branch_name": "refs/heads/main",
"committer_date": 1670765805000,
"content_id": "05ddd6d7ea27bda3c7ff655cd87bd06ec6694bcd",
"detected_licenses": [
"MIT"
],
"directory_id": "e47cc3beaf6f8112ab23144712dcbf7b0540d17e",
"extension": "py",
"file... | 2.453125 | stackv2 | """Python client library for the Genius Hub API."""
import logging
from hashlib import sha256
import aiohttp
from .const import DEFAULT_TIMEOUT_V1, DEFAULT_TIMEOUT_V3
_LOGGER = logging.getLogger(__name__)
class GeniusService:
"""Handle all communication to the Genius Hub."""
def __init__(self, hub_id, us... | 74 | 33.47 | 88 | 17 | 551 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_519bd63753c83577_70f941e7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
22
] | [
null
] | [
24
] | [
61
] | |
2024-11-19T01:11:57.862789+00:00 | 1,606,837,250,000 | 9ee2bb10391742451372c8ca9c2110a283d3c11e | 2 | {
"blob_id": "9ee2bb10391742451372c8ca9c2110a283d3c11e",
"branch_name": "refs/heads/master",
"committer_date": 1606837250000,
"content_id": "dbf1004afba4e0c03aad9c5136df61e3043c7270",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "40fd45b4b468ecc5719d9aee997ab862b726fa69",
"extension": "p... | 2.3125 | stackv2 | from jinja2 import Template
import random
import string
import cherrypy
from os.path import abspath
class Render(object):
def getpage(self, path):
with open(path) as file:
data = file.readlines()
page = ''.join(data)
return str(page)
def setjob(self,jobname,jobtext... | 21 | 23.76 | 48 | 13 | 124 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5da3724eb697008a_a5f1a93c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
17
] | [
null
] | [
14
] | [
33
] | |
2024-11-19T01:33:43.864519+00:00 | 1,372,866,416,000 | a581d7a91c220c8afd56a56c0a3836e7704d1318 | 3 | {
"blob_id": "a581d7a91c220c8afd56a56c0a3836e7704d1318",
"branch_name": "refs/heads/master",
"committer_date": 1372866416000,
"content_id": "1a53feccf83600a07ed475ab74be78a46636512a",
"detected_licenses": [
"MIT"
],
"directory_id": "06c3da4a6f06aea894b2a55bf5192cd0b2ddbcad",
"extension": "py",
"fi... | 2.609375 | stackv2 | #!/usr/bin/python
import commands
import subprocess
import urllib
import tarfile
import time
import os
import hashlib
import shutil
def check_requirements():
ipset_status = commands.getstatusoutput("hash ipset")
iptables_status = commands.getstatusoutput("hash iptables")
if ipset_status[0] != 0 or iptables_statu... | 73 | 32.12 | 137 | 13 | 667 | python | [{"finding_id": "codeql_py/tarslip_9e776ba6ac92a2e4_49db573f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
35
] | [
null
] | [
3
] | [
6
] | |
2024-11-19T01:56:51.205018+00:00 | 1,483,174,918,000 | 4eb65a1b994460852e7072898740b288ff8c8f2d | 3 | {
"blob_id": "4eb65a1b994460852e7072898740b288ff8c8f2d",
"branch_name": "refs/heads/master",
"committer_date": 1483174918000,
"content_id": "526d6a8886346ab9b4111d8cf37b93bc72d77a1e",
"detected_licenses": [
"MIT"
],
"directory_id": "0dade8f085589476a557779632262b0e98bae202",
"extension": "py",
"fi... | 3.125 | stackv2 | import hashlib
def part_one(door_id):
print('Starting part one...')
password = ['_'] * 8
index = 0
for i in range(len(password)):
print(' [%7d] Password so far: %s' % (index, ''.join(password)))
h = hashlib.md5((door_id + str(index)).encode('utf-8')).hexdigest()
index += 1
... | 43 | 28.63 | 79 | 20 | 383 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_95552ae5e3fac822_b3906dd9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
9,
17,
25,
34
] | [
null,
null,
null,
null
] | [
15,
11,
15,
11
] | [
73,
62,
73,
62
] | |
2024-11-19T01:56:51.877108+00:00 | 1,567,205,743,000 | ee0bb246b1ca271cfe4e1ac55627e4feaec795a3 | 3 | {
"blob_id": "ee0bb246b1ca271cfe4e1ac55627e4feaec795a3",
"branch_name": "refs/heads/master",
"committer_date": 1567205743000,
"content_id": "8038fbf535906ed4ed2b44761a318a0cdf8f917a",
"detected_licenses": [
"MIT"
],
"directory_id": "08da41469587f041cf270d2a6ddf24ebabb07d21",
"extension": "py",
"fi... | 2.59375 | stackv2 | import os
import tarfile
from google_drive_downloader import GoogleDriveDownloader as gdd
import argparse
from capsnets_laseg.io.io import LocalPreprocessingBinarySeg
import glob
def dload_heart(dset_path = '/content/'):
"""
Args:
dset_path: where you want to save the dataset
"""
dataset = "Tas... | 61 | 41.2 | 144 | 11 | 617 | python | [{"finding_id": "codeql_py/tarslip_324630a2f1a22e01_917c6885", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
33
] | [
null
] | [
9
] | [
12
] | |
2024-11-19T02:10:25.067123+00:00 | 1,638,449,008,000 | 2e8c8f0ba38a05d6657fbf329e531b70eb91e48e | 3 | {
"blob_id": "2e8c8f0ba38a05d6657fbf329e531b70eb91e48e",
"branch_name": "refs/heads/master",
"committer_date": 1638449008000,
"content_id": "7ee9732d416e4d050b59e6e1bc32ad1b8171467a",
"detected_licenses": [
"MIT"
],
"directory_id": "19d93813cff4c210ceb77128516d4b8bc8c81b76",
"extension": "py",
"fi... | 3.484375 | stackv2 | def passesRuleCheck(possiblePassword):
previousDigit = 0
containsAdjacentDigits = False
for digit in str(possiblePassword):
if int(digit) < previousDigit:
return False
if int(digit) == previousDigit:
containsAdjacentDigits = True
else:
previousDigi... | 27 | 33.44 | 71 | 15 | 223 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_33460b527c8a70d3_9e25a3f2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
26,
27
] | [
null,
null
] | [
7,
7
] | [
57,
58
] | |
2024-11-19T02:10:29.793880+00:00 | 1,530,299,179,000 | 9fbc52fb8e22f971b48b50a9afe04ee69ba676d2 | 2 | {
"blob_id": "9fbc52fb8e22f971b48b50a9afe04ee69ba676d2",
"branch_name": "refs/heads/master",
"committer_date": 1530299179000,
"content_id": "ad888e25c2240e819ff950f4052ca97ddbf861fc",
"detected_licenses": [
"MIT"
],
"directory_id": "06de8bd5476eeaefefd1f200d5108b8369b684ae",
"extension": "py",
"fi... | 2.484375 | stackv2 | # --------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for
# license information.
# --------------------------------------------------------------------------
# This sc... | 94 | 45.04 | 132 | 14 | 909 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e9bcde009ec8c3c6_cdc2bf7a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
39,
47,
54
] | [
null,
null,
null
] | [
15,
15,
15
] | [
83,
74,
86
] | |
2024-11-19T02:10:46.642098+00:00 | 1,600,882,894,000 | 8124e9224ebde9db7dbf83807282d942e271daad | 3 | {
"blob_id": "8124e9224ebde9db7dbf83807282d942e271daad",
"branch_name": "refs/heads/master",
"committer_date": 1600882894000,
"content_id": "85dd3eca0f3709f5ac139b8d071f173cf6019d42",
"detected_licenses": [
"MIT"
],
"directory_id": "f5f0df08146a4f506bc2668ebfbac006e3bc428f",
"extension": "py",
"fi... | 2.703125 | stackv2 | import base64
import os
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC
from cryptography.hazmat.primitives import hashes
from cryptography.fernet import Fernet
class Crypto:
def __init__(self, password):
self.encoding = 'utf-8'
... | 47 | 33.04 | 105 | 15 | 391 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_e3ac56680e772ae1_d54168d3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
31
] | [
null
] | [
23
] | [
53
] | |
2024-11-19T02:45:32.405767+00:00 | 1,607,117,496,000 | 1a6296d9c36c243b5225d53fc7199c2e2d46c3f3 | 3 | {
"blob_id": "1a6296d9c36c243b5225d53fc7199c2e2d46c3f3",
"branch_name": "refs/heads/master",
"committer_date": 1607117496000,
"content_id": "f06eb296a4c325fea56f11b9d948e9db4f8fa63c",
"detected_licenses": [
"MIT"
],
"directory_id": "b6a348fea3b2b6f9d67abae6b8d6c2605241e55c",
"extension": "py",
"fi... | 2.515625 | stackv2 | from dataclasses import dataclass, field
from pathlib import Path
from typing import Any, Dict, List, Optional, Tuple
import csv
import json
import re
import jinja2
import mtsg
HEADER_DELIMITER = "|"
MAX_SIGNATURE_NAME_COMPONENTS = 2
SIGNATURE_NAME_DELIMITER = "-"
SIGNATURE_NAME_PREFIX = "SBS"
@dataclass
class Di... | 172 | 24.89 | 88 | 15 | 951 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_dbfc3672423f8886_ba6d60ac", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
168
] | [
null
] | [
11
] | [
79
] | |
2024-11-19T02:45:41.809665+00:00 | 1,489,611,534,000 | 2e0e417d25ebf6b7cf29b2fe612a36957dfedf47 | 3 | {
"blob_id": "2e0e417d25ebf6b7cf29b2fe612a36957dfedf47",
"branch_name": "refs/heads/master",
"committer_date": 1489611534000,
"content_id": "a47cd04fd5f9a943849cba7131a5826586210ccd",
"detected_licenses": [
"MIT"
],
"directory_id": "6104910d435e86cebfa8a118da556b8998822a61",
"extension": "py",
"fi... | 3.4375 | stackv2 | import datetime
import os
import time
from collections import OrderedDict
from models import *
def help_text():
"""Application documentation"""
clear_screen()
print("*"*10)
print("A GUIDE TO USING THE APP.\n"
"To add a new task enter n\n"
"To view previous tasks type v\n"
"To search for previously s... | 424 | 23.94 | 85 | 18 | 2,808 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_92a4a019b3a6ae02_f18ca1ae", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
352
] | [
355
] | [
10
] | [
21
] | |
2024-11-19T02:45:42.310900+00:00 | 1,524,666,321,000 | 20fa130079ae571f2fee4ec32d3fb643122f02de | 2 | {
"blob_id": "20fa130079ae571f2fee4ec32d3fb643122f02de",
"branch_name": "refs/heads/master",
"committer_date": 1524666321000,
"content_id": "7e151e14d05784f196b466b968d137cbde165bb2",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "072ea14f5bec3ff864c6707cddadfff78d4d4ab9",
"extension": "p... | 2.5 | stackv2 | #!/usr/bin/env python3
# Roam - Copyright 2018 David J. C. Beach; see LICENSE in project root
import sys
import json
from io import BytesIO
import numpy as np
import pandas
import matplotlib.pyplot as plt
import bottle
from munch import Munch
import mapalgo as MAP
class AppState(object):
def __init__(self, ... | 306 | 23.76 | 111 | 19 | 2,012 | python | [{"finding_id": "codeql_py/reflective-xss_db264b89bca90594_576a76aa", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
212,
236
] | [
null,
null
] | [
12,
12
] | [
81,
27
] | |
2024-11-19T02:57:18.005106+00:00 | 1,489,709,483,000 | 4d8381dece388fef90c1aba031ebac30ea3d30b0 | 3 | {
"blob_id": "4d8381dece388fef90c1aba031ebac30ea3d30b0",
"branch_name": "refs/heads/master",
"committer_date": 1489709483000,
"content_id": "f47c8d6ba558165a60a824a9d8625cf631359e9c",
"detected_licenses": [
"MIT"
],
"directory_id": "27d4ed0bdeafc48cf4aaa6c40e32663736a015bd",
"extension": "py",
"fi... | 2.796875 | stackv2 | print(" [Search.py] Loading necessary modules...", end="")
import discord
from discord.ext import commands
from random import choice
import json
import aiohttp
import time
import modules.utils as utils
def time_since(ref):
return int(1000*(time.time() - ref))
def tag(start): return f"[Search.py - {time_since(sta... | 97 | 42.67 | 170 | 21 | 950 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9f540396369a75f1_949224a9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
64
] | [
null
] | [
58
] | [
110
] | |
2024-11-19T03:12:07.070544+00:00 | 1,625,060,774,000 | 6aff77bcef32ed1843469a0f4e914922b5b891cc | 3 | {
"blob_id": "6aff77bcef32ed1843469a0f4e914922b5b891cc",
"branch_name": "refs/heads/master",
"committer_date": 1625060774000,
"content_id": "1925688339622b3a9eea941e6c9804943d206d1f",
"detected_licenses": [
"MIT"
],
"directory_id": "8c15002e963f97af553337354f75584eaa583ba9",
"extension": "py",
"fi... | 2.578125 | stackv2 | import requests as r
import time
import re
TOKEN = 'asdfasdfasdfasfd'
def post(url, body={}, reconnect_attempts=100, token=TOKEN):
"""sync fetcher for arcgis services"""
body.update({
"f": "json",
"token": token
})
while reconnect_attempts:
try:
response = r.post(u... | 72 | 31.56 | 98 | 17 | 529 | python | [{"finding_id": "codeql_py/request-without-cert-validation_d785424284a01f37_7b694ae8", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
16
] | [
null
] | [
24
] | [
60
] | |
2024-11-19T03:12:08.445582+00:00 | 1,619,762,487,000 | 0c6e907754fcbfcc1b643b624a9fae91a38bf664 | 2 | {
"blob_id": "0c6e907754fcbfcc1b643b624a9fae91a38bf664",
"branch_name": "refs/heads/master",
"committer_date": 1619762487000,
"content_id": "bd6b1fc18446b8039ba871ddac82c5c4ccfae118",
"detected_licenses": [
"MIT"
],
"directory_id": "4eaa0a86ab8dcd96584afa5d37f36824e4212f5d",
"extension": "py",
"fi... | 2.453125 | stackv2 | from flask import render_template, flash, redirect, request, url_for, jsonify
from app import app, db, mail
from app.forms import LoginForm, SignUpForm
from flask_login import current_user, login_user, logout_user, login_required
from app.models import User, Recipe, Ingredient, CRUD
from werkzeug.urls import url_parse
... | 256 | 39.74 | 108 | 19 | 2,151 | python | [{"finding_id": "codeql_py/url-redirection_2edb8d1ae84bda9a_0f9b3621", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
89
] | [
null
] | [
25
] | [
34
] | |
2024-11-19T03:12:14.210176+00:00 | 1,516,995,749,000 | a07e6b2aea229333b5b624f57892bdfafe0b2ed1 | 2 | {
"blob_id": "a07e6b2aea229333b5b624f57892bdfafe0b2ed1",
"branch_name": "refs/heads/master",
"committer_date": 1516995749000,
"content_id": "728fa5cb06c2b5a7f54735bf1e51050b9cbdb548",
"detected_licenses": [
"MIT"
],
"directory_id": "6ced5b363e2b2aabd931f525b5945fe78fd658e1",
"extension": "py",
"fi... | 2.40625 | stackv2 | import os
import sys
from django.utils.crypto import get_random_string
def main():
args = sys.argv[1:]
if not args:
return
if args.pop() == 'generate_secret_key':
chars = 'abcdefghijklmnopqrstuvwxyz0123456789!@#$%^&*(-_=+)'
secret_key = get_random_string(100, chars)
with ... | 20 | 24.3 | 92 | 15 | 138 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d4a4a8dfe11725da_c4f8c1af", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
16
] | [
null
] | [
31
] | [
65
] | |
2024-11-19T03:12:22.001883+00:00 | 1,689,955,572,000 | 826e3edf54ef1ef65a55ff3ed96ade084000db92 | 2 | {
"blob_id": "826e3edf54ef1ef65a55ff3ed96ade084000db92",
"branch_name": "refs/heads/master",
"committer_date": 1689970493000,
"content_id": "5c3cd9c7336f5ae3afe0068b3b1f35cf73697473",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "97c7bd93242671f8ad215253460a147209935abe",
"extension": "py"... | 2.46875 | stackv2 | """
This file contains classes and functionto interact with qcow images servers
"""
import copy
import logging
import os
import paramiko
from common import PromotionError, get_release_map
class QcowConnectionClient(object):
"""
Proxy class for client connection
"""
_log = logging.getLogger("promoter... | 284 | 38.9 | 80 | 19 | 2,210 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_3d177551e51ec0b6_49a9dcd4", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
28
] | [
null
] | [
13
] | [
73
] | |
2024-11-19T01:33:42.675094+00:00 | 1,592,404,309,000 | 1405b3db081b35447bcf22743575cae8d538a2c4 | 4 | {
"blob_id": "1405b3db081b35447bcf22743575cae8d538a2c4",
"branch_name": "refs/heads/master",
"committer_date": 1592404309000,
"content_id": "dbd204d2f31087832e43c64a93e800d242ce907f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d033b2f8386bad50da633774308c07f3df3789aa",
"extension": "py"... | 4.03125 | stackv2 | from datetime import date
import calendar
from datetime import date, datetime, time, timedelta
'''
Day 11๏ผPython ๆถ้ดๆจกๅไฝฟ็จ้ป่พๅคง็็น
Python ไธๆถ้ดๅค็็ธๅ
ณๆจกๅๆ๏ผtime ๆจกๅๅ datetime ๆจกๅใ
time ๆจกๅ๏ผ ๆไพ 2 ็งๆถ้ด่กจ่พพๆนๅผ๏ผ
ๅๅฎไธไธช้ถ็นๅบๅ๏ผๅ็งป้ฟๅบฆๆข็ฎไธบๆ็ง็ๆฐๅผๅ
็ฑ 9 ไธชๆดๆฐ็ปๆ็ๅ
็ป struct_time ่กจ็คบ็ๆถ้ด
datetime ๆจกๅ๏ผๅธธ็จ็ฑปๆ 4 ไธช๏ผ
date๏ผๆฅๆ็ฑป๏ผๅ
ๆฌๅฑๆงๅนดใๆใๆฅๅ็ธๅ
ณๆนๆณ
time๏ผๆถ้ด็ฑป๏ผๅ
ๆฌๅฑๆงๆถใๅใ็ง็ญๅ็ธๅ
ณๆนๆณ
date... | 132 | 25.08 | 75 | 11 | 1,301 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_83d1ab98c0f4dee5_783be241", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
75,
77
] | [
null,
null
] | [
11,
11
] | [
17,
17
] | |
2024-11-19T01:57:25.560738+00:00 | 1,621,013,252,000 | 7d0a9267e81a5bf362eac0d59cbbbe2c3be74f33 | 3 | {
"blob_id": "7d0a9267e81a5bf362eac0d59cbbbe2c3be74f33",
"branch_name": "refs/heads/main",
"committer_date": 1621013252000,
"content_id": "286125456c7d024c9d7fee607fe511b5d48bd2ee",
"detected_licenses": [
"MIT"
],
"directory_id": "67809d0206bd0b3755f5c9ea806ab658869a96f1",
"extension": "py",
"file... | 3.234375 | stackv2 | """ Email """
import re
from dataclasses import dataclass
from src.domain.domainmodel.exceptions.invalid_email import InvalidEmail
@dataclass
class Email:
""" This class represents the Email datatype """
value: str
""" Email value object """
def __init__(self, value: str):
if self._valida... | 25 | 22.24 | 72 | 13 | 142 | python | [{"finding_id": "codeql_py/redos_437c8a867b397890_db1c0e2b", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'A' and containing many repetition... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'A' and containing many repetitions of '_'."
] | [
24
] | [
null
] | [
30
] | [
42
] | |
2024-11-19T01:57:31.159605+00:00 | 1,561,368,966,000 | 6b70bc31bdfcb1c3d67f650a4e80dfb7bae8796f | 2 | {
"blob_id": "6b70bc31bdfcb1c3d67f650a4e80dfb7bae8796f",
"branch_name": "refs/heads/master",
"committer_date": 1561368966000,
"content_id": "18a03f557f5cb7539fb94568a0163539fa1a58ac",
"detected_licenses": [
"MIT"
],
"directory_id": "ec7300118fe167729c28504a1c3a4d66a12a137b",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/env python
import sys
import os
from os import environ as env
import time
import random
import datetime
import json
import importlib
import schedule
from slackclient import SlackClient
from slack_utils import get_user_id, get_channel_id
DEFAULT_MENUS = """[
"mop.MOP",
"finninn.FinnInn",
"brygg... | 125 | 26.12 | 80 | 13 | 912 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_63e25440f60b6648_7f9a04a8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
122
] | [
null
] | [
11
] | [
55
] | |
2024-11-19T01:57:32.009723+00:00 | 1,619,907,316,000 | a3fcaf3a8d2076a9b889af39483c46f48a1fdd39 | 3 | {
"blob_id": "a3fcaf3a8d2076a9b889af39483c46f48a1fdd39",
"branch_name": "refs/heads/master",
"committer_date": 1619907316000,
"content_id": "c2e2996f0bb4fa018735644d075b0bb22d609520",
"detected_licenses": [
"MIT"
],
"directory_id": "00c0c9b80442af8bb26f0d278b4dc9b628d27eba",
"extension": "py",
"fi... | 3.0625 | stackv2 | import re
import csv
import pandas as pd
pattern = r"(?P<component>^[\%?\#?\w]+)+\s*(?P<Value>[\d\.]+)+\s*(?P<Minimum>[\d\.]+)+\-(?P<Maximum>[\d\.]+)+\s*(?P<Units>[\w\%\/\^]+)"
file=open('blood.txt','r')
dta_lines=file.readlines()
component_data = []
for line in dta_lines:
match=re.match(pattern,line)
if matc... | 20 | 28.35 | 135 | 11 | 179 | python | [{"finding_id": "codeql_py/redos_c09443fdd5845de3_d188cf84", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '#' and containing many repetition... | 3 | true | [
"CWE-1333",
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '#' and containing many repetitions of '.'.",
"This part of the regular expression may cause exponential backtracking on strings starting with '#.' and containing many repetitions of '.'.",
"This part of the regular... | [
5,
5,
5
] | [
null,
null,
null
] | [
54,
78,
101
] | [
61,
85,
108
] | |
2024-11-19T02:11:16.939244+00:00 | 1,692,341,537,000 | 1342a7ec82e89c569d045b8781fa215175c60907 | 3 | {
"blob_id": "1342a7ec82e89c569d045b8781fa215175c60907",
"branch_name": "refs/heads/master",
"committer_date": 1692341537000,
"content_id": "0c2eb3a02e6373a1f8110c2c1e3e2da8a532ba5c",
"detected_licenses": [
"MIT"
],
"directory_id": "c70dc64f3efbb8e824bac4b5cb29ce7cc95c3a75",
"extension": "py",
"fi... | 2.8125 | stackv2 | """
Nozomi
View Template Module
author: hugh@blinkybeach.com
"""
from nozomi.ancillary.configuration import Configuration
from typing import Optional
from nozomi.rendering.context import Context
try:
from jinja2 import Environment, FileSystemLoader
except ImportError:
Environment = None
FileSystemLoader = ... | 89 | 32.74 | 79 | 15 | 629 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_242a1148279fa476_c0520c57", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
53,
64
] | [
59,
70
] | [
43,
43
] | [
14,
14
] | |
2024-11-19T02:11:20.330096+00:00 | 1,535,603,015,000 | 32bf33d809b19439964f2cda6c2244a74adb8df9 | 2 | {
"blob_id": "32bf33d809b19439964f2cda6c2244a74adb8df9",
"branch_name": "refs/heads/master",
"committer_date": 1535603015000,
"content_id": "ad6aff762fdf9587c92919c92f345f8c80ce46b1",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "4d36cd2fb7c35c2356e05779dc96817405c7aed5",
"extension": "p... | 2.328125 | stackv2 | import sys
import os
import os.path
import glob
flatName = 'flat'
sensorName = 'sensor_list.txt'
cmdName = 'commands.txt'
indirName = 'inputs'
workdirName = 'work'
outdirName = 'output'
rundirName = 'run'
runBase = 'run_%03d.sh'
stdoutBase = 'stdout_%s.txt'
stderrBase = 'stderr_%s.txt'
def setup_visit(phosimdir, thr... | 63 | 28.25 | 69 | 12 | 597 | python | [{"finding_id": "codeql_py/overly-permissive-file_d2208766ef0d7759_7c295c06", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
47
] | [
null
] | [
9
] | [
31
] | |
2024-11-19T02:11:24.969598+00:00 | 1,574,503,632,000 | de557aadcf1c0591be31b40ce073af40ca7a0d81 | 2 | {
"blob_id": "de557aadcf1c0591be31b40ce073af40ca7a0d81",
"branch_name": "refs/heads/master",
"committer_date": 1574503632000,
"content_id": "fdc1dba83c4e436d8f7ea97b42810c8c5494b490",
"detected_licenses": [
"MIT"
],
"directory_id": "16accf32e4a8597b0d6c48fe9272ae9dfa604d19",
"extension": "py",
"fi... | 2.484375 | stackv2 | from flask import Flask, send_from_directory, request
import sqlite3
import datetime
import jinja2
app = Flask(__name__)
fDir = '/app/static'
db = "/database/database.db"
@app.route('/')
def index():
print("I should server", flush=True)
return send_from_directory(fDir, 'index.html')
@app.route('/submit', ... | 76 | 25.08 | 118 | 17 | 555 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a3b96768070dd4e4_ce01790f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
50
] | [
75
] | [
16
] | [
12
] | |
2024-11-19T02:11:41.766028+00:00 | 1,564,369,918,000 | fd42f9b6cfe970c405d8ddf0d8bef8178da92e98 | 2 | {
"blob_id": "fd42f9b6cfe970c405d8ddf0d8bef8178da92e98",
"branch_name": "refs/heads/master",
"committer_date": 1564370030000,
"content_id": "1338cbc3e5c07d47975c4ae16aeffc09b1646fa4",
"detected_licenses": [
"MIT"
],
"directory_id": "2f4bb1647e689546ba010ac4dbf56ff2092c57a6",
"extension": "py",
"fi... | 2.34375 | stackv2 | # coding = utf-8
# @time : 2019/6/20 9:06 PM
# @author : alchemistlee
# @fileName: api_utils.py
# @abstract:
import json
import requests
import hashlib
import time
def logging(fh, content):
print(content)
content += '\n'
fh.write(content)
def _encrypt(signStr):
hash_algorithm = hashlib.sha256()
hash_... | 76 | 19.36 | 69 | 12 | 500 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6a84e973761c8b29_445168bf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
21
] | [
null
] | [
25
] | [
48
] | |
2024-11-19T02:32:41.025133+00:00 | 1,431,204,055,000 | 9cc6f4b3e2a566e2a856b4f904db805be5312957 | 3 | {
"blob_id": "9cc6f4b3e2a566e2a856b4f904db805be5312957",
"branch_name": "refs/heads/master",
"committer_date": 1431204055000,
"content_id": "b85d0879bc9355b22691adf834f5ef54af37d6e2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d7081d1b7ac9d10239da95c15ca358eb6bda55f6",
"extension": "py"... | 2.671875 | stackv2 | '''
Restoring module
'''
import logging
import os
import shutil
import getpass
import tarfile
import leveldb
import ntpath
import backup
from myutils import decrypt_file, path_leaf
from ConfigParser import SafeConfigParser
from file_processor import FileProcessor
def restore(dropbox_path, destiantion, override):
'... | 82 | 33.1 | 79 | 14 | 653 | python | [{"finding_id": "codeql_py/tarslip_b15bedf5b0d47296_7ab33c94", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
36
] | [
null
] | [
5
] | [
8
] | |
2024-11-19T02:33:05.200541+00:00 | 1,534,485,507,000 | c58ae3f589efc76f05f4f446a70b5b3f1befef05 | 3 | {
"blob_id": "c58ae3f589efc76f05f4f446a70b5b3f1befef05",
"branch_name": "refs/heads/master",
"committer_date": 1534485507000,
"content_id": "d4ad700c921043121daf1983317ff0cd6ddfe6a9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bfa50d8807b79c0601f1613d607353a991083452",
"extension": "py"... | 2.546875 | stackv2 | # -*- coding: UTF-8 -*-
import os
import stat
import json
import paramiko
from utils.logger.log import log
from utils.config.path_tool import path
class rshell:
def __init__(self, conf):
self.config = conf
self.logger = log.get_logger(category="rsh")
self.ssh = None
def connect(self... | 118 | 35.05 | 155 | 21 | 988 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_752800f8e4f79b6f_accb7d79", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
31
] | [
null
] | [
9
] | [
66
] | |
2024-11-19T02:33:28.084287+00:00 | 1,513,223,041,000 | 2686f0aecb86c21fa699dfe0fa890390b4511034 | 3 | {
"blob_id": "2686f0aecb86c21fa699dfe0fa890390b4511034",
"branch_name": "refs/heads/master",
"committer_date": 1513223041000,
"content_id": "e5a45bbf81b0ee177be407525a8acacd873fe792",
"detected_licenses": [
"MIT"
],
"directory_id": "dace28e668417b034d561e9349b32f36b3db3265",
"extension": "py",
"fi... | 2.75 | stackv2 | import base64
import colorsys
import csv
import os
import numpy as np
from scipy.io import loadmat
from scipy.io import savemat
from hashlib import md5
from io import StringIO
from PIL import Image, ImageFont, ImageDraw
from flask import send_file
## Size of the dataset
DATA_SIZE = 30000
FONT = ImageFont.truetype(
... | 193 | 25.37 | 104 | 16 | 1,464 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_15cea24c42608be7_3dd34041", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](3) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](4) is used in a hashing algorithm (MD5) that is in... | [
23
] | [
null
] | [
14
] | [
36
] | |
2024-11-19T02:33:40.939495+00:00 | 1,614,038,886,000 | d5234b2d940add9dc4a28d65c70b3ebae46a9237 | 3 | {
"blob_id": "d5234b2d940add9dc4a28d65c70b3ebae46a9237",
"branch_name": "refs/heads/main",
"committer_date": 1614038886000,
"content_id": "98166dc29270b76c706b0df11c0c857ebba579e7",
"detected_licenses": [
"MIT"
],
"directory_id": "277e0057a6ce4539408d3e3685030788fe955a9c",
"extension": "py",
"file... | 2.796875 | stackv2 | from paramiko import SSHClient
from paramiko import AutoAddPolicy
from scp import SCPClient
#Define host's here
hosts = ('xx.xx.xx.xx','yy.yy.yy.yy');
ssh = SSHClient(); #Set SSH client
ssh.load_system_host_keys(); #Get SSH keys from know_hosts
ssh.set_missing_host_key_policy(AutoAddPolicy()); #If host is not recogni... | 29 | 27.83 | 90 | 11 | 207 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_3e8bf028fa27b7ef_3e67ff0d", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
10
] | [
null
] | [
null
] | [
49
] | |
2024-11-19T02:33:41.635721+00:00 | 1,285,671,810,000 | e59a40058d1a782135461679bda124d9fbf93db0 | 3 | {
"blob_id": "e59a40058d1a782135461679bda124d9fbf93db0",
"branch_name": "refs/heads/master",
"committer_date": 1285671810000,
"content_id": "dd20c467b73a0cd65f3a761c3bf824fb5ac3414d",
"detected_licenses": [
"MIT"
],
"directory_id": "4c726fd23c5eeb0d3e81798095a99c50060709b6",
"extension": "py",
"fi... | 2.703125 | stackv2 | #-*- coding: utf-8 -*-
"""
Generic utility classes and functions used by flow
"""
import os
import sys
import re
from jinja2 import Environment, FileSystemLoader
import flow
def copy_template(source, target, name, context):
"""
Copies a template file/directory structure to the specified
directory.
s... | 62 | 40.55 | 92 | 15 | 565 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c442dcb81b8d10ee_00d5dcfe", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
37
] | [
null
] | [
11
] | [
61
] | |
2024-11-19T02:46:18.370251+00:00 | 1,543,607,311,000 | 16583f35bb74acf78187ac24224951fd58777a6e | 3 | {
"blob_id": "16583f35bb74acf78187ac24224951fd58777a6e",
"branch_name": "refs/heads/master",
"committer_date": 1543607311000,
"content_id": "1fb45e6fe928f2b5815d2cced21b0c45fc2f626c",
"detected_licenses": [
"MIT"
],
"directory_id": "6d68ebc2a269adb94ac5c08410959f3ba42aec3a",
"extension": "py",
"fi... | 2.53125 | stackv2 | import os
from PyQt5.QtWidgets import (QWidget, QDialog, QDesktopWidget,
QLabel, QPushButton, QHBoxLayout, QVBoxLayout)
from PyQt5.QtCore import Qt, QPoint
from autobot.ui.loginwindow_ui import Ui_LoginForm
class LoginWindow(QWidget, Ui_LoginForm):
def __init__(self, parent=None):
... | 157 | 29.44 | 75 | 15 | 1,138 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_55d7628568fb8e0b_e50c20b8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
113
] | [
115
] | [
25
] | [
59
] | |
2024-11-19T02:46:24.622489+00:00 | 1,575,636,578,000 | 4411a46c67b37ec046bf32c1e0f77b4818919550 | 3 | {
"blob_id": "4411a46c67b37ec046bf32c1e0f77b4818919550",
"branch_name": "refs/heads/master",
"committer_date": 1575636578000,
"content_id": "b44f1b04cc5f9c2875e98e27de083711fc617f79",
"detected_licenses": [
"MIT"
],
"directory_id": "d56996a13e5ac4836f4410ca8dc87a34c9df4790",
"extension": "py",
"fi... | 3.203125 | stackv2 | # --------------
##File path for the file
file_path = file_path
def read_file(path):
file = open(path,"r")
sentence = file.read()
file.close()
return (sentence)
sample_message = read_file(file_path)
print(sample_message)
#Code starts here
# --------------
#Code starts here
file_path_1 = file_path_1
f... | 120 | 19.81 | 70 | 11 | 677 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_83f12d50e7a1aadd_bad58993", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec... | [
111,
27,
51,
74,
96,
116
] | [
null,
null,
null,
null,
null,
null
] | [
13,
7,
7,
7,
7,
7
] | [
23,
19,
50,
19,
19,
17
] | |
2024-11-19T02:59:06.968985+00:00 | 1,504,952,671,000 | 37e5bbd6569904b569e59d7b33fd05ecf70369d4 | 3 | {
"blob_id": "37e5bbd6569904b569e59d7b33fd05ecf70369d4",
"branch_name": "refs/heads/master",
"committer_date": 1504952671000,
"content_id": "d2759ef7c90b8b3f903c3cad2cd6bebfbac782ec",
"detected_licenses": [
"Unlicense"
],
"directory_id": "e229f9f32fec3d5ff3f671862084bca13e5599bf",
"extension": "py",... | 3.125 | stackv2 | # -*- coding: utf-8 -*-
import json
import sys
from urllib import parse, request
class dictionary(object):
legal_translations = ['en-ru', 'ru-en', 'en-en', 'ru-ru']
# Initialize function, get config from file
def __init__(self, api_url, api_key):
self.cfg_url = api_url
self.cfg_key = api_... | 49 | 28.37 | 76 | 18 | 336 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b7403649c6fed297_c1dae619", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
49
] | [
null
] | [
11
] | [
13
] | |
2024-11-19T02:59:07.200154+00:00 | 1,569,632,986,000 | fffa866661931cdf849ac7b50b39f92ded6cd471 | 2 | {
"blob_id": "fffa866661931cdf849ac7b50b39f92ded6cd471",
"branch_name": "refs/heads/master",
"committer_date": 1569632986000,
"content_id": "ccf70c7ad923853a275768521bebfa856254d6f0",
"detected_licenses": [
"MIT"
],
"directory_id": "ab4badf3d4bcd28e2f223f5534d0d315c220ac67",
"extension": "py",
"fi... | 2.4375 | stackv2 | import os
import re
import signal
from contextlib import contextmanager
import datetime
import boto3
from botocore.exceptions import ClientError, NoCredentialsError, HTTPClientError
from botocore.handlers import disable_signing
from botocore import UNSIGNED
from botocore.client import Config
import requests
SIZE_CHE... | 277 | 33.29 | 132 | 22 | 2,344 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_ec5bb16ae48fd0e3_7be035b1", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [.amazonaws.com](1) may be at an arbitrary position in ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [.amazonaws.com](1) may be at an arbitrary position in the sanitized URL."
] | [
99
] | [
null
] | [
8
] | [
36
] | |
2024-11-19T02:59:14.432776+00:00 | 1,592,464,632,000 | a0a1799d77e2fa2539a2439be2cf4d47cab9762d | 2 | {
"blob_id": "a0a1799d77e2fa2539a2439be2cf4d47cab9762d",
"branch_name": "refs/heads/master",
"committer_date": 1592464632000,
"content_id": "bdb4bebf239f1121d0301714d7eca51c73a08125",
"detected_licenses": [
"MIT"
],
"directory_id": "1f510848d1defae8d225f9eea150f41311d16717",
"extension": "py",
"fi... | 2.359375 | stackv2 | import logging.config
import os
from flasgger import Swagger
from flask import Flask, render_template, request
from flask_bootstrap import Bootstrap
from .pets import inference
TF_SERVER_HOST = os.environ.get('TF_SERVER_HOST', '0.0.0.0')
TF_SERVER_PORT = os.environ.get('TF_SERVER_PORT', '8501')
TF_MODEL_NAME = os.en... | 121 | 29.93 | 97 | 16 | 813 | python | [{"finding_id": "codeql_py/path-injection_edacd628b1081cd6_928e0287", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
80,
105
] | [
null,
null
] | [
28,
32
] | [
38,
42
] | |
2024-11-19T02:59:16.219664+00:00 | 1,586,255,770,000 | f3b6da56b743bc6e71beefa25df84dfeadf3caf9 | 3 | {
"blob_id": "f3b6da56b743bc6e71beefa25df84dfeadf3caf9",
"branch_name": "refs/heads/master",
"committer_date": 1586255770000,
"content_id": "17ba6d591e1c2323a817de23896ad59d9bf583da",
"detected_licenses": [
"MIT"
],
"directory_id": "f21027c9c5c38c712590c5b6369c1d0aee5dfccb",
"extension": "py",
"fi... | 3 | stackv2 | # Getting Reddit Client ID and Client Secret
import os
REDDIT_CLIENT = os.environ.get('REDDIT_CLIENT')
REDDIT_SECRET = os.environ.get('REDDIT_SECRET')
REDDIT_USER_PW = os.environ.get('REDDIT_USER_PW')
REDDIT_USER_NAME= os.environ.get('REDDIT_USER_NAME')
# Testing if the config exists
assert REDDIT_CLIENT != None; asse... | 114 | 34.89 | 122 | 14 | 1,008 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eb22f200e7000e29_29915182", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
10
] | [
null
] | [
7
] | [
96
] | |
2024-11-19T02:59:26.223020+00:00 | 1,548,951,873,000 | bd8c0baf78c704de3e5ea06eaeed05c1aba13fd5 | 2 | {
"blob_id": "bd8c0baf78c704de3e5ea06eaeed05c1aba13fd5",
"branch_name": "refs/heads/master",
"committer_date": 1548951877000,
"content_id": "21903e5f291e54ce9a79474e3aea67f05df420ac",
"detected_licenses": [
"MIT"
],
"directory_id": "c0c51d3a35564136fc2be0f4f4e892383ba5da65",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/env python3
""" Builds snippets from terraform's documentation """
import os
import re
import json
import click
import yamldown
from yaml.parser import ParserError
from yaml.scanner import ScannerError
import mistune
from jinja2 import Template
NAME_REGEX = re.compile(r'`([a-z_]+)`')
OPTIONAL_REGEX = re.com... | 156 | 35.6 | 83 | 16 | 1,211 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8cceeef58ffe80ab_4720bee2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
153
] | [
null
] | [
12
] | [
38
] | |
2024-11-19T02:59:31.412485+00:00 | 1,587,974,576,000 | 234ac03a718aaee945ffe9c6707fc1fb22b7727d | 3 | {
"blob_id": "234ac03a718aaee945ffe9c6707fc1fb22b7727d",
"branch_name": "refs/heads/master",
"committer_date": 1587974576000,
"content_id": "153a274d43f8add22753c6cd71540da071bbcc7a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7e4b6e6aa20557091f112673b936a20ed9bce0db",
"extension": "py"... | 2.625 | stackv2 | #!/usr/bin/python3
import paramiko,time,sys
# using as ssh client
client=paramiko.SSHClient()
# auto adjust host key verification with yes or no
client.set_missing_host_key_policy(paramiko.AutoAddPolicy())
# time for connecting to remote Cisco IOS
addr=sys.argv[1] # first argument as IP
u=sys.argv[2] ... | 35 | 27.29 | 81 | 10 | 274 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_4c9a6a9f407c5295_c6e0054f", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
8
] | [
null
] | [
null
] | [
61
] | |
2024-11-19T03:11:57.626904+00:00 | 1,631,558,348,000 | a0ce2d6ab3bd39ae30daf711cfb56045c582a99f | 2 | {
"blob_id": "a0ce2d6ab3bd39ae30daf711cfb56045c582a99f",
"branch_name": "refs/heads/master",
"committer_date": 1631558348000,
"content_id": "a6d52778c5c771f883441f848e7507de8dbdc109",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c8ca395616178167b8f414fc59ee7b6fb6b2c18a",
"extension": "py"... | 2.328125 | stackv2 | """Define a manager to interact with SmartCocoon"""
import asyncio
import paho.mqtt.client as mqtt
import uuid
import traceback
from aiohttp import ClientSession, ClientTimeout
from aiohttp.client_exceptions import ClientError
import async_timeout
from datetime import datetime, timedelta
import logging
from typing i... | 145 | 30.53 | 109 | 19 | 952 | python | [{"finding_id": "codeql_py/request-without-cert-validation_40abe98be878b220_1a519225", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
100
] | [
null
] | [
34
] | [
110
] | |
2024-11-19T01:26:55.218992+00:00 | 1,607,226,303,000 | 54f2698715f2a2e63daab9c8f24757f4ca4320fc | 3 | {
"blob_id": "54f2698715f2a2e63daab9c8f24757f4ca4320fc",
"branch_name": "refs/heads/main",
"committer_date": 1607226303000,
"content_id": "1fd381401a3940a4d49cf0ab2670699fda8186a6",
"detected_licenses": [
"MIT"
],
"directory_id": "504a8c45c99e0a8457b5eb7b592f63335c0204a4",
"extension": "py",
"file... | 3.078125 | stackv2 | list_of_inputs = open("./input.txt").readlines()
cleaned_list = []
for item in list_of_inputs:
cleaned_list.append(item.strip())
correct_passwords_count = 0
for item in cleaned_list:
chCorrect = 0
pCurrent = item.split(" ")
pInfo = pCurrent[0]
pTimesMin, pTimesMax = pInfo.split ("-")
pLetter ... | 34 | 21.59 | 61 | 12 | 208 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6fabe3b8a158d801_54bde58a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
34
] | [
null
] | [
7
] | [
30
] | |
2024-11-19T01:27:02.434379+00:00 | 1,596,214,083,000 | ae7ddb32fe8bbeeea221ffabd9c2fb9fdb63835f | 3 | {
"blob_id": "ae7ddb32fe8bbeeea221ffabd9c2fb9fdb63835f",
"branch_name": "refs/heads/master",
"committer_date": 1596214083000,
"content_id": "7a5b193fe10e2d343d7a205391857c916efc428d",
"detected_licenses": [
"MIT"
],
"directory_id": "c68366fd753ac3d8fe051c0967025e24f3f0b4cc",
"extension": "py",
"fi... | 3.171875 | stackv2 | # Copyright 2012 Google Inc. All Rights Reserved.
# -*- coding: utf-8 -*-
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless require... | 134 | 32.83 | 80 | 14 | 1,078 | python | [{"finding_id": "codeql_py/bad-tag-filter_4ba24c7023444798_e7182693", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match upper case <SCRIPT> tags."
] | [
82
] | [
null
] | [
33
] | [
70
] | |
2024-11-19T01:27:03.250685+00:00 | 1,609,701,260,000 | 725353ca468385cbf3acc5506ab215e909047bab | 3 | {
"blob_id": "725353ca468385cbf3acc5506ab215e909047bab",
"branch_name": "refs/heads/main",
"committer_date": 1609701260000,
"content_id": "f5218eaa95b68454aa10fc1c44cfe5b992fc4ddc",
"detected_licenses": [
"MIT"
],
"directory_id": "31e02058caaf18935d11f851f242a4d23d22ef5e",
"extension": "py",
"file... | 3.4375 | stackv2 | password_valids = 0
with open("input.txt", "r") as f:
lines = f.readlines()
for line in lines:
position, word, password = line.split()
position1, position2 = position.split("-")
position1, position2 = int(position1), int(position2) # convert str to int
word = word.replace(":", ... | 25 | 28.24 | 82 | 11 | 180 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e4f3122d6bd9d175_93a993a7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
25
] | [
null
] | [
7
] | [
44
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.