added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T19:24:05.163373+00:00 | 1,630,247,757,000 | 7ef66a3bf44d9e133b68704b4e573dce0cd9ae97 | 3 | {
"blob_id": "7ef66a3bf44d9e133b68704b4e573dce0cd9ae97",
"branch_name": "refs/heads/main",
"committer_date": 1630247757000,
"content_id": "ceb2784f2592b4bc2efbcf815be8bb8fa66e9fff",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5f0d45d34fe6fb2aef9cf7cc5f19ab82dae8d761",
"extension": "py",
... | 3.078125 | stackv2 | """ Nitro Enclave and Attestation integration with KMS Sample """
import base64
import json
import socket
from Crypto.Cipher import AES
from kms import NitroKms
ENCLAVE_PORT = 5000
"""Client-side AES encryption"""
def add_to_16(value):
while len(value) % 16 != 0:
value += '\0'
return str.encode(valu... | 109 | 39.07 | 123 | 16 | 1,057 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_a5516ba9df7fa68e_496a32ec", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
21,
29
] | [
null,
null
] | [
19,
26
] | [
47,
55
] | |
2024-11-18T19:58:18.429428+00:00 | 1,620,333,344,000 | f77ee433b3e6a62302d092d43bedcd43d3e361e5 | 3 | {
"blob_id": "f77ee433b3e6a62302d092d43bedcd43d3e361e5",
"branch_name": "refs/heads/master",
"committer_date": 1620333344000,
"content_id": "329aeb9ee7e2955eccf868869506912a5901c761",
"detected_licenses": [
"MIT"
],
"directory_id": "98e15084f6103425372690a42cdffee46f3bdb8a",
"extension": "py",
"fi... | 2.609375 | stackv2 | import json
import logging
import os
import re
import stat
from cryptography.fernet import Fernet
# Module default logger
logger = logging.getLogger(__name__)
class SecureStorage:
NAME_PATTERN = re.compile(r"^[\w][\w-]*$")
NS_PATTERN = re.compile(r"^(?:\.|[\w][\w-]*)(?:/[\w][\w-]*)*$")
@staticmethod
... | 96 | 36.55 | 96 | 17 | 764 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_35089cd3ae79f6fc_4102c52f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text."
] | [
82
] | [
null
] | [
24
] | [
41
] | |
2024-11-18T19:58:21.778073+00:00 | 1,420,617,659,000 | 15f86f6ed00b915fe33177006a65db0fbbdc1fc8 | 2 | {
"blob_id": "15f86f6ed00b915fe33177006a65db0fbbdc1fc8",
"branch_name": "refs/heads/master",
"committer_date": 1420617659000,
"content_id": "0fd5b87af19677c5a713b166ffbd41bc6ebb9e8e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "58b63d2afc9468e045b36aac5e3ec8cf80f1bf29",
"extension": "py"... | 2.3125 | stackv2 | # coding: utf-8
#
# Copyright (c) Alexandr Emelin. BSD license.
# All rights reserved.
#
import tornado.gen
import tornado.web
import tornado.httpclient
import json
import os
from urllib.parse import urlencode, parse_qsl
def hostname():
# self
# return 'http://127.0.0.1:9430/'
# heroku
return 'http:... | 148 | 28.21 | 79 | 21 | 971 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c817682a82acdf88_196d8816", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
101
] | [
null
] | [
51
] | [
66
] | |
2024-11-18T18:39:27.972416+00:00 | 1,599,369,800,000 | d68e91f746df474780c799c7632292aea472c35c | 3 | {
"blob_id": "d68e91f746df474780c799c7632292aea472c35c",
"branch_name": "refs/heads/master",
"committer_date": 1599369800000,
"content_id": "382435c0c9ac4d2c0ee8115741401a76bf78a17b",
"detected_licenses": [
"MIT"
],
"directory_id": "f1578c69df2b3a38fe23d0d979c5d8ef07d93c4e",
"extension": "py",
"fi... | 2.703125 | stackv2 | """Core Appliction.
This module houses the core Flask application.
"""
import os
import json
import logging
import boto3.session
import watchtower
from flask import Flask, g, request
from datetime import datetime
from flask_restful import Api
from matching.api import ComputeMatch
from matching.config import Configura... | 92 | 34.34 | 115 | 13 | 721 | python | [{"finding_id": "codeql_py/log-injection_a281f9f2ef4e7af5_d38736ef", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
70,
72
] | [
null,
null
] | [
21,
22
] | [
25,
26
] | |
2024-11-18T18:39:28.793915+00:00 | 1,411,161,588,000 | 08f3f4f19217e082d6b34139d7a7aff608db7e9e | 3 | {
"blob_id": "08f3f4f19217e082d6b34139d7a7aff608db7e9e",
"branch_name": "refs/heads/master",
"committer_date": 1411161588000,
"content_id": "c7065c354485e931e529b89ca64c88af81a13a22",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "b38c8ec67ceeb5672bba862d91fb58d789f7f100",
"extension": "p... | 3.0625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import sys
import Crypto.Random
from Crypto.Cipher import AES
import hashlib
import msgpack
import zlib
import cPickle as pickle
__all__ = ["encrypt", "decrypt"]
# Salt size in bytes
SALT_SIZE = 32
# Number of iterations in the key generation
NUMBER_OF_ITERATIONS = 20
... | 73 | 27.47 | 88 | 12 | 520 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_7478c62c4982551f_430042ab", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
54,
65
] | [
null,
null
] | [
18,
28
] | [
50,
64
] | |
2024-11-18T18:40:06.298420+00:00 | 1,541,791,605,000 | b5f154f1aeee1b89585e11c5e90c8ec0da98edc2 | 3 | {
"blob_id": "b5f154f1aeee1b89585e11c5e90c8ec0da98edc2",
"branch_name": "refs/heads/master",
"committer_date": 1541792392000,
"content_id": "66038906d33cb54337c115adbeaf995bd2d1ba73",
"detected_licenses": [
"MIT"
],
"directory_id": "4677d62e020cdfdcd4e641dde7564b4fef542640",
"extension": "py",
"fi... | 2.828125 | stackv2 | """Code for scraping from mamahd."""
import logging
import multiprocessing as mp
import socket
import time
import requests
from bs4 import BeautifulSoup
from streamscrape.utils import get_ip_address
logger = logging.getLogger(__name__)
HOME = "https://www.mamahd.org"
def _scrape_event(url):
"""Scrape a specif... | 79 | 28.75 | 81 | 21 | 528 | python | [{"finding_id": "codeql_py/request-without-cert-validation_309a9a3e30144752_a8017551", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
26
] | [
null
] | [
12
] | [
43
] | |
2024-11-18T20:52:22.339396+00:00 | 1,537,900,954,000 | b470e29405ac9c8afb65c84ca9b320cb84cd369d | 3 | {
"blob_id": "b470e29405ac9c8afb65c84ca9b320cb84cd369d",
"branch_name": "refs/heads/master",
"committer_date": 1537900954000,
"content_id": "bcccbd4f16fdd3cd4229221667ae1b55fcab8749",
"detected_licenses": [
"MIT"
],
"directory_id": "c0fea19a17ac82c3ac5fff9c76a488c2d9088130",
"extension": "py",
"fi... | 2.765625 | stackv2 | import mutagen
import json
import ntpath
import urllib.request
import urllib
import requests
import tkinter
from tkinter import filedialog
import os
apiKey = "9a3fd8b910073e56b47d0c4ddbdd984a"
def getFile():
root = tkinter.Tk()
root.withdraw() #use to hide tkinter window
startDir = "::{20D04FE0-3AEA-1069... | 94 | 31.27 | 89 | 19 | 812 | python | [{"finding_id": "codeql_py/overly-permissive-file_d462060f7d448101_50f4aa17", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
76
] | [
null
] | [
5
] | [
29
] | |
2024-11-18T20:52:25.497995+00:00 | 1,688,142,598,000 | 1fcf1da718d6fde5bfa9f7b18fa652e11d89e9db | 2 | {
"blob_id": "1fcf1da718d6fde5bfa9f7b18fa652e11d89e9db",
"branch_name": "refs/heads/main",
"committer_date": 1688142598000,
"content_id": "99987b7702b69821dbd8c0b8400ec2b8354d8100",
"detected_licenses": [
"MIT"
],
"directory_id": "06cb7dc8d34b13de8c3ab617089a986ce91d9510",
"extension": "py",
"file... | 2.4375 | stackv2 | """
Implements auth methods
"""
from .err import OperationalError
try:
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives import serialization, hashes
from cryptography.hazmat.primitives.asymmetric import padding
_have_cryptography = True
except ImportError:
... | 267 | 26.78 | 129 | 15 | 1,984 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_bc3426f4e8ce45d9_eadfb0c4", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
88,
199
] | [
null,
null
] | [
24,
25
] | [
32,
33
] | |
2024-11-18T19:49:10.709418+00:00 | 1,619,723,464,000 | ab21c5345127751b6dc2ee441e9a0e2315c4008e | 4 | {
"blob_id": "ab21c5345127751b6dc2ee441e9a0e2315c4008e",
"branch_name": "refs/heads/main",
"committer_date": 1619723464000,
"content_id": "bb925a51731c14936eff3bc148967ecec6438fa6",
"detected_licenses": [
"MIT"
],
"directory_id": "444dac2675b47446222d2d3c2e78d4cf9e8d5daf",
"extension": "py",
"file... | 3.875 | stackv2 | # jogo de Forca
secreta = 'parangaricutirrimirruaro'
digitados = []
chance = 15
while True:
if chance <= 0:
print(f'Você tentou {chance} e perdeu!')
break
letra = input('Digite uma letra: ')
if len(letra) > 1:
print('Digite apenas uma letra.!!')
continue
digitados.appen... | 35 | 29.29 | 86 | 12 | 302 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3353bc6cd2373d0f_13b1912f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (secret)](5) a... | [
28,
31
] | [
null,
null
] | [
15,
15
] | [
86,
68
] | |
2024-11-18T19:49:16.566722+00:00 | 1,485,295,299,000 | 373f4aa5b535ce57ebe76fedf78ca8a437f71f51 | 2 | {
"blob_id": "373f4aa5b535ce57ebe76fedf78ca8a437f71f51",
"branch_name": "refs/heads/master",
"committer_date": 1485295299000,
"content_id": "b92a78b673f18797b8a8854b5b738c55a7367d92",
"detected_licenses": [
"MIT"
],
"directory_id": "44f6db4962ff30d21bf449d03f9a7c6d35411a24",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python
# encoding: utf-8
import praw
import argparse
import urllib
import os
from imguralbum import *
import re
def is_valid(thing):
# Could make this a single boolean statement
# but that's a maintenance nightmare.
if not thing.is_self:
if thing.over_18 and args.no_nsfw:
... | 163 | 33.41 | 122 | 16 | 1,323 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fa98edd6ad95db45_b26902c5", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [imgur.com](1) may be at an arbitrary position in the s... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [imgur.com](1) may be at an arbitrary position in the sanitized URL."
] | [
19
] | [
null
] | [
12
] | [
36
] | |
2024-11-18T20:15:50.353789+00:00 | 1,643,001,480,000 | b1ef3a1416ea80bc9fe363cedbb90da88999196a | 3 | {
"blob_id": "b1ef3a1416ea80bc9fe363cedbb90da88999196a",
"branch_name": "refs/heads/master",
"committer_date": 1643001480000,
"content_id": "422dc455d46fb46666af5af4001085984524c541",
"detected_licenses": [
"MIT"
],
"directory_id": "97ed7b9099c01f0ea4744db40c2178606ccfcf77",
"extension": "py",
"fi... | 2.65625 | stackv2 | # -*- coding: utf-8 -*-
"""
fileparser
~~~~~~~~~~
parse SQL file making use of special comments
that defines dependencies & variables...
:copyright: (c) 2014 by sc AmvTek srl
:email: devel@amvtek.com
"""
import re
from os.path import abspath
from jinja2 import Environment # see PyPI jinja2
... | 127 | 26.74 | 77 | 15 | 847 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_65cc9c065a17d6e3_12a46022", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
119
] | [
null
] | [
14
] | [
54
] | |
2024-11-18T20:15:51.410093+00:00 | 1,596,003,947,000 | cf9664d376e1c6ad00148d6b08dc70554e621dab | 3 | {
"blob_id": "cf9664d376e1c6ad00148d6b08dc70554e621dab",
"branch_name": "refs/heads/master",
"committer_date": 1596003947000,
"content_id": "1f8616a7a0f0f9920b1e7dee49c54953278e7256",
"detected_licenses": [
"MIT"
],
"directory_id": "a1d7739ddf09654f6b6f3e2266309cfb3efb45a2",
"extension": "py",
"fi... | 2.8125 | stackv2 |
from flask import Flask, redirect, url_for, request, jsonify
from firebase_admin import credentials, firestore, initialize_app
import json
app = Flask(__name__)
cred = credentials.Certificate('key.json')
default_app = initialize_app(cred)
db = firestore.client()
patient_details = db.collection('patient_details')
me... | 173 | 30.58 | 122 | 15 | 1,228 | python | [{"finding_id": "codeql_py/flask-debug_249ecc33050139a5_db8d2421", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 6 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a ... | [
173,
66,
88,
113,
138,
157
] | [
null,
null,
null,
null,
null,
null
] | [
5,
16,
16,
16,
16,
16
] | [
24,
20,
20,
20,
20,
20
] | |
2024-11-18T20:15:54.592245+00:00 | 1,531,375,923,000 | ff0ba688e2a10d923a67bb5673faea210d8a402a | 3 | {
"blob_id": "ff0ba688e2a10d923a67bb5673faea210d8a402a",
"branch_name": "refs/heads/master",
"committer_date": 1531375923000,
"content_id": "72c12d20ee26237cc97edaebfb97d01e3a81cc0a",
"detected_licenses": [
"MIT"
],
"directory_id": "039079c36db45e57e21d61f8c69376e182a175e5",
"extension": "py",
"fi... | 2.703125 | stackv2 | #!/usr/bin/python3
import serial
import time
from datetime import datetime
import os
import logging
import paramiko
import traceback
from config import ConsoleConfig
from common import utc_str
class Console:
def __init__(self):
self.iteration = 0
self.logfile = 'console.log' # TODO: Make this per ... | 133 | 30.49 | 114 | 21 | 909 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_d02d939fcbbd8579_c13cca80", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 3 | true | [
"CWE-295",
"CWE-312",
"CWE-312"
] | [
"py/paramiko-missing-host-key-validation",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
91,
54,
69
] | [
null,
null,
null
] | [
9,
23,
30
] | [
74,
45,
80
] | |
2024-11-18T19:38:03.351735+00:00 | 1,421,697,521,000 | b5c8fcb562c76e28fdcf121bbb0496fd9ceece23 | 2 | {
"blob_id": "b5c8fcb562c76e28fdcf121bbb0496fd9ceece23",
"branch_name": "refs/heads/master",
"committer_date": 1421697521000,
"content_id": "a3898923c9fcaad18c5b2d1101fc60aba0e833ca",
"detected_licenses": [
"MIT"
],
"directory_id": "a93153ba99748acbb0ced2730a49dd60948de6d2",
"extension": "py",
"fi... | 2.40625 | stackv2 | import ferbuy
import random
from flask import Flask
from flask import request
from flask import render_template
app = Flask(__name__)
ferbuy.site_id = 1000
ferbuy.secret = 'your_secret'
ferbuy.env = 'demo'
@app.route('/')
def redirect():
data = {
'reference': 'Transaction{0}'.format(random.randint(10000... | 50 | 27.36 | 75 | 13 | 363 | python | [{"finding_id": "codeql_py/flask-debug_ab29b0b30b6b4708_d0350ec1", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
50,
46
] | [
null,
47
] | [
5,
12
] | [
40,
52
] | |
2024-11-18T19:38:41.971217+00:00 | 1,530,275,987,000 | 3ec8bac65183b3cccce9ccb8870e277cb3c0a745 | 3 | {
"blob_id": "3ec8bac65183b3cccce9ccb8870e277cb3c0a745",
"branch_name": "refs/heads/master",
"committer_date": 1530275987000,
"content_id": "009e7174900055474f5a3374549caec2729a994e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fe747dcc17d3890e90046489a56d7f0fc88624a3",
"extension": "py"... | 2.5625 | stackv2 | #!/usr/bin/env python
from __future__ import unicode_literals
import requests
import logging
import sys
import urllib
import StringIO
import pycurl
import json
import time
# setup logging
logging.basicConfig(stream=sys.stdout,level = logging.DEBUG)
logger = logging.getLogger(__name__)
class SSLLabsAPI():
"""
... | 152 | 36.82 | 171 | 20 | 1,275 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b241d0418903f43c_1040cd99", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
49,
51
] | [
null,
null
] | [
28,
29
] | [
117,
97
] | |
2024-11-18T20:10:35.804180+00:00 | 1,517,514,106,000 | 89cf69913f7aee92bdb41895dd6805749f401b95 | 3 | {
"blob_id": "89cf69913f7aee92bdb41895dd6805749f401b95",
"branch_name": "refs/heads/master",
"committer_date": 1517514106000,
"content_id": "1465e7c4208155d176e4802f83ebd8f1dea85428",
"detected_licenses": [
"MIT"
],
"directory_id": "1aefb8c1ca02c00a7693f553a842b0791204f3ef",
"extension": "py",
"fi... | 3.296875 | stackv2 | from flask import Flask
import MySQLdb
import gc
app = Flask(__name__)
app.debug = True
# database connection method
def connection():
conn = MySQLdb.connect(
host = "localhost",
user = "testuser",
passwd = "testpassword",
db = "testflask"
)
c = conn.cursor()
return... | 107 | 24.93 | 90 | 15 | 690 | python | [{"finding_id": "codeql_py/reflective-xss_c3623ecaa0e2843c_5695473a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).\nCross-site scripting vulnerability due to a [user-provided value](3).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
67,
88
] | [
68,
null
] | [
16,
20
] | [
37,
77
] | |
2024-11-18T20:10:51.924565+00:00 | 1,690,193,428,000 | 404895c889ab03e582b7bfe87dd5382ceb282b24 | 2 | {
"blob_id": "404895c889ab03e582b7bfe87dd5382ceb282b24",
"branch_name": "refs/heads/master",
"committer_date": 1690193428000,
"content_id": "e0b71274271076e1feefca83f35c0dade0238b0f",
"detected_licenses": [
"MIT"
],
"directory_id": "5127903ecf06ee0cc2d3b0863e8597c244651cc1",
"extension": "py",
"fi... | 2.359375 | stackv2 | import argparse
import shutil
import tempfile
import time
from collections import defaultdict
from pathlib import Path
from typing import Union
from tqdm import tqdm
from app.attack.convert import split_by_essid
from app.attack.hashcat_cmd import HashcatCmdCapture, HashcatCmdStdout
from app.config import ESSID_TRIED
... | 204 | 35.89 | 127 | 20 | 1,910 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5d85009e88800f34_31267c4c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
197
] | [
null
] | [
38
] | [
50
] | |
2024-11-18T20:11:05.212264+00:00 | 1,477,428,706,000 | 16e983bd8e7dd57ebc21d42637e72a6c28ad09c7 | 2 | {
"blob_id": "16e983bd8e7dd57ebc21d42637e72a6c28ad09c7",
"branch_name": "refs/heads/master",
"committer_date": 1477428706000,
"content_id": "92ce5b645272c3035b3369e17c84d059467fe992",
"detected_licenses": [
"MIT"
],
"directory_id": "f354fcaa962d34323b538a4abc15496f7e0dcf30",
"extension": "py",
"fi... | 2.421875 | stackv2 | from flask import Flask, render_template, request, session, redirect, url_for
import urllib2, json, userdb
from data import hd
app = Flask(__name__)
key="AIzaSyDm8rcyz9i4d8p2QvmCAumvNTM1V9CfmDA"
@app.route('/')
def root():
return render_template("index.html", title = 'Main')
##V link to show nearby hospitals + w... | 101 | 32.65 | 169 | 19 | 869 | python | [{"finding_id": "codeql_py/flask-debug_6a9cd4588d88a951_aae97b4e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
99,
22
] | [
null,
null
] | [
5,
13
] | [
24,
33
] | |
2024-11-18T20:26:28.886239+00:00 | 1,595,230,245,000 | 4651954353746daf670909601456c5be253e7e7a | 3 | {
"blob_id": "4651954353746daf670909601456c5be253e7e7a",
"branch_name": "refs/heads/master",
"committer_date": 1595230245000,
"content_id": "3ec303faa46baa0a446b99ea47d6947753949014",
"detected_licenses": [
"MIT"
],
"directory_id": "afaa42ccdd2ce4277a6a5d21f7fb59c7645f3c10",
"extension": "py",
"fi... | 3.296875 | stackv2 | # --------------
##File path for the file
#file_path
def read_file(path):
file=open(path,'r')
sentence=file.read()
file.close()
return(sentence)
#Code starts here
sample_message=read_file(file_path)
message_1=read_file(file_path_1)
message_2=read_file(file_path_2)
print(message_1)
print(messag... | 92 | 20.48 | 70 | 12 | 527 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6ec8a81440761d65_21bd0311", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec... | [
84,
39,
72,
88
] | [
null,
null,
null,
null
] | [
16,
7,
7,
7
] | [
26,
19,
19,
17
] | |
2024-11-18T20:26:46.949282+00:00 | 1,624,540,493,000 | ee28205bac602cadd7e3e3180d5df79fc4623716 | 3 | {
"blob_id": "ee28205bac602cadd7e3e3180d5df79fc4623716",
"branch_name": "refs/heads/main",
"committer_date": 1624540493000,
"content_id": "b84486f9e2d86580d47b09a43ae69309399c370d",
"detected_licenses": [
"MIT"
],
"directory_id": "65f856bb3c782fe2fec794192260d5b7aa997ef3",
"extension": "py",
"file... | 2.9375 | stackv2 | """验证相关"""
import base64
from Crypto.Cipher import DES
from rest_framework.authentication import BaseAuthentication
from rest_framework import exceptions
class WSCIsLoginAuthenticate(BaseAuthentication):
"""微商城是否登录验证"""
def authenticate_header(self, request):
"""不设置验证头就会返回状态码403"""
return "wsc... | 110 | 24.95 | 76 | 17 | 682 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_255452f9c1e61559_d8578f30", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptograph... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used."
] | [
65,
77
] | [
null,
null
] | [
26,
16
] | [
50,
43
] | |
2024-11-18T20:26:47.626598+00:00 | 1,559,699,664,000 | ca1d08eea855c5d18d0835be838adeac2884f9e9 | 2 | {
"blob_id": "ca1d08eea855c5d18d0835be838adeac2884f9e9",
"branch_name": "refs/heads/master",
"committer_date": 1559699664000,
"content_id": "000b02a3b2e5c8e962ac55857ad3dd3289ec78ca",
"detected_licenses": [
"MIT"
],
"directory_id": "9a06651e7d37f360686fcfb53cede78552ce07d8",
"extension": "py",
"fi... | 2.375 | stackv2 |
# Python dependencies
#
from __future__ import print_function # Python 2
#
import copy as copy
import functools as functools
import json as json
import logging as logging
import os as os
import time as time
try:
# Python 3
from urllib.parse import urljoin
except ImportError:
# Python 2
from urlparse i... | 213 | 26.43 | 80 | 15 | 1,323 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_936aaeda5b109fb3_3a872deb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (passw... | [
144,
188
] | [
148,
192
] | [
13,
13
] | [
14,
14
] | |
2024-11-18T20:26:58.658531+00:00 | 1,668,435,031,000 | 18c83be71a8f183087ad8c307a0a479020c41ad3 | 3 | {
"blob_id": "18c83be71a8f183087ad8c307a0a479020c41ad3",
"branch_name": "refs/heads/master",
"committer_date": 1668435031000,
"content_id": "320744d0dee21d62aa2961991fe984f7f7c926e9",
"detected_licenses": [
"MIT"
],
"directory_id": "3ddbf268e44eaa24811b3d6c16fbd3055d3918d8",
"extension": "py",
"fi... | 2.6875 | stackv2 | '''
Download list from https://mdsched.healthway.com.ph/
to excel
'''
import re
import requests
from time import sleep
from bs4 import BeautifulSoup
from requests.models import Response
from requests.sessions import session
from urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warn... | 56 | 26.62 | 114 | 14 | 360 | python | [{"finding_id": "codeql_py/request-without-cert-validation_9b0ad9f688d391af_9cbf7b3b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
19,
42
] | [
null,
null
] | [
12,
24
] | [
42,
115
] | |
2024-11-18T20:52:05.974646+00:00 | 1,586,020,929,000 | fd98a23dfea36ed0e115613abaa478630d22ad89 | 3 | {
"blob_id": "fd98a23dfea36ed0e115613abaa478630d22ad89",
"branch_name": "refs/heads/master",
"committer_date": 1586020929000,
"content_id": "5425da284225f65779598023611dccc83287c6ea",
"detected_licenses": [
"MIT"
],
"directory_id": "11d604294e50d2c7ba3bd64c718e80646d3c16fd",
"extension": "py",
"fi... | 2.5625 | stackv2 | # Code for the main server NodeMCU sends requests to
from flask import Flask, request, jsonify
from publisher import AgriIOTPublisher
import json
pub = AgriIOTPublisher()
topic = pub.getExistingTopicPath("main")
server = Flask(__name__)
@server.route("/", methods=["GET"])
def index():
return "<h3>AgriIOT Clou... | 55 | 23.76 | 67 | 14 | 320 | python | [{"finding_id": "codeql_py/stack-trace-exposure_de4d2f711a12447d_375ab269", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
51,
55
] | [
null,
null
] | [
24,
5
] | [
34,
38
] | |
2024-11-18T20:52:39.694616+00:00 | 1,580,889,011,000 | 4dc8bb3e0f5bcbf2a2ac3ad8adcc16b268796d84 | 3 | {
"blob_id": "4dc8bb3e0f5bcbf2a2ac3ad8adcc16b268796d84",
"branch_name": "refs/heads/master",
"committer_date": 1580889011000,
"content_id": "6e8f174a49ea0f1a292a2d08929eee3e243be135",
"detected_licenses": [
"MIT"
],
"directory_id": "b05a7117e391c75bb7b90e92fa9a858f78d2e79a",
"extension": "py",
"fi... | 2.859375 | stackv2 | import urllib.request
import json
from .models import Source, Article
# Getting api key
api_key = None
# Getting the news base url
base_url = None
# Getting the article base url
article_base_url = None
def configure_request(app):
global api_key,base_url,article_base_url
api_key = app.config['NEWS_API_KEY']... | 113 | 27.73 | 94 | 12 | 647 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a1dc6c29f211950f_3cd1c429", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
73
] | [
null
] | [
11
] | [
27
] | |
2024-11-18T20:52:56.288244+00:00 | 1,663,892,496,000 | b3f8fae4fe8d29f0770633fb8b1fa743164ac1af | 3 | {
"blob_id": "b3f8fae4fe8d29f0770633fb8b1fa743164ac1af",
"branch_name": "refs/heads/master",
"committer_date": 1663892496000,
"content_id": "dd15a4e5b8741e9e525509553290b5677a8d4517",
"detected_licenses": [
"MIT"
],
"directory_id": "c2bf01adb17d5ed969bac7f35088edb69d4bcdd1",
"extension": "py",
"fi... | 2.609375 | stackv2 | import logging
from flask import Blueprint, redirect, request, url_for, render_template
from flask_login import current_user, login_user, logout_user, login_required
from ..database.models import User
logger = logging.getLogger(__name__)
web = Blueprint('web', __name__, url_prefix='/')
@web.route('')
@login_requi... | 73 | 35.9 | 95 | 17 | 533 | python | [{"finding_id": "codeql_py/log-injection_9e6d60355b430a74_4f95e5bc", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 4 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
21,
31,
33,
52
] | [
null,
null,
null,
null
] | [
18,
30,
26,
22
] | [
74,
42,
78,
34
] | |
2024-11-18T19:02:34.418170+00:00 | 1,607,574,201,000 | 6d97ecd12017bb6e14444bef3adb5b36f63a13e4 | 2 | {
"blob_id": "6d97ecd12017bb6e14444bef3adb5b36f63a13e4",
"branch_name": "refs/heads/master",
"committer_date": 1607574201000,
"content_id": "38ab2166d380e57b33f7ba3cd02bbe4430351ea7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9750b695e84e5a156ad11d5cbd3e34dc46af2a0b",
"extension": "py"... | 2.4375 | stackv2 | import datetime
from flask import Blueprint, current_app, request
from flask_restful import abort, Api, reqparse, Resource
from sourcehub import api_url, error
from sourcehub.database import db
from sourcehub.auth import authenticate, authenticate_app, authenticate_masterkey, authenticate_session
from sourcehub.models ... | 244 | 28.25 | 103 | 17 | 1,608 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_66e37838c447f34f_b97b58da", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
70
] | [
null
] | [
19
] | [
51
] | |
2024-11-18T19:02:35.756325+00:00 | 1,415,587,963,000 | 48996623c95307b13814bb8ffc056b2e82bb1932 | 2 | {
"blob_id": "48996623c95307b13814bb8ffc056b2e82bb1932",
"branch_name": "refs/heads/master",
"committer_date": 1415587963000,
"content_id": "513dd1e06495aa099f2da448da71935e6b2ffca6",
"detected_licenses": [
"MIT"
],
"directory_id": "84b69842977ca08dc7119f3e9f3d81422bcb5b22",
"extension": "py",
"fi... | 2.46875 | stackv2 | from flask import Flask,request
from multiprocessing import Process,Queue
import logging
import os
import signal
import redis
import pymongo
import json
app = Flask(__name__)
client = pymongo.MongoClient()
db = client.orchestra
# Development Mode
logging.basicConfig(level=logging.DEBUG)
# Global datastructures - lif... | 147 | 28.35 | 113 | 18 | 924 | python | [{"finding_id": "codeql_py/log-injection_1fcf0c2b6e239f3d_41e8fa6a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).",
"This log entry depends on a [user-provided value](1)."
] | [
84,
98
] | [
null,
null
] | [
19,
19
] | [
50,
113
] | |
2024-11-18T19:02:45.484744+00:00 | 1,589,802,418,000 | f5ca4c1677c056b80c61f8485817d2e03f276e0c | 3 | {
"blob_id": "f5ca4c1677c056b80c61f8485817d2e03f276e0c",
"branch_name": "refs/heads/master",
"committer_date": 1589802418000,
"content_id": "6cf41beebe66074c44b0d3cc4a1a06047e64cba7",
"detected_licenses": [
"MIT"
],
"directory_id": "69111d15d317f250714937879101b278a3da83ed",
"extension": "py",
"fi... | 2.703125 | stackv2 | import json
if __name__ == "__main__":
with open('data/niteroi_gyms.json', 'r') as f:
data = json.load(f)
with open('data/vertices_niteroi.lhp', 'w') as f:
f.write('VERTICES_NITEROI.LHP\n')
f.write(str(len(data)) + '\n')
f.write('ID NAME NEIGHBOR LATITUDE LONGITUDE\n')... | 19 | 31.89 | 56 | 15 | 175 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0991b81964796364_14946e78", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
19
] | [
null
] | [
21
] | [
22
] | |
2024-11-18T19:02:53.429721+00:00 | 1,530,826,016,000 | 09a7fc8750516026db7550b4b0e8575699f6af83 | 3 | {
"blob_id": "09a7fc8750516026db7550b4b0e8575699f6af83",
"branch_name": "refs/heads/master",
"committer_date": 1530826016000,
"content_id": "c5c30cedd757a8841b219fb07dec601bf918d3a4",
"detected_licenses": [
"MIT"
],
"directory_id": "46437f9e1e3d9f77312a5bd5a36cf5d7d24e35d6",
"extension": "py",
"fi... | 2.53125 | stackv2 | import asyncio
import tornado.web
import tornado.web
import tornado.websocket
from peewee import DoesNotExist
from config import objects
from models import User, Score
letters, digits = 'ABCDEFGHKL', list(range(10))
default_coordinates = [[str(digit)+letter for letter in letters] for digit in digits]
class LogoutH... | 267 | 30.58 | 112 | 24 | 1,773 | python | [{"finding_id": "codeql_py/cookie-injection_df8abe97443b5df9_8f16f5ae", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/cookie-injection",
"py/cookie-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cookie is constructed from a [user-supplied input](1).",
"Cookie is constructed from a [user-supplied input](1)."
] | [
45,
52
] | [
null,
null
] | [
41,
37
] | [
49,
45
] | |
2024-11-18T19:02:59.271985+00:00 | 1,544,044,016,000 | 2bcd0227c100cb6d93a7dfeae1ba59840c8109bd | 2 | {
"blob_id": "2bcd0227c100cb6d93a7dfeae1ba59840c8109bd",
"branch_name": "refs/heads/master",
"committer_date": 1544044016000,
"content_id": "da997ab4dc897b406922e085ba49332e8e6a5791",
"detected_licenses": [
"MIT"
],
"directory_id": "8e18aa270cffa5493c592a1d771306175f5bf7af",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/env python
#
# Based on pyvmomi example code available at:
# https://github.com/vmware/pyvmomi-community-samples
#
import sys
import os
import threading
from time import sleep
import requests
from pyVim.connect import SmartConnect, Disconnect
from pyVmomi import vim
import VcenterInterfaces
import atexit
im... | 332 | 37.11 | 122 | 18 | 2,704 | python | [{"finding_id": "codeql_py/request-without-cert-validation_fbb57462d64c0d73_8f65fcc3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
122
] | [
124
] | [
20
] | [
63
] | |
2024-11-18T19:03:04.172134+00:00 | 1,591,806,479,000 | 06158d731d3bf2112be0e5d2c1dcecc7d2296fee | 3 | {
"blob_id": "06158d731d3bf2112be0e5d2c1dcecc7d2296fee",
"branch_name": "refs/heads/master",
"committer_date": 1591806479000,
"content_id": "d0014a1cefc28052d1a2cf0268045664d7972b0c",
"detected_licenses": [
"MIT"
],
"directory_id": "3af72e9e852a7e4eafd569c2035ebd703dba11e9",
"extension": "py",
"fi... | 2.828125 | stackv2 | import datetime
import json
import logging
import os
from dataclasses import dataclass
from json import JSONDecodeError
from typing import Iterator, Optional
import requests
@dataclass
class se_object:
"""Class to deal with StackExchage data collection and manipulation.
"""
search_terms: list
query_... | 135 | 31.2 | 103 | 19 | 912 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7bdd3af8c4aef59b_9dc286c1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
68
] | [
null
] | [
17
] | [
97
] | |
2024-11-18T19:14:35.040810+00:00 | 1,376,359,833,000 | d904b835f8519f62aec3883c402bee010d1f638d | 3 | {
"blob_id": "d904b835f8519f62aec3883c402bee010d1f638d",
"branch_name": "refs/heads/master",
"committer_date": 1376359833000,
"content_id": "67611d1f98fa81176598643584a26067cdd0ea1f",
"detected_licenses": [
"MIT"
],
"directory_id": "24418d343e58d43fabd6a34c6a11fb2a7572fe6d",
"extension": "py",
"fi... | 2.8125 | stackv2 | """
Create your own little shortening API.
For example:
gunicorn -w 4 example:app
"""
import redis
from rfc3987 import parse
from flask import Flask, request, redirect, url_for
from flask import jsonify as _jsonify
from werkzeug import iri_to_uri
from shorten import RedisStore, NamespacedFormatter, UUIDTokenGe... | 74 | 22.72 | 84 | 14 | 471 | python | [{"finding_id": "codeql_py/stack-trace-exposure_d097f1f2ff250867_0a85c008", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
22
] | [
null
] | [
19
] | [
22
] | |
2024-11-18T19:14:50.250657+00:00 | 1,600,174,499,000 | f5247d22c16d3296b5c784efb59cbed1a9439e11 | 2 | {
"blob_id": "f5247d22c16d3296b5c784efb59cbed1a9439e11",
"branch_name": "refs/heads/master",
"committer_date": 1600174499000,
"content_id": "ded02720b0b688b3942ac5fd787c975179d6cebd",
"detected_licenses": [
"MIT"
],
"directory_id": "4d0e6b2e7731cf5aa865c43a73b22e8335e0adf2",
"extension": "py",
"fi... | 2.375 | stackv2 | import re
import pandas as pd
import requests
class ITOL_session(object):
def __init__(self, login, password):
self.login = login
self.pwd = password
self.session = self.do_login()
self.get_data()
def do_login(self):
LOGIN_URL = 'https://itol.embl.de/login.cgi'
... | 143 | 49.62 | 135 | 23 | 1,345 | python | [{"finding_id": "codeql_py/bad-tag-filter_8118df4eb3d0ca14_c0b76c5c", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match upper case <SCRIPT> tags."
] | [
40
] | [
null
] | [
42
] | [
63
] | |
2024-11-18T19:27:35.614374+00:00 | 1,630,461,417,000 | 1bbb9f83a18719fe9a86a929547a0a48cf54fe2b | 3 | {
"blob_id": "1bbb9f83a18719fe9a86a929547a0a48cf54fe2b",
"branch_name": "refs/heads/main",
"committer_date": 1630461417000,
"content_id": "e9d2a9122fb2654d8c28a4543f8b70c1102349eb",
"detected_licenses": [
"MIT",
"Apache-2.0"
],
"directory_id": "ba93242bb221431b3bea6140191b59159c9fe1cb",
"extensi... | 2.96875 | stackv2 | # SqaPyCleanSpotify: Replace Explicit Content on Your Spotifyy Playlists
# Author flancast90 (Finn Lancaster)
# Copyright: MIT License
# import statement calls and external libs
"""
List of external libs, can be installed by:
- pip install spotipy
"""
import spotipy
from spotipy.oauth2 import SpotifyOAuth
import os... | 136 | 37.85 | 176 | 16 | 1,263 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0878733bb131a6e0_7b0ae682", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
37
] | [
null
] | [
17
] | [
86
] | |
2024-11-18T19:27:35.670617+00:00 | 1,473,744,253,000 | e547a1c920031b85a1989f4dc31f030a5cba5306 | 3 | {
"blob_id": "e547a1c920031b85a1989f4dc31f030a5cba5306",
"branch_name": "refs/heads/master",
"committer_date": 1473744253000,
"content_id": "3de1f82da60e10709270da7539232282b449ca17",
"detected_licenses": [
"MIT"
],
"directory_id": "b95a6064a6c07bc1caef37ad8796d063ee3b5005",
"extension": "py",
"fi... | 2.765625 | stackv2 | """
Create a SCP side-channel to transfer a file to remote network device.
SCP requires a separate SSH connection.
Currently only supports Cisco IOS and Cisco ASA.
"""
from __future__ import print_function
from __future__ import unicode_literals
import re
import os
import hashlib
import paramiko
import scp
class... | 249 | 34.94 | 93 | 17 | 1,905 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_bbd47170cd4d67dc_537239d6", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
29
] | [
null
] | [
9
] | [
76
] | |
2024-11-18T19:27:38.443451+00:00 | 1,576,934,037,000 | 7b3ea4676d7ad764dd2ff1caf79c07d121e90f51 | 3 | {
"blob_id": "7b3ea4676d7ad764dd2ff1caf79c07d121e90f51",
"branch_name": "refs/heads/master",
"committer_date": 1576934037000,
"content_id": "26557407dbe0db245cb9579b6828d676be300a8f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "55c6bf1d3155daf8197e136e5cee95e5d456e4a4",
"extension": "py"... | 2.75 | stackv2 | import cv2
import math
import PNSR
import copy
class PVD:
def __init__(self, msg, img):
self.msg = msg
self.img = img
def msgToBinary(self):
stringBinary = ' '.join(map(bin, bytearray(self.msg, 'utf8')))
stringBinary = stringBinary.replace(" ", "")
# print(stringBinar... | 121 | 40.66 | 100 | 25 | 1,302 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ddb88c8f985a7882_ea058b32", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
33,
60,
63
] | [
null,
null,
null
] | [
24,
56,
56
] | [
33,
100,
79
] | |
2024-11-18T19:27:47.279851+00:00 | 1,546,713,936,000 | 428272d860e2f041fd2db308e07608338de71996 | 2 | {
"blob_id": "428272d860e2f041fd2db308e07608338de71996",
"branch_name": "refs/heads/master",
"committer_date": 1546713936000,
"content_id": "cac615853ab891b140d9e955082d94ae8e973c86",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "b5b92a47803fa0aef32b27a38d62d8344ef8f699",
"extension": "p... | 2.421875 | stackv2 | import pprint
import json
import os
from jinja2 import Template
topics = {}
for topic_file in os.listdir('data/topics'):
if topic_file[0] == '.':
continue
with open('data/topics/'+topic_file) as json_file:
try:
topic = json.load(json_file)
except:
print topic_f... | 31 | 26.84 | 68 | 13 | 200 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_082fb75566519b92_44f2e30f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
29
] | [
null
] | [
16
] | [
46
] | |
2024-11-18T19:38:30.588854+00:00 | 1,601,580,096,000 | f0aabc87eba727f370dd66317c7084bbe718dbf2 | 3 | {
"blob_id": "f0aabc87eba727f370dd66317c7084bbe718dbf2",
"branch_name": "refs/heads/master",
"committer_date": 1601580096000,
"content_id": "f80464b6cf8c4b85731c80081eea878f076601ba",
"detected_licenses": [
"MIT"
],
"directory_id": "4febf49fa8038172431780340b5bd37c1a9d4442",
"extension": "py",
"fi... | 3.0625 | stackv2 | """
Hosts general utility functions for Makeability Lab Django website
"""
import re
# helper function to correctly capitalize a string, specify words to not capitalize in the articles list
# from: https://stackoverflow.com/a/3729957
# Note: this code written by J. Gilkeson and needs to be cleaned up (and/or removed i... | 35 | 44.83 | 126 | 13 | 426 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_8ffa0032f9ccac90_8f2f5d6c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com](1) may be at an arbitrary position in the... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [youtube.com](1) may be at an arbitrary position in the sanitized URL."
] | [
22
] | [
null
] | [
35
] | [
61
] | |
2024-11-18T19:38:50.505709+00:00 | 1,680,612,963,000 | c5ef6703aee09883f361015a5f5a60dd7ac624c0 | 3 | {
"blob_id": "c5ef6703aee09883f361015a5f5a60dd7ac624c0",
"branch_name": "refs/heads/main",
"committer_date": 1680612963000,
"content_id": "21da4d46c5f9341d06d544dde5f29ec4938eef6c",
"detected_licenses": [
"MIT"
],
"directory_id": "a5ec1f892dc504d815d9e0af3e7a84c05c9466e9",
"extension": "py",
"file... | 2.890625 | stackv2 | """
A function for asking the user for their Twitter API keys.
"""
import requests
from requests_oauthlib import OAuth1
from urllib.parse import parse_qs
def handshake():
# Default empty keys
consumer_key = ""
consumer_secret = ""
access_token = ""
access_token_secret = ""
bearer_token = in... | 118 | 33.29 | 163 | 13 | 839 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e4ab8d6163c1d57c_69f85bfa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
80
] | [
81
] | [
13
] | [
28
] | |
2024-11-18T20:06:09.663853+00:00 | 1,559,424,872,000 | 821ed72dced919ee70132424daf6cfdefecc7501 | 3 | {
"blob_id": "821ed72dced919ee70132424daf6cfdefecc7501",
"branch_name": "refs/heads/master",
"committer_date": 1559424872000,
"content_id": "8da29dd11fabf1c7a34eef3f65d39c607f240763",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "83d348e2ca9389dd89ae8b0863ba6073494d5716",
"extension": "py"... | 2.96875 | stackv2 | import http.client
import json
import click
def get_inputs(rpc, address, startblock, api_key=''):
conn = http.client.HTTPSConnection(rpc)
conn.request(
"GET",
f"/api?module=account&action=txlist&address={address}"
f"&startblock={startblock}&page=1&sort=asc&apikey={api_key}"
)
... | 79 | 23.1 | 74 | 13 | 520 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5255da85dd9f8b71_9717880c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p... | [
31,
38
] | [
null,
null
] | [
15,
15
] | [
43,
63
] | |
2024-11-18T20:06:22.680793+00:00 | 1,525,691,909,000 | 6bf81fbba74926fe9b7f579941b35473565137b7 | 3 | {
"blob_id": "6bf81fbba74926fe9b7f579941b35473565137b7",
"branch_name": "refs/heads/master",
"committer_date": 1525691909000,
"content_id": "4582d169ed8317c11d5ca7f1a9e8cf5cc32a93e1",
"detected_licenses": [
"MIT"
],
"directory_id": "329c00c2699f4fa3459d077c4000eeef41e86f4b",
"extension": "py",
"fi... | 2.8125 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
import random
import string
import re
import time
import requests
import argparse
#打印日志
import logging
#设置日志等级
logging.basicConfig(filename='example.log', filemode="a", level=logging.DEBUG)
#输入你的邀请链接
url = ''
#你需要的邀请数量
max_num = 50
def getuser():
user = ''.join(random.... | 93 | 23.33 | 84 | 12 | 595 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_0010ba1a0d3b3066_6c917704", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'processon.com/signup/verification/'... | 2 | true | [
"CWE-020",
"CWE-312"
] | [
"py/incomplete-hostname-regexp",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'processon.com/signup/verification/', so it might match more hosts than expected.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
74,
51
] | [
null,
null
] | [
11,
11
] | [
60,
65
] | |
2024-11-18T20:06:32.005904+00:00 | 1,578,787,044,000 | d76d6acb90dd383ec6c4ecf1141ee051e1aa2d70 | 3 | {
"blob_id": "d76d6acb90dd383ec6c4ecf1141ee051e1aa2d70",
"branch_name": "refs/heads/master",
"committer_date": 1578787044000,
"content_id": "e09a28e8510375843505d2cf8c61acb1b6e8daa4",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "7082ba3c9713341dd63ed2fc69027fe6e5121fba",
"extension": "p... | 2.5625 | stackv2 | import aiohttp
import asyncio
import logging
from hashlib import md5
from yarl import URL
from .exceptions import Error, APIError, AuthError, OKAuthError
from .utils import SignatureCircuit
from .parsers import AuthDialogParser, AccessDialogParser
log = logging.getLogger(__name__)
REST_NO_SIGN_ARGS = ["sig", "access... | 359 | 33.74 | 105 | 21 | 2,631 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_e6b972b344e947c5_f030ddd1", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
118,
128
] | [
null,
null
] | [
24,
20
] | [
45,
41
] | |
2024-11-18T20:18:24.096267+00:00 | 1,557,931,335,000 | 29015482c3c211bafd323f7acd8618ecca8d5134 | 2 | {
"blob_id": "29015482c3c211bafd323f7acd8618ecca8d5134",
"branch_name": "refs/heads/master",
"committer_date": 1558537069000,
"content_id": "0e80342cf4d67a80e726b7cd10abbc5d13df627d",
"detected_licenses": [
"MIT"
],
"directory_id": "494dba4e7ee13ad07c1cb44f60d5efe7bb30a5d1",
"extension": "py",
"fi... | 2.390625 | stackv2 | from pyphen import Pyphen
import pandas as pd
import re
import spacy
from math import log
import html
import numpy as np
from torchtext import data as torchdata
from sklearn.feature_extraction.text import TfidfVectorizer
reduce = {'do_reducing': True, 'reduce_to': 10} # for debugging
do_feature_extraction = False
sa... | 282 | 31.99 | 136 | 15 | 2,489 | python | [{"finding_id": "codeql_py/overly-large-range_83fa1b417a0673c7_815a4c22", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].",
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
104,
105
] | [
null,
null
] | [
64,
47
] | [
67,
50
] | |
2024-11-18T20:18:25.059559+00:00 | 1,593,763,581,000 | 47b7f35bf19cd4e0c8246ec7075dde5cb06b4561 | 3 | {
"blob_id": "47b7f35bf19cd4e0c8246ec7075dde5cb06b4561",
"branch_name": "refs/heads/master",
"committer_date": 1593763581000,
"content_id": "f9519ee8ca804381ffee3c3c9b2c9100f7b1a4ae",
"detected_licenses": [
"MIT"
],
"directory_id": "662a441d7a4b61714392b09a339e84d87e90e7ed",
"extension": "py",
"fi... | 2.96875 | stackv2 | """Client to handle connections and actions executed against a remote host."""
from os import system
from paramiko import SSHClient, AutoAddPolicy, RSAKey
from paramiko.auth_handler import AuthenticationException, SSHException
from scp import SCPClient, SCPException
from .log import logger
class RemoteClient:
"""... | 116 | 33.49 | 104 | 18 | 813 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_b9116744e3259185_8abb8cda", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
47
] | [
null
] | [
17
] | [
73
] | |
2024-11-18T20:18:33.191125+00:00 | 1,579,167,900,000 | 418df8df3b2970c95d1c765da204597bf14b8b14 | 3 | {
"blob_id": "418df8df3b2970c95d1c765da204597bf14b8b14",
"branch_name": "refs/heads/master",
"committer_date": 1579167900000,
"content_id": "39d26cab05e30f2289299122e8181c55dbbe446f",
"detected_licenses": [
"MIT"
],
"directory_id": "3a7e3f540fe5b77fc7841bbbffb5fb60fbcff916",
"extension": "py",
"fi... | 2.625 | stackv2 | import boto3
class SecretManager:
def __init__(self, region_name='us-east-1', secrets_mapping={}):
self.ssm = boto3.client('ssm', region_name=region_name)
self.secrets = {}
self.load_secrets(secrets_mapping)
def get_secret(self, secret_name):
if not self.secrets.get(secret_nam... | 32 | 32.38 | 106 | 17 | 225 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1510bc09129c2132_e31e44e5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
13
] | [
16
] | [
17
] | [
18
] | |
2024-11-18T20:18:33.882151+00:00 | 1,592,538,739,000 | fa1a3136fc634dc41d6f213163ce8381e907135e | 3 | {
"blob_id": "fa1a3136fc634dc41d6f213163ce8381e907135e",
"branch_name": "refs/heads/master",
"committer_date": 1592538739000,
"content_id": "5075e4fc13673f2b7183a78071aded02d5946ea9",
"detected_licenses": [
"MIT"
],
"directory_id": "ddee2095876636c989034e96f97de2a0a5336b18",
"extension": "py",
"fi... | 2.640625 | stackv2 | import json
import urllib.request
# Enter your AlphaVantage API Key here
API_KEY = ""
# Headers for CORS support
cors_headers = {
"Access-Control-Allow-Headers": "Content-Type",
"Access-Control-Allow-Origin": "*",
"Access-Control-Allow-Methods": "OPTIONS,POST,GET",
}
def lambda_handler(event, context)... | 42 | 30.05 | 100 | 14 | 330 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9886e4f316b16596_2f1cbab7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
23
] | [
null
] | [
11
] | [
14
] | |
2024-11-18T20:31:14.713174+00:00 | 1,633,701,313,000 | e6aac6077c6b3c52894188f2e4d462fdc7bbdeb4 | 3 | {
"blob_id": "e6aac6077c6b3c52894188f2e4d462fdc7bbdeb4",
"branch_name": "refs/heads/main",
"committer_date": 1633701313000,
"content_id": "9d31ea5cb878872a2e15ae2ad835f6f80c7a513c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4f2676ebbe4f8d625e7eeb2092fffb998b54a217",
"extension": "py",
... | 2.640625 | stackv2 | import os
from flask import Flask, flash, request, redirect, render_template
from werkzeug.utils import secure_filename
from google.cloud import storage
app=Flask(__name__)
app.secret_key = "secret key"
app.config['MAX_CONTENT_LENGTH'] = 16 * 1024 * 1024
# Get current path
path = os.getcwd()
# file Upload
UPLOAD_FOLD... | 75 | 37.24 | 161 | 22 | 676 | python | [{"finding_id": "codeql_py/url-redirection_56aca9c42f67c7d7_dd9eadb0", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-022"
] | [
"py/url-redirection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
36,
52
] | [
null,
null
] | [
29,
27
] | [
40,
40
] | |
2024-11-18T20:31:35.026836+00:00 | 1,629,279,332,000 | a683cb5aadefa2cbfe2967159355d51367000c0b | 4 | {
"blob_id": "a683cb5aadefa2cbfe2967159355d51367000c0b",
"branch_name": "refs/heads/main",
"committer_date": 1629279332000,
"content_id": "434bd93206b706ff01003ed6127a33c7c8e5c338",
"detected_licenses": [
"MIT"
],
"directory_id": "8f9170d1ee3a1215b01f6810805d9d3f4acbe1fa",
"extension": "py",
"file... | 4.0625 | stackv2 | import random
def jogar():
print("\n\nOla felipe vamos arrasar no python!!!!!!!")
print("***********************************************")
print("Bem-Vindo ao Jogo de Adivinhação!")
print("************************************************")
print("Nivel de dificuldade\n(1) facil numeros entre 1 a ... | 54 | 38.13 | 132 | 21 | 582 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_612eb0dd9f62eac1_63e548f2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text."
] | [
49
] | [
null
] | [
15
] | [
112
] | |
2024-11-18T20:31:38.226273+00:00 | 1,602,573,077,000 | c5c9818f36b5b25a040da1c4b8c9071a31657531 | 2 | {
"blob_id": "c5c9818f36b5b25a040da1c4b8c9071a31657531",
"branch_name": "refs/heads/master",
"committer_date": 1602573077000,
"content_id": "4826d1ff66cad3148a7f6a2fa395f49d1bc2ecb6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b0ab884e8a2654ca79bec52a34a5327de2472177",
"extension": "py"... | 2.484375 | stackv2 | import subprocess
import os
import crypt
import string
import random
import shutil
import ssl
import requests
from urllib.parse import urlparse
from OpenSSL.crypto import load_certificate, FILETYPE_PEM
class CommandUtils(object):
def __init__(self, logger):
self.logger = logger
def run(self, cmd):
... | 106 | 34.09 | 104 | 19 | 820 | python | [{"finding_id": "codeql_py/request-without-cert-validation_6ca2b8c72994b632_916256a4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
62
] | [
null
] | [
17
] | [
75
] | |
2024-11-18T20:43:26.579235+00:00 | 1,594,299,004,000 | 46c36be4d2d6727e302744f1804f6721eecbcbe6 | 2 | {
"blob_id": "46c36be4d2d6727e302744f1804f6721eecbcbe6",
"branch_name": "refs/heads/master",
"committer_date": 1594299004000,
"content_id": "662ec4fe6b6064ef2815cdfea9f76e85c7d11506",
"detected_licenses": [
"MIT"
],
"directory_id": "def481643374b6c7c34612bae2849458bb77d9e8",
"extension": "py",
"fi... | 2.375 | stackv2 | import logging
from flask import Flask, jsonify, request
from mlsearch_api.api_requester import fetch_github
logging.basicConfig(level=logging.INFO)
logger = logging.getLogger(__name__)
app = Flask(__name__)
@app.route('/')
def ping():
return 'ML Search: It Works!'
@app.route('/search', methods=['GET'])
def s... | 32 | 23.12 | 71 | 11 | 179 | python | [{"finding_id": "codeql_py/log-injection_68b2f00071f4839d_4ba0ac4a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
19
] | [
null
] | [
17
] | [
42
] | |
2024-11-18T20:43:53.761461+00:00 | 1,682,114,542,000 | fdfc68e619739c6de94e35de5791997fdd1a1223 | 2 | {
"blob_id": "fdfc68e619739c6de94e35de5791997fdd1a1223",
"branch_name": "refs/heads/master",
"committer_date": 1682114542000,
"content_id": "7feaab805a8fb8b45141ec15c78ec6efa8db590c",
"detected_licenses": [
"MIT"
],
"directory_id": "037eae4716d734bfb7377458da42b492e0a000fd",
"extension": "py",
"fi... | 2.3125 | stackv2 | import re
import hazm
import parsivar
import numpy as np
from os import path
from wordcloud_fa import WordCloudFa as WordCloud
from PIL import Image
from collections import Counter
from pprint import pprint
from itertools import filterfalse
from tqdm import tqdm
default_stop_words_path = path.join(path.dirname(__fi... | 294 | 38.1 | 142 | 16 | 3,251 | python | [{"finding_id": "codeql_py/overly-large-range_9348dea830f63db3_8c878301", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 7 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range ... | [
25,
25,
25,
25,
25,
25,
26
] | [
null,
null,
null,
null,
null,
null,
null
] | [
7,
10,
13,
16,
22,
25,
14
] | [
11,
14,
17,
20,
26,
29,
18
] | |
2024-11-18T20:43:55.441124+00:00 | 1,646,302,492,000 | 217d1cc67684ea7d4907b0bd40bc8fb00448c097 | 3 | {
"blob_id": "217d1cc67684ea7d4907b0bd40bc8fb00448c097",
"branch_name": "refs/heads/master",
"committer_date": 1646302492000,
"content_id": "5ea774765567dbd1f3632c07575ccb05e7ad220a",
"detected_licenses": [
"MIT"
],
"directory_id": "e64c287e25aa6289691b92501603266a451bb131",
"extension": "py",
"fi... | 3.09375 | stackv2 | import scrapy
from jinja2 import Template
from emailer import send_mail
class PageSpider(scrapy.Spider):
home_url = 'http://www.prodirectselect.com/'
def parse(self, response):
'''
Parse the response downloaded for each of the
requests made.
:param response: holds the page co... | 57 | 28.54 | 72 | 18 | 333 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fae78ecb2b7e930c_ffab2c14", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
43
] | [
55
] | [
20
] | [
13
] | |
2024-11-18T20:43:58.356391+00:00 | 1,594,060,022,000 | d566cb910fe7f287488ffe803d8016a2cc21ee40 | 3 | {
"blob_id": "d566cb910fe7f287488ffe803d8016a2cc21ee40",
"branch_name": "refs/heads/master",
"committer_date": 1594060022000,
"content_id": "1c552fceb355f440c272a95fd368db976264458e",
"detected_licenses": [
"MIT"
],
"directory_id": "3d263c8767ce4055f3cfe2ef6bf8b8453ea9a853",
"extension": "py",
"fi... | 3.09375 | stackv2 | # --------------
def read_file(filename):
f=open(filename,mode='r')
sentence= f.readline()
return sentence
sample_message=read_file(file_path)
print(sample_message)
message_1=read_file(file_path_1)
print(message_1)
message_2=read_file(file_path_2)
print(message_2)
def fuse_msg(message_a,message_b):
qu... | 69 | 24.77 | 67 | 11 | 482 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_86936b580fdcda5b_5305d9cf", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec... | [
62,
18,
31,
45,
56,
66
] | [
null,
null,
null,
null,
null,
null
] | [
13,
7,
7,
7,
7,
7
] | [
23,
19,
19,
19,
19,
17
] | |
2024-11-18T20:44:02.149375+00:00 | 1,550,185,627,000 | e33d7bc43a9282b8ed5a16f2fb35ef4723e085f7 | 4 | {
"blob_id": "e33d7bc43a9282b8ed5a16f2fb35ef4723e085f7",
"branch_name": "refs/heads/master",
"committer_date": 1550185627000,
"content_id": "7b5356e269eb057dafc4a359060b1b56809062e8",
"detected_licenses": [
"MIT"
],
"directory_id": "a4c543f2662406610020ee58913b68be45b6b9c1",
"extension": "py",
"fi... | 3.65625 | stackv2 | """
Decorator is a structural pattern that allows
adding new behaviors to objects dynamically by
placing them inside special wrapper objects.
Using decorator you can wrap objects countless
number of times since both target objects and
decorators follow the same interface. The resulting
object will get a stacking behav... | 129 | 26.4 | 115 | 14 | 805 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3e07ed629e250d21_395f6a21", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
121
] | [
null
] | [
15
] | [
29
] | |
2024-11-18T20:44:11.520420+00:00 | 1,587,167,693,000 | a18323af30b6011f61361cda8579dfea13961389 | 3 | {
"blob_id": "a18323af30b6011f61361cda8579dfea13961389",
"branch_name": "refs/heads/master",
"committer_date": 1587167693000,
"content_id": "03ec0acd717aa9849e095c76ded8d08a6865694c",
"detected_licenses": [
"MIT"
],
"directory_id": "e48ea9398cb909a225188ffe48da83327be82522",
"extension": "py",
"fi... | 2.546875 | stackv2 | import os
import subprocess
import sys
from bottle import request, response, route, post, run, template, static_file
from .markdown import get_markdown_files, search_markdown_files
class Templates:
"""
Very simple data class to perform a small path manipulation on the templates
allows easy access of templa... | 135 | 34.47 | 88 | 16 | 986 | python | [{"finding_id": "codeql_py/path-injection_2d910e5f48861d49_069cccbd", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 3 | true | [
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
92,
102,
116
] | [
null,
null,
null
] | [
19,
23,
23
] | [
27,
36,
36
] | |
2024-11-18T20:44:15.209209+00:00 | 1,607,815,472,000 | 8e75e170cb85e325fcf60d1f361f0371df89d7e9 | 4 | {
"blob_id": "8e75e170cb85e325fcf60d1f361f0371df89d7e9",
"branch_name": "refs/heads/master",
"committer_date": 1607815472000,
"content_id": "707a41f0c886eb370de20b1e6b6c41e01075608b",
"detected_licenses": [
"MIT"
],
"directory_id": "7bca7883bbd57354e5ca3afe21f29b13bf1a1927",
"extension": "py",
"fi... | 3.5625 | stackv2 | from collections import Counter
A = 236491
B = 713787
def password_count():
valid_p1 = 0
valid_p2 = 0
for x in range(A, B):
x_str = str(x)
if ''.join(sorted(x_str)) != x_str:
continue
counter = Counter(x_str)
if any(v for v in counter.values() if v >= 2):
... | 27 | 20.59 | 54 | 12 | 183 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8f104b06f81ec7d0_d67cab7f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
26,
27
] | [
null,
null
] | [
11,
11
] | [
34,
34
] | |
2024-11-18T20:44:15.673882+00:00 | 1,582,333,197,000 | e36354e33a0c595c5d3bc34216025810b4071123 | 2 | {
"blob_id": "e36354e33a0c595c5d3bc34216025810b4071123",
"branch_name": "refs/heads/master",
"committer_date": 1582333197000,
"content_id": "59c2f502484fc9c2ca4a6a0fa00640aaddd59585",
"detected_licenses": [
"MIT"
],
"directory_id": "f0932f59d37adfbba9307ee31e6f78ce3c256c4a",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!/usr/bin/env python3
import jinja2
import subprocess
from pathlib import Path
def render_template(path, context, template_dir='.'):
loader = jinja2.FileSystemLoader(template_dir)
env = jinja2.Environment(loader=loader)
template = env.get_template(f'{path}.jinja')
template.stream(**context).dump(path... | 50 | 20.86 | 61 | 13 | 297 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fe21d3043359cd67_2f3e98ee", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
9
] | [
null
] | [
11
] | [
44
] | |
2024-11-18T20:57:33.293208+00:00 | 1,491,060,739,000 | 045e9ec41c1caec8d9e0608e11ee64f701d6daab | 3 | {
"blob_id": "045e9ec41c1caec8d9e0608e11ee64f701d6daab",
"branch_name": "refs/heads/master",
"committer_date": 1491060739000,
"content_id": "edd646794392a5a8d6b99bb5711523a1560712ea",
"detected_licenses": [
"MIT"
],
"directory_id": "18860547af5f2fdc0bd676d6071786ce29e6fe0f",
"extension": "py",
"fi... | 2.609375 | stackv2 | from google.appengine.ext import db
import random
import hashlib
from string import letters
def users_key(group = 'default'):
return db.Key.from_path('users', group)
# User encryption and validation functions
def make_salt(length = 5):
return ''.join(random.choice(letters) for x in xrange(length))
def valid... | 112 | 26.26 | 66 | 17 | 697 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b84981c1e97269db_bb90c489", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
21
] | [
null
] | [
24
] | [
40
] | |
2024-11-18T20:57:38.959066+00:00 | 1,486,080,836,000 | 3cf78b6ed6b236339b08ec3a8047ed4a31fa077e | 2 | {
"blob_id": "3cf78b6ed6b236339b08ec3a8047ed4a31fa077e",
"branch_name": "refs/heads/master",
"committer_date": 1486080836000,
"content_id": "a440921d3bb16ea4083a620f3dfce566ee31a91c",
"detected_licenses": [
"MIT"
],
"directory_id": "029120d1bb23837f5e82adc7815395be64c23634",
"extension": "py",
"fi... | 2.359375 | stackv2 | """
Sample Flask Login app with KnuVerse AudioPass.
Credit: https://github.com/shekhargulati/flask-login-example
"""
from flask import Flask, Response, redirect, request, abort, escape, \
send_from_directory
from flask_login import LoginManager, UserMixin, \
login_required, login_user, logout_user
import json... | 200 | 27.96 | 113 | 20 | 1,335 | python | [{"finding_id": "codeql_py/reflective-xss_6ba62f0b212a30de_24d8ed9c", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-601"
] | [
"py/reflective-xss",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
117,
84
] | [
158,
null
] | [
25,
13
] | [
39,
84
] | |
2024-11-18T20:57:40.612189+00:00 | 1,625,469,801,000 | 7b3f56a0023fa7d986f86529bad16eb162d4576b | 2 | {
"blob_id": "7b3f56a0023fa7d986f86529bad16eb162d4576b",
"branch_name": "refs/heads/master",
"committer_date": 1625469801000,
"content_id": "5db363a29c0964b8fe0a903fe4dad1a757148bb8",
"detected_licenses": [
"MIT"
],
"directory_id": "21d464498148d2adb84329a36037f9c886b13224",
"extension": "py",
"fi... | 2.34375 | stackv2 | from flask import Blueprint, render_template, redirect, request, flash, url_for
import hashlib
from flask import make_response
import xml.etree.ElementTree as ET
wechat = Blueprint(
"wechat", __name__, template_folder="../templates", static_folder="../static")
WX_TOKEN = 'duansq'
@wechat.route("/wechat_api/", ... | 37 | 27.95 | 84 | 16 | 288 | python | [{"finding_id": "codeql_py/reflective-xss_ddd2bb8a8dbbb940_771d4a2e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
25
] | [
null
] | [
35
] | [
42
] | |
2024-11-18T20:57:42.509321+00:00 | 1,693,079,090,000 | 4071c3b9b0b1ae7a16054b11450857152dd16a80 | 3 | {
"blob_id": "4071c3b9b0b1ae7a16054b11450857152dd16a80",
"branch_name": "refs/heads/master",
"committer_date": 1693079090000,
"content_id": "1dbd223a8d1c6ae31eeb9744a08912b6391aa96c",
"detected_licenses": [
"MIT"
],
"directory_id": "9c268aa04ab8b359d11399f94a30c8f4fe171a0c",
"extension": "py",
"fi... | 2.578125 | stackv2 | #!/usr/bin/env python
"""
Generates an AXI Stream switch wrapper with the specified number of ports
"""
import argparse
from jinja2 import Template
def main():
parser = argparse.ArgumentParser(description=__doc__.strip())
parser.add_argument('-p', '--ports', type=int, default=[4], nargs='+', help="number of... | 271 | 37.31 | 128 | 12 | 3,209 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b5fe890ef6904c6b_4af3bcaa", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
44
] | [
253
] | [
9
] | [
5
] | |
2024-11-18T20:57:58.244512+00:00 | 1,572,604,903,000 | ea7aa2f681a9a3df217752066a64ff00195f6a30 | 3 | {
"blob_id": "ea7aa2f681a9a3df217752066a64ff00195f6a30",
"branch_name": "refs/heads/master",
"committer_date": 1572604903000,
"content_id": "bae4d1bfb1746be9236a303faac5b785207bae52",
"detected_licenses": [
"MIT"
],
"directory_id": "9c5e6940ccbfa87754a0b993435f7d273b04a1dd",
"extension": "py",
"fi... | 3.125 | stackv2 |
from tkinter import *
import os
def register():
global register_screen
register_screen = Toplevel(main_screen)
register_screen.title("Register")
register_screen.geometry("300x250")
global username
global password
global username_entry
global password_entry
username = StringVar... | 224 | 30.28 | 106 | 12 | 1,755 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_60d3ac43a8780bf0_b97471d3", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
71
] | [
null
] | [
16
] | [
29
] | |
2024-11-18T20:58:21.474328+00:00 | 1,542,023,429,000 | 94b822335af80f7219d525e7eaaf40ec91773923 | 3 | {
"blob_id": "94b822335af80f7219d525e7eaaf40ec91773923",
"branch_name": "refs/heads/master",
"committer_date": 1542023429000,
"content_id": "08160c27ff15d128809bc8eb19087528f778dfea",
"detected_licenses": [
"MIT"
],
"directory_id": "3a474328c2b21c98f60d355aff1a3920a3fb5f9c",
"extension": "py",
"fi... | 3.078125 | stackv2 | import os
from jinja2 import Template
class SimpleTemplate(object):
def __init__(self):
self.template = Template('')
self.context = ''
def load_from_file(self, template):
if not os.path.isfile(template):
return
f = open(template, 'r')
self.context = ''
... | 35 | 22.2 | 54 | 11 | 193 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_31ce4db281671144_a197b991", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
6,
17
] | [
null,
null
] | [
25,
25
] | [
37,
47
] | |
2024-11-18T20:58:36.119385+00:00 | 1,471,003,212,000 | cc071d763ded059b4f8bc0e7fa11ccf3e165871d | 2 | {
"blob_id": "cc071d763ded059b4f8bc0e7fa11ccf3e165871d",
"branch_name": "refs/heads/master",
"committer_date": 1471003212000,
"content_id": "f84a95a69879647083b62a3a7eda712783896f35",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "546c7bba2c816e824e7933d26dfd516741547a56",
"extension": "py"... | 2.40625 | stackv2 | #
# Copyright 2015-present Boling Consulting Solutions, bcsw.net
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless requir... | 99 | 30.33 | 96 | 15 | 733 | python | [{"finding_id": "codeql_py/reflective-xss_17801b579b7c25e2_c3d7df55", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
41
] | [
null
] | [
16
] | [
42
] | |
2024-11-18T20:58:40.438442+00:00 | 1,556,698,234,000 | 9e36a52248ddf8663334042ef0ce1b4fb8a1d162 | 2 | {
"blob_id": "9e36a52248ddf8663334042ef0ce1b4fb8a1d162",
"branch_name": "refs/heads/master",
"committer_date": 1556698234000,
"content_id": "699e30f190ce446a04c71a46ca3ff3166c9a81a7",
"detected_licenses": [
"MIT"
],
"directory_id": "f245601bab546cce025b4378010c3c75f9193651",
"extension": "py",
"fi... | 2.390625 | stackv2 | # -*- coding: UTF-8 -*-
from flask import request, render_template, flash, redirect, url_for
from sqlalchemy import or_
from wtforms import ValidationError
from flask_login import login_user, logout_user
from app.main_views import main
from app.main_views.forms import RegisterForm, LoginForm
from app.models import Us... | 58 | 33.52 | 114 | 18 | 419 | python | [{"finding_id": "codeql_py/url-redirection_7458ff31aacc4bbe_397e5982", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
48
] | [
null
] | [
29
] | [
58
] | |
2024-11-18T21:10:09.850874+00:00 | 1,691,855,948,000 | 07d01876f62872adf7e289459b00f30e3ee92067 | 3 | {
"blob_id": "07d01876f62872adf7e289459b00f30e3ee92067",
"branch_name": "refs/heads/main",
"committer_date": 1691855948000,
"content_id": "d61683a0901cec4b24739fd6db9e7967d6be992c",
"detected_licenses": [
"MIT"
],
"directory_id": "416559370cfed287db119360d2747783c6bcc512",
"extension": "py",
"file... | 2.640625 | stackv2 | from collections import defaultdict
import jinja2
import os
from urllib.parse import urljoin
from .. import util
from .base import Renderer
from .util import markdown_func, media_url_func, absolute_url_func
# Route reference
# / Posts
# /page/:page/ Posts page #:page
# /tag/:tag/ Posts matching ... | 178 | 33.02 | 79 | 19 | 1,311 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_375d08b1128b67fc_6ea76429", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
36
] | [
38
] | [
26
] | [
10
] | |
2024-11-18T21:10:34.004247+00:00 | 1,541,536,043,000 | 7d03e6453bdae14308db740256a6694304839726 | 2 | {
"blob_id": "7d03e6453bdae14308db740256a6694304839726",
"branch_name": "refs/heads/master",
"committer_date": 1541536043000,
"content_id": "55b8ea19e05247b35e336c6cee57b3638cef3d2b",
"detected_licenses": [
"MIT"
],
"directory_id": "7c688afb28d47b96c62faf0fe45f37f50c49aebe",
"extension": "py",
"fi... | 2.484375 | stackv2 | import argparse
import os
from boltons import fileutils
parser = argparse.ArgumentParser(description='Create and index file for ALLSSTAR data, index.txt is create in the path of the dataset')
parser.add_argument('--src', help='data dir', required=True)
parser.add_argument('--ext', help='extension to index', required=T... | 34 | 39.44 | 135 | 15 | 364 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e4c7646577f01f89_4bc65bc8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
33
] | [
null
] | [
34
] | [
38
] | |
2024-11-18T21:10:45.140597+00:00 | 1,692,828,071,000 | ab9ba3ad7b8e2599365d6defa65add862e32eadf | 3 | {
"blob_id": "ab9ba3ad7b8e2599365d6defa65add862e32eadf",
"branch_name": "refs/heads/main",
"committer_date": 1692828071000,
"content_id": "593337c82d7afd397cebf2ddce0041c6f0fed3bd",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "a3d6556180e74af7b555f8d47d3fea55b94bcbda",
"extension": "py"... | 3.125 | stackv2 | #!/usr/bin/env python
# Copyright 2022 The Chromium Authors
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
import optparse
import os
import shutil
import sys
import tarfile
# A python script that unpacks the pumpkin tar archive by:
# 1. Extracting the tar into a... | 76 | 32.66 | 80 | 11 | 611 | python | [{"finding_id": "codeql_py/tarslip_06d731ff0d0e2e9a_528e6eb6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
63
] | [
null
] | [
3
] | [
6
] | |
2024-11-18T21:10:50.819071+00:00 | 1,662,362,316,000 | 1522833b71012e422551cc8db514503b4ac7204e | 3 | {
"blob_id": "1522833b71012e422551cc8db514503b4ac7204e",
"branch_name": "refs/heads/master",
"committer_date": 1662362316000,
"content_id": "2c8c3eb537b3701307986f638667a1755714dd6a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e96889bdfc11b1fefe00b23ca3ef0944f6cce3e6",
"extension": "py"... | 2.6875 | stackv2 | """
Routes to handle request related to case.
"""
# Import dependencies
import sqlite3 as sql
import os
import json
import datetime
from flask import Blueprint, jsonify, request, make_response, send_file
from flask.wrappers import Response
from api.models.case import Case
from api.models.extractor import Extractor
fro... | 371 | 25.51 | 104 | 16 | 2,221 | python | [{"finding_id": "codeql_py/reflective-xss_43d2c0553dc12f48_46ea0651", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d... | 4 | true | [
"CWE-079",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/reflective-xss",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).\nCross-site scripting vulnerability due to a [user-provided value](3).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value]... | [
119,
94,
106,
209
] | [
null,
null,
null,
null
] | [
12,
24,
24,
41
] | [
16,
28,
28,
54
] | |
2024-11-18T21:11:06.476022+00:00 | 1,629,126,212,000 | 5b9fd51766b3f04789cf8b13990e3ac7941f3887 | 3 | {
"blob_id": "5b9fd51766b3f04789cf8b13990e3ac7941f3887",
"branch_name": "refs/heads/master",
"committer_date": 1629126212000,
"content_id": "c2e9efa7936de6e749163652553ef614b93649f6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7d7f36d82ce64ef48e9b69f09e6d622b23abda1f",
"extension": "py"... | 2.65625 | stackv2 | import requests
import re
import json
def RemoteBulitTimeList(start_time_year, start_time_month, start_time_day, end_time_year, end_time_month, cid_num, headers):
time_list = list()
for i in range(abs((start_time_year - end_time_year) * 12 + (start_time_month - end_time_month) * 1) + 1):
if len(str(st... | 45 | 40.2 | 160 | 20 | 490 | python | [{"finding_id": "codeql_py/request-without-cert-validation_32febdd79d737162_7bb1e890", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
15
] | [
null
] | [
19
] | [
82
] | |
2024-11-18T21:11:14.288656+00:00 | 1,638,191,288,000 | 93c62d85fc29b7411ba5e33d8a4018fcfcf1b740 | 3 | {
"blob_id": "93c62d85fc29b7411ba5e33d8a4018fcfcf1b740",
"branch_name": "refs/heads/main",
"committer_date": 1638191288000,
"content_id": "48ebe919832dabf6d6fd51bc49bf723ef45891d2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "edd94cc385fee12a1a9dd473b9895ad27fd300c3",
"extension": "py",
... | 2.65625 | stackv2 | # !/usr/bin/env python
# -*- encoding: utf-8 -*-
# @File: main.py
import os
import re
import sys
import traceback
from multiprocessing.dummy import Pool
from os.path import isfile
import cv2
try:
from .counter import Counter
from .ops.blur import Blur
from .ops.fliph import FlipH
from .ops.flipv impor... | 185 | 28.79 | 71 | 19 | 1,332 | python | [{"finding_id": "codeql_py/redos_a6937addcbdef4ec_79a8bbbc", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '__' and containing many repetitio... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '__' and containing many repetitions of 'a__'."
] | [
41
] | [
null
] | [
42
] | [
44
] | |
2024-11-18T19:03:20.430505+00:00 | 1,479,837,323,000 | 8b6ca0ca4a6db11b86d863f6df10c13511f405a4 | 3 | {
"blob_id": "8b6ca0ca4a6db11b86d863f6df10c13511f405a4",
"branch_name": "refs/heads/master",
"committer_date": 1479837323000,
"content_id": "8b4f384d9c04d8aab09fe54a8db5b4bfc4e80af2",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "12d9710b8bb659a11f399a71e05e99ccd5e847d1",
"extension": "p... | 3.3125 | stackv2 | #!/usr/bin/env python
"""
This script extracts all URLs from a supplied PDF file.
The script finds all URLs by walking the PDF tree and looking for all URI
references, as specified in Section 8.5 of PDF v1.7:
<</Type/Action/S/URI/URI/<dest>
For Example:
<</Type/Action/S/URI/URI(http://www.google.com/) >>
"""
impor... | 94 | 28.18 | 128 | 17 | 663 | python | [{"finding_id": "codeql_py/overly-large-range_e6e1c37f78910b63_ad9d150d", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
80
] | [
null
] | [
60
] | [
63
] | |
2024-11-18T19:03:23.427305+00:00 | 1,421,928,225,000 | 9cf8b9d0301898a48b3b41f40d3647e382ae7a4b | 3 | {
"blob_id": "9cf8b9d0301898a48b3b41f40d3647e382ae7a4b",
"branch_name": "refs/heads/master",
"committer_date": 1421928225000,
"content_id": "f29374a31e9b5cac166861306f88d91b16d66a9a",
"detected_licenses": [
"MIT"
],
"directory_id": "2de15ddf4cb1b5a80d4a95488bde362248fe75e6",
"extension": "py",
"fi... | 2.71875 | stackv2 | # encoding: UTF-8
from utils.whereami import realdir
import os, re
import os.path
# FileSystem Database driver...
# Simple wrapper that reads and writes confgurations in a fashion that bash can
# easily read the values later.
class RowDoesNotExistError(Exception):
"Exception triggered when trying to get a row whi... | 230 | 28.93 | 144 | 19 | 1,554 | python | [{"finding_id": "codeql_py/overly-large-range_3af61727be209b57_68d934f7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\w in the same character class."
] | [
72
] | [
null
] | [
27
] | [
30
] | |
2024-11-18T19:03:27.682708+00:00 | 1,630,253,847,000 | 29404e61e3d9d123040a8f94606f9d07c50d4b46 | 3 | {
"blob_id": "29404e61e3d9d123040a8f94606f9d07c50d4b46",
"branch_name": "refs/heads/main",
"committer_date": 1630253847000,
"content_id": "b08d9113e4f0f0fe5798652242bc94e0527e5ff3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0e6258cbc71c1c3739821bd985997fb6499fb287",
"extension": "py",
... | 2.734375 | stackv2 | #pip install datetime
import time
import platform
import getpass
machine=str(platform.node())
architecture=str(platform.architecture())
opsys=str(platform.system())
os_vers=str(platform.release())
proces=str(platform.processor())
py_vers=str(platform.python_version())
a='\n'
a1='Machine: '
a2='Architecture: '
a3='OS: '... | 22 | 30.73 | 88 | 23 | 207 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c6649edc49ace685_a0e85baa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
22
] | [
null
] | [
7
] | [
83
] | |
2024-11-18T19:03:39.325785+00:00 | 1,522,717,709,000 | cfcee72d5c2179bf86339d698091b4b2febc8a3d | 3 | {
"blob_id": "cfcee72d5c2179bf86339d698091b4b2febc8a3d",
"branch_name": "refs/heads/master",
"committer_date": 1522717709000,
"content_id": "1d32d037bbfb16f762c493ab0b092ca02ba90e98",
"detected_licenses": [
"MIT"
],
"directory_id": "cdbe873293b8f4046d6c2d703526b1c2333a0cff",
"extension": "py",
"fi... | 2.71875 | stackv2 | #-------------------------------------------------------------------------------
# Name: Event Factory
# Purpose: Contains factories for creating appropriate events.
#
# Author: tetrisd
#-------------------------------------------------------------------------------
from . import event as evt
import re... | 106 | 27.21 | 96 | 17 | 630 | python | [{"finding_id": "codeql_py/overly-large-range_54292b8430198a73_ff991d1b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
93
] | [
null
] | [
51
] | [
54
] | |
2024-11-18T19:28:37.182900+00:00 | 1,590,406,024,000 | 40657406abb5714c9eccc93e14efae6353a6c161 | 3 | {
"blob_id": "40657406abb5714c9eccc93e14efae6353a6c161",
"branch_name": "refs/heads/master",
"committer_date": 1590406024000,
"content_id": "cb27749e345413f8a0f6ee4bf99cf95207bc6b54",
"detected_licenses": [
"MIT"
],
"directory_id": "e9165ab1ae366130e313a9e748499a672e60fa31",
"extension": "py",
"fi... | 2.515625 | stackv2 | import os
import sys
import re
from shutil import copy
from collections import OrderedDict
import imghdr
from jinja2 import Environment, FileSystemLoader, Template
from slugify import slugify
from yaml import load, dump
from pathlib import Path
home = str(Path.home())
DEBUG = True
COPY = True # whether to copy image f... | 151 | 34.58 | 115 | 27 | 1,209 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4a8509bcfc6b6556_38f83678", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
139
] | [
null
] | [
11
] | [
116
] | |
2024-11-18T19:28:44.747890+00:00 | 1,601,677,106,000 | 20967401981c66c7466699656b43855e597e4b56 | 3 | {
"blob_id": "20967401981c66c7466699656b43855e597e4b56",
"branch_name": "refs/heads/master",
"committer_date": 1601677106000,
"content_id": "fc7e600ef0b586690dec87c90a20ba7bf498d5ab",
"detected_licenses": [
"MIT"
],
"directory_id": "ba40ad5865bb3e8c09ef32ace6f452162aacc8c9",
"extension": "py",
"fi... | 2.65625 | stackv2 | import re
def enum(*sequential, **named):
enums = dict(zip(sequential, range(len(sequential))), **named)
from_string = dict((key, value) for key, value in enums.items())
from_int = dict((value, key) for key, value in enums.items())
enums['from_string'] = from_string
enums['from_int'] = from_int
... | 193 | 30.56 | 79 | 19 | 1,467 | python | [{"finding_id": "codeql_py/redos_3476b207032ec810_de57ab50", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '|\\n-|' and containing many repet... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '|\\n-|' and containing many repetitions of '---|'.",
"This part of the regular expression may cause exponential backtracking on strings starting with '|\\n-|-' and containing many repetitions of ':-|-'."
] | [
19,
19
] | [
null,
null
] | [
51,
53
] | [
53,
55
] | |
2024-11-18T19:28:54.408661+00:00 | 1,634,674,014,000 | 75bb72b5d654737fba8bb1ac2dfee42c5eb82197 | 3 | {
"blob_id": "75bb72b5d654737fba8bb1ac2dfee42c5eb82197",
"branch_name": "refs/heads/main",
"committer_date": 1634674014000,
"content_id": "748fe4cc1ba75cb8c677e60d8901c9eafaad4c24",
"detected_licenses": [
"MIT"
],
"directory_id": "7fef9f162f7be5829482ac8ac520ce20d5f8f99d",
"extension": "py",
"file... | 3.265625 | stackv2 | from collections import deque
pizza_orders = deque([int(x) for x in input().split(", ")])
employees = [int(x) for x in input().split(", ")]
orders_count = 0
while pizza_orders and employees:
while pizza_orders and (pizza_orders[0] <= 0 or pizza_orders[0] > 10):
pizza_orders.popleft()
if not pizza_or... | 44 | 27.39 | 74 | 16 | 293 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2fc64fbae226ed0e_0d0abfa1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
37,
40
] | [
38,
null
] | [
11,
15
] | [
47,
69
] | |
2024-11-18T19:39:46.311126+00:00 | 1,614,592,078,000 | cb58339a62292a1dc70563e19ddccec51d4767ae | 3 | {
"blob_id": "cb58339a62292a1dc70563e19ddccec51d4767ae",
"branch_name": "refs/heads/main",
"committer_date": 1614592078000,
"content_id": "3f009f5d5a6ed89bd449700712c09ba61d7da60c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "892c91fea073ae30950d538d5268e1c2ce84a52b",
"extension": "py",
... | 2.875 | stackv2 | import argparse
import glob
import json
from pathlib import Path
from types import SimpleNamespace
from typing import List
from flask import Flask, render_template
def parse_args() -> SimpleNamespace:
parser: argparse.ArgumentParser = argparse.ArgumentParser(description="Flask server to view hanabi games.")
... | 55 | 38.93 | 111 | 15 | 455 | python | [{"finding_id": "codeql_py/reflective-xss_00eebb5dca429ad4_ff8fe89d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 6 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provide... | [
42,
44,
49,
41,
43,
46
] | [
null,
null,
null,
null,
null,
null
] | [
16,
16,
16,
12,
12,
10
] | [
72,
71,
66,
16,
16,
14
] | |
2024-11-18T19:39:49.811883+00:00 | 1,499,964,840,000 | dcefc38c0e56b73fc3c699f9e987ab32125e4dec | 3 | {
"blob_id": "dcefc38c0e56b73fc3c699f9e987ab32125e4dec",
"branch_name": "refs/heads/master",
"committer_date": 1499964840000,
"content_id": "4d0bb709c256acf699b77ccea4c76961b75e0582",
"detected_licenses": [
"MIT"
],
"directory_id": "def6ada035a86750a19dce65aa1d1a058988aea1",
"extension": "py",
"fi... | 2.953125 | stackv2 | # -*- coding:utf8 -*-
"""HTTP requests module."""
from __future__ import unicode_literals
import hmac
import hashlib
from base64 import b64encode
def build_signature(method, path, api_key, secret_key, expires):
"""Build API request signature.
:param method: request method
:type method: basestring
:pa... | 29 | 28.66 | 69 | 13 | 219 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_96fd4f4cc33b4565_7401389c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
28
] | [
null
] | [
42
] | [
53
] | |
2024-11-18T19:39:53.689646+00:00 | 1,636,828,330,000 | 10c7f1cc02f54274d2d3c3dda74596f52a981297 | 3 | {
"blob_id": "10c7f1cc02f54274d2d3c3dda74596f52a981297",
"branch_name": "refs/heads/main",
"committer_date": 1636828330000,
"content_id": "83e3ead6c0c5556e3b47f4b9db90e5e154e66af2",
"detected_licenses": [
"MIT"
],
"directory_id": "e0db3dae526152d990e9fedabbe48c57d781690e",
"extension": "py",
"file... | 2.625 | stackv2 | import requests
import re
BASE_URL = "https://en.wikichip.org/wiki/amd"
def parse_codename(cpu_name):
"""
Queries the AMD section from wikichip,
parses the contents, and looks for the codename/µarch.
"""
formatted = re.sub(
r"(\d{1,2}?(-Core\s?)?(Processor))", "", cpu_name.replace("AMD",... | 76 | 25.04 | 108 | 19 | 533 | python | [{"finding_id": "codeql_py/redos_83c7aeecf7231743_01f4f30f", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<ahref=\"/wiki/amd/cores/' and co... | 6 | true | [
"CWE-1333",
"CWE-1333",
"CWE-1333",
"CWE-1333",
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos",
"py/redos",
"py/redos",
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '<ahref=\"/wiki/amd/cores/' and containing many repetitions of '0'.",
"This part of the regular expression may cause exponential backtracking on strings starting with '<ahref=\"/wiki/amd/cores/a' and containing many r... | [
43,
43,
54,
54,
66,
66
] | [
null,
null,
null,
null,
null,
null
] | [
52,
63,
65,
76,
49,
60
] | [
60,
72,
73,
85,
57,
69
] | |
2024-11-18T19:40:03.031642+00:00 | 1,587,721,921,000 | a41fb62af3df319adefa6f85543a34e8fc01fdfa | 4 | {
"blob_id": "a41fb62af3df319adefa6f85543a34e8fc01fdfa",
"branch_name": "refs/heads/master",
"committer_date": 1587721921000,
"content_id": "b8a9e501de4069a86187575f65b6c3e474d61476",
"detected_licenses": [
"MIT"
],
"directory_id": "ca7c4b6c3b51452f669bab937c441e5970010aa0",
"extension": "py",
"fi... | 3.59375 | stackv2 | import itertools
import time
import string
import sys
with open('passphrases.txt','r') as f_open:
data = f_open.read()
print('Thnaks You For Using It, If you Like it, Please contribute!')
time.sleep(3)
pas = str(input('What is your password > '))
def guess_password(real):
chars = string.ascii_lowercase + stri... | 24 | 27.71 | 75 | 13 | 163 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c9cd7e9856fb6dde_97c525a1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
24
] | [
null
] | [
7
] | [
26
] | |
2024-11-18T20:18:06.063169+00:00 | 1,611,615,238,000 | 3d414702dd04efabd609ae643fea2df8c004eb13 | 3 | {
"blob_id": "3d414702dd04efabd609ae643fea2df8c004eb13",
"branch_name": "refs/heads/main",
"committer_date": 1611615238000,
"content_id": "c8112f3966f56a02b757e35b60417223e447fb77",
"detected_licenses": [
"MIT"
],
"directory_id": "38914ce315357c9a6bffe6aa61638333f43d29b7",
"extension": "py",
"file... | 2.515625 | stackv2 | #!/usr/bin/env python3
import json
import sys
import time
from io import BytesIO
from typing import List, Tuple
import cv2
import requests as rq
import urllib3
from PIL import Image
def sss_login(address: str, account: str, passwd: str,
otp: str = '') -> rq.sessions.Session:
'''Takes a LoginInfo o... | 139 | 30.65 | 79 | 15 | 1,066 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3b2aca30e09e92d4_450a893f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-295"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/request-without-cert-validation"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This request may run without certificate validation because [it is disabled](1)."
] | [
34,
41,
32
] | [
null,
null,
null
] | [
37,
19,
24
] | [
50,
32,
63
] | |
2024-11-18T20:18:17.832469+00:00 | 1,571,740,215,000 | 68ece0feff9e1a7de0770c68ab84338d029c3094 | 3 | {
"blob_id": "68ece0feff9e1a7de0770c68ab84338d029c3094",
"branch_name": "refs/heads/master",
"committer_date": 1571740215000,
"content_id": "d311c95510ecac2ffb56f7f8f88b5f9b1b1520ef",
"detected_licenses": [
"MIT"
],
"directory_id": "445a0b087e76f9c7dc5ae67840fe842cf85e41d7",
"extension": "py",
"fi... | 2.578125 | stackv2 | import asyncio
import functools
import logging
import pathlib
import typing
from aiohttp import web
from player import Playlist, Player
logger = logging.getLogger(__name__)
def api_endpoint(
handler: typing.Callable[[web.Request], typing.Awaitable[web.Response]]
) -> typing.Callable[[web.Request], typing.Awai... | 152 | 32.01 | 87 | 18 | 1,072 | python | [{"finding_id": "codeql_py/log-injection_406edd3a654d4826_e8f3194b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
26
] | [
null
] | [
26
] | [
55
] | |
2024-11-18T20:18:23.097546+00:00 | 1,620,995,596,000 | cfe2a7478fc5b6bb48699d0e49b9d55c6432d299 | 3 | {
"blob_id": "cfe2a7478fc5b6bb48699d0e49b9d55c6432d299",
"branch_name": "refs/heads/master",
"committer_date": 1620995596000,
"content_id": "8de502881d5a84c9ab5f934a94a6a63be2cfaf86",
"detected_licenses": [
"MIT"
],
"directory_id": "f5ddc12ba12168ec033d6914af3c4308c4d1bf90",
"extension": "py",
"fi... | 2.546875 | stackv2 | import os
import wget
import json
import errno
import shutil
import socket
import tarfile
import logging
import urllib.request
DISCLAIMER = (
"\nDISCLAIMER: PAGnol is made available under the MIT licence: "
"By downloading its models/assets, you agree with the terms of the licence agreement.\n"
"Under no c... | 246 | 30.3 | 92 | 19 | 1,703 | python | [{"finding_id": "codeql_py/tarslip_2b4e58f06e3e9173_e23309a0", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
149
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T20:18:32.751669+00:00 | 1,450,937,331,000 | 7f2040b3a284c33d989735e6f2de14f6e93223dd | 3 | {
"blob_id": "7f2040b3a284c33d989735e6f2de14f6e93223dd",
"branch_name": "refs/heads/master",
"committer_date": 1450937331000,
"content_id": "3648cff391f5dddc0e7c56ee39bd2242acf79614",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "4c8f78c1042a2117cee33072ec07b01144fa2e4b",
"extension": "p... | 3 | stackv2 | """
Send message by a phone number.
"""
import datetime
import requests
import hashlib
VER_ACCOUNT_SID = "8a70971adf5ba2d4598193cc03fcbaa2"
VER_AUTH_TOKEN = "7c7c4e5d324b7efbf75db740fdf6a253"
VER_TEM_ID = "12750"
VER_APP_ID = "71ca63be653c45129a819964265eccec"
VER_URL = "https://www.ucpaas.com/maap/sms/code"
VER_VERSI... | 64 | 21.34 | 74 | 12 | 453 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6f1736db55966116_6e9e9cf0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 2 | true | [
"CWE-327",
"CWE-295"
] | [
"py/weak-sensitive-data-hashing",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",
"This request may run without certificate validation because [it is disabled](1)."
] | [
37,
51
] | [
null,
null
] | [
14,
16
] | [
61,
70
] | |
2024-11-18T20:18:45.812726+00:00 | 1,545,070,995,000 | 33d90c793a150d1c469047e0d0d8d45463ad4c75 | 4 | {
"blob_id": "33d90c793a150d1c469047e0d0d8d45463ad4c75",
"branch_name": "refs/heads/master",
"committer_date": 1545070995000,
"content_id": "0f2c08d715505d51123c89203521c9afa0ce20d6",
"detected_licenses": [
"MIT"
],
"directory_id": "c6b9b3f3d74572bd32ab38b7502122a4dfdca5da",
"extension": "py",
"fi... | 3.796875 | stackv2 | '''
1 datetime:处理时间和日期的标准库
datetime是模块,还包含一个datetime类
datetime类可获取指定时间日期
timestamp 时间戳 1970.1.1 00:00
datetime和timestamp转换:fromtiemstamp()方法
str转换为datetime:datetime.strptime()
反之 datetime.strftime()
datetime加减
2 collections:集合模块
namedtuple:定义坐标,可根据属性来引用
deque: 实现高效的插入和... | 302 | 21.56 | 80 | 19 | 2,410 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_94c278bb9cce90f4_21c6601e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp... | [
211,
228
] | [
null,
null
] | [
15,
24
] | [
39,
41
] | |
2024-11-18T20:18:56.556807+00:00 | 1,588,760,471,000 | e87509c7771ff2f3a6a8610761cab991153c5401 | 2 | {
"blob_id": "e87509c7771ff2f3a6a8610761cab991153c5401",
"branch_name": "refs/heads/master",
"committer_date": 1588760471000,
"content_id": "2f134d16ba3239da514bf0c9f6ab2b9be6defbe2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7d639c8a9842fd1cba999079bac8b1dec24c33ab",
"extension": "py"... | 2.3125 | stackv2 | # coding: utf-8
import os
import re
from utils.tool import Tools
__author__ = 'deff'
from scanner.base import BaseScanner
import json
from utils.sdkinfo import sdkinfo
from config import config
# api审计
# 0. 隐私信息api :手机号/imei/imsi/mac/android id/gps/通讯录/应用程序列表/网页浏览记录(静态检测,后续动态可以进行hook对应函数检测)
# 0.1 http url链接检测
# 1.... | 195 | 37.11 | 129 | 22 | 1,798 | python | [{"finding_id": "codeql_py/overly-large-range_ad87b902c65448b4_4848cef4", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
74
] | [
null
] | [
62
] | [
65
] | |
2024-11-18T20:29:47.410431+00:00 | 1,616,426,391,000 | e941d7785a9b27234d12e5c3c21376c50fc8a226 | 3 | {
"blob_id": "e941d7785a9b27234d12e5c3c21376c50fc8a226",
"branch_name": "refs/heads/main",
"committer_date": 1616426391000,
"content_id": "fd8e7b126ad958a28ab4149071c7276867b1613e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8f2be6cb532624e437d0061dfcdbeb085bc33eff",
"extension": "py",
... | 2.796875 | stackv2 | from jinja2 import Environment, BaseLoader
from datetime import datetime
from dateutil.relativedelta import relativedelta
class Jinja:
@property
def env(self):
try:
return self._env
except AttributeError:
self._env = Environment(loader=BaseLoader())
self.se... | 42 | 31.88 | 79 | 17 | 308 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0e0ad30a1230aa6e_e6e3e640", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
null
] | [
25
] | [
57
] | |
2024-11-18T20:51:29.570863+00:00 | 1,692,828,071,000 | 4fa09a99e08c1fd18446353409d12514a4ea9e66 | 2 | {
"blob_id": "4fa09a99e08c1fd18446353409d12514a4ea9e66",
"branch_name": "refs/heads/main",
"committer_date": 1692828071000,
"content_id": "b45f5f3bf9af60802b69f880b3dbebc7068b08b4",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "a3d6556180e74af7b555f8d47d3fea55b94bcbda",
"extension": "py"... | 2.453125 | stackv2 | #!/usr/bin/env python3
# Copyright 2019 The Chromium Authors
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
"""Wraps an executable and any provided arguments into an executable script."""
import argparse
import os
import sys
import textwrap
# The bash template ... | 251 | 31.98 | 96 | 14 | 1,980 | python | [{"finding_id": "codeql_py/overly-permissive-file_940b0c34301ff8a8_acce1abb", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to group readable."
] | [
217
] | [
null
] | [
3
] | [
39
] | |
2024-11-18T19:07:25.248453+00:00 | 1,569,857,706,000 | ab884bc53aea45c122b91e204439233bef170961 | 3 | {
"blob_id": "ab884bc53aea45c122b91e204439233bef170961",
"branch_name": "refs/heads/master",
"committer_date": 1569857706000,
"content_id": "0701e88dee26723a7fbb9a2fba19d584368f467b",
"detected_licenses": [
"MIT"
],
"directory_id": "d46f52b0558b88dd109a7447c4608fc1f8e7eb2f",
"extension": "py",
"fi... | 2.515625 | stackv2 | # coding: utf-8
import logging
from flask import Blueprint, jsonify, abort, g
from backend.business.volunteers import VolunteerDomain
from backend.business.exceptions import DataNotFoundException
logger = logging.getLogger(__name__)
blueprint = Blueprint('Volunteer', __name__)
@blueprint.route('/<string:vk_id>/jo... | 36 | 26.83 | 77 | 12 | 242 | python | [{"finding_id": "codeql_py/log-injection_07084d87d4d6adbc_00f51d93", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)."
] | [
16
] | [
null
] | [
17
] | [
53
] | |
2024-11-18T19:07:26.402075+00:00 | 1,520,201,224,000 | 91bcba5687676464efc54940fd32338e34ef0482 | 2 | {
"blob_id": "91bcba5687676464efc54940fd32338e34ef0482",
"branch_name": "refs/heads/master",
"committer_date": 1520201224000,
"content_id": "d4a682fb1003881f9687e14f38a4ae584adda6e7",
"detected_licenses": [
"MIT"
],
"directory_id": "55aa3ecdc1f14232354292babeb837feed3f2802",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python3
from flask import Flask, request, jsonify, redirect, url_for, render_template, send_file, Response
from werkzeug.datastructures import Headers
from flask_cors import CORS, cross_origin
from flask_compress import Compress
import os
app = Flask(__name__)
CORS(app)
Compress(app)
Port = 80
imgDir ... | 63 | 23.25 | 98 | 16 | 386 | python | [{"finding_id": "codeql_py/path-injection_bc4fda04219a8a84_331b3dbd", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
55
] | [
null
] | [
22
] | [
30
] | |
2024-11-18T19:07:33.384550+00:00 | 1,615,452,574,000 | 434062456dfd2ab354ab816445b6d0daf2462b8d | 3 | {
"blob_id": "434062456dfd2ab354ab816445b6d0daf2462b8d",
"branch_name": "refs/heads/master",
"committer_date": 1615452574000,
"content_id": "03aa5ae299d2531dad4fd3287dc54b2fc453709f",
"detected_licenses": [
"MIT"
],
"directory_id": "01f57a90bf05c718e0249d2403cf748cd57a31c6",
"extension": "py",
"fi... | 2.71875 | stackv2 | """ Made by Dhruman Gupta """
import sys
import base64
import os.path
from selenium import webdriver
from selenium.webdriver.support.ui import WebDriverWait
from selenium.webdriver.support import expected_conditions as EC
from selenium.webdriver.common.by import By
from selenium.common.exceptions import NoSuchElementE... | 165 | 31.22 | 117 | 14 | 1,307 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6a0911a635aeba87_4a589882", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
133,
120,
124
] | [
null,
null,
null
] | [
16,
11,
15
] | [
31,
73,
77
] | |
2024-11-18T19:07:48.259135+00:00 | 1,440,646,121,000 | 0f0452b41449c11529899b767d1550baffb52eb5 | 3 | {
"blob_id": "0f0452b41449c11529899b767d1550baffb52eb5",
"branch_name": "refs/heads/master",
"committer_date": 1440646121000,
"content_id": "77b5429d2b92f63304f6fcc95b86a5bdf5330d78",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5dd30be12cad26d76b8dde4b98fe1cd7b78b1ce5",
"extension": "py"... | 2.609375 | stackv2 | from flask import Flask
from flask import request
import requests
import re
import json
import sys
app = Flask(__name__)
@app.route('/search', methods=['POST', 'GET'])
def hello_world():
key=request.args.get('key', '')
page=request.args.get('page', '')
r=requests.get("https://www.google.com/search?q="+key+'... | 22 | 28.64 | 90 | 17 | 197 | python | [{"finding_id": "codeql_py/polynomial-redos_2799b50f257744dd_ed53a00a", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin... | 3 | true | [
"CWE-1333",
"CWE-079",
"CWE-918"
] | [
"py/polynomial-redos",
"py/reflective-xss",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with 'url?q=' and with many repetitions of 'url?q=a'.\nThis [regular expression](3) that depends on a [user-provided value](2) may run slow on strings starting with 'url?q=&' and with many repetitions of '&a... | [
13,
20,
12
] | [
null,
null,
null
] | [
53,
12,
7
] | [
59,
27,
91
] | |
2024-11-18T19:18:48.160699+00:00 | 1,585,610,014,000 | 58c8b688d0c1e1e448b04e001bcfa59acc980025 | 2 | {
"blob_id": "58c8b688d0c1e1e448b04e001bcfa59acc980025",
"branch_name": "refs/heads/master",
"committer_date": 1585610014000,
"content_id": "8eb501a807b39ea26d14d56619fc1990fa6b2acd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "43dea3ac2f12cad95c2b94a5f037c4edd2ac3679",
"extension": "py"... | 2.453125 | stackv2 | # pylint: disable=too-many-instance-attributes
"""Delete Vessel"""
# coding: utf-8
# pylint: disable=bare-except
import os
import json
import subprocess
from configparser import ConfigParser
import requests
from flask import request
from library.common import Common
from library.couch_queries import Queries
from libr... | 160 | 28.54 | 96 | 18 | 1,046 | python | [{"finding_id": "codeql_py/command-line-injection_f7283cb7ae169cfb_963c6182", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 1 | true | [
"CWE-078"
] | [
"py/command-line-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1)."
] | [
153
] | [
null
] | [
36
] | [
39
] | |
2024-11-18T19:18:59.641373+00:00 | 1,615,150,639,000 | 01c6b99a9bc10efc2d2c2119cfb67e5c0375d9ae | 3 | {
"blob_id": "01c6b99a9bc10efc2d2c2119cfb67e5c0375d9ae",
"branch_name": "refs/heads/main",
"committer_date": 1615150639000,
"content_id": "c6c9cace80a0214cb0cdc81d8cc72dd9918d84db",
"detected_licenses": [
"MIT"
],
"directory_id": "c41e9094cf815d22bf20d122e689238d659f1818",
"extension": "py",
"file... | 2.703125 | stackv2 | """
Groundswell is an util module for continuous inspection of a hashtag
"""
import numpy as np
import pickle
import datetime as dt
import os
import random
import time
from instagramy import InstagramHashTag
from nedima.utils import env_setup
##############################################
##### KNOWN POST IDENTIFI... | 247 | 43.49 | 164 | 17 | 2,527 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_066771419b429bd6_d0026221", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.",
"This expression logs [sensitive data (secret)](... | [
219,
225
] | [
null,
null
] | [
15,
15
] | [
103,
106
] | |
2024-11-18T19:29:37.316500+00:00 | 1,432,217,921,000 | ee100a63ddc5436d0565ac1ebaf76086f76b7dfb | 2 | {
"blob_id": "ee100a63ddc5436d0565ac1ebaf76086f76b7dfb",
"branch_name": "refs/heads/master",
"committer_date": 1432217921000,
"content_id": "3ac0f3bb3e2daf74a44a8035138c0aa479eebf8a",
"detected_licenses": [
"MIT"
],
"directory_id": "187d4f4c36c72578bb33f846a905566095e93435",
"extension": "py",
"fi... | 2.375 | stackv2 | import tornado.web
import tornado.ioloop
import hashlib
from vlang.parser import parserRaw
from tornado.concurrent import run_on_executor
from concurrent.futures import ThreadPoolExecutor
maxWorks = 10
# 启动服务器
def start(mainMenu, settings):
global maxWorks
maxWorks = settings.get('maxWorks', 10)
applicatio... | 71 | 30.8 | 95 | 15 | 519 | python | [{"finding_id": "codeql_py/reflective-xss_9576d0377d58fd95_96f6a6f7", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
35
] | [
null
] | [
28
] | [
35
] | |
2024-11-18T19:29:45.396058+00:00 | 1,618,218,055,000 | 5fa7a29f2529f677acb8877b4f7256d29e3ad575 | 2 | {
"blob_id": "5fa7a29f2529f677acb8877b4f7256d29e3ad575",
"branch_name": "refs/heads/master",
"committer_date": 1618218055000,
"content_id": "6ec7c5dd99ef543012ef31c437e787734acc00dc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4c0feccaec9c2b1d9124c43fd264c5d723a6d0a2",
"extension": "py"... | 2.375 | stackv2 | import logging as log
import urllib.parse
import os
import requests
from requests.auth import HTTPBasicAuth
HNDL_RESOLVE_PREFIX = 'http://hdl.handle.net/'
HNDL_CERT_FILE = '/hps-b2handle/certs/cert.pem'
HNDL_KEY_FILE = '/hps-b2handle/certs/privkey.pem'
def resolve_handle(hndl, serviceProperties):
return 'Not impl... | 95 | 35.24 | 85 | 18 | 752 | python | [{"finding_id": "codeql_py/request-without-cert-validation_448537e36929163e_b945c76a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
66
] | [
67
] | [
17
] | [
72
] | |
2024-11-18T19:29:55.188028+00:00 | 1,484,502,514,000 | 7bff1550fd2692d9b143afc405983295a9ddc9ba | 2 | {
"blob_id": "7bff1550fd2692d9b143afc405983295a9ddc9ba",
"branch_name": "refs/heads/master",
"committer_date": 1484502514000,
"content_id": "909c91c51ad86969ed51c674dc5cb831970e156e",
"detected_licenses": [
"MIT"
],
"directory_id": "05e45b08595959a7b8ab9303704749f5306aa493",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/env python
import os
import re
import pygal
import json
import requests
from bson import json_util
import logging
from pymongo import MongoClient
from datetime import datetime
from datetime import timedelta
logging.basicConfig(filename='{0}weather.log'.format(os.environ['OPENSHIFT_PYTHON_LOG_DIR']),
... | 186 | 30.11 | 100 | 19 | 1,457 | python | [{"finding_id": "codeql_py/log-injection_35f75228008e159e_367896c0", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
33
] | [
null
] | [
23
] | [
27
] | |
2024-11-18T19:58:06.371458+00:00 | 1,591,464,394,000 | 732f0376db9f588a7afd043f6d4430d9985f7185 | 2 | {
"blob_id": "732f0376db9f588a7afd043f6d4430d9985f7185",
"branch_name": "refs/heads/master",
"committer_date": 1591464394000,
"content_id": "c179cc711e70ee594a04d3ffef0cbbb4a79e68e4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fc00010c645432052ceff7b7fcbcaa1cdda79cb7",
"extension": "py"... | 2.421875 | stackv2 | from .face_age_gender_recognition.face_age_gender_recognition import FaceAgeGenderRecognition
from .emotion_recognition.emotion_recognition import EmotionRecognition
from .facial_landmark.facial_landmark import FacialLandmark
from .head_pose_estimation.head_pose_estimation import HedPoseEstimation
__model_factory = {
... | 29 | 34.9 | 103 | 12 | 242 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eeb9522606c03e52_1376539e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
29
] | [
null
] | [
11
] | [
39
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.