added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T19:14:51.495513+00:00 | 1,615,286,196,000 | 178cad566f1b39bc87f28cdb5731479b269a8ed4 | 3 | {
"blob_id": "178cad566f1b39bc87f28cdb5731479b269a8ed4",
"branch_name": "refs/heads/master",
"committer_date": 1615286282000,
"content_id": "191a043d8ceae9a854fa53061cf7552abfedc7b9",
"detected_licenses": [
"MIT"
],
"directory_id": "b1a01db82cc5300d6bd0f37d72a9fbdba141c81e",
"extension": "py",
"fi... | 2.609375 | stackv2 | #!/bin/python
import dataclasses
import json
import subprocess
import click
CONFIG_FILE = "/root/Arduino/libraries/Airpixel/config.h"
ARDUINO_NANO_33_IOT_FQBN = "arduino:samd:nano_33_iot"
class NoDeviceError(Exception):
pass
def to_bytes(string: str) -> bytes:
return bytes(string, "utf-8").decode("unicode... | 217 | 25.66 | 87 | 15 | 1,486 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a4f4bf7b752243dc_c8d1fe08", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
55,
193
] | [
null,
null
] | [
21,
11
] | [
39,
29
] | |
2024-11-18T19:27:40.847808+00:00 | 1,631,596,124,000 | 97d8eea1f3a89793e238b64bcf271c3a14307665 | 2 | {
"blob_id": "97d8eea1f3a89793e238b64bcf271c3a14307665",
"branch_name": "refs/heads/master",
"committer_date": 1631596124000,
"content_id": "340cb6c5c73328ad6d637efbc624b7fcb5b6cb32",
"detected_licenses": [
"MIT"
],
"directory_id": "f345029b0c629f5ae6326d8f636cf1f7a6940771",
"extension": "py",
"fi... | 2.421875 | stackv2 | import json
import logging
import math
import os
from threading import Thread
import requests
from service.list_reader_service import load_identifier_list_of_type
from utils import chunks
alma_api_base_url = 'https://api-eu.hosted.exlibrisgroup.com/almaws/v1/'
def update_portfolio_list(project):
ht_numbers = l... | 153 | 45.71 | 118 | 20 | 1,413 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_db34b696e63dda03_4111a3f3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
66,
86,
99,
150
] | [
null,
null,
null,
151
] | [
26,
37,
38,
33
] | [
87,
111,
118,
115
] | |
2024-11-18T19:27:51.438457+00:00 | 1,614,324,776,000 | 9a4073b24eed78d90d1d909761e5e84e562f1176 | 3 | {
"blob_id": "9a4073b24eed78d90d1d909761e5e84e562f1176",
"branch_name": "refs/heads/master",
"committer_date": 1614324776000,
"content_id": "962b57552cb34b0e02f8fe3b6ace80185c9fb7d8",
"detected_licenses": [
"MIT"
],
"directory_id": "e030f685f993741c04ec0f8fc1c4c82fb5936a1d",
"extension": "py",
"fi... | 2.5625 | stackv2 | from aiohttp import web
import requests
import json
class GiraService:
def __init__(self, serverIp, token):
self.serverIp = serverIp
self.token = token
self.valueCache = dict()
def load_cache(self, dpUid):
for uid in dpUid:
if not uid in self.valueCache:
... | 137 | 39.01 | 160 | 21 | 1,259 | python | [{"finding_id": "codeql_py/request-without-cert-validation_2e61ce17e4af24cc_738b2b58", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 7 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
14,
34,
46,
59,
75,
116,
132
] | [
null,
null,
null,
null,
null,
null,
136
] | [
21,
9,
9,
13,
13,
9,
13
] | [
161,
147,
147,
151,
151,
147,
58
] | |
2024-11-18T19:38:47.239480+00:00 | 1,606,574,628,000 | c00ba0030d4f908f5a2cbf077e7dc938cd1d7885 | 2 | {
"blob_id": "c00ba0030d4f908f5a2cbf077e7dc938cd1d7885",
"branch_name": "refs/heads/master",
"committer_date": 1606574628000,
"content_id": "f66fa62174c62cf20d8206aba618ca293e5ed044",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "77bcfb148670ea7df08b2327617f247e21097df9",
"extension": "py"... | 2.46875 | stackv2 | from pathlib2 import Path
import json
import requests
from urllib.parse import quote
import aiohttp
import asyncio
import logging
# 初始化日志配置
logger = logging.getLogger(__name__)
logger.setLevel(logging.DEBUG)
streamHandler = logging.StreamHandler()
streamHandler.setLevel(logging.INFO)
fileHandler = logging.FileHandler... | 312 | 23.55 | 88 | 16 | 2,355 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_23d664e5288327f5_1a3db29c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensi... | [
64,
95,
133,
167,
168,
250
] | [
null,
null,
null,
null,
null,
null
] | [
13,
21,
21,
25,
25,
25
] | [
48,
74,
29,
31,
28,
31
] | |
2024-11-18T19:38:49.045210+00:00 | 1,549,588,973,000 | bc32633a905b672ec22eed6641f459c29632c308 | 2 | {
"blob_id": "bc32633a905b672ec22eed6641f459c29632c308",
"branch_name": "refs/heads/master",
"committer_date": 1549588973000,
"content_id": "f10ca91c9ab82e71a6cef9c3e9984a4cb860b76f",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "77e4efc20b1ddf775fb87c492df20015e181e4e5",
"extension": "p... | 2.421875 | stackv2 | # Copyright (c) 2018 Georgia Tech Research Corporation
# Distributed under the terms of the BSD-3-Clause License
""" IPython magics for Robot Framework
"""
import argparse
from IPython import get_ipython
from IPython.core.magic import Magics, cell_magic, magics_class
from ..reporter import KernelReporter
from ..runn... | 81 | 29.77 | 87 | 18 | 561 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_80816bc7177a14fa_b4803c49", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
62
] | [
null
] | [
20
] | [
34
] | |
2024-11-18T19:38:51.592111+00:00 | 1,589,906,108,000 | 33589364ba57aeec3df56eca7f51ee6a3600c82a | 2 | {
"blob_id": "33589364ba57aeec3df56eca7f51ee6a3600c82a",
"branch_name": "refs/heads/master",
"committer_date": 1589906108000,
"content_id": "51f22a2a4ead577412fe3af6a38863dd3cac7891",
"detected_licenses": [
"MIT"
],
"directory_id": "e412262aecdafbf5f108048b4b1064e28fc8ae78",
"extension": "py",
"fi... | 2.3125 | stackv2 | from stream import DataInputStream
LAYER_TYPES = ('objects', 'doodads', 'paths')
ANIM_LOOP_TYPES = ('contiguous', 'loop', 'reverse loop')
ANIM_CURVE_TYPES = ('linear', 'sin', 'cos')
ANIM_TYPES = ('X pos', 'Y pos', 'angle', 'X scale', 'Y scale', 'opacity')
NODE_TYPES = ('passthrough', 'stop', 'level', 'change', 'world ... | 184 | 30.11 | 133 | 21 | 2,026 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5f3824dc76fcab5b_b9989409", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.",
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
178,
182
] | [
null,
null
] | [
11,
11
] | [
15,
15
] | |
2024-11-18T19:38:52.195193+00:00 | 1,592,585,681,000 | a6618a6c07162f5fba9ff310f82aa673dde479f3 | 3 | {
"blob_id": "a6618a6c07162f5fba9ff310f82aa673dde479f3",
"branch_name": "refs/heads/master",
"committer_date": 1592585681000,
"content_id": "c2a046b74745d58ebe1ab13136e7db88990530f4",
"detected_licenses": [
"MIT"
],
"directory_id": "e91a2bfd9645f190c675f76ea721f35fe72127d3",
"extension": "py",
"fi... | 2.578125 | stackv2 | from flask import Flask, render_template, request, redirect, url_for, flash, abort, session, jsonify
import json
import os.path
from werkzeug.utils import secure_filename # to check if the file uploaded is safe or nor
app = Flask(__name__) # name of module that is running flask
app.secret_key = 'h23h4h3232njrn2jnjt5ng... | 71 | 34.76 | 100 | 23 | 591 | python | [{"finding_id": "codeql_py/flask-debug_ec86b3f07174f0f8_68058467", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
71,
33
] | [
null,
null
] | [
null,
20
] | [
20,
46
] | |
2024-11-18T19:38:52.497122+00:00 | 1,665,503,317,000 | 88a6970f0b6bd52b6a5591a4ae15c5ffc7d00753 | 2 | {
"blob_id": "88a6970f0b6bd52b6a5591a4ae15c5ffc7d00753",
"branch_name": "refs/heads/master",
"committer_date": 1665503317000,
"content_id": "0ddd40cf3fcecdba09534d891cee85b1da3a6312",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5dc2adf4afe339ac75671de07fcea0a513ac8385",
"extension": "py"... | 2.40625 | stackv2 | #! /bin/env python
"""
A service class for retrieving data from McM using
an SSO cookie since it sits behind CERN SSO
"""
from builtins import str, object
import json
import os
import pycurl
import subprocess
from io import BytesIO
from WMCore.WMException import WMException
class McMNoDataError(WMException):
... | 122 | 29.14 | 104 | 15 | 895 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b474d2adada0b341_75f43969", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
73
] | [
null
] | [
13
] | [
46
] | |
2024-11-18T20:06:03.391969+00:00 | 1,621,320,007,000 | 0b4eaa3628a03a4821f8530cd1dee90df769273f | 2 | {
"blob_id": "0b4eaa3628a03a4821f8530cd1dee90df769273f",
"branch_name": "refs/heads/master",
"committer_date": 1621320007000,
"content_id": "2fdfe1043fc43b1b696acef6ccfafced4c90c7b8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "21a27683b63e22ef8001a1e7a8f7f76c8e3be04e",
"extension": "py"... | 2.4375 | stackv2 | """General Utility Functions."""
import secrets
import urllib.parse
import aiohttp
from aiohttp_session import get_session
from aiohttp import web
from aiocache import cached
from aiocache.serializers import JsonSerializer
from authlib.jose import jwt
from authlib.jose.errors import MissingClaimError, InvalidClaimEr... | 174 | 41.44 | 151 | 18 | 1,671 | python | [{"finding_id": "codeql_py/stack-trace-exposure_98e4c661fe5bfef6_1dfb5dfa", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 6 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
37,
60,
149,
151,
153,
155
] | [
null,
null,
null,
null,
null,
null
] | [
48,
48,
41,
41,
38,
38
] | [
78,
78,
98,
99,
118,
116
] | |
2024-11-18T20:06:15.066877+00:00 | 1,623,356,903,000 | cb96ff199e9adcb4551d986f2d86ad0202093048 | 3 | {
"blob_id": "cb96ff199e9adcb4551d986f2d86ad0202093048",
"branch_name": "refs/heads/main",
"committer_date": 1623356903000,
"content_id": "a3a78ca67cea49b1ee72230b5a598f16aeab7648",
"detected_licenses": [
"MIT"
],
"directory_id": "6db1592bbec71c1d9678ce52ac1c243e3f3a216b",
"extension": "py",
"file... | 2.921875 | stackv2 | import pandas as pd
import math as m
data_path = "Assignment3_data/"
df = pd.read_csv(data_path + 'titanic_clean.csv')
df.set_index("PassengerId", inplace=True)
df_sex_mean = df.groupby(['Sex']).mean()
df_paid_most = df.nlargest(10,'Fare')
df_ticket = df.groupby(['Ticket'])
df_ticket.transform(lambda x: (sum(x) fo... | 26 | 28.5 | 99 | 10 | 219 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f512ecfca140501b_48bd6771", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
24
] | [
null
] | [
7
] | [
18
] | |
2024-11-18T20:06:18.362766+00:00 | 1,514,511,962,000 | b1dc3257766e37571ca879763215f563c909c8a9 | 2 | {
"blob_id": "b1dc3257766e37571ca879763215f563c909c8a9",
"branch_name": "refs/heads/master",
"committer_date": 1514511962000,
"content_id": "db8f3d589c5d04a3ef525672fca7a64f19b53422",
"detected_licenses": [
"MIT"
],
"directory_id": "92b90789c8c3c27e8ebf13499fece7fd876ecf3e",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/env python
import json
import logging
from typing import List
from flask import request, Response, Flask, abort
import config
from app import logic, ura
app = Flask(__name__)
# Use gunicorn logger
gunicorn_error_logger = logging.getLogger('gunicorn.error')
app.logger.handlers.extend(gunicorn_error_logge... | 121 | 34.58 | 110 | 17 | 952 | python | [{"finding_id": "codeql_py/stack-trace-exposure_752de59477ff6c41_f6d81d7c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 6 | true | [
"CWE-209",
"CWE-215",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/stack-trace-exposure",
"py/flask-debug",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-prov... | [
112,
121,
32,
39,
47,
61
] | [
null,
null,
null,
null,
null,
null
] | [
9,
5,
58,
61,
48,
26
] | [
28,
40,
67,
66,
53,
30
] | |
2024-11-18T20:18:18.333447+00:00 | 1,578,839,878,000 | 1ba77576848cb49f7bcb0fc021d3a22a68408d0e | 3 | {
"blob_id": "1ba77576848cb49f7bcb0fc021d3a22a68408d0e",
"branch_name": "refs/heads/master",
"committer_date": 1578839878000,
"content_id": "0711ffbc010ed94b709f120c64d510807486985e",
"detected_licenses": [
"MIT"
],
"directory_id": "1ebe19998b19fcda64c030f2ae783d31c084cb5a",
"extension": "py",
"fi... | 2.953125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import hashlib
from notebook.controller import NoteService
class NoteBook(object):
"""NoteBook UI"""
def __init__(self):
self.controller = NoteService()
self.choice = ""
self.user = ""
self.user_func()
def exit_note(self):
... | 215 | 30.35 | 82 | 14 | 1,416 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_ce5040605bb3690d_34f8d129", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp... | [
60,
71
] | [
null,
null
] | [
32,
32
] | [
40,
40
] | |
2024-11-18T20:31:20.723233+00:00 | 1,636,359,180,000 | fc54a4bd261c9fdba280750931b66fb4893610db | 2 | {
"blob_id": "fc54a4bd261c9fdba280750931b66fb4893610db",
"branch_name": "refs/heads/main",
"committer_date": 1636359180000,
"content_id": "c397c5827064f0c77b9ec69e23fbf0bd33732e4f",
"detected_licenses": [
"MIT"
],
"directory_id": "4eacbdd3f0612968ae3e621f0a5053202591666e",
"extension": "py",
"file... | 2.375 | stackv2 | from POIs.functions import pack_attributes
import requests
from bs4 import BeautifulSoup
def scrape_BP():
source_url = "https://balticpetroleum.lt/baltic-petroleum-degalines"
html_content = requests.get(source_url, headers = {'User-Agent': 'Mozilla/5.0'}).text
websiteContent = BeautifulSoup(html_content, "... | 55 | 32.49 | 103 | 19 | 469 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c3ab7ca49309eba2_bd32e7bc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
35
] | [
null
] | [
7
] | [
55
] | |
2024-11-18T20:31:26.774753+00:00 | 1,577,023,156,000 | d7aa366fa463997a2a01341d812c2a214feee89c | 3 | {
"blob_id": "d7aa366fa463997a2a01341d812c2a214feee89c",
"branch_name": "refs/heads/master",
"committer_date": 1577023156000,
"content_id": "961fda4f1ff17cb3f965f292e62ec0ce396dbd87",
"detected_licenses": [
"MIT"
],
"directory_id": "890844d4d519f5b4cab71bdd86c04ce808b5ca2e",
"extension": "py",
"fi... | 2.84375 | stackv2 | from flask import Flask, request, make_response, session, redirect, url_for
app = Flask(__name__)
# 设置session必须设置key
app.secret_key = 'Hao'
@app.route('/')
def hello_world():
user_id = request.cookies.get('user_id')
return 'Hello World! %s ' % user_id
# 处理上传的数据使用request,一定要使用post
# request可以获得的data,file,me... | 55 | 22.13 | 75 | 11 | 390 | python | [{"finding_id": "codeql_py/insecure-cookie_69a23628675338d8_7625664a", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"... | 3 | true | [
"CWE-614",
"CWE-1004",
"CWE-079"
] | [
"py/insecure-cookie",
"py/client-exposed-cookie",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cookie is added to response without the 'secure' flag being set.",
"Sensitive server cookie is set without HttpOnly flag.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
28,
28,
11
] | [
null,
null,
null
] | [
5,
5,
12
] | [
51,
51,
40
] | |
2024-11-18T20:43:21.877894+00:00 | 1,596,088,444,000 | 437e8578625d6dc710dfc94906a475cf22892724 | 3 | {
"blob_id": "437e8578625d6dc710dfc94906a475cf22892724",
"branch_name": "refs/heads/master",
"committer_date": 1596088444000,
"content_id": "f72d0142e44b378e8893afaa8b5bbafa3e81c8da",
"detected_licenses": [
"MIT"
],
"directory_id": "eafbb2b22962c818b730f555df2090530d4047dc",
"extension": "py",
"fi... | 2.84375 | stackv2 | from smtplib import SMTP
from email.mime.text import MIMEText
from email.mime.multipart import MIMEMultipart
from jinja2 import Environment, FileSystemLoader
import os
from_email = 'krbdashboard@outlook.com'
password = 'ArushiSinghal'
env = Environment(
loader=FileSystemLoader('./templates/'))
def get_contacts(... | 87 | 24.97 | 71 | 14 | 487 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_797a9e04231cb90d_01411470", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
9
] | [
10
] | [
7
] | [
45
] | |
2024-11-18T20:43:30.300239+00:00 | 1,618,615,445,000 | ac1ac463559aac2da7a3191c2692dad0d4f65f09 | 3 | {
"blob_id": "ac1ac463559aac2da7a3191c2692dad0d4f65f09",
"branch_name": "refs/heads/master",
"committer_date": 1618615445000,
"content_id": "2101fb4c58a05de872efb76abe43aafac863b5a2",
"detected_licenses": [
"MIT"
],
"directory_id": "9f1721da639a11e55f1755365976531a4d0da713",
"extension": "py",
"fi... | 2.734375 | stackv2 | import sys
import pymysql
import datetime
import hashlib
try:
import Tkinter as tk
except ImportError:
import tkinter as tk
try:
import ttk
py3 = False
except ImportError:
import tkinter.ttk as ttk
py3 = True
class ventana:
def __init__(self, top=None):
'''This class configures and ... | 115 | 31.72 | 129 | 16 | 1,069 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_43f1fef3a448653c_0310a109", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
106
] | [
null
] | [
14
] | [
39
] | |
2024-11-18T20:43:31.728952+00:00 | 1,616,947,138,000 | 9cba46eb19c88ba4d26a077c8b8cb03203c732ee | 3 | {
"blob_id": "9cba46eb19c88ba4d26a077c8b8cb03203c732ee",
"branch_name": "refs/heads/master",
"committer_date": 1616947138000,
"content_id": "89ce16bfc90d4d8365d8e4f5bf36168c616e1a89",
"detected_licenses": [
"MIT"
],
"directory_id": "79fbf7a8eb4585dae49a9a8dc54e50acba6a0a89",
"extension": "py",
"fi... | 2.515625 | stackv2 | import itertools
import random
from lxml import etree
import os
import json
import urllib.error
import urllib.parse
import urllib.request
from pyquery import PyQuery as pq
from apiclient.discovery import build
import requests
from settings import *
from utils import highlight_sentence, unique_list
websterTree = etree... | 269 | 30.93 | 170 | 20 | 2,071 | python | [{"finding_id": "codeql_py/request-without-cert-validation_84efbb0753a8863a_11b1f2fb", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
128,
163,
204
] | [
133,
164,
209
] | [
21,
20,
16
] | [
26,
73,
26
] | |
2024-11-18T20:43:39.220490+00:00 | 1,693,598,230,000 | 5e95f0552fb08715dc4daef23a0ecea0469ad3a8 | 2 | {
"blob_id": "5e95f0552fb08715dc4daef23a0ecea0469ad3a8",
"branch_name": "refs/heads/master",
"committer_date": 1693598230000,
"content_id": "ff59147dc5819b5258f7ff91317b46ab3a7c1708",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "2a5483d51ffe40126844a7673ebfcec6c8ccda7a",
"extension": "p... | 2.453125 | stackv2 | from __future__ import absolute_import
from __future__ import unicode_literals
from jinja2 import Environment, FileSystemLoader
def render_template(name, context, template_root):
env = Environment(loader=FileSystemLoader(template_root))
return env.get_template(name).render(context)
def timeago(tdelta):
... | 49 | 25.55 | 67 | 11 | 371 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fc193edd3ff54ea4_375b755f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
8
] | [
null
] | [
11
] | [
62
] | |
2024-11-18T20:44:18.196492+00:00 | 1,560,368,786,000 | 0fa5e0e2e76bd665f5031315addb2991d3980977 | 3 | {
"blob_id": "0fa5e0e2e76bd665f5031315addb2991d3980977",
"branch_name": "refs/heads/master",
"committer_date": 1560368786000,
"content_id": "72b446e14816810d32ba0420738a724a520f1896",
"detected_licenses": [
"MIT"
],
"directory_id": "0c59fb4b295cbdb901f5bbb2fa10842f4ee26d11",
"extension": "py",
"fi... | 2.5625 | stackv2 | from flask import request, render_template, jsonify
from flask_cors import CORS
from .models import User
from .TorchModel import Net
from index import app, db
from sqlalchemy.exc import IntegrityError
from .utils.auth import generate_token, verify_token
import pandas as pd
import numpy as np
import tensorflow as tf
imp... | 305 | 35.92 | 120 | 18 | 2,720 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_442b1dbe9f34b208_b5a59ebd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
182
] | [
null
] | [
11
] | [
17
] | |
2024-11-18T20:57:35.011302+00:00 | 1,470,250,669,000 | eee2898cf73c923650f5b946eb0a1ec695951b42 | 3 | {
"blob_id": "eee2898cf73c923650f5b946eb0a1ec695951b42",
"branch_name": "refs/heads/master",
"committer_date": 1470250669000,
"content_id": "43791a6bafbee627d8ca9652187f0c25518144e7",
"detected_licenses": [
"MIT"
],
"directory_id": "66e1fc7c2465b8b27255ae28c437989971607fbf",
"extension": "py",
"fi... | 2.515625 | stackv2 | import os
import hashlib
import urllib
import hmac
import base64
import urlparse
import datetime
import requests
import json
import api
from waypoints import waypoints_config
from analisis import config
class Segment:
base_url = config.googlemaps['base_url']
client_id = config.googlemaps['client_id']
clie... | 151 | 29.35 | 102 | 17 | 1,168 | python | [{"finding_id": "codeql_py/request-without-cert-validation_8cdb070de6604a47_0d1c0db1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
48
] | [
null
] | [
17
] | [
64
] | |
2024-11-18T20:58:07.013497+00:00 | 1,600,754,228,000 | 76e7c7cc594072e1f7bc95b991cae3636c18f5a4 | 3 | {
"blob_id": "76e7c7cc594072e1f7bc95b991cae3636c18f5a4",
"branch_name": "refs/heads/main",
"committer_date": 1600754228000,
"content_id": "ada0cbb7af421ce1a2ac8643449d886134c23fea",
"detected_licenses": [
"MIT"
],
"directory_id": "460175a035dc59fe465eec8b2b43087f35f37748",
"extension": "py",
"file... | 2.703125 | stackv2 | # Copyright (c) 2020 Wilhelm Shen. See LICENSE for details.
"""\
========================================================
:mod:`slowdown.token` -- The python token implementation
========================================================
Example:
>>> tokenizer = \\
... AES_RC4(
... aes_key=Cryp... | 257 | 31.16 | 73 | 16 | 1,871 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_46675ce0513231b3_6dffeac5", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.",
"[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used."
] | [
182,
239
] | [
null,
null
] | [
18,
26
] | [
44,
44
] | |
2024-11-18T20:58:13.117931+00:00 | 1,541,181,505,000 | aca18bb80d1e5bd74c059c90725665c971a221b6 | 3 | {
"blob_id": "aca18bb80d1e5bd74c059c90725665c971a221b6",
"branch_name": "refs/heads/master",
"committer_date": 1541181505000,
"content_id": "cb3bda9af422dd059b777be352f49cd06b88392c",
"detected_licenses": [
"MIT",
"ISC",
"BSD-2-Clause"
],
"directory_id": "e8204fd975a970071d19cc8133405740ad7f04... | 2.875 | stackv2 | '''Handling of password input and printing passphrases (using ncurses)'''
# Copyright (c) 2012-2016 Tom Willemse <tom@ryuslash.org>
# Copyright (c) 2011-2018 Benjamin Althues <benjamin@babab.nl>
#
# Permission to use, copy, modify, and distribute this software for any
# purpose with or without fee is hereby granted,... | 162 | 31.54 | 77 | 20 | 1,162 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cd20a8730feb44e1_70e5546e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
157,
159
] | [
null,
160
] | [
27,
27
] | [
68,
66
] | |
2024-11-18T20:58:13.978954+00:00 | 1,629,900,536,000 | cd1c02971f4ec2a04c45a086112b0fe62ae3a2d0 | 3 | {
"blob_id": "cd1c02971f4ec2a04c45a086112b0fe62ae3a2d0",
"branch_name": "refs/heads/main",
"committer_date": 1629900536000,
"content_id": "90e9f257971a0cbd311cfb6da16ad8d5d00336bd",
"detected_licenses": [
"MIT"
],
"directory_id": "6f2fd86fdcff8e96e11245a17f74fa645e9583a3",
"extension": "py",
"file... | 2.890625 | stackv2 | import ast
from http.server import HTTPServer, BaseHTTPRequestHandler
import xml.etree.ElementTree as ET
import requests
# Création de l'objet Server
class Server(BaseHTTPRequestHandler):
# Setup du headers
def _set_headers(self):
""" Fonction qui permet de setup le headers
Nom fonction ... | 193 | 42.07 | 117 | 27 | 1,669 | python | [{"finding_id": "codeql_py/xml-bomb_484e2539cbabce78_dd6a05a3", "tool_name": "codeql", "rule_id": "py/xml-bomb", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "XML parsing depends on a [user-provided value](1) without guarding against uncontrolled entity expansion.", "remediatio... | 1 | true | [
"CWE-776"
] | [
"py/xml-bomb"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"XML parsing depends on a [user-provided value](1) without guarding against uncontrolled entity expansion."
] | [
42
] | [
null
] | [
49
] | [
53
] | |
2024-11-18T21:10:11.856575+00:00 | 1,465,392,868,000 | 9bbdab0b3118e281c8bd84b3add91c464aea4d6d | 2 | {
"blob_id": "9bbdab0b3118e281c8bd84b3add91c464aea4d6d",
"branch_name": "refs/heads/master",
"committer_date": 1654843787000,
"content_id": "03488f5ed4950e3d4149175050f14f6cff25c3a8",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "a0773806514525e722a98c5a93dd7c06b619af54",
"extension": "p... | 2.46875 | stackv2 | # Copyright (c) 2010, 2011, Tomaž Muraus
# All rights reserved.
from face_client import FaceClient
import json
import csv
import time
client = FaceClient('88c2f662703642d99d67bce4400bbebf', 'd5d89a3b8a8c42dfafb94a19728a183d')
# print response['photos'][0]['tags'][0]['attributes']['gender']['value']
# print response[... | 52 | 33.87 | 102 | 22 | 475 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_caf77e8a536f0c82_5e8730b3", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text."
] | [
41
] | [
null
] | [
32
] | [
45
] | |
2024-11-18T21:10:17.654191+00:00 | 1,519,438,113,000 | b6e6c404256d1b93fe08fb79b6784035306e6b6c | 3 | {
"blob_id": "b6e6c404256d1b93fe08fb79b6784035306e6b6c",
"branch_name": "refs/heads/master",
"committer_date": 1519438113000,
"content_id": "ccbb572e29170faa803cb4e686ddfcb28c0789ca",
"detected_licenses": [
"MIT"
],
"directory_id": "88ce5f2bbd9cdda9a94b5ad84bc676af9b57caee",
"extension": "py",
"fi... | 2.859375 | stackv2 | import base64
import glob
import json
from operator import itemgetter
import os
from jinja2 import Environment, FileSystemLoader
from css_html_js_minify.js_minifier import js_minify_keep_comments
from .utils import position_to_latLng
from .mapelement import MapElement
this_dir, _ = os.path.split(__file__)
TEMPLATE_... | 195 | 30.25 | 87 | 17 | 1,375 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_98098285885bf8b7_36dcc42f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
23
] | [
null
] | [
11
] | [
37
] | |
2024-11-18T21:10:44.835054+00:00 | 1,494,857,555,000 | 7fdbda0bdbc9a5a802da240012c1c527c24cf7eb | 2 | {
"blob_id": "7fdbda0bdbc9a5a802da240012c1c527c24cf7eb",
"branch_name": "refs/heads/master",
"committer_date": 1494857555000,
"content_id": "f9fcf8f811fa4c29cf3478ad55298e42183267ee",
"detected_licenses": [
"MIT"
],
"directory_id": "2d2a2e0463eff0c5042c25e7ab4adf164e86549d",
"extension": "py",
"fi... | 2.34375 | stackv2 | import logging
import sys
import io
import zmq
from PIL import Image
from flask import Flask
from flask import render_template
from flask import jsonify
from flask import request
from os import environ
from zmq import ssh
# initialize Flask web server
app = Flask(__name__)
app.logger.addHandler(logging.StreamHandler(... | 50 | 28.66 | 108 | 12 | 349 | python | [{"finding_id": "codeql_py/flask-debug_d89cd6da2d096cb3_262e51fc", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-117"
] | [
"py/flask-debug",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1)."
] | [
50,
37
] | [
null,
null
] | [
3,
19
] | [
41,
103
] | |
2024-11-18T21:10:44.881246+00:00 | 1,556,822,170,000 | 551d37b4e58768539524cc5a244e650814bb8879 | 3 | {
"blob_id": "551d37b4e58768539524cc5a244e650814bb8879",
"branch_name": "refs/heads/master",
"committer_date": 1556822170000,
"content_id": "66fd5f057016aac7c8517debc9915fc1fbab767f",
"detected_licenses": [
"MIT"
],
"directory_id": "df806489c1d28adc83e9fe62e98f042f85d8360a",
"extension": "py",
"fi... | 2.828125 | stackv2 | import xlsxwriter, re
from openpyxl import load_workbook
from openpyxl.styles import Border, Side, PatternFill, Font, GradientFill, Alignment
from IPEDSSEARCH import IPEDSSEARCH
class Staff:
name = ""
gender = ""
picture = ""
dep = ""
email = ""
title = ""
phone = ""
#open xlsx file
print('Loading file...')
wb... | 121 | 26.79 | 107 | 20 | 977 | python | [{"finding_id": "codeql_py/overly-large-range_4467ea718c8062cd_f5e2dbcd", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[\\r\\u000e\\u000f\\u0010\\u0011\\u0012\\u0013\\u0014... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[\\r\\u000e\\u000f\\u0010\\u0011\\u0012\\u0013\\u0014\\u001....",
"Suspicious character range that is equivalent to \\[\\r\\u000e\\u000f\\u0010\\u0011\\u0012\\u0013\\u0014\\u001....",
"Suspicious character range that is equivalent to \\[\\r\\u000e\\u000f\\u001... | [
57,
57,
59
] | [
null,
null,
null
] | [
17,
71,
39
] | [
20,
74,
42
] | |
2024-11-18T21:10:48.214264+00:00 | 1,450,617,220,000 | 9fe74844f0065bddb3131b49e7b00aaf94ba5f7b | 2 | {
"blob_id": "9fe74844f0065bddb3131b49e7b00aaf94ba5f7b",
"branch_name": "refs/heads/master",
"committer_date": 1450617220000,
"content_id": "57d363e5f4840a350c7f51044fb30e57e1bf94eb",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "9cf81356eda225fe196cf863b2544d00a5b37dcd",
"extension": "p... | 2.46875 | stackv2 | # -*- coding: utf-8 -*-
"""
jinja_kit.core
~~~~~~~~~~~~~~
Core jinja_kit wrapper class
:copyright: (c) 2009 by the Jinja Team.
:copyright: (c) 2012 - 2013 by Alexandr Lispython (alex@obout.ru).
:license: BSD, see LICENSE for more details.
:github: http://github.com/Lispython/jinja-kit
"""
from itertools import chain... | 162 | 30.39 | 85 | 18 | 984 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fb64574bef4655aa_6015f3db", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
37
] | [
40
] | [
20
] | [
54
] | |
2024-11-18T21:10:51.193975+00:00 | 1,622,930,580,000 | 491340e1666af0983dbf1ad51ce752c90b77ed92 | 2 | {
"blob_id": "491340e1666af0983dbf1ad51ce752c90b77ed92",
"branch_name": "refs/heads/main",
"committer_date": 1622930580000,
"content_id": "f55863a96641018d108e434905a0eb84a69ae145",
"detected_licenses": [
"MIT"
],
"directory_id": "8c966aaaaf3f653ba6df1b2f132a38f7cd001453",
"extension": "py",
"file... | 2.453125 | stackv2 | from flask import Flask, request, jsonify, make_response
from utils import *
app = Flask(__name__)
app.config['SECRET_KEY'] = get_secret_key()
@app.route("/")
def test():
return jsonify({"message": "Hello World"})
@app.route("/predict")
@token_required
def predict():
try:
hardness, prod_rate, qual... | 44 | 23.36 | 119 | 18 | 242 | python | [{"finding_id": "codeql_py/stack-trace-exposure_c300c0fd2148fdff_ef455e23", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
24
] | [
null
] | [
38
] | [
57
] | |
2024-11-18T21:11:08.495162+00:00 | 1,628,867,988,000 | e4d298f92610891dc39a660f71c5917c371d9529 | 3 | {
"blob_id": "e4d298f92610891dc39a660f71c5917c371d9529",
"branch_name": "refs/heads/master",
"committer_date": 1628867988000,
"content_id": "c25aa75ad2a072e7f15907d23909c1e504599722",
"detected_licenses": [
"MIT"
],
"directory_id": "00d7e9321d418a2d9a607fb9376b862119f2bd4e",
"extension": "py",
"fi... | 3.328125 | stackv2 | #!/usr/bin/env python
from getpass import getpass
from pbkdf2 import PBKDF2
from Crypto.Cipher import AES
import os
import base64
import pickle
### Settings ###
saltSeed = 'mkhgts465wef4fwtdd' # MAKE THIS YOUR OWN RANDOM STRING
PASSPHRASE_FILE = '/home/ken/secret.p'
SECRETSDB_FILE = '/home/ken/secrets'
PASSPHRASE_... | 111 | 29.24 | 146 | 16 | 895 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_989fd378164a8434_bdaf8e60", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
86
] | [
null
] | [
17
] | [
45
] | |
2024-11-18T21:11:10.528154+00:00 | 1,563,859,747,000 | 5c56de2f5413bd214c8f5a5c537c0515298323fd | 3 | {
"blob_id": "5c56de2f5413bd214c8f5a5c537c0515298323fd",
"branch_name": "refs/heads/master",
"committer_date": 1563859747000,
"content_id": "b15cd84ea57ff5eaf76d532186d92319b777ce93",
"detected_licenses": [
"MIT"
],
"directory_id": "ce8f6e3be8129c4e5cfca30c7e307e82c6a187cf",
"extension": "py",
"fi... | 2.828125 | stackv2 | from __future__ import print_function
import requests
import urllib
from bs4 import BeautifulSoup
#change to our dest-dir
path = 'file/'
image_src = []
src = []
url = 'https://people.cs.clemson.edu/~mark/3220.html'
r = requests.get(url,verify=False)
if r.status_code is 200:
print("successfully access the website")... | 38 | 26.5 | 69 | 17 | 288 | python | [{"finding_id": "codeql_py/request-without-cert-validation_dc838f0ffaa741d4_10d3164b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
11,
36
] | [
null,
null
] | [
5,
16
] | [
35,
60
] | |
2024-11-18T19:03:18.857255+00:00 | 1,614,024,804,000 | 56c1f62e3c91aad72278ca9f3bc9b5d47072d11d | 2 | {
"blob_id": "56c1f62e3c91aad72278ca9f3bc9b5d47072d11d",
"branch_name": "refs/heads/main",
"committer_date": 1614024804000,
"content_id": "e48d7e0ef8e46628949cb26c99605f7d5ae74687",
"detected_licenses": [
"MIT"
],
"directory_id": "09b1a43a8cb32152c29c642ac0f84cd01e9feaa2",
"extension": "py",
"file... | 2.34375 | stackv2 | from flask import Flask, Response
import os
import sys
import traceback
import json
import yaml
import logging
application = Flask(__name__)
def root_dir(): # pragma: no cover
return os.path.abspath(os.path.dirname(__file__))
def get_file(filename): # pragma: no cover
try:
src = os.path.join(root_d... | 27 | 22.11 | 53 | 12 | 153 | python | [{"finding_id": "codeql_py/stack-trace-exposure_9adcd9cb486b7427_3e1bf3e3", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
24
] | [
null
] | [
21
] | [
28
] | |
2024-11-18T19:03:27.725751+00:00 | 1,626,907,172,000 | 964992d1e8eaf36942cb2f4dc05363602cfd27e2 | 2 | {
"blob_id": "964992d1e8eaf36942cb2f4dc05363602cfd27e2",
"branch_name": "refs/heads/master",
"committer_date": 1626907172000,
"content_id": "2b25780dfc2c956ec7baf4ec1efeb245e1dbb928",
"detected_licenses": [
"MIT"
],
"directory_id": "7af209ea47ba82ca8f2cf1a7981690291779ea6f",
"extension": "py",
"fi... | 2.40625 | stackv2 | from functools import partial
import json
from typing import Tuple, Iterable
import os
import os.path
from geopy.geocoders import Bing
from geopy.extra.rate_limiter import RateLimiter
from geopy.point import Point
from lac_covid19.geo.paths import DIR_DATA
import lac_covid19.const as const
import lac_covid19.current_... | 88 | 33.08 | 79 | 17 | 738 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_51fbbd9291e155e9_bb6b7303", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
50
] | [
null
] | [
11
] | [
65
] | |
2024-11-18T19:03:40.676992+00:00 | 1,534,794,830,000 | ff931c2958179949459528dd525a01c6ae0157a4 | 4 | {
"blob_id": "ff931c2958179949459528dd525a01c6ae0157a4",
"branch_name": "refs/heads/master",
"committer_date": 1534794830000,
"content_id": "5bbc6eb4ab5e873a5f6be1e2091a39cdc184e521",
"detected_licenses": [
"MIT"
],
"directory_id": "8de48852ff0e12afca8f1cc3c6431ca40053df9b",
"extension": "py",
"fi... | 4.28125 | stackv2 | #!/usr/bin/env python3
import random
# Day1
# Hours in a year
print(365 * 24)
# Minutes ina decade
print(10*365*24)
# My age in a seconds
print(27*365*24*60*60)
# Andrea Visanoiu age
print(48618000/365/24/60/60)
#Day2
# ---
#Day3
#Full name greeting
first_name = input("What is your fist name? ")
middle_name = input("... | 143 | 23.29 | 87 | 14 | 1,056 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_32db605d820bc5aa_be7fb030", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
29
] | [
null
] | [
7
] | [
82
] | |
2024-11-18T19:03:42.596925+00:00 | 1,402,785,245,000 | 0972a7710778f32cb1d68d49525080c3b4503568 | 3 | {
"blob_id": "0972a7710778f32cb1d68d49525080c3b4503568",
"branch_name": "refs/heads/master",
"committer_date": 1402785245000,
"content_id": "58fc10e9480bfa3fab44de92b6670d2dfd22482c",
"detected_licenses": [
"MIT"
],
"directory_id": "e291577cfc6c5a7464865bd538130e04c35cf29a",
"extension": "py",
"fi... | 2.640625 | stackv2 | from abc import abstractmethod
import urllib2
import urllib
import hashlib
import json
from datetime import datetime
import logging
from controller.exceptions import NotConnectedError
from model.File import File
from environment import USER_AGENT
class ServiceConnector:
_endpoint = None
def __init__(self, ... | 122 | 28.75 | 108 | 18 | 754 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_2587ccd58962e616_684c2203", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
80
] | [
null
] | [
33
] | [
47
] | |
2024-11-18T19:28:36.150153+00:00 | 1,645,008,660,000 | 29351afd0014a77f246ccead9838e7bd085a57f1 | 3 | {
"blob_id": "29351afd0014a77f246ccead9838e7bd085a57f1",
"branch_name": "refs/heads/main",
"committer_date": 1645008660000,
"content_id": "5b779cae3528596e5f6d1a8ce49f60faf60a844b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "374c3a629e2dcf24c2c5826e2d67a71ca52eb609",
"extension": "py",
... | 2.890625 | stackv2 | """Utility functions for the Templator."""
import glob
import importlib
import json
import os
import shutil
from collections import OrderedDict
from contextlib import contextmanager
from pathlib import Path
from jinja2 import Environment, FileSystemLoader, Template
from loguru import logger
from pytemplator.constant... | 220 | 32.7 | 98 | 21 | 1,488 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0cad032533a9d675_a86c7269", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 4 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially... | [
67,
87,
123,
132
] | [
null,
null,
126,
null
] | [
25,
24,
21,
29
] | [
45,
48,
10,
47
] | |
2024-11-18T19:28:58.748911+00:00 | 1,608,110,497,000 | cbcf130e4488f0b6c682d1462af6e33c50ba75e6 | 2 | {
"blob_id": "cbcf130e4488f0b6c682d1462af6e33c50ba75e6",
"branch_name": "refs/heads/master",
"committer_date": 1608208196000,
"content_id": "9f13c100577208d6f9d436a485b9a64784e3c474",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0f7d5fd644a426e6d66cde38ce20fb907b2cd4e9",
"extension": "py"... | 2.5 | stackv2 | import sys, json, asyncio
from web3 import Web3
from configparser import ConfigParser
from src.data_transfer.interledger import Interledger
from src.data_transfer.ethereum import EthereumInitiator, EthereumResponder
from src.data_transfer.ksi import KSIResponder
# Helper function to read Ethereum related options fro... | 238 | 31.42 | 114 | 13 | 1,777 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9af6a3506b13d57d_7ef53288", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
99,
140
] | [
null,
null
] | [
11,
11
] | [
30,
30
] | |
2024-11-18T19:29:01.959790+00:00 | 1,692,250,445,000 | 9673c9a8a1325d7e3704db9e67656e017708a516 | 3 | {
"blob_id": "9673c9a8a1325d7e3704db9e67656e017708a516",
"branch_name": "refs/heads/master",
"committer_date": 1692250445000,
"content_id": "502bba8cf51a1815548cce385d3b6c3b363617f4",
"detected_licenses": [
"Apache-2.0",
"BSD-3-Clause"
],
"directory_id": "637c1fb7d20c6f6f0bcfdc398ce663b26a0c5629",... | 2.5625 | stackv2 | #!/usr/bin/env python3
import hashlib
from io import BytesIO
import logging
import socket
import pycurl
from common import DCOSAuth
from lrucache import LRUCache
logger = logging.getLogger('utils')
# The maximum number of clashes to allow when assigning a port.
MAX_CLASHES = 50
class ServicePortAssigner(object):... | 437 | 31.57 | 79 | 20 | 3,295 | python | [{"finding_id": "codeql_py/request-without-cert-validation_4f08cd9eec37647b_157a617f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
182
] | [
null
] | [
13
] | [
55
] | |
2024-11-18T20:18:01.009347+00:00 | 1,636,391,227,000 | 81ee786dcf07bab7da44c798401bb913f2b93129 | 2 | {
"blob_id": "81ee786dcf07bab7da44c798401bb913f2b93129",
"branch_name": "refs/heads/main",
"committer_date": 1636391227000,
"content_id": "78d6e8e41e1cbd81cd550843a9d11e7bbbeab80d",
"detected_licenses": [
"MIT"
],
"directory_id": "f9e17a2fc63e7a9af107984aa60f4df943828949",
"extension": "py",
"file... | 2.359375 | stackv2 | #!/usr/bin/env python3
######################################################################
## Author: Carl Schaefer, Smithsonian Institution Archives
######################################################################
import sys
import os
import re
import db_access as dba
import stop_watch
import stat
import dm... | 152 | 37.7 | 79 | 19 | 1,181 | python | [{"finding_id": "codeql_py/overly-permissive-file_58e4a497fdfbb448_4dedde61", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable."
] | [
35,
48
] | [
null,
null
] | [
11,
7
] | [
34,
33
] | |
2024-11-18T20:18:07.116031+00:00 | 1,445,024,035,000 | 4afd2f32ffdd6b5dcbb7069c9fed10a143f9b9e4 | 3 | {
"blob_id": "4afd2f32ffdd6b5dcbb7069c9fed10a143f9b9e4",
"branch_name": "refs/heads/master",
"committer_date": 1445024035000,
"content_id": "a4d227b1afae7a09b124eb1252dee6cf0ba27faf",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2e1ce7dcfbad3efeed8e71ca372cba4814115274",
"extension": "py"... | 2.703125 | stackv2 | '''
uFrameEventCollection:
- Represents the latest attributes of the uframe endpoint.
- Important methods:
to_json(id=None):
Reaches out to uframe and gets either the complete list of events, or
if an id is provided, an individual object.
from_json():
Prepares a JSON packet to be sent as... | 97 | 37.06 | 123 | 18 | 774 | python | [{"finding_id": "codeql_py/stack-trace-exposure_617a98526eb173a3_1995ee95", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
42
] | [
null
] | [
34
] | [
118
] | |
2024-11-18T20:18:07.512059+00:00 | 1,604,610,460,000 | 031b9b7f7e3498a3ee74b1e671c78fe0f49360af | 3 | {
"blob_id": "031b9b7f7e3498a3ee74b1e671c78fe0f49360af",
"branch_name": "refs/heads/main",
"committer_date": 1604610460000,
"content_id": "52ad539f3d62eec4a3e4c6ebf555340c3377bf19",
"detected_licenses": [
"MIT"
],
"directory_id": "5a5d5a76a14b0427148435a35adde137f5cb6ac6",
"extension": "py",
"file... | 3.203125 | stackv2 | import os
import sys
import string
######
lettercounter = [dict.fromkeys(string.ascii_lowercase, 0) for i in range(8)] # *8 make shallow copies
######
if __name__ == "__main__":
with open(os.path.join(sys.path[0],"input.txt"), "r") as f:
instructrions = f.readlines()
for line in instructrions:
... | 21 | 35.33 | 105 | 15 | 200 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_db9236043e56ed8d_27c8ec8d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
20,
21
] | [
null,
null
] | [
11,
11
] | [
50,
50
] | |
2024-11-18T20:18:33.789091+00:00 | 1,590,784,692,000 | 80348c2dca3bb7c9d9d9de501c9c172179b0b914 | 2 | {
"blob_id": "80348c2dca3bb7c9d9d9de501c9c172179b0b914",
"branch_name": "refs/heads/master",
"committer_date": 1590784692000,
"content_id": "28f5fb405eb698352219761b1d49a529e4842161",
"detected_licenses": [
"MIT"
],
"directory_id": "c8299de994811f452f20dca010007abfca5d38e9",
"extension": "py",
"fi... | 2.34375 | stackv2 | import sys
import datetime
import json
import csv
import os
from os import path
import numpy as np
sys.path.append( path.dirname( path.dirname( path.dirname( path.abspath(__file__) ) ) ) )
from utils import loadConfig
import utils
import generator
config = loadConfig.getConfig()
def check_aggregates_directory():
... | 160 | 29.61 | 89 | 16 | 1,187 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_9cff85f692439222_b728da0c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
157
] | [
null
] | [
16
] | [
28
] | |
2024-11-18T20:18:43.773765+00:00 | 1,615,141,494,000 | 62172141860741a5f154c5944a4f443e34611995 | 3 | {
"blob_id": "62172141860741a5f154c5944a4f443e34611995",
"branch_name": "refs/heads/master",
"committer_date": 1615141494000,
"content_id": "bba086aa6aa32dfb749a95773e40ef2718f642f2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2c7f3d16d89fa553fa5e700f345e417015a92b9b",
"extension": "py"... | 2.625 | stackv2 | """
recovery.py
==============
Endpoints for operations related to matching users. All routes start with
/api/recovery
All incoming request parameters are wrapped in a JSON body.
All outgoing response returns are wrapped in a JSON entry with key 'payload',
like this:
.. code-block::
{
"error": "false",
... | 122 | 28.17 | 96 | 17 | 755 | python | [{"finding_id": "codeql_py/command-line-injection_2653556b8842f7d5_f4bdad56", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 1 | true | [
"CWE-078"
] | [
"py/command-line-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1)."
] | [
79
] | [
null
] | [
21
] | [
84
] | |
2024-11-18T20:18:48.928049+00:00 | 1,586,225,646,000 | cc8afc2226a0ecf2e76b716233d0070d90ddc104 | 3 | {
"blob_id": "cc8afc2226a0ecf2e76b716233d0070d90ddc104",
"branch_name": "refs/heads/master",
"committer_date": 1586225646000,
"content_id": "70713bc41bc80530a2b6e7874ead095501d01347",
"detected_licenses": [
"MIT"
],
"directory_id": "53eb4e334838d0bd3ad463a176b21b97811acb74",
"extension": "py",
"fi... | 2.59375 | stackv2 | #! /usr/bin/env python
# -*- coding:utf-8 -*-
# Author: kenny.bai
# Date: 2020/4/1 11:23
# File: main.py
from selenium import webdriver
from selenium.webdriver.support.select import Select
from selenium.webdriver.common.action_chains import ActionChains
from selenium.webdriver.common.keys import Keys
import time
impor... | 191 | 34.35 | 105 | 18 | 1,829 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_90e401a00b8657b8_3098ded3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
52
] | [
null
] | [
70
] | [
85
] | |
2024-11-18T20:29:35.654705+00:00 | 1,629,721,661,000 | 6afa71e2c951733ecd983e0619db3eef70c9d78f | 3 | {
"blob_id": "6afa71e2c951733ecd983e0619db3eef70c9d78f",
"branch_name": "refs/heads/main",
"committer_date": 1629721661000,
"content_id": "ec455cb41229da8c8de6f2e99a83cd503e43cea1",
"detected_licenses": [
"MIT"
],
"directory_id": "49840b9c15292ec5558a6dc4b4cc9e7d00fde9e2",
"extension": "py",
"file... | 2.609375 | stackv2 | # Original code from
# https://riverkangg.github.io/크롤링/crawling-2naverCafe/
# Get appropriate chromedriver from
# https://chromedriver.chromium.org/downloads
from selenium import webdriver
from paths import APP_PATH
from scrapper.source.config.naver_cafe import NAVER_ID, NAVER_PASSWORD
class NaverCafeScrapper:
... | 51 | 29.29 | 148 | 12 | 436 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1ae6a70523fa5c89_2eb4c294", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
18
] | [
null
] | [
25
] | [
39
] | |
2024-11-18T20:51:24.685157+00:00 | 1,581,779,975,000 | a8bad918bbec91e1290c14840f93d1267c437427 | 2 | {
"blob_id": "a8bad918bbec91e1290c14840f93d1267c437427",
"branch_name": "refs/heads/master",
"committer_date": 1581779975000,
"content_id": "ca61d5fc14d39b7cbae847a0d577153ab7ee3d50",
"detected_licenses": [
"MIT"
],
"directory_id": "69a92c193f3a6061da04e544348be8bca9c114fa",
"extension": "py",
"fi... | 2.421875 | stackv2 | from session import generateCredentials
from flask import Flask, jsonify
import requests
app = Flask(__name__)
devId = ""
sessionId = ""
def getSession():
return generateCredentials(devId, sessionId, "createsession").generate_session()
# return the signature and timestamp
def getSignature(method):
return ge... | 58 | 33.81 | 85 | 10 | 416 | python | [{"finding_id": "codeql_py/partial-ssrf_845f9cf1e84af7c6_79093881", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).\nPart of the URL of this request depends on a [user-provided value](3).\nPart of the URL of this request depends on a [user-provided value](4).\nPart of the URL of this req... | [
18
] | [
19
] | [
12
] | [
81
] | |
2024-11-18T20:51:27.966026+00:00 | 1,619,204,701,000 | f4670c1823902e7edfe9f84c769566df8c39862f | 2 | {
"blob_id": "f4670c1823902e7edfe9f84c769566df8c39862f",
"branch_name": "refs/heads/master",
"committer_date": 1619204701000,
"content_id": "401e34576aa81451471858cd83a9486f59b30468",
"detected_licenses": [
"MIT"
],
"directory_id": "fc2267a644f6fbcba25bf49a95229d445488b12b",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/env python3
import jinja2
import sys
import os
import re
TEMPLATE = "template.html"
SCRIPTS_DIR = "../src"
METADATA_RE = re.compile(r"(?m)^\/\/ @([a-z]+) *(.*)$")
def parse_metadata(file):
content = open(file).read()
metadata = {}
for match in METADATA_RE.finditer(content):
metadata[ma... | 36 | 23.94 | 62 | 15 | 222 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_7510a4385c6370ca_89ccf916", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
30
] | [
null
] | [
12
] | [
50
] | |
2024-11-18T20:51:32.584074+00:00 | 1,668,623,733,000 | f6c61af4bb8b65b3f0f165dc0c62c10d8c782e01 | 3 | {
"blob_id": "f6c61af4bb8b65b3f0f165dc0c62c10d8c782e01",
"branch_name": "refs/heads/main",
"committer_date": 1668623733000,
"content_id": "c90e72cf90824c21c4a63381fe5bf06b4ec3c261",
"detected_licenses": [
"MIT"
],
"directory_id": "841ec3a181ef7fd865965d729ed302d3fdb38b60",
"extension": "py",
"file... | 2.71875 | stackv2 | # --------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for
# license information.
# --------------------------------------------------------------------------
# This s... | 107 | 34.61 | 117 | 12 | 766 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_62fca132e58929c4_c658b4f7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
50,
66
] | [
null,
null
] | [
15,
15
] | [
21,
30
] | |
2024-11-18T20:51:47.042455+00:00 | 1,690,570,479,000 | f31e72bcf7f259966d0bbf7982df2bce8d9ab1ee | 3 | {
"blob_id": "f31e72bcf7f259966d0bbf7982df2bce8d9ab1ee",
"branch_name": "refs/heads/master",
"committer_date": 1690570479000,
"content_id": "da2318625a04651bee259b981ae9fbd91f014489",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3f038733e9a03bdd4105ba8319de880924f3af9f",
"extension": "py"... | 2.875 | stackv2 | import requests
import json
import os
import logging
logging.basicConfig(level=logging.INFO)
log = logging.getLogger(__name__)
class SlackLib:
def __init__(
self,
base_url="https://slack.com/api",
token=os.environ["SLACK_API_TOKEN"].strip(),
):
"""
Creates a Github uti... | 50 | 29.38 | 131 | 17 | 313 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ab6ab821c751cffe_83435c2c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
50
] | [
null
] | [
11
] | [
56
] | |
2024-11-18T19:07:07.575839+00:00 | 1,508,045,987,000 | c03655c5bfe4a8c1829536897ce5fca3c7776f58 | 2 | {
"blob_id": "c03655c5bfe4a8c1829536897ce5fca3c7776f58",
"branch_name": "refs/heads/master",
"committer_date": 1508045987000,
"content_id": "0e68414a8d28d7046b2d5d140f83790e985473b1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a4f6e67fe8fd6e18868c0842f88945c8ffed83bc",
"extension": "py"... | 2.484375 | stackv2 | import shlex
import traceback
import logging
import inspect
import json
import requests
from ConfigParser import SafeConfigParser
class Cached(object):
def __init__(self, func):
self.func = func
self.results = {}
def __call__(self, *args, **kwargs):
# Format hashable key
key =... | 172 | 33.06 | 106 | 18 | 1,245 | python | [{"finding_id": "codeql_py/request-without-cert-validation_1ef48326493b5735_5694c023", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
94
] | [
null
] | [
20
] | [
77
] | |
2024-11-18T19:07:14.028307+00:00 | 1,633,771,151,000 | 4b41f2583bb6b7da84804f620db7f49e8ff25eab | 2 | {
"blob_id": "4b41f2583bb6b7da84804f620db7f49e8ff25eab",
"branch_name": "refs/heads/main",
"committer_date": 1633771151000,
"content_id": "414ba04b6ac65436c052fd5941aafbb3b68712bb",
"detected_licenses": [
"Unlicense"
],
"directory_id": "a7d72165fb5b9dafcc75d7f2f8aade265be9cac4",
"extension": "py",
... | 2.421875 | stackv2 | import base64
import zlib
import json
import hashlib
from Cryptodome import Random
from Cryptodome.Cipher import AES
class CDNKeys:
key460 = "uRqLnp6p9WUrTJ6nNXlv7z9VZRjbXvRFKEcF/spEn9k="
key470 = "DJ1LTHLgxRNq7v7fsyG3AQONlsdN49gJ+oY9UuVCSzQ="
key500 = "CADqND0WPwViwTPzhAiOjR/IrB5TCFInww+k1cmUg70="
... | 34 | 29.29 | 77 | 14 | 444 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_15bf8c206b6f0586_26ce2472", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
23
] | [
null
] | [
18
] | [
45
] | |
2024-11-18T19:07:23.818656+00:00 | 1,692,631,424,000 | fa6d49cf6486e045d805a6e934818cf178318d9a | 3 | {
"blob_id": "fa6d49cf6486e045d805a6e934818cf178318d9a",
"branch_name": "refs/heads/master",
"committer_date": 1692631424000,
"content_id": "f849f1776718d98eb608a164761245b4c46aacb5",
"detected_licenses": [
"MIT"
],
"directory_id": "d5a76f4b4ae371aca14e29ecca221fbb5ef7c889",
"extension": "py",
"fi... | 3.015625 | stackv2 | #!/usr/bin/python
#
# gps_echo.py
# Simple script to read gps from gps device connected to serial port. The output
# is meant for constructing a google map location URL based on the lat/lon data
# read as shown below.
#
# https://www.google.com/maps?q=`python gps_echo.py`"
#
# Author: Arul Selvan
# Version:... | 41 | 22.12 | 82 | 14 | 274 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_62e48916ab349d34_bd27e144", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
39
] | [
null
] | [
14
] | [
17
] | |
2024-11-18T19:07:23.975499+00:00 | 1,494,849,993,000 | 2d0a6a0b1b6af4df34b4954182566584f36683bc | 3 | {
"blob_id": "2d0a6a0b1b6af4df34b4954182566584f36683bc",
"branch_name": "refs/heads/master",
"committer_date": 1494849993000,
"content_id": "a567878a2f69446b5de8e43c6787dd911f15d5f2",
"detected_licenses": [
"MIT"
],
"directory_id": "d30b81d7f9655f7abaeee2ac67d26c248fcfdb11",
"extension": "py",
"fi... | 2.890625 | stackv2 | """
<Program Name>
deploy_server_final.py
<Started>
July 2009
<Author>
n2k8000@u.washington.edu
Konstantin Pik
<Purpose>
This is a fully automated webserver that handles only certain web requests. The server assumes files exist
in the locations that they're supposed to exist, and the files are placed th... | 539 | 24.76 | 114 | 23 | 3,189 | python | [{"finding_id": "codeql_py/path-injection_102380d86f760cee_3ded265b", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
92,
95
] | [
null,
null
] | [
27,
41
] | [
36,
50
] | |
2024-11-18T19:07:46.922343+00:00 | 1,623,153,934,000 | 557eb3fd7cc2b024dc3e15fbaf4de5c63dbacbba | 3 | {
"blob_id": "557eb3fd7cc2b024dc3e15fbaf4de5c63dbacbba",
"branch_name": "refs/heads/master",
"committer_date": 1623153934000,
"content_id": "dd4df509c8bf0e950af455db62562bd4d2ec7d12",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9c07fe211a13e87df51402af4d47c4413401681d",
"extension": "py"... | 3.3125 | stackv2 | import requests
import re
from goose3 import Goose
# meta tag의 property의 article:section을 파싱하기 위한 클래스
class Parse_category:
def __init__(self,url):
req = requests.get(url)
self.raw = req.text
self.category_names = ["정치","사회","경제"]
self.policy = ["정치"] # 후에 정치 서브 카테고리를 채우자
sel... | 75 | 31.12 | 98 | 15 | 653 | python | [{"finding_id": "codeql_py/bad-tag-filter_1f00a9ad04305890_621b1cee", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match script end tags like </script >.", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match script end tags like </script >."
] | [
17
] | [
null
] | [
24
] | [
47
] | |
2024-11-18T19:18:41.006153+00:00 | 1,513,618,781,000 | 0e139dc1a9800b380b09ebe70a14615b7f4cfe82 | 3 | {
"blob_id": "0e139dc1a9800b380b09ebe70a14615b7f4cfe82",
"branch_name": "refs/heads/master",
"committer_date": 1513618781000,
"content_id": "80f4bbf960a40ea1c85c9b645a4e50161c2e1cc0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "422c7c08c458e4485f1cdc8db7514ff678230328",
"extension": "py"... | 2.921875 | stackv2 | # Proof of concept of a SSRF vulnerability, written in Python
# using Windows's WinHTTP.WinHTTPRequest native methods
# to demonstrate how Windows will give out hashes when asked
# to authenticate using NTLM.
#
# written by Julio Cesar Fort, Wildfire Labs /// Blaze Information Security
#
# Copyright 2016-2017, Blaze I... | 43 | 37 | 146 | 16 | 407 | python | [{"finding_id": "codeql_py/stack-trace-exposure_17a6236fa1b0a5c4_8d8134bd", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
36
] | [
null
] | [
24
] | [
53
] | |
2024-11-18T19:18:52.352058+00:00 | 1,629,735,554,000 | c62171d7974b4c868b1807dc4ca05ccea15a0b41 | 3 | {
"blob_id": "c62171d7974b4c868b1807dc4ca05ccea15a0b41",
"branch_name": "refs/heads/main",
"committer_date": 1629735554000,
"content_id": "aa3abbc67c302673fc11790a7fd73fb6fbf00cc5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0cbdb3941642c257d2d2eb19a1e393bb53991fc5",
"extension": "py",
... | 2.65625 | stackv2 | from flask import Flask, jsonify as _j, request, render_template
import pandas as pd
import numpy as np
import pickle
import csv
heartModel = pickle.load(open("models/heart.dtc", "rb"))
spineModel = pickle.load(open("models/spine.dtc", "rb"))
app = Flask(__name__)
@app.route('/', methods=['GET'])
def home():
ret... | 85 | 29.41 | 91 | 23 | 536 | python | [{"finding_id": "codeql_py/stack-trace-exposure_0e3c1262cb88fbc8_429d421f", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-215",
"CWE-117",
"CWE-117"
] | [
"py/stack-trace-exposure",
"py/flask-debug",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-prov... | [
72,
85,
56,
61
] | [
null,
null,
null,
null
] | [
19,
5,
30,
34
] | [
25,
51,
59,
39
] | |
2024-11-18T19:19:02.813707+00:00 | 1,478,216,681,000 | 5c95590d1307aa51e2c47d5b23b7ba24a391f575 | 2 | {
"blob_id": "5c95590d1307aa51e2c47d5b23b7ba24a391f575",
"branch_name": "refs/heads/master",
"committer_date": 1478216681000,
"content_id": "e8a7ee72c599a4637a30d745e85f5e0e1d6c94e9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "dcc65a5ad5e42b6035f70613191957f4c93bd702",
"extension": "py"... | 2.3125 | stackv2 | #!/usr/bin/env python3
# pylint: disable=C0111,W0212,W0611,E1102,W0703
"""
Ingestion Tool
Modified from ersa-reporting-ingest
"""
import base64
import hashlib
import json
import lzma
import os
import random
import time
import requests
import concurrent.futures
from argparse import ArgumentParser
from sys import ex... | 224 | 33.55 | 141 | 17 | 1,774 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_4988d9d864f8ee3a_276755a2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure."
] | [
40
] | [
null
] | [
34
] | [
60
] | |
2024-11-18T19:29:52.377403+00:00 | 1,641,712,614,000 | 2ae31a286055797ddcdb0f83fd802877a581f151 | 3 | {
"blob_id": "2ae31a286055797ddcdb0f83fd802877a581f151",
"branch_name": "refs/heads/master",
"committer_date": 1641712614000,
"content_id": "0495d7cf4858a3db1a8d77b14803349838c95332",
"detected_licenses": [
"MIT"
],
"directory_id": "e7a72c1124fc7a52c3594370a8fbafe763f925e0",
"extension": "py",
"fi... | 2.8125 | stackv2 | # -*- coding: utf-8 -*-
"""MOOC 课程下载"""
import os
import sys
import re
import json
import argparse
def store_cookies(file_name):
"""存储并返回 Cookie 字典"""
def cookie_to_json():
"""将分号分隔的 Cookie 转为字典"""
cookies_dict = {}
raw_cookies = input('> ')
for cookie in raw_cookies.split(... | 87 | 34.15 | 118 | 14 | 830 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_67b780b5d0532e8a_257d3ed9", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'icourse163.org/course/', so it migh... | 5 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'icourse163.org/course/', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'xuetangx.com/courses/', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before '163.com/c... | [
60,
63,
67,
71,
74
] | [
null,
null,
null,
null,
null
] | [
19,
21,
21,
21,
21
] | [
54,
63,
56,
51,
59
] | |
2024-11-18T19:44:18.142836+00:00 | 1,547,247,836,000 | 3645655be0ae7eac8fd522ecf0f48efd80fc7b3e | 2 | {
"blob_id": "3645655be0ae7eac8fd522ecf0f48efd80fc7b3e",
"branch_name": "refs/heads/master",
"committer_date": 1547247836000,
"content_id": "2a8ee646f46b09246d50e2aab6f4e7dca8d70500",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bb56f9c34944936997ee921c17c4381fb7fd9c1f",
"extension": "py"... | 2.34375 | stackv2 | import socket
import os
import signal
from tempfile import NamedTemporaryFile
import subprocess
from jinja2 import Environment
from jinja2 import FileSystemLoader
CHROME_PATH = None
if os.path.exists('/usr/bin/chrome-browser'):
CHROME_PATH = 'chrome-browser'
elif os.path.exists('/usr/bin/chromium-browser'):
... | 105 | 30.67 | 75 | 17 | 784 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_be9c772a5e13a9a7_dd4af7e9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
35
] | [
null
] | [
11
] | [
75
] | |
2024-11-18T19:44:37.213248+00:00 | 1,435,051,265,000 | ba2c3aefc23f8bca05bc456374fd36dd1fa5ceba | 3 | {
"blob_id": "ba2c3aefc23f8bca05bc456374fd36dd1fa5ceba",
"branch_name": "refs/heads/master",
"committer_date": 1435051265000,
"content_id": "41a347649a3c4ff695c51a183f3af032e203666e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "691e4810fe7204c7ceae81a97dc7f0baf2529ebb",
"extension": "py"... | 2.578125 | stackv2 | from thesaurus import fullfil_thesaurus_db
from extract_names import extract_names
from cache import name_genders, university_locations, university_types
import os, sys
lib_path = os.path.abspath('../')
sys.path.append(lib_path)
from model.teseo_model import University
from model.dbconnection import dbconfig
from sql... | 58 | 37.19 | 139 | 14 | 518 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_49b496f8d278a44b_72bdeaf2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
38
] | [
null
] | [
30
] | [
85
] | |
2024-11-18T19:44:40.450125+00:00 | 1,554,415,242,000 | b43d25d1f59ab50b1132c74df8239073677a2cf0 | 3 | {
"blob_id": "b43d25d1f59ab50b1132c74df8239073677a2cf0",
"branch_name": "refs/heads/master",
"committer_date": 1554415242000,
"content_id": "f7cf861e0b7d0dd1a66039fbcc7d7a80682cd72d",
"detected_licenses": [
"MIT"
],
"directory_id": "57c4fd22bdf76284678380c20f12f663fdf3d993",
"extension": "py",
"fi... | 2.96875 | stackv2 | # -*- coding: utf8 -*-
#
# Created by 'myth' on 10/19/15
import os
from sys import stderr, stdout
from jinja2 import Template
from pepper8.models import FileResult
from pepper8.parser import Parser
class HtmlGenerator(object):
"""
The HTML Generator generates the HTML report based off of the data retrieved
... | 146 | 34.33 | 107 | 21 | 1,040 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fc1efc740d4502a7_48c29401", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
82
] | [
null
] | [
20
] | [
45
] | |
2024-11-18T19:58:06.509201+00:00 | 1,499,328,485,000 | 46693adad8b901016d4d78ea10d7323f9f609861 | 2 | {
"blob_id": "46693adad8b901016d4d78ea10d7323f9f609861",
"branch_name": "refs/heads/master",
"committer_date": 1499328485000,
"content_id": "ddcdbc0ba24d10beb82111ce715e6a1035c25019",
"detected_licenses": [
"MIT"
],
"directory_id": "4308a0fe0697f18533d04aefc1d65e68690decf3",
"extension": "py",
"fi... | 2.3125 | stackv2 | import os
import sys
import logging
import argparse
import sqlalchemy as sa
from sqlalchemy import (
Table, Column,
Integer, String, TEXT,
ForeignKey, PrimaryKeyConstraint,
MetaData
)
import config
# engine = sa.create_engine('sqlite:///dblp.sql', echo=False)
connection_string = 'postgresql://%s:%s@... | 82 | 25.66 | 78 | 12 | 498 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_411b5bc90d5a2655_92212f9e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
24
] | [
null
] | [
14
] | [
74
] | |
2024-11-18T20:10:19.213178+00:00 | 1,588,305,066,000 | 4e3e6c7baac780e36c548c9ed97dbcd8fd43e898 | 3 | {
"blob_id": "4e3e6c7baac780e36c548c9ed97dbcd8fd43e898",
"branch_name": "refs/heads/master",
"committer_date": 1588305066000,
"content_id": "bd04d803109ca64266a1adb2cb2cb96fa5aa1857",
"detected_licenses": [
"MIT"
],
"directory_id": "91cc883f4901d6731801a901b1e2c89f2c3c1fcc",
"extension": "py",
"fi... | 2.625 | stackv2 | from structures import *
from threading import Event as ThreadEvent
from os import urandom
import flask, math, json
database = Database()
cache = Cache()
app = flask.Flask(__name__)
app.secret_key = urandom(32).hex()
stopEvent = ThreadEvent()
print(f'Secrety Key: {app.secret_key}')
def updateAllPortfolios():
all... | 282 | 26.44 | 150 | 19 | 1,982 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_52ff4aa2f4e69115_59a3902a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-215"
] | [
"py/clear-text-logging-sensitive-data",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
14,
282
] | [
null,
null
] | [
7,
2
] | [
39,
21
] | |
2024-11-18T20:10:38.779674+00:00 | 1,656,441,040,000 | 086b038a5a29dadc8b8ac1c5bb7ed43001783f83 | 3 | {
"blob_id": "086b038a5a29dadc8b8ac1c5bb7ed43001783f83",
"branch_name": "refs/heads/master",
"committer_date": 1656441040000,
"content_id": "67cd8b16af702fefc735dd097221d07a1779cf7a",
"detected_licenses": [
"MIT"
],
"directory_id": "0ef6f868c60bf7a54d0a48fbcf5992acc7d47d61",
"extension": "py",
"fi... | 2.703125 | stackv2 |
# #######################################################################
#
# Task : KeePass Interaction
#
# #######################################################################
"""
Creates the autoIT stub code to be passed into the master compile
: Takes a supplied text file for the Sheepl to type
: the mas... | 349 | 31.96 | 126 | 22 | 2,302 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_20220035c9441b6a_abf9780a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
158,
233
] | [
null,
null
] | [
15,
19
] | [
45,
79
] | |
2024-11-18T20:23:35.970065+00:00 | 1,628,674,007,000 | 84a9df1204d3a2348be985b33c74f68d7d2c9319 | 2 | {
"blob_id": "84a9df1204d3a2348be985b33c74f68d7d2c9319",
"branch_name": "refs/heads/main",
"committer_date": 1628674007000,
"content_id": "775c10f525290eb5f70aded3e0e89637d94a7306",
"detected_licenses": [
"MIT"
],
"directory_id": "4dca81f7e7c3ae60397c40fde44faec71b720b17",
"extension": "py",
"file... | 2.421875 | stackv2 | # -*-coding:utf-8-*-
# @File : 2021/7/31 上午10:11
# @Author : Rosetta0
# @File : 3.5_kaggle_house.py
import hashlib
import os
import tarfile
import zipfile
import requests
import numpy as np
import pandas as pd
import torch
from torch import nn
from d2l import torch as d2l
###################数据集下载#####... | 225 | 33.56 | 114 | 16 | 2,176 | python | [{"finding_id": "codeql_py/tarslip_3798e0cac97eb6ba_c35e8112", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
54
] | [
null
] | [
5
] | [
7
] | |
2024-11-18T20:49:15.580284+00:00 | 1,403,689,353,000 | 45878f865215b23a7ebb15f197e4190ab65d4ac5 | 3 | {
"blob_id": "45878f865215b23a7ebb15f197e4190ab65d4ac5",
"branch_name": "refs/heads/master",
"committer_date": 1403689353000,
"content_id": "ea817d3f9fe63967adf3a3e58572dc7c9bd3e7e5",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "321e43415d42a2214710b3cc6a1d48b955c2c507",
"extension": "p... | 2.59375 | stackv2 | import logging
from django import forms
from django.utils.translation import ugettext as _
from django.contrib.auth import get_user_model
from django.core.exceptions import ObjectDoesNotExist
from models import EmailUpdate
# Instantiate logger.
logger = logging.getLogger(__name__)
class UserForm(forms.Form):
""... | 95 | 38.23 | 142 | 22 | 700 | python | [{"finding_id": "codeql_py/log-injection_d5a912f223956f48_faa53373", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
55
] | [
null
] | [
34
] | [
130
] | |
2024-11-18T20:49:17.937039+00:00 | 1,589,045,076,000 | 7a3b7cbe1367fb34fb3b70f3c818856fe6e3e257 | 3 | {
"blob_id": "7a3b7cbe1367fb34fb3b70f3c818856fe6e3e257",
"branch_name": "refs/heads/master",
"committer_date": 1589045076000,
"content_id": "6bdfb0fc49fbbce3a27992dee3935e024d60e7e9",
"detected_licenses": [
"ISC"
],
"directory_id": "aeb7c59477f5145480a0542081e14e1ff86551c2",
"extension": "py",
"fi... | 2.6875 | stackv2 | import os
import string
from demosys.management.base import CreateCommand
class Command(CreateCommand):
help = "Create a project"
def add_arguments(self, parser):
parser.add_argument("name", help="Name of the project")
def handle(self, *args, **options):
self.project_name = options['nam... | 78 | 32.82 | 88 | 15 | 538 | python | [{"finding_id": "codeql_py/overly-permissive-file_4b271cd1b7566255_224984cf", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
57
] | [
null
] | [
9
] | [
37
] | |
2024-11-18T20:49:38.624047+00:00 | 1,638,565,961,000 | 8b8ee3e87337c29964864e81c8053e1111c34ddc | 3 | {
"blob_id": "8b8ee3e87337c29964864e81c8053e1111c34ddc",
"branch_name": "refs/heads/main",
"committer_date": 1638565961000,
"content_id": "8ee95547a23f5270216049f9410e28583acc3506",
"detected_licenses": [
"MIT"
],
"directory_id": "b9fa9e6810179d049c96cf3b28d74b6f2d006080",
"extension": "py",
"file... | 2.890625 | stackv2 | import hashlib
from flask import Blueprint
from flask import jsonify # for return
from flask import request # for url parameter and password
import db
user_bp = Blueprint('user', __name__)
'''
Logs users into their profile
request body: {"username": ..., "password": ...}
return: {"valid": true/false}
... | 91 | 25.77 | 79 | 16 | 576 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_af8ae2a12c87c4f6_976857f8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp... | [
19,
42,
73
] | [
null,
null,
null
] | [
28,
28,
28
] | [
57,
57,
57
] | |
2024-11-18T20:49:52.192569+00:00 | 1,417,994,155,000 | 65cec68587bcdcbf88b2a68d739cdd4c9b4d9fc4 | 2 | {
"blob_id": "65cec68587bcdcbf88b2a68d739cdd4c9b4d9fc4",
"branch_name": "refs/heads/master",
"committer_date": 1417994155000,
"content_id": "04e56d37bc7714c99c0bf8dfaa649999b3e58a86",
"detected_licenses": [
"MIT"
],
"directory_id": "0ab13caa4070b34734f6695a17fa595cf4eb39c0",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python
import logging
import tornado.ioloop
import tornado.options
import tornado.web
import json
from tornado.options import define, options
define("port", default=8888, help="run on the given port", type=int)
class MainHandler(tornado.web.RequestHandler):
def get(self):
try:
... | 104 | 26.95 | 76 | 16 | 620 | python | [{"finding_id": "codeql_py/reflective-xss_db816e8ca3c7cd0c_9b1843f7", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-601"
] | [
"py/reflective-xss",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
66,
64
] | [
null,
null
] | [
24,
27
] | [
28,
38
] | |
2024-11-18T20:49:57.281874+00:00 | 1,566,897,879,000 | c799d60c2eabf772e45f981a0ec52ae00590c86a | 3 | {
"blob_id": "c799d60c2eabf772e45f981a0ec52ae00590c86a",
"branch_name": "refs/heads/master",
"committer_date": 1566897879000,
"content_id": "4008c6902819fcd187931d4150431ad7c08d23e0",
"detected_licenses": [
"MIT"
],
"directory_id": "7c5ea48fc7fa42640db9c494dfabb4b874f5260f",
"extension": "py",
"fi... | 2.609375 | stackv2 | from rest_framework import serializers
class ReplaceableField(object):
pass
class WritableField(object):
pass
def ReplaceableNestedField(*args, serializer=None, **kwargs):
class List(serializers.ListSerializer, ReplaceableField):
def validate_nested(self, data):
queryset = self.child... | 432 | 36.96 | 107 | 21 | 2,952 | python | [{"finding_id": "codeql_py/stack-trace-exposure_47480415f512ce04_8567dc4e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
303,
309,
363
] | [
null,
null,
null
] | [
59,
59,
59
] | [
66,
66,
62
] | |
2024-11-18T20:50:04.128833+00:00 | 1,606,778,788,000 | 167c7f86ff4ecad9225e2e19b81486d3fd32a97a | 2 | {
"blob_id": "167c7f86ff4ecad9225e2e19b81486d3fd32a97a",
"branch_name": "refs/heads/master",
"committer_date": 1606778788000,
"content_id": "0647fa33a65ddf8fde875f55180e38ead7c1710e",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "a298190b5b65051a1ba0d227fcf7428a3c1c22f1",
"extension": "p... | 2.453125 | stackv2 | #!/usr/bin/env python3
###########################################################################
# Stupid basic, ugly website that allows logins to view a secret web page #
# Probably not secure #
#####################################################################... | 88 | 26.51 | 76 | 16 | 525 | python | [{"finding_id": "codeql_py/flask-debug_1667fa592953ab06_2015553f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
88,
83
] | [
null,
null
] | [
5,
12
] | [
40,
16
] | |
2024-11-18T20:50:06.386571+00:00 | 1,606,919,474,000 | 7a688245aac6432c7a38a4684fdc5230f1875640 | 3 | {
"blob_id": "7a688245aac6432c7a38a4684fdc5230f1875640",
"branch_name": "refs/heads/master",
"committer_date": 1606920254000,
"content_id": "fb41b2aabed8606ef1f43ad2e213ce8c6120a20e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "313e63cce7abf271af345cbce8bdafb22963e643",
"extension": "py"... | 2.5625 | stackv2 | import os
from colorama import Fore, init
from twilio.rest import Client
from twilio.base.exceptions import TwilioRestException
# Current file directory details
file = os.path.realpath(__file__)
filedir = os.path.dirname(file)
parentdir = os.path.dirname(filedir)
# Initialise colors for terminal
init()
# Print out h... | 61 | 35.44 | 130 | 14 | 579 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_73673693c9d6de22_c9c19777", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
56
] | [
null
] | [
13
] | [
65
] | |
2024-11-18T20:50:07.985672+00:00 | 1,678,040,170,000 | 3070890efa1a8346961fbd1bb777f6aa2c5d9803 | 2 | {
"blob_id": "3070890efa1a8346961fbd1bb777f6aa2c5d9803",
"branch_name": "refs/heads/master",
"committer_date": 1678040170000,
"content_id": "be591375d6527e48870071748061a1ecc4ad6f6b",
"detected_licenses": [
"MIT"
],
"directory_id": "4022d3dd583ea0324f0d38d90421d2dccbd3d47f",
"extension": "py",
"fi... | 2.375 | stackv2 | from flask import g, Blueprint, flash, redirect, url_for, render_template, request
from flask_login import current_user, login_user, logout_user, login_required
from conekt import login_manager, db
from conekt.helpers.url import is_safe_url
from conekt.models.users import User
from conekt.forms.login import LoginForm
... | 142 | 29.98 | 115 | 18 | 901 | python | [{"finding_id": "codeql_py/url-redirection_a2dc3613730191b6_a7d7645c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
105
] | [
null
] | [
33
] | [
42
] | |
2024-11-18T20:50:36.848586+00:00 | 1,691,263,458,000 | 2b3e69296ac6bc95881b1ffd235af3c2116f66e5 | 2 | {
"blob_id": "2b3e69296ac6bc95881b1ffd235af3c2116f66e5",
"branch_name": "refs/heads/master",
"committer_date": 1691263458000,
"content_id": "4043ddadcac179ba03757553a5f63ff57edaa18f",
"detected_licenses": [
"MIT"
],
"directory_id": "f5de163623c0e1f2207104a69fea499b2d4b3948",
"extension": "py",
"fi... | 2.375 | stackv2 | #!/usr/bin/env python
"""Script to convert templates from Mako to Jinja2."""
import io
import glob
import sys
import os
import re
import json
import shutil
import tempfile
import jinja2
dumb_replacements = [
["{% if any(post.has_math for post in posts) %}", '{% if posts|selectattr("has_math")|list %}'],
["js... | 272 | 36.33 | 115 | 17 | 2,710 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f9e618d775118973_124e9f03", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
53
] | [
null
] | [
14
] | [
34
] | |
2024-11-18T20:50:49.708718+00:00 | 1,557,457,514,000 | 266127033ae95dbd2a116bd3fe6ae49689eb3b9d | 3 | {
"blob_id": "266127033ae95dbd2a116bd3fe6ae49689eb3b9d",
"branch_name": "refs/heads/master",
"committer_date": 1557457514000,
"content_id": "ce1987a46ba7b279747216145613b4ff266df72b",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "ed3dbed9193ee0cf133b0e905ac6bb72cd975709",
"extension": "p... | 2.546875 | stackv2 | from django.conf import settings
from django.db import models
from django.utils.functional import cached_property
from Crypto.Cipher import DES
from Crypto.Hash import MD5
import struct
__all__ = ['EncryptedPKModel']
import logging
log = logging.getLogger('gravy.db.models.crypto')
def base36encode(number):
nu... | 87 | 27.69 | 81 | 19 | 623 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_a1e22c3767a247f3_71d607d3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
69
] | [
null
] | [
38
] | [
57
] | |
2024-11-18T20:51:10.709179+00:00 | 1,581,093,981,000 | 989e4d5d51c888c2904d3071cd072a7200473ca6 | 3 | {
"blob_id": "989e4d5d51c888c2904d3071cd072a7200473ca6",
"branch_name": "refs/heads/master",
"committer_date": 1581093981000,
"content_id": "507929b827ea74d7585659d479de07b4de64a559",
"detected_licenses": [
"MIT"
],
"directory_id": "4cb0996baa8a3f8b45c8ed64dfb26fe1e7d0ef06",
"extension": "py",
"fi... | 2.8125 | stackv2 | from flask import Blueprint, current_app, request, jsonify
from .model import City
from .serializer import CitySchema
from requests import get, post
import json
from datetime import date, datetime
from sqlalchemy import desc, func
from unidecode import unidecode
bp_citys = Blueprint('citys', __name__)
@bp_citys.... | 165 | 30.61 | 122 | 23 | 1,276 | python | [{"finding_id": "codeql_py/partial-ssrf_c24eed02da73a89d_54a060d6", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
19
] | [
null
] | [
9
] | [
26
] | |
2024-11-18T20:51:15.663862+00:00 | 1,616,924,805,000 | 6c565912cc566e780dc781ab21587303148441f1 | 3 | {
"blob_id": "6c565912cc566e780dc781ab21587303148441f1",
"branch_name": "refs/heads/master",
"committer_date": 1616924805000,
"content_id": "7e81e0610760d74dfb1d5204ae7f8d215f5d5509",
"detected_licenses": [
"MIT"
],
"directory_id": "b73a69e313f3f1e2c6860682354f346720019b27",
"extension": "py",
"fi... | 2.9375 | stackv2 | import os
import pwd
import json
import re
from src import config
# aliases for path to use later on
user = pwd.getpwuid(os.getuid())[0]
path = "/home/"+user+"/.atom/"
def inplace_change(filename, old_string, new_string):
"""@params: config - config to be written into file
path - the path where t... | 78 | 32.26 | 96 | 15 | 637 | python | [{"finding_id": "codeql_py/overly-large-range_ed166450b0df9009_f0ec09c2", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with A-z in the same character class, and is equivalent to \\[A... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with A-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
51,
51
] | [
null,
null
] | [
40,
45
] | [
43,
48
] | |
2024-11-18T21:14:24.315482+00:00 | 1,365,649,529,000 | 4100897e162d84835eb9a2f9e83724998fddcd8a | 3 | {
"blob_id": "4100897e162d84835eb9a2f9e83724998fddcd8a",
"branch_name": "refs/heads/master",
"committer_date": 1365649529000,
"content_id": "688c64b533ea673d7b65a418f38a8208baf3e2b2",
"detected_licenses": [
"MIT"
],
"directory_id": "b38842fd2728550e322be0d7b17c7b54f3b8535d",
"extension": "py",
"fi... | 2.640625 | stackv2 | import hmac
import random
import string
import hashlib
from pymongo.errors import OperationFailure, DuplicateKeyError
import bson
import sys
from exceptions import DoesNotExist, UserPasswordNotMatch
def make_salt():
salt = ""
for i in range(5):
salt = salt + random.choice(string.ascii_letters)
ret... | 116 | 22.03 | 71 | 13 | 649 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_32bacc1ae64b2c7e_4cd56f39", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
21
] | [
null
] | [
27
] | [
36
] | |
2024-11-18T21:14:24.418956+00:00 | 1,586,786,250,000 | fd867cb27f024f8d291ffe4597f194538d3fedfe | 3 | {
"blob_id": "fd867cb27f024f8d291ffe4597f194538d3fedfe",
"branch_name": "refs/heads/master",
"committer_date": 1586786250000,
"content_id": "0f04aa9fb81d1351046899876819f84a6a385264",
"detected_licenses": [
"MIT"
],
"directory_id": "9991cd7103f2d58578e31c48b93cdc9c6d4c05c0",
"extension": "py",
"fi... | 3.15625 | stackv2 | import sys
from sqlalchemy import create_engine
import re
import numpy as np
import pandas as pd
import nltk
nltk.download('stopwords')
from nltk.tokenize import word_tokenize
from nltk.stem import WordNetLemmatizer
from nltk.corpus import stopwords
from sklearn.pipeline import Pipeline
from sklearn.model_selection... | 164 | 28.56 | 115 | 14 | 1,052 | python | [{"finding_id": "codeql_py/overly-large-range_a817b19d2e905b73_8f95c3a7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
71
] | [
null
] | [
48
] | [
51
] | |
2024-11-18T21:14:34.505404+00:00 | 1,605,990,431,000 | 411a3d9f78373f01caca3b4e68190b6c3abfbb68 | 2 | {
"blob_id": "411a3d9f78373f01caca3b4e68190b6c3abfbb68",
"branch_name": "refs/heads/main",
"committer_date": 1605990431000,
"content_id": "691fe2e67bf00eb68c1df91940b38320732696f5",
"detected_licenses": [
"MIT"
],
"directory_id": "f6fc5c4bff712492743840febbcbbfd98ddc8de7",
"extension": "py",
"file... | 2.328125 | stackv2 | import sys
import sqlite3
from PyQt5.QtGui import QIcon
import appWidgets
from hashlib import md5
from appWidgets import CONNECT
from PyQt5.QtWidgets import QApplication, QMainWindow
from PyQt5.QtWidgets import QPushButton, QLineEdit
from PyQt5.QtWidgets import QWidget, QLabel
from PyQt5 import uic
class Auth(QMai... | 110 | 31.77 | 83 | 19 | 746 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1a243546a6699dba_2b21807d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp... | [
29,
45
] | [
null,
null
] | [
40,
37
] | [
57,
54
] | |
2024-11-18T20:10:42.053031+00:00 | 1,305,301,839,000 | 50b7a910d39b97697a62fbc8d4cfaad575b3f914 | 3 | {
"blob_id": "50b7a910d39b97697a62fbc8d4cfaad575b3f914",
"branch_name": "refs/heads/master",
"committer_date": 1305301839000,
"content_id": "d5ef32ce216e1c003f0648bf70bf98c5a59b5cb0",
"detected_licenses": [
"MIT"
],
"directory_id": "5cf6034c353ffd4f30c468df22a31c0176ce7507",
"extension": "py",
"fi... | 2.640625 | stackv2 | import json
import tornado.httpserver
import tornado.ioloop
import tornado.options
import tornado.web
import logging
logger = logging.getLogger('trinity.' + __name__)
class NodeNotFoundError(Exception): pass
class JPypeJSONEncoder(json.JSONEncoder):
"""JSONEncoder subclass that knows how to encode JPype. """
... | 87 | 31.3 | 78 | 15 | 599 | python | [{"finding_id": "codeql_py/log-injection_6cb3995823ae9bc4_f6ec50d3", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [use... | [
60,
73,
77
] | [
null,
74,
null
] | [
26,
26,
22
] | [
29,
75,
70
] | |
2024-11-18T20:10:48.848454+00:00 | 1,596,375,003,000 | 00c9bc0459989ac66d8b9f60aa1248b7285d85b7 | 3 | {
"blob_id": "00c9bc0459989ac66d8b9f60aa1248b7285d85b7",
"branch_name": "refs/heads/master",
"committer_date": 1596375003000,
"content_id": "ed731eb45273d08d06f9829c235449fcb0726f96",
"detected_licenses": [
"MIT"
],
"directory_id": "d72df1cd00bf246739025352d4884771d5277186",
"extension": "py",
"fi... | 3.484375 | stackv2 | # --------------
#Header files
import pandas as pd
import numpy as np
import matplotlib.pyplot as plt
#path of the data file- path
data=pd.read_csv(path)
data['Gender'].replace('-', 'Agender',inplace=True)
gender_count=data['Gender'].value_counts()
print(gender_count)
gender_count.plot(kind='bar')
plt.xlabel('Gender'... | 72 | 20.62 | 57 | 9 | 436 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_443b23ef17cc3a38_34fdb220", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
12
] | [
null
] | [
7
] | [
19
] | |
2024-11-18T20:10:50.262363+00:00 | 1,506,355,170,000 | 2fa313440d36580c898db3d83216cc8bb28af5a3 | 3 | {
"blob_id": "2fa313440d36580c898db3d83216cc8bb28af5a3",
"branch_name": "refs/heads/master",
"committer_date": 1506355170000,
"content_id": "7c750e61cef8e4c678a69d3eddf65462da5b8378",
"detected_licenses": [
"MIT"
],
"directory_id": "b6409c427748811f23fd6988e03c015c8c781d28",
"extension": "py",
"fi... | 2.625 | stackv2 | #! /usr/bin/python
# generate server.xml with the following command:
# openssl req -new -x509 -keyout server.pem -out server.pem -days 365 -nodes
# run as follows:
# python https.py
# then in your browser, visit:
# https://localhost:4443
# curl -X POST --data "one two three four" localhost:8080/store.json
# c... | 51 | 34.24 | 91 | 17 | 429 | python | [{"finding_id": "codeql_py/insecure-default-protocol_760b3acbd6dcb0fc_963405e8", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
50
] | [
null
] | [
17
] | [
91
] | |
2024-11-18T20:10:54.339910+00:00 | 1,400,021,240,000 | 59162c2c37e88def1945e16e1439862190bc479d | 2 | {
"blob_id": "59162c2c37e88def1945e16e1439862190bc479d",
"branch_name": "refs/heads/master",
"committer_date": 1400021240000,
"content_id": "e613b213468b7489f4b617021d33c90800714140",
"detected_licenses": [
"MIT"
],
"directory_id": "b6416d9bc53794bcbeeb32f350d13d69130f1b1b",
"extension": "py",
"fi... | 2.40625 | stackv2 | from django.conf.urls import patterns, url
from django.http import HttpResponse, HttpResponseForbidden, HttpResponseBadRequest
from django.views.generic.base import View
from django.shortcuts import get_object_or_404
import json
from django.forms.models import model_to_dict
from django.views.decorators.csrf import csrf... | 190 | 30.66 | 125 | 20 | 1,561 | python | [{"finding_id": "codeql_py/stack-trace-exposure_2ae537f7fbd0c03d_c2fc3c97", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
123
] | [
null
] | [
35
] | [
54
] | |
2024-11-18T20:10:59.759525+00:00 | 1,590,371,339,000 | 9b208973aac67814b040d3d32a670fe5028777ef | 3 | {
"blob_id": "9b208973aac67814b040d3d32a670fe5028777ef",
"branch_name": "refs/heads/master",
"committer_date": 1590371339000,
"content_id": "9944494868d81fb997f728566625445f88c29d7e",
"detected_licenses": [
"MIT"
],
"directory_id": "6e238722688d383a70207ee01e52f2cc97945a56",
"extension": "py",
"fi... | 2.546875 | stackv2 | # coding: utf-8
"""
Helper functions for filename and URL generation.
"""
import sys
import os
import subprocess
import urllib.request
import urllib.error
import logging
import tarfile
import zipfile
from io import BytesIO
__author__ = 'Yeongbin Jo <yeongbin.jo@pylab.co>'
def get_geckodriver_filename():
"""
... | 210 | 30.36 | 125 | 19 | 1,528 | python | [{"finding_id": "codeql_py/overly-permissive-file_497cc9f5e243e56a_37fa8fa7", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-022"
] | [
"py/overly-permissive-file",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable.",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
193,
204
] | [
null,
null
] | [
9,
9
] | [
46,
12
] | |
2024-11-18T20:11:00.089853+00:00 | 1,588,981,843,000 | 652c35bde0e6963aa4e0ff877b385136b69a4fdd | 3 | {
"blob_id": "652c35bde0e6963aa4e0ff877b385136b69a4fdd",
"branch_name": "refs/heads/main",
"committer_date": 1588981843000,
"content_id": "484506503cd85a7d201c747148059fc208c96c44",
"detected_licenses": [
"MIT"
],
"directory_id": "0a2d02cee77f0a12e75d459a706d64f5e3d13d26",
"extension": "py",
"file... | 3.296875 | stackv2 | #!/usr/bin/python3
import base64
import crypt
import argparse
import json
import random
import string
import sys
DEFAULT_CHARSET = string.ascii_letters + string.digits + string.punctuation
DEFAULT_LENGTH = 16
MINIMUM_LENGTH = 12
assert DEFAULT_LENGTH >= MINIMUM_LENGTH, \
"Password default length is not >= the... | 109 | 26.31 | 75 | 16 | 635 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ab2bd2905b2cc424_cbe2b84e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
75
] | [
null
] | [
15
] | [
66
] | |
2024-11-18T20:48:09.380962+00:00 | 1,493,244,212,000 | 381646d3c82ba68c00fdc2249982c7fed27f52c8 | 3 | {
"blob_id": "381646d3c82ba68c00fdc2249982c7fed27f52c8",
"branch_name": "refs/heads/master",
"committer_date": 1493244212000,
"content_id": "973301c1f905ef254ee4a18d72412446283a9ca4",
"detected_licenses": [
"Unlicense"
],
"directory_id": "1e1ba8eff29ff566e698078981dab49ba080dfec",
"extension": "py",... | 2.59375 | stackv2 | import db
import os
import base64
import hashlib
from cryptography.fernet import Fernet, InvalidToken
from cryptography.exceptions import InvalidSignature
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives.kdf.pbkdf2 import PBK... | 43 | 27.07 | 67 | 12 | 298 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_c40b3bf2ec19cd26_72856244", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
16
] | [
null
] | [
22
] | [
34
] | |
2024-11-18T21:25:45.945012+00:00 | 1,617,826,444,000 | 79f983e8348e9bd2d440a6715fdbb445e296e5e5 | 3 | {
"blob_id": "79f983e8348e9bd2d440a6715fdbb445e296e5e5",
"branch_name": "refs/heads/master",
"committer_date": 1617826444000,
"content_id": "127791703c09911fd2acfdb21ade25312c2de652",
"detected_licenses": [
"MIT"
],
"directory_id": "d882967d55c6e730ecdf37419d3e34f7bc69ad2c",
"extension": "py",
"fi... | 2.546875 | stackv2 | import re
from pathlib import Path
from .config import DATASET, INPUT, SRC_FILES
from .data_reader import ManySStuBs4J
def check_line(lines, line_number):
"""This function tries to extract the complete bug line
when it is expanded on multiple lines or the line number
in the dataset is pointing to somewhe... | 123 | 32.63 | 151 | 16 | 959 | python | [{"finding_id": "codeql_py/redos_56109895df8e3c3f_2f283f11", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '/*' and containing many repetitio... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '/*' and containing many repetitions of ' '."
] | [
17
] | [
null
] | [
27
] | [
35
] | |
2024-11-18T21:26:07.325627+00:00 | 1,397,255,856,000 | 58bdc63fcc3f7fecf23a61fee7f6093ceda70f60 | 3 | {
"blob_id": "58bdc63fcc3f7fecf23a61fee7f6093ceda70f60",
"branch_name": "refs/heads/master",
"committer_date": 1397268088000,
"content_id": "64ea714dc61c01f8db4fdc1e710db75df7ae6520",
"detected_licenses": [
"MIT"
],
"directory_id": "0055fb1d50cca904ff2325d0bdd8b9f5d8a1f04d",
"extension": "py",
"fi... | 2.71875 | stackv2 | import logging
import re
import time
import sys
from selenium import webdriver
from selenium.webdriver.common.keys import Keys
browser = webdriver.Firefox()
log = logging.getLogger(__name__)
def login(account_id, username, password):
log.info('Logging in as %s for account %s...', username, account_id)
bro... | 92 | 32.32 | 109 | 13 | 745 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4df0639750b7c6bd_aa722837", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
26
] | [
null
] | [
59
] | [
66
] | |
2024-11-18T21:51:47.343434+00:00 | 1,463,068,908,000 | 7ddc889f5da410d965c946ee084e94a008557be8 | 2 | {
"blob_id": "7ddc889f5da410d965c946ee084e94a008557be8",
"branch_name": "refs/heads/master",
"committer_date": 1463068908000,
"content_id": "00eac37be2c2eaadc07ec6875c7178382be195d7",
"detected_licenses": [
"MIT"
],
"directory_id": "0660f18b77375a44ff7550a5abdc9be0861dfde8",
"extension": "py",
"fi... | 2.5 | stackv2 | """Django bitserv payment library for selling 402 API endpoints."""
import os
from functools import wraps
from rest_framework import status
from rest_framework.response import Response
from rest_framework.exceptions import ParseError
import two1.bitserv as bitserv
class PaymentRequiredResponse(Response):
"""Paym... | 93 | 41.65 | 106 | 25 | 777 | python | [{"finding_id": "codeql_py/stack-trace-exposure_452785178544687b_bd353a03", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
91
] | [
null
] | [
38
] | [
44
] | |
2024-11-18T21:52:04.597830+00:00 | 1,627,143,969,000 | 2ea3601fad3b175edd28c372ab48f750b58d68f1 | 3 | {
"blob_id": "2ea3601fad3b175edd28c372ab48f750b58d68f1",
"branch_name": "refs/heads/main",
"committer_date": 1627143969000,
"content_id": "6b0e0768ef676134d75d4759bf2e2805770e7831",
"detected_licenses": [
"MIT"
],
"directory_id": "fdb44e88d9ece9279d1653a7662f28eb3b93300b",
"extension": "py",
"file... | 3.34375 | stackv2 | import markdown
from jinja2 import Environment, FileSystemLoader
import os
class Report():
def __init__(self, title=None, name=None, desc=None) -> None:
self.title = title
self.name = name
self.desc = desc
self.links = '' # html string
self.content = '' # html string
... | 74 | 30.16 | 100 | 13 | 567 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f718acea406709c9_84c025fc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
36
] | [
null
] | [
15
] | [
57
] | |
2024-11-18T21:52:05.868982+00:00 | 1,624,277,079,000 | 1702502b0db1642740f9ea369e735e2f8dde8ecd | 3 | {
"blob_id": "1702502b0db1642740f9ea369e735e2f8dde8ecd",
"branch_name": "refs/heads/main",
"committer_date": 1624277079000,
"content_id": "9dfdaf6706ac441b4f588e2bf675ff2c4ea0d49a",
"detected_licenses": [
"MIT"
],
"directory_id": "6f28755b25258b7728e60845a5fd32fb8bc64813",
"extension": "py",
"file... | 3.09375 | stackv2 | from __future__ import annotations
import abc
from src.articles.domain.entities import exceptions
from src.articles.domain.entities.encryptor import Encryptor, AbstractEncryptor
from src.articles.domain.values.password import Password
class AbstractCredential(abc.ABC):
username: str
password: str
active:... | 67 | 24.42 | 79 | 12 | 355 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b71d6bda8e3de42b_b2e1cf65", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
66
] | [
null
] | [
11
] | [
22
] | |
2024-11-18T20:31:35.716128+00:00 | 1,554,816,514,000 | 66eef3e1704aeef8c624f79ff93e367d0945b1f6 | 3 | {
"blob_id": "66eef3e1704aeef8c624f79ff93e367d0945b1f6",
"branch_name": "refs/heads/master",
"committer_date": 1554816514000,
"content_id": "7f456b48bd5d20536bdd6b0ae6467340654bf2bb",
"detected_licenses": [
"MIT"
],
"directory_id": "39e4524aa50606f6989634b8770ef1d07f645a28",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/env python3
# -*- coding:utf-8 -*-
import subprocess
import os
import sys
from pathlib import Path
from datetime import datetime
from jinja2 import Environment, FileSystemLoader
from xml.sax.saxutils import *
class PXUnit:
"""
xUnitもどきクラス
"""
def __init__(self, testee_path, answer_path, test... | 152 | 29.97 | 84 | 17 | 1,183 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b973ccd8e5b4eeb9_09f817c8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
94
] | [
null
] | [
11
] | [
70
] | |
2024-11-18T20:59:43.390828+00:00 | 1,628,157,502,000 | 2afa4f6210ba41c23e1b57a6ac78771e51a1e097 | 3 | {
"blob_id": "2afa4f6210ba41c23e1b57a6ac78771e51a1e097",
"branch_name": "refs/heads/master",
"committer_date": 1628157502000,
"content_id": "7d2ec69ffb212513521224dc1e2fc28605b3995a",
"detected_licenses": [
"MIT"
],
"directory_id": "315596e2f614910d981264506e9817f0e0a939e9",
"extension": "py",
"fi... | 2.546875 | stackv2 | from flask import Flask, render_template, request,jsonify
from py2neo import Graph
# from neo4j.v1 import GraphDatabase
# import sys
#
# sys.path.append('/Users/sunchao/PycharmProjects/KG/QASystemOnMedicalKG')
# from chatbot_graph import ChatBotGraph
#
#
# handler = ChatBotGraph()
app = Flask(__name__)
graph = Graph(... | 56 | 28.39 | 105 | 12 | 437 | python | [{"finding_id": "codeql_py/flask-debug_77b65117ab423324_3fb5a7cd", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
56,
37
] | [
null,
null
] | [
5,
12
] | [
26,
25
] | |
2024-11-18T21:10:32.029932+00:00 | 1,624,252,461,000 | 45046c0c8fc160bcb2756d77b2465b80fb5f3132 | 2 | {
"blob_id": "45046c0c8fc160bcb2756d77b2465b80fb5f3132",
"branch_name": "refs/heads/main",
"committer_date": 1624252461000,
"content_id": "a8ee1d7728aebf99a791229afa03af59e077cde8",
"detected_licenses": [
"MIT"
],
"directory_id": "0e3c16d6ce8955f2143a11feeaf26bf351fa6c0e",
"extension": "py",
"file... | 2.5 | stackv2 | #!/usr/bin/env python
# -*- coding: utf8 -*-
#import cjson
import os
import logging
import json
import click
import socket
socket.setdefaulttimeout(50)
from orgprofile.builder import SOURCES_MAP
from orgprofile.builder import build_profile
def list_profiles():
profiles = list(SOURCES_MAP.keys())
profiles.so... | 74 | 23.49 | 103 | 13 | 492 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8f0c39ba69aeed8e_da641ec0", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
54
] | [
null
] | [
13
] | [
28
] | |
2024-11-18T21:10:53.569638+00:00 | 1,591,280,747,000 | 3b94707de99f76a1c44158a5a20ae0e0d8035fcd | 4 | {
"blob_id": "3b94707de99f76a1c44158a5a20ae0e0d8035fcd",
"branch_name": "refs/heads/master",
"committer_date": 1591280747000,
"content_id": "dd603970b7929dbbfcd210bd23df3f8725d79975",
"detected_licenses": [
"MIT"
],
"directory_id": "c6dcecd43edf7ee1488be38779a59b41781b8371",
"extension": "py",
"fi... | 4.40625 | stackv2 | #Created by Josh Tseng, 2 June 2020
#This file illustrates how if-statements can be used to determine if a key exists in a dictionary
phone_numbers = {
"John": "90904454",
"Ellie": "90234056",
"Raj": "94456654"
}
print("Welcome! Search for a person's phone number.")
user_search = input("Type a person's name: ")
if u... | 26 | 36.08 | 146 | 11 | 266 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_34d28cfa620f2d96_1772bdaa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
14
] | [
null
] | [
11
] | [
87
] | |
2024-11-18T21:10:56.507237+00:00 | 1,619,205,356,000 | 57c42faa61bb7a08b75099a6494d4406d1253d3a | 4 | {
"blob_id": "57c42faa61bb7a08b75099a6494d4406d1253d3a",
"branch_name": "refs/heads/main",
"committer_date": 1619205356000,
"content_id": "6d965215ad9658078eb56731f83dad1992fac7aa",
"detected_licenses": [
"MIT"
],
"directory_id": "234458aada8348533041bfb39a5807a49e2eabd6",
"extension": "py",
"file... | 4.15625 | stackv2 |
#py_calendar.py
import calendar
#create a TextCalendar instance
cal = calendar.TextCalendar()
print("We just produced a {}.\n".format(type(cal)))
print("Let's check out the calendar for April, 2016\n")
calendar.prmonth(2016,4)
print()
#what day of the week was I born?
birthday_year=1957
birthday_month=5
birthday_d... | 24 | 25.58 | 78 | 9 | 171 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_48f3a01b4358ffe9_ad389eb9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
24
] | [
null
] | [
7
] | [
71
] | |
2024-11-18T21:23:45.308564+00:00 | 1,616,195,991,000 | e3e12a883a7182c67faa516e0873cdef0d229fbe | 3 | {
"blob_id": "e3e12a883a7182c67faa516e0873cdef0d229fbe",
"branch_name": "refs/heads/master",
"committer_date": 1616195991000,
"content_id": "f6c0ccbe6cc7fae8de5e044976edcda23528df1a",
"detected_licenses": [
"MIT"
],
"directory_id": "cd8d6718e9603efc08181710974f10586d7a3757",
"extension": "py",
"fi... | 3.46875 | stackv2 | """Symple Fields plotting.
This module provides tools allowing for somebody to quickly and easily
plot a direction field for a given symbolic equation. Possible uses
include plotting direction fields of first order differential equations.
"""
from __future__ import division
import re
from math import sqrt
import mult... | 230 | 33.21 | 85 | 18 | 1,766 | python | [{"finding_id": "codeql_py/redos_f7c2b20e2f31b335_c1b93365", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of ' '.", "remediati... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of ' '."
] | [
41
] | [
null
] | [
14
] | [
31
] | |
2024-11-18T21:24:00.042896+00:00 | 1,691,876,137,000 | e6e1a08f7cc21a91cd9b0be6661b16b25c160e47 | 2 | {
"blob_id": "e6e1a08f7cc21a91cd9b0be6661b16b25c160e47",
"branch_name": "refs/heads/master",
"committer_date": 1691876137000,
"content_id": "eb1c64b3de7fbf2a6f4a5d07efac2ae84863cd82",
"detected_licenses": [
"MIT"
],
"directory_id": "8999a82b8cdeec9ce3b0d29196326c404ce1a6cb",
"extension": "py",
"fi... | 2.34375 | stackv2 | '''
This set of routes is in place to handle migration from the old PHP-based website.
Once requests to any old URLs dry up, it can be safely removed.
'''
from flask import redirect, url_for, request
from alchemyst import app
from alchemyst.ui.note import note_view
from alchemyst.api.routes import note
from alchemyst... | 77 | 32.25 | 103 | 21 | 610 | python | [{"finding_id": "codeql_py/url-redirection_abde88bf50953a13_5da32ed8", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
17
] | [
null
] | [
21
] | [
29
] | |
2024-11-18T21:37:51.506014+00:00 | 1,578,466,316,000 | 679e3563cafddad1cbd8003cffc7e3aa38b6b72a | 3 | {
"blob_id": "679e3563cafddad1cbd8003cffc7e3aa38b6b72a",
"branch_name": "refs/heads/master",
"committer_date": 1578466316000,
"content_id": "6b5bbaac836ff2ea8b2643679bc195fefbbc0587",
"detected_licenses": [
"MIT"
],
"directory_id": "c39cd00f14fea69798ef67947ac405b382e05f43",
"extension": "py",
"fi... | 2.765625 | stackv2 | import sqlite3 as sql
class job:
def __init__(self,desc=None,salary=None,duration=None):
#self.utype=utype
self.desc=desc
self.salary=salary
self.duration=duration
#CARE SEEKER SPECIFIC
def create(self,utype):
if utype==1:
print("You Have Access ... | 44 | 24.66 | 59 | 13 | 292 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3443f66694196ff3_970ce639", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
13
] | [
null
] | [
47
] | [
58
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.