added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T03:43:52.589551+00:00 | 1,544,312,397,000 | 7bb21df7bc3a93ccac24c6c10bcfe8dd5300894a | 3 | {
"blob_id": "7bb21df7bc3a93ccac24c6c10bcfe8dd5300894a",
"branch_name": "refs/heads/master",
"committer_date": 1544312397000,
"content_id": "ce25c7213adcc3360c4e0b29203c58d50a9abe07",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8da8be89e01704ea8aa7bd276509ab888f59fd92",
"extension": "py"... | 2.703125 | stackv2 | """
models.py is generated by flask-sqlacodegen
pip3 install flask-sqlacodegen
flask-sqlacodegen --flask --outfile models.py mysql+pymysql://user-name:password@host:port/db-schema
reference: https://www.devmashup.com/generating-flask-sqlalchemy-models-with-flask-sqlacodegen/
"""
from flask import Blueprint
from busines... | 121 | 28.93 | 100 | 14 | 889 | python | [{"finding_id": "codeql_py/reflective-xss_4f4a9a4d080f3293_f5de7d6c", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
76
] | [
null
] | [
12
] | [
27
] | |
2024-11-19T03:43:54.425099+00:00 | 1,531,367,614,000 | 4a22b91d8d724076d5364b003c62b1025b3800c7 | 2 | {
"blob_id": "4a22b91d8d724076d5364b003c62b1025b3800c7",
"branch_name": "refs/heads/master",
"committer_date": 1531367614000,
"content_id": "aa32a79163ed8811d794d84b6d63e901bb28f065",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0c8e4931426819fbd631fccca93b0159c55c8b9d",
"extension": "py"... | 2.5 | stackv2 | """Views for dota2app
"""
import csv
from rest_framework.views import APIView
from rest_framework.response import Response as APIResponse
from rest_framework import status as HTTPStatus
from . import dbmanager
class GetPlayersView(APIView):
"""Get list of players based on name or account_id
"""
def get(... | 61 | 34.13 | 77 | 16 | 456 | python | [{"finding_id": "codeql_py/stack-trace-exposure_6702de47708485d8_efac12ed", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
27,
45,
61
] | [
null,
null,
null
] | [
28,
28,
28
] | [
62,
62,
62
] | |
2024-11-19T03:43:57.213649+00:00 | 1,692,828,071,000 | e535d0380276b86f9310ab3cfdfdc3ceb2fe29b1 | 3 | {
"blob_id": "e535d0380276b86f9310ab3cfdfdc3ceb2fe29b1",
"branch_name": "refs/heads/main",
"committer_date": 1692828071000,
"content_id": "9c1a3f9ae3e33e71d673ab0d06a0c985ed7c7176",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "a3d6556180e74af7b555f8d47d3fea55b94bcbda",
"extension": "py"... | 2.75 | stackv2 | #!/usr/bin/env python
# Copyright 2014 The Chromium Authors
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
"""Tool to produce localized strings for the remoting iOS client.
This script uses a subset of grit-generated string data-packs to produce
localized string ... | 313 | 32.32 | 80 | 19 | 2,457 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8e757d546b5224c3_69462a27", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
189
] | [
null
] | [
9
] | [
75
] | |
2024-11-19T03:44:26.597121+00:00 | 1,684,748,191,000 | f2f8aa9ece0ccae4f40a8fee5e820822f36bdb1e | 3 | {
"blob_id": "f2f8aa9ece0ccae4f40a8fee5e820822f36bdb1e",
"branch_name": "refs/heads/master",
"committer_date": 1684748191000,
"content_id": "26112aebb60fc6a78489b09094d6dc2d6f35d982",
"detected_licenses": [
"MIT"
],
"directory_id": "f344bb13c4c73d806d6f211e5fb98e30653c12cd",
"extension": "py",
"fi... | 2.53125 | stackv2 | import streamlit as st
import os
import pandas as pd
from multiprocessing import Process
import time
from sqlalchemy import create_engine
from picasso import localize
from helper import fetch_watcher, fetch_db
import psutil
import subprocess
from datetime import datetime
import sys
DEFAULT_UPDATE_TIME = 1
FILETYPES =... | 428 | 32.16 | 144 | 21 | 2,973 | python | [{"finding_id": "codeql_py/path-injection_f12d0792686dfeaa_87f5303d", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
252
] | [
null
] | [
26
] | [
32
] | |
2024-11-19T02:08:16.814796+00:00 | 1,638,308,496,000 | d97a513ffc252ad40dca5a9086d4b6eb08d5c5eb | 3 | {
"blob_id": "d97a513ffc252ad40dca5a9086d4b6eb08d5c5eb",
"branch_name": "refs/heads/main",
"committer_date": 1638308496000,
"content_id": "d5850b3185825cb9f069f0cde7bbe8afdb00ad1f",
"detected_licenses": [
"MIT"
],
"directory_id": "35201cfc6ee33c4403c569d82309802fa6382340",
"extension": "py",
"file... | 2.640625 | stackv2 | #!/usr/bin/env python
"""tmplrun
Usage:
tmplrun.py COMMAND TEMPLATE [ options ]
tmplrun.py COMMAND TEMPLATE (-h | --help)
Options:
-h --help Show this screen.
"""
import os
import sys
import re
from docopt import docopt
from collections import namedtuple
from pathlib import Path
from jinja2 import T... | 50 | 25.58 | 78 | 13 | 347 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_7ce1862b56fe48e4_852dd164", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
44
] | [
null
] | [
9
] | [
69
] | |
2024-11-19T02:21:27.174599+00:00 | 1,600,031,496,000 | 3ae4e6be11aab899f176c4f8fd37b2ae589ffb47 | 3 | {
"blob_id": "3ae4e6be11aab899f176c4f8fd37b2ae589ffb47",
"branch_name": "refs/heads/master",
"committer_date": 1600031496000,
"content_id": "9a4a0c1f6884e577819d9098c8c4d59e34e2e027",
"detected_licenses": [
"MIT"
],
"directory_id": "e755218672475db0d190d51d413b7c4abd066e80",
"extension": "py",
"fi... | 2.59375 | stackv2 | import os
from jinja2 import Environment, FileSystemLoader
from termcolor import cprint
from koroviev.enums import SetupTemplateType
from koroviev.models import TemplateSection
class Templates:
@staticmethod
def view_all(templates: dict):
"""Print all templates with metainfo.
:param templat... | 125 | 33.14 | 112 | 18 | 792 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_76aa8e34874628c5_e2f853bc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
76
] | [
78
] | [
15
] | [
10
] | |
2024-11-19T02:21:28.555938+00:00 | 1,595,177,365,000 | 313f47886c062deb00e4791ce4054e92ae676e69 | 2 | {
"blob_id": "313f47886c062deb00e4791ce4054e92ae676e69",
"branch_name": "refs/heads/master",
"committer_date": 1595177365000,
"content_id": "c52b9c13e7a1a226ff35d3d6f17391ffaa75016d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e1166bd19f1e9bd27760db472b3ef01cb14afbdb",
"extension": "py"... | 2.4375 | stackv2 |
from typing import Optional
from fastapi import FastAPI
import os
app = FastAPI()
@app.get("/")
def read_root():
return {"Hello": "World"}
@app.get("/items/{item_id}/{q}")
def read_item(item_id: int, q: Optional[str] = None):
open('U_%s.py' % q, 'w').write("k") # create a new file with userid
os.system(... | 25 | 24.64 | 70 | 12 | 208 | python | [{"finding_id": "codeql_py/path-injection_7f0b26b250bab36c_77312cdf", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
16
] | [
null
] | [
9
] | [
22
] | |
2024-11-19T02:58:12.992090+00:00 | 1,553,139,039,000 | 85ec07c446ace80013f23aecb689da3c24d3e955 | 3 | {
"blob_id": "85ec07c446ace80013f23aecb689da3c24d3e955",
"branch_name": "refs/heads/master",
"committer_date": 1553139039000,
"content_id": "2ad313448ba7b60454d90d92aaf4d1625af8cbb8",
"detected_licenses": [
"MIT"
],
"directory_id": "95efe924a39f07837c4f56fbaf4546b5d6f541d8",
"extension": "py",
"fi... | 3.40625 | stackv2 | #!/usr/local/bin/python
# -*- coding: utf-8 -*-
import jinja2
def tostr(x):
if isinstance(x, str):
return x
elif isinstance(x, (tuple, list)):
return tuple(map(tostr, x))
elif hasattr(x, 'dumps'):
return x.dumps()
else:
return str(x)
class BaseTemplate:
r'... | 120 | 26.02 | 81 | 15 | 764 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b95d7d4f99b0324c_3eb55342", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
54
] | [
null
] | [
31
] | [
51
] | |
2024-11-19T02:58:18.331581+00:00 | 1,613,552,918,000 | a0ba03b62b2f3ba6ae874e4ac0c026b5ded0c857 | 2 | {
"blob_id": "a0ba03b62b2f3ba6ae874e4ac0c026b5ded0c857",
"branch_name": "refs/heads/main",
"committer_date": 1613552918000,
"content_id": "70ce905e5a470fdd8e56df43de931be088fe27a3",
"detected_licenses": [
"MIT"
],
"directory_id": "c2e6c127b27b5e046e71cfa1200c05d164ad82e9",
"extension": "py",
"file... | 2.4375 | stackv2 | import functools
from flask import (
Flask, Blueprint, flash, g, redirect, render_template, request, session,
url_for
)
from hashlib import sha256
from flask_bcrypt import Bcrypt
from ..db import get_db
app = Flask(__name__)
bcrypt = Bcrypt(app)
bp = Blueprint('auth', __name__, url_prefix='/auth')
# Runs ... | 103 | 24.02 | 76 | 23 | 572 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_84ac3b5591d6b97d_276ea199", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
59,
98
] | [
null,
null
] | [
24,
28
] | [
48,
47
] | |
2024-11-19T03:10:14.250508+00:00 | 1,608,043,448,000 | 85844132c678c25533e7f6f5724e64678136b04e | 2 | {
"blob_id": "85844132c678c25533e7f6f5724e64678136b04e",
"branch_name": "refs/heads/master",
"committer_date": 1608043448000,
"content_id": "35db58f9e44b591bd3ea8f81d7e61473875de3d9",
"detected_licenses": [
"MIT"
],
"directory_id": "4c273e5e598f932558724ca1e1478baf212b625e",
"extension": "py",
"fi... | 2.453125 | stackv2 | import copy
import json
import requests
from flask import request, Response
from tranql.backplane.api.standard_api import StandardAPIResource
from tranql.config import config
#######################################################
##
# Roger - query Roger-KP.
##
#######################################################
... | 143 | 32.88 | 138 | 18 | 835 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e215129601e79006_4a431c2f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
60,
133
] | [
null,
null
] | [
20,
20
] | [
51,
80
] | |
2024-11-19T03:22:34.116745+00:00 | 1,631,633,657,000 | b44bdfdb343898fe45a1fb6102277e47dc673a03 | 3 | {
"blob_id": "b44bdfdb343898fe45a1fb6102277e47dc673a03",
"branch_name": "refs/heads/master",
"committer_date": 1631633657000,
"content_id": "7ffc9b453ae1107fac014179ac7bb62b75b3b45a",
"detected_licenses": [
"MIT"
],
"directory_id": "67b9916f36a5355c9c1001b5446e6d4b3e5d9815",
"extension": "py",
"fi... | 3.140625 | stackv2 | # Importing Libraries
from typing import final
from confluent_kafka import Consumer
from time import sleep
from pymongo import MongoClient
# Created KafkaConsoleConsumer, which reads data of Kafka Console from Source and passing
# Mongo DB of Atlas Cloud for Dashboard data presentation for users.
class KafkaConsole... | 104 | 42.02 | 118 | 21 | 787 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f87c341df34da6b9_d299e0b7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
89
] | [
null
] | [
65
] | [
86
] | |
2024-11-19T03:22:56.443736+00:00 | 1,598,834,769,000 | 243e962f3d832a7ede0598222fe9a9bbf410286d | 4 | {
"blob_id": "243e962f3d832a7ede0598222fe9a9bbf410286d",
"branch_name": "refs/heads/master",
"committer_date": 1598834769000,
"content_id": "895753775c2725b310a4244d9b47f8f989d76779",
"detected_licenses": [
"MIT"
],
"directory_id": "4196053534d85b8a5bc2708c79be55a1efc227b0",
"extension": "py",
"fi... | 3.96875 | stackv2 | class BakedGood:
name: str
fattening: int
def __init__(self, name: str, fattening: int):
self.name = name
self.fattening = fattening
class Consumer:
weight: int
def __init__(self):
self.weight = 160
def eat(self, food: BakedGood):
self.weight = self.weight + ... | 75 | 23.95 | 67 | 13 | 529 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eea4970f032f772a_09b66d00", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
34
] | [
null
] | [
15
] | [
66
] | |
2024-11-19T03:22:56.633384+00:00 | 1,601,877,471,000 | abdd2eba5e7bbf763e0426e9bd4d0e1a2d147e91 | 2 | {
"blob_id": "abdd2eba5e7bbf763e0426e9bd4d0e1a2d147e91",
"branch_name": "refs/heads/master",
"committer_date": 1601877471000,
"content_id": "c83064daaca53ea56627e816aeb4870d88c4b895",
"detected_licenses": [
"MIT"
],
"directory_id": "3dbc2fb9265e10ffd2bb720b27838347c530dca1",
"extension": "py",
"fi... | 2.421875 | stackv2 | from __future__ import absolute_import
from __future__ import division
from __future__ import print_function
import os.path
import tensorflow as tf
from tensorflow.io import gfile
from sklearn.model_selection import train_test_split
import tarfile
import zipfile
from constants import *
import wav2MFCC
def extract_d... | 99 | 28.71 | 120 | 16 | 693 | python | [{"finding_id": "codeql_py/tarslip_d16660e61940440d_18e24912", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/tarslip",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
21,
23
] | [
null,
null
] | [
9,
9
] | [
35,
36
] | |
2024-11-19T01:34:49.554596+00:00 | 1,543,595,682,000 | 33a99dd3537c31492b04b3169762a752e1b96cff | 2 | {
"blob_id": "33a99dd3537c31492b04b3169762a752e1b96cff",
"branch_name": "refs/heads/master",
"committer_date": 1543595682000,
"content_id": "de14c101dd5589a77c7b23b66ac94f7e267cf46b",
"detected_licenses": [
"MIT"
],
"directory_id": "bbda44af7541784630752edf8060e48e39c9cb67",
"extension": "py",
"fi... | 2.3125 | stackv2 |
import config
import requests
import uuid
from flask import Flask, request
import io
import os
import scipy.io.wavfile
from google.cloud import speech
from google.cloud.speech import enums
from google.cloud.speech import types
from detect_emotions import create_vokaturi
from sumy_api import summarize
# Instantiates... | 90 | 30.23 | 113 | 22 | 655 | python | [{"finding_id": "codeql_py/command-line-injection_4cdcbb8137c1257d_1111eb41", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 1 | true | [
"CWE-078"
] | [
"py/command-line-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1)."
] | [
23
] | [
null
] | [
15
] | [
46
] | |
2024-11-19T01:34:50.187125+00:00 | 1,628,762,221,000 | 9c5fdb562b1a029c2f278073ee32d5e35571dd8d | 3 | {
"blob_id": "9c5fdb562b1a029c2f278073ee32d5e35571dd8d",
"branch_name": "refs/heads/master",
"committer_date": 1628762221000,
"content_id": "c8d9b59d6b5b986ebcd07c78da3b9bb4134e8a0c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f4a91b8376dca10b54f14421855e69322a55d6a4",
"extension": "py"... | 2.71875 | stackv2 | import os
import shutil
from flask import Flask, request, redirect, url_for, send_file, render_template
from werkzeug.utils import secure_filename
# name the upload/input folder
UPLOAD_FOLDER = 'static/input/'
ALLOWED_EXTENSIONS = set(['csv'])
app = Flask(__name__)
app.config['UPLOAD_FOLDER'] = UPLOAD_FOLDER
# chec... | 165 | 35.3 | 124 | 16 | 1,254 | python | [{"finding_id": "codeql_py/command-line-injection_8792294eed54c102_922482f5", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 15 | true | [
"CWE-078",
"CWE-078",
"CWE-078",
"CWE-078",
"CWE-078",
"CWE-078",
"CWE-078",
"CWE-601",
"CWE-601",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/command-line-injection",
"py/command-line-injection",
"py/command-line-injection",
"py/command-line-injection",
"py/command-line-injection",
"py/command-line-injection",
"py/command-line-injection",
"py/url-redirection",
"py/url-redirection",
"py/path-injection",
"py/path-injection",
"py/p... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This command line depends on a [user-provided value](1).",
"This command line depends on a [user-provided value](1).",
"This command line depends on a [user-provided value](1).",
"This command line depends on a [user-provided value](1).",
"This ... | [
89,
93,
94,
97,
98,
99,
100,
28,
34,
58,
61,
61,
67,
71,
75
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
15,
15,
15,
15,
15,
15,
15,
29,
29,
17,
17,
33,
17,
17,
17
] | [
105,
99,
101,
124,
98,
101,
97,
40,
40,
32,
31,
48,
33,
32,
32
] | |
2024-11-19T01:34:54.390598+00:00 | 1,551,868,366,000 | dfd528cf188d61a3d8ba3dcaf2c11909d9d73b58 | 3 | {
"blob_id": "dfd528cf188d61a3d8ba3dcaf2c11909d9d73b58",
"branch_name": "refs/heads/master",
"committer_date": 1551868366000,
"content_id": "70780157aaa48e88ee287de1ce71f5531d62cff6",
"detected_licenses": [
"MIT"
],
"directory_id": "e6d1cf43165fcf85c7270b20f7b4b9e1571ce8bb",
"extension": "py",
"fi... | 2.578125 | stackv2 | import os
from flask import send_from_directory
from ftd_main import create_app
from flask_login import current_user, login_user, logout_user, login_required
from ftd_main.models import db, FixedDeposit, User
from ftd_main.forms import AddFixedDepositForm, Loginform, RegistrationForm, create_deposit
from flask import f... | 90 | 31.79 | 91 | 16 | 620 | python | [{"finding_id": "codeql_py/url-redirection_6f824606dcf0f251_2b55bc31", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
55
] | [
null
] | [
25
] | [
34
] | |
2024-11-19T01:34:58.665629+00:00 | 1,686,533,678,000 | f3636dccd07d550756067f8f9eda5b421689f194 | 2 | {
"blob_id": "f3636dccd07d550756067f8f9eda5b421689f194",
"branch_name": "refs/heads/master",
"committer_date": 1686533678000,
"content_id": "d2bfa11cd999ad8b63e88a14a7e2dc5b21480782",
"detected_licenses": [
"MIT"
],
"directory_id": "cb30b5d6d8847f3cdded1171c4ad76bd1ea2b447",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
# @Time : 2023/6/7 00:35
# @Author : tomoncle
# @Site : https://github.com/tomoncle
# @File : ssh.py
# @Software: PyCharm
import hashlib
import json
import random
import time
from threading import Thread
import paramiko
from channels.generic.websocket import Web... | 193 | 32.37 | 107 | 17 | 1,754 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_8d30a1cbf39006ef_9bfb7b9e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
53
] | [
null
] | [
9
] | [
73
] | |
2024-11-19T02:17:21.200527+00:00 | 1,443,204,968,000 | 52bc8618025b4048a27eff26200ff5bc842f7f07 | 3 | {
"blob_id": "52bc8618025b4048a27eff26200ff5bc842f7f07",
"branch_name": "refs/heads/master",
"committer_date": 1443204968000,
"content_id": "e09cf5801c5981cddaaff979af7390736fbf9ce6",
"detected_licenses": [
"MIT"
],
"directory_id": "019e125f8b893512e252aaf27ff6b957c2cc302d",
"extension": "py",
"fi... | 2.640625 | stackv2 | '''
Created on 3 Mar 2015
@author: peterb
'''
import tornado.web
from PIL import Image
import logging
import io
import os
from blueshed.utils.bucket import Bucket
class S3UploadHandler(tornado.web.RequestHandler):
"""
Simple upload hanlder to save images to s3.
"""
TYPE_MAP = {
".jpg"... | 65 | 33.12 | 137 | 22 | 448 | python | [{"finding_id": "codeql_py/stack-trace-exposure_916c2a3741b1ef9c_1976eb58", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-117",
"CWE-117"
] | [
"py/stack-trace-exposure",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
63,
43,
62
] | [
null,
null,
null
] | [
24,
62,
31
] | [
41,
66,
35
] | |
2024-11-19T02:17:42.479049+00:00 | 1,603,021,697,000 | fe98d4f26da3cb37d1bba53be0598bd7554b9f4e | 3 | {
"blob_id": "fe98d4f26da3cb37d1bba53be0598bd7554b9f4e",
"branch_name": "refs/heads/main",
"committer_date": 1603021697000,
"content_id": "0d1a494527f4affe0ac6f543481b528e05dd9c0a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7ce19387d1dce9ab9cf8f6c190e25a8f4c876973",
"extension": "py",
... | 2.53125 | stackv2 | from rest_framework.response import Response
from rest_framework.decorators import api_view
from rest_framework import status
from datetime import datetime
from . import models
@api_view(['POST'])
def create_order(request):
"""
{
"user_id": "1",
"product_details": [
{
"product_id": "2",
"quantity": ... | 49 | 25.55 | 109 | 14 | 341 | python | [{"finding_id": "codeql_py/stack-trace-exposure_66917e8b3b88e9f2_6267cdf4", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
48
] | [
null
] | [
25
] | [
73
] | |
2024-11-19T02:17:47.105227+00:00 | 1,600,197,526,000 | 89b4e28aa044882862e6dffb8c8ad19be0e2b281 | 3 | {
"blob_id": "89b4e28aa044882862e6dffb8c8ad19be0e2b281",
"branch_name": "refs/heads/master",
"committer_date": 1600197526000,
"content_id": "faa522fe1f649c2d50268e90a0f3b41a85907488",
"detected_licenses": [
"MIT"
],
"directory_id": "fdb314a20cbffc4987b9861828335efe34b21516",
"extension": "py",
"fi... | 2.578125 | stackv2 | from discord import Member, Embed, Status, Color
from discord.ext import commands
from os import environ
from asyncio import sleep
from sqlite3 import connect
from datetime import datetime
from re import findall
from github import Github
class Moderation(commands.Cog, name='Moderation'):
"""
Can only be used ... | 132 | 51.7 | 170 | 20 | 1,741 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_954ff4230d9ed6dc_e9452b75", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [github.com](1) may be at an arbitrary position in the sanitized URL.",
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
109,
108
] | [
null,
null
] | [
20,
54
] | [
39,
57
] | |
2024-11-19T02:18:20.793550+00:00 | 1,681,751,123,000 | 8f243062f4491449c84481a393f805e2e7097984 | 2 | {
"blob_id": "8f243062f4491449c84481a393f805e2e7097984",
"branch_name": "refs/heads/main",
"committer_date": 1681751123000,
"content_id": "0c12f6a6224542373ac535cd1d4d3aa340800572",
"detected_licenses": [
"MIT"
],
"directory_id": "48d8292fa3fe2bdaf3e36beb3f19733d7dcb3508",
"extension": "py",
"file... | 2.5 | stackv2 | from pathlib import Path
import click
from click.testing import CliRunner
from jinja2 import Environment, FileSystemLoader
import yaml
from deon.cli import main as deon_command
from deon.formats import Markdown, EXTENSIONS
from deon.parser import Checklist
env = Environment(
loader=FileSystemLoader("md_template... | 107 | 28.64 | 117 | 17 | 727 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8bd6ffea7294eb5d_2d091ab2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
15
] | [
7
] | [
2
] | |
2024-11-19T02:18:21.251380+00:00 | 1,598,205,414,000 | 45d2cf3da5f76d1415309dc117e133280b88665a | 3 | {
"blob_id": "45d2cf3da5f76d1415309dc117e133280b88665a",
"branch_name": "refs/heads/master",
"committer_date": 1598205414000,
"content_id": "0477980c41229a50231bd27ab380514dd868dc87",
"detected_licenses": [
"MIT"
],
"directory_id": "8e94945c46c9e3abb32b31da1bec662b10769f88",
"extension": "py",
"fi... | 2.546875 | stackv2 | import socket
import ssl
import re
def conferma(user,passwd):
#indirizzo e porta mail server pop3
mailserver = ("pop.gmail.com", 995)
# comandi del protocollo pop3 da inviare al server
comandi = [f'{user} \r\n',f'{passwd} \r\n']
# connesione al socket tramite tunneling ssl siccome gmail ... | 69 | 38.57 | 144 | 15 | 771 | python | [{"finding_id": "codeql_py/overly-large-range_3472afa00c3347a1_9b73c8cc", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[&'()*+,\\-.\\/\\].", "remediation": "", "location": ... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[&'()*+,\\-.\\/\\].",
"Suspicious character range that is equivalent to \\[&'()*+,\\-.\\/\\]."
] | [
39,
39
] | [
null,
null
] | [
47,
79
] | [
50,
82
] | |
2024-11-19T02:18:41.561865+00:00 | 1,477,051,344,000 | ceedd4ec9b7fadc1d1fcfaf6b371f6ae2375441d | 3 | {
"blob_id": "ceedd4ec9b7fadc1d1fcfaf6b371f6ae2375441d",
"branch_name": "refs/heads/master",
"committer_date": 1477051344000,
"content_id": "daac75f69a4a900645f6b85566048de64ceae23e",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "979cf95a541c32014bcc592d21bb7735041bada6",
"extension": "p... | 2.703125 | stackv2 | """arsenal.user - user blueprint"""
from flask import (
Blueprint,
flash,
redirect,
request,
render_template,
url_for,
)
from flask_login import (
LoginManager,
current_user,
login_required,
login_user,
logout_user,
)
from .forms import (
ChangeEmailForm,
ChangeNameF... | 130 | 26.68 | 79 | 16 | 750 | python | [{"finding_id": "codeql_py/url-redirection_5db60283a60932e5_55d20e82", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 4 | true | [
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
70,
85,
100,
113
] | [
null,
null,
null,
null
] | [
29,
29,
29,
29
] | [
78,
78,
78,
78
] | |
2024-11-19T02:29:51.506595+00:00 | 1,520,583,750,000 | 9fab5987ff438da60bb411af7cef7937dd920177 | 3 | {
"blob_id": "9fab5987ff438da60bb411af7cef7937dd920177",
"branch_name": "refs/heads/master",
"committer_date": 1520587886000,
"content_id": "ff0de6c38c39b550410cf95397e2554bd2a7c447",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "16a223d5cb6a96e1b6a9aa84636670fa7ddf7fda",
"extension": "py"... | 2.78125 | stackv2 | # -*- coding: utf-8 -*-
"""
Pull forecast and historical weather
and do power usage prediction by weather
"""
import requests
import json
import random
import copy
from datetime import datetime
from datetime import timedelta
from config import FORECAST_URL, HISTORICAL_URL, FORECAST_RANGE, PROXY
from admin import db
fr... | 182 | 31.37 | 122 | 15 | 1,539 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e8734e6cdef5bd50_a9cedfd4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
21
] | [
null
] | [
11
] | [
72
] | |
2024-11-19T02:30:19.587925+00:00 | 1,572,345,370,000 | 31f5cb3fc2fbaed4ac3118bd8d5c29906b4a0aa8 | 2 | {
"blob_id": "31f5cb3fc2fbaed4ac3118bd8d5c29906b4a0aa8",
"branch_name": "refs/heads/master",
"committer_date": 1572345370000,
"content_id": "c8b404f35614a95ff95d0b9c350b84c6bc6d6a67",
"detected_licenses": [
"MIT"
],
"directory_id": "cbcbd3d3b19268b53c2b2456ed48c357bc101297",
"extension": "py",
"fi... | 2.484375 | stackv2 | import sqlite3
import base64
import binascii
import itsdangerous
from flask import request, current_app
from flask_login import UserMixin
from hashlib import sha256
from eve.auth import TokenAuth
from config import reporting_app_config as cfg
from egcg_core.rest_communication import Communicator
user_db = sqlite3.conn... | 147 | 30.86 | 100 | 16 | 1,049 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_4738b88c0768f8ca_656f177a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
68
] | [
null
] | [
19
] | [
32
] | |
2024-11-19T02:30:22.692329+00:00 | 1,599,605,631,000 | 2775eca99c13ea8a94d32b67b8c6b55d1d98df2e | 4 | {
"blob_id": "2775eca99c13ea8a94d32b67b8c6b55d1d98df2e",
"branch_name": "refs/heads/master",
"committer_date": 1599605631000,
"content_id": "fcfd7aa66aeacf4ddfdbf4687b9f31e7872a3a1c",
"detected_licenses": [
"MIT"
],
"directory_id": "a0e91e6722d417bc7f880095a99e27df1632905b",
"extension": "py",
"fi... | 3.8125 | stackv2 | #!/usr/bin/env python3
''' Simple example of Reflective Cross-Site Scripting (XSS).
The web page asks the user's name and responds with a greeting.
The input is not-sanitized and the output is not escaped.
The following can be entered into the name field to demonstrate
the xss vulnerability:
<scr... | 39 | 28.64 | 67 | 12 | 266 | python | [{"finding_id": "codeql_py/reflective-xss_23ded46a96e972d1_8f0915f4", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
39
] | [
null
] | [
12
] | [
20
] | |
2024-11-19T02:30:23.110336+00:00 | 1,296,497,497,000 | a5ccc3889d5bd30d7b675858cf89e2a7779ec752 | 3 | {
"blob_id": "a5ccc3889d5bd30d7b675858cf89e2a7779ec752",
"branch_name": "refs/heads/master",
"committer_date": 1296497497000,
"content_id": "bbd7b8339c272da583bf71c989ccfb14d75db553",
"detected_licenses": [
"MIT"
],
"directory_id": "04294aa45cc6fed7038f9647d723a5b2ab69af7f",
"extension": "py",
"fi... | 2.734375 | stackv2 | #!/usr/bin/env python
## @file
#
# cURL wrapper for FTP operations.
#
# @see http://pycurl.sourceforge.net/
# package imports
import os
import pycurl
################################################################################
# Global Constants
##################################################################... | 281 | 28.23 | 91 | 15 | 1,752 | python | [{"finding_id": "codeql_py/request-without-cert-validation_32a3bd22d5a196f3_9734fbe9", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
145
] | [
null
] | [
13
] | [
60
] | |
2024-11-19T02:30:31.675672+00:00 | 1,692,804,620,000 | 4be0c527ef64105588cf11b9679cbd2a0d8928d3 | 2 | {
"blob_id": "4be0c527ef64105588cf11b9679cbd2a0d8928d3",
"branch_name": "refs/heads/main",
"committer_date": 1692804620000,
"content_id": "e61eb3ff8592dc4a002f8c79219defcca95a1863",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "29bd0e9b5bdef7e2b4ff79edda3be258d5bde63c",
"extension": "py"... | 2.5 | stackv2 | """A sphinx extension to process jinja/rst template
Usage:
define the context variable needed by the document inside
``jinja_contexts`` variable in ``conf.py``
"""
# https://www.ericholscher.com/blog/2016/jul/25/integrating-jinja-rst-sphinx/
from pathlib import Path
import jinja2
from . import rst_helpers,... | 55 | 26.6 | 86 | 14 | 363 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e278dc923a083662_259ece71", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
32
] | [
35
] | [
23
] | [
10
] | |
2024-11-19T02:41:55.179487+00:00 | 1,621,816,236,000 | 559662191c3c0d93d8625c64d13b03fe4164f341 | 3 | {
"blob_id": "559662191c3c0d93d8625c64d13b03fe4164f341",
"branch_name": "refs/heads/master",
"committer_date": 1621816236000,
"content_id": "25dc7ada84fd0482b4c8286d69eba57db6d94666",
"detected_licenses": [
"MIT"
],
"directory_id": "692f33d30d088b7bb366e935437a0ba44a319433",
"extension": "py",
"fi... | 3.0625 | stackv2 | import json
import os
import random
import requests
from tqdm import tqdm
def make_url(fov, heading, key, location, pitch, size, source):
return "https://maps.googleapis.com/maps/api/streetview"\
+"?size="+size\
+"&fov="+str(fov)\
+"&heading="+str(heading)\
+"&key="+key\
... | 81 | 31.58 | 95 | 20 | 800 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e2dca736989e6a73_dc06b861", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive data (private)](4) as clear text.\nThis expression stores [sensitive data ... | [
35
] | [
null
] | [
22
] | [
35
] | |
2024-11-19T02:42:06.069472+00:00 | 1,633,116,959,000 | 89cc98255d69294594a4a527fb591f872383473e | 3 | {
"blob_id": "89cc98255d69294594a4a527fb591f872383473e",
"branch_name": "refs/heads/master",
"committer_date": 1633116959000,
"content_id": "8ac864326ca850737229d8b4efa3b95f732578c2",
"detected_licenses": [
"MIT"
],
"directory_id": "3898b2a8499ad73bc7564c07e5d8c216c38c31ef",
"extension": "py",
"fi... | 3.21875 | stackv2 | # -----------------------------------------
# DOWNLOAD AND ORGANIZE FLOWERS17 DATASET
# -----------------------------------------
import os
import glob
import tarfile
import urllib.request
def download_dataset(filename, url, work_dir):
"""
Purpose: This function will download the data from the specified location.
... | 121 | 30.49 | 104 | 14 | 980 | python | [{"finding_id": "codeql_py/tarslip_cb1373a4a88d8a60_b8f3a740", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
48
] | [
null
] | [
36
] | [
50
] | |
2024-11-19T02:50:46.713599+00:00 | 1,425,629,248,000 | ac6ba97233e5475d34f346e099e4865660b4ca66 | 3 | {
"blob_id": "ac6ba97233e5475d34f346e099e4865660b4ca66",
"branch_name": "refs/heads/master",
"committer_date": 1425629248000,
"content_id": "5468db0e832ad0c2a09e22aa220fc7ae581d0b27",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b76095275dd7679e610dcad0c6d21af213c34c0c",
"extension": "py"... | 3.109375 | stackv2 | """
Contains functions and utilities which are used by multiple modules.
"""
from datetime import datetime as dt
import jinja2
import os
import pytz
def get_parent_dir():
"""
:return: Absolute path of the parent of the directory of this file.
"""
cwd = os.path.dirname(__file__) # Here __file__ r... | 62 | 35.31 | 162 | 10 | 498 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_78743324f0132c04_e4918954", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
46
] | [
null
] | [
19
] | [
115
] | |
2024-11-19T02:50:54.293116+00:00 | 1,592,886,025,000 | b182922fd46c598a065d65fba130a4311d2fb704 | 3 | {
"blob_id": "b182922fd46c598a065d65fba130a4311d2fb704",
"branch_name": "refs/heads/master",
"committer_date": 1592886025000,
"content_id": "d2fa26771384996cb74067a7c1d1632cd37c616f",
"detected_licenses": [
"MIT"
],
"directory_id": "f7ccb9215b55bb6e954d7e470f59a1eaf2b411f5",
"extension": "py",
"fi... | 2.71875 | stackv2 | #!/usr/bin/env python3
from flask import Flask, request
from .session import BashSession
app = Flask(__name__)
def session_route(command=None):
if command:
return "/session/id/<session>/" + command
else:
return "/session/id/<session>"
sessions = {}
def get_session(session, type=None):
... | 73 | 19.93 | 53 | 13 | 357 | python | [{"finding_id": "codeql_py/reflective-xss_54a65b6071b81121_71902a66", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 4 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
36,
46,
56,
66
] | [
null,
null,
null,
null
] | [
16,
16,
16,
16
] | [
54,
54,
54,
54
] | |
2024-11-18T18:05:54.195133+00:00 | 1,605,931,535,000 | 613a321136f9bae0387971468f54fb80380c807c | 2 | {
"blob_id": "613a321136f9bae0387971468f54fb80380c807c",
"branch_name": "refs/heads/master",
"committer_date": 1605931535000,
"content_id": "05c2a80ca060e1caf507ccf6d5f7f76e1e7c9ec2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "07cdff3dfac2b8f5eccfb945d72837efe1ea2fe9",
"extension": "py"... | 2.5 | stackv2 | from argparse import ArgumentParser
from uuid import uuid4
from datetime import datetime
from flask import Flask
from flask import request
from Crypto.Hash import SHA256
from blockchain.blockchain_data_structure import BlockchainInstance
from crypto.keygen import generate_key_pair
import json
import jsonpickle
import o... | 142 | 30.9 | 117 | 15 | 1,032 | python | [{"finding_id": "codeql_py/stack-trace-exposure_49de7dae20770504_b8b83253", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
65
] | [
null
] | [
16
] | [
27
] | |
2024-11-18T18:05:54.457188+00:00 | 1,600,171,858,000 | 496f89de26d62d06873d30f0cf8783b66673abc9 | 3 | {
"blob_id": "496f89de26d62d06873d30f0cf8783b66673abc9",
"branch_name": "refs/heads/master",
"committer_date": 1600171858000,
"content_id": "791cbe5d4779b967051ddc6e28d12fd5b01075d3",
"detected_licenses": [
"MIT"
],
"directory_id": "1d168a01a627695044d0a89cc08430a7f77a2f4d",
"extension": "py",
"fi... | 3.359375 | stackv2 | # a simple python AES decrypter. Do not remember why I needed this, but nice to have. :)
pw = [255,155,28,115,214,107,206,49,172,65,62,174,19,27,70,79,88,47,108,226,209,225,243,218,126,141,55,107,38,57,78,91]
pw1 = b''
for i in pw:
pw1 += i.to_bytes(1, 'little')
import sys, hexdump, binascii
from Crypto.Cipher im... | 27 | 27.89 | 119 | 11 | 345 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_90a152dfde383d3a_6e37b8bf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
27
] | [
null
] | [
7
] | [
15
] | |
2024-11-18T18:06:00.595412+00:00 | 1,641,871,211,000 | ce98a7c092efff2a994876e85db49eeb32598318 | 2 | {
"blob_id": "ce98a7c092efff2a994876e85db49eeb32598318",
"branch_name": "refs/heads/master",
"committer_date": 1641871211000,
"content_id": "e76d0ca027c860feb11d880ff49f04d2efcab9b4",
"detected_licenses": [
"MIT"
],
"directory_id": "8a65bb494b7f1ee8684f8e8ed391668b4ebd0e13",
"extension": "py",
"fi... | 2.46875 | stackv2 | import time
from random import randint
class bcolors:
HEADER = '\033[95m'
OKBLUE = '\033[94m'
OKGREEN = '\033[92m'
WARNING = '\033[93m'
FAIL = '\033[91m'
ENDC = '\033[0m'
BOLD = '\033[1m'
UNDERLINE = '\033[4m'
passwords = ['Dylan_2791', '123456seven', 'No match found']
keywords = ['Dylan; June 3rd, Stonehendg... | 34 | 37.85 | 84 | 13 | 535 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6115c0c95ce428de_6470e07e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
34
] | [
null
] | [
8
] | [
37
] | |
2024-11-18T18:16:05.739264+00:00 | 1,568,561,726,000 | ca8d8ce15b0c0f81a4a81c3a9089d5b6d2aebd08 | 2 | {
"blob_id": "ca8d8ce15b0c0f81a4a81c3a9089d5b6d2aebd08",
"branch_name": "refs/heads/master",
"committer_date": 1568561726000,
"content_id": "89465fc27fef7f4d305fff82fc9343a63ddc3d71",
"detected_licenses": [
"MIT"
],
"directory_id": "0ff7b19bfb3f6d172fec98040e58da86dc9baa66",
"extension": "py",
"fi... | 2.3125 | stackv2 | from flask import Blueprint, render_template, flash, redirect, url_for, request, jsonify, send_from_directory
from flask_login import login_user, current_user, logout_user, login_required
from flaskapp import db, bcrypt, login_manager
from flaskapp.main.forms import RegistrationForm, LoginForm, PostForm
from flaskapp.m... | 127 | 38.02 | 160 | 25 | 1,147 | python | [{"finding_id": "codeql_py/url-redirection_4aeb035019d2f7d1_8c291948", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
44
] | [
null
] | [
29
] | [
38
] | |
2024-11-18T19:31:06.544526+00:00 | 1,628,492,827,000 | 80bad4bf50e5fca5e3b686f66a10e1ae10c0281e | 3 | {
"blob_id": "80bad4bf50e5fca5e3b686f66a10e1ae10c0281e",
"branch_name": "refs/heads/master",
"committer_date": 1628492827000,
"content_id": "0fdb97829117dce246da0eb2c2a7549feb814813",
"detected_licenses": [
"MIT"
],
"directory_id": "762c66d73e62cbd1f24f2efdd5fa89372e08f5ce",
"extension": "py",
"fi... | 2.796875 | stackv2 | import os
import csv
import talib
import pandas
import array as arr
import yfinance as yf
import json
from flask import Flask, request, render_template
from patterns import candlestick_patterns
from datetime import date
app = Flask(__name__)
@app.route('/getjson')
def getjson():
ticker = request.args.get('symbol... | 179 | 27.2 | 82 | 19 | 1,129 | python | [{"finding_id": "codeql_py/path-injection_32e477613fd81be1_6ebbf379", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
168
] | [
null
] | [
15
] | [
26
] | |
2024-11-18T18:59:39.092342+00:00 | 1,636,057,218,000 | eb52b25d07c826e98ef90f2d0e8ecd5ac617be82 | 2 | {
"blob_id": "eb52b25d07c826e98ef90f2d0e8ecd5ac617be82",
"branch_name": "refs/heads/master",
"committer_date": 1636057218000,
"content_id": "b0610e46b763f359a0f2a71e458b8aa58b60fa16",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "86386b8fafe1a3922390cb865fd6c3fe1db2efed",
"extension": "py"... | 2.484375 | stackv2 | # IMPORTS
import logging
from functools import wraps
from werkzeug.security import check_password_hash
from flask import Blueprint, render_template, flash, redirect, url_for, request, session
from flask_login import current_user, login_user, logout_user
from datetime import datetime
from app import db
from lottery.view... | 152 | 39.89 | 119 | 18 | 1,245 | python | [{"finding_id": "codeql_py/log-injection_9b39590b1c19311f_0f9e38f3", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 7 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depen... | [
49,
82,
86,
90,
94,
112,
130
] | [
null,
null,
null,
null,
null,
null,
null
] | [
83,
100,
100,
100,
98,
99,
92
] | [
102,
119,
119,
119,
117,
118,
111
] | |
2024-11-18T19:11:46.957096+00:00 | 1,611,790,997,000 | bbf0de7368466dedac2f8a72cc8c5e12f852342c | 3 | {
"blob_id": "bbf0de7368466dedac2f8a72cc8c5e12f852342c",
"branch_name": "refs/heads/main",
"committer_date": 1611790997000,
"content_id": "1ae56576584b3bf5562b6f6d2884b43f6955ebe9",
"detected_licenses": [
"MIT-0"
],
"directory_id": "7316e3d6b196722d73799b2aabfc7515fc159e9a",
"extension": "py",
"fi... | 2.859375 | stackv2 |
from datetime import datetime, timezone
import pytz
from data_access.data_config import PROFILE_TABLE
from data_access.ddb_util import query_item_ddb, get_item_ddb
import logging
from data_access.data_config import LOG_LEVEL
from boto3.dynamodb.conditions import Key
logger = logging.getLogger('UserProfile')
logger.... | 98 | 34.7 | 107 | 17 | 749 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1114567caadd35df_6af7064e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
90
] | [
null
] | [
21
] | [
65
] | |
2024-11-18T19:23:59.343113+00:00 | 1,671,563,629,000 | 4238a220912ae184be322a28df674c08c20e3f86 | 2 | {
"blob_id": "4238a220912ae184be322a28df674c08c20e3f86",
"branch_name": "refs/heads/master",
"committer_date": 1674514449000,
"content_id": "a3702726909dc5d2b25d95c096f2e7a69651f204",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "810f2f57c70e9df1e1c3862a2f43965ca9d88610",
"extension": "p... | 2.5 | stackv2 | #!/usr/bin/env python3
import urllib
import time
import logging
from http.server import HTTPServer, BaseHTTPRequestHandler, SimpleHTTPRequestHandler
from socketserver import ThreadingMixIn
import threading
import json
import subprocess
import sys
USE_HTTPS = False
pathWhiteList = {"/",
"/athanor.js",
"/athanor... | 96 | 32.74 | 116 | 15 | 784 | python | [{"finding_id": "codeql_py/insecure-default-protocol_f149696492fc8a24_e70ad3b0", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
89
] | [
null
] | [
25
] | [
117
] | |
2024-11-18T19:58:20.614207+00:00 | 1,582,579,915,000 | aef5ee43f56b56e57c64031d07dfbf24412c259b | 3 | {
"blob_id": "aef5ee43f56b56e57c64031d07dfbf24412c259b",
"branch_name": "refs/heads/master",
"committer_date": 1582579915000,
"content_id": "a7ed2b84844b371d38df133940e2e0630a397990",
"detected_licenses": [
"MIT"
],
"directory_id": "abd30d389b1ff2be523300fb41cb919229ef305d",
"extension": "py",
"fi... | 3.15625 | stackv2 | #! python3
#! Version 0.2 by gbn1
#! https://github.com/gbrn1/cEX
from modules import cex128
from modules import banners
import os
import time
import getpass
import hashlib
import platform
class MAIN:
def __init__(self):
self.config_file = "config.dat"
os.chdir("data")
def clear(self):
... | 108 | 32.11 | 120 | 21 | 837 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_62ff68df62807aa8_783c05e0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
26
] | [
null
] | [
33
] | [
71
] | |
2024-11-18T19:58:20.716362+00:00 | 1,627,282,167,000 | 2d686196a8281b22e370912c072344164cf3b5aa | 2 | {
"blob_id": "2d686196a8281b22e370912c072344164cf3b5aa",
"branch_name": "refs/heads/master",
"committer_date": 1627282167000,
"content_id": "adf689894aef20b3a325413438d46fafd1574921",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c385ad363b20c47e160080ea12b666e0730d7cf8",
"extension": "py"... | 2.3125 | stackv2 | from flask import Blueprint, redirect, url_for, flash, render_template, request
from flask_login import current_user, login_user, logout_user, login_required
from flaskblog import bcrypt, db
from flaskblog.models import User, Post
from flaskblog.users.forms import RegistrationForm, LoginForm, \
UpdateAccountForm
... | 98 | 38.08 | 79 | 16 | 721 | python | [{"finding_id": "codeql_py/url-redirection_5f60526706e0ba5a_baff5bc6", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
43
] | [
null
] | [
29
] | [
38
] | |
2024-11-18T19:58:35.325385+00:00 | 1,689,457,617,000 | fe9e508f426e684a50c6c25cca91d92d90c03997 | 3 | {
"blob_id": "fe9e508f426e684a50c6c25cca91d92d90c03997",
"branch_name": "refs/heads/main",
"committer_date": 1689457617000,
"content_id": "bbba7109daf930964fc95af23076e12e795ed637",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "f3bf3cb6ddbbfbb5e47a3e533bd5b28371c7c1ca",
"extension": "py",
"... | 2.984375 | stackv2 | # Get the PIDs of datasets in a given dataverse (and optionally any dataverses in that dataverse).
# Includes deaccessioned datasets. Excludes harvested and linked datasets.
import csv
import glob
import json
import os
import requests
import sys
import time
from tkinter import filedialog
from tkinter import ttk
from t... | 360 | 40.32 | 177 | 21 | 3,561 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5b438c4d3f351fa6_0a5c8bbe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive dat... | [
244,
171,
213
] | [
null,
null,
null
] | [
31,
15,
27
] | [
58,
158,
54
] | |
2024-11-18T19:58:36.410409+00:00 | 1,579,421,452,000 | cf050a3695ad195122908fa0b1a354332ab5d413 | 3 | {
"blob_id": "cf050a3695ad195122908fa0b1a354332ab5d413",
"branch_name": "refs/heads/master",
"committer_date": 1579421452000,
"content_id": "3a391c2a8a05818c84e8984e7513c64a17ba63ba",
"detected_licenses": [
"MIT"
],
"directory_id": "b73389ba7c9948177a522154a297a63875da2a8a",
"extension": "py",
"fi... | 2.84375 | stackv2 | import json
import plotly
import numpy as np
import pandas as pd
import re
import nltk
from nltk.stem import WordNetLemmatizer
from nltk.tokenize import word_tokenize
from nltk.corpus import stopwords
from flask import Flask
from flask import render_template, request, jsonify
from plotly.graph_objs import Bar
from skle... | 236 | 27.34 | 124 | 17 | 1,492 | python | [{"finding_id": "codeql_py/overly-large-range_2b9aa2ab9179871c_de4c257a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 2 | true | [
"CWE-020",
"CWE-215"
] | [
"py/overly-large-range",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
47,
232
] | [
null,
null
] | [
48,
5
] | [
51,
51
] | |
2024-11-18T18:39:57.300675+00:00 | 1,544,521,867,000 | a1e9313592d0377acc761b85356afc981520dfbd | 2 | {
"blob_id": "a1e9313592d0377acc761b85356afc981520dfbd",
"branch_name": "refs/heads/master",
"committer_date": 1544521867000,
"content_id": "6ed258b7369df83e02011f054b322b16080988ef",
"detected_licenses": [
"MIT"
],
"directory_id": "f0fa6cd0885d0615b5a676e132f36004182dacb7",
"extension": "py",
"fi... | 2.3125 | stackv2 | import argparse
import json
import pickledb
import requests
import threading
import time
from flask import Flask, request, make_response
app = Flask(__name__)
apiKey = None
easemlAddr = None
db = pickledb.load("id_mappings.db", True)
def run_get_query(url, params=None):
params = params or {}
result = []
... | 216 | 31.06 | 146 | 18 | 1,835 | python | [{"finding_id": "codeql_py/flask-debug_bbcfcdca6f738af2_1f3eb939", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-918"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [use... | [
216,
67,
147,
63
] | [
null,
null,
null,
null
] | [
5,
30,
26,
9
] | [
24,
52,
42,
112
] | |
2024-11-18T18:40:03.050328+00:00 | 1,593,941,059,000 | 9b1d2b1e0026df8ef8414c8a2e540fb11930a55e | 2 | {
"blob_id": "9b1d2b1e0026df8ef8414c8a2e540fb11930a55e",
"branch_name": "refs/heads/master",
"committer_date": 1593941059000,
"content_id": "7b7459d4966d0bae2eba295f8e611de046977075",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "999053056d970c4cbcd1b7e508963a421238609c",
"extension": "py"... | 2.453125 | stackv2 | #! /usr/bin/python3
# -*- coding: utf-8 -*-
import logging
import json
from flask import Flask, request, make_response, jsonify
from analysis_service import Analyst
from search_service import Search
from render_service import Graph_Formatter
from realtime_monitor_service import Realtime_Monitor
app = Flask(__name__)
... | 137 | 37.95 | 121 | 15 | 1,184 | python | [{"finding_id": "codeql_py/flask-debug_ef07ba6bd3bdcfa2_3a4215e1", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 7 | true | [
"CWE-215",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/flask-debug",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry de... | [
137,
33,
43,
45,
119,
122,
124
] | [
null,
null,
null,
null,
null,
null,
null
] | [
5,
17,
15,
15,
21,
13,
21
] | [
24,
67,
52,
92,
70,
75,
70
] | |
2024-11-18T18:46:57.153355+00:00 | 1,636,184,056,000 | a821612d4f506c3a510fe91c3258da87b28d5f2b | 3 | {
"blob_id": "a821612d4f506c3a510fe91c3258da87b28d5f2b",
"branch_name": "refs/heads/master",
"committer_date": 1636184056000,
"content_id": "16cd4408dd7fc38707ea7be8fd600662de6b5eda",
"detected_licenses": [
"MIT"
],
"directory_id": "903ac284ebf68ba1b24999c56774faca3a3ac8ba",
"extension": "py",
"fi... | 2.546875 | stackv2 | #!/usr/bin/env python
# -*- coding:utf-8 -*-
import configparser
import jieba
import jieba.posseg
import jieba.analyse
import json
import io
import os
import pymysql
import re
import sys
import time
import urllib.request
import urllib.parse
import wordcloud
sys.stdout = io.TextIOWrapper(sys.stdout.buffer, encoding='... | 77 | 29.84 | 131 | 14 | 642 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6629156c805bda9d_c6ff74d9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
38
] | [
null
] | [
7
] | [
114
] | |
2024-11-18T20:58:18.781346+00:00 | 1,603,736,696,000 | dcb685603643fd6271936ba08b7e076b87ef39a0 | 3 | {
"blob_id": "dcb685603643fd6271936ba08b7e076b87ef39a0",
"branch_name": "refs/heads/master",
"committer_date": 1603736696000,
"content_id": "8bc214cf8ceccd258ec1f93ea4cac3a84e0c50a0",
"detected_licenses": [
"MIT"
],
"directory_id": "3facd37976ecda3500a9430baf2d2b7eb0c7d5fc",
"extension": "py",
"fi... | 2.96875 | stackv2 | #!/usr/bin/env python3
from optparse import OptionParser
import os
from os import path
import tarfile
import shutil
import zipfile
temp_dir = '.tempdir'
def check_temp_dir():
if not path.exists(temp_dir):
os.mkdir(temp_dir)
def replace_item(source, destination):
print("Source {}, dest {}".format(sour... | 142 | 31.57 | 97 | 15 | 1,002 | python | [{"finding_id": "codeql_py/tarslip_21fbc2e6bcc31b7f_45993d46", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/tarslip",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
42,
74
] | [
null,
null
] | [
5,
5
] | [
12,
12
] | |
2024-11-18T20:58:19.082426+00:00 | 1,617,338,445,000 | 2ac13f05c7749d575bc0451231ec5added394bce | 3 | {
"blob_id": "2ac13f05c7749d575bc0451231ec5added394bce",
"branch_name": "refs/heads/master",
"committer_date": 1617338445000,
"content_id": "09d3acc0ad356ddfd2fc4eb3d2efa736559c7474",
"detected_licenses": [
"MIT"
],
"directory_id": "6aa5e41a374ac632e3ae447d690176147c2bdecf",
"extension": "py",
"fi... | 2.9375 | stackv2 | import time
import yaml
import pickle
import requests
import webbrowser
from urllib import parse
from jinja2 import Template
from geopy.geocoders import Nominatim
class User:
"""
Class to store user config to get and update Strava activities.
Attributes:
access_token (str): Your Strava access tok... | 268 | 37.48 | 78 | 18 | 1,986 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e8a250f538b7d6b8_f7d3c2c0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
194
] | [
null
] | [
16
] | [
30
] | |
2024-11-18T19:49:11.498137+00:00 | 1,634,279,112,000 | 8a7db691a9146bd62b5e8845009b1f61e6e058f3 | 2 | {
"blob_id": "8a7db691a9146bd62b5e8845009b1f61e6e058f3",
"branch_name": "refs/heads/master",
"committer_date": 1634279112000,
"content_id": "94fb48d829ec90b0d54ffbd725d8717f603e3538",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4aac2786259842f1b452f86557e3841788d1dddd",
"extension": "py"... | 2.359375 | stackv2 | import requests
import logging
import sys
import json
import tempfile
import os
from obs import ObsClient
logger = logging.getLogger('log')
def get_token(appid, secret):
url = 'https://api.weixin.qq.com/cgi-bin/token?appid={}&secret={}&grant_type=client_credential'.format(appid,
... | 73 | 33.53 | 126 | 13 | 580 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_f8bc647daf110ffa_1112f6d8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (sec... | [
47,
23,
37
] | [
null,
null,
null
] | [
17,
22,
22
] | [
24,
30,
32
] | |
2024-11-18T20:15:47.763610+00:00 | 1,522,070,424,000 | 1ce00ac55a20f1255d6055b85ebf5ff68f1fcb00 | 3 | {
"blob_id": "1ce00ac55a20f1255d6055b85ebf5ff68f1fcb00",
"branch_name": "refs/heads/master",
"committer_date": 1522070424000,
"content_id": "732b0adb526c96fc5060cbc7daefb160f5c61756",
"detected_licenses": [
"MIT"
],
"directory_id": "51941ce18b0df9a8e189553942a70056beb76f7b",
"extension": "py",
"fi... | 2.984375 | stackv2 | import bcrypt
import getpass
import hashlib
pwPath = os.path.expanduser('~' + '/.mpassword/')
def storePassword():
password = getpass.getpass('Enter in the Master Key: ')
check = getpass.getpass('Enter in Master Key again: ')
while check != password:
check = getpass.getpass('Incorrect entry. Plea... | 37 | 36.7 | 100 | 14 | 325 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_7988d0e85c7cbe43_2ee2df70", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
17
] | [
null
] | [
26
] | [
43
] | |
2024-11-18T20:15:58.506598+00:00 | 1,572,042,096,000 | b865bf613c0c65930978bb109b6bb18c660f9895 | 3 | {
"blob_id": "b865bf613c0c65930978bb109b6bb18c660f9895",
"branch_name": "refs/heads/master",
"committer_date": 1572042096000,
"content_id": "19aae27c747e3cca8a0f28f8138563442d92a17a",
"detected_licenses": [
"MIT"
],
"directory_id": "44e6cf45d35340c1cd220a2ad189d9ad48136afc",
"extension": "py",
"fi... | 3.015625 | stackv2 | from utils import get_random_string
def run_postgres_wizard(env_file):
if env_file.is_file():
update_postgres_env_file(env_file)
else:
generate_default_postgres_env_file(env_file)
def generate_default_postgres_env_file(env_file):
env_file["POSTGRES_USER"] = "misago_%s" % get_random_strin... | 38 | 30.63 | 94 | 13 | 289 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_268f9b995737f0ca_e3b259f4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
36
] | [
null
] | [
15
] | [
33
] | |
2024-11-18T20:16:00.632448+00:00 | 1,527,826,106,000 | f210188fbe65b6136a50508d26bdb3045a68c375 | 3 | {
"blob_id": "f210188fbe65b6136a50508d26bdb3045a68c375",
"branch_name": "refs/heads/master",
"committer_date": 1527826106000,
"content_id": "d3f2461c88d1205a3ff0b399fd8892491303370d",
"detected_licenses": [
"MIT"
],
"directory_id": "c32e8496712559fb0f2f5d299d400337d404c502",
"extension": "py",
"fi... | 3 | stackv2 | import os
import csv
from us_state_abbrev import us_state_abbrev
input_file1 = 'employee_data1.csv'
input_file2 = 'employee_data2.csv'
output_file1 = 'reformatted_employee_data1.csv'
output_file2 = 'reformatted_employee_data2.csv'
folder_name = os.path.join('C:', '\\Users', 'jmose', 'Downloads', 'UDEN201805DATA1-mast... | 52 | 32.54 | 170 | 14 | 508 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5f2a7de5c817f89f_051c3316", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive data (private)](4) as clear text.\nThis expression stores [sensitive data ... | [
47
] | [
null
] | [
17
] | [
31
] | |
2024-11-18T19:38:41.329114+00:00 | 1,483,476,202,000 | da812e2fb1822dccfc5c0e2ba45e71b5152396c1 | 3 | {
"blob_id": "da812e2fb1822dccfc5c0e2ba45e71b5152396c1",
"branch_name": "refs/heads/master",
"committer_date": 1483476202000,
"content_id": "ae6f6a2fe8b210d848259d3967e4d4d6a3fb0533",
"detected_licenses": [
"MIT"
],
"directory_id": "5aea92578876e2aacdb6163f7a19d2d249d4cb6d",
"extension": "py",
"fi... | 3.21875 | stackv2 | #!/usr/bin/env python
"""
This script will take a lat-long pair (e.g., "-80.123, 45.678") in the final column, and determine if any
other lines are at that exactly named pair. If so, it scatters them around in a circle.
So if other points are adjacent or identical but differently named (-80.123 vs. -80.1230), this won... | 134 | 37.53 | 116 | 20 | 1,246 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1a12396ee62045f2_7e5cd930", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
104
] | [
null
] | [
27
] | [
103
] | |
2024-11-18T20:10:42.900728+00:00 | 1,520,491,663,000 | 93aaf84093f90ccf693e01370b972eee0526d03d | 3 | {
"blob_id": "93aaf84093f90ccf693e01370b972eee0526d03d",
"branch_name": "refs/heads/master",
"committer_date": 1520491663000,
"content_id": "c10bc9b09e267ede60ddb825016fa077eddb2bae",
"detected_licenses": [
"Unlicense"
],
"directory_id": "d3b5909c7f5baef4bae93bdb69531a95ba143bcc",
"extension": "py",... | 2.515625 | stackv2 | # -*- coding: utf-8 -*-
import os, sys, subprocess, threading, time, random
import socketserver, http.server
from queue import Queue, Empty
import urllib
class FFMpeg:
def __init__(self, addr):
self.addr = addr
self.fragSize = 8192
self.opts = None
self.buffer = Queue()
self... | 111 | 31.05 | 144 | 17 | 802 | python | [{"finding_id": "codeql_py/command-line-injection_73b1b9b0090a524f_df4baafc", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 1 | true | [
"CWE-078"
] | [
"py/command-line-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1)."
] | [
22
] | [
null
] | [
40
] | [
49
] | |
2024-11-18T20:11:06.618414+00:00 | 1,587,175,738,000 | 4c7edbdf818c6bebabb5a7e1a935aeb6ac290c7f | 3 | {
"blob_id": "4c7edbdf818c6bebabb5a7e1a935aeb6ac290c7f",
"branch_name": "refs/heads/master",
"committer_date": 1587175738000,
"content_id": "02919a16f480b6381fd46e214855a74695dbe017",
"detected_licenses": [
"MIT"
],
"directory_id": "25f3fb0c3bb0e65f1ba1c7d1d77be6bcb1c103b1",
"extension": "py",
"fi... | 2.5625 | stackv2 | import os
from pathlib import Path
dir = str(Path(__file__).parent.absolute())
def setup():
user = input("Twitch Username: ")
passwd = input("Twitch Password: ")
f = open(dir+'/secrets.py','w')
f.write(
"user = '" + user + "'\n"
"passwd = '" + passwd + "'"
)
f.close
p... | 24 | 18.67 | 43 | 13 | 122 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ece219f51dcbd296_babb6c84", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
12
] | [
13
] | [
9
] | [
36
] | |
2024-11-18T20:11:07.432854+00:00 | 1,557,986,275,000 | 49a00294b8aa1bfa04ef0eb351e1a29b4f11f224 | 3 | {
"blob_id": "49a00294b8aa1bfa04ef0eb351e1a29b4f11f224",
"branch_name": "refs/heads/master",
"committer_date": 1557986275000,
"content_id": "6e763105543f69e54a84b40793cab6ed16cd9cbe",
"detected_licenses": [
"MIT"
],
"directory_id": "77ce009d8776454bdebb247e8f4e43cae572d228",
"extension": "py",
"fi... | 3.140625 | stackv2 | class User:
def __init__(self, username, password):
self.username = username
self.password = self._encrypt_password(password)
self.is_logged = False
def _encrypt_password(self, password):
import hashlib
password = str.encode(password + self.username)
enc... | 100 | 28.66 | 59 | 15 | 555 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_78ee7fc8471d852c_76f7a666", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
12
] | [
null
] | [
26
] | [
34
] | |
2024-11-18T20:26:07.486129+00:00 | 1,526,524,409,000 | 1629159572327032c03692586b22442ecf48033f | 2 | {
"blob_id": "1629159572327032c03692586b22442ecf48033f",
"branch_name": "refs/heads/master",
"committer_date": 1526524409000,
"content_id": "ba433b9b1f8845d0faf69b04137de04756e00a15",
"detected_licenses": [
"MIT"
],
"directory_id": "0d474186bc41b87469477b6079f97b48c6e2a1bf",
"extension": "py",
"fi... | 2.34375 | stackv2 | # code utf-8
import json
import os
import sys
import urllib.parse
import urllib.request
from PyQt5.QtCore import QObject
from PyQt5.QtCore import pyqtSlot
from PyQt5.QtCore import pyqtSignal
from PyQt5.QtCore import QUrl
from PyQt5.QtWebChannel import QWebChannel
from PyQt5.QtWebEngineWidgets import QWebEngineView
fro... | 83 | 32.36 | 109 | 11 | 715 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3c6a6d16dd21e494_bb46932d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
56
] | [
null
] | [
46
] | [
54
] | |
2024-11-18T20:26:25.984701+00:00 | 1,617,074,727,000 | 9b5958d5dc9576ee23d137ab75e3fb9ee28dd02a | 3 | {
"blob_id": "9b5958d5dc9576ee23d137ab75e3fb9ee28dd02a",
"branch_name": "refs/heads/main",
"committer_date": 1617074727000,
"content_id": "9ed2a6d6e6f7fecd28c8e25813b3d25478437298",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "c11a08accbb84f1d66e1c8627e5b6a04c70b7e2c",
"extension": "py"... | 2.734375 | stackv2 | from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives.asymmetric import rsa
from cryptography.hazmat.primitives import serialization
from collections import namedtuple
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.primitives.asymmetric import padding
... | 101 | 33.06 | 76 | 16 | 700 | python | [{"finding_id": "codeql_py/overly-permissive-file_d10bb24bd8fdbf1b_e2816416", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in open sets file to world readable."
] | [
92
] | [
null
] | [
15
] | [
51
] | |
2024-11-18T20:26:36.813088+00:00 | 1,582,063,265,000 | d84ae7db7e5048cdbc7f353d827c02ca77910b97 | 3 | {
"blob_id": "d84ae7db7e5048cdbc7f353d827c02ca77910b97",
"branch_name": "refs/heads/master",
"committer_date": 1582063265000,
"content_id": "9b4883b57554715152134599b9a2f7dda29d4f19",
"detected_licenses": [
"MIT"
],
"directory_id": "cac61da0e1a97204241f0df4acc2cab5a8b1825e",
"extension": "py",
"fi... | 3.140625 | stackv2 | import time
import folium
from geopy.geocoders import Nominatim
from geopy import distance
def get_film_locations(input_year):
"""
Function reads data from location.list file
:param input_year: string
:return: set
"""
film_set = set()
with open('data/locations.csv', 'r', encoding="utf-8", ... | 124 | 35.97 | 94 | 22 | 1,146 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8dddea6e3af50572_aa811659", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
80,
81
] | [
null,
null
] | [
11,
11
] | [
55,
57
] | |
2024-11-18T20:26:37.708441+00:00 | 1,589,837,555,000 | c7d672fa915709c821ecc756f54312c5a56b10c4 | 4 | {
"blob_id": "c7d672fa915709c821ecc756f54312c5a56b10c4",
"branch_name": "refs/heads/master",
"committer_date": 1589837555000,
"content_id": "8743d8f3052db5a84022d764ae809c7a1d057934",
"detected_licenses": [
"MIT"
],
"directory_id": "d519ddcb68c5caf7d0154464dba63973aa8e27a1",
"extension": "py",
"fi... | 4.03125 | stackv2 | num_dict = {0:'', 1:'one', 2:'two', 3:'three', 4:'four', 5:'five', 6:'six', 7:'seven', 8:'eight', 9:'nine',
10:'ten', 11:'eleven', 12:'twelve', 13:'thirteen', 14:'fourteen', 15:'fifteen', 16:'sixteen', 17:'seventeen', 18:'eighteen', 19:'nineteen',
20:'twenty', 30:'thirty', 40:'forty', 50:'fifty', 60:'sixty', 70... | 40 | 32.58 | 143 | 16 | 478 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_86da7dc0e5eac015_486cc616", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
34
] | [
null
] | [
11
] | [
25
] | |
2024-11-18T20:26:40.051671+00:00 | 1,496,611,304,000 | 1292b2e54e975e99e6cb81eda31eefb26b0f901d | 4 | {
"blob_id": "1292b2e54e975e99e6cb81eda31eefb26b0f901d",
"branch_name": "refs/heads/master",
"committer_date": 1496611304000,
"content_id": "c6f0073cacbc2bef66815763b7c01c6774cbf73b",
"detected_licenses": [
"MIT"
],
"directory_id": "9c2a9536363e139f44b38a911686eef307a9fb7c",
"extension": "py",
"fi... | 3.578125 | stackv2 | # Crypto I. Week 3. Constructing Compression Functions. HW assignment from video at 5:00.
# Tested in Python 3
# The collision finding solution:
# E(k1, m1) ^ k1 = E(k2, m2) ^ k2
# E(k1, m1) ^ k1 ^ k2 = E(k2, m2)
# D(k2, (E(k1, m1) ^ k1 ^ k2)) = D(k2, (E(k2, m2)))
# D(k2, (E(k1, m1) ^ k1 ^ k2)) = m2
from Crypto.Ciphe... | 52 | 24.12 | 89 | 9 | 462 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_8280e55a52ad9eea_acbec746", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
16,
22
] | [
null,
null
] | [
10,
10
] | [
31,
31
] | |
2024-11-18T20:26:54.032902+00:00 | 1,552,947,239,000 | ca380f9f808a2e32670087577b09d429498c8fed | 3 | {
"blob_id": "ca380f9f808a2e32670087577b09d429498c8fed",
"branch_name": "refs/heads/master",
"committer_date": 1552947239000,
"content_id": "bc92c768f854c1bcd3db18db45604fa1048d3a05",
"detected_licenses": [
"MIT"
],
"directory_id": "e3e9e0255673d46526424d07f96f51b4e1509358",
"extension": "py",
"fi... | 2.953125 | stackv2 | """Internal representation of a CAN trace.
"""
from jinja2 import Environment, PackageLoader, select_autoescape
import datetime
class InternalMessageDirection(object):
RX = 1
TX = 2
class InternalMessageType(object):
"""
Attributes:
DT: CAN or J1939 data frame
FD: CAN FD data frame
... | 224 | 24.42 | 77 | 17 | 1,314 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_00e5afe5a89e804d_c708d90e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
192,
213
] | [
null,
null
] | [
15,
15
] | [
78,
78
] | |
2024-11-18T20:52:06.500452+00:00 | 1,582,709,563,000 | 3c60953e6820508e16acce6fd052f56658bfcf95 | 3 | {
"blob_id": "3c60953e6820508e16acce6fd052f56658bfcf95",
"branch_name": "refs/heads/master",
"committer_date": 1582710167000,
"content_id": "8b48baf8cadedc47df836475c3f047437dacde64",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "76afa99ad879a2b492558ad6696fe6f3a05707a6",
"extension": "py"... | 3.296875 | stackv2 | import hashlib
class User(object):
def __init__(self, name, password, card_id, money=0, lock=False):
self.name = name
self.card_id = card_id
self.money = money
self.lock = lock
self.__password = self.__encrypt_password(password)
def __str__(self):
return '用户名{}... | 33 | 27.64 | 76 | 13 | 211 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d9d684aa994cf7d8_28194cd7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
32
] | [
null
] | [
18
] | [
42
] | |
2024-11-18T20:52:12.028462+00:00 | 1,693,550,945,000 | 20b88c10e01e18d374e581420c54a40898add3bc | 3 | {
"blob_id": "20b88c10e01e18d374e581420c54a40898add3bc",
"branch_name": "refs/heads/main",
"committer_date": 1693550945000,
"content_id": "becd3633bc01b2eef22d36835d511d31d05abb2a",
"detected_licenses": [
"Apache-2.0",
"BSD-3-Clause",
"MIT"
],
"directory_id": "b8bbdfc593b6d816e67a344f720f90ec0... | 2.515625 | stackv2 | #
# Licensed to the Apache Software Foundation (ASF) under one
# or more contributor license agreements. See the NOTICE file
# distributed with this work for additional information
# regarding copyright ownership. The ASF licenses this file
# to you under the Apache License, Version 2.0 (the
# "License"); you may not... | 88 | 37.01 | 104 | 13 | 728 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c068aadb9944c9c6_014cc610", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
86
] | [
null
] | [
24
] | [
100
] | |
2024-11-18T20:52:15.118682+00:00 | 1,404,202,015,000 | 547dff7576530938a176f79dea1913137154adeb | 3 | {
"blob_id": "547dff7576530938a176f79dea1913137154adeb",
"branch_name": "refs/heads/master",
"committer_date": 1404202015000,
"content_id": "a61ec4d560898a3aaa62dfb971b5fadd7d044234",
"detected_licenses": [
"MIT"
],
"directory_id": "6e6407e0cbfa4eaaa3c98379bf06dbbdf2a05e69",
"extension": "py",
"fi... | 2.859375 | stackv2 | import hashlib
from .database_connector import DatabaseConnector
def _hash_password(email, password):
email = email.encode()
password = password.encode()
salt = hashlib.sha1(email).hexdigest().encode()
hashed_password = hashlib.sha1(password + salt).hexdigest().encode()
for i in range(100):
... | 28 | 30.32 | 76 | 14 | 180 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_4dbc7f93c54167f4_1b4cc2e2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
9
] | [
null
] | [
36
] | [
51
] | |
2024-11-18T20:52:25.155058+00:00 | 1,616,521,732,000 | 80f026455915135cd391ecc4356648bb7c2342d4 | 3 | {
"blob_id": "80f026455915135cd391ecc4356648bb7c2342d4",
"branch_name": "refs/heads/master",
"committer_date": 1616521732000,
"content_id": "b63be193f1fccc562546dac3b32b0a2d14fe8af0",
"detected_licenses": [
"MIT"
],
"directory_id": "af09971b9023976ea52795a164af47b8c0576d13",
"extension": "py",
"fi... | 2.625 | stackv2 | from Crypto.Hash import MD5
from Crypto.PublicKey import RSA
from Crypto.Util import randpool
import pickle
import socket
import sys
#generate the RSA key
blah = randpool.RandomPool()
RSAKey = RSA.generate(512, blah.get_bytes)
RSAPubKey = RSAKey.publickey()
#listen for a connection
host = ''
port = 12345
s = ... | 44 | 22.07 | 71 | 10 | 278 | python | [{"finding_id": "codeql_py/weak-crypto-key_6831174c70508c0e_12499dad", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable.", "remediation": "", ... | 2 | true | [
"CWE-326",
"CWE-200"
] | [
"py/weak-crypto-key",
"py/bind-socket-all-network-interfaces"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable.",
"'' binds a socket to all interfaces."
] | [
11,
21
] | [
null,
null
] | [
10,
null
] | [
43,
20
] | |
2024-11-18T20:52:30.216918+00:00 | 1,604,680,380,000 | e8cedf7ca1a503f598394006d985b734b85b3780 | 3 | {
"blob_id": "e8cedf7ca1a503f598394006d985b734b85b3780",
"branch_name": "refs/heads/main",
"committer_date": 1604680380000,
"content_id": "704abf8fe7ad97941ff8b2e2c55130ec27e28caf",
"detected_licenses": [
"MIT"
],
"directory_id": "d571630c7b8aef819ca5587ddeed67dc7eae3365",
"extension": "py",
"file... | 2.671875 | stackv2 | import json
import requests
BASE_URL = 'https://payme.uz/api/'
class PayMeApi:
def __init__(self):
pass
def _make_request(self, params):
response = requests.post(BASE_URL, data=json.dumps(params), verify=False)
response_json = response.json()
print(response_json)
re... | 52 | 21.67 | 81 | 15 | 269 | python | [{"finding_id": "codeql_py/request-without-cert-validation_72b27bdfff0116c7_a43ba3e2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
13
] | [
null
] | [
20
] | [
82
] | |
2024-11-18T20:52:42.880068+00:00 | 1,629,730,085,000 | 5b94b340766b93e06ed1521d3fe45c835082c880 | 2 | {
"blob_id": "5b94b340766b93e06ed1521d3fe45c835082c880",
"branch_name": "refs/heads/master",
"committer_date": 1629730085000,
"content_id": "ba4fb7ccb5155423a0aaf1b8ef839635d9293686",
"detected_licenses": [
"MIT"
],
"directory_id": "84adb992857d27d89e327a5edb462f9e3df29bf3",
"extension": "py",
"fi... | 2.328125 | stackv2 | # encoding: utf-8
# pylint: disable=too-few-public-methods,invalid-name
"""
RESTful API User resources
--------------------------
"""
import logging
from flask_login import current_user
from flask_restplus import Resource
import sqlalchemy
from app.extensions.api import Namespace, abort, http_exceptions
from app.ext... | 224 | 32.61 | 99 | 21 | 1,468 | python | [{"finding_id": "codeql_py/log-injection_a4ef8a67934e5380_3e4b69f1", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
136
] | [
null
] | [
84
] | [
93
] | |
2024-11-18T19:02:29.155156+00:00 | 1,573,780,778,000 | 2ea02e0a8130b6082c767dffd347b2e6bb77f6d9 | 2 | {
"blob_id": "2ea02e0a8130b6082c767dffd347b2e6bb77f6d9",
"branch_name": "refs/heads/master",
"committer_date": 1573780778000,
"content_id": "183c92896a0f57f8516a2cd39a792e4359a340f9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "984f028cfb5f00d54c3ac44ebcdaea41120ddf4e",
"extension": "py"... | 2.390625 | stackv2 | from django.shortcuts import render
from django.http import HttpResponseRedirect
from QUser.views import *
from Buyer.models import *
from Shop.models import *
import smtplib
from email.mime.text import MIMEText
def sendMial(content, email):
from Qshop.settings import MAIL_SENDER, MAIL_PASSWORD, MAIL_SERVER, MAIL... | 404 | 28.28 | 107 | 18 | 2,686 | python | [{"finding_id": "codeql_py/insecure-cookie_28f266fc25126b83_125c9988", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"... | 3 | true | [
"CWE-614",
"CWE-312",
"CWE-1004"
] | [
"py/insecure-cookie",
"py/clear-text-logging-sensitive-data",
"py/client-exposed-cookie"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cookie is added to response without the 'secure' flag being set.",
"This expression logs [sensitive data (password)](1) as clear text.",
"Sensitive server cookie is set without HttpOnly flag."
] | [
84,
135,
84
] | [
null,
null,
null
] | [
17,
19,
17
] | [
56,
27,
56
] | |
2024-11-18T19:02:52.325757+00:00 | 1,632,492,188,000 | dab42f5707758c7ff18b64ffd4435c3b287b1932 | 3 | {
"blob_id": "dab42f5707758c7ff18b64ffd4435c3b287b1932",
"branch_name": "refs/heads/main",
"committer_date": 1632492188000,
"content_id": "c71dfe3dda4bf41709796c3baf4fd137a792a527",
"detected_licenses": [
"MIT"
],
"directory_id": "b2deb6754529915316021ac0fd326963839af0c3",
"extension": "py",
"file... | 2.53125 | stackv2 | from django.urls import path
from django.http import JsonResponse, HttpResponseNotAllowed
from banjo import http
import json
urlpatterns = []
def get_request_params(request):
content_type = request.headers.get('Content-Type')
if content_type == 'application/json':
return json.loads(request.body.decode... | 43 | 30 | 76 | 18 | 264 | python | [{"finding_id": "codeql_py/stack-trace-exposure_a319617ef4df3664_65af3fe7", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
26
] | [
null
] | [
37
] | [
54
] | |
2024-11-18T19:02:59.916074+00:00 | 1,321,630,069,000 | 6d91fc17cf04dca6f50123c68c0332e8ae6040ad | 2 | {
"blob_id": "6d91fc17cf04dca6f50123c68c0332e8ae6040ad",
"branch_name": "refs/heads/master",
"committer_date": 1321630069000,
"content_id": "3dac83b771bad0ac4ee4b655c85fc4b3b36913e0",
"detected_licenses": [
"MIT",
"ISC"
],
"directory_id": "8b9c327f27a1dd80f9ae2198a3815ecc990ee2e1",
"extension": ... | 2.40625 | stackv2 | #!/usr/bin/env python
# encoding: utf-8
"""
api.py
Created by 徐 光硕 on 2011-11-14.
Copyright (c) 2011 __MyCompanyName__. All rights reserved.
"""
import time
import datetime
from dateutil.parser import *
try :
import json
except ImportError :
import simplejson as json
import urllib
from hashlib import m... | 175 | 34.73 | 97 | 23 | 1,516 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_97f0a42600d7127b_565fe136", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
89
] | [
null
] | [
20
] | [
23
] | |
2024-11-18T19:03:05.316138+00:00 | 1,486,737,069,000 | 52484eec8052f0d3289658f94666f243f833e6a7 | 3 | {
"blob_id": "52484eec8052f0d3289658f94666f243f833e6a7",
"branch_name": "refs/heads/master",
"committer_date": 1486737069000,
"content_id": "a48e22d7bb961fa30b10efa23c968f95f0fab96d",
"detected_licenses": [
"MIT"
],
"directory_id": "a945a9b22c7b96ee69979685d615f4173d7a2ea7",
"extension": "py",
"fi... | 2.671875 | stackv2 | import base64
import hashlib
import hmac
def md5(data):
return hashlib.md5(data).hexdigest()
def get_hmac(password, salt):
h = hmac.new(salt, password, hashlib.sha512)
return base64.b64encode(h.digest())
def set_attrs_from_dict(obj, dict_, attrs, pop=False):
for attr in attrs:
if attr in d... | 20 | 20.1 | 54 | 12 | 108 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7423ae7610655730_4f2a8cff", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
11
] | [
null
] | [
24
] | [
32
] | |
2024-11-18T19:14:31.647673+00:00 | 1,634,045,841,000 | 99310d2ea325607c95c87ae65d64d4ca2f9f7698 | 2 | {
"blob_id": "99310d2ea325607c95c87ae65d64d4ca2f9f7698",
"branch_name": "refs/heads/master",
"committer_date": 1634045841000,
"content_id": "4f97ba5a2615120b96215dd9a99386e66af93990",
"detected_licenses": [
"MIT"
],
"directory_id": "2fd4de2f0820f186c735f0619bce2a0318bbfc38",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
# @Project : tql-App.
# @File : flask_upload
# @Time : 2019-11-29 13:22
# @Author : yuanjie
# @Email : yuanjie@xiaomi.com
# @Software : PyCharm
# @Description :
from flask import Flask, request, redirect, url_for
import os
app = Fla... | 44 | 24.8 | 66 | 13 | 328 | python | [{"finding_id": "codeql_py/flask-debug_1f42de67516c90f2_e48d735f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
44,
22
] | [
null,
null
] | [
5,
16
] | [
51,
27
] | |
2024-11-18T19:14:32.193176+00:00 | 1,457,739,828,000 | e40b731e3854bd4ad7030909d3e08179b4fd1318 | 3 | {
"blob_id": "e40b731e3854bd4ad7030909d3e08179b4fd1318",
"branch_name": "refs/heads/master",
"committer_date": 1457739828000,
"content_id": "a6afed1e9716b71b059b5c1f402b5b1fc9af84de",
"detected_licenses": [
"MIT"
],
"directory_id": "00563b04ff4f75bc1c72309454dae58788b3e42e",
"extension": "py",
"fi... | 3.390625 | stackv2 | def my_encryption(some_string):
character_set = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 "
secret_key = "Dd18Abz2EqNPW hYTOjBvtVlpXaH6msFUICg4o0KZwJeryQx3f9kSinRu5L7cGM"
encription = ""
for x in some_string:
count = 0
for i in character_set:
if i == x:
encription += secret_key... | 18 | 22.94 | 82 | 13 | 147 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4ace0fc3faee9e4e_85039bb5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
18
] | [
null
] | [
7
] | [
8
] | |
2024-11-18T19:14:35.368508+00:00 | 1,611,171,947,000 | faf125e26e966ba9dd28b71f94b99af212385925 | 3 | {
"blob_id": "faf125e26e966ba9dd28b71f94b99af212385925",
"branch_name": "refs/heads/master",
"committer_date": 1611171947000,
"content_id": "bfde4bbc49585ff32abe8c64d0a20219ae9fa2ac",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "3ffd559b29ec5abc4a74acd2543fbdeee5cbdc36",
"extension": "p... | 2.640625 | stackv2 |
from ecgdetectors import Detectors
import data_read
from pyhrv.hrv import hrv
from pyhrv.time_domain import hr_parameters
from pyhrv.frequency_domain import frequency_domain
from pyhrv.tools import nn_intervals, plot_ecg, heart_rate, tachogram
def heart_rate_variability(sample, lead, rpeak_method = 'string'):
cu... | 90 | 34.04 | 75 | 11 | 840 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ee5027f59c6accdb_5baee4bc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 14 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (p... | [
77,
78,
79,
80,
81,
82,
83,
84,
85,
86,
87,
88,
89,
90
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
7,
18,
19,
18,
18,
18,
19,
19,
16,
16,
23,
21,
20,
20
] | [
9,
33,
35,
33,
33,
33,
35,
35,
34,
34,
43,
39,
37,
38
] | |
2024-11-18T19:14:50.039773+00:00 | 1,535,774,657,000 | e9d17ee11c348140b355659cd4454ae70c572c3a | 3 | {
"blob_id": "e9d17ee11c348140b355659cd4454ae70c572c3a",
"branch_name": "refs/heads/master",
"committer_date": 1535774680000,
"content_id": "ec363735dc15ddda990b8d31589d8dddb9a39f9a",
"detected_licenses": [
"MIT"
],
"directory_id": "4a814f5243d7db4cb72b10f602a9f30a5c62d14b",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
'''
asyncio 的使用
https://demos.aiohttp.org/en/latest/tutorial.html
'''
import asyncio
from aiohttp import web
async def index(request):
await asyncio.sleep(0.5)
return web.Response(body='<h1>Index</h1>'.encode('utf-8'), content_type='text/html')
async def hello(req... | 28 | 23.18 | 88 | 11 | 189 | python | [{"finding_id": "codeql_py/reflective-xss_42b1c40bddd6fc24_4906bc4f", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
21
] | [
null
] | [
30
] | [
50
] | |
2024-11-18T19:27:35.670704+00:00 | 1,613,528,217,000 | 3c2da2aa3ccbe9981eb75dcf524fa67ad8f89144 | 2 | {
"blob_id": "3c2da2aa3ccbe9981eb75dcf524fa67ad8f89144",
"branch_name": "refs/heads/master",
"committer_date": 1613528217000,
"content_id": "9a879f860f69964cf5e9779b07c4a5e850ee233a",
"detected_licenses": [
"MIT"
],
"directory_id": "1520e7ffc29c706293b54635165a1883374a401f",
"extension": "py",
"fi... | 2.359375 | stackv2 | import datetime as dt
from functools import partial
import logging
from math import isfinite
import os
import re
from typing import Any, NamedTuple, Optional
import jinja2
import requests
from rich.progress import track
from urllib.parse import urljoin
from ..._version import get_versions
from ...schema import Compou... | 270 | 30.66 | 97 | 19 | 1,894 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2fd8a995ad027e19_68428275", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
169
] | [
null
] | [
19
] | [
61
] | |
2024-11-18T19:27:38.443521+00:00 | 1,509,824,398,000 | 34f9631d499015b0e67601a841be8dec04ddbd42 | 3 | {
"blob_id": "34f9631d499015b0e67601a841be8dec04ddbd42",
"branch_name": "refs/heads/master",
"committer_date": 1509824398000,
"content_id": "1c4ccf6b44bbdc0b7ce4fa9f928a00a9e8f91965",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ce6812c0987e98141bb2f94d77a2cb51f1cb666d",
"extension": "py"... | 2.828125 | stackv2 | #!/usr/bin/python
import webbrowser
import os
import datetime
def stringchecker (orig,v1):
ret = True
x = len(v1)
j=0
for j in range(0,x,1):
if(len(v1)<=len(orig)):
if orig[j].capitalize() == v1[j] or orig[j]==v1[j]:
ret = ret and True
elif orig[j] != v1[j]:
ret = ret and False
... | 380 | 24.93 | 141 | 22 | 2,360 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_237c044c224c8ab6_fbb9bf9c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 9 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensiti... | [
46,
330,
367,
293,
195,
83,
119,
271,
158
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
31,
31,
31,
31,
31,
31,
31,
32,
31
] | [
141,
141,
141,
111,
111,
141,
141,
40,
141
] | |
2024-11-18T19:27:39.432517+00:00 | 1,585,227,673,000 | ae7c7c86c1540d5360034266ddd02655e8493e2f | 3 | {
"blob_id": "ae7c7c86c1540d5360034266ddd02655e8493e2f",
"branch_name": "refs/heads/master",
"committer_date": 1585227673000,
"content_id": "04bbe29adac5ed6d58491960731ee3ad81f0bc8f",
"detected_licenses": [
"MIT"
],
"directory_id": "5fb9c5bdc773c959834482af75553e65b834d0e9",
"extension": "py",
"fi... | 2.65625 | stackv2 | #!/usr/bin/env python3
"""attach image to scicat"""
import os
import urllib
import json
import base64
import requests
from get_api import GetApi
class ScicatAttach:
"""attach image to scicat"""
api = ""
url_fragment = "Datasets"
thumbnail = ""
file = "data/nicos_00000332.hdf"
options = {}
... | 118 | 24.6 | 74 | 14 | 695 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2a4473e494003095_9d14f610", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
49
] | [
null
] | [
15
] | [
23
] | |
2024-11-18T19:27:49.029498+00:00 | 1,631,584,351,000 | 07c349137d9989a4b7337c14685930d47d3e8141 | 2 | {
"blob_id": "07c349137d9989a4b7337c14685930d47d3e8141",
"branch_name": "refs/heads/main",
"committer_date": 1631584351000,
"content_id": "3221970d6f59b4f3046f423f5efa5a4593ac507b",
"detected_licenses": [
"MIT"
],
"directory_id": "cb03cd0464f79b0c60620733baa4589798cca68f",
"extension": "py",
"file... | 2.46875 | stackv2 | # utilities.py
import datetime
import math
import random
from datetime import datetime
import aiohttp
import discord
import toml
configFile = toml.load('config.toml')
def get_api():
API_KEY = configFile['hypixel']['api_keys']
api = random.choice(API_KEY)
return api
async def get_data(name):
api =... | 411 | 29.9 | 129 | 19 | 3,583 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2215e3189a3e5612_2aaf9d55", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
163
] | [
null
] | [
29
] | [
32
] | |
2024-11-18T19:38:45.535416+00:00 | 1,457,030,171,000 | b012990c26821b87bf69bf867e9839e06d40913b | 2 | {
"blob_id": "b012990c26821b87bf69bf867e9839e06d40913b",
"branch_name": "refs/heads/master",
"committer_date": 1457030171000,
"content_id": "b443ad6e50255770bf8e7e4ede7499a53002b026",
"detected_licenses": [
"MIT"
],
"directory_id": "13446c5b6cd0b5b3d1b005b5f8f872f0d18599e9",
"extension": "py",
"fi... | 2.453125 | stackv2 | import sys
import requests
import json
from urlparse import urljoin
from lxml import html
URL = 'http://www.insolvencydirect.bis.gov.uk/IESdatabase/viewdirectorsummary-new.asp'
HEADERS = {
'User-Agent': 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Saf... | 37 | 27.24 | 141 | 11 | 317 | python | [{"finding_id": "codeql_py/request-without-cert-validation_9cdba09e87e168d6_9146b45b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
21
] | [
null
] | [
15
] | [
42
] | |
2024-11-18T19:38:50.563280+00:00 | 1,522,877,782,000 | 8a215ed19af52df20e85587d66162281c9533b1b | 3 | {
"blob_id": "8a215ed19af52df20e85587d66162281c9533b1b",
"branch_name": "refs/heads/master",
"committer_date": 1522877782000,
"content_id": "1a19302bedc3b36f0294983ad85d13c0c997c8a9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1318345bc0458edc981935f074cbfaf7bcf5c929",
"extension": "py"... | 2.59375 | stackv2 | from flask import Flask, render_template, request, jsonify
import atexit
import cf_deployment_tracker
import os
import json
import twitter
import time
from watson_developer_cloud import PersonalityInsightsV3, ToneAnalyzerV3
# Emit Bluemix deployment event
cf_deployment_tracker.track()
# Register the "Flask" Applicati... | 137 | 35.44 | 92 | 16 | 1,280 | python | [{"finding_id": "codeql_py/flask-debug_9168cfd2d98c484c_20155fa6", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
137,
65,
67,
123
] | [
null,
null,
null,
null
] | [
5,
23,
19,
15
] | [
51,
46,
42,
38
] | |
2024-11-18T20:06:25.919266+00:00 | 1,582,573,718,000 | 21983e4c50d4665581c23fa0ea6bcc2e63c2270b | 2 | {
"blob_id": "21983e4c50d4665581c23fa0ea6bcc2e63c2270b",
"branch_name": "refs/heads/master",
"committer_date": 1582573718000,
"content_id": "64ebc165519d8ac79b8a1ae0a494220bd7db35e3",
"detected_licenses": [
"MIT"
],
"directory_id": "70848f187c4626079a09152b7c2637e46abd0e17",
"extension": "py",
"fi... | 2.46875 | stackv2 | from django.http import HttpResponse
import json
from pokemon import utilities
# Create your views here.
def searchPokemonInfoByName(request):
try:
name = request.GET['name']
if len(name) < 4:
response = "The minimum character allowed is 4"
else:
utilities_pokemon... | 41 | 30.76 | 77 | 15 | 258 | python | [{"finding_id": "codeql_py/stack-trace-exposure_56bd0c44a6f91867_d28f8c3d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
25,
41
] | [
null,
null
] | [
25,
25
] | [
45,
45
] | |
2024-11-18T20:18:13.656789+00:00 | 1,562,057,400,000 | 8b7761a19412356e1ee4df86bf7fa149a0c8174a | 3 | {
"blob_id": "8b7761a19412356e1ee4df86bf7fa149a0c8174a",
"branch_name": "refs/heads/master",
"committer_date": 1562057400000,
"content_id": "d15becac8629e5c1bf4594e5e3f95297e7939e04",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b656715e9ac4d806964bcdccef2f6d32c6dd09db",
"extension": "py"... | 3.109375 | stackv2 | from base64 import b64encode, encodebytes
from Crypto.Cipher import AES
import binascii
import hashlib
BS = AES.block_size
unpad = lambda data: data[0:-ord(data[-1])]
def padding_pkcs5(text):
count = len(text.encode('utf-8'))
add = BS - (count % BS)
entext = text + (chr(add) * add)
return entext
... | 67 | 28.58 | 85 | 13 | 564 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_3948a86243c189b9_9d9452b6", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
27,
34,
43
] | [
null,
null,
null
] | [
18,
18,
18
] | [
55,
55,
48
] | |
2024-11-18T20:18:16.243120+00:00 | 1,613,790,628,000 | 650c8b6d83f646fa32523d913da07a5170a73c28 | 3 | {
"blob_id": "650c8b6d83f646fa32523d913da07a5170a73c28",
"branch_name": "refs/heads/main",
"committer_date": 1613790628000,
"content_id": "80793fe76fb570d47027694eb6e510b94d0ff882",
"detected_licenses": [
"MIT"
],
"directory_id": "1c6d4644aafbea2166f0d0c6e983e491a12d32a9",
"extension": "py",
"file... | 2.734375 | stackv2 | import requests
def placa(message):
message = message.text.replace('@merkun_bot', '').replace('/placa ', '').replace('-', '')
try:
request = requests.get(
f'https://apicarros.com/v2/consultas/{message}/SEU TOKEN AQUI', verify=False).json()
modelo = request.get('modelo')
m... | 32 | 26.59 | 96 | 14 | 229 | python | [{"finding_id": "codeql_py/request-without-cert-validation_8079f228491a9a49_62868515", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
9
] | [
10
] | [
19
] | [
90
] | |
2024-11-18T20:18:19.066020+00:00 | 1,685,950,274,000 | 4a96217fe11d7201ed1c2c8295ddb76413b7e149 | 2 | {
"blob_id": "4a96217fe11d7201ed1c2c8295ddb76413b7e149",
"branch_name": "refs/heads/master",
"committer_date": 1685950274000,
"content_id": "04460b35ae3e74174547dac88f67431b76e50889",
"detected_licenses": [
"MIT"
],
"directory_id": "8a9ebd9d8846d6cc04a90c50f35a07c60282a101",
"extension": "py",
"fi... | 2.484375 | stackv2 | """ Normalize and parse.
"""
import os
import shutil
import sys
import tarfile
import tempfile
import time
from normalize_arxiv_dump import normalize
from parse_latex_tralics import parse
def prepare(in_dir, out_dir, meta_db, tar_fn_patt, write_logs=False):
if not os.path.isdir(in_dir):
print('input dire... | 138 | 35.07 | 79 | 21 | 1,124 | python | [{"finding_id": "codeql_py/tarslip_fa9aef74b32a7a3d_548be796", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
83
] | [
null
] | [
21
] | [
24
] | |
2024-11-18T20:18:29.788066+00:00 | 1,567,898,177,000 | 4e602b43a6c72f42831aaf88796165017fd476bb | 2 | {
"blob_id": "4e602b43a6c72f42831aaf88796165017fd476bb",
"branch_name": "refs/heads/master",
"committer_date": 1567898177000,
"content_id": "20852e76d93a2fa31b06a72214ff7003c214bd9d",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "3b36989a450d3ce8bc8b32ea2fe4c845326d9b7e",
"extension": "p... | 2.484375 | stackv2 | #!/usr/bin/python3
import json
import requests
from requests import urllib3
import time
import pprint as pp
import csv
import pandas as pd
from docx import Document
from docx.shared import Inches, Pt
from docx.enum.section import WD_ORIENT, WD_SECTION
from docx.enum.text import WD_ALIGN_PARAGRAPH
from ..models import M... | 182 | 28.35 | 90 | 19 | 1,277 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b21ed92e9989b84b_20225ebe", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
24
] | [
null
] | [
24
] | [
77
] | |
2024-11-18T20:31:15.154166+00:00 | 1,601,625,327,000 | d2dc6b0d904cca1c6ca616efcf4390dc19cd355e | 2 | {
"blob_id": "d2dc6b0d904cca1c6ca616efcf4390dc19cd355e",
"branch_name": "refs/heads/master",
"committer_date": 1601625327000,
"content_id": "a3e44228f1943809a7b599c99f9fa7395fb81146",
"detected_licenses": [
"MIT"
],
"directory_id": "2a21faa26473757e22a1ad5e1c15f840b7a0ec22",
"extension": "py",
"fi... | 2.421875 | stackv2 | from flask import render_template,flash, request, redirect, url_for
from flask_login import login_user, logout_user,login_required
from app.auth import auth
from app.models import User
from .forms import RegForm,LoginForm
from ..email import mail_message
from .. import db
@auth.route('/login',methods = ['POST','GET'])... | 49 | 39.27 | 165 | 16 | 415 | python | [{"finding_id": "codeql_py/url-redirection_bac65bfd4fc6f373_15a7fdc1", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
16
] | [
null
] | [
29
] | [
78
] | |
2024-11-18T20:31:18.476113+00:00 | 1,620,048,547,000 | bafd061303552b75cd3b09c39eb712afdebfd144 | 3 | {
"blob_id": "bafd061303552b75cd3b09c39eb712afdebfd144",
"branch_name": "refs/heads/main",
"committer_date": 1620048547000,
"content_id": "1bf1f51e4b7baf04e574af4d361972f1efcab2d2",
"detected_licenses": [
"MIT"
],
"directory_id": "c6d19cc339e76ab98420bccdc18a2c9f14fe6411",
"extension": "py",
"file... | 2.546875 | stackv2 | import os
from flask import *
from werkzeug.utils import secure_filename
from flask import send_from_directory
import json
from flask_cors import CORS
app = Flask(__name__)
CORS(app, supports_credentials=True)
CORS(app, resources=r'/*')
UPLOAD_FOLDER = './uploads'
ALLOWED_EXTENSIONS = set(['txt', 'pdf', 'png', 'jpg', ... | 57 | 29.26 | 95 | 16 | 405 | python | [{"finding_id": "codeql_py/reflective-xss_8fe1ef2649a05847_e73ba752", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
54
] | [
null
] | [
21
] | [
69
] | |
2024-11-18T20:31:33.172579+00:00 | 1,574,707,785,000 | 174dd7d79dff1f6de28d79638cf54127581784b3 | 3 | {
"blob_id": "174dd7d79dff1f6de28d79638cf54127581784b3",
"branch_name": "refs/heads/master",
"committer_date": 1574707785000,
"content_id": "358e61e63e0a26f726620f2c649aa2fe8c360738",
"detected_licenses": [
"Unlicense"
],
"directory_id": "71c15a6e1c1838a0c785ee5bd024b7601db8828a",
"extension": "py",... | 2.53125 | stackv2 | import csv
from datetime import datetime
import PySimpleGUI as sg
# CONFIG
standard_shipping = 'FedEx'
standard_service = 'Ground'
stamp = datetime.now().strftime('%Y%m%d')
export_file_name = f"order_import_{stamp}.txt"
def main():
layout = [
[sg.Text('Shopify to 3PL Central Order Converter', size=(0,1), ... | 156 | 29.86 | 119 | 18 | 1,088 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e2ab6ef08a74440b_741e93b1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
35
] | [
null
] | [
17
] | [
21
] | |
2024-11-18T20:43:24.216338+00:00 | 1,565,437,922,000 | d269cf7d3b4e39e69443a16f12fbc23863317c5f | 3 | {
"blob_id": "d269cf7d3b4e39e69443a16f12fbc23863317c5f",
"branch_name": "refs/heads/master",
"committer_date": 1565437922000,
"content_id": "d236011d5f9dd5d3a141bb6745680f3a9751ebf1",
"detected_licenses": [
"MIT"
],
"directory_id": "bd59d93ce767553a1028b69477b6c794e60a2787",
"extension": "py",
"fi... | 3.390625 | stackv2 | #!/usr/bin/python3
# **5. Mac Address Lookup** - This tool will return information on mac addressses.
# - This tool will use the urllib2, json, and codecs modules.
# - This tool will make an api call with mac address to http://macvendors.co/api
# - It will take stndin from user.
# - It will return a report in ... | 59 | 26.76 | 106 | 15 | 424 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_643fc2297f17a532_9412f355", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
49
] | [
null
] | [
11
] | [
40
] | |
2024-11-18T20:43:26.727714+00:00 | 1,576,783,058,000 | 7790414846a4079f8676e1ddbc24bd7efbed6c5f | 2 | {
"blob_id": "7790414846a4079f8676e1ddbc24bd7efbed6c5f",
"branch_name": "refs/heads/master",
"committer_date": 1576783058000,
"content_id": "9202de90ef43aa613c0327ad4760df26ea79a9f1",
"detected_licenses": [
"MIT"
],
"directory_id": "538e99d6fcabad52248c2c5291ddb8dae2049e61",
"extension": "py",
"fi... | 2.328125 | stackv2 | import os
import numpy as np
import facenet
import cv2
import tensorflow as tf
import urllib
import tarfile
MODEL_FILE = 'https://storage.googleapis.com/esper/models/facenet/20170512-110547.tar.gz'
EMBEDDING_SIZE = 128
def temp_directory():
directory = os.path.expanduser('~/.vas/resources')
os.makedirs(direc... | 107 | 35.28 | 107 | 19 | 900 | python | [{"finding_id": "codeql_py/tarslip_d8eb9c0ced2ed26b_f9360397", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
30
] | [
null
] | [
13
] | [
18
] | |
2024-11-18T20:58:04.231480+00:00 | 1,376,669,431,000 | f346cba6152972f4273453437abd18ee858e072c | 3 | {
"blob_id": "f346cba6152972f4273453437abd18ee858e072c",
"branch_name": "refs/heads/master",
"committer_date": 1376669431000,
"content_id": "a78ae1a2cff74dbbf32e6bbb1590cbf088a41b97",
"detected_licenses": [
"Artistic-2.0"
],
"directory_id": "7d0a1b67dc8700617a942af32e2f0172662d711b",
"extension": "p... | 2.671875 | stackv2 | import web
import requests
import httplib, base64
urls = (
'/', 'index',
'/(.*)', 'found'
)
render = web.template.render('templates/')
class index:
def GET(self):
render.index()
class found:
def GET(self, screen_name):
g = get_user()
found_user = g.found_user()
render... | 117 | 34.74 | 138 | 15 | 957 | python | [{"finding_id": "codeql_py/request-without-cert-validation_805c0ee4b38b680a_f1a6afc4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 5 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
71,
81,
88,
99,
108
] | [
null,
null,
null,
null,
null
] | [
13,
13,
13,
13,
17
] | [
107,
121,
120,
139,
82
] | |
2024-11-18T20:58:10.289437+00:00 | 1,527,073,081,000 | ebeec4ec50fc13b0598a3e9214315a648c4a1a1f | 2 | {
"blob_id": "ebeec4ec50fc13b0598a3e9214315a648c4a1a1f",
"branch_name": "refs/heads/master",
"committer_date": 1527073081000,
"content_id": "16a73c81ee28a8110893ada31a2d9f546e1c5b7b",
"detected_licenses": [
"MIT"
],
"directory_id": "4c47dff7c25f22d2ec49db63d3f171838446438e",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
import config
debug = config.debug
import sys
if debug : print('initializing...', flush=True, file=sys.stderr)
import os
import json
import netifaces
from http.server import BaseHTTPRequestHandler, HTTPServer
import pychromecast
import gtts
media_contoller = None
s... | 153 | 38.45 | 138 | 16 | 1,224 | python | [{"finding_id": "codeql_py/path-injection_c3da6b9827802546_b4255ce0", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
125,
135
] | [
null,
null
] | [
40,
60
] | [
48,
68
] | |
2024-11-18T21:10:14.142986+00:00 | 1,684,823,007,000 | 073c91ceb7612f9a895756737da042dc8445d73a | 2 | {
"blob_id": "073c91ceb7612f9a895756737da042dc8445d73a",
"branch_name": "refs/heads/main",
"committer_date": 1684823007000,
"content_id": "9047561ee6180475f23beeed8b9229851446ace0",
"detected_licenses": [
"MIT"
],
"directory_id": "189c2fdefb78be9c5fc6d2b9d86bb44c04512a49",
"extension": "py",
"file... | 2.359375 | stackv2 | from .base import BaseDataset
from ..util import ivecs_read, fvecs_read
from urllib.request import urlretrieve
import tarfile
class Sift1m(BaseDataset):
def __init__(self, path):
super().__init__(path=path)
def download(self):
self.path.mkdir(exist_ok=True, parents=True)
tar_path = s... | 60 | 33.8 | 87 | 18 | 438 | python | [{"finding_id": "codeql_py/tarslip_e925073320ae775d_2d731f7c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
37
] | [
null
] | [
17
] | [
20
] | |
2024-11-18T21:10:33.033026+00:00 | 1,627,473,753,000 | c009034ed2276366de47f8a8285d899fc079ffb0 | 3 | {
"blob_id": "c009034ed2276366de47f8a8285d899fc079ffb0",
"branch_name": "refs/heads/main",
"committer_date": 1627473753000,
"content_id": "7b01ed1a7b24dc0ce0d6a92fc6442d342fda29cc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "00b0e12adbcdee95c0608f12c3f224976745e997",
"extension": "py",
... | 2.65625 | stackv2 | import os
import sys
import math
import cv2
from tqdm import tqdm
import requests
from zipfile import ZipFile
import json
from PIL import Image
import matplotlib.pyplot as plt
import tarfile
import os
import datetime
import csv
######### Download Dataset and Annotations ###########
def download_dataset(thetarfile, tar... | 161 | 32.61 | 108 | 18 | 1,218 | python | [{"finding_id": "codeql_py/tarslip_288f9f0e4a6e62d7_64b11d17", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
34
] | [
null
] | [
5
] | [
11
] | |
2024-11-18T21:10:58.013328+00:00 | 1,622,152,255,000 | d808d694ccf7208780ebae166110daba5dc952b9 | 2 | {
"blob_id": "d808d694ccf7208780ebae166110daba5dc952b9",
"branch_name": "refs/heads/master",
"committer_date": 1622152255000,
"content_id": "3e7c66a2086be8ba7df9ac71fda7840c1fc75c96",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "f9d4c301b4994994c45d9435bdfa73147ad53e49",
"extension": "p... | 2.359375 | stackv2 | """The Firestarter Connector connects to Firehose and writes the output to a kafka topic
"""
import asyncio
import json
import os
import ssl
import time
import warnings
import zlib
from typing import Optional, Tuple
from confluent_kafka import KafkaException, Producer # type: ignore
CONNECTION_ERROR_LIMIT = 3
COMPR... | 310 | 34.21 | 107 | 19 | 2,512 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0bb7908a0eb66b0e_26b14aa2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
201
] | [
null
] | [
11
] | [
37
] | |
2024-11-18T21:11:01.509755+00:00 | 1,608,101,878,000 | e776e7d7bdc7de4bbcb8331eb6bd80b0b224c7d5 | 4 | {
"blob_id": "e776e7d7bdc7de4bbcb8331eb6bd80b0b224c7d5",
"branch_name": "refs/heads/main",
"committer_date": 1608101878000,
"content_id": "3b2d173ff0a76157a0db19a6c8b48ca4a5398adf",
"detected_licenses": [
"MIT"
],
"directory_id": "d74afd5c1d64fa8174d02d85f337e36addfaaf67",
"extension": "py",
"file... | 3.515625 | stackv2 | data = open("day2.txt").read().splitlines()
def part_one():
passwords = 0
for x in data:
y = x.split(" ")
y[1] = y[1].strip(":")
counter = y[2].count(y[1])
number_range = y[0].split("-")
if counter in range(int(number_range[0]), int(number_range[1]) + 1):
pas... | 27 | 27.11 | 76 | 15 | 224 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a24fb05168514682_b3852f4d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
26,
27
] | [
null,
null
] | [
7,
7
] | [
17,
17
] | |
2024-11-18T21:11:07.349225+00:00 | 1,464,336,327,000 | 1fa9b2d4398c6161cb6e27e20e4291ec599994ea | 3 | {
"blob_id": "1fa9b2d4398c6161cb6e27e20e4291ec599994ea",
"branch_name": "refs/heads/master",
"committer_date": 1464336327000,
"content_id": "27506e50c794f92f1b6468ffd4d73f302246d996",
"detected_licenses": [
"MIT"
],
"directory_id": "991c9cb3927c59d6938dd3b3beac56fda6a4b180",
"extension": "py",
"fi... | 2.765625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
#
# User Module.
# Including User class and reading/writing implementations
#
import re, os, json, time
import config
from hashlib import md5
class User:
def __init__(self, src, password=None):
'''
Create one User instance from a Dict or String obje... | 96 | 24.82 | 77 | 16 | 587 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_9916c2769e75f86a_31cf7e2e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
45
] | [
null
] | [
38
] | [
65
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.