added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T22:35:56.455796+00:00 | 1,373,532,872,000 | 4feccdf7839a59bef17d3f1b79d5f1b0e62555af | 3 | {
"blob_id": "4feccdf7839a59bef17d3f1b79d5f1b0e62555af",
"branch_name": "refs/heads/master",
"committer_date": 1373532872000,
"content_id": "480a1b20f8b4ad9b9ed1817dd8bc6afa1ba90bd7",
"detected_licenses": [
"MIT"
],
"directory_id": "07539ecbcee0488ce4a0eb779583da3149cfac7b",
"extension": "py",
"fi... | 2.546875 | stackv2 | import hashlib
from amonone.web.apps.core.basemodel import BaseModel
class UserModel(BaseModel):
def __init__(self):
super(UserModel, self).__init__()
self.collection = self.mongo.get_collection('users')
def create_user(self, userdata):
userdata['password'] = hashlib.sha1(userdata['p... | 67 | 27.06 | 88 | 17 | 390 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_84801ad4639ea425_92376d48", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally e... | [
12,
16,
53
] | [
null,
null,
null
] | [
45,
45,
45
] | [
65,
65,
61
] | |
2024-11-18T22:36:04.464451+00:00 | 1,629,922,010,000 | 5792db18699e96f2b19a9125a70bdceb4d447150 | 3 | {
"blob_id": "5792db18699e96f2b19a9125a70bdceb4d447150",
"branch_name": "refs/heads/master",
"committer_date": 1629922010000,
"content_id": "958b29f1fc6ec304f79a2e5a585cb39cfd4ace88",
"detected_licenses": [
"MIT"
],
"directory_id": "3df543db6266b3eb0fd5647601c6ea6d37b60efd",
"extension": "py",
"fi... | 3.09375 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""
Created on Mon Jul 8 14:52:08 2019
@author: edoardottt
This file contains code for analyze the database.
It uses matplotlib library to displays the result.
It shows a chart with likes, retweets, followers per day.
This file is under MIT License.
"""
# all librari... | 132 | 42.88 | 111 | 28 | 1,209 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b16dac08b35de35b_7550e597", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
50
] | [
null
] | [
28
] | [
52
] | |
2024-11-18T22:36:07.964089+00:00 | 1,561,686,269,000 | a5af498b6cbed37b04bef8072568418c5f432877 | 3 | {
"blob_id": "a5af498b6cbed37b04bef8072568418c5f432877",
"branch_name": "refs/heads/master",
"committer_date": 1561686269000,
"content_id": "6f4bb6a284694c6431cc734bd916f83ef1670f2a",
"detected_licenses": [
"MIT"
],
"directory_id": "a6d99f64037b2b4c8d40c76f6cf78a445d77cd8d",
"extension": "py",
"fi... | 2.5625 | stackv2 | from flask import Flask, request, flash, render_template
from flask_wtf import FlaskForm
from wtforms import StringField, PasswordField, SubmitField
from wtforms.validators import DataRequired, EqualTo
app = Flask(__name__)
app.config['WTF_CSRF_ENABLED'] = False
app.config['SECRET_KEY'] = 'SECRET_KEY'
class RegistF... | 37 | 30.97 | 106 | 14 | 285 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_54a52c370dd7e6ae_a3bc05bc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-215"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/flask-debug"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
26,
26,
37
] | [
null,
null,
null
] | [
25,
35,
5
] | [
33,
44,
24
] | |
2024-11-18T22:36:49.048148+00:00 | 1,403,863,431,000 | 1717dd6472eba7d14384f2c162fe2412f6d3f57f | 3 | {
"blob_id": "1717dd6472eba7d14384f2c162fe2412f6d3f57f",
"branch_name": "refs/heads/master",
"committer_date": 1403863431000,
"content_id": "b4aab80c84977df7eb7a40cd5fd55617327dc29f",
"detected_licenses": [
"MIT"
],
"directory_id": "c65827ad7680555b3d2cffcaf2bb76d44fa99210",
"extension": "py",
"fi... | 2.734375 | stackv2 | #!/usr/bin/python
'''
simplecache.py - (C) 2014 Daniel Fairhead <daniel.fairhead@.om.org>
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including ... | 82 | 37.07 | 86 | 15 | 683 | python | [{"finding_id": "codeql_py/path-injection_c8c8965c4ee0ea99_e8030c35", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 4 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
53,
54,
55,
61
] | [
null,
null,
null,
null
] | [
23,
27,
26,
19
] | [
33,
46,
45,
29
] | |
2024-11-18T20:23:27.335109+00:00 | 1,516,957,296,000 | 06dafabd5bd9fc3721847bcce198f29f6ca8e94c | 4 | {
"blob_id": "06dafabd5bd9fc3721847bcce198f29f6ca8e94c",
"branch_name": "refs/heads/master",
"committer_date": 1516957296000,
"content_id": "4c9cc0ea393c2421add8814134006d4555fff595",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c4509e0d8d116403fe83f4dd06a0d31c01701ddf",
"extension": "py"... | 3.90625 | stackv2 | import random
#18 연봉 계산
salary = int(input("연봉을 입력해주세요(3000)"))
isMarried = input("결혼 여부를 입력해주세요(미혼/결혼)")
tax = 0
if isMarried=='미혼' :
if salary < 3000 :
tax = salary * 0.1
else :
tax = salary * 0.25
elif isMarried=='결혼' :
if salary < 6000:
tax = salary * 0.1
else :
t... | 109 | 17.35 | 68 | 12 | 883 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_37c12b6dc64710ab_a85e184f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
21
] | [
null
] | [
7
] | [
68
] | |
2024-11-18T20:23:27.436905+00:00 | 1,506,351,088,000 | d433de62d77ad86fabd117083cec034822e7522f | 3 | {
"blob_id": "d433de62d77ad86fabd117083cec034822e7522f",
"branch_name": "refs/heads/master",
"committer_date": 1506351088000,
"content_id": "73cd6408cf9918ceef69d32d83a35a465883f8c6",
"detected_licenses": [
"MIT"
],
"directory_id": "7cca2f867a4ea3eb62a9e4e2568a57d290239b5f",
"extension": "py",
"fi... | 2.59375 | stackv2 | import json
import os
from flask import Flask
from sqlalchemy import create_engine
from sqlalchemy import inspect
from sqlalchemy import text
app = Flask(__name__)
def getDbAddress():
if 'DPP_DB_ENGINE' in os.environ:
return os.environ['DPP_DB_ENGINE'];
return 'postgresql://postgres:123456@localhost:1... | 63 | 32.35 | 165 | 20 | 614 | python | [{"finding_id": "codeql_py/sql-injection_ed20664c4d428328_41b97b41", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
45
] | [
null
] | [
16
] | [
154
] | |
2024-11-18T20:23:31.690228+00:00 | 1,617,103,975,000 | 5bf4a2575ceefc035e118d71973c515fbacee62f | 2 | {
"blob_id": "5bf4a2575ceefc035e118d71973c515fbacee62f",
"branch_name": "refs/heads/main",
"committer_date": 1617103975000,
"content_id": "372216b8171de8537d28821931e9f638f436425a",
"detected_licenses": [
"MIT"
],
"directory_id": "70b90ca35ce61c439c9e3031096c258358c59496",
"extension": "py",
"file... | 2.328125 | stackv2 | import os
import json
import pandas as pd
import numpy
from flask import Flask, render_template, request, jsonify
from pandas.io.json import json_normalize
from sklearn.externals import joblib
from werkzeug.wrappers import Request, Response
app = Flask(__name__)
port = int(os.getenv('PORT', 5500))
@app.route('/')
d... | 35 | 23.89 | 58 | 14 | 202 | python | [{"finding_id": "codeql_py/stack-trace-exposure_188ad7d8003528c7_ee691822", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
31,
35
] | [
null,
null
] | [
21,
2
] | [
22,
48
] | |
2024-11-18T20:23:32.219868+00:00 | 1,629,902,909,000 | a25ad596d5f699d1ff4e6d71bc4b57c91ec1db4b | 3 | {
"blob_id": "a25ad596d5f699d1ff4e6d71bc4b57c91ec1db4b",
"branch_name": "refs/heads/main",
"committer_date": 1629902909000,
"content_id": "dffd0608dcf69f9b3c9332c63a459f12d64e92c7",
"detected_licenses": [
"MIT"
],
"directory_id": "58efd17e84b579d686d2dce575aed72fa4aa08c7",
"extension": "py",
"file... | 2.5625 | stackv2 |
from collections import defaultdict
from typing import Any, Dict, List, Text
from flask import Flask, json, jsonify, request
import api
flask = Flask(__name__)
MOCK_DATA_HEAP = defaultdict(list)
Constraint = List[Dict[Text, Any]]
class InvalidUsage(Exception):
def __init__(self, message, status_code=None):
... | 84 | 23.05 | 85 | 18 | 474 | python | [{"finding_id": "codeql_py/code-injection_067364a7bd8e70d7_ad133f71", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-094"
] | [
"py/code-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1)."
] | [
42
] | [
null
] | [
48
] | [
76
] | |
2024-11-18T20:23:41.359824+00:00 | 1,664,740,262,000 | 7616423f972eaafed63160ca073cb9c76b9b9f1a | 3 | {
"blob_id": "7616423f972eaafed63160ca073cb9c76b9b9f1a",
"branch_name": "refs/heads/main",
"committer_date": 1664740262000,
"content_id": "ebca167520a7454ae00994dcfe2300e176bfc2d7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e4695f3731fa868a2603cd79682f860d5975e730",
"extension": "py",
... | 2.703125 | stackv2 | import hashlib
import urllib.request
from django.core.exceptions import ValidationError
class HaveIBeenPwnedValidator:
def validate(self, password, user=None):
sha1 = hashlib.sha1() # nosec:required by service.
sha1.update(password.encode())
digest = sha1.hexdigest().upper()
pref... | 24 | 40.17 | 87 | 17 | 216 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_76077a836776ecbb_f22d68b8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
10
] | [
null
] | [
21
] | [
38
] | |
2024-11-18T21:22:42.050741+00:00 | 1,598,082,424,000 | bcedb8203b23c1fee75341d0bca28add370f28d0 | 3 | {
"blob_id": "bcedb8203b23c1fee75341d0bca28add370f28d0",
"branch_name": "refs/heads/master",
"committer_date": 1598082424000,
"content_id": "87dda5164883a83ac699ef8b63793817673712d9",
"detected_licenses": [
"MIT"
],
"directory_id": "e0121af6e951b5612ffb86329a16da5c7765e009",
"extension": "py",
"fi... | 2.703125 | stackv2 | import spotdl
import clipboard
import enchant
from shutil import copyfile
from os import listdir, remove, mkdir
from os.path import isfile, join
from pathlib import Path, PurePath
import ctypes
path = Path(Path.home(), "Desktop/Music")
def download(url: str):
try:
ans = ctypes.windll.user32.MessageBoxW(0... | 35 | 37.46 | 131 | 18 | 334 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_430b56d9e7f490c1_b5d8e65f", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://open.spotify.com](1) may be at an arbitrary po... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [https://open.spotify.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [https://youtu.be](1) may be at an arbitrary position in the sanitized URL."
] | [
19,
19
] | [
null,
null
] | [
50,
96
] | [
92,
130
] | |
2024-11-18T21:22:42.571163+00:00 | 1,588,805,281,000 | ab8470cf0d60fc5b519775efdb2c285ea1e553b0 | 2 | {
"blob_id": "ab8470cf0d60fc5b519775efdb2c285ea1e553b0",
"branch_name": "refs/heads/master",
"committer_date": 1588805281000,
"content_id": "91f1086a92d7f2c6cd720fb5e77aef7cc045202a",
"detected_licenses": [
"MIT"
],
"directory_id": "9fd0e0a819e94b32c09672d2cd5d0c90f1afbd7c",
"extension": "py",
"fi... | 2.359375 | stackv2 | ###############################################################################
#
# Zero-Touch Automation utility for Ixia Vision Network Packet Brokers
#
# File: ixvision_ztp_sysinfo.py
# Author: Alex Bortok (https://github.com/bortok)
#
# Description: A module to inquiry system status
#
# COPYRIGHT 2018 - 2019 Keysig... | 66 | 33.02 | 135 | 14 | 532 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d61f9de5a9bb9236_67a01d9c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
31
] | [
null
] | [
11
] | [
59
] | |
2024-11-18T21:22:46.086762+00:00 | 1,604,038,290,000 | 17e2fd271567bab5f81dc8606bbe64a146df98cd | 4 | {
"blob_id": "17e2fd271567bab5f81dc8606bbe64a146df98cd",
"branch_name": "refs/heads/main",
"committer_date": 1604038290000,
"content_id": "132c5f31d276dc5e17567ac75d7271f67149923c",
"detected_licenses": [
"MIT"
],
"directory_id": "ad9815eaf483c7d1c663d024569eecc96d7f1e21",
"extension": "py",
"file... | 3.5625 | stackv2 | from flask import Flask
app = Flask(__name__)
@app.route('/')
def homepage():
"""Shows a greeting to the user."""
return 'Are you there, world? It\'s me, Ducky!'
@app.route('/penguins')
def penguins():
return 'Penguins are cute!'
@app.route('/animal/<users_animal>')
def favorite_animal(users_animal):
... | 59 | 26.8 | 84 | 12 | 424 | python | [{"finding_id": "codeql_py/flask-debug_182790476db20dc7_a0f9b831", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 6 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a ... | [
59,
17,
21,
27,
36,
45
] | [
null,
null,
null,
null,
null,
null
] | [
5,
12,
12,
16,
16,
12
] | [
24,
62,
56,
57,
29,
20
] | |
2024-11-18T21:23:18.133251+00:00 | 1,646,156,770,000 | fc1698d8fa259911e73b7a8fb80d590599346ca7 | 3 | {
"blob_id": "fc1698d8fa259911e73b7a8fb80d590599346ca7",
"branch_name": "refs/heads/master",
"committer_date": 1646156770000,
"content_id": "1d05dd245ad187b6af590e8184d651ddd7efe879",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "aa64c62a3d246b87f3f1e5810a8f75b1d166aaf6",
"extension": "py"... | 2.640625 | stackv2 | import click
from .comm import pdserver_request
@click.group()
@click.pass_context
def routers(ctx):
"""
(deprecated) Access router information on the controller.
These commands are deprecated. Please use the equivalent commands under
`pdtools cloud --help`.
"""
ctx.obj['routers_url'] = ctx.... | 90 | 24.61 | 85 | 14 | 543 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2c7fee9a028dedb9_c92f5e21", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
74
] | [
null
] | [
15
] | [
56
] | |
2024-11-18T21:23:19.744983+00:00 | 1,681,836,800,000 | 8a8b223821834448777ee1a31299ed3d5294b6be | 3 | {
"blob_id": "8a8b223821834448777ee1a31299ed3d5294b6be",
"branch_name": "refs/heads/master",
"committer_date": 1681836800000,
"content_id": "ff9114b92fdc26c7ad28589a3324c821fde0d19a",
"detected_licenses": [
"MIT"
],
"directory_id": "9acd360d688177e03a77dff6d391c60ad1b82295",
"extension": "py",
"fi... | 2.734375 | stackv2 | """
keycloak
~~~~~~~~~~
Keycloak login helpers and management features
"""
import os
from posixpath import join as urljoin
import requests
from requests import codes
import logging
import webbrowser
from typing import Optional, Dict, List, Any
from .exceptions import ServerError, AuthServerError
from .utils import ho... | 414 | 35.98 | 114 | 17 | 3,496 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a108670dd76f2e65_c68f83c3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text."
] | [
55
] | [
null
] | [
76
] | [
80
] | |
2024-11-18T21:51:40.851044+00:00 | 1,524,606,861,000 | 16153a687d9d02cd8b2678b8228b76cb3bc4acba | 2 | {
"blob_id": "16153a687d9d02cd8b2678b8228b76cb3bc4acba",
"branch_name": "refs/heads/master",
"committer_date": 1524606861000,
"content_id": "ddb95e40d350efe5dbcb6ee2f0c1f408ed6aa363",
"detected_licenses": [
"MIT"
],
"directory_id": "a1b3343ceed9a3a1495cdfbf1e813f06030e8fd6",
"extension": "py",
"fi... | 2.390625 | stackv2 | #Add all global routes in this file
from flask import request
from flask import Blueprint
import logging
from lib.decorators import jsonify, logrequest
logger = logging.getLogger()
global_routes = Blueprint('global_routes', __name__)
@global_routes.route('/', methods=['GET'])
@jsonify
@logrequest
def test():
logg... | 18 | 24.83 | 82 | 10 | 102 | python | [{"finding_id": "codeql_py/log-injection_a0760f86869e11d8_2bbe8765", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
16
] | [
null
] | [
70
] | [
82
] | |
2024-11-18T21:51:41.837675+00:00 | 1,631,915,449,000 | 03d49580475515ced9115c5274b786a9e0c31bba | 3 | {
"blob_id": "03d49580475515ced9115c5274b786a9e0c31bba",
"branch_name": "refs/heads/master",
"committer_date": 1631915449000,
"content_id": "eab9cd59b3d04375b8b89b54d37a31a87f28f8dd",
"detected_licenses": [
"MIT"
],
"directory_id": "cc8461174a59712685768ee2ea77f0b0e3368386",
"extension": "py",
"fi... | 2.578125 | stackv2 | from flask import Flask, jsonify, send_from_directory, request
import os
from subprocess import Popen, PIPE
app = Flask(__name__)
@app.route("/rot")
def rot():
chave = request.args.get('chave')
texto = request.args.get('texto')
try:
int(chave)
except x:
return ":(", 400
processo ... | 23 | 22.91 | 89 | 11 | 149 | python | [{"finding_id": "codeql_py/command-line-injection_1127c24e9f11f36c_e4fa573a", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 1 | true | [
"CWE-078"
] | [
"py/command-line-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1)."
] | [
17
] | [
null
] | [
22
] | [
46
] | |
2024-11-18T21:52:02.903333+00:00 | 1,594,508,697,000 | ae1ad82193225b580948c60573bd5baa02edb20a | 2 | {
"blob_id": "ae1ad82193225b580948c60573bd5baa02edb20a",
"branch_name": "refs/heads/master",
"committer_date": 1594508697000,
"content_id": "5a0c59ea354c82904a9c3e9e4f1b37c2e8c5b911",
"detected_licenses": [
"MIT"
],
"directory_id": "563469316290461d709a34c847e592de6800f8c5",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/env python3
# MIT License
##
# Copyright (c) 2017 Sayak Brahmachari
##
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to
# deal in the Software without restriction, including without limitation the
# righ... | 282 | 35.65 | 97 | 34 | 2,066 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_47846c472268ea27_e12f945e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-200",
"CWE-200"
] | [
"py/clear-text-logging-sensitive-data",
"py/bind-socket-all-network-interfaces",
"py/bind-socket-all-network-interfaces"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"'0.0.0.0' binds a socket to all interfaces.",
"'0.0.0.0' binds a socket to all interfaces."
] | [
41,
61,
65
] | [
42,
null,
null
] | [
11,
null,
null
] | [
46,
26,
37
] | |
2024-11-18T22:02:49.911160+00:00 | 1,619,819,738,000 | 7b1683707bc7bde1cd20d629b7bccf42d238684b | 2 | {
"blob_id": "7b1683707bc7bde1cd20d629b7bccf42d238684b",
"branch_name": "refs/heads/master",
"committer_date": 1619819738000,
"content_id": "3c29e8dbd600e6cadd50adc14231f229ff5689e3",
"detected_licenses": [
"MIT"
],
"directory_id": "3af8e9ca36e1deeff2683907db497772b9051899",
"extension": "py",
"fi... | 2.46875 | stackv2 | #!/usr/bin/env python
# coding: utf-8
from kollektions import app, db, User, Event, Following
from kollektions.forms import LoginForm, SignupForm
from kollektions.store import get_store
from kollektions.utils import pretty_date
from flask import render_template, flash, redirect, url_for, session
from flask import abor... | 434 | 27.74 | 78 | 21 | 3,037 | python | [{"finding_id": "codeql_py/partial-ssrf_344360f4d9535a55_d7da10fb", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
34
] | [
35
] | [
11
] | [
27
] | |
2024-11-18T22:27:48.643783+00:00 | 1,581,079,709,000 | 2fd81cb42a5ed0e64f4eac3a368f8eb25fe00deb | 3 | {
"blob_id": "2fd81cb42a5ed0e64f4eac3a368f8eb25fe00deb",
"branch_name": "refs/heads/master",
"committer_date": 1581079709000,
"content_id": "ef3b2a9f026a7ebd8f47732c1be689985f0cda25",
"detected_licenses": [
"MIT"
],
"directory_id": "dc0a1aa09a6093376fb0b640f245d5e494b7351c",
"extension": "py",
"fi... | 2.8125 | stackv2 | import os
import cv2
import pickle
import numpy as np
from torch.utils.data import Dataset
import random
def unpickle_batch(file):
with open(file, 'rb') as f:
dict_ = pickle.load(f, encoding='bytes')
return dict_
def preprocess(img_bgr):
# to 32bit img
img_bgr = img_bgr.astype(np.float32)/25... | 129 | 34.57 | 107 | 22 | 1,221 | python | [{"finding_id": "codeql_py/tarslip_200d32a69e82f805_244854d4", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
92
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T22:28:18.096908+00:00 | 1,691,311,230,000 | b2c22bf2036fa2c5c6d90b1ad1e841ee685d4c7c | 2 | {
"blob_id": "b2c22bf2036fa2c5c6d90b1ad1e841ee685d4c7c",
"branch_name": "refs/heads/PPDM-main",
"committer_date": 1691311230000,
"content_id": "b0c5030e144ea3ba12fa32fffe84e1f228f31f93",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3bd241c4240347d5ab098cacfa7799404842d971",
"extension": "... | 2.375 | stackv2 | #!/usr/bin/env python3
import argparse
import requests
import urllib3
import sys
import json
# The purpose of this script is to simplify K8s Credential Management in PowerProtect
urllib3.disable_warnings()
def get_args():
# Get command line args from the user
parser = argparse.ArgumentParser(
descri... | 176 | 45.47 | 116 | 22 | 1,904 | python | [{"finding_id": "codeql_py/request-without-cert-validation_62643a109c5691d4_348ce41d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 5 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
43,
76,
98,
113,
129
] | [
null,
null,
null,
null,
null
] | [
20,
20,
20,
20,
20
] | [
83,
83,
83,
71,
69
] | |
2024-11-18T22:43:57.623596+00:00 | 1,419,571,332,000 | fd94dbd0f34995da162c31dd810266a9435b237a | 2 | {
"blob_id": "fd94dbd0f34995da162c31dd810266a9435b237a",
"branch_name": "refs/heads/master",
"committer_date": 1419571332000,
"content_id": "640294468020448a06725cd3b17ec65a365a8f4e",
"detected_licenses": [
"MIT"
],
"directory_id": "108a7a174913409b934858d43c83064df7aaafb2",
"extension": "py",
"fi... | 2.46875 | stackv2 | #! /usr/bin/env python3
import sqlite3
import os
import hashlib
import codecs
import bcrypt
from Crypto.Cipher import AES
from password import encrypt, decrypt, toHex, fromHex
import config
pwdatabase = config.dbfile
'''This utility only needs to be run once to convert from an unencrypted database.'''
'''Fill in pa... | 36 | 31.14 | 108 | 13 | 306 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bd1168fcb8126dfa_8eab2984", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
29,
32
] | [
null,
null
] | [
18,
18
] | [
26,
30
] | |
2024-11-18T22:44:00.916837+00:00 | 1,550,557,535,000 | 022cfba2bac242d1374d0d70cf3b3f9a3e40f226 | 2 | {
"blob_id": "022cfba2bac242d1374d0d70cf3b3f9a3e40f226",
"branch_name": "refs/heads/master",
"committer_date": 1550557535000,
"content_id": "e52b8392476aee925df627fbcb18bdab77d5f272",
"detected_licenses": [
"MIT"
],
"directory_id": "8727805627d1034073d89e03b135269b3804b6b9",
"extension": "py",
"fi... | 2.390625 | stackv2 | import sublime
import sublime_plugin
from .driver.baidu_translate import BaiduTranslate
s = sublime.load_settings("HBH-Translator.sublime-settings")
appid = s.get('appid')
secret_key = s.get('secret_key')
print(appid, secret_key)
bd_api = BaiduTranslate(appid, secret_key)
class TranslateCommand(sublime_plugin.TextCo... | 32 | 32.56 | 77 | 15 | 245 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ab075d4885c2c5b4_17a5a2ac", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
8
] | [
null
] | [
14
] | [
24
] | |
2024-11-18T22:44:14.175065+00:00 | 1,326,821,638,000 | 6f433abe3128c4276cf70979e8a10d8d46341332 | 2 | {
"blob_id": "6f433abe3128c4276cf70979e8a10d8d46341332",
"branch_name": "refs/heads/master",
"committer_date": 1326821638000,
"content_id": "8f916bd0f772a2b6ad8d9445c2c5ac94a9f9b63c",
"detected_licenses": [
"MIT"
],
"directory_id": "848946322a2653184f18883f321ed5b2ed0c0256",
"extension": "py",
"fi... | 2.375 | stackv2 | # Copyright (c) 2011 anatanokeitai.com(sakurai_youhei)
#
# Permission is hereby granted, free of charge, to any person obtaining a
# copy of this software and associated documentation files (the
# "Software"), to deal in the Software without restriction, including
# without limitation the rights to use, copy, modify, ... | 163 | 29.11 | 107 | 18 | 1,250 | python | [{"finding_id": "codeql_py/insecure-default-protocol_a17679b0817980bd_56a250c7", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
157
] | [
null
] | [
14
] | [
55
] | |
2024-11-18T22:44:19.136096+00:00 | 1,655,990,133,000 | 55d34f07584633b6f49b5aac1844e9af43660544 | 2 | {
"blob_id": "55d34f07584633b6f49b5aac1844e9af43660544",
"branch_name": "refs/heads/master",
"committer_date": 1655990133000,
"content_id": "1f79eb8748867edf7c975587243d2363e0c784a5",
"detected_licenses": [
"MIT"
],
"directory_id": "ff914ecce4f7230dcc18b154900b053354f7be96",
"extension": "py",
"fi... | 2.40625 | stackv2 | from requests import get
from requests.exceptions import RequestException
from contextlib import closing
import xml.etree.ElementTree as xme
import time
import re
import pandas as pd
import calendar
def getrequest(url):
try:
with closing(get(url,stream=True)) as resp:
if (is_good_response(resp)... | 162 | 48.38 | 146 | 22 | 1,669 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_198ded9678ec354f_04d0145f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-116"
] | [
"py/clear-text-logging-sensitive-data",
"py/bad-tag-filter"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"Comments ending with --> are matched differently from comments ending with --!>. The first is matched with capture group 5 and comments ending with --!> are matched with capture group 7."
] | [
19,
26
] | [
null,
null
] | [
15,
21
] | [
53,
112
] | |
2024-11-18T22:44:35.247369+00:00 | 1,492,619,639,000 | ecdd0c890be7aac60958f9048e55fc8f9ea1a916 | 2 | {
"blob_id": "ecdd0c890be7aac60958f9048e55fc8f9ea1a916",
"branch_name": "refs/heads/master",
"committer_date": 1492619639000,
"content_id": "c9041bc2a92a4c0105c3e177882cd3120b64ea70",
"detected_licenses": [
"MIT"
],
"directory_id": "e4088ae5e991171d1d42ba6db3e045885a73007b",
"extension": "py",
"fi... | 2.453125 | stackv2 | import psycopg2 as psy
db = psy.connect(dbname='gkdb', host='gkdb.org')
def get_groups(uid):
cur = db.cursor()
cur.execute("""
SELECT * FROM
pg_group
WHERE
%s = ANY (grolist)
;""", (uid, ))
return cur
def get_sql_usergroups():
cur = db.cursor()
cur.execute("""
S... | 35 | 25.49 | 72 | 11 | 237 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5e6971346181ae28_133b1630", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
31
] | [
null
] | [
21
] | [
29
] | |
2024-11-18T20:24:07.368237+00:00 | 1,657,714,617,000 | 16553e6dff6c267199e1ffa009ef09414c80899b | 2 | {
"blob_id": "16553e6dff6c267199e1ffa009ef09414c80899b",
"branch_name": "refs/heads/master",
"committer_date": 1657714617000,
"content_id": "74a702306e960aa4a75f4fb6fe02f69921933030",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "314e2d33f5d49f2da74a6f2d72cf506cc37bbdba",
"extension": "py"... | 2.3125 | stackv2 | import os
import re
import argparse
from jinja2 import Template
from shutil import copyfile
if __name__ == '__main__':
parser = argparse.ArgumentParser('Log Parser arguments!')
parser.add_argument("-data_dir", type=str, help="Directory with the all the logs")
parser.add_argument("-out_dir", type=str, he... | 153 | 33 | 152 | 22 | 1,192 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_c1edd990caf900e8_288ab3f3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
148
] | [
null
] | [
20
] | [
42
] | |
2024-11-18T20:24:14.184447+00:00 | 1,627,853,574,000 | a259f8f599e52f5d2e3449152e48fb01606e9058 | 3 | {
"blob_id": "a259f8f599e52f5d2e3449152e48fb01606e9058",
"branch_name": "refs/heads/main",
"committer_date": 1627853574000,
"content_id": "5693a5f4ac8231576b62dac2032771f7a96959c1",
"detected_licenses": [
"MIT"
],
"directory_id": "667961ed8e9df1fada4ddf00854cb6a9b8fbfb5e",
"extension": "py",
"file... | 2.96875 | stackv2 | # No puede ser un jupiter, tiene que ser archivo .py
from flask import Flask, flash, request, render_template, redirect, url_for
import pandas as pd
import os
import json
UPLOAD_FOLDER = os.sep + "static" + os.sep
# Flask es una clase cuyo primer atributo es un atributo obligatorio (name):
app = Flask(__name__) # E... | 42 | 45.55 | 118 | 13 | 467 | python | [{"finding_id": "codeql_py/flask-debug_f0b59bdd91522acd_15242bf6", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
41,
29
] | [
null,
32
] | [
5,
16
] | [
71,
59
] | |
2024-11-18T21:00:33.812446+00:00 | 1,605,957,527,000 | b48195f271c2e8ea2ccf8e331c0b96c72aea67e7 | 2 | {
"blob_id": "b48195f271c2e8ea2ccf8e331c0b96c72aea67e7",
"branch_name": "refs/heads/main",
"committer_date": 1605957527000,
"content_id": "f33d907556c9b9fc201b71eb8cdc6b8052468813",
"detected_licenses": [
"MIT"
],
"directory_id": "93ba96a5e3c1ccf829b62f2b5533309f306ce9b6",
"extension": "py",
"file... | 2.34375 | stackv2 | from ldap_api import retrieve_user_details, ldap_connection
from configurations import AUTH_AD_HOST, AUTH_AD_PORT, AUTH_AD_DOMAIN
from services import decode
from flask_restful import Resource
from flask import make_response, request
import json
import http
class UserDetails(Resource):
def options(self):
... | 52 | 31.15 | 69 | 18 | 301 | python | [{"finding_id": "codeql_py/stack-trace-exposure_ad75275bd91af68f_0a11af52", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
23,
50
] | [
25,
52
] | [
34,
34
] | [
15,
15
] | |
2024-11-18T21:01:13.598648+00:00 | 1,607,439,510,000 | 247786dbcfe55b5afc11623ed6be5a68bcfb159b | 3 | {
"blob_id": "247786dbcfe55b5afc11623ed6be5a68bcfb159b",
"branch_name": "refs/heads/main",
"committer_date": 1607439510000,
"content_id": "a428f9fcf148b2bed6c9293777915ff0f2331c6d",
"detected_licenses": [
"MIT"
],
"directory_id": "25a6da24bae4ed91a559efa3b057165218b91cb2",
"extension": "py",
"file... | 2.6875 | stackv2 | import random, sys
from hashlib import sha256
from tkinter import *
from tkinter import Text
import tkinter as tk
from tkinter.ttk import Combobox
from tkinter import messagebox
from datetime import datetime
#main Window
root = tk.Tk()
root.title('passwordGenerator')
root.resizable(0,0)
canvas = tk.Canvas(root, heigh... | 169 | 31.29 | 113 | 14 | 1,592 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1b7fea3a71e6dbd9_38a0bf24", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
32
] | [
null
] | [
14
] | [
19
] | |
2024-11-18T21:01:17.091928+00:00 | 1,599,767,190,000 | 03e4bb0ba518ab9d9e63b975ad9e94c01170ead2 | 3 | {
"blob_id": "03e4bb0ba518ab9d9e63b975ad9e94c01170ead2",
"branch_name": "refs/heads/master",
"committer_date": 1599767190000,
"content_id": "26454299628ae8d03b85f9a26045d4cea88cd52c",
"detected_licenses": [
"MIT"
],
"directory_id": "98789579e97078e99f0dd2c4fd0eb450473a8c33",
"extension": "py",
"fi... | 2.609375 | stackv2 | import pickle
import os
from flask import Flask, flash, request, redirect, url_for, g
from flask.templating import render_template
from werkzeug.utils import secure_filename
from HashtagRecommenderModel import HashtagRecommender, join_file
MYDIR = os.path.dirname(__file__)
UPLOAD_FOLDER = os.path.join('static', 'uploa... | 81 | 37 | 133 | 23 | 676 | python | [{"finding_id": "codeql_py/url-redirection_8d741f519f6c2ccf_f05efbab", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 5 | true | [
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends o... | [
37,
43,
55,
59,
71
] | [
null,
null,
null,
null,
null
] | [
29,
29,
33,
25,
25
] | [
40,
40,
44,
36,
56
] | |
2024-11-18T21:01:29.544799+00:00 | 1,623,735,066,000 | f722625f5b28aac63c36415a17913cf1d1e8003f | 2 | {
"blob_id": "f722625f5b28aac63c36415a17913cf1d1e8003f",
"branch_name": "refs/heads/master",
"committer_date": 1623735066000,
"content_id": "30d82122a57dfff98cf24ef4f70ae91dc5184544",
"detected_licenses": [
"MIT"
],
"directory_id": "2a71a577dd2a4f235a70b6e54cdfff9c38764081",
"extension": "py",
"fi... | 2.40625 | stackv2 | import hashlib
import os
import base64
import json
import subprocess
from flask import Flask, request
from subprocess import Popen
DETACHED_PROCESS = 0x00000008
app = Flask(__name__)
class AgentInstance:
DEST_PATH = 'C:\\temp'
AGENT_KEY = 'ZZ4UNX4MGVSSCQ920O5CFCXR4UOYZ0S1UW70CLF9BC83E1VHA9W9MX0APTQ0WV0G'
... | 101 | 33.95 | 99 | 18 | 870 | python | [{"finding_id": "codeql_py/command-line-injection_394d40b5a7db22d9_31af51ee", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 3 | true | [
"CWE-078",
"CWE-022",
"CWE-022"
] | [
"py/command-line-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
59,
51,
55
] | [
null,
null,
null
] | [
23,
19,
32
] | [
26,
35,
48
] | |
2024-11-18T21:25:34.822547+00:00 | 1,520,556,293,000 | 2e6c6be6b76e21d29a759a58ef818d9011ed6580 | 4 | {
"blob_id": "2e6c6be6b76e21d29a759a58ef818d9011ed6580",
"branch_name": "refs/heads/master",
"committer_date": 1520556293000,
"content_id": "b0ae0310437027c393936f0cd185edf03fdeb898",
"detected_licenses": [
"MIT"
],
"directory_id": "e937274f730b9c6beb19687cedfe2f118890dc68",
"extension": "py",
"fi... | 3.859375 | stackv2 | #!/usr/bin/env python3
'''
Code by Stephane Gallet, <gallet.stephane@gmail.com>
based on "How to Share a Secret" by Adi Shamir
Published by :Communications of the ACM
November 1979, Volume 22, Num. 11
'''
import numpy as np
import random
def split_secret(secret, k, n):
'''
Secret in an integer
k is the... | 113 | 20.8 | 71 | 13 | 696 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ccbc97ef44b52bdf_37972527", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
88
] | [
null
] | [
11
] | [
27
] | |
2024-11-18T21:51:34.362577+00:00 | 1,611,329,563,000 | 0a26405e0f423c1b2b0b35c9fcf8321b3666580c | 2 | {
"blob_id": "0a26405e0f423c1b2b0b35c9fcf8321b3666580c",
"branch_name": "refs/heads/master",
"committer_date": 1611329563000,
"content_id": "8e9a18a002feee6a8588b4c11768871de3e9bd04",
"detected_licenses": [
"MIT"
],
"directory_id": "e01656767f7e5f464e40792fb245068d876051dc",
"extension": "py",
"fi... | 2.375 | stackv2 | #!/usr/bin/python
# Copyright (c). 2021-2021. All rights reserved.
import getpass
import json
import re
from sys import argv
import os
import logger
import requests
import yaml
from requests.packages.urllib3.exceptions import InsecureRequestWarning
from vmware_pass_update import UpdatePassword
requests.packages.url... | 549 | 31.1 | 84 | 20 | 3,777 | python | [{"finding_id": "codeql_py/request-without-cert-validation_04ffc2834db59a7a_2e61b0d4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 6 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
49,
70,
96,
300,
329,
347
] | [
null,
71,
null,
302,
331,
null
] | [
20,
20,
20,
24,
24,
24
] | [
67,
47,
75,
64,
63,
85
] | |
2024-11-18T22:00:14.387671+00:00 | 1,580,380,043,000 | b79536a9a90bf7a61f02181663cdaf7e73a193de | 3 | {
"blob_id": "b79536a9a90bf7a61f02181663cdaf7e73a193de",
"branch_name": "refs/heads/master",
"committer_date": 1580380043000,
"content_id": "191a81095a39ab4ffd68c05aee7aaa52557fb28b",
"detected_licenses": [
"MIT"
],
"directory_id": "04887b8cac1c05f8f069cca203555734bbf182e5",
"extension": "py",
"fi... | 2.75 | stackv2 | import os
import sys
ROOT_DIR = os.path.dirname(os.path.abspath(os.path.dirname('__file__')))
sys.path.append(ROOT_DIR)
import scipy.io
import numpy as np
import pandas as pd
import imagesize
import requests
import tarfile
local_file_path = os.path.join(ROOT_DIR, 'resources', 'wiki_crop.tar')
# path where all the unpa... | 94 | 32.97 | 108 | 14 | 820 | python | [{"finding_id": "codeql_py/tarslip_32b0fc6290c8c19a_c17e5cd2", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
28
] | [
null
] | [
5
] | [
7
] | |
2024-11-18T22:00:18.711114+00:00 | 1,676,722,332,000 | 19e3c65799a49ca96c47df7bfe6b813d5a93cf81 | 2 | {
"blob_id": "19e3c65799a49ca96c47df7bfe6b813d5a93cf81",
"branch_name": "refs/heads/master",
"committer_date": 1676722332000,
"content_id": "1d2d26fa10205b6819c70b7aab3ac37ef11ee7e3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bae3254792b2f3ee0d7384794e52ceff66851a29",
"extension": "py"... | 2.328125 | stackv2 | # -*- coding: utf-8 -*-
# Copyright (c) 2004-2014 Alterra, Wageningen-UR
# Allard de Wit (allard.dewit@wur.nl), April 2014
import sys, os
import urllib
from google.appengine.api import urlfetch
from datetime import date, timedelta
import numpy as np
from ..base_classes import WeatherDataProvider, WeatherDataContainer... | 313 | 40.67 | 108 | 20 | 3,231 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d9d3efe381eb014d_4948476f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.\nThis expression logs [sensitive data (private)]... | [
192
] | [
null
] | [
15
] | [
18
] | |
2024-11-18T22:00:22.392007+00:00 | 1,524,833,221,000 | 2ea10c377351690d30754175f063e05164a838d7 | 3 | {
"blob_id": "2ea10c377351690d30754175f063e05164a838d7",
"branch_name": "refs/heads/master",
"committer_date": 1524833221000,
"content_id": "dfaa401bd218d84b1dc5c2eec78e6653cbd4d404",
"detected_licenses": [
"MIT"
],
"directory_id": "88aaad13543ae621272eec34bd2a79a350cb120d",
"extension": "py",
"fi... | 2.671875 | stackv2 | from BaseHTTPServer import BaseHTTPRequestHandler,HTTPServer
from cgi import parse_header, parse_multipart
from urlparse import parse_qs
import os.path,string,WiFi
ADDR = "0.0.0.0"
PORT = 8000
WEBCONT = "WebContent/"
httpd = None
def getWifiOption():
wifiList = WiFi.getAllWifi()
result = ""
if wifiList ... | 78 | 32.64 | 94 | 18 | 629 | python | [{"finding_id": "codeql_py/path-injection_ad6c5b860e7f05da_70043e31", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "remed... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2)."
] | [
49,
51
] | [
null,
null
] | [
52,
22
] | [
59,
29
] | |
2024-11-18T22:00:47.266072+00:00 | 1,512,819,139,000 | 6e4c4334a83a7229692e2b04c2a99b83ab261902 | 2 | {
"blob_id": "6e4c4334a83a7229692e2b04c2a99b83ab261902",
"branch_name": "refs/heads/master",
"committer_date": 1512819139000,
"content_id": "f885f148f281809ec73f7dba5ff0a59cb41a62a8",
"detected_licenses": [
"MIT"
],
"directory_id": "ccc385ce597254483613e48a5e6be905e12dcd6a",
"extension": "py",
"fi... | 2.5 | stackv2 | import os
if __name__ == '__main__':
entries = set()
with open('actual.txt', 'r') as playlist, open('parsed.sh', 'w') as output:
output.write('#!/usr/bin/env bash\n\n')
for line in playlist:
try:
sections = line.split('/')
artist = sections[3]
... | 31 | 30.32 | 145 | 22 | 241 | python | [{"finding_id": "codeql_py/overly-permissive-file_a72ba07b60ce1154_0020c1db", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
31
] | [
null
] | [
5
] | [
33
] | |
2024-11-18T22:01:02.317899+00:00 | 1,689,353,215,000 | 4c91eee58b0a787287b0e0df804885705445f76f | 3 | {
"blob_id": "4c91eee58b0a787287b0e0df804885705445f76f",
"branch_name": "refs/heads/master",
"committer_date": 1689353215000,
"content_id": "328784399ee5bb38422d09fe93d5320d8e78d8f3",
"detected_licenses": [
"MIT"
],
"directory_id": "6ba72ce01fe8c08a10a7607536858cfd40b2dc16",
"extension": "py",
"fi... | 2.65625 | stackv2 | from django.conf import settings
from django.core.exceptions import ValidationError
from django.forms.fields import Field, CharField
from django.utils.translation import gettext_lazy as _
import decimal
from decimal import Decimal, InvalidOperation
import re
class ItemPriceField(Field):
default_error_messages =... | 102 | 32.09 | 101 | 18 | 758 | python | [{"finding_id": "codeql_py/polynomial-redos_58be8c71ef77fc67_99c49922", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma... | 1 | true | [
"CWE-1333"
] | [
"py/polynomial-redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '9'."
] | [
77
] | [
null
] | [
47
] | [
51
] | |
2024-11-18T22:01:10.713493+00:00 | 1,623,948,010,000 | 3c9f22bac11ca17c72a3d4ef849a62dba4ca8638 | 3 | {
"blob_id": "3c9f22bac11ca17c72a3d4ef849a62dba4ca8638",
"branch_name": "refs/heads/master",
"committer_date": 1623948010000,
"content_id": "6c39e90044fe82e42cfeb4ae59e53c51fdae8a9c",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "02be689be654331033d3e1370237343c09f4385e",
"extension": "p... | 2.84375 | stackv2 | #!/usr/bin/env python
# coding: utf-8
"""
Source-level RSA using a searchlight on fMRI data
=================================================
This example demonstrates how to perform representational similarity analysis
(RSA) on volumetric fMRI data, using a searchlight approach.
In the searchlight approach, represe... | 89 | 44.08 | 79 | 10 | 919 | python | [{"finding_id": "codeql_py/tarslip_1092633fcd8f993b_157bd1c6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
39
] | [
null
] | [
null
] | [
4
] | |
2024-11-18T22:15:11.243513+00:00 | 1,668,197,007,000 | 390c9fc0b13b7e71359a4a9c4686e0902d5a89cb | 2 | {
"blob_id": "390c9fc0b13b7e71359a4a9c4686e0902d5a89cb",
"branch_name": "refs/heads/main",
"committer_date": 1668197007000,
"content_id": "569f09459eb429795c4a63e0d9176d99bc6a1cc2",
"detected_licenses": [
"MIT"
],
"directory_id": "6cd49642145b9ccbea0837e4f4427f16eed7a9f4",
"extension": "py",
"file... | 2.3125 | stackv2 | import os
import random
from flask import Flask, jsonify, flash, request, redirect, url_for,send_from_directory,make_response
from werkzeug.utils import secure_filename
from flask_cors import CORS
import uuid as myuuid
import cv2
import glob
import datetime
import numpy as np
import png, pydicom
from ast import literal... | 159 | 34.96 | 120 | 19 | 1,370 | python | [{"finding_id": "codeql_py/url-redirection_4eea728f5f1fa971_87142d64", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
85
] | [
null
] | [
25
] | [
36
] | |
2024-11-18T22:26:12.273950+00:00 | 1,610,283,861,000 | b7b57695d3b77dbcf74d391d4a1884c02c55a0dd | 3 | {
"blob_id": "b7b57695d3b77dbcf74d391d4a1884c02c55a0dd",
"branch_name": "refs/heads/master",
"committer_date": 1610283861000,
"content_id": "4fa32b4762eb2239f8566c2df3b6e27b913b91b6",
"detected_licenses": [
"MIT"
],
"directory_id": "4b51df3145fefb8e594aa26375e3a9d829c39c6a",
"extension": "py",
"fi... | 2.515625 | stackv2 | import logging.config
from lxml import etree
import requests
import yaml
from flask import Flask, abort, jsonify, render_template, request
logging.config.dictConfig(yaml.safe_load("""
version: 1
formatters:
simple:
format: "%(levelname)s from %(name)s: %(message)s"
handlers:
stream_handler:
c... | 101 | 26.21 | 88 | 16 | 635 | python | [{"finding_id": "codeql_py/reflective-xss_6b0f45c41dcadf57_d1f3c945", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 6 | true | [
"CWE-079",
"CWE-918",
"CWE-918",
"CWE-918",
"CWE-117",
"CWE-117"
] | [
"py/reflective-xss",
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"This log ent... | [
55,
54,
61,
77,
78,
83
] | [
null,
null,
null,
null,
null,
null
] | [
12,
21,
21,
21,
38,
74
] | [
57,
68,
68,
68,
48,
84
] | |
2024-11-18T22:26:12.650618+00:00 | 1,559,498,677,000 | 988d0aac6766c3ba760245526da68e9a7c15cd6f | 3 | {
"blob_id": "988d0aac6766c3ba760245526da68e9a7c15cd6f",
"branch_name": "refs/heads/master",
"committer_date": 1559498677000,
"content_id": "57e96dafb66f2b0ac59f9e48102a9f891328ea3a",
"detected_licenses": [
"MIT"
],
"directory_id": "3ba8a81fb2ef7bcdf3a28957fac8577bbed3e9a5",
"extension": "py",
"fi... | 2.734375 | stackv2 | from dataclasses import dataclass
from datetime import datetime
from typing import List, Tuple, Optional
import logging
import pytz
import requests
from requests import HTTPError
from marshmallow import Schema, fields, post_load
# Because this is a library, we don't want to force logs on people if they
# don't confi... | 301 | 29.95 | 79 | 16 | 1,979 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8417f5099e2e136f_2dba0df0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 7 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (p... | [
190,
222,
241,
246,
273,
292,
297
] | [
null,
null,
null,
null,
null,
null,
null
] | [
22,
43,
26,
26,
43,
26,
26
] | [
41,
46,
55,
60,
46,
55,
60
] | |
2024-11-18T20:39:52.488846+00:00 | 1,555,933,182,000 | 1767df03b3e7f418bb33ffcde267aea5deb1d6bb | 3 | {
"blob_id": "1767df03b3e7f418bb33ffcde267aea5deb1d6bb",
"branch_name": "refs/heads/master",
"committer_date": 1555933182000,
"content_id": "b67b1a4254556f62f551fc1f2b444e0ee6993d0a",
"detected_licenses": [
"MIT"
],
"directory_id": "831c8360eb9ddf10b912f2a7b39127143c48f0d2",
"extension": "py",
"fi... | 2.703125 | stackv2 | from telegram.ext import Updater
from telegram.ext import CommandHandler, MessageHandler, Filters
from pprint import pprint as pp
import requests
from conf import *
API_URL = ('http://api.openweathermap.org/data/2.5/weather?q={}&mode=json&units=metric&appid={}')
API_URL_LOC = "http://api.openweathermap.org/data/2.5/w... | 84 | 35.75 | 149 | 16 | 730 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d6b5b5cde3cdf28e_60465b9e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
50
] | [
null
] | [
15
] | [
89
] | |
2024-11-18T21:31:31.686281+00:00 | 1,634,430,788,000 | 8833e343123ee0da7a82bf8c019a95728cb9ffe0 | 3 | {
"blob_id": "8833e343123ee0da7a82bf8c019a95728cb9ffe0",
"branch_name": "refs/heads/master",
"committer_date": 1634430788000,
"content_id": "26abf067159515a813e5a74a18f599ba56c712bc",
"detected_licenses": [
"MIT"
],
"directory_id": "9a6594f0225c161cc67f32680d3705ef4884e38c",
"extension": "py",
"fi... | 3.171875 | stackv2 | import phonenumbers
from phonenumbers import geocoder
from phonenumbers import carrier
import pyfiglet
def show_details(number):
try:
phone_number = phonenumbers.parse(number)
number_location = geocoder.description_for_number(phone_number, 'en')
service_provider = carrier.name_for_number(p... | 33 | 25.91 | 87 | 13 | 214 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_86ae1e0ca4f6c24b_50c899e2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
13,
15
] | [
null,
null
] | [
15,
15
] | [
43,
40
] | |
2024-11-18T21:31:57.819263+00:00 | 1,557,768,528,000 | c7df055e5e825b71233d66d86bf3865ef7ef8f04 | 3 | {
"blob_id": "c7df055e5e825b71233d66d86bf3865ef7ef8f04",
"branch_name": "refs/heads/master",
"committer_date": 1557768528000,
"content_id": "c057218af95c6f886636c646ea2f2af2817ec5d9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "54d0e2a465fff88b93b4fbca3029d15d9f97ea9b",
"extension": "py"... | 2.6875 | stackv2 | import cherrypy
from base64 import b64encode
from hashlib import sha256
from os import urandom
from time import time_ns
from pymongo.database import Database
from api.base import Base
# This class is used for authorizing users with tokens.
@cherrypy.expose
class Authenticate(Base):
def __init__(self, db: Databas... | 46 | 33.15 | 79 | 23 | 376 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6cd7b304040e088a_79730f41", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
21
] | [
null
] | [
34
] | [
62
] | |
2024-11-18T21:32:11.966616+00:00 | 1,618,080,422,000 | c746022617293d08dd25fddbbeda9ba08fdd2412 | 3 | {
"blob_id": "c746022617293d08dd25fddbbeda9ba08fdd2412",
"branch_name": "refs/heads/main",
"committer_date": 1618080422000,
"content_id": "b1cedd9bb9ab3c77333880e7ebd56c6df27668b2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c6ba92f2111632d25a22fbc1cbcd75480dca63bf",
"extension": "py",
... | 3.4375 | stackv2 | from Crypto.Cipher import DES
import binascii
#we can use the DES algorithm like this
#there are several modes (7 modes)
# 1.) ECB: "Electronic Code Book" -> we use DES on every 64 bits long plaintext block
# these blocks are independnt of each other so we use DES seperately on every block
# 2.) CBC: "Cipher... | 58 | 35.43 | 134 | 11 | 518 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_1921efc8f64a1b79_68ed12d7", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptograph... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used."
] | [
39,
43
] | [
null,
null
] | [
12,
12
] | [
34,
35
] | |
2024-11-18T21:32:19.195551+00:00 | 1,671,495,976,000 | 255b19a7826859579bbb1d5de51cffec2ab6fff0 | 3 | {
"blob_id": "255b19a7826859579bbb1d5de51cffec2ab6fff0",
"branch_name": "refs/heads/master",
"committer_date": 1671495976000,
"content_id": "2531953d33ca0efc83a89255bcb5d18bec97c73f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "705622f26400cfb205bbdea85b82d46c81c07263",
"extension": "py"... | 2.546875 | stackv2 | import logging
from hashlib import sha1
from typing import Optional
from django.conf import settings
from django.contrib.auth.models import User
from itsdangerous import BadSignature, TimedJSONWebSignatureSerializer
logger = logging.getLogger("atlas")
def generate_token(user: User, expires_in: int = 3600 * 24 * 30)... | 37 | 29.54 | 76 | 16 | 276 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_550e9cac8d5c6ed1_5ab664cf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
37
] | [
null
] | [
17
] | [
64
] | |
2024-11-18T21:32:19.707794+00:00 | 1,554,272,298,000 | ef05fe0a78527334217f6ef612fa2969cd1895d6 | 3 | {
"blob_id": "ef05fe0a78527334217f6ef612fa2969cd1895d6",
"branch_name": "refs/heads/master",
"committer_date": 1554272298000,
"content_id": "ca7b75da15246c036159435f7251b9c11783466f",
"detected_licenses": [
"MIT"
],
"directory_id": "cd77533244aada190434f2d493fa6d40ae0765a1",
"extension": "py",
"fi... | 2.53125 | stackv2 | import warnings
warnings.filterwarnings("ignore")
from flask import Flask, request, Response, redirect, jsonify
import jsonpickle, os
import numpy as np
import pickle, cv2, uuid, datetime
import ElRoiApp.roi_backbone.api as face_recognition
import ElRoiApp.roi_backbone.mlearning_knn_model as mlearning
import dlib
det... | 137 | 34.78 | 110 | 15 | 1,191 | python | [{"finding_id": "codeql_py/url-redirection_6f493578322f693f_9598113c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
34,
39
] | [
null,
null
] | [
29,
29
] | [
40,
40
] | |
2024-11-18T21:32:21.314837+00:00 | 1,449,415,838,000 | ea030e55edf9f372c2ee5a0c5fec845178ba1376 | 3 | {
"blob_id": "ea030e55edf9f372c2ee5a0c5fec845178ba1376",
"branch_name": "refs/heads/master",
"committer_date": 1449415838000,
"content_id": "64eb88c5148bc8e8e5ce25a69a0fca570f2052fe",
"detected_licenses": [
"MIT"
],
"directory_id": "f3545d695c0dde854598d66a308b67e15727085c",
"extension": "py",
"fi... | 2.6875 | stackv2 | """Copyright (c) 2012 Charles Kaminski (CharlesKaminski@gmail.com)
Permission is hereby granted, free of charge, to any person
obtaining a copy of this software and associated documentation
files (the "Software"), to deal in the Software without
restriction, including without limitation the rights to use,
copy, modify... | 414 | 30.15 | 80 | 16 | 3,516 | python | [{"finding_id": "codeql_py/bad-tag-filter_3fc2437f4440ddc9_b83da5f7", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match script end tags like </script >.", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match script end tags like </script >."
] | [
35
] | [
null
] | [
13
] | [
46
] | |
2024-11-18T21:33:02.637845+00:00 | 1,593,260,115,000 | 6fa21a238e7d52658f7679ed28338e73d49ac3e4 | 3 | {
"blob_id": "6fa21a238e7d52658f7679ed28338e73d49ac3e4",
"branch_name": "refs/heads/master",
"committer_date": 1593260115000,
"content_id": "c536f33fc4792915009506afece3c22c889d9392",
"detected_licenses": [
"MIT"
],
"directory_id": "7c1572cff5c78b587ada922a25ccbbd23978def4",
"extension": "py",
"fi... | 2.953125 | stackv2 | from Crypto.Cipher import PKCS1_OAEP
from Crypto.PublicKey import RSA
import base64
def genrateKeys(private_key_path, public_key_path):
private_key = RSA.generate(1024)
public_key = private_key.publickey()
private_pem = private_key.exportKey().decode()
public_pem = public_key.exportKey().decode()
... | 40 | 30.93 | 75 | 15 | 342 | python | [{"finding_id": "codeql_py/weak-crypto-key_0b8693d0332dee66_32ad343d", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
7
] | [
null
] | [
19
] | [
37
] | |
2024-11-18T21:49:06.631666+00:00 | 1,622,575,048,000 | 3c0e49bcb598dd221d068343e6ffe92f1c32910f | 3 | {
"blob_id": "3c0e49bcb598dd221d068343e6ffe92f1c32910f",
"branch_name": "refs/heads/main",
"committer_date": 1622575048000,
"content_id": "3af717511067a9b5ca611f4ab05ced8c7f8110af",
"detected_licenses": [
"Unlicense"
],
"directory_id": "67889387912976b86c282d9a5adc1f9e16913ba7",
"extension": "py",
... | 2.765625 | stackv2 | # -*- coding: utf-8 -*-
"""
File: pwned_password.py
Description: Tasks related to API calls to pwnedpasswords.com. For more info on
the API docs, see https://haveibeenpwned.com/API/v2
Author: E. Chris Pedro
Created: 2020-01-20
This is free and unencumbered software released into the public domain.
Anyone is free to... | 70 | 34.81 | 79 | 15 | 611 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b6eace94dd222b14_19fc1d15", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
57
] | [
null
] | [
25
] | [
47
] | |
2024-11-18T22:42:15.085468+00:00 | 1,589,727,113,000 | 4a40b001bc5fccc5d7611838da9103640cb68f64 | 4 | {
"blob_id": "4a40b001bc5fccc5d7611838da9103640cb68f64",
"branch_name": "refs/heads/master",
"committer_date": 1589727113000,
"content_id": "92587e16d34ca9ec9e345f2f0259f529305cfc9c",
"detected_licenses": [
"MIT"
],
"directory_id": "996ec3531fa8ed6d389b5199300f235df9e3e0c4",
"extension": "py",
"fi... | 3.640625 | stackv2 | from amnesiac import blurry_memory
import random
import string
class Chromosome:
"""
CLass to define password.
Sequence refers to the password string.
Fitness refers to the fitness value received for the password from blurry_memory method
"""
def __init__(self, sequence, fitness=None):
... | 150 | 36.06 | 105 | 13 | 1,263 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_31ef52a92af01cff_9b54e294", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
148
] | [
null
] | [
26
] | [
39
] | |
2024-11-18T20:31:24.088798+00:00 | 1,482,343,724,000 | 309a43eabdc2a4e7f8f48c139f47628a8b3954f9 | 2 | {
"blob_id": "309a43eabdc2a4e7f8f48c139f47628a8b3954f9",
"branch_name": "refs/heads/master",
"committer_date": 1482343729000,
"content_id": "c1d221e1f213b1e3ee5b309ebde0ff961638a5b3",
"detected_licenses": [
"MIT"
],
"directory_id": "a2f67937ab7ef9519572b573e73da5654b891362",
"extension": "py",
"fi... | 2.3125 | stackv2 | # Copyright (C) 2016 Codethink Limited
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU Affero General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is dist... | 85 | 30.69 | 93 | 21 | 616 | python | [{"finding_id": "codeql_py/bad-tag-filter_0c9e7601d311df0c_16e662f2", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression only parses --> and not --!> as a HTML comment end tag.", "remediation": "", "location":... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression only parses --> and not --!> as a HTML comment end tag."
] | [
70
] | [
null
] | [
28
] | [
37
] | |
2024-11-18T20:31:35.777765+00:00 | 1,607,650,454,000 | 493d680889fd991218eb9e0376932e251ce61a4a | 2 | {
"blob_id": "493d680889fd991218eb9e0376932e251ce61a4a",
"branch_name": "refs/heads/master",
"committer_date": 1607650454000,
"content_id": "72466deb9028ee3e22de90c4f14b2a41c6a162f2",
"detected_licenses": [
"MIT"
],
"directory_id": "fb748834fe2f16e360a4de6b89dca84b148ae2fa",
"extension": "py",
"fi... | 2.390625 | stackv2 | import requests
import json
try:
requests.packages.urllib3.disable_warnings()
except:
pass
hostname = "198.18.133.27"
username = "admin"
password = "C1sco12345"
endpoint_name = "IOT_Assets"
endpoint_description = "PLCs, HMIs, and other IOT Assets"
print(f"\n==> Creates a new endpoint group.")
if __name__ ==... | 37 | 27.92 | 131 | 15 | 269 | python | [{"finding_id": "codeql_py/request-without-cert-validation_91cc49e17d61b431_290cc619", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
29
] | [
null
] | [
20
] | [
132
] | |
2024-11-18T20:31:36.169008+00:00 | 1,591,381,368,000 | de99cda1f8a8ed32faf71a38ee1264419642d48e | 3 | {
"blob_id": "de99cda1f8a8ed32faf71a38ee1264419642d48e",
"branch_name": "refs/heads/master",
"committer_date": 1591381368000,
"content_id": "80ef132a3cb12645f9b719bdae25f3a514377fd8",
"detected_licenses": [
"MIT"
],
"directory_id": "16b42d0f6fac8ae6009b23683633aa837bab6f1f",
"extension": "py",
"fi... | 2.609375 | stackv2 | from flask import Flask,request
from flask_cors import CORS,cross_origin
app = Flask(__name__)
cors=CORS(app)
queue = []
RFID = []
count = 0
if __name__ == '__main__':
app.run()
@app.route('/')
@cross_origin()
def hello():
return "Server Working Fine!!!"
@app.route('/airportInfo/<string:name>')
@cross_ori... | 70 | 21.94 | 81 | 13 | 389 | python | [{"finding_id": "codeql_py/reflective-xss_ddef0e6eeaf69e6d_089dfee3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
22,
27,
32
] | [
null,
null,
null
] | [
12,
12,
12
] | [
56,
52,
67
] | |
2024-11-18T20:53:34.835302+00:00 | 1,610,630,905,000 | 32982bf5d17bd3725ee74b7049112c3e37b3cb87 | 3 | {
"blob_id": "32982bf5d17bd3725ee74b7049112c3e37b3cb87",
"branch_name": "refs/heads/main",
"committer_date": 1610630905000,
"content_id": "3d01926ee8477b800a26bda49fd1b6e6e36104b5",
"detected_licenses": [
"MIT"
],
"directory_id": "deeca3b09a3a40ea84005268980d34a14ec82b72",
"extension": "py",
"file... | 3.265625 | stackv2 | import random
import secrets
import hashlib
import uuid
def hash_function(password):
#generate a random uuid as salt
salt = uuid.uuid4().hex
print("\nsalt = "+salt)
return hashlib.sha256(salt.encode("ascii", "replace")+password.encode("ascii", "replace")).hexdigest()+':'+salt
def check_password(ha... | 30 | 40.63 | 125 | 15 | 219 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7a4e60cab97ddd53_5af9a636", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-327",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[... | [
22,
29,
12,
17
] | [
null,
null,
null,
null
] | [
7,
8,
27,
39
] | [
31,
40,
94,
113
] | |
2024-11-18T20:53:38.249633+00:00 | 1,676,139,610,000 | 4525af595d249342f431392a7d2518626b826e08 | 3 | {
"blob_id": "4525af595d249342f431392a7d2518626b826e08",
"branch_name": "refs/heads/master",
"committer_date": 1676139610000,
"content_id": "c8c3266516e19f1e9ec32e84e151d824212c78d6",
"detected_licenses": [
"MIT"
],
"directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9",
"extension": "py",
"fi... | 3.046875 | stackv2 | # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# b... | 115 | 40.9 | 128 | 11 | 1,920 | python | [{"finding_id": "codeql_py/overly-large-range_f432b605c5d5952d_3fd9c61d", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\d in the same character class.", "remediation": "", "loc... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\d in the same character class."
] | [
58
] | [
null
] | [
47
] | [
50
] | |
2024-11-18T21:10:20.904608+00:00 | 1,625,042,016,000 | 612d1489b6654e12ba7ab5561ab59b92ef6cb0c2 | 3 | {
"blob_id": "612d1489b6654e12ba7ab5561ab59b92ef6cb0c2",
"branch_name": "refs/heads/main",
"committer_date": 1625042016000,
"content_id": "b306db8cfde608f7c8bcbe954e0643f8f251b0b3",
"detected_licenses": [
"MIT"
],
"directory_id": "a228cd9bd9a2a650736e2b944d6d95a9bfbf0850",
"extension": "py",
"file... | 2.703125 | stackv2 | import requests
from bs4 import BeautifulSoup as bs
from datetime import datetime
url = "http://sejong.korea.ac.kr/campuslife/facilities/dining/weeklymenu"
def get_bob_image():
res = requests.get(url, verify=False)
soup = bs(res.text, 'html.parser')
for a in soup.select('a'):
if a.text == "교직원식당 ... | 37 | 29.89 | 73 | 23 | 288 | python | [{"finding_id": "codeql_py/request-without-cert-validation_814c8ac6051ab7a9_c9b02175", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
8,
17
] | [
null,
null
] | [
11,
11
] | [
42,
42
] | |
2024-11-18T21:10:22.915785+00:00 | 1,580,934,154,000 | e63a4b77607bd5bfe5710a42007629c3e97146df | 3 | {
"blob_id": "e63a4b77607bd5bfe5710a42007629c3e97146df",
"branch_name": "refs/heads/master",
"committer_date": 1580934154000,
"content_id": "124a2e8454bb2b1d96c090f6cef9b642fb28d1f4",
"detected_licenses": [
"MIT"
],
"directory_id": "c6e20198e54d2bdb361640aee0fd5811b3d49978",
"extension": "py",
"fi... | 2.609375 | stackv2 | import json
import os
VCR_ANNOTS_DIR = '/mnt/home/yangshao/vcr/train_val_data'
GENDER_NEUTRAL_NAMES = ['Casey', 'Riley', 'Jessie', 'Jackie', 'Avery', 'Jaime', 'Peyton', 'Kerry', 'Jody', 'Kendall',
'Peyton', 'Skyler', 'Frankie', 'Pat', 'Quinn']
def tokenize(tokenized_sent, obj_to_type):
res =... | 37 | 40.3 | 117 | 17 | 414 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_89645384b421936c_277a0324", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
31
] | [
null
] | [
25
] | [
59
] | |
2024-11-18T21:10:34.664109+00:00 | 1,558,507,397,000 | b53d84df915c2b06d530629b61d52cfcb47dc0fa | 3 | {
"blob_id": "b53d84df915c2b06d530629b61d52cfcb47dc0fa",
"branch_name": "refs/heads/master",
"committer_date": 1558507397000,
"content_id": "2ea608c74b5f4982884c705a8fe9f8dc2d6a2d75",
"detected_licenses": [
"MIT"
],
"directory_id": "eb6eeb0b983b76e89443c02ff98fb4cd5fde48cb",
"extension": "py",
"fi... | 3.34375 | stackv2 | import hashlib
class User(object):
def __init__(self, username, password):
self.username = username
self.password = self._encrypt_pw(password)
self.is_logged_in = False
def _encrypt_pw(self, password):
hash_string = (self.username + password)
hash_string = hash_string... | 28 | 23.46 | 58 | 11 | 141 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_242f9142713ad4c1_747ca5dc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
14
] | [
null
] | [
31
] | [
42
] | |
2024-11-18T21:11:12.081770+00:00 | 1,550,465,485,000 | 4f7e5ec57c33bbf16e3a658e91d51c2849643ca5 | 3 | {
"blob_id": "4f7e5ec57c33bbf16e3a658e91d51c2849643ca5",
"branch_name": "refs/heads/master",
"committer_date": 1550465485000,
"content_id": "3a0619f504711a33edf920d1e97d341ac8375709",
"detected_licenses": [
"MIT"
],
"directory_id": "fa5112354ad4f3f73c2e2532f8689aefe605f3ea",
"extension": "py",
"fi... | 2.96875 | stackv2 |
from flask import Flask, request, jsonify
from .processor import Processor
import json
def create_app():
import nltk
nltk.download('punkt') # Download nltk data used for newspaper NLP
app = Flask(__name__)
@app.route('/')
def hello_world():
return jsonify({ "ok": True })
@app.route... | 34 | 24.09 | 71 | 16 | 184 | python | [{"finding_id": "codeql_py/stack-trace-exposure_0a853ec4089fa661_0cd86426", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
28
] | [
null
] | [
28
] | [
38
] | |
2024-11-18T21:47:36.256011+00:00 | 1,645,324,610,000 | 60f4bdee7e32222c3475504e526b336b71fe81e2 | 3 | {
"blob_id": "60f4bdee7e32222c3475504e526b336b71fe81e2",
"branch_name": "refs/heads/master",
"committer_date": 1645324610000,
"content_id": "1f58ff5b1ac08afbac6ea33fc59c18b7f28529f4",
"detected_licenses": [
"MIT"
],
"directory_id": "7fbda7ec849047ef3af3d34b10ecfd9c0e75aa50",
"extension": "py",
"fi... | 3 | stackv2 | from collections import namedtuple
from Crypto import Random
from Crypto.Cipher import AES
from Crypto.Hash import HMAC
from Crypto.Hash import SHA256
from Crypto.Protocol import KDF
EncryptedKey = namedtuple('EncryptedKey', ['salt', 'rounds', 'encrypted_key'])
class PBKDF2SHA256AES256(object):
KDF_NAME = 'PBK... | 63 | 35.89 | 78 | 17 | 559 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_bd351febaa7f2732_bb590863", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
46,
62
] | [
null,
null
] | [
25,
15
] | [
48,
62
] | |
2024-11-18T21:47:40.365241+00:00 | 1,643,706,550,000 | 8f051d4862810c5028fb895a68710efa06b0986b | 3 | {
"blob_id": "8f051d4862810c5028fb895a68710efa06b0986b",
"branch_name": "refs/heads/main",
"committer_date": 1643706550000,
"content_id": "de4ba40b647278e5945043c25dd98bd139669b03",
"detected_licenses": [
"MIT"
],
"directory_id": "8e2162cb9e763badfd10ede3ea8bbd852dc0aebe",
"extension": "py",
"file... | 2.65625 | stackv2 | from PIL import Image
from os import path
from collections import Counter
from wordcloud import WordCloud, STOPWORDS, ImageColorGenerator, get_single_color_func
from matplotlib.patches import Patch #NEW
import matplotlib.pyplot as plt
import numpy as np
from matplotlib import cm, colors
from urllib import parse as pars... | 213 | 34.62 | 102 | 16 | 1,874 | python | [{"finding_id": "codeql_py/request-without-cert-validation_7cd649af5d268be9_ea4827ce", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
28
] | [
null
] | [
14
] | [
53
] | |
2024-11-18T22:28:48.110927+00:00 | 1,467,622,508,000 | f89b744b7ad789ea923d838847acbf93dc6e7f60 | 2 | {
"blob_id": "f89b744b7ad789ea923d838847acbf93dc6e7f60",
"branch_name": "refs/heads/master",
"committer_date": 1467622508000,
"content_id": "4bb58f7467291fc91badc9731fa979d1b2ad7559",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bd9b4e3793862e8f611b1af33fe925f619a930fa",
"extension": "py"... | 2.46875 | stackv2 | import asyncio
import hashlib
from aiohttp import web
from leela.core.service import LeelaService
from leela.core.decorators import leela_post
SESSION_USER_KEY = '_leela_user'
class authorization(object):
def __init__(self, *roles):
self.__roles = set(roles)
def allowed_roles(self):
return... | 73 | 28.36 | 76 | 15 | 438 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_20bc0c019d0296f8_37251832", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally e... | [
30,
35
] | [
null,
null
] | [
35,
35
] | [
52,
52
] | |
2024-11-18T22:29:30.754786+00:00 | 1,595,347,148,000 | 7b73edfd9c1b29db117adba23706dcbca59d1933 | 2 | {
"blob_id": "7b73edfd9c1b29db117adba23706dcbca59d1933",
"branch_name": "refs/heads/master",
"committer_date": 1595347148000,
"content_id": "32e01241c42863a164d2f0858bcc6eb6ed29e3f5",
"detected_licenses": [
"MIT"
],
"directory_id": "f430b97a90639906c1d6f879a9107bd3b488ae0f",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python3
from multiprocessing import shared_memory
import logging
import signal
import json
from flask import Flask, request
from multiprocessing import Process
from mqtt2timescale.postgres_connector import TimescaleConnector
from mqtt2timescale.mqtt_app import setup_mqtt
from utils.environment import M... | 59 | 31.08 | 103 | 14 | 449 | python | [{"finding_id": "codeql_py/log-injection_0d86c24100ea9221_39ef9b32", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
27
] | [
null
] | [
22
] | [
40
] | |
2024-11-18T22:29:37.812621+00:00 | 1,450,920,455,000 | 5aeb04c1fa25bd6998ac2f1de0abd974b714ee38 | 2 | {
"blob_id": "5aeb04c1fa25bd6998ac2f1de0abd974b714ee38",
"branch_name": "refs/heads/master",
"committer_date": 1450920455000,
"content_id": "3b0af94ae539e4790bfa812c0623cbb8abb7e86c",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "551721b32c5808f12d413d5fb0c3f2ad6395ad4f",
"extension": "p... | 2.421875 | stackv2 | #from gevent import monkey
#monkey.patch_all()
import socket
import httplib
import time
import Queue
import os
import errno
import logging
import utils
import ssl
class Connection():
def __init__(self, sock):
self.sock = sock
self.create_time = time.time()
def close(self):
self.sock.... | 169 | 32.64 | 135 | 20 | 1,233 | python | [{"finding_id": "codeql_py/insecure-default-protocol_1201d9f9ff1ee776_cf0d1410", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/insecure-default-protocol",
"py/insecure-default-protocol"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.",
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
51,
53
] | [
null,
null
] | [
32,
32
] | [
103,
83
] | |
2024-11-18T22:29:41.034054+00:00 | 1,550,551,014,000 | b71f93d2568a2c5d5f46aeeae20c2e8964737539 | 2 | {
"blob_id": "b71f93d2568a2c5d5f46aeeae20c2e8964737539",
"branch_name": "refs/heads/master",
"committer_date": 1550551014000,
"content_id": "5c1657177275024d2c34be3d912d84ee53122f8b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f134311292b98506f9d3d2ece2ac2e7e295a2496",
"extension": "py"... | 2.484375 | stackv2 | from django.shortcuts import render, redirect
from django.views import View
from tf_identification.forms import UploadFileForm
from webapp.settings import BASE_DIR
from django.utils.crypto import get_random_string
import time, os, random
def handle_uploaded_file(f, filename, gorilla, topTF):
''' Handle and process... | 96 | 46 | 172 | 17 | 927 | python | [{"finding_id": "codeql_py/command-line-injection_13618e0ecc3d84c5_e8dbef9b", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 3 | true | [
"CWE-078",
"CWE-022",
"CWE-022"
] | [
"py/command-line-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
18,
67,
70
] | [
null,
null,
null
] | [
15,
27,
27
] | [
92,
83,
83
] | |
2024-11-18T22:40:37.278451+00:00 | 1,476,701,703,000 | 8218bbd1a8746001fe7d6d0f23cdf5c6a08acc63 | 2 | {
"blob_id": "8218bbd1a8746001fe7d6d0f23cdf5c6a08acc63",
"branch_name": "refs/heads/master",
"committer_date": 1476701703000,
"content_id": "ca538b29b20fad05aa43b1dff7f066d34a155ecf",
"detected_licenses": [
"MIT"
],
"directory_id": "0aebf6e8bdf6de43f038dea01741645a4febd451",
"extension": "py",
"fi... | 2.4375 | stackv2 | import requests
import json
class Connection:
def __init__(self, serverUrl):
self.url = serverUrl
self.auth = ""
def get_token(self, nutzer, passwd):
requestString = self.url + "/gettoken"
r = requests.post(requestString,
data={'nutzer': nutzer, '... | 122 | 27.33 | 156 | 14 | 845 | python | [{"finding_id": "codeql_py/request-without-cert-validation_86c1c67688bf2a3d_f6a7bd22", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 7 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
16,
32,
48,
64,
80,
96,
111
] | [
17,
33,
49,
65,
81,
97,
112
] | [
13,
13,
13,
13,
13,
13,
13
] | [
82,
137,
81,
97,
157,
75,
64
] | |
2024-11-18T22:41:16.845048+00:00 | 1,389,446,625,000 | 76ec47e4038b90dc92706217cdd534551977567c | 3 | {
"blob_id": "76ec47e4038b90dc92706217cdd534551977567c",
"branch_name": "refs/heads/master",
"committer_date": 1389446625000,
"content_id": "3a5d2a4dbd55173ed13451a1ac318058d99d259d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c8e2b03672f71b83ae1c064b3cfc0550ee849399",
"extension": "py"... | 2.59375 | stackv2 | #!/usr/bin/env python
from RibParser import RibDump
from optparse import OptionParser
from pybgpdump import BGPDump
from os import listdir
from os.path import isfile, join
import pygal
import tarfile
from operator import itemgetter
import math
resourcesPath="../../resources/"
bgpUpdatesPath = resourcesPath + "updat... | 221 | 36.15 | 176 | 17 | 2,096 | python | [{"finding_id": "codeql_py/tarslip_97c470e5fd20b8ba_8221b9b9", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
29
] | [
null
] | [
5
] | [
10
] | |
2024-11-18T22:54:05.005306+00:00 | 1,531,307,986,000 | ff11fb2a09cbfd0ef55ebb956c02f8220c8058b7 | 2 | {
"blob_id": "ff11fb2a09cbfd0ef55ebb956c02f8220c8058b7",
"branch_name": "refs/heads/master",
"committer_date": 1531307986000,
"content_id": "b131fdef4dac4c3d85daa2260d08204d455de773",
"detected_licenses": [
"MIT"
],
"directory_id": "714f0b053cfb18e473097b33dc80a593e1cf7350",
"extension": "py",
"fi... | 2.390625 | stackv2 |
import sys
import os
import re
import jinja2 as jj
from .params import Params
class Template:
"""
"""
def __init__(self,
params=None,
iframe=True):
"""
"""
dir_file = os.path.dirname(os.path.abspath(__file__))
dir_template = os.path.joi... | 43 | 23.49 | 61 | 13 | 194 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b0b0df2d8f3354b6_3eff6589", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25
] | [
30
] | [
15
] | [
31
] | |
2024-11-18T22:54:05.652798+00:00 | 1,600,752,443,000 | 7ecd9eeb4e4068fcd431f9e7134d50dfcc8a4ce3 | 3 | {
"blob_id": "7ecd9eeb4e4068fcd431f9e7134d50dfcc8a4ce3",
"branch_name": "refs/heads/master",
"committer_date": 1600752443000,
"content_id": "cafe19f3a6eb63bc85745de0bc7a287e226f1141",
"detected_licenses": [
"MIT"
],
"directory_id": "89aa88c7e458c545de2fd01f9cb81216da4bdda7",
"extension": "py",
"fi... | 2.640625 | stackv2 | from flask import Flask, render_template, request, url_for
from pymongo import MongoClient
import datetime, pprint, os
app = Flask(__name__)
client = MongoClient('localhost', 27017)
db = client.test_database
collection = db.test_collection
@app.route("/hello")
@app.route('/hello/<name>')
def hello(name=None):
re... | 44 | 28.27 | 101 | 14 | 306 | python | [{"finding_id": "codeql_py/path-injection_0cacce18aebf410c_f7786bb4", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
32
] | [
null
] | [
16
] | [
34
] | |
2024-11-18T20:55:05.153939+00:00 | 1,565,683,031,000 | 2ec53b5f1243e54a9215373fb36ebd4c3b7372c9 | 2 | {
"blob_id": "2ec53b5f1243e54a9215373fb36ebd4c3b7372c9",
"branch_name": "refs/heads/master",
"committer_date": 1565683031000,
"content_id": "eba5021099e3e00b809502c6a38dcb3e9e85598b",
"detected_licenses": [
"MIT"
],
"directory_id": "6fe88652de578f5a5b5fa8cd11ff824b7bd3af9c",
"extension": "py",
"fi... | 2.375 | stackv2 | from flask import render_template, redirect, url_for, flash, request
from . import auth
from flask_login import login_required, login_user, logout_user
from ..models import Writer
from .forms import RegistrationForm, LoginForm
from .. import db
from ..writer import writer_user
@auth.route('/login', methods=['GET', 'PO... | 36 | 39.75 | 114 | 16 | 309 | python | [{"finding_id": "codeql_py/url-redirection_fe464a2e8c6f43c2_dc7f779e", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
17
] | [
null
] | [
29
] | [
89
] | |
2024-11-18T20:55:06.714562+00:00 | 1,601,846,670,000 | 15db09a244768d4d9b49be70d00e4c8b65be98df | 2 | {
"blob_id": "15db09a244768d4d9b49be70d00e4c8b65be98df",
"branch_name": "refs/heads/master",
"committer_date": 1601846670000,
"content_id": "18551516b3800e7e501208407e12061b7a8f5431",
"detected_licenses": [
"MIT"
],
"directory_id": "8a1d2e6946f3c9c8003ddf3b96cb5ba06762c62c",
"extension": "py",
"fi... | 2.328125 | stackv2 | import paramiko
import sys
import argparse, time
arg_parser = argparse.ArgumentParser()
arg_parser.add_argument('hostname', type=str)
arg_parser.add_argument('username', type=str)
arg_parser.add_argument('password', type=str)
args = arg_parser.parse_args()
## EDIT SSH DETAILS ##
SSH_COMMAND = "uname -a"
## CODE BE... | 32 | 24.53 | 89 | 11 | 190 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_759033da3b87282f_ac2a4e92", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
19
] | [
null
] | [
null
] | [
58
] | |
2024-11-18T21:33:16.201116+00:00 | 1,531,911,765,000 | 1a3b1b43b2d12f0aab1901e62e2366baf896d12e | 2 | {
"blob_id": "1a3b1b43b2d12f0aab1901e62e2366baf896d12e",
"branch_name": "refs/heads/master",
"committer_date": 1531911765000,
"content_id": "d58343db6c4f2902f618ed92a478985791693a40",
"detected_licenses": [
"MIT"
],
"directory_id": "d6b357f7551db033c96fefe3083bd1e2563160d8",
"extension": "py",
"fi... | 2.421875 | stackv2 | import graphene
from db import db_session
from schema_models import PeopleCredentialSchemaModel
from db_models import PeopleCredentialDBModel
import jwt
class LoginParams(graphene.InputObjectType):
username = graphene.String(description='username or email.', required=True)
password = graphene.String(required... | 70 | 29.47 | 81 | 18 | 400 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_ab2269fb6d9bc3df_422393e9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
28
] | [
null
] | [
41
] | [
49
] | |
2024-11-18T21:56:07.419287+00:00 | 1,559,066,815,000 | 312fbaf4e4a4cbc8222af449ce188116fa04be23 | 3 | {
"blob_id": "312fbaf4e4a4cbc8222af449ce188116fa04be23",
"branch_name": "refs/heads/master",
"committer_date": 1559066815000,
"content_id": "8907339dc6a1a27e4d3eddce56fc99f6b98d723f",
"detected_licenses": [
"MIT"
],
"directory_id": "c7aa860868f150226ec3290489e73307223a5677",
"extension": "py",
"fi... | 2.734375 | stackv2 | import json
import re
import requests
from bs4 import BeautifulSoup, NavigableString
from constants import SEARCH_OBJECT_TYPE, OPEN_SEARCH, TOOLTIP, Q_COLORS, TOOLTIP_ARGS
from tooltip import build_tooltip
class OpenSearchError(Exception):
pass
class SearchObjectError(Exception):
pass
class OpenSearch:
... | 254 | 39.12 | 152 | 26 | 2,063 | python | [{"finding_id": "codeql_py/overly-large-range_41961f7e4daaf857_7cce1241", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
51
] | [
null
] | [
51
] | [
54
] | |
2024-11-18T22:39:33.047839+00:00 | 1,499,322,368,000 | 6f125d830efc7f290bdf8a57fc765772f5c39e97 | 3 | {
"blob_id": "6f125d830efc7f290bdf8a57fc765772f5c39e97",
"branch_name": "refs/heads/master",
"committer_date": 1499322368000,
"content_id": "db2259ddc303ec76ca85a75a6464dcc024fc7301",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e5499f5c1bd0ddfc15c8178efbb828185a980391",
"extension": "py"... | 2.609375 | stackv2 | """Compile the website"""
import os.path
import glob
import jinja2
import subprocess
import json
from gul import task
from gul import run
@task('html')
def html():
write_html(
source='src/html/*.html',
dest='dist',
context=json.load(open('src/data/global.json')))
def write_html(source:... | 55 | 24.42 | 66 | 15 | 328 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ce921907ba8489c8_1b1f9543", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
24
] | [
null
] | [
11
] | [
67
] | |
2024-11-18T22:39:40.637463+00:00 | 1,622,599,584,000 | 0f314ee0e9ec4f11ebd38e4fe588ebc138df97b7 | 2 | {
"blob_id": "0f314ee0e9ec4f11ebd38e4fe588ebc138df97b7",
"branch_name": "refs/heads/main",
"committer_date": 1622599584000,
"content_id": "1a94ca08c8323ed4c3d4237039fd6c5e094d334b",
"detected_licenses": [
"MIT"
],
"directory_id": "90f223fecb93da48cccaeec51b99b23e77a05b43",
"extension": "py",
"file... | 2.328125 | stackv2 | from flask import Blueprint, Response, jsonify, request
from flask_cors import CORS
from routes.analizer import interpreter
tables = Blueprint('tables', __name__)
CORS(tables)
@tables.route('/create/<db>/<name>', methods=['GET'])
def create(db, name):
return {"msg": f'table {name} created'}, 200
@tables.route('/s... | 23 | 30.09 | 55 | 11 | 193 | python | [{"finding_id": "codeql_py/reflective-xss_46d130f1ec60532f_f8cebac0", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
9
] | [
null
] | [
12
] | [
49
] | |
2024-11-18T22:54:59.443566+00:00 | 1,463,293,550,000 | 0f7c721d301e8c2ddfceaa69e97ebe076ceceb0b | 3 | {
"blob_id": "0f7c721d301e8c2ddfceaa69e97ebe076ceceb0b",
"branch_name": "refs/heads/master",
"committer_date": 1463293550000,
"content_id": "fa6802eb90ead014e26a6d246561f3285e9f4707",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "dea439d3f49922448e97e11147eba2ca14a63c9b",
"extension": "p... | 2.5625 | stackv2 |
# coding: utf-8
# This is an example of registering a python web service. You can access the a service which
# is registered by name /python-web by http://localhost/app/python-web
# In[ ]:
#This creates a web service located off
import tornado.web
class MainHandler(tornado.web.RequestHandler):
def get(sel... | 146 | 19.53 | 98 | 11 | 764 | python | [{"finding_id": "codeql_py/reflective-xss_f99239faf8ffdea1_39d623b8", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
15
] | [
null
] | [
24
] | [
58
] | |
2024-11-18T22:55:04.105955+00:00 | 1,631,647,664,000 | a0d3109a19aa7664c1bc97e8647e69c2cc5d32fe | 2 | {
"blob_id": "a0d3109a19aa7664c1bc97e8647e69c2cc5d32fe",
"branch_name": "refs/heads/main",
"committer_date": 1631647664000,
"content_id": "73763f8c6c8e9542675647c193fa8f85b1b6f424",
"detected_licenses": [
"MIT"
],
"directory_id": "901888d95a32287d63dcf6fa70e77324b55345b9",
"extension": "py",
"file... | 2.4375 | stackv2 | import os
import gpxpy
import numpy as np
import pandas as pd
import geo
from flask import Flask, flash, request, redirect, url_for, render_template, send_from_directory
from werkzeug.utils import secure_filename
from gpxpy.geo import distance, Location
from pathlib import Path
os.chdir(os.path.dirname(os.path.abspath... | 183 | 33.35 | 155 | 17 | 1,592 | python | [{"finding_id": "codeql_py/flask-debug_de44d72a532c3c3a_9584c107", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-601",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
183,
123,
129
] | [
null,
null,
null
] | [
5,
29,
29
] | [
40,
40,
40
] | |
2024-11-18T22:44:14.950794+00:00 | 1,548,790,664,000 | 7f734179dcaa1a829501d2ee30aa3a2ef89ef41a | 3 | {
"blob_id": "7f734179dcaa1a829501d2ee30aa3a2ef89ef41a",
"branch_name": "refs/heads/master",
"committer_date": 1548790664000,
"content_id": "c3e6c0601373546e1d3eec8eb6b88099db478be1",
"detected_licenses": [
"MIT"
],
"directory_id": "3d26e4da25a9b0938c523bae8d6c6a05e41bff87",
"extension": "py",
"fi... | 2.625 | stackv2 | ''' City display app '''
from climates import weather
from utilities import get_latin
from datetime import datetime, timedelta
from flask import Flask, redirect, render_template
import json
import random
import re
app = Flask(__name__)
import glob
seeds = [c[-1] for c in glob.glob(app.static_folder + '/data/*')]
see... | 219 | 28.47 | 78 | 16 | 1,621 | python | [{"finding_id": "codeql_py/flask-debug_dfd91f70470594f1_e7d94bce", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
218,
51,
53,
55
] | [
null,
null,
null,
null
] | [
5,
13,
13,
13
] | [
51,
63,
62,
66
] | |
2024-11-18T23:10:45.058651+00:00 | 1,674,429,471,000 | 49b4e0b91d57155a69ce4080265a0ee06dd8bf3c | 3 | {
"blob_id": "49b4e0b91d57155a69ce4080265a0ee06dd8bf3c",
"branch_name": "refs/heads/main",
"committer_date": 1674429471000,
"content_id": "f827dc3151deda496a84de6fc9aa5809d377ab0e",
"detected_licenses": [
"MIT"
],
"directory_id": "159d4ae61f4ca91d94e29e769697ff46d11ae4a4",
"extension": "py",
"file... | 2.984375 | stackv2 | import tarfile
import zipfile
class Archive(object):
def __init__(self, path: str):
self.file_path = path
def unpack(self, directory):
if self.file_path.endswith(".zip"):
return self.__extract_zip(directory)
elif self.file_path.endswith(".tar.gz"):
return self... | 33 | 30.67 | 102 | 15 | 235 | python | [{"finding_id": "codeql_py/tarslip_70a40397fcce4863_2f7341c1", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](2)."
] | [
31
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T23:25:02.103048+00:00 | 1,595,339,253,000 | af80390c91a30876f4bb05f47655206e9b0470ef | 3 | {
"blob_id": "af80390c91a30876f4bb05f47655206e9b0470ef",
"branch_name": "refs/heads/master",
"committer_date": 1595339253000,
"content_id": "630e5656d88f12982a58f1dda4f59f34285973fb",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f5b0f3856444d7bcb07aa36ef069859802ca0aa3",
"extension": "py"... | 2.8125 | stackv2 | #!/usr/bin/env python
# cardinal_pythonlib/cmdline.py
"""
===============================================================================
Original code copyright (C) 2009-2020 Rudolf Cardinal (rudolf@pobox.com).
This file is part of cardinal_pythonlib.
Licensed under the Apache License, Version 2.0 (the... | 103 | 32.91 | 127 | 17 | 888 | python | [{"finding_id": "codeql_py/redos_7427172ea0a96dc9_c02d0c87", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\\\\\'.",
"This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\\\\\'."
] | [
56,
58
] | [
null,
null
] | [
28,
28
] | [
45,
48
] | |
2024-11-18T22:29:58.026086+00:00 | 1,506,385,974,000 | 4dbe80ffd589bc31adc4e0407eff2217fa1e0edf | 2 | {
"blob_id": "4dbe80ffd589bc31adc4e0407eff2217fa1e0edf",
"branch_name": "refs/heads/master",
"committer_date": 1506385974000,
"content_id": "f7936c949fe33a2359c7e2bb804dbfbd8dc9f62c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "319decdac56310a2e1d85a88a6c230a51aeefe72",
"extension": "py"... | 2.359375 | stackv2 | import flask
from flask import render_template
from flask import request
from flask import Flask
from flask import g
app = Flask(__name__,static_url_path='/static')
from netaddr import *
import time
import os
import json
import random
import sys
import traceback
import sqlite3
import models_elastic as nweb
from nmap_... | 133 | 23.42 | 93 | 19 | 861 | python | [{"finding_id": "codeql_py/stack-trace-exposure_c21eb0f41e419f4c_f41b387b", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-079"
] | [
"py/stack-trace-exposure",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
122,
132
] | [
null,
null
] | [
12,
10
] | [
61,
94
] | |
2024-11-18T22:30:02.218166+00:00 | 1,667,838,107,000 | 13aa629064d835626ade16ef99ed19cb34da941e | 3 | {
"blob_id": "13aa629064d835626ade16ef99ed19cb34da941e",
"branch_name": "refs/heads/master",
"committer_date": 1667838107000,
"content_id": "79492cade74844c8535c1bb5848e831ddfedc302",
"detected_licenses": [
"Apache-2.0",
"BSD-2-Clause"
],
"directory_id": "cc127478f47a3af9d9ac3d4418cd2643ed510ded",... | 2.609375 | stackv2 | # ******************************************************************************
# Copyright 2017-2018 Intel Corporation
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apa... | 324 | 31.85 | 95 | 20 | 2,313 | python | [{"finding_id": "codeql_py/tarslip_7472f17184e55a16_8157c09a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
192
] | [
null
] | [
17
] | [
20
] | |
2024-11-18T22:30:03.223772+00:00 | 1,612,518,903,000 | 3fd55e2c9e3c6807f4045b1b7d79a68e8f52d45d | 2 | {
"blob_id": "3fd55e2c9e3c6807f4045b1b7d79a68e8f52d45d",
"branch_name": "refs/heads/main",
"committer_date": 1612518903000,
"content_id": "9ad0f220d470c82e3c71254d2bb6e5c0d1b86fd4",
"detected_licenses": [
"MIT"
],
"directory_id": "18af8b0a51015bf2aaa674261d08ab603a0997a8",
"extension": "py",
"file... | 2.359375 | stackv2 | from flask import Flask, render_template, request, redirect, make_response
import base64, glob, secrets
app = Flask(__name__)
app.secret_key = secrets.token_hex()
def is_number(s):
try:
float(s)
return True
except ValueError:
return False
@app.route("/")
@app.route("/index.html")
def ... | 57 | 21.28 | 97 | 17 | 323 | python | [{"finding_id": "codeql_py/cookie-injection_e62be1e0ecb239f9_ddae0f33", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "... | 3 | true | [
"CWE-020",
"CWE-215",
"CWE-022"
] | [
"py/cookie-injection",
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cookie is constructed from a [user-supplied input](1).",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
23,
57,
45
] | [
null,
null,
null
] | [
35,
5,
17
] | [
68,
24,
21
] | |
2024-11-18T23:10:10.777642+00:00 | 1,395,499,875,000 | b131fb5c127a51457e3c86ec39ab68ce0f41ae37 | 3 | {
"blob_id": "b131fb5c127a51457e3c86ec39ab68ce0f41ae37",
"branch_name": "refs/heads/master",
"committer_date": 1395499915000,
"content_id": "6ef29383b92320af3bdbf92ea60e30fc5246de4c",
"detected_licenses": [
"MIT"
],
"directory_id": "f8c73bc49d6269988b1897ab426319454ddad74e",
"extension": "py",
"fi... | 2.65625 | stackv2 | import os
import sys
import threading
import SimpleHTTPServer
import SocketServer
import shutil
import enaml
from enaml.qt.qt_application import QtApplication
from PyQt4.QtCore import QFileSystemWatcher
from atom.api import Atom, Unicode, observe, Typed, Property, Int, Value
from btsync import BTSync
import logging
... | 269 | 31.06 | 107 | 18 | 1,804 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9f0aee4325bf343f_4ddc74f4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (secret)](5) a... | [
81,
116
] | [
null,
null
] | [
22,
22
] | [
66,
50
] | |
2024-11-18T23:21:53.719278+00:00 | 1,628,001,895,000 | 364d06b335b08eec87687a0c098970c5409c37b2 | 4 | {
"blob_id": "364d06b335b08eec87687a0c098970c5409c37b2",
"branch_name": "refs/heads/main",
"committer_date": 1628001895000,
"content_id": "80585c56745b1d106595fbaf60d282d4bdc9d682",
"detected_licenses": [
"MIT"
],
"directory_id": "3fbfabfaaada7b9b77e8a1df8fed4de444070d49",
"extension": "py",
"file... | 4.125 | stackv2 |
# sorting using custom key
employees = [
{'Name': 'Alan Turing', 'age': 25, 'salary': 10000},
{'Name': 'Sharon Lin', 'age': 30, 'salary': 8000},
{'Name': 'John Hopkins', 'age': 18, 'salary': 1000},
{'Name': 'Mikhail Tal', 'age': 40, 'salary': 15000},
]
# custom functions to get employee info
def get_n... | 34 | 21.94 | 56 | 8 | 227 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_abd4bf2ad25357f7_9cfa369e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
25,
29,
33
] | [
null,
null,
null
] | [
7,
7,
7
] | [
16,
16,
16
] | |
2024-11-18T21:33:32.816606+00:00 | 1,490,363,552,000 | 1a20e2e975dfec764b22bf78dfe6e1caa4086c82 | 2 | {
"blob_id": "1a20e2e975dfec764b22bf78dfe6e1caa4086c82",
"branch_name": "refs/heads/master",
"committer_date": 1490363552000,
"content_id": "6f403c51e7e7063a5921a78f9be0e8a9bc1d9e2f",
"detected_licenses": [
"MIT"
],
"directory_id": "bc61aca3346eb98e41d1a54e9ac730cad7af7eb0",
"extension": "py",
"fi... | 2.375 | stackv2 | # -*- coding: utf-8 -*-
import json
import datetime
import redis
import logging
from tornado import web, websocket
from Handlers.BaseHandler import BaseHandler
logger = logging.getLogger(__name__)
def verif_planning(planning):
timestamp = datetime.datetime.now().timestamp()
hour = datetime.datetime.now().ho... | 115 | 34.17 | 105 | 17 | 837 | python | [{"finding_id": "codeql_py/log-injection_6c7c27d1c639a9ef_958ea7f8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
65
] | [
null
] | [
21
] | [
66
] | |
2024-11-18T21:33:41.858272+00:00 | 1,630,251,358,000 | 1b2b559be715a5980475ecc73033ea7148464ad4 | 3 | {
"blob_id": "1b2b559be715a5980475ecc73033ea7148464ad4",
"branch_name": "refs/heads/main",
"committer_date": 1630251358000,
"content_id": "e157d761798116a158a1aa2dd599fc5b3750f749",
"detected_licenses": [
"MIT"
],
"directory_id": "603656f8631018e435fa6e2c978d71f18f7d36d7",
"extension": "py",
"file... | 3.484375 | stackv2 | """ Utilility functions for the main script """
import sys
from random import randint
from getpass import getpass
from typing import Union
from itertools import cycle
from functools import reduce
from operator import xor
def get_password():
""" Requests for and reads password invisibly """
pwd = getpass("En... | 131 | 34.48 | 101 | 19 | 1,151 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_369eb492ef332cfb_0752128d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
89
] | [
98
] | [
21
] | [
11
] | |
2024-11-18T21:33:44.290754+00:00 | 1,655,875,357,000 | 3ad269a5d12a42e6199c28bbbe7c496ac864dc94 | 3 | {
"blob_id": "3ad269a5d12a42e6199c28bbbe7c496ac864dc94",
"branch_name": "refs/heads/master",
"committer_date": 1655875357000,
"content_id": "92b15f875e3b245acc289ee018186cbd54475e00",
"detected_licenses": [
"MIT"
],
"directory_id": "08ad52ed4d6b33d464d245273f060bd0722029ea",
"extension": "py",
"fi... | 3.046875 | stackv2 | """
Utility functions and classes to deal with language models.
"""
# Core Library modules
import logging
import os
import tarfile
import tempfile
from argparse import ArgumentDefaultsHelpFormatter, ArgumentParser
from decimal import Decimal, getcontext
# Third party modules
import pkg_resources
getcontext().prec = ... | 208 | 33.25 | 88 | 28 | 1,586 | python | [{"finding_id": "codeql_py/tarslip_c9bedfeef896ab40_bd35e46c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
167
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T23:15:54.143202+00:00 | 1,554,479,514,000 | d71014fabf21bca540832baa194fa19254ee2aaf | 4 | {
"blob_id": "d71014fabf21bca540832baa194fa19254ee2aaf",
"branch_name": "refs/heads/master",
"committer_date": 1554479514000,
"content_id": "5e57b5eac0a4d38be16261781203e444f193b5a6",
"detected_licenses": [
"MIT"
],
"directory_id": "541d11d4c2927a834eac379a2d8cf93fce05fc52",
"extension": "py",
"fi... | 3.84375 | stackv2 | import random
secretNumber = random.randrange(1, 101)
print(secretNumber) # cheat to win 😝
print("What's your guess?")
userNumber = int(input("> "))
while userNumber != secretNumber:
if userNumber > secretNumber:
print("That too high!")
if userNumber < secretNumber:
print("That too low!")
... | 19 | 21.89 | 57 | 11 | 109 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4c45773f2f31e5e0_7bbbeb22", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
4
] | [
null
] | [
7
] | [
19
] | |
2024-11-18T23:15:55.701138+00:00 | 1,676,473,951,000 | 5d2fc06f6c565b5112374774706d29ee5d14355d | 3 | {
"blob_id": "5d2fc06f6c565b5112374774706d29ee5d14355d",
"branch_name": "refs/heads/master",
"committer_date": 1676473951000,
"content_id": "d800eefa5d07a201890f784a8fe60d8c503a4de7",
"detected_licenses": [
"MIT"
],
"directory_id": "fad9727f199d7b5cd1157513c6437f70fe2266df",
"extension": "py",
"fi... | 2.75 | stackv2 | import tempfile
from typing import Tuple
import jinja2
import os
import settings
from emails import EmailSender
from gsheets import read_spreadsheet_as_csv
from generate_report import dataframe_to_image, generate_report_from_csv_str
TEMP_DIR = tempfile.gettempdir()
TMP_FILENAME = os.path.join(TEMP_DIR, 'graph.png')
... | 50 | 33.68 | 107 | 11 | 374 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_645485f39a56f395_8b8aeee5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
18
] | [
null
] | [
20
] | [
62
] | |
2024-11-18T22:30:16.094292+00:00 | 1,460,318,270,000 | 33061779379e19a8002235080f88ff0b8c2ec73d | 3 | {
"blob_id": "33061779379e19a8002235080f88ff0b8c2ec73d",
"branch_name": "refs/heads/master",
"committer_date": 1460318270000,
"content_id": "7bbc9c94e4b5aa818e9953ee52cab54a6324a20d",
"detected_licenses": [
"MIT"
],
"directory_id": "f4e6f9f024ee89da99dbe0b57831f947c1dfd002",
"extension": "py",
"fi... | 3 | stackv2 | #!/usr/bin/env python
import click
import csv
import geocoder
import geojson
import os
import time
import webbrowser
from jinja2 import Environment, PackageLoader
def make_point(name, data, address):
g = geocoder.bing(address)
point = geojson.Point((g.lng, g.lat))
feature = geojson.Feature(geometry=point, ... | 147 | 32.63 | 125 | 19 | 1,098 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ec04486e250210d7_c8cd4e83", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
134
] | [
null
] | [
11
] | [
72
] | |
2024-11-18T22:30:19.646996+00:00 | 1,477,240,262,000 | 0fe9dfd2463346a471b7cbf18e7c5e0f3de715a2 | 3 | {
"blob_id": "0fe9dfd2463346a471b7cbf18e7c5e0f3de715a2",
"branch_name": "refs/heads/master",
"committer_date": 1477240262000,
"content_id": "1ac6a9e2cf511ab0d93c95fd965b58501ad4f2b6",
"detected_licenses": [
"MIT"
],
"directory_id": "2c2fbf9183644ab043c2394766ad60d04a587afb",
"extension": "py",
"fi... | 2.765625 | stackv2 | #!/usr/bin/env python2.7
"""The purpose of this module is to allow messaging via screen. It needs you to
install enum module as `pip install enum`. This module is executed as:
.. code-block:: bash
$ python ScreenLoggerServer.py [zmq_transport]
It uses a default ZeroMQ transport if the argument is not given.
Onc... | 102 | 30.6 | 79 | 15 | 720 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4c8ba6c3676b114c_aa6ff9e5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
63
] | [
null
] | [
26
] | [
36
] | |
2024-11-18T22:44:45.384112+00:00 | 1,548,768,640,000 | 2189889b9790d173a82c3d84f65709285697cd53 | 3 | {
"blob_id": "2189889b9790d173a82c3d84f65709285697cd53",
"branch_name": "refs/heads/master",
"committer_date": 1548768640000,
"content_id": "7cfacd5dd2d078925a16735a9618d5546dedb1c4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "727c1f042945d50f08696b52975ff0ec7fe18262",
"extension": "py"... | 2.734375 | stackv2 |
import requests
def download_aip(aip_url, temp_dir):
print('AIP downloading...')
for key, value in aip_url.items():
responce = requests.get(value)
with open(temp_dir + "/" + key + '.pdf', 'wb') as file:
file.write(responce.content)
print('AIP download completed.')
def downloa... | 29 | 29.79 | 90 | 16 | 223 | python | [{"finding_id": "codeql_py/request-without-cert-validation_2b6a1f86d83eeb8a_6b07f395", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
25
] | [
null
] | [
16
] | [
50
] | |
2024-11-18T23:36:53.885871+00:00 | 1,645,310,375,000 | 62a3d963121bb6356f5eb905b94ecb12bcba29a4 | 3 | {
"blob_id": "62a3d963121bb6356f5eb905b94ecb12bcba29a4",
"branch_name": "refs/heads/master",
"committer_date": 1645310375000,
"content_id": "4b9fc0f46e20d8bf3b4296bba845fc43df217b2d",
"detected_licenses": [
"MIT"
],
"directory_id": "c0039280993c64bb61d49cd33fdca73136402217",
"extension": "py",
"fi... | 3.046875 | stackv2 | import sopel.module
here_url = "https://geocoder.api.here.com/6.2/geocode.json"
here_app_id = ""
here_app_code = ""
darksky_url = "https://api.darksky.net/forecast"
darksky_key = ""
def unix_to_localtime(t, tz="US/Eastern"):
"""
Convert unix timestamp to local time.
"""
from datetime import datetim... | 81 | 25.31 | 90 | 13 | 552 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_942b892c27c27170_6a280a4e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
81
] | [
null
] | [
11
] | [
36
] | |
2024-11-18T21:14:12.874631+00:00 | 1,587,824,127,000 | eb0154c6f9f3920cb301c4bbafea3c39d7db8115 | 3 | {
"blob_id": "eb0154c6f9f3920cb301c4bbafea3c39d7db8115",
"branch_name": "refs/heads/master",
"committer_date": 1587824127000,
"content_id": "8173b7642635fe8a82ec04a022edac53faa1c910",
"detected_licenses": [
"MIT"
],
"directory_id": "be49c1421a56577ef90096a3136015b744e27b63",
"extension": "py",
"fi... | 2.625 | stackv2 | import datetime
import logging
from tabulate import tabulate
from . import utils
# TODO: fix navigation bar
def build_tables(data, replaces, template_env, config):
for table in data:
table_replaces = replaces.copy()
table_replaces["datatable"] = data[table]
build_html(template_env, tabl... | 126 | 29.29 | 76 | 17 | 876 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3fb8e5b6942b5ddf_12fc138d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
64
] | [
66
] | [
16
] | [
6
] | |
2024-11-18T21:58:04.428784+00:00 | 1,486,136,740,000 | dff785f6072a446da86d06df0d5c398eca15237c | 2 | {
"blob_id": "dff785f6072a446da86d06df0d5c398eca15237c",
"branch_name": "refs/heads/master",
"committer_date": 1486136740000,
"content_id": "a5049805a98ed6c3c06885f6b09734a784f6cd49",
"detected_licenses": [
"MIT-0"
],
"directory_id": "645014cfd568b28f140f8ccc6b9fe6ee518d9e7e",
"extension": "py",
"... | 2.46875 | stackv2 | import functools
import re
import logging
logger = logging.getLogger(__name__)
@functools.lru_cache()
def is_key_match(url):
# This is a circular dependency! So it must be loaded late.
from ..apibeard import APIBeard
match = re.match(r"/key([A-z]+)/.*", url)
key = match.group(1)
logger.debug("M... | 22 | 21.41 | 63 | 11 | 124 | python | [{"finding_id": "codeql_py/overly-large-range_7b509c36b071cc05_7614ceda", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
14
] | [
null
] | [
30
] | [
33
] | |
2024-11-18T21:58:26.998120+00:00 | 1,637,373,938,000 | 616216e6da78587a3d1d49c4d9ca38b3b54768b3 | 2 | {
"blob_id": "616216e6da78587a3d1d49c4d9ca38b3b54768b3",
"branch_name": "refs/heads/master",
"committer_date": 1637373938000,
"content_id": "671a07227d52df7ae394c272e05cd1b71cdc04e2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6ee06ad2bbc15cc0f829f99198947ffe8cffe395",
"extension": "py"... | 2.421875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
from .Base import Base
import requests
import json
class TargetOption(Base):
def __init__(self, api_base_url, api_key):
super().__init__(api_base_url, api_key)
self.excluded_hours_dict = {
'default': '',
'9am_to_5pm': 'cb869c... | 303 | 34.78 | 136 | 17 | 2,494 | python | [{"finding_id": "codeql_py/request-without-cert-validation_bfa4e96971e9f4ee_d5348faa", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 9 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"... | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
41,
65,
89,
126,
158,
191,
224,
260,
296
] | [
null,
null,
null,
null,
159,
null,
null,
261,
null
] | [
24,
24,
24,
24,
24,
24,
24,
24,
24
] | [
111,
110,
114,
110,
64,
109,
118,
67,
107
] | |
2024-11-18T21:58:31.965183+00:00 | 1,600,988,903,000 | 620158ac953411033735b3dadcc03d6eae85cd1b | 3 | {
"blob_id": "620158ac953411033735b3dadcc03d6eae85cd1b",
"branch_name": "refs/heads/master",
"committer_date": 1600988903000,
"content_id": "9826ac3a73faf3cf25d34a9cbee4c12fe7210235",
"detected_licenses": [
"MIT"
],
"directory_id": "d5ded3ea87fedd24ef5ec24e7dfe3a4e2349c7ba",
"extension": "py",
"fi... | 3.25 | stackv2 | import json
# Reads from geoList and ipList to get the GeoIP and IP data respectively and writes to newGeo.txt to copy as data for Google GeoChart usage
text = open("ipList.txt", "r")
geoInfo = open("geoList.json", "r")
newGeo = open("newGeo.txt", "w")
d = dict()
geoList = []
# Loop through each line of the ipList to... | 30 | 31.9 | 140 | 17 | 272 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a4c20ef8ea47cbee_cb01f0dc", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
30
] | [
null
] | [
18
] | [
121
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.