added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T02:31:58.295270+00:00 | 1,596,218,763,000 | de336a4637fa87d898092dba46f37328a4fb292b | 3 | {
"blob_id": "de336a4637fa87d898092dba46f37328a4fb292b",
"branch_name": "refs/heads/master",
"committer_date": 1596218763000,
"content_id": "79c79d9ecd18fddb30821cd93954c5f4d143a240",
"detected_licenses": [
"MIT"
],
"directory_id": "e615c71dbb301b7928a5aeaa16a2b5f9c4346884",
"extension": "py",
"fi... | 2.8125 | stackv2 | ## The script can be run with Python 3.5 or higher version.
## The script requires 'requests' library to make the API calls. The library can be installed using the command: pip install requests.
import sys
import argparse
import requests
import login.login_api as login_api
def print_usage():
return ("\nThe comma... | 85 | 37.06 | 135 | 15 | 704 | python | [{"finding_id": "codeql_py/request-without-cert-validation_820010161d2c3820_7aa16021", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
55
] | [
null
] | [
27
] | [
105
] | |
2024-11-19T02:32:20.605448+00:00 | 1,629,851,746,000 | 096dcf036a168f8fb267e668a580067b953c2690 | 3 | {
"blob_id": "096dcf036a168f8fb267e668a580067b953c2690",
"branch_name": "refs/heads/master",
"committer_date": 1629851746000,
"content_id": "1439124c99648eac36b09894e7291e3ec8953d12",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5e9bba1918ccf56a2d7d49271adb02b2ec19c6f4",
"extension": "py"... | 3.09375 | stackv2 | """Models related to the event schedule section in Tibia.com."""
import re
import time
import datetime
from typing import List, Optional
from tibiapy import abc
from tibiapy.utils import get_tibia_url, parse_popup, parse_tibiacom_content
__all__ = (
'EventSchedule',
'EventEntry',
)
month_year_regex = re.co... | 234 | 34.02 | 117 | 22 | 1,759 | python | [{"finding_id": "codeql_py/overly-large-range_13902c27088619be_d414c088", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
17
] | [
null
] | [
35
] | [
38
] | |
2024-11-19T02:32:24.144723+00:00 | 1,425,129,595,000 | 178d84f0759dc310ed33cfbbecfb0016f5aba9f3 | 2 | {
"blob_id": "178d84f0759dc310ed33cfbbecfb0016f5aba9f3",
"branch_name": "refs/heads/master",
"committer_date": 1425129595000,
"content_id": "db3995798a791c24eb1dbf7845029a401c53ba92",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0849202e8150e3db4f724475e7e9bbac0fc1f3f9",
"extension": "py"... | 2.3125 | stackv2 | #coding:utf-8
import json
import hashlib
import sqlite3
from datetime import datetime
import web
from models import User
from .base import bad_request
session = web.config._session
CACHE_USER = {}
def sha1(data):
return hashlib.sha1(data).hexdigest()
class UserHandler:
def GET(self):
# 获取当前登录的用户... | 86 | 21.48 | 53 | 13 | 412 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_0aaa4901829da222_de54f7cf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
18
] | [
null
] | [
25
] | [
29
] | |
2024-11-19T02:32:46.907389+00:00 | 1,688,183,113,000 | b562647c337162333efbecbc70a3b23ce93e1457 | 3 | {
"blob_id": "b562647c337162333efbecbc70a3b23ce93e1457",
"branch_name": "refs/heads/main",
"committer_date": 1688183113000,
"content_id": "0e3af714d179777f6869b9b7f76e4a352b6e78d7",
"detected_licenses": [
"MIT"
],
"directory_id": "0e5a5c6bb6747383bc800faeef07f3b95665a7ea",
"extension": "py",
"file... | 2.90625 | stackv2 | """
Vworld 데이터 API Python Module
"""
import requests
from ..utils.code import get_vworld_data_api_info_by_dict
requests.packages.urllib3.disable_warnings()
class VworldData:
"""Vworld 데이터 API 클래스
Vworld에서 발급받은 API 서비스 인증키를 입력받아 초기화합니다.
Parameters
----------
service_key : str
Vworld Open... | 67 | 27.66 | 96 | 16 | 450 | python | [{"finding_id": "codeql_py/request-without-cert-validation_21618a7be9da95fe_e5cd6451", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
56
] | [
null
] | [
23
] | [
74
] | |
2024-11-19T02:32:52.674302+00:00 | 1,599,371,369,000 | 14a2a5939f2ad743f7a9f3c011690afc25956adf | 2 | {
"blob_id": "14a2a5939f2ad743f7a9f3c011690afc25956adf",
"branch_name": "refs/heads/master",
"committer_date": 1599371369000,
"content_id": "02925f141847f177d65a0d573ded40c30827f155",
"detected_licenses": [
"MIT"
],
"directory_id": "4b91f359c7f7c619bfd758738b70435a148ffd7d",
"extension": "py",
"fi... | 2.46875 | stackv2 | from settings import BAIDU
import requests
from random import randint
import hashlib
class Baidu:
def __init__(self):
self.api = 'http://api.fanyi.baidu.com/api/trans/vip/translate'
self.appid = BAIDU['appid']
self.appsecret = BAIDU['appsecret']
self.to_langs = {
'中文': ... | 38 | 27.61 | 89 | 17 | 292 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_0c7c9da8c3010955_a2b3b689", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
30
] | [
null
] | [
20
] | [
89
] | |
2024-11-19T02:32:55.671205+00:00 | 1,470,063,915,000 | 97a03e49f082fa78848866f9be0459ce5e2670cb | 2 | {
"blob_id": "97a03e49f082fa78848866f9be0459ce5e2670cb",
"branch_name": "refs/heads/master",
"committer_date": 1470063915000,
"content_id": "ddcfc99b917df01e8f7a1b64290fd07f30d5717c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "187774f515dc3def8d2e86fc0fb60ea5dc79bb6c",
"extension": "py"... | 2.34375 | stackv2 | import json
import requests
from time import sleep, time
from rancher import exit, util
class Stack:
rancherApiVersion = '/v1/'
request_headers = {'Content-Type': 'application/json', 'Accept': 'application/json'}
def __init__(self, configuration):
self.config = configuration
def get_stack_i... | 191 | 43.33 | 115 | 20 | 1,816 | python | [{"finding_id": "codeql_py/request-without-cert-validation_66225ee51c793f8f_dc741707", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 6 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
17,
43,
65,
94,
105,
152
] | [
19,
45,
67,
96,
107,
154
] | [
20,
20,
20,
20,
20,
20
] | [
76,
91,
91,
91,
91,
76
] | |
2024-11-19T02:33:01.032507+00:00 | 1,610,975,226,000 | 9bb605b52f2aeb4dac66ecd91e8235caafa6e48f | 2 | {
"blob_id": "9bb605b52f2aeb4dac66ecd91e8235caafa6e48f",
"branch_name": "refs/heads/master",
"committer_date": 1610975226000,
"content_id": "dfbe5f61cb652db4ac3ca1f853715457fc1506ba",
"detected_licenses": [
"MIT"
],
"directory_id": "49c5f005b1714e2a9c7ab1a87ba66087ddcb0381",
"extension": "py",
"fi... | 2.453125 | stackv2 | import subprocess
import os
from io import StringIO
import hashlib
import pandas as pd
from datetime import datetime, timedelta
from azure.storage.blob import BlobClient, generate_container_sas, BlobSasPermissions
def sha512(text, encoding='utf-8'):
"""Converts an input string to its sha512 hash
"""
if n... | 191 | 35.04 | 129 | 18 | 1,593 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_3601af5c840a07e4_9365b417", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
19
] | [
null
] | [
27
] | [
31
] | |
2024-11-19T02:33:12.042344+00:00 | 1,498,028,673,000 | 65271b2eee818364fae2a814c42213185d9b9bc7 | 2 | {
"blob_id": "65271b2eee818364fae2a814c42213185d9b9bc7",
"branch_name": "refs/heads/master",
"committer_date": 1498028673000,
"content_id": "80c9bd1c76531f6f3ef6421e24f39b7f3c3c539e",
"detected_licenses": [
"Unlicense"
],
"directory_id": "f354d9e4d5cde8944375db8422af668cbd61fb17",
"extension": "py",... | 2.359375 | stackv2 | #!/usr/bin/python3
from wsgiref.simple_server import make_server
from pyramid.config import Configurator
from pyramid.view import view_config
from pyramid.response import Response
from config import *
import os
@view_config(route_name='sort')
def sort_books(request, test_without_try_except = False):
if test_witho... | 101 | 34 | 160 | 16 | 808 | python | [{"finding_id": "codeql_py/stack-trace-exposure_8efe9fda52819154_9c362a3b", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-079"
] | [
"py/stack-trace-exposure",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
20,
75
] | [
null,
null
] | [
30,
22
] | [
36,
66
] | |
2024-11-19T02:43:31.282302+00:00 | 1,633,628,367,000 | 35c06f589f6492bb4b266a5ca075d0c047d37645 | 3 | {
"blob_id": "35c06f589f6492bb4b266a5ca075d0c047d37645",
"branch_name": "refs/heads/master",
"committer_date": 1633628367000,
"content_id": "6fc8c60eb779d51c7542e3d3ecddf03f803c1575",
"detected_licenses": [
"MIT"
],
"directory_id": "bf27149c253827ea87cdcedda0e9c1cf56b9e905",
"extension": "py",
"fi... | 2.78125 | stackv2 | # write your code here
import argparse
import sys
import socket
import itertools
import json
import os
#parser = argparse.ArgumentParser(description="hacking website passwords")
#parser.add_argument("addrress")
#parser.add_argument("port")
#parser.add_argument("password")
args = sys.argv
ipaddress = args[1]
port = ... | 70 | 32.61 | 79 | 22 | 452 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bdebfb3140a3a516_f8bc51a7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
70
] | [
null
] | [
7
] | [
15
] | |
2024-11-19T02:55:12.148535+00:00 | 1,586,671,621,000 | 41ecfc7a3a8b5030524ec172d75bacc504679945 | 3 | {
"blob_id": "41ecfc7a3a8b5030524ec172d75bacc504679945",
"branch_name": "refs/heads/master",
"committer_date": 1586671621000,
"content_id": "63efacfacaed97961c380c49deffa93135a135ce",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5773f84f56f01078412f2c2a22a5b5f05cc2b795",
"extension": "py"... | 2.96875 | stackv2 | #!/usr/bin/python
"""A few utilities for working with the cryptography around ephemeral ids.
In particular, it can:
1. compute ephemeral ids given an Identity Key, a scaler and a timestamp;
2. compute the identity key from the Curve25519 shared secret and the public
keys;
3. compute all the steps needed to registe... | 407 | 30.63 | 80 | 18 | 3,794 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_21a339cb735848b5_4d7cfec7", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
274,
285
] | [
null,
null
] | [
8,
9
] | [
49,
51
] | |
2024-11-19T02:55:13.328133+00:00 | 1,601,405,168,000 | 3be19fa1a3da8c3c435b2e34cd7f9399ef088cc5 | 3 | {
"blob_id": "3be19fa1a3da8c3c435b2e34cd7f9399ef088cc5",
"branch_name": "refs/heads/master",
"committer_date": 1601405168000,
"content_id": "38efcbeb70f0ee864f425aaf1929758117aaf7cd",
"detected_licenses": [
"MIT"
],
"directory_id": "e57bc591847c01c78ea39a47db76953a4cc5c3e6",
"extension": "py",
"fi... | 2.8125 | stackv2 | import numpy as np
import torch
from torch.distributions import OneHotCategorical
from torchvision.transforms import Compose
from data import Vocabulary, OneHot, Genders, Races, ToTensor
from utils import load_model
class Generator:
"""Base Generator class that can load trained model and require every subclass t... | 209 | 35.95 | 116 | 22 | 1,650 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_abee2e4e654c3882_83e6108a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (priva... | [
74,
209
] | [
null,
null
] | [
23,
16
] | [
92,
29
] | |
2024-11-19T02:55:16.025123+00:00 | 1,568,455,230,000 | 67db7a018831042bf9d3c4bcb33d7319ea4fc7f0 | 2 | {
"blob_id": "67db7a018831042bf9d3c4bcb33d7319ea4fc7f0",
"branch_name": "refs/heads/master",
"committer_date": 1568455230000,
"content_id": "1cc6c4e637d09c01db08e440fc73ff3eb4a40ecc",
"detected_licenses": [
"MIT"
],
"directory_id": "44db47b96054cb4b77e272300a464225c221bd2c",
"extension": "py",
"fi... | 2.46875 | stackv2 | import re
from bot.util.telegram import parser, api
from bot import models, db
def run():
_listener_content()
_listener_news()
def _listener_content():
if str(api.CHAT_ID) == str(parser.chat_id()):
if parser.forward_from() is not None:
_send_message()
_add_count_news()
... | 59 | 20.97 | 93 | 14 | 325 | python | [{"finding_id": "codeql_py/overly-large-range_daa5d4260190a463_bb7f7b07", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
51
] | [
null
] | [
44
] | [
47
] | |
2024-11-19T02:55:22.847454+00:00 | 1,555,398,438,000 | fb1fbfe4eea8653cb870d5608f2f94b1597cc5dc | 3 | {
"blob_id": "fb1fbfe4eea8653cb870d5608f2f94b1597cc5dc",
"branch_name": "refs/heads/master",
"committer_date": 1555398438000,
"content_id": "995f6063bb6a0b3b29b3d6741c89fcddb498e0ea",
"detected_licenses": [
"MIT"
],
"directory_id": "077ce95fe81ec2c49a0be1b2647d9977c9facaf8",
"extension": "py",
"fi... | 2.5625 | stackv2 |
import json
import requests
from flask import Flask, Response
app = Flask(__name__)
mime_type = 'text/plain'
@app.route('/')
def root_route():
return Response(response='usage : python.semcal.org/<package>[==<version>]', mimetype=mime_type)
# todo: should this be <package>[==<version>] or <package>[/<versio... | 47 | 31.57 | 103 | 16 | 360 | python | [{"finding_id": "codeql_py/partial-ssrf_9ca720a728e1955a_dfa78b12", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
25
] | [
null
] | [
24
] | [
41
] | |
2024-11-19T02:55:35.641971+00:00 | 1,552,436,994,000 | 8ea22312f8378a5bc14ce12a36a8e7fe9e043a1e | 3 | {
"blob_id": "8ea22312f8378a5bc14ce12a36a8e7fe9e043a1e",
"branch_name": "refs/heads/master",
"committer_date": 1552436994000,
"content_id": "3c6fff9795d298ec9a8d67a1462fcfec1ea914b4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "39763295ac58ac3ee104644b039f5546b64027b4",
"extension": "py"... | 3.125 | stackv2 | import sys
import urllib2
import hashlib
if (len(sys.argv) == 2):
password = sys.argv[1]
else:
print "Usage: python pwned.py <password>"
exit(-1)
hash = hashlib.sha1()
hash.update(password)
digest = hash.hexdigest().upper()
print digest
headers = { 'User-Agent' : 'pwned.py' }
apiurl = "https://api.pwne... | 35 | 19.91 | 65 | 10 | 208 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_32ae98863a98d98e_93859872", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
13
] | [
null
] | [
13
] | [
21
] | |
2024-11-19T02:55:37.827700+00:00 | 1,693,221,508,000 | a37124a6b3e3ef78b8aefd82e4bb5e190f9f0770 | 2 | {
"blob_id": "a37124a6b3e3ef78b8aefd82e4bb5e190f9f0770",
"branch_name": "refs/heads/main",
"committer_date": 1693221508000,
"content_id": "2fc9c8a851d00f1ba48c3e530a4264579698a37d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "35b6013c1943f37d1428afd2663c8aba0a02628d",
"extension": "py",
... | 2.5 | stackv2 | #!/usr/bin/env python
# Copyright 2021 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or ... | 41 | 34.22 | 82 | 12 | 313 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_953000ef5de207c6_9653741f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
37
] | [
null
] | [
11
] | [
29
] | |
2024-11-19T02:55:39.170779+00:00 | 1,607,573,628,000 | acdae580ffec8dacd3d19dada838f0074146963e | 2 | {
"blob_id": "acdae580ffec8dacd3d19dada838f0074146963e",
"branch_name": "refs/heads/master",
"committer_date": 1607573628000,
"content_id": "300878da56ebb67caae1a48bd2aaccbb513fd17f",
"detected_licenses": [
"MIT"
],
"directory_id": "a6ea4012f51ba9f9193334b5574ebe3076fd08a4",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/env python
# -*- encoding: utf-8 -*-
import json
import logging
import traceback
from rest_framework.response import Response
from fastrunner import models
def get_value(content, keys):
if isinstance(content, (str, int)):
return content
if content == None:
return ""
if isinsta... | 55 | 27.64 | 91 | 18 | 330 | python | [{"finding_id": "codeql_py/stack-trace-exposure_21b7faab96f1d80a_5582f283", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
55
] | [
null
] | [
29
] | [
50
] | |
2024-11-19T02:55:46.472677+00:00 | 1,428,612,940,000 | ce932e6ed2655682429d4a152b957641240337b9 | 2 | {
"blob_id": "ce932e6ed2655682429d4a152b957641240337b9",
"branch_name": "refs/heads/master",
"committer_date": 1428612940000,
"content_id": "d314d774df3a5ae63578e3d48a0f3769905d1a09",
"detected_licenses": [
"MIT"
],
"directory_id": "7458a23c73ee8ff03fe996bf8d22b44a13142afd",
"extension": "py",
"fi... | 2.5 | stackv2 | ''' Implements handler for /items
Imported from handler for /menus/{id} '''
import logging
import cherrypy
import mysql.connector
import sys
sys.stdout = sys.stderr # Turn off console output; it will get logged by Apache
import os
import os.path
import json
import pprint
from jinja2 import Environment, FileSystemLoader... | 76 | 38.55 | 157 | 17 | 734 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f8fe60592b659a3d_9a288f20", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
null
] | [
7
] | [
101
] | |
2024-11-19T02:55:47.128624+00:00 | 1,610,308,465,000 | dcdc1b07fc36f6db3b0c16610ab422b85f7a30c4 | 3 | {
"blob_id": "dcdc1b07fc36f6db3b0c16610ab422b85f7a30c4",
"branch_name": "refs/heads/master",
"committer_date": 1610308465000,
"content_id": "4740538411342e57ffcdd24e314bc77364befd15",
"detected_licenses": [
"MIT"
],
"directory_id": "30d9dc8b4885b7bdfd0e6630d32277883cb1fc99",
"extension": "py",
"fi... | 2.65625 | stackv2 | import os
import re
import yaml
import cerberus
import logging
from watsor.config.schema import schema
_LOGGER = logging.getLogger(__name__)
_ENV_pattern = re.compile('.*?\${(\w+)}.*?')
SECRETS_YAML = "secrets.yaml"
__SECRET_CACHE = {}
def _load_yaml(filename: str, loader: yaml.Loader = yaml.SafeLoader):
_LOG... | 244 | 31.61 | 86 | 19 | 1,738 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_908a6eed64637169_8400bf20", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
18,
98
] | [
null,
null
] | [
33,
74
] | [
41,
82
] | |
2024-11-19T02:55:59.739616+00:00 | 1,559,154,341,000 | 29888e81d775d6f80f40c814f7ad303c8ab7c7f4 | 2 | {
"blob_id": "29888e81d775d6f80f40c814f7ad303c8ab7c7f4",
"branch_name": "refs/heads/master",
"committer_date": 1559154341000,
"content_id": "3159ca5a4f160eae7a75313ec3ed0360f193ee0c",
"detected_licenses": [
"Unlicense"
],
"directory_id": "6f2a6a935501cb2193d62bb77aed01f6e63d8f0c",
"extension": "py",... | 2.46875 | stackv2 | #ASSOCIATES PHYSICAL AND L2-OUT DOMAINS TO EPG
import requests
from jinja2 import Template
#use pip install jinja2 if you get a module error
import sys
import login
import getpass
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
urllib3.disable_warnings(urllib3.exceptions.SNIMissingWar... | 121 | 33.87 | 106 | 11 | 1,052 | python | [{"finding_id": "codeql_py/request-without-cert-validation_01e9ca54f51ac1f3_336dbe6a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 6 | true | [
"CWE-295",
"CWE-295",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potential... | [
57,
84,
39,
53,
66,
80
] | [
null,
null,
null,
null,
null,
null
] | [
19,
19,
14,
14,
14,
14
] | [
96,
96,
35,
39,
35,
39
] | |
2024-11-19T02:56:04.396775+00:00 | 1,555,796,870,000 | 5d7bca842d4eb9bc1da381fd3bd9b2426f06f4a4 | 3 | {
"blob_id": "5d7bca842d4eb9bc1da381fd3bd9b2426f06f4a4",
"branch_name": "refs/heads/master",
"committer_date": 1555796870000,
"content_id": "7beb9661a8208db25108c2576dc64cb0b8295ce6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e9b363d3192a27c4e81c587f7c9a83da7e894061",
"extension": "py"... | 2.640625 | stackv2 | """
All Blueprint routes regarding rendering authentication templates
except:
/login [POST] --> handeling the login, has nothing todo with rendering a template
"""
from sqlalchemy.sql import exists
from werkzeug.exceptions import BadRequest
from flask import Blueprint, request, jsonify, g, redirect, render... | 96 | 29.88 | 93 | 17 | 641 | python | [{"finding_id": "codeql_py/url-redirection_da928cac80d7f4bd_270a9f6f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
23,
33
] | [
null,
null
] | [
25,
25
] | [
33,
33
] | |
2024-11-19T02:56:05.349732+00:00 | 1,481,563,795,000 | 9dcaf758b061708c4d1d393562c195a5e2a31556 | 2 | {
"blob_id": "9dcaf758b061708c4d1d393562c195a5e2a31556",
"branch_name": "refs/heads/master",
"committer_date": 1481563795000,
"content_id": "3b15249c3813eec4d999542017f6bf52ff7c18cf",
"detected_licenses": [
"MIT"
],
"directory_id": "c72edf2594b9391c2c215f4d7dd0eee110e2c157",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python3
import os, sys, yaml, mistune, importlib, collections, argparse, logging, time, datetime
from jinja2 import Environment, FileSystemLoader
from stab.watchman import Watchman
absjoin = lambda x, y: os.path.abspath(os.path.join(x, y))
class Stab:
def __init__(self, ROOT_DIR, force):
s... | 128 | 43.18 | 133 | 18 | 1,361 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fb44dc6d4b4a804a_d03f65ad", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
44
] | [
null
] | [
26
] | [
63
] | |
2024-11-19T03:10:23.357232+00:00 | 1,603,354,397,000 | e5a7529501fb1c721096506cda22e6e592009f62 | 2 | {
"blob_id": "e5a7529501fb1c721096506cda22e6e592009f62",
"branch_name": "refs/heads/master",
"committer_date": 1603354397000,
"content_id": "30c2b77935b1dd9de784885b43f14fff7ffe9d3c",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "a8831959ac9e1c956a65ac613a74f309c253629c",
"extension": "p... | 2.34375 | stackv2 | # -*- coding: UTF-8 -*-
import sp_utils
import copy
import ctypes
data_folder_path = "constellation_data/"
constellation_lla_location = [];
# constellation_name = 'StarLink';
constellation_name = 'OneWeb';
# describing the lla location information for a specific satellite
class sp_lla_trace:
def __init__(self):
... | 111 | 42.65 | 142 | 22 | 1,206 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5a5a499903efe7f6_ed188cba", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
30,
42
] | [
null,
null
] | [
17,
17
] | [
21,
21
] | |
2024-11-19T03:22:07.979605+00:00 | 1,617,189,823,000 | 4ec93c9f99306dfb31f33894458d73c54b2bdf60 | 2 | {
"blob_id": "4ec93c9f99306dfb31f33894458d73c54b2bdf60",
"branch_name": "refs/heads/master",
"committer_date": 1617189823000,
"content_id": "87cf37159b1e27f9e1ae451d55411671bc226e9c",
"detected_licenses": [
"MIT"
],
"directory_id": "6f44df5804e3e611706a890b7774db6cdc525fbf",
"extension": "py",
"fi... | 2.375 | stackv2 | """Module for handling queries for a valid Sharing/Request API signature."""
import hmac
import time
import logging
import secrets
import aiohttp.web
from ._convenience import session_check, api_check, get_tempurl_key, sign
from .settings import setd
LOGGER = logging.getLogger("signature")
async def handle_sig... | 262 | 26.56 | 76 | 14 | 1,588 | python | [{"finding_id": "codeql_py/log-injection_fd8150b2f8f3672f_989acc7b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
202
] | [
null
] | [
9
] | [
23
] | |
2024-11-19T03:43:56.384114+00:00 | 1,568,793,769,000 | dd982b5c23a4016ba913cbdfc467eef01f6586e0 | 3 | {
"blob_id": "dd982b5c23a4016ba913cbdfc467eef01f6586e0",
"branch_name": "refs/heads/master",
"committer_date": 1568793769000,
"content_id": "4757173de89fb98dd50b3235c985aa9e8c71b53d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c0829adfeb87fd28f6b03dd5205db61b1e3eb25e",
"extension": "py"... | 2.546875 | stackv2 | # coding=utf-8
from flask import Flask, jsonify
from flask import render_template
import sqlite3
import cgi
import socket
DATABASE = 'mini_app.db'
PAGE_SIZE = 10
app = Flask(__name__)
def escape(html):
"""
转义HTML字符
:param html:
:return:
"""
if not html:
return ""
return cgi.escap... | 68 | 23.66 | 104 | 14 | 447 | python | [{"finding_id": "codeql_py/sql-injection_fc645d29e047ac30_01079b6e", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
40
] | [
41
] | [
27
] | [
37
] | |
2024-11-19T02:08:37.312714+00:00 | 1,620,150,075,000 | 2cd903dcced5c4682e3b35e80a40489032bb69fe | 2 | {
"blob_id": "2cd903dcced5c4682e3b35e80a40489032bb69fe",
"branch_name": "refs/heads/master",
"committer_date": 1620150075000,
"content_id": "7fefc388011444b7520969102dda1171cf73e000",
"detected_licenses": [
"MIT"
],
"directory_id": "8acec7d68f7f7cb1219a5d933d4421e2ba66e9c5",
"extension": "py",
"fi... | 2.421875 | stackv2 | from flask_login.utils import login_required
from . import auth
from flask import render_template, url_for, redirect, flash, request
from .forms import RegistrationForm, LoginForm
from .. import db
from ..models import Writer
from flask_login import login_user, logout_user
from flask_mail import Message
from .. import ... | 42 | 42.05 | 150 | 16 | 375 | python | [{"finding_id": "codeql_py/url-redirection_040bb8a5d461346e_86328b81", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
34
] | [
null
] | [
29
] | [
76
] | |
2024-11-19T02:21:23.233677+00:00 | 1,400,826,297,000 | d92955b8f1d67534d1231e1bbc8babd27738b016 | 3 | {
"blob_id": "d92955b8f1d67534d1231e1bbc8babd27738b016",
"branch_name": "refs/heads/master",
"committer_date": 1400826297000,
"content_id": "f197ed20c6084fbe8d3e57a9b29b4bd4a35abbfb",
"detected_licenses": [
"MIT"
],
"directory_id": "1c9eb7448d899d2d904695cd7412e6702ada2210",
"extension": "py",
"fi... | 2.65625 | stackv2 | import requests
from requests.auth import HTTPBasicAuth
class HarvestError(Exception):
pass
class Harvest(object):
def __init__(self, uri, email, password):
self.uri = uri
self.email = email
self.password = password
self.headers = {
'Accept': 'application/json',
... | 66 | 34.61 | 132 | 21 | 554 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c3c2fad1c6431553_ebb8c180", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
43,
46,
48,
57
] | [
null,
null,
null,
null
] | [
21,
25,
25,
21
] | [
133,
129,
56,
124
] | |
2024-11-19T03:10:05.294199+00:00 | 1,635,232,635,000 | dedbfe9c73a853c6de2e131542a6d1f7d11bb555 | 2 | {
"blob_id": "dedbfe9c73a853c6de2e131542a6d1f7d11bb555",
"branch_name": "refs/heads/master",
"committer_date": 1635233771000,
"content_id": "90dadc038d43cb19f7507aafb85330f8dbb286a8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1267a2395f069324733ff13646e8e53a768b04c1",
"extension": "py"... | 2.328125 | stackv2 | import requests
from flask import Flask, Response, request
EXCLUDED_HEADERS = {"content-encoding", "content-length", "transfer-encoding", "connection"}
app = Flask(__name__)
@app.route("/", defaults={"path": ""}, methods=["GET", "POST", "PUT", "DELETE"])
@app.route("/<path:path>", methods=["GET", "POST", "PUT", "D... | 25 | 32.2 | 120 | 15 | 180 | python | [{"finding_id": "codeql_py/full-ssrf_08f5691647475068_9b774e00", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 2 | true | [
"CWE-918",
"CWE-079"
] | [
"py/full-ssrf",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
13,
22
] | [
20,
null
] | [
16,
18
] | [
6,
34
] | |
2024-11-19T03:10:11.552781+00:00 | 1,512,397,779,000 | 2133e7234fdbfe1ba1d7d0fdb32d31f7e2b80d0b | 2 | {
"blob_id": "2133e7234fdbfe1ba1d7d0fdb32d31f7e2b80d0b",
"branch_name": "refs/heads/master",
"committer_date": 1512397779000,
"content_id": "aca352d8d1bfdcf4c5b0f4ec267b67b2ba8b56c5",
"detected_licenses": [
"MIT"
],
"directory_id": "5294449c79108fd7ce6d0c970d8d9c28675a09eb",
"extension": "py",
"fi... | 2.421875 | stackv2 | import telegram
from telegram.ext import Updater, MessageHandler, CommandHandler, Filters, BaseFilter
import sys
from glob import glob
import pickle
import numpy.random as rn
import logging
from Crypto.Cipher import AES
import base64
"""
TODO list:
- Do not count other bots when calculating quorum
- Store me... | 294 | 30.53 | 141 | 18 | 2,222 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_1556af4c7b412665_b38c356b", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
253
] | [
null
] | [
15
] | [
62
] | |
2024-11-19T03:10:20.162456+00:00 | 1,528,899,832,000 | 15e54604a5bc5617bac3e9816abbec07dfa871a7 | 3 | {
"blob_id": "15e54604a5bc5617bac3e9816abbec07dfa871a7",
"branch_name": "refs/heads/master",
"committer_date": 1528899832000,
"content_id": "f9601b5081c86d813a53690d08cb3008d2ec4534",
"detected_licenses": [
"MIT"
],
"directory_id": "49f672ad53cbcf85047201a20a5f61b0d9216bcc",
"extension": "py",
"fi... | 2.5625 | stackv2 | import requests
import json
import os
from flask import Flask, render_template, request
# Init Flask
app = Flask(__name__)
# Helpers
def _url(path):
return 'https://api.ciscospark.com/v1' + path
def _fix_at(at):
if 'Bearer' not in at:
return 'Bearer ' + at
else:
return at
def get... | 116 | 26.14 | 82 | 13 | 805 | python | [{"finding_id": "codeql_py/flask-debug_2a43214a4229948b_ddbf912a", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
116,
21
] | [
null,
null
] | [
5,
12
] | [
51,
83
] | |
2024-11-19T03:22:33.474593+00:00 | 1,629,387,081,000 | f4e0d02fa0d1a97a2c36cfce99201dd5a7f77c9e | 2 | {
"blob_id": "f4e0d02fa0d1a97a2c36cfce99201dd5a7f77c9e",
"branch_name": "refs/heads/master",
"committer_date": 1629387081000,
"content_id": "8028cd48ad759c114d0eec695dfe769a8db0bba7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f1716199259f9a1fc8ee923614ec543ebb3c5409",
"extension": "py"... | 2.453125 | stackv2 | from transformers import AutoTokenizer, pipeline
from flask import Flask, request, jsonify, render_template
from queue import Queue, Empty
from threading import Thread
import time
app = Flask(__name__)
print("model loading...")
# Model loading
tokenizer = AutoTokenizer.from_pretrained("seongju/squadv2-xlm-roberta-b... | 111 | 25.1 | 91 | 18 | 668 | python | [{"finding_id": "codeql_py/stack-trace-exposure_620d7d96823876ce_7f4d0afe", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-079"
] | [
"py/stack-trace-exposure",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
67,
89
] | [
null,
null
] | [
24,
12
] | [
36,
25
] | |
2024-11-19T03:22:50.377933+00:00 | 1,551,911,151,000 | 1bed54eb424103cc838e369982845259f5af429d | 2 | {
"blob_id": "1bed54eb424103cc838e369982845259f5af429d",
"branch_name": "refs/heads/master",
"committer_date": 1551911151000,
"content_id": "2783191215ffdca5f2813018c229205a46552568",
"detected_licenses": [
"MIT"
],
"directory_id": "a2f50d0f977f6043cf8ce34efc95815316a6c711",
"extension": "py",
"fi... | 2.5 | stackv2 | import paramiko
from paramiko import AuthenticationException, SSHException, ChannelException
from enum import Enum
from concurrent.futures import ThreadPoolExecutor
from socket import error as SocketError
from margaritashotgun.auth import AuthMethods
from margaritashotgun.exceptions import *
import logging
logger = lo... | 228 | 39.12 | 88 | 17 | 1,781 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_8093ea92f1aa157c_33505bb6", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation",
"py/paramiko-missing-host-key-validation"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
32,
53
] | [
null,
null
] | [
9,
17
] | [
71,
89
] | |
2024-11-19T03:44:14.108118+00:00 | 1,692,194,979,000 | 9daade4a48979e0ce812797adc12a073d1ab257e | 2 | {
"blob_id": "9daade4a48979e0ce812797adc12a073d1ab257e",
"branch_name": "refs/heads/master",
"committer_date": 1692194979000,
"content_id": "04e3feae09afb3d460f8f3074a8b53ae5faad7c7",
"detected_licenses": [
"MIT"
],
"directory_id": "26720cf4472a0370881755ef0720893c65977983",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python3
"""InnoGames Monitoring Plugins - HTTPS Domains Check
Copyright (c) 2019 InnoGames GmbH
"""
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, includ... | 186 | 32.46 | 79 | 17 | 1,392 | python | [{"finding_id": "codeql_py/insecure-protocol_db43493e39e646bc_3d75c91b", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)."
] | [
113
] | [
null
] | [
10
] | [
17
] | |
2024-11-19T03:44:14.957231+00:00 | 1,571,612,630,000 | 98407158290c1cf7fba728271963c74efa9d431f | 3 | {
"blob_id": "98407158290c1cf7fba728271963c74efa9d431f",
"branch_name": "refs/heads/master",
"committer_date": 1571612630000,
"content_id": "a15f461bdf6af83cc928e09ee6a596f582be85ae",
"detected_licenses": [
"MIT"
],
"directory_id": "401b79c9b8f16da44352c5509390663ec2239ac5",
"extension": "py",
"fi... | 2.84375 | stackv2 | # ref: http://ozzmaker.com/using-python-with-a-gps-receiver-on-a-raspberry-pi/
# ref: http://ozzmaker.com/how-to-save-gps-data-to-a-file-using-python/
from gps import *
import threading
gpsd = None
class GpsPoller(threading.Thread):
def __init__(self):
threading.Thread.__init__(self)
global gpsd
... | 92 | 31.9 | 119 | 17 | 891 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_051667b8f4ea58ce_76d1a46e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
86
] | [
null
] | [
19
] | [
23
] | |
2024-11-19T01:34:51.509873+00:00 | 1,482,494,433,000 | 4a7d35bd5fc3673c751e05446cc44da5e733f91b | 3 | {
"blob_id": "4a7d35bd5fc3673c751e05446cc44da5e733f91b",
"branch_name": "refs/heads/master",
"committer_date": 1482494433000,
"content_id": "63155133cc0a2d2166ff0165314a286838f80214",
"detected_licenses": [
"MIT"
],
"directory_id": "8ef20f842698e009de77269fd6cfe40daa4101d5",
"extension": "py",
"fi... | 2.734375 | stackv2 | # -*- coding: utf-8 -*-
"""
Update the secrets in a Wordpress configuration file.
MIT License
Copyright (c) 2016 Martin Bo Kristensen Grønholdt
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software w... | 136 | 32.46 | 89 | 18 | 1,092 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0ba0009147660c18_807f986d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
106
] | [
null
] | [
10
] | [
52
] | |
2024-11-19T01:34:52.892624+00:00 | 1,646,407,541,000 | b5307fd41d41a776ea79a8e2b282f94c56b7e30a | 3 | {
"blob_id": "b5307fd41d41a776ea79a8e2b282f94c56b7e30a",
"branch_name": "refs/heads/master",
"committer_date": 1646407541000,
"content_id": "e98cacd94994597adbd88d9312e10c5a069bdfd3",
"detected_licenses": [
"MIT"
],
"directory_id": "31b2db174900aecc3a71117250aa5f781652bff6",
"extension": "py",
"fi... | 2.984375 | stackv2 | """
By Hubert Gee
Description
SSH to a device and enter commands.
Supports SFTP to download files also.
Usage:
sshClient = sshExecCommand.Connect(apiServerIp, username, password)
# linux
sshClient.transferFile('/mnt/ixload-share/http.rxf', '/home/hgee/http.rxf')
stdout,stderr = sshClient.en... | 136 | 34.67 | 156 | 20 | 1,054 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_7af1d51561f7972e_4ef5b122", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
56
] | [
null
] | [
13
] | [
81
] | |
2024-11-19T01:35:08.166702+00:00 | 1,619,968,750,000 | 2c42f80a75731b47b6396861fc2ebd3d3c0070e1 | 3 | {
"blob_id": "2c42f80a75731b47b6396861fc2ebd3d3c0070e1",
"branch_name": "refs/heads/main",
"committer_date": 1619968750000,
"content_id": "9facc82540116b9019e0ef9a735ac9670e823ecc",
"detected_licenses": [
"MIT"
],
"directory_id": "d3aba2f8f1d3248d63857c54282bf7ddce4d8d05",
"extension": "py",
"file... | 2.8125 | stackv2 | # this is an example
#
# Dieses Beispiel enthält vorschläge für Formatierung
# (und geht über das Niveau des start-projects hinaus).
# Dieser Code kann als inspiration dienen um sich den
# Aufbau eines Programms in Python vorzustellen.
#
# Nutzt bitte Methoden und führt dann zum Schluss diese
# in dieser if Abfrage au... | 415 | 34.08 | 92 | 22 | 3,107 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_903cfcfa430d7fe2_af0fa851", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
275
] | [
null
] | [
15
] | [
19
] | |
2024-11-19T02:07:50.165521+00:00 | 1,579,219,365,000 | 40556ae894c89a88b39a40359f44463f2ec08bcf | 3 | {
"blob_id": "40556ae894c89a88b39a40359f44463f2ec08bcf",
"branch_name": "refs/heads/master",
"committer_date": 1579219365000,
"content_id": "ee41eb2aa416450544a17be12beb9612eb15f788",
"detected_licenses": [
"MIT"
],
"directory_id": "be23991846c509b5dda5012e65ec95d3d0a41c73",
"extension": "py",
"fi... | 3 | stackv2 | from bs4 import BeautifulSoup
import requests
import re
from difflib import SequenceMatcher
class Braacket:
def __init__(self, league):
# https://braacket.com/league/{league}
# https://braacket.com/league/{league}/player?rows=200
# ie: 'NCMelee'
self.league = league
#s... | 360 | 40.06 | 116 | 18 | 3,536 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_532f4525ed9a0ff7_86284570", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [twitter.com](1) may be at an arbitrary position in the... | 6 | true | [
"CWE-020",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/incomplete-url-substring-sanitization",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The string [twitter.com](1) may be at an arbitrary position in the sanitized URL.",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation beca... | [
111,
29,
68,
121,
167,
281
] | [
null,
31,
70,
122,
169,
null
] | [
24,
13,
13,
13,
13,
13
] | [
53,
60,
69,
74,
58,
48
] | |
2024-11-19T02:17:34.836627+00:00 | 1,619,072,732,000 | c4280c8c5985a09b69086fd57452c398d040f42c | 2 | {
"blob_id": "c4280c8c5985a09b69086fd57452c398d040f42c",
"branch_name": "refs/heads/master",
"committer_date": 1619072732000,
"content_id": "a4e6cba016dd1e2cdd954469d0530a12f290140c",
"detected_licenses": [
"MIT"
],
"directory_id": "06664d4ae71bc4e9245972544b95d15818774728",
"extension": "py",
"fi... | 2.390625 | stackv2 | import aiohttp_jinja2
import jinja2
import secrets
import random
from aiohttp import web
from aiohttp.client import MultiDict
from source import fit_model, vectorize, model_predict
routes = web.RouteTableDef()
PORT = 8080
base_url = f"http://localhost:{PORT}"
IMGS, X, Y = 3, 5, 7
THRESH = 0.1
networks = {}
@rout... | 175 | 22.64 | 108 | 15 | 1,136 | python | [{"finding_id": "codeql_py/url-redirection_0a0d6df9c182a325_afb98aba", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
45
] | [
null
] | [
34
] | [
108
] | |
2024-11-19T02:18:03.310206+00:00 | 1,678,286,428,000 | c5345b0b0def31d2f7b6cc45f98e4848a81b37bd | 3 | {
"blob_id": "c5345b0b0def31d2f7b6cc45f98e4848a81b37bd",
"branch_name": "refs/heads/master",
"committer_date": 1678286428000,
"content_id": "54e98dc07188a395730e65bd3aabf3fcf3c9b951",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "7a2358ec25d0c0f2ac9c495c95d889022adb2aa1",
"extension": "p... | 2.75 | stackv2 | #!/usr/bin/env python
##########################################################
# This script retrieves the reference results from
# a remote repository which is at
# https://simulationresearch.lbl.gov/jmodelica/modelica-ibpsa/Dymola/.
#
# This script creates a folder called 'Dymola'
# in the working directory and wri... | 44 | 36.02 | 86 | 15 | 376 | python | [{"finding_id": "codeql_py/overly-large-range_a0ed424d501b3630_fc60a793", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class.", "remediation": "", "loc... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class.",
"Suspicious character range that overlaps with A-Z in the same character class.",
"Suspicious character range that overlaps with 0-9 in the same character class."
] | [
29,
29,
29
] | [
null,
null,
null
] | [
35,
38,
41
] | [
38,
41,
44
] | |
2024-11-19T02:18:15.088517+00:00 | 1,488,760,291,000 | f93d48ceb2ca2b8c1e2f97fd5be9ba5d86c8ff67 | 4 | {
"blob_id": "f93d48ceb2ca2b8c1e2f97fd5be9ba5d86c8ff67",
"branch_name": "refs/heads/master",
"committer_date": 1488760291000,
"content_id": "04ba7ce1a6088995a07e04ad84764c5aaa329eec",
"detected_licenses": [
"MIT"
],
"directory_id": "7d874847354d8f49cfd49f6c1bdc62e8ad864b99",
"extension": "py",
"fi... | 3.6875 | stackv2 | """ Exercise 4 """
import hashlib
def genpasswd(password):
""" Accepts a password and generate new one """
sha1 = hashlib.sha1(password.encode('utf-8'))
hashstring = sha1.hexdigest()
return hashstring[:6]
def findcollision(x0):
""" Finds two input passwords which give the same output from genpas... | 38 | 23.24 | 85 | 15 | 275 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b6342326af204d48_235f562c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw... | [
24,
7
] | [
null,
null
] | [
19,
25
] | [
85,
49
] | |
2024-11-19T02:18:16.095828+00:00 | 1,521,869,104,000 | 29970279c96cfa794beeea612fa892f2a43a87e3 | 2 | {
"blob_id": "29970279c96cfa794beeea612fa892f2a43a87e3",
"branch_name": "refs/heads/master",
"committer_date": 1521869104000,
"content_id": "882526f622c4e52859a6552c6eb1de9e5322ef34",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "ccefe1573b03ad801b97f648ee4f88cc4383ec7f",
"extension": "p... | 2.46875 | stackv2 | from scapy.all import *
class signature:
def __init__(self, type):
if type in ["probe", "assoc"]:
self.type = type
else:
print("wrong data type!")
raise ValueError
# change member type from list[] to string'' for bitwise comparison later
self.pro... | 134 | 37.41 | 114 | 23 | 1,132 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_872e9ed2fb87f524_2e1e515c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text."
] | [
33
] | [
null
] | [
15
] | [
47
] | |
2024-11-19T02:18:17.877652+00:00 | 1,624,481,200,000 | 91ff6b9516d519db68ab97bb8e8caf94082a5be9 | 2 | {
"blob_id": "91ff6b9516d519db68ab97bb8e8caf94082a5be9",
"branch_name": "refs/heads/main",
"committer_date": 1624481200000,
"content_id": "a814e2f2fbab3796bc9ffb9c7874a47679d1d0bc",
"detected_licenses": [
"MIT"
],
"directory_id": "216912b6d4591c627cf681f86483be2f15aef03d",
"extension": "py",
"file... | 2.4375 | stackv2 | from typing import Optional
from fastapi import FastAPI
import requests
import json
app = FastAPI()
@app.get("/")
@app.get("/queues/{queue_name}")
def read_queue_messages(queue_name: str):
url = 'http://13.81.39.210:15672/api/queues/dcs/' + queue_name + '/get'
myobj = '{"count":100,"requeue":"true","encodin... | 25 | 28.56 | 79 | 14 | 206 | python | [{"finding_id": "codeql_py/partial-ssrf_38329353f11806f0_2d098930", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
16
] | [
null
] | [
9
] | [
71
] | |
2024-11-19T02:29:58.092602+00:00 | 1,460,397,847,000 | fa51c4a75bd36720e82b0e854701261aba1a5896 | 3 | {
"blob_id": "fa51c4a75bd36720e82b0e854701261aba1a5896",
"branch_name": "refs/heads/master",
"committer_date": 1460397847000,
"content_id": "e0acbb29f2195b62410a8581d931306a6ff6397b",
"detected_licenses": [
"MIT"
],
"directory_id": "b4ae4ded103cc4c496bf4749c5a5fbfb2f1e3a2f",
"extension": "py",
"fi... | 2.671875 | stackv2 | from flask import Flask, request, make_response
import julia_fast
from PIL import Image
from matplotlib import cm
from itertools import product
from threading import Thread
from uuid import uuid4
import numpy as np
import time
import io
import shelve
application = Flask(__name__)
store = shelve.open('example.dat')
#A... | 83 | 24.27 | 71 | 15 | 604 | python | [{"finding_id": "codeql_py/reflective-xss_f0908d6a47a67cfa_a97432c3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
78
] | [
null
] | [
12
] | [
16
] | |
2024-11-19T02:30:03.804829+00:00 | 1,569,367,875,000 | 8b633dc0751f0f3b3d58bf2a4728b59d3b9d6a73 | 3 | {
"blob_id": "8b633dc0751f0f3b3d58bf2a4728b59d3b9d6a73",
"branch_name": "refs/heads/master",
"committer_date": 1569367875000,
"content_id": "26fef67105431aa29509f3c473ffa5fdfa1a358c",
"detected_licenses": [
"MIT"
],
"directory_id": "77a066a86c8c65b233df5476bac1c16023155c10",
"extension": "py",
"fi... | 3.109375 | stackv2 | import requests
class Employee:
min_hourly_wage = 17.91 #LAW
weeks_per_year = 52.0 #assume full-time
hours_per_week = 40.0 #assume full-time
min_superannuation_percent = 9.5
atCompanyDefault="@company.com"
min_salary = min_hourly_wage * hours_per_week * weeks_per_year #LAW #assume full-time
... | 52 | 37.02 | 113 | 15 | 491 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6de7d938c8a89abd_84ca2226", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
26
] | [
null
] | [
20
] | [
81
] | |
2024-11-19T02:30:21.187800+00:00 | 1,619,350,802,000 | c6805ba356b673806387cb0eb24bbc942e24f677 | 3 | {
"blob_id": "c6805ba356b673806387cb0eb24bbc942e24f677",
"branch_name": "refs/heads/main",
"committer_date": 1619350802000,
"content_id": "f61f02075500db1f23c733164106f39184d0ad17",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "95b0f73d0dac443851359dec350bc22823573ec3",
"extension": "py",
... | 2.640625 | stackv2 | #
from api import MessageServiceApi
from thrift.transport import TSocket
from thrift.transport import TTransport
from thrift.protocol import TBinaryProtocol
from thrift.server import TServer
class MessageService(object):
def __init__(self):
self.name = 'api.MessageService'
def startup(self):
p... | 41 | 27.66 | 80 | 12 | 295 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9d610c6f5a3b38ef_f6dd7ea5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
30
] | [
null
] | [
15
] | [
56
] | |
2024-11-19T02:30:39.336260+00:00 | 1,670,690,629,000 | 223ca0c5d35a0ffc30ea757cedf0e8067ce9c0f9 | 3 | {
"blob_id": "223ca0c5d35a0ffc30ea757cedf0e8067ce9c0f9",
"branch_name": "refs/heads/master",
"committer_date": 1670690629000,
"content_id": "21fbbc24c50c2d4b032efc9bb158027790950d96",
"detected_licenses": [
"MIT"
],
"directory_id": "e0ca06af60b05d6e8e6d22d1e89696692bdfe807",
"extension": "py",
"fi... | 3.046875 | stackv2 | #!/usr/local/bin/python3
# -*- coding: utf-8 -*-
# DESCRIPTION: Given an excel file and text files passed as arguments to the script,
# metadata headers are added to each individual text files
#
# Mac OS example:
# python add_headers.py --directory=Spring\ 2018/normalized/ --master_file=Metadata_Spring_2018_updated... | 283 | 48.12 | 137 | 22 | 3,069 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d988aa21469b7890_a94267bd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text."
] | [
235
] | [
null
] | [
23
] | [
49
] | |
2024-11-19T02:30:40.290882+00:00 | 1,520,601,566,000 | 2d337b7b4a9372538d0794b472d5d48e5468138a | 3 | {
"blob_id": "2d337b7b4a9372538d0794b472d5d48e5468138a",
"branch_name": "refs/heads/master",
"committer_date": 1520601566000,
"content_id": "bca8aee2291be2344b3b70df8a57a51a72f61b31",
"detected_licenses": [
"MIT"
],
"directory_id": "2648b9f8097156ce8c02db4a3c563e9ccd1727e9",
"extension": "py",
"fi... | 2.609375 | stackv2 | # -*- coding: utf-8 -*-
"""
Public section
"""
import os
import json
from flask import Blueprint, render_template, request, Response
import pandas as pd
from ..utils import NumpyJsonEncoder, check_config, list_is_true, str_to_list, translate_separator, remove_spaces
blueprint = Blueprint('public', __name__, static... | 118 | 40.58 | 117 | 19 | 1,133 | python | [{"finding_id": "codeql_py/reflective-xss_6d1a8237bc0c6400_02e17a0b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 4 | true | [
"CWE-079",
"CWE-079",
"CWE-022",
"CWE-022"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
79,
86,
98,
113
] | [
80,
87,
null,
null
] | [
16,
12,
23,
19
] | [
48,
44,
42,
38
] | |
2024-11-19T02:41:39.712681+00:00 | 1,544,315,709,000 | bea20fc8d701c2b91d990bb6203749a2e990819c | 2 | {
"blob_id": "bea20fc8d701c2b91d990bb6203749a2e990819c",
"branch_name": "refs/heads/master",
"committer_date": 1544315709000,
"content_id": "750f0e118ad45c90af580aae312cba24f988e153",
"detected_licenses": [
"MIT"
],
"directory_id": "efa579a5b4f4ed9d09bc4db37d388512b4bf0803",
"extension": "py",
"fi... | 2.375 | stackv2 | # CodeName: rehash.py
# Author: Dahir Muhammad Dahir
# Date: 14th-May-2018
# About: i will tell u later
import os
from bs4 import BeautifulSoup as bs
import re
import argparse
import requests
import random
import sys
reload(sys)
sys.setdefaultencoding("utf8")
headers = {"User-Agent": "Mozilla/5.0 (Windows NT 6.3; Wi... | 138 | 28.88 | 128 | 22 | 1,145 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_9bb2257b7896cf5a_fd930fbe", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensiti... | [
85,
90,
131
] | [
null,
null,
null
] | [
16,
12,
11
] | [
46,
29,
15
] | |
2024-11-18T18:06:00.696718+00:00 | 1,597,707,080,000 | 5cd7c509f908eb4c5b71970f3243a33a4c2efdfa | 3 | {
"blob_id": "5cd7c509f908eb4c5b71970f3243a33a4c2efdfa",
"branch_name": "refs/heads/master",
"committer_date": 1597707080000,
"content_id": "0115d3a8ff85583bc3d82cc36c13e1ee1becd7ef",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "be4549717420da7102e0f84ac2743ad1f01f3b4e",
"extension": "py"... | 2.75 | stackv2 | from yaml import load, FullLoader
from jinja2 import Template
from pathlib import Path
def load_config(config_path):
"""Produce a Python object (usually dict-like) from the config file at `config_path`
:param config_path: (str) path to config file, can be absolute or relative to working directory
:return... | 48 | 30.79 | 119 | 13 | 344 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_348d4ec81a53c76b_b3738602", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
20
] | [
null
] | [
20
] | [
45
] | |
2024-11-18T18:06:04.645571+00:00 | 1,620,935,549,000 | d2d0efaf5f25634f190499d3294e2d6d699cb005 | 3 | {
"blob_id": "d2d0efaf5f25634f190499d3294e2d6d699cb005",
"branch_name": "refs/heads/main",
"committer_date": 1620935549000,
"content_id": "dac347fe19ea9e16f660d53f9c0fb23ccab85853",
"detected_licenses": [
"MIT"
],
"directory_id": "ba41e9765416a40b8ce533f80b4c593f5b4a256d",
"extension": "py",
"file... | 3.046875 | stackv2 | import re
from controllers import employees_controller
# regex for email validation
regex = '^(\w|\.|\_|\-)+[@](\w|\_|\-|\.)+[.]\w{2,3}$'
# Returns a message "Pass" when field is valid, custom message when invalid
def validate_field(id, type, field):
if(type == "phone"):
print('Checking phone')
if(... | 115 | 34.11 | 96 | 15 | 911 | python | [{"finding_id": "codeql_py/redos_c8bb3735afa41575_685011aa", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "remediati... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'a@' and containing many repetitions of '_'."
] | [
4,
4
] | [
null,
null
] | [
11,
28
] | [
25,
42
] | |
2024-11-18T18:15:57.062294+00:00 | 1,543,443,364,000 | 0b0362d757825b09948a82ae8ae1b58dd2ffcf53 | 3 | {
"blob_id": "0b0362d757825b09948a82ae8ae1b58dd2ffcf53",
"branch_name": "refs/heads/master",
"committer_date": 1543443364000,
"content_id": "2ecfb693502de9822756be21da58399a6e7f3ea7",
"detected_licenses": [
"MIT"
],
"directory_id": "3c8273af6151343490a09a414a9b50ac1f714f73",
"extension": "py",
"fi... | 2.609375 | stackv2 | import hashlib
import random
import string
import uuid
from mongoengine import StringField
from models.Base import BaseDocument, BaseSchema, BaseFactory
__author__ = 'Enis Simsar'
# from http://www.pythoncentral.io/hashing-strings-with-python/
def hash_password(password):
# uuid is used to generate a random nu... | 43 | 25.98 | 97 | 16 | 277 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b9ff2e165f58a59c_df17446f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
17
] | [
null
] | [
27
] | [
60
] | |
2024-11-18T18:16:06.145993+00:00 | 1,605,684,444,000 | 6633f50ae35fd886e6551b5ba3fc1c8af6d474ec | 2 | {
"blob_id": "6633f50ae35fd886e6551b5ba3fc1c8af6d474ec",
"branch_name": "refs/heads/master",
"committer_date": 1605684444000,
"content_id": "8d6a1b02d0258b012ca4531c3c0e7e1434a920f0",
"detected_licenses": [
"MIT"
],
"directory_id": "ef21ea6ed244666cac5f96e4cfdaa58a7276049f",
"extension": "py",
"fi... | 2.46875 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
'''
Use Ciel to automatically do updates
'''
import os
import re
import sys
import logging
import argparse
import requests
import readline
import subprocess
logging.basicConfig(
format='[%(levelname)s] %(message)s', level=logging.INFO)
re_variable = re.compile('^\\... | 166 | 31.93 | 105 | 16 | 1,332 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_73954cd64f0cede3_e0d3ea5a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://github.com](1) may be at an arbitrary position... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [https://github.com](1) may be at an arbitrary position in the sanitized URL."
] | [
87
] | [
null
] | [
8
] | [
47
] | |
2024-11-18T18:59:38.109728+00:00 | 1,693,345,400,000 | 0c3dc1e9ce57f55301c7a9e7ba8cfdce9b21ffbc | 2 | {
"blob_id": "0c3dc1e9ce57f55301c7a9e7ba8cfdce9b21ffbc",
"branch_name": "refs/heads/master",
"committer_date": 1693345400000,
"content_id": "b6a7544aa212528e07c5833fb80a17329496e8e1",
"detected_licenses": [
"MIT"
],
"directory_id": "8018cbc929b44be4a203dafa661a566151bb801d",
"extension": "py",
"fi... | 2.453125 | stackv2 | from flask import jsonify, request, make_response
from flask_restful import Resource
from sqlalchemy import or_, and_
from datetime import datetime
import json
import os
from api.function_library.image_functions import save_image
from api.resources.authentication import requires_auth
from api.utility.storage import up... | 280 | 28.04 | 173 | 18 | 1,798 | python | [{"finding_id": "codeql_py/stack-trace-exposure_2177bfc1427770b8_f54c518d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
198
] | [
null
] | [
61
] | [
71
] | |
2024-11-18T19:11:48.510841+00:00 | 1,501,782,942,000 | 3b8c0592ee3d52d27bb26d1526dec0dfb4c495df | 3 | {
"blob_id": "3b8c0592ee3d52d27bb26d1526dec0dfb4c495df",
"branch_name": "refs/heads/master",
"committer_date": 1501782942000,
"content_id": "e203e8931bfdecf6dd66a070f9844718edd6c7ca",
"detected_licenses": [
"MIT"
],
"directory_id": "911d88a5de948fe0860afffaa283af6ca1652a8d",
"extension": "py",
"fi... | 3.125 | stackv2 | """
Simple Facebook Echo bot: Respond with exactly what it receives
Standalone version
"""
import sys, json, traceback, requests
from flask import Flask, request
application = Flask(__name__)
app = application
PAT = 'replace_your_own_PAT_here'
VERIFICATION_TOKEN = 'replace_your_own_token'
@app.route('/', methods=['G... | 128 | 36.35 | 120 | 20 | 1,013 | python | [{"finding_id": "codeql_py/reflective-xss_133bdeaaf0a29352_bfeb5adf", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
19
] | [
null
] | [
16
] | [
53
] | |
2024-11-18T18:39:42.703232+00:00 | 1,644,127,830,000 | 3f02bebf2cdc3f86aeb87debe47729999fbb3606 | 3 | {
"blob_id": "3f02bebf2cdc3f86aeb87debe47729999fbb3606",
"branch_name": "refs/heads/master",
"committer_date": 1644127830000,
"content_id": "d378b5ae211be29e69c4d6e197348ba91d76eb2c",
"detected_licenses": [
"MIT"
],
"directory_id": "5a7cd046d62c7476b874d87dc34e6ef6d5e693b6",
"extension": "py",
"fi... | 2.765625 | stackv2 | #!/usr/bin/python3
from flask import Flask, request, render_template, url_for
import json, os, random
from PIL import Image
TITLE = "VotePhoMe.johanv.xyz - Vote for a Photo" #site title, used in the title bar and the heading within the page
app = Flask(__name__)
app.config['MAX_CONTENT_LENGTH'] = 100 * 1024 * 1024 ... | 172 | 33.2 | 150 | 16 | 1,438 | python | [{"finding_id": "codeql_py/path-injection_9f093b81ef480ef1_aff1113e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
122,
152
] | [
null,
null
] | [
19,
25
] | [
41,
36
] | |
2024-11-18T18:39:52.801616+00:00 | 1,578,748,829,000 | 07f24fcaaccf606e4b868c1f811ba6ada3946bc1 | 2 | {
"blob_id": "07f24fcaaccf606e4b868c1f811ba6ada3946bc1",
"branch_name": "refs/heads/master",
"committer_date": 1578748829000,
"content_id": "6f75734ae3af81f50c5560ec2c1171179709e21f",
"detected_licenses": [
"Apache-2.0",
"MIT"
],
"directory_id": "bb9f44facabecb2cc41728d1ebbf5c59be190962",
"exten... | 2.484375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
r''' Copyright 2020, SigDev
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless requ... | 424 | 33.29 | 78 | 21 | 3,764 | python | [{"finding_id": "codeql_py/overly-large-range_0dde7f753ab5bdde_a289fc76", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
155,
155
] | [
null,
null
] | [
31,
43
] | [
34,
46
] | |
2024-11-18T18:39:54.847192+00:00 | 1,631,518,429,000 | 7d634bd05c5dac050f3e1018cc33fe7236067b40 | 3 | {
"blob_id": "7d634bd05c5dac050f3e1018cc33fe7236067b40",
"branch_name": "refs/heads/master",
"committer_date": 1631518429000,
"content_id": "89a7fbe71fe45759013e77def4938bd36c557e60",
"detected_licenses": [
"MIT"
],
"directory_id": "9afcbcbd35dd5d7ac3f497d825bbad8077396ed5",
"extension": "py",
"fi... | 3 | stackv2 | import re
from aalpy.base import SUL
class TomitaSUL(SUL):
"""
Tomita grammars are often used as a benchmark for automata-related challenges. Simple SUL that implements all 7
Tomita grammars and enables their learning.
"""
def __init__(self, tomita_level_fun):
super().__init__()
... | 68 | 20.74 | 115 | 13 | 484 | python | [{"finding_id": "codeql_py/redos_3b7c5a19d9176858_1d479e99", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '0'.", "remediati... | 3 | true | [
"CWE-1333",
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '0'.",
"This part of the regular expression may cause exponential backtracking on strings starting with '10' and containing many repetitions of '10'.",
"This part of the regular expression may cause... | [
34,
34,
34
] | [
null,
null,
null
] | [
30,
47,
64
] | [
36,
53,
70
] | |
2024-11-18T18:39:59.636576+00:00 | 1,631,294,878,000 | 3d603246342fbdeda6a9a99b790641ef4c2b8af2 | 3 | {
"blob_id": "3d603246342fbdeda6a9a99b790641ef4c2b8af2",
"branch_name": "refs/heads/master",
"committer_date": 1631294878000,
"content_id": "255af7cb32f719e14cc87f76b7c4924180b70bbe",
"detected_licenses": [
"MIT"
],
"directory_id": "d28b6574e8c088cdb4670c48a53e0f93272b102c",
"extension": "py",
"fi... | 2.71875 | stackv2 | import logging
from http.server import HTTPServer, BaseHTTPRequestHandler
from typing import List, Dict
from jsonrpcserver import dispatch, method
from .autodocstring import get_docstring_info
from .constants import DEFAULT_HOST, DEFAULT_PORT
logger = logging.getLogger(__name__)
logger.setLevel(logging.INFO)
logger.... | 95 | 32.58 | 110 | 16 | 716 | python | [{"finding_id": "codeql_py/log-injection_b484eb9540db94be_d4b475f1", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
30
] | [
null
] | [
21
] | [
51
] | |
2024-11-18T18:40:00.321453+00:00 | 1,557,494,207,000 | 3014161f902845ddcf2b827c17fbf522c9c70b87 | 3 | {
"blob_id": "3014161f902845ddcf2b827c17fbf522c9c70b87",
"branch_name": "refs/heads/master",
"committer_date": 1557494207000,
"content_id": "b74225f051a3f77c3917c4872b08e802941c54ff",
"detected_licenses": [
"MIT"
],
"directory_id": "1ada703c1dde2fa6a2b7b08ef941f842a67a139b",
"extension": "py",
"fi... | 3.21875 | stackv2 | import base64
import requests
import os
import sys
import platform
def prepareImage(pathToImage):
print(pathToImage)
with open(pathToImage, 'rb') as imgFile:
image = base64.b64encode(imgFile.read())
decodedImage = image.decode("utf-8")
return decodedImage
def placeGoogleOrder(imageAsStrin... | 128 | 22.16 | 84 | 15 | 692 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_16f4c8c523ff1359_2a6ea464", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text."
] | [
59
] | [
null
] | [
20
] | [
47
] | |
2024-11-18T18:47:04.486433+00:00 | 1,495,759,412,000 | d6e970b1ac4c915a3dfb6c7fca8e7a9068b93651 | 3 | {
"blob_id": "d6e970b1ac4c915a3dfb6c7fca8e7a9068b93651",
"branch_name": "refs/heads/master",
"committer_date": 1495759412000,
"content_id": "7d8159c5180b3930e1974c6da35d37aa911b9c0b",
"detected_licenses": [
"MIT"
],
"directory_id": "5e6a2124f2a7c7eaf5e3e08c3663859fd7abce66",
"extension": "py",
"fi... | 2.59375 | stackv2 | import os
import jinja2
from . import Object, unicode, settings, descriptors
from .base_gui import BaseGUI
from .gui_helper import GUIHelper as Helper
class AppGUI(BaseGUI):
""" GUI class for creating apps using PyQt5's QtWebkit.
The class AppGUI can be used to create standalone applications with HTML
... | 230 | 45.59 | 79 | 16 | 2,219 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_bedd58dea69964f4_b54f2fb6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
111
] | [
null
] | [
41
] | [
61
] | |
2024-11-18T20:58:17.682850+00:00 | 1,619,117,351,000 | 34d03e7a1d635d05fdf1b4308baaf4a9be88baa4 | 4 | {
"blob_id": "34d03e7a1d635d05fdf1b4308baaf4a9be88baa4",
"branch_name": "refs/heads/main",
"committer_date": 1619117351000,
"content_id": "09efbef96ed68085200e637622d0952c458af1ba",
"detected_licenses": [
"MIT"
],
"directory_id": "a884039e1a8b0ab516b80c2186e0e3bad28d5147",
"extension": "py",
"file... | 3.890625 | stackv2 | # Program: Exercicio4_4.py
# Author: Ramon R. Valeriano
# Description:
# Developed: 23/03/2020 - 13:02
# Updated:
salary = float(input("Enter with the salary: R$ "))
if (salary>0):
if salary <= 1250:
tax = 15
else:
tax = 10
new_salary = salary + ((salary*tax)/100)
print("The new salary... | 19 | 20 | 52 | 11 | 142 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_03501e27b35a951b_e112e871", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
15
] | [
null
] | [
11
] | [
52
] | |
2024-11-18T19:49:10.112951+00:00 | 1,628,881,188,000 | ea1b07bf741c11e1d7f459d7ef2adad9252c51e1 | 3 | {
"blob_id": "ea1b07bf741c11e1d7f459d7ef2adad9252c51e1",
"branch_name": "refs/heads/master",
"committer_date": 1628881188000,
"content_id": "d2f8a3ca67700c67bf31cea2a4aed06a2a1c48ec",
"detected_licenses": [
"Apache-2.0",
"BSD-3-Clause"
],
"directory_id": "021b3c9db5265d7ec19df0e6a36fa6aec3b506a3",... | 2.734375 | stackv2 | """JWT Backend.
Navigator Authentication using JSON Web Tokens.
"""
import jwt
from aiohttp import web
from .base import BaseAuthBackend
from datetime import datetime, timedelta
from aiohttp_session import get_session, new_session
from navigator.exceptions import NavException, UserDoesntExists, InvalidAuth
from naviga... | 163 | 35.69 | 85 | 17 | 1,203 | python | [{"finding_id": "codeql_py/stack-trace-exposure_681f80ed19953894_29254302", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
158
] | [
null
] | [
47
] | [
70
] | |
2024-11-18T19:38:18.675826+00:00 | 1,542,991,135,000 | bd011b88cee656ce8451a1917abec62727e84eb4 | 3 | {
"blob_id": "bd011b88cee656ce8451a1917abec62727e84eb4",
"branch_name": "refs/heads/master",
"committer_date": 1542991135000,
"content_id": "bf6b2ad2e8ea736ad86c2d2e23dc01cb71599b5f",
"detected_licenses": [
"MIT"
],
"directory_id": "04db672bd13408b4b61bb4960333abd1c1926a32",
"extension": "py",
"fi... | 2.578125 | stackv2 | #!/bin/python3
from event_queue import EventQueue
#import firebase_admin
#from firebase_admin import credentials, db
import pyrebase
"""
Notifier
Gathers notifications from EventQueue and sends them to PrescriptionManager.
"""
class Notifier:
#_ref = None
#_notification_ref= None
#_prescription_ref= None... | 79 | 32.37 | 98 | 16 | 621 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_88ae024f7e661f32_00b5550d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
63
] | [
null
] | [
39
] | [
44
] | |
2024-11-18T19:38:41.770550+00:00 | 1,619,768,552,000 | bf9e7ee5bfc37e1c4c4f99b6c4644521c591d52a | 3 | {
"blob_id": "bf9e7ee5bfc37e1c4c4f99b6c4644521c591d52a",
"branch_name": "refs/heads/main",
"committer_date": 1619768552000,
"content_id": "1bed96ebcb27a75c338a5dde86db70938716508c",
"detected_licenses": [
"MIT"
],
"directory_id": "4781fc05b27ea6c898716c0f1e39dfb328f97e65",
"extension": "py",
"file... | 3.46875 | stackv2 | income_tax=0
id = int(input("Enter Employee id: "))
basic_salary = int(input("Enter monthly gross salary: "))
allowance = int(input("Enter allowance: "))
gross_salary = basic_salary+allowance
if gross_salary<=5000:
income_tax = 0
elif gross_salary<=10000:
income_tax = 0.1 * gross_salary
elif gross_salary<=20... | 20 | 29.45 | 168 | 9 | 179 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6c76553df5f520cd_9ec72883", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
20
] | [
null
] | [
7
] | [
168
] | |
2024-11-18T20:11:03.942870+00:00 | 1,529,157,358,000 | 3db2e4a488ed76007e896ae5fa332065bc68e66c | 2 | {
"blob_id": "3db2e4a488ed76007e896ae5fa332065bc68e66c",
"branch_name": "refs/heads/master",
"committer_date": 1529157358000,
"content_id": "280b890bb5751f19d36335c42b49c54f1f9f17c7",
"detected_licenses": [
"MIT"
],
"directory_id": "24d1b8bcd71751e37906685f94900a7725fa8fa5",
"extension": "py",
"fi... | 2.46875 | stackv2 | #!/usr/bin/env python
"""
C++ source code generator to create bindings from Neovim API functions
using Magnum types
Based on the bindings/generate_bindings.py script from https://github.com/equalsraf/neovim-qt.
"""
import argparse
import msgpack
import sys, subprocess, os
import re
import jinja2
import datetime
impor... | 284 | 31.63 | 121 | 20 | 2,185 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_7f4625e4dd13947b_74046ffa", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
42
] | [
null
] | [
11
] | [
79
] | |
2024-11-18T20:26:19.771363+00:00 | 1,475,601,860,000 | 332103705bbd616b0e4d6818cc4a95fbd6d4c2bf | 2 | {
"blob_id": "332103705bbd616b0e4d6818cc4a95fbd6d4c2bf",
"branch_name": "refs/heads/master",
"committer_date": 1475601860000,
"content_id": "0b0e905e887bd436b3fb0d30e5b3838e87abdc6e",
"detected_licenses": [
"MIT"
],
"directory_id": "5a5436aeac22f3a928924063ccc7a87d051d03bb",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/python
# coding=utf-8
import logging
import falcon
import smtplib
from catcher import config
from catcher.models import MySQLModel
class Login(object):
@staticmethod
def send_email(recipient, message):
# TODO: nacitat z configu
sender = 'noreply.catcher@gmail.com'
try:
... | 74 | 25.68 | 64 | 15 | 417 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9e6ff5413c5650e5_296a0149", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
31
] | [
32
] | [
17
] | [
43
] | |
2024-11-18T20:26:43.134881+00:00 | 1,592,118,548,000 | b8a73db6e97fac282e9fe918f2b52dd51e7e51c7 | 3 | {
"blob_id": "b8a73db6e97fac282e9fe918f2b52dd51e7e51c7",
"branch_name": "refs/heads/master",
"committer_date": 1592118548000,
"content_id": "858325314e3602d47ad9b4cb8be744f17d788e03",
"detected_licenses": [
"MIT"
],
"directory_id": "7f5e38237e9832f480940bdbb2c152eda370a748",
"extension": "py",
"fi... | 2.640625 | stackv2 | # -*- coding: utf-8 -*-
import redis
import uuid
import time
import json
import numpy as np
from PIL import Image
import cv2
import sys
import os
# import self tool
sys.path.append(os.path.split(os.path.realpath(__file__))[0])
import helpers
import age_gender_service_settings as settings
db = redis.StrictRedis(host=... | 141 | 29.25 | 132 | 18 | 1,169 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d45246e56d127044_619fa9d6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
119
] | [
null
] | [
11
] | [
36
] | |
2024-11-18T20:26:44.277953+00:00 | 1,571,132,936,000 | 0a5663a31d013a3745ddf1ee6d561aac47515cd0 | 2 | {
"blob_id": "0a5663a31d013a3745ddf1ee6d561aac47515cd0",
"branch_name": "refs/heads/master",
"committer_date": 1571132936000,
"content_id": "54a575eef16423c1b4e1a2c077646e3b042da4f5",
"detected_licenses": [
"MIT"
],
"directory_id": "c57d4e42db1c772b951ca75b909f0021673c7396",
"extension": "py",
"fi... | 2.46875 | stackv2 | from flask import Flask, jsonify, request
from werkzeug import secure_filename
from esHandler import ESHandler
import asyncio
import os
import json
ES_PORT = os.environ['ES_PORT']
ES_HOST = os.environ['ES_HOST']
ES_INDEX_NAME = "expenses"
SHEET_FORM_DATA_NAME = "file"
app = Flask(__name__)
es = ESHandler(ES_HOST,ES_P... | 63 | 28.81 | 100 | 12 | 460 | python | [{"finding_id": "codeql_py/reflective-xss_92ff2a7fa0fe017b_280a720a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
49
] | [
null
] | [
9
] | [
97
] | |
2024-11-18T20:26:52.490530+00:00 | 1,601,398,331,000 | 3fa470a4cba1e2871e7db9296c55042129b2536e | 2 | {
"blob_id": "3fa470a4cba1e2871e7db9296c55042129b2536e",
"branch_name": "refs/heads/main",
"committer_date": 1601398331000,
"content_id": "c3dc4a46383c558083505f7474c632ee9333e853",
"detected_licenses": [
"MIT"
],
"directory_id": "cc129db64fc64d1cb9a99526583771c10e245deb",
"extension": "py",
"file... | 2.484375 | stackv2 | import re
from collections import defaultdict
from datetime import datetime
from city_scrapers_core.constants import (
ADVISORY_COMMITTEE,
BOARD,
COMMITTEE,
FORUM,
NOT_CLASSIFIED,
)
from city_scrapers_core.items import Meeting
from city_scrapers_core.spiders import CityScrapersSpider
from dateutil.... | 146 | 36.59 | 88 | 19 | 1,186 | python | [{"finding_id": "codeql_py/overly-large-range_63e4da11d117a09d_86fdf7da", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
107
] | [
null
] | [
37
] | [
40
] | |
2024-11-18T20:52:16.508081+00:00 | 1,438,801,911,000 | 499ff13155344271b01721bd9a6ce7f4b6f2bc26 | 2 | {
"blob_id": "499ff13155344271b01721bd9a6ce7f4b6f2bc26",
"branch_name": "refs/heads/master",
"committer_date": 1438801911000,
"content_id": "a7078044a735cea25d175bae8690ff55351cb03a",
"detected_licenses": [
"MIT"
],
"directory_id": "c159364dcc17ee7ca04d1b6380ef09f552b3cb36",
"extension": "py",
"fi... | 2.40625 | stackv2 | from configparser import ConfigParser
from datetime import datetime
import logging
import requests
from yapsy.IPlugin import IPlugin
from api.motor import Motor
ALARM_ON_ALERT_MESSAGE = "Command Center - Alarm is now on alert! Alert start time: %s"
ALARM_ON_ALERT_OFF_MESSAGE = "Command Center - Alarm alert is off. ... | 54 | 42.07 | 113 | 18 | 499 | python | [{"finding_id": "codeql_py/request-without-cert-validation_be3872d4abe97bc0_39bc6e8f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
38
] | [
null
] | [
21
] | [
77
] | |
2024-11-18T20:52:17.251664+00:00 | 1,628,177,393,000 | dfd15de8dff1c24862e5e4109d73b0eeb8fbcfa8 | 2 | {
"blob_id": "dfd15de8dff1c24862e5e4109d73b0eeb8fbcfa8",
"branch_name": "refs/heads/master",
"committer_date": 1628177393000,
"content_id": "5e261ce71689edc2d17bc1ba7fbcb193b80441b2",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "825035ad37f8baf4cfd3057afa93a306523644c5",
"extension": "p... | 2.421875 | stackv2 | # -*- coding: utf-8 -*-
"""
restapp.py
:copyright: (c) 2014 by Aravinda VK
:license: MIT, see LICENSE for more details.
"""
import types
from flask import Flask, request, jsonify
from functools import wraps
from glusterfsrest import users
from glusterfsrest.config import APP_DEBUG
from glusterfsrest.excep... | 98 | 23.07 | 72 | 15 | 550 | python | [{"finding_id": "codeql_py/stack-trace-exposure_83a8b802b44e809b_4361867d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
34
] | [
null
] | [
20
] | [
27
] | |
2024-11-18T20:52:28.616547+00:00 | 1,566,916,850,000 | 3a2b93bad38cf67fb882d21c306e799932f63b68 | 4 | {
"blob_id": "3a2b93bad38cf67fb882d21c306e799932f63b68",
"branch_name": "refs/heads/master",
"committer_date": 1566916850000,
"content_id": "30487e7d17b24c8231abdfb8f5a5d081d1ac45d0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7847fc84698c4e5acaad15c9e5435b78bc3fed9b",
"extension": "py"... | 4.375 | stackv2 | def main():
printNumbers()
password = input("Enter a password: ")
confirm_pass = input("Please confirm your password: ")
print(checkPassword(password, confirm_pass))
print(evenOrOdd())
print(prob4_main(greeting_word()))
print(quit_func())
number1 = int(input("Enter a number: "))
numb... | 61 | 24.03 | 78 | 11 | 427 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d60c6f4a45900780_05048bb1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
5
] | [
null
] | [
11
] | [
48
] | |
2024-11-18T20:52:28.746275+00:00 | 1,633,424,613,000 | 962eae897616677d348bba6c680fdee3e86821b9 | 3 | {
"blob_id": "962eae897616677d348bba6c680fdee3e86821b9",
"branch_name": "refs/heads/master",
"committer_date": 1633424613000,
"content_id": "8358dc2e96e48c37b397c1912526b61b2ea400d3",
"detected_licenses": [
"MIT"
],
"directory_id": "50b9be56ddad0fab18439b6023a174369c3b8c94",
"extension": "py",
"fi... | 2.8125 | stackv2 | from flask import Blueprint, jsonify, render_template
from requests import get
import pandas as pd
# Create a blueprint for the REST API
rest_bp = Blueprint(
'api',
__name__,
template_folder="templates",
static_folder="static",
)
"""
API endpoints for world data
"""
# All available data, for all ... | 109 | 27.89 | 97 | 15 | 760 | python | [{"finding_id": "codeql_py/partial-ssrf_7587641afee2a920_6e4af34a", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
46,
107
] | [
null,
null
] | [
16,
12
] | [
74,
78
] | |
2024-11-18T20:52:47.619701+00:00 | 1,533,625,424,000 | 92ed058745b133d11d08bdea39019646b3fcb357 | 3 | {
"blob_id": "92ed058745b133d11d08bdea39019646b3fcb357",
"branch_name": "refs/heads/master",
"committer_date": 1533625424000,
"content_id": "bc7d738540f0f441e8dc884ea6abb91e330a9f9e",
"detected_licenses": [
"MIT"
],
"directory_id": "412e49b698f1a3feed93d55817574e6a2cb45b30",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/env python3
#encoding: utf-8
import threading
import sys
from json.decoder import JSONDecodeError
from requests import get as request
from time import sleep
from inspect import currentframe
# === Константы ===
api = "https://api.vk.com/method/"
tokenPrefix = "?v=5.67&access_token=%s"
setActivity = api + ... | 372 | 25.83 | 140 | 22 | 2,572 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_873a05370761846a_75cf296f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
231,
357
] | [
null,
null
] | [
16,
24
] | [
72,
38
] | |
2024-11-18T20:52:56.807506+00:00 | 1,688,789,443,000 | 45e2c971e7767479a321782fe009249d5f06e51d | 2 | {
"blob_id": "45e2c971e7767479a321782fe009249d5f06e51d",
"branch_name": "refs/heads/master",
"committer_date": 1688789443000,
"content_id": "0a3e521343551e3fbda50306ee4004df4a25a64c",
"detected_licenses": [
"MIT"
],
"directory_id": "982385175300be331c5e9dfa22c22ea7d31afb54",
"extension": "py",
"fi... | 2.375 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
from subprocess import check_output # call command line
# from subprocess import Popen, PIPE
import os # make directories, change current dir, etc
import platform # macOS or windows
import shutil # move and delete files/folders
from glob impor... | 297 | 29.21 | 91 | 17 | 2,222 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_44154256f227b3f4_e72706c0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
291
] | [
null
] | [
16
] | [
56
] | |
2024-11-18T19:02:35.247871+00:00 | 1,532,896,337,000 | 0463acd47cfe1546a3855a828cc6a8e81200ed3e | 3 | {
"blob_id": "0463acd47cfe1546a3855a828cc6a8e81200ed3e",
"branch_name": "refs/heads/master",
"committer_date": 1532896337000,
"content_id": "7108af6acd918e364e23d694f14a7ffb44f34569",
"detected_licenses": [
"MIT"
],
"directory_id": "00e6a9585a54f7b82023be8c8d3c58e651faf472",
"extension": "py",
"fi... | 3.359375 | stackv2 | import re
import string
class Clean:
def __init__(self, text):
self.text = text
def low(self):
'''make string lowercase'''
return self.text.lower()
def caps(self):
'''make string uppercase'''
return self.text.upper(... | 54 | 24.17 | 64 | 13 | 338 | python | [{"finding_id": "codeql_py/overly-large-range_c2caf65b7291b94e_661e0cf8", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range ... | [
47,
47,
47,
47
] | [
null,
null,
null,
null
] | [
34,
37,
40,
49
] | [
38,
41,
44,
53
] | |
2024-11-18T19:02:39.543382+00:00 | 1,536,892,647,000 | 32507472067e84a94fccc44eb5f900e19fc9f0cb | 2 | {
"blob_id": "32507472067e84a94fccc44eb5f900e19fc9f0cb",
"branch_name": "refs/heads/master",
"committer_date": 1536892647000,
"content_id": "b165b98d47e80dd13a5f43c5038b6e789e14e945",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "4e6ca2bf1e8b250bf5457c41cdbf07f7b958ddf3",
"extension": "p... | 2.328125 | stackv2 | #!/usr/bin/env python3
from flask import Flask, jsonify, request
import threading
import time
import os
from functools import partial
from config import config
from multiprocessing.dummy import Pool as ThreadPool
import requests
import os
import sys
from itertools import product
app = Flask(__name__)
local_data_stor... | 68 | 30.91 | 134 | 19 | 513 | python | [{"finding_id": "codeql_py/partial-ssrf_b0871adbdc759c73_83523638", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)."
] | [
60
] | [
null
] | [
17
] | [
135
] | |
2024-11-18T19:02:47.807467+00:00 | 1,618,849,231,000 | d23446f8e75e5425ec6277402f060865381f8d2a | 2 | {
"blob_id": "d23446f8e75e5425ec6277402f060865381f8d2a",
"branch_name": "refs/heads/master",
"committer_date": 1618996570000,
"content_id": "2fd0909fc4554d12b2ec63537968aff3fabe4936",
"detected_licenses": [
"MIT"
],
"directory_id": "50810fdbd65afed9a060c9c39cc79ae1c52b86f6",
"extension": "py",
"fi... | 2.359375 | stackv2 | # Copyright (c) Facebook, Inc. and its affiliates.
#
# This source code is licensed under the MIT license found in the
# LICENSE file in the root directory of this source tree.
import subprocess
from flask import Flask
app = Flask(__name__)
@app.route("/rce/<string:payload>")
def definite_rce(payload: str) -> Non... | 26 | 22.46 | 65 | 10 | 149 | python | [{"finding_id": "codeql_py/command-line-injection_81fbb3009fc3c34d_804fee6f", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 2 | true | [
"CWE-078",
"CWE-078"
] | [
"py/command-line-injection",
"py/command-line-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This command line depends on a [user-provided value](1)."
] | [
16,
26
] | [
null,
null
] | [
20,
20
] | [
27,
37
] | |
2024-11-18T19:14:28.520022+00:00 | 1,671,235,182,000 | 41d012c570717943b557698551cd2cad4433e735 | 2 | {
"blob_id": "41d012c570717943b557698551cd2cad4433e735",
"branch_name": "refs/heads/master",
"committer_date": 1671235182000,
"content_id": "b84d726536adf4b47379fe75807f6b47121bac66",
"detected_licenses": [
"MIT"
],
"directory_id": "6f5475a4753cf7839c2196f2f9b398ad8eeb3a95",
"extension": "py",
"fi... | 2.46875 | stackv2 | import socket
import ssl
import json
import hashlib
import time
import random
RSV1 = 64
RSV2 = 32
RSV3 = 16
OP_CONTINUATION = 0
OP_TEXT = 1
OP_BINARY = 2
OP_CLOSE = 8
OP_PING = 9
OP_PONG = 10
OPCODES = [
OP_CONTINUATION,
OP_TEXT,
OP_BINARY,
OP_CLOSE,
OP_P... | 371 | 27.07 | 82 | 24 | 2,744 | python | [{"finding_id": "codeql_py/insecure-default-protocol_d5368c176e83a308_9ac5c80f", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
198
] | [
null
] | [
23
] | [
44
] | |
2024-11-18T19:14:36.260409+00:00 | 1,504,705,569,000 | 780a6180773ad472eb12b90f2c964ffdc3bd65c9 | 2 | {
"blob_id": "780a6180773ad472eb12b90f2c964ffdc3bd65c9",
"branch_name": "refs/heads/master",
"committer_date": 1504705569000,
"content_id": "540462580d0f8cedff3d90d8d5cc88b08892edf6",
"detected_licenses": [
"MIT"
],
"directory_id": "3eec9638de882a24a854b927f543b029e9ddec9c",
"extension": "py",
"fi... | 2.5 | stackv2 | import os
from itertools import count
import requests
class HubAPI:
def __init__(self, hapikey):
self.session = requests.Session()
self.hapikey = hapikey
def request(self, method, url, params=None, **kwargs):
if params is None:
params = {}
if url.startswith('/'):
... | 55 | 30.27 | 88 | 17 | 383 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_52cd031ebf403adb_8cf50616", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://api.hubapi.com](1) may be at an arbitrary posi... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [https://api.hubapi.com](1) may be at an arbitrary position in the sanitized URL."
] | [
17
] | [
null
] | [
12
] | [
43
] | |
2024-11-18T19:14:42.619870+00:00 | 1,628,602,606,000 | 0712d8c695e3fa463546e31479c0ce07fe6597af | 3 | {
"blob_id": "0712d8c695e3fa463546e31479c0ce07fe6597af",
"branch_name": "refs/heads/master",
"committer_date": 1628602606000,
"content_id": "02f446eb5120cfbc064568ae9847366572123a25",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "76efc9f38dae28d3072c624cda1ac48714633ded",
"extension": "p... | 2.703125 | stackv2 | #! /usr/bin/env python3
"""
ONTAP REST API Sample Scripts
This script was developed by NetApp to help demonstrate NetApp technologies.
This script is not officially supported as a
standard NetApp product.
Purpose: This Module covers system/node/power/off CLI diagnostic mode usage using ONTAP REST API
Usage: system_... | 102 | 32.1 | 97 | 18 | 767 | python | [{"finding_id": "codeql_py/request-without-cert-validation_3bb3634668fdaeef_b5497622", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
46
] | [
50
] | [
20
] | [
26
] | |
2024-11-18T19:14:43.364653+00:00 | 1,638,551,708,000 | 3c6efbff4c8a5080d489416ed750430a9e64d62e | 2 | {
"blob_id": "3c6efbff4c8a5080d489416ed750430a9e64d62e",
"branch_name": "refs/heads/master",
"committer_date": 1638861686000,
"content_id": "2950800f0c45bcccc20bca50edf6335bcf88c533",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "70a1cfaee115bc96012df4ba7411548131b18a6c",
"extension": "p... | 2.421875 | stackv2 | # ////////////////////////////////////////////////////////////
#
# File: remoteshell.py
#
# ////////////////////////////////////////////////////////////
#
# Author: Robin Nyman
#
# Nokia - Confidential
# Do not use, distribute, or copy without consent of Nokia.
# Copyright (c) 2021 Nokia. All rights reserved.
#
# /////... | 141 | 33.29 | 87 | 18 | 1,055 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2aa549696bc23c7b_2944a680", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
74
] | [
null
] | [
9
] | [
71
] | |
2024-11-18T19:27:40.219503+00:00 | 1,528,992,725,000 | 73c5300bf757572fd1ef38581d6e2ab45288c13e | 2 | {
"blob_id": "73c5300bf757572fd1ef38581d6e2ab45288c13e",
"branch_name": "refs/heads/master",
"committer_date": 1528992725000,
"content_id": "5de2d464b994671b9e6a076341774a608752fc55",
"detected_licenses": [
"MIT"
],
"directory_id": "f7d8cd730978aa6e0d04be7a4157a900b793e9fe",
"extension": "py",
"fi... | 2.40625 | stackv2 | import os
import shutil
from scipy.misc import imread, toimage
import urllib.request
import tarfile
bsds_url = 'http://www.eecs.berkeley.edu/Research/Projects/CS/vision/grouping/BSR/BSR_bsds500.tgz'
tar_name = bsds_url.split('/')[-1]
print('start downloading training data from "{}"'.format(bsds_url))
urllib.request... | 58 | 32.31 | 98 | 14 | 533 | python | [{"finding_id": "codeql_py/tarslip_8501b5d748cb11c5_ab0cd79e", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
18
] | [
null
] | [
5
] | [
13
] | |
2024-11-18T19:27:40.278175+00:00 | 1,480,348,690,000 | 2100c355e0f0131fd3dd49455fa21bb41d703ccf | 2 | {
"blob_id": "2100c355e0f0131fd3dd49455fa21bb41d703ccf",
"branch_name": "refs/heads/master",
"committer_date": 1480348690000,
"content_id": "64c0e26bd1e2413ced80866baebc82883086018d",
"detected_licenses": [
"MIT"
],
"directory_id": "4022fdf491e29722a7684f4f1aba8e4ac3ed5c02",
"extension": "py",
"fi... | 2.453125 | stackv2 | # -*- coding: utf-8 -*-
from datetime import datetime, timedelta
from django.conf import settings
from pymongo import MongoClient, DESCENDING
class Morudall(object):
def __init__(self):
uri = 'mongodb://%s:%d/' % (settings.MONGO_ADDRESS, settings.MONGO_PORT)
mc = MongoClient(uri)
self.db... | 120 | 24.57 | 80 | 17 | 771 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6515883fc6954f6e_47449217", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
116,
120
] | [
null,
null
] | [
11,
11
] | [
38,
46
] | |
2024-11-18T19:38:51.905338+00:00 | 1,618,476,875,000 | ac65350c07146ed8dca2de8247c7ebbe793621eb | 3 | {
"blob_id": "ac65350c07146ed8dca2de8247c7ebbe793621eb",
"branch_name": "refs/heads/master",
"committer_date": 1618476875000,
"content_id": "26728db02d9a4e96c0187b22be79e767d54b1f6b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e7a79508d88c8b77edc4a49b31d802eafc276a6c",
"extension": "py"... | 3.40625 | stackv2 | import time
if __name__ == '__main__':
with open('today.txt', 'wt') as fin:
fin.write(time.ctime(time.time()))
today_string = ''
with open('today.txt', 'rt') as fout:
today_string = fout.readline()
print(today_string)
time_pars = time.strptime(today_string)
print(time_pars)
... | 19 | 23.32 | 54 | 13 | 122 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d30db48f81279d18_14e9bb02", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
19
] | [
null
] | [
11
] | [
54
] | |
2024-11-18T20:06:01.376245+00:00 | 1,465,785,184,000 | 77ce611409b99da94d1d72e2c9f59a50a1171f9e | 3 | {
"blob_id": "77ce611409b99da94d1d72e2c9f59a50a1171f9e",
"branch_name": "refs/heads/master",
"committer_date": 1465785184000,
"content_id": "949e097613462d1f932828aab4ad9bc65ef395f9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "43e4ca65303f6c103d03287e125528c484aa4430",
"extension": "py"... | 2.8125 | stackv2 | #coding=utf-8
import requests
from bs4 import BeautifulSoup
import shutil
import re
import time
def get_gif_urls(content):
output = []
soup = BeautifulSoup(content)
for link in soup.find_all('a'):
href = link.get('href')
if href != None and 'gif' in href and 'blogspot.com' in href:
... | 70 | 33.46 | 173 | 19 | 670 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_2e5a23235d0670b8_5f7650bb", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [blogspot.com](1) may be at an arbitrary position in th... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [blogspot.com](1) may be at an arbitrary position in the sanitized URL."
] | [
15
] | [
null
] | [
47
] | [
69
] | |
2024-11-18T20:06:01.689831+00:00 | 1,598,474,249,000 | cd23cf793478c125b54c260aa28e0a75afca10d3 | 2 | {
"blob_id": "cd23cf793478c125b54c260aa28e0a75afca10d3",
"branch_name": "refs/heads/master",
"committer_date": 1598474249000,
"content_id": "6696a323982b7f522c77946f02d4c68d95931790",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e8927da938039e86853955690a120ee8643d8565",
"extension": "py"... | 2.3125 | stackv2 | import hashlib
from uuid import uuid4
from functools import wraps
from django.http import HttpResponse
from django.db import IntegrityError, transaction
from django.contrib.auth.models import User
from django.conf import settings
def only_lti(fn):
"""
Decorator ensures that user comes from LTI session.
"... | 70 | 26.23 | 83 | 15 | 425 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6b0952b9c6806511_ba3a4ecb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.",
"[Sensitive data (id)](1) is used in a hashing algorithm (RIPEMD160) that is insecure."
] | [
56,
65
] | [
null,
null
] | [
17,
14
] | [
54,
37
] | |
2024-11-18T20:06:21.929818+00:00 | 1,603,572,371,000 | 3cf9f5367cfc8cd7a2a2eb9b2f43d0eb3013ad5e | 2 | {
"blob_id": "3cf9f5367cfc8cd7a2a2eb9b2f43d0eb3013ad5e",
"branch_name": "refs/heads/main",
"committer_date": 1603572371000,
"content_id": "457993b8bd5053862ede76967aef767dfbcf6170",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7c10f3b5c39458788bd0b62765ed767c8f0d1f6d",
"extension": "py",
... | 2.34375 | stackv2 | from flask import Flask, request, send_file, Response, make_response
app = Flask(__name__)
app.config['SEND_FILE_MAX_AGE_DEFAULT'] = 0
import database
db = database.Database()
import analysis
import ml
predictor = ml.Predictor()
import json
import os
import threading
ROOT_DIR = "/tf/HackDuke2019"
FRONTEND_DIR = os... | 138 | 29.22 | 98 | 16 | 946 | python | [{"finding_id": "codeql_py/path-injection_8f089b2138d2f769_ec7d31c8", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
31,
32
] | [
null,
null
] | [
27,
30
] | [
40,
43
] | |
2024-11-18T20:18:11.683590+00:00 | 1,647,367,933,000 | c1271fd402026bde765c662bf8166cc40dfa55cc | 2 | {
"blob_id": "c1271fd402026bde765c662bf8166cc40dfa55cc",
"branch_name": "refs/heads/master",
"committer_date": 1647367933000,
"content_id": "71e36a4e2e3fb2bd46a6fb6ade0731403b9b4d0e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "da0ce1ec13cc4154ae4eb204afbf8a81ba600479",
"extension": "py"... | 2.484375 | stackv2 | # coding=utf-8
# Copyright 2020 The Google Research Authors.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicab... | 200 | 28.32 | 79 | 17 | 1,546 | python | [{"finding_id": "codeql_py/overly-large-range_276c864c45bcc021_819cd87a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 6 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[... | [
34,
34,
47,
47,
50,
50
] | [
null,
null,
null,
null,
null,
null
] | [
23,
42,
42,
50,
51,
59
] | [
27,
46,
46,
54,
55,
63
] | |
2024-11-18T20:18:14.377954+00:00 | 1,583,706,665,000 | a19a51f62b90cf20ced2395bfcc181981946db21 | 2 | {
"blob_id": "a19a51f62b90cf20ced2395bfcc181981946db21",
"branch_name": "refs/heads/master",
"committer_date": 1583706665000,
"content_id": "95f5ee2cfb4f5667e7bad4a8346fc236ecc1dace",
"detected_licenses": [
"MIT"
],
"directory_id": "d211bf8cddcfe3a5e288efee292be0d7eb23209a",
"extension": "py",
"fi... | 2.484375 | stackv2 | from rest_framework import viewsets, status
from rest_framework.authentication import TokenAuthentication
from rest_framework.permissions import IsAuthenticated
from rest_framework.response import Response
from core.models import News, Campaing
from newscampaing import serializers
class NewsPrivate(viewsets.ModelView... | 87 | 30.98 | 70 | 16 | 515 | python | [{"finding_id": "codeql_py/stack-trace-exposure_da8f685bbdf6da85_8e833684", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
64,
85
] | [
null,
null
] | [
21,
21
] | [
40,
40
] | |
2024-11-18T20:18:15.988713+00:00 | 1,629,913,561,000 | 55f52100233ed13260b806934e1da1e215b0fa8d | 2 | {
"blob_id": "55f52100233ed13260b806934e1da1e215b0fa8d",
"branch_name": "refs/heads/master",
"committer_date": 1629913561000,
"content_id": "4dea2172263e42a77b85f07d7a92882a7645e0ec",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "f7b4c0234db78b5987e066763890a1a763085cce",
"extension": "p... | 2.5 | stackv2 | import environ
import json
from django.conf import settings
import requests
class Pessoa(object):
def __init__(self, set_id, pes_matricula, pes_nome):
self.set_id = set_id
self.pes_matricula = pes_matricula
self.pes_nome = pes_nome
class Setor(object):
def __init__(self, set_id, set_nome, set_sigla, set_id_... | 76 | 46.53 | 132 | 11 | 736 | python | [{"finding_id": "codeql_py/request-without-cert-validation_94ea01d33729b819_5b7098e0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
45,
54,
63,
72
] | [
null,
null,
null,
null
] | [
7,
7,
7,
7
] | [
45,
45,
45,
45
] | |
2024-11-18T20:18:24.204797+00:00 | 1,620,981,766,000 | 819c6389c28b3296a142ad9e6116d258b94693c8 | 2 | {
"blob_id": "819c6389c28b3296a142ad9e6116d258b94693c8",
"branch_name": "refs/heads/master",
"committer_date": 1620981766000,
"content_id": "4a06a74bfa1782dd989a3ba4c4bdcaf813c89926",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "1ea80a195958c5faef5090fedc14389dc6932716",
"extension": "p... | 2.453125 | stackv2 | import datetime
from collections import defaultdict
from api.models.couriers import Courier
from rest_framework import serializers
from rest_framework.exceptions import ValidationError
class CourierSerializer(serializers.ModelSerializer):
courier_id = serializers.IntegerField()
class Meta:
fields = ... | 101 | 39.38 | 78 | 17 | 840 | python | [{"finding_id": "codeql_py/stack-trace-exposure_c1f6574e17d9e110_5f5648c0", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
62
] | [
null
] | [
35
] | [
36
] | |
2024-11-18T20:18:31.175827+00:00 | 1,620,788,482,000 | 887490abbb7f4e2481aa77ab0286b3839a623a09 | 4 | {
"blob_id": "887490abbb7f4e2481aa77ab0286b3839a623a09",
"branch_name": "refs/heads/master",
"committer_date": 1620788482000,
"content_id": "0a48d8cb3f5a69848a94495ded63602740d2b0f9",
"detected_licenses": [
"MIT"
],
"directory_id": "8d22e1fd064e7f5972c71db82fad657eea5a9333",
"extension": "py",
"fi... | 4.25 | stackv2 | import math
# 编写一个代表圆形的类,其具备:
# (1)半径属性
# (2)求面积行为
class Circle:
def __init__(self, radius):
self.Radius = radius
def GetArea(self):
return 3.14 * self.Radius * self.Radius
c = Circle(3)
print("The circle's radius is {0}. It's area is {1:.2f}."
.format(c.Radius, c.GetArea()))
# 编写一个代表矩形的... | 171 | 27.77 | 109 | 19 | 1,607 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_823c8776f0b3c6b0_9071b875", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (p... | [
61,
64,
83,
86
] | [
62,
65,
84,
87
] | [
15,
15,
15,
15
] | [
89,
89,
109,
109
] | |
2024-11-18T20:18:31.634176+00:00 | 1,396,164,245,000 | 581676971a91b817ca17822e4151543a9a1dcda6 | 3 | {
"blob_id": "581676971a91b817ca17822e4151543a9a1dcda6",
"branch_name": "refs/heads/master",
"committer_date": 1396164245000,
"content_id": "ea5eacbf3a2a7853547bb1e884c3fa75b44815b3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "023e4279f0b54e5bb8beaed36561e20226d81bd4",
"extension": "py"... | 2.609375 | stackv2 | import flask
import hashlib
import base64
import uuid
import re
import boto
boto.s3
from .database import query
import logging
logger = logging.getLogger(__name__)
logger.addHandler(logging.FileHandler(u'auth.log'))
class Auth(object):
@staticmethod
def query(*args, **kwargs):
return query(*args, *... | 95 | 28.79 | 79 | 16 | 616 | python | [{"finding_id": "codeql_py/polynomial-redos_e970f8ee5e6e316c_f8949a9c", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma... | 2 | true | [
"CWE-1333",
"CWE-327"
] | [
"py/polynomial-redos",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'.\nThis [regular expression](3) that depends on a [user-provided value](2) may run slow on strings starting with 'signature=' and with many repetitions of 'signature=a'.",
"[Sensitive data ... | [
54,
73
] | [
null,
null
] | [
23,
20
] | [
43,
28
] | |
2024-11-18T20:18:37.545456+00:00 | 1,495,370,577,000 | 85bb27c855ad006665a8cf1b03ee9ad91b95502a | 3 | {
"blob_id": "85bb27c855ad006665a8cf1b03ee9ad91b95502a",
"branch_name": "refs/heads/master",
"committer_date": 1495370577000,
"content_id": "9b703455337c1001e36e501622c86cdbc9578883",
"detected_licenses": [
"MIT"
],
"directory_id": "a68230657489a1d9e4c850a394539a992d66e94a",
"extension": "py",
"fi... | 2.75 | stackv2 | import os
import sys
import time
import logging
import tempfile
import zipfile
import tarfile
import requests
import subprocess
try:
import curses
assert curses
except ImportError:
curses = None
# Fake unicode literal support: Python 3.2 doesn't have the u'' marker for
# literal strings, and alternative ... | 170 | 32.14 | 75 | 16 | 1,295 | python | [{"finding_id": "codeql_py/tarslip_cd779261909d92db_678b7ff0", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
94
] | [
null
] | [
13
] | [
17
] | |
2024-11-18T20:31:21.127143+00:00 | 1,581,353,094,000 | 5cb1658605e3acb438f6ccb07d8cfb726273570e | 3 | {
"blob_id": "5cb1658605e3acb438f6ccb07d8cfb726273570e",
"branch_name": "refs/heads/master",
"committer_date": 1581353094000,
"content_id": "0974b93022f0d7de0fec8b4b7bd1e3e54d5a06de",
"detected_licenses": [
"MIT"
],
"directory_id": "5b09ee3b611a9d6935a3400dd6fe23770a87368a",
"extension": "py",
"fi... | 2.96875 | stackv2 | import re
from pyjo_mdl.exceptions import InstanceValidationError
__author__ = 'xelhark'
URL_REGEX = re.compile(r'http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]))+')
def number_validator(fs, value):
if 'max_value' in fs and value > fs['max_value']:
raise InstanceValidationEr... | 68 | 35.12 | 120 | 15 | 571 | python | [{"finding_id": "codeql_py/overly-large-range_65c0f6acdff71b25_66fc5093", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
6
] | [
null
] | [
56
] | [
59
] | |
2024-11-18T20:31:38.336908+00:00 | 1,522,980,554,000 | 51e7035b76d49ddd80de92b7905d4ef43f8a93d4 | 3 | {
"blob_id": "51e7035b76d49ddd80de92b7905d4ef43f8a93d4",
"branch_name": "refs/heads/master",
"committer_date": 1522980554000,
"content_id": "dcd3a664b9c1a2d09a6aa2876f4d3382232557d0",
"detected_licenses": [
"MIT"
],
"directory_id": "257577c237a46a9147b9086ff3d438e53144cb7f",
"extension": "py",
"fi... | 3.21875 | stackv2 | """
File: encrypt.py
Author: Matt Kearns (mdk2mc)
Date: 10/10/2017
"""
__author__ = "mdk2mc"
import sys
from Crypto.PublicKey import RSA
from Crypto import Random
from Crypto.Cipher import PKCS1_OAEP
from Crypto.Cipher import ARC4
from Crypto.Hash import SHA256
def secret_string(message, public_ke... | 84 | 28.4 | 74 | 16 | 672 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_d8f808aa2ce4f991_63d5b795", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.",
"[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used."
] | [
40,
64
] | [
null,
null
] | [
26,
17
] | [
55,
46
] | |
2024-11-18T20:43:20.979463+00:00 | 1,692,041,996,000 | 56b464f2be70953113b84165b8d0825b26cc142f | 3 | {
"blob_id": "56b464f2be70953113b84165b8d0825b26cc142f",
"branch_name": "refs/heads/main",
"committer_date": 1692041996000,
"content_id": "2dea333fd709c9a76884dacf50ef6673b8ac9e75",
"detected_licenses": [
"MIT"
],
"directory_id": "1dbbb05b30d27c6419b9f34eea3b9a47f92582a0",
"extension": "py",
"file... | 2.84375 | stackv2 | #!/usr/bin/env python3
# Copyright (c) Facebook, Inc. and its affiliates.
# This source code is licensed under the MIT license found in the
# LICENSE file in the root directory of this source tree.
import os
from collections import defaultdict
from typing import Dict, List, Tuple
import pandas as pd
RACES_ETHNICIT... | 225 | 37.46 | 89 | 21 | 2,221 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2da23d1d8813a59d_c2cec75f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (priva... | [
34,
221
] | [
null,
222
] | [
11,
9
] | [
70,
34
] | |
2024-11-18T20:43:29.760541+00:00 | 1,550,058,886,000 | a68f24e61aa2a9df42d73995ade25211601700c8 | 2 | {
"blob_id": "a68f24e61aa2a9df42d73995ade25211601700c8",
"branch_name": "refs/heads/master",
"committer_date": 1550058886000,
"content_id": "ad2a35eb9bdfc7d99b89e1c53e46e4e6b049f9f7",
"detected_licenses": [
"MIT"
],
"directory_id": "2a018ef76779ca26f03a22283c3bfc80039118a8",
"extension": "py",
"fi... | 2.421875 | stackv2 | import logging
import string
from xml.sax.saxutils import escape
import io
from google.cloud import vision
from google.cloud.vision import types
from PIL import Image
import requests
import os
from jinja2 import Environment, FileSystemLoader
NEW_LINE_HYSTERESIS = 4
TEMPLATE_ENVIRONMENT = Environment(
autoescape=Fa... | 167 | 33.58 | 118 | 21 | 1,300 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0bb9f1c568731a69_bdc035d2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
16
] | [
24
] | [
23
] | |
2024-11-18T20:43:38.376500+00:00 | 1,399,218,215,000 | 7ef67c549c2e4fc189bcb8cec42f5fde19c6e31a | 3 | {
"blob_id": "7ef67c549c2e4fc189bcb8cec42f5fde19c6e31a",
"branch_name": "refs/heads/master",
"committer_date": 1399218425000,
"content_id": "667076d0bf3530ccb2eca155772c344f789db828",
"detected_licenses": [
"MIT"
],
"directory_id": "26903b08fe5380848b80b77749184f4cd3873466",
"extension": "py",
"fi... | 2.640625 | stackv2 | """
marvin.security
~~~~~~~~~~~~~~~
Security-related utilities and tools.
"""
from .utils import generic_error_handler
from itsdangerous import BadData, constant_time_compare, URLSafeSerializer
from flask import abort, current_app, g, request
from flask.ext.principal import identity_changed, Identity
i... | 151 | 34.78 | 119 | 17 | 1,328 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_71e02fccd23de949_089cb903", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
31
] | [
null
] | [
27
] | [
35
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.