added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T22:00:18.024210+00:00 | 1,676,139,610,000 | c255927327f8898eb30e2022736b7dc9fb8fd515 | 3 | {
"blob_id": "c255927327f8898eb30e2022736b7dc9fb8fd515",
"branch_name": "refs/heads/master",
"committer_date": 1676139610000,
"content_id": "9ca63557214c0cfebec42b9e955ce50b7e2a1bad",
"detected_licenses": [
"MIT"
],
"directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9",
"extension": "py",
"fi... | 2.890625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
A simple standalone script to test an Apple Push Notification setup.
Uses the feedback packets to provide the best information on how to fix things.
Steps to send a push notification:
* set up push certificates on your app on the developer portal and regenerate
yo... | 99 | 37.13 | 108 | 18 | 877 | python | [{"finding_id": "codeql_py/insecure-protocol_859f49390a3eb32f_c7b7e63a", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.wrap_socket](1).", "remediation": "", "l... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.wrap_socket](1)."
] | [
52
] | [
null
] | [
19
] | [
107
] | |
2024-11-18T22:00:45.564925+00:00 | 1,510,322,261,000 | fdf640f45bd94cc78d19c523770b164948045b68 | 3 | {
"blob_id": "fdf640f45bd94cc78d19c523770b164948045b68",
"branch_name": "refs/heads/master",
"committer_date": 1510322261000,
"content_id": "740a1ac7b6b479b1d6857a77c95261eb17d2eee4",
"detected_licenses": [
"BSD-3-Clause",
"BSD-2-Clause"
],
"directory_id": "5343143a89032e08b47ebf2c36c92b72e5ff1f28... | 2.96875 | stackv2 | """
Provides Sun-related parameters
The following code is heavily based on IDL function get_sun.pro which itself
is based on algorithms presented in the book Astronomical Formulae for
Calculators, by Jean Meeus.
Every function returning a quantity is of type astropy.units.Quantity
"""
from __future__ import absolute_i... | 288 | 34.91 | 100 | 14 | 3,248 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_697337feb828600a_33441f2f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.",
"This expression logs [sensitive data (priva... | [
280,
281,
282,
283
] | [
null,
null,
null,
284
] | [
11,
11,
11,
11
] | [
84,
96,
90,
74
] | |
2024-11-18T22:00:55.263451+00:00 | 1,492,018,880,000 | 3925ffb3c4a8ac31c8c5ce5b43973ebabf62f9a2 | 3 | {
"blob_id": "3925ffb3c4a8ac31c8c5ce5b43973ebabf62f9a2",
"branch_name": "refs/heads/master",
"committer_date": 1492019307000,
"content_id": "0131bacccf6c4df360d631f769f3e8fc84614174",
"detected_licenses": [
"MIT"
],
"directory_id": "2136e530d0066f737f66d5ac1cfeaf794e44e16f",
"extension": "py",
"fi... | 2.5625 | stackv2 | import json
from os.path import join, dirname, abspath
from importlib import import_module
from jinja2 import Environment, PackageLoader
from scrapy.commands import ScrapyCommand
from scrapy.commands.genspider import sanitize_module_name
from scrapy.exceptions import UsageError
__all__ = ['BrushCommand']
class Brus... | 59 | 36.81 | 123 | 17 | 497 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3655353144583e39_32fdc9e6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
36
] | [
null
] | [
15
] | [
68
] | |
2024-11-18T22:01:09.000144+00:00 | 1,597,217,928,000 | b7c14fe5f4f4cc3263cdf828c27d31ad44395d76 | 2 | {
"blob_id": "b7c14fe5f4f4cc3263cdf828c27d31ad44395d76",
"branch_name": "refs/heads/master",
"committer_date": 1597217928000,
"content_id": "470455c8e23d9ddc012d3e4bb648958b019a66e6",
"detected_licenses": [
"MIT"
],
"directory_id": "188ec0ba6f69ce2d6ff765d217c037d9035fa650",
"extension": "py",
"fi... | 2.375 | stackv2 | from rest_framework.viewsets import GenericViewSet
from rest_framework.decorators import action, api_view
from rest_framework.permissions import AllowAny
from rest_framework_jwt.settings import api_settings
from rest_framework.decorators import permission_classes
from django.conf import settings
import logging
import r... | 135 | 32.52 | 71 | 16 | 993 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_a84997b943d3d30c_b57ee9ff", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n... | 2 | true | [
"CWE-327",
"CWE-022"
] | [
"py/weak-sensitive-data-hashing",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.",
"This path depends on a [user-provided value](1)."
] | [
133,
109
] | [
null,
null
] | [
27,
19
] | [
49,
28
] | |
2024-11-18T22:26:08.321736+00:00 | 1,621,127,573,000 | b7ebf279917645463e6cb2b436dd17fc46924490 | 4 | {
"blob_id": "b7ebf279917645463e6cb2b436dd17fc46924490",
"branch_name": "refs/heads/main",
"committer_date": 1621127573000,
"content_id": "079d8a31690072a8b688995a01216004c2cc4b49",
"detected_licenses": [
"MIT"
],
"directory_id": "5c7f87cc3777db8700a98e5b390b6964f1104504",
"extension": "py",
"file... | 4.09375 | stackv2 | import random
def jogar():
print("*" * 30)
print("Bem vindo no jogo da Adivinhação")
print("*" * 30)
# numeroSecreto = 10
# numeroSecreto = round(random.random() * 100)
# rodada = 1
numeroSecreto = random.randrange(1, 101)
print(f'Número secreto: {numeroSecreto}')
tentativas ... | 78 | 28.21 | 89 | 16 | 654 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5e56e1227c06263e_b6d2c3e0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
14
] | [
null
] | [
11
] | [
45
] | |
2024-11-18T22:26:09.240508+00:00 | 1,550,659,661,000 | 5e8c122d273a077de2ddca641bd2dbebf354efcc | 2 | {
"blob_id": "5e8c122d273a077de2ddca641bd2dbebf354efcc",
"branch_name": "refs/heads/master",
"committer_date": 1550659661000,
"content_id": "4870d4c22cabce46dcd8c07794d121159df6f6a5",
"detected_licenses": [
"MIT"
],
"directory_id": "a63b417f28f0ce306aa0d4194928906d4ba14aa6",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/env python
import config
import sys
import time
import select
import paramiko
import re
import requests
from influxdb import InfluxDBClient
def connect_to_host(host):
i = 1
while True:
try:
ssh = paramiko.SSHClient()
ssh.set_missing_host_key_policy(paramiko.AutoAddP... | 61 | 24.54 | 109 | 15 | 373 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_1ce0b71f18a4ccd1_a5b5a67b", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
18
] | [
null
] | [
13
] | [
70
] | |
2024-11-18T20:39:48.393447+00:00 | 1,605,554,626,000 | 0dc5f21f8f278672b5eaaca352cf0ab4f6d8708b | 3 | {
"blob_id": "0dc5f21f8f278672b5eaaca352cf0ab4f6d8708b",
"branch_name": "refs/heads/master",
"committer_date": 1605554626000,
"content_id": "3d97e09e3ecce59e021a78a3d0aa33b8cb849645",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2fd9c8545d3c7a113ad5e5fab1d5a3ce7e593a83",
"extension": "py"... | 2.78125 | stackv2 | #! /usr/local/bin/python3
import requests
from bs4 import BeautifulSoup
import hashlib
def generate_sid(key):
page = requests.get("http://fritz.box/login_sid.lua")
soup = BeautifulSoup(page.text, 'html.parser')
challenge_value = soup.find('challenge').text
password = challenge_value + '-' + key
... | 83 | 23.77 | 94 | 13 | 492 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_4e8b68bc3c57860b_43e8aebe", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
16
] | [
null
] | [
29
] | [
56
] | |
2024-11-18T20:39:52.854743+00:00 | 1,612,176,715,000 | bb51265da865604124da5338aa0026d94b981551 | 2 | {
"blob_id": "bb51265da865604124da5338aa0026d94b981551",
"branch_name": "refs/heads/main",
"committer_date": 1612176715000,
"content_id": "f87e4c6356f0c7ee2428324f8bf675b8b8c7ae70",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "568d7d17d09adeeffe54a1864cd896b13988960c",
"extension": "py",
... | 2.5 | stackv2 | from django.http import HttpResponse, JsonResponse
from django.shortcuts import render
# Create your views here.
from django.utils.decorators import method_decorator
from django.views import View
import json
from .models import UserProfile
import hashlib
import jwt
import time
from django.conf import settings
from too... | 186 | 29.5 | 66 | 20 | 1,577 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_fbe7b37629d186cb_e35ba14e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
87
] | [
null
] | [
20
] | [
39
] | |
2024-11-18T20:40:02.297216+00:00 | 1,601,423,530,000 | 59f35de5f58de7d668d1a23986ad516ab772adf4 | 2 | {
"blob_id": "59f35de5f58de7d668d1a23986ad516ab772adf4",
"branch_name": "refs/heads/master",
"committer_date": 1601423530000,
"content_id": "73a577d008bf0c41c53d98827a70f3084d93f3ca",
"detected_licenses": [
"MIT"
],
"directory_id": "74cec3aefc021447b79bd681901d085f207b1e13",
"extension": "py",
"fi... | 2.3125 | stackv2 | # -*- coding: utf-8 -*-
"""General shortcuts.
"""
from django.shortcuts import Http404, get_object_or_404
from rest_framework.exceptions import NotFound, APIException
def drf_get_object_or_404(klass, *args, **kwargs):
"""drf_get_object_or_404.
"""
try:
return get_object_or_404(klass, *args, **kwar... | 17 | 31.24 | 67 | 18 | 140 | python | [{"finding_id": "codeql_py/stack-trace-exposure_1c5dc6bbfa18057a_06910fec", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
17
] | [
null
] | [
35
] | [
45
] | |
2024-11-18T20:52:18.174597+00:00 | 1,630,424,893,000 | 855dcb4029ab53e6a52993ad1f53a45a83ada828 | 4 | {
"blob_id": "855dcb4029ab53e6a52993ad1f53a45a83ada828",
"branch_name": "refs/heads/main",
"committer_date": 1630424893000,
"content_id": "71bebea75f4a703de5687333f7219310e253ad8f",
"detected_licenses": [
"MIT"
],
"directory_id": "79d776e2e3ff18b5206cf4165418bd76c4a4ed8e",
"extension": "py",
"file... | 4.09375 | stackv2 | """
This program create a password with random positions until 94 characters
"""
import random
import string
print("Welcome")
password_lenght = int(input("\nEnter the lenght of password: "))
lower_char = string.ascii_lowercase
upper_char = string.ascii_uppercase
number_char = string.digits
symbol_char = string.punc... | 23 | 20.83 | 72 | 10 | 112 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cef07485583631f1_842ef2c0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
23
] | [
null
] | [
7
] | [
37
] | |
2024-11-18T21:08:08.039794+00:00 | 1,641,678,092,000 | ec2c3173f1db3da654c74ce0e3c0019fa5dac61d | 2 | {
"blob_id": "ec2c3173f1db3da654c74ce0e3c0019fa5dac61d",
"branch_name": "refs/heads/master",
"committer_date": 1641678092000,
"content_id": "2943bf64420a5a50c77e538cee741c7649c86254",
"detected_licenses": [
"Unlicense"
],
"directory_id": "86a213706d55b4f1d390d9b99d59fa78b158a202",
"extension": "py",... | 2.375 | stackv2 | from __future__ import print_function
from watson_developer_cloud import SpeechToTextV1
from watson_developer_cloud.websocket import RecognizeCallback
from watson_developer_cloud import ConversationV1
import os, sys, subprocess, threading, time, json, re, signal, snowboydecoder
STTusername = os.environ['WTTSusername'... | 114 | 27.35 | 142 | 12 | 812 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ffb814d853195608_3085923b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
27,
29
] | [
null,
null
] | [
8,
8
] | [
43,
41
] | |
2024-11-18T21:08:25.739920+00:00 | 1,490,999,317,000 | 677e283b21871ff7dda921373d531420ade9d8df | 2 | {
"blob_id": "677e283b21871ff7dda921373d531420ade9d8df",
"branch_name": "refs/heads/master",
"committer_date": 1490999317000,
"content_id": "1f90ae33d76579b9089ea5f48e4e0249ccb5243a",
"detected_licenses": [
"MIT"
],
"directory_id": "9d5d818ced0dc8bf4909d8312f4ab499691fcdd0",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python3
import argparse
import configparser
import os
import sys
import re
from jinja2 import Environment, DictLoader
from tabulate import tabulate
from argparse import RawTextHelpFormatter
USERNAME = os.environ.get("SUDO_USER") or os.environ.get("USER")
if (not USERNAME):
print("Username could not... | 330 | 34.11 | 80 | 17 | 2,636 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_58e4be24e6fc82f3_ff4ac592", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
282
] | [
null
] | [
17
] | [
65
] | |
2024-11-18T21:32:21.365561+00:00 | 1,581,253,928,000 | 83fa95854a7cb3d5a2de8d177348441da5dab85d | 3 | {
"blob_id": "83fa95854a7cb3d5a2de8d177348441da5dab85d",
"branch_name": "refs/heads/master",
"committer_date": 1581253928000,
"content_id": "bdae3fa9db0313d6137e4639814046e66613a1e7",
"detected_licenses": [
"MIT"
],
"directory_id": "c4c29e0943e727322be4b31f7d51fdaf250e9ac3",
"extension": "py",
"fi... | 3.15625 | stackv2 | # import libraries
import re
import nltk
import pandas as pd
from nltk.corpus import stopwords
from nltk.stem.wordnet import WordNetLemmatizer
from nltk.tokenize import word_tokenize
from sklearn.base import BaseEstimator, TransformerMixin
stop_words = stopwords.words('english')
lemmatizer = WordNetLemmatizer()
url_r... | 121 | 27.71 | 93 | 15 | 851 | python | [{"finding_id": "codeql_py/overly-large-range_764866d6923f7dc0_14da5149", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
13
] | [
null
] | [
45
] | [
48
] | |
2024-11-18T21:32:26.762012+00:00 | 1,528,145,932,000 | 881d06ae613c30198250379fa6f565237e53ce4f | 2 | {
"blob_id": "881d06ae613c30198250379fa6f565237e53ce4f",
"branch_name": "refs/heads/master",
"committer_date": 1528145932000,
"content_id": "0bd9300ba1f36feb973d566e82246977cfc638a7",
"detected_licenses": [
"MIT"
],
"directory_id": "acabaf7bcc2bf3c42ee7df51391d770a77707ac1",
"extension": "py",
"fi... | 2.3125 | stackv2 | import os
from datetime import datetime, timedelta
#Import Flask
from flask import Flask, render_template, request, jsonify, json, Response, g
from itsdangerous import TimedJSONWebSignatureSerializer as Serializer, BadSignature, SignatureExpired
#import stuff for database
from flask_sqlalchemy import SQLAlchemy
from... | 217 | 32 | 102 | 21 | 1,540 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5b0968f329a1fe7d_2ecb9866", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-215"
] | [
"py/clear-text-logging-sensitive-data",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
138,
217
] | [
null,
null
] | [
23,
5
] | [
54,
24
] | |
2024-11-18T21:49:05.899150+00:00 | 1,607,091,941,000 | 08708e4773c01c0f93659d1a69449038ebd69943 | 4 | {
"blob_id": "08708e4773c01c0f93659d1a69449038ebd69943",
"branch_name": "refs/heads/main",
"committer_date": 1607091941000,
"content_id": "0df31d6016d35414ad5807677726bc364fb4c867",
"detected_licenses": [
"MIT"
],
"directory_id": "4e269268451a9d84d3310dedd1f60d46ed2e3e0c",
"extension": "py",
"file... | 3.59375 | stackv2 | from hashlib import md5
init = 'ckczppom'
def is_pw(key: str, num: int, leading_zeros: int) -> bool:
full_key = key + str(num)
m = md5(full_key.encode())
target = "0" * leading_zeros
return m.hexdigest()[0:leading_zeros] == target
def password(init, leading_zeros):
key = init
for i in range(10... | 25 | 23.04 | 58 | 10 | 196 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4471e4c17c0bb19c_36aa5cd5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
24,
25
] | [
null,
null
] | [
7,
7
] | [
24,
24
] | |
2024-11-18T21:49:13.189826+00:00 | 1,618,391,805,000 | b38c0ce40d4231a19f9636329457b2d7aa277c5e | 2 | {
"blob_id": "b38c0ce40d4231a19f9636329457b2d7aa277c5e",
"branch_name": "refs/heads/main",
"committer_date": 1618391805000,
"content_id": "a91c027cd97a75b8eb0546b0743c458fba3dd77b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "befaebdc6723d12c7b043c8f0d61148f82377507",
"extension": "py",
... | 2.328125 | stackv2 | from jinja2 import Template
import json
try:
import importlib.resources as pkg_resources
except ImportError:
import importlib_resources as pkg_resources
def visualize(dicts: dict, out: str):
with pkg_resources.path('resources', "viz.j2") as file_:
template = Template(file_.read_text())
with ... | 35 | 30.49 | 110 | 12 | 273 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b7750122bc4e6bc4_19a64160", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
12
] | [
null
] | [
20
] | [
47
] | |
2024-11-18T21:49:22.992655+00:00 | 1,293,850,972,000 | 3ec953a9864922d8e6b7da7793530eeaffa7304b | 3 | {
"blob_id": "3ec953a9864922d8e6b7da7793530eeaffa7304b",
"branch_name": "refs/heads/master",
"committer_date": 1293850972000,
"content_id": "65cdb11e6defaffe803c73b9c8e34afce25eb105",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "3a3f00324fdf2dedede45d072a47f38fdc5a58f3",
"extension": "p... | 2.5625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
fission.package
~~~~~~~~~~~~~~
Download and expand tar.gz file.
:copyright: (c) 2010-2011 Shinya Ohyanagi, All rights reserved.
:license: BSD, see LICENSE for more details.
"""
from paver.easy import task, cmdopts, path, sh
from datetime import ... | 186 | 22.66 | 83 | 23 | 1,078 | python | [{"finding_id": "codeql_py/tarslip_8dc0c2bb1b6b65b3_2b2e4d1d", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
85
] | [
null
] | [
5
] | [
12
] | |
2024-11-18T22:26:06.723118+00:00 | 1,550,641,127,000 | 901c7531ff149c5ffa4506e72f606061ae70a031 | 2 | {
"blob_id": "901c7531ff149c5ffa4506e72f606061ae70a031",
"branch_name": "refs/heads/master",
"committer_date": 1550641127000,
"content_id": "68a7e1866bd867dc4c60b3443cc3bf8ea230d33d",
"detected_licenses": [
"MIT"
],
"directory_id": "4dceaa269da9629f9882e78e6a0cef449ea38499",
"extension": "py",
"fi... | 2.40625 | stackv2 | import hashlib
import logging
import time
import requests
logger = logging.getLogger(__name__)
API_BASE_URL = 'https://smartapi.vesync.com'
API_RATE_LIMIT = 30
API_TIMEOUT = 5
DEV15ASTATUS = '/15a/v1/device/devicestatus'
DEV15ADETAILS = '/15a/v1/device/devicedetail'
DEVICEAPI = '/platform/v1/app/devices'
class VeS... | 415 | 33.58 | 117 | 23 | 2,935 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_e3c044a942641e2a_afdb8cc8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
232
] | [
null
] | [
69
] | [
98
] | |
2024-11-18T20:31:38.755490+00:00 | 1,646,620,091,000 | a5d2bf8a922dcc3452089c2715a0c66e6769db23 | 3 | {
"blob_id": "a5d2bf8a922dcc3452089c2715a0c66e6769db23",
"branch_name": "refs/heads/master",
"committer_date": 1646620091000,
"content_id": "4237e2b01187b6d7bba57b041c6c4e865859d0fe",
"detected_licenses": [
"MIT"
],
"directory_id": "ef49c247360cefd3efd43cc0293b367004e2383c",
"extension": "py",
"fi... | 2.578125 | stackv2 | #!/usr/bin/python3
# -*-: coding: utf-8 -*-
"""
:author: albert
:date: 02/28/2019
:desc: http请求工具类
"""
import logging
import requests
from config import GLOBAL_PROXY
class Request:
def __init__(self, url, params=None, proxy=False, **kwargs):
self.proxy = proxy
self.url = url
self.params =... | 39 | 22.26 | 92 | 13 | 239 | python | [{"finding_id": "codeql_py/request-without-cert-validation_552f52ffb67262d9_ac2f3a55", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
24
] | [
null
] | [
16
] | [
93
] | |
2024-11-18T20:31:39.896898+00:00 | 1,506,194,945,000 | 15a4307c82327027718321df88d10e10069583f6 | 2 | {
"blob_id": "15a4307c82327027718321df88d10e10069583f6",
"branch_name": "refs/heads/master",
"committer_date": 1506194945000,
"content_id": "c714dc2d4d0ff76afb5c0cf30cb7b27efee4a5d2",
"detected_licenses": [
"MIT"
],
"directory_id": "be6d8c95dd40fd4944986359b44bb9276ff5e578",
"extension": "py",
"fi... | 2.375 | stackv2 | import os
import cv2
import numpy
import requests
from flask import Flask
from flask import render_template
from flask import request
import config
app = Flask(__name__, template_folder='templates', static_folder='static')
rep = config.get_rep0st()
if config.IS_PRODUCTION:
rep.get_index()
@app.route("/", meth... | 98 | 23.95 | 112 | 19 | 549 | python | [{"finding_id": "codeql_py/full-ssrf_fc91293d6b257a1d_3ac84352", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/full-ssrf",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"The full URL of this request depends on a [user-provided value](1)."
] | [
62,
69
] | [
null,
null
] | [
9,
12
] | [
26,
29
] | |
2024-11-18T20:31:40.017803+00:00 | 1,542,970,766,000 | f061f8a27df5e5615abd16cbddc0c480ac0b96c1 | 3 | {
"blob_id": "f061f8a27df5e5615abd16cbddc0c480ac0b96c1",
"branch_name": "refs/heads/master",
"committer_date": 1542970766000,
"content_id": "d3a87dc5b6326b084153d8965bf9e2aebc7a1134",
"detected_licenses": [
"MIT"
],
"directory_id": "9641ff7f636f902d56289e7c2822d009254669ec",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/python3
from flask import Flask, request, redirect, render_template, jsonify
from telegram import Telegram
import os,json,datetime,subprocess,time
app = Flask(__name__)
download_path = "{}/Downloads/".format(os.getcwd())
def append_to_downloads(data):
# append the argument to Downloads/downloads.json ... | 72 | 35.57 | 116 | 18 | 657 | python | [{"finding_id": "codeql_py/command-line-injection_82fe270c80450e79_2a1a56aa", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 2 | true | [
"CWE-078",
"CWE-022"
] | [
"py/command-line-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
37,
36
] | [
null,
null
] | [
19,
18
] | [
85,
47
] | |
2024-11-18T20:31:41.105249+00:00 | 1,559,313,807,000 | a80aa0f01eae81106cb68c2435e16deb38dd10f4 | 2 | {
"blob_id": "a80aa0f01eae81106cb68c2435e16deb38dd10f4",
"branch_name": "refs/heads/master",
"committer_date": 1559313807000,
"content_id": "52d4c91f27a3e31c03075e23967fbdb6ae50bcc5",
"detected_licenses": [
"MIT"
],
"directory_id": "a9a0a22482c1c1734ebb232cfa99496e92e55790",
"extension": "py",
"fi... | 2.421875 | stackv2 | import yaml
import sys
import os
import pathlib
import zipfile
import shutil
import tarfile
import errno
# Read YAML file
def main(argv):
command_name = 'mkisofs'
target_directory = 'target'
if sys.version_info[0] != 3 or sys.version_info[1] < 6:
print("This script requires Python version 3.6+")
... | 194 | 32.94 | 76 | 22 | 1,430 | python | [{"finding_id": "codeql_py/tarslip_5e594c0a5a6123a0_c45aaa00", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
174
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T20:53:39.110505+00:00 | 1,620,457,810,000 | 157880aaacd6e831180b933179de72f5b581c311 | 2 | {
"blob_id": "157880aaacd6e831180b933179de72f5b581c311",
"branch_name": "refs/heads/master",
"committer_date": 1620457810000,
"content_id": "b4261a85b033b200c1184ddc6452da2a006167c2",
"detected_licenses": [
"MIT"
],
"directory_id": "8a1deb6fa8d615d6ce58d0b082286bf3638e454a",
"extension": "py",
"fi... | 2.46875 | stackv2 | # coding: utf-8
from base64 import b64decode
import binascii
import codecs
from io import BytesIO
import struct
import re
from Crypto.Cipher import AES, PKCS1_OAEP
from Crypto.Util import number
from Crypto.PublicKey import RSA
from .account import Account
from .chunk import Chunk
# Secure note types that contain a... | 284 | 28.99 | 111 | 15 | 2,249 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_d6f2be3396a4b9de_14619b82", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ECB](2) is broken or weak, and should not be used.\n[The block mode CBC](3) is broken or weak, and should not be used.\n[The block mode ECB](4) is broken or weak, and should not be used."
] | [
281
] | [
null
] | [
9
] | [
26
] | |
2024-11-18T20:53:39.158332+00:00 | 1,560,771,099,000 | 3482b81e810bdea38add33a1bb493da426b192a3 | 4 | {
"blob_id": "3482b81e810bdea38add33a1bb493da426b192a3",
"branch_name": "refs/heads/master",
"committer_date": 1560771099000,
"content_id": "36bfcbdd982ae332b0d42c1f40aa51192dc4fd20",
"detected_licenses": [
"MIT"
],
"directory_id": "0fac5c9888fd8efc01b06357a5c069cd65750c7f",
"extension": "py",
"fi... | 4.125 | stackv2 | '''
2.0新增功能:循环的终止 break
3.0新增功能:保存密码及强度到文件中:mode r ,w ,r+(读写),a(在末尾添加附加内容,不会覆盖掉之前w写入的内容)
4.0新增功能:读取文件中的密码:read():返回整个内容的字符串。readline()返回文件中下一行内容的字符串。readlines()返回每段以\n结尾的字符串的整个文件list。
文件可进行 for line in f:
5.0新增功能:定义一个password工具class:把面向过程中的变量抽成一个class的属性来处理,然后把相关包含的变量的方法,抽成class的def
6.0新增功能:定义一个文件... | 113 | 21.59 | 98 | 13 | 764 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8b8134d61388584f_4a6feb2b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
70
] | [
null
] | [
17
] | [
21
] | |
2024-11-18T21:47:34.454003+00:00 | 1,648,228,172,000 | 8b6dda78b7dd38c1c85d594a9071807014ef4e3a | 3 | {
"blob_id": "8b6dda78b7dd38c1c85d594a9071807014ef4e3a",
"branch_name": "refs/heads/master",
"committer_date": 1648228172000,
"content_id": "ba147df79f640bf71787cba821fa8ad57b243231",
"detected_licenses": [
"MIT"
],
"directory_id": "e3cdc4e999e4d6d039be09f7836ccbcc6372b517",
"extension": "py",
"fi... | 2.546875 | stackv2 | import requests
from configs import default
class RestClient(object):
_instance = None
APP_SCOPES = {
"publisher": 'apim:api_view apim:api_create apim:api_publish apim:tier_view apim:tier_manage apim:subscription_view apim:subscription_block apim:subscribe',
"store": 'apim:subscribe apim:signu... | 59 | 35.59 | 164 | 16 | 483 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f26c0480558e2b52_3ede3c3e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
31
] | [
32
] | [
17
] | [
64
] | |
2024-11-18T21:47:35.373850+00:00 | 1,604,483,018,000 | 11246617c174c7d93d6da62766551db1fd1cdf59 | 3 | {
"blob_id": "11246617c174c7d93d6da62766551db1fd1cdf59",
"branch_name": "refs/heads/master",
"committer_date": 1604483018000,
"content_id": "87bc9f99778a8995b37c13bcaa2582912e6331d7",
"detected_licenses": [
"MIT"
],
"directory_id": "991c3b30ae7310535cf0f91d6cc91fab1125f3e0",
"extension": "py",
"fi... | 3.15625 | stackv2 | import re
import nltk
import math
import numpy as np
from nltk.corpus import cmudict
from scipy.interpolate import interp1d
from statistics import mean, mode, StatisticsError
d = cmudict.dict()
extra_abbreviations = ['inc', 'i.e', 'e.g']
sentence_tokenizer = nltk.data.load('tokenizers/punkt/english.pickle')
sentence... | 380 | 28.1 | 107 | 22 | 2,879 | python | [{"finding_id": "codeql_py/overly-large-range_55d0aab4954c3187_60e6d044", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
136
] | [
null
] | [
54
] | [
57
] | |
2024-11-18T22:28:50.402789+00:00 | 1,593,403,514,000 | 6d9f3758fceebffbf89054a0cec2aa9ace0fbeb2 | 3 | {
"blob_id": "6d9f3758fceebffbf89054a0cec2aa9ace0fbeb2",
"branch_name": "refs/heads/master",
"committer_date": 1593403514000,
"content_id": "62b5d72e45b05087dcf5654fa05d529ed53d9e15",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e6efe213644e36723bcdc4c5684144febd0b8c60",
"extension": "py"... | 2.53125 | stackv2 | import os
import subprocess
from flask import Flask, request, make_response
print("Started...")
app = Flask(__name__)
@app.route('/')
def func1():
print("Running")
return "Hello World"
@app.route('/exec', methods=['POST'])
def route_exec():
command = request.data.decode('utf-8')
try:
complete... | 28 | 29.79 | 149 | 13 | 207 | python | [{"finding_id": "codeql_py/command-line-injection_6b7b7b762c48f232_6b8dbe55", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 2 | true | [
"CWE-078",
"CWE-215"
] | [
"py/command-line-injection",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
17,
28
] | [
null,
null
] | [
43,
5
] | [
50,
80
] | |
2024-11-18T22:28:52.247012+00:00 | 1,597,507,184,000 | a3ec98a3bea3648db1bf8f775b4e8a5c23aee395 | 3 | {
"blob_id": "a3ec98a3bea3648db1bf8f775b4e8a5c23aee395",
"branch_name": "refs/heads/master",
"committer_date": 1597507184000,
"content_id": "fa7835ec4c14b61b26c1ecdf91c438bd83c7acf3",
"detected_licenses": [
"MIT"
],
"directory_id": "42ffc94db17b90fee293e8e6b774f3d1b553d845",
"extension": "py",
"fi... | 2.5625 | stackv2 | from flask import Flask, render_template, url_for, request, redirect
from flask_bootstrap import Bootstrap
import os
import inference
app=Flask(__name__)
Bootstrap(app)
"""
Routes
"""
@app.route('/',methods=['GET','POST'])
def index():
if request.method == 'POST':
uploaded_file= request.files['file']
... | 29 | 28.28 | 69 | 14 | 171 | python | [{"finding_id": "codeql_py/flask-debug_85017a5f635928e7_ed2c0e92", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
29,
18
] | [
null,
null
] | [
5,
32
] | [
24,
42
] | |
2024-11-18T22:29:02.043067+00:00 | 1,576,477,306,000 | 4eea0e5cdf49fdfd0e397bdaa59d5e642738af07 | 3 | {
"blob_id": "4eea0e5cdf49fdfd0e397bdaa59d5e642738af07",
"branch_name": "refs/heads/master",
"committer_date": 1576477306000,
"content_id": "033c73843a9d47b5928eac97f80c8dee710e4d8b",
"detected_licenses": [
"MIT"
],
"directory_id": "3a55703604f884b08c06e75de5d0a2d17170ba72",
"extension": "py",
"fi... | 3.21875 | stackv2 | import pyperclip
from user import User
from credentials import Credential
import string
import random
def create_user(username,password):
'''
Function to create a new user account
'''
new_user = User(username,password)
return new_user
def save_user(user):
'''
Function to save new user account
'''
user.save_u... | 318 | 25.41 | 121 | 30 | 1,880 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_890d21f3d584e207_3bd62f7e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 7 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensi... | [
92,
134,
138,
152,
230,
234,
248
] | [
null,
null,
null,
null,
null,
null,
null
] | [
10,
19,
19,
18,
19,
19,
18
] | [
70,
87,
87,
115,
87,
87,
115
] | |
2024-11-18T22:29:22.076990+00:00 | 1,608,142,050,000 | 29697fbb1cbfdf3476accee32476a754bfcd1700 | 3 | {
"blob_id": "29697fbb1cbfdf3476accee32476a754bfcd1700",
"branch_name": "refs/heads/master",
"committer_date": 1608142050000,
"content_id": "c2c65b22159361f6884e4134357aeaa63d93a3c9",
"detected_licenses": [
"MIT"
],
"directory_id": "990d812fe4c29e42e12f5af888f2f556e9994ba2",
"extension": "py",
"fi... | 2.640625 | stackv2 | import numpy as np
import re
import string
import pandas as pd
from gensim.models import Doc2Vec
from gensim.models.doc2vec import LabeledSentence
from gensim import utils
from nltk.corpus import stopwords
def textClean(text):
text = re.sub(r"[^A-Za-z0-9^,!.\/'+-=]", " ", text)
text = text.lower().split()
... | 71 | 30.27 | 103 | 16 | 580 | python | [{"finding_id": "codeql_py/overly-large-range_da238ba65a753f5c_7bea3d22", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=\\]."
] | [
12
] | [
null
] | [
39
] | [
42
] | |
2024-11-18T22:29:33.161883+00:00 | 1,520,192,788,000 | 0786084bae76f4bc7604af3588add2ed1255fee3 | 3 | {
"blob_id": "0786084bae76f4bc7604af3588add2ed1255fee3",
"branch_name": "refs/heads/master",
"committer_date": 1520192788000,
"content_id": "1467bc5bba417878b18dc2d485c6f6224bb83648",
"detected_licenses": [
"MIT"
],
"directory_id": "f5b6c97e74939508c11a61216f296e98410d69f0",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/env python2
# -*- coding: utf-8 -*-
"""
Created on Mon Feb 19 11:58:11 2018
@author: Vilja Hulden
Extract information from the Chronicling America RDF files - each publication title
(identified with an "sn" ID) has an associated RDF file that contains various metadata
about the title.
Among other things, ... | 191 | 36.9 | 101 | 16 | 2,118 | python | [{"finding_id": "codeql_py/overly-large-range_a2c7844e3df9d1da_40f8dda9", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/incomplete-hostname-regexp"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"This regular expression has an unescaped '.' before 'geonames.org/', so it might match more hosts than expected."
] | [
54,
71
] | [
null,
null
] | [
43,
29
] | [
46,
57
] | |
2024-11-18T22:29:43.041113+00:00 | 1,589,569,085,000 | bb60bc60c9fb4d2b12eaa69f4553001534e67e5f | 3 | {
"blob_id": "bb60bc60c9fb4d2b12eaa69f4553001534e67e5f",
"branch_name": "refs/heads/master",
"committer_date": 1589569085000,
"content_id": "a0edac002e877022460f418a1870e0ed55d206ab",
"detected_licenses": [
"MIT"
],
"directory_id": "d94a8f8e512093a49a8cb0a6c246c2431b94e7ff",
"extension": "py",
"fi... | 2.546875 | stackv2 | """
Filters down a directory of grb2 files to a specific geometry.
FIXME:100 There is a memory leak somewhere in this file. No clue where, but at month-level granularities, you need at least 2GB ram/year-month.
"""
import os
import click
import pandas as pd
import geopandas as gpd
import xarray as xr
import tarfile
i... | 216 | 29.87 | 144 | 18 | 1,783 | python | [{"finding_id": "codeql_py/tarslip_67bcc1ea80310aa0_18d3a22c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
98
] | [
null
] | [
24
] | [
31
] | |
2024-11-18T22:40:26.171515+00:00 | 1,504,642,741,000 | 2e756cc15f61e75af996493ebbd1188fae2f08a7 | 3 | {
"blob_id": "2e756cc15f61e75af996493ebbd1188fae2f08a7",
"branch_name": "refs/heads/master",
"committer_date": 1504642741000,
"content_id": "510aff3ece51e3b9b89c9711807a943dd146c36a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9f9e162323176f6a220a701ea680ee3f0712b40b",
"extension": "py"... | 2.96875 | stackv2 | '''
Created on 4 Mar 2017
@author: Robert Putt
'''
import logging
import argparse
import random
import bcrypt
from openschoolmail.config import DB_URI
from openschoolmail.config import SECRET_KEY
from openschoolmail.db.models import Staff
from openschoolmail.db import get_db_session
logging.basicConfig(level=logging... | 85 | 30.25 | 86 | 12 | 556 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_86d5ce7e44f1dc87_79771167", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
82
] | [
null
] | [
18
] | [
50
] | |
2024-11-18T22:40:27.485514+00:00 | 1,565,090,854,000 | bf0547d82ee80b6319e75ff29ad83d6dfe9c028a | 3 | {
"blob_id": "bf0547d82ee80b6319e75ff29ad83d6dfe9c028a",
"branch_name": "refs/heads/master",
"committer_date": 1565090854000,
"content_id": "57666d602bbaaaf3ae271b6228c7aa7881e9d36d",
"detected_licenses": [
"MIT"
],
"directory_id": "15e2c7b30aa72891d6971b911059c3ca62f5a64c",
"extension": "py",
"fi... | 2.625 | stackv2 | #coding:utf-8
import ftplib
import sys,socket
def ftpburp(ip,port):
with open('ftp\user.txt','r') as user:
users = user.readlines()
with open('ftp\pass.txt','r') as passs:
pwds = passs.readlines()
user.close()
passs.close()
addr = (ip, int(port))
sock_21 = socket.socket(so... | 41 | 24.22 | 100 | 18 | 242 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_289d368f208e05d4_771e34e8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
34
] | [
null
] | [
38
] | [
100
] | |
2024-11-18T22:54:27.221476+00:00 | 1,680,460,946,000 | fd4662fb77c3e1db7b002986bb4621bde8c63f7f | 3 | {
"blob_id": "fd4662fb77c3e1db7b002986bb4621bde8c63f7f",
"branch_name": "refs/heads/main",
"committer_date": 1680460946000,
"content_id": "1d2262abe79fb442666c9ad36bc3e3f0568ac497",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "168faa31153797d034bc7413dd732bb5830bb5c5",
"extension": "py"... | 3.0625 | stackv2 | """
==================
Timeout Middleware
==================
Middleware to ensure that request handling does not exceeds X seconds.
Usage
=====
.. code-block:: python
from aiohttp import web
from aiohttp_middlewares import (
error_middleware,
timeout_middleware,
)
# Basic usage
... | 144 | 33.69 | 79 | 16 | 1,065 | python | [{"finding_id": "codeql_py/log-injection_50af2328a33a653e_1cc0ca42", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
137
] | [
null
] | [
23
] | [
71
] | |
2024-11-18T22:54:33.769988+00:00 | 1,599,812,355,000 | 04ac3fb6b4cf387108789da3c6ed51888f7d5d11 | 2 | {
"blob_id": "04ac3fb6b4cf387108789da3c6ed51888f7d5d11",
"branch_name": "refs/heads/master",
"committer_date": 1599812355000,
"content_id": "227d205f7409749a641fb80c84ae9c60f94ac676",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "37df3ce2112fe2961d0683ec1ee8a1c79fd5f182",
"extension": "py"... | 2.328125 | stackv2 | #!/usr/bin/env python3
# -*- coding:utf-8 -*-
"""
@project: k8scontroller-metadata-exporter
@component: core
@author: vfabi
@support: vfabi
@initial date: 2020-05-17 18:30:40
@license: this file is subject to the terms and conditions defined
in file 'LICENSE', which is part of this sour... | 223 | 36.91 | 145 | 18 | 1,777 | python | [{"finding_id": "codeql_py/stack-trace-exposure_357c5d493e8f6781_cfdd66c4", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
114,
178,
215
] | [
null,
null,
null
] | [
24,
24,
24
] | [
32,
32,
32
] | |
2024-11-18T20:55:13.453973+00:00 | 1,543,878,242,000 | a230ae970c528aa91965bcebc5c808c118e3019c | 2 | {
"blob_id": "a230ae970c528aa91965bcebc5c808c118e3019c",
"branch_name": "refs/heads/master",
"committer_date": 1543878242000,
"content_id": "e203ee86e163d74f495f67e78eee876d538e2a45",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5ebdf723e4f26230b6e6ad9307f15a081993194d",
"extension": "py"... | 2.34375 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
#
# Copyright 2011-2016 Lancaster University.
#
#
# This file is part of Yarely.
#
# Licensed under the Apache License, Version 2.0.
# For full licensing information see /LICENSE.
# Standard library imports
import json
import logging
import threading
from xml.etree imp... | 200 | 31.38 | 79 | 17 | 1,348 | python | [{"finding_id": "codeql_py/log-injection_48c5248a91e9d1ae_422aae28", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
71
] | [
null
] | [
19
] | [
57
] | |
2024-11-18T21:33:29.719071+00:00 | 1,596,976,420,000 | 5c7b210be4385fd6ed9d109a272cddd22ae43352 | 2 | {
"blob_id": "5c7b210be4385fd6ed9d109a272cddd22ae43352",
"branch_name": "refs/heads/master",
"committer_date": 1596976420000,
"content_id": "1b4f7ad6198640e36419ebd54dc4878dba7314fa",
"detected_licenses": [
"MIT"
],
"directory_id": "0f894f29f1065a42523a5cbfb9c33d01f26d4558",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/env python3
import os
import re
import sys
from glob import glob
import argparse
from pprint import pprint
from jinja2 import FileSystemLoader, Environment, TemplateNotFound, FunctionLoader
from collections import OrderedDict
class HumeRenderer():
def __init__(self,templates_dir=None, transfer_method=N... | 230 | 33 | 92 | 17 | 1,821 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f7753dd986ad2396_4dce017d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
32,
37
] | [
33,
38
] | [
23,
31
] | [
52,
60
] | |
2024-11-18T21:55:47.887177+00:00 | 1,575,423,938,000 | b99b1709316a67834957030cd6c3173e4124bc87 | 2 | {
"blob_id": "b99b1709316a67834957030cd6c3173e4124bc87",
"branch_name": "refs/heads/master",
"committer_date": 1575423938000,
"content_id": "883dd2c049178f4e9e05f39525610a9da5ee0706",
"detected_licenses": [
"MIT"
],
"directory_id": "dc9e005a228441ff77022bbf898ef00721aaf85d",
"extension": "py",
"fi... | 2.421875 | stackv2 | import os
import sys
from flask import Flask
import hvac
import json
app = Flask(__name__)
@app.route('/')
def hello_world():
port = os.getenv('NOMAD_PORT_http', 8000)
arg = None
if len(sys.argv) > 1:
arg = sys.argv[1]
token = os.getenv('VAULT_TOKEN', None)
data = {}
err = None
if t... | 29 | 31.66 | 118 | 17 | 274 | python | [{"finding_id": "codeql_py/stack-trace-exposure_e31082eea0e28059_ba1bf5f5", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
25
] | [
null
] | [
12
] | [
119
] | |
2024-11-18T21:55:58.847815+00:00 | 1,525,805,898,000 | 23014f4452496cc9d595bded95ba075ddbe1ff0d | 3 | {
"blob_id": "23014f4452496cc9d595bded95ba075ddbe1ff0d",
"branch_name": "refs/heads/master",
"committer_date": 1525805898000,
"content_id": "48470c4af64da29fcb125b2a688a3c85bb7b1536",
"detected_licenses": [
"MIT"
],
"directory_id": "6ef615e3a34075c1a440f23f43db7d996d3333ce",
"extension": "py",
"fi... | 2.734375 | stackv2 | import os
import subprocess
from flask import Flask, request
app = Flask(__name__)
@app.route('/', methods=['GET', 'POST'])
def hello_world():
jsonData = request.json
if jsonData:
return "{\"message\": \"Hello\", \"data\": [{\"name\": \""+jsonData['name']+"\", \"source\": \""+jsonData['source']+"\"}]}"
else:
re... | 24 | 28.88 | 125 | 18 | 183 | python | [{"finding_id": "codeql_py/stack-trace-exposure_bd7b8f23eeea34d9_7007b32f", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-079"
] | [
"py/stack-trace-exposure",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
21,
10
] | [
null,
null
] | [
10,
10
] | [
36,
126
] | |
2024-11-18T21:55:59.877547+00:00 | 1,581,194,558,000 | b6d8abaf8f0102c89f2f573c894750f2a7571881 | 3 | {
"blob_id": "b6d8abaf8f0102c89f2f573c894750f2a7571881",
"branch_name": "refs/heads/master",
"committer_date": 1581194558000,
"content_id": "b4cdf6b5c4594585c56783c95bb0a200537f9af2",
"detected_licenses": [
"MIT"
],
"directory_id": "afddedac062ae148fbb950318e79fb260eafe3b5",
"extension": "py",
"fi... | 2.546875 | stackv2 | import os
from jinja2 import Template
from IPython.core.display import display, HTML
CURRENT_PATH = os.path.abspath(os.path.dirname(__file__))
class RenderEngine:
def __init__(self, tmpl_file: str = "templates/jupyter_notebook.html"):
tmpl_file = os.path.join(CURRENT_PATH, tmpl_file)
self.tmpl_f... | 25 | 25.48 | 75 | 13 | 153 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_15aefa19769ff41d_b6d2daef", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
20
] | [
null
] | [
16
] | [
35
] | |
2024-11-18T22:39:39.603583+00:00 | 1,688,369,869,000 | 0bdf0acfbfacb453238290858dd031fe8d77fa78 | 2 | {
"blob_id": "0bdf0acfbfacb453238290858dd031fe8d77fa78",
"branch_name": "refs/heads/master",
"committer_date": 1688369869000,
"content_id": "e08b258d91452c088036e45251b4db9773025262",
"detected_licenses": [
"MIT"
],
"directory_id": "8f0fee459b33524b854be475a71d6d25786acc91",
"extension": "py",
"fi... | 2.328125 | stackv2 | # Copyright (c) 2020-2022 CRS4
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merge, publish, distribut... | 118 | 31.35 | 80 | 12 | 937 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1da7a650c5a1b1c6_c2399f35", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
57,
78,
88,
95
] | [
null,
null,
null,
null
] | [
11,
15,
45,
11
] | [
25,
18,
52,
44
] | |
2024-11-18T22:54:58.085547+00:00 | 1,622,790,219,000 | e8d272ba6d116d4c027d71b64a4c9352652b53ee | 3 | {
"blob_id": "e8d272ba6d116d4c027d71b64a4c9352652b53ee",
"branch_name": "refs/heads/master",
"committer_date": 1622790219000,
"content_id": "a293cf4cd28b28e53d176320c67d1237667a8d15",
"detected_licenses": [
"MIT"
],
"directory_id": "fea9afe647ffa42961639d5460c9dd50f040713c",
"extension": "py",
"fi... | 2.546875 | stackv2 | import flask
import logging
from flask import jsonify, request, Response
import io
from .GCLocationList import FindLocation, FindLocations,GetLocationsForCountry
from .GCCountry import GetCountries
from .GCGregorianDate import GCGregorianDate,Today
from .TCalendar import TCalendar
app = flask.Flask(__name__)
@app.... | 163 | 31.25 | 152 | 16 | 1,358 | python | [{"finding_id": "codeql_py/reflective-xss_b04e92105140c8ca_7ba4eec1", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
88
] | [
null
] | [
40
] | [
147
] | |
2024-11-18T23:06:18.647844+00:00 | 1,361,979,697,000 | cf204398281ee0039e5d89bb21f4dc3a996d9470 | 3 | {
"blob_id": "cf204398281ee0039e5d89bb21f4dc3a996d9470",
"branch_name": "refs/heads/master",
"committer_date": 1361979961000,
"content_id": "828e64a679439690231e03b0bccf97d8a90fe8c7",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "f02d58e1906f72ce06cf5b00deed1bd190d580e6",
"extension": "p... | 2.515625 | stackv2 | from urlparse import urlparse, urljoin
from flask import request, redirect
from flask.ext.wtf import Form
from flask.ext.wtf import HiddenField, BooleanField, TextField, PasswordField
from flask.ext.wtf import Required, Length, EqualTo, Email, URL
def is_safe_url(target):
ref_url = urlparse(request.host_url)
... | 56 | 31.5 | 85 | 13 | 390 | python | [{"finding_id": "codeql_py/url-redirection_a07e17f48c35a29c_e8d0c1c7", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
34
] | [
null
] | [
25
] | [
62
] | |
2024-11-18T23:25:08.789106+00:00 | 1,614,876,824,000 | 965ca005ec7741b9a396e17a3b53c14371a9199d | 2 | {
"blob_id": "965ca005ec7741b9a396e17a3b53c14371a9199d",
"branch_name": "refs/heads/master",
"committer_date": 1614876824000,
"content_id": "113603cc71db6ea8a45cf84546cf94caa128bf63",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d5146db0a3b144a16a4c3c83d87baa000d7510d1",
"extension": "py"... | 2.328125 | stackv2 | __author__ = "Manuel Escriche <mev@tid.es>"
import base64, certifi, requests
from kernel.Settings import settings
class ConnectionToJIRA(Exception):
pass
class Connector:
url_api = {
'session': '/rest/auth/1/session',
'project': '/rest/api/latest/project',
'component': '/rest/api/l... | 216 | 34.25 | 108 | 17 | 1,612 | python | [{"finding_id": "codeql_py/request-without-cert-validation_20d306515a37f54a_0283494c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2).",
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
46,
158
] | [
null,
null
] | [
18,
18
] | [
91,
86
] | |
2024-11-18T22:29:34.526532+00:00 | 1,604,381,269,000 | d371cb308003a8487f1a15354e54719fc4bb900c | 2 | {
"blob_id": "d371cb308003a8487f1a15354e54719fc4bb900c",
"branch_name": "refs/heads/master",
"committer_date": 1604381269000,
"content_id": "aac0513efce92ac35c0eb32804c35148ac0b567a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "03c8064409efe7fba0d0d49db58e4c8b6130376c",
"extension": "py"... | 2.359375 | stackv2 | from threading import Thread
import time
import requests
from io import BytesIO
import http.cookiejar as cookielib
from PIL import Image
from base64 import b64decode
import os
requests.packages.urllib3.disable_warnings()
class show_code(Thread):
def __init__(self,data):
Thread.__init__(self)
self.... | 74 | 32.42 | 145 | 15 | 626 | python | [{"finding_id": "codeql_py/request-without-cert-validation_87bc60b3b0d14a29_2d36848e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
28
] | [
null
] | [
17
] | [
62
] | |
2024-11-18T22:29:49.652843+00:00 | 1,482,255,958,000 | ab7b9a1d34195123487cfdeda386d46e87cb7ea7 | 3 | {
"blob_id": "ab7b9a1d34195123487cfdeda386d46e87cb7ea7",
"branch_name": "refs/heads/master",
"committer_date": 1482255958000,
"content_id": "3460a2b2e7abcbfd081f9cd36b35bcbbaa9d698a",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "2a56d481855e3621f2c7ffce455bb76f79e6cbea",
"extension": "p... | 3.0625 | stackv2 | #!/usr/bin/env python
# Build information
__author__ = 'Kevin Wurster'
__version__ = '0.1'
__copyright__ = 'Copyright SkyTruth 2014'
__license__ = 'New BSD (See LICENSE.txt)'
import os
import sys
import json
from os.path import isfile
def print_usage():
print("")
print("Usage: task.json task_run.json outf... | 216 | 32.92 | 120 | 17 | 1,703 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c0355e3716306370_e3ee6526", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data ... | [
189,
186
] | [
null,
null
] | [
26,
23
] | [
30,
49
] | |
2024-11-18T22:29:52.292324+00:00 | 1,586,436,800,000 | d2985dde60c6d84c925180adb2e1f0738e20ba10 | 3 | {
"blob_id": "d2985dde60c6d84c925180adb2e1f0738e20ba10",
"branch_name": "refs/heads/master",
"committer_date": 1586436800000,
"content_id": "75643333ce9e7169ac4b985b101f463df0a88ed4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a7cd317e03f91431d72f6067c5734c7366addc44",
"extension": "py"... | 2.609375 | stackv2 | #!/usr/bin/env python3
from flask import Flask
from flask import request
from util import startTunnel, stopTunnel, addressesForInterface
from argparse import ArgumentParser
import logging
app = Flask(__name__)
settings = {}
@app.route("/connect")
def connect():
address = request.remote_addr
logging.info("Con... | 42 | 24.29 | 80 | 12 | 244 | python | [{"finding_id": "codeql_py/log-injection_2799fcfd1136b4e4_8b0e93ff", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
15
] | [
null
] | [
18
] | [
59
] | |
2024-11-18T22:29:56.306406+00:00 | 1,551,347,594,000 | 4897d971856b16e6eabd3fc5a885b7f2ad26928b | 3 | {
"blob_id": "4897d971856b16e6eabd3fc5a885b7f2ad26928b",
"branch_name": "refs/heads/master",
"committer_date": 1551347594000,
"content_id": "8f7671bea0176eec48b6fda9fba0051d6770365c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e44b25477c08ad1a8696d6310c167a896f7e56ef",
"extension": "py"... | 2.53125 | stackv2 | import json
import time
import gensim
import numpy as np
from flask import Flask, request
from gensim.models import KeyedVectors
# json encoder
class MyEncoder(json.JSONEncoder):
def default(self, obj):
if isinstance(obj, np.integer):
return int(obj)
elif isinstance(obj, np.floating):
... | 200 | 35.46 | 143 | 20 | 1,751 | python | [{"finding_id": "codeql_py/stack-trace-exposure_1f720ca02d42fda3_204cccde", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 9 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
125,
143,
170,
196,
200,
123,
141,
168,
194
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
20,
20,
20,
20,
5,
20,
20,
20,
20
] | [
62,
62,
62,
62,
72,
96,
114,
140,
130
] | |
2024-11-18T23:21:50.345902+00:00 | 1,446,234,741,000 | 808c5091fd53ff12f947c55b58d90edb0e10cbec | 3 | {
"blob_id": "808c5091fd53ff12f947c55b58d90edb0e10cbec",
"branch_name": "refs/heads/master",
"committer_date": 1446234741000,
"content_id": "6f00a09ba5f13cf25a77f03879fddc96f0f584dc",
"detected_licenses": [
"MIT"
],
"directory_id": "9055e0d2c32f342eccdd10213bfcd5a72880604b",
"extension": "py",
"fi... | 2.59375 | stackv2 | # # @package ExactAbstract
# All non-algorithm related work for ExactAbstract
#
# The main package for the app
from flask import Flask
from flask import request
from flask import render_template, jsonify, make_response
from algorithms.statistical import get_keyword
from nltk.tokenize import word_tokenize
from nltk.ste... | 392 | 38.3 | 120 | 22 | 3,307 | python | [{"finding_id": "codeql_py/flask-debug_9228211900d2c280_b0bd48aa", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
392,
143
] | [
null,
null
] | [
5,
14
] | [
24,
47
] | |
2024-11-18T23:21:53.190773+00:00 | 1,570,117,163,000 | 39b46263c097a01e83b2ce27b62853fde1282b76 | 2 | {
"blob_id": "39b46263c097a01e83b2ce27b62853fde1282b76",
"branch_name": "refs/heads/master",
"committer_date": 1570120556000,
"content_id": "415a53a51ebf51c6d34677c6a602acccecb24ddb",
"detected_licenses": [
"MIT"
],
"directory_id": "906e157adb45f09b5d035b784cb16d7289a2dbae",
"extension": "py",
"fi... | 2.359375 | stackv2 | #! /usr/bin/env python
import argparse
import json
import os
import re
from collections import ChainMap
from pathlib import PurePath
from jinja2 import Environment, PackageLoader
env = Environment(loader=PackageLoader(__name__))
CUSTOM_DOTFILES_DIR = 'custom_dotfiles/'
CUSTOM_SETTINGS_DIR = 'custom_settings/'
DEFA... | 168 | 32.63 | 79 | 19 | 1,188 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ac39ccb743d31e0a_e92f8a17", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
null
] | [
7
] | [
50
] | |
2024-11-18T21:33:30.809394+00:00 | 1,608,024,400,000 | 4dca853d7f75040526b952f14ff5fc1c345db9ce | 3 | {
"blob_id": "4dca853d7f75040526b952f14ff5fc1c345db9ce",
"branch_name": "refs/heads/master",
"committer_date": 1608024400000,
"content_id": "d1c8f1a2d1e23f8fba94936422e37af6173e8f04",
"detected_licenses": [
"MIT"
],
"directory_id": "2c3da6e0bddf55d64d650040bbf286c47b31811a",
"extension": "py",
"fi... | 3 | stackv2 | from gevent import monkey
monkey.patch_all()
import gevent
import time
import pywifi
from pywifi import const
def test_connect(password_str):
wifi = pywifi.PyWiFi() # 开启一个无线对象
interface = wifi.interfaces()[0] # 抓取无线网卡列表第一个无线网卡
# print(wifi.interfaces())
# print(interface.name()) # 取出无限网卡的名字
interface.disco... | 59 | 23.64 | 63 | 15 | 516 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_800bc7da9197c8b8_e5d79e36", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
36,
38
] | [
null,
null
] | [
9,
9
] | [
56,
56
] | |
2024-11-18T21:33:36.597085+00:00 | 1,683,787,480,000 | 077f7e98d2466473f5eb33043cb636fd1a434d47 | 3 | {
"blob_id": "077f7e98d2466473f5eb33043cb636fd1a434d47",
"branch_name": "refs/heads/master",
"committer_date": 1683787480000,
"content_id": "9e96bc3998b59ab7cc3feb3f1f4160a0d723f40b",
"detected_licenses": [
"MIT"
],
"directory_id": "35410279821fe2896b3eed264a6cb2f38c1e0dff",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
import re
import hashlib
import json
from unicodedata import category
from cassandra.cqlengine.models import Model
from cassandra.cqlengine.management import sync_table
from cassandra.cqlengine import columns, connection, ValidationError
import resources.utils.hash_pas... | 150 | 22.63 | 80 | 15 | 1,013 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_fa01ad7d5257ad5e_3d8e2720", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 6 | true | [
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
134,
135,
136,
137,
138,
139
] | [
null,
null,
null,
null,
null,
null
] | [
28,
30,
34,
34,
34,
34
] | [
43,
45,
49,
49,
49,
49
] | |
2024-11-18T22:30:21.391774+00:00 | 1,553,692,353,000 | 04259cc0be42fa5e5efc826792bc8114d5585819 | 3 | {
"blob_id": "04259cc0be42fa5e5efc826792bc8114d5585819",
"branch_name": "refs/heads/master",
"committer_date": 1553692353000,
"content_id": "ab5499e97d346466b1aae6f9561ac4fc5dc4a55c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "17bc72ee1ad409ca65f4c0a07bf7a905faea0cac",
"extension": "py"... | 3.15625 | stackv2 | # coding:utf8
'''
输入一个仓库(文件夹路径):
1. 提取其中的html,js,css文件
2. 提取script标签内容为js文件,提取style标签内容为css文件
3. 变量替换 href,src等引用部分 以及 script片段 (用任意变量名替换)
'''
import os
import random
import re
import shutil
# 输入仓库路径,返回三个一维list,分别对应此仓库的html,css,js文件
def get_html_css_js_files(repo_path):
html_files = [] # html文件路径
css_file... | 173 | 35.72 | 120 | 24 | 1,955 | python | [{"finding_id": "codeql_py/bad-tag-filter_b5d096174e44927f_6c57240d", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ... | 2 | true | [
"CWE-116",
"CWE-116"
] | [
"py/bad-tag-filter",
"py/bad-tag-filter"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This regular expression does not match upper case <SCRIPT> tags.",
"This regular expression does not match upper case <SCRIPT> tags."
] | [
69,
93
] | [
null,
null
] | [
15,
19
] | [
43,
45
] | |
2024-11-18T22:30:23.595916+00:00 | 1,511,218,380,000 | 72f340951f163acad449bc8e1a6e2e00bcf8910b | 3 | {
"blob_id": "72f340951f163acad449bc8e1a6e2e00bcf8910b",
"branch_name": "refs/heads/master",
"committer_date": 1511218380000,
"content_id": "a2da485b4185d50d3f28a3dd9af0890756450933",
"detected_licenses": [
"MIT"
],
"directory_id": "d9e0b7bcc576ac5721140c7018caf75f4369a5c6",
"extension": "py",
"fi... | 2.703125 | stackv2 | #!/usr/bin/python2.7
from __future__ import print_function
import argparse
import re
import sys
import os.path
parser = argparse.ArgumentParser()
parser.add_argument("input", help="Input PMAnalyzer file")
parser.add_argument("plate", help="Plate file name")
parser.add_argument("-n", "--nocolumn", action="store_true",
... | 64 | 31.19 | 72 | 13 | 549 | python | [{"finding_id": "codeql_py/overly-large-range_f861c31d6253abd2_c11d869d", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
17
] | [
null
] | [
23
] | [
26
] | |
2024-11-18T22:30:33.137601+00:00 | 1,615,005,687,000 | f9efa2343e2a12018c7f91a6c1f492ffb9ebaa30 | 3 | {
"blob_id": "f9efa2343e2a12018c7f91a6c1f492ffb9ebaa30",
"branch_name": "refs/heads/master",
"committer_date": 1615005687000,
"content_id": "473e15f1cf1908a3cb8f88b7016058dd3d3154ae",
"detected_licenses": [
"MIT"
],
"directory_id": "31ce2a5755c1f1f0569fef61c991259039112c65",
"extension": "py",
"fi... | 2.578125 | stackv2 | from jinja2 import Template
import yaml
import sys
if len(sys.argv) != 4:
sys.exit("Invalid number of arguments.\nUsage: {} template.md profile.yaml output.md".format(sys.argv[0]))
template = sys.argv[1]
yaml_file = sys.argv[2]
output_file = sys.argv[3]
#profile
with open(yaml_file, "r") as f:
profile = yaml... | 21 | 24.81 | 110 | 11 | 147 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_96d52b05f5554ae4_f490d5e8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
17
] | [
null
] | [
27
] | [
45
] | |
2024-11-18T22:44:49.628960+00:00 | 1,490,792,459,000 | eb7cb2b84aa71c3178faef90eb036242647a06c6 | 3 | {
"blob_id": "eb7cb2b84aa71c3178faef90eb036242647a06c6",
"branch_name": "refs/heads/master",
"committer_date": 1490792459000,
"content_id": "733ab3453c76d0bc7e5a88285690c975b4cec477",
"detected_licenses": [
"MIT"
],
"directory_id": "66a4f71c99b1444f341bcca8a26bc0cd877553fc",
"extension": "py",
"fi... | 2.609375 | stackv2 | # -*- coding: utf-8 -*-
from django.shortcuts import render
from django.http import JsonResponse
from . import models
import requests
import json
from . import update_data
from rest_framework.views import APIView
from rest_framework.response import Response
# Create your views here.
EARTH_RAD_KM = 6371
GOOGLKEY = "AIz... | 127 | 33.68 | 120 | 18 | 1,008 | python | [{"finding_id": "codeql_py/partial-ssrf_10cba819551e5c63_b590c946", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
101
] | [
null
] | [
20
] | [
72
] | |
2024-11-18T23:36:48.094252+00:00 | 1,619,376,548,000 | 3147e8829699bd29c4605b709486fd4902a4d57b | 3 | {
"blob_id": "3147e8829699bd29c4605b709486fd4902a4d57b",
"branch_name": "refs/heads/master",
"committer_date": 1619376548000,
"content_id": "5bf3053088af5e798861a4a5b0c9a40c7343b799",
"detected_licenses": [
"MIT"
],
"directory_id": "0a66f2fd513b38533b31a0462789c64d5dc7312b",
"extension": "py",
"fi... | 3.171875 | stackv2 | import numpy as np
from numpy.linalg import inv
from scipy.stats import binom
#a1 = failed
#a2 = passed
testPassingProbabilities = [0.7, 0.6, 0.8, 0.9]
noOfSpecialistsCurrent = [100, 70, 50, 60]
wantedSpecialists = 5
wantedWithProbability = 0.9
transitionMatrix = np.zeros((len(testPassingProbabilities) + 2, len(tes... | 40 | 33.6 | 107 | 11 | 421 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_08502a7949c615aa_18f4308c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
39
] | [
null
] | [
15
] | [
69
] | |
2024-11-18T23:36:50.657281+00:00 | 1,575,601,347,000 | 79fdd0e018814b5b37fa8839537d961ff0e366cf | 3 | {
"blob_id": "79fdd0e018814b5b37fa8839537d961ff0e366cf",
"branch_name": "refs/heads/master",
"committer_date": 1575601347000,
"content_id": "6f90a5e73d03714466014d8b6910e59173223950",
"detected_licenses": [
"MIT"
],
"directory_id": "231f724150a36b21a7767b7636a766e98046f97f",
"extension": "py",
"fi... | 2.8125 | stackv2 | import requests
from bs4 import BeautifulSoup
import logging
from pprint import pprint
import re
import dateparser
def requests_wraper(url):
headers = {'User-Agent':'Mozilla/5.0 (Windows NT 10.0; WOW64; rv:51.0) Gecko/20100101 Firefox/51.0'}
for _ in range(200):
try:
resp = requests.get(url, verify=False... | 368 | 26.01 | 152 | 18 | 2,859 | python | [{"finding_id": "codeql_py/request-without-cert-validation_8ee7efd3c6366a21_93854ec2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
12
] | [
null
] | [
14
] | [
62
] | |
2024-11-18T23:37:11.110922+00:00 | 1,633,624,855,000 | c42d9938ef6e4df6773a1dc52a9c0e11c011d65e | 2 | {
"blob_id": "c42d9938ef6e4df6773a1dc52a9c0e11c011d65e",
"branch_name": "refs/heads/master",
"committer_date": 1633624855000,
"content_id": "0e2dcd6f0024aff623c685e8be327b9b73e5c8d2",
"detected_licenses": [
"MIT"
],
"directory_id": "c396faf6d28c3c0067e40418ee78673210875af6",
"extension": "py",
"fi... | 2.328125 | stackv2 | from __future__ import print_function, division
import os
import re
from sys import stderr
from binascii import b2a_hex
from .readers import ByteReader
from .hexdump import strescape, toout, ashex
from .Datamodel import TableDefinition, Record
from .Datafile import Datafile
import base64
import struct
import crodump.ko... | 289 | 33.45 | 100 | 23 | 2,478 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e7de1e95587fef32_26b5c5cb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
162
] | [
null
] | [
15
] | [
100
] | |
2024-11-18T21:15:48.915018+00:00 | 1,615,486,304,000 | 12004c1713620c7eccde87038940fdbb94c5c2e6 | 4 | {
"blob_id": "12004c1713620c7eccde87038940fdbb94c5c2e6",
"branch_name": "refs/heads/main",
"committer_date": 1615486304000,
"content_id": "2909fe39bf3518b7af09d4d7f9e0dc6b704bf207",
"detected_licenses": [
"MIT"
],
"directory_id": "3fc992cb2a68fc6d36a7cfe9806cac8d0bc239af",
"extension": "py",
"file... | 3.5625 | stackv2 | #!/usr/bin/env python3
"""
Simple script to brute force bitcoin wallets with text file filled with passphrases
and print any keys with available balance. Program check for
both compressed and uncompressed versions of addresses using
bit library.
Example use: python brutecointxt.py -t passphrases.txt
DISCLAIMER: Progr... | 80 | 48.6 | 153 | 21 | 775 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_180a4d1006c66a8c_e472feef", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
64,
53
] | [
null,
null
] | [
49,
54
] | [
55,
76
] | |
2024-11-18T21:58:12.925559+00:00 | 1,591,041,669,000 | e9db0d9127c794175f5547a135498b665fd9a608 | 3 | {
"blob_id": "e9db0d9127c794175f5547a135498b665fd9a608",
"branch_name": "refs/heads/master",
"committer_date": 1591041669000,
"content_id": "fe200a96eea6a754d3d0696cf9f33dd7ddec48ed",
"detected_licenses": [
"MIT"
],
"directory_id": "4e16e6c081ce557657b2b57c4c0996beda05597b",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/env python3
# -*- encoding: utf-8 -*-
import os
import random
import time
import paramiko
from clients.PrototypeClient import PrototypeClient
class SSHClient(PrototypeClient.PrototypeClient):
def __init__(self, **kwargs):
super(SSHClient, self).__init__(**kwargs)
self._logger.debug("S... | 159 | 37.75 | 157 | 21 | 1,252 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_ac0e9873a3148579_d33de441", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to WarningPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to WarningPolicy may be unsafe."
] | [
132
] | [
null
] | [
17
] | [
87
] | |
2024-11-18T21:58:18.006392+00:00 | 1,549,884,058,000 | 291901e97676dfec46633bf8157427f880167f54 | 3 | {
"blob_id": "291901e97676dfec46633bf8157427f880167f54",
"branch_name": "refs/heads/master",
"committer_date": 1549884058000,
"content_id": "76db2ca30039f9758bc722f335da5d05c2a86f8e",
"detected_licenses": [
"MIT"
],
"directory_id": "91e36564486aaf09640f87c3d654327cfbb79790",
"extension": "py",
"fi... | 2.796875 | stackv2 | import re
import zlib
import requests
import collections
from typing import List
from pythonopensubtitles.opensubtitles import OpenSubtitles
class OpenSubtitleSession:
def __init__(self, username, password):
self.username = username
self.password = password
self._ost = OpenSubtitles()
... | 98 | 28.03 | 89 | 16 | 693 | python | [{"finding_id": "codeql_py/bad-tag-filter_b95459f3c505b305_b5d8c263", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression only parses --> and not --!> as a HTML comment end tag.", "remediation": "", "location":... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression only parses --> and not --!> as a HTML comment end tag."
] | [
43
] | [
null
] | [
27
] | [
32
] | |
2024-11-18T21:58:19.266865+00:00 | 1,689,168,397,000 | ca8de2c0259530d0d36e63e6a3eb802284b8269e | 2 | {
"blob_id": "ca8de2c0259530d0d36e63e6a3eb802284b8269e",
"branch_name": "refs/heads/main",
"committer_date": 1689168397000,
"content_id": "11791eabfbc955fd7d47cac12be755d996fe749e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "27dd33362ea9c723db275f2710cb46cdaeb15ed9",
"extension": "py",
... | 2.421875 | stackv2 | import sys
from getpass import getuser
from pathlib import Path
import pandas as pd
import streamlit as st
from duqtools.config import var_lookup
from duqtools.ids import ImasHandle, merge_data
from duqtools.utils import read_imas_handles_from_file
sys.path.insert(0, str(Path(__file__).parent))
from _shared import ... | 126 | 29.18 | 80 | 13 | 851 | python | [{"finding_id": "codeql_py/path-injection_744352500d9462a2_851b7b2c", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "remed... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2)."
] | [
28
] | [
null
] | [
8
] | [
11
] | |
2024-11-18T21:58:30.823602+00:00 | 1,598,175,851,000 | 3904a8ffbb161b68a7923f010f2009ef820ac4d8 | 2 | {
"blob_id": "3904a8ffbb161b68a7923f010f2009ef820ac4d8",
"branch_name": "refs/heads/master",
"committer_date": 1598175851000,
"content_id": "43fc6aae2f3c90b24b1c10525a3a927a2914ba84",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "0889262ca12429e9be0241ffe15c47a330c316a6",
"extension": "p... | 2.46875 | stackv2 | """Common generator module."""
import os
import datetime
import textwrap
from configparser import ConfigParser, ParsingError
import yaml
from jinja2 import Environment, FileSystemLoader
from click import prompt, Choice, MissingParameter, BadParameter, Abort
from .utils import get_usermail, get_username, parse_list... | 246 | 31.66 | 87 | 20 | 1,754 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_bb9f1a0cbb41e6f3_12208266", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
157
] | [
159
] | [
11
] | [
6
] | |
2024-11-18T22:05:52.977898+00:00 | 1,622,444,931,000 | 0a1b0a27d071917c6d87ec205d0fa23c2e3c073e | 3 | {
"blob_id": "0a1b0a27d071917c6d87ec205d0fa23c2e3c073e",
"branch_name": "refs/heads/master",
"committer_date": 1622444931000,
"content_id": "2578e0841d9d5ced39b892a4dde8bd02fe3c5ddf",
"detected_licenses": [
"MIT"
],
"directory_id": "efe6fe073076a527a4f017de85785f224361cc2b",
"extension": "py",
"fi... | 3.03125 | stackv2 | """
This script processes the raw Reddit comments for Target group 1(from reddit_data.py) and further creates Counter Target
dataset containing target group term replaced with Target group 2 terms. In case of demographic - Gender and
Sexual orientation, Reddit comments with only one Target group mention are retained.
"... | 180 | 51.84 | 150 | 26 | 2,468 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cb69c21026dffdbb_1597e358", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
71
] | [
null
] | [
19
] | [
24
] | |
2024-11-18T23:26:06.984721+00:00 | 1,465,896,677,000 | f1ac42d39d086d82b108911fdd0ff1d77b4ca0a2 | 3 | {
"blob_id": "f1ac42d39d086d82b108911fdd0ff1d77b4ca0a2",
"branch_name": "refs/heads/master",
"committer_date": 1465896677000,
"content_id": "0d38e212e1584e5ec82dc62cf3e8657dfaec780c",
"detected_licenses": [
"MIT"
],
"directory_id": "f92a47c2028fb7c430a937d580f4bbaa9c59a13e",
"extension": "py",
"fi... | 2.53125 | stackv2 | import jinja2
import json
env = jinja2.Environment(loader=jinja2.FileSystemLoader(["."]))
template = env.get_template ('list.html')
with open ('json.data', 'r') as f:
dataset = json.loads (f.readline())
print template.render (title='Alain', dataset=dataset)
with open ('json.txt', 'r') as f:
dataset = json.l... | 17 | 24.88 | 63 | 11 | 118 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_1d69dbc63ac65f58_0d4c7a8e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
4
] | [
null
] | [
7
] | [
64
] | |
2024-11-18T23:26:11.705721+00:00 | 1,577,364,934,000 | ffe9bb846aec969dd1aec599ddbf69071ec52557 | 3 | {
"blob_id": "ffe9bb846aec969dd1aec599ddbf69071ec52557",
"branch_name": "refs/heads/master",
"committer_date": 1577364934000,
"content_id": "efa99d76ebd2e18fd1729e7620c7e0fc5f88fc4f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "19a4b144e8afa70931d7a6e03bad2acea3d58fec",
"extension": "py"... | 2.546875 | stackv2 | # encoding: utf-8
import logging_helper
from scp import SCPClient
from paramiko import SSHClient, AutoAddPolicy
from conversionutil.dx import dx
logging = logging_helper.setup_logging()
__author__ = u'Oli Davis'
__copyright__ = u'Copyright (C) 2016 Oli Davis'
class SCP(object):
def __init__(self,
... | 80 | 27.64 | 77 | 13 | 452 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e54a233f6d99f077_41d6d438", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
33
] | [
null
] | [
9
] | [
62
] | |
2024-11-18T23:26:13.707102+00:00 | 1,563,338,232,000 | 76b333a245f71f2b331dd93b8abe7e578195131b | 3 | {
"blob_id": "76b333a245f71f2b331dd93b8abe7e578195131b",
"branch_name": "refs/heads/master",
"committer_date": 1563338232000,
"content_id": "636f2e0b2d74da5a5eb585d54fe1f03960ddac85",
"detected_licenses": [
"MIT"
],
"directory_id": "a3dc1f341f43f4a5db0d4347ba2528c755505e6e",
"extension": "py",
"fi... | 2.578125 | stackv2 | #coding = "utf-8"
__author :"lokey"
import urllib.request
import urllib.parse
import urllib.error
import simplejson
import hashlib
import itertools
import pandas as pd
from hashlib import sha1
from datetime import datetime
class weather_info(object):
def __init__(self,weatherServer_appkey,weatherServer_secret):
... | 64 | 38.33 | 158 | 20 | 640 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9974b050551f8b4d_e87618b8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
35,
21
] | [
null,
null
] | [
15,
29
] | [
18,
80
] | |
2024-11-18T22:27:25.769744+00:00 | 1,601,460,310,000 | 0c1b49210c68e2a9aace9e06327bd2844c3e0d9b | 2 | {
"blob_id": "0c1b49210c68e2a9aace9e06327bd2844c3e0d9b",
"branch_name": "refs/heads/master",
"committer_date": 1601460310000,
"content_id": "cb34204e21e4d1f872d0fa34de80780ed0fb9e74",
"detected_licenses": [
"MIT"
],
"directory_id": "a37e29ed8365995cf03efce541f4ffdb1f313fc8",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python3
import os
from flask import Flask, request, jsonify
from flask_cors import CORS
import requests
from datetime import datetime
import json
import pika
import hashlib
import hmac
import base64
from urllib.parse import urlencode, urlparse
# from signature import process_url
app = Flask(__name__... | 91 | 37.29 | 159 | 13 | 837 | python | [{"finding_id": "codeql_py/flask-debug_5f79be56455897c6_ea164cb4", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 7 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-327",
"CWE-918",
"CWE-918",
"CWE-918"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/weak-sensitive-data-hashing",
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"[Sensitive data (password)](1) is used in a ... | [
91,
52,
77,
84,
33,
42,
58
] | [
null,
null,
null,
null,
null,
null,
null
] | [
5,
12,
12,
37,
37,
13,
9
] | [
51,
25,
92,
64,
67,
38,
34
] | |
2024-11-18T22:14:56.599255+00:00 | 1,630,239,658,000 | 319176c26356d4fd8d5c5e2feb6760461a008773 | 3 | {
"blob_id": "319176c26356d4fd8d5c5e2feb6760461a008773",
"branch_name": "refs/heads/main",
"committer_date": 1630239658000,
"content_id": "413bfd8eb0d046f127788c929ecb35616315a232",
"detected_licenses": [
"MIT"
],
"directory_id": "accc9921ffb9761cd235e40aefdaa577047ec01a",
"extension": "py",
"file... | 2.921875 | stackv2 | # Import Required modules
import os
import pickle
# Create List
details_list=[]
l2=[]
G = []
#--------------------------------------------------------------------------------------------------------------------------------------------------------------------
def file_save(): # Function to save a file
NAME_PRO... | 211 | 42.95 | 165 | 14 | 1,929 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bbf3d27816aeef80_13ec1a73", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text."
] | [
46
] | [
null
] | [
38
] | [
52
] | |
2024-11-18T22:55:24.834746+00:00 | 1,590,869,626,000 | b25519856f46a50e6b3e705008f8ddc00af91b6e | 3 | {
"blob_id": "b25519856f46a50e6b3e705008f8ddc00af91b6e",
"branch_name": "refs/heads/master",
"committer_date": 1590869626000,
"content_id": "6c56943e3bfe5aae7a06a9401b45306985c95665",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "89da32209f368f97515b2ce151937c8e04bc3c0b",
"extension": "py"... | 3.28125 | stackv2 | """Centralized configuration manager."""
import os
import logging
import threading
import yaml
from inotify_simple import INotify, flags
class ConfigurationManager:
"""Configuration manager handles configuration centrally and
notify via callbacks of changes
"""
def __init__(self, work_dir=None):
... | 163 | 28.9 | 81 | 18 | 931 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_891594e09bdc8dec_e005b53b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
116
] | [
null
] | [
46
] | [
52
] | |
2024-11-18T22:55:39.793831+00:00 | 1,491,464,925,000 | 51513677cf438f56550350095909b225e5ef5201 | 2 | {
"blob_id": "51513677cf438f56550350095909b225e5ef5201",
"branch_name": "refs/heads/master",
"committer_date": 1491464925000,
"content_id": "108f1fa79ff5989836e76d6811368e73c5828326",
"detected_licenses": [
"MIT"
],
"directory_id": "9c5d562132bce2f4642d99bfad26ea37d46c247f",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!/usr/bin/python
"""Evil-Ginx Parser"""
import os
import os.path
import argparse
import json
import ConfigParser
import urllib
import time
import datetime
EOL = '\n'
TAB = '\t'
email_by_ips = {}
class log_data:
def __init__(self, email, passwd, tokens):
self.email = email
self.passwd = passwd
... | 217 | 31.17 | 153 | 21 | 1,663 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d4124b14768159bd_51625e6a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensiti... | [
112,
113,
114,
118,
119
] | [
null,
null,
null,
null,
null
] | [
21,
21,
21,
21,
21
] | [
45,
52,
33,
45,
46
] | |
2024-11-18T23:32:13.749679+00:00 | 1,302,953,826,000 | eeda930be64501d5da47cd72b1e7df7a9109ba69 | 3 | {
"blob_id": "eeda930be64501d5da47cd72b1e7df7a9109ba69",
"branch_name": "refs/heads/master",
"committer_date": 1302953826000,
"content_id": "22b37eb2f9aa252ab6e87628f4e8527d94d7e426",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "46eb22dbe3514fc586ca57dd5e9a2ef1e486ed7e",
"extension": "p... | 2.609375 | stackv2 | from codecs import open
from datetime import datetime
import imp
import logging
import ConfigParser
from optparse import OptionParser
from os import makedirs, getcwd, getlogin
from os.path import splitext, join, dirname, split, abspath, getctime,\
basename, exists, relpath, isabs
from shutil import ... | 331 | 38.17 | 98 | 25 | 2,657 | python | [{"finding_id": "codeql_py/tarslip_06213a252aea6681_a156e156", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
273
] | [
null
] | [
5
] | [
8
] | |
2024-11-18T23:55:45.869013+00:00 | 1,571,839,760,000 | 6d2115e20b5281ff195a6bb7e423f21010fb4689 | 3 | {
"blob_id": "6d2115e20b5281ff195a6bb7e423f21010fb4689",
"branch_name": "refs/heads/master",
"committer_date": 1571839760000,
"content_id": "d93c709e387b5f114ee3aa9999074b446889cca0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6fcc7e53952c7ee05a8cb8e1f60fdfeb11482151",
"extension": "py"... | 2.75 | stackv2 | from keras.preprocessing.text import Tokenizer
from keras.preprocessing.sequence import pad_sequences
from keras.utils.np_utils import to_categorical
from keras.models import Sequential
from keras.layers import Dense, Flatten, LSTM, Conv1D, MaxPooling1D, Dropout, Activation, Bidirectional
from keras.layers.embeddings i... | 297 | 30.15 | 107 | 14 | 2,485 | python | [{"finding_id": "codeql_py/overly-large-range_53fa1dd512004571_6cb3e754", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=\\]."
] | [
34
] | [
null
] | [
36
] | [
39
] | |
2024-11-18T23:55:48.313038+00:00 | 1,632,009,836,000 | 62e80fb5a4a0ff29765469b40ee524c596560a8c | 3 | {
"blob_id": "62e80fb5a4a0ff29765469b40ee524c596560a8c",
"branch_name": "refs/heads/master",
"committer_date": 1632009836000,
"content_id": "641d8b3be76b4f0cc76d56bb4ff5da16c440cee5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "284b095d58b4ffd913beb911a20894a522d00223",
"extension": "py"... | 3.453125 | stackv2 | '''
sumber referensi: https://www.petanikode.com/python-file
ditulis pada: 14-02-2021
'''
#a = append, dengan append bisa menambahkan data ke dalam file tanpa perlu mengubah isi dari keseluruhan file
data_file = open('file.txt', 'a')
#membuat input user
data_id = input('masukkan id >>> ')
data_user = input('masukkan ... | 18 | 33.22 | 122 | 9 | 178 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ca6d228e242de542_0b3ac95a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
18
] | [
null
] | [
17
] | [
21
] | |
2024-11-18T22:43:34.389284+00:00 | 1,418,272,646,000 | 5d9ad219bb76de6b24a384d232f887c086e1377e | 2 | {
"blob_id": "5d9ad219bb76de6b24a384d232f887c086e1377e",
"branch_name": "refs/heads/master",
"committer_date": 1418272646000,
"content_id": "7e3f5944c8825825a2110a780d3565653a2ef40a",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "0489b12736da0baedddbb42e7d58ab630d73db3e",
"extension": "p... | 2.390625 | stackv2 | # Copyright 2014 Dietrich Epp.
# This file is part of SGLib. SGLib is licensed under the terms of the
# 2-clause BSD license. For more information, see LICENSE.txt.
import os
import io
NOTICE = 'This file automatically generated by the build system'
class GeneratedSource(object):
__slots__ = []
@property
... | 92 | 25.35 | 71 | 19 | 510 | python | [{"finding_id": "codeql_py/overly-permissive-file_f59ca935ce3ed86d_6ddcf849", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world writable.", "remediation": "", "location": {... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in open sets file to world writable."
] | [
77
] | [
80
] | [
24
] | [
27
] | |
2024-11-18T22:43:38.195454+00:00 | 1,565,514,402,000 | c8a71c9898a8a5e8cad2facdcf1234c5f856326a | 2 | {
"blob_id": "c8a71c9898a8a5e8cad2facdcf1234c5f856326a",
"branch_name": "refs/heads/master",
"committer_date": 1565514402000,
"content_id": "8130b15d334b024c8d1d379a90200c36ecf3d421",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a4fd055338b55890241b6b8282b2ea4fa408c9c5",
"extension": "py"... | 2.34375 | stackv2 | # Import from third-party
from flask import Flask, render_template, json, request, jsonify, session
def create_report():
ids = []
# print(request.form)
for form in request.form:
if 'form-name-' in form:
ids.append(int(form[len('form-name-'):]))
ids = sorted(ids)
print ids
st... | 71 | 39.87 | 116 | 23 | 615 | python | [{"finding_id": "codeql_py/path-injection_d56b39ad5c15313e_83ae017e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
69
] | [
null
] | [
15
] | [
19
] | |
2024-11-18T23:18:13.454112+00:00 | 1,582,022,670,000 | 59dbc5895c5a4c8db1b00ab223d540ace9ed9e12 | 2 | {
"blob_id": "59dbc5895c5a4c8db1b00ab223d540ace9ed9e12",
"branch_name": "refs/heads/master",
"committer_date": 1582022670000,
"content_id": "f05fa9e77df99e783e6c478a11bc9782e6a2be36",
"detected_licenses": [
"MIT"
],
"directory_id": "b2d63e3bb4ee9730e3979e782866f4c7a05f252b",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*
import requests
from bs4 import BeautifulSoup
import re
import os
import jieba
import numpy as np
import matplotlib.pyplot as plt
from wordcloud import WordCloud
from PIL import Image
s = requests.Session()
headers = {
'user-agent': 'Mozilla/5.0 (Windows NT 6.1; Win64... | 161 | 31.07 | 135 | 22 | 1,336 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_3560c4c912fb6df7_818bed5e", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'chinaetfs.net/', so it might match ... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'chinaetfs.net/', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'chinaetfs.net/', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'chinaetfs.net/', so it m... | [
44,
46,
66
] | [
null,
null,
null
] | [
27,
27,
35
] | [
60,
64,
68
] | |
2024-11-18T23:18:20.403879+00:00 | 1,426,386,053,000 | e9ce04404c67273459d8626692297828c8c3f086 | 2 | {
"blob_id": "e9ce04404c67273459d8626692297828c8c3f086",
"branch_name": "refs/heads/master",
"committer_date": 1426386053000,
"content_id": "5528267686f6894d23346f929bd38cd94d493bb1",
"detected_licenses": [
"MIT"
],
"directory_id": "170ad622a7de672bdcd1d3860599915bbd6109f0",
"extension": "py",
"fi... | 2.34375 | stackv2 | """
homeassistant.components.httpinterface
~~~~~~~~~~~~~~~~~~~~~~~~~~~
This module provides an API and a HTTP interface for debug purposes.
By default it will run on port 8123.
All API calls have to be accompanied by an 'api_password' parameter and will
return JSON. If successful calls will return status code 200 or... | 379 | 30.57 | 79 | 17 | 2,654 | python | [{"finding_id": "codeql_py/log-injection_d3520f220bff0348_77c0ce22", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).\nThis log entry depends on a [user-provided value](3).\nThis log entry depends on a [user-provided value](4).\nThis log entry depends on a [user-provided value](5).\nThis log entry depends on a [user-provid... | [
223
] | [
null
] | [
51
] | [
63
] | |
2024-11-19T00:07:16.969885+00:00 | 1,421,872,002,000 | 08a2bd59fa7d4033261b120aeea46a9a18746bc3 | 2 | {
"blob_id": "08a2bd59fa7d4033261b120aeea46a9a18746bc3",
"branch_name": "refs/heads/master",
"committer_date": 1421873436000,
"content_id": "88bcec51b38061509bb992cb819d994d71f72873",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cf1348d04a4d11389b2e7f8c48cd866cf6e2b940",
"extension": "py"... | 2.5 | stackv2 | import pathlib
import flask
app = flask.Flask(__name__)
@app.route('/')
def index():
return flask.redirect(flask.url_for('dir', path='api'))
@app.route('/<path:path>/')
def dir(path):
file_path = pathlib.Path(app.config['SITE_DIR']) / path / 'index.html'
if not file_path.exists():
flask.abor... | 23 | 19.35 | 74 | 13 | 114 | python | [{"finding_id": "codeql_py/path-injection_138681817198dc10_d49a3c30", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
18,
21
] | [
null,
null
] | [
12,
10
] | [
21,
19
] | |
2024-11-19T00:45:04.610874+00:00 | 1,564,236,695,000 | 39ec703262a9d347fcf63636501aa21550f2adeb | 2 | {
"blob_id": "39ec703262a9d347fcf63636501aa21550f2adeb",
"branch_name": "refs/heads/master",
"committer_date": 1564236695000,
"content_id": "ab5ce37561233cd0d5ffb2ff2935e9b1c0c004b8",
"detected_licenses": [
"MIT"
],
"directory_id": "0f7c7624666263e84e76508430ea433889ce7e89",
"extension": "py",
"fi... | 2.4375 | stackv2 | from uuid import uuid4
from flask import Flask, request, make_response, jsonify, session
from dotenv import load_dotenv
import os
import logging
import json
import collections
import requests
import os
from assets.endpoints import endpoint
from assets.Course import Course
# Read env variables from .env file
dotenv_pa... | 479 | 33.9 | 141 | 17 | 3,757 | python | [{"finding_id": "codeql_py/log-injection_3a597ef995d3838d_95f36ef4", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 7 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depen... | [
224,
269,
293,
321,
376,
401,
407
] | [
null,
null,
null,
null,
null,
null,
null
] | [
22,
18,
45,
18,
22,
18,
18
] | [
62,
82,
50,
76,
84,
72,
46
] | |
2024-11-18T23:28:27.797635+00:00 | 1,579,277,064,000 | 50fc67a15e28cd2f0cdee0be7623555abf817f76 | 2 | {
"blob_id": "50fc67a15e28cd2f0cdee0be7623555abf817f76",
"branch_name": "refs/heads/master",
"committer_date": 1579277064000,
"content_id": "f62947463ffde27d625f6e48a4800d7f056197ac",
"detected_licenses": [
"MIT"
],
"directory_id": "ff6f03897958735aea2a81f9f57fa1c7b74b777f",
"extension": "py",
"fi... | 2.4375 | stackv2 | import email.utils
import http.server
import os
import urllib
from collections import abc
from http.server import HTTPStatus
import sys
import logging as lg
lg.basicConfig(level=lg.INFO, format='%(levelname)-8s: %(message)s')
__version__ = '0.1.0'
class Cors_container(abc.Container) :
def __init__(self, cors) :
... | 132 | 30.36 | 84 | 17 | 968 | python | [{"finding_id": "codeql_py/log-injection_fd9b89833d80901f_41b57f46", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 4 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
43,
44,
50,
58
] | [
null,
null,
null,
null
] | [
14,
14,
28,
47
] | [
26,
39,
34,
58
] | |
2024-11-19T00:06:19.003772+00:00 | 1,627,399,007,000 | d4755f50d5b1d4f0b05ba3bf237dd4831921541a | 3 | {
"blob_id": "d4755f50d5b1d4f0b05ba3bf237dd4831921541a",
"branch_name": "refs/heads/master",
"committer_date": 1627399007000,
"content_id": "48b3a26a71103ccf038fb605e28a999098a38610",
"detected_licenses": [
"MIT"
],
"directory_id": "b769ddda1e4d4a1a55c65587e28f852b85e9de84",
"extension": "py",
"fi... | 2.53125 | stackv2 | def setup():
print(10*'=' + ' Notas SIGAA setup ' + 10*'=')
username = str(input('SIGAA username: '))
password = str(input('SIGAA password: '))
webdriver_path = str(input('Webdriver path (always use / and, if in the same dir, use ./): '))
csv_output = str(input('CSV output path (always use / and, i... | 25 | 37.08 | 105 | 11 | 248 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1494986526b2c4b1_cb2377fd", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
14
] | [
21
] | [
20
] | [
4
] | |
2024-11-19T00:06:20.153048+00:00 | 1,460,200,038,000 | 6f56f3f75afc1b520fb9fda0996391aee9599136 | 2 | {
"blob_id": "6f56f3f75afc1b520fb9fda0996391aee9599136",
"branch_name": "refs/heads/master",
"committer_date": 1460200284000,
"content_id": "fa43a3f0b1124e7dcac8eba6a98b8286035a1344",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3b42b4eaeb77f0cf18e8ef0c369b0c9dca835163",
"extension": "py"... | 2.34375 | stackv2 | try:
from sshtunnel import SSHTunnelForwarder
except ImportError:
from sshtunnel.sshtunnel import SSHTunnelForwarder
from cm_api.api_client import ApiResource, ApiException
from cm_api.endpoints.services import ApiService, ApiServiceSetupInfo
import paramiko
import json
import yaml
import requests
import subpro... | 289 | 53.32 | 175 | 20 | 3,617 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_7edb3c15bcec91c1_63d77991", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
68
] | [
null
] | [
13
] | [
86
] | |
2024-11-19T01:11:32.639594+00:00 | 1,636,050,565,000 | 86322f7ed8fcfc3617ae39f5425a35d75d2b43a0 | 2 | {
"blob_id": "86322f7ed8fcfc3617ae39f5425a35d75d2b43a0",
"branch_name": "refs/heads/main",
"committer_date": 1636050565000,
"content_id": "2df13e8c3dce970b76301ac02de5312c24d34b72",
"detected_licenses": [
"MIT"
],
"directory_id": "287add3abe5c6cc75dccbccd06e8b2a875e87481",
"extension": "py",
"file... | 2.421875 | stackv2 | import time
from pprint import pprint
import socket
import re
import paramiko
from textfsm import clitable
import yaml
class ConnectSSH:
def __init__(
self,
host,
username,
password,
enable_pass,
max_read=60000,
read_pause=0.5,
fail_on="",
t... | 159 | 30.54 | 88 | 17 | 1,113 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_c2c972e52bd6d509_16012d72", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
30
] | [
null
] | [
9
] | [
69
] | |
2024-11-18T23:48:05.907024+00:00 | 1,452,676,763,000 | f1aa7f73118382deabc346bb272382b5724a0e6d | 2 | {
"blob_id": "f1aa7f73118382deabc346bb272382b5724a0e6d",
"branch_name": "refs/heads/master",
"committer_date": 1452676763000,
"content_id": "ebb273ee6675c41bb3dadae495d3180ed7ebe73d",
"detected_licenses": [
"MIT"
],
"directory_id": "62c703c9ce78d4928b246c098fe282130fbf6c9d",
"extension": "py",
"fi... | 2.5 | stackv2 | import os
import json
from application import whitelist
SCANNED_DATA_FILENAME = 'scanned_numbers.txt'
SCANNER_ID = '9d3c2169-3be5-4ae6-9be9-2bc2cbd49ccb'
def read_list():
if os.path.exists(SCANNED_DATA_FILENAME):
with open(SCANNED_DATA_FILENAME, 'rt') as read_handle:
read_buffer = read_handle.... | 79 | 23.65 | 120 | 17 | 482 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5d23c474e9d33b66_c725f6ad", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
32
] | [
null
] | [
28
] | [
38
] | |
2024-11-18T23:48:07.425097+00:00 | 1,609,410,808,000 | 3c6789e46d81148efff47b9a407bc38b432ef2e6 | 3 | {
"blob_id": "3c6789e46d81148efff47b9a407bc38b432ef2e6",
"branch_name": "refs/heads/master",
"committer_date": 1609410808000,
"content_id": "26ade937f9db3d49506c14b50a44a7fe2b1bcbcb",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "357319d8adf4320246bd3c6c2e45fbb532921f9c",
"extension": "py"... | 2.640625 | stackv2 | # -*- coding: utf-8 -*-
# Cli.py
import re
import paramiko
import time
from scp import SCPClient
class SCPCli(object):
# class调用方法
def __init__(self, host, port, username, password, timeout = 600):
self.host = host
self.port = int(port)
self.username = username
self.password ... | 91 | 23.73 | 70 | 13 | 549 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e49da72c55ae17f9_05a8a155", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
32
] | [
null
] | [
9
] | [
71
] | |
2024-11-18T23:48:08.522641+00:00 | 1,651,862,888,000 | cc4c3833b15f032725fb639579d273f1f7263e52 | 2 | {
"blob_id": "cc4c3833b15f032725fb639579d273f1f7263e52",
"branch_name": "refs/heads/master",
"committer_date": 1651862972000,
"content_id": "f5fb04a0b5ccd60ad4631899f157f75bdfd81f84",
"detected_licenses": [
"MIT"
],
"directory_id": "d74eaabe4635ae1b99ba0c0d21b19e8eeade360a",
"extension": "py",
"fi... | 2.359375 | stackv2 | import re
import math
import random
import string
import urllib.request, urllib.error, urllib.parse
from datetime import datetime, timedelta
import supybot.log as log
import supybot.conf as conf
import supybot.world as world
import supybot.ircutils as ircutils
import supybot.registry as registry
from . import globals... | 269 | 28.78 | 117 | 16 | 2,163 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_f36ab1aaf4ea6a65_79b1fa41", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'github.com', so it might match more... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'github.com', so it might match more hosts than expected."
] | [
141
] | [
null
] | [
34
] | [
70
] | |
2024-11-18T23:48:09.344208+00:00 | 1,604,005,824,000 | dd8c2e908fedd9e4be4da9f3436beb87ec4c5eec | 3 | {
"blob_id": "dd8c2e908fedd9e4be4da9f3436beb87ec4c5eec",
"branch_name": "refs/heads/master",
"committer_date": 1604005824000,
"content_id": "a47e995524fd8b8ad328d0a4ea75900cf8ee80da",
"detected_licenses": [
"MIT"
],
"directory_id": "7804aacdc97e2d89134e9018bf9ed58303a5723f",
"extension": "py",
"fi... | 2.96875 | stackv2 | from http.server import BaseHTTPRequestHandler, HTTPServer
import socket
from urllib.parse import urlparse
class NumberServer(BaseHTTPRequestHandler):
def _set_headers(self):
self.send_response(200)
self.send_header('Content-type', 'text/plain')
self.end_headers()
def do_GET(self):
... | 61 | 29.52 | 91 | 16 | 430 | python | [{"finding_id": "codeql_py/path-injection_8d1600fe9493b319_23205011", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1)."
] | [
25,
39
] | [
null,
null
] | [
22,
26
] | [
27,
31
] | |
2024-11-19T00:44:20.831149+00:00 | 1,639,315,196,000 | cc081ec71db390613542e7cf68006a09ac14a7dd | 3 | {
"blob_id": "cc081ec71db390613542e7cf68006a09ac14a7dd",
"branch_name": "refs/heads/master",
"committer_date": 1639315196000,
"content_id": "849297abf37f9e40831b00a0eb947f192a89b031",
"detected_licenses": [
"Unlicense"
],
"directory_id": "3beec068158598234412d94ae89c652705cc08b8",
"extension": "py",... | 3.203125 | stackv2 | #!/usr/bin/env python3
input = open("day04.txt", "r").read().split("\n")[:-1]
valid_passwords = 0
valid_passwords2 = 0
for line in input:
words = line.split()
if len(set(words)) == len(words):
valid_passwords += 1
for line in input:
words = ["".join(sorted(w)) for w in line.split()]
if len(se... | 18 | 22.5 | 54 | 12 | 122 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_caa24325a1ce8daf_b86e2734", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
17,
18
] | [
null,
null
] | [
7,
7
] | [
22,
23
] | |
2024-11-18T23:19:49.746426+00:00 | 1,603,962,142,000 | e3ef16a1b722768c5be6e87ec00518a784dee61a | 3 | {
"blob_id": "e3ef16a1b722768c5be6e87ec00518a784dee61a",
"branch_name": "refs/heads/main",
"committer_date": 1603962142000,
"content_id": "a2ff4a7fd2026f92f52c9d42774e15f927f4bc12",
"detected_licenses": [
"MIT"
],
"directory_id": "1c36db390f9d66a0dd93e47a0f417d233229da37",
"extension": "py",
"file... | 3.109375 | stackv2 | from flask import Flask
app = Flask(__name__)
# @app.route('/') 使用app.route装饰器注册视图函数
def hello_world():
return '<h1>Hello MMY!</h1>'
app.add_url_rule('/', 'hello_world', hello_world) # 使用app.add_url_rule()方法 3个参数:URL、端点名和视图函数
# 动态路由
@app.route('/user/<name>')
def user(name):
return '<h1>Hello,{}!</h1>'... | 22 | 16.18 | 93 | 9 | 124 | python | [{"finding_id": "codeql_py/reflective-xss_08d9969128d0edd1_932d8673", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
17
] | [
null
] | [
12
] | [
45
] | |
2024-11-18T23:11:13.892492+00:00 | 1,445,413,049,000 | 89a311c5e5a722a132df8c3f1df21b69542eed5b | 3 | {
"blob_id": "89a311c5e5a722a132df8c3f1df21b69542eed5b",
"branch_name": "refs/heads/master",
"committer_date": 1445413049000,
"content_id": "ba6d6a33499c1ed5ce89cfddcb0f000f36c6c181",
"detected_licenses": [
"MIT"
],
"directory_id": "4d1e93a236890614670559d703e6a412341c851f",
"extension": "py",
"fi... | 2.75 | stackv2 | from . import connection
import hashlib, random, string
def password_hash(password, salt):
return hashlib.sha256((password + salt).encode('utf-8')).hexdigest()
def current_user(handler):
uid = handler.get_secure_cookie('uid')
if uid is None:
return None
else:
return User.from_uid(int(uid.decode()))
... | 77 | 28.52 | 110 | 16 | 532 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_27a5271bb6669726_f9ee8ff1", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
6
] | [
null
] | [
25
] | [
58
] | |
2024-11-19T01:21:45.298515+00:00 | 1,690,556,429,000 | d1ffa7fc6de3e3f4b6c7a22177154ea399923b96 | 3 | {
"blob_id": "d1ffa7fc6de3e3f4b6c7a22177154ea399923b96",
"branch_name": "refs/heads/master",
"committer_date": 1690556429000,
"content_id": "c54542bcdc560f1d9cbd47a280827e551d930171",
"detected_licenses": [
"MIT"
],
"directory_id": "7d9d651cc5ecbd520b73779631a5d7c8eae40aca",
"extension": "py",
"fi... | 2.78125 | stackv2 | import jinja2
class Saturation(object):
def __init__(self,
name,
input_word_length=22,
input_frac_length=10,
output_word_length=16):
context = {'name': name,
'iw': input_word_length,
'ow': output_wo... | 39 | 36.59 | 110 | 16 | 344 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9a4ace2ab1ea6a1e_5dafa6de", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
23
] | [
null
] | [
15
] | [
48
] | |
2024-11-19T00:11:35.962906+00:00 | 1,374,482,273,000 | 69c3a16d9d81be44b8dc19dfdaa2bf4106dcf54d | 2 | {
"blob_id": "69c3a16d9d81be44b8dc19dfdaa2bf4106dcf54d",
"branch_name": "refs/heads/master",
"committer_date": 1374482273000,
"content_id": "78a4a6623f2603616a03276541cc712efdbee9a8",
"detected_licenses": [
"MIT"
],
"directory_id": "82b34241cd1e2d7c6f9ef7660ed7351f615f8d18",
"extension": "py",
"fi... | 2.359375 | stackv2 | from flask import Blueprint, render_template, redirect, g, url_for, request
from flask.ext.login import login_user, logout_user
from aurora_app import login_manager
from aurora_app.models import User, Deployment
from aurora_app.decorators import public
from aurora_app.forms import LoginForm
mod = Blueprint('main', __... | 44 | 28.75 | 78 | 17 | 281 | python | [{"finding_id": "codeql_py/url-redirection_008eb4b36781951f_201a05bb", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
35
] | [
null
] | [
30
] | [
34
] | |
2024-11-19T00:36:48.933889+00:00 | 1,432,724,567,000 | 34b57092ab8a5231c4dccd973a73ae583cfab612 | 2 | {
"blob_id": "34b57092ab8a5231c4dccd973a73ae583cfab612",
"branch_name": "refs/heads/master",
"committer_date": 1432724567000,
"content_id": "e5079e4f3b536af49943cdf191d4074a465d4408",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3e73e9d9b22efe3d2e99aea44d1e6fb1c91064c1",
"extension": "py"... | 2.40625 | stackv2 | # -*- coding: utf-8 -*-
import tornado.httpserver
import tornado.ioloop
import tornado.options
import tornado.web
import json
from bson import json_util
from bson.objectid import ObjectId
import pymongo
from tornado.options import define, options
define('port', default=8000, help='run on the given port', type=int)... | 77 | 25.73 | 73 | 16 | 480 | python | [{"finding_id": "codeql_py/reflective-xss_e94bd8c22e2ed13c_7089545a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
49
] | [
null
] | [
20
] | [
62
] | |
2024-11-19T00:36:50.450384+00:00 | 1,634,357,771,000 | 3ba5a71f99870ffec8228cfc040b5864f138564d | 3 | {
"blob_id": "3ba5a71f99870ffec8228cfc040b5864f138564d",
"branch_name": "refs/heads/main",
"committer_date": 1634357771000,
"content_id": "d7546223a042fa9111a561655ac89db027df7084",
"detected_licenses": [
"MIT"
],
"directory_id": "43093ea92879ed3d192ee846f9fb5b0ac9b358a7",
"extension": "py",
"file... | 3.203125 | stackv2 | #!/usr/bin/env python3
'''
Scrapes for phone and emails and places in
spreadsheet.
Python 3 required
'''
import re
from urllib.request import urlopen, Request
import os
from datetime import datetime
from openpyxl import Workbook
from ... | 102 | 30.91 | 129 | 17 | 846 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_11ac7abd296f3a13_85e4f7bb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
52
] | [
null
] | [
19
] | [
62
] | |
2024-11-19T00:36:54.322289+00:00 | 1,597,942,083,000 | f0e90bbfcf370724760b6957cc11cff5419b2e32 | 3 | {
"blob_id": "f0e90bbfcf370724760b6957cc11cff5419b2e32",
"branch_name": "refs/heads/master",
"committer_date": 1597942083000,
"content_id": "80f50e1a641901c2f073c7f396efbf5411b601b2",
"detected_licenses": [
"MIT"
],
"directory_id": "9759d275a6087a15aebed8deec52c18cfcde9d93",
"extension": "py",
"fi... | 2.5625 | stackv2 | from django.shortcuts import render
from django.http import HttpResponse,JsonResponse
from django.views import View
from book.models import BookInfo,PeopleInfo
from django.http import HttpResponse
from django.shortcuts import redirect
# Create your views here.
import json
def set_cookies(request):
response = H... | 176 | 18.02 | 89 | 11 | 848 | python | [{"finding_id": "codeql_py/reflective-xss_316f369de37c9a26_46aa2ad0", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
127
] | [
null
] | [
29
] | [
47
] | |
2024-11-19T01:02:11.140966+00:00 | 1,450,738,667,000 | cae70cabd035fc89bc7362b8254ce9944370e674 | 3 | {
"blob_id": "cae70cabd035fc89bc7362b8254ce9944370e674",
"branch_name": "refs/heads/master",
"committer_date": 1450738667000,
"content_id": "4e6e530fc9b8b2f4ac7b8575c3a4508161dcf959",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "97b7669912e19019d5cddec83001af065e9389d4",
"extension": "p... | 2.90625 | stackv2 | # -*- coding: utf-8 -*-
"""Dump a production database backup and current commit to **luna**."""
# python
from datetime import datetime
# third party
import environ
import paramiko
from scp import SCPClient
from time import sleep
def backuptoluna():
"""
Dump a production database backup and current commit t... | 69 | 31.86 | 79 | 12 | 565 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_be4ce2580d725c6b_54c4a769", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
48
] | [
null
] | [
5
] | [
62
] | |
2024-11-19T00:13:41.525701+00:00 | 1,599,762,393,000 | efbef5424a910fff06c65ab7628484de5b8a049b | 3 | {
"blob_id": "efbef5424a910fff06c65ab7628484de5b8a049b",
"branch_name": "refs/heads/master",
"committer_date": 1599762393000,
"content_id": "25536eeba737050ed944c38c90412350d2420b6f",
"detected_licenses": [
"MIT"
],
"directory_id": "ec8be97834198ae6c5cd43863727fba444b59b48",
"extension": "py",
"fi... | 3.234375 | stackv2 | # --------------
#Header files
import pandas as pd
import numpy as np
import matplotlib.pyplot as plt
data=pd.read_csv(path)
data['Gender'].replace('-','Agender',inplace=True)
print(data['Gender'])
#path of the data file- path
gender_count=data['Gender'].value_counts()
data['Gender'].value_counts().plot(kind="bar")
#... | 70 | 19.44 | 69 | 9 | 388 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_daf22020211e4232_81a9afbe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
9
] | [
null
] | [
7
] | [
21
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.