added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T21:51:40.430215+00:00 | 1,620,250,571,000 | 1c74c30f492c4c938a550bdf67f670f281a191c4 | 2 | {
"blob_id": "1c74c30f492c4c938a550bdf67f670f281a191c4",
"branch_name": "refs/heads/master",
"committer_date": 1620250571000,
"content_id": "ad5902fa6bd0208d1dc21a06f9560fad535499a0",
"detected_licenses": [
"MIT"
],
"directory_id": "22c328557c6c86a88d7b1e1154fc84ddb6384ddf",
"extension": "py",
"fi... | 2.34375 | stackv2 | # Importing Flask and dependencies
from flask import Blueprint, jsonify, request, make_response
from flask_restx import Resource, abort
from app.api import api
import os
# Import model and db
from app import db
from app.api.developer.model import Developer, DeveloperSchema, DeveloperRestSchema, DeveloperReturnSchema
... | 95 | 27.93 | 120 | 17 | 687 | python | [{"finding_id": "codeql_py/code-injection_0e897aad27a650f1_ac7ec8b5", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-094"
] | [
"py/code-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1)."
] | [
49
] | [
null
] | [
9
] | [
20
] | |
2024-11-18T21:51:56.062582+00:00 | 1,491,548,103,000 | 0ddeb4f9d30496111272e3c1ec60f73a01e80266 | 3 | {
"blob_id": "0ddeb4f9d30496111272e3c1ec60f73a01e80266",
"branch_name": "refs/heads/master",
"committer_date": 1491548103000,
"content_id": "0e32b9f20d4301e023daad4ddbb2809b1f9b8930",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b9251fc0c66d62482f04d4e9d90cdba67cabd1f8",
"extension": "py"... | 2.8125 | stackv2 | # coding: utf8
"""
工具集
"""
import json
import pycurl
from StringIO import StringIO
from prettytable import PrettyTable
def get_html(url, user_agent, refer_url):
"""
curl html
:param url:
:param user_agent:
:param refer_url:
:return:
"""
curl = pycurl.Curl()
curl.setopt(pycurl.US... | 84 | 19.04 | 53 | 13 | 441 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f8a641aed9d501c3_2704817c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
27
] | [
null
] | [
5
] | [
42
] | |
2024-11-18T21:51:59.258518+00:00 | 1,656,074,572,000 | 18ec26ac01f72e017fb6c58c19fe70bac9e255c0 | 3 | {
"blob_id": "18ec26ac01f72e017fb6c58c19fe70bac9e255c0",
"branch_name": "refs/heads/master",
"committer_date": 1656074572000,
"content_id": "5394556c3f440f43bccb43072c84e2a573cf3e82",
"detected_licenses": [
"MIT"
],
"directory_id": "6737ba9fb2bdb1c278d6c5d316c4b1ef244fc0db",
"extension": "py",
"fi... | 2.640625 | stackv2 | #/usr/bin/env python
# -*- coding: utf-8 -*-
import rsa
import sys
import base64
# 打印 python 版本 与 windows 系统编码
print("---- 1 ----")
print(sys.version)
print(sys.getdefaultencoding())
print(sys.getfilesystemencoding())
# 先生成一对密钥,然后保存.pem格式文件,当然也可以直接使用
print("---- 2 ----")
(pubkey, privkey) = rsa.newkeys(1024)
pub = pu... | 91 | 23.71 | 69 | 11 | 732 | python | [{"finding_id": "codeql_py/weak-crypto-key_5793926f60cc7e53_020b7160", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
15
] | [
null
] | [
21
] | [
38
] | |
2024-11-18T21:52:07.736723+00:00 | 1,429,238,814,000 | 35dee58e8234c1255b9b6ce812a25fbd75b955d6 | 2 | {
"blob_id": "35dee58e8234c1255b9b6ce812a25fbd75b955d6",
"branch_name": "refs/heads/master",
"committer_date": 1429238814000,
"content_id": "c9bf34723fd07d2dfa381ae03b48463857c75c63",
"detected_licenses": [
"MIT"
],
"directory_id": "4b0cc83d0d7f3c48e2acafc046432a6778c42f35",
"extension": "py",
"fi... | 2.5 | stackv2 | # -*- coding: utf-8 -*-
import jinja2
import markdown2
import os
import shutil
import subprocess
import yaml
import json
def render_site_ouput(source_dir, output_base, templates_dir, site_data):
for root, dirs, files in os.walk(source_dir):
for f in files:
folder_id = root[len(source_dir):]
... | 189 | 37.58 | 79 | 17 | 1,700 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_1a6ef62b4984acca_f94d7d28", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
80,
98,
112
] | [
null,
null,
null
] | [
21,
21,
17
] | [
60,
60,
53
] | |
2024-11-18T22:27:41.043535+00:00 | 1,631,899,880,000 | fdae0965820214f5b2eba2e476a6779545a7a53e | 2 | {
"blob_id": "fdae0965820214f5b2eba2e476a6779545a7a53e",
"branch_name": "refs/heads/master",
"committer_date": 1631899880000,
"content_id": "33345426b074c46575c056a5dc575ea6ea94e15b",
"detected_licenses": [
"MIT"
],
"directory_id": "ca0897decab13aa13da09155e119b806864a8fe7",
"extension": "py",
"fi... | 2.5 | stackv2 | import json
import os
import time
import uuid
from operator import and_
import requests
from flask import Flask, render_template, abort
from flask_basicauth import BasicAuth
from flask_cors import CORS
from flask_migrate import Migrate
from flask_sqlalchemy import SQLAlchemy
from sqlalchemy import desc, asc
from sqlal... | 336 | 33.99 | 160 | 17 | 2,792 | python | [{"finding_id": "codeql_py/reflective-xss_54a57ff54cf1e568_e803f845", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2)."
] | [
172,
202
] | [
null,
null
] | [
12,
12
] | [
16,
16
] | |
2024-11-18T22:27:41.403506+00:00 | 1,673,386,071,000 | 8dfd7057df47bd94107586d41db9af7b042b3cde | 2 | {
"blob_id": "8dfd7057df47bd94107586d41db9af7b042b3cde",
"branch_name": "refs/heads/main",
"committer_date": 1673386071000,
"content_id": "c0b181c374a680f21a39136dd7be1297035f05d4",
"detected_licenses": [
"MIT"
],
"directory_id": "fd4b3a767ea86a3c6b8ff63857009e2f0cddc5de",
"extension": "py",
"file... | 2.328125 | stackv2 | """
Reolink Camera subscription
"""
from datetime import datetime, timedelta
import base64
import hashlib
import logging
import re
import uuid
import aiohttp
import asyncio
from . import templates
TERMINATION_TIME = 15
DEFAULT_TIMEOUT = 30
_LOGGER = logging.getLogger(__name__)
class Manager:
"""Initialize the ... | 238 | 33.68 | 134 | 19 | 1,718 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_ffbd3a1654dd8ee3_7a1cb838", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
68
] | [
null
] | [
21
] | [
87
] | |
2024-11-18T22:43:56.145676+00:00 | 1,419,464,600,000 | 2c3853e56bbe25abb83137e201d413320182665e | 3 | {
"blob_id": "2c3853e56bbe25abb83137e201d413320182665e",
"branch_name": "refs/heads/master",
"committer_date": 1419464600000,
"content_id": "6924ce0a2cb14565eadf3995375fd7f0e8dffd1f",
"detected_licenses": [
"MIT"
],
"directory_id": "dd08eab78ff8e3da508e199b27d4bca4dcf82ecf",
"extension": "py",
"fi... | 2.59375 | stackv2 | #! /usr/bin/python
# -*- coding: utf-8 -*-
import os
import argparse
from copy import deepcopy
import bibtexparser
from bibtexparser.bparser import BibTexParser
from jinja2 import Environment, FileSystemLoader
from auxfun import *
PATH = os.getcwdu()
# Create command line arguments parser
parser = argparse.Argumen... | 111 | 33.6 | 93 | 17 | 824 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_311f4ab3815bb29c_40527cc2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
74,
100
] | [
null,
null
] | [
14,
21
] | [
62,
89
] | |
2024-11-18T22:44:44.962805+00:00 | 1,574,366,579,000 | 6470fd5a58df41a5053800054b2ff37ce5e6e788 | 4 | {
"blob_id": "6470fd5a58df41a5053800054b2ff37ce5e6e788",
"branch_name": "refs/heads/master",
"committer_date": 1574366579000,
"content_id": "ac036b60c937f2ef3cba5654e237259670581a94",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ba8b7f6bcffeaed6807ff254699e8ae7013f0c56",
"extension": "py"... | 3.640625 | stackv2 | def play_game():
from IPython.display import clear_output
clear_output()
day_list = ['первое', 'второе', 'третье', 'четвёртое',
'пятое', 'шестое', 'седьмое', 'восьмое',
'девятое', 'десятое', 'одиннадцатое', 'двенадцатое',
'тринадцатое', 'четырнадцатое', 'пятна... | 40 | 52.52 | 171 | 21 | 844 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f5bf0233705b6b05_7907b9dd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
32
] | [
null
] | [
23
] | [
142
] | |
2024-11-18T22:44:52.435445+00:00 | 1,648,531,533,000 | b73674be647eb8e1b0874e895cb1d48a0adba8c3 | 2 | {
"blob_id": "b73674be647eb8e1b0874e895cb1d48a0adba8c3",
"branch_name": "refs/heads/master",
"committer_date": 1648531533000,
"content_id": "19bd65132a70702583b4f9d48ab1f27dc5c54362",
"detected_licenses": [
"MIT"
],
"directory_id": "8ac6ad77f3939ebf364dc369e905971a705d9b0c",
"extension": "py",
"fi... | 2.328125 | stackv2 | """
Script goal,
Build evaluation maps of GEE data
"""
#==============================================================================
__title__ = "data fetcher"
__author__ = "Arden Burrell"
__version__ = "v1.0(11.09.2019)"
__email__ = "arden.burrell@gmail.com"
#====================================================... | 393 | 28.43 | 150 | 19 | 3,375 | python | [{"finding_id": "codeql_py/tarslip_d71e47586336dee3_c2c6628d", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/tarslip",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
347,
356
] | [
null,
null
] | [
4,
3
] | [
6,
5
] | |
2024-11-18T21:00:01.838861+00:00 | 1,470,931,079,000 | 32f473fd111ad5534c1297b4d64bab2bd079c00e | 3 | {
"blob_id": "32f473fd111ad5534c1297b4d64bab2bd079c00e",
"branch_name": "refs/heads/master",
"committer_date": 1470931079000,
"content_id": "6aaefdd7698cb6da708fec9568fd7af2f43eea08",
"detected_licenses": [
"MIT"
],
"directory_id": "87496867d96cd4f830d3f3ec3213b71403ab3e48",
"extension": "py",
"fi... | 2.75 | stackv2 | # coding=utf-8
# habraproxy.py — это простейший http-прокси-сервер, запускаемый локально (порт на ваше
# усмотрение), который показывает содержимое страниц Хабра. С одним исключением: после
# каждого слова из шести букв должен стоять значок «™». Примерно так:
#
# http://habrahabr.ru/company/yandex/blog/258673/
# ... | 137 | 34.21 | 114 | 16 | 1,236 | python | [{"finding_id": "codeql_py/partial-ssrf_e823b8a4cfad3a33_b9a53db7", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)."
] | [
49
] | [
null
] | [
31
] | [
71
] | |
2024-11-18T21:00:02.861871+00:00 | 1,596,189,140,000 | 162fc19fefef77e5fda6bc55e7618418b16735a8 | 3 | {
"blob_id": "162fc19fefef77e5fda6bc55e7618418b16735a8",
"branch_name": "refs/heads/master",
"committer_date": 1596189140000,
"content_id": "e74148b2c1d5b8fddbbad645f9cf141a756d461c",
"detected_licenses": [
"MIT"
],
"directory_id": "6ca9a7ed179ed96857c86dd91d5f81ad07be4690",
"extension": "py",
"fi... | 2.546875 | stackv2 | import hashlib
import string
import requests
import re
import time
import os
# 按base64规则解码
def decode_b64str(base64_str):
base64_charset = string.ascii_uppercase + string.ascii_lowercase + string.digits + '+/'
# 对每一个base64字符取下标索引,并转换为6为二进制字符串
base64_bytes = ['{:0>6}'.format(str(bin(base64_charset.index(s... | 160 | 23.62 | 111 | 17 | 1,296 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_0c17a4f4fa547081_d0dc34cf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
40
] | [
null
] | [
24
] | [
46
] | |
2024-11-18T21:00:05.820810+00:00 | 1,588,661,101,000 | 82b0a44371bcb13b13666c7cd6bd07852821971f | 2 | {
"blob_id": "82b0a44371bcb13b13666c7cd6bd07852821971f",
"branch_name": "refs/heads/master",
"committer_date": 1588661101000,
"content_id": "f251331b8b5d5a4efd4b1c22d4ed63ad9ff48bce",
"detected_licenses": [
"MIT"
],
"directory_id": "d30280099e212d1dc640743ffc5dd9f9c8144f28",
"extension": "py",
"fi... | 2.359375 | stackv2 | #! /usr/bin/env python3.6
"""
server.py
Stripe Sample.
Python 3.6 or newer required.
"""
import stripe
from twilio.rest import Client
import json
import os
from flask import Flask, render_template, jsonify, request, send_from_directory
from dotenv import load_dotenv, find_dotenv
# Setup Stripe python client library... | 193 | 31.95 | 119 | 18 | 1,314 | python | [{"finding_id": "codeql_py/stack-trace-exposure_16fb5e92d613db8a_95910462", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 4 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
84,
110,
156,
174
] | [
null,
null,
null,
null
] | [
30,
30,
30,
20
] | [
49,
49,
49,
21
] | |
2024-11-18T21:00:51.402582+00:00 | 1,669,749,418,000 | 05abd8e2807d9fbd325c5c6938417988dde7427f | 4 | {
"blob_id": "05abd8e2807d9fbd325c5c6938417988dde7427f",
"branch_name": "refs/heads/master",
"committer_date": 1669749418000,
"content_id": "434ad4518fb67ebb79b87c5f0f337e7562d0bea2",
"detected_licenses": [],
"directory_id": "2296bb6d628d08f59516de14487b8f87fec09bfb",
"extension": "py",
"filename": "01_... | 4.15625 | stackv2 | # Instructions:
# https://docs.google.com/document/d/1Fj1Na3iOYbpw-XejVtvjinl6fensn1gcIrIUsOHAbBc/edit?usp=sharing
import random
secret_number = random.randint(1, 100)
user_guess = None
number_of_guesses = 0
def display_secret_number(secret_number):
print('-' * 20)
print('The secret number is (just for debuggi... | 23 | 43.57 | 106 | 9 | 286 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_58b8ee009e87a84a_a613d887", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
10
] | [
null
] | [
66
] | [
79
] | |
2024-11-18T21:01:04.285501+00:00 | 1,689,553,250,000 | 40640e9808a5439317edac7c1eeaf83d6826fe8a | 2 | {
"blob_id": "40640e9808a5439317edac7c1eeaf83d6826fe8a",
"branch_name": "refs/heads/master",
"committer_date": 1689553250000,
"content_id": "48c868908c0b6a1776df418139dd12b46fdd63d9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "74dbaccf7da7038876aa3f0c48f7a6b909b9fba6",
"extension": "py"... | 2.375 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Mar 15, 2012
@author: moloch
Copyright 2012 Root the Box
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licen... | 377 | 34.26 | 88 | 18 | 2,854 | python | [{"finding_id": "codeql_py/log-injection_30f6be135260bd74_4877c47d", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 5 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
96,
100,
121,
196,
215
] | [
null,
null,
null,
null,
null
] | [
27,
27,
23,
23,
13
] | [
88,
77,
81,
81,
79
] | |
2024-11-18T21:25:27.737113+00:00 | 1,475,177,103,000 | 70dc3e16537028fe34a9c5ee8b0b89b7eb9b609b | 4 | {
"blob_id": "70dc3e16537028fe34a9c5ee8b0b89b7eb9b609b",
"branch_name": "refs/heads/master",
"committer_date": 1475177103000,
"content_id": "894afe0fe2ab89de80540860ab5ec716080935b8",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "3092e6b025a65a3eff3c81881115d21ea304b3d4",
"extension": "p... | 3.671875 | stackv2 | #! /usr/bin/env python3
"""
Minceware generates truly random Diceware style passphrases on a computer.
Exported functions:
get_length_from_entropy -- calculate passphrase length based on entropy and word list length
generate_passphrase -- generates passphrase from a given word list
For standalone usage and command l... | 128 | 31.37 | 92 | 18 | 880 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5b95615ef700a017_675198aa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
128
] | [
null
] | [
11
] | [
49
] | |
2024-11-18T22:01:02.859797+00:00 | 1,554,022,303,000 | a77a6ee52af360b1f9d8ed8098b2cbf7ab50fa0b | 3 | {
"blob_id": "a77a6ee52af360b1f9d8ed8098b2cbf7ab50fa0b",
"branch_name": "refs/heads/master",
"committer_date": 1554022303000,
"content_id": "e0b055acdf85bb2b08ce51cea8f7d6e565da4968",
"detected_licenses": [
"MIT"
],
"directory_id": "54d552bd969b17f044ab4182cde8e4e5e4ee0796",
"extension": "py",
"fi... | 2.71875 | stackv2 | #!/usr/bin/python3
# -*- python -*-
# -*- coding: UTF-8 -*-
# seed_phrase_to_kin_keys
# Copyright (C) 2017 chancity
#
# Permission is hereby granted, free of charge, to any person
# obtaining a copy of this software and associated documentation files
# (the "Software"), to deal in the Software without restriction,
# i... | 214 | 37.41 | 80 | 19 | 1,885 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6c7b5010f70215c8_d98182d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
120
] | [
null
] | [
11
] | [
52
] | |
2024-11-18T22:01:13.298086+00:00 | 1,622,717,210,000 | dbcc45c6afd2b070244e08b8548b4d479f433db6 | 3 | {
"blob_id": "dbcc45c6afd2b070244e08b8548b4d479f433db6",
"branch_name": "refs/heads/main",
"committer_date": 1622717210000,
"content_id": "47e6bba13d05444956efd89304c7b585954dadb5",
"detected_licenses": [
"MIT"
],
"directory_id": "38c1a0fb2a6bfc24ad018f3f687e050e95227ad3",
"extension": "py",
"file... | 2.71875 | stackv2 | from fastapi import APIRouter
from fastapi.responses import JSONResponse
import requests
import json
router = APIRouter(prefix="/nasa")
@router.get("/planetary-news")
# date format: YYYY - MM - DD; api_key can be specified or not (-> then goes with the default one)
async def get_planetary_news(date: str, api_key: st... | 117 | 28.68 | 98 | 16 | 766 | python | [{"finding_id": "codeql_py/stack-trace-exposure_08c4774d6b50b596_2c310497", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
25
] | [
null
] | [
58
] | [
66
] | |
2024-11-18T22:15:00.566339+00:00 | 1,582,301,916,000 | f707fba49e79e00435ec02cfa7bcf3048071399d | 3 | {
"blob_id": "f707fba49e79e00435ec02cfa7bcf3048071399d",
"branch_name": "refs/heads/master",
"committer_date": 1582301916000,
"content_id": "11d280391694ddd6c59e748ad95bf0c8fef76508",
"detected_licenses": [
"MIT"
],
"directory_id": "73845744e1372d187c57c468dba0fed45b7420d4",
"extension": "py",
"fi... | 2.984375 | stackv2 | """
ComptoxAI graphs.
A typical graph workflow looks something like the following:
>>> from comptox_ai import Graph
>>> G = Graph.from_neo4j(config_file = "./CONFIG.cfg")
>>> G.convert_inplace(to='networkx')
>>> A = G.get_adjacency()
>>> GS = G.convert(to='graphsage')
"""
import numpy as np
import scipy.sparse
impor... | 371 | 31.46 | 117 | 16 | 2,637 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_71c72a0f02705c78_4bd36c04", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
236
] | [
null
] | [
25
] | [
28
] | |
2024-11-18T22:15:02.436258+00:00 | 1,358,291,622,000 | 41c037a131f0afa29191dac668c206a74841e438 | 2 | {
"blob_id": "41c037a131f0afa29191dac668c206a74841e438",
"branch_name": "refs/heads/master",
"committer_date": 1358291622000,
"content_id": "20d96851103283a3d69c14a4afee1dbf95ca6bb8",
"detected_licenses": [
"MIT"
],
"directory_id": "e7640af22ff5113e0061765d5d9e6c8c9762e54a",
"extension": "py",
"fi... | 2.3125 | stackv2 | import os, re
from twilio.rest import TwilioRestClient
import sendgrid
from flask import Flask, request, render_template
app = Flask(__name__)
# TWILIO_ACCOUNT_SID and TWILIO_AUTH_TOKEN environment variables must be set
client = TwilioRestClient()
# SENDGRID_USER and SENDGRID_PASS enviornment variables must be set
sg... | 45 | 35.36 | 101 | 17 | 382 | python | [{"finding_id": "codeql_py/polynomial-redos_fa91fd4f5a4a91d7_a30bb9da", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma... | 1 | true | [
"CWE-1333"
] | [
"py/polynomial-redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '?'."
] | [
23
] | [
null
] | [
50
] | [
72
] | |
2024-11-18T22:25:59.505673+00:00 | 1,548,313,245,000 | 9479f3c378128943890e650a9f87ba8c0521c1bd | 2 | {
"blob_id": "9479f3c378128943890e650a9f87ba8c0521c1bd",
"branch_name": "refs/heads/master",
"committer_date": 1548313245000,
"content_id": "f1fc092f778262fd9eb588dc8dbf519c461ebde8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c4624942c620a7d116dd99024686101c57c0639d",
"extension": "py"... | 2.5 | stackv2 | import requests
import json
def sendSMS(mobile, content):
"""
:param mobile:
:param content:
:return: 短信告警
"""
headers = {"Content-Type": "application/json"}
# url = "http://10.10.70.121:80/api/Message/SendMessageV3" # Help/Api/POST-api-Message-SendMessageV3
# url = "http://10.10.70.1... | 29 | 28.38 | 105 | 13 | 263 | python | [{"finding_id": "codeql_py/request-without-cert-validation_fa5cd07010e4d5ad_ea634153", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
21
] | [
null
] | [
15
] | [
103
] | |
2024-11-18T22:26:03.511373+00:00 | 1,684,792,236,000 | c78bd51dcd7027376a450eb18ada955264be6799 | 3 | {
"blob_id": "c78bd51dcd7027376a450eb18ada955264be6799",
"branch_name": "refs/heads/master",
"committer_date": 1684910798000,
"content_id": "b93842b3f77ffe3920f6deadacf4c42c7824b710",
"detected_licenses": [
"MIT"
],
"directory_id": "6e809100c3772cd490fe5c5d13c9ad0838b3d715",
"extension": "py",
"fi... | 2.6875 | stackv2 | import requests
import requests_cache
from datetime import timedelta
from rest_framework import status
from rest_framework.decorators import api_view
from rest_framework.response import Response
from api.commonresponses import DOWNSTREAM_ERROR_RESPONSE
from api.models import City
from api.modules.weather.constants imp... | 91 | 43.35 | 95 | 23 | 787 | python | [{"finding_id": "codeql_py/partial-ssrf_c5d02fc0744f3ba1_2586c9cf", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)."
] | [
73
] | [
null
] | [
24
] | [
90
] | |
2024-11-18T22:26:17.598625+00:00 | 1,490,904,838,000 | 27bcc063842d918cd64de82ab3bbfb0a2034a603 | 3 | {
"blob_id": "27bcc063842d918cd64de82ab3bbfb0a2034a603",
"branch_name": "refs/heads/master",
"committer_date": 1490904838000,
"content_id": "1b1d2af50f210256c26d0aff120e1873a8ded58b",
"detected_licenses": [
"MIT"
],
"directory_id": "70905cce5f92ff7273ec424d62b338d8f36f3dc0",
"extension": "py",
"fi... | 2.625 | stackv2 | from Crypto.Cipher import DES
from Crypto import Random
from base64 import b64encode, b64decode
from config import app_config
from profiling import profile, Scope
# generate new key:
# print(b64encode(Random.new().read(DES.block_size)).decode("utf-8"))
class Encoder():
@profile(Scope.Core)
def __init__(self... | 33 | 29.76 | 83 | 15 | 258 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_5dc923fc87606cbd_a37c1735", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES](1) is broken or weak, and should not be used.", "r... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The cryptographic algorithm DES](1) is broken or weak, and should not be used.",
"[The cryptographic algorithm DES](1) is broken or weak, and should not be used."
] | [
23,
30
] | [
null,
null
] | [
26,
16
] | [
43,
58
] | |
2024-11-18T20:39:44.340408+00:00 | 1,680,032,345,000 | c8faef56b3a8eff8fbd06134d23ddc51a83fef25 | 3 | {
"blob_id": "c8faef56b3a8eff8fbd06134d23ddc51a83fef25",
"branch_name": "refs/heads/main",
"committer_date": 1680033272000,
"content_id": "2c736042fe512c5a22f14be75f538ada4fabb70f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3f5f2bad9f6ab4acd56c4e2929cee1af4a242e57",
"extension": "py",
... | 2.578125 | stackv2 | #
# Copyright (c) 2022 Dell EMC Corporation
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed... | 295 | 38.36 | 112 | 23 | 2,572 | python | [{"finding_id": "codeql_py/request-without-cert-validation_83ccd42ad953bee1_2177840e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 9 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"... | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
66,
83,
118,
135,
161,
184,
223,
235,
239
] | [
68,
null,
null,
null,
162,
185,
null,
null,
null
] | [
20,
20,
16,
20,
20,
20,
20,
33,
41
] | [
50,
68,
64,
68,
70,
70,
72,
90,
102
] | |
2024-11-18T20:39:48.321169+00:00 | 1,621,507,695,000 | 0550b942e66c61ae6194d011fd67ca8e844bc6ee | 2 | {
"blob_id": "0550b942e66c61ae6194d011fd67ca8e844bc6ee",
"branch_name": "refs/heads/main",
"committer_date": 1621507695000,
"content_id": "e64477229ecd3318c9b6007a1535aa17e8628a4c",
"detected_licenses": [
"MIT"
],
"directory_id": "ee0ded1e4265a3770d524309ff6e1cf1d24a2575",
"extension": "py",
"file... | 2.40625 | stackv2 | import scrapy
from scrapy.spiders import CrawlSpider, Rule
from scrapy.linkextractors import LinkExtractor
from GitClosedIssuesWebCrawler.items import GitItem
import csv
import json
from collections import defaultdict
####################################
#### REMOVE BLANK LINES FROM CSV ###
###########################... | 111 | 44.28 | 142 | 15 | 1,196 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fa331d7afb31065f_026b4544", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [github.com](1) may be at an arbitrary position in the sanitized URL."
] | [
47
] | [
null
] | [
46
] | [
63
] | |
2024-11-18T20:40:08.494414+00:00 | 1,626,515,579,000 | ccecb26f6011dd9bbb1554cf54760766ed05805a | 3 | {
"blob_id": "ccecb26f6011dd9bbb1554cf54760766ed05805a",
"branch_name": "refs/heads/master",
"committer_date": 1626515579000,
"content_id": "36e850027e522fc22842e385414139cbb992df50",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "6e82f43b9e0c8ca634ebf5c69bfbffdf01951e23",
"extension": "p... | 2.71875 | stackv2 | """Downloads build artifacts via the CircleCI API."""
import argparse
import os
import json
import six
import subprocess
import sys
def query_artifacts(api_token, user, project, branch, filter):
"""Queries CircleCI for a list of build artifacts.
All parameters are strings. The returned value is a JSON object wit... | 88 | 37.81 | 132 | 15 | 737 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a1051b5386230917_5389e1f1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
28
] | [
null
] | [
9
] | [
23
] | |
2024-11-18T20:52:21.742701+00:00 | 1,532,612,162,000 | 4b38005e674a72ca06bec7fc0606ba267cddcce8 | 3 | {
"blob_id": "4b38005e674a72ca06bec7fc0606ba267cddcce8",
"branch_name": "refs/heads/master",
"committer_date": 1532612162000,
"content_id": "fe11f66e50648dd89379945db0cb23675b6e1a39",
"detected_licenses": [
"MIT"
],
"directory_id": "5c603f9b55d30c679ca2dc623953b2e15b3201f7",
"extension": "py",
"fi... | 2.5625 | stackv2 | from flask import abort, Flask, jsonify, request
import os,re,time
import pandas as pd
import requests
from slackclient import SlackClient
import summarybot_utils as sbut
import summarybot_ref as sref
from zappa.async import task
app = Flask(__name__)
###################################################################... | 143 | 36.88 | 109 | 15 | 1,163 | python | [{"finding_id": "codeql_py/full-ssrf_3f48c394856e5284_092ef077", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
129
] | [
null
] | [
5
] | [
43
] | |
2024-11-18T21:08:10.838049+00:00 | 1,679,473,142,000 | 7cc7e800035e793c093b3e0a6e0b231d587b0706 | 2 | {
"blob_id": "7cc7e800035e793c093b3e0a6e0b231d587b0706",
"branch_name": "refs/heads/master",
"committer_date": 1679473142000,
"content_id": "e84d8321e429d199dd1b3c6a35ff337c3a7c9e2f",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "d8744b28d1530450cbeeb4c80756bfe41244f859",
"extension": "p... | 2.34375 | stackv2 | # -*- coding: utf-8 -*-
"""
rstblog.programs
~~~~~~~~~~~~~~~~
Builtin build programs.
:copyright: (c) 2010 by Armin Ronacher.
:license: BSD, see LICENSE for more details.
"""
import os
import shutil
import subprocess
from datetime import datetime
from io import StringIO
from typing import Any, Di... | 267 | 30.29 | 86 | 20 | 1,677 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_39815299326cac79_9393b7d7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
190
] | [
null
] | [
20
] | [
34
] | |
2024-11-18T21:08:19.648595+00:00 | 1,669,983,054,000 | e63df7315732c742c3a8de787db4991f64861fc8 | 2 | {
"blob_id": "e63df7315732c742c3a8de787db4991f64861fc8",
"branch_name": "refs/heads/master",
"committer_date": 1669983054000,
"content_id": "940218b0662b427f5eaedc240cb3f58cd013d78c",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "56731673c481f872b61f86e9c8c07bb9b0548c94",
"extension": "p... | 2.453125 | stackv2 | import json
import typing
from jinja2 import Template
from tornado.routing import Rule
from tornado.web import Application, RequestHandler
from .base import Apiman as _Apiman
class Apiman(_Apiman):
"""Tornado extension
>>> apiman = Apiman(
... template="./examples/docs/dog_template.yml"
... )
... | 165 | 34.43 | 88 | 24 | 1,237 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_cd44aa793cc58b44_aa3182f5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
43,
52
] | [
null,
null
] | [
28,
26
] | [
72,
68
] | |
2024-11-18T21:08:21.883361+00:00 | 1,529,314,391,000 | a646dadea04c176ae9ccbe012635f8561589bdcc | 3 | {
"blob_id": "a646dadea04c176ae9ccbe012635f8561589bdcc",
"branch_name": "refs/heads/master",
"committer_date": 1529314391000,
"content_id": "1650b63ddede4892977c695f6dba1dd79dd61e3b",
"detected_licenses": [
"MIT"
],
"directory_id": "4c92dd7bae8e7bb3b0693420bf3098639b207404",
"extension": "py",
"fi... | 2.84375 | stackv2 | """Functions for downloading and reading CIFAR10 data."""
from __future__ import absolute_import
from __future__ import division
from __future__ import print_function
import os
import urllib
import numpy as np
import tarfile
import pickle
from tensorflow.python.platform import gfile
import tensorflow as tf
from tenso... | 209 | 28.86 | 92 | 15 | 1,429 | python | [{"finding_id": "codeql_py/tarslip_17596a8251a59821_226fe123", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
92
] | [
null
] | [
13
] | [
15
] | |
2024-11-18T21:08:26.637879+00:00 | 1,593,097,517,000 | 1d155cb02a991787f5f6e28d55c2cdaada8f5352 | 4 | {
"blob_id": "1d155cb02a991787f5f6e28d55c2cdaada8f5352",
"branch_name": "refs/heads/master",
"committer_date": 1593097517000,
"content_id": "3aa497f9099342a53f2e1426bf48e7cb3306615e",
"detected_licenses": [
"MIT"
],
"directory_id": "27b7cbf08c40cedb3ddb3a6a6acb6e10131844e7",
"extension": "py",
"fi... | 3.703125 | stackv2 | from string import digits, ascii_letters, punctuation
from random import choice, shuffle
########################################
#this small program generate a password you can use it to secure your accounts with a strong password!!!
# How it works!!!!
# simply choose the length of the letters and the numbers and t... | 58 | 31.74 | 166 | 11 | 423 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4e84f2c8f269d6d6_89f1913c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
54
] | [
null
] | [
13
] | [
29
] | |
2024-11-18T21:32:18.207786+00:00 | 1,429,289,811,000 | 9e65c2443582cb42452c96584a2aaef7f942802c | 2 | {
"blob_id": "9e65c2443582cb42452c96584a2aaef7f942802c",
"branch_name": "refs/heads/master",
"committer_date": 1429289811000,
"content_id": "fdb7d3c2ca72445e64f80fea413586865a84d7b2",
"detected_licenses": [
"MIT"
],
"directory_id": "1e61308b1c503507edc6a788031901199f611228",
"extension": "py",
"fi... | 2.46875 | stackv2 | '''The MIT License (MIT)
Copyright (c) 2014 Shuo Li
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, me... | 72 | 33.83 | 99 | 14 | 633 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_aebfc0679ed63326_15bd87b2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
47
] | [
null
] | [
9
] | [
50
] | |
2024-11-18T21:32:24.699419+00:00 | 1,510,860,141,000 | 04805110d099431c63972456f3988efc518a2c9a | 3 | {
"blob_id": "04805110d099431c63972456f3988efc518a2c9a",
"branch_name": "refs/heads/master",
"committer_date": 1510860141000,
"content_id": "d9f68d06c428343f291cd15729cef06cc93f027c",
"detected_licenses": [
"MIT"
],
"directory_id": "7451758cf09b18d42e4720fcf946c8e1610ea5e0",
"extension": "py",
"fi... | 2.71875 | stackv2 | #!/usr/bin/env python3
import sys
from http.server import BaseHTTPRequestHandler
from http.client import HTTPSConnection
import json
import socketserver
import urllib
# curl -X POST -d @push.raw http://localhost:8081/ --header "Content-Type:application/json"
class SimpleServer(socketserver.ThreadingMixIn, socketserv... | 143 | 27.92 | 99 | 14 | 919 | python | [{"finding_id": "codeql_py/full-ssrf_d7580b1c63b360e0_3091f555", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](2).\nThe full URL of this request depends on a [user-provided value](2)."
] | [
84
] | [
null
] | [
13
] | [
62
] | |
2024-11-18T22:26:06.933747+00:00 | 1,633,536,693,000 | acdda3463be4743b25c3da0fca2f5819f93ac035 | 2 | {
"blob_id": "acdda3463be4743b25c3da0fca2f5819f93ac035",
"branch_name": "refs/heads/master",
"committer_date": 1633536693000,
"content_id": "57c6a7767b06fa1e14471ba762d592ed775a49f9",
"detected_licenses": [
"ISC"
],
"directory_id": "475889e0e76ea2d7570d07f60b5c4723048d232e",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
#
# Copyright (C) 2021 The SymbiFlow Authors.
#
# Use of this source code is governed by a ISC-style
# license that can be found in the LICENSE file or at
# https://opensource.org/licenses/ISC
#
# SPDX-License-Identifier: ISC
"""
This script is responsible for generating ... | 81 | 27.47 | 79 | 15 | 518 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a0cda7e291f7ea9a_b65c1051", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
30
] | [
null
] | [
11
] | [
69
] | |
2024-11-18T22:42:12.077177+00:00 | 1,604,719,720,000 | 3353ded4773ef4496bb6af21d191b1f6c1b62ec1 | 2 | {
"blob_id": "3353ded4773ef4496bb6af21d191b1f6c1b62ec1",
"branch_name": "refs/heads/master",
"committer_date": 1604719720000,
"content_id": "90aecabac8f1ed8eb875c4fe00309d66d6a6c7c4",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "cb6482b61e94355b9a86aec3361d00da6986a57e",
"extension": "p... | 2.3125 | stackv2 | #!/usr/bin/env python3
import cmd
import sqlite3
import sys
import os
import requests
from time import sleep
from terminaltables import AsciiTable
from cme.msfrpc import Msfrpc, MsfAuthError
import configparser
from cme.loaders.protocol_loader import protocol_loader
from requests import ConnectionError
# The following... | 296 | 34.05 | 123 | 22 | 2,210 | python | [{"finding_id": "codeql_py/request-without-cert-validation_22dc8c45893eda57_32ad9c5c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
105,
110
] | [
null,
null
] | [
21,
25
] | [
110,
112
] | |
2024-11-18T22:42:13.390664+00:00 | 1,633,870,292,000 | 1fb0d3b7b8f178d0642a159b9f1643c7b5ff1997 | 2 | {
"blob_id": "1fb0d3b7b8f178d0642a159b9f1643c7b5ff1997",
"branch_name": "refs/heads/main",
"committer_date": 1633870292000,
"content_id": "c3ba4d137ed931fa4373fd1519774e8a2767cc8d",
"detected_licenses": [
"MIT"
],
"directory_id": "8a819058f4ffca208f493033c23f2ff0b54f84b8",
"extension": "py",
"file... | 2.375 | stackv2 | import sys
import os
from qtpy.QtWidgets import QDialog, QVBoxLayout, QHBoxLayout, QPushButton, QTextEdit, QFileDialog, QRadioButton, QApplication
from qtpy.QtGui import QIcon
from nodes_package import NodesPackage
from .SelectPackages_Dialog import SelectPackages_Dialog
def apply_stylesheet(style: str):
from... | 161 | 33.66 | 125 | 17 | 1,113 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8e9b22395a4edbb6_de443884", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
29
] | [
null
] | [
22
] | [
40
] | |
2024-11-18T22:42:13.570629+00:00 | 1,553,174,689,000 | 4b47093c942cc38c2eeaf0dd1008a3480ce47726 | 2 | {
"blob_id": "4b47093c942cc38c2eeaf0dd1008a3480ce47726",
"branch_name": "refs/heads/master",
"committer_date": 1553174689000,
"content_id": "b64036a343ffe8c1e4ef440a2cf3434983a31f4b",
"detected_licenses": [
"MIT"
],
"directory_id": "2f185e4f02f5c95371c2fe4322470de805fa1225",
"extension": "py",
"fi... | 2.453125 | stackv2 | import pexpect
from firebase import firebase
firebase = firebase.FirebaseApplication('https://fizbee-4c002.firebaseio.com', None)
res = open("mac.txt", 'w')
child = pexpect.spawn("bluetoothctl")
child.send("scan on\n")
mac_addrs = []
try:
while True:
child.expect("Device (([0-9A-Fa-f]{2}:){5}([0-9A-Fa... | 22 | 23.77 | 84 | 14 | 149 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_10e13bb135698c25_b1465f3f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
19
] | [
null
] | [
23
] | [
36
] | |
2024-11-18T22:42:15.849343+00:00 | 1,575,556,022,000 | 99b8b5a2493421fce579fe701c3f610f247afa4c | 3 | {
"blob_id": "99b8b5a2493421fce579fe701c3f610f247afa4c",
"branch_name": "refs/heads/master",
"committer_date": 1575556022000,
"content_id": "5eabc9bfc40b15d161fe4651e362ecc8368504c2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1ffac689f0fedd6de04519bbfd6f577a6996798a",
"extension": "py"... | 2.578125 | stackv2 | from tornado.web import RequestHandler
import pymysql
import os
class HelloDBHandler(RequestHandler):
def get(self):
print("HELLO ALL")
host = "" if os.environ["db_host"] is None else str(os.environ["db_host"])
user = "" if os.environ["db_username"] is None else str(os.environ["db_usernam... | 76 | 34.95 | 94 | 19 | 556 | python | [{"finding_id": "codeql_py/stack-trace-exposure_c038abb1775ee75c_7269e948", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-209",
"CWE-079"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
36,
72,
69
] | [
null,
null,
null
] | [
24,
24,
24
] | [
31,
31,
42
] | |
2024-11-18T20:53:36.082679+00:00 | 1,588,148,221,000 | e3d671dd148bf35259661914073b6dcd7b709f9f | 3 | {
"blob_id": "e3d671dd148bf35259661914073b6dcd7b709f9f",
"branch_name": "refs/heads/master",
"committer_date": 1588148221000,
"content_id": "9a89e619a6120f2ece89b5e4d94f0943e530612f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f4a578152a5309c56cddc4bb3feea90b05fbaaa7",
"extension": "py"... | 2.671875 | stackv2 | from http.server import HTTPServer, BaseHTTPRequestHandler
#Main Class
class Serv(BaseHTTPRequestHandler):
def do_GET(self):
if self.path=='/':
self.path='/index.html'
try:
file_to_open = open(self.path[1:]).read()
self.send_response(200)
except:
file_to_open = "<h1>404 error</h1>"
self.send_res... | 20 | 22.75 | 58 | 16 | 140 | python | [{"finding_id": "codeql_py/path-injection_df7221f4ec726138_06b92ff3", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
10
] | [
null
] | [
24
] | [
37
] | |
2024-11-18T21:10:35.005894+00:00 | 1,498,751,932,000 | 15aadb2a804a34bd59ae180235c215a36d877b18 | 2 | {
"blob_id": "15aadb2a804a34bd59ae180235c215a36d877b18",
"branch_name": "refs/heads/master",
"committer_date": 1498751932000,
"content_id": "6a957604cb28e5f15978f7fa8d42906eb84579e1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2247cc67416681f6ec75d36c272cf823c6a288dd",
"extension": "py"... | 2.375 | stackv2 | # ********************************************************************************************************************************* #
# Name: api_example_python.py #
# Desc: full api example ... | 129 | 45.18 | 133 | 12 | 1,266 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0e5d08c0b0e25d3a_d617a23b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive dat... | [
61,
63,
70,
71,
79
] | [
null,
null,
null,
null,
null
] | [
11,
7,
15,
15,
7
] | [
42,
47,
52,
52,
24
] | |
2024-11-18T21:11:14.837950+00:00 | 1,688,668,412,000 | 848d2405adadf12999030d671d476f4e6cda0211 | 2 | {
"blob_id": "848d2405adadf12999030d671d476f4e6cda0211",
"branch_name": "refs/heads/master",
"committer_date": 1688668412000,
"content_id": "d949b2f5ca27426d4e85d4e0ecde864d9003ce11",
"detected_licenses": [
"MIT"
],
"directory_id": "090cb88268bf3ca43e8acd1061dbda8e878ba159",
"extension": "py",
"fi... | 2.484375 | stackv2 | import base64
from datetime import date
from os import path
from jinja2 import BaseLoader, Environment
from app.ds_config import TPL_PATH, IMG_PATH
def render_transcript(student_name):
"""Get base64 transcript
Parameters:
student_name (str): student full name.
Returns:
base64 transcript.
... | 28 | 30.57 | 72 | 14 | 216 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2ff30a0194ecd606_05aef959", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
21
] | [
null
] | [
18
] | [
48
] | |
2024-11-18T21:46:37.662933+00:00 | 1,478,367,052,000 | cf2304c5bdbbd5933998c6a99efb33e71670dc46 | 3 | {
"blob_id": "cf2304c5bdbbd5933998c6a99efb33e71670dc46",
"branch_name": "refs/heads/master",
"committer_date": 1478367052000,
"content_id": "568e5ae8023a58af16bf01536e28763ccac3479f",
"detected_licenses": [
"MIT"
],
"directory_id": "0aa44daed8a65bb77a74482f81d89cb5f97ac2d1",
"extension": "py",
"fi... | 2.828125 | stackv2 | """
FlashAssassin debug server
==========================
This little Flask app provides a suitable implementation of the FlashAir API.
It can be used to debug the FlashAssassin server.
A demo picture has been added to DCIM directory already that can be used to
test the app.
"""
import os
from datetime import datet... | 139 | 26.14 | 79 | 18 | 819 | python | [{"finding_id": "codeql_py/flask-debug_783d2d6882d5ceb3_20a75efa", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 7 | true | [
"CWE-215",
"CWE-079",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path d... | [
139,
131,
33,
41,
70,
80,
86
] | [
null,
null,
null,
null,
null,
null,
null
] | [
null,
35,
27,
22,
31,
29,
32
] | [
40,
51,
36,
30,
40,
38,
58
] | |
2024-11-18T21:47:30.069609+00:00 | 1,627,654,284,000 | dfeb9184cbf3ec28add8a9880eae781e452b66b4 | 3 | {
"blob_id": "dfeb9184cbf3ec28add8a9880eae781e452b66b4",
"branch_name": "refs/heads/master",
"committer_date": 1627654284000,
"content_id": "c5fddb6722976a40f867e5d105309ffe6895aca3",
"detected_licenses": [
"MIT"
],
"directory_id": "4da7514c9a84b447a5166d6eb4bf84c41662f056",
"extension": "py",
"fi... | 2.578125 | stackv2 | """This file contains the flask server."""
from moviebot.controller.controller_messenger import ControllerMessenger
from moviebot.controller.controller_telegram import ControllerTelegram
from flask import Flask, request
from os import environ
import yaml
import telegram
app = Flask(__name__)
controller_messenger = Co... | 124 | 29.9 | 83 | 17 | 836 | python | [{"finding_id": "codeql_py/reflective-xss_5fba56462d3a6f15_07eaf322", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
78
] | [
null
] | [
16
] | [
43
] | |
2024-11-18T21:47:35.365673+00:00 | 1,625,199,286,000 | 0247abb29b2f466265bf2a96e02cd4680740eee9 | 3 | {
"blob_id": "0247abb29b2f466265bf2a96e02cd4680740eee9",
"branch_name": "refs/heads/master",
"committer_date": 1625199286000,
"content_id": "047dec06a1d4fd624a8e5cb50c4f5914a02d6a8f",
"detected_licenses": [
"MIT"
],
"directory_id": "6bd1d66cc84bfb88f4a4d854822e946d99144820",
"extension": "py",
"fi... | 2.515625 | stackv2 | from flask import Flask, render_template, Response, request, redirect, url_for
from flask_login import (current_user, LoginManager, login_required,
login_user, logout_user, UserMixin)
from flask_sqlalchemy import SQLAlchemy
from werkzeug.security import check_password_hash, generate_password_ha... | 249 | 31.42 | 79 | 25 | 1,827 | python | [{"finding_id": "codeql_py/reflective-xss_2f37881a1c362fd1_fd26e64a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
138,
159,
164
] | [
null,
null,
null
] | [
16,
16,
12
] | [
56,
68,
53
] | |
2024-11-18T21:47:38.193327+00:00 | 1,567,044,846,000 | fcb4714f6fce779a3532c755d41f6b90f779da1f | 2 | {
"blob_id": "fcb4714f6fce779a3532c755d41f6b90f779da1f",
"branch_name": "refs/heads/master",
"committer_date": 1567044846000,
"content_id": "3c04638d35877336928228266e58c078b2f8265e",
"detected_licenses": [
"MIT"
],
"directory_id": "2a7f59d07ec2fe52084a1077dc0e2e70db429aff",
"extension": "py",
"fi... | 2.390625 | stackv2 | import json
from rest_framework import status
from rest_framework.authentication import TokenAuthentication
from rest_framework.decorators import api_view, permission_classes, authentication_classes
from rest_framework.permissions import IsAdminUser
from rest_framework.response import Response
from .serializers impor... | 77 | 22.73 | 96 | 17 | 447 | python | [{"finding_id": "codeql_py/path-injection_797a74267e3d24ef_e693cac9", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
28,
49
] | [
null,
null
] | [
15,
15
] | [
19,
19
] | |
2024-11-18T22:28:48.847207+00:00 | 1,463,658,056,000 | 0d99d641a6e29da7c201a27ff363f3e4207b4ec8 | 3 | {
"blob_id": "0d99d641a6e29da7c201a27ff363f3e4207b4ec8",
"branch_name": "refs/heads/master",
"committer_date": 1463658056000,
"content_id": "382f8155c31ac341b3342bf73f44f0595227548a",
"detected_licenses": [
"MIT"
],
"directory_id": "cf6d41046228b810b8b292a6af8424f604c5f052",
"extension": "py",
"fi... | 2.90625 | stackv2 | #!/usr/bin/env python3
"""
A fun little script to create a virtualenv without installing a damn thing.
python venvbs.py <arguments to virtualenv>
"""
import contextlib
import glob
import io
import json
import logging
import os
import os.path
import shutil
import subprocess
import sys
import tarfile
try:
from url... | 143 | 27.68 | 75 | 16 | 987 | python | [{"finding_id": "codeql_py/tarslip_10574db7c5732971_bce14570", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
87
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T22:29:34.292410+00:00 | 1,541,912,924,000 | baf6d23334fa1eac8ff142f938aafa6a60219314 | 3 | {
"blob_id": "baf6d23334fa1eac8ff142f938aafa6a60219314",
"branch_name": "refs/heads/master",
"committer_date": 1541912924000,
"content_id": "e5dcd360a83281819ebbd3422bd5fe54b279cd9e",
"detected_licenses": [
"MIT"
],
"directory_id": "ad006bec108f261c4a8309815a7a2615faff1b0e",
"extension": "py",
"fi... | 3.0625 | stackv2 | #!/usr/bin/env python
import os.path
import urllib.parse
import configparser
import base64
import json
import requests
import argparse
import sys
def options():
parser = argparse.ArgumentParser(prog="gitlab-file-downloader.py",
add_help=True,
... | 113 | 28.66 | 79 | 16 | 749 | python | [{"finding_id": "codeql_py/request-without-cert-validation_ddf2d766b775afad_ce915260", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
83,
99
] | [
85,
101
] | [
9,
9
] | [
35,
35
] | |
2024-11-18T22:29:35.921103+00:00 | 1,581,618,086,000 | 9b114cbcfadd278519614791feb98f6686b96821 | 3 | {
"blob_id": "9b114cbcfadd278519614791feb98f6686b96821",
"branch_name": "refs/heads/master",
"committer_date": 1581618086000,
"content_id": "4ca3ad9dea2efcef46c0347caf8e4a2931438767",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "019cd8e16fd5d90c57c45a3ad445cd530ad104a5",
"extension": "py"... | 2.65625 | stackv2 | """Default RG Gamification backend."""
from abc import ABCMeta, abstractmethod, abstractproperty
import json
import requests
import urlparse
from gamma_bridge import settings
class BaseStorage(object):
"""
The base class for work with remote storage.
"""
__metaclass__ = ABCMeta
@abstractmethod
... | 105 | 23.61 | 79 | 15 | 509 | python | [{"finding_id": "codeql_py/request-without-cert-validation_059a51f8817b71a4_ae64c755", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
72
] | [
77
] | [
34
] | [
14
] | |
2024-11-18T22:41:21.576143+00:00 | 1,607,736,498,000 | 25638a0978427002e8ccd81204deb59e6e9e4be2 | 3 | {
"blob_id": "25638a0978427002e8ccd81204deb59e6e9e4be2",
"branch_name": "refs/heads/master",
"committer_date": 1607736498000,
"content_id": "56a3c078fd0429d825851df5c279d9073b9aa809",
"detected_licenses": [
"MIT"
],
"directory_id": "0b299b456067622bae1e1de72efb8ba797c93a37",
"extension": "py",
"fi... | 2.71875 | stackv2 | import logging
import flask
from flask import current_app
from flask_socketio import emit, join_room
from application import GameManager, GAME_MANAGER_CONFIG_KEY
from .. import socketio
LOG = logging.getLogger("GameState")
@socketio.on("join")
def joined_event(message):
"""
Received when a player joins... | 89 | 26.56 | 114 | 14 | 573 | python | [{"finding_id": "codeql_py/log-injection_6c1abbfa2a5f40d4_672f906a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 4 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
27,
31,
42,
81
] | [
null,
null,
null,
null
] | [
18,
21,
14,
21
] | [
60,
71,
59,
102
] | |
2024-11-18T22:54:05.755919+00:00 | 1,681,840,460,000 | 82c4d6e76e4175dab99a2feacffbbe5a9be82813 | 3 | {
"blob_id": "82c4d6e76e4175dab99a2feacffbbe5a9be82813",
"branch_name": "refs/heads/master",
"committer_date": 1681840460000,
"content_id": "2541641ecea0ed30ff636a5f0fec67f025bc51f3",
"detected_licenses": [
"MIT"
],
"directory_id": "b1829737cb9a90c11b9f1af5aec412e2ebf74de8",
"extension": "py",
"fi... | 2.734375 | stackv2 | from bs4 import BeautifulSoup
import requests
class requests_template():
def __init__(self):
self.base_url = ""
self.soup = BeautifulSoup(features="html.parser")
def __get_url(self, url):
raw_site = requests.get(url, verify=False).text
self.soup = BeautifulSoup(raw_sit... | 65 | 31.6 | 131 | 13 | 653 | python | [{"finding_id": "codeql_py/request-without-cert-validation_13886285c6d3df6c_8675e4f1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
11
] | [
null
] | [
20
] | [
51
] | |
2024-11-18T22:54:17.457321+00:00 | 1,574,413,577,000 | dc563cbd5dc56704ef4b196705dc9d58f28a4f08 | 3 | {
"blob_id": "dc563cbd5dc56704ef4b196705dc9d58f28a4f08",
"branch_name": "refs/heads/master",
"committer_date": 1574413577000,
"content_id": "22c3b44508593eab27b8bb61a1adc5a2912f40b8",
"detected_licenses": [
"MIT"
],
"directory_id": "593b18ae3fd2b8a480a0520fb69a062c01782881",
"extension": "py",
"fi... | 3.109375 | stackv2 | """
Simple Flask app for easy work with TelePort API
"""
from flask import Flask
from flask import render_template
from flask import request
import urllib3
import json
import datetime
import re
app = Flask(__name__)
API_URL = 'https://api.tport.online/v2/public-stations/'
def get_data():
"""
Try to receive... | 90 | 24.31 | 88 | 16 | 548 | python | [{"finding_id": "codeql_py/regex-injection_72b6eb6a8d52a7e4_87c2cd3f", "tool_name": "codeql", "rule_id": "py/regex-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This regular expression depends on a [user-provided value](1) and is executed by [re.match](2).", "remedi... | 1 | true | [
"CWE-730"
] | [
"py/regex-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression depends on a [user-provided value](1) and is executed by [re.match](2)."
] | [
51
] | [
null
] | [
21
] | [
30
] | |
2024-11-18T21:07:33.526053+00:00 | 1,607,286,367,000 | 13fffea45877ef588b0c22816006e75e622c825b | 2 | {
"blob_id": "13fffea45877ef588b0c22816006e75e622c825b",
"branch_name": "refs/heads/master",
"committer_date": 1607286367000,
"content_id": "fb59acfeb7a2d3feec3f8f1c7e9c708667911644",
"detected_licenses": [
"MIT"
],
"directory_id": "67d704301a2d4368866dfea69ecf28184f61734d",
"extension": "py",
"fi... | 2.359375 | stackv2 | import logging
from rest_framework.exceptions import ValidationError
from rest_framework.generics import get_object_or_404
from rest_framework.response import Response
from rest_framework.views import APIView
logger = logging.getLogger(__name__)
"""
conceptually very similar to https://www.django-rest-framework.org/... | 103 | 33.78 | 123 | 17 | 699 | python | [{"finding_id": "codeql_py/log-injection_46a92fe637127271_37760a50", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
100
] | [
null
] | [
21
] | [
26
] | |
2024-11-18T21:07:38.848349+00:00 | 1,578,005,415,000 | bb834e746307088a52dabcd32db4925861e2884b | 3 | {
"blob_id": "bb834e746307088a52dabcd32db4925861e2884b",
"branch_name": "refs/heads/master",
"committer_date": 1578005415000,
"content_id": "638ceb9bb466329f4c17463e6a2c7fcd395d2049",
"detected_licenses": [
"MIT"
],
"directory_id": "fdfc37d52fa30acd81c4acc37a41f98be39be45d",
"extension": "py",
"fi... | 2.90625 | stackv2 | """Form API Calls"""
import os
import datetime
import json
import pandas as pd
import requests
class ApiCall:
call_skele = {
"real_time_stock": "https://api.worldtradingdata.com/api/v1/stock?{options}" # tckr should be something like 'ATVI,SNAP'
, "real_time_mf": "https://api.worldtradingdata.com/... | 192 | 33.39 | 136 | 16 | 1,580 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4790468be37b0044_712aebaf", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
65
] | [
null
] | [
25
] | [
32
] | |
2024-11-18T21:33:29.379943+00:00 | 1,444,889,119,000 | f7f8162becb9ef2c88068bd18bcb7aaf7e30bc9b | 2 | {
"blob_id": "f7f8162becb9ef2c88068bd18bcb7aaf7e30bc9b",
"branch_name": "refs/heads/master",
"committer_date": 1444889119000,
"content_id": "41aa5bfaf23be25b36a6a390b79190dabe0aa46e",
"detected_licenses": [
"MIT"
],
"directory_id": "50a235bf7b2232a48fe6b497d8adb3729f8c0c01",
"extension": "py",
"fi... | 2.375 | stackv2 | # -*- coding: utf-8 -*-
import os
import sys
from ConfigParser import ConfigParser
from datetime import datetime
import requests
import rumps
import simplejson
NIGHTSCOUT_URL = '/api/v1/entries.json?count=100'
UPDATE_FREQUENCY_SECONDS = 20
MAX_SECONDS_TO_SHOW_DELTA = 600
HISTORY_LENGTH = 5
MAX_BAD_REQUEST_ATTEMPTS = ... | 175 | 31.54 | 115 | 18 | 1,433 | python | [{"finding_id": "codeql_py/request-without-cert-validation_bbb9aa5a96e3dc19_736736f6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
83
] | [
null
] | [
16
] | [
78
] | |
2024-11-18T21:55:40.038063+00:00 | 1,512,018,359,000 | f57e2403d95f12dfecb01e4ab9ad7d1dfe32e72e | 3 | {
"blob_id": "f57e2403d95f12dfecb01e4ab9ad7d1dfe32e72e",
"branch_name": "refs/heads/master",
"committer_date": 1512018359000,
"content_id": "ec58adb16847a069c1c065645f9b085616c50a91",
"detected_licenses": [
"MIT"
],
"directory_id": "8ad32c20b0b75ba4b6e0040019fd607f63779491",
"extension": "py",
"fi... | 2.78125 | stackv2 | from __future__ import print_function
import hashlib
import signal
import pickle
import sys
class hasher():
def __init__(self, doorID):
self.doorID = doorID
def hash(self, num):
m = hashlib.md5()
m.update(self.doorID + str(num))
return m.hexdigest()
class Spinner():
char... | 73 | 23.18 | 82 | 15 | 476 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1ffb921481d12944_7e560784", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p... | [
28,
72
] | [
null,
null
] | [
11,
8
] | [
74,
25
] | |
2024-11-18T21:55:57.370715+00:00 | 1,690,388,978,000 | 15d4ad5c4c0186b02c57461750ae2b610014457d | 2 | {
"blob_id": "15d4ad5c4c0186b02c57461750ae2b610014457d",
"branch_name": "refs/heads/master",
"committer_date": 1690388978000,
"content_id": "790b038deca2b72154b1317ed77167b94ea5b07b",
"detected_licenses": [
"MIT"
],
"directory_id": "92a73eb632541a44c16f47731af44b65e777468e",
"extension": "py",
"fi... | 2.375 | stackv2 | from flask import render_template,redirect,url_for,request,flash
from . import auth
from ..models import Group
from .forms import RegistrationForm,LoginForm
from .. import db
from flask_login import login_user,logout_user,login_required
@auth.route('/login', methods=["GET", "POST"])
def login():
login_form = Logi... | 55 | 23.96 | 91 | 17 | 289 | python | [{"finding_id": "codeql_py/url-redirection_c052772bd71fe931_9be7e096", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
21
] | [
null
] | [
29
] | [
91
] | |
2024-11-18T21:55:58.103062+00:00 | 1,619,799,663,000 | e34ddb42fbac81246fb8cf2eb55157e121e304b8 | 3 | {
"blob_id": "e34ddb42fbac81246fb8cf2eb55157e121e304b8",
"branch_name": "refs/heads/master",
"committer_date": 1619799663000,
"content_id": "dbdea514533c63a1e22579bcc04932bed5bf996e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6491584bfdca9ae85ac8ad06232c597eb735e2ea",
"extension": "py"... | 2.625 | stackv2 | import logging
import os
import pickle
from threading import Thread, Event
from typing import List, Dict
import GPUtil
import pandas as pd
import psutil
from dataclasses import dataclass, field
from dataclasses_json import dataclass_json
from flask import Flask
METRICS_FOLDER = os.path.abspath(os.path.dirname(__file_... | 164 | 22.9 | 108 | 15 | 982 | python | [{"finding_id": "codeql_py/flask-debug_c5a643a289d85c5a_6765766d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-117"
] | [
"py/flask-debug",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1)."
] | [
164,
128
] | [
null,
null
] | [
5,
18
] | [
24,
52
] | |
2024-11-18T21:55:59.814238+00:00 | 1,572,610,861,000 | 5e817d4b5151181084d0a89ff6d0e1c839e06b8f | 2 | {
"blob_id": "5e817d4b5151181084d0a89ff6d0e1c839e06b8f",
"branch_name": "refs/heads/master",
"committer_date": 1572610861000,
"content_id": "2f26eab3cfd0cee5112755c29fb935ea6ef2cb67",
"detected_licenses": [
"MIT"
],
"directory_id": "0c0c3e2010978978207e092ee116a4060ef86f3e",
"extension": "py",
"fi... | 2.3125 | stackv2 | from flask import *
import pdfsplitter
app=Flask(__name__)
@app.route("/")
def upload():
return render_template("file_upload.html")
@app.route("/success",methods=["POST"])
def success():
global st
global en
global file
st=int(request.form['start'])
en=int(request.form['end'])
f=request.f... | 37 | 19.27 | 68 | 12 | 177 | python | [{"finding_id": "codeql_py/flask-debug_8bc4cda390535986_b9eff1c0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).\nThis path depends on a [user-provided value](3).",
"This path depends on a [user-provided va... | [
37,
20,
33
] | [
null,
null,
null
] | [
5,
12,
22
] | [
24,
16,
30
] | |
2024-11-18T21:56:00.528418+00:00 | 1,586,964,035,000 | b4a0290f75f3ba3bc5fed497cce7d92243e4cd8a | 3 | {
"blob_id": "b4a0290f75f3ba3bc5fed497cce7d92243e4cd8a",
"branch_name": "refs/heads/master",
"committer_date": 1586964035000,
"content_id": "b5067d21e4755059894f5c577d3942cfc2913dac",
"detected_licenses": [
"MIT"
],
"directory_id": "14ca7f784492ac76c45892190c00e794aa25cee5",
"extension": "py",
"fi... | 2.765625 | stackv2 | from requests.utils import requote_uri
from base64 import b64decode
from hashlib import md5
from Crypto.Cipher import AES
class TwistSourceDecryptor:
BLOCK_SIZE = 16
SECRET_KEY = b'LXgIVP&PorO68Rq7dTx8N^lP!Fa5sGJ^*XK'
def __init__(self, enc_src):
self.enc_src = enc_src.encode('utf-8')
def __... | 55 | 33.16 | 122 | 17 | 608 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_86c238894f78e06d_d1a51dfe", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
25,
28
] | [
null,
null
] | [
19,
23
] | [
23,
33
] | |
2024-11-18T21:56:00.633723+00:00 | 1,390,387,565,000 | 22fcbd91b524ad8ab853e05899a188532a2790ba | 2 | {
"blob_id": "22fcbd91b524ad8ab853e05899a188532a2790ba",
"branch_name": "refs/heads/master",
"committer_date": 1390387565000,
"content_id": "63f1f48772cc4c16fb37599b678cb5c2f9e83e67",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "98d245a3572a2aa380d4683c65305caffde53906",
"extension": "py",
... | 2.34375 | stackv2 | import os
import json
import jinja2
import logging
import subprocess
def which(program):
for path in os.environ["PATH"].split(os.pathsep):
path = path.strip('"')
exe = os.path.join(path, program)
if os.path.isfile(exe) and os.access(exe, os.X_OK):
return exe
return None
d... | 56 | 23.82 | 77 | 11 | 342 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f375c70a9cc9d2d2_0b82bc27", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
56
] | [
null
] | [
9
] | [
78
] | |
2024-11-18T21:56:07.463586+00:00 | 1,609,266,700,000 | 427af9580f29a02b5fc279330eb7be2ac5aaaa56 | 2 | {
"blob_id": "427af9580f29a02b5fc279330eb7be2ac5aaaa56",
"branch_name": "refs/heads/master",
"committer_date": 1609266700000,
"content_id": "84bad5471dfd67b88cc016a54500d8c021cd0ebd",
"detected_licenses": [
"MIT"
],
"directory_id": "4c0e8eca699f2c9cf4916f4b85f7069058f8eaa5",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/env python
'''
Python script to get json data from Hive
python get_hive_json.py [-h] username password
'''
import requests
import json
import sys
import argparse
from pprint import pprint
parser = argparse.ArgumentParser(description='Get Hive JSON data.')
parser.add_argument('username', help='Hive Username'... | 43 | 39.02 | 158 | 10 | 463 | python | [{"finding_id": "codeql_py/request-without-cert-validation_01adb421efead4af_1efe2ec1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
23,
32,
42
] | [
null,
null,
null
] | [
5,
5,
5
] | [
80,
53,
56
] | |
2024-11-18T22:39:33.910783+00:00 | 1,689,758,547,000 | 0c2b792452ce475e3f4bb6af956c6945a00882f8 | 3 | {
"blob_id": "0c2b792452ce475e3f4bb6af956c6945a00882f8",
"branch_name": "refs/heads/master",
"committer_date": 1689758547000,
"content_id": "82c031e91c2389fd9538c56804186765d77483a4",
"detected_licenses": [
"MIT",
"0BSD",
"Apache-2.0"
],
"directory_id": "9558cfd15b5d548cc9a82ca4a046fc90d0d5948... | 2.578125 | stackv2 | from flask import Flask, jsonify, request, make_response
#from flask import response
# default values of parameters
breath_rate = 12
tidal_volume = 500
i_ratio = 1
e_ratio = 2
pause_value = 0
o2_fraction = 21
patient_state = 1
volume = 0.0023
sO2 = 0.95
count = 0
#volume = 2500
#sO2 = 0.95
# default value of some... | 132 | 30.24 | 138 | 11 | 1,078 | python | [{"finding_id": "codeql_py/reflective-xss_12e8fc3c399db1df_218c4753", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vu... | [
64,
70,
122
] | [
null,
null,
null
] | [
12,
12,
12
] | [
22,
22,
22
] | |
2024-11-18T22:54:57.744619+00:00 | 1,547,540,673,000 | b9a2b255f8d2fcd76d445b19adbb8ae2ba6b2fc8 | 2 | {
"blob_id": "b9a2b255f8d2fcd76d445b19adbb8ae2ba6b2fc8",
"branch_name": "refs/heads/master",
"committer_date": 1547540673000,
"content_id": "74fae42fb497cf1db3af3a1f37847a8b31ccba49",
"detected_licenses": [
"MIT"
],
"directory_id": "41a500e0d1035838e7b6d1f5b1cdaf649b97528e",
"extension": "py",
"fi... | 2.34375 | stackv2 | # A Wavenet For Speech Denoising - Dario Rethage - 19.05.2017
# Main.py
import sys
import logging
import optparse
import json
import os
import models
import datasets
import util
import denoise
import numpy as np
def set_system_settings():
sys.setrecursionlimit(50000)
logging.getLogger().setLevel(logging.INFO)... | 259 | 41.63 | 125 | 17 | 2,598 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0aa81df7f3180c10_b4662665", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
167,
170,
178
] | [
null,
null,
null
] | [
23,
23,
11
] | [
102,
102,
22
] | |
2024-11-18T22:54:58.562491+00:00 | 1,453,103,076,000 | 5f1174b1480e0264381183b0c13ccec4b9d7b3ca | 2 | {
"blob_id": "5f1174b1480e0264381183b0c13ccec4b9d7b3ca",
"branch_name": "refs/heads/master",
"committer_date": 1453103076000,
"content_id": "02370958010a62a1ed655d4ad34337740e416428",
"detected_licenses": [
"MIT"
],
"directory_id": "0362118bfd8f039dcdcf9171c07d31a4f3fa34d1",
"extension": "py",
"fi... | 2.34375 | stackv2 | import click
import os
from jinja2 import Environment, PackageLoader
from os import path
env = Environment(loader=PackageLoader(__name__, 'templates'))
package_root = path.join(path.dirname(__file__), '..', '..', 'src', 'main',
'java', 'com.github.parksungmin.collectionUtils')
def render_te... | 30 | 22.4 | 75 | 12 | 154 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_96aba4b9d4cf1fab_bf48f60c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
7
] | [
null
] | [
7
] | [
63
] | |
2024-11-18T23:06:15.853034+00:00 | 1,671,574,166,000 | b535238c8f8df8e0adac9eacd2488682e960a28b | 3 | {
"blob_id": "b535238c8f8df8e0adac9eacd2488682e960a28b",
"branch_name": "refs/heads/main",
"committer_date": 1671574166000,
"content_id": "03014262ee6f2ca2dbcb499a580c67aaea0cf09b",
"detected_licenses": [
"ISC"
],
"directory_id": "7113b9475f09687620afa54b6f8d7a591e6f9765",
"extension": "py",
"file... | 3.390625 | stackv2 | #!/usr/bin/env python
from argparse import ArgumentParser
import random
import string
def get_words():
dictionary_file = "/usr/share/dict/words"
words = []
try:
with open(dictionary_file) as file:
for line in file:
words.append(line.rstrip())
except FileNotFoundEr... | 77 | 24.95 | 79 | 17 | 427 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aba4fefb0a152f15_5e8a54b5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
67
] | [
null
] | [
15
] | [
33
] | |
2024-11-18T23:06:16.336543+00:00 | 1,576,402,449,000 | 757665781aadce37966c4d3d36a9aff77086d7a7 | 4 | {
"blob_id": "757665781aadce37966c4d3d36a9aff77086d7a7",
"branch_name": "refs/heads/master",
"committer_date": 1576402449000,
"content_id": "7a49a553a169734e7b5c10c51b4fc87c46ec0812",
"detected_licenses": [
"MIT"
],
"directory_id": "e8206dd193b9232e5bd3fda484bb0f1083c76d6b",
"extension": "py",
"fi... | 3.609375 | stackv2 | # https://adventofcode.com/2019/day/4
puzzle_input = "137683-596253"
max_digits = 6
def two_adjacent_are_the_same(previous, current):
return previous == current
def only_increase_or_stay_the_same(first_digit, digits):
previous = first_digit
for d in digits:
if previous > int(d):
retu... | 75 | 25.07 | 83 | 16 | 551 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_07297771c0b0d955_eafc9a49", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
63
] | [
null
] | [
19
] | [
66
] | |
2024-11-18T22:43:25.278427+00:00 | 1,305,905,967,000 | 3460a50768c18b10017a4136e8797ca9e83dfa40 | 2 | {
"blob_id": "3460a50768c18b10017a4136e8797ca9e83dfa40",
"branch_name": "refs/heads/master",
"committer_date": 1305905967000,
"content_id": "6247f1f2c67f5c1ce2744d3b9922def4c125e913",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "0f40e3d23dfdc5eaa277c222b0230730a94d1c59",
"extension": "p... | 2.46875 | stackv2 | import re
import unicodedata
from erm.settings import *
import datetime
import os
import sys
import time
import pickle
import stat
import md5
import urllib
from django.utils.encoding import smart_str, smart_unicode, force_unicode
def microtime_slug(time_value=None):
if time_value is None:
time_val... | 211 | 33.88 | 122 | 20 | 1,842 | python | [{"finding_id": "codeql_py/overly-permissive-file_a4ba025436a414c9_ab9ac73b", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable.",
"Overly permissive mask in chmod sets file to world readable."
] | [
99,
107
] | [
null,
null
] | [
17,
9
] | [
41,
39
] | |
2024-11-18T22:43:27.817352+00:00 | 1,556,850,976,000 | e1d2e71f794a2668e342881bb77b0fae1fd2ffea | 2 | {
"blob_id": "e1d2e71f794a2668e342881bb77b0fae1fd2ffea",
"branch_name": "refs/heads/master",
"committer_date": 1556850976000,
"content_id": "e89848f18b9d629226d14fe3bf14d40eacc1e9fd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4903f7aa3c79417650aeabb3e31067f7952d84fa",
"extension": "py"... | 2.40625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import logging
import tornado.web
import tornado.websocket
from tornado.ioloop import IOLoop, PeriodicCallback
import Queue
import sys
import threading
import time
import json
import argparse
#from types import *
global args
global q
q_channels = {}
wsMapingChannel = ... | 175 | 28.26 | 136 | 19 | 1,114 | python | [{"finding_id": "codeql_py/log-injection_f94716f03512272b_41e969ef", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).\nThis log entry depends on a [user-provided value](3).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
62,
126,
141
] | [
null,
null,
null
] | [
23,
27,
29
] | [
82,
60,
93
] | |
2024-11-18T22:43:28.789446+00:00 | 1,632,670,165,000 | 6e929067cb7cc68f10cca53bf8112e838579cc42 | 2 | {
"blob_id": "6e929067cb7cc68f10cca53bf8112e838579cc42",
"branch_name": "refs/heads/master",
"committer_date": 1632670165000,
"content_id": "028bef823da429802ffa0c7fea70b7a9b3cfaaba",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bc3ad3504c206f0696536e0180f5a9b41347c015",
"extension": "py"... | 2.453125 | stackv2 | import hashlib
import os
from typing import Any, Dict, List
from fastapi import Depends, FastAPI, File, HTTPException, UploadFile, status
from fastapi.responses import FileResponse
from fastapi.security import HTTPBasic, HTTPBasicCredentials
from .controller import Controller, ControllerException
MAX_UPLOAD_SIZE = 1... | 77 | 29.75 | 88 | 15 | 527 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7d794dc05c9abc3d_f4755784", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
22
] | [
null
] | [
34
] | [
63
] | |
2024-11-18T22:43:31.950628+00:00 | 1,680,724,061,000 | 998506066ddde9edf3bdfd83a48fd2d186a693d3 | 2 | {
"blob_id": "998506066ddde9edf3bdfd83a48fd2d186a693d3",
"branch_name": "refs/heads/master",
"committer_date": 1680724061000,
"content_id": "b4ca317342e21fc43bb117c4f1e754e86e3059a4",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "11ff96811e520ec92e18f591656c183a715edf25",
"extension": "p... | 2.375 | stackv2 | #!/usr/bin/env python
import os
import argparse
import json
from pathlib import Path
from jinja2 import Template
import pyyaks.logger
def get_opt():
parser = argparse.ArgumentParser(description='Make aimpoint monitor web page')
parser.add_argument("--data-root",
default=".",
... | 49 | 25.04 | 82 | 12 | 286 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_15b977f1983e0c5b_4bfa40f9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
39
] | [
null
] | [
16
] | [
58
] | |
2024-11-18T22:44:13.335968+00:00 | 1,630,987,573,000 | de137df8cff04a35dc62d4646936714edc38a873 | 3 | {
"blob_id": "de137df8cff04a35dc62d4646936714edc38a873",
"branch_name": "refs/heads/master",
"committer_date": 1630987573000,
"content_id": "44e425b0f3adce6f7fc7677365cd82ff5ceb3943",
"detected_licenses": [
"MIT"
],
"directory_id": "d318e7e804772296a5960d3f3c94f644c5e4a8d8",
"extension": "py",
"fi... | 2.828125 | stackv2 | import flask, requests
# user variables
faucetuser = "username"
faucetpasswd = "password"
claimamount = int(10)
enable_faucet = False
api_port = 5000
#only a program variable
users = [faucetuser]
def login(username, password):
#gets server ip
import requests, socket
server = requests.get("https://raw... | 180 | 28.37 | 133 | 23 | 1,307 | python | [{"finding_id": "codeql_py/reflective-xss_790b9208016f00f3_f23c2412", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
123
] | [
null
] | [
28
] | [
36
] | |
2024-11-18T23:10:38.389561+00:00 | 1,367,965,029,000 | 9d5b211c0babd4323ab8913014151ffc6e3c68c4 | 3 | {
"blob_id": "9d5b211c0babd4323ab8913014151ffc6e3c68c4",
"branch_name": "refs/heads/master",
"committer_date": 1367965029000,
"content_id": "804526795eedb8360dc557190fb95e09d68c7ca4",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "930ac658e8a331fe92f4681914f61de33e3e008f",
"extension": "p... | 2.921875 | stackv2 | #!/usr/bin/env python
import jinja2
import types
import os
import csv
import StringIO
import shutil
_ROOT = os.path.abspath(os.path.dirname(__file__))
_TEMPLATE_PATH = os.path.join(_ROOT, 'templates')
_template_env = jinja2.Environment(
loader=jinja2.FileSystemLoader(_TEMPLATE_PATH))
_DEFAULT_ASSET_DEST_DIR = ... | 345 | 30.93 | 84 | 15 | 2,540 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b15d85c3606ada73_9bdce39d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
14
] | [
17
] | [
52
] | |
2024-11-18T23:25:05.144876+00:00 | 1,572,455,028,000 | b6ae3e4a6c6972e05a842def8e9d594103abd727 | 3 | {
"blob_id": "b6ae3e4a6c6972e05a842def8e9d594103abd727",
"branch_name": "refs/heads/master",
"committer_date": 1572455028000,
"content_id": "d754c7e9ec300fce06a524dec4da968c76e45172",
"detected_licenses": [
"MIT"
],
"directory_id": "276bafbb2f9de6af3bc7a6486e165221361432b9",
"extension": "py",
"fi... | 2.640625 | stackv2 | import os
import sys
import json
import statistics
from datetime import datetime
import logging
from flask import Flask, make_response, request
from flask_restplus import Resource, Api
from flask_weather.helper import google_maps
from flask_weather.weather import get_available_weather_services
from .exceptions impo... | 207 | 33.98 | 99 | 19 | 1,428 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3f9695c205bb183e_8b7d20ff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text."
] | [
197
] | [
null
] | [
26
] | [
34
] | |
2024-11-18T22:29:45.877498+00:00 | 1,557,603,218,000 | 0dcb5f67dd52645262ac5f7c850b84fc247a065f | 3 | {
"blob_id": "0dcb5f67dd52645262ac5f7c850b84fc247a065f",
"branch_name": "refs/heads/master",
"committer_date": 1557603218000,
"content_id": "02e7c0827d665e603b14994d5d154004cbd1bf0f",
"detected_licenses": [
"MIT"
],
"directory_id": "62d766d65a319179c65ab488ea01b487d8ad566e",
"extension": "py",
"fi... | 2.75 | stackv2 | __version__ = "0.1.10"
import argparse, json, os.path, sys
import jinja2, requests
def main():
parser = argparse.ArgumentParser()
parser.add_argument(
"-i", "--input",
default="swagger.json",
help="path to or URL of the Swagger JSON file (default: swagger.json)",
metavar="SW... | 92 | 27.34 | 79 | 18 | 561 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_088a7fd5910fe2c9_a3a90ebd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
79
] | [
null
] | [
11
] | [
59
] | |
2024-11-18T22:29:55.310907+00:00 | 1,626,365,841,000 | 0e18726db91b0e2e5eaeca49c495a260091c7d14 | 3 | {
"blob_id": "0e18726db91b0e2e5eaeca49c495a260091c7d14",
"branch_name": "refs/heads/master",
"committer_date": 1626365841000,
"content_id": "3d031a264101f8510ba544b95d4120e966454196",
"detected_licenses": [
"MIT"
],
"directory_id": "6ab0d2249bbc4690c16b79f8d1ae38ae36a57611",
"extension": "py",
"fi... | 2.9375 | stackv2 | import socket
import hashlib
import base64
from Crypto.Cipher import AES
from Crypto import Random
# vector is global, we start with None
IV = None
def generate_vector():
global IV
if IV is None:
# we save it as bytes
IV = Random.new().read(AES.block_size)
# initialization vector, we n... | 38 | 19.55 | 106 | 13 | 196 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_30bf693a4e30fd40_ac1c30f9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
26
] | [
null
] | [
35
] | [
48
] | |
2024-11-18T23:10:11.016817+00:00 | 1,621,599,572,000 | 7315989ec7608333ab93542138a71094c7541df1 | 4 | {
"blob_id": "7315989ec7608333ab93542138a71094c7541df1",
"branch_name": "refs/heads/main",
"committer_date": 1621599572000,
"content_id": "29c4f580e471985ce7576cc09fc7f5118ab9e5ad",
"detected_licenses": [
"MIT"
],
"directory_id": "751f92fecd33dd35dcc6640afe5c5d71191a7a1b",
"extension": "py",
"file... | 3.875 | stackv2 | # Design & develop a web application to maintain records of students.
# The single the record shall contain the following information:
# | Name | Roll number | Age | Gender |
import os
from enum import Enum
os.system("")
class Style:
BLACK = '\033[30m'
RED = '\033[31m'
GREEN = '\033[32m'
YELLOW = '\... | 201 | 30.7 | 105 | 16 | 1,525 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d09bf9fdd98bf3a1_b4257c56", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.",
"This expression logs [sensitive data (p... | [
82,
82,
116,
136
] | [
null,
null,
null,
null
] | [
15,
34,
19,
40
] | [
32,
47,
69,
54
] | |
2024-11-18T23:21:49.338469+00:00 | 1,388,137,916,000 | 9841bb5a6e89f54bd43553a9164aa3f650f8bd1b | 3 | {
"blob_id": "9841bb5a6e89f54bd43553a9164aa3f650f8bd1b",
"branch_name": "refs/heads/master",
"committer_date": 1388137916000,
"content_id": "a46251eb65d2a9c313b9e501af3131b2ae892348",
"detected_licenses": [
"MIT"
],
"directory_id": "61d911ddcde6aa879cd9a77e7c8b86f3f324e8cc",
"extension": "py",
"fi... | 2.65625 | stackv2 | import paramiko
from common import debug
class SshClient:
def __init__(self, hostname, username, directory, password=None, sshkey=None):
self.hostname = hostname
self.username = username
self.password = password
self.sshkey = sshkey
self.directory = directory
... | 41 | 34.73 | 134 | 16 | 327 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_4aac1e678e1f2823_0eed538e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
22
] | [
null
] | [
13
] | [
75
] | |
2024-11-18T21:33:34.707765+00:00 | 1,443,808,557,000 | 9903fd3d6aa6394df970296e716cf4a46453ed78 | 3 | {
"blob_id": "9903fd3d6aa6394df970296e716cf4a46453ed78",
"branch_name": "refs/heads/master",
"committer_date": 1443808557000,
"content_id": "df21f71104fea8a3ad2b81dedcec0b155b564839",
"detected_licenses": [
"MIT"
],
"directory_id": "9701d6e4cb43c3a07fe0186b6d57b1281d75a926",
"extension": "py",
"fi... | 2.640625 | stackv2 |
import os
import smtplib
from time import sleep
from jinja2 import Environment, PackageLoader
from email.mime.multipart import MIMEMultipart
from email.mime.text import MIMEText
from urllib.parse import urlparse
class Mailer(object):
def __init__(self, url):
scheme, netloc, path, params, query, fragment =... | 104 | 31.33 | 135 | 17 | 707 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a762e5ad7e08bf82_40fb4eac", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
51
] | [
null
] | [
20
] | [
85
] | |
2024-11-18T22:30:16.750693+00:00 | 1,374,482,273,000 | f1e047089bb8e349acfa59a63ec4be44482fbf29 | 3 | {
"blob_id": "f1e047089bb8e349acfa59a63ec4be44482fbf29",
"branch_name": "refs/heads/master",
"committer_date": 1374482273000,
"content_id": "60c238b1c027be80c58b3d2822e08abb0a090f13",
"detected_licenses": [
"MIT"
],
"directory_id": "82b34241cd1e2d7c6f9ef7660ed7351f615f8d18",
"extension": "py",
"fi... | 2.515625 | stackv2 | from multiprocessing import Process
from functools import wraps
from flask import g, redirect, request
from aurora_app.helpers import notify
def public(location):
"""Makes location public"""
location.is_public = True
return location
def must_be_able_to(action):
"""Checks if user can do action, if ... | 42 | 28.21 | 78 | 16 | 242 | python | [{"finding_id": "codeql_py/url-redirection_7e68d4521a3938f9_b5b2a2ce", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
23
] | [
null
] | [
33
] | [
49
] | |
2024-11-18T23:36:49.980862+00:00 | 1,689,912,169,000 | 78ab42b8dc9757770b1a2ba9bc7cb24e1c1bfc8b | 3 | {
"blob_id": "78ab42b8dc9757770b1a2ba9bc7cb24e1c1bfc8b",
"branch_name": "refs/heads/main",
"committer_date": 1689912169000,
"content_id": "f9e0e4f1f53a0a5875c325063e70032ad698d820",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "0ed62eec4eea9931f08f383cf657f3ca1a3ef4f9",
"extension": "py"... | 2.671875 | stackv2 | # BioPortal utilities
import requests
from requests.packages.urllib3.exceptions import InsecureRequestWarning
import json
import urllib.parse
import os
from fnmatch import fnmatch
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
BIOPORTAL_API_BASE = "https://data.bioontology.org"
def annotate(api... | 59 | 25.2 | 98 | 13 | 355 | python | [{"finding_id": "codeql_py/request-without-cert-validation_337fcdb0e0b367ba_517031b6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
46
] | [
null
] | [
20
] | [
83
] | |
2024-11-18T23:36:55.858378+00:00 | 1,586,696,969,000 | 1dfe50f8c9ba0f0cb97bfec899145751a0391f99 | 2 | {
"blob_id": "1dfe50f8c9ba0f0cb97bfec899145751a0391f99",
"branch_name": "refs/heads/master",
"committer_date": 1586696969000,
"content_id": "998a226915849b83a3cf4a35a10cdaa8aae42fe6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8cced97a617f980cca7b5e1342ac15e2ffbf8d33",
"extension": "py"... | 2.375 | stackv2 | from ..CommonInterface import CommonInterfaceNsd
from .helpers import Helpers
import json
import requests
class Nsd(CommonInterfaceNsd):
"""
NSD Management Interfaces
"""
def __init__(self, host, port=9999):
self._host = host
self._port = port
self._base_path = 'https://{0}:{1}... | 318 | 37.26 | 102 | 16 | 2,805 | python | [{"finding_id": "codeql_py/request-without-cert-validation_1abc20208b947edc_1a90fdbc", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 6 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
60,
110,
157,
195,
229,
265
] | [
null,
null,
null,
null,
null,
266
] | [
17,
17,
17,
17,
17,
17
] | [
97,
103,
97,
87,
97,
49
] | |
2024-11-18T23:36:57.911847+00:00 | 1,524,234,607,000 | 914f83ddfa0697671e41011e372c5ff8c9d428be | 3 | {
"blob_id": "914f83ddfa0697671e41011e372c5ff8c9d428be",
"branch_name": "refs/heads/master",
"committer_date": 1524234607000,
"content_id": "329a6c4038cb9b5af48d3ecb90a066cf00eb7a08",
"detected_licenses": [
"MIT"
],
"directory_id": "1c298fab3634b79e294936b478c66fed06f5218e",
"extension": "py",
"fi... | 3.484375 | stackv2 | import random
import os
def jogar ():
os.system('clear')
display_abertura()
palavras = abri_arquivo()
numero = random.randrange(0,len(palavras))
palavra_secreta = palavras[numero].lower()
lista_da_palavra = ["_" for letra in palavra_secreta]
tentativas = 7
enforcou = False
acer... | 172 | 24.43 | 63 | 15 | 1,122 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_52781b06036b5c84_0a94ac1c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
128
] | [
null
] | [
11
] | [
63
] | |
2024-11-18T21:14:45.542896+00:00 | 1,522,118,871,000 | 81b05c13f2fd05b30d2931e99d5dd50c9c42ec1a | 2 | {
"blob_id": "81b05c13f2fd05b30d2931e99d5dd50c9c42ec1a",
"branch_name": "refs/heads/master",
"committer_date": 1522118871000,
"content_id": "601f5bc869ee3f93ccf9269c0f546a1aa4f8d49a",
"detected_licenses": [
"MIT"
],
"directory_id": "60e7738d90ea7151a790a73285382b0c77799262",
"extension": "py",
"fi... | 2.453125 | stackv2 | import sys, os
import subprocess
import urllib, optparse
from flask import Flask, jsonify, request, abort, make_response
#from werkzeug.utils import secure_filename
###GLOBAL VARIABLES###############################
app = Flask(__name__)
##################################################
@app.route('/', methods=['GET... | 87 | 32.69 | 167 | 16 | 708 | python | [{"finding_id": "codeql_py/command-line-injection_9e058ac3d90b2d6f_27545dcb", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 1 | true | [
"CWE-078"
] | [
"py/command-line-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1)."
] | [
27
] | [
null
] | [
19
] | [
167
] | |
2024-11-18T21:57:26.328333+00:00 | 1,633,971,801,000 | 370ca635bac9f5327ba3541c5a580c6a8c84427a | 3 | {
"blob_id": "370ca635bac9f5327ba3541c5a580c6a8c84427a",
"branch_name": "refs/heads/main",
"committer_date": 1633971801000,
"content_id": "cb63951bffdfab4e1337054e4d38ef31d1a7f0d9",
"detected_licenses": [
"MIT"
],
"directory_id": "a92f4b5a90e97e0fa3b8bc46dfabbd3cf7e0df68",
"extension": "py",
"file... | 2.796875 | stackv2 | #!/usr/bin/env python3
import subprocess
import logging
import time
import sys
import os
logging.basicConfig(
level=10,
format='%(asctime)s:%(levelname)s:%(lineno)d\t\t%(message)s',
handlers=[
logging.FileHandler(f'{"/".join(os.path.realpath(__file__).split("/")[:-1])}/process.log'),
log... | 151 | 28.91 | 126 | 19 | 983 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d43e59b17b53530c_e610bb30", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
35,
50
] | [
null,
null
] | [
22,
26
] | [
31,
60
] | |
2024-11-18T21:57:49.446296+00:00 | 1,568,564,112,000 | 58bc6af260b98c5bd5a701318f586b03157e5af6 | 2 | {
"blob_id": "58bc6af260b98c5bd5a701318f586b03157e5af6",
"branch_name": "refs/heads/master",
"committer_date": 1568564112000,
"content_id": "4b01625a65cbc9d9a73917470fc900327f0949be",
"detected_licenses": [
"MIT"
],
"directory_id": "2367f3995720dfa54dd9c2a8e285fd47f517825c",
"extension": "py",
"fi... | 2.3125 | stackv2 | import socket
import select
import sys
import re
import Crypto
from Crypto.PublicKey import RSA
from Crypto import Random
import ast
server = socket.socket()
# IP_address = input("Enter IP address: ")
Port = int(input("Enter port number: "))
Mode = int(input("Enter mode: "))
IP_address = "127.0.0.1"
server.connect((IP... | 119 | 38.95 | 113 | 30 | 972 | python | [{"finding_id": "codeql_py/weak-crypto-key_b112157ba5d5ec7c_eb56032e", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
17
] | [
null
] | [
7
] | [
43
] | |
2024-11-18T21:57:58.033615+00:00 | 1,683,032,857,000 | 09ba89e38f1f729bb336c9bb1d9f101010f39eb0 | 3 | {
"blob_id": "09ba89e38f1f729bb336c9bb1d9f101010f39eb0",
"branch_name": "refs/heads/master",
"committer_date": 1683032857000,
"content_id": "a7bec3f4fae6c340c35e418408544aaa9bcb11c3",
"detected_licenses": [
"MIT"
],
"directory_id": "edd98ac69375fbe6acbc4a28e6ec5c61bcdbf249",
"extension": "py",
"fi... | 2.9375 | stackv2 | # 'os' module to access environment variables
import os
# 'logging' to log things to the terminal
import logging
# 'requests_oauthlib's 'OAuth2Session' to handle the OAuth magic
from requests_oauthlib import OAuth2Session
logging.basicConfig(level=logging.INFO)
# Gets the basic connection info from the environment v... | 70 | 36.94 | 71 | 9 | 599 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0fd7c9cf2b5a93b4_d5156a22", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
24,
70
] | [
null,
null
] | [
14,
7
] | [
55,
15
] | |
2024-11-18T21:58:08.505217+00:00 | 1,543,578,373,000 | f93ca338a8bf42f659b489d94fef2ac74ff53cda | 2 | {
"blob_id": "f93ca338a8bf42f659b489d94fef2ac74ff53cda",
"branch_name": "refs/heads/master",
"committer_date": 1543578373000,
"content_id": "39a4c17e2eac8b4d644825c5f6d7cc53a5bcc91a",
"detected_licenses": [
"MIT"
],
"directory_id": "bd7b602e2d362fc801627543aeec4e6ce917c641",
"extension": "py",
"fi... | 2.40625 | stackv2 | import logging
import boto3
from django.conf import settings
from ..exceptions import BackendRequirement
from .base import BaseSmsBackend
logger = logging.getLogger(__name__)
AWS_ACCESS_KEY_ID = getattr(settings, 'AWS_ACCESS_KEY_ID')
AWS_SECRET_ACCESS_KEY = getattr(settings, 'AWS_SECRET_ACCESS_KEY')
AWS_REGION_NAME... | 95 | 32.72 | 114 | 16 | 735 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b96023cb399e447c_487cb22b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
36
] | [
null
] | [
30
] | [
57
] | |
2024-11-18T21:58:09.370132+00:00 | 1,449,675,412,000 | 33ee08d10c009e80e4e628ef7fedf5024cc40a40 | 3 | {
"blob_id": "33ee08d10c009e80e4e628ef7fedf5024cc40a40",
"branch_name": "refs/heads/master",
"committer_date": 1449675412000,
"content_id": "df6d50349f1877522ce6c73d8fe8e7f967f5f1b2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3639762625ea9481f26e77b7ba68b8ae10fa4a84",
"extension": "py"... | 2.5625 | stackv2 | # Copyright (c) 2015 Scality
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, s... | 245 | 28 | 78 | 17 | 1,642 | python | [{"finding_id": "codeql_py/overly-permissive-file_27eb080bef7a6839_c4126900", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
157
] | [
null
] | [
9
] | [
38
] | |
2024-11-18T21:58:33.175074+00:00 | 1,614,366,147,000 | cf3ed158a6c5ec7b0607d01a6eaebce0a0386eb3 | 4 | {
"blob_id": "cf3ed158a6c5ec7b0607d01a6eaebce0a0386eb3",
"branch_name": "refs/heads/main",
"committer_date": 1614366147000,
"content_id": "cfbeed53d4565b025cb0b707ec879517a404df29",
"detected_licenses": [
"MIT"
],
"directory_id": "e26db03a9825b0b82e3ca62326f4be0d70317ad5",
"extension": "py",
"file... | 3.703125 | stackv2 | import random
upperCaseLetters: str = "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
lowerCaseLetters: str = upperCaseLetters.lower()
digits: str = "0123456789"
symbols: str = "!@#$%^&*()_-+={[}]|\\/?.>,<;:"
upper: bool = True
lower: bool = True
nums: bool = True
syms: bool = True
allLetters: str = ""
if upper:
allLetters += upp... | 31 | 18.39 | 57 | 10 | 176 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_75f5d84a25b84be8_62c7a136", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
31
] | [
null
] | [
11
] | [
19
] | |
2024-11-18T21:58:33.296734+00:00 | 1,559,697,696,000 | 8fafb8fccb57ff0187ab07b5b32511110fe268d9 | 2 | {
"blob_id": "8fafb8fccb57ff0187ab07b5b32511110fe268d9",
"branch_name": "refs/heads/master",
"committer_date": 1559697696000,
"content_id": "b00d0fe2d357010585916b08f7e8793cbf4c335d",
"detected_licenses": [
"MIT"
],
"directory_id": "99249dad36df26a712ae8d900041d53acf3901ea",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/env python
"""High-magnification, small field of view video camera of the diffractometer,
used for aligneing a crystal in the X-ray beam
Friedrich Schotte, 19 Feb 2008 - 6 Jul 2017"""
__version__ = "1.8.1" # __main__
import logging; from tempfile import gettempdir
logfile = gettempdir()+"/MicroscopeCamera.l... | 34 | 34.32 | 79 | 10 | 315 | python | [{"finding_id": "codeql_py/overly-permissive-file_8cc893aeb9a47ee7_cb35a658", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
13
] | [
null
] | [
6
] | [
25
] | |
2024-11-18T23:10:56.196729+00:00 | 1,556,577,091,000 | 4a78012f53de834848d718c4a0b101d6fd4bf5f5 | 3 | {
"blob_id": "4a78012f53de834848d718c4a0b101d6fd4bf5f5",
"branch_name": "refs/heads/master",
"committer_date": 1556577091000,
"content_id": "601d3713081ce8aac14228323196307d0b13284f",
"detected_licenses": [
"MIT"
],
"directory_id": "ce86b4d3aa9fefdd412d33cb4e7256d456e160e8",
"extension": "py",
"fi... | 2.75 | stackv2 | import pathlib
import jinja2
from .assetfiles import AssetFiles
def setup_parser(parser):
parser.add_argument('src',
type=str,
help='''src root folder.
src/articles is markdown folder.
src/templates is html template folder.
''')
parser.ad... | 81 | 26.2 | 76 | 18 | 463 | python | [{"finding_id": "codeql_py/stack-trace-exposure_2093629f00bab67a_94dda121", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 3 | true | [
"CWE-209",
"CWE-079",
"CWE-079"
] | [
"py/stack-trace-exposure",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
68,
44,
63
] | [
null,
45,
64
] | [
20,
26,
32
] | [
39,
71,
77
] | |
2024-11-18T22:48:21.970842+00:00 | 1,596,429,528,000 | 706d79e34e1ad5a702890318779cbbf1a0846ac9 | 3 | {
"blob_id": "706d79e34e1ad5a702890318779cbbf1a0846ac9",
"branch_name": "refs/heads/master",
"committer_date": 1596429528000,
"content_id": "5c47d08ad99d5a33e3602bc6200db9c984e64d4c",
"detected_licenses": [
"MIT"
],
"directory_id": "d25488bede4e1a1316aa1afbd6e446144deb12bb",
"extension": "py",
"fi... | 2.828125 | stackv2 | from click import echo
from jinja2 import Template
def merge(template_string: str, values: dict):
template = Template(template_string)
return template.render(values)
def render(template, values, target=None):
with open(template, 'r') as template_file:
template_string = template_file.read()
... | 20 | 24.4 | 46 | 13 | 107 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_711a854467abcfa6_5002e9ea", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
6
] | [
null
] | [
16
] | [
41
] | |
2024-11-18T22:49:06.943437+00:00 | 1,357,025,520,000 | ee5fa6bd80cbbff94049e91c2f9603e84ddae174 | 3 | {
"blob_id": "ee5fa6bd80cbbff94049e91c2f9603e84ddae174",
"branch_name": "refs/heads/master",
"committer_date": 1357025520000,
"content_id": "6c6812c455765d3d53b124a793b745397866471b",
"detected_licenses": [
"MIT"
],
"directory_id": "23da0ae6ef9f08738a0c8d50ddb09ede159a62de",
"extension": "py",
"fi... | 2.71875 | stackv2 | # encoding: utf-8
import pwd
import os
import pwd
import grp
def get_uid(username):
try:
pwd.getpwnam(username)[2]
except:
return None
def drop_privileges(uid_name='nobody', gid_name='nogroup'):
if os.getuid() != 0:
# We're not root so, like, whatever dude
return
# Get... | 66 | 27.45 | 74 | 13 | 484 | python | [{"finding_id": "codeql_py/overly-permissive-file_3875b3e3097e41ff_a903f6e8", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
48
] | [
null
] | [
13
] | [
37
] | |
2024-11-18T22:49:10.064948+00:00 | 1,537,916,713,000 | 6f7b6512815ccee1bd52232bb7450523a41e7799 | 2 | {
"blob_id": "6f7b6512815ccee1bd52232bb7450523a41e7799",
"branch_name": "refs/heads/master",
"committer_date": 1537916713000,
"content_id": "a6389d29b4d832889706fcae67bd44d42d8daf1e",
"detected_licenses": [
"MIT"
],
"directory_id": "5d3924fb75b83175f1276696b5843203445f9b6d",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import logging
import os
import re
import requests
import simplejson as json
import socket
import time
import tornado.ioloop
import tornado.options
import tornado.web
import tornado.websocket
import urllib.request
import uuid
logging.basicConfig(
format='%(asctime)s'
... | 207 | 29.95 | 78 | 23 | 1,307 | python | [{"finding_id": "codeql_py/stack-trace-exposure_1a51d095cccdbd75_f8f6a6e7", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 6 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-079",
"CWE-117",
"CWE-117"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/reflective-xss",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"Cross-site scripting vul... | [
86,
114,
194,
191,
58,
189
] | [
89,
117,
197,
null,
null,
null
] | [
24,
24,
24,
24,
22,
26
] | [
15,
15,
15,
49,
51,
66
] | |
2024-11-18T23:26:01.010451+00:00 | 1,571,867,241,000 | 06be4c8aabf6ae285a2b5d6bacd5985a816f6c31 | 3 | {
"blob_id": "06be4c8aabf6ae285a2b5d6bacd5985a816f6c31",
"branch_name": "refs/heads/master",
"committer_date": 1571867241000,
"content_id": "bbd464ec35c27b667877b303765a608df6171acb",
"detected_licenses": [
"MIT"
],
"directory_id": "472b0eb035ea11a4978c87d43a4e698aaa0f161c",
"extension": "py",
"fi... | 2.546875 | stackv2 | import grp
import os
import pwd
import shlex
import subprocess
from typing import Set, List
from helpers.ssh_key_object import SSHKeyObject
from helpers.gitlab_operations import GitlabGroupConfig
from helpers.config_operations import sanitize_sudoers_line, sanitize_username
__all__ = [
"UserOps",
"UOProtectedU... | 252 | 33.23 | 116 | 20 | 1,952 | python | [{"finding_id": "codeql_py/overly-permissive-file_487d733703b653b4_23889134", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
141
] | [
null
] | [
9
] | [
46
] | |
2024-11-18T23:26:03.774290+00:00 | 1,626,522,876,000 | b45a00cd924b9946041ac99da80f15ea6458044f | 3 | {
"blob_id": "b45a00cd924b9946041ac99da80f15ea6458044f",
"branch_name": "refs/heads/master",
"committer_date": 1626522876000,
"content_id": "06918eba1956bf727e2803ac886f1bec5ac8588f",
"detected_licenses": [
"MIT"
],
"directory_id": "65f73fbe3842767fbc1b28a4edc97232c3e3952e",
"extension": "py",
"fi... | 2.671875 | stackv2 | import time
import uuid
import discordsdk as dsdk
# we get the application id from a file
with open("application_id.txt", "r") as file:
application_id = int(file.read())
# debug callback
def debug_callback(debug, result, *args):
if result == dsdk.Result.ok:
print(debug, "success")
else:
... | 83 | 25.72 | 100 | 13 | 501 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_648b896a23994142_4ab07024", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
27,
32
] | [
null,
null
] | [
21,
21
] | [
27,
27
] | |
2024-11-18T23:26:07.235953+00:00 | 1,558,883,853,000 | 2fd8d71b709babeba3deec802f6d1df535639ebc | 3 | {
"blob_id": "2fd8d71b709babeba3deec802f6d1df535639ebc",
"branch_name": "refs/heads/master",
"committer_date": 1558883853000,
"content_id": "f0980698e186b83aba4f1c4ca9f221b4be314f6b",
"detected_licenses": [
"MIT"
],
"directory_id": "96262ca5188d996902570e97f3d95baebf6c9c94",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/env python
# coding: utf-8
# @Author: lapis-hong
# @Date : 2019/5/8
"""Abstract base class for all search engine extractor descendant classes."""
from __future__ import absolute_import
from __future__ import unicode_literals
import os
import time
import random
import logging
from abc import ABCMeta, abstra... | 270 | 35.6 | 101 | 16 | 2,068 | python | [{"finding_id": "codeql_py/request-without-cert-validation_d783abd37fd5dfcb_2a18299d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
201
] | [
207
] | [
28
] | [
32
] | |
2024-11-18T23:26:08.603573+00:00 | 1,546,549,139,000 | a88f0a03f0271658d3298d377eef9c4ecc39b066 | 3 | {
"blob_id": "a88f0a03f0271658d3298d377eef9c4ecc39b066",
"branch_name": "refs/heads/master",
"committer_date": 1546549139000,
"content_id": "ed368db905068ab107f455a6ec5dca026ff77376",
"detected_licenses": [
"MIT"
],
"directory_id": "3598c02d42963fff2a48b121dbf6c6993611e2b6",
"extension": "py",
"fi... | 3.375 | stackv2 | import random
caracteres = "abcdefghijklmnospqrstuvwxyzABCDEFGHIJKLMNOSPQRSTUVWXYZ1234567890$#@"
numero, longitud = input("Número Longitud ").split()
numero = int(numero)
longitud = int(longitud)
arreglo_password = []
for i in range(numero):
password = "".join(random.sample(caracteres, longitud))
if passw... | 23 | 22.13 | 82 | 10 | 127 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5ada00011a39eb02_e3e76982", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
22,
20
] | [
null,
null
] | [
17,
7
] | [
44,
23
] | |
2024-11-18T22:27:27.540102+00:00 | 1,613,665,022,000 | 2af9815cd896b010f1f8356d9efa819b5236ad47 | 2 | {
"blob_id": "2af9815cd896b010f1f8356d9efa819b5236ad47",
"branch_name": "refs/heads/master",
"committer_date": 1613665022000,
"content_id": "c03d6b95e68730d19fac182baf4d592c11ed7432",
"detected_licenses": [
"MIT"
],
"directory_id": "ff818f48b52a812256d4bb8718a0b5fefaa33f4c",
"extension": "py",
"fi... | 2.40625 | stackv2 | import logging
import os
from flask import Flask
from flask import Markup
from flask import render_template
from flask import request
from flask import Response
from flask import jsonify
from flask_babel import Babel, gettext
from google.cloud import datastore
from opencensus.ext.azure.log_exporter import AzureLogHand... | 211 | 30.32 | 146 | 19 | 1,446 | python | [{"finding_id": "codeql_py/reflective-xss_520333c788f0d8a3_de89c307", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
120
] | [
null
] | [
12
] | [
51
] | |
2024-11-18T22:27:31.559637+00:00 | 1,542,977,253,000 | 8d33cbbb833a727dca6d6bf8245233a1b3d3c5d1 | 3 | {
"blob_id": "8d33cbbb833a727dca6d6bf8245233a1b3d3c5d1",
"branch_name": "refs/heads/master",
"committer_date": 1542977253000,
"content_id": "9b3485eaede35baaf9567155d3bb5f93d6de1640",
"detected_licenses": [
"MIT"
],
"directory_id": "f3b6644916ab2e0dba94b514904f46269454149c",
"extension": "py",
"fi... | 2.65625 | stackv2 | import json
from flask import Flask, render_template
from flask_cors import CORS
from tfidf import ExtractiveSummarizer_tfidf
from balance import balance_equation
app = Flask(__name__)
CORS(app, resources={r"/*": {"origins": "*"}})
text_summarizer = ExtractiveSummarizer_tfidf(corpus="clean_dataset")
with open("eleme... | 63 | 24.48 | 73 | 14 | 365 | python | [{"finding_id": "codeql_py/flask-debug_280361410aa169d3_2a6f8dd1", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
63,
40,
53
] | [
null,
null,
null
] | [
5,
20,
16
] | [
24,
48,
44
] | |
2024-11-18T22:27:33.619961+00:00 | 1,626,936,728,000 | e3593184a165e68328c4748ff6485f405e957ee1 | 3 | {
"blob_id": "e3593184a165e68328c4748ff6485f405e957ee1",
"branch_name": "refs/heads/master",
"committer_date": 1626936728000,
"content_id": "c35971479e9a2c79290f75f5273eaab268ef9bbc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b08fa95dc2e838d425a7b4569383b400c73103d1",
"extension": "py"... | 2.953125 | stackv2 | #! /usr/bin/env python
# -*- coding: utf-8 -*-
# File Name: base
# Description :
# Author : SanYapeng
# date: 2019-05-15
# Change Activity: 2019-05-15:
import json
import re
import time
import hashlib
import os
class Message:
@staticmethod
def welcome():
mes... | 252 | 24.18 | 92 | 16 | 1,619 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_0393556752ce7fe1_f23d2c54", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
81
] | [
null
] | [
20
] | [
44
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.